Sciweavers

532 search results - page 74 / 107
» Extending Scalar Multiplication Using Double Bases
Sort
View
ICRA
2009
IEEE
182views Robotics» more  ICRA 2009»
14 years 3 months ago
Manipulation planning on constraint manifolds
Abstract— We present the Constrained Bi-directional RapidlyExploring Random Tree (CBiRRT) algorithm for planning paths in configuration spaces with multiple constraints. This al...
Dmitry Berenson, Siddhartha S. Srinivasa, Dave Fer...
ICRA
2008
IEEE
135views Robotics» more  ICRA 2008»
14 years 3 months ago
Decentralized connectivity maintenance in mobile networks with bounded inputs
Abstract— A distributed control law that guarantees connectivity maintenance in a network of multiple mobile agents is presented. The control law respects the limited sensing cap...
Dimos V. Dimarogonas, Karl Henrik Johansson
ICC
2007
IEEE
114views Communications» more  ICC 2007»
14 years 16 days ago
Channel-Matched Spreading Codes for the Downlink of MC-CDMA
Abstract-- This paper concerns the multiple access performance of spreading codes used in the downlink of multicarrier code-division multiple-access (MC-CDMA). Complex-valued sprea...
Qinghua Shi, Yong Liang Guan, Choi Look Law
LREC
2008
129views Education» more  LREC 2008»
13 years 10 months ago
Chinese Core Ontology Construction from a Bilingual Term Bank
A core ontology is a mid-level ontology which bridges the gap between an upper ontology and a domain ontology. Automatic Chinese core ontology construction can help quickly model ...
Yi-Rong Chen, Qin Lu, Wenjie Li, Gaoying Cui
IJCAI
2003
13 years 10 months ago
Employing Trainable String Similarity Metrics for Information Integration
The problem of identifying approximately duplicate objects in databases is an essential step for the information integration process. Most existing approaches have relied on gener...
Mikhail Bilenko, Raymond J. Mooney