Sciweavers

4335 search results - page 767 / 867
» Privatizing Constraint Optimization
Sort
View
SIGMETRICS
2008
ACM
111views Hardware» more  SIGMETRICS 2008»
15 years 1 months ago
Predicting the resource consumption of network intrusion detection systems
Abstract. When installing network intrusion detection systems (NIDSs), operators are faced with a large number of parameters and analysis options for tuning trade-offs between dete...
Holger Dreger, Anja Feldmann, Vern Paxson, Robin S...
IJRR
2007
75views more  IJRR 2007»
15 years 1 months ago
Surveillance Strategies for a Pursuer with Finite Sensor Range
This paper addresses the pursuit-evasion problem of maintaining surveillance by a pursuer of an evader in a world populated by polygonal obstacles. This requires the pursuer to pl...
Rafael Murrieta-Cid, Teja Muppirala, Alejandro Sar...
TC
2008
15 years 1 months ago
High-Performance Designs for Linear Algebra Operations on Reconfigurable Hardware
Numerical linear algebra operations are key primitives in scientific computing. Performance optimizations of such operations have been extensively investigated. With the rapid adva...
Ling Zhuo, Viktor K. Prasanna
AUTOMATICA
2005
178views more  AUTOMATICA 2005»
15 years 1 months ago
Spacecraft attitude control using explicit model predictive control
In this paper, an explicit model predictive controller for the attitude of a satellite is designed. Explicit solutions to constrained linear MPC problems can be computed by solvin...
Øyvind Hegrenæs, Jan Tommy Gravdahl, ...
TCS
2008
15 years 1 months ago
Bincoloring
We introduce a new problem that was motivated by a (more complicated) problem arising in a robotized assembly environment. The bin coloring problem is to pack unit size colored it...
Sven Oliver Krumke, Willem de Paepe, Jörg Ram...