Sciweavers

576 search results - page 42 / 116
» Approximate controllability of a reaction-diffusion system
Sort
View
FOSSACS
2005
Springer
14 years 3 months ago
History-Based Access Control with Local Policies
Abstract. An extension of the λ-calculus is proposed, to study historybased access control. It allows for security policies with a possibly nested, local scope. We define a type ...
Massimo Bartoletti, Pierpaolo Degano, Gian Luigi F...
ESOP
2003
Springer
14 years 3 months ago
Using Controller-Synthesis Techniques to Build Property-Enforcing Layers
In complex systems, like robot plants, applications are built on top of a set of components, or devices. Each of them has particular individual constraints, and there are also log...
Karine Altisen, Aurélie Clodic, Florence Ma...
ICRA
2000
IEEE
102views Robotics» more  ICRA 2000»
14 years 2 months ago
Evaluating Control Modes for Constrained Robotic Surgery
Minimally invasive surgery (MIS) constrains instrument motions to 4 DOF by precluding lateral motion at the incision. Robotic MIS systems can interpose arbitrary mappings between ...
Fuji Lai, Robert D. Howe
ENTCS
2007
98views more  ENTCS 2007»
13 years 9 months ago
Evaluating Complex MAC Protocols for Sensor Networks with APMC
In this paper we present an analysis of a MAC (Medium Access Control) protocol for wireless sensor networks. The purpose of this protocol is to manage wireless media access by con...
Michaël Cadilhac, Thomas Hérault, Rich...
CDC
2009
IEEE
166views Control Systems» more  CDC 2009»
14 years 2 months ago
Idempotent method for dynamic games and complexity reduction in min-max expansions
— In recent years, idempotent methods (specifically, max-plus methods) have been developed for solution of nonlinear control problems. It was thought that idempotent linearity o...
William M. McEneaney