Sciweavers

2028 search results - page 164 / 406
» Deriving Relation Keys from XML Keys
Sort
View
CORR
2008
Springer
111views Education» more  CORR 2008»
15 years 3 months ago
Concave Programming Upper Bounds on the Capacity of 2-D Constraints
The capacity of 1-D constraints is given by the entropy of a corresponding stationary maxentropic Markov chain. Namely, the entropy is maximized over a set of probability distribut...
Ido Tal, Ron M. Roth
JC
2010
55views more  JC 2010»
15 years 3 months ago
Dimension-wise integration of high-dimensional functions with applications to finance
We present a new general class of methods for the computation of high-dimensional integrals. The quadrature schemes result by truncation and discretization of the anchored-ANOVA d...
Michael Griebel, Markus Holtz
ECTEL
2010
Springer
15 years 2 months ago
How to Share and Reuse Learning Resources: The ARIADNE Experience
ARIADNE is a European foundation that aims to foster "Share and Reuse" of learning resources. To support this goal, ARIADNE has created an infrastructure for managing lea...
Joris Klerkx, Bram Vandeputte, Gonzalo Parra, Jos&...
ICC
2009
IEEE
15 years 2 months ago
Performance Evaluation of QAM-Based BICM: An Analytical Approach
We present an analytical approach to determine the performance of bit-interleaved coded modulation (BICM) transmission over unfaded Gaussian channels. In particular, we derive expr...
Alireza Kenarsari-Anhari, Lutz H.-J. Lampe
ANTSW
2010
Springer
14 years 11 months ago
A Deterministic Metaheuristic Approach Using "Logistic Ants" for Combinatorial Optimization
Abstract. Ant algorithms are usually derived from a stochastic modeling based on some specific probability laws. We consider in this paper a full deterministic model of "logis...
Rodolphe Charrier, Christine Bourjot, Franç...