—Embedded zero-tree coding in wavelet domain has drawn a lot of attention to the image compression applications. Among noteworthy zero-tree algorithms is the SPIHT algorithm. For...
—In the context of multiple constant multiplications (MCM) design, we propose a novel common-subexpression-elimination (CSE) algorithm that models synthesis of coefficients into ...
The benefit of incorporating background knowledge in the learning process has been successfully demonstrated in numerous applications of ILP methods. Nevertheless the effect of inc...
—A wideband voltage-controlled oscillator (VCO) with a frequency range from 3GHz to 5GHz is presented. The VCO has two control inputs, one for band switching and one for continuo...
Abstract—Adaptive middleware and wireless networks are hot topics in many discussions today. Literature describes a lot of approaches which are based upon existing middleware tec...
— Among all ECG components, QRS complex is the most significant feature. Entropy based method for the detection of QRS complexes (cardiac beat) in the single lead Electrocardiogr...
—In this research, the Genetic Algorithm (GA) and Space-Filling Curve (SFC) are combined along with the use of Taguchi method for finding the optimal combination of parameters. T...
Abstract Previously, we have proposed two recommendation systems, the Context-aware Information Filtering (C-IF) and Context-aware Collaborative Filtering (C-CF), both of which ar...
Kenta Oku, Shinsuke Nakajima, Jun Miyazaki, Shunsu...
We consider multi-pushdown automata, a multi-stack extension of pushdown automata that comes with a constraint on stack operations: a pop can only be performed on the first non-emp...
Mohamed Faouzi Atig, Benedikt Bollig, Peter Haberm...
Abstract. Let w be an equality word of two nonperiodic binary morphisms g, h : {a, b} . Suppose that no overflow occurs twice in w and that w contains at least 9 occurrences of a ...