Sciweavers

1906 search results - page 152 / 382
» Dependable Self-Hosting Distributed Systems Using Constraint...
Sort
View
103
Voted
ISORC
2007
IEEE
15 years 10 months ago
Security Analysis of the Utilization of Corba Object References as Authorization Tokens
In object-oriented real-time computing scenarios, particularly where Corba is used in embedded systems with resource constraints, developers and system architects often utilize Co...
Christoph Becker, Sebastian Staamann, Ralf Salomon
160
Voted
PAMI
2008
161views more  PAMI 2008»
15 years 3 months ago
Multilayered 3D LiDAR Image Construction Using Spatial Models in a Bayesian Framework
Standard 3D imaging systems process only a single return at each pixel from an assumed single opaque surface. However, there are situations when the laser return consists of multip...
Sergio Hernandez-Marin, Andrew M. Wallace, Gavin J...
124
Voted
IPPS
2007
IEEE
15 years 10 months ago
Using Speed Diagrams for Symbolic Quality Management
We present a quality management method for multimedia applications. The method takes as input an application software composed of actions. The execution times of actions are unkno...
Jacques Combaz, Jean-Claude Fernandez, Joseph Sifa...
127
Voted
JSSPP
2009
Springer
15 years 10 months ago
Scalability Analysis of Job Scheduling Using Virtual Nodes
It is important to identify scalability constraints in existing job scheduling software as they are applied to next generation parallel systems. In this paper, we analyze the scala...
Norman Bobroff, Richard Coppinger, Liana Fong, See...
140
Voted
AUTOMATICA
2005
108views more  AUTOMATICA 2005»
15 years 3 months ago
Enlarging the domain of attraction of MPC controllers
This paper presents a method for enlarging the domain of attraction of nonlinear model predictive control (MPC). The usual way of guaranteeing stability of nonlinear MPC is to add...
Daniel Limón, T. Alamo, Eduardo F. Camacho