Sciweavers

2038 search results - page 111 / 408
» Loops under Strategies
Sort
View
VTC
2007
IEEE
152views Communications» more  VTC 2007»
15 years 10 months ago
Iterative (TURBO) IQ Imbalance Estimation and Correction in BICM-ID for Flat Fading Channels
—TURBO principle has been exploited gainfully to implement many receiver functions. RF front-end impairments are a serious issue in high spectral efficient applications. IQ imba...
Raghunath Cherukuri, Poras T. Balsara
AB
2007
Springer
15 years 10 months ago
Manifestation and Exploitation of Invariants in Bioinformatics
Whenever a programmer writes a loop, or a mathematician does a proof by induction, an invariant is involved. The discovery and understanding of invariants often underlies problem s...
Limsoon Wong
DATE
2006
IEEE
72views Hardware» more  DATE 2006»
15 years 10 months ago
HDL models of ferromagnetic core hysteresis using timeless discretisation of the magnetic slope
A new methodology is presented to assure numerically reliable integration of the magnetisation slope in the JilesAtherton model of ferromagnetic core hysteresis. Two HDL implement...
Hessa Al-Junaid, Tom J. Kazmierski
ICRA
2006
IEEE
87views Robotics» more  ICRA 2006»
15 years 10 months ago
Motion Duplication Control for Distributed Dynamic Systems by Natural Damping
— This paper proposes a motion duplication control scheme, which not only synchronizes motions between two distributed separate dynamic systems but also perfectly preserves presc...
Joono Cheong, Seungjin Lee, Jung Kim
EUROPAR
2004
Springer
15 years 9 months ago
A Data Structure Oriented Monitoring Environment for Fortran OpenMP Programs
This paper describes a monitoring environment that enables the analysis of memory access behavior of applications in a selective way with a potentially very high degree of detail. ...
Edmond Kereku, Tianchao Li, Michael Gerndt, Josef ...