Sciweavers

2038 search results - page 19 / 408
» Loops under Strategies
Sort
View
TITS
2008
133views more  TITS 2008»
13 years 7 months ago
Fuzzy Control Model Optimization for Behavior-Consistent Traffic Routing Under Information Provision
This paper presents an H-infinity filtering approach to optimize a fuzzy control model used to determine behaviorconsistent (BC) information-based control strategies to improve the...
Alexander Paz, Srinivas Peeta
ICRA
2010
IEEE
100views Robotics» more  ICRA 2010»
13 years 6 months ago
Robot limbo: Optimized planning and control for dynamically stable robots under vertical obstacles
Abstract— We present successful control strategies for dynamically stable robots that avoid low ceilings and other vertical obstacles in a manner similar to limbo dances. Given t...
Kasemsit Teeyapan, Jiuguang Wang, Tobias Kunz, Mik...
ASPLOS
1992
ACM
13 years 11 months ago
Access Normalization: Loop Restructuring for NUMA Compilers
: In scalable parallel machines, processors can make local memory accesses much faster than they can make remote memory accesses. In addition, when a number of remote accesses must...
Wei Li, Keshav Pingali
INFORMATICALT
2010
102views more  INFORMATICALT 2010»
13 years 4 months ago
Closed-Loop System Identification with Modifications of the Instrumental Variable Method
Least-squares method is the most popular method for parameter estimation. It is easy applicable, but it has considerable drawback. Under well-known conditions in the presence of no...
Nasko Atanasov, Alexander Ichtev
AINA
2009
IEEE
14 years 18 days ago
An Analytical Performance Evaluation for WSNs Using Loop-Free Bellman Ford Protocol
—Although several analytical models have been proposed for wireless sensor networks (WSNs) with different capabilities, very few of them consider the effect of general service di...
Mohammad Baharloo, Reza Hajisheykhi, Mohammad Arjo...