Sciweavers

17789 search results - page 3371 / 3558
» Exceptional Use Cases
Sort
View
ICC
2009
IEEE
176views Communications» more  ICC 2009»
15 years 11 months ago
Error Resilient Non-Asymmetric Slepian-Wolf Coding
Abstract—We consider non-asymmetric distributed source coding (DSC) that achieves any point in the Slepian-Wolf (SW) region. We study the error propagation phenomena and propose ...
Cédric Herzet, Velotiaray Toto-Zarasoa, Ali...
RTSS
2009
IEEE
15 years 11 months ago
Cross-Layer Analysis of the End-to-End Delay Distribution in Wireless Sensor Networks
—Emerging applications of wireless sensor networks (WSNs) require real-time quality of service (QoS) guarantees to be provided by the network. However, designing real-time schedu...
Yunbo Wang, Mehmet C. Vuran, Steve Goddard
ICDM
2009
IEEE
233views Data Mining» more  ICDM 2009»
15 years 11 months ago
Semi-Supervised Sequence Labeling with Self-Learned Features
—Typical information extraction (IE) systems can be seen as tasks assigning labels to words in a natural language sequence. The performance is restricted by the availability of l...
Yanjun Qi, Pavel Kuksa, Ronan Collobert, Kunihiko ...
ICRA
2009
IEEE
151views Robotics» more  ICRA 2009»
15 years 11 months ago
Probabilistic estimation of Multi-Level terrain maps
— Recent research has shown that robots can model their world with Multi-Level (ML) surface maps, which utilize ‘patches’ in a 2D grid space to represent various environment ...
Cesar Rivadeneyra, Isaac Miller, Jonathan R. Schoe...
ICTAI
2009
IEEE
15 years 11 months ago
Managing Authorization Provenance: A Modal Logic Based Approach
Abstract—In distributed environments, access control decisions depend on statements of multiple agents rather than only one central trusted party. However, existing policy langua...
Jinwei Hu, Yan Zhang, Ruixuan Li, Zhengding Lu
« Prev « First page 3371 / 3558 Last » Next »