Sciweavers

13593 search results - page 2521 / 2719
» Performance Analysis of MD5
Sort
View
WWW
2011
ACM
14 years 11 months ago
Consideration set generation in commerce search
In commerce search, the set of products returned by a search engine often forms the basis for all user interactions leading up to a potential transaction on the web. Such a set of...
Sayan Bhattacharya, Sreenivas Gollapudi, Kamesh Mu...
EJASP
2010
166views more  EJASP 2010»
14 years 11 months ago
Decoding Schemes for FBMC with Single-Delay STTC
Orthogonally multiplexed Quadrature Amplitude Modulation (O-QAM) with Filter Banks based Multi Carrier modulation (FBMC) is a multi-carrier modulation scheme that can be considere...
Chrislin Lélé, Didier Le Ruyet
EJWCN
2010
118views more  EJWCN 2010»
14 years 11 months ago
Controlled Delegation Protocol in Mobile RFID Networks
To achieve off-line delegation for mobile readers, we propose a delegation protocol for mobile RFID allowing its readers access to specific tags through back-end server. That is t...
Ming-Hour Yang
TSP
2011
152views more  TSP 2011»
14 years 11 months ago
Blind Adaptive Constrained Constant-Modulus Reduced-Rank Interference Suppression Algorithms Based on Interpolation and Switched
—This work proposes a blind adaptive reduced-rank scheme and constrained constant-modulus (CCM) adaptive algorithms for interference suppression in wireless communications system...
Rodrigo C. de Lamare, Raimundo Sampaio Neto, Marti...
TASLP
2010
167views more  TASLP 2010»
14 years 11 months ago
Broadband Source Localization From an Eigenanalysis Perspective
Abstract--Broadband source localization has several applications ranging from automatic video camera steering to target signal tracking and enhancement through beamforming. Consequ...
Mehrez Souden, Jacob Benesty, Sofiène Affes
« Prev « First page 2521 / 2719 Last » Next »