Sciweavers

CORR
2008
Springer
105views Education» more  CORR 2008»
13 years 10 months ago
Success Exponent of Wiretapper: A Tradeoff between Secrecy and Reliability
Equivocation has been widely used as a measure of security after Shannon[10]. For an infinite system such as the wiretap channel defined in [2], equivocation is unbounded and so e...
Chung Chan
CORR
2008
Springer
96views Education» more  CORR 2008»
13 years 10 months ago
Public Discourse in the Web Does Not Exhibit Group Polarization
We performed a massive study of the dynamics of group deliberation among several websites containing millions of opinions on topics ranging from books to media. Contrary to the co...
Fang Wu, Bernardo A. Huberman
CORR
2008
Springer
91views Education» more  CORR 2008»
13 years 10 months ago
Significant Diagnostic Counterexamples in Probabilistic Model Checking
Abstract. This paper presents a novel technique for counterexample generation in probabilistic model checking of Markov chains and Markov Decision Processes. (Finite) paths in coun...
Miguel E. Andrés, Pedro R. D'Argenio, Peter...
CORR
2008
Springer
148views Education» more  CORR 2008»
13 years 10 months ago
Integrating Job Parallelism in Real-Time Scheduling Theory
We investigate the global scheduling of sporadic, implicit deadline, real-time task systems on multiprocessor platforms. We provide a task model which integrates job parallelism. ...
Sébastien Collette, Liliana Cucu, Joël...
CORR
2008
Springer
100views Education» more  CORR 2008»
13 years 10 months ago
Statistical region-based active contours with exponential family observations
In this paper, we focus on statistical region-based active contour models where image features (e.g. intensity) are random variables whose distribution belongs to some parametric ...
François Lecellier, Stéphanie Jehan-...
CORR
2008
Springer
100views Education» more  CORR 2008»
13 years 10 months ago
Lossy Source Transmission over the Relay Channel
Lossy transmission over a relay channel in which the relay has access to correlated side information is considered. First, a joint source-channel decode-and-forward scheme is propo...
Deniz Gündüz, Elza Erkip, Andrea J. Gold...
CORR
2008
Springer
72views Education» more  CORR 2008»
13 years 10 months ago
Lossless Compression with Security Constraints
Secure distributed data compression in the presence of an eavesdropper is explored. Two correlated sources that need to be reliably transmitted to a legitimate receiver are availab...
Deniz Gündüz, Elza Erkip, H. Vincent Poo...
CORR
2008
Springer
105views Education» more  CORR 2008»
13 years 10 months ago
Design Patterns for Complex Event Processing
Currently engineering efficient and successful event-driven applications based on the emerging Complex Event Processing (CEP) technology, is a laborious trial and error process. T...
Adrian Paschke
CORR
2008
Springer
120views Education» more  CORR 2008»
13 years 10 months ago
Codeword-Independent Performance of Nonbinary Linear Codes Under Linear-Programming and Sum-Product Decoding
A coded modulation system is considered in which nonbinary coded symbols are mapped directly to nonbinary modulation signals. It is proved that if the modulator-channel combination...
Mark F. Flanagan
CORR
2008
Springer
375views Education» more  CORR 2008»
13 years 10 months ago
The Margitron: A Generalised Perceptron with Margin
We identify the classical Perceptron algorithm with margin as a member of a broader family of large margin classifiers which we collectively call the Margitron. The Margitron, (des...
Constantinos Panagiotakopoulos, Petroula Tsampouka