Sciweavers

1684 search results - page 193 / 337
» The lexicographic decision function
Sort
View
DATE
2005
IEEE
192views Hardware» more  DATE 2005»
15 years 10 months ago
C Based Hardware Design for Wireless Applications
The algorithms used in wireless applications are increasingly more sophisticated and consequently more challenging to implement in hardware. Traditional design flows require devel...
Andrés Takach, Bryan Bowyer, Thomas Bollaer...
ISCC
2005
IEEE
120views Communications» more  ISCC 2005»
15 years 10 months ago
Modular Reference Implementation of an IP-DSLAM
We describe a modular reference implementation of an IPbased DSL access multiplexer (DSLAM). We identify deployment trends and primary tasks a future DSLAM has to offer. The imple...
Christian Sauer, Matthias Gries, Sören Sonnta...
WACV
2005
IEEE
15 years 10 months ago
Gait Verification Using Probabilistic Methods
In this paper we describe a novel method for gait based identity verification based on Bayesian classification. The verification task is reduced to a two class problem (Client or ...
Alex I. Bazin, Mark S. Nixon
ICCS
2005
Springer
15 years 10 months ago
H2O Metacomputing - Jini Lookup and Discovery
Because of its inter-organisational, collaborative use of computational resources, grid computing presents a severe interoperability challenge to grid application developers. Diffe...
Dirk Gorissen, Gunther Stuer, Kurt Vanmechelen, Ja...
ICIC
2005
Springer
15 years 10 months ago
Methods of Decreasing the Number of Support Vectors via k-Mean Clustering
This paper proposes two methods which take advantage of k -mean clustering algorithm to decrease the number of support vectors (SVs) for the training of support vector machine (SVM...
Xiao-Lei Xia, Michael R. Lyu, Tat-Ming Lok, Guang-...