Sciweavers

2917 search results - page 45 / 584
» Adaptation and the effort needed to adapt
Sort
View
JCST
2008
98views more  JCST 2008»
15 years 1 months ago
Probabilistic Adaptive Anonymous Authentication in Vehicular Networks
Vehicular networks have attracted extensive attention in recent years for their promises in improving safety and enabling other value-added services. Most previous work focuses on ...
Yong Xi, Kewei Sha, Weisong Shi, Loren Schwiebert,...
126
Voted
GI
2010
Springer
14 years 12 months ago
Extended Workflow Flexibility using Rule-Based Adaptation Patterns with Eventing Semantics
: In several industry scenarios, it is often the case that an existing reference workflow has to be adapted according to specific context factors, which might even change at runtim...
Markus Döhring, Birgit Zimmermann, Eicke Gode...
129
Voted
AUTOMATICA
2007
154views more  AUTOMATICA 2007»
15 years 2 months ago
A globally stable saturated desired compensation adaptive robust control for linear motor systems with comparative experiments
The recently proposed saturated adaptive robust controller is integrated with desired trajectory compensation to achieve global stability with9 much improved tracking performance....
Yun Hong, Bin Yao
CHI
2009
ACM
15 years 8 months ago
Awareness, training and trust in interaction with adaptive spam filters
Even though adaptive (trainable) spam filters are a common example of systems that make (semi-)autonomous decisions on behalf of the user, trust in these filters has been underexp...
Henriette S. M. Cramer, Vanessa Evers, Maarten van...
76
Voted
RAID
2009
Springer
15 years 8 months ago
Automatically Adapting a Trained Anomaly Detector to Software Patches
Abstract. In order to detect a compromise of a running process based on it deviating from its program’s normal system-call behavior, an anomaly detector must first be trained wi...
Peng Li, Debin Gao, Michael K. Reiter