Sciweavers

CORR
2008
Springer
70views Education» more  CORR 2008»
14 years 17 days ago
Random Vandermonde Matrices-Part II: Applications
In this paper, we review some potential applications of random Vandermonde matrices in the field of signal processing and wireless communications. Using asymptotic results based on...
Øyvind Ryan, Mérouane Debbah
CORR
2008
Springer
136views Education» more  CORR 2008»
14 years 17 days ago
Distributed Sensor Localization in Random Environments using Minimal Number of Anchor Nodes
Abstract--The paper introduces DILOC, a distributed, iterative algorithm to locate sensors (with unknown locations) in 1, with respect to a minimal number of + 1 anchors with known...
Usman A. Khan, Soummya Kar, José M. F. Mour...
CORR
2008
Springer
126views Education» more  CORR 2008»
14 years 17 days ago
Approximate Capacity of Gaussian Relay Networks
We present an achievable rate for general Gaussian relay networks. We show that the achievable rate is within a constant number of bits from the information-theoretic cut-set uppe...
Amir Salman Avestimehr, Suhas N. Diggavi, David N....
CORR
2008
Springer
109views Education» more  CORR 2008»
14 years 17 days ago
Wavelet and Curvelet Moments for Image Classification: Application to Aggregate Mixture Grading
We show the potential for classifying images of mixtures of aggregate, based themselves on varying, albeit well-defined, sizes and shapes, in order to provide a far more effective...
Fionn Murtagh, Jean-Luc Starck
CORR
2008
Springer
117views Education» more  CORR 2008»
14 years 17 days ago
Time Warp Edit Distance
: This technical report details a family of time warp distances on the set of discrete time series. This family is constructed as an editing distance whose elementary operations ap...
Pierre-Francois Marteau
CORR
2008
Springer
97views Education» more  CORR 2008»
14 years 17 days ago
Voice-controlled Debugging of Spreadsheets
Developments in Mobile Computing are putting pressure on the software industry to research new modes of interaction that do not rely on the traditional keyboard and mouse combinat...
Derek Flood, Kevin McDaid
CORR
2008
Springer
141views Education» more  CORR 2008»
14 years 17 days ago
Automatic Verification of Correspondences for Security Protocols
We present a new technique for verifying correspondences in security protocols. In particular, correspondences can be used to formalize authentication. Our technique is fully auto...
Bruno Blanchet
CORR
2008
Springer
94views Education» more  CORR 2008»
14 years 17 days ago
On the Structure of the Capacity Region of Asynchronous Memoryless Multiple-Access Channels
The asynchronous capacity region of memoryless multiple-access channels is the union of certain polytopes. It is well-known that vertices of such polytopes may be approached via a...
Ninoslav Marina, Bixio Rimoldi
CORR
2008
Springer
104views Education» more  CORR 2008»
14 years 17 days ago
Some Aspects of Testing Process for Transport Streams in Digital Video Broadcasting
: This paper presents some aspects related to the DVB (Digital Video Broadcasting) investigation. Thebasicaspectsof DVB are presented, with an emphasis on DVB-T version of standard...
Radu Arsinte, Ciprian Ilioaei
CORR
2008
Springer
121views Education» more  CORR 2008»
14 years 17 days ago
The Forgiving Tree: A Self-Healing Distributed Data Structure
We consider the problem of self-healing in peer-to-peer networks that are under repeated attack by an omniscient adversary. We assume that the following process continues for up t...
Tom Hayes, Navin Rustagi, Jared Saia, Amitabh Treh...