Sciweavers

1737 search results - page 327 / 348
» Using Strategy Objectives for Network Security Analysis
Sort
View
SIGMETRICS
2010
ACM
187views Hardware» more  SIGMETRICS 2010»
15 years 4 months ago
Can multipath mitigate power law delays?: effects of parallelism on tail performance
—Parallelism has often been used to improve the reliability and efficiency of a variety of different engineering systems. In this paper, we quantify the efficiency of paralleli...
Jian Tan, Wei Wei, Bo Jiang, Ness Shroff, Donald F...
CHI
2005
ACM
16 years 4 days ago
Six themes of the communicative appropriation of photographic images
In this paper, we explore the use of digital photographs in computer-mediated communication. We present Lascaux, an instant messaging client that serves as a research platform for...
Amy Voida, Elizabeth D. Mynatt
OSDI
2004
ACM
16 years 1 days ago
Correlating Instrumentation Data to System States: A Building Block for Automated Diagnosis and Control
This paper studies the use of statistical induction techniques as a basis for automated performance diagnosis and performance management. The goal of the work is to develop and ev...
Ira Cohen, Jeffrey S. Chase, Julie Symons, Mois&ea...
CODES
1999
IEEE
15 years 4 months ago
An MPEG-2 decoder case study as a driver for a system level design methodology
We present a case study on the design of a heterogeneous architecture for MPEG-2 video decoding. The primary objective of the case study is the validation of the SPADE methodology...
Pieter van der Wolf, Paul Lieverse, Mudit Goel, Da...
CIBCB
2007
IEEE
15 years 1 months ago
Optimization of Bacterial Strains with Variable-Sized Evolutionary Algorithms
—In metabolic engineering it is difficult to identify which set of genetic manipulations will result in a microbial strain that achieves a desired production goal, due to the co...
Miguel Rocha, José P. Pinto, Isabel Rocha, ...