—In this paper we present an analytical approach to evaluate the M-QAM bit error rate and carrier frequency dependent throughput of OFDM systems subject to various receiver impai...
Machine Learned Ranking approaches have shown successes in web search engines. With the increasing demands on developing effective ranking functions for different search domains, ...
Keke Chen, Rongqing Lu, C. K. Wong, Gordon Sun, La...
Rapid growth in the amount of data available on social networking sites has made information retrieval increasingly challenging for users. In this paper, we propose a collaborativ...
In robot building, attention tends to focus on internal signal processing and the way desired motor signals are generated. But equally important is the selection and configuration...
We identify proximity breach as a privacy threat specific to numerical sensitive attributes in anonymized data publication. Such breach occurs when an adversary concludes with hig...