Sciweavers

555 search results - page 41 / 111
» Between Symbol and Language-in-use
Sort
View
GLOBECOM
2006
IEEE
14 years 1 months ago
Frequency Offset Estimation for IFDMA Uplink Systems
— This paper proposes two frequency offset estimation algorithms for the uplink of an Interleaved Frequency-Division Multiple-Access (IFDMA) system. One algorithm performs estima...
Alexander Arkhipov, Michael Schnell
CHES
2005
Springer
108views Cryptology» more  CHES 2005»
14 years 1 months ago
Further Hidden Markov Model Cryptanalysis
We extend the model of Karlof and Wagner for modelling side channel attacks via Input Driven Hidden Markov Models (IDHMM) to the case where not every state corresponds to a single ...
P. J. Green, Richard Noad, Nigel P. Smart
NIPS
2004
13 years 9 months ago
Discrete profile alignment via constrained information bottleneck
Amino acid profiles, which capture position-specific mutation probabilities, are a richer encoding of biological sequences than the individual sequences themselves. However, profi...
Sean O'Rourke, Gal Chechik, Robin Friedman, Eleaza...
NC
1998
140views Neural Networks» more  NC 1998»
13 years 9 months ago
Recurrent Neural Networks with Iterated Function Systems Dynamics
We suggest a recurrent neural network (RNN) model with a recurrent part corresponding to iterative function systems (IFS) introduced by Barnsley 1] as a fractal image compression ...
Peter Tiño, Georg Dorffner
DALT
2010
Springer
13 years 2 months ago
Understanding Permissions through Graphical Norms
Abstract. Norm-aware agents are able to reason about the obligations, permissions and prohibitions that affect their operation. While much work has focused on the creation of such ...
Nir Oren, Madalina Croitoru, Simon Miles, Michael ...