Sciweavers

1532 search results - page 96 / 307
» An analysis of additivity in OLAP systems
Sort
View
SOSP
2003
ACM
14 years 6 months ago
Measurement, modeling, and analysis of a peer-to-peer file-sharing workload
Peer-to-peer (P2P) file sharing accounts for an astonishing volume of current Internet traffic. This paper probes deeply into modern P2P file sharing systems and the forces that...
P. Krishna Gummadi, Richard J. Dunn, Stefan Saroiu...
DTJ
1998
171views more  DTJ 1998»
13 years 8 months ago
Measurement and Analysis of C and C++ Performance
ir increasing use of abstraction, modularity, delayed binding, polymorphism, and source reuse, especially when these attributes are used in combination. Modern processor architectu...
Hemant G. Rotithor, Kevin W. Harris, Mark W. Davis
BMCBI
2005
94views more  BMCBI 2005»
13 years 9 months ago
Visualization-based discovery and analysis of genomic aberrations in microarray data
Background: Chromosomal copy number changes (aneuploidies) play a key role in cancer progression and molecular evolution. These copy number changes can be studied using microarray...
Chad L. Myers, Xing Chen, Olga G. Troyanskaya
SIGSOFT
1998
ACM
14 years 1 months ago
Effective Whole-Program Analysis in the Presence of Pointers
Understanding large software systems is difficult. Traditionally, automated tools are used to assist program understanding. However, the representations constructed by these tool...
Darren C. Atkinson, William G. Griswold
DBSEC
2004
170views Database» more  DBSEC 2004»
13 years 10 months ago
RBAC/MAC Security Analysis and Design for UML
In software construction, analysis investigates the boundary of a system (scope and requirements), its usage and access, and from a security perspective, who needs access to what ...
Thuong Doan, Steven A. Demurjian, Charles E. Phill...