Sciweavers

2767 search results - page 244 / 554
» Universal Exponentiation Algorithm
Sort
View
111
Voted
ICRA
2009
IEEE
266views Robotics» more  ICRA 2009»
15 years 9 months ago
Behavioral control for multi-robot perimeter patrol: A Finite State Automata approach
Abstract— This paper proposes a multiple robot control algorithm to approach the problem of patrolling an open or closed line. The algorithm is fully decentralized, i.e., no comm...
Alessandro Marino, Lynne E. Parker, Gianluca Anton...
100
Voted
ICCCN
2007
IEEE
15 years 9 months ago
Interleaving Techniques for W-CDMA Linear Equalization Receivers
—This paper focuses on the use of specific interleaving techniques for use in W-CDMA (Wideband Code Division Multiple Access). The linear equalization algorithm usually performs ...
João Carlos Silva, Rui Dinis, Nuno Souto, F...
101
Voted
GMP
2006
IEEE
117views Solid Modeling» more  GMP 2006»
15 years 8 months ago
Two-Dimensional Selections for Feature-Based Data Exchange
Proper treatment of selections is essential in parametric feature-based design. Data exchange is one of the most important operators in any design paradigm. In this paper we addre...
Ari Rappoport, Steven N. Spitz, Michal Etzion
97
Voted
AAAI
2007
15 years 5 months ago
Propagating Knapsack Constraints in Sublinear Time
We develop an efficient incremental version of an existing cost-based filtering algorithm for the knapsack constraint. On a universe of n elements, m invocations of the algorith...
Irit Katriel, Meinolf Sellmann, Eli Upfal, Pascal ...
DSP
2006
15 years 2 months ago
Detection of audio covert channels using statistical footprints of hidden messages
We address the problem of detecting the presence of hidden messages in audio. The detector is based on the characteristics of the denoised residuals of the audio file, which may c...
Hamza Özer, Bülent Sankur, Nasir D. Memo...