Sciweavers

1321 search results - page 216 / 265
» Logic Simulation Using Networks of State Machines
Sort
View
CDC
2009
IEEE
122views Control Systems» more  CDC 2009»
14 years 11 months ago
Dynamic policy-based IDS configuration
Intrusion Detection System (IDS) is an important security enforcement tool in modern networked information systems. Obtaining an optimal IDS configuration for effective detection o...
Quanyan Zhu, Tamer Basar
QEST
2007
IEEE
15 years 4 months ago
Probabilistic Model Checking Modulo Theories
— Probabilistic models are widely used to analyze embedded, networked, and more recently biological systems. Existing numerical analysis techniques are limited to finitestate mo...
Björn Wachter, Lijun Zhang, Holger Hermanns
INFOCOM
2005
IEEE
15 years 3 months ago
Low-state fairness: lower bounds and practical enforcement
— Providing approximate max-min fair bandwidth allocation among flows within a network or at a single router has been an important research problem. In this paper, we study the ...
Abhimanyu Das, Debojyoti Dutta, Ahmed Helmy, Ashis...
COMCOM
2006
140views more  COMCOM 2006»
14 years 9 months ago
A combined delay and throughput proportional scheduling scheme for differentiated services
Abstract--The proportional differentiation model is a newly introduced approach for differentiated services networks. This paper proposes and evaluates a scheduling mechanism for t...
Ahmed E. Kamal, Samyukta Sankaran
ICML
2008
IEEE
15 years 10 months ago
Space-indexed dynamic programming: learning to follow trajectories
We consider the task of learning to accurately follow a trajectory in a vehicle such as a car or helicopter. A number of dynamic programming algorithms such as Differential Dynami...
J. Zico Kolter, Adam Coates, Andrew Y. Ng, Yi Gu, ...