Sciweavers

1594 search results - page 163 / 319
» Sampling and Reconstruction of Operators
Sort
View
148
Voted
TSP
2008
178views more  TSP 2008»
15 years 2 months ago
Digital Computation of Linear Canonical Transforms
Abstract--We deal with the problem of efficient and accurate digital computation of the samples of the linear canonical transform (LCT) of a function, from the samples of the origi...
A. Koc, Haldun M. Özaktas, Cagatay Candan, M....
134
Voted
IGARSS
2009
15 years 9 days ago
General Framework on Change Detection in a Sparse Domain
The paper presents a general framework for change detection in radar images, for an operational purpose and in the context of environmental monitoring. This framework is based on ...
Abdourrahmane M. Atto, Grégoire Mercier, Do...
189
Voted
IGARSS
2010
14 years 9 months ago
The microasar experiment on CASIE-09
During the summer of 2009, the Characterization of Arctic Sea Ice Experiment 2009 (CASIE-09) operated a small, unmanned aircraft system (UAS) over the Arctic Ocean for a number of ...
David G. Long, Evan C. Zaugg, Matthew C. Edwards, ...
111
Voted
INFOCOM
2011
IEEE
14 years 6 months ago
Utility optimization for dynamic peer-to-peer networks with tit-for-tat constraints
— We consider a peer-to-peer network where nodes can send and receive files amongst their peers. File requests are generated randomly, and each new file can correspond to a dif...
Michael J. Neely, Leana Golubchik
USENIX
2007
15 years 4 months ago
From Trusted to Secure: Building and Executing Applications That Enforce System Security
Commercial operating systems have recently introduced mandatory access controls (MAC) that can be used to ensure system-wide data confidentiality and integrity. These protections...
Boniface Hicks, Sandra Rueda, Trent Jaeger, Patric...