-
2
-
-
84881621193
-
Internet of Things (IoT): A vision, architectural elements, and future directions
-
Submitted on 1 Jul
-
Gubbi J, Buyya R, Marusic S, Palaniswami M,. Internet of Things (IoT): a vision, architectural elements, and future directions. Technical Report, Submitted on 1 Jul 2012.
-
(2012)
Technical Report
-
-
Gubbi, J.1
Buyya, R.2
Marusic, S.3
Palaniswami, M.4
-
6
-
-
79959295303
-
Virtual Appliances in the Collective: A Road to Hassle-Free Computing
-
Sapuntzakis, Constantine P, Lam MS,. Virtual Appliances in the Collective: A Road to Hassle-Free Computing. In HotOS. 2003, pp. 55-60.
-
(2003)
HotOS
, pp. 55-60
-
-
Sapuntzakis1
Constantine, P.2
Lam, M.S.3
-
8
-
-
2442507142
-
Exclusion-based signature matching for intrusion detection
-
Markatos E, Antonatos S, Polychronakis M, Anagnostakis K,. Exclusion-based signature matching for intrusion detection, in Proceedings of the IASTED international conference on communications and computer networks, CCN, 2002.
-
(2002)
Proceedings of the IASTED International Conference on Communications and Computer Networks, CCN
-
-
Markatos, E.1
Antonatos, S.2
Polychronakis, M.3
Anagnostakis, K.4
-
9
-
-
56549129238
-
Predicting the resource consumption of network intrusion detection systems
-
Lippmann R. Kirda E. Trachtenberg A. (eds)
-
Dreger H, Feldmann A, Paxson V, Sommer R,. Predicting the resource consumption of network intrusion detection systems. In Recent Advances in Intrusion Detection, Lippmann R, Kirda E, Trachtenberg A, (eds), 2008; 135-154.
-
(2008)
Recent Advances in Intrusion Detection
, pp. 135-154
-
-
Dreger, H.1
Feldmann, A.2
Paxson, V.3
Sommer, R.4
-
10
-
-
0001491336
-
Resource Constrained Scheduling as Generalized Bin Packing
-
Garey MR, Graham RL, Johnson DS, Andrew MR, Garey RL, Graham DS, Johnson A,. Resource Constrained Scheduling as Generalized Bin Packing. Journal of Combinatorial Theory 1976; 21: 257-298
-
(1976)
Journal of Combinatorial Theory
, vol.21
, pp. 257-298
-
-
Garey, M.R.1
Graham, R.L.2
Johnson, D.S.3
Andrew, M.R.4
Garey, R.L.5
Graham, D.S.6
Johnson, A.7
-
15
-
-
74349115721
-
Enacloud: An energy-saving application live placement approach for cloud computing environments
-
Bangalore, India
-
Li B, Li J, Huai J, Wo T, Li Q, Zhong L,. Enacloud: an energy-saving application live placement approach for cloud computing environments. In Proceedings of the 2009 IEEE International Conference on Cloud Computing, pages 17-24, Bangalore, India, 2009.
-
(2009)
Proceedings of the 2009 IEEE International Conference on Cloud Computing, Pages
, pp. 17-24
-
-
Li, B.1
Li, J.2
Huai, J.3
Wo, T.4
Li, Q.5
Zhong, L.6
-
17
-
-
8344288340
-
Incentives build robustness in bittorrent
-
Berkeley, CA
-
Cohen B,. Incentives build robustness in bittorrent. In P2P Economics Workshop, Berkeley, CA, 2003.
-
(2003)
P2P Economics Workshop
-
-
Cohen, B.1
-
19
-
-
84928212924
-
Virtual security appliance survey: What's really going on?
-
Christiansen CA,. Virtual security appliance survey: What's really going on?, IDC Report, 2009.
-
(2009)
IDC Report
-
-
Christiansen, C.A.1
-
21
-
-
84885639914
-
Detecting past and present intrusions through vulnerability-specific predicates
-
Joshi A, King ST, Dunlap GW, Chen PM,. Detecting past and present intrusions through vulnerability-specific predicates, in Proceedings of the 2005 SOSP, Oct. 2005.
-
(2005)
Proceedings of the 2005 SOSP, Oct
-
-
Joshi, A.1
King, S.T.2
Dunlap, G.W.3
Chen, P.M.4
-
22
-
-
59249106693
-
Detecting targeted attacks using shadow honeypots
-
Anagnostakis KG, Sidiroglou S, Akritidis P, Xinidis K, Markatos E, Keromytis AD,. Detecting targeted attacks using shadow honeypots. Proc. of the 14th USENIX Security Symposium, 2005.
-
(2005)
Proc. of the 14th USENIX Security Symposium
-
-
Anagnostakis, K.G.1
Sidiroglou, S.2
Akritidis, P.3
Xinidis, K.4
Markatos, E.5
Keromytis, A.D.6
-
23
-
-
0033295259
-
Bro: A system for detecting network intruders in real-time
-
Paxson V., Bro: a system for detecting network intruders in real-time. Computer Networks 1999; 31 (23-24): 2435-2463.
-
(1999)
Computer Networks
, vol.31
, Issue.2324
, pp. 2435-2463
-
-
Paxson, V.1
-
24
-
-
0036088115
-
-
IEEE Computer Society Press: Calif
-
Kruegel C, Valeur F, Vigna G, Kemmerer R,. Stateful intrusion detection for high-speed networks, in proceedings of IEEE symposium security and privacy. IEEE Computer Society Press: Calif., 2002.
-
(2002)
Stateful Intrusion Detection for High-speed Networks, in Proceedings of IEEE Symposium Security and Privacy
-
-
Kruegel, C.1
Valeur, F.2
Vigna, G.3
Kemmerer, R.4
-
25
-
-
33745651405
-
Performance adaptation in real-time intrusion detection systems
-
Lee W, Cabrera JB, Thomas A, Balwalli N, Saluja S, Zhang Y,. Performance adaptation in real-time intrusion detection systems, in recent advances in intrusion detection, 2002.
-
(2002)
Recent Advances in Intrusion Detection
-
-
Lee, W.1
Cabrera, J.B.2
Thomas, A.3
Balwalli, N.4
Saluja, S.5
Zhang, Y.6
-
26
-
-
0036093229
-
Toward cost-sensitive modeling for intrusion detection and response
-
Lee W, Fan W, Miller M, Stolfo SJ, Zadok E,. Toward cost-sensitive modeling for intrusion detection and response. Journal of Computer Security 2002; 10 (1-2): 5-22.
-
(2002)
Journal of Computer Security
, vol.10
, Issue.12
, pp. 5-22
-
-
Lee, W.1
Fan, W.2
Miller, M.3
Stolfo, S.J.4
Zadok, E.5
-
27
-
-
48949090753
-
Autonomic resource management in virtualized data centers using fuzzy logic-based approaches
-
Xu J, Zhao M, Fortes J, Carpenter R, Yousif M,. Autonomic resource management in virtualized data centers using fuzzy logic-based approaches. Cluster Comput. J. 2008; 11: 213-227.
-
(2008)
Cluster Comput. J.
, vol.11
, pp. 213-227
-
-
Xu, J.1
Zhao, M.2
Fortes, J.3
Carpenter, R.4
Yousif, M.5
-
28
-
-
10044239354
-
Migration decision for hybrid mobility in reconfigurable distributed virtual machines
-
IC IEEE Computer Society: Washington, DC
-
Fu S, Xu C,. Migration decision for hybrid mobility in reconfigurable distributed virtual machines. In Proceedings of the 2004 International Conference on Parallel Processing. ICPP. IEEE Computer Society: Washington, DC, 2004; 335-342.
-
(2004)
Proceedings of the 2004 International Conference on Parallel Processing
, pp. 335-342
-
-
Fu, S.1
Xu, C.2
-
29
-
-
84978371830
-
Integrated resource management for cluster-based internet services
-
Shen K, Tang H, Yang T, Chu L,. Integrated resource management for cluster-based internet services. ACM SIGOPS Operating Systems Review 2002; 36 (SI): 225-238.
-
(2002)
ACM SIGOPS Operating Systems Review
, vol.36
, Issue.SI
, pp. 225-238
-
-
Shen, K.1
Tang, H.2
Yang, T.3
Chu, L.4
-
30
-
-
0036041121
-
Managing energy and server resources in hosting centers
-
Chase J, Anderson D, Thakar P, Vahdat A, Doyle R,. Managing energy and server resources in hosting centers. In Proc. of Symposium on Operating Systems Principles (SOSP) (October 2001).
-
(2001)
Proc. of Symposium on Operating Systems Principles (SOSP) (October)
-
-
Chase, J.1
Anderson, D.2
Thakar, P.3
Vahdat, A.4
Doyle, R.5
-
31
-
-
53349127069
-
Black-box and gray-box strategies for virtual machine migration
-
Wood T, Shenoy PJ, Venkataramani A, Yousif MS,. Black-box and gray-box strategies for virtual machine migration. In NSDI (2007), USENIX.
-
(2007)
NSDI, USENIX
-
-
Wood, T.1
Shenoy, P.J.2
Venkataramani, A.3
Yousif, M.S.4
-
32
-
-
58149091441
-
PMapper: Power and migration cost aware application placement in virtualized systems
-
Verma A, Ahuja P, Neogi A,. pMapper: power and migration cost aware application placement in virtualized systems. Middleware 2008: 243-264.
-
(2008)
Middleware
, pp. 243-264
-
-
Verma, A.1
Ahuja, P.2
Neogi, A.3
|