Sciweavers

209 search results - page 20 / 42
» Biography as events in time and space
Sort
View
IWIA
2005
IEEE
15 years 7 months ago
Forensic Analysis of File System Intrusions Using Improved Backtracking
Intrusion detection systems alert the system administrators of intrusions but, in most cases, do not provide details about which system events are relevant to the intrusion and ho...
Sriranjani Sitaraman, Subbarayan Venkatesan
104
Voted
ATVA
2006
Springer
130views Hardware» more  ATVA 2006»
15 years 5 months ago
The Implementation of Mazurkiewicz Traces in POEM
We present the implementation of the trace theory in a new model checking tool framework, POEM, that has a strong emphasis on Partial Order Methods. A tree structure is used to sto...
Peter Niebert, Hongyang Qu
125
Voted
RTAS
2007
IEEE
15 years 8 months ago
Hijack: Taking Control of COTS Systems for Real-Time User-Level Services
This paper focuses on a technique to empower commercial-off-the-shelf (COTS) systems with an execution environment, and corresponding services, to support realtime and embedded ap...
Gabriel Parmer, Richard West
124
Voted
MSS
2000
IEEE
160views Hardware» more  MSS 2000»
15 years 6 months ago
Implementation of a Fault-Tolerant Real-Time Network-Attached Storage Device
Phoenix is a fault-tolerantreal-time network-attachedstorage device (NASD). Like other NASD architectures, Phoenix provides an object-based interface to data stored on network-att...
Ashish Raniwala, Srikant Sharma, Anindya Neogi, Tz...
HICSS
2007
IEEE
132views Biometrics» more  HICSS 2007»
15 years 8 months ago
Complex Interacting Infrastructure Systems
Critical infrastructures have some of the characteristic properties of complex systems. They exhibit infrequent large failures events. These events, though infrequent, often obey ...
Ian Dobson