Sciweavers

20197 search results - page 3611 / 4040
» Comparing Computational Power
Sort
View
138
Voted
JSAC
2008
110views more  JSAC 2008»
15 years 4 months ago
Low complexity resource allocation with opportunistic feedback over downlink OFDMA networks
Abstract--Optimal tone allocation in downlink OFDMA networks is a non-convex NP-hard problem that requires extensive feedback for channel information. In this paper, two constantco...
Rajiv Agarwal, Vinay R. Majjigi, Zhu Han, Rath Van...
JCO
2006
234views more  JCO 2006»
15 years 4 months ago
Coverage by directional sensors in randomly deployed wireless sensor networks
We study a novel "coverage by directional sensors" problem with tunable orientations on a set of discrete targets. We propose a Maximum Coverage with Minimum Sensors (MCM...
Jing Ai, Alhussein A. Abouzeid
120
Voted
JCP
2006
85views more  JCP 2006»
15 years 4 months ago
A Constructive Meta-Level Feature Selection Method based on Method Repositories
Feature selection is one of key issues related with data pre-processing of classification task in a data mining process. Although many efforts have been done to improve typical fea...
Hidenao Abe, Takahira Yamaguchi
JUCS
2008
157views more  JUCS 2008»
15 years 4 months ago
Using Conjunctions and Adverbs for Author Verification
: Linguistics and stylistics have been investigated for author identification for quite a while, but recently, we have testified a impressive growth in the volume with which lawyer...
Daniel Pavelec, Luiz S. Oliveira, Edson J. R. Just...
JEI
2006
128views more  JEI 2006»
15 years 4 months ago
Performance study of common image steganography and steganalysis techniques
Abstract. We investigate the performance of state of the art universal steganalyzers proposed in the literature. These universal steganalyzers are tested against a number of well-k...
Mehdi Kharrazi, Husrev T. Sencar, Nasir D. Memon
« Prev « First page 3611 / 4040 Last » Next »