Sciweavers

3471 search results - page 620 / 695
» User activity histories
Sort
View
CLUSTER
2006
IEEE
14 years 9 months ago
Autonomous recovery in componentized Internet applications
In this paper we show how to reduce downtime of J2EE applications by rapidly and automatically recovering from transient and intermittent software failures, without requiring appl...
George Candea, Emre Kiciman, Shinichi Kawamoto, Ar...
IJMMS
2008
119views more  IJMMS 2008»
14 years 9 months ago
Collaboration and co-ordination in mature eXtreme programming teams
Mature eXtreme programming (XP) teams are highly collaborative and self-organising. In previous studies, we have observed that these teams rely on two apparently simple mechanisms...
Helen Sharp, Hugh Robinson
IJNSEC
2008
115views more  IJNSEC 2008»
14 years 9 months ago
Improving Security Through Analysis of Log Files Intersections
The paper discusses our research in development of general and systematic methods for intrusion prevention. The key idea is to use data mining techniques to discover repeated patt...
Kazimierz Kowalski, Mohsen Beheshti
GRID
2006
Springer
14 years 9 months ago
Personal Workspace for Large-Scale Data-Driven Computational Experiment
1 -- As the scale and complexity of data-driven computational science grows, so grows the burden on the scientists and students in managing the data products used and generated dur...
Yiming Sun, Scott Jensen, Sangmi Lee Pallickara, B...
INFSOF
2008
90views more  INFSOF 2008»
14 years 9 months ago
JADE: A software framework for developing multi-agent applications. Lessons learned
Since a number of years agent technology is considered one of the most innovative technologies for the development of distributed software systems. While not yet a mainstream appr...
Fabio Bellifemine, Giovanni Caire, Agostino Poggi,...