• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 8,098
Next 10 →

The Equivalence of Second-Order Impedance Control and Proportional Explicit Force Control,” Int

by Richard Volpe, Pradeep Khosla - Journal of Robotics Research , 1995
"... This article discusses the essential equivalence of second-order impedance control with force feedback and proportional gain explicit force control with force feedforward. This is first done analytically by reviewing each control method and showing how they mathematically correspond for constrained ..."
Abstract - Cited by 3 (0 self) - Add to MetaCart
This article discusses the essential equivalence of second-order impedance control with force feedback and proportional gain explicit force control with force feedforward. This is first done analytically by reviewing each control method and showing how they mathematically correspond for constrained

On The Equivalence of Second Order Impedance Control and Proportional Gain Explicit Force Control

by Richard Volpe, Pradeep Khosla , 1994
"... This paper discusses the essential equivalence of second order impedance control with force feedback and proportional gain explicit force control with force feedforward. This is first done analytically by reviewing each control method and showing how they mathematically correspond for constrained ma ..."
Abstract - Cited by 8 (6 self) - Add to MetaCart
This paper discusses the essential equivalence of second order impedance control with force feedback and proportional gain explicit force control with force feedforward. This is first done analytically by reviewing each control method and showing how they mathematically correspond for constrained

Myrinet: A Gigabit-per-Second Local Area Network

by Nanette J. Boden, Danny Cohen, Robert E. Felderman, Alan E. Kulawik, Charles L. Seitz, Jakov N. Seizovic, Wen-king Su - IEEE Micro , 1995
"... Abstract. Myrinet is a new type of local-area network (LAN) based on the technology used for packet communication and switching within "massivelyparallel processors " (MPPs). Think of Myrinet as an MPP message-passing network that can span campus dimensions, rather than as a wide-a ..."
Abstract - Cited by 1011 (0 self) - Add to MetaCart
-area telecommunications network that is operating in close quarters. The technical steps toward making Myrinet a reality included the development of (1) robust, 25m communication channels with flow control, packet framing, and error control; (2) self-initializing, low-latency, cut-through switches; (3) host interfaces

Scheduling for reduced CPU energy

by Mark Weiser, Brent Welch, Alan Demers, Scott Shenker - USENIX SYMP. OPERATING , 1994
"... The energy usage of computer systems is becoming more important, especially for battery operated systems. Displays, disks, and cpus, in that order, use the most energy. Reducing the energy used by displays and disks has been studied elsewhere; this paper considers a new method for reducing the energ ..."
Abstract - Cited by 563 (2 self) - Add to MetaCart
1994]. What are the right scheduling algorithms for taking advantage of reduced clock-speed, especially in the presence of applications demanding ever more instructions-per-second? We consider several methods for varying the clock speed dynamically under control of the operating system, and examine

The Vector Field Histogram -- Fast Obstacle Avoidance For Mobile Robots

by J. Borenstein, Y. Koren - IEEE JOURNAL OF ROBOTICS AND AUTOMATION , 1991
"... A new real-time obstacle avoidance method for mobile robots has been developed and implemented. This method, named the vector field histogram(VFH), permits the detection of unknown obstacles and avoids collisions while simultaneously steering the mobile robot toward the target. The VFH method uses a ..."
Abstract - Cited by 484 (24 self) - Add to MetaCart
a two-dimensional Cartesian histogram gridas a world model. This world model is updated continuously with range data sampled by on-board range sensors. The VFH method subsequently employs a two-stage data-reduction process in order to compute the desired control commands for the vehicle

Fading relay channels: Performance limits and space-time signal design

by Rohit U. Nabar, Helmut Bölcskei, Felix W. Kneubühler - IEEE J. SELECT. AREAS COMMUN , 2004
"... Cooperative diversity is a transmission technique where multiple terminals pool their resources to form a virtual antenna array that realizes spatial diversity gain in a distributed fashion. In this paper, we examine the basic building block of cooperative diversity systems, a simple fading relay ch ..."
Abstract - Cited by 445 (4 self) - Add to MetaCart
) or decode-and-forward (DF) modes. For each protocol, we study the ergodic and outage capacity behavior (assuming Gaussian code books) under the AF and DF modes of relaying. We analyze the spatial diversity performance of the various protocols and find that full spatial diversity (second-order in this case

Storage and executive processes in the frontal lobes.

by Edward E Smith , John Jonides - Science, , 1999
"... The human frontal cortex helps mediate working memory, a system that is used for temporary storage and manipulation of information and that is involved in many higher cognitive functions. Working memory includes two components: short-term storage (on the order of seconds) and executive processes th ..."
Abstract - Cited by 401 (5 self) - Add to MetaCart
The human frontal cortex helps mediate working memory, a system that is used for temporary storage and manipulation of information and that is involved in many higher cognitive functions. Working memory includes two components: short-term storage (on the order of seconds) and executive processes

Rule Induction with CN2: Some Recent Improvements

by Peter Clark, Robin Boswell , 1991
"... The CN2 algorithm induces an ordered list of classification rules from examples using entropy as its search heuristic. In this short paper, we describe two improvements to this algorithm. Firstly, we present the use of the Laplacian error estimate as an alternative evaluation function and secondly, ..."
Abstract - Cited by 385 (2 self) - Add to MetaCart
The CN2 algorithm induces an ordered list of classification rules from examples using entropy as its search heuristic. In this short paper, we describe two improvements to this algorithm. Firstly, we present the use of the Laplacian error estimate as an alternative evaluation function and secondly

Trickle: A Self-Regulating Algorithm for Code Propagation and Maintenance in Wireless Sensor Networks

by Philip Levis, Neil Patel, David Culler, Scott Shenker - In Proceedings of the First USENIX/ACM Symposium on Networked Systems Design and Implementation (NSDI , 2004
"... We present Trickle, an algorithm for propagating and maintaining code updates in wireless sensor networks. Borrowing techniques from the epidemic/gossip, scalable multicast, and wireless broadcast literature, Trickle uses a "polite gossip" policy, where motes periodically broadcast a code ..."
Abstract - Cited by 376 (9 self) - Add to MetaCart
, just enough to stay up to date. We show that with this simple mechanism, Trickle can scale to thousand-fold changes in network density, propagate new code in the order of seconds, and impose a maintenance cost on the order of a few sends an hour.

Zero-forcing methods for downlink spatial multiplexing in multiuser MIMO channels

by Quentin H. Spencer, A. Lee Swindlehurst, Martin Haardt - IEEE TRANS. SIGNAL PROCESSING , 2004
"... The use of space-division multiple access (SDMA) in the downlink of a multiuser multiple-input, multiple-output (MIMO) wireless communications network can provide a substantial gain in system throughput. The challenge in such multiuser systems is designing transmit vectors while considering the co-c ..."
Abstract - Cited by 371 (29 self) - Add to MetaCart
-channel interference of other users. Typical optimization problems of interest include the capacity problem—maximizing the sum information rate subject to a power constraint—or the power control problem—minimizing transmitted power such that a certain quality-of-service metric for each user is met. Neither
Next 10 →
Results 1 - 10 of 8,098
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University