Sciweavers

1737 search results - page 258 / 348
» Using Strategy Objectives for Network Security Analysis
Sort
View
HYBRID
1994
Springer
15 years 6 months ago
Symbolic Controller Synthesis for Discrete and Timed Systems
This paper presents algorithms for the symbolic synthesis of discrete and real-time controllers. At the semantic level the controller is synthesized by nding a winning strategy for...
Eugene Asarin, Oded Maler, Amir Pnueli
107
Voted
WWW
2009
ACM
16 years 3 months ago
Learning to tag
Social tagging provides valuable and crucial information for large-scale web image retrieval. It is ontology-free and easy to obtain; however, irrelevant tags frequently appear, a...
Lei Wu, Linjun Yang, Nenghai Yu, Xian-Sheng Hua
EGICE
2006
15 years 6 months ago
Combining Two Data Mining Methods for System Identification
System identification is an abductive task which is affected by several kinds of modeling assumptions and measurement errors. Therefore, instead of optimizing values of parameters ...
Sandro Saitta, Benny Raphael, Ian F. C. Smith
116
Voted
IPPS
2006
IEEE
15 years 8 months ago
An adaptive stabilization framework for distributed hash tables
Distributed Hash Tables (DHT) algorithms obtain good lookup performance bounds by using deterministic rules to organize peer nodes into an overlay network. To preserve the invaria...
Gabriel Ghinita, Yong Meng Teo
ICNP
1997
IEEE
15 years 6 months ago
Optimal Feedback Control for ABR Service in ATM
The e cient support of data tra c over ATM networks requires congestion control, whose objectives include maximizing throughput, minimizing switch bu er requirement, and attaining...
Paolo Narváez, Kai-Yeung Siu