Sciweavers

1448 search results - page 169 / 290
» Deadlock Detection in Distributed Systems
Sort
View
CCS
2010
ACM
15 years 4 months ago
AccessMiner: using system-centric models for malware protection
Models based on system calls are a popular and common approach to characterize the run-time behavior of programs. For example, system calls are used by intrusion detection systems...
Andrea Lanzi, Davide Balzarotti, Christopher Krueg...
AUTONOMICS
2008
ACM
15 years 6 months ago
Design of a fence surveillance system based on wireless sensor networks
In this paper, we present a real application system based on wireless sensor network (WSN) for fence surveillance which is implemented on our development platform for WSN, called ...
Youngsoo Kim, Jonggu Kang, Daeyoung Kim, Eunjo Kim...
PERCOM
2003
ACM
16 years 4 months ago
Self-Adaptive Leasing for Jini
Distributed systems require strategies to detect and recover from failures. Many protocols for distributed systems employ a strategy based on leases, which grant a leaseholder acc...
Kevin Bowers, Kevin Mills, Scott Rose
HASE
2007
IEEE
15 years 10 months ago
A Fault Taxonomy for Service-Oriented Architecture
—Service-Oriented Architecture (SOA) is a popular design paradigm for distributed systems today. Its dynamics and loose coupling are predestined for self-adaptive systems. This a...
Stefan Brüning, Stephan Weißleder, Miro...
CCS
2005
ACM
15 years 10 months ago
An auctioning reputation system based on anomaly
Existing reputation systems used by online auction houses do not address the concern of a buyer shopping for commodities—finding a good bargain. These systems do not provide in...
Shai Rubin, Mihai Christodorescu, Vinod Ganapathy,...