Sciweavers

214 search results - page 8 / 43
» Neuro-fuzzy control based on the NEFCON-model: recent develo...
Sort
View
EOR
2006
86views more  EOR 2006»
13 years 8 months ago
Minimum-distance controlled perturbation methods for large-scale tabular data protection
National Statistical Agencies routinely release large amounts of tabular information. Prior to dissemination, tabular data needs to be processed to avoid the disclosure of individ...
Jordi Castro
ATAL
2004
Springer
14 years 1 months ago
Adaptive, Distributed Control of Constrained Multi-Agent Systems
Product Distribution (PD) theory was recently developed as a framework for analyzing and optimizing distributed systems. In this paper we demonstrate its use for adaptive distribu...
Stefan Bieniawski, David Wolpert
SECURWARE
2008
IEEE
14 years 2 months ago
Enhancing Trusted Platform Modules with Hardware-Based Virtualization Techniques
—We present the design of a trusted platform module (TPM) that supports hardware-based virtualization techniques. Our approach enables multiple virtual machines to use the comple...
Frederic Stumpf, Claudia Eckert
ESE
1998
131views Database» more  ESE 1998»
13 years 8 months ago
A Comparison of Tool-Based and Paper-Based Software Inspection
Software inspection is an e ective method of defect detection. Recent research activity has considered the development of tool support to further increase the e ciency and e ectiv...
F. MacDonald, J. Miller
ICFP
2010
ACM
13 years 9 months ago
The impact of higher-order state and control effects on local relational reasoning
Reasoning about program equivalence is one of the oldest problems in semantics. In recent years, useful techniques have been developed, based on bisimulations and logical relation...
Derek Dreyer, Georg Neis, Lars Birkedal