Computer forensic analysis, intrusion detection and disaster recovery are all dependent on the existence of trustworthy log files. Current storage systems for such log files are...
Field usability research involves observing people in their own environments—for example, workplaces, homes, and schools—to learn their normal or natural behavior. Through fie...
Customers of public computing sites and faculty who use the public computer classrooms to teach want diversity in computing. Inevitably, there’s a group that does not want to te...
Case-based reasoning is a flexible methodology to manage software development related tasks. However, when the reasoner’s task is prediction, there are a number of different CBR ...
Rosina Weber, Michael Waller, June M. Verner, Will...
Tuning applications for multi-core systems involve subtle concepts and target-dependent optimizations. New languages are being designed to express concurrency and locality without...
Cupertino Miranda, Philippe Dumont, Albert Cohen, ...