Sciweavers

17770 search results - page 3324 / 3554
» A Generalization of Forward-Backward Algorithm
Sort
View
141
Voted
ICC
2007
IEEE
109views Communications» more  ICC 2007»
15 years 10 months ago
Design Linear Multiuser Transmitters from Linear Multiuser Receivers
— Novel concepts are introduced for finding the relationship between multiuser detection (MUD) and multiuser transmission (MUT), so that the study in MUT can benefit from the w...
Lie-Liang Yang
ICDE
2007
IEEE
134views Database» more  ICDE 2007»
15 years 10 months ago
Apply Model Checking to Security Analysis in Trust Management
Trust management is a form of access control that uses delegation to achieve scalability beyond a single organization or federation. However, delegation can be difficult to contr...
Mark Reith, Jianwei Niu, William H. Winsborough
ICDE
2007
IEEE
211views Database» more  ICDE 2007»
15 years 10 months ago
Document Representation and Dimension Reduction for Text Clustering
Increasingly large text datasets and the high dimensionality associated with natural language create a great challenge in text mining. In this research, a systematic study is cond...
M. Mahdi Shafiei, Singer Wang, Roger Zhang, Evange...
143
Voted
ICDM
2007
IEEE
121views Data Mining» more  ICDM 2007»
15 years 10 months ago
Finding Predictive Runs with LAPS
We present an extension to the Lasso [9] for binary classification problems with ordered attributes. Inspired by the Fused Lasso [8] and the Group Lasso [10, 4] models, we aim to...
Suhrid Balakrishnan, David Madigan
118
Voted
ICDM
2007
IEEE
183views Data Mining» more  ICDM 2007»
15 years 10 months ago
Depth-Based Novelty Detection and Its Application to Taxonomic Research
It is estimated that less than 10 percent of the world’s species have been described, yet species are being lost daily due to human destruction of natural habitats. The job of d...
Yixin Chen, Henry L. Bart Jr., Xin Dang, Hanxiang ...
« Prev « First page 3324 / 3554 Last » Next »