Sciweavers

6404 search results - page 1064 / 1281
» Blocks
Sort
View
TIT
2008
86views more  TIT 2008»
15 years 4 months ago
A One-to-One Code and Its Anti-Redundancy
One-to-one codes are "one shot" codes that assign a distinct codeword to source symbols and are not necessarily prefix codes (more generally, uniquely decodable). For ex...
Wojciech Szpankowski
TKDE
2008
105views more  TKDE 2008»
15 years 4 months ago
Evolutionary Optimization of File Assignment for a Large-Scale Video-on-Demand System
We present a genetic algorithm for tackling a file assignment problem for a large-scale video-on-demand system. The file assignment problem is to find the optimal replication and a...
Jun Guo, Yi Wang, Kit-Sang Tang, Sammy Chan, Eric ...
132
Voted
JCM
2007
177views more  JCM 2007»
15 years 4 months ago
Collision Free MAC Protocols for Wireless Ad Hoc Networks based on BIBD Architecture
—Wireless Ad hoc networks represent a powerful telecommunication infrastructure that is being exploited for enabling general wireless networking connectivity for a variety of sig...
Pietro Camarda, Orazio Fiume
148
Voted
JCM
2007
162views more  JCM 2007»
15 years 4 months ago
Opportunistic Spectrum Access in Fading Channels Through Collaborative Sensing
— Spectrum scarcity is becoming a major issue for service providers interested in either deploying new services or enhancing the capacity for existing applications. On the other ...
Amir Ghasemi, Elvino S. Sousa
TNN
2008
88views more  TNN 2008»
15 years 4 months ago
A New Approach to Knowledge-Based Design of Recurrent Neural Networks
Abstract-- A major drawback of artificial neural networks (ANNs) is their black-box character. This is especially true for recurrent neural networks (RNNs) because of their intrica...
Eyal Kolman, Michael Margaliot
« Prev « First page 1064 / 1281 Last » Next »