Sciweavers

Share
warning: Creating default object from empty value in /var/www/modules/taxonomy/taxonomy.module on line 1416.
CORR
2008
Springer
99views Education» more  CORR 2008»
10 years 1 months ago
Extension of Inagaki General Weighted Operators and A New Fusion Rule Class of Proportional Redistribution of Intersection Masse
In this paper we extend Inagaki Weighted Operators fusion rule (WO) [see 1, 2] in information fusion by doing redistribution of not only the conflicting mass, but also of masses o...
Florentin Smarandache
CORR
2008
Springer
161views Education» more  CORR 2008»
10 years 1 months ago
Compressed Sensing of Analog Signals
Abstract--A traditional assumption underlying most data converters is that the signal should be sampled at a rate exceeding twice the highest frequency. This statement is based on ...
Yonina C. Eldar
CORR
2008
Springer
127views Education» more  CORR 2008»
10 years 1 months ago
Flexible Time-Triggered Sampling in Smart Sensor-Based Wireless Control Systems
: Wireless control systems (WCSs) often have to operate in dynamic environments where the network traffic load may vary unpredictably over time. The sampling in sensors is conventi...
Feng Xia, Wenhong Zhao
CORR
2008
Springer
115views Education» more  CORR 2008»
10 years 1 months ago
Efficient Navigation in Scale-Free Networks Embedded in Hyperbolic Metric Spaces
Dmitri V. Krioukov, Fragkiskos Papadopoulos, Mari&...
CORR
2008
Springer
113views Education» more  CORR 2008»
10 years 1 months ago
Golden Space-Time Block Coded Modulation
In a slow fading MIMO channel, we consider a coded modulation scheme where the inner code is the Golden Code. In this case, a lower bound for the minimum determinant is given by th...
Laura Luzzi, Ghaya Rekaya-Ben Othman, Jean-Claude ...
CORR
2008
Springer
92views Education» more  CORR 2008»
10 years 1 months ago
Source Coding for a Simple Network with Receiver Side Information
We consider the problem of source coding with receiver side information for the simple network proposed by R. Gray and A. Wyner in 1974. In this network, a transmitter must reliabl...
Roy Timo, Alexander J. Grant, Terence Chan, Gerhar...
CORR
2008
Springer
140views Education» more  CORR 2008»
10 years 1 months ago
Steganography of VoIP streams
The paper concerns available steganographic techniques that can be used for creating covert channels for VoIP (Voice over Internet Protocol) streams. Apart from characterizing exis...
Wojciech Mazurczyk, Krzysztof Szczypiorski
CORR
2008
Springer
148views Education» more  CORR 2008»
10 years 1 months ago
Efficiently Simulating Higher-Order Arithmetic by a First-Order Theory Modulo
In deduction modulo, a theory is not represented by a set of axioms but by a congruence on propositions modulo which the inference rules of standard deductive systems--such as for ...
Guillaume Burel
books