Sciweavers

CORR
2010
Springer
175views Education» more  CORR 2010»
13 years 8 months ago
Improving the Performance of maxRPC
Max Restricted Path Consistency (maxRPC) is a local consistency for binary constraints that can achieve considerably stronger pruning than arc consistency. However, existing maxRPC...
Thanasis Balafoutis, Anastasia Paparrizou, Kostas ...
CORR
2010
Springer
140views Education» more  CORR 2010»
13 years 8 months ago
Runtime-Flexible Multi-dimensional Arrays and Views for C++98 and C++0x
Multi-dimensional arrays are among the most fundamental and most useful data structures of all. In C++, excellent template libraries exist for arrays whose dimension is fixed at ru...
Björn Andres, Ullrich Köthe, Thorben Kr&...
CORR
2010
Springer
230views Education» more  CORR 2010»
13 years 8 months ago
Query-Efficient Locally Decodable Codes of Subexponential Length
A k-query locally decodable code (LDC) C : n N encodes each message x into a codeword C(x) such that each symbol of x can be probabilistically recovered by querying only k coordina...
Yeow Meng Chee, Tao Feng, San Ling, Huaxiong Wang,...
CORR
2010
Springer
98views Education» more  CORR 2010»
13 years 8 months ago
Satisfaction Equilibrium: A General Framework for QoS Provisioning in Self-Configuring Networks
Abstract--This paper is concerned with the concept of equilibrium and quality of service (QoS) provisioning in self-configuring wireless networks with non-cooperative radio devices...
Samir Medina Perlaza, Hamidou Tembine, Samson Lasa...
CORR
2010
Springer
258views Education» more  CORR 2010»
13 years 8 months ago
A Non-Cooperative Game Theoretical Approach For Power Control In Virtual MIMO Wireless Sensor Network
Power management is one of the vital issue in wireless sensor networks, where the lifetime of the network relies on battery powered nodes. Transmitting at high power reduces the l...
R. Valli, P. Dananjayan
CORR
2010
Springer
179views Education» more  CORR 2010»
13 years 8 months ago
Comparison of Support Vector Machine and Back Propagation Neural Network in Evaluating the Enterprise Financial Distress
Recently, applying the novel data mining techniques for evaluating enterprise financial distress has received much research alternation. Support Vector Machine (SVM) and back prop...
Ming-Chang Lee, To Chang
CORR
2010
Springer
177views Education» more  CORR 2010»
13 years 8 months ago
AntiJam: Efficient Medium Access despite Adaptive and Reactive Jamming
Abstract--Intentional interference constitutes a major threat for communication networks operating over a shared medium where availability is imperative. Jamming attacks are often ...
Andréa W. Richa, Christian Scheideler, Stef...
CORR
2010
Springer
150views Education» more  CORR 2010»
13 years 8 months ago
On extracting common random bits from correlated sources
Suppose Alice and Bob receive strings of unbiased independent but noisy bits from some random source. They wish to use their respective strings to extract a common sequence of ran...
Andrej Bogdanov, Elchanan Mossel
CORR
2010
Springer
101views Education» more  CORR 2010»
13 years 8 months ago
Binary is Good: A Binary Inference Framework for Primary User Separation in Cognitive Radio Networks
Primary users (PU) separation concerns with the issues of distinguishing and characterizing primary users in cognitive radio (CR) networks. We argue the need for PU separation in t...
Huy Anh Nguyen, Rong Zheng, Zhu Han