Two symmetric and computationally efficient Gini correlations
نویسندگان
چکیده
منابع مشابه
Adaptively Secure Computationally Efficient Searchable Symmetric Encryption
Searchable encryption is a technique that allows a client to store documents on a server in encrypted form. Stored documents can be retrieved selectively while revealing as little information as possible to the server. In the symmetric searchable encryption domain, the storage and the retrieval are performed by the same client. Most conventional searchable encryption schemes suffer from two dis...
متن کاملComputationally Efficient Target Classification
Detecting and classifying targets in video streams from surveillance cameras is a cumbersome, error-prone and expensive task. Often, the incurred costs are prohibitive for real-time monitoring. This leads to data being stored locally or transmitted to a central storage site for post-incident examination. The required communication links and archiving of the video data are still expensive and th...
متن کاملComputationally Efficient Gaussian Process
Most existing GP regression algorithms assume a single generative model, leading to poor performance when data are nonstationary, i.e. generated from multiple switching processes. Existing methods for GP regression over non-stationary data include clustering and changepoint detection algorithms. However, these methods require significant computation, do not come with provable guarantees on corr...
متن کاملComputationally Efficient MIMO Demodulation
It is shown that multiple complementary techniques for trading BER performance for cost reduction in the Viterbi algorithm for multipleinput/multiple-output joint demodulation can be merged to obtain substantial and efficient cost reduction. Quantitative results for application to the separation of GSM cochannel signals are presented. It is shown that up to six signals can be separated at a GSM...
متن کاملA computationally-efficient two-step implementation of the GLRT detector
In this paper, a new two-step implementation of the GLRT is proposed. A disadvantage of the GLRT detector is that it is more computationally complex than the simple AMF detector. Our two-step implementation of the GLRT significantly reduces the computational load with a negligible loss in detection performance.
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Dependence Modeling
سال: 2020
ISSN: 2300-2298
DOI: 10.1515/demo-2020-0020