Sciweavers

2226 search results - page 381 / 446
» Monitoring and Prediction of Network Performance
Sort
View
DEXAW
2003
IEEE
122views Database» more  DEXAW 2003»
15 years 6 months ago
A Framework for Self-Optimizing Grids Using P2P Components
We present the framework of a new grid architecture based on the peer-to-peer and the component paradigms. In our architecture, several peer-to-peer components are loosely coupled...
Florian Schintke, Thorsten Schütt, Alexander ...
DISCEX
2003
IEEE
15 years 6 months ago
Analyzing Interaction Between Distributed Denial of Service Attacks And Mitigation Technologies
Under sponsorship of the Defense Advanced Research Projects Agency’s (DARPA) Fault Tolerant Networks (FTN) program, The Johns Hopkins University Applied Physics Laboratory (JHU/...
W. J. Blackert, D. M. Gregg, A. K. Castner, E. M. ...
SAC
2003
ACM
15 years 5 months ago
Distributed Query Adaptation and Its Trade-offs
Adaptive query processing in large distributed systems has seen increasing importance due to the rising environmental fluctuations in a growing Internet. We describe Ginga, an ad...
Henrique Paques, Ling Liu, Calton Pu
79
Voted
CDC
2009
IEEE
141views Control Systems» more  CDC 2009»
15 years 5 months ago
Input-to-state stability of self-triggered control systems
— Event-triggered and self-triggered control have recently been proposed as an alternative to periodic implementations of feedback control laws over sensor/actuator networks. In ...
Manuel Mazo, Paulo Tabuada
107
Voted
ACSAC
1999
IEEE
15 years 5 months ago
Adding Availability to Log Services of Untrusted Machines
Uncorrupted log files are the critical system component for computer forensics in case of intrusion and for real time system monitoring and auditing. Protection from tampering wit...
Arianna Arona, Danilo Bruschi, Emilia Rosti