Sciweavers

5196 search results - page 1022 / 1040
» State of Application Assessment
Sort
View
SIGPRO
2008
155views more  SIGPRO 2008»
13 years 7 months ago
Recognition of off-line printed Arabic text using Hidden Markov Models
This paper describes a technique for automatic recognition of off-line printed Arabic text using Hidden Markov Models. In this work different sizes of overlapping and non-overlapp...
Husni A. Al-Muhtaseb, Sabri A. Mahmoud, Rami Qahwa...
IJNSEC
2007
204views more  IJNSEC 2007»
13 years 7 months ago
Enhanced DSR for MANET with Improved Secured Route Discovery and QoS
Mobile Ad hoc NETwork (MANET) comprises of nodes, which are free to move randomly, yet cooperate to forward packets between source and destination over a multi-hop wireless networ...
Anil Rawat, Prakash Dattatraya Vyavahare, Ashwani ...
TASLP
2008
96views more  TASLP 2008»
13 years 7 months ago
Fast Tracing of Acoustic Beams and Paths Through Visibility Lookup
The beam tracing method can be used for the fast tracing of a large number of acoustic paths through a direct lookup of a special tree-like data structure (beam tree) that describe...
Fabio Antonacci, M. Foco, Augusto Sarti, Stefano T...
TCOM
2008
76views more  TCOM 2008»
13 years 7 months ago
Multi-user selection diversity for spread-spectrum multi-carrier multiple-access systems
Recently, Multi-User Selection Diversity (MUSDiv) for single-carrier systems has been under extensive study on account of the enhancement it provides to system performance with min...
Petros L. Katsis, George K. Karagiannidis, Fotini-...
ASE
2005
137views more  ASE 2005»
13 years 7 months ago
Rewriting-Based Techniques for Runtime Verification
Techniques for efficiently evaluating future time Linear Temporal Logic (abbreviated LTL) formulae on finite execution traces are presented. While the standard models of LTL are i...
Grigore Rosu, Klaus Havelund
« Prev « First page 1022 / 1040 Last » Next »