[KNYGA][B] Performance by design: computer capacity planning by example

DA Menasce, VAF Almeida, L Dowdy - 2004 - books.google.com
Computing systems must meet increasingly strict Quality of Service (QoS) requirements for
performance, availability, security, and maintainability. To achieve these goals, designers …

Computer virus propagation models

G Serazzi, S Zanero - International Workshop on Modeling, Analysis, and …, 2003 - Springer
The availability of reliable models of computer virus propagation would prove useful in a
number of ways, in order both to predict future threats, and to develop new containment …

Characterizing a spam traffic

LH Gomes, C Cazita, JM Almeida, V Almeida… - Proceedings of the 4th …, 2004 - dl.acm.org
The rapid increase in the volume of unsolicited commercial e-mails, also known as spam, is
beginning to take its toll in system administrators, business corporations and end-users …

[PDF][PDF] On the Evolution of Wikipedia.

RB Almeida, B Mozafari, J Cho - ICWSM, 2007 - Citeseer
A recent phenomenon on the Web is the emergence and proliferation of new social media
systems allowing social interaction between people. One of the most popular of these …

Modelling email traffic workloads with RNN and LSTM models

K Om, S Boukoros, A Nugaliyadde, T McGill… - … -centric Computing and …, 2020 - Springer
Abstract Analysis of time series data has been a challenging research subject for decades.
Email traffic has recently been modelled as a time series function using a Recurrent Neural …

Continuous validation of performance test workloads

MD Syer, W Shang, ZM Jiang, AE Hassan - Automated Software …, 2017 - Springer
The rise of large-scale software systems poses many new challenges for the software
performance engineering field. Failures in these systems are often associated with …

Performance modeling and tuning of an unstructured mesh CFD application

WD Gropp, DK Kaushik, DE Keyes… - SC'00: Proceedings of …, 2000 - ieeexplore.ieee.org
This paper describes performance tuning experiences with a three-dimensional
unstructured grid Euler flow code from NASA, which we have reimplemented in the PETSc …

An industrial case study of customizing operational profiles using log compression

AE Hassan, DJ Martin, P Flora, P Mansfield… - Proceedings of the 30th …, 2008 - dl.acm.org
Large customers commonly request on-site capacity testing before upgrading to a new
version of a mission critical telecom application. Customers fear that the new version cannot …

Workload models of spam and legitimate e-mails

LH Gomes, C Cazita, JM Almeida, V Almeida… - Performance …, 2007 - Elsevier
This article presents an extensive characterization of a spam-infected e-mail workload. The
study aims at identifying and quantifying the characteristics that significantly distinguish …

Continuous validation of load test suites

MD Syer, ZM Jiang, M Nagappan, AE Hassan… - Proceedings of the 5th …, 2014 - dl.acm.org
Ultra-Large-Scale (ULS) systems face continuously evolving field workloads in terms of
activated/disabled feature sets, varying usage patterns and changing deployment …