German Florez

Learn More
SUMMARY Current technologies allow efficient data collection by several sensors to determine the overall evaluation of the status of a cluster. However, no previous work of which we are aware analyzes the behavior of the parallel programs themselves in real-time. In this paper, we perform a comparison of different artificial intelligence techniques that can(More)
– This paper describes several scenarios that could potentially be used to implement attacks against a Linux high performance cluster, resulting in actions that corrupt information in the system (i.e. integrity issues), collect important information (i.e. confidentiality violations), and perform denial of service attacks (i.e. availability issues). These(More)
A simple analytical expression aiming to calculate the backscatter factor used in dosimetry protocols to determine the absorbed dose in water for low energy X-rays beams is presented. This expression is based on the linear dependence of the backscatter factor with the generating potential, for fixed values of the half-value layer. The results of a recent(More)
Message passing interface (MPI) is an effective programming technique for implementing parallel programs for distributed computation. As these applications run, a number of different types of irregularities can occur including those that result from intrusions, user misbehavior, corrupted data, deadlocks or failure of cluster components. We perform a(More)
Recently intrusion detection techniques have shifted from user-based and connection-based to process-based intrusion detection. Forrest et al. [2] presented one of the first papers analyzing sequences of system calls issued by a process for intrusion detection. Warrender et al. [11] do a comparison of the accuracy and performance of different algorithms for(More)
  • 1