Sciweavers

99 search results - page 6 / 10
» Properties of the Realization of Inner Functions
Sort
View
84 views 103 votes 15 years 1 months ago  MCSS 2007»
We consider the symmetric Darlington synthesis of a p × p rational symmetric Schur function S with the constraint that the extension is of size 2p×2p. Under the assumption that S...
138 views 88 votes 15 years 1 months ago  AMC 2005»
We present an interval branch-and-prune algorithm for computing verified enclosures for the global minimum and all global minimizers of univariate functions subject to bound const...
151 views 89 votes 15 years 2 months ago  ACL 2003»
We introduce a MetaGrammar, which allows us to automatically generate, from a single and compact MetaGrammar hierarchy, parallel Lexical Functional Grammars (LFG) and Tree-Adjoini...
131 views 131 votes 15 years 1 months ago  JMLR 2006»
Kernels are two-placed functions that can be interpreted as inner products in some Hilbert space. It is this property which makes kernels predestinated to carry linear models of l...
137 views 106 votes 15 years 8 months ago  ASIACRYPT 2009»
The design of cryptographic hash functions is a very complex and failure-prone process. For this reason, this paper puts forward a completely modular and fault-tolerant approach to...
82 views 78 votes 15 years 1 months ago  CPHYSICS 2007»
Recently there has been great interest in the conducting properties of DNA because of their potential applications to nanotechnology and their role in protecting the molecule from...
113 views 115 votes 15 years 1 months ago  CORR 2006»
With the rapid spread of various mobile terminals in our society, the importance of secure positioning is growing for wireless networks in adversarial settings. Recently, several ...
108 views 114 votes 15 years 1 months ago  AUTOMATICA 2005»
This paper presents a method for enlarging the domain of attraction of nonlinear model predictive control (MPC). The usual way of guaranteeing stability of nonlinear MPC is to add...
202 views 126 votes 14 years 12 months ago  SMC 2010»
—This study examines the ability of nonnegative matrix factorization (NMF) as a method for constructing semantic spaces, in which the meaning of each word is represented by a hig...
137 views 96 votes 15 years 3 months ago  ICCSA 2010»
The purpose of this paper is to realize an authentication system which satisfies four requirements for security, privacy protection, and usability, that is, impersonation resistanc...