Acceptance Test for Fault Detection in Component-based Cloud Computing and Systems
暂无分享,去创建一个
[1] Marcos K. Aguilera,et al. On the quality of service of failure detectors based on control theory , 2006, 20th International Conference on Advanced Information Networking and Applications - Volume 1 (AINA'06).
[2] Mathai Joseph,et al. Transformation of programs for fault-tolerance , 2005, Formal Aspects of Computing.
[3] Ejaz Ahmed,et al. A review on remote data auditing in single cloud server: Taxonomy and open issues , 2014, J. Netw. Comput. Appl..
[4] Jun Wei,et al. Detecting performance anomaly with correlation analysis for Internetware , 2013, Science China Information Sciences.
[5] Rachid Guerraoui,et al. Fault-Tolerance by Replication in Distributed Systems , 1996, Ada-Europe.
[6] Muthu Ramachandran. Component-Based Development for Cloud Computing Architectures , 2011 .
[7] Xavier Defago,et al. Reliability Prediction for Component-Based Software Systems with Architectural-Level Fault Tolerance Mechanisms , 2013, 2013 International Conference on Availability, Reliability and Security.
[8] Dana Petcu,et al. Towards component-based software engineering of cloud applications , 2012, WICSA/ECSA Companion Volume.
[9] Joseph Sifakis,et al. Modeling Heterogeneous Real-time Components in BIP , 2006, Fourth IEEE International Conference on Software Engineering and Formal Methods (SEFM'06).
[10] Joseph Sifakis,et al. D-Finder: A Tool for Compositional Deadlock Detection and Verification , 2009, CAV.
[11] Marco Bozzano,et al. Formal Design of Fault Detection and Identification Components Using Temporal Epistemic Logic , 2014, TACAS.
[12] Al-Sakib Khan Pathan,et al. The State of the Art in Intrusion Prevention and Detection , 2014 .
[13] Anish Arora,et al. Detectors and correctors: a theory of fault-tolerance components , 1998, Proceedings. 18th International Conference on Distributed Computing Systems (Cat. No.98CB36183).
[14] Mubashir Husain Rehmani,et al. Emerging Communication Technologies Based on Wireless Sensor Networks : Current Research and Future Applications , 2016 .
[15] Anja Feldmann,et al. Enriching network security analysis with time travel , 2008, SIGCOMM '08.
[16] Carl E. Landwehr,et al. Basic concepts and taxonomy of dependable and secure computing , 2004, IEEE Transactions on Dependable and Secure Computing.
[17] Tao Tang,et al. Component Based Design of Fault Tolerant Devices in Cyber Physical System , 2012, 2012 IEEE 15th International Symposium on Object/Component/Service-Oriented Real-Time Distributed Computing Workshops.
[18] Rachid Alami,et al. A Verifiable and Correct-by-Construction Controller for Robots in Human Environments , 2015, HRI.
[19] Tom Kirkham,et al. Risk-Driven Proactive Fault-Tolerant Operation of IaaS Providers , 2013, 2013 IEEE 5th International Conference on Cloud Computing Technology and Science.
[20] Huwaida Tagelsir Elshoush,et al. Alert correlation in collaborative intelligent intrusion detection systems - A survey , 2011, Appl. Soft Comput..
[21] Thanh-Hung Nguyen,et al. Designing autonomous robots , 2009, IEEE Robotics & Automation Magazine.
[22] Brian Randell. System structure for software fault tolerance , 1975 .
[23] J. Wenny Rahayu,et al. Mobile cloud computing: A survey , 2013, Future Gener. Comput. Syst..
[24] Sandeep S. Kulkarni,et al. Stabilization and fault-tolerance in presence of unchangeable environment actions , 2015, ICDCN.
[25] Shikha Agrawal,et al. Survey on Anomaly Detection using Data Mining Techniques , 2015, KES.
[26] Dinesh Singh,et al. Collaborative IDS Framework for Cloud , 2016, Int. J. Netw. Secur..
[27] Manoj Kumar,et al. Outlier detection based fault-detection algorithm for cloud computing , 2014, International Conference for Convergence for Technology-2014.
[28] Chonho Lee,et al. A survey of mobile cloud computing: architecture, applications, and approaches , 2013, Wirel. Commun. Mob. Comput..
[29] Rajkumar Buyya,et al. Seamless application execution in mobile cloud computing: Motivation, taxonomy, and open challenges , 2015, J. Netw. Comput. Appl..
[30] Dewan Md. Farid,et al. Application of Machine Learning Approaches in Intrusion Detection System: A Survey , 2015 .
[31] Anish Arora,et al. Disassembling real-time fault-tolerant programs , 2008, EMSOFT '08.
[32] Rajkumar Buyya,et al. Article in Press Future Generation Computer Systems ( ) – Future Generation Computer Systems Cloud Computing and Emerging It Platforms: Vision, Hype, and Reality for Delivering Computing as the 5th Utility , 2022 .
[33] Ejaz Ahmed,et al. A survey on mobile edge computing , 2016, 2016 10th International Conference on Intelligent Systems and Control (ISCO).
[34] Wolfgang Banzhaf,et al. The use of computational intelligence in intrusion detection systems: A review , 2010, Appl. Soft Comput..
[35] Ali Mili,et al. Measuring Reliability as a Mean Failure Cost , 2007 .
[36] P. M. Melliar-Smith,et al. A program structure for error detection and recovery , 1974, Symposium on Operating Systems.
[37] Makhlouf Aliouat,et al. A New Efficient Checkpointing Algorithm for Distributed Mobile Computing , 2015 .
[38] Deepak Poola Chandrashekar,et al. Robust and fault-tolerant scheduling for scientific workflows in cloud computing environments , 2015 .
[39] Eui-Nam Huh,et al. Emerging Sensor-Cloud Technology for Pervasive Services and Applications , 2014, Int. J. Distributed Sens. Networks.
[40] Uday Chourasia,et al. ANOMALY DETECTION IN THE SERVICES PROVIDED BY MULTI CLOUD ARCHITECTURES: A SURVEY , 2014 .
[41] Ejaz Ahmed,et al. Multi-objective optimization model for seamless application execution in mobile cloud computing , 2013, 2013 5th International Conference on Information and Communication Technologies.
[42] Aniruddha S. Gokhale,et al. Fault-Tolerance for Component-Based Systems - An Automated Middleware Specialization Approach , 2009, 2009 IEEE International Symposium on Object/Component/Service-Oriented Real-Time Distributed Computing.
[43] Mathai Joseph,et al. Specification and verification of fault-tolerance, timing, and scheduling , 1999, TOPL.
[44] Betty H. C. Cheng,et al. Pattern-Based Modeling and Analysis of Failsafe Fault-Tolerance in UML , 2007 .
[45] Xavier Défago,et al. Reliability prediction for component-based software systems: Dealing with concurrent and propagating errors , 2015, Sci. Comput. Program..
[46] Yasir Saleem,et al. Integration of Cognitive Radio Sensor Networks and Cloud Computing: A Recent Trend , 2014 .
[47] Peter Kilpatrick,et al. A Lightweight Tool for Anomaly Detection in Cloud Data Centres , 2015, CLOSER.
[48] L. Arockiam,et al. FTM- A Middle Layer Architecture for Fault Tolerance in Cloud Computing , 2012 .
[49] Ruth Breu,et al. Anomaly Detection in the Cloud: Detecting Security Incidents via Machine Learning , 2012, EternalS@ECAI.
[50] Joseph Sifakis,et al. Modeling synchronous systems in BIP , 2009, EMSOFT '09.
[51] Ganesh Kumar,et al. Anomaly Detection System in Cloud Environment Using Fuzzy Clustering Based ANN , 2015, Mobile Networks and Applications.
[52] Ying Zhang,et al. Model driven configuration of fault tolerance solutions for component-based software system , 2012, MODELS'12.
[53] Y. A. Siva Prasad,et al. Statistical Anomaly Detection Technique for Real Time Datasets , 2013 .
[54] Yue-Shan Chang,et al. Mobile cloud-based depression diagnosis using an ontology and a Bayesian network , 2015, Future Gener. Comput. Syst..
[55] Arif Sari,et al. A Review of Anomaly Detection Systems in Cloud Networks and Survey of Cloud Security Measures in Cloud Storage Applications , 2015 .
[56] Feng Xia,et al. Application optimization in mobile cloud computing: Motivation, taxonomies, and open challenges , 2015, J. Netw. Comput. Appl..
[57] Thanh-Hung Nguyen,et al. Toward a More Dependable Software Architecture for Autonomous Robots , 2008 .
[58] Xavier Défago,et al. Reliability Prediction for Component-Based Systems: Incorporating Error Propagation Analysis and Different Execution Models , 2012, 2012 12th International Conference on Quality Software.
[59] Mubashir Husain Rehmani,et al. An efficient trajectory design for mobile sink in a wireless sensor network , 2014, Comput. Electr. Eng..
[60] Vanish Talwar,et al. Statistical techniques for online anomaly detection in data centers , 2011, 12th IFIP/IEEE International Symposium on Integrated Network Management (IM 2011) and Workshops.
[61] Feng Xia,et al. Cloudlet deployment in local wireless networks: Motivation, architectures, applications, and open challenges , 2016, J. Netw. Comput. Appl..
[62] Indranil Gupta,et al. On scalable and efficient distributed failure detectors , 2001, PODC '01.
[63] Guisheng Fan,et al. Model Based Byzantine Fault Detection Technique for Cloud Computing , 2012, 2012 IEEE Asia-Pacific Services Computing Conference.
[64] Algirdas A. Avi. The Methodology of N-Version Programming , 1995 .
[65] Min Chen,et al. Statistical Learning for Anomaly Detection in Cloud Server Systems: A Multi-Order Markov Chain Framework , 2018, IEEE Transactions on Cloud Computing.
[66] Yi Xie,et al. An energy-efficient task scheduling for mobile devices based on cloud assistant , 2016, Future Gener. Comput. Syst..
[67] Wail S. Elkilani,et al. A hybrid approach for efficient anomaly detection using metaheuristic methods , 2014, Journal of advanced research.
[68] Marco Aurélio Spohn,et al. Improving Network Traffic Anomaly Detection for Cloud Computing Services , 2014, ICSNC 2014.
[69] Pekka Alho,et al. Software fault detection and recovery in critical real-time systems: An approach based on loose coupling , 2014 .
[70] Rajkumar Buyya,et al. Network-centric performance analysis of runtime application migration in mobile cloud computing , 2015, Simul. Model. Pract. Theory.
[71] Jacques Pulou,et al. Using BIP for Modeling and Verification of Networked Systems -- A Case Study on TinyOS-based Networks , 2007, Sixth IEEE International Symposium on Network Computing and Applications (NCA 2007).
[72] Ciprian Dobre,et al. A Failure Detection System for Large Scale Distributed Systems , 2010, CISIS.
[73] Joseph Sifakis,et al. Composition for component-based modeling , 2005, Sci. Comput. Program..
[74] Ming Chen,et al. Adaptive BER-constraint-based power allocation for downlink MC-CDMA systems with linear MMSE receiver , 2010, 2010 IEEE 12th International Conference on Communication Technology.
[75] Anish Arora,et al. Closure and Convergence: A Foundation of Fault-Tolerant Computing , 1993, IEEE Trans. Software Eng..
[76] Ravi Ranjan,et al. A New Clustering Approach for Anomaly Intrusion Detection , 2014, ArXiv.
[77] Gregor Gößler,et al. A Theory of Fault Recovery for Component-Based Models , 2012, SSS.
[78] Amal Ganesh,et al. A study on fault tolerance methods in Cloud Computing , 2014, 2014 IEEE International Advance Computing Conference (IACC).
[79] Seng Wai Loke,et al. Supporting ubiquitous sensor-cloudlets and context-cloudlets: Programming compositions of context-aware systems for mobile users , 2012, Future Gener. Comput. Syst..
[80] Jun Wei,et al. Fault detection for cloud computing systems with correlation analysis , 2015, 2015 IFIP/IEEE International Symposium on Integrated Network Management (IM).
[81] Lavindra de Silva,et al. A Verifiable and Correct-by-Construction Controller for Robot Functional Levels , 2011, ArXiv.
[82] L. Youseff,et al. Toward a Unified Ontology of Cloud Computing , 2008, 2008 Grid Computing Environments Workshop.