Sciweavers

5200 search results - page 220 / 1040
» Symbolic models for control systems
Sort
View
SP
2007
IEEE
113views Security Privacy» more  SP 2007»
14 years 3 months ago
Usable Mandatory Integrity Protection for Operating Systems
Existing mandatory access control systems for operating systems are difficult to use. We identify several principles for designing usable access control systems and introduce the...
Ninghui Li, Ziqing Mao, Hong Chen
CDC
2009
IEEE
122views Control Systems» more  CDC 2009»
14 years 1 months ago
Optimal mistuning for improved stability of vehicular platoons
— We consider a decentralized bidirectional control of a platoon of N identical vehicles moving in a straight line. Such problems are known to suffer from poor stability margin a...
Prabir Barooah, Prashant G. Mehta
CDC
2008
IEEE
14 years 3 months ago
On stability in the presence of analog erasure channels
— Consider a discrete-time networked control scheme, in which the controller has direct access to noisy measurements of the plant’s output, but the controller and the actuator ...
Vijay Gupta, Nuno C. Martins
OWLED
2008
13 years 10 months ago
Managing Change: An Ontology Version Control System
In this paper we present the basic requirements and initial design of a system which manages and facilitates changes to an OWL ontology in a multi-editor environment. This system u...
Timothy Redmond, Michael Smith, Nick Drummond, Tan...
SAC
2005
ACM
14 years 2 months ago
An attribute-based access matrix model
In traditional access control models like MAC, DAC, and RBAC, authorization decisions are determined according to identities of subjects and objects, which are authenticated by a ...
Xinwen Zhang, Yingjiu Li, Divya Nalla