Sciweavers

709 search results - page 102 / 142
» Threshold Setting and Performance Optimization in Adaptive F...
Sort
View
MVA
2007
196views Computer Vision» more  MVA 2007»
13 years 10 months ago
Fingerprint Verification Using Perturbation Method
This paper describes a new, powerful technique of fingerprint verification based on a perturbation method. The proposed method consists of four parts. The first part performs loca...
Satoshi Otaka, Yoshihisa Nishiyama, Takahiro Hatan...
STOC
2001
ACM
151views Algorithms» more  STOC 2001»
14 years 9 months ago
On the cell probe complexity of membership and perfect hashing
We study two fundamental static data structure problems, membership and perfect hashing, in Yao's cell probe model. The first space and bit probe optimal worst case upper bou...
Rasmus Pagh
CORR
2010
Springer
219views Education» more  CORR 2010»
13 years 7 months ago
Cooperative Algorithms for MIMO Interference Channels
Interference alignment is a transmission technique for exploiting all available degrees of freedom in the symmetric frequency- or time-selective interference channel with an arbit...
Steven W. Peters, Robert W. Heath Jr.
ICASSP
2010
IEEE
13 years 9 months ago
Aspect-model-based reference speaker weighting
We propose an aspect-model-based reference speaker weighting. The main idea of the approach is that the adapted model is a linear combination of a set of reference speakers like r...
Seongjun Hahm, Yuichi Ohkawa, Masashi Ito, Motoyuk...
INFOCOM
2007
IEEE
14 years 3 months ago
Two-Tier Load Balancing in OSPF Wireless Back-Hauls
Abstract— High-speed wireless communication technology (e.g. WiMAX) makes it feasible and cost-effective to build wireless back-hauls for Internet access. Compared to wired count...
Xiaowen Zhang, Hao Zhu