Sciweavers

436 search results - page 15 / 88
» On two variations of identifying codes
Sort
View
111
Voted
TREC
2000
15 years 5 months ago
Query Expansion Seen Through Return Order of Relevant Documents
There is a reservoir of knowledge in data from the TREC evaluations that analysis of precision and recall leaves untapped. This knowledge leads to better understanding of query ex...
Walter Liggett, Chris Buckley
111
Voted
SIAMCOMP
2008
123views more  SIAMCOMP 2008»
15 years 3 months ago
Approximation Algorithms for Biclustering Problems
One of the main goals in the analysis of microarray data is to identify groups of genes and groups of experimental conditions (including environments, individuals, and tissues) tha...
Lusheng Wang, Yu Lin, Xiaowen Liu
129
Voted
IOLTS
2003
IEEE
133views Hardware» more  IOLTS 2003»
15 years 9 months ago
Power Consumption of Fault Tolerant Codes: the Active Elements
On-chip global interconnections in very deep submicron technology (VDSM) ICs are becoming more sensitive and prone to errors caused by power supply noise, crosstalk noise, delay v...
Daniele Rossi, Steven V. E. S. van Dijk, Richard P...
124
Voted
WCNC
2008
IEEE
15 years 10 months ago
Cooperative Communications Using Scalable, Medium Block-length LDPC Codes
Abstract— Cooperative communications has received increasing attention in recent years because of the ubiquity of wireless devices. Each year more mobile computing devices enter ...
Marjan Karkooti, Joseph R. Cavallaro
VTC
2007
IEEE
124views Communications» more  VTC 2007»
15 years 10 months ago
Near-Instantaneously Adaptive Cooperative Uplink Schemes Based on Space-Time Block Codes and V-Blast
- In this paper we propose two adaptive schemes for improving the achievable Bandwidth Efficiency (BE) of cooperative diversity aided wireless networks. These schemes are capable ...
Mohammed El-Hajjar, Salam A. Zummo, Lajos Hanzo