IEEE Transactions on Software Engineering - Special issue on computer security and privacy
Adaptive algorithms for managing a distributed data processing workload
IBM Systems Journal
Data mining: practical machine learning tools and techniques with Java implementations
Data mining: practical machine learning tools and techniques with Java implementations
A survey of customizability in operating systems research
ACM Computing Surveys (CSUR)
Host load prediction using linear models
Cluster Computing
Experiences with predicting resource performance on-line in computational grid settings
ACM SIGMETRICS Performance Evaluation Review
Predictive algorithms in the management of computer systems
IBM Systems Journal
Insights into providing dynamic adaptation of operating system policies
ACM SIGOPS Operating Systems Review
Automatic Adaptation and Analysis of SIP Headers Using Decision Trees
Principles, Systems and Applications of IP Telecommunications. Services and Security for Next Generation Networks
Data mining and model trees study on GDP and its influence factors
AIASABEBI'11 Proceedings of the 11th WSEAS international conference on Applied informatics and communications, and Proceedings of the 4th WSEAS International conference on Biomedical electronics and biomedical informatics, and Proceedings of the international conference on Computational engineering in systems applications
Hi-index | 0.00 |
Continuous numeric prediction techniques known as model trees which build decision trees and then use linear regression at the terminal nodes are used to characterize resource consumption in a computer system. An advantage of model trees over time series and other traditional statistical models is the ability to add background knowledge to the model. Models are built using production data from several banks in collaboration with domain experts at those institutions. A demonstration of improving the models by adding background expert knowledge is given. An example of using model predictions to allow adaptive elements of an operating system to become more self-managing with respect to memory usage is also presented. Comparisons with other predictive techniques are made and advantages and disadvantages of using this technique in the operating system are discussed.