Sciweavers

384 search results - page 44 / 77
» A Vector Approach to Cryptography Implementation
Sort
View
SPAA
2005
ACM
15 years 7 months ago
Efficient algorithms for verifying memory consistency
One approach in verifying the correctness of a multiprocessor system is to show that its execution results comply with the memory consistency model it is meant to implement. It ha...
Chaiyasit Manovit, Sudheendra Hangal
CORR
2007
Springer
144views Education» more  CORR 2007»
15 years 1 months ago
Distributing the Kalman Filter for Large-Scale Systems
This paper derives a near optimal distributed Kalman filter to estimate a large-scale random field monitored by a network of N sensors. The field is described by a sparsely con...
Usman A. Khan, José M. F. Moura
161
Voted
ESANN
2006
15 years 3 months ago
Random Forests Feature Selection with K-PLS: Detecting Ischemia from Magnetocardiograms
Random Forests were introduced by Breiman for feature (variable) selection and improved predictions for decision tree models. The resulting model is often superior to AdaBoost and ...
Long Han, Mark J. Embrechts, Boleslaw K. Szymanski...
ICC
2008
IEEE
142views Communications» more  ICC 2008»
15 years 8 months ago
Nonlinear Beamforming for Multiple-Antenna Assisted QPSK Wireless Systems
— A nonlinear beamforming aided detector is proposed for multiple-antenna assisted quadrature phase shift keying systems. By exploiting the inherent symmetry of the optimal Bayes...
Sheng Chen, Lajos Hanzo, Shuang Tan
PR
2010
144views more  PR 2010»
15 years 10 days ago
Classifying transformation-variant attributed point patterns
This paper presents a classification approach, where a sample is represented by a set of feature vectors called an attributed point pattern. Some attributes of a point are transf...
K. E. Dungan, L. C. Potter