Sciweavers

148 search results - page 4 / 30
» Identification for the second-order systems based on the ste...
Sort
View
JOT
2010
153views more  JOT 2010»
13 years 7 months ago
Identification of System Software Components Using Clustering Approach
The selection of software architecture style is an important decision of design stage, and has a significant impact on various system quality attributes. To determine software arc...
Gholamreza Shahmohammadi, Saeed Jalili, Seyed Moha...
NDSS
2000
IEEE
14 years 1 months ago
A First Step Towards the Automatic Generation of Security Protocols
This paper describes automatic protocol generation (APG for short), a novel mechanism to generate security protocols automatically. With APG, the protocol designer inputs the spec...
Adrian Perrig, Dawn Xiaodong Song
CDC
2010
IEEE
150views Control Systems» more  CDC 2010»
13 years 3 months ago
Nonlinear hybrid system identification with kernel models
Abstract-- This paper focuses on the identification of nonlinear hybrid systems involving unknown nonlinear dynamics. The proposed method extends the framework of [1] by introducin...
Fabien Lauer, Gérard Bloch, René Vid...
TASE
2010
IEEE
13 years 3 months ago
Analytic Calculus of Response Time in Networked Automation Systems
--This paper presents a novel approach to evaluate the response time in networked automation systems (NAS) that use a client/server protocol. The developments introduced are derive...
Boussad Addad, Said Amari, Jean-Jacques Lesage
ACCV
1998
Springer
14 years 25 days ago
Integrating Faces and Fingerprints for Personal Identification
An automatic personal identification system based solely on fingerprints or faces is often not able to meet the system performance requirements. Face recognition is fast but not ex...
Lin Hong, Anil K. Jain