نتایج جستجو برای: constrained exible ow lines
تعداد نتایج: 309407 فیلتر نتایج به سال:
The term multimedia conjures up visions of desktop computers reproducing digital movies, high-resolution images and stereo sound. While many current systems support such functionality, none do so elegantly{especially when data is fetched and synchronized from dissimilar sources distributed across resource-limited networks. Our research investigates general approaches for managing the ow of mult...
In recent years the eld of Active or Programmable net works has received much attention from the networking community The goal is to achieve exible programma bility in routers and switches This will be particularly useful in the context of di erentiated services where di erent functionalities may or may not be present This document describes a novel active router archi tecture that provides pol...
Recent developments in networking infrastructure, computer workstation capabilities, software tools, and programming languages and paradigms, have motivated new approaches to cooperative and distributed computing. IceT combines several tools and methodologies that have recently become available into a powerful yet exible environment that is well-suited to cooperative work and to concurrent dist...
This article presents a reduced order method for simulation and control of uid ows. The major advantage of this method over others such as nite element, nite diierence or spectral method is that it has fewer degrees of freedom. The present methodology's feasibility for ow control is demonstrated on two boundary control problems. The rst one is a velocity tracking problem in cavity ow and the se...
We consider the problem of assembling concurrent software systems from untrusted or partially trusted oo-the-shelf components, using wrapper programs to encapsulate components and enforce security policies. In previous work we introduced the box-process calculus with constrained interaction to express wrappers and discussed the rigorous formulation of their security properties. This paper addre...
Multilink robot arms are geometrically similar to chain molecules. We investigate the performance of molecular simulation methods, combined with stochastic methods for optimization, when applied to problems of robotics. An eecient and exible algorithm for solving the inverse kinematic problem for redundant robots in the presence of obstacles (and other constraints) is suggested. This \Constrain...
SPIDER is a network adapter that provides scalable communication support for point-to-point distributed systems. The device exports an eecient interface to the host processor, provides transparent support for dependable , time-constrained communication, and handles packet routing and switching. The communication support provided by SPIDER exploits concurrency between the independent data channe...
To gain insight into the potential logistical beneets of worker cross-training and agile workforce policies, we study simple models of exible workers in serial production systems. The primary control issue is how to assign workers to jobs/stations over time. Under assumptions of complete worker exibility and collaborative work, we prove that a simple expedite policy minimizes along each sample ...
The optic ow eld is deened as preserving the intensity along ow-lines. Due to singularities in the image at xed time, poles are created in the optic ow eld. In this paper we describe the generic types of ow singularities and their generic interaction over time. In a general analytic ow eld, normally the topology is characterised by the points where the ow vanish again subdivided into repellers,...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید