Login / Signup
A standard's integrity: can it be safeguarded?
Tineke M. Egyedi
John Hudson
Published in:
IEEE Commun. Mag. (2005)
Keyphrases
</>
data sets
hidden markov models
clustering algorithm
end users
probability distribution
integrity constraints