Sciweavers

908 search results - page 100 / 182
» Additional methods when using email for teaching
Sort
View
ETT
2000
91views Education» more  ETT 2000»
14 years 9 months ago
Performance Analysis and Estimation of Call Admission Control Parameters in Wireless Integrated Voice and Data Networks
We propose an admission control policy for wireless multimedia networks that is based on the well known threshold-based guard channel method. The new scheme deals with two differen...
Mahmoud T. El-Hadidi, Khaled M. F. Elsayed, Mohame...
CVPR
2004
IEEE
15 years 11 months ago
Joint Feature-Basis Subset Selection
We treat feature selection and basis selection in a unified framework by introducing the masking matrix. If one considers feature selection as finding a binary mask vector that de...
Shai Avidan
FMCAD
2007
Springer
15 years 3 months ago
Exploiting Resolution Proofs to Speed Up LTL Vacuity Detection for BMC
—When model-checking reports that a property holds on a model, vacuity detection increases user confidence in this result by checking that the property is satisfied in the inte...
Jocelyn Simmonds, Jessica Davies, Arie Gurfinkel, ...
IPCV
2008
14 years 11 months ago
Weighted Embedded Zero Tree for Scalable Video Compression
Video streaming over the Internet has gained popularity during recent years mainly due to the revival of videoconferencing and videotelephony applications and the proliferation of ...
Roya Choupani, Stephan Wong, Mehmet R. Tolun
SDM
2007
SIAM
169views Data Mining» more  SDM 2007»
14 years 11 months ago
Rank Aggregation for Similar Items
The problem of combining the ranked preferences of many experts is an old and surprisingly deep problem that has gained renewed importance in many machine learning, data mining, a...
D. Sculley