Sciweavers

4894 search results - page 707 / 979
» The Guarding Problem - Complexity and Approximation
Sort
View
JCM
2006
86views more  JCM 2006»
13 years 8 months ago
MAC Layer RFID Protocol for Low Cost Object Identification
In this paper, we introduce a novel medium access control (MAC) protocol for Radio Frequency Identification (RFID) systems. This protocol exploits the Markov Chain Model of Slotted...
Shweta Singh
MSS
2008
IEEE
93views Hardware» more  MSS 2008»
13 years 8 months ago
Deriving weights from general pairwise comparison matrices
The problem of deriving weights from pairwise comparison matrices has been treated extensively in the literature. Most of the results are devoted to the case when the matrix under...
Nikolai V. Hovanov, James W. Kolari, Mikhail V. So...
MP
2006
137views more  MP 2006»
13 years 8 months ago
New algorithms for singly linearly constrained quadratic programs subject to lower and upper bounds
There are many applications related to singly linearly constrained quadratic programs subjected to upper and lower bounds. In this paper, a new algorithm based on secant approximat...
Yu-Hong Dai, Roger Fletcher
SIAMCO
2008
96views more  SIAMCO 2008»
13 years 8 months ago
Nonlinear Optimal Control via Occupation Measures and LMI-Relaxations
We consider the class of nonlinear optimal control problems (OCP) with polynomial data, i.e., the differential equation, state and control constraints and cost are all described by...
Jean B. Lasserre, Didier Henrion, Christophe Prieu...
SIAMJO
2008
79views more  SIAMJO 2008»
13 years 8 months ago
A Class of Inexact Variable Metric Proximal Point Algorithms
For the problem of solving maximal monotone inclusions, we present a rather general class of algorithms, which contains hybrid inexact proximal point methods as a special case and ...
Lisandro A. Parente, Pablo A. Lotito, Mikhail V. S...