Sciweavers

422 search results - page 62 / 85
» On combinations of CMA equalizers
Sort
View
133
Voted
SOCO
2008
Springer
15 years 11 days ago
A face recognition system based on Pseudo 2D HMM applied to neural network coefficients
Face recognition from an image or video sequences is emerging as an active research area with numerous commercial and law enforcement applications. In this paper different Pseudo 2...
Vitoantonio Bevilacqua, Lucia Cariello, Gaetano Ca...
117
Voted
SP
2008
IEEE
162views Security Privacy» more  SP 2008»
15 years 11 days ago
Fable: A Language for Enforcing User-defined Security Policies
This paper presents FABLE, a core formalism for a programming language in which programmers may specify security policies and reason that these policies are properly enforced. In ...
Nikhil Swamy, Brian J. Corcoran, Michael Hicks
77
Voted
JCIT
2007
84views more  JCIT 2007»
15 years 10 days ago
Using Educational Technology to Attain English-Level Inclusion for Asian Business/Technology Students
Just about if not every Native English Speaking Teacher (NEST) in Korea has faced the situation of having to accommodate students with varying, sometimes to dramatic degrees, leve...
David W. Deeds
100
Voted
TWC
2008
177views more  TWC 2008»
15 years 10 days ago
Generalized Design of Multi-User MIMO Precoding Matrices
In this paper we introduce a novel linear precoding technique. The approach used for the design of the precoding matrix is general and the resulting algorithm can address several o...
Veljko Stankovic, Martin Haardt
AI
1998
Springer
15 years 5 days ago
A Complete Anytime Algorithm for Number Partitioning
Given a set of numbers, the two-way partitioning problem is to divide them into two subsets, so that the sum of the numbers in each subset are as nearly equal as possible. The pro...
Richard E. Korf