Results 21 to 30 of about 2,034,998 (303)

Optimal Control Design for Traffic Flow Maximization Based on Data-Driven Modeling Method

open access: yesEnergies, 2021
This paper proposes enhanced prediction and control design methods for improving traffic flow with human-driven and automated vehicles. To achieve accurate prediction for the entire time horizon, data-driven and model-based prediction methods were ...
Balázs Németh   +3 more
doaj   +1 more source

Network Adaptive Deadband: NCS Data Flow Control for Shared Networks

open access: yesSensors, 2012
This paper proposes a new middleware solution called Network Adaptive Deadband (NAD) for long time operation of Networked Control Systems (NCS) through the Internet or any shared network based on IP technology.
Miguel Díaz-Cacho   +3 more
doaj   +1 more source

Data-Flow vs Control-Flow for Extreme Level Computing

open access: yes2013 Data-Flow Execution Models for Extreme Scale Computing, 2013
This paper challenges the current thinking for building High Performance Computing (HPC) Systems, which is currently based on the sequential computing also known as the von Neumann model, by proposing the use of Novel systems based on the Dynamic Data-Flow model of computation. The switch to Multi-core chips has brought the Parallel Processing into the
Evripidou, Paraskevas   +3 more
openaire   +3 more sources

Multiverse data-flow control

open access: yes, 2011
Technical report ...
Schindler, Benjamin   +3 more
openaire   +2 more sources

Process and Data Flow Control in KLOE

open access: yesComputer Physics Communications, 2001
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Massimo Casarsa, Ciro Pistillo
openaire   +2 more sources

Network Transfer of Control Data: An Application of the NIST SMART DATA FLOW [PDF]

open access: yesJournal of Systemics, Cybernetics and Informatics, 2004
Pervasive Computing environments range from basic mobile point of sale terminal systems, to rich Smart Spaces with many devices and sensors such as lapel microphones, audio and video sensor arrays and multiple interactive PDA acting as electronic brief ...
Vincent Stanford   +2 more
doaj  

Extended access control mechanism for cross-domain data exchange

open access: yesTongxin xuebao, 2019
Aiming at the controlled sharing for cross-domain data exchange for complicated application systems,an extended access control mechanism was proposed.The control process was divided into two steps:constraint control and propagation control.The constraint
Rongna XIE   +5 more
doaj   +2 more sources

Compositional Separation of Control Flow and Data Flow

open access: yes, 2023
Every Model of High-Level Computation (MHC) has an underlying composition mechanism for combining simple computation devices into more complex ones. Composition can be done by (explicitly or implicitly) defining control flow, data flow or any combination thereof.
openaire   +2 more sources

Nutritional and Behavioral Intervention for Long‐Term Childhood Acute Leukemia Survivors With Metabolic Syndrome

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Purpose Metabolic syndrome (MetS) is a common complication in survivors of childhood acute lymphoblastic and myeloid leukemia (AL), and a major risk factor for premature cardiovascular disease, type‐2‐diabetes, and metabolic dysfunction‐associated steatotic liver disease (MASLD).
Visentin Sandrine   +10 more
wiley   +1 more source

Research on cross-domain access control technology

open access: yes网络与信息安全学报, 2021
Based on the latest research at home and abroad, the access control technology in cross-domain data flow were summarized and prospected.Firstly, combined with access control in complex application environments, the development of access control models ...
Tianyi ZHU   +3 more
doaj   +3 more sources

Home - About - Disclaimer - Privacy