Sciweavers

639 search results - page 31 / 128
» Dominance Constraints with Set Operators
Sort
View
ICRA
2008
IEEE
127views Robotics» more  ICRA 2008»
14 years 5 months ago
Continuous control law from unilateral constraints
— The control approaches based on tasks, and particularly based on a hierarchy of tasks, enable to build complex behaviors with some nice properties of robustness and portability...
Nicolas Mansard, Oussama Khatib
CPAIOR
2004
Springer
14 years 4 months ago
Cost Evaluation of Soft Global Constraints
This paper shows that existing definitions of costs associated with soft global constraints are not sufficient to deal with all the usual global constraints. We propose more expre...
Nicolas Beldiceanu, Thierry Petit
SERP
2007
14 years 8 days ago
Using Constraints with Action Language for Model Evolution
- Since the advent of model driven software engineering (MDSE) it has become necessary to develop techniques and tools for model evolution. In this paper we examine two issues and ...
Shahid Alam, Samuel A. Ajila
CMG
2003
14 years 7 days ago
Virtual Memory Constraints in 32-bit Windows
Many server workloads can exhaust the 32-bit virtual address space in the Windows server operating systems. Machines configured with 2 GB or more of RAM installed are particularly...
Mark B. Friedman
SAC
2010
ACM
14 years 3 months ago
Data stream anomaly detection through principal subspace tracking
We consider the problem of anomaly detection in multiple co-evolving data streams. In this paper, we introduce FRAHST (Fast Rank-Adaptive row-Householder Subspace Tracking). It au...
Pedro Henriques dos Santos Teixeira, Ruy Luiz Mili...