Sciweavers

1043 search results - page 131 / 209
» Monitoring Service
Sort
View
ENTCS
2007
88views more  ENTCS 2007»
15 years 3 months ago
Keeping Secrets in Resource Aware Components
We present a powerful and flexible method for automatically checking the secrecy of values inside components. In our framework an attacker may monitor the external communication ...
Tom Chothia, Jun Pang, Muhammad Torabi Dashti
NOMS
2010
IEEE
136views Communications» more  NOMS 2010»
15 years 2 months ago
Supporting System-wide Similarity Queries for networked system management
Abstract— Today’s networked systems are extensively instrumented for collecting a wealth of monitoring data. In this paper, we propose a framework called System-wide Similarity...
Songyun Duan, Hui Zhang 0002, Guofei Jiang, Xiaoqi...
SASO
2010
IEEE
15 years 1 months ago
Extracting Overlay Invariants of Distributed Systems for Autonomic System Management
Many large-scale distributed systems have been built with great complexity to run Internet services. Due to the heterogeneity and dynamics of complex systems, it is very difficult ...
Hanhuai Shan, Guofei Jiang, Kenji Yoshihira
PAM
2009
Springer
15 years 10 months ago
Dynamics of Online Scam Hosting Infrastructure
This paper studies the dynamics of scam hosting infrastructure, with an emphasis on the role of fast-flux service networks. By monitoring changes in DNS records of over 350 distin...
Maria Konte, Nick Feamster, Jaeyeon Jung
CONEXT
2008
ACM
15 years 5 months ago
A probabilistic model of k-coverage in minimum cost wireless sensor networks
One of the fundamental problems in the wireless sensor networks is the coverage problem. The coverage problem fundamentally address the quality of service (surveillance or monitor...
S. Ali Raza Zaidi, Maryam Hafeez, Desmond C. McLer...