Sciweavers

1855 search results - page 281 / 371
» Composing model programs for analysis
Sort
View
109
Voted
HYBRID
2009
Springer
15 years 9 months ago
Safe and Secure Networked Control Systems under Denial-of-Service Attacks
Abstract. We consider the problem of security constrained optimal control for discrete-time, linear dynamical systems in which control and measurement packets are transmitted over ...
Saurabh Amin, Alvaro A. Cárdenas, Shankar S...
78
Voted
WSC
1998
15 years 4 months ago
Discrete Time Simulation of an Equipment Rental Business
In this work we report the results of a discrete time simulation model that we developed for an equipment rental business to study the impact of business decisions. The whole tool...
R. Alan Bowman, Ira J. Haimowitz, Robert M. Matthe...
119
Voted
TASE
2008
IEEE
15 years 2 months ago
Perspectives in Probabilistic Verification
Soon after the birth of the flourishing research area of model checking in the early eighties, researchers started to apply this technique to finite automata equipped with probabi...
Joost-Pieter Katoen
173
Voted
TFM
2009
Springer
252views Formal Methods» more  TFM 2009»
15 years 9 months ago
Abstraction and Modelling: A Complementary Partnership
action and Modelling - a complementary partnership” 10h30 – 11h 00 Coffee break 11h-12h30 Session 1 “Model Transformation: Foundations” Algebraic models for bidirectional m...
Jeffrey Kramer
SLIP
2009
ACM
15 years 9 months ago
Predicting the worst-case voltage violation in a 3D power network
This paper proposes an efficient method to predict the worst case of voltage violation by multi-domain clock gating in a three-dimensional (3D) on-chip power network considering l...
Wanping Zhang, Wenjian Yu, Xiang Hu, Amirali Shaya...