Sciweavers

639 search results - page 69 / 128
» Dominance Constraints with Set Operators
Sort
View
CDC
2009
IEEE
173views Control Systems» more  CDC 2009»
15 years 2 months ago
Fault tolerant control allocation for a thruster-controlled floating platform using parametric programming
— The task in control allocation is to determine how to generate a specified generalized force from a redundant set of control effectors where the associated actuator control in...
Jørgen Spjøtvold, Tor Arne Johansen
INFOSCALE
2007
ACM
14 years 11 months ago
A dubiety-determining based model for database cumulated anomaly intrusion
— The concept of Cumulated Anomaly (CA), which describes a new type of database anomalies, is addressed. A typical CA intrusion is that when a user who is authorized to modify da...
Gang Lu, Junkai Yi, Kevin Lü
SIES
2010
IEEE
14 years 7 months ago
An Energy-Aware Algorithm for TDMA MAC Protocols in Real-Time Wireless Networks
Abstract--In distributed embedded systems operated by battery, energy management is a critical issue that has to be addressed at different architecture levels. For systems that tig...
Gianluca Franchino, Giorgio C. Buttazzo, Mauro Mar...
JAR
2006
236views more  JAR 2006»
14 years 9 months ago
Deciding Boolean Algebra with Presburger Arithmetic
We describe an algorithm for deciding the first-order multisorted theory BAPA, which combines 1) Boolean algebras of sets of uninterpreted elements (BA) and 2) Presburger arithmeti...
Viktor Kuncak, Huu Hai Nguyen, Martin C. Rinard
MMAS
2004
Springer
15 years 3 months ago
Quantitative Organizational Models for Large-Scale Agent Systems
Abstract. As the scale and scope of multi-agent systems grow, it becomes increasingly important to design and manage the manner in which the participants interact. The potential fo...
Bryan Horling, Victor R. Lesser