Sciweavers

8658 search results - page 152 / 1732
» Models of Command and Control
Sort
View
SIS
2008
13 years 10 months ago
An Access Control Model for Location based Services
In this paper we propose an access control model for use by a trusted middleware infrastructure, which is part of an architecture that supports the operation of Location Based Serv...
Cameron Ross Dunne, Thibault Candebat, David Gray
WSC
2001
13 years 10 months ago
Deterministic fluid models of congestion control in high-speed networks
Congestion control algorithms, such as TCP or the closelyrelated additive increase-multiplicative decrease algorithms, are extremely difficult to simulate on a large scale. The re...
Sanjay Shakkottai, R. Srikant
NIPS
1996
13 years 10 months ago
Exploiting Model Uncertainty Estimates for Safe Dynamic Control Learning
Model learning combined with dynamic programming has been shown to be e ective for learning control of continuous state dynamic systems. The simplest method assumes the learned mod...
Jeff G. Schneider
AUTOMATICA
2006
150views more  AUTOMATICA 2006»
13 years 9 months ago
Enlarging the terminal region of nonlinear model predictive control using the support vector machine method
In this paper, Receding Horizon Model Predictive Control (RHMPC) of nonlinear systems subject to input and state constraints is considered. We propose to estimate the terminal reg...
Chong Jin Ong, Dan Sui, Elmer G. Gilbert
IJNSEC
2010
145views more  IJNSEC 2010»
13 years 4 months ago
Formal Specification of Common Criteria Based Access Control Policy Model
One of the major threats that an enterprise Information system networks are facing today is the Insider threat. As part of the Insider Threat study, lack of an effective access co...
Manpreet Singh, Manjeet S. Patterh