Sciweavers

CORR
2008
Springer
131views Education» more  CORR 2008»
13 years 8 months ago
Jamming in Fixed-Rate Wireless Systems with Power Constraints - Part I: Fast Fading Channels
This is the first part of a two-part paper that studies the problem of jamming in a fixed-rate transmission system with fading, under the general assumption that the jammer has no...
George T. Amariucai, Shuangqing Wei
CORR
2008
Springer
52views Education» more  CORR 2008»
13 years 8 months ago
On the diagonalization of the discrete Fourier transform
Shamgar Gurevich, Ronny Hadani
CORR
2008
Springer
100views Education» more  CORR 2008»
13 years 8 months ago
MIML: A Framework for Learning with Ambiguous Objects
Zhi-Hua Zhou, Min-Ling Zhang, Sheng-Jun Huang, Yu-...
CORR
2008
Springer
112views Education» more  CORR 2008»
13 years 8 months ago
The discrete Fourier transform: A canonical basis of eigenfunctions
We exhibit a canonical basis of eigenvectors for the discrete Fourier transform (DFT). The transition matrix from the standard basis to defines a novel transform which we call ...
Shamgar Gurevich, Ronny Hadani, Nir A. Sochen
CORR
2008
Springer
112views Education» more  CORR 2008»
13 years 8 months ago
n-ary Fuzzy Logic and Neutrosophic Logic Operators
We extend Knuth's 16 Boolean binary logic operators to fuzzy logic and neutrosophic logic binary operators. Then we generalize them to n-ary fuzzy logic and neutrosophic logi...
Florentin Smarandache, V. Christianto
CORR
2008
Springer
216views Education» more  CORR 2008»
13 years 8 months ago
Building an interpretable fuzzy rule base from data using Orthogonal Least Squares Application to a depollution problem
In many fields where human understanding plays a crucial role, such as bioprocesses, the capacity of extracting knowledge from data is of critical importance. Within this framewor...
Sébastien Destercke, Serge Guillaume, Brigi...
CORR
2008
Springer
158views Education» more  CORR 2008»
13 years 8 months ago
Declarative Combinatorics: Isomorphisms, Hylomorphisms and Hereditarily Finite Data Types in Haskell
This paper is an exploration in a functional programming framework of isomorphisms between elementary data types (natural numbers, sets, finite functions, permutations binary deci...
Paul Tarau
CORR
2008
Springer
118views Education» more  CORR 2008»
13 years 8 months ago
List Decoding of Burst Errors
A generalization of the Reiger bound is presented for the list decoding of burst errors. It is then shown that Reed
Ron M. Roth, Pascal O. Vontobel
CORR
2008
Springer
162views Education» more  CORR 2008»
13 years 8 months ago
Accelerating Scientific Computations with Mixed Precision Algorithms
On modern architectures, the performance of 32-bit operations is often at least twice as fast as the performance of 64-bit operations. By using a combination of 32-bit and 64-bit ...
Marc Baboulin, Alfredo Buttari, Jack Dongarra, Jak...
CORR
2008
Springer
153views Education» more  CORR 2008»
13 years 8 months ago
Efficient and Robust Secure Aggregation for Sensor Networks
Abstract-- Wireless Sensor Networks (WSNs) rely on innetwork aggregation for efficiency, however, this comes at a price: A single adversary can severely influence the outcome by co...
Parisa Haghani, Panagiotis Papadimitratos, Marcin ...