Sciweavers

113 search results - page 5 / 23
» An iterative logarithmic multiplier
Sort
View
ASAP
2003
IEEE
155views Hardware» more  ASAP 2003»
14 years 3 months ago
Decimal Multiplication Via Carry-Save Addition
Decimal multiplication is important in many commercial applications including financial analysis, banking, tax calculation, currency conversion, insurance, and accounting. This p...
Mark A. Erle, Michael J. Schulte
INFOCOM
2011
IEEE
13 years 1 months ago
Consort: Node-Constrained Opportunistic Routing in wireless mesh networks
— Opportunistic routing is proposed to improve the performance of wireless networks by exploiting the broadcast nature and spatial diversity of the wireless medium. In this paper...
Xi Fang, Dejun Yang, Guoliang Xue
ARITH
2007
IEEE
14 years 1 months ago
An Algorithm for Inversion in GF(2^m) Suitable for Implementation Using a Polynomial Multiply Instruction on GF(2)
An algorithm for inversion in GF(2m ) suitable for implementation using a polynomial multiply instruction on GF(2) is proposed. It is based on the extended Euclid's algorithm...
Katsuki Kobayashi, Naofumi Takagi, Kazuyoshi Takag...
AUTOMATICA
2005
116views more  AUTOMATICA 2005»
13 years 9 months ago
Monotonically convergent iterative learning control for linear discrete-time systems
In iterative learning control schemes for linear discrete time systems, conditions to guarantee the monotonic convergence of the tracking9 error norms are derived. By using the Ma...
Kevin L. Moore, Yangquan Chen, Vikas Bahl
ALT
2008
Springer
14 years 6 months ago
Entropy Regularized LPBoost
In this paper we discuss boosting algorithms that maximize the soft margin of the produced linear combination of base hypotheses. LPBoost is the most straightforward boosting algor...
Manfred K. Warmuth, Karen A. Glocer, S. V. N. Vish...