Sciweavers

2913 search results - page 445 / 583
» How Much to Copy
Sort
View
CORR
2006
Springer
127views Education» more  CORR 2006»
13 years 9 months ago
On the Peak-to-Mean Envelope Power Ratio of Phase-Shifted Binary Codes
The peak-to-mean envelope power ratio (PMEPR) of a code employed in orthogonal frequencydivision multiplexing (OFDM) systems can be reduced by permuting its coordinates and by rot...
Kai-Uwe Schmidt
CORR
2006
Springer
94views Education» more  CORR 2006»
13 years 9 months ago
Fitness Uniform Optimization
Abstract-- In evolutionary algorithms, the fitness of a population increases with time by mutating and recombining individuals and by a biased selection of more fit individuals. Th...
Marcus Hutter, Shane Legg
IJACT
2008
83views more  IJACT 2008»
13 years 9 months ago
On the relation among various security models for certificateless cryptography
: Certificateless cryptography is a promising technology for solving the key escrow problem in identity-based cryptography. However, the lack of a unified set of definitions and se...
Qiong Huang, Duncan S. Wong
CE
2007
100views more  CE 2007»
13 years 9 months ago
Visualization of participation: Does it contribute to successful computer-supported collaborative learning?
This study investigated the effects of visualization of participation during computer-supported collaborative learning (CSCL). It is hypothesized that visualization of participat...
Jeroen Janssen, Gijsbert Erkens, Gellof Kanselaar,...
ISCI
2008
84views more  ISCI 2008»
13 years 9 months ago
Measures for evaluating the decision performance of a decision table in rough set theory
As two classical measures, approximation accuracy and consistency degree can be employed to evaluate the decision performance of a decision table. However, these two measures cann...
Yuhua Qian, Jiye Liang, Deyu Li, Haiyun Zhang, Chu...