Sciweavers

2384 search results - page 285 / 477
» Analyzing Requirements Engineering Processes: A Case Study
Sort
View
FAST
2011
14 years 8 months ago
A Scheduling Framework That Makes Any Disk Schedulers Non-Work-Conserving Solely Based on Request Characteristics
Exploiting spatial locality is critical for a disk scheduler to achieve high throughput. Because of the high cost of disk head seeks and the non-preemptible nature of request serv...
Yuehai Xu, Song Jiang
CCS
2011
ACM
14 years 4 months ago
SURF: detecting and measuring search poisoning
Search engine optimization (SEO) techniques are often abused to promote websites among search results. This is a practice known as blackhat SEO. In this paper we tackle a newly em...
Long Lu, Roberto Perdisci, Wenke Lee
INFOCOM
2007
IEEE
15 years 11 months ago
Non-Cooperative Scheduling of Multiple Bag-of-Task Applications
Multiple applications that execute concurrently on heterogeneous platforms compete for CPU and network resources. In this paper we analyze the behavior of K non-cooperative schedu...
Arnaud Legrand, Corinne Touati
ISN
1999
Springer
112views Communications» more  ISN 1999»
15 years 9 months ago
Modelling Management Components for Reuse Using UML
The competitive pressures of the telecoms sector are leading to a major push towards the automation and integration of many operational support processes. This creates pressures to...
David Lewis, Chris Malbon, Alina DaCruz
CONEXT
2008
ACM
15 years 6 months ago
Troubleshooting chronic conditions in large IP networks
Chronic network conditions are caused by performance impairing events that occur intermittently over an extended period of time. Such conditions can cause repeated performance deg...
Ajay Mahimkar, Jennifer Yates, Yin Zhang, Aman Sha...