Sciweavers

CORR
2006
Springer
77views Education» more  CORR 2006»
13 years 11 months ago
Generalized Entropy Power Inequalities and Monotonicity Properties of Information
New families of Fisher information and entropy power inequalities for sums of independent random variables are presented. These inequalities relate the information in the sum of n ...
Mokshay M. Madiman, Andrew R. Barron
CORR
2006
Springer
123views Education» more  CORR 2006»
13 years 11 months ago
Continuations, proofs and tests
Continuation Passing Style (CPS) is one of the most important issues in the field of functional programming languages, and the quest for a primitive notion of types for continuati...
Stefano Guerrini, Andrea Masini
CORR
2006
Springer
83views Education» more  CORR 2006»
13 years 11 months ago
An unlikely result
What happens to a dictator once he is out of power is not just a matter of justice or a random result. Using game theory we show that post-power scenarios depend largely on two fac...
A. N. Other
CORR
2006
Springer
104views Education» more  CORR 2006»
13 years 11 months ago
Asymptotically Optimal Multiple-access Communication via Distributed Rate Splitting
We consider the multiple-access communication problem in a distributed setting for both the additive white Gaussian noise channel and the discrete memoryless channel. We propose a ...
Jian Cao, Edmund M. Yeh
CORR
2006
Springer
118views Education» more  CORR 2006»
13 years 11 months ago
Minimally Invasive Randomization for Collecting Unbiased Preferences from Clickthrough Logs
Clickthrough data is a particularly inexpensive and plentiful resource to obtain implicit relevance feedback for improving and personalizing search engines. However, it is well kn...
Filip Radlinski, Thorsten Joachims
CORR
2006
Springer
126views Education» more  CORR 2006»
13 years 11 months ago
Evaluating the Robustness of Learning from Implicit Feedback
This paper evaluates the robustness of learning from implicit feedback in web search. In particular, we create a model of user behavior by drawing upon user studies in laboratory ...
Filip Radlinski, Thorsten Joachims
CORR
2006
Springer
114views Education» more  CORR 2006»
13 years 11 months ago
Peer to Peer Networks for Defense Against Internet Worms
Abstract-- Internet worms, which spread in computer networks without human mediation, pose a severe threat to computer systems today. The rate of propagation of worms has been meas...
Srinivas Shakkottai, R. Srikant
CORR
2006
Springer
131views Education» more  CORR 2006»
13 years 11 months ago
A framework of reusable structures for mobile agent development
-- Mobile agents research is clearly aiming towards imposing agent based development as the next generation of tools for writing software. This paper comes with its own contributio...
Tudor Marian, Bogdan Dumitriu, Mihaela Dinsoreanu,...
CORR
2006
Springer
193views Education» more  CORR 2006»
13 years 11 months ago
On the Design of Agent-Based Systems using UML and Extensions
The Unified Software Development Process (USDP) and Unified Modeling Language (UML) have been now generally accepted as the standard methodology and modeling language for developin...
Mihaela Dinsoreanu, Ioan Salomie, Kalman Pusztai
CORR
2006
Springer
126views Education» more  CORR 2006»
13 years 11 months ago
The Gaussian Multiple Access Wire-Tap Channel
We consider the General Gaussian Multiple Access Wire-Tap Channel (GGMAC-WT). In this scenario, multiple users communicate with an intended receiver in the presence of an intellige...
Ender Tekin, Aylin Yener