Sciweavers

436 search results - page 15 / 88
» On two variations of identifying codes
Sort
View
TREC
2000
14 years 11 months ago
Query Expansion Seen Through Return Order of Relevant Documents
There is a reservoir of knowledge in data from the TREC evaluations that analysis of precision and recall leaves untapped. This knowledge leads to better understanding of query ex...
Walter Liggett, Chris Buckley
SIAMCOMP
2008
123views more  SIAMCOMP 2008»
14 years 9 months ago
Approximation Algorithms for Biclustering Problems
One of the main goals in the analysis of microarray data is to identify groups of genes and groups of experimental conditions (including environments, individuals, and tissues) tha...
Lusheng Wang, Yu Lin, Xiaowen Liu
IOLTS
2003
IEEE
133views Hardware» more  IOLTS 2003»
15 years 3 months ago
Power Consumption of Fault Tolerant Codes: the Active Elements
On-chip global interconnections in very deep submicron technology (VDSM) ICs are becoming more sensitive and prone to errors caused by power supply noise, crosstalk noise, delay v...
Daniele Rossi, Steven V. E. S. van Dijk, Richard P...
WCNC
2008
IEEE
15 years 4 months ago
Cooperative Communications Using Scalable, Medium Block-length LDPC Codes
Abstract— Cooperative communications has received increasing attention in recent years because of the ubiquity of wireless devices. Each year more mobile computing devices enter ...
Marjan Karkooti, Joseph R. Cavallaro
VTC
2007
IEEE
124views Communications» more  VTC 2007»
15 years 4 months ago
Near-Instantaneously Adaptive Cooperative Uplink Schemes Based on Space-Time Block Codes and V-Blast
- In this paper we propose two adaptive schemes for improving the achievable Bandwidth Efficiency (BE) of cooperative diversity aided wireless networks. These schemes are capable ...
Mohammed El-Hajjar, Salam A. Zummo, Lajos Hanzo