Sciweavers

484 search results - page 65 / 97
» Equivalence of state representations for hidden Markov model...
Sort
View
CORR
2011
Springer
191views Education» more  CORR 2011»
14 years 4 months ago
A Message-Passing Receiver for BICM-OFDM over Unknown Clustered-Sparse Channels
We propose a factor-graph-based approach to joint channel-estimationand-decoding of bit-interleaved coded orthogonal frequency division multiplexing (BICM-OFDM). In contrast to ex...
Philip Schniter
DKE
2007
130views more  DKE 2007»
14 years 9 months ago
Enabling access-privacy for random walk based data analysis applications
Random walk graph and Markov chain based models are used heavily in many data and system analysis domains, including web, bioinformatics, and queuing. These models enable the desc...
Ping Lin, K. Selçuk Candan
TASE
2008
IEEE
14 years 9 months ago
An Intelligent Online Monitoring and Diagnostic System for Manufacturing Automation
Condition monitoring and fault diagnosis in modern manufacturing automation is of great practical significance. It improves quality and productivity, and prevents damage to machine...
Ming Ge, Yangsheng Xu, Ruxu Du
DCC
2003
IEEE
15 years 3 months ago
Rate-Distortion Bound for Joint Compression and Classification
- Rate-distortion theory is applied to the problem of joint compression and classification. A Lagrangian distortion measure is used to consider both the squared Euclidean error in ...
Yanting Dong, Lawrence Carin
ETRICS
2006
15 years 1 months ago
On the Use of Word Networks to Mimicry Attack Detection
Intrusion detection aims at raising an alarm any time the security of an IT system gets compromised. Though highly successful, Intrusion Detection Systems are all susceptible of mi...
Fernando Godínez, Dieter Hutter, Raul Monro...