Spelling suggestions: "subject:"computer system failure"" "subject:"coomputer system failure""
1 |
Modeling operating system crash behavior through multifractal analysis, long range dependence and mining of memory usage patternsGandikota, Vijai. January 2006 (has links)
Thesis (M.S.)--West Virginia University, 2006. / Title from document title page. Document formatted into pages; contains xii, 102 p. : ill. (some col.). Vita. Includes abstract. Includes bibliographical references (p. 96-99).
|
2 |
Application of adaptive probing for fault diagnosis in computer networksNatu, Maitreya. January 2008 (has links)
Thesis (Ph.D.)--University of Delaware, 2007. / Principal faculty advisor: Ardashpal S. Sethi, Dept. of Computer & Information Sciences. Includes bibliographical references.
|
3 |
Incremental development and cost-based evaluation of software fault prediction modelsJiang, Yue, January 1900 (has links)
Thesis (Ph. D.)--West Virginia University, 2009. / Title from document title page. Document formatted into pages; contains xi, 124 p. : ill. (some col.). Includes abstract. Includes bibliographical references (p. 118-124).
|
4 |
A realistic model of network survivability /Ozkok, Ozlem. January 2003 (has links) (PDF)
Thesis (M.S. in Information Technology Management and M.S. in Computer Science)--Naval Postgraduate School, September 2003. / Thesis advisor(s): Geoffrey Xie, Alex Bordetsky. Includes bibliographical references (p. 47-48). Also available online.
|
5 |
Information technology implementation what works and what does not /Statnikova, Kristina. January 2005 (has links)
Thesis (M.S. in Management of Technology)--Vanderbilt University, May 2005. / Title from title screen. Includes bibliographical references.
|
6 |
Multi-failure network restorability design in survivable transport networksAkpuh, Jude Chukwuelozonam. January 2009 (has links)
Thesis (M.Sc.)--University of Alberta, 2009. / Title from PDF file main screen (viewed on Apr. 1, 2010). "A thesis submitted to the Faculty of Graduate Studies and Research in partial fulfillment of the requirements for the degree of Master of Science in Engineering Management, [Department of] Mechanical Engineering, University of Alberta." Includes bibliographical references.
|
7 |
Assessing operational impact in enterprise systems with dependency discovery and usage miningMoss, Mark Bomi 15 July 2009 (has links)
A framework for monitoring the dependencies between users, applications, and other system components, combined with the actual access times and frequencies, was proposed. Operating system commands were used to extract event information from the end-user workstations about the dependencies between system, application and infrastructure components. Access times of system components were recorded, and data mining tools were leveraged to detect usage patterns. This information was integrated and used to predict whether or not the failure of a component would cause an operational impact during certain time periods. The framework was designed to minimize installation and management overhead, to consume minimal system resources (e.g. network bandwidth), and to be deployable on a variety of enterprise systems, including those with low-bandwidth and partial-connectivity characteristics. The framework was implemented in a test environment to demonstrate the feasibility of this approach. The system was tested on small-scale (6 computers in the GT CERCS Laboratory over 35 days) and large-scale (76 CPR nodes across the entire GT campus over 4 months) data sets. The average size of the impact topology was shown to be approximately 4% of the complete topology, and this size reduction was related to providing system administrators the capability to better identify those users and resources most likely to be affected by a designated set of component failures during a designated time period.
|
8 |
When the chips are down : attribution in the context of computer failure and repair.Quayle, Michael Frank. January 2004 (has links)
Cognitive attribution theories provide convincing and empirically robust models of attribution. However, critiques include the scarcity of empirical research in naturalistic settings and the failure of cognitive attribution theorists to account for why, when and how much people engage in attributional activity. The present study draws data from naturalistic
recordings of the common experience of computer failure and repair. A simple content analysis explores the extent to which everyday attributional talk is modelled by the cognitive theories of attribution. It is found that everyday talk matches the cognitive theories of attribution reasonably well for socially safe operative information about the problem, but poorly for socially unsafe inspective information about the agents and their actions. The second part of the analysis makes sense of this empirical pattern by using conversation and discourse analysis to explore the social functions of observed attributional talk. Participants use attributional talk to achieve two broad social goals: to negotiate and manage the social engagement and to construct and defend positions of competence and expertise. / Thesis (M.A.)-University of KwaZulu-Natal, Pietermaritzburg, 2004.
|
9 |
Coping with value dependency for failure recovery in multidatabase systems /Sun, Yongmei, January 1997 (has links)
Thesis (M. Sc.), Memorial University of Newfoundland, 1998. / Restricted until June 1999. Bibliography: leaves 78-83.
|
10 |
Assessing operational impact in enterprise systems with dependency discovery and usage miningMoss, Mark Bomi. January 2009 (has links)
Thesis (Ph.D)--Computing, Georgia Institute of Technology, 2010. / Committee Chair: Pu, Calton; Committee Member: Ahamad, Mustaque; Committee Member: Liu, Ling; Committee Member: Mark, Leo; Committee Member: Owen, Henry. Part of the SMARTech Electronic Thesis and Dissertation Collection.
|
Page generated in 0.0722 seconds