Sciweavers

1661 search results - page 256 / 333
» Distributed Top-K Monitoring
Sort
View
CCGRID
2005
IEEE
15 years 3 months ago
ReGS: user-level reliability in a grid environment
Grid environments are ideal for executing applications that require a huge amount of computational work, both due to the big number of tasks to execute and to the large amount of ...
J. A. L. Sanches, Patrícia Kayser Vargas, I...
ESCIENCE
2005
IEEE
15 years 3 months ago
Publishing Persistent Grid Computations as WS Resources
Abstract Grid services can be composed into processes, providing a high level definition of the computations involved in terms of their data exchanges and control flow dependenci...
Thomas Heinis, Cesare Pautasso, Oliver Deak, Gusta...
HOTI
2005
IEEE
15 years 3 months ago
SIFT: Snort Intrusion Filter for TCP
Intrusion rule processing in reconfigurable hardware enables intrusion detection and prevention services to run at multi Gigabit/second rates. High-level intrusion rules mapped d...
Michael Attig, John W. Lockwood
ICAC
2005
IEEE
15 years 3 months ago
Multi-resolution Abnormal Trace Detection Using Varied-length N-grams and Automata
Detection and diagnosis of faults in a large-scale distributed system is a formidable task. Interest in monitoring and using traces of user requests for fault detection has been o...
Guofei Jiang, Haifeng Chen, Cristian Ungureanu, Ke...
ICDCSW
2005
IEEE
15 years 3 months ago
Forensix: A Robust, High-Performance Reconstruction System
When computer intrusions occur, one of the most costly, time-consuming, and human-intensive tasks is the analysis and recovery of the compromised system. At a time when the cost o...
Ashvin Goel, Wu-chang Feng, David Maier, Wu-chi Fe...