Results 1  10
of
745,496
Multivariable Feedback Control: Analysis
 span (B∗) und Basis B∗ = { ω1
, 2005
"... multiinput, multioutput feedback control design for linear systems using the paradigms, theory, and tools of robust control that have arisen during the past two decades. The book is aimed at graduate students and practicing engineers who have a basic knowledge of classical control design and st ..."
Abstract

Cited by 529 (24 self)
 Add to MetaCart
multiinput, multioutput feedback control design for linear systems using the paradigms, theory, and tools of robust control that have arisen during the past two decades. The book is aimed at graduate students and practicing engineers who have a basic knowledge of classical control design
DELAYDEPENDENT ROBUST CONTROL FOR UNCERTAIN SINGULAR TIMEDELAY SYSTEMS
"... The problem of delaydependent robust stabilization for uncertain singular timedelay systems is investigated in this paper. The parameter uncertainty is assumed to be normbounded and possibly timevarying, while the time delay considered here is assumed to be constant but unknown. A delaydepende ..."
Abstract

Cited by 3 (1 self)
 Add to MetaCart
The problem of delaydependent robust stabilization for uncertain singular timedelay systems is investigated in this paper. The parameter uncertainty is assumed to be normbounded and possibly timevarying, while the time delay considered here is assumed to be constant but unknown. A delaydependent
A theory of timed automata
, 1999
"... Model checking is emerging as a practical tool for automated debugging of complex reactive systems such as embedded controllers and network protocols (see [23] for a survey). Traditional techniques for model checking do not admit an explicit modeling of time, and are thus, unsuitable for analysis of ..."
Abstract

Cited by 2651 (32 self)
 Add to MetaCart
of realtime systems whose correctness depends on relative magnitudes of different delays. Consequently, timed automata [7] were introduced as a formal notation to model the behavior of realtime systems. Its definition provides a simple way to annotate statetransition graphs with timing constraints
Routing in a delay tolerant network
 Proceedings of ACM Sigcomm
, 2004
"... We formulate the delaytolerant networking routing problem, where messages are to be moved endtoend across a connectivity graph that is timevarying but whose dynamics may be known in advance. The problem has the added constraints of finite buffers at each node and the general property that no con ..."
Abstract

Cited by 612 (8 self)
 Add to MetaCart
We formulate the delaytolerant networking routing problem, where messages are to be moved endtoend across a connectivity graph that is timevarying but whose dynamics may be known in advance. The problem has the added constraints of finite buffers at each node and the general property
Optimization Flow Control, I: Basic Algorithm and Convergence
 IEEE/ACM TRANSACTIONS ON NETWORKING
, 1999
"... We propose an optimization approach to flow control where the objective is to maximize the aggregate source utility over their transmission rates. We view network links and sources as processors of a distributed computation system to solve the dual problem using gradient projection algorithm. In thi ..."
Abstract

Cited by 690 (64 self)
 Add to MetaCart
. In this system sources select transmission rates that maximize their own benefits, utility minus bandwidth cost, and network links adjust bandwidth prices to coordinate the sources' decisions. We allow feedback delays to be different, substantial and timevarying, and links and sources to update
A DelayTolerant Network Architecture for Challenged Internets
, 2003
"... The highly successful architecture and protocols of today’s Internet may operate poorly in environments characterized by very long delay paths and frequent network partitions. These problems are exacerbated by end nodes with limited power or memory resources. Often deployed in mobile and extreme env ..."
Abstract

Cited by 937 (13 self)
 Add to MetaCart
The highly successful architecture and protocols of today’s Internet may operate poorly in environments characterized by very long delay paths and frequent network partitions. These problems are exacerbated by end nodes with limited power or memory resources. Often deployed in mobile and extreme
Congestion control for high bandwidthdelay product networks
 SIGCOMM '02
, 2002
"... Theory and experiments show that as the perflow product of bandwidth and latency increases, TCP becomes inefficient and prone to instability, regardless of the queuing scheme. This failing becomes increasingly important as the Internet evolves to incorporate very highbandwidth optical links and mo ..."
Abstract

Cited by 452 (4 self)
 Add to MetaCart
and more largedelay satellite links. To address this problem, we develop a novel approach to Internet congestion control that outperforms TCP in conventional environments, and remains efficient, fair, scalable, and stable as the bandwidthdelay product increases. This new eXplicit Control Protocol, XCP
Symbolic Model Checking for Realtime Systems
 INFORMATION AND COMPUTATION
, 1992
"... We describe finitestate programs over realnumbered time in a guardedcommand language with realvalued clocks or, equivalently, as finite automata with realvalued clocks. Model checking answers the question which states of a realtime program satisfy a branchingtime specification (given in an ..."
Abstract

Cited by 574 (50 self)
 Add to MetaCart
We describe finitestate programs over realnumbered time in a guardedcommand language with realvalued clocks or, equivalently, as finite automata with realvalued clocks. Model checking answers the question which states of a realtime program satisfy a branchingtime specification (given
Bro: A System for Detecting Network Intruders in RealTime
, 1999
"... We describe Bro, a standalone system for detecting network intruders in realtime by passively monitoring a network link over which the intruder's traffic transits. We give an overview of the system's design, which emphasizes highspeed (FDDIrate) monitoring, realtime notification, clear ..."
Abstract

Cited by 903 (41 self)
 Add to MetaCart
specialized language used to express a site's security policy. Event handlers can update state information, synthesize new events, record information to disk, and generate realtime notifications via syslog. We also discuss a number of attacks that attempt to subvert passive monitoring systems
A Tutorial on Visual Servo Control
 IEEE Transactions on Robotics and Automation
, 1996
"... This paper provides a tutorial introduction to visual servo control of robotic manipulators. Since the topic spans many disciplines our goal is limited to providing a basic conceptual framework. We begin by reviewing the prerequisite topics from robotics and computer vision, including a brief review ..."
Abstract

Cited by 822 (25 self)
 Add to MetaCart
review of coordinate transformations, velocity representation, and a description of the geometric aspects of the image formation process. We then present a taxonomy of visual servo control systems. The two major classes of systems, positionbased and imagebased systems, are then discussed. Since any
Results 1  10
of
745,496