Sciweavers

1376 search results - page 97 / 276
» Monitoring Software Requirements Using Instrumented Code
Sort
View
CODES
2010
IEEE
14 years 8 months ago
Statistical approach in a system level methodology to deal with process variation
The impact of process variation in state of the art technology makes traditional (worst case) designs unnecessarily pessimistic, which translates to suboptimal designs in terms of...
Concepción Sanz Pineda, Manuel Prieto, Jos&...
AICOM
2004
105views more  AICOM 2004»
14 years 9 months ago
Using WordNet for case-based retrieval of UML models
Software complexity has increased substantially in the last decade. This has made software development teams work faster and under tight budgets. Reusing software can be a way of s...
Paulo Gomes, Francisco C. Pereira, Paulo Paiva, Nu...
SAC
2006
ACM
15 years 3 months ago
A posteriori defensive programming: an annotation toolkit for DoS-resistant component-based architectures
Denial-of-Service (DoS) attacks are a major concern for modern distributed applications. They exploit weakness in the software in order to make it unavailable to well-behaved user...
Valerio Schiavoni, Vivien Quéma
CASCON
2008
137views Education» more  CASCON 2008»
14 years 11 months ago
Automating SLA modeling
Service Level Agreements (SLAs) define the level of service that a service provider must deliver. An SLA is a contract between service provider and consumer, and includes appropri...
Tony Chau, Vinod Muthusamy, Hans-Arno Jacobsen, El...
PAM
2005
Springer
15 years 3 months ago
Applying Principles of Active Available Bandwidth Algorithms to Passive TCP Traces
Abstract. While several algorithms have been created to actively measure the end-to-end available bandwidth of a network path, they require instrumentation at both ends of the path...
Marcia Zangrilli, Bruce Lowekamp