Sciweavers

2652 search results - page 322 / 531
» Privacy-preserving linear programming
Sort
View
ICRA
2005
IEEE
171views Robotics» more  ICRA 2005»
15 years 9 months ago
Control Method for a 3D Form Display with Coil-type Shape Memory Alloy
- We previously proposed a new 3D form display actuated by shape memory alloy (SMA), which is capable of displaying large scale objects sequentially. Based on our devised method, o...
Masashi Nakatani, Hiroyuki Kajimoto, Kevin Vlack, ...
123
Voted
INFOCOM
2005
IEEE
15 years 9 months ago
Power controlled minimum frame length scheduling in TDMA wireless networks with sectored antennas
Abstract— We consider the problem of power controlled minimum frame length scheduling for TDMA wireless networks. Given a set of one-hop transmission requests, our objective is t...
Arindam Kumar Das, Robert J. Marks II, Payman Arab...
ISCAS
2005
IEEE
147views Hardware» more  ISCAS 2005»
15 years 9 months ago
A heuristic approach for multiple restricted multiplication
— This paper introduces a heuristic solution to the multiple restricted multiplication (MRM) optimization problem. MRM refers to a situation where a single variable is multiplied...
Nalin Sidahao, George A. Constantinides, Peter Y. ...
107
Voted
ISCAS
2005
IEEE
123views Hardware» more  ISCAS 2005»
15 years 9 months ago
Lower-bound estimation for multi-bitwidth scheduling
In high-level synthesis, accurate lower-bound estimation is helpful to explore the search space efficiently and to evaluate the quality of heuristic algorithms. For the lower-bound...
Junjuan Xu, Jason Cong, Xu Cheng
ISIPTA
2005
IEEE
115views Mathematics» more  ISIPTA 2005»
15 years 9 months ago
Powerful algorithms for decision making under partial prior information and general ambiguity attitudes
This paper discusses decision making in the practically important situation where only partial prior information on the stochastic behavior of the states of nature expressed by im...
Lev V. Utkin, Thomas Augustin