Sciweavers

2205 search results - page 168 / 441
» Mutation Operators for Specifications
Sort
View
ESANN
2001
13 years 11 months ago
A computational model of monkey grating cells for oriented repetitive alternating patterns
In 1992 neurophysiologists [5] found an new type of cells in areas V1 and V2 of the monkey primary visual cortex, which they called grating cells. These cells respond vigorously to...
Tino Lourens, Kazuhiro Nakadai, Hiroshi G. Okuno, ...
LISA
2004
13 years 11 months ago
Real-time Log File Analysis Using the Simple Event Correlator (SEC)
Originally published at Usenix LISA 2004 conference. November 2004 Atlanta, Georiga, USA. Log analysis is an important way to keep track of computers and networks. The use of auto...
John P. Rouillard
USENIX
2001
13 years 11 months ago
Heimdal and Windows 2000 Kerberos - How to Get Them to Play Together
As a practical means of achieving better security and single sign-on, the Kerberos network authentication system has been in wide use in the Unix world for many years. Microsoft h...
Assar Westerlund, Johan Danielsson
LISA
2003
13 years 11 months ago
New NFS Tracing Tools and Techniques for System Analysis
Passive NFS traces provide an easy and unobtrusive way to measure, analyze, and gain an understanding of an NFS workload. Historically, such traces have been used primarily by fil...
Daniel Ellard, Margo I. Seltzer
COOTS
1998
13 years 11 months ago
Java Transactions for the Internet
The Web frequently suffers from failures which affect the performance and consistency of applications run over it. An important fault-tolerance technique is the use of atomic tran...
Mark C. Little, Santosh K. Shrivastava