Sciweavers

3555 search results - page 218 / 711
» Security-Critical System Development with Extended Use Cases
Sort
View
DATE
2006
IEEE
105views Hardware» more  DATE 2006»
15 years 10 months ago
Comfortable modeling of complex reactive systems
Modeling systems based on semi-formal graphical formalisms, such as Statecharts, has become standard practice in the design of reactive embedded devices. However, the modeling of ...
Steffen Prochnow, Reinhard von Hanxleden
CISST
2003
128views Hardware» more  CISST 2003»
15 years 5 months ago
Fast Correspondence-Based System for 2-D Shape Classification
In earlier work, we developed a fast method for 2-D shape retrieval based on point correspondences of silhouette contours. That method did not assume that the database shapes had ...
Boaz J. Super
JCB
2000
90views more  JCB 2000»
15 years 4 months ago
Geometric Invariant Core for the CL and CH1 Domains of Immunoglobulin Molecules
A previously developed algorithmic method for identifying a geometric invariant of protein structures, termed geometrical core, is extended to the and 1 domains of immunoglobulin ...
Ognyan Stoyanov, Alexander Kister, Israel Gelfand,...
WSC
1997
15 years 5 months ago
A Simulation-Based Finite Capacity Scheduling System
This paper describes the methodology of a finite capacity scheduling system which uses an objectoriented discrete event simulation as its engine. The scheduling system is develop...
Alexander J. Weintraub, Andrew Zozom Jr., Thom J. ...
TSP
2008
121views more  TSP 2008»
15 years 4 months ago
Stochastic Analysis of the LMS Algorithm for System Identification With Subspace Inputs
This paper studies the behavior of the low-rank least mean squares (LMS) adaptive algorithm for the general case in which the input transformation may not capture the exact input s...
Neil J. Bershad, José Carlos M. Bermudez, J...