Sciweavers

3373 search results - page 466 / 675
» Linear transformations on codes
Sort
View
CORR
2007
Springer
136views Education» more  CORR 2007»
15 years 3 months ago
On Cognitive Interference Networks
— We study the high-power asymptotic behavior of the sum-rate capacity of multi-user interference networks with an equal number of transmitters and receivers. We assume that each...
Amos Lapidoth, Shlomo Shamai, Michele A. Wigger
JMM2
2008
157views more  JMM2 2008»
15 years 3 months ago
Multiresolution Feature Based Fractional Power Polynomial Kernel Fisher Discriminant Model for Face Recognition
This paper presents a technique for face recognition which uses wavelet transform to derive desirable facial features. Three level decompositions are used to form the pyramidal mul...
Dattatray V. Jadhav, Jayant V. Kulkarni, Raghunath...
130
Voted
AUTOMATICA
2005
115views more  AUTOMATICA 2005»
15 years 3 months ago
Robust constrained predictive control using comparison model
This paper proposes a quadratic programming (QP) approach to robust model predictive control (MPC) for constrained linear systems having both model uncertainties and bounded distu...
Hiroaki Fukushima, Robert R. Bitmead
125
Voted
CVGIP
2004
121views more  CVGIP 2004»
15 years 3 months ago
Skeleton-driven 2D distance field metamorphosis using intrinsic shape parameters
In this article a novel algorithm is presented for 2D shape interpolation using the intrinsic shape parameters of a piecewise linear curve. The skeletons of two given shapes are c...
WuJun Che, XunNian Yang, GuoZhao Wang
113
Voted
FGCS
2000
81views more  FGCS 2000»
15 years 3 months ago
Managing the operator ordering problem in parallel databases
This paper focuses on parallel query optimization. We consider the operator problem and introduce a new class of execution strategies called Linear-Oriented Bushy Trees (LBTs). Co...
Harald Kosch