Sciweavers

5934 search results - page 149 / 1187
» Detecting a Network Failure
Sort
View
IAW
2003
IEEE
15 years 9 months ago
The Use of Honeynets to Detect Exploited Systems Across Large Enterprise Networks
– Computer Networks connected to the Internet continue to be compromised and exploited by hackers. This is in spite of the fact that many networks run some type of security mecha...
John G. Levine, Richard LaBella, Henry L. Owen, Di...
ESCIENCE
2006
IEEE
15 years 10 months ago
Monitoring the Earth System Grid with MDS4
In production Grids for scientific applications, service and resource failures must be detected and addressed quickly. In this paper, we describe the monitoring infrastructure use...
Ann L. Chervenak, Jennifer M. Schopf, Laura Pearlm...
IPPS
2000
IEEE
15 years 8 months ago
A Mechanism for Speculative Memory Accesses Following Synchronizing Operations
In order to reduce the overhead of synchronizing operations of shared memory multiprocessors, this paper proposes a mechanism, named specMEM, to execute memory accesses following ...
Takayuki Sato, Kazuhiko Ohno, Hiroshi Nakashima
RAID
1999
Springer
15 years 8 months ago
Improving Intrusion Detection Performance using Keyword Selection and Neural Networks
The most common computer intrusion detection systems detect signatures of known attacks by searching for attack-specific keywords in network traffic. Many of these systems suffer ...
Richard Lippmann, Robert K. Cunningham
DEXAW
2005
IEEE
151views Database» more  DEXAW 2005»
15 years 10 months ago
An Overlay Network for Resource Discovery in Grids
As Grids try to achieve optimal and balanced utilization of unused resources in a distributed system, fast and efficient discovery of resource states is a key requirement. For sm...
Manfred Hauswirth, Roman Schmidt