Sciweavers

3639 search results - page 128 / 728
» Provenance as Dependency Analysis
Sort
View
APLAS
2009
ACM
15 years 4 months ago
Large Spurious Cycle in Global Static Analyses and Its Algorithmic Mitigation
We present a simple algorithmic extension of the classical call-strings approach to mitigate substantial performance degradation caused by spurious interprocedural cycles. Spuriou...
Hakjoo Oh
ISCAPDCS
2003
14 years 11 months ago
Performance Monitoring of N-tier Client/Server Systems
Despite the widespread deployment of client/server technology, there seem to be no tools currently available that are adequate for analyzing and tuning the performance of client/s...
Christoph Steigner, Jürgen Wilke
IWPSE
2007
IEEE
15 years 4 months ago
Using concept analysis to detect co-change patterns
Software systems need to change over time to cope with new requirements, and due to design decisions, the changes happen to crosscut the system’s structure. Understanding how ch...
Tudor Gîrba, Stéphane Ducasse, Adrian...
DSN
2002
IEEE
15 years 2 months ago
Reliability and Availability Analysis for the JPL Remote Exploration and Experimentation System
The NASA Remote Exploration and Experimentation (REE) Project, managed by the Jet Propulsion Laboratory, has the vision of bringing commercial supercomputing technology into space...
Dong Chen, Selvamuthu Dharmaraja, Dongyan Chen, Le...
ACSAC
1999
IEEE
15 years 2 months ago
Security Relevancy Analysis on the Registry of Windows NT 4.0
Many security breaches are caused by inappropriate inputs crafted by people with malicious intents. To enhance the system security, we need either to ensure that inappropriate inp...
Wenliang Du, Praerit Garg, Aditya P. Mathur