Sciweavers

2388 search results - page 401 / 478
» Kernel information embeddings
Sort
View
GLOBECOM
2007
IEEE
15 years 10 months ago
Overlapped Alamouti Codes
—In most of the existing space–time code designs, achieving full diversity is based on maximum-likelihood (ML) decoding at the receiver that is usually computationally expensiv...
Yue Shang, Xiang-Gen Xia
ICC
2007
IEEE
15 years 10 months ago
Scheduling Feed Retrieval
— The popularity of RSS and similar feed formats is growing fast. This paper gives an overview of the standards and implementations in this field, and analyzes whether they allo...
Ward van Wanrooij, Aiko Pras
ICDM
2007
IEEE
132views Data Mining» more  ICDM 2007»
15 years 10 months ago
Granularity Conscious Modeling for Probabilistic Databases
The convergence of embedded sensor systems and stream query processing suggests an important role for database techniques, in managing data that only partially – and often inacc...
Eirinaios Michelakis, Daisy Zhe Wang, Minos N. Gar...
LICS
2007
IEEE
15 years 10 months ago
Principles of Superdeduction
In predicate logic, the proof that a theorem P holds in a theory Th is typically conducted in natural deduction or in the sequent calculus using all the information contained in t...
Paul Brauner, Clément Houtmann, Claude Kirc...
RTCSA
2007
IEEE
15 years 10 months ago
A Privacy Preserving Access Control Scheme using Anonymous Identification for Ubiquitous Environments
Compared to all emerging issues, privacy is probably the most prominent concern when it comes to judging the effects of a wide spread deployment of ubiquitous computing. On one ha...
Nguyen Ngoc Diep, Sungyoung Lee, Young-Koo Lee, He...