Sciweavers

4485 search results - page 191 / 897
» Equivalences on Observable Processes
Sort
View
124
Voted
PKC
1999
Springer
87views Cryptology» more  PKC 1999»
15 years 7 months ago
On the Security of RSA Screening
Since many applications require the verification of large sets of signatures, it is sometimes advantageous to perform a simultaneous verification instead of checking each signatu...
Jean-Sébastien Coron, David Naccache
127
Voted
TSD
1999
Springer
15 years 7 months ago
Classifying Visemes for Automatic Lipreading
Automatic lipreading is automatic speech recognition that uses only visual information. The relevant data in a video signal is isolated and features are extracted from it. From a s...
Michiel Visser, Mannes Poel, Anton Nijholt
120
Voted
ECOOPW
1997
Springer
15 years 7 months ago
Active Software Artifacts
There are many similarities between industrial goods manufacturing and software development processes. This paper first briefly analyzes the recent developments in goods manufactur...
Mehmet Aksit, Francesco Marcelloni, Bedir Tekinerd...
ACTA
2007
106views more  ACTA 2007»
15 years 3 months ago
Symbolic models for control systems
In this paper we provide a bridge between the infinite state models used in control theory to describe the evolution of continuous physical processes and the finite state models ...
Paulo Tabuada
141
Voted
ICASSP
2011
IEEE
14 years 7 months ago
Adaptive beam tracking for interference alignment in time-varying MIMO interference channels: Conjugate gradient approach
Based on a linear formulation to interference alignment, an adaptive algorithm for interference-aligning beam tracking in time-varying MIMO interference channels is proposed. It i...
Junse Lee, Heejung Yu, Youngchul Sung, Yong H. Lee