[KNYGA][B] Performance by design: computer capacity planning by example
DA Menasce, VAF Almeida, L Dowdy - 2004 - books.google.com
Computing systems must meet increasingly strict Quality of Service (QoS) requirements for
performance, availability, security, and maintainability. To achieve these goals, designers …
performance, availability, security, and maintainability. To achieve these goals, designers …
Computer virus propagation models
The availability of reliable models of computer virus propagation would prove useful in a
number of ways, in order both to predict future threats, and to develop new containment …
number of ways, in order both to predict future threats, and to develop new containment …
Characterizing a spam traffic
The rapid increase in the volume of unsolicited commercial e-mails, also known as spam, is
beginning to take its toll in system administrators, business corporations and end-users …
beginning to take its toll in system administrators, business corporations and end-users …
[PDF][PDF] On the Evolution of Wikipedia.
A recent phenomenon on the Web is the emergence and proliferation of new social media
systems allowing social interaction between people. One of the most popular of these …
systems allowing social interaction between people. One of the most popular of these …
Modelling email traffic workloads with RNN and LSTM models
Abstract Analysis of time series data has been a challenging research subject for decades.
Email traffic has recently been modelled as a time series function using a Recurrent Neural …
Email traffic has recently been modelled as a time series function using a Recurrent Neural …
Continuous validation of performance test workloads
The rise of large-scale software systems poses many new challenges for the software
performance engineering field. Failures in these systems are often associated with …
performance engineering field. Failures in these systems are often associated with …
Performance modeling and tuning of an unstructured mesh CFD application
This paper describes performance tuning experiences with a three-dimensional
unstructured grid Euler flow code from NASA, which we have reimplemented in the PETSc …
unstructured grid Euler flow code from NASA, which we have reimplemented in the PETSc …
An industrial case study of customizing operational profiles using log compression
Large customers commonly request on-site capacity testing before upgrading to a new
version of a mission critical telecom application. Customers fear that the new version cannot …
version of a mission critical telecom application. Customers fear that the new version cannot …
Workload models of spam and legitimate e-mails
This article presents an extensive characterization of a spam-infected e-mail workload. The
study aims at identifying and quantifying the characteristics that significantly distinguish …
study aims at identifying and quantifying the characteristics that significantly distinguish …
Continuous validation of load test suites
Ultra-Large-Scale (ULS) systems face continuously evolving field workloads in terms of
activated/disabled feature sets, varying usage patterns and changing deployment …
activated/disabled feature sets, varying usage patterns and changing deployment …