Sciweavers

5200 search results - page 285 / 1040
» Symbolic models for control systems
Sort
View
STTT
2008
134views more  STTT 2008»
13 years 9 months ago
Automated verification of access control policies using a SAT solver
Abstract. Managing access control policies in modern computer systems can be challenging and error-prone. Combining multiple disparate access policies can introduce unintended cons...
Graham Hughes, Tevfik Bultan
AUTOMATICA
2002
91views more  AUTOMATICA 2002»
13 years 9 months ago
Closed-loop identification with an unstable or nonminimum phase controller
In many practical cases, the identification of a system is done in closed loop with some controller. In this paper, we show that the internal stability of the resulting model, in ...
Benoît Codrons, Brian D. O. Anderson, Michel...
RTS
2010
90views more  RTS 2010»
13 years 8 months ago
A timeband framework for modelling real-time systems
Abstract Complex real-time systems, must integrate physical processes with digital control, human operation and organizational structures. New scientific foundations are required ...
Alan Burns, Ian J. Hayes
HYBRID
2007
Springer
14 years 3 months ago
Coupling from the Past in Hybrid Models for File Sharing Peer to Peer Systems
In this paper we show how file sharing peer to peer systems can be modeled by hybrid systems with a continuous part corresponding to a fluid limit of files and a discrete part c...
Bruno Gaujal, Florence Perronnin
IPPS
2003
IEEE
14 years 2 months ago
Trust Modeling for Peer-to-Peer Based Computing Systems
The peer-to-peer approach to design large-scale systems has significant benefits including scalability, low cost of ownership, robustness, and ability to provide site autonomy. ...
Farag Azzedin, Muthucumaru Maheswaran