Now showing items 21-30 of 266
Clouseau Evaluation for Peer-to-Peer Transfer Operations
(Center for Information Technology Integration, 2008-03-05)
We evaluate whether Clouseau, a commercial product from SafeMedia, Inc., is effective in discriminating between risky and non-risky P2P operations. We construct a testbed and assess the Clouseau's efficacy in interdicting ...
Bilevel Image Similarity Ground Truth Archive
(2015-05-01)
This archive contains a set of seven bilevel images, the same images distorted in a number of ways and to a number of different degrees, subjective rating scores for each distorted image as to its similarity to its ...
XNetMod: A Design Tool for Large-Scale Networks
(Center for Information Technology Integration, 1993-08-18)
The network modeling tool XNetMod (based on NetMod) uses simple analytical models to allow designers of interconnected local area networks to analyze and simulate the potential performance of networks. This tool can be ...
Sifting the Network: Performing Packet Triage with NFR
(Center for Information Technology Integration, 1998-11-23)
We describe a set of Network Flight Recorder scripts designed to detect network intrusions. After developing scripts that detect some known attacks, we focus on sifting scripts that attempt to remove "normal" traffic from ...
An Environment for "Sniffing" DCE-RPC Traffic
(Center for Information Technology Integration, 1993-06-21)
The ability to watch the network traffic generated by client and server applications can greatly assist in both understanding how a client/server application functions, as well as identifying problem areas. At the Center ...
Evaluating Delayed Write in a Multilevel Caching File System
(Center for Information Technology Integration, 1995-10-24)
Delayed write in a multilevel file system cache hierarchy offers a way to improve performance in diverse client/server scenarios, such as integrating mass store into a distributed file system or providing distributed file ...
MICA: A MID Compiler in Java
(Center for Information Technology Integration, 1997-09-03)
Management Information Bases (MIBs) define the attributes of objects managed by the Simple Network Management Protocol (SNMP). An SNMP application uses the information in one or more MIBs to learn the attributes of the ...
Linux Kernel Hash Table Behavior: Analysis and Improvements
(Center for Information Technology Integration, 2000-08-13)
The Linux kernel employs hash table data structures to store high-usage data objects such as pages, buffers, inodes, and others. In this report we find significant performance boosts with careful analysis and tuning of ...
Intermediate File Servers in a Distributed File System Environment
(Center for Information Technology Integration, 1992-06-30)
A component of the Institutional File System (IFS), the intermediate file server addresses scaling and interoperability issues on the University of Michigan campus. The IFS is based on AFS, a distributed file system from ...