Sciweavers

245 search results - page 9 / 49
» The Iterated Weakest Link
Sort
View
HICSS
2008
IEEE
110views Biometrics» more  HICSS 2008»
15 years 6 months ago
Gathering Experience Knowledge from Iterative Software Development Processes
This paper proposes that experience knowledge would be beneficial for iterative software development. In this paper, experience knowledgebased artifacts have been linked to Extrem...
Jouni Kokkoniemi
VTC
2008
IEEE
15 years 6 months ago
Irregular Generic Detection Aided Iterative Downlink SDMA Systems
— When an iterative-decoding aided system is configured to operate at a near-capacity performance, an excessive complexity may be imposed by the iterative process. In this paper...
Chun-Yi Wei, Lajos Hanzo
TIT
2008
121views more  TIT 2008»
14 years 11 months ago
Asynchronous Iterative Water-Filling for Gaussian Frequency-Selective Interference Channels
This paper considers the maximization of information rates for the Gaussian frequency-selective interference channel, subject to power and spectral mask constraints on each link. T...
Gesualdo Scutari, Daniel Pérez Palomar, Ser...
SIPS
2007
IEEE
15 years 6 months ago
Exit Chart Aided Irregular Convolutional Code Design for Iterative Downlink SDMA Systems Using Imperfect Channel State Informati
We analyze a precoded and iteratively detected downlink multiuser system employing imperfect Spatio-Temporal Channel Impulse Response at the Transmitters (ST-CIRT) with the aid of...
Chun-Yi Wei, Jin Wang, Lajos Hanzo
EUROPAR
2007
Springer
15 years 6 months ago
Asynchronous Distributed Power Iteration with Gossip-Based Normalization
The dominant eigenvector of matrices defined by weighted links in overlay networks plays an important role in many peer-to-peer applications. Examples include trust management, im...
Márk Jelasity, Geoffrey Canright, Kenth Eng...