Sciweavers

773 search results - page 130 / 155
» On Cryptographic Assumptions and Challenges
Sort
View
CLEF
2009
Springer
14 years 11 months ago
Unsupervised Morphological Analysis by Formal Analogy
Abstract. While classical approaches to unsupervised morphology acquisition often rely on metrics based on information theory for identifying morphemes, we describe a novel approac...
Jean-François Lavallée, Philippe Lan...
GLOBECOM
2009
IEEE
14 years 11 months ago
A Low-Complexity Algorithm for Uplink Scheduling in Cooperative Cellular Networks with a Capacity-Constrained Backhaul Infrastru
Today, it is well understood that interference poses the main capacity limitation and thus challenge for future cellular networks. A promising concept that addresses interference i...
Fabian Diehm, Patrick Marsch, Gerhard Fettweis, Bh...
133
Voted
ICCAD
2009
IEEE
106views Hardware» more  ICCAD 2009»
14 years 11 months ago
Quantifying robustness metrics in parameterized static timing analysis
Process and environmental variations continue to present significant challenges to designers of high-performance integrated circuits. In the past few years, while much research has...
Khaled R. Heloue, Chandramouli V. Kashyap, Farid N...
ICMLA
2009
14 years 11 months ago
Exploring Scale-Induced Feature Hierarchies in Natural Images
Recently there has been considerable interest in topic models based on the bag-of-features representation of images. The strong independence assumption inherent in the bag-of-feat...
Jukka Perkiö, Tinne Tuytelaars, Wray L. Bunti...
COGSCI
2011
50views more  COGSCI 2011»
14 years 9 months ago
A Phase Transition Model for the Speed-Accuracy Trade-Off in Response Time Experiments
Most models of response time (RT) in elementary cognitive tasks implicitly assume that the speed-accuracy trade-off is continuous: When payoffs or instructions gradually increase ...
Gilles Dutilh, Eric-Jan Wagenmakers, Ingmar Visser...