Sciweavers

230 search results - page 28 / 46
» Cryptanalysis of the Quadratic Generator
Sort
View
CDC
2010
IEEE
129views Control Systems» more  CDC 2010»
13 years 2 months ago
On parameterized Lyapunov and control Lyapunov functions for discrete-time systems
This paper deals with the existence and synthesis of parameterized-(control) Lyapunov functions (p-(C)LFs) for discrete-time nonlinear systems that are possibly subject to constrai...
Mircea Lazar, Rob H. Gielen
ICASSP
2011
IEEE
12 years 11 months ago
Practical codes for lossy compression when side information may be absent
Practical codes are developed for quadratic Gaussian lossy compression when side information may be absent by hybridizing successively refinable trellis coded quantization (SR-TC...
Sivagnanasundaram Ramanan, John MacLaren Walsh
NIPS
2003
13 years 9 months ago
Minimax Embeddings
Spectral methods for nonlinear dimensionality reduction (NLDR) impose a neighborhood graph on point data and compute eigenfunctions of a quadratic form generated from the graph. W...
Matthew Brand
JCT
2010
83views more  JCT 2010»
13 years 6 months ago
Families of prudent self-avoiding walks
A self-avoiding walk (SAW) on the square lattice is prudent if it never takes a step towards a vertex it has already visited. Prudent walks differ from most classes of SAW that ha...
Mireille Bousquet-Mélou
ICPR
2006
IEEE
14 years 8 months ago
Recognizing Rotated Faces from Two Orthogonal Views in Mugshot Databases
Tolerance to pose variations is one of the key remaining problems in face recognition. It is of great interest in airport surveillance systems using mugshot databases to screen tr...
Xiaozheng Zhang, Yongsheng Gao, Bailing Zhang