Sciweavers

4252 search results - page 749 / 851
» Measuring Component Adaptation
Sort
View
ICC
2009
IEEE
164views Communications» more  ICC 2009»
13 years 7 months ago
Policy-Based Security Configuration Management, Application to Intrusion Detection and Prevention
Intrusion Detection and/or Prevention Systems (IDPS) represent an important line of defense against the variety of attacks that can compromise the security and well functioning of...
Khalid Alsubhi, Issam Aib, Jérôme Fra...
TKDE
2011
177views more  TKDE 2011»
13 years 5 months ago
Load Shedding in Mobile Systems with MobiQual
— In location-based, mobile continual query (CQ) systems, two key measures of quality of service (QoS) are: freshness and accuracy. To achieve freshness, the CQ server must perfo...
Bugra Gedik, Kun-Lung Wu, Ling Liu, Philip S. Yu
HOTNETS
2010
13 years 4 months ago
Diagnosing mobile applications in the wild
There are a lot of applications that run on modern mobile operating systems. Inevitably, some of these applications fail in the hands of users. Diagnosing a failure to identify the...
Sharad Agarwal, Ratul Mahajan, Alice Zheng, Victor...
ISCA
2011
IEEE
333views Hardware» more  ISCA 2011»
13 years 1 months ago
The impact of memory subsystem resource sharing on datacenter applications
In this paper we study the impact of sharing memory resources on five Google datacenter applications: a web search engine, bigtable, content analyzer, image stitching, and protoc...
Lingjia Tang, Jason Mars, Neil Vachharajani, Rober...
TVCG
2012
213views Hardware» more  TVCG 2012»
12 years 14 days ago
Mesh-Driven Vector Field Clustering and Visualization: An Image-Based Approach
—Vector field visualization techniques have evolved very rapidly over the last two decades, however, visualizing vector fields on complex boundary surfaces from computational ...
Zhenmin Peng, Edward Grundy, Robert S. Laramee, Gu...