Sciweavers

8658 search results - page 219 / 1732
» Models of Command and Control
Sort
View
INAP
2001
Springer
15 years 6 months ago
Content-based Management of Document Access Control
Three different security models have been advocated to determine the access rights to documents in a network of computers; DAC, MLS, and RBAC. Each of these models has its strengt...
Edgar Weippl, Ismail Khalil Ibrahim, Werner Winiwa...
CDC
2009
IEEE
136views Control Systems» more  CDC 2009»
15 years 3 months ago
Refined instrumental variable methods for identifying hammerstein models operating in closed loop
This article presents an instrumental variable method dedicated to non-linear Hammerstein systems operating in closed loop. The linear process is a Box
Vincent Laurain, Marion Gilson, Hugues Garnier
APPML
2008
75views more  APPML 2008»
15 years 2 months ago
Maximum principle for a size-structured model of forest and carbon sequestration management
The paper analyzes nonlinear optimal control of integral
Natali Hritonenko, Yuri Yatsenko, Renan-Ulrich Goe...
JACM
2002
87views more  JACM 2002»
15 years 2 months ago
Understanding TCP Vegas: a duality model
We view congestion control as a distributed primal
Steven H. Low, Larry L. Peterson, Limin Wang
QUESTA
1998
124views more  QUESTA 1998»
15 years 2 months ago
Structural results for the control of queueing systems using event-based dynamic programming
In this paper we study monotonicity results for optimal policies of various queueing and resource sharing models. The standard approach is to propagate, for each specific model, ...
Ger Koole