Sciweavers

3555 search results - page 239 / 711
» Security-Critical System Development with Extended Use Cases
Sort
View
FAST
2011
14 years 8 months ago
Just-in-Time Analytics on Large File Systems
As file systems reach the petabytes scale, users and administrators are increasingly interested in acquiring highlevel analytical information for file management and analysis. T...
H. Howie Huang, Nan Zhang 0004, Wei Wang, Gautam D...
ICPR
2008
IEEE
16 years 6 months ago
Wavelet-based salient points with scale information for classification
The calculation of local features at points of interest is a vital part of many current image retrieval and object detection systems. The wavelet-based interest point detector by ...
Alexandra Teynor, Hans Burkhardt
142
Voted
CASCON
1993
114views Education» more  CASCON 1993»
15 years 6 months ago
A transaction manager component for cooperative transaction models
The database community has produced extensive research on the concurrency control problem in the context of traditional databases. However, this traditional model is not suitable ...
George T. Heineman
TSMC
2010
14 years 11 months ago
State-Feedback Control of Fuzzy Discrete-Event Systems
In a 2002 paper, we combined fuzzy logic with discrete-event systems (DESs) and established an automaton model of fuzzy DESs (FDESs). The model can effectively represent determinis...
Feng Lin, Hao Ying
127
Voted
CDC
2009
IEEE
147views Control Systems» more  CDC 2009»
15 years 9 months ago
On a small gain theorem for networks of iISS systems
— This paper considers networks consisting of integral input-to-state stable (iISS) subsystems and addresses the problem of verifying iISS property of a given network. First, we ...
Hiroshi Ito, Sergey Dashkovskiy, Fabian Wirth