Sciweavers

2620 search results - page 151 / 524
» An Evaluation Technique for Binarization Algorithms
Sort
View
AINA
2011
IEEE
12 years 11 months ago
Power Adaptive Cognitive Pilot Channel for Spectrum Co-existence in Wireless Networks
— Next generation wireless networks will be heterogeneous, where several primary users (PU e.g. licensed users) and secondary users (SU e.g. unlicensed users) can operate in the ...
Md. Akbar Hossain, Roberto Passerone
GLOBECOM
2006
IEEE
14 years 2 months ago
Reduced Complexity Vector Precoding for the Multiuser Downlink
— We investigate nonlinear precoding techniques for the downlink of multi-user systems from a transmitter equipped with multiple antennas to non-cooperative single antenna mobile...
René Habendorf, Ines Riedel, Gerhard Fettwe...
ISCAS
2003
IEEE
97views Hardware» more  ISCAS 2003»
14 years 1 months ago
Optimal design of FIR frequency-response-masking filters using second-order cone programming
Since Limís 1986 paper on the frequency-response masking (FRM) technique for the design of FIR digital Ýlters with very small transition widths, the analysis and design of FRM ...
Wu-Sheng Lu, Takao Hinamoto
COLING
2008
13 years 9 months ago
Instance-Based Ontology Population Exploiting Named-Entity Substitution
We present an approach to ontology population based on a lexical substitution technique. It consists in estimating the plausibility of sentences where the named entity to be class...
Claudio Giuliano, Alfio Massimiliano Gliozzo
ICMCS
2010
IEEE
160views Multimedia» more  ICMCS 2010»
13 years 9 months ago
A framework for the validation of privacy protection solutions in video surveillance
The issue of privacy protection in video surveillance has drawn a lot of interest lately. However, thorough performance analysis and validation is still lacking, especially regard...
Frédéric Dufaux, Touradj Ebrahimi