Sciweavers

1117 search results - page 110 / 224
» Equivalent Representations of Set Functions
Sort
View
126
Voted
LPAR
2007
Springer
15 years 9 months ago
Deciding Knowledge in Security Protocols for Monoidal Equational Theories
Abstract. In formal approaches, messages sent over a network are usually modeled by terms together with an equational theory, axiomatizing the properties of the cryptographic funct...
Véronique Cortier, Stéphanie Delaune
116
Voted
TSMC
2008
99views more  TSMC 2008»
15 years 3 months ago
Robust Regularized Kernel Regression
Robust regression techniques are critical to fitting data with noise in real-world applications. Most previous work of robust kernel regression is usually formulated into a dual fo...
Jianke Zhu, Steven C. H. Hoi, Michael R. Lyu
128
Voted
TCS
2010
15 years 2 months ago
Alternating states for dual nondeterminism in imperative programming
The refinement calculus of Back, Morgan, Morris, and others is based on monotone predicate transformers (weakest preconditions) where conjunctions stand for demonic choices betwee...
Wim H. Hesselink
134
Voted
CDC
2010
IEEE
116views Control Systems» more  CDC 2010»
14 years 10 months ago
A stochastic control approach to coding with feedback over degraded broadcast channels
In this paper we attempt to further demonstrate connections between information theory and control, in a networked setting. Specifically, we consider the communication problem of b...
Siva K. Gorantla, Todd P. Coleman
128
Voted
EOR
2008
70views more  EOR 2008»
15 years 3 months ago
Robust portfolio selection based on a multi-stage scenario tree
The aim of this paper is to apply the concept of robust optimization introduced by Bel-Tal and Nemirovski to the portfolio selection problems based on multi-stage scenario trees. ...
Ruijun Shen, Shuzhong Zhang