The joint estimation of the location vector and the shape matrix of a set of independent and identically Complex Elliptically Symmetric (CES) distributed observations is investigated from both the theoretical and computational viewpoints. This joint estimation problem is framed in the original context of semiparametric models allowing us to handle the (generally unknown) density generator as an infinite-dimensional nuisance parameter. In the first part of the paper, a computationally efficient and memory saving implementation of the robust and semiparmaetric efficient R-estimator for shape matrices is derived. Building upon this result, in the second part, a joint estimator, relying on the Tyler’s M-estimator of location and on the R-estimator of shape matrix, is proposed and its Mean Squared Error (MSE) performance compared with the Semiparametric Cramér-Rao Bound (SCRB).
Journal of Automated Reasoning - Algebraic datatypes, and among them lists and trees, have attracted a lot of interest in automated reasoning and Satisfiability Modulo Theories (SMT). Since its... 相似文献
Recent advances in design theory help clarify the logic, forms and conditions of generativity. In particular, the formal model of forcing predicts that high-level generativity (so-called generic generativity) can only be reached if the knowledge structure meets the ‘splitting condition’. We test this hypothesis for the case of Bauhaus (1919–1933), where we can expect strong generativity and where we have access to the structures of knowledge provided by teaching. We analyse teaching at Bauhaus by focusing on the courses of Itten and Klee. We show that these courses aimed to increase students’ creative design capabilities by providing the students with methods of building a knowledge base with two critical features: (1) a knowledge structure that is characterized by non-determinism and non-modularity and (2) a design process that helps students progressively ‘superimpose’ languages on the object. From the results of the study, we confirm the hypothesis deduced from design theory; we reveal unexpected conditions on the knowledge structure required for generativity and show that the structure is different from the knowledge structure and design process of engineering systematic design and show that the conditions required for generativity, which can appear as a limit on generativity, can also be positively interpreted. The example of Bauhaus shows that enabling a splitting condition is a powerful way to increase designers’ generativity. 相似文献
This paper proposes to decompose the nonlinear dynamic of a chaotic system with Chebyshev polynomials to improve performances
of its estimator. More widely than synchronization of chaotic systems, this algorithm is compared to other nonlinear stochastic
estimator such as Extended Kalman Filter (EKF) and Unscented Kalman Filter (UKF). Chebyshev polynomials orthogonality properties
is used to fit a polynomial to a nonlinear function. This polynomial is then used in an Exact Polynomial Kalman Filter (ExPKF)
to run real time state estimation. The ExPKF offers mean square error optimality because it can estimate exact statistics
of transformed variables through the polynomial function. Analytical expressions of those statistics are derived so as to
lower ExPKF algorithm computation complexity and allow real time applications. Simulations under the Additive White Gaussian
Noise (AWGN) hypothesis, show relevant performances of this algorithm compared to classical nonlinear estimators. 相似文献
Authentication and authorization for Grids is a challenging security issue. In this paper, key issues for the establishment
of Grid authentication and authorization infrastructures are discussed, and an overview of major Grid authentication and authorization
technologies is presented. Related to this, recent developments in Grid authentication and authorization infrastructures suggest
adoption of the Shibboleth technology which offers advantages in terms of usability, confidentiality, scalability and manageability.
When combined with advanced authorization technologies, Shibboleth-based authentication and authorization infrastructures
provide role-based, fine-grained authorization. We share our experience in constructing a Shibboleth-based authentication
and authorization infrastructure and believe that such infrastructure provides a promising solution for the security of many
application domains. 相似文献
Many causes can be at the origin of hip osteoarthritis (e.g., cam/pincer impingements), but the exact pathogenesis for idiopathic
osteoarthritis has not yet been clearly delineated. The aim of the present work is to analyze the consequences of repetitive
extreme hip motion on the labrum cartilage. Our hypothesis is that extreme movements can induce excessive labral deformations
and lead to early arthritis. To verify this hypothesis, an optical motion capture system is used to estimate the kinematics
of patient-specific hip joint, while soft tissue artifacts are reduced with an effective correction method. Subsequently,
a physical simulation system is used during motion to compute accurate labral deformations and to assess the global pressure
of the labrum, as well as any local pressure excess that may be physiologically damageable. Results show that peak contact
pressures occur at extreme hip flexion/abduction and that the pressure distribution corresponds with radiologically observed
damage zones in the labrum.
We present a Hoare logic for proving semantic security and determining exact security bounds of a block cipher mode of operation. We propose a simple yet expressive programming language to specify encryption modes, semantic functions for each command (statement) in the language, an assertion language that allows to state predicates and axioms, and rules to propagate the predicates through the commands of a program. We also provide heuristics for finding loop invariants that are necessary for the application of our rule on for-loops. This enables us to prove the security of protocols that take arbitrary length messages as input. We implemented a prototype that uses this logic to automatically prove the security of block cipher modes of operation. This prototype can prove the security of many standard modes of operation, such as Cipher Block Chaining (CBC), Cipher FeedBack mode (CFB), Output FeedBack (OFB), and CounTeR mode (CTR). 相似文献
Multiple human pose estimation is an important yet challenging problem. In an operating room (OR) environment, the 3D body poses of surgeons and medical staff can provide important clues for surgical workflow analysis. For that purpose, we propose an algorithm for localizing and recovering body poses of multiple human in an OR environment under a multi-camera setup. Our model builds on 3D Pictorial Structures and 2D body part localization across all camera views, using convolutional neural networks (ConvNets). To evaluate our algorithm, we introduce a dataset captured in a real OR environment. Our dataset is unique, challenging and publicly available with annotated ground truths. Our proposed algorithm yields to promising pose estimation results on this dataset. 相似文献
This article investigates portfolio management in double unknown situations. Double unknown refers to a situation in which the level of uncertainty is high and both technology and markets are as yet unknown. This situation can be an opportunity for new discoveries, creation of new performance solutions and giving direction to portfolio structuring. The literature highlights that the double unknown situation is a prerequisite to designing generic technologies that are able to address many existing and emerging markets and create value across a broad range of applications. The purpose of this paper is to investigate the initial phases of generic technology governance and associated portfolio structuring in multi‐project firms. We studied three empirical contexts of portfolio structuring at the European semiconductor provider STMicroelectronics. The results demonstrate that (1) portfolio management for generic technologies is highly transversal and comprises creating both modules to address market complementarities and the core element of a technological system – the platform, and (2) the design of generic technologies requires ‘cross‐application’ managers who are able to supervise the interactions among innovative concepts developed in different business and research groups and who are responsible for structuring and managing technological and marketing exploration portfolios within the organizational structures of a company. 相似文献