Sciweavers

CORR
2010
Springer
58views Education» more  CORR 2010»
13 years 8 months ago
Nefarious Numbers
Douglas N. Arnold, Kristine K. Fowler
CORR
2010
Springer
185views Education» more  CORR 2010»
13 years 8 months ago
Analysing the behaviour of robot teams through relational sequential pattern mining
This report outlines the use of a relational representation in a Multi-Agent domain to model the behaviour of the whole system. A desired property in this systems is the ability of...
Grazia Bombini, Raquel Ros, Stefano Ferilli, Ramon...
CORR
2010
Springer
48views Education» more  CORR 2010»
13 years 8 months ago
E-Net Models of a Software System for E-Mail Security
Nikolai Todorov Stoianov, Veselin Tsenov Tselkov
CORR
2010
Springer
208views Education» more  CORR 2010»
13 years 8 months ago
Real-time Robust Principal Components' Pursuit
In the recent work of Candes et al, the problem of recovering low rank matrix corrupted by i.i.d. sparse outliers is studied and a very elegant solution, principal component pursui...
Chenlu Qiu, Namrata Vaswani
CORR
2010
Springer
130views Education» more  CORR 2010»
13 years 8 months ago
Oblivious Buy-at-Bulk in Planar Graphs
In the oblivious buy-at-bulk network design problem in a graph, the task is to compute a fixed set of paths for every pair of source-destination in the graph, such that any set of ...
Srinivasagopalan Srivathsan, Costas Busch, S. Sith...
CORR
2010
Springer
136views Education» more  CORR 2010»
13 years 8 months ago
Comparing Prediction Market Structures, With an Application to Market Making
Ensuring sufficient liquidity is one of the key challenges for designers of prediction markets. Various market making algorithms have been proposed in the literature and deployed ...
Aseem Brahma, Sanmay Das, Malik Magdon-Ismail
CORR
2010
Springer
82views Education» more  CORR 2010»
13 years 8 months ago
Secret-key Agreement with Channel State Information at the Transmitter
We study the capacity of secret-key agreement over a wiretap channel with state parameters. The transmitter communicates to the legitimate receiver and the eavesdropper over a disc...
Ashish Khisti, Suhas N. Diggavi, Gregory W. Wornel...
CORR
2010
Springer
286views Education» more  CORR 2010»
13 years 8 months ago
PhishDef: URL Names Say It All
Phishing is an increasingly sophisticated method to steal personal user information using sites that pretend to be legitimate. In this paper, we take the following steps to identif...
Anh Le, Athina Markopoulou, Michalis Faloutsos
CORR
2010
Springer
83views Education» more  CORR 2010»
13 years 8 months ago
Mixed Cumulative Distribution Networks
Ricardo Silva, Charles Blundell, Yee Whye Teh
CORR
2010
Springer
160views Education» more  CORR 2010»
13 years 8 months ago
Routing with Mutual Information Accumulation in Wireless Networks
We investigate optimal routing and scheduling strategies for multi-hop wireless networks with rateless codes. Rateless codes allow each node of the network to accumulate mutual in...
Rahul Urgaonkar, Michael J. Neely