Sciweavers

3544 search results - page 554 / 709
» Information Security in Open Systems
Sort
View
ICCBR
2007
Springer
15 years 5 months ago
Mining Large-Scale Knowledge Sources for Case Adaptation Knowledge
Abstract. Making case adaptation practical is a longstanding challenge for casebased reasoning. One of the impediments to widespread use of automated case adaptation is the adaptat...
David B. Leake, Jay H. Powell
ETFA
2006
IEEE
15 years 5 months ago
Fault Tolerance for Manufacturing Components
The more the information technologies begin to be incorporated into the industrial productive fabric, the more complex it becomes to organise them. It is vital to implant proactiv...
Diego Marcos-Jorquera, Francisco Maciá P&ea...
GROUP
2005
ACM
15 years 4 months ago
Seeking the source: software source code as a social and technical artifact
In distributed software development, two sorts of dependencies can arise. The structure of the software system itself can create dependencies between software elements, while the ...
Cleidson R. B. de Souza, Jon Froehlich, Paul Douri...
IMC
2005
ACM
15 years 4 months ago
Exploiting Internet Route Sharing for Large Scale Available Bandwidth Estimation
Recent progress in active measurement techniques has made it possible to estimate end-to-end path available bandwidth. However, how to efficiently obtain available bandwidth info...
Ningning Hu, Peter Steenkiste
LCPC
2005
Springer
15 years 4 months ago
Software Thread Level Speculation for the Java Language and Virtual Machine Environment
Thread level speculation (TLS) has shown great promise as a strategy for fine to medium grain automatic parallelisation, and in a hardware context techniques to ensure correct TLS...
Christopher J. F. Pickett, Clark Verbrugge