Sciweavers

4511 search results - page 751 / 903
» Observation Based System Security
Sort
View
PLDI
2010
ACM
15 years 2 months ago
Detecting Inefficiently-Used Containers to Avoid Bloat
Runtime bloat degrades significantly the performance and scalability of software systems. An important source of bloat is the inefficient use of containers. It is expensive to cre...
Guoqing Xu, Atanas Rountev
SIGMETRICS
2010
ACM
195views Hardware» more  SIGMETRICS 2010»
15 years 2 months ago
CWS: a model-driven scheduling policy for correlated workloads
We define CWS, a non-preemptive scheduling policy for workloads with correlated job sizes. CWS tackles the scheduling problem by inferring the expected sizes of upcoming jobs bas...
Giuliano Casale, Ningfang Mi, Evgenia Smirni
143
Voted
IHI
2012
353views Healthcare» more  IHI 2012»
13 years 5 months ago
Enhancing accountability of electronic health record usage via patient-centric monitoring
Electronic Health Record (EHR) and Personal Health Record (PHR) systems could allow patients to better manage their health information and share it to enhance the quality and effi...
Daisuke Mashima, Mustaque Ahamad
165
Voted
ICDE
2005
IEEE
120views Database» more  ICDE 2005»
15 years 11 months ago
Asymmetric Batch Incremental View Maintenance
Incremental view maintenance has found a growing number of applications recently, including data warehousing, continuous query processing, publish/subscribe systems, etc. Batch pr...
Hai Yu, Hao He, Jun Yang 0001, Junyi Xie
ATAL
2006
Springer
15 years 2 months ago
A utility-based sensing and communication model for a glacial sensor network
This paper reports on the development of a utility-based mechanism for managing sensing and communication in cooperative multi-sensor networks. The specific application considered...
Paritosh Padhy, Rajdeep K. Dash, Kirk Martinez, Ni...