Sciweavers

6693 search results - page 1012 / 1339
» On an anytime algorithm for control
Sort
View
IJNSEC
2010
152views more  IJNSEC 2010»
14 years 10 months ago
Comparative Analysis of Different Cryptosystems for Hierarchical Mobile IPv6-based Wireless Mesh Network
Wireless Mesh Network (WMN) is advocated as the major supporting technology for the next generation wireless Internet satisfying the needs of anywhere-anytime broadband Internet a...
Ramanarayana Kandikattu, Lillykutty Jacob
143
Voted
TCSV
2010
14 years 10 months ago
Perceptually Unequal Packet Loss Protection by Weighting Saliency and Error Propagation
We describe a method for achieving perceptually minimal video distortion over packet-erasure networks using perceptually unequal loss protection (PULP). There are two main ingredie...
Hojin Ha, Jincheol Park, Sanghoon Lee, Alan Conrad...
TSP
2010
14 years 10 months ago
Code design for radar STAP via optimization theory
Abstract--In this paper, we deal with the problem of constrained code optimization for radar space-time adaptive processing (STAP) in the presence of colored Gaussian disturbance. ...
Antonio De Maio, Silvio De Nicola, Yongwei Huang, ...
166
Voted
SIAMJO
2011
14 years 10 months ago
Adaptive Multilevel Inexact SQP Methods for PDE-Constrained Optimization
We present a class of inexact adaptive multilevel trust-region SQP-methods for the efficient solution of optimization problems governed by nonlinear partial differential equations...
J. Carsten Ziems, Stefan Ulbrich
CIDR
2011
274views Algorithms» more  CIDR 2011»
14 years 7 months ago
Cloud Resource Orchestration: A Data-Centric Approach
Cloud computing provides users near instant access to seemingly unlimited resources, and provides service providers the opportunity to deploy complex information technology infras...
Yun Mao, Changbin Liu, Jacobus E. van der Merwe, M...
« Prev « First page 1012 / 1339 Last » Next »