Sciweavers

835 search results - page 64 / 167
» Characterizing rosy theories
Sort
View
SPLST
2003
15 years 1 months ago
Secure SMS messaging using Quasigroup encryption and Java SMS API
SMS (Short Message Service) is a widely used service for brief communication. Occasionally the data sent using SMS services is confidential in nature and is desired not to be disc...
Marko Hassinen, Smile Markovski
AUTOMATICA
2008
78views more  AUTOMATICA 2008»
14 years 12 months ago
Exact determinations of the maximal output admissible set for a class of nonlinear systems
This paper is concerned with obtaining necessary and sufficient conditions for fulfilling specified state and control pointwise-in-time constraints against a certain class of nonli...
Kenji Hirata, Yoshito Ohta
CORR
2010
Springer
98views Education» more  CORR 2010»
14 years 12 months ago
Strategical languages of infinite words
: We deal in this paper with strategical languages of infinite words, that is those generated by a nondeterministic strategy in the sense of game theory. We first show the existenc...
Mustapha Arfi, Bedine Ould M. Lemine, Carla Selmi
EJC
2010
14 years 12 months ago
Geometric properties of Assur graphs
In our previous paper, we presented the combinatorial theory for minimal isostatic pinned frameworks - Assur graphs - which arise in the analysis of mechanical linkages. In this p...
Brigitte Servatius, Offer Shai, Walter Whiteley
EOR
2008
112views more  EOR 2008»
14 years 12 months ago
DEA based auctions
We discuss the design of multi-dimensional tender and auction mechanisms that combine Data Envelopment Analysis (DEA) and auction theory. The mechanisms select an agent to perform...
Peter Bogetoft, Kurt Nielsen