Sciweavers

3128 search results - page 413 / 626
» Finite element method
Sort
View
CSDA
2010
157views more  CSDA 2010»
15 years 5 months ago
Robust estimation of constrained covariance matrices for confirmatory factor analysis
Confirmatory factor analysis (CFA) is a data anylsis procedure that is widely used in social and behavioral sciences in general and other applied sciences that deal with large qua...
E. Dupuis Lozeron, M. P. Victoria-Feser
AUTOMATICA
2006
103views more  AUTOMATICA 2006»
15 years 5 months ago
A universal iterative learning stabilizer for a class of MIMO systems
Design of iterative learning control (ILC) often requires some prior knowledge about a system's control matrix. In some applications, such as uncalibrated visual servoing, th...
Ping Jiang, Huadong Chen, Leon C. A. Bamforth
FAC
2008
139views more  FAC 2008»
15 years 5 months ago
Network invariants for real-time systems
We extend the approach of model checking parameterized networks of processes by means of network invariants to the setting of real-time systems. We introduce timed transition stru...
Olga Grinchtein, Martin Leucker
159
Voted
CORR
2006
Springer
189views Education» more  CORR 2006»
15 years 5 months ago
Node-Based Optimal Power Control, Routing, and Congestion Control in Wireless Networks
Abstract--In wireless networks, important network functionalities such as power control, rate allocation, routing, and congestion control must be optimized in a coherent and integr...
Yufang Xi, Edmund M. Yeh
CN
2007
106views more  CN 2007»
15 years 5 months ago
Learning DFA representations of HTTP for protecting web applications
Intrusion detection is a key technology for self-healing systems designed to prevent or manage damage caused by security threats. Protecting web server-based applications using in...
Kenneth L. Ingham, Anil Somayaji, John Burge, Step...