Author:
Couceiro Maria,Romano Paolo,Rodrigues Luis
Publisher
Springer Berlin Heidelberg
Reference33 articles.
1. Andrzejak, A., Silva, L.: Using machine learning for non-intrusive modeling and prediction of software aging. In: Proc. of the Network Operations and Management Symposium (NOMS), pp. 25–32. IEEE, Salvador de Bahia, Brazil (2008)
2. Auer, P., Cesa-Bianchi, N., Fischer, P.: Finite-time analysis of the multiarmed bandit problem. Machine Learning 47, 235–256 (2002)
3. Bernstein, P.A., Hadzilacos, V., Goodman, N.: Concurrency Control and Recovery in Database Systems. Addison-Wesley Longman Publishing Co., Inc., Boston (1986)
4. Bloom, B.H.: Space/time trade-offs in hash coding with allowable errors. Communications of the ACM 13(7), 422–426 (1970)
5. Bruno, N., Chaudhuri, S.: An online approach to physical design tuning. In: Proc. of the International Conference on Data Engineering (ICDE), pp. 826–835 (2007)
Cited by
8 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Relaxing real-time order in opacity and linearizability;Journal of Parallel and Distributed Computing;2017-02
2. Q-OPT;Proceedings of the 16th Annual Middleware Conference;2015-11-24
3. Cloud-TM;Cloud Technology;2015
4. Self-tuning in Distributed Transactional Memory;Transactional Memory. Foundations, Algorithms, Tools, and Applications;2015
5. Introduction to Transactional Replication;Transactional Memory. Foundations, Algorithms, Tools, and Applications;2015