Sciweavers

956 search results - page 121 / 192
» Slicing Objects Using System Dependence Graphs
Sort
View
HYBRID
1998
Springer
15 years 9 months ago
Formal Verification of Safety-Critical Hybrid Systems
This paper investigates how formal techniques can be used for the analysis and verification of hybrid systems [1,5,7,16] -- systems involving both discrete and continuous behavior....
Carolos Livadas, Nancy A. Lynch
GLOBECOM
2006
IEEE
15 years 10 months ago
Pessimism Is Mostly the Best for the Expanding Ring Search in Wireless Networks
— Global flooding and expanding ring search are two commonly used methods in search for an interested object in multi-hop wireless networks. While global flooding is simple, it...
Kui Wu, Hong-Chuan Yang, Fulu Li
ICAS
2009
IEEE
109views Robotics» more  ICAS 2009»
15 years 11 months ago
Ponder2: A Policy System for Autonomous Pervasive Environments
Policies form an important part of management and can be an effective means of implementing self-adaptation in pervasive systems. Most policy-based systems focus on large-scale ne...
Kevin P. Twidle, Naranker Dulay, Emil Lupu, Morris...
CDC
2010
IEEE
181views Control Systems» more  CDC 2010»
14 years 11 months ago
Relationship between power loss and network topology in power systems
This paper is concerned with studying how the minimum power loss in a power system is related to its network topology. The existing algorithms in the literature all exploit nonline...
Javad Lavaei, Steven H. Low
SIVP
2010
109views more  SIVP 2010»
14 years 11 months ago
System profiles in content-based image indexing and retrieval
In this paper, a novel study on system profiles and adaptation of parameters for end-users of content-based indexingandretrieval(CBIR)applicationsarepresented.The main objective of...
Esin Guldogan, Moncef Gabbouj