Sciweavers

8808 search results - page 1696 / 1762
» Process Change Patterns
Sort
View
CISS
2007
IEEE
15 years 4 months ago
Cooperation Strategies for Two Co-located receivers, with no CSI at the transmitter
— We study the case of a single transmitter, which communicates to two co-located users, through an independent block Rayleigh fading channel. The co-location nature of the users...
Amichai Sanderovich, Avi Steiner, Shlomo Shamai
ICC
2007
IEEE
15 years 4 months ago
Video Coding With Linear Compensation (VCLC)
— Block based motion compensation techniques are commonly used in video encoding to reduce the temporal redundancy of the signal. In these techniques, each block in a video frame...
Arif Mahmood, Zartash Afzal Uzmi, Sohaib Khan
ICTAI
2007
IEEE
15 years 4 months ago
Establishing Logical Rules from Empirical Data
We review a method of generating logical rules, or axioms, from empirical data. This method, using closed set properties of formal concept analysis, has been previously described ...
John L. Pfaltz
IPCCC
2007
IEEE
15 years 4 months ago
Optimising Networks Against Malware
Rapidly-spreading malicious software is an important threat on today’s computer networks. Most solutions that have been proposed to counter this threat are based on our ability ...
Pierre-Marc Bureau, José M. Fernandez
IROS
2007
IEEE
210views Robotics» more  IROS 2007»
15 years 4 months ago
Extrinsic self calibration of a camera and a 3D laser range finder from natural scenes
— In this paper, we describe a new approach for the extrinsic calibration of a camera with a 3D laser range finder, that can be done on the fly. This approach does not require an...
Davide Scaramuzza, Ahad Harati, Roland Siegwart
« Prev « First page 1696 / 1762 Last » Next »