Sciweavers

CORR
2008
Springer
162views Education» more  CORR 2008»
14 years 18 days ago
Accelerating Scientific Computations with Mixed Precision Algorithms
On modern architectures, the performance of 32-bit operations is often at least twice as fast as the performance of 64-bit operations. By using a combination of 32-bit and 64-bit ...
Marc Baboulin, Alfredo Buttari, Jack Dongarra, Jak...
CORR
2008
Springer
153views Education» more  CORR 2008»
14 years 18 days ago
Efficient and Robust Secure Aggregation for Sensor Networks
Abstract-- Wireless Sensor Networks (WSNs) rely on innetwork aggregation for efficiency, however, this comes at a price: A single adversary can severely influence the outcome by co...
Parisa Haghani, Panagiotis Papadimitratos, Marcin ...
CORR
2008
Springer
68views Education» more  CORR 2008»
14 years 18 days ago
Impact of Vehicular Communications Security on Transportation Safety
Transportation safety, one of the main driving forces of the development of vehicular communication (VC) systems, relies on high-rate safety messaging (beaconing). At the same time...
Panos Papadimitratos, Giorgio Calandriello, Jean-P...
CORR
2008
Springer
141views Education» more  CORR 2008»
14 years 18 days ago
Distributed Source Coding using Abelian Group Codes
In this work, we consider a distributed source coding problem with a joint distortion criterion depending on the sources and the reconstruction. This includes as a special case the...
Dinesh Krithivasan, S. Sandeep Pradhan
CORR
2008
Springer
54views Education» more  CORR 2008»
14 years 18 days ago
Parameterized Telescoping Proves Algebraic Independence of Sums
Usually creative telescoping is used to derive recurrences for sums. In this article we show that the non-existence of a creative telescoping solution, and more generally, of a par...
Carsten Schneider
CORR
2008
Springer
106views Education» more  CORR 2008»
14 years 18 days ago
GossiCrypt: Wireless Sensor Network Data Confidentiality Against Parasitic Adversaries
Resource and cost constraints remain a challenge for wireless sensor network security. In this paper, we propose a new approach to protect confidentiality against a parasitic adver...
Jun Luo, Panos Papadimitratos, Jean-Pierre Hubaux
CORR
2008
Springer
70views Education» more  CORR 2008»
14 years 18 days ago
A Refined Difference Field Theory for Symbolic Summation
In this article we present a refined summation theory based on Karr's difference field approach. The resulting algorithms find sum representations with optimal nested depth. ...
Carsten Schneider
CORR
2008
Springer
113views Education» more  CORR 2008»
14 years 18 days ago
A Simple E-Voting Protocol
We propose an e-voting protocol that seems to allow citizens to verify that their vote has been accurately taken into account while preserving its secrecy, without requiring the u...
Frederic Connes
CORR
2008
Springer
68views Education» more  CORR 2008»
14 years 18 days ago
Comparing human and automatic thesaurus mapping approaches in the agricultural domain
Knowledge organization systems (KOS), like thesauri and other controlled vocabularies, are used to provide subject access to information systems across the web. Due to the heterog...
Boris Lauser, Gudrun Johannsen, Caterina Caracciol...