Sciweavers

518 search results - page 33 / 104
» Solution of a system of linear equations with fuzzy numbers
Sort
View
97
Voted
INFORMATICALT
2010
99views more  INFORMATICALT 2010»
14 years 11 months ago
Security Analysis of Asymmetric Cipher Protocol Based on Matrix Decomposition Problem
The asymmetric cipher protocol, based on decomposition problem in matrix semiring M over semiring of natural numbers N is presented. The security of presented cipher protocol is ba...
Andrius Raulynaitis, Eligijus Sakalauskas, Saulius...
MMAS
2010
Springer
14 years 7 months ago
A Novel Method for Solving Multiscale Elliptic Problems with Randomly Perturbed Data
We propose a method for efficient solution of elliptic problems with multiscale features and randomly perturbed coefficients. We use the multiscale finite element method (MsFEM) as...
Victor Ginting, Axel Målqvist, Michael Presh...
96
Voted
SIAMCO
2002
86views more  SIAMCO 2002»
15 years 3 days ago
On the Observability and Detectability of Continuous-Time Markov Jump Linear Systems
The paper introduces a new detectability concept for continuous-time Markov jump linear systems with finite Markov space that generalizes previous concepts found in the literature....
Eduardo F. Costa, João Bosco Ribeiro do Val
CDC
2008
IEEE
150views Control Systems» more  CDC 2008»
15 years 7 months ago
Riccati conditioning and sensitivity for a MinMax controlled cable-mass system
— In this paper we study the relationship between the parameter θ, used in the design of the MinMax controller, and the conditioning of the approximate algebraic Riccati equatio...
Lizette Zietsman, Katie A. Evans, J. Teye Brown, R...
82
Voted
CORR
2010
Springer
61views Education» more  CORR 2010»
15 years 17 days ago
A weakly stable algorithm for general Toeplitz systems
We show that a fast algorithm for the QR factorization of a Toeplitz or Hankel matrix A is weakly stable in the sense that RT R is close to AT A. Thus, when the algorithm is used ...
Adam W. Bojanczyk, Richard P. Brent, Frank R. de H...