Sciweavers

742 search results - page 74 / 149
» Validating an Online Adaptive System Using SVDD
Sort
View
CSREASAM
2006
14 years 11 months ago
Reinforcing Access Control Using Fuzzy Relation Equations
Current computer security systems are based on the premise that once a user presents valid credentials to the authentication system (e.g. valid ID and password), they are granted ...
Ali Berrached, André de Korvin
FAC
2010
140views more  FAC 2010»
14 years 7 months ago
From a domain analysis to the specification and detection of code and design smells
Code and design smells are recurring design problems in software systems that must be identified to avoid their possible negative consequences on development and maintenance. Conse...
Naouel Moha, Yann-Gaël Guéhéneu...
CF
2004
ACM
15 years 3 months ago
Modeling service-based multimedia content adaptation in pervasive computing
Pervasive computing applications allow users to access information from anywhere while traveling and using variety of devices. Heterogeneity and limitation of resources involved i...
Girma Berhe, Lionel Brunie, Jean-Marc Pierson
JNS
2008
79views more  JNS 2008»
14 years 9 months ago
Singularly Perturbed Monotone Systems and an Application to Double Phosphorylation Cycles
The theory of monotone dynamical systems has been found very useful in the modeling of some gene, protein, and signaling networks. In monotone systems, every net feedback loop is p...
Liming Wang, Eduardo D. Sontag
ICRA
2009
IEEE
103views Robotics» more  ICRA 2009»
14 years 7 months ago
Prioritizing linear equality and inequality systems: Application to local motion planning for redundant robots
We present a novel method for prioritizing both linear equality and inequality systems and provide one algorithm for its resolution. This algorithm can be summarized as a sequence ...
Oussama Kanoun, Florent Lamiraux, Pierre-Brice Wie...