Sciweavers

1821 search results - page 337 / 365
» Security-Aware Program Transformations
Sort
View
AUTOMATICA
2005
115views more  AUTOMATICA 2005»
13 years 8 months ago
Robust constrained predictive control using comparison model
This paper proposes a quadratic programming (QP) approach to robust model predictive control (MPC) for constrained linear systems having both model uncertainties and bounded distu...
Hiroaki Fukushima, Robert R. Bitmead
CG
2005
Springer
13 years 8 months ago
Recognition and beautification of multi-stroke symbols in digital ink
Sketch-based user interfaces provide a more direct and convenient way for interacting with computers, especially for performing graphical tasks. Most computer programs provide a m...
Heloise Hwawen Hse, A. Richard Newton
ASC
2004
13 years 8 months ago
Evaluation of services using a fuzzy analytic hierarchy process
This paper proposes a new approach for tackling the uncertainty and imprecision of the service evaluation process. Identifying suitable service offers, evaluating the offers and c...
Ludmil Mikhailov, Petco E. Tsvetinov
SAC
2008
ACM
13 years 8 months ago
UML-based design test generation
In this paper we investigate and propose a fully automated technique to perform conformance checking of Java implementations against UML class diagrams. In our approach, we reused...
Waldemar Pires, João Brunet, Franklin Ramal...
IEEECIT
2010
IEEE
13 years 7 months ago
Superblock-Based Source Code Optimizations for WCET Reduction
—Superblocks represent regions in a program code that consist of multiple basic blocks. Compilers benefit from this structure since it enables optimization across block boundari...
Paul Lokuciejewski, Timon Kelter, Peter Marwedel