Sciweavers

1585 search results - page 313 / 317
» Using a Non-prior Training Active Feature Model
Sort
View
MMNS
2001
151views Multimedia» more  MMNS 2001»
14 years 10 months ago
Analysis of Random Access Protocol under Bursty Traffic
Aloha-type random-access protocols have been employed as access control protocols in wireline and wireless, stationary and mobile, multiple-access communications networks. They are...
Jianbo Gao, Izhak Rubin
CORR
2008
Springer
161views Education» more  CORR 2008»
14 years 8 months ago
Compressed Sensing of Analog Signals
Abstract--A traditional assumption underlying most data converters is that the signal should be sampled at a rate exceeding twice the highest frequency. This statement is based on ...
Yonina C. Eldar
TASLP
2010
138views more  TASLP 2010»
14 years 4 months ago
Glimpsing IVA: A Framework for Overcomplete/Complete/Undercomplete Convolutive Source Separation
Abstract--Independent vector analysis (IVA) is a method for separating convolutedly mixed signals that significantly reduces the occurrence of the well-known permutation problem in...
Alireza Masnadi-Shirazi, Wenyi Zhang, Bhaskar D. R...
ICDE
2006
IEEE
206views Database» more  ICDE 2006»
15 years 10 months ago
Query Co-Processing on Commodity Hardware
The rapid increase in the data volumes for the past few decades has intensified the need for high processing power for database and data mining applications. Researchers have acti...
Anastassia Ailamaki, Naga K. Govindaraju, Dinesh M...
GFKL
2007
Springer
152views Data Mining» more  GFKL 2007»
15 years 3 months ago
Supporting Web-based Address Extraction with Unsupervised Tagging
Abstract. The manual acquisition and modeling of tourist information as e.g. addresses of points of interest is time and, therefore, cost intensive. Furthermore, the encoded inform...
Berenike Loos, Chris Biemann