Sciweavers

1684 search results - page 279 / 337
» The lexicographic decision function
Sort
View
SIGCOMM
2010
ACM
13 years 10 months ago
Fived: a service-based architecture implementation to innovate at the endpoints
Security functions such as access control, encryption and authentication are typically left up to applications on the modern Internet. There is no unified system to implement thes...
D. J. Capelis, Darrell D. E. Long
CDC
2008
IEEE
145views Control Systems» more  CDC 2008»
13 years 10 months ago
Necessary and sufficient conditions for success of the nuclear norm heuristic for rank minimization
Minimizing the rank of a matrix subject to constraints is a challenging problem that arises in many applications in control theory, machine learning, and discrete geometry. This c...
Benjamin Recht, Weiyu Xu, Babak Hassibi
AIL
2007
96views more  AIL 2007»
13 years 10 months ago
Legal ontology of sales law application to ecommerce
Legal codes, such as the Uniform Commercial Code (UCC) examined in this article, are good points of entry for AI and ontology work because of their more straightforward adaptabili...
John W. Bagby, Tracy Mullen
CORR
2010
Springer
147views Education» more  CORR 2010»
13 years 10 months ago
High-Rate Quantization for the Neyman-Pearson Detection of Hidden Markov Processes
This paper investigates the decentralized detection of Hidden Markov Processes using the NeymanPearson test. We consider a network formed by a large number of distributed sensors....
Joffrey Villard, Pascal Bianchi, Eric Moulines, Pa...
CSDA
2008
120views more  CSDA 2008»
13 years 10 months ago
Tree-structured smooth transition regression models
ABSTRACT. This paper introduces a tree-based model that combines aspects of CART (Classification and Regression Trees) and STR (Smooth Transition Regression). The model is called t...
Joel Corrêa da Rosa, Alvaro Veiga, Marcelo C...