Sciweavers

14078 search results - page 2724 / 2816
» Design and Analysis of Computer Algorithms
Sort
View
SMA
1999
ACM
107views Solid Modeling» more  SMA 1999»
15 years 7 months ago
Generation of swept volumes of toroidal endmills in five-axis motion using space curves
Accurate prediction of the swept volume of a cutting tool is essential in NC verification algorithms for detecting deficiencies in a proposed tool path, such as gouging, undercutt...
David Roth, Sanjeev Bedi, Fathy Ismail
FPGA
1998
ACM
142views FPGA» more  FPGA 1998»
15 years 7 months ago
A Hybrid Complete-Graph Partial-Crossbar Routing Architecture for Multi-FPGA Systems
Multi-FPGA systems (MFSs) are used as custom computing machines, logic emulators and rapid prototyping vehicles. A key aspect of these systems is their programmable routing archit...
Mohammed A. S. Khalid, Jonathan Rose
POPL
1989
ACM
15 years 7 months ago
How to Make ad-hoc Polymorphism Less ad-hoc
raction that a programming language provides influences the structure and algorithmic complexity of the resulting programs: just imagine creating an artificial intelligence engine ...
Philip Wadler, Stephen Blott
EMNETS
2007
15 years 7 months ago
Robust node localization for wireless sensor networks
The node localization problem in Wireless Sensor Networks has received considerable attention, driven by the need to obtain a higher location accuracy without incurring a large, p...
Radu Stoleru, John A. Stankovic, Sang Hyuk Son
CP
2004
Springer
15 years 6 months ago
ID Walk: A Candidate List Strategy with a Simple Diversification Device
This paper presents a new optimization metaheuristic called ID Walk (Intensification/Diversification Walk) that offers advantages for combining simplicity with effectiveness. In ad...
Bertrand Neveu, Gilles Trombettoni, Fred Glover
« Prev « First page 2724 / 2816 Last » Next »