Sciweavers

10819 search results - page 99 / 2164
» Addition and multiplication of sets
Sort
View
CDC
2008
IEEE
14 years 2 months ago
Robust invariant set theory applied to networked buffer-level control
— A manufacturer producing several items keeps them into safety stocks (buffers) in order to supply an external stochastic demand without interruptions. We consider the classical...
Francesco Borrelli, Carmen Del Vecchio, Alessandra...
GLOBECOM
2006
IEEE
14 years 1 months ago
Efficient Construction of Weakly-Connected Dominating Set for Clustering Wireless Ad Hoc Networks
In most of the proposed clustering algorithms for wireless ad hoc networks, the cluster-heads form a dominating set in the network topology. A variant of dominating set which is mo...
Bo Han, Weijia Jia
CW
2004
IEEE
13 years 11 months ago
Watermarking a 3D Shape Model Defined as a Point Set
This paper discusses a method to watermark a 3D shape model defined as a set of unoriented points. Our approach is to perform frequency domain analysis of the shape of the 3D poin...
Ryutarou Ohbuchi, Akio Mukaiyama, Shigeo Takahashi
IAT
2009
IEEE
14 years 2 months ago
Extending Alternating-Offers Bargaining in One-to-Many and Many-to-Many Settings
Automating negotiations in markets where multiple buyers and sellers operate is a scientific challenge of extraordinary importance. One-to-one negotiations are classically studie...
Bo An, Nicola Gatti, Victor R. Lesser
DATE
2006
IEEE
82views Hardware» more  DATE 2006»
14 years 1 months ago
Concurrent core test for SOC using shared test set and scan chain disable
A concurrent core test approach is proposed to reduce the test cost of SOC. Multiple cores in SOC can be tested simultaneously by using a shared test set and scan chain disable. P...
Gang Zeng, Hideo Ito