Sciweavers

3497 search results - page 63 / 700
» Making Distributed Applications Robust
Sort
View
ICC
2008
IEEE
118views Communications» more  ICC 2008»
15 years 6 months ago
A Principal Components Analysis-Based Robust DDoS Defense System
—One of the major threats to cyber security is the Distributed Denial-of-Service (DDoS) attack. In our previous projects, PacketScore, ALPi, and other statistical filtering-based...
Huizhong Sun, Yan Zhaung, H. Jonathan Chao
SRDS
2008
IEEE
15 years 6 months ago
Application-Level Recovery Mechanisms for Context-Aware Pervasive Computing
We identify here various kinds of failure conditions and robustness issues that arise in context-aware pervasive computing applications. Such conditions are related to failures in...
Devdatta Kulkarni, Anand Tripathi
TGC
2007
Springer
15 years 6 months ago
Access Control Based on Code Identity for Open Distributed Systems
In computing systems, trust is an expectation on the dynamic behavior of an agent; static analysis is a collection of techniques for establishing static bounds on the dynamic behav...
Andrew Cirillo, James Riely
CSDA
2008
147views more  CSDA 2008»
14 years 12 months ago
An adjusted boxplot for skewed distributions
The boxplot is a very popular graphical tool to visualize the distribution of continuous unimodal data. It shows information about the location, spread, skewness as well as the ta...
M. Hubert, E. Vandervieren
ICDE
2009
IEEE
156views Database» more  ICDE 2009»
16 years 1 months ago
Online Anomaly Prediction for Robust Cluster Systems
In this paper, we present a stream-based mining algorithm for online anomaly prediction. Many real-world applications such as data stream analysis requires continuous cluster opera...
Xiaohui Gu, Haixun Wang