Sciweavers

2250 search results - page 58 / 450
» Authorizing applications in singularity
Sort
View
ICC
2007
IEEE
126views Communications» more  ICC 2007»
15 years 4 months ago
Estimating Ridge Topologies with High Curvature for Fingerprint Authentication Systems
— An orientation model provides an analytical means for describing fingerprint ridge orientations. It can help in data storage and recovery as well as other possible communicati...
Yi Wang, Jiankun Hu
IJCNN
2006
IEEE
15 years 3 months ago
Some stability properties of dynamic neural networks with different time-scales
Abstract— Dynamic neural networks with different timescales include the aspects of fast and slow phenomenons. Some applications require that the equilibrium points of these netwo...
Alejandro Cruz Sandoval, Wen Yu, Xiaoou Li
ICDM
2005
IEEE
126views Data Mining» more  ICDM 2005»
15 years 3 months ago
Text Representation: From Vector to Tensor
In this paper, we propose a text representation model, Tensor Space Model (TSM), which models the text by multilinear algebraic high-order tensor instead of the traditional vector...
Ning Liu, Benyu Zhang, Jun Yan, Zheng Chen, Wenyin...
ITNG
2010
IEEE
15 years 2 months ago
Functional Implementation Specification for a Service-Oriented Geographic Intelligence
This paper is the second on a series of four papers and presents the functional systematization implementation specification of a subsystem with integrative function based on a Se...
Valdevino Siqueira Campos Neto, Fernando Maciel Li...
ICASSP
2009
IEEE
15 years 1 months ago
A MIMO channel perturbation analysis for robust bit loading
In narrowband multiple-input multiple-output (MIMO) communication systems, when the channel state information (CSI) is known perfectly at the transmitter and the receiver, techniq...
Michael D. Larsen, A. Lee Swindlehurst