Sciweavers

2150 search results - page 178 / 430
» On a restricted cross-intersection problem
Sort
View
ICRA
2005
IEEE
168views Robotics» more  ICRA 2005»
15 years 10 months ago
Target Acquisition, Localization, and Surveillance Using a Fixed-Wing Mini-UAV and Gimbaled Camera
— Target acquisition and continuous surveillance using fixed-wing UAVs is a difficult task due to the many degrees of freedom inherent in aircraft and gimbaled cameras. Mini-UA...
Morgan Quigley, Michael A. Goodrich, Stephen Griff...
BIRTHDAY
2005
Springer
15 years 10 months ago
Changing Labels in the Double-Pushout Approach Can Be Treated Categorically
In the double-pushout approach to graph transformations, most authors assume the left-hand side to be injective, since the noninjective case leads to ambiguous results. Taking into...
Hans Jürgen Schneider
CSCLP
2005
Springer
15 years 10 months ago
Complete Propagation Rules for Lexicographic Order Constraints over Arbitrary Domains
We give an efficiently executable specification of the global constraint of lexicographic order in the Constraint Handling Rules (CHR) language. In contrast to previous approaches...
Thom W. Frühwirth
GECCO
2005
Springer
113views Optimization» more  GECCO 2005»
15 years 10 months ago
A multi-objective algorithm for DS-CDMA code design based on the clonal selection principle
This paper proposes a new algorithm based on the clonal selection principle for the design of spreading codes for DS-CDMA. The algorithm follows a multi-objective approach, genera...
Daniel Stevens, Sanjoy Das, Balasubramaniam Natara...
ICANN
2005
Springer
15 years 10 months ago
Short Term Memory and Pattern Matching with Simple Echo State Networks
Two recently proposed approaches to recognize temporal patterns have been proposed by J¨ager with the so called Echo State Network (ESN) and by Maass with the so called Liquid Sta...
Georg Fette, Julian Eggert