Sciweavers

2038 search results - page 163 / 408
» Loops under Strategies
Sort
View
ICASSP
2010
IEEE
15 years 4 months ago
Audio fingerprinting to identify multiple videos of an event
The proliferation of consumer recording devices and video sharing websites makes the possibility of having access to multiple recordings of the same occurrence increasingly likely...
Courtenay V. Cotton, Daniel P. W. Ellis
COMCOM
2008
100views more  COMCOM 2008»
15 years 4 months ago
Individual profile graphs for location management in PCS networks
A user's profile, for the purpose of location management in a personal communication service (PCS) network, is formalized as a subgraph of the network graph. This subgraph, t...
Chansophea Chuon, Sumanta Guha
CORR
2006
Springer
108views Education» more  CORR 2006»
15 years 4 months ago
Mutual Information Games in Multi-user Channels with Correlated Jamming
We investigate the behavior of two users and one jammer in an additive white Gaussian noise (AWGN) channel with and without fading when they participate in a noncooperative zero-su...
Shabnam Shafiee, Sennur Ulukus
CORR
2007
Springer
116views Education» more  CORR 2007»
15 years 4 months ago
Cooperative game theory and the Gaussian interference channel
—In this paper we discuss the use of cooperative game theory for analyzing interference channels. We extend our previous work, to games with N players as well as frequency select...
Amir Leshem, Ephraim Zehavi
JUCS
2008
90views more  JUCS 2008»
15 years 4 months ago
A Survey of Practical Software Adaptation Techniques
: Software adaptation techniques appear in many disparate areas of research literature, and under many guises. This paper enables a clear and uniform understanding of the related r...
Stephen Kell