Sciweavers

657 search results - page 22 / 132
» On the Identification of a Class of Linear Models
Sort
View
SP
2010
IEEE
156views Security Privacy» more  SP 2010»
14 years 7 months ago
Round-Efficient Broadcast Authentication Protocols for Fixed Topology Classes
Abstract--We consider resource-constrained broadcast authentication for n receivers in a static, known network topology. There are only two known broadcast authentication protocols...
Haowen Chan, Adrian Perrig
79
Voted
ICIP
2006
IEEE
15 years 11 months ago
Image Tampering Identification using Blind Deconvolution
Digital images have been used in growing number of applications from law enforcement and surveillance, to medical diagnosis and consumer photography. With such widespread populari...
Ashwin Swaminathan, Min Wu, K. J. Ray Liu
EGICE
2006
15 years 1 months ago
Combining Two Data Mining Methods for System Identification
System identification is an abductive task which is affected by several kinds of modeling assumptions and measurement errors. Therefore, instead of optimizing values of parameters ...
Sandro Saitta, Benny Raphael, Ian F. C. Smith
ACS
2005
14 years 9 months ago
Relating Categorical Semantics for Intuitionistic Linear Logic
There are several kinds of linear typed calculus in the literature, some with their associated notion of categorical model. Our aim in this paper is to systematise the relationshi...
Maria Emilia Maietti, Paola Maneggia, Valeria de P...
AEI
1999
110views more  AEI 1999»
14 years 9 months ago
Self-tuning fuzzy controller design using genetic optimisation and neural network modelling
This article describes a new adaptive fuzzy logic control scheme. The proposed scheme is based on the structure of the self-tuning regulator and employs neural network and genetic...
Duc Truong Pham, Dervis Karaboga