Sciweavers

396 search results - page 60 / 80
» Argument Controlled Profiling
Sort
View
ICSE
2005
IEEE-ACM
14 years 7 months ago
An empirical evaluation of test case filtering techniques based on exercising complex information flows
Some software defects trigger failures only when certain complex information flows occur within the software. Profiling and analyzing such flows therefore provides a potentially i...
David Leon, Wes Masri, Andy Podgurski
ICDE
2010
IEEE
292views Database» more  ICDE 2010»
14 years 7 months ago
Exploring Power-Performance Tradeoffs in Database Systems
With the total energy consumption of computing systems increasing in a steep rate, much attention has been paid to the design of energy-efficient computing systems and applications...
Zichen Xu, Yi-Cheng Tu, Xiaorui Wang
ICC
2007
IEEE
127views Communications» more  ICC 2007»
14 years 2 months ago
Properties of the Traffic Output by a Leaky-Bucket Policer with Long-Range Dependent Input Traffic
 Long-range dependence (LRD) is a largely verified property of Internet traffic, which severely affects queuing performance in network buffers. A common approach for guaranteein...
Stefano Bregni, Paolo Giacomazzi, Gabriella Saddem...
ECTEL
2007
Springer
14 years 1 months ago
Using MotSaRT to Support On-Line Teachers in Student Motivation
Motivation to learn is affected by a student’s self-efficacy, goal orientation, locus of control and perceived task difficulty. In the classroom, teachers know how to motivate th...
Teresa Hurley, Stephan Weibelzahl
SAINT
2006
IEEE
14 years 1 months ago
Fair Overload Handling Using Proof-of-Work Functions
Overload can reduce the overall performance of a computer system up to a point where the whole service might collapse. Thus, for example the load on a server must be controlled to...
Sebastian Golze, Gero Mühl