Sciweavers

505 search results - page 31 / 101
» On the Minimality and Decomposability of Constraint Networks
Sort
View
NPL
1998
87views more  NPL 1998»
13 years 8 months ago
Constrained Learning in Neural Networks: Application to Stable Factorization of 2-D Polynomials
Adaptive artificial neural network techniques are introduced and applied to the factorization of 2-D second order polynomials. The proposed neural network is trained using a const...
Stavros J. Perantonis, Nikolaos Ampazis, Stavros V...
ICASSP
2009
IEEE
14 years 3 months ago
Filter-and-forward distributed beamforming for relay networks in frequency selective fading channels
A half-duplex distributed beamforming technique for relay networks with frequency selective fading channels is developed. The network relays use the filter-and-forward (FF) strat...
Haihua Chen, Alex B. Gershman, Shahram Shahbazpana...
VTC
2006
IEEE
116views Communications» more  VTC 2006»
14 years 2 months ago
Distributed Estimation in a Power Constrained Sensor Network
— This paper derives the optimum non-uniform quantization scheme for a distributed estimation problem based on noisy observations in a wireless sensor network. The optimal quanti...
Visvakumar Aravinthan, Sudharman K. Jayaweera, Kos...
GLOBECOM
2008
IEEE
14 years 2 months ago
Near-Optimum Power Allocation for Outage Restricted Distributed MIMO Multi-Hop Networks
Abstract—The throughput of multi-hop communication systems can significantly be increased by the application of MIMO concepts. To utilize the physical resources in an efficient...
Dirk Wübben, Yidong Lang
CCS
2010
ACM
13 years 8 months ago
Input generation via decomposition and re-stitching: finding bugs in Malware
Attackers often take advantage of vulnerabilities in benign software, and the authors of benign software must search their code for bugs in hopes of finding vulnerabilities before...
Juan Caballero, Pongsin Poosankam, Stephen McCaman...