Sciweavers

147 search results - page 12 / 30
» Logarithmic keying
Sort
View
AUTOMATICA
2008
104views more  AUTOMATICA 2008»
13 years 10 months ago
Communication constraints in the average consensus problem
The interrelationship between control and communication theory is becoming of fundamental importance in many distributed control systems, such as the coordination of a team of aut...
Ruggero Carli, Fabio Fagnani, Alberto Speranzon, S...
SIAMMAX
2010
117views more  SIAMMAX 2010»
13 years 4 months ago
On the Convergence of Rational Ritz Values
Ruhe's rational Krylov method is a popular tool for approximating eigenvalues of a given matrix, though its convergence behavior is far from being fully understood. Under fair...
Bernhard Beckermann, Stefan Güttel, Raf Vande...
CTRSA
2008
Springer
110views Cryptology» more  CTRSA 2008»
13 years 11 months ago
RFID Security: Tradeoffs between Security and Efficiency
Recently, Juels and Weis defined strong privacy for RFID tags. We add to this definition a completeness and a soundness requirement, i.e., a reader should accept valid tags and onl...
Ivan Damgård, Michael Østergaard Pede...
PAMI
2000
113views more  PAMI 2000»
13 years 9 months ago
Hierarchical Discriminant Regression
This paper presents a new technique which incrementally builds a hierarchical discriminant regression (IHDR) tree for generation of motion based robot reactions. The robot learned...
Wey-Shiuan Hwang, Juyang Weng
IJNSEC
2011
78views more  IJNSEC 2011»
13 years 4 months ago
Multi-authority Electronic Voting Scheme Based on Elliptic Curves
In this paper, a new multi authority electronic voting scheme based on elliptic curves is proposed. According to the proposed scheme, each voter casts the vote as a point on the e...
Chinniah Porkodi, Ramalingam Arumuganathan, Krishn...