Sciweavers

1012 search results - page 175 / 203
» Identification of System Software Components Using Clusterin...
Sort
View
WWW
2005
ACM
16 years 3 months ago
Cataclysm: policing extreme overloads in internet applications
In this paper we present the Cataclysm server platform for handling extreme overloads in hosted Internet applications. The primary contribution of our work is to develop a low ove...
Bhuvan Urgaonkar, Prashant J. Shenoy
SEFM
2007
IEEE
15 years 8 months ago
Model-driven architecture for cancer research
It is a common phenomenon for research projects to collect and analyse valuable data using ad-hoc information systems. These costly-to-build systems are often composed of incompat...
Radu Calinescu, Steve Harris, Jeremy Gibbons, Jim ...
BPM
2007
Springer
124views Business» more  BPM 2007»
15 years 6 months ago
SAP WebFlow Made Configurable: Unifying Workflow Templates into a Configurable Model
To facilitate the implementation of workflows, enterprise and workflow system vendors typically provide sets of workflow templates for their software. Each of these templates depic...
Florian Gottschalk, Wil M. P. van der Aalst, Moniq...
CCGRID
2007
IEEE
15 years 8 months ago
Integrated Data Reorganization and Disk Mapping for Reducing Disk Energy Consumption
Increasing power consumption of high-performance systems leads to reliability, survivability, and cooling related problems. Motivated by this observation, several recent efforts f...
Seung Woo Son, Mahmut T. Kandemir
TSE
2010
230views more  TSE 2010»
14 years 9 months ago
Vulnerability Discovery with Attack Injection
The increasing reliance put on networked computer systems demands higher levels of dependability. This is even more relevant as new threats and forms of attack are constantly being...
João Antunes, Nuno Ferreira Neves, Miguel C...