Sciweavers

2038 search results - page 282 / 408
» Loops under Strategies
Sort
View
ICC
2008
IEEE
171views Communications» more  ICC 2008»
15 years 11 months ago
On the Capacity of Training-Based Transmissions with Input Peak Power Constraints
— 1 In this paper, training-based transmissions over a priori unknown Rayleigh block fading channels are considered. The input signals are assumed to be subject to peak power con...
Mustafa Cenk Gursoy
ICIP
2008
IEEE
15 years 11 months ago
Multispectral palm image fusion for accurate contact-free palmprint recognition
In this paper, we propose to improve the verification performance of contract-free palmprint recognition system by means of feature-level image registration and pixel-level fusio...
Ying Hao, Zhenan Sun, Tieniu Tan, Chao Ren
ICRA
2008
IEEE
143views Robotics» more  ICRA 2008»
15 years 11 months ago
Adaptive workspace biasing for sampling-based planners
Abstract— The widespread success of sampling-based planning algorithms stems from their ability to rapidly discover the connectivity of a configuration space. Past research has ...
Matthew Zucker, James Kuffner, James A. Bagnell
IPPS
2008
IEEE
15 years 11 months ago
Programmability of the HPCS Languages: A case study with a quantum chemistry kernel
As high-end computer systems present users with rapidly increasing numbers of processors, possibly also incorporating attached co-processors, programmers are increasingly challeng...
Aniruddha G. Shet, Wael R. Elwasif, Robert J. Harr...
ISCAS
2008
IEEE
230views Hardware» more  ISCAS 2008»
15 years 11 months ago
Joint optimization of data hiding and video compression
— From copyright protection to error concealment, video data hiding has found usage in a great number of applications. Recently proposed applications such as privacy data preserv...
Jithendra K. Paruchuri, Sen-Ching S. Cheung