Sciweavers

3458 search results - page 180 / 692
» Abstracting Control
Sort
View
DC
2007
15 years 3 months ago
Randomized leader election
d bins abstraction and works in two phases. The main novelty of the work is in the first phase where the number of contending processes is reduced in a controlled manner. Probabil...
Murali Krishna Ramanathan, Ronaldo A. Ferreira, Su...
MCSS
2008
Springer
15 years 3 months ago
Weakly coprime factorization and state-feedback stabilization of discrete-time systems
Abstract: The LQ-optimal state feedback of a finite-dimensional linear time-invariant system determines a coprime factorization NM-1 of the transfer function. We show that the same...
Kalle M. Mikkola
118
Voted
SMC
2010
IEEE
177views Control Systems» more  SMC 2010»
15 years 1 months ago
On a new model for automatic text categorization based on Vector Space Model
Abstract—In our previous paper, we proposed a new classification technique called the Frequency Ratio Accumulation Method (FRAM). This is a simple technique that adds up the rat...
Makoto Suzuki, Naohide Yamagishi, Takashi Ishida, ...
SACMAT
2005
ACM
15 years 8 months ago
Peer-to-peer access control architecture using trusted computing technology
It has been recognized for some time that software alone does not provide an adequate foundation for building a high-assurance trusted platform. The emergence of industry-standard...
Ravi S. Sandhu, Xinwen Zhang
ISW
2009
Springer
15 years 9 months ago
Hardware-Assisted Application-Level Access Control
Abstract. Applications typically rely on the operating system to enforce access control policies such as MAC, DAC, or other policies. However, in the face of a compromised operatin...
Yu-Yuan Chen, Ruby B. Lee