Sciweavers

384 search results - page 64 / 77
» A Vector Approach to Cryptography Implementation
Sort
View
97
Voted
COCO
2007
Springer
111views Algorithms» more  COCO 2007»
15 years 3 months ago
Efficient Arguments without Short PCPs
Current constructions of efficient argument systems combine a short (polynomial size) PCP with a cryptographic hashing technique. We suggest an alternative approach for this probl...
Yuval Ishai, Eyal Kushilevitz, Rafail Ostrovsky
96
Voted
ICANNGA
2007
Springer
100views Algorithms» more  ICANNGA 2007»
15 years 3 months ago
Softening Splits in Decision Trees Using Simulated Annealing
Predictions computed by a classification tree are usually constant on axis-parallel hyperrectangles corresponding to the leaves and have strict jumps on their boundaries. The densi...
Jakub Dvorák, Petr Savický
108
Voted
ATVA
2006
Springer
191views Hardware» more  ATVA 2006»
15 years 3 months ago
Automatic Verification of Hybrid Systems with Large Discrete State Space
We address the problem of model checking hybrid systems which exhibit nontrivial discrete behavior and thus cannot be treated by considering the discrete states one by one, as most...
Werner Damm, Stefan Disch, Hardi Hungar, Jun Pang,...
87
Voted
HYBRID
2000
Springer
15 years 3 months ago
Towards Procedures for Systematically Deriving Hybrid Models of Complex Systems
Abstract. In many cases, complex system behaviors are naturally modeled as nonlinear differential equations. However, these equations are often hard to analyze because of "sti...
Pieter J. Mosterman, Gautam Biswas
GLOBECOM
2009
IEEE
15 years 2 months ago
Super-Gaussian Loading for Robust Beamforming
— It is well known that the performance of adaptive beamformers may degrade in the presence of steering errors. In this context, diagonal loading is one of the most popular metho...
Jing Gu, Patrick J. Wolfe