Sciweavers

1448 search results - page 208 / 290
» Deadlock Detection in Distributed Systems
Sort
View
141
Voted
WSC
1998
15 years 6 months ago
A Speculation-based Approach for Performance and Dependability Analysis: A Case Study
In this paper, we propose two speculation-based methods for fast and accurate simulation-based performance and dependability analysis of complex systems, incorporating detailed si...
Yiqing Huang, Zbigniew Kalbarczyk, Ravishankar K. ...
DEBS
2008
ACM
15 years 6 months ago
Event-based constraints for sensornet programming
We propose a sensornet programming model based on declarative spatio-temporal constraints on events only, not sensors. Where previous approaches conflate events and sensors becaus...
Jie Mao, John Jannotti, Mert Akdere, Ugur Ç...
ICDCSW
2007
IEEE
15 years 11 months ago
A Cooperative Approach for Analyzing Intrusions in Mobile Ad hoc Networks
In this paper, we consider the problem of reducing the number of false positives generated by cooperative Intrusion Detection Systems (IDSs) in Mobile Ad hoc Networks (MANETs). We...
Hadi Otrok, Mourad Debbabi, Chadi Assi, Prabir Bha...
IEEEMSP
2002
IEEE
134views Multimedia» more  IEEEMSP 2002»
15 years 10 months ago
Beat-ID: identifying music via beat analysis
— Music identification is an effective tool that enables multimedia players to extract a distinct statistical digest of the played content, look up into a music database using t...
Darko Kirovski, Hagai Attias
DIMVA
2009
15 years 6 months ago
Defending Browsers against Drive-by Downloads: Mitigating Heap-Spraying Code Injection Attacks
Drive-by download attacks are among the most common methods for spreading malware today. These attacks typically exploit memory corruption vulnerabilities in web browsers and brows...
Manuel Egele, Peter Wurzinger, Christopher Kruegel...