: Today, mobile phones are becoming an essential device in our daily life, and carried comfortably and regularly by a huge percentage of population. In this note, we propose an app...
Online program monitoring is an effective technique for detecting bugs and security attacks in running applications. Extending these tools to monitor parallel programs is challeng...
Michelle L. Goodstein, Evangelos Vlachos, Shimin C...
Monitoring and mining real-time network data streams is crucial for managing and operating data networks. The information that network operators desire to extract from the network...
Pere Barlet-Ros, Gianluca Iannaccone, Josep Sanju&...
In the framework of SOM methodology for process and system analysis, we suggest a method for identifying regions in the SOM visualization space corresponding to different conditio...
It seems fair to assume that employers provide e-mail facilities to employees as tools intended for workrelated activity. As such it further seems fair to assume that employers wo...