Sciweavers

203 search results - page 22 / 41
» Second-Order Risk Constraints
Sort
View
CLEIEJ
2006
169views more  CLEIEJ 2006»
13 years 7 months ago
Tailoring RUP for LMS Selection: A Case Study
Learning Management System (LMS) development has become a high priority project for educational institutions and organizations, as it provides the virtual environment for online e...
Luis Eduardo Mendoza, María A. Pérez...
ML
2008
ACM
13 years 7 months ago
Discovering significant patterns
Pattern discovery techniques, such as association rule discovery, explore large search spaces of potential patterns to find those that satisfy some user-specified constraints. Due...
Geoffrey I. Webb
CDC
2008
IEEE
137views Control Systems» more  CDC 2008»
14 years 1 months ago
Decentralized cooperative collision avoidance for acceleration constrained vehicles
— Safety must be ensured in the deployment of multi-agent vehicle systems. This paper presents decentralized collision avoidance algorithms for systems with second order dynamics...
Gabriel Hoffmann, Claire J. Tomlin
GLOBECOM
2006
IEEE
14 years 1 months ago
Analog Multi-Tone Signaling for High-Speed Backplane Electrical Links
— Implementing a multi-tone (MT) architecture for high-speed backplane electrical links is difficult given the tight power and complexity constraints in this application. This pa...
Amir Amirkhany, Ali-Azam Abbasfar, Vladimir Stojan...
ICIP
1999
IEEE
13 years 11 months ago
The Shape of Illusory Figures
We have been developing a stochastic model for figure-ground separation[9][3][12]. The model selects/constructs theforeground with preferenceforfigures with "moreconvex"...
Davi Geiger, Krishnan Kumaran, Hsing-Kuo Pao, Nava...