Sciweavers

2838 search results - page 141 / 568
» Verifying Controlled Components
Sort
View
94
Voted
CDC
2009
IEEE
126views Control Systems» more  CDC 2009»
15 years 1 months ago
Reachability analysis for a class of Petri nets
In this paper, we study the reachability problem for the class of (strictly) monotone Petri nets that we define based on algebraic conditions. More specifically, given a (strictly)...
Yu Ru, Christoforos N. Hadjicostis
111
Voted
CSREASAM
2006
15 years 2 months ago
Reinforcing Access Control Using Fuzzy Relation Equations
Current computer security systems are based on the premise that once a user presents valid credentials to the authentication system (e.g. valid ID and password), they are granted ...
Ali Berrached, André de Korvin
91
Voted
IROS
2006
IEEE
111views Robotics» more  IROS 2006»
15 years 6 months ago
A Delay-tolerant, Potential field-based, Network Implementation of an Integrated Navigation System
Abstract—Network controllers (NCs) are devices that are capable of converting dynamic, spatially extended, and functionally specialized modules into a taskable goal-oriented grou...
Rachana Ashok Gupta, Ahmad A. Masoud, Mo-Yuen Chow
JCP
2006
106views more  JCP 2006»
15 years 22 days ago
Using Firewalls to Enforce Enterprise-wide Policies over Standard Client-Server Interactions
We propose and evaluate a novel framework for enforcing global coordination and control policies over message passing software components in enterprise computing environments. This...
Tuan Phan, Zhijun He, Thu D. Nguyen
96
Voted
AUTOMATICA
2005
91views more  AUTOMATICA 2005»
15 years 20 days ago
Lyapunov-based continuous-time nonlinear controller redesign for sampled-data implementation
: Given a continuous-time controller and a Lyapunov function that shows global asymptotic stability for the closed loop system, we provide several results for modification of the c...
Dragan Nesic, Lars Grüne