Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- extended-abstractJune 2024
Brief Announcement: A Fast Scalable Detectable Unrolled Lock-Based Linked List
SPAA '24: Proceedings of the 36th ACM Symposium on Parallelism in Algorithms and ArchitecturesPages 73–75https://doi.org/10.1145/3626183.3660272Persistent memory (PM) has emerged as a promising technology that enables data structure algorithms to preserve their consistent state after recovering from system failures. Detectable data structures have been proposed to resolve the response of the ...
- research-articleJanuary 2022
Detectability Conditions and State Estimation for Linear Time-Varying and Nonlinear Systems
SIAM Journal on Control and Optimization (SICON), Volume 60, Issue 4Pages 2514–2537https://doi.org/10.1137/21M1429473This work proposes a detectability condition for linear time-varying systems based on the exponential dichotomy spectrum. The condition guarantees the existence of an observer, whose gain is determined only by the unstable modes of the system. This allows ...
- extended-abstractJuly 2021
Brief Announcement: Detectable Sequential Specifications for Recoverable Shared Objects
PODC'21: Proceedings of the 2021 ACM Symposium on Principles of Distributed ComputingPages 557–560https://doi.org/10.1145/3465084.3467943The recent commercial release of persistent main memory by Intel has sparked intense interest in recoverable concurrent objects. Specifying and implementing such objects is technically challenging on current generation hardware precisely because the top ...
- research-articleJanuary 2021
Nonlinear Detectability and Incremental Input/Output-to-State Stability
SIAM Journal on Control and Optimization (SICON), Volume 59, Issue 4Pages 3017–3039https://doi.org/10.1137/20M135039XIncremental input/output-to-state stability (i-IOSS) is a popular characterization of detectability for nonlinear systems. For instance, it is known that any system that admits a robustly stable full-order observer (i.e., a system evolving in the same state ...
- research-articleJuly 2020
Upper and Lower Bounds on the Space Complexity of Detectable Objects
PODC '20: Proceedings of the 39th Symposium on Principles of Distributed ComputingPages 11–20https://doi.org/10.1145/3382734.3405725The emergence of systems with non-volatile main memory (NVM) increases the interest in the design of recoverable concurrent objects that are robust to crash-failures, since their operations are able to recover from such failures by using state retained ...
-
- short-paperJuly 2020
Tracking in Order to Recover - Detectable Recovery of Lock-Free Data Structures
SPAA '20: Proceedings of the 32nd ACM Symposium on Parallelism in Algorithms and ArchitecturesPages 503–505https://doi.org/10.1145/3350755.3400257We present the tracking approach for deriving detectable implementations of many widely-used concurrent data structures for systems with non-volatile main memory (NVRAM). Detectable recovery ensures that in the crash-recovery model, every operation ...
- research-articleJanuary 2018
Turnpike Properties and Strict Dissipativity for Discrete Time Linear Quadratic Optimal Control Problems
SIAM Journal on Control and Optimization (SICON), Volume 56, Issue 2Pages 1282–1302https://doi.org/10.1137/17M112350XWe analyze the connection between turnpike behaviors and strict dissipativity properties for discrete time finite dimensional linear quadratic optimal control problems. We first use strict dissipativity as a sufficient condition for the turnpike property. ...
- ArticleDecember 2013
Secure Steganography Technique Based on Bitplane Indexes
ISM '13: Proceedings of the 2013 IEEE International Symposium on MultimediaPages 287–291https://doi.org/10.1109/ISM.2013.55This paper is concerned with secret hiding in multiple image bit planes for increased security without undermining capacity. A secure steganographic algorithm based on bit planes index manipulation is proposed. The index manipulation is confined to the ...
- posterNovember 2013
POSTER: TRIPLEX: verifying data minimisation in communication systems
CCS '13: Proceedings of the 2013 ACM SIGSAC conference on Computer & communications securityPages 1415–1418https://doi.org/10.1145/2508859.2512514Systems dealing with personal information are legally required to satisfy the principle of data minimisation. Privacy-enhancing protocols use cryptographic primitives to minimise the amount of personal information exposed by communication. However, the ...
- ArticleJuly 2012
A quality control framework using task-based detectability measurements for digital mammography
IWDM'12: Proceedings of the 11th international conference on Breast ImagingPages 197–204https://doi.org/10.1007/978-3-642-31271-7_26Quality control for digital mammography should be objective, reproducible and applicable across different manufacturers' systems and technologies. Ideally it should be possible to set clearly defined thresholds of acceptable behaviour that can be ...
- ArticleJune 2009
Sensor Disposition Problem in Wireless Ad-Hoc Sensor Networks
ISA '09: Proceedings of the 3rd International Conference and Workshops on Advances in Information Security and AssurancePages 485–493https://doi.org/10.1007/978-3-642-02617-1_49In order to monitor for traffic traversal, sensors can be deployed to perform collaborative target detection. Such a sensor network achieves a certain level of detection performance with an associated cost of deployment. This paper addresses two points ...
- articleMarch 2008
Time-Varying Regular Bilinear Systems
SIAM Journal on Control and Optimization (SICON), Volume 47, Issue 3Pages 1097–1126https://doi.org/10.1137/050632245The theory of infinite-dimensional systems introduced and developed by Salamon [Trans. Amer. Math. Soc., 300 (1987), pp. 383-431] and Weiss [SIAM J. Control Optim., 27 (1989), pp. 527-545] has been recently applied for various systems; see, e.g., the ...
- articleJune 2005
A New Approach to Detectability of Discrete-Time Infinite Markov Jump Linear Systems
SIAM Journal on Control and Optimization (SICON), Volume 43, Issue 6Pages 2132–2156https://doi.org/10.1137/S036301290342992XThis paper deals with detectability for the class of discrete-time Markov jump linear systems (MJLS) with the underlying Markov chain having countably infinite state space. The formulation here relates the convergence of the output with that of the ...
- articleJanuary 2004
Separation Principles for Input-Output and Integral-Input-to-State Stability
SIAM Journal on Control and Optimization (SICON), Volume 43, Issue 1Pages 256–276https://doi.org/10.1137/S0363012902419047We present new characterizations of input-output-to-state stability. This is a notion of detectability formulated in the ISS (input-to-state stability) framework. Equivalent properties are presented in terms of asymptotic estimates of the state ...
- articleDecember 2000
Input-Output-to-State Stability
SIAM Journal on Control and Optimization (SICON), Volume 39, Issue 6Pages 1874–1928https://doi.org/10.1137/S0363012999365352This work explores Lyapunov characterizations of the input-output-to-state stability (IOSS) property for nonlinear systems. The notion of IOSS is a natural generalization of the standard zero-detectability property used in the linear case. The main ...
- articleOctober 2000
Optimizability and Estimatability for Infinite-Dimensional Linear Systems
SIAM Journal on Control and Optimization (SICON), Volume 39, Issue 4Pages 1204–1232https://doi.org/10.1137/S036301299833519XAn infinite-dimensional linear system described by $\dot{x}(t)=Ax(t)+Bu(t)$ $(t\geq 0)$ is said to be optimizable if for every initial state x(0), an input $u\in L^2$ can be found such that $x\in L^2$. Here, A is the generator of a strongly continuous ...
- articleJuly 1998
Coprime Factorizations and Well-Posed Linear Systems
SIAM Journal on Control and Optimization (SICON), Volume 36, Issue 4Pages 1268–1292https://doi.org/10.1137/S0363012995285417We study the basic notions related to the stabilization of an infinite-dimensional well-posed liner system in the sense of Salamon and Weiss. We first introduce an appropriate stabilizability and detectability notion and show that if a system is ...
- research-articleJanuary 1998
Model-Based 3D Object Recognition Using Bayesian Indexing
Computer Vision and Image Understanding (CVIU), Volume 69, Issue 1Pages 87–105https://doi.org/10.1006/cviu.1997.0597This research features the rapid recognition of three-dimensional objects, focusing on efficient indexing. A major concern in practical vision systems is how to retrieve the best matched models without exploring all possible object matches. We have ...
- research-articleSeptember 1997
Detectability, Uniqueness, and Reliability of Eigen Windows for Stable Verification of Partially Occluded Objects
IEEE Transactions on Pattern Analysis and Machine Intelligence (ITPM), Volume 19, Issue 9Pages 1043–1048https://doi.org/10.1109/34.615453This paper describes a method for recognizing partially occluded objects for bin-picking tasks using eigenspace analysis, referred to as the "eigen window" method, that stores multiple partial appearances of an object in an eigenspace. Such partial ...