Sciweavers

2044 search results - page 59 / 409
» System theory for numerical analysis
Sort
View
136
Voted
FAST
2010
15 years 6 months ago
End-to-end Data Integrity for File Systems: A ZFS Case Study
We present a study of the effects of disk and memory corruption on file system data integrity. Our analysis focuses on Sun's ZFS, a modern commercial offering with numerous r...
Yupu Zhang, Abhishek Rajimwale, Andrea C. Arpaci-D...
125
Voted
WSC
2007
15 years 6 months ago
An initial simulation model for aiding policy analysis in urban insurgencies
This paper aims to demonstrate the potential for using the system dynamics computer simulation methodology to gain insight into the evolution of insurgencies. In particular, it ex...
Edward G. Anderson Jr.
HICSS
2003
IEEE
168views Biometrics» more  HICSS 2003»
15 years 9 months ago
'Pay-per-use' Concept in Healthcare: A Grounded Theory Perspective
Healthcare organizations worldwide are faced with the growing challenge of introducing structural and technological reforms and cost-effective IT solutions that will transform the...
Abdullah A. Akbar
127
Voted
HICSS
2008
IEEE
107views Biometrics» more  HICSS 2008»
15 years 10 months ago
Research on Constraints in Anti-Money Laundering (AML) Business Process in China Based on Theory of Constraints
Anti-money laundering is a pressing issue in today’s economy. With the newly launched Chinese anti-money laundering regulation, this issue has drawn more and more attention from...
Xuan Liu, Pengzhu Zhang
171
Voted
IWMM
2011
Springer
217views Hardware» more  IWMM 2011»
14 years 6 months ago
On the theory and potential of LRU-MRU collaborative cache management
The goal of cache management is to maximize data reuse. Collaborative caching provides an interface for software to communicate access information to hardware. In theory, it can o...
Xiaoming Gu, Chen Ding