Sciweavers

361 search results - page 34 / 73
» A Vector Model of Trust for Developing Trustworthy Systems
Sort
View
AUTOMATICA
2006
94views more  AUTOMATICA 2006»
13 years 8 months ago
Subspace identification for FDI in systems with non-uniformly sampled multirate data
This paper proposes a novel subspace approach towards direct identification of a residual model for fault detection and isolation (FDI) in a system with non-uniformly sampled mult...
Weihua Li, Zhengang Han, Sirish L. Shah
CORR
2010
Springer
149views Education» more  CORR 2010»
13 years 8 months ago
Using Rough Set and Support Vector Machine for Network Intrusion Detection
The main function of IDS (Intrusion Detection System) is to protect the system, analyze and predict the behaviors of users. Then these behaviors will be considered an attack or a ...
Rung Ching Chen, Kai-Fan Cheng, Chia-Fen Hsieh
CAISE
2008
Springer
13 years 10 months ago
Extended Kaos to Support Variability for Goal Oriented Requirements Reuse
This work is done as part of the Tacos project1 whose aims is to define a component-based approach to specify trustworthy systems from the requirements phase to the specification p...
Farida Semmak, Christophe Gnaho, Régine Lal...
TSP
2008
121views more  TSP 2008»
13 years 8 months ago
Stochastic Analysis of the LMS Algorithm for System Identification With Subspace Inputs
This paper studies the behavior of the low-rank least mean squares (LMS) adaptive algorithm for the general case in which the input transformation may not capture the exact input s...
Neil J. Bershad, José Carlos M. Bermudez, J...
FPGA
2008
ACM
133views FPGA» more  FPGA 2008»
13 years 10 months ago
Vector processing as a soft-core CPU accelerator
The currently accepted method of accelerating applications in FPGA soft processor systems is to design a custom hardware accelerator. This paper suggests the alternative approach ...
Jason Yu, Guy Lemieux, Christopher Eagleston