Sciweavers

453 search results - page 66 / 91
» Using Symbolic Simulation for Bounded Property Checking
Sort
View
IJSYSC
2006
127views more  IJSYSC 2006»
14 years 11 months ago
Backlash compensation of nonlinear systems using fuzzy logic
: A backlash compensator is designed for nonlinear systems using the fuzzy logic. The classification property of fuzzy logic systems makes them a natural candidate for the rejectio...
Jun Oh Jang, Gi Joon Jeon
HAPTICS
2008
IEEE
15 years 6 months ago
Using Vibration Patterns to Provide Impact Position Information in Haptic Manipulation of Virtual Objects
While standard closed haptic control loop used in haptic simulation of rigid bodies are bounded to low frequency force restitution, event-based or open-loop haptic, by superimposin...
Jean Sreng, Anatole Lécuyer, Claude Andriot
CMS
2006
175views Communications» more  CMS 2006»
15 years 1 months ago
Attack Graph Based Evaluation of Network Security
Abstract. The perspective directions in evaluating network security are simulating possible malefactor's actions, building the representation of these actions as attack graphs...
Igor V. Kotenko, Mikhail Stepashkin
AAAI
2006
15 years 1 months ago
Weighted Constraint Satisfaction with Set Variables
Set variables are ubiquitous in modeling (soft) constraint problems, but efforts on practical consistency algorithms for Weighted Constraint Satisfaction Problems (WCSPs) have onl...
J. H. M. Lee, C. F. K. Siu
FMSD
2006
131views more  FMSD 2006»
14 years 11 months ago
Specification and analysis of the AER/NCA active network protocol suite in Real-Time Maude
This paper describes the application of the Real-Time Maude tool and the Maude formal methodology to the specification and analysis of the AER/NCA suite of active network multicast...
Peter Csaba Ölveczky, José Meseguer, C...