Sciweavers

264 search results - page 43 / 53
» Machine Learning in Infrastructure Security
Sort
View
AGS
2009
Springer
14 years 1 months ago
Two Case Studies for Jazzyk BSM
Recently, we introduced Behavioural State Machines (BSM ), a novel programming framework for development of cognitive agents with Jazzyk, its associated programming language and in...
Michael Köster, Peter Novák, David Mai...
UIC
2009
Springer
14 years 1 months ago
Printing in Ubiquitous Computing Environments
Document printing has long been considered an indispensable part of the workspace. While this process is considered trivial and simple for environments where resources are ample (e...
Athanasios Karapantelakis, Alisa Devlic, Mohammad ...
POLICY
2004
Springer
14 years 21 days ago
DecisionQoS: An Adaptive, Self-Evolving QoS Arbitration Module for Storage Systems
As a consequence of the current trend towards consolidating computing, storage and networking infrastructures into large centralized data centers, applications compete for shared ...
Sandeep Uttamchandani, Guillermo A. Alvarez, Gul A...

Publication
198views
13 years 10 months ago
Real time policy based management of workflows for SLA Adherence
The need for service providers to offer SLAs to gain consumers confidence has become increasingly apparent. Our work focuses on providers who manage the execution of long-running d...
Daniel Spaven, Madhavi Rani, Sumit Kumar Bose, Mik...
SIGMETRICS
2008
ACM
109views Hardware» more  SIGMETRICS 2008»
13 years 7 months ago
Automatic request categorization in internet services
Modeling system performance and workload characteristics has become essential for efficiently provisioning Internet services and for accurately predicting future resource requirem...
Abhishek Sharma, Ranjita Bhagwan, Monojit Choudhur...