Sciweavers

5275 search results - page 196 / 1055
» Computing by observing
Sort
View
118
Voted
CORR
2006
Springer
122views Education» more  CORR 2006»
15 years 4 months ago
Derivatives of Entropy Rate in Special Families of Hidden Markov Chains
Consider a hidden Markov chain obtained as the observation process of an ordinary Markov chain corrupted by noise. Zuk, et. al. [13, 14] showed how, in principle, one can explicit...
Guangyue Han, Brian Marcus
INFORMATICALT
2000
101views more  INFORMATICALT 2000»
15 years 3 months ago
Closed-loop Robust Identification Using the Indirect Approach
In the previous paper (Pupeikis, 2000) the problem of closed-loop robust identification using the direct approach in the presence of outliers in observations have been considered. ...
Rimantas Pupeikis
GLOBECOM
2009
IEEE
15 years 1 months ago
Minimum-Length Scheduling for Multicast Traffic under Channel Uncertainty
Abstract--We consider a set of multicast sources, each multicasting a finite amount of data to its corresponding destinations. The objective is to minimize the time to deliver all ...
Anna Pantelidou, Anthony Ephremides
136
Voted
ICSAP
2009
15 years 1 months ago
Omnidirectional Surveillance System for Digital Home Security
This paper proposed an efficient omnidirectional surveillance system for digital home security. In this surveillance system, the omnidirectional scenes in a room, kitchen, car porc...
Wai Kit Wong, Joanne Tze Yen Liew, Chu Kiong Loo, ...
DEBU
2010
134views more  DEBU 2010»
15 years 1 months ago
Causality in Databases
Provenance is often used to validate data, by verifying its origin and explaining its derivation. When searching for "causes" of tuples in the query results or in genera...
Alexandra Meliou, Wolfgang Gatterbauer, Joseph Y. ...