Sciweavers

2861 search results - page 418 / 573
» Constraint Programming
Sort
View
COMPSAC
2009
IEEE
15 years 1 months ago
GUI-Based Testing of Boundary Overflow Vulnerability
Boundary overflows are caused by violation of constraints, mostly limiting the range of internal values of a program, and can be provoked by an intruder to gain control of or acce...
Tugkan Tuglular, Can A. Muftuoglu, Özgür...
NETWORKING
2008
14 years 11 months ago
Traffic Engineering and Routing in IP Networks with Centralized Control
There have been research initiatives in centralized control recently, which advocate that the control of an autonomous system (AS) should be performed in a centralized fashion. In ...
Jing Fu, Peter Sjödin, Gunnar Karlsson
HICSS
2000
IEEE
208views Biometrics» more  HICSS 2000»
15 years 2 months ago
Transfer Capability Computations in Deregulated Power Systems
With the recent trend towards deregulating power systems around the world, transfer capability computation emerges as the key issue to a smoothly running power market with multipl...
Mohamed Shaaban, Yixin Ni, Felix F. Wu
CODES
2004
IEEE
15 years 1 months ago
Automatic synthesis of system on chip multiprocessor architectures for process networks
In this paper, we present an approach for automatic synthesis of System on Chip (SoC) multiprocessor architectures for applications expressed as process networks. Our approach is ...
Basant Kumar Dwivedi, Anshul Kumar, M. Balakrishna...
AUTOMATICA
2006
132views more  AUTOMATICA 2006»
14 years 10 months ago
A new autocovariance least-squares method for estimating noise covariances
Industrial implementation of model-based control methods, such as model predictive control, is often complicated by the lack of knowledge about the disturbances entering the syste...
Brian J. Odelson, Murali R. Rajamani, James B. Raw...