• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 2,548
Next 10 →

The market for corporate control: The scientific evidence

by Michael C. Jensen, Richard S. Ruback - Journal of Financial Economics , 1983
"... This paper reviews much of the scientific literature on the market for corporate control. The evidence indicates that corporate takeovers generate positive gains, that target firm shareholders benefit, and that bidding firm shareholders do not lose. The gains created by corporate takeovers do not ap ..."
Abstract - Cited by 613 (11 self) - Add to MetaCart
This paper reviews much of the scientific literature on the market for corporate control. The evidence indicates that corporate takeovers generate positive gains, that target firm shareholders benefit, and that bidding firm shareholders do not lose. The gains created by corporate takeovers do

Evolving 3D morphology and behavior by competition

by Karl Sims - Proceedings of Artificial Life IV , 1994
"... This paper describes a system for the evolution and co-evolution of virtual creatures that compete in physically simulated three-dimensional worlds. Pairs of individuals enter one-on-one contests in which they contend to gain control of a common resource. The winners receive higher relative fitness ..."
Abstract - Cited by 439 (0 self) - Add to MetaCart
This paper describes a system for the evolution and co-evolution of virtual creatures that compete in physically simulated three-dimensional worlds. Pairs of individuals enter one-on-one contests in which they contend to gain control of a common resource. The winners receive higher relative fitness

On The Equivalence of Second Order Impedance Control and Proportional Gain Explicit Force Control

by Richard Volpe, Pradeep Khosla , 1994
"... This paper discusses the essential equivalence of second order impedance control with force feedback and proportional gain explicit force control with force feedforward. This is first done analytically by reviewing each control method and showing how they mathematically correspond for constrained ma ..."
Abstract - Cited by 8 (6 self) - Add to MetaCart
This paper discusses the essential equivalence of second order impedance control with force feedback and proportional gain explicit force control with force feedforward. This is first done analytically by reviewing each control method and showing how they mathematically correspond for constrained

Zero-forcing methods for downlink spatial multiplexing in multiuser MIMO channels

by Quentin H. Spencer, A. Lee Swindlehurst, Martin Haardt - IEEE TRANS. SIGNAL PROCESSING , 2004
"... The use of space-division multiple access (SDMA) in the downlink of a multiuser multiple-input, multiple-output (MIMO) wireless communications network can provide a substantial gain in system throughput. The challenge in such multiuser systems is designing transmit vectors while considering the co-c ..."
Abstract - Cited by 371 (29 self) - Add to MetaCart
The use of space-division multiple access (SDMA) in the downlink of a multiuser multiple-input, multiple-output (MIMO) wireless communications network can provide a substantial gain in system throughput. The challenge in such multiuser systems is designing transmit vectors while considering the co

The Equivalence of Second-Order Impedance Control and Proportional Explicit Force Control,” Int

by Richard Volpe, Pradeep Khosla - Journal of Robotics Research , 1995
"... This article discusses the essential equivalence of second-order impedance control with force feedback and proportional gain explicit force control with force feedforward. This is first done analytically by reviewing each control method and showing how they mathematically correspond for constrained ..."
Abstract - Cited by 3 (0 self) - Add to MetaCart
This article discusses the essential equivalence of second-order impedance control with force feedback and proportional gain explicit force control with force feedforward. This is first done analytically by reviewing each control method and showing how they mathematically correspond for constrained

Stable Proportional-Derivative Controllers

by Jie Tan, Karen Liu, Greg Turk
"... In computer animation, a common technique for tracking the motion of characters is the proportional-derivative (PD) controller. In this paper, we introduce a new formulation of the PD controller that allows arbitrarily high gains, even at large time steps. The key to our approach is to determine the ..."
Abstract - Cited by 6 (1 self) - Add to MetaCart
In computer animation, a common technique for tracking the motion of characters is the proportional-derivative (PD) controller. In this paper, we introduce a new formulation of the PD controller that allows arbitrarily high gains, even at large time steps. The key to our approach is to determine

Changing the world and changing the self: A two-process model of perceived control

by Fred Rothbaum, John R. Weisz, Samuel S. Snyder - Journal of Personality and Social Psychology , 1982
"... There is extensive evidence that people strongly value and are reluctant to re-linquish the perception of control. Yet, both helplessness and locus of control theorists interpret various "inward " behaviors (passivity, withdrawal, and sub-missiveness) as signs of relinquished perceived con ..."
Abstract - Cited by 198 (2 self) - Add to MetaCart
type of perceived control that is generally over-looked. People attempt to gain control not only by bringing the environment into line with their wishes (primary control) but also by bringing themselves into line with environmental forces (secondary control). Four manifestations of secondary control

PROPORTIONAL-INTEGRAL-PLUS (PIP) GAIN SCHEDULING CONTROL OF AN INTELLIGENT EXCAVATOR

by Jun Gu , James Taylor , Derek Seward
"... Abstract: This paper considers the design and implementation of an electro-hydraulic control system for a robotic excavator, namely the Lancaster University Computerised and Intelligent Excavator (LUCIE). The excavator is being developed to autonomously dig trenches without human intervention. Here ..."
Abstract - Add to MetaCart
. Here, a gain scheduling design, based on Proportional-Integral-Plus (PIP) control methods, is utilised to regulate the highly nonlinear joint dynamics. Simulation and initial field tests both demonstrate the feasibility of the proposed technique, with the excavator arm directed along specified

Distributed consensus algorithms in sensor networks with communication channel noise and random link failures

by Soummya Kar, José M. F. Moura - in Proc. 41st Asilomar Conf. Signals, Systems, Computers , 2007
"... Abstract—The paper studies average consensus with random topologies (intermittent links) and noisy channels. Consensus with noise in the network links leads to the bias-variance dilemma—running consensus for long reduces the bias of the final average estimate but increases its variance. We present t ..."
Abstract - Cited by 149 (21 self) - Add to MetaCart
two different compromises to this tradeoff: the algorithm modifies conventional consensus by forcing the weights to satisfy a persistence condition (slowly decaying to zero;) and the algorithm where the weights are constant but consensus is run for a fixed number of iterations, then it is restarted

The ghost in the browser: Analysis of web-based malware

by Niels Provos, Dean Mcnamee, Panayiotis Mavrommatis, Ke Wang, Nagendra Modadugu, Google Inc - In Usenix Hotbots , 2007
"... As more users are connected to the Internet and conduct their daily activities electronically, computer users have become the target of an underground economy that infects hosts with malware or adware for financial gain. Unfortunately, even a single visit to an infected web site enables the attacker ..."
Abstract - Cited by 126 (5 self) - Add to MetaCart
the attacker to detect vulnerabilities in the user’s applications and force the download a multitude of malware binaries. Frequently, this malware allows the adversary to gain full control of the compromised systems leading to the ex-filtration of sensitive information or installation of utilities
Next 10 →
Results 1 - 10 of 2,548
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University