We present new results on a distributable changedetection method inspired by the natural immune system. A weakness in the original algorithm was the exponential cost of generating...
Patrik D'haeseleer, Stephanie Forrest, Paul Helman
A standard technique from the hashing literature is to use two hash functions h1(x) and h2(x) to simulate additional hash functions of the form gi(x) = h1(x) + ih2(x). We demonstra...
Policy-based automation is emerging as a viable approach to IT systems management, codifying high-level business goals into executable specifications for governing IT operations. ...
Eser Kandogan, John H. Bailey, Paul P. Maglio, Ebe...
This paper presents our research works and our proposal : ISiS model (Intentions, Strategies, interactional Situations), a conceptual framework elaborated to structure the design o...
HCI continues to grow in popularity amongst commercial practitioners, many of whom have no formal training or education in HCI. Conferences, such as HCI 2007, offer an attractive ...