Sciweavers

4166 search results - page 405 / 834
» Automating the constraining process
Sort
View
ENTCS
2008
110views more  ENTCS 2008»
15 years 5 months ago
A New Proposal Of Quasi-Solved Form For Equality Constraint Solving
Most well-known algorithms for equational solving are based on quantifier elimination. This technique iteratively eliminates the innermost block of existential/universal quantifie...
Javier Álvez, Paqui Lucio
COR
2006
84views more  COR 2006»
15 years 5 months ago
Stability and interaction in flatline games
Starting from a given one-shot game played by a finite population of agents living in flatline, a circular or constrained grid structured by the classical definitions of neighborh...
Alexander Mehlmann
EOR
2006
81views more  EOR 2006»
15 years 5 months ago
Optimal and near-optimal policies for lost sales inventory models with at most one replenishment order outstanding
In this paper we use policy-iteration to explore the behaviour of optimal control policies for lost sales inventory models with the constraint that not more than one replenishment...
Roger M. Hill, Søren Glud Johansen
114
Voted
IJNSEC
2006
78views more  IJNSEC 2006»
15 years 5 months ago
Authentication and Key Agreement Protocols Preserving Anonymity
Anonymity is a very important security feature in addition to authentication and key agreement features in communication protocols. In this paper, we propose two authentication an...
Kumar V. Mangipudi, Rajendra S. Katti, Huirong Fu
152
Voted
JMLR
2006
136views more  JMLR 2006»
15 years 5 months ago
Optimising Kernel Parameters and Regularisation Coefficients for Non-linear Discriminant Analysis
In this paper we consider a novel Bayesian interpretation of Fisher's discriminant analysis. We relate Rayleigh's coefficient to a noise model that minimises a cost base...
Tonatiuh Peña Centeno, Neil D. Lawrence