Sciweavers

284 search results - page 43 / 57
» Modularity of Completeness Revisited
Sort
View
CORR
2007
Springer
114views Education» more  CORR 2007»
13 years 9 months ago
On the Throughput of Secure Hybrid-ARQ Protocols for Gaussian Block-Fading Channels
—The focus of this paper is an information-theoretic study of retransmission protocols for reliable packet communication under a secrecy constraint. The hybrid automatic retransm...
Xiaojun Tang, Ruoheng Liu, Predrag Spasojevic, H. ...
MSCS
2006
87views more  MSCS 2006»
13 years 9 months ago
Differential categories
This paper revisits the authors' notion of a differential category from a different perspective. A differential category is an additive symmetric monoidal category with a como...
Richard Blute, J. Robin B. Cockett, R. A. G. Seely
JSAC
2007
97views more  JSAC 2007»
13 years 9 months ago
R2: Random Push with Random Network Coding in Live Peer-to-Peer Streaming
— In information theory, it has been shown that network coding can effectively improve the throughput of multicast communication sessions in directed acyclic graphs. More practic...
Mea Wang, Baochun Li
WWW
2011
ACM
13 years 4 months ago
Characterizing search intent diversity into click models
Modeling a user’s click-through behavior in click logs is a challenging task due to the well-known position bias problem. Recent advances in click models have adopted the examin...
Botao Hu, Yuchen Zhang, Weizhu Chen, Gang Wang, Qi...
POPL
2006
ACM
14 years 10 months ago
Certified assembly programming with embedded code pointers
Embedded code pointers (ECPs) are stored handles of functions and continuations commonly seen in low-level binaries as well as functional or higher-order programs. ECPs are known ...
Zhaozhong Ni, Zhong Shao