Sciweavers

2838 search results - page 478 / 568
» Verifying Controlled Components
Sort
View
CD
2005
Springer
14 years 2 months ago
A Decentralized Redeployment Algorithm for Improving the Availability of Distributed Systems
In distributed and mobile environments, the connections among the hosts on which a software system is running are often unstable. As a result of connectivity losses, the overall a...
Sam Malek, Marija Mikic-Rakic, Nenad Medvidovic
CIS
2005
Springer
14 years 2 months ago
Distance Protection of Compensated Transmission Line Using Computational Intelligence
A new approach for protection of transmission line including TCSC is presented in this paper. The proposed method includes application of Fuzzy Neural Network for distance relaying...
S. R. Samantaray, Pradipta K. Dash, Ganapati Panda...
FROCOS
2005
Springer
14 years 2 months ago
Sociable Interfaces
Interface formalisms are able to model both the input requirements and the output behavior of system components; they support both bottom-up component-based design, and top-down de...
Luca de Alfaro, Leandro Dias da Silva, Marco Faell...
GECCO
2005
Springer
220views Optimization» more  GECCO 2005»
14 years 2 months ago
Scale invariant pareto optimality: a meta--formalism for characterizing and modeling cooperativity in evolutionary systems
This article describes a mathematical framework for characterizing cooperativity in complex systems subject to evolutionary pressures. This framework uses three foundational compo...
Mark Fleischer
ISW
2005
Springer
14 years 2 months ago
Device-Enabled Authorization in the Grey-System
d Abstract) Lujo Bauer, Scott Garriss, Jonathan M. McCune, Michael K. Reiter, Jason Rouse, and Peter Rutenbar Carnegie Mellon University, Pittsburgh, Pennsylvania, USA We describe ...
Lujo Bauer, Scott Garriss, Jonathan M. McCune, Mic...