Sciweavers

CORR
2008
Springer
47views Education» more  CORR 2008»
13 years 10 months ago
Artificial Immune Systems Tutorial
Uwe Aickelin, Dipankar Dasgupta
CORR
2008
Springer
85views Education» more  CORR 2008»
13 years 10 months ago
Introduction to Multi-Agent Simulation
Peer-Olaf Siebers, Uwe Aickelin
CORR
2008
Springer
127views Education» more  CORR 2008»
13 years 10 months ago
Asymptotically Optimum Universal One-Bit Watermarking for Gaussian Covertexts and Gaussian Attacks
The problem of optimum watermark embedding and detection was addressed in a recent paper by Merhav and Sabbag, where the optimality criterion was the maximum false
Pedro Comesaña, Neri Merhav, Mauro Barni
CORR
2010
Springer
51views Education» more  CORR 2010»
13 years 10 months ago
On ternary square-free circular words
Circular words are cyclically ordered finite sequences of letters. We give a computer-free proof of the following result by Currie: square-free circular words over the ternary alp...
Arseny M. Shur
CORR
2008
Springer
65views Education» more  CORR 2008»
13 years 10 months ago
Succinct Data Structures for Retrieval and Approximate Membership
Martin Dietzfelbinger, Rasmus Pagh
CORR
2010
Springer
144views Education» more  CORR 2010»
13 years 10 months ago
A secure email login system using virtual password
In today's world password compromise by some adversaries is common for different purpose. In ICC 2008 Lei et al. proposed a new user authentication system based on the virtual...
Nishant Doshi
CORR
2008
Springer
98views Education» more  CORR 2008»
13 years 10 months ago
Void Traversal for Guaranteed Delivery in Geometric Routing
Geometric routing algorithms like GFG (GPSR) are lightweight, scalable algorithms that can be used to route in resource-constrained ad hoc wireless networks. However, such algorith...
Mikhail Nesterenko, Adnan Vora
CORR
2010
Springer
157views Education» more  CORR 2010»
13 years 10 months ago
Clandestine Simulations in Cellular Automata
This paper studies two kinds of simulation between cellular automata: simulations based on factor and simulations based on sub-automaton. We show that these two kinds of simulation...
Pierre Guillon, Pierre-Etienne Meunier, Guillaume ...
CORR
2008
Springer
124views Education» more  CORR 2008»
13 years 10 months ago
A New Upper Bound for Max-2-Sat: A Graph-Theoretic Approach
In MaxSat, we ask for an assignment which satisfies the maximum number of clauses for a boolean formula in CNF. We present an algorithm yielding a run time upper bound of O (2 K 6....
Daniel Raible, Henning Fernau