Sciweavers

3555 search results - page 530 / 711
» Security-Critical System Development with Extended Use Cases
Sort
View
CDC
2009
IEEE
151views Control Systems» more  CDC 2009»
15 years 8 months ago
A poset framework to model decentralized control problems
— In this paper we use partially ordered sets (posets) to study decentralized control problems arising in different settings. We show that time delayed systems with certain dela...
Parikshit Shah, Pablo A. Parrilo
CORR
2006
Springer
120views Education» more  CORR 2006»
15 years 4 months ago
Termination orders for 3-dimensional rewriting
Abstract: This paper studies 3-polygraphs as a framework for rewriting on two-dimensional words. A translation of term rewriting systems into 3-polygraphs with explicit resource ma...
Yves Guiraud
CAD
2006
Springer
15 years 4 months ago
A unified subdivision approach for multi-dimensional non-manifold modeling
This paper presents a new unified subdivision scheme that is defined over a k-simplicial complex in n-D space with k 3. We first present a series of definitions to facilitate top...
Yu-Sung Chang, Hong Qin
CASES
2003
ACM
15 years 9 months ago
Clustered calculation of worst-case execution times
Knowing the Worst-Case Execution Time (WCET) of a program is necessary when designing and verifying real-time systems. A correct WCET analysis method must take into account the po...
Andreas Ermedahl, Friedhelm Stappert, Jakob Engblo...
ICIW
2008
IEEE
15 years 10 months ago
DBOWL: Towards a Scalable and Persistent OWL Reasoner
—With the increasing development of real applications using Semantic Web Technologies, it is necessary to provide scalable and efficient ontology querying and reasoning systems....
María del Mar Roldán García, ...