Sciweavers

CORR
2008
Springer
133views Education» more  CORR 2008»
14 years 17 days ago
Faceted Ranking of Egos in Collaborative Tagging Systems
Multimedia uploaded content is tagged and recommended by users of collaborative systems, resulting in informal classifications also known as folksonomies. Faceted web ranking has ...
José Ignacio Orlicki, Pablo Ignacio Fierens...
CORR
2008
Springer
116views Education» more  CORR 2008»
14 years 17 days ago
A computational approach to the covert and overt deployment of spatial attention
Popular computational models of visual attention tend to neglect the influence of saccadic eye movements whereas it has been shown that the primates perform on average three of th...
Jérémy Fix, Nicolas P. Rougier, Fr&e...
CORR
2008
Springer
109views Education» more  CORR 2008»
14 years 17 days ago
A Generic Top-Down Dynamic-Programming Approach to Prefix-Free Coding
Given a probability distribution over a set of n words to be transmitted, the Huffman Coding problem is to find a minimal-cost prefix free code for transmitting those words. The b...
Mordecai Golin, Xiaoming Xu, Jiajin Yu
CORR
2008
Springer
53views Education» more  CORR 2008»
14 years 17 days ago
Mining Meaning from Wikipedia
Olena Medelyan, Catherine Legg, David N. Milne, Ia...
CORR
2008
Springer
114views Education» more  CORR 2008»
14 years 17 days ago
The Equivalence of Semidefinite Relaxation MIMO Detectors for Higher-Order QAM
In multi-input multi-output (MIMO) detection, semidefinite relaxation (SDR) has been shown to be an efficient high-performance approach. For BPSK and QPSK, it has been found that S...
Wing-Kin Ma, Chao-Cheng Su, Joakim Jalden, Tsung-H...
CORR
2008
Springer
82views Education» more  CORR 2008»
14 years 17 days ago
Algorithms for Game Metrics (Full Version)
Krishnendu Chatterjee, Luca de Alfaro, Rupak Majum...
CORR
2008
Springer
98views Education» more  CORR 2008»
14 years 17 days ago
An Asymptotically Optimal RFID Authentication Protocol Against Relay Attacks
Abstract. Relay attacks are a major concern for RFID systems: during an authentication process an adversary transparently relays messages between a verifier and a remote legitimate...
Gildas Avoine, Aslan Tchamkerten
CORR
2008
Springer
99views Education» more  CORR 2008»
14 years 17 days ago
Modelling interdependencies between the electricity and information infrastructures
The aim of this paper is to provide qualitative models characterizing interdependencies related failures of two critical infrastructures: the electricity infrastructure and the ass...
Jean-Claude Laprie, Karama Kanoun, Mohamed Ka&acir...
CORR
2008
Springer
59views Education» more  CORR 2008»
14 years 17 days ago
On Gaussian MIMO BC-MAC Duality With Multiple Transmit Covariance Constraints
Lan Zhang, Rui Zhang, Ying-Chang Liang, Yan Xin, H...
CORR
2008
Springer
106views Education» more  CORR 2008»
14 years 17 days ago
Multiprocessor Global Scheduling on Frame-Based DVFS Systems
In this work, we are interested in multiprocessor energy efficient systems where task durations are not known in advance but are known stochastically. More precisely we consider g...
Vandy Berten, Joël Goossens