— In this paper, distributed double-differential coding is proposed to avoid the problem of carrier offsets in amplify and forward protocol based cooperative network with two rel...
In the analysis of cryptographic protocols, a treacherous set of terms is one from which an intruder can get access to what was intended to be secret, by adding on to the top of a ...
— One of features of soft object manipulation is motion during deformation of the soft body. We analyze the stability of soft object manipulation by simultaneous control of motio...
In this paper, we report our success in building efficient scalable classifiers in the form of decision tables by exploring capabilities of modern relational database management s...
We present an approach for the joint extraction of entities and relations in the context of opinion recognition and analysis. We identify two types of opinion-related entities -- ...