Sciweavers

3979 search results - page 4 / 796
» Wild control operators
Sort
View
WWW
2005
ACM
14 years 7 months ago
Describing namespaces with GRDDL
Describing XML Namespaces is an open issue for many users of XML technologies, and even though namespaces are one of the foundations of XML, there is no generally accepted and wid...
Erik Wilde
CIMCA
2005
IEEE
14 years 21 days ago
Access Control for Shared Resources
Access control for shared resources is a complex and challenging task, in particular if the access control policy should be able to cope with different kind of sharing and collabo...
Erik Wilde, Nick Nabholz
RTSS
2002
IEEE
13 years 12 months ago
Cost and Benefit of Separate Address Spaces in Real-Time Operating Systems
Frank Mehnert, Michael Hohmuth, Hermann Härti...
NSDI
2008
13 years 9 months ago
Measurements and Mitigation of Peer-to-Peer-based Botnets: A Case Study on Storm Worm
Botnets, i.e., networks of compromised machines under a common control infrastructure, are commonly controlled by an attacker with the help of a central server: all compromised ma...
Thorsten Holz, Moritz Steiner, Frederic Dahl, Erns...
CDC
2010
IEEE
119views Control Systems» more  CDC 2010»
13 years 2 months ago
Combining extremum seeking control and tracking control for high-performance CVT operation
The control design for the variator in a pushbelt continuously variable transmission (CVT) is investigated. The variator enables a stepless variation of the transmission ratio with...
Stan van der Meulen, Bram de Jager, Frans Veldpaus...