Sciweavers

1548 search results - page 239 / 310
» Estimating Software Vulnerabilities
Sort
View
EUROSYS
2009
ACM
15 years 8 months ago
Predicting replicated database scalability from standalone database profiling
This paper develops analytical models to predict the throughput and the response time of a replicated database using measurements of the workload on a standalone database. These m...
Sameh Elnikety, Steven G. Dropsho, Emmanuel Cecche...
EUROSYS
2006
ACM
15 years 8 months ago
Balancing power consumption in multiprocessor systems
Actions usually taken to prevent processors from overheating, such as decreasing the frequency or stopping the execution flow, also degrade performance. Multiprocessor systems, h...
Andreas Merkel, Frank Bellosa
ICCD
2006
IEEE
115views Hardware» more  ICCD 2006»
15 years 8 months ago
Long-term Performance Bottleneck Analysis and Prediction
— Identifying performance bottlenecks is important for microarchitects and application developers to produce high performance microprocessor designs and application software. Man...
Fei Gao, Suleyman Sair
IUI
2009
ACM
15 years 8 months ago
Tagsplanations: explaining recommendations using tags
While recommender systems tell users what items they might like, explanations of recommendations reveal why they might like them. Explanations provide many benefits, from improvi...
Jesse Vig, Shilad Sen, John Riedl
ICSE
2009
IEEE-ACM
15 years 6 months ago
Improving quality, one process change at a time
We report on one organization's experience making process changes in a suite of projects. The changes were motivated by clients’ requests for better time estimates, better ...
Caryna Pinheiro, Frank Maurer, Jonathan Sillito