Sciweavers

2340 search results - page 425 / 468
» Data abstraction and information hiding
Sort
View
CORR
2007
Springer
156views Education» more  CORR 2007»
13 years 7 months ago
Capacity Gain from Two-Transmitter and Two-Receiver Cooperation
Abstract—Capacity improvement from transmitter and receiver cooperation is investigated in a two-transmitter, two-receiver network with phase fading and full channel state inform...
Chris T. K. Ng, Nihar Jindal, Andrea J. Goldsmith,...
INFORMATICALT
2006
116views more  INFORMATICALT 2006»
13 years 7 months ago
An Agent-Based Best Effort Routing Technique for Load Balancing
Abstract. Several best effort schemes (next-hop routing) are used to transport the data in the Internet. Some of them do not perform flexible route computations to cope up with the...
Sunilkumar S. Manvi, Pallapa Venkataram
TASLP
2008
158views more  TASLP 2008»
13 years 7 months ago
Score-Independent Audio Features for Description of Music Expression
Abstract--During a music performance, the musician adds expressiveness to the musical message by changing timing, dynamics, and timbre of the musical events to communicate an expre...
Luca Mion, Giovanni De Poli
TSMC
2008
172views more  TSMC 2008»
13 years 7 months ago
AdaBoost-Based Algorithm for Network Intrusion Detection
Abstract--Network intrusion detection aims at distinguishing the attacks on the Internet from normal use of the Internet. It is an indispensable part of the information security sy...
Weiming Hu, Wei Hu, Stephen J. Maybank
TSP
2008
86views more  TSP 2008»
13 years 7 months ago
Fixed-Complexity Soft MIMO Detection via Partial Marginalization
Abstract--This paper presents a new approach to soft demodulation for MIMO channels. The proposed method is an approximation to the exact a posteriori probability-per-bit computer....
Erik G. Larsson, Joakim Jalden