Sciweavers

1855 search results - page 281 / 371
» Composing model programs for analysis
Sort
View
HYBRID
2009
Springer
15 years 4 months ago
Safe and Secure Networked Control Systems under Denial-of-Service Attacks
Abstract. We consider the problem of security constrained optimal control for discrete-time, linear dynamical systems in which control and measurement packets are transmitted over ...
Saurabh Amin, Alvaro A. Cárdenas, Shankar S...
WSC
1998
14 years 11 months ago
Discrete Time Simulation of an Equipment Rental Business
In this work we report the results of a discrete time simulation model that we developed for an equipment rental business to study the impact of business decisions. The whole tool...
R. Alan Bowman, Ira J. Haimowitz, Robert M. Matthe...
TASE
2008
IEEE
14 years 9 months ago
Perspectives in Probabilistic Verification
Soon after the birth of the flourishing research area of model checking in the early eighties, researchers started to apply this technique to finite automata equipped with probabi...
Joost-Pieter Katoen
TFM
2009
Springer
252views Formal Methods» more  TFM 2009»
15 years 4 months ago
Abstraction and Modelling: A Complementary Partnership
action and Modelling - a complementary partnership” 10h30 – 11h 00 Coffee break 11h-12h30 Session 1 “Model Transformation: Foundations” Algebraic models for bidirectional m...
Jeffrey Kramer
SLIP
2009
ACM
15 years 4 months ago
Predicting the worst-case voltage violation in a 3D power network
This paper proposes an efficient method to predict the worst case of voltage violation by multi-domain clock gating in a three-dimensional (3D) on-chip power network considering l...
Wanping Zhang, Wenjian Yu, Xiang Hu, Amirali Shaya...