Institution
Mitre Corporation
Company•Bedford, Massachusetts, United States•
About: Mitre Corporation is a company organization based out in Bedford, Massachusetts, United States. It is known for research contribution in the topics: Air traffic control & National Airspace System. The organization has 4884 authors who have published 6053 publications receiving 124808 citations. The organization is also known as: Mitre & MITRE.
Topics: Air traffic control, National Airspace System, Information system, Air traffic management, Communications system
Papers published on a yearly basis
Papers
More filters
••
TL;DR: Two proximate time-optimal servomechanisms, PTO 53 and PTO53 tau, are proposed for type-3 and type-2 third-order plants, respectively, and it is shown that the control parameters can be adjusted to accommodate, more or less, disturbances and unmodeled dynamics in the system.
Abstract: The problem of proximate time-optimal control of third-order systems is considered. Two proximate time-optimal servomechanisms, PTO53 and PTO53 tau , are proposed for type-3 and type-2 third-order plants, respectively. Theorems stating sufficient conditions on each system's control design parameters to ensure global stability are given, and it is shown that the control parameters can be adjusted to accommodate, more or less, disturbances and unmodeled dynamics in the system. The approach used to develop the controllers is that of constructing a 'slab' in three-dimensional state space that describe the 'switching' structure of the control. The technique relies on three-dimensional phase-space analysis, which is rarely applied to systems of order three or higher. Simulation and experimental results demonstrate the performance of the algorithms developed. >
91 citations
••
TL;DR: Looking across the history of MUC in the context of related evaluations, important lessons are drawn about the need for evaluation to evolve with the technology it evaluates, to balance costs against benefits and to weigh the divergent needs of the multiple stake-holders— developers, funders and users.
91 citations
••
TL;DR: Adding buffers to a packet switching network can increase throughput in certain system architectures and a word of warning—don't make them too large.
Abstract: Adding buffers to a packet switching network can increase throughput in certain system architectures. A word of warning—don't make them too large.
91 citations
••
16 Aug 1998TL;DR: The collaborative learning model described in this paper identifies the specific characteristics exhibited by effective collaborative learning teams, and based on these characteristics, suggests strategies for promoting effective peer interaction.
Abstract: Placing students in a group and assigning them a task does not guarantee that the students will engage in effective collaborative learning behavior. The collaborative learning model described in this paper identifies the specific characteristics exhibited by effective collaborative learning teams, and based on these characteristics, suggests strategies for promoting effective peer interaction. The model is designed to help an intelligent collaborative learning system recognize and target group interaction problem areas. Once targeted, the system can take actions to help students collaborate more effectively with their peers, maximizing individual student and group learning.
91 citations
•
28 Feb 1992TL;DR: In this article, a tool for assisting an operator to detect security violations in a multilevel secure database management system is presented, where security constraints are represented in conceptual structures, rules, or frames, and operator communication with the constraint representation is provided by a user interface.
Abstract: A tool for assisting an operator to detect security violations in a multilevel secure database. The database stores data classified at a plurality of security levels, where the different users of the database are cleared to different security levels and access the database through a multilevel secure database management system. Security constraints are represented in conceptual structures, rules, or frames, and operator communication with the constraint representation is provided by a user interface. An inference engine uses reasoning strategies on the security-constraint representations base to detect security violations in the database by inference.
90 citations
Authors
Showing all 4896 results
Name | H-index | Papers | Citations |
---|---|---|---|
Sushil Jajodia | 101 | 664 | 35556 |
Myles R. Allen | 82 | 295 | 32668 |
Barbara Liskov | 76 | 204 | 25026 |
Alfred D. Steinberg | 74 | 295 | 20974 |
Peter T. Cummings | 69 | 521 | 18942 |
Vincent H. Crespi | 63 | 287 | 20347 |
Michael J. Pazzani | 62 | 183 | 28036 |
David Goldhaber-Gordon | 58 | 192 | 15709 |
Yeshaiahu Fainman | 57 | 648 | 14661 |
Jonathan Anderson | 57 | 195 | 10349 |
Limsoon Wong | 55 | 367 | 13524 |
Chris Clifton | 54 | 160 | 11501 |
Paul Ward | 52 | 408 | 12400 |
Richard M. Fujimoto | 52 | 290 | 13584 |
Bhavani Thuraisingham | 52 | 563 | 10562 |