Sciweavers

2050 search results - page 194 / 410
» constraints 2010
Sort
View
123
Voted
COMPSAC
2010
IEEE
14 years 9 months ago
Security in Context: Analysis and Refinement of Software Architectures
Security analysis methods can provide correct yet meaningless results if the assumptions underlying the model do not conform to reality. We present an approach to analyze the secur...
Thomas Heyman, Riccardo Scandariato, Wouter Joosen
114
Voted
ACCV
2010
Springer
14 years 7 months ago
Efficient Structured Support Vector Regression
Support Vector Regression (SVR) has been a long standing problem in machine learning, and gains its popularity on various computer vision tasks. In this paper, we propose a structu...
Ke Jia, Lei Wang, Nianjun Liu
CDC
2010
IEEE
181views Control Systems» more  CDC 2010»
14 years 7 months ago
Relationship between power loss and network topology in power systems
This paper is concerned with studying how the minimum power loss in a power system is related to its network topology. The existing algorithms in the literature all exploit nonline...
Javad Lavaei, Steven H. Low
CDC
2010
IEEE
226views Control Systems» more  CDC 2010»
14 years 7 months ago
Fast primal-dual projected linear iterations for distributed consensus in constrained convex optimization
In this paper we study the constrained consensus problem, i.e. the problem of reaching a common point from the estimates generated by multiple agents that are constrained to lie in...
Ion Necoara, Ioan Dumitrache, Johan A. K. Suykens
84
Voted
TSP
2010
14 years 7 months ago
Power allocation for a MIMO relay system with multiple-antenna users
A power allocation or scheduling problem is studied for a multiuser multiple-input multiple-output (MIMO) wireless relay system where there is a non-regenerative relay between one ...
Yuan Yu, Yingbo Hua