Sciweavers

461 search results - page 55 / 93
» Letters
Sort
View
TWC
2008
145views more  TWC 2008»
13 years 9 months ago
Generalized Window-Based PN Acquisition Scheme in CDMA Spread Spectrum Systems
In this letter, we propose a generalized version of the window-based pseudonoise (PN) acquisition scheme verifying one or more best hypotheses rather than the best one per search w...
Kwang Man Ok, Chung Gu Kang
ACL
2010
13 years 9 months ago
A Statistical Model for Lost Language Decipherment
In this paper we propose a method for the automatic decipherment of lost languages. Given a non-parallel corpus in a known related language, our model produces both alphabetic map...
Benjamin Snyder, Regina Barzilay, Kevin Knight
LPAR
2010
Springer
13 years 9 months ago
Coping with Selfish On-Going Behaviors
A rational and selfish environment may have an incentive to cheat the system it interacts with. Cheating the system amounts to reporting a stream of inputs that is different from ...
Orna Kupferman, Tami Tamir
CORR
2010
Springer
156views Education» more  CORR 2010»
13 years 7 months ago
FauxCrypt - A Method of Text Obfuscation
Warnings have been raised about the steady diminution of privacy. More and more personal information, such as that contained electronic mail, is moving to cloud computing servers ...
Devlin M. Gualtieri
NN
2011
Springer
348views Neural Networks» more  NN 2011»
13 years 5 months ago
Tree-like hierarchical associative memory structures
In this letter we explore an alternative structural representation for Steinbuch-type binary associative memories. These networks offer very generous storage capacities (both asy...
João Sacramento, Andreas Wichert