— There are many communication imperfections in networked control systems (NCSs) such as varying sampling/transmission intervals, varying delays, possible packet loss, communicat...
W. P. M. H. Heemels, Dragan Nesic, Andrew R. Teel,...
: Constraint Shape Model is proposed to extract facial feature using two different search methods for contour points and control points individually. In the proposed algorithm, sal...
Model tracing and constraint-based modeling are two prominent paradigms on which intelligent tutoring systems (ITSs) have been based. We Kodaganallur, Weitz and Rosenthal (2005), h...
Viswanathan Kodaganallur, Rob R. Weitz, David Rose...
— The concept of Cumulated Anomaly (CA), which describes a new type of database anomalies, is addressed. A typical CA intrusion is that when a user who is authorized to modify da...