Go home now Header Background Image
Search
Submission Procedure
share: |
 
Follow us
 
 
 
 
Articles by Topics
Topic C. - Computer Systems Organization
Topic C.4 - PERFORMANCE OF SYSTEMS

L. Borzemski:
Internet Path Behavior Prediction via Data Mining: Conceptual Framework and Case Study
/jucs_13_2/internet_path_behavior_prediction
page 287 - 316
Vol.13 / Issue 2
R. Bucki, P. Suchanek:
The Method of Logistic Optimization in E-commerce
/jucs_18_10/the_method_of_logistic
page 1238 - 1258
Vol.18 / Issue 10
C. Campo, F. Almenárez, D. Díaz, C. García-Rubio, A.M. López:
Secure Service Discovery based on Trust Management for ad-hoc Networks
/jucs_12_3/secure_service_discovery_based
page 340 - 356
Vol.12 / Issue 3
D. Collange, J.-L. Costeux:
Passive Estimation of Quality of Experience
/jucs_14_5/passive_estimation_of_quality
page 625 - 641
Vol.14 / Issue 5
M. Di Santo, F. Frattolillo:
Time Costs in Actor Computations
/jucs_11_6/time_costs_in_actor
page 850 - 873
Vol.11 / Issue 6
J. Fernández-Pérez, F.J. Sánchez-Fernández, R. Carmona-Galán:
Performance Evaluation and Limitations of a Vision System on a Reconfigurable/Programmable Chip
/jucs_13_3/performance_evaluation_and_limitations
page 440 - 453
Vol.13 / Issue 3
A.E. Garcia, K.D. Hackbarth:
Approximation to a Behavioral Model for Estimating Traffic Aggregation Scenarios
/jucs_14_5/approximation_to_a_behavioral
page 731 - 744
Vol.14 / Issue 5
J.M. Gimenez-Guzman, M.J. Domenech-Benlloch, V. Pla, V. Casares-Giner, J. Martinez-Bauset:
Guaranteeing Seamless Mobility with User Redials and Automatic Handover Retrials
/jucs_14_10/guaranteeing_seamless_mobility_with
page 1597 - 1624
Vol.14 / Issue 10
K. Gopinath, M.K. Narasinhan:
Performance of Switch Blocking on Multithreaded Architectures
/jucs_6_10/performance_of_switch_blocking
page 928 - 947
Vol.6 / Issue 10
J.M. Granado-Criado, M.A. Vega-Rodríguez, J.M. Sánchez-Pérez, J.A. Gómez-Pulido:
A Dynamically and Partially Reconfigurable Implementation of the IDEA Algorithm Using FPGAs and Handel-C
/jucs_13_3/a_dynamically_and_partially
page 407 - 418
Vol.13 / Issue 3
F. C. Gärtner:
Transformational Approaches to the Specification and Verification of Fault-Tolerant Systems: Formal Background and Classification
/jucs_5_10/transformational_approaches_to_the
page 668 - 692
Vol.5 / Issue 10
Y.H. Ho, A.H. Ho, K.A. Hua, F. Xie:
Cooperation Enforcement in a Highly Dynamic Mobile Ad Hoc Network
/jucs_15_5/cooperation_enforcement_in_a
page 1090 - 1118
Vol.15 / Issue 5
A. Klauser, R. Posch:
Distributed Caching in Networked File Systems
/jucs_1_6/distributed_caching_in_networked
page 399 - 409
Vol.1 / Issue 6
D. Król, A. Lupa:
Agent Migration: Framework for Analysis
/jucs_15_4/agent_migration_framework_for
page 941 - 966
Vol.15 / Issue 4
D. Król, M. Zelmozer:
Structural Performance Evaluation of Multi-Agent Systems
/jucs_14_7/structural_performance_evaluation_of
page 1154 - 1178
Vol.14 / Issue 7
Y.J. Na, S. Abdullaev, F.I.S. Ko:
An Optimization of CDN Using Efficient Load Distribution and RADS Caching Algorithm
/jucs_14_14/an_optimization_of_cdn
page 2329 - 2342
Vol.14 / Issue 14
M. Naldi, G. D'Acquisto:
A Normal Copula Model for the Economic Risk Analysis of Correlated Failures in Communications Networks
/jucs_14_5/a_normal_copula_model
page 786 - 799
Vol.14 / Issue 5
T. Peng, Q. Zheng, Y. Jin:
Transmission Latency based Network Friendly Tree for Peer-to-Peer Streaming
/jucs_15_9/transmission_latency_based_network
page 2011 - 2025
Vol.15 / Issue 9
M. Rady:
Generating an Excerpt of a Service Level Agreement from a Formal Definition of Non-Functional Aspects Using OWL
/jucs_20_3/generating_an_excerpt_of
page 366 - 384
Vol.20 / Issue 3
G. Rodríguez, M.J. Martín, P. González, J. Touriño:
A Heuristic Approach for the Automatic Insertion of Checkpoints in Message-Passing Codes
/jucs_15_14/a_heuristic_approach_for
page 2894 - 2911
Vol.15 / Issue 14
A. Schröpfer, F. Kerschbaum, C. Schütz, R. Pibernik:
Optimizations for Risk-Aware Secure Supply Chain Master Planning
/jucs_15_15/optimizations_for_risk_aware
page 3019 - 3037
Vol.15 / Issue 15
M. Stein, A. Geyer-Schulz:
A Comparison of Five Programming Languages in a Graph Clustering Scenario
/jucs_19_3/a_comparison_of_five
page 428 - 456
Vol.19 / Issue 3
M.B. Yassein, Y. Khamayseh, M. AbuJazoh:
Feature Selection for Black Hole Attacks
/jucs_22_4/feature_selection_for_black
page 521 - 536
Vol.22 / Issue 4
H. P. Zima:
Data Distribution Specification for High Performance Computing
/jucs_7_8/data_distribution_specification_for
page 736 - 753
Vol.7 / Issue 8
A. Faustino da Silva, V. Santos Costa:
An Experimental Evaluation of JAVA JIT Technology
/jucs_11_7/an_experimental_evaluation_of
page 1291 - 1309
Vol.11 / Issue 7
A.F. da Silva, V.S. Costa:
The Design of the YAP Compiler: An Optimizing Compiler for Logic Programming Languages
/jucs_12_7/the_design_of_the
page 764 - 787
Vol.12 / Issue 7
A.F. da Silva, V.S. Costa:
Our Experiences with Optimizations in Sun's Java Just-In-Time Compilers
/jucs_12_7/our_experiences_with_optimizations
page 788 - 810
Vol.12 / Issue 7