Sciweavers

3979 search results - page 148 / 796
» Wild control operators
Sort
View
SP
1996
IEEE
15 years 2 months ago
View-Based Access Control with High Assurance
View-based access control enables content-based and context-based security, as opposed to container-based security provided in operating systems. However, view-based access contro...
Xiaolei Qian
ICALP
2000
Springer
15 years 1 months ago
Parallel Machine Scheduling Problems with Controllable Processing Times
We consider the problem of scheduling n independent jobs on m identical machines that operate in parallel. Each job has a controllable processing time. The fact that the jobs have...
Klaus Jansen, Monaldo Mastrolilli
DFT
2008
IEEE
151views VLSI» more  DFT 2008»
14 years 12 months ago
Design and Evaluation of a Timestamp-Based Concurrent Error Detection Method (CED) in a Modern Microprocessor Controller
This paper presents a concurrent error detection technique for the control logic of a modern microprocessor. Our method is based on execution time prediction for each instruction ...
Michail Maniatakos, Naghmeh Karimi, Yiorgos Makris...
JNW
2007
88views more  JNW 2007»
14 years 10 months ago
Integrated Proactive Admission Control Technique For both UDP And TCP Traffic Flows
—Real time traffic adopting UDP at the transport layer needs some quality of service. It is offered through an admission control scheme. This paper adopts one such scheme which i...
Lakshmanan Senthilkumar, Venkadachalam Sankaranara...
TSMC
2008
140views more  TSMC 2008»
14 years 10 months ago
Adaptive Feedback Control by Constrained Approximate Dynamic Programming
A constrained approximate dynamic programming (ADP) approach is presented for designing adaptive neural network (NN) controllers with closed-loop stability and performance guarante...
S. Ferrari, J. E. Steck, R. Chandramohan