Sciweavers

3104 search results - page 549 / 621
» Using quantitative analysis to implement autonomic IT system...
Sort
View
103
Voted
INFOCOM
2010
IEEE
15 years 2 months ago
Topological Properties Affect the Power of Network Coding in Decentralized Broadcast
—There exists a certain level of ambiguity regarding whether network coding can further improve download performance in P2P content distribution systems, as compared to commonly ...
Di Niu, Baochun Li
117
Voted
PVLDB
2010
150views more  PVLDB 2010»
15 years 2 months ago
DataGarage: Warehousing Massive Performance Data on Commodity Servers
Contemporary datacenters house tens of thousands of servers. The servers are closely monitored for operating conditions and utilizations by collecting their performance data (e.g....
Charles Loboz, Slawek Smyl, Suman Nath
154
Voted
SEKE
2010
Springer
15 years 2 months ago
A String Constraint Solver for Detecting Web Application Vulnerability
Given the bytecode of a software system, is it possible to automatically generate attack signatures that reveal its vulnerabilities? A natural solution would be symbolically execu...
Xiang Fu, Chung-Chih Li
130
Voted
CDC
2010
IEEE
164views Control Systems» more  CDC 2010»
14 years 10 months ago
Accuracy and decision time for a class of sequential decision aggregation rules
Abstract-- This work focuses on decentralized decision making in a population of individuals each implementing the sequential probability ratio test. The individual decisions are c...
Sandra H. Dandach, Ruggero Carli, Francesco Bullo
132
Voted
DAC
2003
ACM
15 years 9 months ago
Determining appropriate precisions for signals in fixed-point IIR filters
This paper presents an analytical framework for the implementation of digital infinite impulse response filters in fixed-point hardware on field programmable gate arrays. This ana...
Joan Carletta, Robert J. Veillette, Frederick W. K...