• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 130,319
Next 10 →

Table 3. Tools for complex systems. Tool/

in The Application of Software Tools to Complex Distributed Systems: An Overview
by Diane T. Rover, Abdul Waheed, An Overview
"... In PAGE 13: ... While important, the evaluation of software tools is beyond the scope of this article. Each of the tools in Table3 is a dynamic analysis tool and, as such, relies on runtime data. Most of the tools focus on correct real-time behavior and/ or acceptable quality of service (instead of, e.... ..."

Table 1. Model Construction

in Computational Methods for Hybrid Systems
by Sven Hedlund
"... In PAGE 13: ... The WL P T L handles a piecewise linear DPWLE system as an object. The basic commands for building a PWL system are listed in Table1 . Having partitioned the state space and used the functions for entering data into MATLAB,the system is aggregated into a single record that is passed on to functions for analysis and simulations.... In PAGE 98: ... 3. Understanding the Tools The commands available for solving the control problem are listed in Table1 . There are three main groups of programs: a group of four commands that in various ways approximate the value function of a hybrid optimal control problem, one command for deriving a control signal from the value function, and four commands for simulating hy- brid systems.... In PAGE 105: ... Command Reference This section describes the commands in detail. Being very similar to each other, some of the commands of Table1 are grouped into the same entry on the following pages. The commands ohsf and ohsfe are not found in this section, since they are of little interest to the standard user.... ..."

Table 3. Number of analysis tool executions

in An approach to operational design co-ordination
by Graham Coates, Alex H. B. Duffy, Ian Whitfield, William Hills 2001
"... In PAGE 9: ... To construct a task model, the scheduler uses knowledge provided by the user and contained within the analysis tool dependency matrix. Table 6 represents the analysis tool dependency matrix shown in Table 5, with each analysis tool assigned a value for TI in accordance with Table3 . In addition, Table 7 rep- resents some of the knowledge of tasks held within the task model.... ..."
Cited by 2

Table 5. Analysis tool dependency matrix

in An approach to operational design co-ordination
by Graham Coates, Alex H. B. Duffy, Ian Whitfield, William Hills 2001
"... In PAGE 9: ... The dependency matrix for the compu- tational process, shown in Figure 3, is presented in Table 5. With regard to Table5 , as an example, for an execution of TF23225_2, the corresponding executions of TF04710 and TF04720 must be completed. 4.... In PAGE 9: ... To construct a task model, the scheduler uses knowledge provided by the user and contained within the analysis tool dependency matrix. Table 6 represents the analysis tool dependency matrix shown in Table5 , with each analysis tool assigned a value for TI in accordance with Table 3. In addition, Table 7 rep- resents some of the knowledge of tasks held within the task model.... ..."
Cited by 2

Table 2 - Aerodynamic Parameters

in Modeling the Benchmark Active Control Technology Wind-Tunnel Model for Active Control Design Applications
by Martin Waszak Langley

Table 1: Kinds of systems supported by the different analysis tools

in MAST: An Open Environment for Modeling, Analysis, and Design of Real-Time Systems
by Gonzlez Harbour Medina, J. L. Medina, J. J. GutiƩrrez, J. C. Palencia, J. M. Drake
"... In PAGE 9: ... There is an option to automatically calculate the priority ceilings for shared resources of type Immediate_Ceiling_Resource. Table1 shows a summary of the level of support of each tool. The MAST toolset provides an option to automatically calculate an optimized set of priorities.... ..."

Table 1: Needs Analysis algorithm.

in Acquiring Domain-Specific Planners by Example
by Elly Winner , Manuela Veloso
"... In PAGE 16: ... We call such needs accomplished, and indicate this in our diagrams with a double circle. Needs Analysis Algorithm The needs analysis algorithm is shown in Table1 . We now describe in detail how needs analysis generates the needs of an individual term.... In PAGE 22: ... and step b generate q. Choosing a di erent relevant e ect to generate q creates a di erent partial order. The two partial orders representing each of the two relevant e ect choices are shown in Figures 11 and 12. The needs analysis algorithm shown in Table1 produces a needs tree that encompasses all possible partial orderings consistent with the totally ordered plan, and Sprawl searches through these orderings to identify the optimal one according to a given measure. However, nding the optimal partial ordering \under reasonable optimality criteria quot; has been shown to be NP-hard [3].... In PAGE 33: ...conditions not all elements are taken care of and any common conditions newloop.body sequence replace sequence with newloop reconnect condition and result arcs change true Table1 0: Identifying loops in an observed plan and space utilization to allow the system to merge the new plans into its current program online rather than constructing a new planner from scratch after including the new plans in a large database. 4.... ..."
Cited by 2

Table 1. Characteristics of existing network analysis tools.

in Composable Tools For Network Discovery and Security Analysis
by Giovanni Vigna, Fredrik Valeur, Jingyu Zhou, Richard A. Kemmerer 2002
"... In PAGE 2: ... These tools provide differ- ent types of functionality, use different means to retrieve information about a network, and store information in dif- ferent formats. Table1 summarizes the characteristics of several popular network and security analysis tools. The ta- ble shows, for each tool, the type of functionality provided (node discovery, topology discovery, service mapping, op- erating system fingerprinting, and node management), and the type of storage used for the information gathered (data structures in memory, text files, or databases).... ..."
Cited by 3

Table 2. Examples of IEM tools

in ISSUED BY
by unknown authors
"... In PAGE 4: ... REFERENCES 11. GLOSSARY BOXES Box 1: Key definitions and understandings set the context for this document Box 2: Relevant definitions of sustainable development Box 3: Environmental rights of people in the South African Bill of Rights TABLES Table 1: Key features of environmental assessment and management tools from the 1970s to the present Table2 . Examples of IEM tools FIGURES Figure 1: Relationship between IEM tools, and complementary processes and supporting disciplines Figure 2: Commonly used tools in the IEM toolbox Figure 3: Example of a hierarchy of selected IEM tools in relationship to a typical development cycle 2 3 4 4 4 6 6 6 6 6 7 8 8 8 8 8 8 9 9 10 16 16 17 18 4 5 5 7 11 10 15... In PAGE 11: ... * The tools are supported by numerous specialist disciplines, which are in turn supported by technologies and methods for sourcing input data. Commonly used tools in support of integrated environmental management are listed and described in Table2 . References are provided to other documents in the DEAT Integrated Environmental Management Information Series, as well as websites or other useful sources of information on these tools.... ..."

Table 13. Other Tools

in OOTW FORCE DESIGN TOOLS
by Dean S. Hartley Iii, Richard E. Bell, Stephen L. Packard, Dean S. Hartley Iii, Richard E. Bell, Stephen L. Packard 1999
"... In PAGE 9: ...able 12. Existing Force Design Tools ......................................... 18 Table13 .... In PAGE 39: ... The Contingency Operations Support Tool (COST) was discussed, as it will be used in evaluating the incremental cost of a force design. Table13 summarizes data on these tools. Because the workshop participants identified actual needs beyond that of force design tools, several tools have been added to Table 13, reflecting this expanded scope.... In PAGE 39: ... Table 13 summarizes data on these tools. Because the workshop participants identified actual needs beyond that of force design tools, several tools have been added to Table13 , reflecting this expanded scope. These are the Counternarcotics Modeling and Analysis Capability (CMAC), CyCAM III, the Deployable Exercise System (DEXES),... In PAGE 70: ... There are several commercial games (such as SimCityTM) that model the impact of many of the important activities and factors of OOTWs. There are also several OOTW simulations (some are listed in Table13 on page 20) that model the impact of OOTW activities; however, most are used for training, not analysis, or have not been used extensively. (Section 7.... ..."
Next 10 →
Results 1 - 10 of 130,319
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University