Sciweavers

3031 search results - page 95 / 607
» SNMS - Shadow Network Management System
Sort
View
135
Voted
DSOM
2003
Springer
15 years 8 months ago
Idiosyncratic Signatures for Authenticated Execution of Management Code
TrustedFlow™ is a software solution to the problem of remotely authenticating code during execution. A continuous flow of idiosyncratic signatures assures that the software from ...
Mario Baldi, Yoram Ofek, Moti Yung
239
Voted
ICDE
2006
IEEE
210views Database» more  ICDE 2006»
16 years 5 months ago
Fractal Modeling of IP Network Traffic at Streaming Speeds
This paper describes how to fit fractal models, online, on IP traffic data streams. Our approach relies on maintaining a sketch of the data stream and fitting straight lines: it y...
Flip Korn, S. Muthukrishnan, Yihua Wu
206
Voted
DSOM
2007
Springer
15 years 9 months ago
Efficient Web Services Event Reporting and Notifications by Task Delegation
Web Services are an XML technology recently viewed as capable of being used for network management. A key aspect of WS in this domain is event reporting. WS-based research in this ...
Aimilios Chourmouziadis, George Pavlou
133
Voted
CISIS
2010
IEEE
15 years 2 months ago
Ten Principles for Living Models - A Manifesto of Change-Driven Software Engineering
The new generation of open networked IT systems poses particular challenges to software engineering due to their evolving nature and their high quality requirements. In particular...
Ruth Breu
105
Voted
PAM
2009
Springer
15 years 10 months ago
Clarified Recorder and Analyzer for Visual Drill Down Network Analysis
This paper presents the Clarified system for passive network . It is based on capturing complete packet history and abstracting it in form of different interactive high-level visua...
Jani Kenttälä, Joachim Viide, Timo Ojala...