Two symmetric and computationally efficient Gini correlations

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Adaptively Secure Computationally Efficient Searchable Symmetric Encryption

Searchable encryption is a technique that allows a client to store documents on a server in encrypted form. Stored documents can be retrieved selectively while revealing as little information as possible to the server. In the symmetric searchable encryption domain, the storage and the retrieval are performed by the same client. Most conventional searchable encryption schemes suffer from two dis...

متن کامل

Computationally Efficient Target Classification

Detecting and classifying targets in video streams from surveillance cameras is a cumbersome, error-prone and expensive task. Often, the incurred costs are prohibitive for real-time monitoring. This leads to data being stored locally or transmitted to a central storage site for post-incident examination. The required communication links and archiving of the video data are still expensive and th...

متن کامل

Computationally Efficient Gaussian Process

Most existing GP regression algorithms assume a single generative model, leading to poor performance when data are nonstationary, i.e. generated from multiple switching processes. Existing methods for GP regression over non-stationary data include clustering and changepoint detection algorithms. However, these methods require significant computation, do not come with provable guarantees on corr...

متن کامل

Computationally Efficient MIMO Demodulation

It is shown that multiple complementary techniques for trading BER performance for cost reduction in the Viterbi algorithm for multipleinput/multiple-output joint demodulation can be merged to obtain substantial and efficient cost reduction. Quantitative results for application to the separation of GSM cochannel signals are presented. It is shown that up to six signals can be separated at a GSM...

متن کامل

A computationally-efficient two-step implementation of the GLRT detector

In this paper, a new two-step implementation of the GLRT is proposed. A disadvantage of the GLRT detector is that it is more computationally complex than the simple AMF detector. Our two-step implementation of the GLRT significantly reduces the computational load with a negligible loss in detection performance.

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Dependence Modeling

سال: 2020

ISSN: 2300-2298

DOI: 10.1515/demo-2020-0020