Sciweavers

27 search results - page 5 / 6
» Improved Rates for the Stochastic Continuum-Armed Bandit Pro...
Sort
View
CISS
2010
IEEE
12 years 10 months ago
Queue based compression in a two-way relay network
—We consider the problem of joint rate scheduling and lossy data compression in a two-way relay network with distortion-sensitive stochastic packet traffic. A relay node facilit...
Ertugrul Necdet Ciftcioglu, Yalin Evren Sagduyu, A...
ICTAI
2006
IEEE
14 years 1 months ago
Outlier Detection Using Random Walks
The discovery of objects with exceptional behavior is an important challenge from a knowledge discovery standpoint and has attracted much attention recently. In this paper, we pre...
H. D. K. Moonesinghe, Pang-Ning Tan
AUTOMATICA
2006
81views more  AUTOMATICA 2006»
13 years 7 months ago
An energy-gain bounding approach to robust fuzzy identification
A novel method for the robust identification of interpretable fuzzy models, based on the criterion that identification errors are least sensitive to data uncertainties and modelli...
Mohit Kumar, Norbert Stoll, Regina Stoll
ICDAR
2003
IEEE
14 years 11 days ago
On-line Overlaid-Handwriting Recognition Based on Substroke HMMs
This paper proposes a novel handwriting recognition interface for wearable computing where users write characters continuously without pauses on a small single writing box. Since ...
Hiroshi Shimodaira, Takashi Sudo, Mitsuru Nakai, S...
RTCSA
2009
IEEE
14 years 1 months ago
Managing Imprecise Worst Case Execution Times on DVFS Platforms
Abstract—Although energy-efficient real-time task scheduling has attracted a lot of attention in the past decade, most existing results assumed deterministic execution lengths f...
Vandy Berten, Chi-Ju Chang, Tei-Wei Kuo