Sciweavers

1317 search results - page 216 / 264
» A new delay system approach to network-based control
Sort
View
MSR
2010
ACM
13 years 9 months ago
Identifying security bug reports via text mining: An industrial case study
-- A bug-tracking system such as Bugzilla contains bug reports (BRs) collected from various sources such as development teams, testing teams, and end users. When bug reporters subm...
Michael Gegick, Pete Rotella, Tao Xie
INFOCOM
2011
IEEE
12 years 11 months ago
Understanding robustness of mobile networks through temporal network measures
—The application of complex network theory to communication systems has led to several important results. Nonetheless, previous research has often neglected to take into account ...
Salvatore Scellato, Ilias Leontiadis, Cecilia Masc...
SDMW
2005
Springer
14 years 1 months ago
Metadata Management in Outsourced Encrypted Databases
Abstract. Database outsourcing is becoming increasingly popular introducing a new paradigm, called database-as-a-service, where a client’s database is stored at an external servi...
Ernesto Damiani, Sabrina De Capitani di Vimercati,...
WSC
2004
13 years 9 months ago
Air Cargo Operations Evaluation and Analysis through Simulation
This paper illustrates the use of simulation for evaluating and analyzing air cargo operations at one of the new stateof-the art cargo facilities at Toronto Pearson Airport. The e...
Aaron Luntala Nsakanda, Michel Turcotte, Moustapha...
AUTOMATICA
2007
70views more  AUTOMATICA 2007»
13 years 7 months ago
Squaring the circle: An algorithm for generating polyhedral invariant sets from ellipsoidal ones
This paper presents a new (geometrical) approach to the computation of polyhedral (robustly) positively invariant (PI) sets for general (possibly discontinuous) nonlinear discrete...
A. Alessio, Mircea Lazar, Alberto Bemporad, W. P. ...