Sciweavers

4201 search results - page 10 / 841
» Our Users have Root!
Sort
View
FASE
2009
Springer
14 years 17 days ago
Algorithms for Automatically Computing the Causal Paths of Failures
We have proposed an automated debugging technique that explains a failure by computing its causal path leading from the root cause to the failure. Given a failing execution, the te...
William N. Sumner, Xiangyu Zhang
ICEB
2004
279views Business» more  ICEB 2004»
13 years 9 months ago
Adaptive User Interfaces for Intelligent E-Learning: Issues and Trends
Adaptive User Interfaces have a long history rooted in the emergence of such eminent technologies as Artificial Intelligence, Soft Computing, Graphical User Interface, JAVA, Inter...
Abdul Rahim Ahmad, Otman A. Basir, Khaled Hassanei...
ACSAC
2005
IEEE
14 years 1 months ago
Dynamic Taint Propagation for Java
Improperly validated user input is the underlying root cause for a wide variety of attacks on web-based applications. Static approaches for detecting this problem help at the time...
Vivek Haldar, Deepak Chandra, Michael Franz
RSA
1998
53views more  RSA 1998»
13 years 7 months ago
Recursive reconstruction on periodic trees
A periodic tree Tn consists of full n-level copies of a finite tree T. The tree Tn is labeled by random bits. The root label is chosen randomly, and the probability of two adjace...
Elchanan Mossel
AUSDM
2007
Springer
112views Data Mining» more  AUSDM 2007»
14 years 2 months ago
Measuring Data-Driven Ontology Changes using Text Mining
Most current ontology management systems concentrate on detecting usage-driven changes and representing changes formally in order to maintain the consistency. In this paper, we pr...
Majigsuren Enkhsaikhan, Wilson Wong, Wei Liu, Mark...