Sciweavers

449 search results - page 70 / 90
» Errors-in-variables methods in system identification
Sort
View
PERCOM
2007
ACM
14 years 9 months ago
Dynamic Key-Updating: Privacy-Preserving Authentication for RFID Systems
The objective of private authentication for Radio Frequency Identification (RFID) systems is to allow valid readers to explicitly authenticate their dominated tags without leaking...
Li Lu, Jinsong Han, Lei Hu, Yunhao Liu, Lionel M. ...
DATE
2005
IEEE
118views Hardware» more  DATE 2005»
14 years 3 months ago
A Tool and Methodology for AC-Stability Analysis of Continuous-Time Closed-Loop Systems
—Presented are a methodology and a DFII-based tool for AC-stability analysis of a wide variety of closed-loop continuous-time (operational amplifiers and other linear circuits). ...
Momchil Milev, Rod Burt
ECML
2006
Springer
14 years 1 months ago
The Minimum Volume Covering Ellipsoid Estimation in Kernel-Defined Feature Spaces
Minimum volume covering ellipsoid estimation is important in areas such as systems identification, control, video tracking, sensor management, and novelty detection. It is well kno...
Alexander N. Dolia, Tijl De Bie, Christopher J. Ha...
GECCO
2006
Springer
150views Optimization» more  GECCO 2006»
14 years 1 months ago
Nonlinear parametric regression in genetic programming
Genetic programming has been considered a promising approach for function approximation since it is possible to optimize both the functional form and the coefficients. However, it...
Yung-Keun Kwon, Sung-Soon Choi, Byung Ro Moon
CIMAGING
2008
85views Hardware» more  CIMAGING 2008»
13 years 11 months ago
Technology-assisted dietary assessment
Dietary intake provides valuable insights for mounting intervention programs for prevention of disease. With growing concern for adolescent obesity, the need to accurately measure...
Fengqing Zhu, Anand Mariappan, Carol J. Boushey, D...