Sciweavers

439 search results - page 87 / 88
» A new method for speaker adaptation using bilinear model
Sort
View
CISS
2007
IEEE
14 years 3 days ago
Cooperation Strategies for Two Co-located receivers, with no CSI at the transmitter
— We study the case of a single transmitter, which communicates to two co-located users, through an independent block Rayleigh fading channel. The co-location nature of the users...
Amichai Sanderovich, Avi Steiner, Shlomo Shamai
JCSS
2008
120views more  JCSS 2008»
13 years 5 months ago
Quantum certificate complexity
Given a Boolean function f, we study two natural generalizations of the certificate complexity C (f): the randomized certificate complexity RC (f) and the quantum certificate comp...
Scott Aaronson
AAAI
2006
13 years 7 months ago
AWDRAT: A Cognitive Middleware System for Information Survivability
The Infrastructure of modern society is controlled by software systems that are vulnerable to attacks. Many such attacks, launched by "recreational hackers" have already...
Howard E. Shrobe, Robert Laddaga, Robert Balzer, N...
ATAL
2010
Springer
13 years 6 months ago
Planning against fictitious players in repeated normal form games
Planning how to interact against bounded memory and unbounded memory learning opponents needs different treatment. Thus far, however, work in this area has shown how to design pla...
Enrique Munoz de Cote, Nicholas R. Jennings
BMCBI
2007
125views more  BMCBI 2007»
13 years 5 months ago
Statistical tests to compare motif count exceptionalities
Background: Finding over- or under-represented motifs in biological sequences is now a common task in genomics. Thanks to p-value calculation for motif counts, exceptional motifs ...
Stéphane Robin, Sophie Schbath, Vincent Van...