Sciweavers

1224 search results - page 90 / 245
» Theory decision by decomposition
Sort
View
99
Voted
RTA
2009
Springer
15 years 7 months ago
YAPA: A Generic Tool for Computing Intruder Knowledge
Reasoning about the knowledge of an attacker is a necessary step in many formal analyses of security protocols. In the framework of the applied pi calculus, as in similar languages...
Mathieu Baudet, Véronique Cortier, St&eacut...
101
Voted
DAGM
2001
Springer
15 years 5 months ago
Optimal Camera Parameter Selection for State Estimation with Applications in Object Recognition
In this paper we introduce a formalism for optimal camera parameter selection for iterative state estimation. We consider a framework based on Shannon’s information theory and se...
Joachim Denzler, Christopher M. Brown, Heinrich Ni...
ALGORITHMICA
2006
77views more  ALGORITHMICA 2006»
15 years 23 days ago
Scalable Parallel Algorithms for FPT Problems
Algorithmic methods based on the theory of fixed-parameter tractability are combined with powerful computational platforms to launch systematic attacks on combinatorial problems o...
Faisal N. Abu-Khzam, Michael A. Langston, Pushkar ...
80
Voted
TROB
2008
109views more  TROB 2008»
15 years 17 days ago
An Investigation of the Intrinsic Force Sensing Capabilities of Continuum Robots
-- This paper presents the theoretical analysis and the experimental validation of the force sensing capabilities of continuum robots. These robots employ super-elastic NiTi backbo...
Kai Xu 0005, Nabil Simaan
91
Voted
TIT
2010
97views Education» more  TIT 2010»
14 years 7 months ago
Why does the Kronecker model result in misleading capacity estimates?
Many recent works that study the performance of multi-input multi-output (MIMO) systems in practice assume a Kronecker model where the variances of the channel entries, upon decom...
Vasanthan Raghavan, Jayesh H. Kotecha, Akbar M. Sa...