Sciweavers

32607 search results - page 6452 / 6522
» Supporting
Sort
View
SIAMSC
2011
177views more  SIAMSC 2011»
13 years 5 months ago
Computing f(A)b via Least Squares Polynomial Approximations
Given a certain function f, various methods have been proposed in the past for addressing the important problem of computing the matrix-vector product f(A)b without explicitly comp...
Jie Chen, Mihai Anitescu, Yousef Saad
SLOGICA
2011
13 years 5 months ago
Logics for Qualitative Inductive Generalization
The paper contains a survey of (mainly unpublished) adaptive logics of inductive generalization. These defeasible logics are precise formulations of certain methods. Some attentio...
Diderik Batens
SNAM
2011
246views more  SNAM 2011»
13 years 5 months ago
Market basket analysis with networks
The field of market basket analysis, the search for meaningful associations in customer purchase data, is one of the oldest areas of data mining. The typical solution involves th...
Troy Raeder, Nitesh V. Chawla
TCS
2011
13 years 5 months ago
On the relationship between fuzzy and Boolean cellular automata
Fuzzy cellular automata (FCA) are continuous cellular automata where the local rule is defined as the “fuzzification" of the local rule of a corresponding Boolean cellula...
Heather Betel, Paola Flocchini
TIT
2011
120views more  TIT 2011»
13 years 5 months ago
The Secrecy Capacity Region of the Gaussian MIMO Multi-Receiver Wiretap Channel
In this paper, we consider the Gaussian multiple-input multiple-output (MIMO) multi-receiver wiretap channel in which a transmitter wants to have confidential communication with ...
Ersen Ekrem, Sennur Ulukus
« Prev « First page 6452 / 6522 Last » Next »