Sciweavers

658 search results - page 104 / 132
» Time Management in the DoD High Level Architecture
Sort
View
TMA
2010
Springer
150views Management» more  TMA 2010»
14 years 7 months ago
A Database of Anomalous Traffic for Assessing Profile Based IDS
This paper aims at proposing a methodology for evaluating current IDS capabilities of detecting attacks targeting the networks and their services. This methodology tries to be as r...
Philippe Owezarski
WSC
1998
14 years 11 months ago
Avoiding the Blues for Airline Travelers
The fast growth in airline passenger traffic combined with the slow growth in airport capacity worldwide is putting a severe strain on the capability of airlines to adapt their pr...
Jane L. Snowdon, Soad El-Taji, Mario Montevecchi, ...
SAC
2006
ACM
14 years 9 months ago
Combining supervised and unsupervised monitoring for fault detection in distributed computing systems
Fast and accurate fault detection is becoming an essential component of management software for mission critical systems. A good fault detector makes possible to initiate repair a...
Haifeng Chen, Guofei Jiang, Cristian Ungureanu, Ke...
DEBU
2008
141views more  DEBU 2008»
14 years 9 months ago
Oracle's SQL Performance Analyzer
We present the SQL Performance Analyzer, a novel approach in Oracle Database 11g to testing database changes, such as upgrades, parameter changes, schema changes, and gathering op...
Khaled Yagoub, Peter Belknap, Benoît Dagevil...
CN
2002
82views more  CN 2002»
14 years 9 months ago
Optimal allocation of electronic content
Abstract-The delivery of large files to single users, such as application programs for some versions of the envisioned network computer, or movies, is expected by many to be one of...
Israel Cidon, Shay Kutten, Ran Soffer