Sciweavers

4985 search results - page 312 / 997
» Observation of String-Rewriting Systems
Sort
View
UCS
2004
Springer
15 years 10 months ago
Dependable Coding of Fiducial Tags
Fiducial tags can be recognised successfully and decoded by computer vision systems in order to produce location information. We term a system dependable if its observable results ...
Andrew C. Rice, Christopher B. Cain, John K. Fawce...
183
Voted
HPDC
2002
IEEE
15 years 9 months ago
Dynamic Monitoring of High-Performance Distributed Applications
Developers and users of high-performance distributed systems often observe performance problems such as unexpectedly low throughput or high latency. Determining the source of the ...
Dan Gunter, Brian Tierney, Keith R. Jackson, Jason...
CDC
2009
IEEE
161views Control Systems» more  CDC 2009»
15 years 9 months ago
Network structure preserving model reduction with weak a priori structural information
— This paper extends a state projection method for structure preserving model reduction to situations where only a weaker notion of system structure is available. This weaker not...
Enoch Yeung, Jorge M. Goncalves, Henrik Sandberg, ...
128
Voted
EUROMICRO
1999
IEEE
15 years 9 months ago
Error Recovery using Forced Validity Assisted by Executable Assertions for Error Detection: An Experimental Evaluation
This paper proposes and evaluates error detection and recovery mechanisms suitable for embedded systems. The purpose of these mechanisms is to provide detection of and recovery fr...
Martin Hiller
FM
1999
Springer
97views Formal Methods» more  FM 1999»
15 years 9 months ago
Sensors and Actuators in TCOZ
Timed Communicating Object Z (TCOZ) combines Object-Z's strengths in modeling complex data and algorithms with Timed CSP's strengths in modeling real-time concurrency. TC...
Brendan P. Mahony, Jin Song Dong