Sciweavers

773 search results - page 130 / 155
» On Cryptographic Assumptions and Challenges
Sort
View
CLEF
2009
Springer
13 years 7 months ago
Unsupervised Morphological Analysis by Formal Analogy
Abstract. While classical approaches to unsupervised morphology acquisition often rely on metrics based on information theory for identifying morphemes, we describe a novel approac...
Jean-François Lavallée, Philippe Lan...
GLOBECOM
2009
IEEE
13 years 7 months ago
A Low-Complexity Algorithm for Uplink Scheduling in Cooperative Cellular Networks with a Capacity-Constrained Backhaul Infrastru
Today, it is well understood that interference poses the main capacity limitation and thus challenge for future cellular networks. A promising concept that addresses interference i...
Fabian Diehm, Patrick Marsch, Gerhard Fettweis, Bh...
ICCAD
2009
IEEE
106views Hardware» more  ICCAD 2009»
13 years 7 months ago
Quantifying robustness metrics in parameterized static timing analysis
Process and environmental variations continue to present significant challenges to designers of high-performance integrated circuits. In the past few years, while much research has...
Khaled R. Heloue, Chandramouli V. Kashyap, Farid N...
ICMLA
2009
13 years 7 months ago
Exploring Scale-Induced Feature Hierarchies in Natural Images
Recently there has been considerable interest in topic models based on the bag-of-features representation of images. The strong independence assumption inherent in the bag-of-feat...
Jukka Perkiö, Tinne Tuytelaars, Wray L. Bunti...
COGSCI
2011
50views more  COGSCI 2011»
13 years 4 months ago
A Phase Transition Model for the Speed-Accuracy Trade-Off in Response Time Experiments
Most models of response time (RT) in elementary cognitive tasks implicitly assume that the speed-accuracy trade-off is continuous: When payoffs or instructions gradually increase ...
Gilles Dutilh, Eric-Jan Wagenmakers, Ingmar Visser...