Sciweavers

49 search results - page 9 / 10
» tse 2010
Sort
View
IFIP
2010
Springer
13 years 18 days ago
Evaluation of Evidence in Internet Auction Fraud Investigations
Abstract Internet auction fraud has become prevalent. Methodologies for detecting fraudulent transactions use historical information about Internet auction participants to decide w...
Michael Y. K. Kwan, Richard E. Overill, Kam-Pui Ch...
SIGARCH
2010
89views more  SIGARCH 2010»
13 years 15 days ago
Efficient reconfigurable design for pricing asian options
Arithmetic Asian options are financial derivatives which have the feature of path-dependency: they depend on the entire price path of the underlying asset, rather than just the in...
Anson H. T. Tse, David B. Thomas, Kuen Hung Tsoi, ...
BMCBI
2010
69views more  BMCBI 2010»
13 years 5 months ago
Reanalyze unassigned reads in Sanger based metagenomic data using conserved gene adjacency
Background: Investigation of metagenomes provides greater insight into uncultured microbial communities. The improvement in sequencing technology, which yields a large amount of s...
Francis C. Weng, Chien-Hao Su, Ming-Tsung Hsu, Tse...
CORR
2010
Springer
139views Education» more  CORR 2010»
13 years 4 months ago
Feedback Capacity of the Gaussian Interference Channel to within 2 Bits
We characterize the capacity region to within 2 bits/s/Hz and the symmetric capacity to within 1 bit/s/Hz for the two-user Gaussian interference channel (IC) with feedback. We dev...
Changho Suh, David Tse
CORR
2010
Springer
198views Education» more  CORR 2010»
13 years 5 months ago
Downlink Interference Alignment
We develop an interference alignment (IA) technique for a downlink cellular system. In the uplink, IA schemes need channel-state-information exchange across base-stations of diffe...
Changho Suh, Minnie Ho, David Tse