Sciweavers

750 search results - page 92 / 150
» Desires, Norms and Constraints
Sort
View
RSP
2003
IEEE
132views Control Systems» more  RSP 2003»
15 years 7 months ago
Rapid Exploration of Pipelined Processors through Automatic Generation of Synthesizable RTL Models
As embedded systems continue to face increasingly higher performance requirements, deeply pipelined processor architectures are being employed to meet desired system performance. ...
Prabhat Mishra, Arun Kejariwal, Nikil Dutt
HICSS
2002
IEEE
89views Biometrics» more  HICSS 2002»
15 years 7 months ago
Nash Strategies for Load Serving Entities in Dynamic Energy Multi-markets
In this paper the problem of developing bidding strategies for the participants of dynamic energy-multi markets is studied. Attention is given to strategic bidding of load serving...
Jose B. Cruz Jr., Ashkan Kian
CDC
2009
IEEE
181views Control Systems» more  CDC 2009»
15 years 6 months ago
Collision-free tracking control of unicycle mobile robots
—We propose a tracking control with collision avoidance for a group of unicycle mobile robots. A supervisory system assigns to each robot its reference path, together with the de...
Dragan Kostic, Sisdarmanto Adinandra, Jurjen Caarl...
IH
2001
Springer
15 years 6 months ago
Keyless Public Watermarking for Intellectual Property Authentication
Abstract. A constraint-based watermarking technique has been introduced for the protection of intellectual properties such as hardware, software, algorithms, and solutions to hard ...
Gang Qu
AGENTS
2000
Springer
15 years 6 months ago
Ant-like missionaries and cannibals: synthetic pheromones for distributed motion control
Many applied problems in domains such as military operations, manufacturing, and logistics require that entities change location under certain constraints. These problems are trad...
H. Van Dyke Parunak, Sven Brueckner