Sciweavers

203 search results - page 22 / 41
» Second-Order Risk Constraints
Sort
View
CLEIEJ
2006
169views more  CLEIEJ 2006»
14 years 11 months ago
Tailoring RUP for LMS Selection: A Case Study
Learning Management System (LMS) development has become a high priority project for educational institutions and organizations, as it provides the virtual environment for online e...
Luis Eduardo Mendoza, María A. Pérez...
ML
2008
ACM
14 years 11 months ago
Discovering significant patterns
Pattern discovery techniques, such as association rule discovery, explore large search spaces of potential patterns to find those that satisfy some user-specified constraints. Due...
Geoffrey I. Webb
CDC
2008
IEEE
137views Control Systems» more  CDC 2008»
15 years 6 months ago
Decentralized cooperative collision avoidance for acceleration constrained vehicles
— Safety must be ensured in the deployment of multi-agent vehicle systems. This paper presents decentralized collision avoidance algorithms for systems with second order dynamics...
Gabriel Hoffmann, Claire J. Tomlin
87
Voted
GLOBECOM
2006
IEEE
15 years 5 months ago
Analog Multi-Tone Signaling for High-Speed Backplane Electrical Links
— Implementing a multi-tone (MT) architecture for high-speed backplane electrical links is difficult given the tight power and complexity constraints in this application. This pa...
Amir Amirkhany, Ali-Azam Abbasfar, Vladimir Stojan...
ICIP
1999
IEEE
15 years 4 months ago
The Shape of Illusory Figures
We have been developing a stochastic model for figure-ground separation[9][3][12]. The model selects/constructs theforeground with preferenceforfigures with "moreconvex"...
Davi Geiger, Krishnan Kumaran, Hsing-Kuo Pao, Nava...