• Aucun résultat trouvé

Control and Data

CONTROL OF AN ARTIFICIAL MOUTH PLAYING A TROMBONE AND ANALYSIS OF SOUND DESCRIPTORS ON EXPERIMENTAL DATA

CONTROL OF AN ARTIFICIAL MOUTH PLAYING A TROMBONE AND ANALYSIS OF SOUND DESCRIPTORS ON EXPERIMENTAL DATA

... of control, an exploratory subspace, and following a precise proto- ...every data from all sensors (Temperatures, Pressures, Positions, etc) are recorded and ...energy and roughness are ...

9

Access control policies and companies data transmission management

Access control policies and companies data transmission management

... what" and has been proposed within computer systems in the last 50 ...against data leakage, a specific type of security issues that can disclose sensitive information and generate major issues ...

159

Capacity: an Abstract Model of Control over Personal Data

Capacity: an Abstract Model of Control over Personal Data

... of control is well captured by ...complex and realistic ...access control on smartphones is acceptable because the biometric data processing is performed under the control of the ...

25

More Data Locality for Static Control Programs on NUMA Architectures

More Data Locality for Static Control Programs on NUMA Architectures

... analyzing and trans- forming static control programs, hence its intensive use for the optimization of data locality and automatic paralleliza- ...modeling control flow, to promote ...

12

Control chart and data fusion for varietal origin discrimination: Application to olive oil

Control chart and data fusion for varietal origin discrimination: Application to olive oil

... Combining data from different analytical sources could be a way to improve the performances of chemometric models by extracting the relevant and complementary information for food ...several data ...

8

Tuple-Based Access Control: a Provenance-Based Information Flow Control for Relational Data

Tuple-Based Access Control: a Provenance-Based Information Flow Control for Relational Data

... of data while transferred between ...credentials, and a party encrypting data determines a policy for who can ...semirings and ultimately N[X] is left ...

11

Usage control for data handling in smart cities

Usage control for data handling in smart cities

... Usage Control, Data Handling, Smart Cities, and Information ...(IoT) and the underlying ...plans and ideas for smart cities will become a ...citizens and groups of users in both ...

7

Access Control for HTTP Operations on Linked Data

Access Control for HTTP Operations on Linked Data

... Protocol) and Shi3ld for the Linked Data Plat- form (with and without the internal SPARQL ...access control policies expressed with Web languages ...conditions, and that the complexity ...

16

Mobile Field Data Entry for Concrete Quality Control Information

Mobile Field Data Entry for Concrete Quality Control Information

... FIELD DATA COLLECTION To facilitate speedy field data collection and timely decision making, especially in the case of field qual- ity control inspection it would be highly beneficial to use ...

8

A Data-Driven Approach to Prediction and Optimal Bucket-Filling Control for Autonomous Excavators

A Data-Driven Approach to Prediction and Optimal Bucket-Filling Control for Autonomous Excavators

... feedback control with sophisticated sensors and instrumentation technology is not practical, considering the harsh environment where excavators have to ...approach and a new methodology, we exploit ...

9

Access Control Mechanisms in Named Data Networks: A Comprehensive Survey

Access Control Mechanisms in Named Data Networks: A Comprehensive Survey

... Access Control A re-encryption scheme [133] may use two or more encryption operations to provide authentication or update the access rules ...confidential data dissemination: the producer encrypts the ...

33

Cryptographically enforced access control for user data in untrusted clouds

Cryptographically enforced access control for user data in untrusted clouds

... logical data set, and she selectively exposes a portion of that data to each web ...services control her data: each service keeps its portion of the user’s objects in a walled garden ...

60

Self-Triggered Control for Sampled-data Systems using Reachability Analysis

Self-Triggered Control for Sampled-data Systems using Reachability Analysis

... triggered control; Sampled-data systems; ...buildings and cars, advanced manufacturing plants, smart medical devices, ...cyber and physical worlds defines the scope of this ...analyze ...

7

Connecting Distributed Version Control Systems Communities to Linked Open Data

Connecting Distributed Version Control Systems Communities to Linked Open Data

... Version Control Systems (DVCS) such as Git or Mercurial allow community of developers to coordinate and maintain well known software such as Linux operating system or Firefox web ...interoperate and ...

10

A Control Approach for Performance of Big Data Systems

A Control Approach for Performance of Big Data Systems

... Herodotou and Babu, 2011) or to assure performance objectives as noted in (Xie et ...input data to be treated, a Map function, and a Reduce ...the control theory point of view, the Map ...

8

Generating data sets as inputs of reference for cyber security issues and industrial control systems

Generating data sets as inputs of reference for cyber security issues and industrial control systems

... code and to raise alarms if ...a control which can ensure consistency between both sub systems and a global property for our ship ...sensors and effectors: a sensor can measure the temperature ...

3

A case study of optimal input-output system with sampled-data control: Ding et al. force and fatigue muscular control model

A case study of optimal input-output system with sampled-data control: Ding et al. force and fatigue muscular control model

... The article is organized as follows. In Section 2 , we make a brief presentation of Ding et al. force-fatigue model based on [ 20 ]. In Section 3 , the dynamics of the force model is briefly investigated to describe the ...

23

Impulse and sampled-data optimal control of heat equations, and error estimates

Impulse and sampled-data optimal control of heat equations, and error estimates

... impulse control is an interesting alternative, not only to usual discretization schemes, but also in order to deal with systems that cannot be acted on by means of continuous control inputs, as it often ...

31

Composing data and control functions to ease virtual networks programmability

Composing data and control functions to ease virtual networks programmability

... design and control virtual ...complex and dynamic nature of the physical ...functions and advanced network ...static control functions, dynamic control functions and ...

8

Composing data and control functions to ease virtual networks programmability

Composing data and control functions to ease virtual networks programmability

... switch and matches a controller rule, it will be directly forwarded to that ...header) and uses it to call the network function included in the ...packet and return the results. In case of a ...

9

Show all 10000 documents...

Sujets connexes