Search results

    COOTS '99JMAS: A Java-Based Mobile Actor System for Distributed Parallel ComputingLegand L. Burge III, K. M. George
    COOTS '99Adaptation and Specialization for High Performance Mobile AgentsDong Zhou, Karsten Schwan
    COOTS '99Design Considerations and Performance Optimizations for Real-time ORBsAniruddha Gokhale, Irfan Pyarali, Carlos O'Ryan, Douglas Schmidt, Vishal Kachroo, Alexander Arulanthu, Nanbor Wang
    COOTS '99The Application of Object-Oriented Design Techniques to the Evolution of the Architecture of a Large Legacy Software SystemJeff Mason, Emil Ochotta
    COOTS '99Supporting Automatic Configuration of Component-Based Distributed SystemsFabio Kon, Roy H. Campbell
    COOTS '99Automating Three Modes of Evolution for Object-Oriented Software ArchitecturesLance Tokuda, Don Batory
    COOTS '99The Design and Implementation of GuaranáAlexandre Oliva, Luiz Eduardo Buzato
    COOTS '99Tuning Branch Predictors to Support Java Method InvocationN. Vijaykrishnan, N. Ranganathan
    COOTS '99Comprehensive Profiling Support in the Java Virtual MachineSheng Liang, Deepa Viswanathan
    ID '99Analysis Techniques for Detecting Coordinated Attacks and ProbesTim Aldrich, Stephen Northcutt, Bill Ralph, John Green
    ID '99Intrusion Detection and Intrusion Prevention on a Large Network: A Case StudyTom Dunigan, Greg Hinkel
    ID '99An Eye on Network Intruder-Administrator ShootoutsLuc Girardin
    ID '99On Preventing Intrusions by Process Behavior MonitoringR. Sekar, Thomas Bowen
    ID '99Intrusion Detection Through Dynamic Software MeasurementSebastian Elbaum, John C. Munson
    ID '99Learning Program Behavior Profiles for Intrusion DetectionAnup Ghosh, Aaron Schwartzbard, Michael Schatz
    ID '99Automated Intrusion Detection Methods Using NFRWenke Lee, Christopher Park, Salvatore J. Stolfo
    ID '99Experience with EMERALD Thus FarPhillip A. Porras, Peter G. Neumann, Teresa Lunt
    ID '99Defending Against the Wily Surfer -Web-Based Attacks and DefensesDan Klein
    ID '99Preprocessor Algorithm for Network Management CodebookMinaxi Gupta, Mani Subramanian
    ID '99The Packet Vault: Secure Storage of Network DataCharles J. Antonelli, Matthew Undy, Peter Honeyman
    ID '99Real-Time Intrusion Detection and Suppression in ATM NetworksRicardo Bettati, Wei Zhao, Dan Teodor
    ID '99A Statistical Method for Profiling Network TrafficDavid Marchette
    ID '99Transaction-Based Anomaly DetectionRoland Buschkes, Mark Borning
    NETA '99Keynote Address: "Home, Road and Work Have Merged Via the Internet" Norm Schryer
    NETA '99Driving via the Rearview Mirror: Managing a Network with Super MRTGJeff Allen