Sciweavers

4716 search results - page 695 / 944
» Iterative-free program analysis
Sort
View
HYBRID
2009
Springer
15 years 11 months ago
Safe and Secure Networked Control Systems under Denial-of-Service Attacks
Abstract. We consider the problem of security constrained optimal control for discrete-time, linear dynamical systems in which control and measurement packets are transmitted over ...
Saurabh Amin, Alvaro A. Cárdenas, Shankar S...
HYBRID
2009
Springer
15 years 11 months ago
Optimal Boundary Control of Convention-Reaction Transport Systems with Binary Control Functions
We investigate a new approach for solving boundary control problems for dynamical systems that are governed by transport equations, when the control function is restricted to binar...
Falk M. Hante, Günter Leugering
CONIELECOMP
2009
IEEE
15 years 11 months ago
A Power-Line Communication Modem Based on OFDM
In this paper, we present the design and implementation of a PLC (Power-Line Communication) Modem based on Orthogonal Frequency Division Multiplexing (OFDM). The PLC device implem...
H. A. Garcia-Baleon, Vicente Alarcón Aquino
SASO
2009
IEEE
15 years 11 months ago
Teleological Software Adaptation
—We examine the use of teleological metareasoning for self-adaptation in game-playing software agents. The goal of our work is to develop an interactive environment in which the ...
Joshua Jones, Chris Parnin, Avik Sinharoy, Spencer...
DBPL
2009
Springer
131views Database» more  DBPL 2009»
15 years 11 months ago
XML Security Views Revisited
In this paper, we revisit the view based security framework for XML without imposing any of the previously considered restrictions on the class of queries, the class of DTDs, and t...
Benoît Groz, Slawomir Staworko, Anne-C&eacut...