Sciweavers

596 search results - page 67 / 120
» Finding and Removing Performance Bottlenecks in Large System...
Sort
View
CASES
2009
ACM
14 years 2 months ago
Towards scalable reliability frameworks for error prone CMPs
As technology scales and the energy of computation continually approaches thermal equilibrium [1,2], parameter variations and noise levels will lead to larger error rates at vario...
Joseph Sloan, Rakesh Kumar
SRDS
2006
IEEE
14 years 1 months ago
Call Availability Prediction in a Telecommunication System: A Data Driven Empirical Approach
Availability prediction in a telecommunication system plays a crucial role in its management, either by alerting the operator to potential failures or by proactively initiating pr...
Günther A. Hoffmann, Miroslaw Malek
ACSD
2009
IEEE
106views Hardware» more  ACSD 2009»
13 years 10 months ago
Specification Enforcing Refinement for Convertibility Verification
Protocol conversion deals with the automatic synthesis of an additional component, often referred to as an adaptor or a converter, to bridge mismatches between interacting compone...
Partha S. Roop, Alain Girault, Roopak Sinha, Grego...
DEXA
2000
Springer
75views Database» more  DEXA 2000»
14 years 5 days ago
View Selection in OLAP Environment
To select some "valuable" views for materialization is an essential challenge in OLAP system design. Several techniques proposed previously are not very scalable for syst...
Shi Guang Qiu, Tok Wang Ling
TSE
2010
230views more  TSE 2010»
13 years 2 months ago
Vulnerability Discovery with Attack Injection
The increasing reliance put on networked computer systems demands higher levels of dependability. This is even more relevant as new threats and forms of attack are constantly being...
João Antunes, Nuno Ferreira Neves, Miguel C...