This paper studies the input design problem for system identification where time domain constraints have to be considered. A finite Markov chain is used to model the input of the s...
The open and anonymous nature of a P2P network makes it an ideal medium for attackers to spread malicious content. In this paper, we propose a reputation-based trust management sy...
This paper describes the methodology of a finite capacity scheduling system which uses an objectoriented discrete event simulation as its engine. The scheduling system is develop...
Alexander J. Weintraub, Andrew Zozom Jr., Thom J. ...
We present a component-based description language for heterogeneous systems composed of several data flow processing components and a unique eventbased controller. Descriptions a...
This paper proposes a new visual modeling environment for embedded component systems that improves the productivity of application developers. This embedded component system decre...