Filters








66,255 Hits in 7.7 sec

Measuring Database Performance in Online Services: A Trace-Based Approach [chapter]

Swaroop Kavalanekar, Dushyanth Narayanan, Sriram Sankar, Eno Thereska, Kushagra Vaid, Bruce Worthington
2009 Lecture Notes in Computer Science  
In this paper we analyze disk I/O traces from production servers in four internet services as well as servers running TPC benchmarks.  ...  Online services also show significant diurnal patterns in load that can be exploited for energy savings or consolidation.  ...  In previous research [2, 3, 4] , we have also seen that a trace-based approach allows evaluation of system designs and performance metrics that benchmarks alone do not allow.  ... 
doi:10.1007/978-3-642-10424-4_10 fatcat:c3dl2l3wtbektob7rldwq7xyey

Identifying Learner's Engagement in Learning Games - A Qualitative Approach based on Learner's Traces of Interaction
english

Patrice Bouvier, Élise Lavoué, Karim Sehaba, Sébastien George
2013 Proceedings of the 5th International Conference on Computer Supported Education  
This paper proposes a qualitative approach for identifying learners' engagement from their traces of interactions performed in the learning game.  ...  By relying on traces of interactions, this approach enables to identify engaged-behaviours in low-constraint interactive games, directly, continuously, under ecological conditions and over a long time  ...  Funding for this project was provided by a grant from la Région Rhône Alpes and le Grand  ... 
doi:10.5220/0004386903390350 dblp:conf/csedu/BouvierLSG13 fatcat:btcqigvkwjbxpbl7f2y35fcwaq

A trace-based approach to identifying users' engagement and qualifying their engaged-behaviours in interactive systems: application to a social game

Patrice Bouvier, Karim Sehaba, Élise Lavoué
2014 User modeling and user-adapted interaction  
We also conducted a user study based on a validation of our results by experts. The high prediction rate obtained confirms the performance of our approach.  ...  The basis of our approach is to transform low-level traces of interaction into meaningful information represented in higher-level traces.  ...  Funding for this project was provided by a grant from la Région Rhône Alpes and Le Grand Lyon. The QUEJANT project was labelled by the french competitiveness cluster Imaginove.  ... 
doi:10.1007/s11257-014-9150-2 fatcat:m3juejc2v5gqto3vjbicmy2cfu

Profile-Driven Component Placement for Cluster-Based Online Services

C. Stewart, Kai Shen, S. Dwarkadas, M.L. Scott, Jian Yin
2004 IEEE Distributed Systems Online  
As far as we know, our approach is the only one that employs a parameterization based on input workload characteristics for cluster-based online services.  ...  Our goal is to develop the software infrastructure needed for efficient dynamic component placement in cluster-based online services.  ...  Marcos Aguilera and his colleagues propose performance debugging for multicomponent online applications based on message traces. 8 They analyze intercomponent causal message paths and then derive the  ... 
doi:10.1109/mdso.2004.27 fatcat:7fxxywkm7vbozln3gmmuje7ebm

VAM-aaS: Online Cloud Services Security Vulnerability Analysis and Mitigation-as-a-Service [chapter]

Mohamed Almorsy, John Grundy, Amani S. Ibrahim
2012 Lecture Notes in Computer Science  
Our approach is based on a new vulnerability signature and mitigation-actions specification approach.  ...  VAM-aaS performs online service analysis to pinpoint new vulnerabilities and weaknesses.  ...  Summary We described a new integrated, automated online vulnerability analysis and mitigation solution as a service (VAM-aaS).  ... 
doi:10.1007/978-3-642-35063-4_30 fatcat:wnnxfyewyveahdcbjfdeaglane

Tisa: Toward Trustworthy Services in a Service-Oriented Architecture

Hridesh Rajan, Mahantesh Hosamani
2008 IEEE Transactions on Services Computing  
We describe an approach, based on hardware-based root of trust, for verifying the integrity of a requirements monitor executing in an untrusted environment.  ...  Verifying whether a service implementation is conforming to its service-level agreements is important to inspire confidence in services in a service-oriented architecture (SoA).  ...  This material is based upon work supported in part by the National Science Foundation under Grants CNS-05-40362, CNS-06-27354 and CNS-07-09217.  ... 
doi:10.1109/tsc.2008.18 fatcat:53uonbgrezhhbi74set2444bwi

Multi-user utility pattern based cloud service negotiation for quality of service improvement: an implicit interest prediction approach

Mohan Manoharan, Selvarajan Saraswathi
2017 International Journal of Intelligent Enterprise  
To solve the issue of service negotiation, a multi-user utility pattern based service negotiation approach is discussed in this paper.  ...  The method monitors the service negotiation values and keeps track of services accessed by different cloud user. It also maintains a trace of sequence of service access based on user's interest.  ...  The completeness measure has been computed based on the logs available in the service access trace.  ... 
doi:10.1504/ijie.2017.087003 fatcat:mxfm2t7ynnbaplucukqq2ueprq

Web Services Navigator: Visualizing the execution of Web Services

W. De Pauw, M. Lei, E. Pring, L. Villard, M. Arnold, J. F. Morar
2005 IBM Systems Journal  
In this paper, we describe Web Services Navigator, a visualization tool that fosters better understanding of serviceoriented architecture (SOA) applications.  ...  We draw on our experience with real SOA applications to show how this tool has been applied to practical problems ranging from business logic misunderstandings to performance bottlenecks to syntax and  ...  positives and negatives'' inherent in a heuristic approach.  ... 
doi:10.1147/sj.444.0821 fatcat:7nn35ve3kbasvfl4oqf3y4nuwu

Digital (Library Services) and (Digital Library) Services

Jeffrey Pomerantz
2008 Journal of Digital Information  
Services, regardless of the environment in which they are provided, break down into services performed on materials (technical services) and services provided to individual users and communities of users  ...  Both traditional and new services are discussed as a means for exploring the question of what a library service is. Value is proposed as the concept unifying all library services.  ...  System-focused Services The system-focused approach to services for DLs may be traced at least as far back in time as a paper by Kahn & Wilensky (1995) in which they describe an infrastructure for digital  ... 
dblp:journals/jodi/Pomerantz08 fatcat:kphw7mmex5doll5dt4b2azkiba

Becoming responsive to service usage and performance changes by applying service feedback metrics to software maintenance

Henk van der Schuur, Slinger Jansen, Sjaak Brinkkemper
2008 2008 23rd IEEE/ACM International Conference on Automated Software Engineering - Workshops  
This approach enables software vendors to respond quickly to performance and usage changes in their service software, both at specific customers and concerning the service software in general.  ...  In this paper we present a metrics-based approach that is used by software vendors to create real-time usage reports, based on data gathered by leveraging aspect-oriented programming techniques.  ...  In this paper we introduce Service Knowledge Utilization (SKU) as an approach to increase a software vendor's flexibility, and responsiveness to changes in the performance and usage of its service-based  ... 
doi:10.1109/asew.2008.4686321 dblp:conf/kbse/SchuurJB08 fatcat:sj5zvlz3gvehxp6bx7ca47lqna

Consideration of Service Time in Placing Clients of Web-Based Services

Wei Zhang, C. E. Wills
2011 2011 IEEE Global Telecommunications Conference - GLOBECOM 2011  
Our results show that in the best case our simple policies have better performance than using current DNS decisions, while in the worst case they provide comparable performance for a range of performance  ...  Web-based services involving dynamic computation of the content are increasingly used on the Web.  ...  Hence, fulfillment of a Web service may require remote database queries to be performed.  ... 
doi:10.1109/glocom.2011.6133763 dblp:conf/globecom/0024W11 fatcat:4tbrnksoy5dobjfnbes6n55xzm

Domain-Specific Service Selection for Composite Services

Oliver Moser, Florian Rosenberg, Schahram Dustdar
2012 IEEE Transactions on Software Engineering  
Our approach is implemented on top of an existing WS-BPEL engine. We demonstrate its feasibility by implementing a case study from the telecommunication domain.  ...  To this end, we leverage quality of service (QoS) as a means to specify rigid dependability requirements.  ...  This is a common approach to increase service performance and dependability in real-world applications.  ... 
doi:10.1109/tse.2011.43 fatcat:pnqcds5ev5bkdjqwngtrkec3im

Cluster-based scalable network services

Armando Fox, Steven D. Gribble, Yatin Chawathe, Eric A. Brewer, Paul Gauthier
1997 Proceedings of the sixteenth ACM symposium on Operating systems principles - SOSP '97  
We present detailed measurements of TranSend's performance based on substantial client traces, as well as anecdotal evidence from the TranSend and HotBot experience, to support the claims made for the  ...  To this end, we propose a general, layered architecture for building cluster-based scalable network services that encapsulates the above requirements for reuse, and a service-programming model based on  ...  Using extensive client traces, we conducted detailed performance measurements of TranSend.  ... 
doi:10.1145/268998.266662 dblp:conf/sosp/FoxGCB97 fatcat:ss5mj646jjefbpzcn74zo5yfku

Cluster-based scalable network services

Armando Fox, Steven D. Gribble, Yatin Chawathe, Eric A. Brewer, Paul Gauthier
1997 ACM SIGOPS Operating Systems Review  
We present detailed measurements of TranSend's performance based on substantial client traces, as well as anecdotal evidence from the TranSend and HotBot experience, to support the claims made for the  ...  To this end, we propose a general, layered architecture for building cluster-based scalable network services that encapsulates the above requirements for reuse, and a service-programming model based on  ...  In particular, we do not believe it will work well for write-intensive services where the writes carry hard state or where strong consistency is desired, such as commerce servers, file systems, or online  ... 
doi:10.1145/269005.266662 fatcat:7age3yn3ofcudjii3k5sfblmsu

PowerTracer: Tracing requests in multi-tier services to save cluster power consumption [article]

Lin Yuan, Jianfeng Zhan, Bo Sang, Lei Wang, Haining Wang
2010 arXiv   pre-print
To achieve this goal, we propose a request tracing approach that online classifies the major causal path patterns of a multi-tier service and monitors their performance data as a guide for accurate DVFS  ...  Based on the request tracing approach, we present a hybrid DVFS control system that combines an empirical performance model for fast modulation at different load levels and a simpler feedback controller  ...  Then, we present design details in online request tracing, performance profiling, and controller, respectively. A.  ... 
arXiv:1007.4890v2 fatcat:litewsuddva2ll7v5c5tnpldfe
« Previous Showing results 1 — 15 out of 66,255 results