Sciweavers

699 search results - page 27 / 140
» Computation of Interprocedural Control Dependence
Sort
View
CSREASAM
2006
13 years 9 months ago
Reinforcing Access Control Using Fuzzy Relation Equations
Current computer security systems are based on the premise that once a user presents valid credentials to the authentication system (e.g. valid ID and password), they are granted ...
Ali Berrached, André de Korvin
NIME
2005
Springer
139views Music» more  NIME 2005»
14 years 1 months ago
The Smart Controller Workbench
The Smart Controller is a portable hardware device that responds to input control voltage, OSC, and MIDI messages; producing output control voltage, OSC, and MIDI messages (depend...
Angelo Fraietta
INFOCOM
2007
IEEE
14 years 1 months ago
Discrete Power Control: Cooperative and Non-Cooperative Optimization
— We consider an uplink power control problem where each mobile wishes to maximize its throughput (which depends on the transmission powers of all mobiles) but has a constraint o...
Eitan Altman, Konstantin Avrachenkov, Gregory Mill...
PRDC
2008
IEEE
14 years 2 months ago
Indirect Control Path Analysis and Goal Coverage Strategies for Elaborating System Safety Goals in Composite Systems
Correctly specifying requirements for composite systems is essential to system safety, particularly in a distributed development environment. Goal-oriented requirements engineerin...
Jennifer Black, Philip Koopman
APIN
2002
80views more  APIN 2002»
13 years 7 months ago
Searching a Scalable Approach to Cerebellar Based Control
Decades of research into the structure and function of the cerebellum have led to a clear understanding of many of its cells, as well as how learning might take place. Furthermore...
Jan Peters, P. Patrick van der Smagt