Sciweavers

3771 search results - page 391 / 755
» Subobject Transformation Systems
Sort
View
AUTOMATICA
2010
123views more  AUTOMATICA 2010»
15 years 3 months ago
On the computation of linear model predictive control laws
Finite-time optimal control problems with quadratic performance index for linear systems with linear constraints can be transformed into Quadratic Programs (QPs). Model Predictive ...
Francesco Borrelli, Mato Baotic, Jaroslav Pekar, G...
138
Voted
INTERSPEECH
2010
14 years 11 months ago
Speaker and language adaptive training for HMM-based polyglot speech synthesis
This paper proposes a technique for speaker and language adaptive training for HMM-based polyglot speech synthesis. Language-specific context-dependencies in the system are captur...
Heiga Zen
163
Voted
JDCTA
2010
169views more  JDCTA 2010»
14 years 11 months ago
The Partner Selection in Virtual Enterprise based on BDI Agent
This paper's research is based on the model of BDI Agent, carries out the research of the modeling and simulating the Virtual Enterprise's partner selection using Swarm ...
Wang Yu, Zhu Feng, Geng Hua, Zhuwang Jing
CORR
2007
Springer
148views Education» more  CORR 2007»
15 years 5 months ago
Blind Estimation of Multiple Carrier Frequency Offsets
Multiple carrier-frequency offsets (CFO) arise in a distributed antenna system, where data are transmitted simultaneously from multiple antennas. In such systems the received sign...
Yuanning Yu, Athina P. Petropulu, H. Vincent Poor,...
ICIP
2005
IEEE
16 years 6 months ago
An adaptive DCT-based Mod-4 steganographic method
This paper presents a novel Mod-4 steganographic method in discrete cosine transform (DCT) domain. A group of 2?2 quantized DCT coefficients (GQC) is selected as the valid embeddi...
Xiaojun Qi, KokSheik Wong