Sciweavers

CORR
2010
Springer
110views Education» more  CORR 2010»
13 years 9 months ago
Time Critical Social Mobilization: The DARPA Network Challenge Winning Strategy
Galen Pickard, Iyad Rahwan, Wei Pan, Manuel Cebri&...
CORR
2010
Springer
150views Education» more  CORR 2010»
13 years 9 months ago
Don't 'have a clue'? Unsupervised co-learning of downward-entailing operators
Researchers in textual entailment have begun to consider inferences involving downward-entailing operators, an interesting and important class of lexical items that change the way...
Cristian Danescu-Niculescu-Mizil, Lillian Lee
CORR
2010
Springer
43views Education» more  CORR 2010»
13 years 9 months ago
Exact Localization and Superresolution with Noisy Data and Random Illumination
This paper studies the problem of exact localization of multiple objects with noisy data. The crux of the proposed approach consists of random illumination. Two recovery methods ar...
Albert Fannjiang
CORR
2010
Springer
72views Education» more  CORR 2010»
13 years 9 months ago
Sequential Rationality in Cryptographic Protocols
Much of the literature on rational cryptography focuses on analyzing the strategic properties of cryptographic protocols. However, due to the presence of computationallybounded pl...
Ronen Gradwohl, Noam Livne, Alon Rosen
CORR
2010
Springer
184views Education» more  CORR 2010»
13 years 9 months ago
Comparison of different Broadcast Schemes for Multi-Hop Wireless Sensor Networks
In this paper, we present the performance of different broadcast schemes for multihop sensor networks based on mathematical modeling. In near future many applications will demand ...
S. Mehta, K. S. Kwak
CORR
2010
Springer
126views Education» more  CORR 2010»
13 years 9 months ago
Well-definedness of Streams by Transformation and Termination
Streams are infinite sequences over a given data type. A stream specification is a set of equations intended to define a stream. We propose a transformation from such a stream spec...
Hans Zantema
CORR
2010
Springer
146views Education» more  CORR 2010»
13 years 9 months ago
An Empirical Study on Content Bundling in BitTorrent Swarming System
Despite the tremendous success of BitTorrent, its swarming system suffers from a fundamental limitation: lower or no availability of unpopular contents. Recently, Menasche et al. ...
Jinyoung Han, Taejoong Chung, Seungbae Kim, Hyunch...
CORR
2010
Springer
80views Education» more  CORR 2010»
13 years 9 months ago
Cooperative Secret Communication with Artificial Noise in Symmetric Interference Channel
We consider the symmetric Gaussian interference channel where two users try to enhance their secrecy rates in a cooperative manner. Artificial noise is introduced along with useful...
Jingge Zhu, Jianhua Mo, Meixia Tao
CORR
2010
Springer
69views Education» more  CORR 2010»
13 years 9 months ago
Epistemic irrelevance in credal nets: the case of imprecise Markov trees
We focus on credal nets, which are graphical models that generalise Bayesian nets to imprecise probability. We replace the notion of strong independence commonly used in credal ne...
Gert de Cooman, Filip Hermans, Alessandro Antonucc...
CORR
2010
Springer
52views Education» more  CORR 2010»
13 years 9 months ago
Application Neutrality and a Paradox of Side Payments
Eitan Altman, Stéphane Caron, George Kesidi...