Sciweavers

443 search results - page 62 / 89
» Compensation-Aware Runtime Monitoring
Sort
View
SIGMOD
2008
ACM
297views Database» more  SIGMOD 2008»
15 years 10 months ago
Automatic Virtual Machine Configuration for Database Workloads
Virtual machine monitors are becoming popular tools for the deployment of database management systems and other enterprise software applications. In this paper, we consider a commo...
Ahmed A. Soror, Ashraf Aboulnaga, Kenneth Salem, P...
DAC
2005
ACM
14 years 12 months ago
Simulation based deadlock analysis for system level designs
In the design of highly complex, heterogeneous, and concurrent systems, deadlock detection and resolution remains an important issue. In this paper, we systematically analyze the ...
Xi Chen, Abhijit Davare, Harry Hsieh, Alberto L. S...
WWW
2004
ACM
14 years 11 months ago
Web customization using behavior-based remote executing agents
ReAgents are remotely executing agents that customize Web browsing for non-standard resource-limited clients. A reAgent is essentially a "one-shot" mobile agent that act...
Eugene Hung, Joseph Pasquale
ESORICS
2002
Springer
14 years 10 months ago
TINMAN: A Resource Bound Security Checking System for Mobile Code
Resource security pertains to the prevention of unauthorized usage of system resources that may not directly cause corruption or leakage of information. A common breach of resource...
Aloysius K. Mok, Weijiang Yu
ACHI
2009
IEEE
14 years 5 months ago
Model-Driven Instrumentation of Graphical User Interfaces
In today’s continuously changing markets newly developed products often do not meet the demands and expectations of customers. Research on this problem identified a large gap b...
Mathias Funk, Philip Hoyer, Stefan Link