Sciweavers

977 search results - page 79 / 196
» Soft Constraints for Security
Sort
View
CP
2005
Springer
15 years 3 months ago
Tree Decomposition with Function Filtering
Besides search, complete inference methods can also be used to solve soft constraint problems. Their main drawback is the high spatial complexity. To improve its practical usage, w...
Martí Sánchez, Javier Larrosa, Pedro...
RTSS
1997
IEEE
15 years 2 months ago
Exploiting skips in periodic tasks for enhancing aperiodic responsiveness
In certain real-time applications, ranging from multimedia to telecommunication systems, timing constraints can be more flexible than scheduling theory usually permits. For exampl...
Marco Caccamo, Giorgio C. Buttazzo
CONCUR
2005
Springer
15 years 11 hour ago
The Coarsest Congruence for Timed Automata with Deadlines Contained in Bisimulation
Abstract. Delaying the synchronization of actions may reveal some hidden behavior that would not happen if the synchronization met the specified deadlines. This precise phenomenon...
Pedro R. D'Argenio, Biniam Gebremichael
HIS
2003
14 years 11 months ago
Design of Transparent Mamdani Fuzzy Inference Systems
: In this paper, we propose a technique to design Fuzzy Inference Systems (FIS) of Mamdani type with transparency constraints. The technique is based on our Crisp Double Clustering...
Giovanna Castellano, Anna Maria Fanelli, Corrado M...
DT
2008
75views more  DT 2008»
14 years 10 months ago
Application Scenarios in Streaming-Oriented Embedded-System Design
In the past decade real-time embedded systems became more and more complex and pervasive. From the user perspective, these systems have stringent requirements regarding size, perfo...
Stefan Valentin Gheorghita, Twan Basten, Henk Corp...