Sciweavers

3971 search results - page 656 / 795
» On the Use of Properties in Java Applications
Sort
View
CDC
2008
IEEE
180views Control Systems» more  CDC 2008»
15 years 11 months ago
Opacity-enforcing supervisory strategies for secure discrete event systems
— Initial-state opacity emerges as a key property in numerous security applications of discrete event systems including key-stream generators for cryptographic protocols. Speciļ¬...
Anooshiravan Saboori, Christoforos N. Hadjicostis
DSN
2008
IEEE
15 years 11 months ago
A recurrence-relation-based reward model for performability evaluation of embedded systems
Embedded systems for closed-loop applications often behave as discrete-time semi-Markov processes (DTSMPs). Performability measures most meaningful to iterative embedded systems, ...
Ann T. Tai, Kam S. Tso, William H. Sanders
155
Voted
HPDC
2008
IEEE
15 years 11 months ago
FaTLease: scalable fault-tolerant lease negotiation with paxos
A lease is a token which grants its owner exclusive access to a resource for a defined span of time. In order to be able to tolerate failures, leases need to be coordinated by di...
Felix Hupfeld, Björn Kolbeck, Jan Stender, Mi...
ICDM
2008
IEEE
136views Data Mining» more  ICDM 2008»
15 years 11 months ago
Generalized Framework for Syntax-Based Relation Mining
Supervised approaches to Data Mining are particularly appealing as they allow for the extraction of complex relations from data objects. In order to facilitate their application i...
Bonaventura Coppola, Alessandro Moschitti, Daniele...
ICPR
2008
IEEE
15 years 11 months ago
A performance controllable octree construction method
The conventional octree construction method is implemented iteratively at consecutive subdivision levels. The resultant octree models at different subdivision levels contain quite...
Zen Chen, Hong-Long Chou, Wen-Chao Chen