Search results

From Navigators

Jump to: navigation, search

Page title matches

  • Project:DIVERSE
    |Acronym=DIVERSE |Url=http://www.di.fc.ul.pt/~nuno/PROJECTS/DIVERSE/
    5 KB (750 words) - 09:37, 26 July 2014

Page text matches

  • Project:DARIO
    in control applications as diverse as industrial processes,
    4 KB (533 words) - 17:18, 31 March 2017
  • Project:DIVERSE
    |Acronym=DIVERSE |Url=http://www.di.fc.ul.pt/~nuno/PROJECTS/DIVERSE/
    5 KB (750 words) - 09:37, 26 July 2014
  • Project:COPE
    ...ted and would lose their usefulness. These applications come from the most diverse areas of knowledge, such as medical sciences including genetic engineering,
    3 KB (485 words) - 17:45, 3 December 2012
  • Project:GODC
    ... of activities, stimulate the need for structuring those activities around diverse groups of interested participants. The building blocks for group activity a
    3 KB (444 words) - 15:05, 14 November 2012
  • Publication:Bessani11depsky
    ... the cloud through the encryption, encoding and replication of the data on diverse clouds that form a cloud-of-clouds. We deployed our system using four comme
    2 KB (246 words) - 14:40, 14 January 2013
  • Publication:Antunes11b
    ...mpatibilities and presents a new methodology to evaluate the compliance of diverse server replicas. The methodology collects network traces to identify syntax Project:MASSIF, Project:DIVERSE
    1 KB (190 words) - 14:40, 14 January 2013
  • Publication:Correia10a
    Project:REGENESYS, Project:DIVERSE
    2 KB (240 words) - 14:40, 14 January 2013
  • Publication:Antunes11d
    Project:MASSIF, Project:DIVERSE
    1 KB (185 words) - 14:40, 14 January 2013
  • Publication:Moniz10a
    Project:DIVERSE
    2 KB (212 words) - 14:40, 14 January 2013
  • Publication:Bessani10aqs-tr
    ...em replication protocol for Byzantine fault tolerance, which uses a set of diverse algorithms for implementing different kinds of operations based on the sema
    873 B (104 words) - 14:40, 14 January 2013
  • Publication:Antunes11ewdc
    Project:MASSIF, Project:DIVERSE
    2 KB (209 words) - 14:40, 14 January 2013
  • Publication:Garcia11osdiversity
    ...nce, our analysis provides a strong indication that building a system with diverse OSes may be a useful technique to improve its intrusion tolerance capabilit Project:DIVERSE, Project:MASSIF
    2 KB (212 words) - 14:40, 14 January 2013
  • Publication:Moniz09healer
    Wireless ad-hoc networks are being increasingly used in diverse
    2 KB (239 words) - 14:41, 14 January 2013
  • Publication:Joao-craveiro2009embedded-linux-229
    ...to an RTOS. In embedded systems, we have to cope with scarce resources and diverse existent hardware, and a balance between both issues must be reached. For s
    1 KB (217 words) - 10:52, 17 January 2013
  • Publication:Ip07-90
    ...e design and implementation of distributed embedded systems, in areas such diverse as industrial automation, automotive, avionics and aerospace.
    1 KB (169 words) - 14:41, 14 January 2013
  • Publication:Cogo12MSc
    ...chanism. Diversity is a mechanism that consists in providing and combining diverse resources to increase vulnerability independence between system components. The first phase consists in providing enough diverse resources to be considered, combined and selected in second phase.
    2 KB (330 words) - 15:12, 17 January 2013
  • Publication:Garcia msc11
    ...xtent failure diversity is observed in practical deployment depends on how diverse are the components that constitute the system. In this thesis we present a ...lities in all OS replicas. To mitigate/eliminate this problem we introduce diverse proactive recovery on the replicas. Proactive recovery is a technique that
    2 KB (314 words) - 17:48, 2 October 2018
  • Publication:Garcia12 diversity
    |title=DIVERSYS: DIVErse Rejuvenation SYStem |Project=Project:DIVERSE, Project:MASSIF,
    2 KB (225 words) - 18:29, 21 January 2013
  • Navtalks/Archive
    ...less Networks (Jeferson Souza) and Identification of Inconsistencies Among Diverse Replicas (João Antunes)
    21 KB (2,755 words) - 18:46, 3 October 2017
  • Publication:Garcia13diversity
    |Project=Project:MASSIF, Project:DIVERSE, ...xtent failure diversity is observed in practical deployment depends on how diverse are the components that constitute the system. In this paper, we present a
    1 KB (213 words) - 14:33, 23 July 2014
  • Publication:Antunes12PhD
    ... a new method is proposed to assist on the evaluation of the compliance of diverse replicas in intrusion-tolerant systems.
    2 KB (316 words) - 16:37, 2 October 2018
  • Project:SUPERCLOUD
    ...poses provider-agnostic resources in a robust manner using primitives from diverse cloud providers.
    3 KB (333 words) - 10:06, 2 October 2018
  • Publication:Sousa2015wheat
    ... machine replication library and running the experiments in geographically-diverse PlanetLab nodes and Amazon EC2 regions. Interestingly, our results show tha
    2 KB (247 words) - 08:14, 9 August 2015
  • Publication:Medeiros2015tese
    diverse activities such as traffic engineering, anomaly detection, and performance
    2 KB (334 words) - 16:33, 2 October 2018
  • NavTalks
    ">Diverse Intrusion-tolerant Systems</span></td> ...roducts, like vehicles and trains, integrate embedded systems implementing diverse and complicated functionalities. Such functionalities are programmable by s
    69 KB (10,003 words) - 20:37, 7 March 2022
  • Publication:Garcia2011dsn poster rejuvenations
    |title=Diverse OS Rejuvenation for Intrusion Tolerance |Project=Project:DIVERSE, Project:MASSIF,
    1 KB (184 words) - 10:29, 6 June 2016
  • Project:DiSIEM
    ...ucture-related information from open-source intelligence data available on diverse sources from the internet, (3) create new ways for visualising the informat
    2 KB (294 words) - 22:24, 9 December 2021
  • Publication:EDCC 2017
    |title=On Combining Diverse Static Analysis Tools for Web Security: An Empirical Study ...e number of false alarms. In this paper, we study the problem of combining diverse static analysis tools to detect web vulnerabilities, considering four softw
    2 KB (224 words) - 18:01, 9 September 2017
  • Publication:Sousa2015wheat-tech-report
    ... machine replication library and running the experiments in geographically-diverse PlanetLab nodes and Amazon EC2 regions. Interestingly, our results
    2 KB (245 words) - 10:07, 8 June 2018
  • Publication:EDCC 2018
    ...ored to effectively obtain this knowledge, by retrieving information from diverse sources. This paper proposes a fully automated approach to update the IDS k
    2 KB (220 words) - 00:35, 3 July 2018
  • Publication:Computing2018
    |title=An Empirical Study on Combining Diverse Static Analysis Tools for Web Security Vulnerabilities based on Development ...ptable in some scenarios. In this paper, we study the problem of combining diverse ASATs to improve the overall detection of vulnerabilities in web applicatio
    2 KB (261 words) - 09:00, 19 July 2019
  • Publication:BrunoVavalaTese
    ...ng on large data sets, using an abstraction layer that is implementable on diverse trusted hardware architectures.
    3 KB (525 words) - 15:53, 2 October 2018
  • Publication:ManuelMendoncaTese
    ...n operating systems (OS) include many device drivers (DD) produced by very diverse manufactures. Experience has shown that the development of DD is error pron ...and parameters involved in the OS-DD interface. This tool can support very diverse testing operations, including the log of system activity and to reverse eng
    4 KB (622 words) - 15:55, 2 October 2018
  • Publication:Paulo Antunes Tese
    ...ons are ubiquitous in our everyday lives, as they are deployed in the most diverse contexts and support a variety of services. The correctness of these applic
    2 KB (245 words) - 23:56, 4 October 2018
  • Publication:RicardoMorgado Tese
    This dissertation has two main objectives: to study the diverse types of web application vulnerabilities, namely different attacks that exp
    2 KB (288 words) - 00:03, 18 September 2019
  • Publication:MaxCompNetworks19
    ...ns that need to be deployed across multiple trust domains, while enforcing diverse security ...ds. The system scales well for networks of thousands of switches employing diverse topologies and improves on the virtual network acceptance ratio, provider r
    2 KB (278 words) - 14:04, 26 July 2019
  • Publication:FranciscoAraujo Tese
    ...roducts, like vehicles and trains, integrate embedded systems implementing diverse and complicated functionalities. Such functionalities are programmable by s
    2 KB (331 words) - 00:50, 18 September 2019
  • Publication:Secrypt19 teps
    ... related information (e.g., Indicator of Compromise -IoC) is obtained from diverse and different sources and collected by Threat Intelligence Platforms (TIPs)
    2 KB (252 words) - 00:30, 18 September 2019
  • Publication:DRSS19 slicer
    ...alicious activities in their IT infrastructures. SIEMs receive events from diverse devices of the
    2 KB (233 words) - 00:37, 18 September 2019
  • Publication:PRDC19 slicer
    ...alicious activities in their IT infrastructures. SIEMs receive events from diverse devices of the
    1 KB (197 words) - 00:39, 18 September 2019
  • Publication:EDCC2020 CodingStyles
    ...se positives & negatives), whose cause is recurrently associated with very diverse coding styles, i.e., similar functionality is implemented in distinct manne
    1 KB (201 words) - 16:24, 2 August 2020
  • Publication:ITEQS2020
    ...roducts, like vehicles and trains, integrate embedded systems implementing diverse and complicated functionalities. Such functionalities are programmable by s
    2 KB (261 words) - 16:28, 2 August 2020

View (previous 100 | next 100) (20 | 50 | 100 | 250 | 500)

Views
Toolbox
Navigators toolbox