Sciweavers

2328 search results - page 334 / 466
» Component Frameworks - A Case Study
Sort
View
ASIAMS
2008
IEEE
15 years 6 months ago
A Blended Text Mining Method for Authorship Authentication Analysis
The paper elaborates upon the interim results achieved in resolving a few newly discovered 16th century letters now alleged to be written by Queen Mary of Scots (QMS). Despite the...
Philip Sallis, Subana Shanmuganathan
145
Voted
CORR
2007
Springer
105views Education» more  CORR 2007»
15 years 4 months ago
Relative-Error CUR Matrix Decompositions
Many data analysis applications deal with large matrices and involve approximating the matrix using a small number of “components.” Typically, these components are linear combi...
Petros Drineas, Michael W. Mahoney, S. Muthukrishn...
169
Voted
JSAC
2006
180views more  JSAC 2006»
15 years 4 months ago
Adaptive spread-spectrum multicarrier multiple-access over wirelines
Abstract--In this paper, we investigate the dynamic resource allocation adapted to spread-spectrum multicarrier multiple-access (SS-MC-MA) systems in a multiuser power line communi...
Matthieu Crussière, Jean-Yves Baudais, Jean...
INFSOF
2002
147views more  INFSOF 2002»
15 years 4 months ago
On the efficiency of domain-based COTS product selection method
Use of commercial-off-the-shelf (COTS) products is becoming a popular software development method. Current methods of selecting COTS products involve using the intuition of softwa...
Karl R. P. H. Leung, Hareton K. N. Leung
145
Voted
CORR
2010
Springer
153views Education» more  CORR 2010»
15 years 4 months ago
To Feed or Not to Feed Back
We study the communication over Finite State Channels (FSCs), where the encoder and the decoder can control the availability or the quality of the noise-free feedback. Specificall...
Himanshu Asnani, Haim H. Permuter, Tsachy Weissman