Sciweavers

985 search results - page 164 / 197
» Piercing Convex Sets
Sort
View
IWDW
2009
Springer
14 years 2 months ago
Estimating the Information Theoretic Optimal Stego Noise
We recently developed a new benchmark for steganography, underpinned by the square root law of capacity, called Steganographic Fisher Information (SFI). It is related to the multip...
Andrew D. Ker
COMPGEOM
2009
ACM
14 years 2 months ago
Incremental construction of the delaunay triangulation and the delaunay graph in medium dimension
We describe a new implementation of the well-known incremental algorithm for constructing Delaunay triangulations in any dimension. Our implementation follows the exact computing ...
Jean-Daniel Boissonnat, Olivier Devillers, Samuel ...
CDC
2008
IEEE
14 years 2 months ago
Robust generalized asymptotic regulation against non-stationary sinusoidal disturbances
Abstract— Attenuation of sinusoidal disturbances with uncertain and arbitrarily time-varying frequencies is considered in the form of a generalized asymptotic regulation problem....
Hakan Köroglu, Carsten W. Scherer
CDC
2008
IEEE
236views Control Systems» more  CDC 2008»
14 years 2 months ago
Non-monotonic Lyapunov functions for stability of discrete time nonlinear and switched systems
Abstract— We relax the monotonicity requirement of Lyapunov’s theorem to enlarge the class of functions that can provide certificates of stability. To this end, we propose two...
Amir Ali Ahmadi, Pablo A. Parrilo
CDC
2008
IEEE
144views Control Systems» more  CDC 2008»
14 years 2 months ago
Control software model checking using bisimulation functions for nonlinear systems
— This paper extends a method for integrating source-code model checking with dynamic system analysis to verify properties of controllers for nonlinear dynamic systems. Source-co...
James Kapinski, Alexandre Donzé, Flavio Ler...