Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,551,948 papers from all fields of science
Search
Sign In
Create Free Account
MM algorithm
Known as:
MM
The MM algorithm is an iterative optimization method which exploits the convexity of a function in order to find their maxima or minima. The MM…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
6 relations
Convex function
Expectation–maximization algorithm
Jensen's inequality
Line search
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
Texts semantic similarity detection based graph approach
Majid Mohebbi
,
A. Talebpour
˜The œinternational Arab journal of information…
2016
Corpus ID: 11917026
Similarity of text documents is important to analyze and extract useful information from text documents and generation of the…
Expand
2013
2013
Second-Order Markov Chain Based Multiple-Model Algorithm for Maneuvering Target Tracking
Jian Lan
,
X. R. Li
,
V. Jilkov
,
Chundi Mu
IEEE Transactions on Aerospace and Electronic…
2013
Corpus ID: 11547619
A multiple-model algorithm for maneuvering target tracking is proposed. It is referred to as a second-order Markov chain (SOMC…
Expand
2013
2013
Retrieving Smith-Waterman Alignments with Optimizations for Megabase Biological Sequences Using GPU
E. F. De O. Sandes
,
A. C. M. A. de Melo
IEEE Transactions on Parallel and Distributed…
2013
Corpus ID: 207879217
In Genome Projects, biological sequences are aligned thousands of times, in a daily basis. The Smith-Waterman algorithm is able…
Expand
2009
2009
Radome slope estimation in flight using fuzzy adaptive multiple model for active homing missile
Xiaorui Cao
,
Chaoyang Dong
,
Qing Wang
,
Yu Chen
International Conference on Electronic…
2009
Corpus ID: 28310664
For homing missile guidance system in there dimensional engagement scenarios, a new filter structure using fuzzy adaptive…
Expand
2007
2007
Performance evaluation of minimum interference routing in network scenarios with protection requirements
J. Marzo
,
E. Calle
,
P. Vilà
,
A. Urra
Computer Communications
2007
Corpus ID: 14968488
2005
2005
Feedback control design for discrete-time piecewise affine systems
Jun Xu
,
Lihua Xie
,
G. Feng
International Conferences on Computing…
2005
Corpus ID: 18650261
This paper investigates the design of state feedback and dynamic output feedback stabilizing controllers for discrete-time…
Expand
2005
2005
The behavior of model probability in multiple model algorithms
Zhanlue Zhao
,
X. R. Li
Fusion
2005
Corpus ID: 16843499
The behavior of the model probability is closely related to the performance of multiple model algorithm. A clear view about the…
Expand
2003
2003
Achieving NTRU with Montgomery Multiplication
Colleen O'Rourke
,
B. Sunar
IEEE Trans. Computers
2003
Corpus ID: 9690334
We propose a new unified architecture that utilizes the Montgomery multiplication algorithm to perform a modular multiplication…
Expand
1998
1998
Degenerate and non-degenerate convex decomposition of finite fuzzy partitions (II)
D. Dumitrescu
,
Horia F. Pop
Fuzzy Sets Syst.
1998
Corpus ID: 11837221
1993
1993
Mode structure and wavelength tunability of the p-Ge far-infrared hot hole laser
A. Muravjov
International Memory Workshop
1993
Corpus ID: 140002713
The mode spectrum of the p-Ge far-infrared intersubband transition hot hole laser, with several types ofresonator cavity, has…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE