Sciweavers

27692 search results - page 105 / 5539
» Where is ...
Sort
View
SIGPRO
2002
91views more  SIGPRO 2002»
13 years 8 months ago
Comparison of maximum entropy and minimal mutual information in a nonlinear setting
In blind source separation (BSS), two di erent separation techniques are mainly used: minimal mutual information (MMI), where minimization of the mutual output information yields ...
Fabian J. Theis, Christoph Bauer, Elmar Wolfgang L...
TIT
2002
85views more  TIT 2002»
13 years 8 months ago
Parallel constrained coding with application to two-dimensional constraints
A parallel constrained coding scheme is considered where p-blocks of raw data are encoded simultaneously into q tracks such that the contents of each track belong to a given const...
Shirley Halevy, Ron M. Roth
IPL
2010
80views more  IPL 2010»
13 years 7 months ago
The reachability problem for branching vector addition systems requires doubly-exponential space
Branching vector addition systems are an extension of vector addition systems where new reachable vectors may be obtained by summing two reachable vectors and adding an integral v...
Ranko Lazic
NETWORKS
2010
13 years 7 months ago
Network flow spanners
Abstract. In this paper, motivated by applications of ordinary (distance) spanners in communication networks and to address such issues as bandwidth constraints on network links, l...
Feodor F. Dragan, Chenyu Yan
RULEML
2010
Springer
13 years 7 months ago
Superiority Based Revision of Defeasible Theories
We propose a systematic investigation on how to modify a preference relation in a defeasible logic theory to change the conclusions of the theory itself. We argue that the approach...
Guido Governatori, Francesco Olivieri, Simone Scan...