Sciweavers

2241 search results - page 139 / 449
» Performance Modeling and Evaluation of E-Business Systems
Sort
View
CDC
2008
IEEE
216views Control Systems» more  CDC 2008»
14 years 2 months ago
Robust limit cycle control in an attitude control system with switching-constrained actuators
Abstract— In this paper the robust behavior in some piecewise affine systems with minimally spaced transition times is studied. Such systems are found e.g. in satellites and sat...
Alexandre R. Mesquita, Karl Heinz Kienitz, Erico L...
SIGIR
2012
ACM
11 years 10 months ago
Explicit relevance models in intent-oriented information retrieval diversification
The intent-oriented search diversification methods developed in the field so far tend to build on generative views of the retrieval system to be diversified. Core algorithm compon...
Saul Vargas, Pablo Castells, David Vallet
SIGMOD
2010
ACM
259views Database» more  SIGMOD 2010»
14 years 21 days ago
PODS: a new model and processing algorithms for uncertain data streams
Uncertain data streams, where data is incomplete, imprecise, and even misleading, have been observed in many environments. Feeding such data streams to existing stream systems pro...
Thanh T. L. Tran, Liping Peng, Boduo Li, Yanlei Di...
EDBT
2011
ACM
199views Database» more  EDBT 2011»
12 years 11 months ago
Predicting completion times of batch query workloads using interaction-aware models and simulation
A question that database administrators (DBAs) routinely need to answer is how long a batch query workload will take to complete. This question arises, for example, while planning...
Mumtaz Ahmad, Songyun Duan, Ashraf Aboulnaga, Shiv...
HICSS
2007
IEEE
137views Biometrics» more  HICSS 2007»
14 years 2 months ago
Value Driven Security Threat Modeling Based on Attack Path Analysis
This paper presents a quantitative threat modeling method, the Threat Modeling method based on Attack Path Analysis (T-MAP), which quantifies security threats by calculating the t...
Yue Chen, Barry W. Boehm, Luke Sheppard