Sciweavers

470 search results - page 79 / 94
» Using Unknown Word Techniques to Learn Known Words
Sort
View
JUCS
2010
97views more  JUCS 2010»
13 years 6 months ago
Usage-based Object Similarity
: Recommender systems are widely used online to support users in finding relevant information. They can be based on different techniques such as content-based and collaborative ...
Katja Niemann, Maren Scheffel, Martin Friedrich, U...
ICS
2010
Tsinghua U.
13 years 12 months ago
Weight Distribution and List-Decoding Size of Reed-Muller Codes
: We study the weight distribution and list-decoding size of Reed-Muller codes. Given a weight parameter, we are interested in bounding the number of Reed-Muller codewords with a w...
Tali Kaufman, Shachar Lovett, Ely Porat
ICIP
2005
IEEE
14 years 9 months ago
An efficient algorithm for informed embedding of dirty-paper trellis codes for watermarking
Dirty paper trellis codes are a form of watermarking with side information. These codes have the advantage of being invariant to valumetric scaling of the cover Work. However, the...
Gwenaël J. Doërr, Ingemar J. Cox, Lin Li...
SODA
2010
ACM
200views Algorithms» more  SODA 2010»
14 years 5 months ago
Fully-Functional Succinct Trees
We propose new succinct representations of ordinal trees, which have been studied extensively. It is known that any n-node static tree can be represented in 2n + o(n) bits and a l...
Kunihiko Sadakane, Gonzalo Navarro
ITCC
2005
IEEE
14 years 1 months ago
Frequency Hopping Pattern Detection in Wireless Ad Hoc Networks
Frequency hopping is a technique that wireless devices communicate in a way that the transmission frequencies are alternated in a pre-determined ordered hopping pattern known only...
Min Song, Scott Wigginton