Sciweavers

422 search results - page 62 / 85
» On combinations of CMA equalizers
Sort
View
SOCO
2008
Springer
14 years 9 months ago
A face recognition system based on Pseudo 2D HMM applied to neural network coefficients
Face recognition from an image or video sequences is emerging as an active research area with numerous commercial and law enforcement applications. In this paper different Pseudo 2...
Vitoantonio Bevilacqua, Lucia Cariello, Gaetano Ca...
96
Voted
SP
2008
IEEE
162views Security Privacy» more  SP 2008»
14 years 9 months ago
Fable: A Language for Enforcing User-defined Security Policies
This paper presents FABLE, a core formalism for a programming language in which programmers may specify security policies and reason that these policies are properly enforced. In ...
Nikhil Swamy, Brian J. Corcoran, Michael Hicks
JCIT
2007
84views more  JCIT 2007»
14 years 9 months ago
Using Educational Technology to Attain English-Level Inclusion for Asian Business/Technology Students
Just about if not every Native English Speaking Teacher (NEST) in Korea has faced the situation of having to accommodate students with varying, sometimes to dramatic degrees, leve...
David W. Deeds
TWC
2008
177views more  TWC 2008»
14 years 9 months ago
Generalized Design of Multi-User MIMO Precoding Matrices
In this paper we introduce a novel linear precoding technique. The approach used for the design of the precoding matrix is general and the resulting algorithm can address several o...
Veljko Stankovic, Martin Haardt
AI
1998
Springer
14 years 9 months ago
A Complete Anytime Algorithm for Number Partitioning
Given a set of numbers, the two-way partitioning problem is to divide them into two subsets, so that the sum of the numbers in each subset are as nearly equal as possible. The pro...
Richard E. Korf