Sciweavers

3193 search results - page 556 / 639
» A Security Risk Analysis Model for Information Systems
Sort
View
SOSP
2007
ACM
14 years 7 months ago
Triage: diagnosing production run failures at the user's site
Diagnosing production run failures is a challenging yet important task. Most previous work focuses on offsite diagnosis, i.e. development site diagnosis with the programmers prese...
Joseph Tucek, Shan Lu, Chengdu Huang, Spiros Xanth...
ADBIS
2007
Springer
124views Database» more  ADBIS 2007»
14 years 4 months ago
Fast and Efficient Log File Compression
Contemporary information systems are replete with log files, created in multiple places (e.g., network servers, database management systems, user monitoring applications, system se...
Przemyslaw Skibinski, Jakub Swacha
QEST
2008
IEEE
14 years 4 months ago
KPC-Toolbox: Simple Yet Effective Trace Fitting Using Markovian Arrival Processes
We present the KPC-Toolbox, a collection of Matlab scripts for fitting workload traces into Markovian Arrival Processes (MAPs) in an automatic way. We first present detailed sen...
Giuliano Casale, Eddy Z. Zhang, Evgenia Smirni
ESWS
2007
Springer
14 years 2 months ago
Towards Semantic Social Networks
Abstract. Computer manipulated social networks are usually built from the explicit assertion by users that they have some relation with other users or by the implicit evidence of s...
Jason J. Jung, Jérôme Euzenat
VISSYM
2007
14 years 16 days ago
Flexible And Topologically Localized Segmentation
One of the most common visualization tasks is the extraction of significant boundaries, often performed with isosurfaces or level set segmentation. Isosurface extraction is simple...
Gunnar Johansson, Ken Museth, Hamish Carr