Sciweavers

217 search results - page 40 / 44
» System-Level Modeling and Verification: a Comprehensive Desi...
Sort
View
WSC
2000
15 years 1 months ago
Analyzing transformation-based simulation metamodels
We present a technique for analyzing a simulation metamodel that has been constructed using a variancestabilizing transformation. To compute a valid confidence interval for the ex...
Maria de los A. Irizarry, Michael E. Kuhl, Emily K...
HYBRID
2010
Springer
15 years 2 months ago
Receding horizon control for temporal logic specifications
In this paper, we describe a receding horizon scheme that satisfies a class of linear temporal logic specifications sufficient to describe a wide range of properties including saf...
Tichakorn Wongpiromsarn, Ufuk Topcu, Richard M. Mu...
MOBIHOC
2009
ACM
16 years 24 days ago
Characterizing the exit process of a non-saturated IEEE 802.11 wireless network
In this paper, we consider a non-saturated IEEE 802.11 based wireless network. We use a three-way fixed point to model the node behavior with Bernoulli packet arrivals and determi...
Punit Rathod, Onkar Dabeer, Abhay Karandikar, Anir...
VISUALIZATION
2003
IEEE
15 years 5 months ago
Visualizing Spatial and Temporal Variability in Coastal Observatories
In this paper, we describe a set of 3D and 4D visualization tools and techniques for CORIE, a complex environmental observation and forecasting system (EOFS) for the Columbia Rive...
Walter Jiménez, Wagner Toledo Corrêa,...
SIGSOFT
2002
ACM
16 years 1 months ago
Secure systems development based on the common criteria: the PalME project
Security is a very important issue in information processing, especially in open network environments like the Internet. The Common Criteria (CC) is the standard requirements cata...
Monika Vetterling, Guido Wimmel, Alexander K. Wi&s...