Sciweavers

1075 search results - page 131 / 215
» Calculating the Number of Tunnels
Sort
View
SMA
2009
ACM
125views Solid Modeling» more  SMA 2009»
14 years 4 months ago
Stable mesh decimation
Current mesh reduction techniques, while numerous, all primarily reduce mesh size by successive element deletion (e.g. edge collapses) with the goal of geometric and topological f...
Chandrajit L. Bajaj, Andrew Gillette, Qin Zhang
CEC
2008
IEEE
14 years 4 months ago
A feasibility-preserving local search operator for constrained discrete optimization problems
Abstract— Meta-heuristic optimization approaches are commonly applied to many discrete optimization problems. Many of these optimization approaches are based on a local search op...
Martin Lukasiewycz, Michael Glaß, Christian ...
ICC
2008
IEEE
116views Communications» more  ICC 2008»
14 years 4 months ago
Pre-Equalization for Pre-Rake MISO DS-UWB Systems
—In this paper, we propose two novel pre–equalization schemes for multiple–input single–output (MISO) direct–sequence ultra–wideband (DS–UWB) systems with pre–Rake ...
Elham Torabi, Jan Mietzner, Robert Schober
ICC
2008
IEEE
107views Communications» more  ICC 2008»
14 years 4 months ago
Minimum BER Transmit Beamforming for MIMO-OFDM Systems with Finite Rate Feedback
— In this paper, we consider minimum bit error rate (BER) beamforming (BF) for multiple–input multiple–output orthogonal frequency division multiplexing (MIMO–OFDM) systems...
Yang-wen Liang, Robert Schober, Wolfgang H. Gersta...
ICDCS
2008
IEEE
14 years 4 months ago
Analysis of Maximum Executable Length for Detecting Text-Based Malware
The possibility of using purely text stream (keyboardenterable) as carrier of malware is under-researched and often underestimated. A text attack can happen at multiple levels, fr...
P. Kumar Manna, Sanjay Ranka, Shigang Chen