Sciweavers

683 search results - page 90 / 137
» Four Types of Lookback
Sort
View
DOLAP
2004
ACM
15 years 3 months ago
Developing a characterization of business intelligence workloads for sizing new database systems
Computer system sizing involves estimating the amount of hardware resources needed to support a new workload not yet deployed in a production environment. In order to determine th...
Ted J. Wasserman, Patrick Martin, David B. Skillic...
ASWSD
2004
Springer
15 years 3 months ago
On the Fault Hypothesis for a Safety-Critical Real-Time System
– A safety-critical real-time computer system must provide its services with a dependability that is much better than the dependability of any one of its constituent components. ...
Hermann Kopetz
ATAL
2004
Springer
15 years 3 months ago
An Empirical Study of the Effect of Agent Competence on User Performance and Perception
We studied the role of the competence of an interface agent that helped users to learn and use a text editor. Participants in the study made a set of changes to a document with th...
Jun Xiao, John T. Stasko, Richard Catrambone
DSN
2003
IEEE
15 years 3 months ago
Characterization of Linux Kernel Behavior under Errors
This paper describes an experimental study of Linux kernel behavior in the presence of errors that impact the instruction stream of the kernel code. Extensive error injection exper...
Weining Gu, Zbigniew Kalbarczyk, Ravishankar K. Iy...
HICSS
2003
IEEE
125views Biometrics» more  HICSS 2003»
15 years 3 months ago
A Marketing Model for Mobile Wireless Services
: 1 Invaluable feedback from HIICS referees is gratefully acknowledged. Mobile data services integrate handheld and Internet technologies to create new value propositions (Keen and...
A. Lee Gilbert, Jon D. Kendall