enter search term and/or author name
Exploiting Service Usage Information for Optimizing Server Resource Management
Alexander Totok, Vijay Karamcheti
Article No.: 1
It is often difficult to tune the performance of modern component-based Internet services because: (1) component middleware are complex software systems that expose several independently tuned server resource management mechanisms; (2)...
There is a continuous struggle for control of resources at every organization that is connected to the Internet. The local organization wishes to use its resources to achieve strategic goals. Some external entities seek direct control of these...
Anomaly Detection in Dynamic Systems Using Weak Estimators
Justin Zhan, B. John Oommen, Johanna Crisostomo
Article No.: 3
Anomaly detection involves identifying observations that deviate from the normal behavior of a system. One of the ways to achieve this is by identifying the phenomena that characterize “normal” observations. Subsequently, based on the...
We consider the problem of XML Schema evolution. In the ever-changing context of the web, XML schemas continuously change in order to cope with the natural evolution of the entities they describe. Schema changes have important consequences. First,...