Sciweavers

886 search results - page 30 / 178
» Generalized Bezout Identity
Sort
View
COLING
2010
13 years 4 months ago
Detection of Simple Plagiarism in Computer Science Papers
Plagiarism is the use of the language and thoughts of another work and the representation of them as one's own original work. Various levels of plagiarism exist in many domai...
Yaakov HaCohen-Kerner, Aharon Tayeb, Natan Ben-Dro...
WWW
2011
ACM
13 years 4 months ago
Towards automatic quality assurance in Wikipedia
Featured articles in Wikipedia stand for high information quality, and it has been found interesting to researchers to analyze whether and how they can be distinguished from “or...
Maik Anderka, Benno Stein, Nedim Lipka
TCOM
2010
87views more  TCOM 2010»
13 years 4 months ago
Performance of an AFC Loop in the Presence of a Single Interferer in a Fading Channel
The performance of an automatic frequency control (AFC) loop is investigated using two measures, the mean time to loss of lock and the average switching rate. The AFC is considere...
Amin Emad, Norman C. Beaulieu
TSP
2010
13 years 4 months ago
On entropy rate for the complex domain and its application to i.i.d. sampling
We derive the entropy rate formula for a complex Gaussian random process by using a widely linear model. The resulting expression is general and applicable to both circular and non...
Wei Xiong, Hualiang Li, Tülay Adali, Yi-Ou Li...
TIT
2010
150views Education» more  TIT 2010»
13 years 4 months ago
Information-theoretic key agreement of multiple terminals: part I
This is the first part of a two-part paper on information-theoretically secure secret key agreement. In this part, we study the secrecy problem under the widely studied source mod...
Amin Aminzadeh Gohari, Venkat Anantharam