Sciweavers

931 search results - page 79 / 187
» Controlled Experimentation with Agents - Models and Implemen...
Sort
View
MMMACNS
2005
Springer
14 years 2 months ago
A Modal Logic for Role-Based Access Control
Making correct access-control decisions is central to security, which in turn requires accounting correctly for the identity, credentials, roles, authority, and privileges of users...
Thumrongsak Kosiyatrakul, Susan Older, Shiu-Kai Ch...
GECCO
2007
Springer
172views Optimization» more  GECCO 2007»
14 years 2 months ago
A simulation of evolved autotrophic reproduction
In this experiment we evolve reproductive behaviors for a simulated vehicle. Future work will employ the resulting behaviors to populate a simulated ecosystem. Categories and Subj...
Correy Allen Kowall, Brian J. Krent
TROB
2008
128views more  TROB 2008»
13 years 8 months ago
Convergence-Preserving Switching for Topology-Dependent Decentralized Systems
Abstract-- Stability analysis of decentralized control mechanisms for networked, coordinating systems has generally focused on specific controller implementations, such as nearest ...
Brian Shucker, Todd D. Murphey, John K. Bennett
GLVLSI
2009
IEEE
186views VLSI» more  GLVLSI 2009»
14 years 3 months ago
Bitmask-based control word compression for NISC architectures
Implementing a custom hardware is not always feasible due to cost and time considerations. No instruction set computer (NISC) architecture is one of the promising direction to des...
Chetan Murthy, Prabhat Mishra
DAC
2006
ACM
14 years 9 months ago
Rapid estimation of control delay from high-level specifications
We address the problem of estimating controller delay from high-level specifications during behavioral synthesis. Typically, the critical path of a synthesised behavioral design g...
Gagan Raj Gupta, Madhur Gupta, Preeti Ranjan Panda