Sciweavers

5962 search results - page 893 / 1193
» Working with Patterns and Code
Sort
View
CISS
2011
IEEE
14 years 8 months ago
Noncoherent compressive sensing with application to distributed radar
—We consider a multi-static radar scenario with spatially dislocated receivers that can individually extract delay information only. Furthermore, we assume that the receivers are...
Christian R. Berger, Josee M. F. Moura
ICASSP
2011
IEEE
14 years 8 months ago
Speaker diarization of meetings based on speaker role n-gram models
Speaker diarization of meeting recordings is generally based on acoustic information ignoring that meetings are instances of conversations. Several recent works have shown that th...
Fabio Valente, Deepu Vijayasenan, Petr Motlí...
DASFAA
2011
IEEE
251views Database» more  DASFAA 2011»
14 years 8 months ago
Towards Web Search by Sentence Queries: Asking the Web for Query Substitutions
In this paper, we propose a method to search the Web for sentence substitutions for a given sentence query. Our method uses only lexico-syntactic patterns dynamically generated fro...
Yusuke Yamamoto, Katsumi Tanaka
152
Voted
GECCO
2011
Springer
256views Optimization» more  GECCO 2011»
14 years 8 months ago
Evolving complete robots with CPPN-NEAT: the utility of recurrent connections
This paper extends prior work using Compositional Pattern Producing Networks (CPPNs) as a generative encoding for the purpose of simultaneously evolving robot morphology and contr...
Joshua E. Auerbach, Josh C. Bongard
INFOCOM
2011
IEEE
14 years 8 months ago
Identity-based attack detection in mobile wireless networks
—Identity-based attacks (IBAs) are one of the most serious threats to wireless networks. Recently, received signal strength (RSS) based detection mechanisms were proposed to dete...
Kai Zeng, Kannan Govindan, Daniel Wu, Prasant Moha...