Sciweavers

15 search results - page 1 / 3
» Finding Close T-indistinguishability Operators to a Given Pr...
Sort
View
EUSFLAT
2007
175views Fuzzy Logic» more  EUSFLAT 2007»
13 years 8 months ago
Finding Close T-indistinguishability Operators to a Given Proximity
Two ways to approximate a proximity relation R (i.e. a reflexive and symmetric fuzzy relation) by a T-transitive one where T is a continuous archimedean t-norm are given. The fi...
Luis Garmendia, Jordi Recasens
ICC
2007
IEEE
173views Communications» more  ICC 2007»
14 years 1 months ago
A Distributed Approach to Interference Mitigation Between OFDM-Based 802.16 Systems Operating in License-Exempt Spectrum
— An approach to mitigating interference between 802.16 license-exempt systems is proposed in this paper. More specifically, the approach focuses on solving problems which arise...
Omar Ashagi, Seán Murphy, Liam Murphy
SIAMJO
2011
13 years 2 months ago
Prox-Penalization and Splitting Methods for Constrained Variational Problems
This paper is concerned with the study of a class of prox-penalization methods for solving variational inequalities of the form Ax + NC (x) 0 where H is a real Hilbert space, A : H...
Hedy Attouch, Marc-Olivier Czarnecki, Juan Peypouq...
CEC
2010
IEEE
13 years 8 months ago
On the role of modularity in evolutionary dynamic optimisation
The field of evolutionary dynamic optimisation is concerned with the application of evolutionary algorithms to dynamic optimisation problems. In recent years, numerous new algorith...
Philipp Rohlfshagen, Xin Yao
SP
2008
IEEE
115views Security Privacy» more  SP 2008»
13 years 7 months ago
Compromising Reflections-or-How to Read LCD Monitors around the Corner
We present a novel eavesdropping technique for spying at a distance on data that is displayed on an arbitrary computer screen, including the currently prevalent LCD monitors. Our ...
Michael Backes, Markus Dürmuth, Dominique Unr...