This work presents an innovative system for analysing and predicting the runtime behaviour of object-oriented applications, with respect to the data access patterns performed over their domain objects. The analysis and predictions are performed using three alternative stochastic model implementations. The models are based on Bayesian Inference, Importance Analysis, and Markov Chains. The system deals with all the necessary modifications of the target applications under analysis in a completely automatic fashion, without it being necessary for any developer intervention. The results are validated by the execution of the TPC-W and oo7 benchmarks. The oo7 benchmark has been modelled as a stochastic process through Monte Carlo simulations. We s...
Abstract. Software developers cannot always anticipate how users will actually use their software as...
In recent times, our reliance on software and software-controlled systems has drastically increased,...
atdr05hdInternational audienceThis chapter explores the effect that changing access patterns has on ...
Most existing studies of file access prediction are experimental in nature and rely on trace driven ...
In this paper, we present a fully-automatic, high-accuracy approach to predict access to persistent ...
This thesis introduces a modelling framework, which is developed for risk and performance assessment...
Object-oriented analysis methods have been used in the computer science arena for a number of years ...
We introduce a tool-supported method for the formal analysis of timing, resource use, cost and other...
Abstract — Leveraging the power of scratchpad memories (SPMs) available in most embedded systems tod...
These days the Object-Oriented (OO) paradigm is used extensively in the development of software syst...
Current scientific applications have been producing large amounts of data. The processing, handling ...
Method materialization is a promising data access optimization technique for multiple applications, ...
Abstract. This paper presents an experiment performed on three large open source applications. The a...
Since the emergence of the object technology, organizations have accumulated a tremendous amount of ...
Software developers cannot always anticipate how users will actually use their software as it may va...
Abstract. Software developers cannot always anticipate how users will actually use their software as...
In recent times, our reliance on software and software-controlled systems has drastically increased,...
atdr05hdInternational audienceThis chapter explores the effect that changing access patterns has on ...
Most existing studies of file access prediction are experimental in nature and rely on trace driven ...
In this paper, we present a fully-automatic, high-accuracy approach to predict access to persistent ...
This thesis introduces a modelling framework, which is developed for risk and performance assessment...
Object-oriented analysis methods have been used in the computer science arena for a number of years ...
We introduce a tool-supported method for the formal analysis of timing, resource use, cost and other...
Abstract — Leveraging the power of scratchpad memories (SPMs) available in most embedded systems tod...
These days the Object-Oriented (OO) paradigm is used extensively in the development of software syst...
Current scientific applications have been producing large amounts of data. The processing, handling ...
Method materialization is a promising data access optimization technique for multiple applications, ...
Abstract. This paper presents an experiment performed on three large open source applications. The a...
Since the emergence of the object technology, organizations have accumulated a tremendous amount of ...
Software developers cannot always anticipate how users will actually use their software as it may va...
Abstract. Software developers cannot always anticipate how users will actually use their software as...
In recent times, our reliance on software and software-controlled systems has drastically increased,...
atdr05hdInternational audienceThis chapter explores the effect that changing access patterns has on ...