Sciweavers

149 search results - page 16 / 30
» Experiences with formal specification of fault-tolerant file...
Sort
View
WIS
2004
13 years 8 months ago
AuthenLink: A User-Centred Authentication System for a Secure Mobile Commerce
We envision an environment where humans communicate directly with computers without additional authentication inputs like passwords, passphrases, PINs (Personal Identification Num...
Christina Braz, Esma Aïmeur
ICDM
2009
IEEE
223views Data Mining» more  ICDM 2009»
14 years 2 months ago
Execution Anomaly Detection in Distributed Systems through Unstructured Log Analysis
Abstract -- Detection of execution anomalies is very important for the maintenance, development, and performance refinement of large scale distributed systems. Execution anomalies ...
Qiang Fu, Jian-Guang Lou, Yi Wang, Jiang Li
TACAS
2000
Springer
149views Algorithms» more  TACAS 2000»
13 years 11 months ago
Proof General: A Generic Tool for Proof Development
This note describes Proof General, a tool for developing machine proofs with an interactive proof assistant. Interaction is based around a proof script, which is the target of a pr...
David Aspinall
EDM
2010
248views Data Mining» more  EDM 2010»
13 years 9 months ago
Analyzing Learning Styles using Behavioral Indicators in Web based Learning Environments
It is argued that the analysis of the learner's generated log files during interactions with a learning environment is necessary to produce interpretative views of their activ...
Nabila Bousbia, Jean-Marc Labat, Amar Balla, Issam...
FTCS
1993
111views more  FTCS 1993»
13 years 8 months ago
Detection and Discrimination of Injected Network Faults
Although the present work does in fact employ training data, it does so in the interest of calibrating the results Six hundred faults were induced by injection into five live obtai...
Roy A. Maxion, Robert T. Olszewski