Sciweavers

1040 search results - page 10 / 208
» Resource Usage Verification
Sort
View
ECTEL
2007
Springer
14 years 1 months ago
Improving Retrieval of Reusable Learning Resources by Estimating Adaptation Effort
Due to slightly changed scenarios of usage a one-to-one reuse of existing E-Learning resource often is not possible. Actual approaches for retrieving existing E-Learning resources ...
Birgit Zimmermann, Marek Meyer, Christoph Rensing,...
HPDC
2000
IEEE
13 years 11 months ago
Managing Network Resources in Condor
Data-intensive applications in the Condor High Throughput Computing environment can place heavy demands on network resources for checkpointing and remote data access. We have deve...
Jim Basney, Miron Livny
CHARME
2003
Springer
97views Hardware» more  CHARME 2003»
13 years 11 months ago
Coverage Metrics for Formal Verification
In formal verification, we verify that a system is correct with respect to a specification. Even when the system is proven to be correct, there is still a question of how complete ...
Hana Chockler, Orna Kupferman, Moshe Y. Vardi
GECON
2009
Springer
125views Business» more  GECON 2009»
13 years 12 months ago
Message Protocols for Provisioning and Usage of Computing Services
Abstract. The commercial availability of computational resources enable consumers to scale their applications on-demand. However, it is necessary for both consumers and providers o...
Nikolay Borissov, Simon Caton, Omer F. Rana, Aharo...
HT
2006
ACM
14 years 1 months ago
Hyperlink assessment based on web usage mining
One of the basic methods of web usage mining are association rules that indicate relationships among common use of web pages. Positive and confined negative association rules are ...
Przemyslaw Kazienko, Marcin Pilarczyk