Sciweavers

956 search results - page 121 / 192
» Slicing Objects Using System Dependence Graphs
Sort
View
HYBRID
1998
Springer
14 years 2 months ago
Formal Verification of Safety-Critical Hybrid Systems
This paper investigates how formal techniques can be used for the analysis and verification of hybrid systems [1,5,7,16] -- systems involving both discrete and continuous behavior....
Carolos Livadas, Nancy A. Lynch
GLOBECOM
2006
IEEE
14 years 4 months ago
Pessimism Is Mostly the Best for the Expanding Ring Search in Wireless Networks
— Global flooding and expanding ring search are two commonly used methods in search for an interested object in multi-hop wireless networks. While global flooding is simple, it...
Kui Wu, Hong-Chuan Yang, Fulu Li
ICAS
2009
IEEE
109views Robotics» more  ICAS 2009»
14 years 4 months ago
Ponder2: A Policy System for Autonomous Pervasive Environments
Policies form an important part of management and can be an effective means of implementing self-adaptation in pervasive systems. Most policy-based systems focus on large-scale ne...
Kevin P. Twidle, Naranker Dulay, Emil Lupu, Morris...
CDC
2010
IEEE
181views Control Systems» more  CDC 2010»
13 years 5 months ago
Relationship between power loss and network topology in power systems
This paper is concerned with studying how the minimum power loss in a power system is related to its network topology. The existing algorithms in the literature all exploit nonline...
Javad Lavaei, Steven H. Low
SIVP
2010
109views more  SIVP 2010»
13 years 4 months ago
System profiles in content-based image indexing and retrieval
In this paper, a novel study on system profiles and adaptation of parameters for end-users of content-based indexingandretrieval(CBIR)applicationsarepresented.The main objective of...
Esin Guldogan, Moncef Gabbouj