Sciweavers

5544 search results - page 59 / 1109
» Three Inadequate Models
Sort
View
SCS
2004
13 years 9 months ago
Complex Reactive Real Time Systems and the Safety Case
Complex reactive real time systems are systems of systems that interact with the external world to perform selections of tasks in real time. They may be required to carry out sele...
Gordon R. Stone
CORR
2006
Springer
114views Education» more  CORR 2006»
13 years 7 months ago
Peer to Peer Networks for Defense Against Internet Worms
Abstract-- Internet worms, which spread in computer networks without human mediation, pose a severe threat to computer systems today. The rate of propagation of worms has been meas...
Srinivas Shakkottai, R. Srikant
IEEECIT
2010
IEEE
13 years 6 months ago
Research on PID Control Algorithm of BP Network based on Two Axis Digital Control Turntable
under the research context of two axis digital control turntable, this paper has set up a mathematical model of control system of turntables. Proceeding from such model, it has ma...
Jie Hao, Wenxiang Zhang, Mingqing Ling
SYNTHESE
2010
68views more  SYNTHESE 2010»
13 years 6 months ago
Informational versus functional theories of scientific representation
Recent work in the philosophy of science has generated an apparent conflict between theories attempting to explicate the nature of scientific representation. On one side, there are...
Anjan Chakravartty
TWC
2010
13 years 2 months ago
On the Efficacy of Frequency Hopping in Coping with Jamming Attacks in 802.11 Networks
Abstract--Frequency hopping (FH) has been the most popularly considered approach for alleviating the effects of jamming attacks. We re-examine, the efficacy of FH based on both exp...
Konstantinos Pelechrinis, Christos Koufogiannakis,...