Sciweavers

21 search results - page 3 / 5
» hais 2011
Sort
View
TMC
2011
137views more  TMC 2011»
13 years 5 months ago
Cognitive Medium Access: Exploration, Exploitation, and Competition
— This paper establishes the equivalence between cognitive medium access and the competitive multi-armed bandit problem. First, the scenario in which a single cognitive user wish...
Lifeng Lai, Hesham El Gamal, Hai Jiang, H. Vincent...
CIKM
2011
Springer
12 years 10 months ago
Estimating selectivity for joined RDF triple patterns
A fundamental problem related to RDF query processing is selectivity estimation, which is crucial to query optimization for determining a join order of RDF triple patterns. In thi...
Hai Huang 0003, Chengfei Liu
ICASSP
2011
IEEE
13 years 2 months ago
Slice error concealment based on size-adaptive SSIM matching and motion vector outlier rejection
Consecutive corrupted MBs or slice errors are commonly seen in modern video transmission systems. Temporal error concealment is an effective approach to reduce the impact of error...
Hai Gao, Jo Yew Tham, Wei Siong Lee, Kwong Huang G...
INFOCOM
2011
IEEE
13 years 2 months ago
Fast and scalable secret key generation exploiting channel phase randomness in wireless networks
—Recently, there has been great interest in physical layer security techniques that exploit the randomness of wireless channels for securely extracting cryptographic keys. Severa...
Qian Wang, Hai Su, Kui Ren, Kwangjo Kim
ICASSP
2011
IEEE
13 years 2 months ago
Structured Output Layer neural network language model
This paper introduces a new neural network language model (NNLM) based on word clustering to structure the output vocabulary: Structured Output Layer NNLM. This model is able to h...
Hai Son Le, Ilya Oparin, Alexandre Allauzen, Jean-...