Browsing by Keywords "International symposium"
Now showing items 1-15 of 15
-
Authorship attribution: performance of various features and classification methods
(IEEE, 2007-11)Authorship attribution is the process of determining the writer of a document. In literature, there are lots of classification techniques conducted in this process. In this paper we explore information retrieval methods ... -
Bluetooth or 802.15.4 technologies to optimise lifetime of wireless sensor networks: Numerical comparison under a common framework
(IEEE, 2008-04)This paper aims at comparing through simulations the network lifetime of a wireless sensor network using Bluetooth-enabled or IEEE802.15.4 compliant devices. The evaluation is performed under a common reference framework, ... -
Channel polarization: A method for constructing capacity-achieving codes
(IEEE, 2008-07)A method is proposed, called channel polarization, to construct code sequences that achieve the symmetric capacity I(W) of any given binary-input discrete memoryless channel (B-DMC) W. The symmetric capacity I(W) is the ... -
Generalized ID-based ElGamal signatures
(IEEE, 2007-11)ID-based cryptography has been a very active area of research in cryptography since bilinear pairings were introduced as a cryptographic tool, and there have been many proposals for ID-based signatures recently. In this ... -
Induction of logical relations based on specific generalization of strings
(IEEE, 2007-11)Learning logical relations from examples expressed as first order facts has been studied extensively by the Inductive Logic Programming research. Learning with positive-only data may cause over generalization of examples ... -
On the number of clusters in channel model
(IEEE, 2006-08)Typically, scatterers in an environment are not distributed uniformly but rather observed to occur in clusters. Identification of clusters is an issue under discussion. To this end, we study the effect of number of clusters ... -
Parallel preconditioners for solutions of dense linear systems with tens of millions of unknowns
(2007-11)We propose novel parallel preconditioning schemes for the iterative solution of integral equation methods. In particular, we try to improve convergence rate of the ill-conditioned linear systems formulated by the electric-field ... -
A performance evaluation framework of a rate-controlled MPEG video transmission over UMTS networks
(IEEE, 2007-07)UMTS is designed to offer high bandwidth radio access with QoS assurances for multimedia communications. In particular, real-time video communications services are expected to become a successful experience under UMTS ... -
PocketDrive: A system for mobile control of desktop PC and its applications using PDAs
(IEEE, 2007-11)Today, consumer electronic devices and PCs are inevitable parts of our daily life. Controlling those devices remotely is an important aspect of the technology. We have already universal remote control devices for controlling ... -
Research issues in peer-to-peer data management
(IEEE, 2007-11)Data management in Peer-to-Peer (P2P) systems is a complicated and challenging issue due to the scale of the network and highly transient population of peers. In this paper, we identify important research problems in P2P ... -
A scratch-pad memory aware dynamic loop scheduling algorithm
(IEEE, 2008-03)Executing array based applications on a chip multiprocessor requires effective loop parallelization techniques. One of the critical issues that need to be tackled by an optimizing compiler in this context is loop scheduling, ... -
Solution of large-scale scattering problems with the multilevel fast multipole algorithm parallelized on distributed-memory architectures
(IEEE, 2007)We present the solution of large-scale scattering problems involving three-dimensional closed conducting objects with arbitrary shapes. With an efficient parallelization of the multilevel fast multipole algorithm on ... -
Threshold broadcast encryption with reduced complexity
(IEEE, 2007-11)Threshold Broadcast Encryption (TBE) is a promising extension of threshold cryptography with its advantages over traditional threshold cryptosystems, such as eliminating the need of a trusted party, the ability of setting ... -
Turkish keyphrase extraction using KEA
(IEEE, 2007-11)Keyphrases provide semantic metadata to summarize and characterize documents. Unfortunately, there are many digital documents especially on the Internet that do not have a list of assigned keyphrases. Assigning keyphrases ... -
A wideband and a Wide-Beamwidth acoustic transducer design for underwater acoustic communications
(IEEE, 2007-05)This paper is concerned with the design of an efficient, wideband and a wide-beamwidth resonant acoustic transducer for high frequency use. The general transducer structure which has two back-to-back quarter wave thick 1-3 ...