Sciweavers

948 search results - page 50 / 190
» Analysis of SITA policies
Sort
View
COMPSAC
2002
IEEE
15 years 2 months ago
Resource Instantiation Policies for Software Process Environments
Process-Centered Software Engineering Environments (PSEEs) deal with activities that demand limited resources. Characteristics about required resources and their dynamic availabili...
Carla Alessandra Lima Reis, Rodrigo Quites Reis, H...
CLUSTER
2008
IEEE
14 years 10 months ago
Translating Service Level Objectives to lower level policies for multi-tier services
Service providers and their customers agree on certain quality of service guarantees through Service Level Agreements (SLA). An SLA contains one or more Service Level Objectives (S...
Yuan Chen, Subu Iyer, Xue Liu, Dejan S. Milojicic,...
MCS
2008
Springer
14 years 9 months ago
Public policy, innovation and total factor productivity: An application to Taiwan's manufacturing industry
: This paper examines the impact of being an innovator on firm productivity in Taiwan. Using a panel of 48794 firms observed over the 1997-2003 period, and distributed across 23 in...
Chia-Lin Chang, Stéphane Robin
78
Voted
CN
2004
109views more  CN 2004»
14 years 9 months ago
Modeling correlations in web traces and implications for designing replacement policies
A number of web cache-related algorithms, such as replacement and prefetching policies, rely on specific characteristics present in the sequence of requests for efficient performa...
Konstantinos Psounis, An Zhu, Balaji Prabhakar, Ra...
ICCS
2009
Springer
15 years 4 months ago
Access Policy Design Supported by FCA Methods
Role Based Access Control (RBAC) is a methodology for providing users in an IT system specific permissions like write or read to t abstracts from specific users and binds permiss...
Frithjof Dau, Martin Knechtel