Sciweavers

1317 search results - page 154 / 264
» A new delay system approach to network-based control
Sort
View
CDC
2008
IEEE
124views Control Systems» more  CDC 2008»
14 years 3 months ago
A passive 2DOF walker: Finding gait cycles using virtual holonomic constraints
— A planar compass-like biped on a shallow slope is the simplest model of a passive walker. It is a two-degrees-offreedom impulsive mechanical system known to possess periodic so...
Leonid B. Freidovich, Uwe Mettin, Anton S. Shiriae...
CDC
2008
IEEE
124views Control Systems» more  CDC 2008»
14 years 3 months ago
A proximal center-based decomposition method for multi-agent convex optimization
— In this paper we develop a new dual decomposition method for optimizing a sum of convex objective functions corresponding to multiple agents but with coupled constraints. In ou...
Ion Necoara, Johan A. K. Suykens
DEON
2008
Springer
13 years 11 months ago
Specifying Intrusion Detection and Reaction Policies: An Application of Deontic Logic
The security policy of an information system may include a wide range of different requirements. The literature has primarily focused on access and information flow control require...
Nora Cuppens-Boulahia, Frédéric Cupp...
AUTONOMICS
2008
ACM
13 years 11 months ago
Design of a fence surveillance system based on wireless sensor networks
In this paper, we present a real application system based on wireless sensor network (WSN) for fence surveillance which is implemented on our development platform for WSN, called ...
Youngsoo Kim, Jonggu Kang, Daeyoung Kim, Eunjo Kim...
STORAGESS
2006
ACM
14 years 3 months ago
Scalable security for large, high performance storage systems
New designs for petabyte-scale storage systems are now capable of transferring hundreds of gigabytes of data per second, but lack strong security. We propose a scalable and effici...
Andrew W. Leung, Ethan L. Miller