Learn More
In this paper, we discuss the design, implementation, and experimental evaluation of a middleware architecture for enabling service level agreement (SLA)-driven clustering of QoS-aware application servers. Our middleware architecture supports application server technologies with dynamic resource management: application servers can dynamically change the(More)
Acne has a prevalence of over 90% among adolescents and persists into adulthood in approximately 12%-14% of cases with psychological and social implications. Possible outcomes of the inflammatory acne lesions are acne scars which, although they can be treated in a number of ways, may have a negative psychological impact on social life and relationships. The(More)
Large enterprises are nowadays complex interconnected software systems spanning over several domains. This new dimension makes difficult for enterprises the task of enabling efficient security defenses. This paper addresses the problem of detecting inter-domain stealthy port scans and proposes an architecture of an Intrusion Detection System which uses, for(More)
We describe an Internet-based collaborative environment that protects geographically dispersed organizations of a critical infrastructure (e.g., financial institutions, telco providers) from coordinated cyber attacks. A specific instance of a collaborative environment for detecting malicious inter-domain port scans is introduced. This instance uses the open(More)
—Mission critical distributed systems are typically constructed out of many different software components strictly interacting with each other. Due to the inherent complexity of those systems and to the asynchrony of the interactions, they can exhibit anomalies that can lead to failures and, in some cases, to an abrupt block of the system, even though the(More)
Recent evidence of successful Internet-based attacks and frauds involving financial institutions highlights the inadequacy of the existing protection mechanisms, in which each instutition implements its own isolated monitoring and reaction strategy. Analyzing on-line activity and detecting attacks on a large scale is an open issue due to the huge amounts of(More)
This paper introduces an experimental evaluation of a set of middleware services we have developed in order to enable application server technology to meet such quality of service (QoS) application requirements as service availability, timeliness and throughput. These services, developed in the context of the EU funded project TAPAS, have been integrated in(More)
The success of recent massive Internet-based attacks and frauds targeting financial institutions highlights the inadequacy of these institutions when facing such threats in isolation. There is a need for financial players to coordinate their efforts by sharing and correlating suspicious activities occurring at multiple, geographically distributed sites.(More)
Currently, a mobile device equipped with multiple heterogeneous wireless Network Interface Cards (NICs), cannot take fully advantage of its capabilities as the conventional mobility management approach allows it to select and use only one of its NICs at a time. In contrast to this approach, we propose the so-called Always Best Packet Switching (ABPS) model(More)
This paper describes the design, implementation and experimental evaluation of a system prototype, named Mobile E-Witness (MEW), which enables the acquisition and remote storage of multimedia (i.e., audio and video) data streams. In essence, MEW consists of a mobile device, incorporating a camera and a microphone, which can be “worn” (i.e., it can be(More)