Sciweavers

861 search results - page 126 / 173
» Predicting Attack-prone Components
Sort
View
NETGAMES
2004
ACM
14 years 1 months ago
Implementation of a service platform for online games
Large-scale multiplayer online games require considerable investment in hosting infrastructures. However, the difficulty of predicting the success of a new title makes investing ...
Anees Shaikh, Sambit Sahu, Marcel-Catalin Rosu, Mi...
SC
2004
ACM
14 years 1 months ago
Language and Compiler Support for Adaptive Applications
There exist many application classes for which the users have significant flexibility in the quality of output they desire. At the same time, there are other constraints, such a...
Wei Du, Gagan Agrawal
IWQOS
2004
Springer
14 years 1 months ago
Triage: performance isolation and differentiation for storage systems
Abstract— Ensuring performance isolation and differentiation among workloads that share a storage infrastructure is a basic requirement in consolidated data centers. Existing man...
Magnus Karlsson, Christos T. Karamanolis, Xiaoyun ...
SAFECOMP
2004
Springer
14 years 1 months ago
How Explicit Are the Barriers to Failure in Safety Arguments?
Safety cases embody arguments that demonstrate how safety properties of a system are upheld. Such cases implicitly document the barriers that must exist between hazards and vulnera...
Shamus P. Smith, Michael D. Harrison, Bastiaan A. ...
CODES
2003
IEEE
14 years 29 days ago
Early estimation of the size of VHDL projects
The analysis of the amount of human resources required to complete a project is felt as a critical issue in any company of the electronics industry. In particular, early estimatin...
William Fornaciari, Fabio Salice, Daniele Paolo Sc...