Sciweavers

11488 search results - page 2069 / 2298
» Robust optimization - methodology and applications
Sort
View
ENTCS
2008
115views more  ENTCS 2008»
15 years 3 months ago
Time Separation of Events: An Inverse Method
The problem of "time separation" can be stated as follows: Given a system made of several connected components, each one entailing a local delay known with uncertainty, ...
Emmanuelle Encrenaz, Laurent Fribourg
AUTOMATICA
2006
119views more  AUTOMATICA 2006»
15 years 3 months ago
Absolute stability of third-order systems: A numerical algorithm
The problem of absolute stability is one of the oldest open problems in the theory of control. Even for the particular case of second-order systems a complete solution was present...
Michael Margaliot, Christos Yfoulis
FSS
2008
89views more  FSS 2008»
15 years 3 months ago
On the equivalence of some approaches to the OWA operator and RIM quantifier determination
The ordered weighted averaging (OWA) operator is a widely used aggregation method, and its determination is usually a prerequisite step in many related applications. The regular i...
Xinwang Liu, Hongwei Lou
119
Voted
CGF
2006
106views more  CGF 2006»
15 years 3 months ago
Silhouette Extraction in Hough Space
Object-space silhouette extraction is an important problem in fields ranging from non-photorealistic computer graphics to medical robotics. We present an efficient silhouette extr...
Matt Olson, Hao Zhang 0002
156
Voted
CJ
2006
123views more  CJ 2006»
15 years 3 months ago
Unconditionally Secure Anonymous Encryption and Group Authentication
Anonymous channels or similar techniques that can achieve sender's anonymity play important roles in many applications. However, they will be meaningless if cryptographic prim...
Goichiro Hanaoka, Junji Shikata, Yumiko Hanaoka, H...
« Prev « First page 2069 / 2298 Last » Next »