Sciweavers

6960 search results - page 1289 / 1392
» Continuity Analysis of Programs
Sort
View
AUTOMATICA
2005
115views more  AUTOMATICA 2005»
15 years 3 months ago
Robust constrained predictive control using comparison model
This paper proposes a quadratic programming (QP) approach to robust model predictive control (MPC) for constrained linear systems having both model uncertainties and bounded distu...
Hiroaki Fukushima, Robert R. Bitmead
TDSC
2008
152views more  TDSC 2008»
15 years 3 months ago
Towards Formal Verification of Role-Based Access Control Policies
Specifying and managing access control policies is a challenging problem. We propose to develop formal verification techniques for access control policies to improve the current s...
Somesh Jha, Ninghui Li, Mahesh V. Tripunitara, Qih...
TITS
2008
96views more  TITS 2008»
15 years 3 months ago
A Sampling Theorem Approach to Traffic Sensor Optimization
Abstract--With the objective of minimizing the total cost, which includes both sensor and congestion costs, the authors adopted a novel sampling theorem approach to address the pro...
Woei Ling Leow, Daiheng Ni, Hossein Pishro-Nik
CG
2005
Springer
15 years 3 months ago
Combining geometry and domain knowledge to interpret hand-drawn diagrams
One main challenge in building interpreters for hand-drawn sketches is the task of parsing a sketch to locate the individual symbols. Many existing pen-based systems avoid this pr...
Leslie Gennari, Levent Burak Kara, Thomas F. Staho...
TSE
2008
113views more  TSE 2008»
15 years 3 months ago
Discovering Neglected Conditions in Software by Mining Dependence Graphs
Neglected conditions are an important but difficult-to-find class of software defects. This paper presents a novel approach for revealing neglected conditions that integrates stati...
Ray-Yaung Chang, Andy Podgurski, Jiong Yang
« Prev « First page 1289 / 1392 Last » Next »