Geometric techniques of controller design for nonlinear systems have enjoyed great success. A serious shortcoming, however, has been the need for access to full-state feedback. this paper addresses the issue of state ...
详细信息
Geometric techniques of controller design for nonlinear systems have enjoyed great success. A serious shortcoming, however, has been the need for access to full-state feedback. this paper addresses the issue of state estimation from limited sensor measurements in the presence of parameter uncertainty. An adaptive nonlinear observer is suggested for Lipschitz nonlinear systems and the stability of this observer is shown to be related to finding solutions to a quadratic inequality involving two variables. A co-ordinate transformation is used to reformulate this inequality as a Linear Matrix Inequality. A systematic algorithm is presented which checks for feasibility of a solution to the quadratic inequality and yields an observer whenever the solution is feasible. the state estimates then are guaranteed to converge to zero asymptotically. the convergence of the parameters, however, is determined by a persistence-of-excitation type constraint.
We present an upper bound on the performance provided by a protocol guaranteeing mutually exclusive access to a replicated resource in a network subject to component failure and subsequent partitioning. the bound is p...
this paper describes the design and capabilities of a simulation program that modelsthe behavior of a token-ring access local area network (LAN). Such networks consist of a variety of devices connected to a high spee...
详细信息
A description is given of the design and capabilities of a simulation program that modelsthe behavior of a token-ring access local area network (LAN). Such networks consist of a variety of devices connected to a high...
详细信息
ISBN:
(纸本)0818607661
A description is given of the design and capabilities of a simulation program that modelsthe behavior of a token-ring access local area network (LAN). Such networks consist of a variety of devices connected to a high-speed transmission medium having a geographic extent limited to a few kilometers. Topologically, the transmission medium and devices constitute a closed loop or ring. Devices transmit messages on the ring only after obtaining control of a permission token that regulates access to the transmission medium. Attention is focused on the token-ring access protocol since the available evidence suggests that this protocol results in small delays at light workloads and controlled delay at heavy workloads.
this book constitutes the refereed proceedings of the 10th International symposium, PETS 2010, held in Berlin, Germany in July 2010. the 16 revised full papers were carefully reviewed and selected from 57 submissions ...
详细信息
ISBN:
(数字)9783642145278
ISBN:
(纸本)9783642145261
this book constitutes the refereed proceedings of the 10th International symposium, PETS 2010, held in Berlin, Germany in July 2010. the 16 revised full papers were carefully reviewed and selected from 57 submissions for inclusion in the book. the papers handle topics such as accesscontrol, privacy of web based search, anonymus webs of trust, security attacks, active timing attacks in lo-latency anonymus communication, network topology and web search with malicious adversaries
暂无评论