Sciweavers

3820 search results - page 269 / 764
» Bounded Model Debugging
Sort
View
AUTOMATICA
2005
126views more  AUTOMATICA 2005»
15 years 3 months ago
Relations between uncertainty structures in identification for robust control
Various techniques of system identification exist that provide a nominal model and an uncertainty bound. An important question is what the implications are for the particular choi...
Sippe G. Douma, Paul M. J. Van den Hof
SIAMCOMP
2002
113views more  SIAMCOMP 2002»
15 years 3 months ago
A Layered Analysis of Consensus
This paper introduces a simple notion of layering as a tool for analyzing well-behaved runs of a given model of distributed computation. Using layering, a model-independent analysi...
Yoram Moses, Sergio Rajsbaum
LCN
2008
IEEE
15 years 10 months ago
An analysis on error servers for stochastic network calculus
—Network calculus is a recently developed theory dealing with queuing systems found in computer networks with focus on service guarantee analysis. In the current network calculus...
Jing Xie, Yuming Jiang
ASIACRYPT
2007
Springer
15 years 10 months ago
Secure Protocols with Asymmetric Trust
Abstract. In the standard general-adversary model for multi-party protocols, a global adversary structure is given, and every party must trust in this particular structure. We intr...
Ivan Damgård, Yvo Desmedt, Matthias Fitzi, J...
AUTOMATICA
2008
139views more  AUTOMATICA 2008»
15 years 3 months ago
Structured low-rank approximation and its applications
Fitting data by a bounded complexity linear model is equivalent to low-rank approximation of a matrix constructed from the data. The data matrix being Hankel structured is equival...
Ivan Markovsky