Sciweavers

1117 search results - page 110 / 224
» Equivalent Representations of Set Functions
Sort
View
LPAR
2007
Springer
15 years 3 months ago
Deciding Knowledge in Security Protocols for Monoidal Equational Theories
Abstract. In formal approaches, messages sent over a network are usually modeled by terms together with an equational theory, axiomatizing the properties of the cryptographic funct...
Véronique Cortier, Stéphanie Delaune
TSMC
2008
99views more  TSMC 2008»
14 years 9 months ago
Robust Regularized Kernel Regression
Robust regression techniques are critical to fitting data with noise in real-world applications. Most previous work of robust kernel regression is usually formulated into a dual fo...
Jianke Zhu, Steven C. H. Hoi, Michael R. Lyu
TCS
2010
14 years 8 months ago
Alternating states for dual nondeterminism in imperative programming
The refinement calculus of Back, Morgan, Morris, and others is based on monotone predicate transformers (weakest preconditions) where conjunctions stand for demonic choices betwee...
Wim H. Hesselink
CDC
2010
IEEE
116views Control Systems» more  CDC 2010»
14 years 4 months ago
A stochastic control approach to coding with feedback over degraded broadcast channels
In this paper we attempt to further demonstrate connections between information theory and control, in a networked setting. Specifically, we consider the communication problem of b...
Siva K. Gorantla, Todd P. Coleman
EOR
2008
70views more  EOR 2008»
14 years 9 months ago
Robust portfolio selection based on a multi-stage scenario tree
The aim of this paper is to apply the concept of robust optimization introduced by Bel-Tal and Nemirovski to the portfolio selection problems based on multi-stage scenario trees. ...
Ruijun Shen, Shuzhong Zhang