Sciweavers

1791 search results - page 56 / 359
» Behavioral Operations
Sort
View
DANCE
2002
IEEE
15 years 7 months ago
Developing Dynamic Security Policies
In this paper we define and provide a general construction for a class of policies we call dynamic policies. In most existing systems, policies are implemented and enforced by ch...
Prasad Naldurg, Roy H. Campbell, M. Dennis Mickuna...
123
Voted
DAC
1994
ACM
15 years 6 months ago
Performance Analysis and Optimization of Schedules for Conditional and Loop-Intensive Specifications
This paper presents a new method,based on Markov chain analysis, to evaluate the performance of schedules of behavioral specifications. The proposed performance measure is the expe...
Subhrajit Bhattacharya, Sujit Dey, Franc Brglez
98
Voted
ICARIS
2004
Springer
15 years 8 months ago
Negative Selection Algorithm for Aircraft Fault Detection
We investigated a real-valued Negative Selection Algorithm (NSA) for fault detection in man-in-the-loop aircraft operation. The detection algorithm uses body-axes angular rate sens...
D. Dasgupta, K. KrishnaKumar, D. Wong, M. Berry
140
Voted
ISCAS
2006
IEEE
119views Hardware» more  ISCAS 2006»
15 years 8 months ago
Scheduling and binding for low gate leakage nanoCMOS datapath circuit synthesis
In this paper we present two polynomial time-complexity heuristic algorithms for optimization of gate-oxide leakage (tunneling current) during behavioral synthesis through simulta...
Saraju P. Mohanty, Elias Kougianos, Ramakrishna Ve...
129
Voted
LISA
2004
15 years 4 months ago
Experience in Implementing an HTTP Service Closure
One ideal of configuration management is to specify only desired behavior in a high-level language, while an automatic configuration management system assures that behavior on an ...
Steven Schwartzberg, Alva L. Couch