Sciweavers

953 search results - page 191 / 191
» On the Emulation of Software Faults by Software Fault Inject...
Sort
View
SAC
2011
ACM
12 years 8 months ago
Cloud application logging for forensics
Logs are one of the most important pieces of analytical data in a cloud-based service infrastructure. At any point in time, service owners and operators need to understand the sta...
Raffael Marty
GAMESEC
2011
344views Game Theory» more  GAMESEC 2011»
12 years 5 months ago
Aegis A Novel Cyber-Insurance Model
Recent works on Internet risk management have proposed the idea of cyber-insurance to eliminate risks due to security threats, which cannot be tackled through traditional means suc...
Ranjan Pal, Leana Golubchik, Konstantinos Psounis
VEE
2012
ACM
218views Virtualization» more  VEE 2012»
12 years 1 months ago
Enhancing TCP throughput of highly available virtual machines via speculative communication
Checkpoint-recovery based virtual machine (VM) replication is an attractive technique for accommodating VM installations with high-availability. It provides seamless failover for ...
Balazs Gerofi, Yutaka Ishikawa