Sciweavers

2096 search results - page 74 / 420
» Modeling stream processing applications for dependability ev...
Sort
View
100
Voted
ICC
2007
IEEE
206views Communications» more  ICC 2007»
15 years 9 months ago
Buffer Occupation Probability of Trace-Driven Background Streams in Hybrid Simulation
— In this paper, numerical calculation schemes of the buffer occupation probability for a buffer which is fed by a large number of independent and stationary sources are evaluate...
Ben Lauwens, Bart Scheers, Antoine Van de Capelle
ICSE
2008
IEEE-ACM
16 years 3 months ago
Predicting defects using network analysis on dependency graphs
In software development, resources for quality assurance are limited by time and by cost. In order to allocate resources effectively, managers need to rely on their experience bac...
Thomas Zimmermann, Nachiappan Nagappan
123
Voted
ALGORITHMICA
2002
97views more  ALGORITHMICA 2002»
15 years 2 months ago
Testing and Spot-Checking of Data Streams
Abstract. We consider the tasks of testing and spot-checking for data streams. These testers and spotcheckers are potentially useful in real-time or near real-time applications tha...
Joan Feigenbaum, Sampath Kannan, Martin Strauss, M...
151
Voted
VLDB
2010
ACM
190views Database» more  VLDB 2010»
15 years 1 months ago
Continuous authentication on relational streams
According to the database outsourcing model, a data owner delegates database functionality to a thirdparty service provider, which answers queries received from clients. Authentic...
Stavros Papadopoulos, Yin Yang, Dimitris Papadias
108
Voted
ADC
2004
Springer
106views Database» more  ADC 2004»
15 years 8 months ago
Customizing Internal Activity Behaviour for Flexible Process Enforcement
Workflow technology has met with success in a variety of industries, although several limitations have emerged. One such drawback is the inflexibility of specification languages, ...
Belinda M. Carter, Joe Y.-C. Lin, Maria E. Orlowsk...