Table of ContentsMeasuring Windows NT Outline User-Perceived Performance Three types of responses Conventional techniques Our goals Plan of attack Suspicions Data to collect Can we do this without source? Why we cannot sign the agreement Conclusions |
Author: Yasuhiro Endo |