Sciweavers

1665 search results - page 184 / 333
» Monitoring Timing Constraints in Distributed Real-Time Syste...
Sort
View
ISCC
2006
IEEE
256views Communications» more  ISCC 2006»
15 years 10 months ago
A Wireless Distributed Intrusion Detection System and a New Attack Model
Denial-of-Service attacks, and jamming in particular, are a threat to wireless networks because they are at the same time easy to mount and difficult to detect and stop. We propo...
Marco Domenico Aime, Giorgio Calandriello, Antonio...
EUC
2006
Springer
15 years 7 months ago
Saving Register-File Leakage Power by Monitoring Instruction Sequence in ROB
- Modern portable or embedded systems support more and more complex applications. These applications make embedded devices require not only low powerconsumption, but also high comp...
Wann-Yun Shieh, Hsin-Dar Chen
IPPS
2007
IEEE
15 years 10 months ago
The Design and Implementation of Real-time Event-based Applications with RTSJ
This paper presents a framework to design real-time event-based applications using Java. The Real-Time Specification for Java (RTSJ) is well designed for hard periodic real-time ...
Damien Masson, Serge Midonnet
ATAL
2003
Springer
15 years 9 months ago
A key-based coordination algorithm for dynamic readiness and repair service coordination
This paper describes an agent application for the coordination of aircraft repair, refit, refuel, and rearm teams in a dynamic setting. The paper also presents a new algorithm fo...
Thomas Wagner, Valerie Guralnik, John Phelps
143
Voted
GRID
2007
Springer
15 years 10 months ago
Log summarization and anomaly detection for troubleshooting distributed systems
— Today’s system monitoring tools are capable of detecting system failures such as host failures, OS errors, and network partitions in near-real time. Unfortunately, the same c...
Dan Gunter, Brian Tierney, Aaron Brown, D. Martin ...