Sciweavers

17505 search results - page 3485 / 3501
» Use Cases as Workflows
Sort
View
142
Voted
TIT
2010
146views Education» more  TIT 2010»
14 years 10 months ago
Cooperation with an untrusted relay: a secrecy perspective
We consider the communication scenario where a source-destination pair wishes to keep the information secret from a relay node despite wanting to enlist its help. For this scenario...
Xiang He, Aylin Yener
128
Voted
TIT
2010
111views Education» more  TIT 2010»
14 years 10 months ago
Designing floating codes for expected performance
Floating codes are codes designed to store multiple values in a Write Asymmetric Memory, with applications to flash memory. In this model, a memory consists of a block of n cells, ...
Flavio Chierichetti, Hilary Finucane, Zhenming Liu...
151
Voted
TMC
2010
103views more  TMC 2010»
14 years 10 months ago
Optimal Cooperative Relaying Schemes in IR-UWB Networks
Cooperation between wireless nodes to retransmit data for the other users introduces multiuser diversity to a wireless network and increases the system throughput. In this paper, t...
Ghasem Naddafzadeh Shirazi, Peng Yong Kong, Chen-K...
136
Voted
TNN
2010
168views Management» more  TNN 2010»
14 years 10 months ago
On the selection of weight decay parameter for faulty networks
The weight-decay technique is an effective approach to handle overfitting and weight fault. For fault-free networks, without an appropriate value of decay parameter, the trained ne...
Andrew Chi-Sing Leung, Hongjiang Wang, John Sum
179
Voted
TNN
2010
234views Management» more  TNN 2010»
14 years 10 months ago
Novel maximum-margin training algorithms for supervised neural networks
This paper proposes three novel training methods, two of them based on the back-propagation approach and a third one based on information theory for Multilayer Perceptron (MLP) bin...
Oswaldo Ludwig, Urbano Nunes
« Prev « First page 3485 / 3501 Last » Next »