Sciweavers

495 search results - page 33 / 99
» The Subword Reversing Method
Sort
View
JSAC
2007
139views more  JSAC 2007»
13 years 8 months ago
Reverse-Engineering MAC: A Non-Cooperative Game Model
— This paper reverse-engineers backoff-based random-access MAC protocols in ad-hoc networks. We show that the contention resolution algorithm in such protocols is implicitly part...
Jang-Won Lee, Ao Tang, Jianwei Huang, Mung Chiang,...
FLAIRS
2004
13 years 10 months ago
Speaker Verification Using Speaker-Specific Prompts
Intra- and inter-speaker information, which include acoustical, speaker style, speech rate and temporal variation, despite their critical importance for the verification of claims...
Yongxin Zhang, Adel Iskander Fahmy, Michael S. Sco...
IJAC
2006
93views more  IJAC 2006»
13 years 8 months ago
On Word Reversing in Braid Groups
It has been conjectured that in a braid group, or more generally in a Garside group, applying any sequence of monotone equivalences and word reversings can increase the length of a...
Patrick Dehornoy, Bert Wiest
ICDE
2009
IEEE
169views Database» more  ICDE 2009»
14 years 10 months ago
Visible Reverse k-Nearest Neighbor Queries
Reverse nearest neighbor (RNN) queries have a broad application base such as decision support, profile-based marketing, resource allocation, data mining, etc. Previous work on RNN ...
Yunjun Gao, Baihua Zheng, Gencai Chen, Wang-Chien ...
DAC
2004
ACM
14 years 9 months ago
Quantum logic synthesis by symbolic reachability analysis
Reversible quantum logic plays an important role in quantum computing. In this paper, we propose an approach to optimally synthesize quantum circuits by symbolic reachability anal...
William N. N. Hung, Xiaoyu Song, Guowu Yang, Jin Y...