Sciweavers

351 search results - page 53 / 71
» Generating Java trace data
Sort
View
DSN
2002
IEEE
14 years 1 months ago
Pinpoint: Problem Determination in Large, Dynamic Internet Services
Traditional problem determination techniques rely on static dependency models that are difficult to generate accurately in today’s large, distributed, and dynamic application e...
Mike Y. Chen, Emre Kiciman, Eugene Fratkin, Armand...
DCC
1998
IEEE
14 years 22 days ago
The Context Trees of Block Sorting Compression
Abstract. The Burrows-Wheeler transform (BWT) and block sorting compression are closely related to the context trees of PPM. The usual approach of treating BWT as merely a permutat...
N. Jesper Larsson
USS
2008
13 years 10 months ago
Modeling the Trust Boundaries Created by Securable Objects
One of the most critical steps of any security review involves identifying the trust boundaries that an application is exposed to. While methodologies such as threat modeling can ...
Matt Miller
MASCOTS
2004
13 years 9 months ago
Size-Based Scheduling Policies with Inaccurate Scheduling Information
Size-based scheduling policies such as SRPT have been studied since 1960s and have been applied in various arenas including packet networks and web server scheduling. SRPT has bee...
Dong Lu, Huanyuan Sheng, Peter A. Dinda
TVCG
1998
197views more  TVCG 1998»
13 years 8 months ago
A New Line Integral Convolution Algorithm for Visualizing Time-Varying Flow Fields
—New challenges on vector field visualization emerge as time-dependent numerical simulations become ubiquitous in the field of computational fluid dynamics (CFD). To visualize da...
Han-Wei Shen, David L. Kao