Sciweavers

4307 search results - page 627 / 862
» Dynamic Spyware Analysis
Sort
View
ENGL
2007
81views more  ENGL 2007»
13 years 10 months ago
Computational Comparisons of GPC and NGPC Schemes
—In this paper the GPC and NGPC model predictive control techniques are applied to a typical plant and compared in terms of computational efficiency. The system identification an...
D. N. Rao, M. R. K. Murthy, D. N. Harshal, S. R. M...
JSS
2006
76views more  JSS 2006»
13 years 10 months ago
Performance evaluation of peer-to-peer Web caching systems
Peer-to-peer Web caching has attracted a great attention from the research community recently, and is one of the potential peer-topeer applications. In this paper, we systematical...
Weisong Shi, Yonggen Mao
KES
2006
Springer
13 years 10 months ago
A Framework for distributed knowledge management in autonomous logistic processes
The trends and recent changes in logistics lead to complex and partially conflicting requirements on logistic planning and control systems. Due to the lack of efficiency of curren...
Hagen Langer, Jan D. Gehrke, Joachim Hammer, Marti...
SIAMAM
2008
101views more  SIAMAM 2008»
13 years 10 months ago
Competitive Exclusion of Microbial Species for a Single Nutrient with Internal Storage
We study a chemostat model that describes competition between n microbial species for a single-limited resource based on storage. The model incorporates internal resource storage v...
Sze-Bi Hsu, Ting-Hao Hsu
SIAMSC
2008
146views more  SIAMSC 2008»
13 years 10 months ago
Long Time Numerical Solution of the Navier--Stokes Equations Based on a Sequential Regularization Formulation
Abstract. The sequential regularization method is a reformulation of the unsteady Navier-Stokes equations from the view point of constrained dynamical systems or approximate Helmho...
Ping Lin, Jian-Guo Liu, Xiliang Lu