Sciweavers

1318 search results - page 226 / 264
» Measuring network security using dynamic bayesian network
Sort
View
PC
2006
113views Management» more  PC 2006»
14 years 9 months ago
Autonomous mobility skeletons
To manage load on large and dynamic networks we have developed Autonomous Mobile Programs (AMPs) that periodically use a cost model to decide where to execute. A disadvantage of d...
Xiao Yan Deng, Greg Michaelson, Philip W. Trinder
OSDI
2000
ACM
14 years 11 months ago
End-to-End Authorization
Many boundaries impede the flow of authorization information, forcing applications that span those boundaries into hop-by-hop approaches to authorization. We present a unified app...
Jon Howell, David Kotz
SIGCOMM
2009
ACM
15 years 4 months ago
Impact of IT monoculture on behavioral end host intrusion detection
In this paper, we study the impact of today’s IT policies, defined based upon a monoculture approach, on the performance of endhost anomaly detectors. This approach leads to th...
Dhiman Barman, Jaideep Chandrashekar, Nina Taft, M...
AC
2005
Springer
14 years 9 months ago
Power Analysis and Optimization Techniques for Energy Efficient Computer Systems
Reducing power consumption has become a major challenge in the design and operation of today's computer systems. This chapter describes different techniques addressing this c...
Wissam Chedid, Chansu Yu, Ben Lee
MOBIMEDIA
2007
14 years 11 months ago
Adaptive link layer protocols for shared wireless links
— The error prone nature of wireless links often necessitates the use of a link layer protocol to ensure acceptable application performance. While traditional link layers assume ...
George Xylomenos, Michael Makidis