Sciweavers

CORR
2008
Springer
67views Education» more  CORR 2008»
13 years 11 months ago
Noncoherent Capacity of Underspread Fading Channels
Giuseppe Durisi, Ulrich G. Schuster, Helmut Bö...
CORR
2008
Springer
98views Education» more  CORR 2008»
13 years 11 months ago
Information Acquisition and Exploitation in Multichannel Wireless Networks
A wireless system with multiple channels is considered, where each channel has several transmission states. A user learns about the instantaneous state of an available channel by ...
Sudipto Guha, Kamesh Munagala, Saswati Sarkar
CORR
2008
Springer
62views Education» more  CORR 2008»
13 years 11 months ago
Computation of unirational fields
One of the main contributions which Volker Weispfenning made to mathematics is related to Gr
Jaime Gutierrez, David Sevilla
CORR
2008
Springer
158views Education» more  CORR 2008»
13 years 11 months ago
Distributed and Recursive Parameter Estimation in Parametrized Linear State-Space Models
We consider a network of sensors deployed to sense a spatio-temporal field and infer parameters of interest about the field. We are interested in the case where each sensor's...
S. Sundhar Ram, Venugopal V. Veeravalli, Angelia N...
CORR
2008
Springer
167views Education» more  CORR 2008»
13 years 11 months ago
Fast k Nearest Neighbor Search using GPU
Statistical measures coming from information theory represent interesting bases for image and video processing tasks such as image retrieval and video object tracking. For example...
Vincent Garcia, Eric Debreuve, Michel Barlaud
CORR
2008
Springer
125views Education» more  CORR 2008»
13 years 11 months ago
Adversary lower bounds for nonadaptive quantum algorithms
We present two general methods for proving lower bounds on the query complexity of nonadaptive quantum algorithms. Both methods are based on the adversary method of Ambainis. We sh...
Pascal Koiran, Jürgen Landes, Natacha Portier...
CORR
2008
Springer
125views Education» more  CORR 2008»
13 years 11 months ago
Data Reduction in Intrusion Alert Correlation
: Network intrusion detection sensors are usually built around low level models of network traffic. This means that their output is of a similarly low level and as a consequence, ...
Gianni Tedesco, Uwe Aickelin
CORR
2008
Springer
91views Education» more  CORR 2008»
13 years 11 months ago
The quest for rings on bipolar scales
Michel Grabisch, Bernard De Baets, János C....
CORR
2008
Springer
97views Education» more  CORR 2008»
13 years 11 months ago
Spreading Signals in the Wideband Limit
Abstract-- Wideband communications are asymptotically impossible with signals that are spread over a very wide band and are transmitted over a multipath channel unknown ahead of ti...
Elchanan Zwecher, Dana Porrat
CORR
2008
Springer
141views Education» more  CORR 2008»
13 years 11 months ago
Cryptanalysis of Yang-Wang-Chang's Password Authentication Scheme with Smart Cards
In 2005, Yang, Wang, and Chang proposed an improved timestamp-based password authentication scheme in an attempt to overcome the flaws of Yang-Shieh's legendary timestamp-base...
Al-Sakib Khan Pathan, Choong Seon Hong