Sciweavers

1043 search results - page 55 / 209
» Monitoring Service
Sort
View
144
Voted
ICCD
2004
IEEE
97views Hardware» more  ICCD 2004»
16 years 26 days ago
Runtime Execution Monitoring (REM) to Detect and Prevent Malicious Code Execution
1 Many computer security threats involve execution of unauthorized foreign code on the victim computer. Viruses, network and email worms, Trojan horses, backdoor programs used in ...
A. Murat Fiskiran, Ruby B. Lee
CN
2007
111views more  CN 2007»
15 years 4 months ago
Quantile sampling for practical delay monitoring in Internet backbone networks
Point-to-point delay is an important network performance measure as it captures service degradations caused by various events. We study how to measure and report delay in a concis...
Baek-Young Choi, Sue B. Moon, Rene L. Cruz, Zhi-Li...
IGARSS
2009
15 years 1 months ago
Fog Forecasting, Detection and Monitoring in the UAE using SEVIRI-MSG Data
The UAE location on the edge of a very warm sea and hot and dry desert create the optimal conditions of inland fog forming. The afternoon sea breeze, which is almost a daily event...
Abdulla Bushahab, Ali Al Suwaidi, Hosni Ghedira, K...
ICWS
2008
IEEE
15 years 5 months ago
Transparent Reputation Management for Composite Web Services
The dependability of composite services is largely affected by their constituent Web services. Composite services have to operate in an open and dynamically changing environment i...
Domenico Bianculli, Walter Binder, Mauro Luigi Dra...
ICNS
2006
IEEE
15 years 10 months ago
Service Level Agreement Management with Adaptive Coordination
Service Level Agreement Management in the telecommunications domain consists of a set of mechanisms for provisioning and monitoring services according to requirements given by eit...
Dominic A. P. Greenwood, Giosuè Vitaglione,...