Sciweavers

CORR
2010
Springer
79views Education» more  CORR 2010»
13 years 11 months ago
Variable elimination for building interpreters
In this paper, we build an interpreter by reusing host language functions instead of recoding mechanisms of function application that are already available in the host language (t...
Julien Cohen, Jean-Louis Giavitto, Olivier Michel
CORR
2010
Springer
45views Education» more  CORR 2010»
13 years 11 months ago
Solution to the Counterfeit Coin Problem and its Generalization
: This work deals with a classic problem: "Given a set of coins among which there is a counterfeit coin of a different weight, find this counterfeit coin using ordinary balanc...
Juan Dominguez-Montes
CORR
2010
Springer
186views Education» more  CORR 2010»
13 years 11 months ago
Cooperative Sequential Spectrum Sensing Algorithms for OFDM
This paper considers the problem of spectrum sensing in cognitive radio networks when the primary user is using Orthogonal Frequency Division Multiplexing (OFDM). For this we devel...
ArunKumar Jayaprakasam, Vinod Sharma, Chandra R. M...
CORR
2010
Springer
111views Education» more  CORR 2010»
13 years 11 months ago
Coordination and Bargaining over the Gaussian Interference Channel
This work considers coordination and bargaining between two selfish users over a Gaussian interference channel using game theory. The usual information theoretic approach assumes f...
Xi Liu, Elza Erkip
CORR
2010
Springer
62views Education» more  CORR 2010»
13 years 11 months ago
Views, Program Transformations, and the Evolutivity Problem
In this article, we argue that a program transformation approach is a good way to solve the tyranny of the primary decomposition. We illustrate our transformation-based approach o...
Julien Cohen, Rémi Douence
CORR
2010
Springer
105views Education» more  CORR 2010»
13 years 11 months ago
The Impact of Topology on Byzantine Containment in Stabilization
Self-stabilization is an versatile approach to fault-tolerance since it permits a distributed system to recover from any transient fault that arbitrarily corrupts the contents of ...
Swan Dubois, Toshimitsu Masuzawa, Sébastien...
CORR
2010
Springer
54views Education» more  CORR 2010»
13 years 11 months ago
Polynomial integration on regions defined by a triangle and a conic
We present an efficient solution to the following problem, of relevance in a numerical optimization scheme: calculation of integrals of the type ZZ T {f0} 12 dx dy for quadratic p...
David Sevilla, Daniel Wachsmuth
CORR
2010
Springer
175views Education» more  CORR 2010»
13 years 11 months ago
Detecting Security threats in the Router using Computational Intelligence
Information security is an issue of global concern. As the Internet is delivering great convenience and benefits to the modern society, the rapidly increasing connectivity and acc...
J. Visumathi, K. L. Shunmuganathan
CORR
2010
Springer
90views Education» more  CORR 2010»
13 years 11 months ago
No embedding of the automorphisms of a topological space into a compact metric space endows them with a composition that passes
The Hausdorff distance, the Gromov-Hausdorff, the Fr
Patrizio Frosini, Claudia Landi
CORR
2010
Springer
113views Education» more  CORR 2010»
13 years 11 months ago
A two-step fusion process for multi-criteria decision applied to natural hazards in mountains
Abstract--Mountain river torrents and snow avalanches generate human and material damages with dramatic consequences. Knowledge about natural phenomenona is often lacking and exper...
Jean-Marc Tacnet, Mireille Batton-Hubert, Jean Dez...