Sciweavers

1522 search results - page 101 / 305
» Practical Exception Specifications
Sort
View
SP
1996
IEEE
101views Security Privacy» more  SP 1996»
15 years 5 months ago
An Immunological Approach to Change Detection: Algorithms, Analysis and Implications
We present new results on a distributable changedetection method inspired by the natural immune system. A weakness in the original algorithm was the exponential cost of generating...
Patrik D'haeseleer, Stephanie Forrest, Paul Helman
ESA
2006
Springer
106views Algorithms» more  ESA 2006»
15 years 5 months ago
Less Hashing, Same Performance: Building a Better Bloom Filter
A standard technique from the hashing literature is to use two hash functions h1(x) and h2(x) to simulate additional hash functions of the form gi(x) = h1(x) + ih2(x). We demonstra...
Adam Kirsch, Michael Mitzenmacher
CHIMIT
2008
ACM
15 years 3 months ago
Policy-based IT automation: the role of human judgment
Policy-based automation is emerging as a viable approach to IT systems management, codifying high-level business goals into executable specifications for governing IT operations. ...
Eser Kandogan, John H. Bailey, Paul P. Maglio, Ebe...
ECTEL
2008
Springer
15 years 3 months ago
A Goal-oriented Authoring Approach to Design, Share and Reuse Learning Scenarios
This paper presents our research works and our proposal : ISiS model (Intentions, Strategies, interactional Situations), a conceptual framework elaborated to structure the design o...
Valérie Emin
BCSHCI
2007
15 years 3 months ago
Introducing HCI: a practitioner's guide
HCI continues to grow in popularity amongst commercial practitioners, many of whom have no formal training or education in HCI. Conferences, such as HCI 2007, offer an attractive ...
Steve Cummaford, John Long