Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
SSST
SSST 1991
Generate Citations
The Twenty-Third Southeastern Symposium on System Theory
March 10 1991 to March 12 1991
Columbia, SC, USA
Table of Contents
Evaluation of DS/SSMA: a comparison of simulation results with bit error probability bounds
Full-text access may be available. Sign in or learn about subscription options.
pp. 16,17,18,19,20
by
C.D. Yuan
,
J.J. Komo
Proceedings. The Twenty-Third Southeastern Symposium on System Theory
Freely available from IEEE.
pp. 0_1
A fast acquisition technique for direct sequence spread spectrum communication systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 2,3,4,5,6
by
G.S. Rawlins
,
M.A. Belkerdid
16-kbps modem design using vector quantization
Full-text access may be available. Sign in or learn about subscription options.
pp. 7,8,9,10
by
J. Foster
,
S.F. Harris
Implementation consideration of code division multiple access sequences
Full-text access may be available. Sign in or learn about subscription options.
pp. 11,12,13,14,15
by
J.J. Komo
,
Chulki Kim
Transient analysis of power systems using a frequency domain technique
Full-text access may be available. Sign in or learn about subscription options.
pp. 22,23,24,25,26,27
by
D.G. Hart
,
A.A. Girgis
,
C.M. Fallon
Interfacing synchronous machines with power systems for fault analysis: constructing symmetrical components from machine dqO quantities
Full-text access may be available. Sign in or learn about subscription options.
pp. 28,29,30,31,32
by
S.M. Halpin
,
C.A. Gross
Modelling, simulation and analysis of variable speed constant frequency wind energy conversion scheme using self excited induction generator
Full-text access may be available. Sign in or learn about subscription options.
pp. 33,34,35,36,37,38
by
R.M. Hilloowala
,
A.M. Sharaf
Modified induction motor drive speed control strategies for loss reduction and efficiency enhancement
Full-text access may be available. Sign in or learn about subscription options.
pp. 39,40,41,42,43,44
by
L.H. Altas
,
A.M. Sharaf
Existence of linear feedback control for certain types of global stability
Full-text access may be available. Sign in or learn about subscription options.
pp. 46,47,48
by
A.K. Bose
,
A.S. Cover
,
J.A. Reneke
Robust analysis of optimal flow control for reducing fluid transients
Full-text access may be available. Sign in or learn about subscription options.
pp. 49,50,51,52,53
by
R.C. Hsiao
,
H.J. Zhang
Controller design for a large space structure test facility using experimental frequency response data
Full-text access may be available. Sign in or learn about subscription options.
pp. 54,55,56,57,58,59
by
R.D. Irwin
,
J.R. Mitchell
Adaptive disturbance-accommodation
Full-text access may be available. Sign in or learn about subscription options.
pp. 60,61,62,63,64
by
C.D. Johnson
A simulation application in facility expansion decision-making
Full-text access may be available. Sign in or learn about subscription options.
pp. 65,66,67
by
Jingjun Sun
,
J.A. Chisman
Medical radiograph classification by pattern recognition
Full-text access may be available. Sign in or learn about subscription options.
pp. 70,71,72,73,74
by
D. Zhu
,
R. Conners
,
C. Carrig
,
W. Swecker
CT image sequence processing for wood defect recognition
Full-text access may be available. Sign in or learn about subscription options.
pp. 75,76,77,78,79
by
D. Zhu
,
R. Conners
,
P. Araman
Stereo image databases for flight simulators
Full-text access may be available. Sign in or learn about subscription options.
pp. 80,81,82,83
by
V. Nagar
,
J.E. Dudgeon
Representation of a curved boundary
Full-text access may be available. Sign in or learn about subscription options.
pp. 84,85,86,87,88
by
Yonghoon Kim
,
J.H. Kim
,
E.H. Park
,
Kwang Sohn
Decomposition of the camera calibration matrix
Full-text access may be available. Sign in or learn about subscription options.
pp. 89,90,91,92,93
by
J. Labuz
,
M. Thaker
,
B. Venkateswaran
The role of subtractive defects and grain boundaries in determining early failures in VLSI metal interconnects
Full-text access may be available. Sign in or learn about subscription options.
pp. 96,97,98,99,100
by
K.F. Poole
,
R.R. Cali
,
K.G. Kemp
A VLSI based logic analyzer interface for a microprocessor development system
Full-text access may be available. Sign in or learn about subscription options.
pp. 101,102,103,104,105
by
B.H. Lee
,
R.Z. Makki
,
C. Rohe
Considerations in the use of a dedicated VLSI DSP chip for real time signal processing
Full-text access may be available. Sign in or learn about subscription options.
pp. 106,107,108,109,110
by
M.E. Mitchell
,
P.B. Crilly
Computer-aided instruction for VLSI design using the NeXT workstation-phase II
Full-text access may be available. Sign in or learn about subscription options.
pp. 111,112,113
by
J. Foster
,
M. Smith
,
J. Nichols
Yield analysis of 2D hexagonal VLSI/WSI arrays
Full-text access may be available. Sign in or learn about subscription options.
pp. 114,115,116,117,118
by
A. Noore
,
S. Cambam
A Program Structure Analyzer
Full-text access may be available. Sign in or learn about subscription options.
pp. 120,121,122
by
T.L. Crawford
Parallel structure for recursively updating the covariance matrix for real-time image processing applications
Full-text access may be available. Sign in or learn about subscription options.
pp. 123,124,125,126,127
by
A.O. Barbir
,
S. Manickam
,
J.L. Aravena
Pipelined dynamics SISD system organization
Full-text access may be available. Sign in or learn about subscription options.
pp. 128,129,130,131,132
by
M. Celenk
,
V. Reddy
On the synthesis of multi-linear arrays with flexible compute time
Full-text access may be available. Sign in or learn about subscription options.
pp. 133,134,135,136,137
by
H.R. Barada
,
A.O. Barbir
Knowledge based automatic testing of microprocessor based systems (KBAT)
Full-text access may be available. Sign in or learn about subscription options.
pp. 138,139,140,141,142
by
K.C. Yarlagadda
,
P.K. Lala
A new application for acousto-optic cells in wavelength division demultiplexing
Full-text access may be available. Sign in or learn about subscription options.
pp. 144,145,146
by
A. Helaly
,
M. Abushagur
Normalized formalism for the analysis of diffractionless beams
Full-text access may be available. Sign in or learn about subscription options.
pp. 147,148,149,150,151
by
Kannan Raj
,
Ting-Chung Poon
,
R.J. Pieper
The fiber-Brillouin ring for low noise amplification, switching and channel selection
Full-text access may be available. Sign in or learn about subscription options.
pp. 152,153,154,155,156
by
Chung Yu
,
A. Holliday
Generation of dark solitons under optical conditions
Full-text access may be available. Sign in or learn about subscription options.
pp. 162,163,164,165
by
W. Zhao
,
E. Bourkoff
Position signal interface for the robotic arm control system
Full-text access may be available. Sign in or learn about subscription options.
pp. 168,169,170,171,172
by
S.P. Praturu
,
J.N. Anderson
UNIX-based robotic controller architecture
Full-text access may be available. Sign in or learn about subscription options.
pp. 173,174,175,176
by
A. Smiarowski
Mechanical analysis and design of a six-degree-of-freedom robotic wrist for space assembly
Full-text access may be available. Sign in or learn about subscription options.
pp. 177-181
by
W.F. Smith III
Composite control of direct-drive manipulators under motion constraints
Full-text access may be available. Sign in or learn about subscription options.
pp. 182,183,184,185,186
by
J. Carroll
,
D. Dawson
,
Zhihua Qu
Robust control of constrained robots
Full-text access may be available. Sign in or learn about subscription options.
pp. 187,188,189,190,191
by
D. Dawson
,
J. Carroll
,
Zhihua Qu
Obstacle avoidance using hierarchical dynamic programming
Full-text access may be available. Sign in or learn about subscription options.
pp. 192,193,194,195,196
by
J.K. Peterson
On testing iterated neural network structures
Full-text access may be available. Sign in or learn about subscription options.
pp. 198,199,200,201,202
by
A. Noore
,
R. Nutter
A neural network based histogramic procedure for fast image segmentation
Full-text access may be available. Sign in or learn about subscription options.
pp. 203,204,205,206
by
R. Kothari
,
P. Klinkhachorn
,
H.A. Huber
A linearization technique for linearly inseparable patterns
Full-text access may be available. Sign in or learn about subscription options.
pp. 207,208,209,210,211
by
Sung-Kwon Park
,
J.H. Kim
Recognition of stability domain of nonlinear dynamical system using multilayer feed-forward artificial neural network approach
Full-text access may be available. Sign in or learn about subscription options.
pp. 212,213,214,215,216,217
by
D.R. Marpaka
Learning for distributed artificial intelligence systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 218,219,220,221
by
M.L. Dowell
,
R.D. Bonnell
Tracking maneuvering targets with an interacting multiple model filter containing exponentially-correlated acceleration models
Full-text access may be available. Sign in or learn about subscription options.
pp. 224,225,226,227,228
by
W.D. Blair
,
G.A. Watson
,
T.R. Rice
Bias and observability analysis of target tracking filters using a kinematic constraint
Full-text access may be available. Sign in or learn about subscription options.
pp. 229,230,231,232
by
A.T. Alouani
,
W.D. Blair
,
G.A. Watson
Tracking constant speed targets using a kinematic constraint
Full-text access may be available. Sign in or learn about subscription options.
pp. 233,234,235,236,237,238
by
W.D. Blair
,
G.A. Waston
,
A.T. Alouani
Constant speed prediction for maneuvering targets using a three dimensional turning rate
Full-text access may be available. Sign in or learn about subscription options.
pp. 239,240,241,242,243
by
G.D. Watson
,
W.D. Blair
Reliability in CMOS VLSI circuits
Full-text access may be available. Sign in or learn about subscription options.
pp. 246,247,248,249,250,251,252,253
by
P. Kukkal
,
J. Bowles
ME spectral estimation for segmented time signals
Full-text access may be available. Sign in or learn about subscription options.
pp. 254,255,256,257
by
Ping Zhou
,
A.D. Poularikas
Bispectral detection of nonstationary signals new theoretical results
Full-text access may be available. Sign in or learn about subscription options.
pp. 264,265,266,267
by
C.M. Pike
,
J.A. Tague
,
E.J. Sullivan
Positive realness and realization of unorthodox impedances
Full-text access may be available. Sign in or learn about subscription options.
pp. 270,271,272
by
A. Davari
Alignment of radars with location errors and azimuth misalignments
Full-text access may be available. Sign in or learn about subscription options.
pp. 273,274,275,276,277
by
R.E. Helmick
A review of fetal ECG detection and enhancement methodologies
Full-text access may be available. Sign in or learn about subscription options.
pp. 278,279,280,281,282
by
S. Horner
,
P.B. Crilly
A parametrically drive PLL lock detector
Full-text access may be available. Sign in or learn about subscription options.
pp. 283,284,285,286
by
J. Stensby
Detection and statistics of amplitude and wave front fluctuations
Full-text access may be available. Sign in or learn about subscription options.
pp. 287,288,289,290,291
by
A.D. Poularikas
Gravity gradient torque control for Earth-orbiting satellites using time-varying systems analysis
Full-text access may be available. Sign in or learn about subscription options.
pp. 300,301,302,303,304,305
by
A.G. Emslie
,
J. Zhu
Geometric properties of constrained linear systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 306,307,308,309,310,311,312,313,314,315,316,317,318
by
M. Fashoro
RKH space methods for factoring the covariance operator
Full-text access may be available. Sign in or learn about subscription options.
pp. 319,320,321,322
by
R.E. Fennell
,
J.A. Reneke
An intelligent control architecture for expert process control
Full-text access may be available. Sign in or learn about subscription options.
pp. 323,324,325,326
by
J. Chen
,
R.D. Bonnell
A decomposition technique for image compression
Full-text access may be available. Sign in or learn about subscription options.
pp. 328,329,330,331,332
by
P. Chitale
,
T. Huntsberger
Image template matching on hypercube array processors
Full-text access may be available. Sign in or learn about subscription options.
pp. 333,334,335,336,337
by
M. Celenk
Self-organizing neural networks for unsupervised color image recognition
Full-text access may be available. Sign in or learn about subscription options.
pp. 338,339,340,341,342
by
Dae Su Sim
,
T. Huntsberger
Modeling the retina
Full-text access may be available. Sign in or learn about subscription options.
pp. 343,344,345,346
by
M. Nouri-Moghadam
,
J.G. Taylor
An implementation of backpropagation algorithm on a massively parallel processor
Full-text access may be available. Sign in or learn about subscription options.
pp. 347,348,349,350,351,352
by
O.M. Omidvar
,
C.L. Wilson
Design of a fault-tolerant RISC microprocessor using VHDL
Full-text access may be available. Sign in or learn about subscription options.
pp. 354,355,356,357,358
by
J.A. Wicks
,
H.L. Martin
Global routing in sea-of-gates technology
Full-text access may be available. Sign in or learn about subscription options.
pp. 359,360,361,362
by
D. Zhou
CAD tool integration for ASIC design: an end-users perspective
Full-text access may be available. Sign in or learn about subscription options.
pp. 363,364,365,366,367,368
by
P. Kukkal
,
M. Imaizumi
,
H. Kobayashi
On the nature of the instabilities of bistable electron devices
Full-text access may be available. Sign in or learn about subscription options.
pp. 369,370,371,372
by
K. Daneshvar
,
G. Singco
A student modeling system for ITCDD: an intelligent tutor for CMOS digital design
Full-text access may be available. Sign in or learn about subscription options.
pp. 373,374,375,376,377,378
by
Chang Jin Kee
,
N. Kaul
,
G. Biswas
,
B. Bhuva
,
J.E. Vargas
Signal distortions that result from minimum phase signal recovery using cepstral processing
Full-text access may be available. Sign in or learn about subscription options.
pp. 380,381,382,383,384
by
T.R. Rice
,
J.E. Gray
,
W.D. Blair
A real-time design of an acoustic signal detection algorithm using the AT&T DSP32 development system
Full-text access may be available. Sign in or learn about subscription options.
pp. 385,386,387,388
by
J. Foster
,
J. Lyon
The response of the transfer function of an alpha-beta filter to various measurement models
Full-text access may be available. Sign in or learn about subscription options.
pp. 389,390,391,392,393
by
J.E. Gray
,
W. Murray
The efficient real-time spatial domain 2-D IIR and FIR digital filter implementation
Full-text access may be available. Sign in or learn about subscription options.
pp. 394,395,396,397,398
by
J.G. Jeong
,
W.E. Alexander
Application of Kalman filtering on a vector signal processor
Full-text access may be available. Sign in or learn about subscription options.
pp. 399,400,401,402,403
by
D.G. Hart
,
A.A. Girgis
Scattering and radiation from cylindrical anisotropic shells
Full-text access may be available. Sign in or learn about subscription options.
pp. 405,406,407,408,409
by
B. Beker
A state space approach to determining solutions to Maxwell's equations for a one-dimensional dispersive medium
Full-text access may be available. Sign in or learn about subscription options.
pp. 410,411,412,413
by
J.E. Gray
,
R.E. Helmick
Characteristics of a thin-wire circular loop antenna in a parallel-plate waveguide
Full-text access may be available. Sign in or learn about subscription options.
pp. 414,415,416,417,418
by
H.A.N. Hejase
,
H.L. Duncan
,
K. Naishadham
,
H. Gangl
,
C. Trad
,
A. Hejase
Transverse wave propagation in media characterized by an exponential impedance profile
Full-text access may be available. Sign in or learn about subscription options.
pp. 419,420,421,422,423
by
K. Pendergraft
,
R. Pieper
Helmholtz decomposition of surface electric current in electromagnetic scattering problems
Full-text access may be available. Sign in or learn about subscription options.
pp. 424,425,426
by
R.W. Scharstein
Modeling the polymerization process-the gel-effect function
Full-text access may be available. Sign in or learn about subscription options.
pp. 428,429,430,431,432,433,434
by
C. Soots
,
T. Stanford
Numerical techniques for the simultaneous achievement of multiple design constraints for multivariable control systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 435,436,437,438,439
by
W.G. Frazier
,
R.D. Irwin
New results for linear, time-varying, discrete-time systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 440,441,442,443
by
C.D. Johnson
,
J. Zhu
A MIMO feedback control simulator of a diaphragm-type chlorine/caustic electrolyzer
Full-text access may be available. Sign in or learn about subscription options.
pp. 444,445,446,447,448,449
by
Chih Ta Lee
,
J.W. Van Zee
A case study of frozen-time eigenvalues in the stability analysis for periodic linear systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 450,451,452,453
by
S. Ray
,
J. Zhu
Quality of stability for linear, time-varying systems using an exact time-varying eigenvalue theory. I
Full-text access may be available. Sign in or learn about subscription options.
pp. 454,455,456,457,458,459,460
by
C.D. Johnson
,
J. Zhu
Determination of tonal amplitudes for texture segmentation
Full-text access may be available. Sign in or learn about subscription options.
pp. 462,463,464,465,466
by
P.S. Hays
,
K.M. Celik
,
R.J. Pieper
Connected-word recognition using the NeXT workstation
Full-text access may be available. Sign in or learn about subscription options.
pp. 467,468
by
J. Foster
,
M. Smith
Data compression of speech signals using time code modulation
Full-text access may be available. Sign in or learn about subscription options.
pp. 469,470,471
by
J. Foster
,
Tzung-Kwang Wang
A texture-based direct 3D segmentation system for confocal scanning fluorescence microscopic images
Full-text access may be available. Sign in or learn about subscription options.
pp. 472,473,474,475,476
by
Z. Lang
,
R.E. Scarberry
,
Z. Zhang
,
W. Shao
,
X. Sun
Design and performance of a modular hardware process mapper (scheduler) for a real-time token controlled data driven multiprocessor architecture
Full-text access may be available. Sign in or learn about subscription options.
pp. 478,479,480,481,482
by
J.R. Heath
,
S. Ramamoorthy
LSIM: a parallel programming environment for large-scale numerical computations
Full-text access may be available. Sign in or learn about subscription options.
pp. 483,484,485,486,487
by
R.P. Natu
,
J.E. Vargas
I/O interfacing for the transputer
Full-text access may be available. Sign in or learn about subscription options.
pp. 488,489,490,491,492,493,494,495
by
G.G. Nordstrom
Concurrent program execution
Full-text access may be available. Sign in or learn about subscription options.
pp. 496,497,498,499
by
V. Swaminathan
,
J. Bowles
Distributing a mobile robot simulator using remote procedure calls
Full-text access may be available. Sign in or learn about subscription options.
pp. 500,501,502,503,504
by
J.A. Kulkarni
,
R.O. Pettus
Fiber-optic components for LANs and data communications
Full-text access may be available. Sign in or learn about subscription options.
pp. 505
by
C.J. Daniels
Proposed automated data analysis for nuclear waste vitrification at SRS: a case study
Full-text access may be available. Sign in or learn about subscription options.
pp. 506
by
R.E. Edwards
Simulation and performance analysis of reliable broadcast protocols for distributed systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 508,509,510,511,512
by
H.B. Desai
,
J. Bowles
Computer viruses
Full-text access may be available. Sign in or learn about subscription options.
pp. 513,514,515,516,517
by
C.E. Pelaez
,
J. Bowles
Security requirements and models in open systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 518,519,520,521,522,523
by
K.O. Kolstad
,
J. Bowles
Showing 100 out of 121
Load More
Load All