• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 21 - 30 of 224
Next 10 →

Beamformer Design for Interference Alignment Using Reweighted Frobenius Norm Minimization

by Gokul Sridharan, Wei Yu
"... Abstract—This paper proposes an algorithm to compute the uplink transmit beamformers for linear interference alignment in MIMO cellular networks without symbol extensions. In particular, we consider interference alignment in a network consisting of G cells and K users/cell, having N and M antennas a ..."
Abstract - Add to MetaCart
constraints. The interference matrix of a BS consists of all the interfering vectors at that BS. The proposed algorithm approximates rank using the weighted Frobenius norm and iteratively updates the weights so that the weighted Frobenius norm is a close approximation of the rank of the interference matrix. A

Scenario Generation and Reduction for Long-term and Short-term Power System Generation Planning under Uncertainties

by Yonghan Feng, James D. Mccalley, William Q. Meeker, Jo Min, Lizhi Wang
"... ii ..."
Abstract - Add to MetaCart
Abstract not found

How Green Was My Valley? Coercive Contract Enforcement in 19th Century Industrial Britain

by Suresh Naidu , Noam Yuchtman , Ryan Bubb , Davide Cantoni , Greg Clark , Melissa Dell , Oeindrila Dube , Stan Engerman , James Fenske , Camilo Garcia , Claudia Goldin , Larry Katz
"... Abstract British Master and Servant law made employee contract breach a criminal offense until 1875. We develop a contracting model generating equilibrium contract breach and prosecutions, then exploit exogenous changes in output prices to examine the effects of labor demand shocks on prosecutions. ..."
Abstract - Add to MetaCart
, and imprisonments each year in the 1860s and early 1870s were the product of 19th century laws that were explicitly designed to enforce labor contracts in growing industries. Enforcement of Master and Servant Law In Victorian times, until 1875, the 1823 Master and Servant Act (and its revision in 1867) governed

Noname manuscript No. (will be inserted by the editor) Distributed Multi-objective Multidisciplinary Design Optimization algorithms

by Amir Noori
"... the date of receipt and acceptance should be inserted later Abstract This work proposes multi-agent systems setting for concurrent engineering system design optimization and gradually paves the way towards examining graph the-oretic constructs in the context of multidisciplinary design optimization ..."
Abstract - Add to MetaCart
with neighbor subspaces and then updated by comput-ing a weighted sum of the local and received estimates. To comply with the consistency requirement, the resultant values are projected to local constraint sets. By employing the existing rules and results of the field, it has shown that the dual task

Length-lex ordering for set CSPs

by Carmen Gervet, Pascal Van Hentenryck - IN PROCEEDINGS OF THE 21ST NATIONAL CONFERENCE ON ARTIF ICIAL INTELLIGENCE , 2006
"... Combinatorial design problems arise in many application ar-eas and are naturally modelled in terms of set variables and constraints. Traditionally, the domain of a set variable is spec-ified by two sets (R,E) and denotes all sets containing R and disjoint from E. This representation has inherent dif ..."
Abstract - Cited by 16 (6 self) - Add to MetaCart
. The solver can then enforce bound-consistency on all unary constraints in time Õ(k) where k is the set cardinality. In analogy with finite-domain solvers, non-unary constraints can be viewed as inference rules generating new unary constraints. The re-sulting set solver achieves a pruning (at least

Design And Implementation Of Modeling And Validation Facilities For Business OBJECT DOCUMENTS

by Haifei Li, Stanley Y. W. Su
"... this report, we use the ECAA (Event-Condition-Action-Alternative action) rule paradigm to model the constraints of BODs at build-time and validate these constraints at run-time. The BOD modeling and validation system we developed consists of a set of build-time components and a set of run-time compo ..."
Abstract - Add to MetaCart
this report, we use the ECAA (Event-Condition-Action-Alternative action) rule paradigm to model the constraints of BODs at build-time and validate these constraints at run-time. The BOD modeling and validation system we developed consists of a set of build-time components and a set of run

unknown title

by Copyright John Wiley
"... Sensor network software update management: a survey By Chih-Chieh Han, Ram Kumar, Roy Shea and Mani Srivastava*,† Software management is a critical task in the system administration of enterprise-scale networks. Enterprise-scale networks that have traditionally comprised of large clusters of worksta ..."
Abstract - Add to MetaCart
conceptual model for the software update tools in WSNs. Three components of this model that we study are the execution environment at the sensor nodes, the software distribution protocol in the network and optimization of transmitted updates. We present the design space of each component and discuss in

AND MATHEMATICAL ENGINEERING

by Madeleine Udell, Professor Lester Mackey , 2015
"... ii ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
Abstract not found

INSTITUT DE ROB `OTICA I INFORM `ATICA INDUSTRIAL- PREPRINT 1 A Branch-and-Prune Solver for Distance Constraints

by Josep M. Porta, Federico Thomas, Carme Torras
"... Abstract — Given some geometric elements such as points and lines in , subject to a set of pairwise distance constraints, the problem tackled in this paper is that of finding all possible configurations of these elements that satisfy the constraints. Many problems in Robotics (such as the position ..."
Abstract - Add to MetaCart
Abstract — Given some geometric elements such as points and lines in , subject to a set of pairwise distance constraints, the problem tackled in this paper is that of finding all possible configurations of these elements that satisfy the constraints. Many problems in Robotics (such

Cryptographic Voting Protocols A Prototype Design and Implementation for University Elections at TU Darmstadt

by Alexander Klink, Betreut Von Evangelos Karatsiolis, Technische Universität Darmstadt, Fachbereich Informatik, Fachgebiet Theoretische Informatik
"... I would like to thank some people who were involved in the creation of this thesis: • Berry Schoenmakers of TU Eindhoven for introducing me to the topic of cryptographic voting protocols. • Evangelos Karatsiolis for his work in guiding me through the process of writing this thesis and his constant m ..."
Abstract - Add to MetaCart
I would like to thank some people who were involved in the creation of this thesis: • Berry Schoenmakers of TU Eindhoven for introducing me to the topic of cryptographic voting protocols. • Evangelos Karatsiolis for his work in guiding me through the process of writing this thesis and his constant motivation. • Roberto Samarone Araujo for hours of discussing various protocols with Evengelos and me. • Warren D. Smith for providing with a preliminary version of his upcoming book »How Mathematics can Improve Democracy«. • Ute Günther and Christian Burgmann for their proof-reading. Nonetheless, any remaing errors shall be blamed on me. • Andrea Peter for her love and for cheering me up when I was down. • Last but not least my parents, Jacqueline Herrnkind and Hans Peter Klink – without their love and continuous support, this thesis would never have been written.
Next 10 →
Results 21 - 30 of 224
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University