As partial evaluation gets more mature, it is now possible to use this program transformation technique to tackle realistic languages and real-size application programs. However, t...
—A mini scale helicopter poses a difficult control problem due to its complex dynamics. Compared to its full-size counterparts, the model helicopter exhibits not only increased s...
Herman Y. Sutarto, Agus Budiyono, Endra Joelianto,...
Abstract. The concurrent constraint pi-calculus (cc-pi-calculus) has been introduced as a model for concluding Service Level Agreements. The cc-pi calculus combines the synchronous...
The ability to inspect both packet headers and payloads to identify attack signatures makes network intrusion detection system (NIDS) a promising approach to protect Internet syste...
Given an arbitrary Petri net (PN) structure, which may have uncontrollable and unobservable transitions, the deadlock prevention procedure presented here determines a set of linear...
Marian V. Iordache, John O. Moody, Panos J. Antsak...