Sciweavers

NN
1998
Springer
177views Neural Networks» more  NN 1998»
13 years 4 months ago
Soft vector quantization and the EM algorithm
The relation between hard c-means (HCM), fuzzy c-means (FCM), fuzzy learning vector quantization (FLVQ), soft competition scheme (SCS) of Yair et al. (1992) and probabilistic Gaus...
Ethem Alpaydin
ETT
2002
92views Education» more  ETT 2002»
13 years 4 months ago
Most probable paths and performance formulae for buffers with gaussian input traffic
In this paper, performance formulae for a queue serving Gaussian traffic are presented. The main technique employed is motivated by a general form of Schilder's theorem, the ...
Ron Addie, Petteri Mannersalo, Ilkka Norros
TNN
2008
128views more  TNN 2008»
13 years 4 months ago
A Hybrid Technique for Blind Separation of Non-Gaussian and Time-Correlated Sources Using a Multicomponent Approach
Blind inversion of a linear and instantaneous mixture of source signals is a problem often encountered in many signal processing applications. Efficient FastICA (EFICA) offers an ...
Petr Tichavský, Zbynek Koldovský, Ar...
TIT
2008
91views more  TIT 2008»
13 years 4 months ago
Uncoded Transmission Is Exactly Optimal for a Simple Gaussian "Sensor" Network
One of the simplest sensor network models has one single underlying Gaussian source of interest, observed by many sensors, subject to independent Gaussian observation noise. The se...
Michael Gastpar
TIT
2008
74views more  TIT 2008»
13 years 4 months ago
Rate Region of the Quadratic Gaussian Two-Encoder Source-Coding Problem
We determine the rate region of the quadratic Gaussian two-encoder source-coding problem. This rate region is achieved by a simple architecture that separates the analog and digita...
Aaron B. Wagner, Saurabha Tavildar, Pramod Viswana...
JCC
2008
195views more  JCC 2008»
13 years 4 months ago
pyVib, a computer program for the analysis of infrared and Raman optical activity
: A new program called pyVib has been developed as a tool for the analysis of Gaussian (Gaussian 03, Gaussian Inc., Pittsburgh, PA) outputs of vibrational absorption (IR), Raman as...
Mohamed Zerara
CORR
2006
Springer
126views Education» more  CORR 2006»
13 years 4 months ago
The Gaussian Multiple Access Wire-Tap Channel
We consider the General Gaussian Multiple Access Wire-Tap Channel (GGMAC-WT). In this scenario, multiple users communicate with an intended receiver in the presence of an intellige...
Ender Tekin, Aylin Yener
CORR
2006
Springer
117views Education» more  CORR 2006»
13 years 4 months ago
The Gaussian Multiple Access Wire-Tap Channel with Collective Secrecy Constraints
We consider the Gaussian Multiple Access Wire-Tap Channel (GMAC-WT). In this scenario, multiple users communicate with an intended receiver in the presence of an intelligent and in...
Ender Tekin, Aylin Yener
CORR
2010
Springer
119views Education» more  CORR 2010»
13 years 4 months ago
Ergodic Secret Alignment
In this paper, we provide a new achievable ergodic secrecy rate region for the multiple access wiretap channel in fading. Our achievable scheme is based on repeating each symbol at...
Raef Bassily, Sennur Ulukus
CORR
2008
Springer
98views Education» more  CORR 2008»
13 years 4 months ago
The Gaussian MAC with Conferencing Encoders
We derive the capacity region of the Gaussian version of Willems's two-user MAC with conferencing encoders. This setting differs from the classical MAC in that, prior to each ...
Shraga I. Bross, Amos Lapidoth, Michele A. Wigger