Sciweavers

403 search results - page 73 / 81
» Using Adaptation Plans to Control the Behavior of Models@run...
Sort
View
EIS
2011
290views ECommerce» more  EIS 2011»
13 years 5 months ago
Code query by example
Most software engineering techniques that deal with software products customization are based on anticipation: The software designer has to foresee, somehow, the future needs for ...
Sebastien Vaucouleur
AIM
2002
13 years 10 months ago
Computational Vulnerability Analysis for Information Survivability
The Infrastructure of modern society is controlled by software systems. These systems are vulnerable to attacks; several such attacks, launched by "recreation hackers" h...
Howard E. Shrobe
HOTOS
1999
IEEE
14 years 2 months ago
Elephant: The File System That Never Forgets
Modern file systems associate the deletion of a file with the release of the storage associated with that file, and file writes with the irrevocable change of file contents. We pr...
Douglas J. Santry, Michael J. Feeley, Norman C. Hu...
DSN
2006
IEEE
14 years 2 months ago
A Contribution Towards Solving the Web Workload Puzzle
World Wide Web, the biggest distributed system ever built, experiences tremendous growth and change in Web sites, users, and technology. A realistic and accurate characterization ...
Katerina Goseva-Popstojanova, Fengbin Li, Xuan Wan...
SENSYS
2010
ACM
13 years 8 months ago
The Jigsaw continuous sensing engine for mobile phone applications
Supporting continuous sensing applications on mobile phones is challenging because of the resource demands of long-term sensing, inference and communication algorithms. We present...
Hong Lu, Jun Yang, Zhigang Liu, Nicholas D. Lane, ...