Sciweavers

3104 search results - page 582 / 621
» Using quantitative analysis to implement autonomic IT system...
Sort
View
SIGOPS
2010
127views more  SIGOPS 2010»
14 years 10 months ago
Optimizing information flow in the gossip objects platform
Gossip-based protocols are commonly used for diffusing information in large-scale distributed applications. GO (Gossip Objects) is a per-node gossip platform that we developed in...
Ymir Vigfusson, Ken Birman, Qi Huang, Deepak P. Na...
SOSYM
2010
176views more  SOSYM 2010»
14 years 10 months ago
On challenges of model transformation from UML to Alloy
Abstract The Unified Modeling Language (UML) is the de facto language used in the industry for software specifications. Once an application has been specified, Model Driven Arch...
Kyriakos Anastasakis, Behzad Bordbar, Geri Georg, ...
RAID
2010
Springer
14 years 9 months ago
BotSwindler: Tamper Resistant Injection of Believable Decoys in VM-Based Hosts for Crimeware Detection
We introduce BotSwindler, a bait injection system designed to delude and detect crimeware by forcing it to reveal during the exploitation of monitored information. The implementati...
Brian M. Bowen, Pratap V. Prabhu, Vasileios P. Kem...
TDSC
2011
14 years 6 months ago
A Policy Enforcing Mechanism for Trusted Ad Hoc Networks
To ensure fair and secure communication in Mobile Ad hoc Networks (MANETs), the applications running in these networks must be regulated by proper communication policies. However,...
Gang Xu, Cristian Borcea, Liviu Iftode
VLUDS
2010
225views Visualization» more  VLUDS 2010»
14 years 6 months ago
Visualization in Human-Centered Virtual Factories
In a manufacturing system (MS), a wide range of human activities are applied in production processes. The human factor plays a core role and should be incorporated into the design...
Xiang Yang, Eduard Deines, Jan C. Aurich