Sciweavers

7988 search results - page 1578 / 1598
» A Useful Undecidable Theory
Sort
View
TCOM
2008
136views more  TCOM 2008»
13 years 8 months ago
Cross-layer adaptive transmission with incomplete system state information
We consider a point-to-point communication system in which data packets randomly arrive to a finite-length buffer and are subsequently transmitted to a receiver over a timevarying ...
Anh Tuan Hoang, Mehul Motani
IPL
2007
99views more  IPL 2007»
13 years 8 months ago
Substitutions into propositional tautologies
We prove that there is a polynomial time substitution (y1, . . . , yn) := g(x1, . . . , xk) with k << n such that whenever the substitution instance A(g(x1, . . . , xk)) of ...
Jan Krajícek
TEC
2008
127views more  TEC 2008»
13 years 8 months ago
Fingerprinting: Visualization and Automatic Analysis of Prisoner's Dilemma Strategies
Fingerprinting is a technique for generating a representation-independent functional signature for a game playing agent. Fingerprints can be used to compare agents across represent...
Daniel A. Ashlock, Eun-Youn Kim
IVC
2007
99views more  IVC 2007»
13 years 8 months ago
On the Bayes fusion of visual features
We consider the problem of image classification when more than one visual feature is available. In such cases, Bayes fusion offers an attractive solution by combining the result...
Xiaojin Shi, Roberto Manduchi
TIT
2008
83views more  TIT 2008»
13 years 8 months ago
Constrained Codes as Networks of Relations
We address the well-known problem of determining the capacity of constrained coding systems. While the onedimensional case is well understood to the extent that there are technique...
Moshe Schwartz, Jehoshua Bruck
« Prev « First page 1578 / 1598 Last » Next »