Sciweavers

187 search results - page 20 / 38
» Computing Special Values of Partial Zeta Functions
Sort
View
ICIP
2009
IEEE
15 years 10 months ago
Secure Distortion Computation Among Untrusting Parties Using Homomorphic Encryption
Alice and Bob possess sequences xn and yn respectively and would like to compute d(xn , yn ) where d(., .) is a distortion measure. However, Alice and Bob do not trust each other ...
77
Voted
ATMOS
2010
163views Optimization» more  ATMOS 2010»
14 years 8 months ago
Railway Track Allocation by Rapid Branching
The track allocation problem, also known as train routing problem or train timetabling problem, is to find a conflict-free set of train routes of maximum value in a railway netw...
Ralf Borndörfer, Thomas Schlechte, Steffen We...
AAAI
2010
14 years 11 months ago
Structured Parameter Elicitation
The behavior of a complex system often depends on parameters whose values are unknown in advance. To operate effectively, an autonomous agent must actively gather information on t...
Li Ling Ko, David Hsu, Wee Sun Lee, Sylvie C. W. O...
HYBRID
2009
Springer
15 years 1 months ago
Trajectory Based Verification Using Local Finite-Time Invariance
Abstract. In this paper we propose a trajectory based reachability analysis by using local finite-time invariance property. Trajectory based analysis are based on the execution tra...
A. Agung Julius, George J. Pappas
CDC
2008
IEEE
109views Control Systems» more  CDC 2008»
15 years 4 months ago
LQG control over lossy TCP-like networks with probabilistic packet acknowledgements
Abstract— This paper is concerned with control applications over lossy data networks. Sensor data is transmitted to an estimation-control unit over a network, and control command...
Emanuele Garone, Bruno Sinopoli, Alessandro Casavo...