Sciweavers

1090 search results - page 130 / 218
» A Replicated Monitoring Tool
Sort
View
LISA
2007
15 years 4 months ago
Remote Control: Distributed Application Configuration, Management, and Visualization with Plush
Support for distributed application management in large-scale networked environments remains in its early stages. Although a number of solutions exist for subtasks of application ...
Jeannie R. Albrecht, Ryan Braud, Darren Dao, Nikol...
MASCOTS
2010
15 years 3 months ago
OnTimeDetect: Dynamic Network Anomaly Notification in perfSONAR Deployments
To monitor and diagnose bottlenecks on network paths used for large-scale data transfers, there is an increasing trend to deploy measurement frameworks such as perfSONAR. These dep...
Prasad Calyam, Jialu Pu, Weiping Mandrawa, Ashok K...
SEC
2007
15 years 3 months ago
A Survey of Bots Used for Distributed Denial of Service Attacks
Abstract. In recent years, we have seen the arrival of Distributed Denial-ofService (DDoS) open-source bot-based attack tools facilitating easy code enhancement, and so resulting i...
Vrizlynn L. L. Thing, Morris Sloman, Naranker Dula...
WSC
1997
15 years 3 months ago
Requirements for Transitioning Business Process Simulation Models to Real-Time Operational Systems
The value of modeling and simulating business processes has recently received increased attention with the interest in business process re-engineering (BPR). Many re-engineering p...
Peter Floss
110
Voted
CIDM
2007
IEEE
15 years 2 months ago
Detection of Unknown Computer Worms Activity Based on Computer Behavior using Data Mining
— Detecting unknown worms is a challenging task. Extant solutions, such as anti-virus tools, rely mainly on prior explicit knowledge of specific worm signatures. As a result, aft...
Robert Moskovitch, Ido Gus, Shay Pluderman, Dima S...