Sciweavers

1684 search results - page 193 / 337
» The lexicographic decision function
Sort
View
75
Voted
DATE
2005
IEEE
192views Hardware» more  DATE 2005»
15 years 6 months ago
C Based Hardware Design for Wireless Applications
The algorithms used in wireless applications are increasingly more sophisticated and consequently more challenging to implement in hardware. Traditional design flows require devel...
Andrés Takach, Bryan Bowyer, Thomas Bollaer...
118
Voted
ISCC
2005
IEEE
120views Communications» more  ISCC 2005»
15 years 6 months ago
Modular Reference Implementation of an IP-DSLAM
We describe a modular reference implementation of an IPbased DSL access multiplexer (DSLAM). We identify deployment trends and primary tasks a future DSLAM has to offer. The imple...
Christian Sauer, Matthias Gries, Sören Sonnta...
91
Voted
WACV
2005
IEEE
15 years 6 months ago
Gait Verification Using Probabilistic Methods
In this paper we describe a novel method for gait based identity verification based on Bayesian classification. The verification task is reduced to a two class problem (Client or ...
Alex I. Bazin, Mark S. Nixon
82
Voted
ICCS
2005
Springer
15 years 6 months ago
H2O Metacomputing - Jini Lookup and Discovery
Because of its inter-organisational, collaborative use of computational resources, grid computing presents a severe interoperability challenge to grid application developers. Diffe...
Dirk Gorissen, Gunther Stuer, Kurt Vanmechelen, Ja...
114
Voted
ICIC
2005
Springer
15 years 6 months ago
Methods of Decreasing the Number of Support Vectors via k-Mean Clustering
This paper proposes two methods which take advantage of k -mean clustering algorithm to decrease the number of support vectors (SVs) for the training of support vector machine (SVM...
Xiao-Lei Xia, Michael R. Lyu, Tat-Ming Lok, Guang-...