Sciweavers

303 search results - page 19 / 61
» Context-Sensitive Call Control Using Constraints and Rules
Sort
View
CDC
2009
IEEE
122views Control Systems» more  CDC 2009»
13 years 11 months ago
Air traffic management with target windows: An approach using reachability
Abstract-- We present the applications of reachability methods and computational tools based on game theory to a problem in air traffic management. The use of such methods in air t...
Kostas Margellos, John Lygeros
ECML
2004
Springer
14 years 1 months ago
Learning to Fly Simple and Robust
We report on new experiments with machine learning in the reconstruction of human sub-cognitive skill. The particular problem considered is to generate a clone of a human pilot per...
Dorian Suc, Ivan Bratko, Claude Sammut
DASFAA
2010
IEEE
176views Database» more  DASFAA 2010»
13 years 8 months ago
Efficient Database-Driven Evaluation of Security Clearance for Federated Access Control of Dynamic XML Documents
Achieving data security over cooperating web services is becoming a reality, but existing XML access control architectures do not consider this federated service computing. In this...
Erwin Leonardi, Sourav S. Bhowmick, Mizuho Iwaihar...
SPLC
2008
13 years 9 months ago
Filtered Cartesian Flattening: An Approximation Technique for Optimally Selecting Features while Adhering to Resource Constraint
Software Product-lines (SPLs) use modular software components that can be reconfigured into different variants for different requirements sets. Feature modeling is a common method...
Jules White, B. Doughtery, Douglas C. Schmidt
GECCO
2006
Springer
133views Optimization» more  GECCO 2006»
13 years 11 months ago
A general coarse-graining framework for studying simultaneous inter-population constraints induced by evolutionary operations
The use of genotypic populations is necessary for adaptation in Evolutionary Algorithms. We use a technique called form-invariant commutation to study the immediate effect of evol...
Keki M. Burjorjee, Jordan B. Pollack