Sciweavers

64 search results - page 6 / 13
» isi 2008
Sort
View
ICC
2008
IEEE
121views Communications» more  ICC 2008»
14 years 1 months ago
Low-Complexity Pattern-Eliminating Codes for ISI-Limited Channels
— This paper introduces low-complexity block codes, termed pattern-eliminating codes (PEC), which achieve a potentially large performance improvement over channels with residual ...
Natasa Blitvic, Lizhong Zheng, Vladimir Stojanovic
ISI
2008
Springer
13 years 7 months ago
Identity management architecture
Identity Management plays a crucial role in many application contexts, including e-governments, e-commerce, business intelligence, investigation, and homeland security. The variet...
Uwe Glässer, Mona Vajihollahi
JSAC
2008
75views more  JSAC 2008»
13 years 7 months ago
Evolution analysis of low-cost iterative equalization in coded linear systems with cyclic prefixes
This paper is concerned with the low-cost iterative equalization/detection principles for coded linear systems with cyclic prefixes. Turbo frequency-domain-equalization (FDE) is ap...
Xiaojun Yuan, Qinghua Guo, Xiaodong Wang, Li Ping
ISI
2008
Springer
13 years 7 months ago
Data mining for social network analysis
A social network is defined as a social structure of individuals, who are related (directly or indirectly to each other) based on a common relation of interest, e.g. friendship, t...
J. Srivastava
ISI
2008
Springer
13 years 7 months ago
Information sharing and privacy protection of terrorist or criminal social networks
Terrorist or criminal social network analysis is helpful for intelligence and law enforcement force in investigation. However, individual agency usually has part of the complete te...
Christopher C. Yang