Sciweavers

3155 search results - page 12 / 631
» Maintenance: Less Is Not More
Sort
View
ICCBR
2009
Springer
14 years 2 months ago
Maintenance by a Committee of Experts: The MACE Approach to Case-Base Maintenance
Case-base administrators face a choice of many maintenance algorithms. It is well-known that these algorithms have different biases that cause them to perform inconsistently over ...
Lisa Cummins, Derek G. Bridge
IWPC
2009
IEEE
14 years 2 months ago
Enabling more precise dependency analysis in event-based systems
Maintenance engineers need to understand component dependencies in a system to successfully modify component implementations. Interaction dependencies are especially hard to under...
Daniel Popescu, Joshua Garcia, Nenad Medvidovic
CHI
2007
ACM
14 years 7 months ago
AwareLESS authentication: insensible input based authentication
To increase the security of handheld devices, we propose awareLESS authentication. Since insensible input prevents the leakage of the key information, it can provide more secure a...
Hiroyuki Manabe, Masaaki Fukumoto
WISA
2007
Springer
14 years 1 months ago
Breaking 104 Bit WEP in Less Than 60 Seconds
We demonstrate an active attack on the WEP protocol that is able to recover a 104-bit WEP key using less than 40,000 frames with a success probability of 50%. In order to succeed i...
Erik Tews, Ralf-Philipp Weinmann, Andrei Pyshkin
CIMCA
2006
IEEE
14 years 1 months ago
Direct Adaptive Fuzzy Control with Less Restrictions on the Control Gain
: In the adaptive fuzzy control field for affine nonlinear systems, there are two basic configurations: direct and indirect. It is well known that the direct configuration needs mo...
Phi Anh Phan, Timothy J. Gale