Sciweavers

1098 search results - page 157 / 220
» Proactive Intrusion Detection
Sort
View
SIMULATION
2010
178views more  SIMULATION 2010»
14 years 8 months ago
Application-level Simulation for Network Security
We introduce and describe a novel network simulation tool called NeSSi (Network Security Simulator). NeSSi incorporates a variety of features relevant to network security distingu...
Stephan Schmidt, Rainer Bye, Joël Chinnow, Ka...
SOSP
2009
ACM
15 years 10 months ago
Tolerating hardware device failures in software
Hardware devices can fail, but many drivers assume they do not. When confronted with real devices that misbehave, these assumptions can lead to driver or system failures. While ma...
Asim Kadav, Matthew J. Renzelmann, Michael M. Swif...
ACSC
2007
IEEE
15 years 8 months ago
Jooj: Real-Time Support For Avoiding Cyclic Dependencies
The design guideline avoid dependency cycles among modules was first alluded to by Parnas in 1978. Many tools have since been built to detect cyclic dependencies among a programā...
Hayden Melton, Ewan D. Tempero
ECLIPSE
2004
ACM
15 years 7 months ago
Workspace awareness in application development
Coordination of development activities is often the most crucial success factor in a software development team. Typically, teams rely on configuration management (CM) systems for...
Roger M. Ripley, Ryan Y. Yasui, Anita Sarma, Andr&...
MR
2007
120views Robotics» more  MR 2007»
15 years 1 months ago
Advanced electronic prognostics through system telemetry and pattern recognition methods
Electronic Prognostics (EP) is a technique used in high-reliability and high-availability systems to actively and proactively detect faults, allowing the reduction of system downt...
Leon Lopez