Sciweavers

1490 search results - page 69 / 298
» Monitoring Mobile Code
Sort
View
CLEIEJ
1998
134views more  CLEIEJ 1998»
14 years 11 months ago
Firewall Monitoring
Securing resources against unauthorized access and/or use is a major concern of every organization that uses computer networks. To protect internal networks from external attacks,...
Ernst L. Leiss, Jianyu You
SEKE
2010
Springer
14 years 10 months ago
A Project Monitoring Cockpit Based On Integrating Data Sources in Open Source Software Development
— Many open source software (OSS) development projects use tools and models that come from heterogeneous sources. A project manager, who wants to analyze indicators for the state...
Stefan Biffl, Wikan Danar Sunindyo, Thomas Moser
GLOBECOM
2007
IEEE
15 years 3 months ago
Accelerating Service Discovery in Ad-Hoc Zero Configuration Networking
Zero Configuration Networking (Zeroconf) assigns IP addresses and host names, and discovers service without a central server. Zeroconf can be used in wireless mobile ad-hoc network...
Se Gi Hong, Suman Srinivasan, Henning Schulzrinne
ICCD
2008
IEEE
116views Hardware» more  ICCD 2008»
15 years 8 months ago
Prototyping a hybrid main memory using a virtual machine monitor
— We use a novel virtualization-based approach for computer architecture performance analysis. We present a case study analyzing a hypothetical hybrid main memory, which consists...
Dong Ye, Aravind Pavuluri, Carl A. Waldspurger, Br...
ECOOP
2007
Springer
15 years 6 months ago
A Staged Static Program Analysis to Improve the Performance of Runtime Monitoring
In runtime monitoring, a programmer specifies a piece of code to execute when a trace of events occurs during program execution. Our work is based on tracematches, an extension to...
Eric Bodden, Laurie J. Hendren, Ondrej Lhotá...