By Topic
Skip to Results

Search Results

You searched for: On the History of Control
6,215 Results returned
Skip to Results
  • Save this Search
  • Download Citations Disabled
  • Save To Project
  • Email
  • Print
  • Export Results
  • Full text access may be available. Click article title to sign in or learn about subscription options.

    On the History of Control

    Bushnell, L.G.
    Control Systems, IEEE

    Volume: 16 , Issue: 3
    DOI: 10.1109/MCS.1996.506393
    Publication Year: 1996
    Cited by:  Papers (1)

    IEEE Journals & Magazines

    First Page of the Article
    View full abstract»

  • Full text access may be available. Click article title to sign in or learn about subscription options.

    Decentralized Stochastic Control with Partial History Sharing: A Common Information Approach

    Nayyar, A. ; Mahajan, A. ; Teneketzis, D.
    Automatic Control, IEEE Transactions on

    Volume: 58 , Issue: 7
    DOI: 10.1109/TAC.2013.2239000
    Publication Year: 2013 , Page(s): 1644 - 1658
    Cited by:  Papers (6)

    IEEE Journals & Magazines

    A general model of decentralized stochastic control called partial history sharing information structure is presented. In this model, at each step the controllers share part of their observation and control history with each other. This general model subsumes several existing models of information sharing as special cases. Based on the information commonly known to all the controllers, the decentralized problem is reformulated as an equivalent centralized problem from the perspective of a coordinator. The coordinator knows the common information and selects prescriptions that map each controller's local information to its control actions. The optimal control problem at the coordinator is shown to be a partially observable Markov decision process (POMDP) which is solved using techniques from Markov decision theory. This approach provides 1) structural results for optimal strategies and 2) a dynamic program for obtaining optimal strategies for all controllers in the original decentralized problem. Thus, this approach unifies the various ad-hoc approaches taken in the literature. In addition, the structural results on optimal control strategies obtained by the proposed approach cannot be obtained by the existing generic approach (the person-by-person approach) for obtaining structural results in decentralized problems; and the dynamic program obtained by the proposed approach is simpler than that obtained by the existing generic approach (the designer's approach) for obtaining dynamic programs in decentralized problems. View full abstract»

  • Full text access may be available. Click article title to sign in or learn about subscription options.

    Amassing and indexing a large sample of version control systems: Towards the census of public source code history

    Mockus, A.
    Mining Software Repositories, 2009. MSR '09. 6th IEEE International Working Conference on

    DOI: 10.1109/MSR.2009.5069476
    Publication Year: 2009 , Page(s): 11 - 20
    Cited by:  Papers (10)  |  Patents (1)

    IEEE Conference Publications

    The source code and its history represent the output and process of software development activities and are an invaluable resource for study and improvement of software development practice. While individual projects and groups of projects have been extensively analyzed, some fundamental questions, such as the spread of innovation or genealogy of the source code, can be answered only by considering the entire universe of publicly available source code and its history. We describe methods we developed over the last six years to gather, index, and update an approximation of such a universal repository for publicly accessible version control systems and for the source code inside a large corporation. While challenging, the task is achievable with limited resources. The bottlenecks in network bandwidth, processing, and disk access can be dealt with using inherent parallelism of the tasks and suitable tradeoffs between the amount of storage and computations, but a completely automated discovery of public version control systems may require enticing participation of the sampled projects. Such universal repository would allow studies of global properties and origins of the source code that are not possible through other means. View full abstract»

  • Full text access may be available. Click article title to sign in or learn about subscription options.

    Parameter control by the entire search history: Case study of history-driven evolutionary algorithm

    Shing Wa Leung ; Shiu Yin Yuen ; Chi Kin Chow
    Evolutionary Computation (CEC), 2010 IEEE Congress on

    DOI: 10.1109/CEC.2010.5585945
    Publication Year: 2010 , Page(s): 1 - 8

    IEEE Conference Publications

    History-driven Evolutionary Algorithm (HdEA) is an EA that uses the entire search history to improve searching performance. By building the approximated fitness landscape and estimating the gradient using the entire history, HdEA performs a parameter-less adaptive mutation. In order to decrease the number of parameters that makes the HdEA more robust, this paper proposes a novel adaptive parameter control system. This system is as an add-on component to HdEA, which uses the whole search history in HdEA to control the parameters in an automatic manner. The performance of the proposed system is examined on 34 benchmark functions. The results shows that the parameter control system gives similar or better performance in 24 functions and has the benefit that two parameters of the HdEA are eliminated; they are set and varied automatically by the system. View full abstract»

  • Freely Available from IEEE

    Origin of Numerical Control [History]

    Younkin, G. ; Hesla, E.
    Industry Applications Magazine, IEEE

    Volume: 14 , Issue: 5
    DOI: 10.1109/MIAS.2008.927525
    Publication Year: 2008 , Page(s): 10 - 12

    IEEE Journals & Magazines

  • Full text access may be available. Click article title to sign in or learn about subscription options.

    Run-to-run overlay control of steppers in semiconductor manufacturing systems based on history data analysis and neural network modeling

    Seong-Jin Park ; Moon-Sang Lee ; Sung-Young Shin ; Kwang-Hyun Cho ; Jong-Tae Lim ; Bong-Su Cho ; Young-Ho Jei ; Myung-Kil Kim ; Chan-Hoon Park
    Semiconductor Manufacturing, IEEE Transactions on

    Volume: 18 , Issue: 4
    DOI: 10.1109/TSM.2005.858530
    Publication Year: 2005 , Page(s): 605 - 613
    Cited by:  Papers (7)

    IEEE Journals & Magazines

    This paper presents a new run-to-run control scheme to reduce overlay misalignment errors in steppers and demonstrates the feasibility of the scheme by real-time experimental tests. The overlay misalignment error mainly depends on two factors: one is the internal dynamics of photo processes and steppers and the other is the process history of lots, such as base equipment and reticles. Based on these observations, a new control scheme was designed to find the stepper inputs minimizing the misalignment errors based on history data analysis and neural network models. Moreover, we demonstrated that the proposed control scheme reduces the spec-out ratios as well as the number of engagements of the send-ahead wafer process, which thereby results in the increase of product yield in semiconductor manufacturing. View full abstract»

  • Full text access may be available. Click article title to sign in or learn about subscription options.

    Access control by tracking shallow execution history

    Fong, P.W.L.
    Security and Privacy, 2004. Proceedings. 2004 IEEE Symposium on

    DOI: 10.1109/SECPRI.2004.1301314
    Publication Year: 2004 , Page(s): 43 - 55
    Cited by:  Papers (6)  |  Patents (2)

    IEEE Conference Publications

    Software execution environments like operating systems, mobile code platforms and scriptable applications must protect themselves against potential damages caused by malicious code. Monitoring the execution history of the latter provides an effective means for controlling the access pattern of system services. Several authors have recently proposed increasingly general automata models for characterizing various classes of security policies enforceable by execution monitoring. An open question raised by Bauer, Ligatti and Walker is whether one can further classify the space of security policies by constraining the capabilities of the execution monitor. This paper presents a novel information-based approach to address the research problem. Specifically, security policies are characterized by the information consumed by an enforcing execution monitor. By restricting the execution monitor to track only a shallow history of previously granted access events, a precise characterization of a class of security policies enforceable by restricted access to information is identified. Although provably less expressive than the general class of policies enforceable by execution monitoring, this class does contain naturally occurring policies including Chinese Wall policy, low-water-mark policy, one-out-of-k authorization, assured pipelines, etc. Encouraged by this success, the technique is generalized to produce a lattice of policy classes. Within the lattice, policy classes are ordered by the information required for enforcing member policies. Such a fine-grained policy classification lays the semantic foundation for future studies on special-purpose policy languages. View full abstract»

  • Full text access may be available. Click article title to sign in or learn about subscription options.

    A Temporal Description Logic Based Access Control Model for Expressing History Constrained Policies in Semantic Web

    Faghih, F. ; Amini, M. ; Jalili, R.
    Policies for Distributed Systems and Networks, 2009. POLICY 2009. IEEE International Symposium on

    DOI: 10.1109/POLICY.2009.15
    Publication Year: 2009 , Page(s): 142 - 149

    IEEE Conference Publications

    An access control model for semantic Web should be compatible with the corresponding semantic model. The access control procedure(s) should also take the semantic relationships between the entities (specified as ontologies) into account. Considering the benefits of logic-based models and the description logic foundation of semantic Web, in this paper, we propose an access control model based on a temporal variant of description logics (TL-ALCF). This logical schema enables us to express history constrained policies to enrich the policy-base with dynamic properties based on previous accesses.The specification of each component of the model as well as the approach to define history constrained policies along with some clarifying examples are presented. The access control procedure of the model is proposed over the inference services of TL-ALCF. View full abstract»

  • Full text access may be available. Click article title to sign in or learn about subscription options.

    Dynamic transmission capacity control schemes for power saving using a mixture of the history and the latest information

    Fukuda, Y. ; Ikenaga, T. ; Oie, Y.
    GLOBECOM Workshops (GC Wkshps), 2010 IEEE

    DOI: 10.1109/GLOCOMW.2010.5700176
    Publication Year: 2010 , Page(s): 1438 - 1442
    Cited by:  Papers (3)

    IEEE Conference Publications

    Power saving technology for the Internet has become a vital issue because of the growing energy consumption, caused by the increasing traffic demand. Thus, we have proposed a scheme to dynamically control the transmission capacity between switches in order to reduce the power consumption on the basis of the change in traffic volume. In this paper, the transmission capacity is better estimated by taking into account the history information of the amount of arriving traffic. We propose two types of schemes, which slightly differ in their use of a mixture of the history information and the latest information. Using simulation studies including an evaluation with real traffic, we show that the proposed schemes can achieve high power saving capability as well as sufficient communication quality. View full abstract»

  • Full text access may be available. Click article title to sign in or learn about subscription options.

    Using Version Control History to Follow the Changes of Source Code Elements

    Toth, Z. ; Novak, G. ; Ferenc, R. ; Siket, I.
    Software Maintenance and Reengineering (CSMR), 2013 17th European Conference on

    DOI: 10.1109/CSMR.2013.40
    Publication Year: 2013 , Page(s): 319 - 322
    Cited by:  Papers (1)

    IEEE Conference Publications

    Version control systems store the whole history of the source code. Since the source code of a system is organized into files and folders, the history tells us the concerned files and their changed lines only but software engineers are also interested in which source code elements (e.g. classes or methods) are affected by a change. Unfortunately, in most programming languages source code elements do not follow the file system hierarchy, which means that a file can contain more classes and methods and a class can be stored in more files, which makes it difficult to determine the changes of classes by using the changes of files. To solve this problem we developed an algorithm, which is able to follow the changes of the source code elements by using the changes of files and we successfully applied it on the Web Kit open source system. View full abstract»

  • Full text access may be available. Click article title to sign in or learn about subscription options.

    Control in the History of Computing: Making an Ambiguous Concept Useful

    Sjoblom, G.
    Annals of the History of Computing, IEEE

    Volume: 33 , Issue: 3
    DOI: 10.1109/MAHC.2011.53
    Publication Year: 2011 , Page(s): 88 - 87

    IEEE Journals & Magazines

    Computing and control are deeply intertwined. As a theory and practice of engineering, control was a main impetus for the emergence of modern computing in the 1940s. With its broad connotations of mastery and steering, control seems intuitively applicable to many of computers' uses. With versatility, however, comes ambiguity. The concept has been applied to a range of disparate phenomena, at different levels of abstraction. This article gives seven definitions of control and shows that the theme and the diversity of control is relevant to the social history of computing. However, historians of computing should be careful to distinguish between literal and metaphorical use and between different aspects of control. View full abstract»

  • Full text access may be available. Click article title to sign in or learn about subscription options.

    An eclectic photographic history of the IEEE Control Systems Society: a look at society events

    Birdwell, J.D.
    Control Systems, IEEE

    Volume: 24 , Issue: 6
    DOI: 10.1109/MCS.2004.1368482
    Publication Year: 2004 , Page(s): 67 - 73

    IEEE Journals & Magazines

    As part of the planning process for the IEEE Control Systems Society's 50th anniversary celebration, a collection of photographs from Society events are assembled. The collection is not intended to have any profound meaning but is simply a way for the members to indulge in their individual and collective memories of past events and people, to impart a sense of where the Society has been and for its future course. This photographic journey by its very nature is visual rather than textual. Each image's caption provides information on the event and date and the individuals in the photograph. This photographic history, eclectic or otherwise, provides an archival snapshot of portions of the Society's past, and illustrates the importance of photography's role in preservation. Perhaps this photographic essay can also serve as a reminder to future volunteers and event organizers to ensure that the future is recorded for the benefit of subsequent generations. View full abstract»

  • Full text access may be available. Click article title to sign in or learn about subscription options.

    Channel Surfing Redux: A Brief History of the TV Remote Control and a Tribute to Its Coinventors

    Luplow, W.C. ; Taylor, J.I.
    Consumer Electronics Magazine, IEEE

    Volume: 1 , Issue: 4
    DOI: 10.1109/MCE.2012.2207149
    Publication Year: 2012 , Page(s): 24 - 29

    IEEE Journals & Magazines

    As the consumer electronics industry mourns the passing of the last of the coinventors of the wireless remote control for television, IEEE hits the pause button to review the colorful history behind the remote control to reflect on the impact of this innovation that has transformed the lives of generations of TV viewers and to celebrate the lives and contributions of these consumer electronic industry pioneers. View full abstract»

  • Full text access may be available. Click article title to sign in or learn about subscription options.

    Design of History Database for Networked Control Systems

    Zhu Youzhi ; Peng Peng ; Zheng Geng
    Control Conference, 2007. CCC 2007. Chinese

    DOI: 10.1109/CHICC.2006.4347577
    Publication Year: 2007 , Page(s): 292 - 296

    IEEE Conference Publications

    History database is used to facilitate the high-performance storage and retrieval of history data which is very valuable in areas like process and manufacturing industries. Networked control systems(NCS) are different from traditional control systems in that they have network inside their control loops. This paper introduced the design of history database which is a part of a novel NCS implementation platform-NetCon system. System architecture is designed for the history database. After that a configurable two stage history data compression/decompression algorithm is introduced for the store and restore of history data. The first stage compression is the preprocess step and the second stage offers some universal lossless byte flow compression algorithms. In order to enable an efficient data retrieval, the storage structure of history data is designed. View full abstract»

  • Full text access may be available. Click article title to sign in or learn about subscription options.

    Trust-aware access control: How recent is your transaction history?

    Ahmed, A. ; Alnajem, A.
    Digital Information and Communication Technology and it's Applications (DICTAP), 2012 Second International Conference on

    DOI: 10.1109/DICTAP.2012.6215352
    Publication Year: 2012 , Page(s): 208 - 213
    Cited by:  Papers (1)

    IEEE Conference Publications

    Establishing trust in a subject requesting access to a sensitive resource object is fundamental in history-aware access control models. A subject's past behaviour could be used as an indication about the subject's trustworthiness. In fact, a subject's trust plays a significant role in deciding the associated access rights in, for example, context-aware access control models. Recently, there have been efforts to accommodate the subject's trust level to provide smart security services including access control. Some proposals utilise data mining techniques, whereas some incorporate statistical methods to compute the subject's trust value. Most of the models fail to identify malicious attempts from genuine subjects. In this paper, we propose a new model that bridges the gap by incorporating the concepts of Recency, Frequency and Sensitivity (RFS) in trust computation. The model is formally defined and prototyped in Java using the XACML RBAC profile and its run-time performance is investigated. The results show the model adds a significant overhead on top of the RBAC core model. However, the trust computation process could be done off-line cutting down that overhead dramatically, thus providing an affordable solution. View full abstract»

  • Full text access may be available. Click article title to sign in or learn about subscription options.

    Feedback control: an invisible thread in the history of technology

    Bernstein, D.S.
    Control Systems, IEEE

    Volume: 22 , Issue: 2
    DOI: 10.1109/37.993315
    Publication Year: 2002 , Page(s): 53 - 68
    Cited by:  Papers (5)

    IEEE Journals & Magazines

    The history of technology combines engineering with economic, social, and political factors. Technology seems to advance in waves. Small advances accumulate slowly until a critical level of technological success and economic advantage is achieved. Throughout technological history is found the idea of feedback control. Like all ideas, feedback control impacts technology only when it is embodied therein; it is not tied to any specific innovation or invention. The article describes innovations that either use feedback control or allow it to be exploited. They are simple but their impact on technology is profound. It is shown that they played a crucial role in facilitating the truly great waves of technological and scientific development. They are the escapement (a significant part of the paper is about mechanical clocks), the governor, the aileron, the gyro, and the amplifier View full abstract»

  • Full text access may be available. Click article title to sign in or learn about subscription options.

    A history based semantic aware access control model using logical time

    Ravari, A.N. ; Amini, M. ; Jalili, R. ; Haadi Jafarian, J.
    Computer and Information Technology, 2008. ICCIT 2008. 11th International Conference on

    DOI: 10.1109/ICCITECHN.2008.4803125
    Publication Year: 2008 , Page(s): 43 - 50

    IEEE Conference Publications

    With the advent of semantic technology, access control cannot be done in a safe way unless the access decision takes into account the semantic relationships among the entities in a semantic-aware environment. The SBAC model (semantic based access control model) considers this issue in its decision making process. However, time plays a crucial role in new computing environments, which is not supported in SBAC. In this paper, we propose the temporal semantic based access control (TSBAC) model, as an extension of SBAC, which enhances the specification of user-defined authorization rules by constraining time interval and temporal expression over users' history of accesses. TSBAC uses logical time, rather than to real time, in its authorization rules. A formal semantics for temporal authorizations is provided and conflicting situations (due to the semantic relations of the SBAC model and a sub-interval relation between authorizations) are investigated and resolved in our proposed model. An architecture for the access control system based on TSBAC is presented. View full abstract»

  • Full text access may be available. Click article title to sign in or learn about subscription options.

    A Semantic aware Access Control model with real time constraints on history of accesses

    Ravari, A.N. ; Amini, M. ; Jalili, R.
    Computer Science and Information Technology, 2008. IMCSIT 2008. International Multiconference on

    DOI: 10.1109/IMCSIT.2008.4747338
    Publication Year: 2008 , Page(s): 827 - 836
    Cited by:  Papers (1)

    IEEE Conference Publications

    With the advent of semantic technology, access control cannot be done in a safe way unless the access decision takes into account the semantic relationships among the entities in a semantic-aware environment. SBAC model considers this issue in its decision making process. However, time plays a crucial role in new computing environments which is not supported in the model. In this paper we introduce the Temporal Semantic Based Access Control model (TSBAC), as an extension of SBAC, which enhances the specification of user-defined authorization rules by constraining time interval and temporal expression over userspsila history of accesses. A formal semantics for temporal authorizations is provided and conflicting situations (due to the semantic relations of the SBAC model and a sub-interval relation between authorizations) are investigated and resolved in our proposed model. An architecture for the access control system based on the proposed model is presented, and finally, we discuss and evaluate TSBAC. View full abstract»

  • Full text access may be available. Click article title to sign in or learn about subscription options.

    History based distributed filtering - a tagging approach to network-level access control

    Sailer, R. ; Kabatnik, M.
    Computer Security Applications, 2000. ACSAC '00. 16th Annual Conference

    DOI: 10.1109/ACSAC.2000.898892
    Publication Year: 2000 , Page(s): 373 - 382
    Cited by:  Papers (1)  |  Patents (7)

    IEEE Conference Publications

    Discusses a network-level access control technique that applies the non-discretionary access control model to individual data packets that are exchanged between hosts or subnets. The proposed technique examines the incoming data's integrity properties to prevent applications within a node or subnetwork from so-called subversive channels. It checks outgoing data's secrecy requirements before transmission. Security labels are used to identify data packets as members of different categories and security levels. Additional tags store context information to validate the trustworthiness of a packet's content. Labels and tags of a data packet reflect events that may be relevant to access control throughout its life. As opposed to stateful filtering, which is based on the history of a flow of packets, our approach works on the history of an individual packet. Any state information is part of the packet rather than being stored in all the nodes inspecting the packet; i.e. nodes do not need to create and maintain state information View full abstract»

  • Full text access may be available. Click article title to sign in or learn about subscription options.

    A short history of hydropower control

    Fasol, K.H.
    Control Systems, IEEE

    Volume: 22 , Issue: 4
    DOI: 10.1109/MCS.2002.1021646
    Publication Year: 2002 , Page(s): 68 - 76
    Cited by:  Papers (2)

    IEEE Journals & Magazines

    Today's control systems have their roots, to a great extent, in the speed control of driving engines (prime movers) and particularly in the speed control of water turbines. The first turbines with automatic speed control appeared sometime in the mid-19th century. I discuss the history of water-turbine control systems, noting the older inventions and techniques that made possible the very first attempts to control the speed of hydraulic machinery and recognizing the key engineers and scientists who contributed to the further development. View full abstract»

  • Freely Available from IEEE

    A history of the monocycle stability and control from inside the wheel

    Cardini, S.B.
    Control Systems, IEEE

    Volume: 26 , Issue: 5
    DOI: 10.1109/MCS.2006.1700041
    Publication Year: 2006 , Page(s): 22 - 26

    IEEE Journals & Magazines

  • Full text access may be available. Click article title to sign in or learn about subscription options.

    Microprocessor Architecture for Discrete Manufacturing Control, Part I: History and Problem Definition

    Alford, C.O. ; Sledge, R.
    Manufacturing Technology, IEEE Transactions on

    Volume: 5 , Issue: 2
    DOI: 10.1109/TMFT.1976.1136021
    Publication Year: 1976 , Page(s): 43 - 49
    Cited by:  Papers (3)

    IEEE Journals & Magazines

    This paper presents a history of computer control in discrete manufacturing and focuses on the computer control problem at the lowest or machine tool level. Succeeding papers will give the specifications for a control computer at this level, derive a system architecture to meet these specifications, and evaluate the computer performance when applied to a control problem. The objective of the total set of papers is to present a computer architecture, based on microprocessor concepts, which will be efficient in a total manufacturing environment involving a hierarchy of control computers. The proposed computer would function at the lowest level of this hierarchy. View full abstract»

  • Full text access may be available. Click article title to sign in or learn about subscription options.

    History data collection, retrieving and display in the NSLS control system

    Tang, Y.N. ; Smith, J.D.
    Particle Accelerator Conference, 1995., Proceedings of the 1995

    Volume: 4
    DOI: 10.1109/PAC.1995.505515
    Publication Year: 1995 , Page(s): 2253 - 2255 vol.4

    IEEE Conference Publications

    This paper presents the history data collection, retrieve and presentation subsystem of our control system. We made every effort to to make the software friendly, convenient and robust. It is widely used and has become a very valuable diagnostic tool. Anyone may start and stop his own history at any data rate up to 20 Hz. The data can be periodically written to disk files or stored in a cyclic ring buffer and dumped to a disk file upon request. All the history data files use the self-contained and self-explanatory standard format. One graphical display program displays all the history data files because of their standard format. In addition to the standard features of a plot program, this display program can display up to 16 devices on both axis, take differences with a reference point, browse the data file by pages or a scroll bar, zoom-in and zoom-out any portion of the plot, do many types of analyses, etc View full abstract»

  • Freely Available from IEEE

    A History of Control Engineering 1800-1930

    Fuller, A.T.
    Electronics and Power

    Volume: 25 , Issue: 9
    DOI: 10.1049/ep.1979.0369
    Publication Year: 1979

    IET Journals & Magazines

  • Full text access may be available. Click article title to sign in or learn about subscription options.

    Otto Mayr: contributions to the history of feedback control

    Bennett, S.
    Control Systems, IEEE

    Volume: 22 , Issue: 2
    DOI: 10.1109/37.993312
    Publication Year: 2002 , Page(s): 29 - 33
    Cited by:  Papers (1)

    IEEE Journals & Magazines

    The publication, in 1969, of Dr. Otto Mayr's book, Zur Friffigeschichte der technischen Regelungen (The Origins of Feedback Control), revealed that both the concept and its application were much older. The reader rapidly becomes aware that the book is no simple catalog of inventions and inventors, but is a deep and subtle exploration of the history of ideas. A second theme that Mayr draws out of the narrative is the change in the relationship between science and technology that was occurring during the Victorian period View full abstract»

Skip to Results

SEARCH HISTORY

Search History is available using your personal IEEE account.