Sciweavers

10797 search results - page 1921 / 2160
» Robust control applications
Sort
View
IWQOS
2001
Springer
15 years 9 months ago
Differentiated Services over Shared Media
The growing use of multimedia communication applications with specific bandwidth and real time delivery requirements has created the need for a new Internet in which traditional be...
Pascal Anelli, Gwendal Le Grand
KI
2001
Springer
15 years 9 months ago
Belief Update in the pGOLOG Framework
High-level controllers that operate robots in dynamic, uncertain domains are concerned with at least two reasoning tasks dealing with the effects of noisy sensors and effectors: T...
Henrik Grosskreutz, Gerhard Lakemeyer
PADL
2001
Springer
15 years 9 months ago
Specifying Authentication Protocols Using Rewriting and Strategies
Abstract. Programming with rewrite rules and strategies has been already used for describing several computational logics. This paper describes the way the Needham-Schroeder Public...
Horatiu Cirstea
RE
2001
Springer
15 years 9 months ago
Deriving Safety Requirements Using Scenarios
Elicitation of requirements for safety critical aeroengine control systems is dependent on the capture of core design intent and the systematic derivation of requirements addressi...
Karen Allenby, Tim Kelly
VLDB
2001
ACM
93views Database» more  VLDB 2001»
15 years 9 months ago
Transaction Timestamping in (Temporal) Databases
Many database applications need accountability and trace-ability that necessitate retaining previous database states. For a transaction-time database supporting this, the choice o...
Christian S. Jensen, David B. Lomet
« Prev « First page 1921 / 2160 Last » Next »