Sciweavers

364 search results - page 31 / 73
» Monitoring, Analyzing, and Controlling Internet-scale System...
Sort
View
SYSTOR
2009
ACM
15 years 2 months ago
Architecture of the internet archive
The Internet Archive is a live production system supporting close to a petabyte of data and delivering an average of 2.3Gb/sec of data to Internet users. We describe the architect...
Elliot Jaffe, Scott Kirkpatrick
BPSC
2010
194views Business» more  BPSC 2010»
14 years 8 months ago
Ad-hoc Management Capabilities for Distributed Business Processes
: Advanced business processes are mostly distributed and require highly flexible management capabilities. In such scenarios, process parts often leave their initiator’s direct sp...
Sonja Zaplata, Dirk Bade, Kristof Hamann, Winfried...
EUROSEC
2010
ACM
15 years 4 months ago
Improving the accuracy of network intrusion detection systems under load using selective packet discarding
Under conditions of heavy traffic load or sudden traffic bursts, the peak processing throughput of network intrusion detection systems (NIDS) may not be sufficient for inspecting ...
Antonis Papadogiannakis, Michalis Polychronakis, E...
RE
2005
Springer
15 years 3 months ago
Identifying Contingency Requirements Using Obstacle Analysis
This paper describes the use of Obstacle Analysis to identify anomaly-handling requirements for a safetycritical, autonomous system. The software requirements for the system evolv...
Robyn R. Lutz, Stacy Nelson, Ann Patterson-Hine, C...
HOTNETS
2010
14 years 4 months ago
Diagnosing mobile applications in the wild
There are a lot of applications that run on modern mobile operating systems. Inevitably, some of these applications fail in the hands of users. Diagnosing a failure to identify the...
Sharad Agarwal, Ratul Mahajan, Alice Zheng, Victor...