Sciweavers

3979 search results - page 27 / 796
» Wild control operators
Sort
View
WISA
2007
Springer
15 years 3 months ago
A Compositional Multiple Policies Operating System Security Model
Multilevel security policies aim at only confidentiality assurance, with less consideration on integrity assurance and weakness in expressing channel control policies. Besides, the...
Lei Xia, Wei Huang, Hao Huang
INFOCOM
2003
IEEE
15 years 3 months ago
A new TCP/AQM for Stable Operation in Fast Networks
—This paper is aimed at designing a congestion control system that scales gracefully with network capacity, providing high utilization, low queueing delay, dynamic stability, and...
Fernando Paganini, Zhikui Wang, Steven H. Low, Joh...
AIMS
2008
Springer
15 years 4 months ago
A Theory of Closure Operators
We explore how fixed-point operators can be designed to interact and be composed to form autonomic control mechanisms. We depart from the idea that an operator is idempotent only ...
Alva L. Couch, Marc Chiarini
AIPS
2006
14 years 11 months ago
Explanation-Based Acquisition of Planning Operators
Classical planning algorithms require that their operators be simple in order for planning to be tractable. However, the complexities of real world domains suggest that, in order ...
Geoffrey Levine, Gerald DeJong
SIAMCO
2010
114views more  SIAMCO 2010»
14 years 4 months ago
Discrete Carleman Estimates for Elliptic Operators in Arbitrary Dimension and Applications
In arbitrary dimension, we consider the semi-discrete elliptic operator -2 t + AM , where AM is a finite difference approximation of the operator - x((x) x). For this operator we d...
Franck Boyer, Florence Hubert, Jérôme...