Sciweavers

1291 search results - page 194 / 259
» Optimally switched linear systems
Sort
View
RTA
2007
Springer
14 years 1 months ago
Intruders with Caps
In the analysis of cryptographic protocols, a treacherous set of terms is one from which an intruder can get access to what was intended to be secret, by adding on to the top of a ...
Siva Anantharaman, Paliath Narendran, Michaël...
SC
2005
ACM
14 years 1 months ago
How Well Can Simple Metrics Represent the Performance of HPC Applications?
In this paper, a systematic study of the effects of complexity of prediction methodology on its accuracy for a set of real applications on a variety of HPC systems is performed. R...
Laura Carrington, Michael Laurenzano, Allan Snavel...
LCTRTS
2001
Springer
14 years 7 days ago
ILP-based Instruction Scheduling for IA-64
The IA-64 architecture has been designed as a synthesis of VLIW and superscalar design principles. It incorporates typical functionality known from embedded processors as multiply...
Daniel Kästner, Sebastian Winkel
SAGA
2001
Springer
14 years 7 days ago
Yet Another Local Search Method for Constraint Solving
We propose a generic, domain-independent local search method called adaptive search for solving Constraint Satisfaction Problems (CSP). We design a new heuristics that takes advan...
Philippe Codognet, Daniel Diaz
AUTOMATICA
2004
138views more  AUTOMATICA 2004»
13 years 7 months ago
Decentralized overlapping control of a formation of unmanned aerial vehicles
Decentralized overlapping feedback laws are designed for a formation of unmanned aerial vehicles. The dynamic model of the formation with an information structure constraint in wh...
Dusan M. Stipanovic, Gökhan Inalhan, Rodney T...