Sciweavers

3281 search results - page 82 / 657
» Bases for parametrized iterativity
Sort
View
130
Voted
CDC
2010
IEEE
226views Control Systems» more  CDC 2010»
14 years 8 months ago
Fast primal-dual projected linear iterations for distributed consensus in constrained convex optimization
In this paper we study the constrained consensus problem, i.e. the problem of reaching a common point from the estimates generated by multiple agents that are constrained to lie in...
Ion Necoara, Ioan Dumitrache, Johan A. K. Suykens
FSE
1994
Springer
145views Cryptology» more  FSE 1994»
15 years 5 months ago
TEA, a Tiny Encryption Algorithm
We give a short routine which is based on a Feistel iteration and uses a large number of rounds to get security with simplicity.
David J. Wheeler, Roger M. Needham
132
Voted
PEPM
2000
ACM
15 years 5 months ago
From Recursion to Iteration: What are the Optimizations?
Transforming recursion into iteration eliminates the use of stack frames during program execution. It has been studied extensively. This paper describes a powerful and systematic ...
Yanhong A. Liu, Scott D. Stoller
WCNC
2008
IEEE
15 years 8 months ago
Two-Stage Code Acquisition Employing Search Space Reduction and Iterative Detection in the DS-UWB Downlink
— In this paper we propose and investigate an iterative code acquisition scheme assisted by both search space reduction and iterative Massage Passing (MP), which was designed for...
Seung Hwan Won, Lajos Hanzo
FOSSACS
2007
Springer
15 years 7 months ago
Iterator Types
Abstract. System L is a linear λ-calculus with numbers and an iterator, which, although imposing linearity restrictions on terms, has all the computational power of G¨odel’s Sy...
Sandra Alves, Maribel Fernández, Már...