Sciweavers

314 search results - page 47 / 63
» A Comparison of Known Codes, Random Codes, and the Best Code...
Sort
View
AUSDM
2006
Springer
100views Data Mining» more  AUSDM 2006»
13 years 11 months ago
Data Mining Methodological Weaknesses and Suggested Fixes
Predictive accuracy claims should give explicit descriptions of the steps followed, with access to the code used. This allows referees and readers to check for common traps, and t...
John H. Maindonald
VTC
2008
IEEE
236views Communications» more  VTC 2008»
14 years 1 months ago
Apriori-LLR-Threshold-Assisted K-Best Sphere Detection for MIMO Channels
—When the maximum number of best candidates retained at each tree search level of the K-Best Sphere Detection (SD) is kept low for the sake of maintaining a low memory requiremen...
Li Wang, Lei Xu, Sheng Chen, Lajos Hanzo
IRI
2006
IEEE
14 years 1 months ago
A similarity based technique for detecting malicious executable files for computer forensics
With the rapidly increasing complexity of computer systems and the sophistication of hacking tools and techniques, there is a crucial need for computer forensic analysis technique...
Jun-Hyung Park, Minsoo Kim, BongNam Noh, James B. ...
FPL
1997
Springer
125views Hardware» more  FPL 1997»
13 years 11 months ago
VPR: A new packing, placement and routing tool for FPGA research
We describe the capabilities of and algorithms used in a new FPGA CAD tool, Versatile Place and Route (VPR). In terms of minimizing routing area, VPR outperforms all published FPG...
Vaughn Betz, Jonathan Rose
ICIP
2004
IEEE
14 years 9 months ago
JPEG2000 vs. JPEG from an image retrieval point of view
It is well known that JPEG2000 has a variety of advantages over its predecessor JPEG. JPEG2000 not only allows images to be coded with clearly better visual image quality, it also...
Gerald Schaefer