Sciweavers

721 search results - page 42 / 145
» Stability for Effective Algebras
Sort
View
CDC
2010
IEEE
151views Control Systems» more  CDC 2010»
14 years 6 months ago
Input output analysis of power control in wireless networks
In a wireless communication network different users share a common resource. An objective of radio resource management is to assign the resources in an effective way between the us...
Anders Moller, Ulf T. Jönsson
CDC
2008
IEEE
151views Control Systems» more  CDC 2008»
15 years 6 months ago
Analysis of hybrid systems resulting from relay-type hysteresis and saturation: A Lyapunov approach
— This paper studies a class of hybrid systems with linear (or linear plus saturated linear) continuous and discrete dynamics, which are determined by a flow map and jump map, a...
Dan Dai, Ricardo G. Sanfelice, Tingshu Hu, Andrew ...
CRYPTO
2006
Springer
125views Cryptology» more  CRYPTO 2006»
15 years 3 months ago
On the Higher Order Nonlinearities of Algebraic Immune Functions
Abstract. One of the most basic requirements concerning Boolean functions used in cryptosystems is that they must have high algebraic degrees. This simple criterion is not always w...
Claude Carlet
JSYML
2008
74views more  JSYML 2008»
14 years 11 months ago
Omitting types for finite variable fragments and complete representations of algebras
. We give a novel application of algebraic logic to first order logic. A new, flexible construction is presented for representable but not completely representable atomic relation ...
Tarek Sayed Ahmed, Hajnal Andréka, Istv&aac...
CISC
2009
Springer
174views Cryptology» more  CISC 2009»
14 years 9 months ago
Algebraic Side-Channel Attacks
Abstract. In 2002, algebraic attacks using overdefined systems of equations have been proposed as a potentially very powerful cryptanalysis technique against block ciphers. However...
Mathieu Renauld, François-Xavier Standaert