Sciweavers

3104 search results - page 401 / 621
» Using quantitative analysis to implement autonomic IT system...
Sort
View
IQ
2007
15 years 6 months ago
Assessing Information Quality In A RFID-Integrated Shelf Replenishment Decision Support System For The Retail Industry
: Motivated by the problem of out-of-shelf (OOS) in retail industry and the emergence of RFID (Radio Frequency Identification) technology, this paper investigates the impact that t...
Cleopatra Bardaki, Katerina Pramatari
WSC
1998
15 years 6 months ago
Applying Temporal Databases to HLA Data Collection and Analysis
The High Level Architecture (HLA) for distributed simulations was proposed by the Defense Modeling and Simulation Office of the Department of Defense (DOD) in order to support int...
Thom McLean, Leo Mark, Margaret L. Loper, David Ro...
PPOPP
2009
ACM
16 years 5 months ago
Effective performance measurement and analysis of multithreaded applications
Understanding why the performance of a multithreaded program does not improve linearly with the number of cores in a sharedmemory node populated with one or more multicore process...
Nathan R. Tallent, John M. Mellor-Crummey
WORM
2003
15 years 6 months ago
Worm propagation modeling and analysis under dynamic quarantine defense
Due to the fast spreading nature and great damage of Internet worms, it is necessary to implement automatic mitigation, such as dynamic quarantine, on computer networks. Enlighten...
Cliff Changchun Zou, Weibo Gong, Donald F. Towsley
ECOOP
2005
Springer
15 years 10 months ago
Interprocedural Analysis for Privileged Code Placement and Tainted Variable Detection
In Java 2 and Microsoft .NET Common Language Runtime (CLR), trusted code has often been programmed to perform accessrestricted operations not explicitly requested by its untrusted ...
Marco Pistoia, Robert J. Flynn, Larry Koved, Vugra...