Sciweavers

515 search results - page 53 / 103
» Neighborhood operator systems and approximations
Sort
View
ASC
2004
14 years 9 months ago
Soft computing applications in dynamic model identification of polymer extrusion process
This paper proposes the applications of soft computing to deal with the constraints in conventional modelling techniques of the dynamic extrusion process. The proposed technique i...
Leong Ping Tan, Ahmad Lotfi, Eugene Lai, J. B. Hul...
GLOBECOM
2010
IEEE
14 years 7 months ago
Predicting Critical Intradomain Routing Events
Network equipments generate an overwhelming number of reports and alarms every day, but only a small fraction of these alarms require the intervention of network operators. Our goa...
Amelie Medem Kuatse, Renata Teixeira, Nicolas Usun...
CSFW
2012
IEEE
13 years 5 days ago
Gran: Model Checking Grsecurity RBAC Policies
—Role-based Access Control (RBAC) is one of the most widespread security mechanisms in use today. Given the growing complexity of policy languages and access control systems, ver...
Michele Bugliesi, Stefano Calzavara, Riccardo Foca...
USENIX
2001
14 years 11 months ago
User-Level Checkpointing for LinuxThreads Programs
Multiple threads running in a single, shared address space is a simple model for writing parallel programs for symmetric multiprocessor (SMP) machines and for overlapping I/O and ...
William R. Dieter, James E. Lumpp Jr.
JSAC
2011
83views more  JSAC 2011»
14 years 18 days ago
Trading Rate for Balanced Queue Lengths for Network Delay Minimization
—We consider a communication channel with two transmitters and one receiver, with an underlying rate region which is approximated as a general pentagon. Different from the Gaussi...
Jing Yang, Sennur Ulukus