Sciweavers

1989 search results - page 53 / 398
» cost 2010
Sort
View
WOSP
2010
ACM
15 years 6 months ago
SLA-driven planning and optimization of enterprise applications
We propose a model-based methodology to size and plan enterprise applications under Service Level Agreements (SLAs). Our approach is illustrated using a real-world Enterprise Reso...
Hui Li, Giuliano Casale, Tariq N. Ellahi
CBSE
2010
Springer
15 years 4 months ago
Restructuring Object-Oriented Applications into Component-Oriented Applications by Using Consistency with Execution Traces
Abstract. Software systems should evolve in order to respond to changing client requirements and their evolving environments. But unfortunately, the evolution of legacy application...
Simon Allier, Houari A. Sahraoui, Salah Sadou, St&...
RTAS
2010
IEEE
14 years 10 months ago
A Bandwidth Reservation Strategy for Multiprocessor Real-Time Scheduling
—The problem of scheduling a set of tasks on a multiprocessor architecture is addressed. Tasks are assumed to be sporadic with arbitrary deadlines and may migrate between process...
Ernesto Massa, George Lima
DATE
2010
IEEE
173views Hardware» more  DATE 2010»
15 years 4 months ago
Robust design of embedded systems
—This paper presents a methodology to evaluate and optimize the robustness of an embedded system in terms of invariability in case of design revisions. Early decisions in embedde...
Martin Lukasiewycz, Michael Glaß, Jürge...
CORR
2010
Springer
64views Education» more  CORR 2010»
14 years 12 months ago
Near-Optimal Evasion of Convex-Inducing Classifiers
Classifiers are often used to detect miscreant activities. We study how an adversary can efficiently query a classifier to elicit information that allows the adversary to evade de...
Blaine Nelson, Benjamin I. P. Rubinstein, Ling Hua...