Sciweavers

7694 search results - page 1384 / 1539
» An Implementation of an Applicative File System
Sort
View
132
Voted
CAGD
2008
98views more  CAGD 2008»
15 years 3 months ago
Exact evaluation of limits and tangents for non-polynomial subdivision schemes
In this paper, we describe a method for exact evaluation of a limit mesh defined via subdivision and its associated tangent vectors on a uniform grid of any size. Other exact eval...
S. Schaefer, J. Warren
119
Voted
CORR
2010
Springer
109views Education» more  CORR 2010»
15 years 3 months ago
Dirty Paper Coding using Sign-bit Shaping and LDPC Codes
Dirty paper coding (DPC) refers to methods for pre-subtraction of known interference at the transmitter of a multiuser communication system. There are numerous applications for DPC...
G. Shilpa, Andrew Thangaraj, Srikrishna Bhashyam
98
Voted
EOR
2010
102views more  EOR 2010»
15 years 3 months ago
The Tree of Hubs Location Problem
The Tree-of-Hubs Location Problem is studied. This problem, which combines several aspects of some location, network design and routing problems, is inspired by those transportati...
Iván A. Contreras, Elena Fernández, ...
134
Voted
ECEASST
2008
110views more  ECEASST 2008»
15 years 3 months ago
Independence Analysis of Firing and Rule-based Net Transformations in Reconfigurable Object Nets
: The main idea behind Reconfigurable Object Nets (RONs) is to support the visual specification of controlled rule-based net transformations of place/transition nets (P/T nets). RO...
Enrico Biermann, Tony Modica
129
Voted
ENGL
2008
153views more  ENGL 2008»
15 years 3 months ago
Neural Network NARMA Control of a Gyroscopic Inverted Pendulum
The objective herein is to demonstrate the feasibility of a real-time digital control of an inverted pendulum for modeling and control, with emphasis on nonlinear auto regressive m...
F. Chetouane, S. Darenfed
« Prev « First page 1384 / 1539 Last » Next »