Sciweavers

1625 search results - page 264 / 325
» Intentionality
Sort
View
128
Voted
CORR
2008
Springer
78views Education» more  CORR 2008»
15 years 3 months ago
Wireless Secrecy in Cellular Systems with Infrastructure--Aided Cooperation
In cellular systems, confidentiality of uplink transmission with respect to eavesdropping terminals can be ensured by creating intentional interference via scheduling of concurren...
Petar Popovski, Osvaldo Simeone
IPL
2007
94views more  IPL 2007»
15 years 3 months ago
A note on the Hadwiger number of circular arc graphs
Abstract. The intention of this note is to motivate the researchers to study Hadwiger’s conjecture for circular arc graphs. Let η(G) denote the largest clique minor of a graph G...
N. S. Narayanaswamy, Naveen Belkale, L. Sunil Chan...
RAS
2007
117views more  RAS 2007»
15 years 3 months ago
Learning spatial concepts from RatSLAM representations
RatSLAM is a biologically-inspired visual SLAM and navigation system that has been shown to be effective indoors and outdoors on real robots. The spatial representation at the cor...
Michael Milford, Ruth Schulz, David Prasser, Gordo...
GPEM
2010
89views more  GPEM 2010»
15 years 2 months ago
Variable population size and evolution acceleration: a case study with a parallel evolutionary algorithm
Abstract With current developments of parallel and distributed computing, evolutionary algorithms have benefited considerably from parallelization techniques. Besides improved com...
Ting Hu, Simon Harding, Wolfgang Banzhaf
JEI
2008
129views more  JEI 2008»
15 years 2 months ago
Removable visible image watermarking algorithm in the discrete cosine transform domain
Abstract. A removable visible watermarking scheme, which operates in the discrete cosine transform (DCT) domain, is proposed for combating copyright piracy. First, the original wat...
Ying Yang, Xingming Sun, Hengfu Yang, Chang-Tsun L...