Sciweavers

255 search results - page 34 / 51
» Generalizing Consistency and other Constraint Properties to ...
Sort
View
CCS
2005
ACM
15 years 3 months ago
Deciding security of protocols against off-line guessing attacks
We provide an effective procedure for deciding the existence of off-line guessing attacks on security protocols, for a bounded number of sessions. The procedure consists of a co...
Mathieu Baudet
80
Voted
CDC
2009
IEEE
144views Control Systems» more  CDC 2009»
14 years 11 months ago
A minimized zero mean entropy approach to networked control systems
A novel control method is proposed for networked control systems with nonlinear process, probably non-Gaussian process noise and time delays. The performance index of closed loop c...
Jianhua Zhang, Hong Wang 0001
122
Voted
SIAMREV
2010
174views more  SIAMREV 2010»
14 years 4 months ago
Guaranteed Minimum-Rank Solutions of Linear Matrix Equations via Nuclear Norm Minimization
The affine rank minimization problem consists of finding a matrix of minimum rank that satisfies a given system of linear equality constraints. Such problems have appeared in the ...
Benjamin Recht, Maryam Fazel, Pablo A. Parrilo
GPCE
2007
Springer
15 years 4 months ago
Safe composition of product lines
Programs of a software product line can be synthesized by composing modules that implement features. Besides high-level domain constraints that govern the compatibility of feature...
Sahil Thaker, Don S. Batory, David Kitchin, Willia...
76
Voted
SIGIR
2005
ACM
15 years 3 months ago
The maximum entropy method for analyzing retrieval measures
We present a model, based on the maximum entropy method, for analyzing various measures of retrieval performance such as average precision, R-precision, and precision-at-cutoffs....
Javed A. Aslam, Emine Yilmaz, Virgiliu Pavlu