Sciweavers

1760 search results - page 279 / 352
» The Focus of Requirements Engineering in Workflow Applicatio...
Sort
View
LISA
2003
14 years 11 months ago
Using Service Grammar to Diagnose BGP Configuration Errors
Often network components work correctly, yet end-to-end services don’t. This happens if configuration parameters of components are set to incorrect values. Configuration is a fu...
Xiaohu Qie, Sanjai Narain
KDD
2002
ACM
112views Data Mining» more  KDD 2002»
15 years 10 months ago
From run-time behavior to usage scenarios: an interaction-pattern mining approach
A key challenge facing IT organizations today is their evolution towards adopting e-business practices that gives rise to the need for reengineering their underlying software syst...
Mohammad El-Ramly, Eleni Stroulia, Paul G. Sorenso...
LCTRTS
2004
Springer
15 years 3 months ago
A trace-based binary compilation framework for energy-aware computing
Energy-aware compilers are becoming increasingly important for embedded systems due to the need to meet conflicting constraints on time, code size and power consumption. We intro...
Lian Li 0002, Jingling Xue
ISSTA
2009
ACM
15 years 4 months ago
Identifying bug signatures using discriminative graph mining
Bug localization has attracted a lot of attention recently. Most existing methods focus on pinpointing a single statement or function call which is very likely to contain bugs. Al...
Hong Cheng, David Lo, Yang Zhou, Xiaoyin Wang, Xif...
SMC
2007
IEEE
125views Control Systems» more  SMC 2007»
15 years 4 months ago
Scaling with digital connection: Services innovation
—Digitization of production factors, including the knowledge for knowledge workers and consumers, opens almost infinite potential to connect persons, systems, processes, enterpri...
Cheng Hsu