Sciweavers

868 search results - page 31 / 174
» On Analog Signature Analysis
Sort
View
ENDM
2008
61views more  ENDM 2008»
14 years 9 months ago
Diameter and Curvature: Intriguing Analogies
We highlight intriguing analogies between the diameter of a polytope and the largest possible total curvature of the associated central path. We prove continuous analogues of the ...
Antoine Deza, Tamás Terlaky, Feng Xie, Yuri...
HICSS
2007
IEEE
136views Biometrics» more  HICSS 2007»
15 years 4 months ago
Analog and Hybrid Computation Approaches for Static Power Flow
Analog and hybrid computation methods are areas of continued interest, particularly in specific applications where traditional digital computation techniques cannot achieve the de...
Aaron St. Leger, Chika O. Nwankpa
SIPS
2007
IEEE
15 years 3 months ago
Sensitivity of Time-Division Multiplexing Parallel A/D Converters to Analog Imperfection
In this paper, the Time-Division Multiplexing (TDM) architecture for the Hybrid Filter Bank (HFB) A/D Converters (ADCs) is studied in the time domain. Giving a brief survey on the...
Davud Asemani, Jacques Oksman
KES
1998
Springer
15 years 1 months ago
Attractor systems and analog computation
Attractor systems are useful in neurodynamics,mainly in the modelingof associative memory. Thispaper presentsa complexity theory for continuous phase space dynamical systems with ...
Hava T. Siegelmann, Shmuel Fishman
KBSE
2009
IEEE
15 years 4 months ago
Generating Vulnerability Signatures for String Manipulating Programs Using Automata-Based Forward and Backward Symbolic Analyses
Given a program and an attack pattern (specified as a regular expression), we automatically generate string-based vulnerability signatures, i.e., a characterization that includes...
Fang Yu, Muath Alkhalaf, Tevfik Bultan