Sciweavers

2838 search results - page 140 / 568
» Verifying Controlled Components
Sort
View
KIVS
2009
Springer
14 years 4 months ago
A Middleware for the Controlled Information Exchange Between Online Games and Internet Applications
Multiplayer Online Games (MOGs) are a thriving market leading to a multiplicity of game related internet applications. Enabling information exchange between games and these applica...
Sonja Bergsträsser, Tomas Hildebrandt, Christ...
ICC
2007
IEEE
118views Communications» more  ICC 2007»
14 years 2 months ago
Efficient Group Management For Inter-PN Access Control
This paper presents an architecture for resource sharing in Personal Networks (PNs). Resources are not necessarily in the same authentication domain and the group that uses them is...
Ahmad Ahmad, Khaled Masmoudi, Hossam Afifi
FM
2008
Springer
184views Formal Methods» more  FM 2008»
13 years 12 months ago
Safe and Reliable Metro Platform Screen Doors Control/Command Systems
In this article we would like to present some recent applications of the B formal method to the development of safety critical system. These SIL3/SIL41 compliant systems have their...
Thierry Lecomte
EUSFLAT
2001
144views Fuzzy Logic» more  EUSFLAT 2001»
13 years 11 months ago
Adaptive torque control using a connectionist reinforcement learning agent
The correction of angular misalignment between mating components is a fundamental requirement for their successful assembly. In this paper we present how a learning agent based on...
Lorenzo Brignone, Martin Howarth, S. Sivayoganatha...
DAS
2006
Springer
14 years 2 months ago
Finding the Best-Fit Bounding-Boxes
The bounding-box of a geometric shape in 2D is the rectangle with the smallest area in a given orientation (usually upright) that complete contains the shape. The best-fit bounding...
Bo Yuan, Leong Kwoh, Chew Lim Tan