Sciweavers

27692 search results - page 105 / 5539
» Where is ...
Sort
View
91
Voted
SIGPRO
2002
91views more  SIGPRO 2002»
15 years 1 months ago
Comparison of maximum entropy and minimal mutual information in a nonlinear setting
In blind source separation (BSS), two di erent separation techniques are mainly used: minimal mutual information (MMI), where minimization of the mutual output information yields ...
Fabian J. Theis, Christoph Bauer, Elmar Wolfgang L...
117
Voted
TIT
2002
85views more  TIT 2002»
15 years 1 months ago
Parallel constrained coding with application to two-dimensional constraints
A parallel constrained coding scheme is considered where p-blocks of raw data are encoded simultaneously into q tracks such that the contents of each track belong to a given const...
Shirley Halevy, Ron M. Roth
107
Voted
IPL
2010
80views more  IPL 2010»
15 years 20 days ago
The reachability problem for branching vector addition systems requires doubly-exponential space
Branching vector addition systems are an extension of vector addition systems where new reachable vectors may be obtained by summing two reachable vectors and adding an integral v...
Ranko Lazic
133
Voted
NETWORKS
2010
15 years 19 days ago
Network flow spanners
Abstract. In this paper, motivated by applications of ordinary (distance) spanners in communication networks and to address such issues as bandwidth constraints on network links, l...
Feodor F. Dragan, Chenyu Yan
122
Voted
RULEML
2010
Springer
15 years 18 days ago
Superiority Based Revision of Defeasible Theories
We propose a systematic investigation on how to modify a preference relation in a defeasible logic theory to change the conclusions of the theory itself. We argue that the approach...
Guido Governatori, Francesco Olivieri, Simone Scan...