Sciweavers

46 search results - page 3 / 10
» How to Do Application Logging Right
Sort
View
CMG
2003
13 years 9 months ago
{Performance Modeling and Evaluation of Large-Scale J2EE Applications
The queueing Petri net (QPN) paradigm provides a number of benefits over conventional modeling paradigms such as queueing networks and generalized stochastic Petri nets. Using qu...
Samuel Kounev, Alejandro P. Buchmann
USS
2008
13 years 10 months ago
Modeling the Trust Boundaries Created by Securable Objects
One of the most critical steps of any security review involves identifying the trust boundaries that an application is exposed to. While methodologies such as threat modeling can ...
Matt Miller
DEBU
1998
115views more  DEBU 1998»
13 years 7 months ago
The Case for Non-transparent Replication: Examples from Bayou
Applications that rely on replicated data have different requirements for how their data is managed. For example, some applications may require that updates propagate amongst repl...
Douglas B. Terry, Karin Petersen, Mike Spreitzer, ...
AICOM
2002
96views more  AICOM 2002»
13 years 7 months ago
Comparing environments for developing software agents
In the last years, dozens of environments for modeling, testing and finally implementing multi-agent systems have been developed. Unfortunately, no standard criteria for understand...
Thomas Eiter, Viviana Mascardi
VL
2009
IEEE
126views Visual Languages» more  VL 2009»
14 years 2 months ago
Revealing the copy and paste habits of end users
Transferring data across applications is a common end user task, and copying and pasting via the clipboard lets users do so relatively easily. Using the clipboard, however, can al...
Kathryn T. Stolee, Sebastian G. Elbaum, Gregg Roth...