Sciweavers

632 search results - page 19 / 127
» Performance Analysis of a Cluster File System
Sort
View
CASCON
2007
104views Education» more  CASCON 2007»
15 years 3 months ago
Identifying fault-prone files using static analysis alerts through singular value decomposition
Static analysis tools tend to generate more alerts than a development team can reasonably examine without some form of guidance. In this paper, we propose a technique for leveragi...
Mark Sherriff, Sarah Smith Heckman, Mike Lake, Lau...
ACSAC
2005
IEEE
15 years 7 months ago
An Integrity Verification Scheme for DNS Zone file based on Security Impact Analysis
The Domain Name System (DNS) is the world’s largest distributed computing system that performs the key function of translating user-friendly domain names to IP addresses through...
Ramaswamy Chandramouli, Scott Rose
151
Voted
CLUSTER
2000
IEEE
15 years 1 months ago
Data management for large-scale scientific computations in high performance distributed systems
With the increasing number of scientific applications manipulating huge amounts of data, effective high-level data management is an increasingly important problem. Unfortunately, ...
Alok N. Choudhary, Mahmut T. Kandemir, Jaechun No,...
PRL
2006
207views more  PRL 2006»
15 years 1 months ago
On-line trajectory clustering for anomalous events detection
In this paper we propose a trajectory clustering algorithm suited for video surveillance systems. Trajectories are clustered on-line, as the data are collected, and clusters are o...
Claudio Piciarelli, Gian Luca Foresti
SP
2008
IEEE
195views Security Privacy» more  SP 2008»
15 years 8 months ago
Automated Formal Analysis of a Protocol for Secure File Sharing on Untrusted Storage
We study formal security properties of a state-of-the-art protocol for secure file sharing on untrusted storage, in the automatic protocol verifier ProVerif. As far as we know, ...
Bruno Blanchet, Avik Chaudhuri