Sciweavers

868 search results - page 120 / 174
» The Importance of Resource Management in Engineering Distrib...
Sort
View
ASPLOS
2008
ACM
15 years 6 months ago
Archipelago: trading address space for reliability and security
Memory errors are a notorious source of security vulnerabilities that can lead to service interruptions, information leakage and unauthorized access. Because such errors are also ...
Vitaliy B. Lvin, Gene Novark, Emery D. Berger, Ben...
FASE
2008
Springer
15 years 6 months ago
Automated Analysis of Permission-Based Security Using UMLsec
Abstract. To guarantee the security of computer systems, it is necessary to define security permissions to restrict the access to the systems' resources. These permissions enf...
Jan Jürjens, Jörg Schreck, Yijun Yu
ICSM
1995
IEEE
15 years 8 months ago
Discovering relationships between service and customer satisfaction
Organizations spend significant resources tracking customer satisfaction and managing service delivery. Although a great deal of effort is expended in understanding what goes on w...
Michael Buckley, Ram Chillarege
HPDC
2008
IEEE
15 years 11 months ago
Issues in applying data mining to grid job failure detection and diagnosis
As grid computation systems become larger and more complex, manually diagnosing failures in jobs becomes impractical. Recently, machine-learning techniques have been proposed to d...
Lakshmikant Shrinivas, Jeffrey F. Naughton
IM
1997
15 years 5 months ago
The Hollowman: An Innovative ATM Control Architecture
The current implementation of out-of-band control in ATM networks inhibits their successful exploitation. The confusion in signalling protocols between application services and th...
Sean Rooney