Performance engineering

Known as: Software Performance Engineering, Systems Performance Engineering 
Performance engineering or SPE (Systems Performance Engineering or Software Performance Engineering) within systems engineering, encompasses the set… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

1968-2018
05019682018

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2011
Highly Cited
2011
Resource-efficient cryptographic primitives are essential for realizing both security and efficiency in embedded systems like… (More)
  • figure 2
  • figure 3
  • figure 4
  • table 2
  • table 3
Is this relevant?
Highly Cited
2009
Highly Cited
2009
We present the Java Modelling Tools (JMT) suite, an integrated framework of Java tools for performance evaluation of computer… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2007
Highly Cited
2007
Performance is a pervasive quality of software systems; everything affects it, from the software itself to all underlying layers… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2007
2007
Late identification of performance problems can lead to significant additional development costs. Hence, it is necessary to… (More)
  • figure 1
  • figure 2
  • figure 4
Is this relevant?
Highly Cited
2004
Highly Cited
2004
Over the last decade, the relevance of performance evaluation in the early stages of the software development life-cycle has been… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 6
Is this relevant?
Highly Cited
2004
Highly Cited
2004
Intrusion detection systems (IDSs) have become widely recognized as powerful tools for identifying, deterring and deflecting… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 7
Is this relevant?
Review
2004
Review
2004
Over the last decade, a lot of research has been directed toward integrating performance analysis into the software development… (More)
  • table 1
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
Highly Cited
2004
Highly Cited
2004
A crucial issue in the design of Component-Based (CB) applications is the ability to early guarantee that the system under… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
1996
Highly Cited
1996
Cryptographic hash functions are an important tool in cryptography for applications such as digital fingerprinting of messages… (More)
  • table 1
  • figure 1
Is this relevant?
Highly Cited
1993
Highly Cited
1993
We detail and analyse the critical techniques which may be combined in the design of fast hardware for RSA cryptography: chinese… (More)
  • figure 2
  • figure 3
  • figure 4
Is this relevant?