Sciweavers

2206 search results - page 314 / 442
» On the power of coercion abstraction
Sort
View
CDC
2009
IEEE
103views Control Systems» more  CDC 2009»
14 years 2 months ago
Reduced-order predictive outage compensators for networked systems
Abstract— Control systems utilizing wireless sensor and actuator networks can be severely affected by the properties of the wireless links. Radio fading and interference may caus...
Erik Henriksson, Henrik Sandberg, Karl Henrik Joha...
CDC
2009
IEEE
143views Control Systems» more  CDC 2009»
14 years 2 months ago
Control interpretations of products in the Hopf algebra
Abstract— Families of differential operators, like those defining affine, generally nonlinear, control systems are known to have natural Hopf algebra structures. These provide ...
Matthias Kawski
IWOMP
2009
Springer
14 years 2 months ago
Dynamic Task and Data Placement over NUMA Architectures: An OpenMP Runtime Perspective
Abstract. Exploiting the full computational power of current hierarchical multiprocessor machines requires a very careful distribution of threads and data among the underlying non-...
François Broquedis, Nathalie Furmento, Bric...
SARA
2009
Springer
14 years 2 months ago
Light Algorithms for Maintaining Max-RPC During Search
Abstract. This article presents two new algorithms whose purpose is to maintain the Max-RPC domain filtering consistency during search with a minimal memory footprint and implemen...
Julien Vion, Romuald Debruyne
ASIACRYPT
2001
Springer
14 years 2 months ago
Threshold Cryptosystems Secure against Chosen-Ciphertext Attacks
Abstract. Semantic security against chosen-ciphertext attacks (INDCCA) is widely believed as the correct security level for public-key encryption scheme. On the other hand, it is o...
Pierre-Alain Fouque, David Pointcheval