Sciweavers

1407 search results - page 168 / 282
» Systems Theory Model for Information Security
Sort
View
ICRA
1999
IEEE
133views Robotics» more  ICRA 1999»
14 years 19 days ago
Control of Flexible-Manufacturing Workcells Using Extended Moore Automata
The modeling and control flexible-manufacturing workcells (FMCs) has generally been performed in a hierarchical structure, where at the highest level they have been modeled as dis...
A. Ramírez, C. Sriskandarajah, Beno Benhabi...
CCE
2006
13 years 8 months ago
Sensitivity analysis of differential-algebraic equations and partial differential equations
Sensitivity analysis generates essential information for model development, design optimization, parameter estimation, optimal control, model reduction and experimental design. In...
Linda R. Petzold, Shengtai Li, Yang Cao, Radu Serb...
IUI
2010
ACM
14 years 1 months ago
Towards a reputation-based model of social web search
While web search tasks are often inherently collaborative in nature, many search engines do not explicitly support collaboration during search. In this paper, we describe HeyStaks...
Kevin KcNally, Michael P. O'Mahony, Barry Smyth, M...
ECMDAFA
2010
Springer
138views Hardware» more  ECMDAFA 2010»
13 years 6 months ago
A UML 2.0 Profile to Model Block Cipher Algorithms
Abstract. Current mobile digital communication systems must implement rigorous operations to guarantee high levels of confidentiality and integrity during transmission of critical ...
Tomás Balderas-Contreras, Gustavo Rodr&iacu...
OOPSLA
2005
Springer
14 years 1 months ago
A software product line architecture for distributed real-time and embedded systems: a separation of concerns approach
This paper presents a separation of concerns approach to solve the tangling problem of functional and Quality of Service (QoS) concerns in traditional Component-based Software Eng...
Shih-Hsi Liu