Sciweavers

109
Voted
CORR
2010
Springer
110views Education» more  CORR 2010»
15 years 3 months ago
Advanced Software Protection Now
We introduce a novel software-protection method, which can be fully implemented with today's technologies, that provides traitor tracing and license-enforcement functionalitie...
Diego Bendersky, Ariel Futoransky, Luciano Notarfr...
CORR
2010
Springer
106views Education» more  CORR 2010»
15 years 3 months ago
MDPs with Unawareness
Markov decision processes (MDPs) are widely used for modeling decision-making problems in robotics, automated control, and economics. Traditional MDPs assume that the decision mak...
Joseph Y. Halpern, Nan Rong, Ashutosh Saxena
73
Voted
CORR
2010
Springer
66views Education» more  CORR 2010»
15 years 3 months ago
Highly Parallel Sparse Matrix-Matrix Multiplication
Aydin Buluç, John R. Gilbert
47
Voted
CORR
2010
Springer
45views Education» more  CORR 2010»
15 years 3 months ago
Colored Gaussian Multiple Descriptions: Spectral-Domain Characterization and Time-Domain Design
Jan Østergaard, Yuval Kochman, Ram Zamir
159
Voted
CORR
2010
Springer
160views Education» more  CORR 2010»
15 years 3 months ago
A Semi-distributed Reputation Based Intrusion Detection System for Mobile Adhoc Networks
Abstract: A Mobile Adhoc Network (manet) is a cooperative engagement of a collection of mobile nodes without any centralized access point. The underlying concept of coordination am...
Animesh Kr Trivedi, Rajan Arora, Rishi Kapoor, Sud...
75
Voted
CORR
2010
Springer
70views Education» more  CORR 2010»
15 years 3 months ago
Augmented Rotation-Based Transformation for Privacy-Preserving Data Clustering
Dowon Hong, Abedelaziz Mohaisen
49
Voted
CORR
2010
Springer
41views Education» more  CORR 2010»
15 years 3 months ago
Roomy: A System for Space Limited Computations
Daniel Kunkle
99
Voted
CORR
2010
Springer
146views Education» more  CORR 2010»
15 years 3 months ago
Building Computer Network Attacks
In this work we start walking the path to a new perspective for viewing cyberwarfare scenarios, by introducing conceptual tools (a formal model) to evaluate the costs of an attack...
Ariel Futoransky, Luciano Notarfrancesco, Gerardo ...
132
Voted
CORR
2010
Springer
172views Education» more  CORR 2010»
15 years 3 months ago
The MUSIC Algorithm for Sparse Objects: A Compressed Sensing Analysis
The MUSIC algorithm, and its extension for imaging sparse extended objects, with noisy data is analyzed by compressed sensing (CS) techniques. A thresholding rule is developed to a...
Albert Fannjiang
149
Voted
CORR
2010
Springer
172views Education» more  CORR 2010»
15 years 3 months ago
Seeing Through Black Boxes : Tracking Transactions through Queues under Monitoring Resource Constraints
The problem of optimal allocation of monitoring resources for tracking transactions progressing through a distributed system, modeled as a queueing network, is considered. Two for...
Animashree Anandkumar, Ting He, Chatschik Bisdikia...