메뉴 건너뛰기




Volumn , Issue , 2009, Pages 199-204

Opaque superlanguages and sublanguages in discrete event systems

Author keywords

[No Author keywords available]

Indexed keywords

DISCRETE EVENT SIMULATION;

EID: 77950839504     PISSN: 07431546     EISSN: 25762370     Source Type: Conference Proceeding    
DOI: 10.1109/CDC.2009.5400704     Document Type: Conference Paper
Times cited : (10)

References (23)
  • 1
    • 0023104549 scopus 로고
    • Supervisory control of a class of discrete-event processes
    • P. J. Ramadge and W. M. Wonham. Supervisory control of a class of discrete-event processes.SIAM Journal of Control and Optimization, 25(1),pp.206-230, 1987.
    • (1987) SIAM Journal of Control and Optimization , vol.25 , Issue.1 , pp. 206-230
    • Ramadge, P.J.1    Wonham, W.M.2
  • 2
    • 0023995784 scopus 로고
    • On observability of discrete-event systems
    • F. Lin and W. M. Wonham. On observability of discrete-event systems. Information Sciences, 44, pp. 173-198,1988.
    • (1988) Information Sciences , vol.44 , pp. 173-198
    • Lin, F.1    Wonham, W.M.2
  • 6
    • 0001047238 scopus 로고
    • Diagnosability of discrete event systems and its applications
    • F. Lin. Diagnosability of discrete event systems and its applications. Discrete Event Dynamic Systems: Theory and Applications, 4(1), pp. 197-212, 1994.
    • (1994) Discrete Event Dynamic Systems: Theory and Applications , vol.4 , Issue.1 , pp. 197-212
    • Lin, F.1
  • 8
    • 56349167981 scopus 로고    scopus 로고
    • State estimation and detectability of probabilistic discrete event systems
    • S. Shu, F. Lin, H. Ying, and X. Chen. State estimation and detectability of probabilistic discrete event systems. Automatica, 44(12), pp. 3054-3060.
    • Automatica , vol.44 , Issue.12 , pp. 3054-3060
    • Shu, S.1    Lin, F.2    Ying, H.3    Chen, X.4
  • 17
    • 77950856913 scopus 로고    scopus 로고
    • Probabilistic model checking of an anonymity system
    • V Shmatikov. Probabilistic model checking of an anonymity system. Journal of Computer Security, 2004.
    • (2004) Journal of Computer Security
    • Shmatikov, V.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.