Unix Platform

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 264 Experts worldwide ranked by ideXlab platform

Wu Zhigong - One of the best experts on this subject based on the ideXlab platform.

  • CSO - Masquerade Detection Using Support Vector Machines in the Smart Grid
    2014 Seventh International Joint Conference on Computational Sciences and Optimization, 2014
    Co-Authors: Zhao Yu-xiang, Hu Guangyu, Wu Zhigong
    Abstract:

    In the Smart grid, network security is the important part. In this paper, we will introduce a new method detection based on Support Vector Machines to detect Masquerade attack, and test it and other methods on the dataset from keyboard commands on a Unix Platform. The presence of shared tuples would cause many attacks in this dataset to be difficultly detected, just as other researchers shown. In order to eliminate their negative influence on masquerade detection, we take some preprocessing for the dataset before detecting masquerade attacks. Our results show that after removing the shared tuples, the classifiers based on support vector machines outperforms the original approaches presented.

  • Masquerade Detection Using Support Vector Machines in the Smart Grid
    Computational Sciences and Optimization (CSO), 2014 Seventh International Joint Conference on, 2014
    Co-Authors: Zhao Yu-xiang, Hu Guangyu, Wu Zhigong
    Abstract:

    In the Smart grid, network security is the important part. In this paper, we will introduce a new method detection based on Support Vector Machines to detect Masquerade attack, and test it and other methods on the dataset from keyboard commands on a Unix Platform. The presence of shared tuples would cause many attacks in this dataset to be difficultly detected, just as other researchers shown. In order to eliminate their negative influence on masquerade detection, we take some preprocessing for the dataset before detecting masquerade attacks. Our results show that after removing the shared tuples, the classifiers based on support vector machines outperforms the original approaches presented.

D. Jewett - One of the best experts on this subject based on the ideXlab platform.

  • Integrity S2: a fault-tolerant Unix Platform
    [1991] Digest of Papers. Fault-Tolerant Computing: The Twenty-First International Symposium, 1991
    Co-Authors: D. Jewett
    Abstract:

    A description is given of Integrity S2, a fault-tolerant, Unix-based computing system designed and implemented to provide a highly available, fault-tolerant computing Platform for Unix-based applications. Unlike some other fault tolerant computing systems, no additional coding at the user-level is required to take advantage of the fault-tolerant capabilities inherent in the Platform. The hardware is an RISC-based triple-modular-redundant processing core, with duplexed global memory and I/O subsystems. The goals for this machine, the system architecture, its implementation and resulting performance, and the hardware and software techniques incorporated to achieve fault tolerance are discussed. Fault tolerance has been accomplished without compromising the programmatic interface, operating system or system performance.

  • FTCS - Integrity S2: a fault-tolerant Unix Platform
    Twenty-Fifth International Symposium on Fault-Tolerant Computing 1995 ' Highlights from Twenty-Five Years'., 1991
    Co-Authors: D. Jewett
    Abstract:

    A description is given of Integrity S2, a fault-tolerant, Unix-based computing system designed and implemented to provide a highly available, fault-tolerant computing Platform for Unix-based applications. Unlike some other fault tolerant computing systems, no additional coding at the user-level is required to take advantage of the fault-tolerant capabilities inherent in the Platform. The hardware is an RISC-based triple-modular-redundant processing core, with duplexed global memory and I/O subsystems. The goals for this machine, the system architecture, its implementation and resulting performance, and the hardware and software techniques incorporated to achieve fault tolerance are discussed. Fault tolerance has been accomplished without compromising the programmatic interface, operating system or system performance. >

Michael Boniface - One of the best experts on this subject based on the ideXlab platform.

  • Introduction of knowledge bases in patient's data management system: Role of the user interface
    International Journal of Clinical Monitoring and Computing, 1995
    Co-Authors: M. C. Chambrin, P. Ravaux, A. Jaborska, C. Beugnet, P. Lestavel, Claude Chopin, Michael Boniface
    Abstract:

    As the number of signals and data to be handled grows in intensive care unit, it is necessary to design more powerful computing systems that integrate and summarize all this information. The manual input of data as e.g. clinical signs and drug prescription and the synthetic representation of these data requires an ever more sophisticated user interface. The introduction of knowledge bases in the data management allows to conceive contextual interfaces. The objective of this paper is to show the importance of the design of the user interface, in the daily use of clinical information system. Then we describe a methodology that uses the man-machine interaction to capture the clinician knowledge during the clinical practice. The different steps are the audit of the user's actions, the elaboration of statistic models allowing the definition of new knowledge, and the validation that is performed before complete integration. A part of this knowledge can be used to improve the user interface. Finally, we describe the implementation of these concepts on a Unix Platform using OSF/MOTIF graphical interface.

Wout Mertens - One of the best experts on this subject based on the ideXlab platform.

  • herding cats managing a mobile Unix Platform
    USENIX Large Installation Systems Administration Conference, 2005
    Co-Authors: Maarten Thibaut, Wout Mertens
    Abstract:

    Laptops running Unix operating systems are gaining market share. This leads to more sysadmins being asked to support these systems. This paper describes the major technical decisions reached to facilitate the pilot roll out of a mobile Mac OS X Platform. We explain which choices we made and why. We also list the main problems we encountered and how they were tackled. We show why in the environment of a customer support organization at Cisco, a file management tool with tripwire-like capabilities is needed. Radmind appears to be the only software base meeting these requirements. We show how the radmind suite can be extended and integrated to suit mobile clients in an enterprise environment. We provide solutions to automate asset tracking and the maintenance of encrypted home directory disk images. We draw conclusions and list the lessons learnt.

  • LISA - Herding cats: managing a mobile Unix Platform
    2005
    Co-Authors: Maarten Thibaut, Wout Mertens
    Abstract:

    Laptops running Unix operating systems are gaining market share. This leads to more sysadmins being asked to support these systems. This paper describes the major technical decisions reached to facilitate the pilot roll out of a mobile Mac OS X Platform. We explain which choices we made and why. We also list the main problems we encountered and how they were tackled. We show why in the environment of a customer support organization at Cisco, a file management tool with tripwire-like capabilities is needed. Radmind appears to be the only software base meeting these requirements. We show how the radmind suite can be extended and integrated to suit mobile clients in an enterprise environment. We provide solutions to automate asset tracking and the maintenance of encrypted home directory disk images. We draw conclusions and list the lessons learnt.

Zhao Yu-xiang - One of the best experts on this subject based on the ideXlab platform.

  • CSO - Masquerade Detection Using Support Vector Machines in the Smart Grid
    2014 Seventh International Joint Conference on Computational Sciences and Optimization, 2014
    Co-Authors: Zhao Yu-xiang, Hu Guangyu, Wu Zhigong
    Abstract:

    In the Smart grid, network security is the important part. In this paper, we will introduce a new method detection based on Support Vector Machines to detect Masquerade attack, and test it and other methods on the dataset from keyboard commands on a Unix Platform. The presence of shared tuples would cause many attacks in this dataset to be difficultly detected, just as other researchers shown. In order to eliminate their negative influence on masquerade detection, we take some preprocessing for the dataset before detecting masquerade attacks. Our results show that after removing the shared tuples, the classifiers based on support vector machines outperforms the original approaches presented.

  • Masquerade Detection Using Support Vector Machines in the Smart Grid
    Computational Sciences and Optimization (CSO), 2014 Seventh International Joint Conference on, 2014
    Co-Authors: Zhao Yu-xiang, Hu Guangyu, Wu Zhigong
    Abstract:

    In the Smart grid, network security is the important part. In this paper, we will introduce a new method detection based on Support Vector Machines to detect Masquerade attack, and test it and other methods on the dataset from keyboard commands on a Unix Platform. The presence of shared tuples would cause many attacks in this dataset to be difficultly detected, just as other researchers shown. In order to eliminate their negative influence on masquerade detection, we take some preprocessing for the dataset before detecting masquerade attacks. Our results show that after removing the shared tuples, the classifiers based on support vector machines outperforms the original approaches presented.