Sciweavers

1156 search results - page 112 / 232
» The PENG System: Practice and Experience
Sort
View
ICAC
2009
IEEE
15 years 6 months ago
Ranking the importance of alerts for problem determination in large computer systems
The complexity of large computer systems has raised unprecedented challenges for system management. In practice, operators often collect large volume of monitoring data from system...
Guofei Jiang, Haifeng Chen, Kenji Yoshihira, Akhil...
SP
2007
IEEE
157views Security Privacy» more  SP 2007»
15 years 5 months ago
Network Flow Watermarking Attack on Low-Latency Anonymous Communication Systems
Many proposed low-latency anonymous communication systems have used various flow transformations such as traffic padding, adding cover traffic (or bogus packets), packet droppi...
Xinyuan Wang, Shiping Chen, Sushil Jajodia
CVRMED
1997
Springer
15 years 3 months ago
Development and validation of a navigational guidance system for acetabular implant placement
During the past year our group has been developing HipNav, a system which helps surgeons determine optimal, patient-specific acetabular implant placement and accurately achieve the...
David A. Simon, Branislav Jaramaz, Mike Blackwell,...
SASO
2007
IEEE
15 years 5 months ago
e-SAFE: An Extensible, Secure and Fault Tolerant Storage System
With the rapidly falling price of hardware, and increasingly available bandwidth, the storage technology is seeing a paradigm shift from centralized and managed mode to distribute...
Sandip Agarwala, Arnab Paul, Umakishore Ramachandr...
CCS
2003
ACM
15 years 4 months ago
MECA: an extensible, expressive system and language for statically checking security properties
This paper describes a system and annotation language, MECA, for checking security rules. MECA is expressive and designed for checking real systems. It provides a variety of pract...
Junfeng Yang, Ted Kremenek, Yichen Xie, Dawson R. ...