Sciweavers

3082 search results - page 136 / 617
» New Bounds for the Controller Problem
Sort
View
EUROCRYPT
2004
Springer
15 years 9 months ago
On Generating the Initial Key in the Bounded-Storage Model
Abstract. In the bounded-storage model (BSM) for information-theoretically secure encryption and key-agreement one uses a random string R whose length t is greater than the assumed...
Stefan Dziembowski, Ueli M. Maurer
JMLR
2010
143views more  JMLR 2010»
15 years 2 months ago
A Quasi-Newton Approach to Nonsmooth Convex Optimization Problems in Machine Learning
We extend the well-known BFGS quasi-Newton method and its memory-limited variant LBFGS to the optimization of nonsmooth convex objectives. This is done in a rigorous fashion by ge...
Jin Yu, S. V. N. Vishwanathan, Simon Günter, ...
JDCTA
2010
272views more  JDCTA 2010»
14 years 11 months ago
Optimal Control of Nonlinear Systems Using the Homotopy Perturbation Method: Infinite Horizon Case
This paper presents a new method for solving a class of infinite horizon nonlinear optimal control problems. In this method, first the original optimal control problem is transfor...
Amin Jajarmi, Hamidreza Ramezanpour, Arman Sargolz...
ICCCN
2007
IEEE
15 years 8 months ago
Localized and Configurable Topology Control in Lossy Wireless Sensor Networks
Wireless sensor networks (WSNs) introduce new challenges to topology control due to the prevalence of lossy links. We propose a new topology control formulation for lossy WSNs that...
Guoliang Xing, Chenyang Lu, Robert Pless
SIGGRAPH
1995
ACM
15 years 8 months ago
Feature-based control of visibility error: a multi-resolution clustering algorithm for global illumination
In this paper we introduce a new approach to controlling error in hierarchical clustering algorithms for radiosity. The new method ensures that just enough work is done to meet th...
François X. Sillion, George Drettakis