Sciweavers

CORR
2006
Springer
111views Education» more  CORR 2006»
13 years 11 months ago
Security and Non-Repudiation for Voice-Over-IP Conversations
Christian Hett, Nicolai Kuntze, Andreas U. Schmidt
CORR
2006
Springer
74views Education» more  CORR 2006»
13 years 11 months ago
Scheduling Algorithms for Procrastinators
This paper presents scheduling algorithms for procrastinators, where the speed that a procrastinator executes a job increases as the due date approaches. We give optimal off-line ...
Michael A. Bender, Raphaël Clifford, Kostas T...
CORR
2006
Springer
122views Education» more  CORR 2006»
13 years 11 months ago
On the complexity of XPath containment in the presence of disjunction, DTDs, and variables
XPath is a simple language for navigating an XML-tree and returning a set of answer nodes. The focus in this paper is on the complexity of the containment problem for various frag...
Frank Neven, Thomas Schwentick
CORR
2006
Springer
78views Education» more  CORR 2006»
13 years 11 months ago
FLAIM: A Multi-level Anonymization Framework for Computer and Network Logs
FLAIM (Framework for Log Anonymization and Information Management) addresses two important needs not well addressed by current log anonymizers. First, it is extremely modular and ...
Adam J. Slagell, Kiran Lakkaraju, Katherine Luo
CORR
2006
Springer
89views Education» more  CORR 2006»
13 years 11 months ago
On the Efficiency of Strategies for Subdividing Polynomial Triangular Surface Patches
In this paper, we investigate the efficiency of various strategies for subdividing polynomial triangular surface patches. We give a simple algorithm performing a regular subdivisio...
Jean H. Gallier
CORR
2006
Springer
93views Education» more  CORR 2006»
13 years 11 months ago
Fast and Simple Methods For Computing Control Points
The purpose of this paper is to present simple and fast methods for computing control points for polynomial curves and polynomial surfaces given explicitly in terms of polynomials ...
Jean H. Gallier, Weqing Gu
CORR
2006
Springer
105views Education» more  CORR 2006»
13 years 11 months ago
Threshold-Controlled Global Cascading in Wireless Sensor Networks
Abstract-- We investigate cascade dynamics in thresholdcontrolled (multiplex) propagation on random geometric networks. We find that such local dynamics can serve as an efficient, ...
Qiming Lu, Gyorgy Korniss, Boleslaw K. Szymanski
CORR
2006
Springer
101views Education» more  CORR 2006»
13 years 11 months ago
Context-Sensitive Languages, Rational Graphs and Determinism
We investigate families of infinite automata for context-sensitive languages. An infinite automaton is an infinite labeled graph with two sets of initial and final vertices. Its la...
Arnaud Carayol, Antoine Meyer
CORR
2006
Springer
134views Education» more  CORR 2006»
13 years 11 months ago
Topology for Distributed Inference on Graphs
Soummya Kar, Saeed A. Aldosari, José M. F. ...
CORR
2006
Springer
142views Education» more  CORR 2006»
13 years 11 months ago
Decentralized Erasure Codes for Distributed Networked Storage
We consider the problem of constructing an erasure code for storage over a network when the data sources are distributed. Specifically, we assume that there are n storage nodes wit...
Alexandros G. Dimakis, Vinod M. Prabhakaran, Kanna...