Sciweavers

1701 search results - page 215 / 341
» Bandwidth Management of WiMAX Systems and Performance Modeli...
Sort
View
DKE
2007
99views more  DKE 2007»
15 years 4 months ago
Interaction pattern detection in process oriented information systems
Finding interaction patterns is a challenging problem, but this kind of information about processes or social networks might be useful for an organization’s management to unders...
Schahram Dustdar, Thomas Hoffmann
EDBT
2011
ACM
199views Database» more  EDBT 2011»
14 years 7 months ago
Predicting completion times of batch query workloads using interaction-aware models and simulation
A question that database administrators (DBAs) routinely need to answer is how long a batch query workload will take to complete. This question arises, for example, while planning...
Mumtaz Ahmad, Songyun Duan, Ashraf Aboulnaga, Shiv...
MSS
2003
IEEE
151views Hardware» more  MSS 2003»
15 years 9 months ago
Accurate Modeling of Cache Replacement Policies in a Data Grid
Caching techniques have been used to improve the performance gap of storage hierarchies in computing systems. In data intensive applications that access large data files over wid...
Ekow J. Otoo, Arie Shoshani
ICSM
2000
IEEE
15 years 8 months ago
Evolution in Open Source Software: A Case Study
Most studies of software evolution have been performed on systems developed within a single company using traditional management techniques. With the widespread availability of se...
Michael W. Godfrey, Qiang Tu
EDBT
2009
ACM
135views Database» more  EDBT 2009»
15 years 9 months ago
Provenance for nested subqueries
Data provenance is essential in applications such as scientific computing, curated databases, and data warehouses. Several systems have been developed that provide provenance fun...
Boris Glavic, Gustavo Alonso