Sciweavers

886 search results - page 20 / 178
» Generalized Bezout Identity
Sort
View
QUESTA
2007
117views more  QUESTA 2007»
13 years 9 months ago
Analyzing a degenerate buffer with general inter-arrival and service times in discrete time
We present the queueing analysis of a degenerate buffer having access to a single server. This system cannot realize any given delay, but only values that are an integer multiple ...
Wouter Rogiest, Koenraad Laevens, Joris Walraevens...
AUTOMATICA
2007
61views more  AUTOMATICA 2007»
13 years 9 months ago
Errors-in-variables methods in system identification
Abstract: The paper gives a survey of errors-in-variables methods in system identification. Background and motivation are given, and examples illustrate why the identification pr...
Torsten Söderström
CCR
2010
104views more  CCR 2010»
13 years 7 months ago
I know what you will do next summer
This is a brief journey across the Internet privacy landscape. After trying to convince you about the importance of the problem I will try to present questions of interest and how...
Balachander Krishnamurthy
ICDCS
2010
IEEE
14 years 1 months ago
Existence Theorems and Approximation Algorithms for Generalized Network Security Games
—Aspnes et al [2] introduced an innovative game for modeling the containment of the spread of viruses and worms (security breaches) in a network. In this model, nodes choose to i...
V. S. Anil Kumar, Rajmohan Rajaraman, Zhifeng Sun,...
CVPR
2010
IEEE
13 years 9 months ago
Towards general motion-based face recognition
Motion-based face recognition is a young research topic, inspired mainly by psychological studies on motionbased perception of human faces. Unlike its close relative, appearance-b...
Ning Ye, Terence Sim