Sciweavers

5638 search results - page 1069 / 1128
» On presence
Sort
View
JAIR
2008
157views more  JAIR 2008»
13 years 10 months ago
Qualitative System Identification from Imperfect Data
Experience in the physical sciences suggests that the only realistic means of understanding complex systems is through the use of mathematical models. Typically, this has come to ...
George Macleod Coghill, Ashwin Srinivasan, Ross D....
CORR
2007
Springer
117views Education» more  CORR 2007»
13 years 10 months ago
Perfectly Secure Steganography: Capacity, Error Exponents, and Code Constructions
An analysis of steganographic systems subject to the following perfect undetectability condition is presented in this paper. Following embedding of the message into the covertext,...
Ying Wang, Pierre Moulin
JCSS
2008
90views more  JCSS 2008»
13 years 10 months ago
Fault tolerance in cellular automata at high fault rates
A commonly used model for fault-tolerant computation is that of cellular automata. The essential difficulty of fault-tolerant computation is present in the special case of simply ...
Mark McCann, Nicholas Pippenger
CORR
2007
Springer
189views Education» more  CORR 2007»
13 years 10 months ago
Diversity-Multiplexing Tradeoff of Asynchronous Cooperative Diversity in Wireless Networks
Synchronization of relay nodes is an important and critical issue in exploiting cooperative diversity in wireless networks. In this paper, two asynchronous cooperative diversity s...
Shuangqing Wei
CORR
2007
Springer
100views Education» more  CORR 2007»
13 years 10 months ago
Identifying statistical dependence in genomic sequences via mutual information estimates
Questions of understanding and quantifying the representation and amount of information in organisms have become a central part of biological research, as they potentially hold th...
H. M. Aktulga, I. Kontoyiannis, L. A. Lyznik, Luka...
« Prev « First page 1069 / 1128 Last » Next »