نتایج جستجو برای: budget constrained exible ow lines

تعداد نتایج: 342172  

2014
Peng Li Chuanhe Huang Qin Liu

In vehicular ad hoc networks, roadside units (RSUs) placement has been proposed to improve the the overall network performance in many ITS applications. This paper addresses the budget constrained and delay-bounded placement problem (BCDP) for roadside units in vehicular ad hoc networks. There are two types of RSUs: cable connected RSU (c-RSU) and wireless RSU (w-RSU). c-RSUs are interconnected...

1997
Paul A. Gray Vaidy S. Sunderam

Recent developments in networking infrastructure, computer workstation capabilities, software tools, and programming languages and paradigms, have motivated new approaches to cooperative and distributed computing. IceT combines several tools and methodologies that have recently become available into a powerful yet exible environment that is well-suited to cooperative work and to concurrent dist...

Journal: :IEEE Journal on Selected Areas in Communications 1994
Chyan Yang Ruey-yih Lin

A communication network’s reliability, survivability, and interconnectivity are primarily based on the degree of interconnection between the existing nodes of the network. Enhancement of these characteristics can be obtained by adding direct communication links between nodes of the network. This process is generally subject to a budget constraint. From the service provider’s perspective, enhanc...

Journal: :Transportation Research Part B: Methodological 2001

1996
K. ITO S. S. RAVINDRAN

This article presents a reduced order method for simulation and control of uid ows. The major advantage of this method over others such as nite element, nite diierence or spectral method is that it has fewer degrees of freedom. The present methodology's feasibility for ow control is demonstrated on two boundary control problems. The rst one is a velocity tracking problem in cavity ow and the se...

2000
Peter Sewell Jan Vitek

We consider the problem of assembling concurrent software systems from untrusted or partially trusted oo-the-shelf components, using wrapper programs to encapsulate components and enforce security policies. In previous work we introduced the box-process calculus with constrained interaction to express wrappers and discussed the rigorous formulation of their security properties. This paper addre...

Journal: :Robotica 1996
Thomas Kastenmeier Franz J. Vesely

Multilink robot arms are geometrically similar to chain molecules. We investigate the performance of molecular simulation methods, combined with stochastic methods for optimization, when applied to problems of robotics. An eecient and exible algorithm for solving the inverse kinematic problem for redundant robots in the presence of obstacles (and other constraints) is suggested. This \Constrain...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید