Sciweavers

854 search results - page 170 / 171
» Stability of boundary measures
Sort
View
TIFS
2010
184views more  TIFS 2010»
13 years 6 months ago
Information-theoretically secret key generation for fading wireless channels
—The multipath-rich wireless environment associated with typical wireless usage scenarios is characterized by a fading channel response that is time-varying, location-sensitive, ...
Chunxuan Ye, Suhas Mathur, Alex Reznik, Yogendra S...
ISPASS
2010
IEEE
13 years 6 months ago
Weak execution ordering - exploiting iterative methods on many-core GPUs
Abstract--On NVIDIA's many-core GPUs, there is no synchronization function among parallel thread blocks. When finegranularity of data communication and synchronization is requ...
Jianmin Chen, Zhuo Huang, Feiqi Su, Jih-Kwon Peir,...
EUSFLAT
2009
163views Fuzzy Logic» more  EUSFLAT 2009»
13 years 6 months ago
A Fuzzy Set Approach to Ecological Knowledge Discovery
Besides the problem of searching for effective methods for extracting knowledge from large databases (KDD) there are some additional problems with handling ecological data, namely ...
Arkadiusz Salski
COLING
2010
13 years 3 months ago
Multiword Expressions in the wild? The mwetoolkit comes in handy
The mwetoolkit is a tool for automatic extraction of Multiword Expressions (MWEs) from monolingual corpora. It both generates and validates MWE candidates. The generation is based...
Carlos Ramisch, Aline Villavicencio, Christian Boi...
TKDE
2011
332views more  TKDE 2011»
13 years 3 months ago
Adaptive Cluster Distance Bounding for High-Dimensional Indexing
—We consider approaches for similarity search in correlated, high-dimensional data-sets, which are derived within a clustering framework. We note that indexing by “vector appro...
Sharadh Ramaswamy, Kenneth Rose