Sciweavers

1848 search results - page 274 / 370
» A Question Answering System for the Operation of Software Ap...
Sort
View
WER
2007
Springer
14 years 3 months ago
Exploiting a Goal-Decomposition Technique to Prioritize Non-functional Requirements
Business stakeholders need to have clear and realistic goals if they want to meet commitments in application development. As a consequence, at early stages they prioritize require...
Maya Daneva, Mohamad Kassab, María Laura Po...
EDBTW
2010
Springer
14 years 13 days ago
Flexible Dataspace Management Through Model Management
The vision of dataspaces has been articulated as providing various of the benefits of classical data integration but with reduced up-front costs, which, combined with opportunitie...
Cornelia Hedeler, Khalid Belhajjame, Lu Mao, Norma...
LISA
2001
13 years 10 months ago
ScanSSH: Scanning the Internet for SSH Servers
SSH is a widely used application that provides secure remote login. It uses strong cryptography to provide authentication and confidentiality. The IETF SecSH working group is deve...
Niels Provos, Peter Honeyman
ISSRE
2010
IEEE
13 years 7 months ago
Pinpointing the Subsystems Responsible for the Performance Deviations in a Load Test
—Large scale systems (LSS) contain multiple subsystems that interact across multiple nodes in sometimes unforeseen and complicated ways. As a result, pinpointing the subsystems t...
Haroon Malik, Bram Adams, Ahmed E. Hassan
NOMS
2010
IEEE
251views Communications» more  NOMS 2010»
13 years 7 months ago
Online detection of utility cloud anomalies using metric distributions
—The online detection of anomalies is a vital element of operations in data centers and in utility clouds like Amazon EC2. Given ever-increasing data center sizes coupled with th...
Chengwei Wang, Vanish Talwar, Karsten Schwan, Part...