Sciweavers

1037 search results - page 10 / 208
» Application Management Techniques for the Bifrost System
Sort
View
CASCON
1996
160views Education» more  CASCON 1996»
13 years 9 months ago
Automatic generation of performance models for distributed application systems
Organizations have become increasingly dependent on computing systems to achieve their business goals. The performance of these systems in terms of response times and cost has a m...
M. Qin, R. Lee, Asham El Rayess, Vidar Vetland, Je...
KDD
2010
ACM
300views Data Mining» more  KDD 2010»
13 years 6 months ago
Using data mining techniques to address critical information exchange needs in disaster affected public-private networks
Crisis Management and Disaster Recovery have gained immense importance in the wake of recent man and nature inflicted calamities. A critical problem in a crisis situation is how t...
Li Zheng, Chao Shen, Liang Tang, Tao Li, Steven Lu...
ISTA
2003
13 years 9 months ago
Managing Business Logic with Symbolic Computation
: A new approach of building enterprise distributed applications for layer of business rules as standard part of architecture is proposed in this paper. The approach uses symbolic ...
Ruslan Shevchenko, Anatoly E. Doroshenko
AAI
2000
182views more  AAI 2000»
13 years 7 months ago
Implementing a Business Process Management System Using ADEPT: A Real-World Case Study
: This paper describes how ADEPT's agent-based design and implementation philosophy was used to prototype a business process management system for a real-world application. Th...
Nicholas R. Jennings, Peyman Faratin, Timothy J. N...
STORAGESS
2005
ACM
14 years 1 months ago
Ensuring data integrity in storage: techniques and applications
Data integrity is a fundamental aspect of storage security and reliability. With the advent of network storage and new technology trends that result in new failure modes for stora...
Gopalan Sivathanu, Charles P. Wright, Erez Zadok