Sciweavers

28962 search results - page 5772 / 5793
» Computational Mechanism Design
Sort
View
JCST
2010
119views more  JCST 2010»
13 years 5 months ago
Location, Localization, and Localizability
Abstract Location-aware technology spawns numerous unforeseen pervasive applications in a wide range of living, production, commence, and public services. This article provides an ...
Yunhao Liu, Zheng Yang, Xiaoping Wang, Lirong Jian
TSP
2008
132views more  TSP 2008»
13 years 5 months ago
On Doubly Selective Channel Estimation Using Superimposed Training and Discrete Prolate Spheroidal Sequences
Abstract--Channel estimation and data detection for frequencyselective time-varying channels are considered using superimposed training. We employ a discrete prolate spheroidal bas...
Shuangchi He, Jitendra K. Tugnait
KDD
2010
ACM
272views Data Mining» more  KDD 2010»
13 years 5 months ago
Scalable similarity search with optimized kernel hashing
Scalable similarity search is the core of many large scale learning or data mining applications. Recently, many research results demonstrate that one promising approach is creatin...
Junfeng He, Wei Liu, Shih-Fu Chang
MA
2010
Springer
135views Communications» more  MA 2010»
13 years 5 months ago
Nonparametric comparison of regression functions
In this work we provide a new methodology for comparing regression functions m1 and m2 from two samples. Since apart from smoothness no other (parametric) assumptions are required...
Ramidha Srihera, Winfried Stute
MEDIAFORENSICS
2010
13 years 5 months ago
Biometric template transformation: a security analysis
One of the critical steps in designing a secure biometric system is protecting the templates of the users that are stored either in a central database or on smart cards. If a biom...
Abhishek Nagar, Karthik Nandakumar, Anil K. Jain
« Prev « First page 5772 / 5793 Last » Next »