Sciweavers

2213 search results - page 200 / 443
» On the Scalability of Centralized Control
Sort
View
HASE
1998
IEEE
15 years 6 months ago
A Firewalling Scheme for Securing MPOA-Based Enterprise Networks
A well-known security problem with MPOA is that cutthrough connections generally bypasses firewall routers if there are any. None of the previously proposed approaches solved the ...
Jun Xu, Mukesh Singhal
99
Voted
RTSS
1998
IEEE
15 years 6 months ago
The Time-Triggered Model of Computation
: The Time-Triggered (TT) model of computation is a model for the representation and analysis of the design of large hard real-time systems. Central to this model is the concept of...
Hermann Kopetz
CDC
2009
IEEE
184views Control Systems» more  CDC 2009»
15 years 5 months ago
A closed loop musculoskeletal model of postural coordination dynamics
A closed-loop model with actuator dynamics and sensory feedback has been developed to capture the complex postural behaviors observed in a human head tracking task. In motor-contro...
Vincent Bonnet, Philippe Fraisse, Nacim Ramdani, J...
ICC
2007
IEEE
142views Communications» more  ICC 2007»
15 years 5 months ago
Optimal Pricing for Selfish Users and Prefetching in Heterogeneous Wireless Networks
Prefetching has been shown to be an effective technique for reducing resource cost and delay in heterogeneous wireless networks. However, in modern wireless local area networks, th...
Jonathan Y. Lau, Ben Liang
HYBRID
2010
Springer
15 years 3 months ago
Identifiability of discrete-time linear switched systems
In this paper we study the identifiability of linear switched systems (LSSs ) in discrete-time. The question of identifiability is central to system identification, as it sets the...
Mihály Petreczky, Laurent Bako, Jan H. van ...