Sciweavers

8658 search results - page 100 / 1732
» Models of Command and Control
Sort
View
IFIP
2010
Springer
13 years 2 months ago
A Formal Analysis of Authentication in the TPM
The Trusted Platform Module (TPM) is a hardware chip designed to enable computers to achieve a greater level of security than is possible in software alone. To this end, the TPM pr...
Stéphanie Delaune, Steve Kremer, Mark Dermo...
TSE
2002
83views more  TSE 2002»
13 years 7 months ago
Optimum Control Limits for Employing Statistical Process Control in Software Process
There is an increased interest in using control charts for monitoring and improving software processes, particularly quality control processes like reviews and testing. In a contro...
Pankaj Jalote, Ashish Saxena
ICARCV
2006
IEEE
148views Robotics» more  ICARCV 2006»
14 years 2 months ago
Switched Linear Control of a Model Helicopter
—A mini scale helicopter poses a difficult control problem due to its complex dynamics. Compared to its full-size counterparts, the model helicopter exhibits not only increased s...
Herman Y. Sutarto, Agus Budiyono, Endra Joelianto,...
WSC
1997
13 years 9 months ago
A Java Based System for Specifying Hierarchical Control Flow Graph Models
The portion of the Hierarchical Modeling And Simulation System-Java (HiMASS-j) used for specifying Hierarchical Control Flow Graph (HCFG) Models is described. The specification o...
Thorsten Daum, Robert G. Sargent
SIGCOMM
1991
ACM
13 years 11 months ago
A Control-Theoretic Approach to Flow Control
This paper presents a control-theoretic approach to reactive flow control in networks that do not reserve bandwidth. We assume a round-robin-like queue service discipline in the o...
Srinivasan Keshav