Sciweavers

535 search results - page 23 / 107
» Predicting Application Run Times Using Historical Informatio...
Sort
View
ISI
2008
Springer
13 years 7 months ago
Real time intrusion prediction, detection and prevention programs
An Intrusion Detection Program (IDP) analyzes what happens or has happened during an execution and tries to find indications that the computer has been misused. In this talk, we p...
A. Abraham
SIGMETRICS
2003
ACM
115views Hardware» more  SIGMETRICS 2003»
14 years 27 days ago
Dynamic resource allocation for shared data centers using online measurements
Since web workloads are known to vary dynamically with time, in this paper, we argue that dynamic resource allocation techniques are necessary to provide guarantees to web applicat...
Abhishek Chandra, Weibo Gong, Prashant J. Shenoy
HOTSWUP
2009
ACM
14 years 9 days ago
Automating Database Schema Evolution in Information System Upgrades
The complexity, cost, and down-time currently created by the database schema evolution process is the source of incessant problems in the life of information systems and a major s...
Carlo Curino, Hyun Jin Moon, Carlo Zaniolo
CIT
2006
Springer
13 years 11 months ago
A High Performance ASIC for Cellular Automata (CA) Applications
CA are useful tools in modeling and simulation. However, the more complex a CA is, the longer it takes to run in typical environments. A dedicated CA machine solves this problem by...
Cheryl A. Kincaid, Saraju P. Mohanty, Armin R. Mik...
HICSS
2006
IEEE
105views Biometrics» more  HICSS 2006»
14 years 1 months ago
Unified Information Models in Support of Location Transparency for Future Utility Applications
For future scenarios of power system operations, like the self healing grid vision, system and communications architecture are key. Applications will require unlimited access to a...
Otto Preiss, Tatjana Kostic