Sciweavers

CORR
2010
Springer
155views Education» more  CORR 2010»
13 years 11 months ago
Data-driven Co-clustering Model of Internet Usage in Large Mobile Societies
Design and simulation of future mobile networks will center around human interests and behavior. We propose a design paradigm for mobile networks driven by realistic models of use...
Saeed Moghaddam, Ahmed Helmy, Sanjay Ranka, Manas ...
CORR
2010
Springer
112views Education» more  CORR 2010»
13 years 11 months ago
Little Dragon Two: An efficient Multivariate Public Key Cryptosystem
In 1998 [8], Patarin proposed an efficient cryptosystem called Little Dragon which was a variant of Matsumoto Imai cryptosystem C . However Patarin later found that Little Dragon ...
Rajesh P. Singh, Anupam Saikia, B. K. Sarma
CORR
2010
Springer
110views Education» more  CORR 2010»
13 years 11 months ago
(Unconditional) Secure Multiparty Computation with Man-in-the-middle Attacks
In secure multi-party computation n parties jointly evaluate an n-variate function f in the presence of an adversary which can corrupt up till t parties. All honest parties are req...
Shailesh Vaya
CORR
2010
Springer
46views Education» more  CORR 2010»
13 years 11 months ago
A Formalization of the Turing Test
Evgeny Chutchev
CORR
2010
Springer
93views Education» more  CORR 2010»
13 years 11 months ago
Group-Strategyproof Irresolute Social Choice Functions
We axiomatically characterize the class of pairwise irresolute social choice functions that are group-strategyproof according to Kelly's preference extension. The class is na...
Felix Brandt
CORR
2010
Springer
98views Education» more  CORR 2010»
13 years 11 months ago
Analog Matching of Colored Sources to Colored Channels
Analog (uncoded) transmission provides a simple scheme for communicating a Gaussian source over a Gaussian channel under the mean squared error (MSE) distortion measure. Unfortuna...
Yuval Kochman, Ram Zamir
CORR
2010
Springer
173views Education» more  CORR 2010»
13 years 11 months ago
Automatic Modular Abstractions for Template Numerical Constraints
c Modular Abstractions for Template Numerical Constraints David Monniaux May 26, 2010 We propose a method for automatically generating abstract transformstatic analysis by abstrac...
David Monniaux
CORR
2010
Springer
180views Education» more  CORR 2010»
13 years 11 months ago
A Network Coding Approach to Loss Tomography
Network tomography aims at inferring internal network characteristics based on measurements at the edge of the network. In loss tomography, in particular, the characteristic of in...
Athina Markopoulou, Christina Fragouli, Minas Gjok...
CORR
2010
Springer
141views Education» more  CORR 2010»
13 years 11 months ago
A database approach to information retrieval: The remarkable relationship between language models and region models
In this report, we unify two quite distinct approaches to information retrieval: region models and language models. Region models were developed for structured document retrieval....
Djoerd Hiemstra, Vojkan Mihajlovic
CORR
2010
Springer
85views Education» more  CORR 2010»
13 years 11 months ago
The Lambek-Grishin calculus is NP-complete
The Lambek-Grishin calculus LG is the symmetric extension of the non-associative Lambek calculus NL. In this paper we prove that the derivability problem for LG is NP-complete.
Jeroen Bransen