Sciweavers

558 search results - page 8 / 112
» Safe and Effective Determinant Evaluation
Sort
View
ICAC
2009
IEEE
15 years 6 months ago
Ranking the importance of alerts for problem determination in large computer systems
The complexity of large computer systems has raised unprecedented challenges for system management. In practice, operators often collect large volume of monitoring data from system...
Guofei Jiang, Haifeng Chen, Kenji Yoshihira, Akhil...
BMCBI
2008
110views more  BMCBI 2008»
14 years 12 months ago
Determining significance of pairwise co-occurrences of events in bursty sequences
Background: Event sequences where different types of events often occur close together arise, e.g., when studying potential transcription factor binding sites (TFBS, events) of ce...
Niina Haiminen, Heikki Mannila, Evimaria Terzi
IJISEC
2006
106views more  IJISEC 2006»
14 years 11 months ago
Execution transactions for defending against software failures: use and evaluation
We examine the problem of containing buffer overflow attacks in a safe and efficient manner. Briefly, we automatically augment source code to dynamically catch stack and heap-based...
Stelios Sidiroglou, Angelos D. Keromytis
JFP
2010
107views more  JFP 2010»
14 years 10 months ago
Lightweight checkpointing for concurrent ML
Transient faults that arise in large-scale software systems can often be repaired by re-executing the code in which they occur. Ascribing a meaningful semantics for safe re-execut...
Lukasz Ziarek, Suresh Jagannathan
118
Voted
ECMDAFA
2010
Springer
241views Hardware» more  ECMDAFA 2010»
15 years 4 months ago
Detecting Inconsistencies in Multi-View Models with Variability
Multi-View Modeling (MVM) is a common modeling practice that advocates the use of multiple, different and yet related models to represent the needs of diverse stakeholders. Of cruc...
Roberto Erick Lopez-Herrejon, Alexander Egyed