Sciweavers

3733 search results - page 647 / 747
» Performance Evaluation of an Operating System Transaction Ma...
Sort
View
KDD
2010
ACM
272views Data Mining» more  KDD 2010»
15 years 5 months ago
Beyond heuristics: learning to classify vulnerabilities and predict exploits
The security demands on modern system administration are enormous and getting worse. Chief among these demands, administrators must monitor the continual ongoing disclosure of sof...
Mehran Bozorgi, Lawrence K. Saul, Stefan Savage, G...
CCGRID
2009
IEEE
15 years 8 months ago
Improving Parallel Write by Node-Level Request Scheduling
In a cluster of multiple processors or cpu-cores, many processes may run on each compute node. Each process tends to issue contiguous I/O requests for snapshot, checkpointing or s...
Kazuki Ohta, Hiroya Matsuba, Yutaka Ishikawa
AGS
2009
Springer
15 years 8 months ago
Distributed Platform for Large-Scale Agent-Based Simulations
Abstract. We describe a distributed architecture for situated largescale agent-based simulations with predominately local interactions. The approach, implemented in AglobeX Simulat...
David Sislák, Premysl Volf, Michal Jakob, M...
ICYCS
2008
IEEE
15 years 8 months ago
VM-based Architecture for Network Monitoring and Analysis
A single physical machine provides multiple network monitoring and analysis services (e.g., IDS, QoS) which are installed on the same operating system. Isolation between services ...
Qiang Li, Qinfen Hao, Limin Xiao, Zhoujun Li
INFOCOM
2008
IEEE
15 years 7 months ago
MAC for Networks with Multipacket Reception Capability and Spatially Distributed Nodes
—The physical layer of future wireless networks will be based on novel radio technologies such as UWB and MIMO. One of the important capabilities of such technologies is the abil...
Guner D. Celik, Gil Zussman, Wajahat F. Khan, Eyta...