Sciweavers

1164 search results - page 207 / 233
» Using CBR for Semantic Analysis of Software Specifications
Sort
View
CISIS
2007
IEEE
13 years 7 months ago
Gridifying IBM's Generic Log Adapter to Speed-Up the Processing of Log Data
Problem determination in today's computing environments consumes between 30 and 70% of an organization’s IT resources and represents from one third to one half of their tot...
Claudi Paniagua, Fatos Xhafa, Thanasis Daradoumis
KDD
2005
ACM
130views Data Mining» more  KDD 2005»
14 years 8 months ago
Regression error characteristic surfaces
This paper presents a generalization of Regression Error Characteristic (REC) curves. REC curves describe the cumulative distribution function of the prediction error of models an...
Luís Torgo
BCS
2008
13 years 9 months ago
Tools for Traceable Security Verification
Dependable systems evolution has been identified by the UK Computing Research Committee (UKCRC) as one of the current grand challenges for computer science. We present work toward...
Jan Jürjens, Yijun Yu, Andreas Bauer 0002
TE
2010
110views more  TE 2010»
13 years 2 months ago
A Wireless Communications Systems Laboratory Course
A novel wireless communications systems laboratory course is introduced. The course teaches students how to design, test, and simulate wireless systems using modern instrumentation...
Sabih Güzelgöz, Hüseyin Arslan
CCS
2008
ACM
13 years 9 months ago
Minimal backups of cryptographic protocol runs
As cryptographic protocols execute they accumulate information such as values and keys, and evidence of properties about this information. As execution proceeds, new information b...
Jay A. McCarthy, Shriram Krishnamurthi