نتایج جستجو برای: control methods

تعداد نتایج: 2926900  

2010
Yliès Falcone Mohamad Jaber

We propose a formal method to automatically integrate security rules regarding an access control policy (expressed in Or-BAC) in Java programs. Given an untrusted application and a set of Or-BAC security rules, our method derives corresponding AspectJ aspects. Derived aspects modify the behaviour of the underlying program so as to meet the policy. Then, these aspects are weaved into the target ...

2009
Todd Farley

The U.S. air transportation system is the most productive in the world, moving far more people and goods than any other. It is also the safest system in the world, thanks in part to its venerable air traffic control system. But as demand for air travel continues to grow, the air traffic control system’s aging infrastructure and labor-intensive procedures are impinging on its ability to keep pac...

1997
Martin Schönhoff Mojgan Kowsari

We present parts of the speci cation of a program to remote control and monitor di erent devices, especially valves, in an explosion test environment. The program was developed within an industrial national project called CATC carried out in PTB, the German federal institute of weights and measures. The CATC information system supports various activities of di erent user groups that are respons...

Journal: :SIAM J. Numerical Analysis 2013
Michael Herty Lorenzo Pareschi Sonja Steffensen

Implicit-explicit (IMEX) Runge-Kutta methods play a major rule in the numerical treatment of differential systems governed by stiff and non-stiff terms. This paper discusses order conditions and symplecticity properties of a class of IMEX Runge–Kutta methods in the context of optimal control problems. The analysis of the schemes is based on the continuous optimality system. Using suitable trans...

2006
Indrakshi Ray Mahendra Kumar Lijun Yu

With the growing use of wireless networks and mobile devices, we are moving towards an era where location information will be necessary for access control. The use of location information can be used for enhancing the security of an application, and it can also be exploited to launch attacks. For critical applications, a formal model for location-based access control is needed that increases th...

1999
Gerald C. Gannod Betty H. C. Cheng

As a program evolves, it becomes increasingly difficult to understand and reason about changes in the source code. Eventually, if enough changes are made, reverse engineering and design recovery techniques must be used in order to understand the current behavior of a system. In this context, the effective use of complementary approaches can facilitate program and system understanding by taking ...

2004
Ajay Chander Drew Dean John C. Mitchell

We present DHARMA, a distributed high assurance reference monitor that is generated mechanically by the formal methods tool PVS from a verified specification of its key algorithms. DHARMA supports policies that allow delegation of access rights, as well as structured, distributed names. To test DHARMA, we use it as the core reference monitor behind a web server that serves files over SSL connec...

Journal: :Int. J. Systems Science 2000
Javier Aracil Enrique Ponce Teodoro Alamo

Bifurcation analysis of nonlinear control systems supplies a global perspective of the system behaviour modes. In this paper, it is shown that this analysis can be implemented with very elementary and classical tools, such as frequency-domain graphical methods. The methodology proposed is illustrated analysing the e€ ects of a saturation nonlinearity on a system designed with a linear control l...

2014
Rüdiger Ehlers Stéphane Lafortune Stavros Tripakis Moshe Y. Vardi

We present a formal connection between supervisory control theory in the field of control engineering and reactive synthesis in the field of formal methods. We focus on the case of fully-observed discrete-event systems that are controlled by a single controller/supervisor in order to achieve a safety specification and a non-blocking specification. The connection is shown by a reduction of the c...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه سمنان 1392

in the area of vocabulary teaching and learning although much research has been done, only some of it has led to effective techniques of vocabulary teaching and many language learners still have problem learning vocabulary. the urge behind this study was to investigate three methods of teaching words. the first one was teaching words in context based on a traditional method of teaching that is,...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید