Even though energy efficient climate control of buildings using model predictive control (MPC) has been widely investigated, most MPC formulations ig…

Two-party secure function evaluation (SFE) has become significantly more feasible, even on resource-constrained devices, because of advances in serve…

We consider estimation and inference in a single index regression model with an unknown but smooth link function. In contrast to the standard approac…

This article discusses a newly developed online manifold learning method, subspace iteration using reduced models (SIRM), for the dimensionality redu…

In this paper, a symplectic model reduction technique, proper symplectic decomposition (PSD) with symplectic Galerkin projection, is proposed to save…

The kinematics and dynamics of young stellar populations enable us to test theories of star formation. With this aim, we continue our analysis of the…

I thank Prof. Peter Sin for his valuable suggestions and feedback. I am grateful to Prof. David Saunders for providing computational data.

The \emph{critical} group of a finite connected graph is an abelian group defined by the Smith normal form of its Laplacian. Let $q$ be a power of a …

In this paper, we consider a class of finite-sum convex optimization problems whose objective function is given by the summation of $m$ ($\ge 1$) smooth components together with some other relatively simple terms. We first introduce a deterministic …

In this paper, we consider a class of finite-sum convex optimization problems whose objective function is given by the summation of $m$ ($\ge 1$) smo…

Due to high complexity of many modern machine learning models such as deep convolutional networks, understanding the cause of model's prediction is c…

The Multiple Instance Hybrid Estimator for discriminative target characterization from imprecisely labeled hyperspectral data is presented. In many h…

Dynamical systems comprising of multiple components that can be partitioned into distinct blocks originate in many scientific areas. A pertinent exam…

We use a method for determining the number of preimages of any permutation under the stack-sorting map in order to obtain recursive upper bounds for …

Realistic mobility models are fundamental to evaluate the performance of protocols in mobile ad hoc networks. Unfortunately, there are no mobility mo…

The state space of a generic string bit model is spanned by $N\times N$ matrix creation operators acting on a vacuum state. Such creation operators t…

Wide-band Electromagnetic Induction Sensors (WEMI) have been used for a number of years in subsurface detection of explosive hazards. While WEMI sens…

We introduce a new geometric framework for the set of symmetric positive-definite (SPD) matrices, aimed to characterize deformations of SPD matrices …

Gravitational wave (GW) and gravitational slingshot recoil kicks, which are natural products of SMBH evolution in merging galaxies, can produce activ…

Learning visual feature representations for video analysis is a daunting task that requires a large amount of training samples and a proper generaliz…

Radial-basis-function networks are traditionally defined for sets of vector-based observations. In this short paper, we reformulate such networks so …

Semiconductor design houses are increasingly becoming dependent on third party vendors to procure intellectual property (IP) and meet time-to-market …

By signing up you accept our content policy

Already have an account? Sign in

No a member yet? Create an account