Sciweavers

3555 search results - page 123 / 711
» Security-Critical System Development with Extended Use Cases
Sort
View
ICC
2008
IEEE
154views Communications» more  ICC 2008»
15 years 8 months ago
Regularized Channel Inversion for Multiple-Antenna users in Multiuser MIMO Downlink
— Channel inversion is one of the simplest techniques for multiuser downlink systems with single-antenna users. In this paper, we extend the regularized channel inversion techniq...
Heunchul Lee, Kwangwon Lee, Bertrand M. Hochwald, ...
ENTCS
2006
120views more  ENTCS 2006»
15 years 1 months ago
Semantics of UML 2.0 Interactions with Variabilities
Means for the representation of variability in UML 2.0 interactions, as presented in a previous work, are further formalised and given a mathematically formal semantics. In this w...
María Victoria Cengarle, Peter Graubmann, S...
CDC
2010
IEEE
105views Control Systems» more  CDC 2010»
14 years 8 months ago
Universal scheduling for networks with arbitrary traffic, channels, and mobility
We extend stochastic network optimization theory to treat networks with arbitrary sample paths for arrivals, channels, and mobility. The network can experience unexpected link or n...
Michael J. Neely
TIT
2002
164views more  TIT 2002»
15 years 1 months ago
On the generalization of soft margin algorithms
Generalization bounds depending on the margin of a classifier are a relatively recent development. They provide an explanation of the performance of state-of-the-art learning syste...
John Shawe-Taylor, Nello Cristianini
IEEECIT
2005
IEEE
15 years 7 months ago
Case Study: Distance-Based Image Retrieval in the MoBIoS DBMS
Similarity search leveraging distance-based index structures is increasingly being used for complex data types. It has been shown that for high dimensional uniform vectors with si...
Rui Mao, Wenguo Liu, Daniel P. Miranker, Qasim Iqb...