Sciweavers

1128 search results - page 199 / 226
» A Case for Buffer Servers
Sort
View
ISSTA
2009
ACM
15 years 6 months ago
AVA: automated interpretation of dynamically detected anomalies
Dynamic analysis techniques have been extensively adopted to discover causes of observed failures. In particular, anomaly detection techniques can infer behavioral models from obs...
Anton Babenko, Leonardo Mariani, Fabrizio Pastore
106
Voted
ICDCS
2008
IEEE
15 years 6 months ago
PFC: Transparent Optimization of Existing Prefetching Strategies for Multi-Level Storage Systems
The multi-level storage architecture has been widely adopted in servers and data centers. However, while prefetching has been shown as a crucial technique to exploit the sequentia...
Zhe Zhang, Kyuhyung Lee, Xiaosong Ma, Yuanyuan Zho...
MUE
2008
IEEE
103views Multimedia» more  MUE 2008»
15 years 6 months ago
Ubiquitous Web Access: Collaborative Optimization and Dynamic Content Negotiation
Traditionally, cellular wide area networks like UMTS are used as Internet access networks for particular users but, in some cases, they can be employed to provide Internet access ...
Xavier Sanchez-Loro, Victoria Beltran, Jordi Casad...
PIMRC
2008
IEEE
15 years 6 months ago
Network-Assisted Wireless Computing
Abstract—Multimedia applications for mobile devices are increasing and growing more sophisticated. Many of these applications require computationally intensive processing, such a...
Carri W. Chan, Nicholas Bambos, Jatinder Pal Singh
CIDM
2007
IEEE
15 years 6 months ago
Privacy Preserving Burst Detection of Distributed Time Series Data Using Linear Transforms
— In this paper, we consider burst detection within the context of privacy. In our scenario, multiple parties want to detect a burst in aggregated time series data, but none of t...
Lisa Singh, Mehmet Sayal