Sciweavers

2038 search results - page 45 / 408
» Loops under Strategies
Sort
View
INFOCOM
2010
IEEE
13 years 6 months ago
Throughput Analysis of Multiple Access Relay Channel under Collision Model
—Despite much research on the throughput of relaying networks under idealized interference models, many practical wireless networks rely on physical-layer protocols that preclude...
Seyed A. Hejazi, Ben Liang
ICASSP
2008
IEEE
14 years 2 months ago
Universal switching portfolios under transaction costs
In this paper, we consider online (sequential) portfolio selection in a competitive algorithm framework under transaction costs. We construct a sequential algorithm for portfolio ...
Suleyman Serdar Kozat, Andrew C. Singer
FGR
2006
IEEE
125views Biometrics» more  FGR 2006»
14 years 1 months ago
Reliable and Fast Tracking of Faces under Varying Pose
This paper presents a system that is able to track multiple faces under varying pose (tilted and rotated) reliably in real-time. The system consists of two interactive modules. Th...
Tao Yang, Stan Z. Li, Quan Pan, Jing Li, Chunhui Z...
GLOBECOM
2007
IEEE
13 years 11 months ago
CAC for Multibeam Opportunistic Schemes in Heterogeneous WiMax Systems Under QoS Constraints
Spatial scheduling in a heterogeneous WiMax Downlink channel, based on partial Channel State Information at the Transmitter (CSIT), is carried out through a multibeam opportunistic...
Nizar Zorba, Ana I. Pérez-Neira
ICASSP
2011
IEEE
12 years 11 months ago
Hilbert envelope based features for robust speaker identification under reverberant mismatched conditions
It is well known that MFCC based speaker identification (SID) systems easily break down under mismatched training and test conditions. One such mismatch occurs when a SID system ...
Seyed Omid Sadjadi, John H. L. Hansen