Sciweavers

4502 search results - page 898 / 901
» Regular Model Checking
Sort
View
SIGSOFT
2010
ACM
13 years 5 months ago
Finding latent performance bugs in systems implementations
Robust distributed systems commonly employ high-level recovery mechanisms enabling the system to recover from a wide variety of problematic environmental conditions such as node f...
Charles Edwin Killian, Karthik Nagaraj, Salman Per...
USS
2010
13 years 5 months ago
Toward Automated Detection of Logic Vulnerabilities in Web Applications
Web applications are the most common way to make services and data available on the Internet. Unfortunately, with the increase in the number and complexity of these applications, ...
Viktoria Felmetsger, Ludovico Cavedon, Christopher...
AIED
2009
Springer
13 years 5 months ago
Investigating the Effects of Social Goals in a Negotiation Game with Virtual Humans
Educational games may be particularly suited to teaching social learning skills with virtual humans. We investigate the importance of social goals and engaging social interactions ...
Amy Ogan, Vincent Aleven, Christopher Jones
EDM
2009
184views Data Mining» more  EDM 2009»
13 years 5 months ago
Process Mining Online Assessment Data
Traditional data mining techniques have been extensively applied to find interesting patterns, build descriptive and predictive models from large volumes of data accumulated throug...
Mykola Pechenizkiy, Nikola Trcka, Ekaterina Vasily...
ICCS
2009
Springer
13 years 5 months ago
Bending Virtual Spring-Damper: A Solution to Improve Local Platoon Control
This article presents a local control approach to linear vehicle platooning. Linear platoon systems are sets of vehicles that use local or global perception capabilities to form a ...
Jean-Michel Contet, Franck Gechter, Pablo Gruer, A...