Sciweavers

2767 search results - page 253 / 554
» Universal Exponentiation Algorithm
Sort
View
RTA
2009
Springer
15 years 9 months ago
Protocol Security and Algebraic Properties: Decision Results for a Bounded Number of Sessions
Abstract. We consider the problem of deciding the security of cryptographic protocols for a bounded number of sessions, taking into account some algebraic properties of the securit...
Sergiu Bursuc, Hubert Comon-Lundh
CDC
2008
IEEE
116views Control Systems» more  CDC 2008»
15 years 9 months ago
General duality between optimal control and estimation
— Optimal control and estimation are dual in the LQG setting, as Kalman discovered, however this duality has proven difficult to extend beyond LQG. Here we obtain a more natural...
Emanuel Todorov
CISS
2008
IEEE
15 years 9 months ago
Distributed estimation in wireless sensor networks via variational message passing
Abstract – In this paper, a variational message passing framework is proposed for Markov random fields. Analogous to the traditional belief propagation algorithm, variational mes...
Yanbing Zhang, Huaiyu Dai
ICASSP
2008
IEEE
15 years 9 months ago
Symbol graph based discriminative training and rescoring for improved math symbol recognition
In the symbol recognition stage of online handwritten math expression recognition, the one-pass dynamic programming algorithm can produce high-quality symbol graphs in addition of...
Zhen Xuan Luo, Yu Shi, Frank K. Soong
ICASSP
2008
IEEE
15 years 9 months ago
Efficient computation of the binary vector that maximizes a rank-deficient quadratic form
The maximization of a full-rank quadratic form over a finite alphabet is NP-hard in both a worst-case sense and an average sense. Interestingly, if the rank of the form is not a ...
George N. Karystinos, Athanasios P. Liavas