Abstract. Managing access control policies in modern computer systems can be challenging and error-prone. Combining multiple disparate access policies can introduce unintended cons...
In many practical cases, the identification of a system is done in closed loop with some controller. In this paper, we show that the internal stability of the resulting model, in ...
Abstract Complex real-time systems, must integrate physical processes with digital control, human operation and organizational structures. New scientific foundations are required ...
In this paper we show how file sharing peer to peer systems can be modeled by hybrid systems with a continuous part corresponding to a fluid limit of files and a discrete part c...
The peer-to-peer approach to design large-scale systems has significant benefits including scalability, low cost of ownership, robustness, and ability to provide site autonomy. ...