Sciweavers

1490 search results - page 69 / 298
» Monitoring Mobile Code
Sort
View
114
Voted
CLEIEJ
1998
134views more  CLEIEJ 1998»
15 years 2 months ago
Firewall Monitoring
Securing resources against unauthorized access and/or use is a major concern of every organization that uses computer networks. To protect internal networks from external attacks,...
Ernst L. Leiss, Jianyu You
210
Voted
SEKE
2010
Springer
15 years 28 days ago
A Project Monitoring Cockpit Based On Integrating Data Sources in Open Source Software Development
— Many open source software (OSS) development projects use tools and models that come from heterogeneous sources. A project manager, who wants to analyze indicators for the state...
Stefan Biffl, Wikan Danar Sunindyo, Thomas Moser
117
Voted
GLOBECOM
2007
IEEE
15 years 6 months ago
Accelerating Service Discovery in Ad-Hoc Zero Configuration Networking
Zero Configuration Networking (Zeroconf) assigns IP addresses and host names, and discovers service without a central server. Zeroconf can be used in wireless mobile ad-hoc network...
Se Gi Hong, Suman Srinivasan, Henning Schulzrinne
116
Voted
ICCD
2008
IEEE
116views Hardware» more  ICCD 2008»
15 years 11 months ago
Prototyping a hybrid main memory using a virtual machine monitor
— We use a novel virtualization-based approach for computer architecture performance analysis. We present a case study analyzing a hypothetical hybrid main memory, which consists...
Dong Ye, Aravind Pavuluri, Carl A. Waldspurger, Br...
125
Voted
ECOOP
2007
Springer
15 years 8 months ago
A Staged Static Program Analysis to Improve the Performance of Runtime Monitoring
In runtime monitoring, a programmer specifies a piece of code to execute when a trace of events occurs during program execution. Our work is based on tracematches, an extension to...
Eric Bodden, Laurie J. Hendren, Ondrej Lhotá...