Sciweavers

1226 search results - page 89 / 246
» A Model of Dynamic Resource Allocation in Workflow Systems
Sort
View
TR
2008
98views more  TR 2008»
15 years 4 months ago
Application of Vulnerability Discovery Models to Major Operating Systems
A number of security vulnerabilities have been reported in the Windows, and Linux operating systems. Both the developers, and users of operating systems have to utilize significant...
Omar H. Alhazmi, Yashwant K. Malaiya
SIGSOFT
2007
ACM
16 years 4 months ago
Model checking service compositions under resource constraints
When enacting a web service orchestration defined using the Business Process Execution Language (BPEL) we observed various safety property violations. This surprised us considerab...
David S. Rosenblum, Howard Foster, Jeff Kramer, Je...
CIKM
2006
Springer
15 years 8 months ago
Resource-aware kernel density estimators over streaming data
A fundamental building block of many data mining and analysis approaches is density estimation as it provides a comprehensive statistical model of a data distribution. For that re...
Christoph Heinz, Bernhard Seeger
EDOC
2008
IEEE
15 years 10 months ago
Achieving Business Process Flexibility with Business Rules
Business processes used in networked business are often large and complex, which makes them difficult to manage and change. In this paper we address this lack of flexibility by pr...
Tim van Eijndhoven, Maria-Eugenia Iacob, Mar&iacut...
EUROSYS
2010
ACM
16 years 1 months ago
Q-Clouds: Managing Performance Interference Effects for QoS-Aware Clouds
Cloud computing offers users the ability to access large pools of computational and storage resources on demand. Multiple commercial clouds already allow businesses to replace, or...
Ripal Nathuji, Aman Kansal, Alireza Ghaffarkhah