Search results

    COOTS '99Adaptation and Specialization for High Performance Mobile AgentsDong Zhou, Karsten Schwan
    COOTS '99Design Considerations and Performance Optimizations for Real-time ORBsAniruddha Gokhale, Irfan Pyarali, Carlos O'Ryan, Douglas Schmidt, Vishal Kachroo, Alexander Arulanthu, Nanbor Wang
    COOTS '99Resource Control for Java Database ExtensionsGrzegorz Czajkowski, Tobias Mayr, Praveen Seshadri, Thorsten von Eicken
    COOTS '99Address Translation Strategies in the Texas Persistent StoreSheetal V. Kakkad, Paul R. Wilson
    COOTS '99Intercepting and Instrumenting COM ApplicationsGalen C. Hunt, Michael L. Scott
    COOTS '99Implementing Causal Logging Using OrbixWeb InterceptionChanathip Namprempre, Jeremy Sussman, Keith Marzullo
    COOTS '99Quality of Service Aware Distributed Object SystemsSvend Frolund, Jari Koistinen
    COOTS '99Filters as a Language Support for Design Patterns in Object-Oriented Scripting Languages Gustaf Neumann, Uwe Zdun
    COOTS '99Performance Patterns: Automated Scenario Based ORB Performance EvaluationSridhar Nimmagadda, Chanaka Liyanaarchchi, Douglas Niehaus, Anil Gopinath, Arvind Kaushal
    COOTS '99Object-Oriented Pattern-Based Parallel Programming with Automatically Generated FrameworksSteve MacDonald, Duane Szafron, Jonathan Schaeffer
    ID '99A Statistical Method for Profiling Network TrafficDavid Marchette
    ID '99Transaction-Based Anomaly DetectionRoland Buschkes, Mark Borning
    ID '99Preprocessor Algorithm for Network Management CodebookMinaxi Gupta, Mani Subramanian
    ID '99The Packet Vault: Secure Storage of Network DataCharles J. Antonelli, Matthew Undy, Peter Honeyman
    ID '99Real-Time Intrusion Detection and Suppression in ATM NetworksRicardo Bettati, Wei Zhao, Dan Teodor
    ID '99Automated Intrusion Detection Methods Using NFRWenke Lee, Christopher Park, Salvatore J. Stolfo
    ID '99Experience with EMERALD Thus FarPhillip A. Porras, Peter G. Neumann, Teresa Lunt
    ID '99Defending Against the Wily Surfer -Web-Based Attacks and DefensesDan Klein
    ID '99On Preventing Intrusions by Process Behavior MonitoringR. Sekar, Thomas Bowen
    ID '99Intrusion Detection Through Dynamic Software MeasurementSebastian Elbaum, John C. Munson
    ID '99Learning Program Behavior Profiles for Intrusion DetectionAnup Ghosh, Aaron Schwartzbard, Michael Schatz
    ID '99Analysis Techniques for Detecting Coordinated Attacks and ProbesTim Aldrich, Stephen Northcutt, Bill Ralph, John Green
    ID '99Intrusion Detection and Intrusion Prevention on a Large Network: A Case StudyTom Dunigan, Greg Hinkel
    ID '99An Eye on Network Intruder-Administrator ShootoutsLuc Girardin
    NETA '99Network Documentation: A Web-Based Relational Database ApproachWade Warner, Rajshekhar Sunderraman