Sciweavers

255 search results - page 42 / 51
» On proactivity and maintenance goals
Sort
View
EGICE
2006
13 years 11 months ago
Combining Two Data Mining Methods for System Identification
System identification is an abductive task which is affected by several kinds of modeling assumptions and measurement errors. Therefore, instead of optimizing values of parameters ...
Sandro Saitta, Benny Raphael, Ian F. C. Smith
IASTEDSEA
2004
13 years 9 months ago
An empirical investigation for different sequences of pedagogical framework documentation in RAD
Frameworks are increasingly employed as a useful way to enable object-oriented reuse. However, their size and complexity make understanding how to use them difficult. Previous wor...
Sin Ban Ho, Ian Chai, Chuie Hong Tan
SEC
2004
13 years 9 months ago
An Asymmetric Cryptography Secure Channel Protocol for Smart Cards
: Smart card secure channel protocols based on public key cryptography are not widely utilised mainly due to processing overheads introduced in the underlying smart card microproce...
Konstantinos Rantos, Constantinos Markantonakis
WSC
1996
13 years 9 months ago
Supporting Manufacturing with Simulation: Model Design, Development, and Deployment
In this paper, we identify and discuss the features we believe are key to the successful use of simulation as a manufacturing support tool. The discussion begins with three sample...
Frank Chance, Jennifer Robinson, John W. Fowler
APIN
2008
108views more  APIN 2008»
13 years 7 months ago
Achieving self-healing in service delivery software systems by means of case-based reasoning
Abstract Self-healing, i.e. the capability of a system to autonomously detect failures and recover from them, is a very attractive property that may enable large-scale software sys...
Stefania Montani, Cosimo Anglano