Sciweavers

10797 search results - page 1984 / 2160
» Robust control applications
Sort
View
ENGL
2007
164views more  ENGL 2007»
15 years 4 months ago
Vision Based Target-Tracking Realized with Mobile Robots using Extended Kalman Filter
— The paper presents a novel scheme for target-tracking realized with two mobile robots, where one robot is configured as tracker and the other as moving target. Fuzzy C-means cl...
Sheli Sinha Chaudhuri, Amit Konar
ENTCS
2007
109views more  ENTCS 2007»
15 years 4 months ago
Modular Structural Operational Semantics with Strategies
Strategies are a powerful mechanism to control rule application in rule-based systems. For instance, different transition relations can be defined and then combined by means of ...
Christiano Braga, Alberto Verdejo
ENTCS
2007
85views more  ENTCS 2007»
15 years 4 months ago
Proving Approximate Implementations for Probabilistic I/O Automata
In this paper we introduce the notion of approximate implementations for Probabilistic I/O Automata (PIOA) and develop methods for proving such relationships. We employ a task str...
Sayan Mitra, Nancy A. Lynch
ENTCS
2007
96views more  ENTCS 2007»
15 years 4 months ago
Deduction, Strategies, and Rewriting
Automated deduction methods should be specified not procedurally, but declaratively, as inference systems which are proved correct regardless of implementation details. Then, di...
Steven Eker, Narciso Martí-Oliet, Jos&eacut...
JSAC
2006
95views more  JSAC 2006»
15 years 4 months ago
A low-rate code-spread and chip-interleaved time-hopping UWB system
We consider a code-spread and chip-interleaved time-hopping (TH) multiple-access scheme for multiuser ultra-wideband (UWB) communications. In such a system, each user's chip s...
Kai Li, Xiaodong Wang, Guosen Yue, Li Ping
« Prev « First page 1984 / 2160 Last » Next »