scispace - formally typeset
Search or ask a question
Institution

Mitre Corporation

CompanyBedford, Massachusetts, United States
About: Mitre Corporation is a company organization based out in Bedford, Massachusetts, United States. It is known for research contribution in the topics: Air traffic control & National Airspace System. The organization has 4884 authors who have published 6053 publications receiving 124808 citations. The organization is also known as: Mitre & MITRE.


Papers
More filters
Journal ArticleDOI
TL;DR: Two proximate time-optimal servomechanisms, PTO 53 and PTO53 tau, are proposed for type-3 and type-2 third-order plants, respectively, and it is shown that the control parameters can be adjusted to accommodate, more or less, disturbances and unmodeled dynamics in the system.
Abstract: The problem of proximate time-optimal control of third-order systems is considered. Two proximate time-optimal servomechanisms, PTO53 and PTO53 tau , are proposed for type-3 and type-2 third-order plants, respectively. Theorems stating sufficient conditions on each system's control design parameters to ensure global stability are given, and it is shown that the control parameters can be adjusted to accommodate, more or less, disturbances and unmodeled dynamics in the system. The approach used to develop the controllers is that of constructing a 'slab' in three-dimensional state space that describe the 'switching' structure of the control. The technique relies on three-dimensional phase-space analysis, which is rarely applied to systems of order three or higher. Simulation and experimental results demonstrate the performance of the algorithms developed. >

91 citations

Journal ArticleDOI
TL;DR: Looking across the history of MUC in the context of related evaluations, important lessons are drawn about the need for evaluation to evolve with the technology it evaluates, to balance costs against benefits and to weigh the divergent needs of the multiple stake-holders— developers, funders and users.

91 citations

Journal ArticleDOI
TL;DR: Adding buffers to a packet switching network can increase throughput in certain system architectures and a word of warning—don't make them too large.
Abstract: Adding buffers to a packet switching network can increase throughput in certain system architectures. A word of warning—don't make them too large.

91 citations

Book ChapterDOI
16 Aug 1998
TL;DR: The collaborative learning model described in this paper identifies the specific characteristics exhibited by effective collaborative learning teams, and based on these characteristics, suggests strategies for promoting effective peer interaction.
Abstract: Placing students in a group and assigning them a task does not guarantee that the students will engage in effective collaborative learning behavior. The collaborative learning model described in this paper identifies the specific characteristics exhibited by effective collaborative learning teams, and based on these characteristics, suggests strategies for promoting effective peer interaction. The model is designed to help an intelligent collaborative learning system recognize and target group interaction problem areas. Once targeted, the system can take actions to help students collaborate more effectively with their peers, maximizing individual student and group learning.

91 citations

Patent
28 Feb 1992
TL;DR: In this article, a tool for assisting an operator to detect security violations in a multilevel secure database management system is presented, where security constraints are represented in conceptual structures, rules, or frames, and operator communication with the constraint representation is provided by a user interface.
Abstract: A tool for assisting an operator to detect security violations in a multilevel secure database. The database stores data classified at a plurality of security levels, where the different users of the database are cleared to different security levels and access the database through a multilevel secure database management system. Security constraints are represented in conceptual structures, rules, or frames, and operator communication with the constraint representation is provided by a user interface. An inference engine uses reasoning strategies on the security-constraint representations base to detect security violations in the database by inference.

90 citations


Authors

Showing all 4896 results

NameH-indexPapersCitations
Sushil Jajodia10166435556
Myles R. Allen8229532668
Barbara Liskov7620425026
Alfred D. Steinberg7429520974
Peter T. Cummings6952118942
Vincent H. Crespi6328720347
Michael J. Pazzani6218328036
David Goldhaber-Gordon5819215709
Yeshaiahu Fainman5764814661
Jonathan Anderson5719510349
Limsoon Wong5536713524
Chris Clifton5416011501
Paul Ward5240812400
Richard M. Fujimoto5229013584
Bhavani Thuraisingham5256310562
Network Information
Related Institutions (5)
IBM
253.9K papers, 7.4M citations

83% related

Hewlett-Packard
59.8K papers, 1.4M citations

83% related

Carnegie Mellon University
104.3K papers, 5.9M citations

83% related

George Mason University
39.9K papers, 1.3M citations

83% related

Georgia Institute of Technology
119K papers, 4.6M citations

82% related

Performance
Metrics
No. of papers from the Institution in previous years
YearPapers
20234
202210
202195
2020139
2019145
2018132