Sciweavers

294 search results - page 36 / 59
» Optimal Detection Ordering for V-BLAST
Sort
View
CW
2002
IEEE
14 years 15 days ago
Direct Segmentation for Reverse Engineering
In Reverse Engineering a physical object is digitally reconstructed from a set of boundary points. In the segmentation phase these points are grouped into subsets to facilitate co...
Marek Vanco, Guido Brunnett
CVPR
1998
IEEE
14 years 9 months ago
Salient and Multiple Illusory Surfaces
All illusory surface jigures yield a perception of a surface occluding another one or the background. Occluded surfaces yield completion, a phenomena known as amodal completions. ...
Davi Geiger, Hsing-Kuo Pao, Nava Rubin
PPOPP
2003
ACM
14 years 24 days ago
Compactly representing parallel program executions
Collecting a program’s execution profile is important for many reasons: code optimization, memory layout, program debugging and program comprehension. Path based execution pro...
Ankit Goel, Abhik Roychoudhury, Tulika Mitra
RTCSA
1999
IEEE
13 years 11 months ago
Incorporating Error Recovery into the Imprecise Computation Model
In this paper; we describe optimal algorithmsfor incorporating error recovery in the imprecise computation model. In that model eack task compriser a mandatory and an optional par...
Hakan Aydin, Rami G. Melhem, Daniel Mossé
TWC
2008
132views more  TWC 2008»
13 years 7 months ago
Asymptotic BER analysis of threshold digital relaying schemes in cooperative wireless systems
Threshold relaying is an effective technique to achieve cooperative diversity in uncoded cooperative wireless networks, which suffer from error propagation due to detection errors...
Furuzan Atay Onat, Yijia Fan, Halim Yanikomeroglu,...