Sciweavers

1998 search results - page 114 / 400
» Situated Control Rules
Sort
View
PDPTA
2003
15 years 5 months ago
Distributed Access Control for Carrier Class Clusters
The telecommunication industry traditionally uses clusters to meet its carrier-class requirements of high availability and reliability. As security has also become a major issue, ...
Makan Pourzandi, Axelle Apvrille, E. Gingras, A. M...
135
Voted
JUCS
2007
122views more  JUCS 2007»
15 years 4 months ago
Spiking Neural P Systems with Astrocyte-Like Control
: Spiking neural P systems are computing models inspired from the way the neurons communicate by means of spikes, electrical impulses of identical shapes. In this note we consider ...
Gheorghe Paun
IJON
2010
159views more  IJON 2010»
14 years 11 months ago
Model predictive flight control using adaptive support vector regression
This paper explores an application of support vector regression (SVR) to model predictive control (MPC). SVR is employed to identify a dynamic system from input-output data, and t...
Jongho Shin, H. Jin Kim, Sewook Park, Youdan Kim
IACR
2011
130views more  IACR 2011»
14 years 3 months ago
Hiding the Policy in Cryptographic Access Control
Abstract. Recently, cryptographic access control has received a lot of attention, mainly due to the availability of efficient Attribute-Based Encryption (ABE) schemes. ABE allows ...
Sascha Müller, Stefan Katzenbeisser
FUZZIEEE
2007
IEEE
15 years 10 months ago
Fuzzy Logic Control System for Autonomous Sailboats
—Sailing experts can explain basic sailing skills by rules about how to steer sails and rudder according to direction of target and wind. This paper describes how to transform th...
Roland Stelzer, Tobias Pröll, Robert Ivor Joh...