Sciweavers

2838 search results - page 249 / 568
» Verifying Controlled Components
Sort
View
QOFIS
2001
Springer
15 years 5 months ago
Traffic Handling in AQUILA QoS IP Network
The paper describes the traffic handling mechanisms implemented in the AQUILA pilot QoS IP network [10]. The AQUILA project enhances the DiffServ architecture concept [1,2,3] by ad...
A. Bak, Wojciech Burakowski, Fabio Ricciato, Stefa...
POPL
2000
ACM
15 years 5 months ago
A Type System for Expressive Security Policies
Certified code is a general mechanism for enforcing security properties. In this paradigm, untrusted mobile code carries annotations that allow a host to verify its trustworthine...
David Walker
ICCV
1999
IEEE
15 years 5 months ago
Specularities on Surfaces with Tangential Hairs or Grooves
Specularities on surfaces with tangential hairs or grooves are readily observable in nature. Examples of such phenomena are the arched or looped highlights observed on horses and ...
Rong Lu, Jan J. Koenderink, Astrid M. L. Kappers
ISCAS
1999
IEEE
100views Hardware» more  ISCAS 1999»
15 years 5 months ago
Reduced complexity, high performance digital delta-sigma modulator for fractional-N frequency synthesis
This paper presents the design consideration of high order digital AZ modulators used as modulus controller for fractional-N frequency synthesizer. A third-order MASH structure (M...
Lizhong Sun, Thierry Lepley, Franck Nozahic, Amaud...
RTCSA
1997
IEEE
15 years 5 months ago
Behavior verification of hybrid real-time requirements by qualitative formalism
Although modern control theories have been successfully applied to solve a variety of problems, they are often mathematically and physically too specific to describe and analyze t...
Jang-Soo Lee, Sung Deok Cha