Sciweavers

1281 search results - page 181 / 257
» Isolated Features Detection in Feature Models
Sort
View
ASPLOS
2006
ACM
15 years 6 months ago
Geiger: monitoring the buffer cache in a virtual machine environment
Virtualization is increasingly being used to address server management and administration issues like flexible resource allocation, service isolation and workload migration. In a...
Stephen T. Jones, Andrea C. Arpaci-Dusseau, Remzi ...
DSOM
2000
Springer
15 years 5 months ago
A Scalable Architecture for Monitoring and Visualizing Multicast Statistics
An understanding of certain network functions is critical for successful network management. Managers must have insight into network topology, protocol performance and fault detec...
Prashant Rajvaidya, Kevin C. Almeroth, Kimberly C....
LCTRTS
2000
Springer
15 years 4 months ago
Approximation of Worst-Case Execution Time for Preemptive Multitasking Systems
The control system of many complex mechatronic products requires for each task the Worst Case Execution Time (WCET), which is needed for the scheduler's admission tests and su...
Matteo Corti, Roberto Brega, Thomas R. Gross
99
Voted
BMCBI
2007
111views more  BMCBI 2007»
15 years 22 days ago
Modular co-evolution of metabolic networks
Background: The architecture of biological networks has been reported to exhibit high level of modularity, and to some extent, topological modules of networks overlap with known f...
Jing Zhao, Guohui Ding, Lin Tao, Hong Yu, Zhong-Ha...
99
Voted
KDD
2010
ACM
304views Data Mining» more  KDD 2010»
14 years 11 months ago
Automatic malware categorization using cluster ensemble
Malware categorization is an important problem in malware analysis and has attracted a lot of attention of computer security researchers and anti-malware industry recently. Todayâ...
Yanfang Ye, Tao Li, Yong Chen, Qingshan Jiang