Sciweavers

CORR
2008
Springer
159views Education» more  CORR 2008»
14 years 17 days ago
Privacy Preserving ID3 over Horizontally, Vertically and Grid Partitioned Data
We consider privacy preserving decision tree induction via ID3 in the case where the training data is horizontally or vertically distributed. Furthermore, we consider the same pro...
Bart Kuijpers, Vanessa Lemmens, Bart Moelans, Karl...
CORR
2008
Springer
81views Education» more  CORR 2008»
14 years 17 days ago
Proactive Service Migration for Long-Running Byzantine Fault Tolerant Systems
In this paper, we describe a proactive recovery scheme based on service migration for long-running Byzantine fault tolerant systems. Proactive recovery is an essential method for ...
Wenbing Zhao
CORR
2008
Springer
103views Education» more  CORR 2008»
14 years 17 days ago
The Capacity Region of the Degraded Finite-State Broadcast Channel
We consider the discrete, time-varying broadcast channel with memory, under the assumption that the channel states belong to a set of nite cardinality. We begin with the de nition...
Ron Dabora, Andrea J. Goldsmith
CORR
2008
Springer
129views Education» more  CORR 2008»
14 years 17 days ago
Tight Bounds on the Capacity of Binary Input random CDMA Systems
Abstract-- We consider code division multiple access communication over a binary input additive white Gaussian noise channel using random spreading. For a general class of symmetri...
Satish Babu Korada, Nicolas Macris
CORR
2008
Springer
120views Education» more  CORR 2008»
14 years 17 days ago
Distributed Joint Source-Channel Coding on a Multiple Access Channel with Side Information
We consider the problem of transmission of several discrete sources over a multiple access channel (MAC) with side information at the sources and the decoder. Source-channel separa...
R. Rajesh, Vinod Sharma
CORR
2008
Springer
96views Education» more  CORR 2008»
14 years 17 days ago
Linear programming bounds for unitary space time codes
The linear programming method is applied to the space Un(C) of unitary matrices in order to obtain bounds for codes relative to the diversity sum and the diversity product. Theore...
Jean Creignou, Hervé Diet
CORR
2008
Springer
91views Education» more  CORR 2008»
14 years 17 days ago
Secure Lossless Compression with Side Information
Secure data compression in the presence of side information at both a legitimate receiver and an eavesdropper is explored. A noise-free, limited rate link between the source and th...
Deniz Gündüz, Elza Erkip, H. Vincent Poo...
CORR
2008
Springer
87views Education» more  CORR 2008»
14 years 17 days ago
The Rate Loss of Single-Letter Characterization: The "Dirty" Multiple Access Channel
For general memoryless systems, the typical information theoretic solution - when exists - has a "single-letter" form. This reflects the fact that optimum performance ca...
Tal Philosof, Ram Zamir
CORR
2008
Springer
181views Education» more  CORR 2008»
14 years 17 days ago
Hierarchical Grid-Based Pairwise Key Pre-distribution in Wireless Sensor Networks
The security of wireless sensor networks is an active topic of research where both symmetric and asymmetric key cryptography issues have been studied. Due to their computational f...
Abedelaziz Mohaisen, DaeHun Nyang, KyungHee Lee
CORR
2008
Springer
123views Education» more  CORR 2008»
14 years 17 days ago
Optimizing Web Sites for Customer Retention
With customer relationship management (CRM) companies move away from a mainly product-centered view to a customer-centered view. Resulting from this change, the effective manageme...
Michael Hahsler