Sciweavers

7918 search results - page 1150 / 1584
» Model Composition Directives
Sort
View
ENGL
2007
81views more  ENGL 2007»
15 years 5 months ago
Computational Comparisons of GPC and NGPC Schemes
—In this paper the GPC and NGPC model predictive control techniques are applied to a typical plant and compared in terms of computational efficiency. The system identification an...
D. N. Rao, M. R. K. Murthy, D. N. Harshal, S. R. M...
JPDC
2006
105views more  JPDC 2006»
15 years 5 months ago
Mutual anonymous overlay multicast
Multicast services are demanded by a variety of applications. Many applications require anonymity during their communication. However, there has been very little work on anonymous...
Li Xiao, Yunhao Liu, Wenjun Gu, Dong Xuan, Xiaomei...
ENTCS
2007
78views more  ENTCS 2007»
15 years 5 months ago
PEPA Queues: Capturing Customer Behaviour in Queueing Networks
Queueing network formalisms are very good at describing the spatial movement of customers, but typically poor at describing how customers change as they move through the network. ...
Ashok Argent-Katwala, Jeremy T. Bradley
MSCS
2008
97views more  MSCS 2008»
15 years 5 months ago
Logical relations for monadic types
Abstract. Software security can be ensured by specifying and verifying security properties of software using formal methods with strong theoretical bases. In particular, programs c...
Jean Goubault-Larrecq, Slawomir Lasota, David Nowa...
IDT
2007
109views more  IDT 2007»
15 years 5 months ago
Intelligent virtual humans with autonomy and personality: State-of-the-art
Intelligent virtual characters has been subject to exponential growth in the last decades and they are utilized in many application areas such as education, training, human-compute...
Zerrin Kasap, Nadia Magnenat-Thalmann
« Prev « First page 1150 / 1584 Last » Next »