Sciweavers

681 search results - page 19 / 137
» Aspects for Trace Monitoring
Sort
View
IJIPT
2010
91views more  IJIPT 2010»
14 years 8 months ago
Detecting and blocking P2P botnets through contact tracing chains
: Peer-to-peer (P2P) botnets have recently become serious security threats on the internet. It is difficult to detect the propagation of P2P botnets by isolated monitoring on indiv...
Zhiyong Huang, Xiaoping Zeng, Yong Liu
APSEC
1997
IEEE
15 years 1 months ago
Using Extended Event Traces to Describe Communication in Software Architectures
A crucial aspect of the architecture of a software system is its decomposition into components and the specification of component interactions. In this report we use a variant of...
Manfred Broy, Christoph Hofmann, Ingolf Krüge...
ENTCS
2007
69views more  ENTCS 2007»
14 years 9 months ago
Modal Logic Characterization of Markovian Testing and Trace Equivalences
Markovian testing and trace equivalences have been recently proposed as reasonable alternatives to Markovian bisimilarity, as both of them induce at the Markov chain level an aggr...
Marco Bernardo, Stefania Botta
PAM
2005
Springer
15 years 3 months ago
Applying Principles of Active Available Bandwidth Algorithms to Passive TCP Traces
Abstract. While several algorithms have been created to actively measure the end-to-end available bandwidth of a network path, they require instrumentation at both ends of the path...
Marcia Zangrilli, Bruce Lowekamp
EDBT
2010
ACM
185views Database» more  EDBT 2010»
14 years 11 months ago
BP-Ex: a uniform query engine for business process execution traces
Many enterprises nowadays use business processes, based on the BPEL standard, to achieve their goals. Analyzing the execution of such processes is critical for enforcing business ...
Eran Balan, Tova Milo, Tal Sterenzy