Sciweavers

872 search results - page 135 / 175
» Using Plans to Automate Software Applications
Sort
View
SOCIALCOM
2010
13 years 6 months ago
Secure Wireless Embedded Systems Via Component-based Design
This paper introduces the method secure-by-design as a way of constructing wireless embedded systems using component-based modeling frameworks. This facilitates design of secure a...
Theis Hjorth, Rune Torbensen
ICSE
2009
IEEE-ACM
13 years 6 months ago
HOLMES: Effective statistical debugging via efficient path profiling
Statistical debugging aims to automate the process of isolating bugs by profiling several runs of the program and using statistical analysis to pinpoint the likely causes of failu...
Trishul M. Chilimbi, Ben Liblit, Krishna K. Mehra,...
OSDI
2004
ACM
14 years 9 months ago
Configuration Debugging as Search: Finding the Needle in the Haystack
This work addresses the problem of diagnosing configuration errors that cause a system to function incorrectly. For example, a change to the local firewall policy could cause a ne...
Andrew Whitaker, Richard S. Cox, Steven D. Gribble
KBS
2007
100views more  KBS 2007»
13 years 8 months ago
A retraining methodology for enhancing agent intelligence
Data mining has proven a successful gateway for discovering useful knowledge and for enhancing business intelligence in a range of application fields. Incorporating this knowledg...
Andreas L. Symeonidis, Ioannis N. Athanasiadis, Pe...
JIIS
2000
119views more  JIIS 2000»
13 years 8 months ago
Knowledge Discovery from Series of Interval Events
Knowledge discovery from data sets can be extensively automated by using data mining software tools. Techniques for mining series of interval events, however, have not been conside...
Roy Villafane, Kien A. Hua, Duc A. Tran, Basab Mau...