Sciweavers

2938 search results - page 478 / 588
» On obfuscating point functions
Sort
View
APAL
2005
125views more  APAL 2005»
13 years 10 months ago
Dynamic topological logic
Dynamic Topological Logic provides a context for studying the confluence of the topological semantics for S4, based on topological spaces rather than Kripke frames; topological dy...
Philip Kremer, Grigori Mints
AUTOMATICA
2005
112views more  AUTOMATICA 2005»
13 years 10 months ago
Robust maximum-likelihood estimation of multivariable dynamic systems
This paper examines the problem of estimating linear time-invariant state-space system models. In particular it addresses the parametrization and numerical robustness concerns tha...
Stuart Gibson, Brett Ninness
TIP
2008
139views more  TIP 2008»
13 years 10 months ago
Model-Based 2.5-D Deconvolution for Extended Depth of Field in Brightfield Microscopy
Abstract--Due to the limited depth of field of brightfield microscopes, it is usually impossible to image thick specimens entirely in focus. By optically sectioning the specimen, t...
François Aguet, Dimitri Van De Ville, Micha...
TIT
2008
86views more  TIT 2008»
13 years 10 months ago
A One-to-One Code and Its Anti-Redundancy
One-to-one codes are "one shot" codes that assign a distinct codeword to source symbols and are not necessarily prefix codes (more generally, uniquely decodable). For ex...
Wojciech Szpankowski
TMC
2008
90views more  TMC 2008»
13 years 10 months ago
Trust-Based Fast Authentication for Multiowner Wireless Networks
In multiowner wireless networks, access points (APs) are owned and operated by different administrations, leading to significant authentication delays during handoff between APs. W...
Jahan Hassan, Harsha Sirisena, Björn Landfeld...