We report on an automated runtime anomaly detection method at the application layer of multi-node computer systems. Although several network management systems are available in th...
While a typical software component has a clearly specified (static) interface in terms of the methods and the input/output types they support, information about the correct sequen...
In a previous experiment, we have studied the preference judgement of pictorial images with image experts and naive observers. We asked image experts to improve pictorial images t...
Clotilde Boust, Ferruccio Cittadini, Mohamed Ben C...
Intelligent tutoring systems (ITS) provide individualised instruction. They offer many advantages over the traditional classroom scenario: they are always available, non-judgement...
Scott P. Overmyer, Hamid Gholam Hosseini, Chao Fan...
I present an expectation-maximization (EM) algorithm for principal component analysis (PCA). The algorithm allows a few eigenvectors and eigenvalues to be extracted from large col...