Due to slightly changed scenarios of usage a one-to-one reuse of existing E-Learning resource often is not possible. Actual approaches for retrieving existing E-Learning resources ...
Birgit Zimmermann, Marek Meyer, Christoph Rensing,...
Data-intensive applications in the Condor High Throughput Computing environment can place heavy demands on network resources for checkpointing and remote data access. We have deve...
In formal verification, we verify that a system is correct with respect to a specification. Even when the system is proven to be correct, there is still a question of how complete ...
Abstract. The commercial availability of computational resources enable consumers to scale their applications on-demand. However, it is necessary for both consumers and providers o...
Nikolay Borissov, Simon Caton, Omer F. Rana, Aharo...
One of the basic methods of web usage mining are association rules that indicate relationships among common use of web pages. Positive and confined negative association rules are ...