Sciweavers

1222 search results - page 72 / 245
» Verifying a File System Implementation
Sort
View
TNC
2004
120views Education» more  TNC 2004»
15 years 3 months ago
Realtime Intrusion-Forensics: A First Prototype Implementation (based on a stack-based NIDS)
The function of a Network Intrusion Detection System (NIDS) is to identify any misuse and abnormal behavior determined as an attack to a network segment or network host. The propo...
Udo Payer
123
Voted
COMPCON
1994
IEEE
15 years 6 months ago
An Overview of the Spring System
Spring is a highly modular, distributed, object-oriented operating system. This paper describes the goals of the Spring system and provides overviews of the Spring object model, t...
James G. Mitchell, Jonathan Gibbons, Graham Hamilt...
SPIRE
2001
Springer
15 years 7 months ago
Adding Security to Compressed Information Retrieval Systems
Word-based Huffman coding has widespread use in information retrieval systems. Besides its compressing power, it also enables the implementation of both indexing and searching sch...
Ruy Luiz Milidiú, C. Gomes de Mello, J. Fer...
134
Voted
ACSAC
1999
IEEE
15 years 6 months ago
Adding Availability to Log Services of Untrusted Machines
Uncorrupted log files are the critical system component for computer forensics in case of intrusion and for real time system monitoring and auditing. Protection from tampering wit...
Arianna Arona, Danilo Bruschi, Emilia Rosti
PE
2006
Springer
91views Optimization» more  PE 2006»
15 years 2 months ago
Performance of peer-to-peer networks: Service capacity and role of resource sharing policies
In this paper we model and study the performance of peer-to-peer (P2P) file sharing systems in terms of their `service capacity'. We identify two regimes of interest: the tra...
Xiangying Yang, Gustavo de Veciana