Sciweavers

1986 search results - page 174 / 398
» constraints 2006
Sort
View
ENGL
2007
98views more  ENGL 2007»
13 years 8 months ago
Synergies of Three Letters Syndrome for Revitalizing Manufacturing
— Research on Just-in-Time (JIT), Total Quality Management (TQM), Total Productive Maintenance (TPM), Supply Chain Management (SCM), and Theory of Constraints (TOC) generally inv...
M. A. Venkatesh, Vishnu D. Wakchaure, Shrikant P. ...
ENGL
2007
91views more  ENGL 2007»
13 years 8 months ago
RRT-based strategies for sensor-based exploration
—Real mobile robots should be able to build an abstract representation of the physical environment, in order to navigate and to work in such environment. We present a method for ...
Abraham Sánchez López, Judith Le&oac...
JSAC
2006
106views more  JSAC 2006»
13 years 8 months ago
Mathematical Decomposition Techniques for Distributed Cross-Layer Optimization of Data Networks
Abstract--Network performance can be increased if the traditionally separated network layers are jointly optimized. Recently, network utility maximization has emerged as a powerful...
Björn Johansson, Pablo Soldati, Mikael Johans...
MP
2006
88views more  MP 2006»
13 years 8 months ago
Bounds on linear PDEs via semidefinite optimization
Using recent progress on moment problems, and their connections with semidefinite optimization, we present in this paper a new methodology based on semidefinite optimization, to ob...
Dimitris Bertsimas, Constantine Caramanis
FUIN
2007
104views more  FUIN 2007»
13 years 8 months ago
Modelling and Checking Timed Authentication of Security Protocols
In this paper we offer a novel methodology for verifying correctness of (timed) security protocols. The idea consists in computing the time of a correct execution of a session and ...
Gizela Jakubowska, Wojciech Penczek