Sciweavers

6554 search results - page 1194 / 1311
» Constraint Logic Programming
Sort
View
CEC
2008
IEEE
15 years 10 months ago
A study on constrained MA using GA and SQP: Analytical vs. finite-difference gradients
— Many deterministic algorithms in the context of constrained optimization require the first-order derivatives, or the gradient vectors, of the objective and constraint function...
Stephanus Daniel Handoko, Chee Keong Kwoh, Yew-Soo...
136
Voted
ICASSP
2008
IEEE
15 years 10 months ago
Cooperative MIMO-beamforming for multiuser relay networks
In this paper, we develop a beamforming algorithm for multiuser MIMO-relaying wireless systems. We consider a relaying scenario with multiple sources transmitting to one or more d...
Amr El-Keyi, Benoît Champagne
128
Voted
ISVLSI
2008
IEEE
142views VLSI» more  ISVLSI 2008»
15 years 10 months ago
A Fuzzy Approach for Variation Aware Buffer Insertion and Driver Sizing
In nanometer regime, the effects of process variations are dominating circuit performance, power and reliability of circuits. Hence, it is important to properly manage variation e...
Venkataraman Mahalingam, Nagarajan Ranganathan
138
Voted
LCN
2008
IEEE
15 years 10 months ago
Delay constrained placement of mobile data collectors in underwater acoustic sensor networks
—We propose a scheme for routing and placement of mobile data collectors in Underwater Acoustic Sensor Networks (UASNs). The proposed scheme maximizes the lifetime of the network...
Waleed Alsalih, Hossam S. Hassanein, Selim G. Akl
132
Voted
WCNC
2008
IEEE
15 years 10 months ago
Mitigation of the Propagation of Localization Error Using Multi-Hop Bounding
Abstract—In ad hoc position-location networks, location information is obtained through the sequential estimation of node locations. An unlocalized node can estimate its location...
R. Michael Buehrer, Swaroop Venkatesh, Tao Jia
« Prev « First page 1194 / 1311 Last » Next »