Sciweavers

5757 search results - page 886 / 1152
» Dynamic Policy Programming
Sort
View
95
Voted
HYBRID
2009
Springer
15 years 7 months ago
Safe and Secure Networked Control Systems under Denial-of-Service Attacks
Abstract. We consider the problem of security constrained optimal control for discrete-time, linear dynamical systems in which control and measurement packets are transmitted over ...
Saurabh Amin, Alvaro A. Cárdenas, Shankar S...
106
Voted
DATE
2009
IEEE
149views Hardware» more  DATE 2009»
15 years 7 months ago
An ILP formulation for task mapping and scheduling on multi-core architectures
Multi-core architectures are increasingly being adopted in the design of emerging complex embedded systems. Key issues of designing such systems are on-chip interconnects, memory a...
Ying Yi, Wei Han, Xin Zhao, Ahmet T. Erdogan, Tugh...
99
Voted
ICDAR
2009
IEEE
15 years 7 months ago
Integrating Language Model in Handwritten Chinese Text Recognition
This paper describes a system for handwritten Chinese text recognition integrating language model. On a text line image, the system generates character segmentation and word segme...
Qiu-Feng Wang, Fei Yin, Cheng-Lin Liu
WECWIS
2009
IEEE
162views ECommerce» more  WECWIS 2009»
15 years 7 months ago
QoS-Driven Web Service Composition Using Learning-Based Depth First Search
—The goal of the Web Service Composition (WSC) problem is to find an optimal composition of web services to satisfy a given request using their syntactic and/or semantic feature...
Wonhong Nam, Hyunyoung Kil, Jungjae Lee
82
Voted
ICRA
2009
IEEE
122views Robotics» more  ICRA 2009»
15 years 7 months ago
Probabilistic search optimization and mission assignment for heterogeneous autonomous agents
— This paper presents an algorithmic framework for conducting search and identification missions using multiple heterogeneous agents. Dynamic objects of type “neutral” or ...
Timothy H. Chung, Moshe Kress, Johannes O. Royset