Sciweavers

1175 search results - page 156 / 235
» Modeling web applications reacting to user behaviors
Sort
View
ICDE
2002
IEEE
146views Database» more  ICDE 2002»
15 years 11 months ago
Data Mining Meets Performance Evaluation: Fast Algorithms for Modeling Bursty Traffic
Network, web, and disk I/O traffic are usually bursty, self-similar [9, 3, 5, 6] and therefore can not be modeled adequately with Poisson arrivals[9]. However, we do want to model...
Mengzhi Wang, Ngai Hang Chan, Spiros Papadimitriou...
EEE
2004
IEEE
15 years 1 months ago
Simulation Models and Their Metainfo-Management Using RDF-Based Paradigms
In a catalogue for computer-based models the basic problem is that complex interdependencies between models must be addressed, which are dependent on an application's domain....
Michael C. Jaeger, Moussa Lo, Robert J. Pefferly
SOSP
2003
ACM
15 years 6 months ago
Model-carrying code: a practical approach for safe execution of untrusted applications
This paper presents a new approach called model-carrying code (MCC) for safe execution of untrusted code. At the heart of MCC is the idea that untrusted code comes equipped with a...
R. Sekar, V. N. Venkatakrishnan, Samik Basu, Sande...
DAWAK
2008
Springer
14 years 11 months ago
UML-Based Modeling for What-If Analysis
In order to be able to evaluate beforehand the impact of a strategical or tactical move, decision makers need reliable previsional systems. What-if analysis satisfies this need by ...
Matteo Golfarelli, Stefano Rizzi
APSCC
2007
IEEE
15 years 4 months ago
Platform EGO Web Service Gateway
Although grid computing has adopted Web services technology to deal with platforms heterogeneity and to enhance service and application interoperability, it is still a challenge t...
Xiaohui Wei, Jishan Gao, Xiao lei Ding, Shutao Yua...