Sciweavers

CORR
2010
Springer
108views Education» more  CORR 2010»
13 years 11 months ago
Compressed Sensing: How sharp is the Restricted Isometry Property
Compressed sensing is a recent technique by which signals can be measured at a rate proportional to their information content, combining the important task of compression directly ...
Jeffrey D. Blanchard, Coralia Cartis, Jared Tanner
CORR
2010
Springer
138views Education» more  CORR 2010»
13 years 11 months ago
Shallow Circuits with High-Powered Inputs
A polynomial identity testing algorithm must determine whether an input polynomial (given for instance by an arithmetic circuit) is identically equal to 0. In this paper, we show ...
Pascal Koiran
CORR
2010
Springer
171views Education» more  CORR 2010»
13 years 11 months ago
Recursive Information Hiding in Visual Cryptography
: Visual Cryptography is a secret sharing scheme that uses the human visual system to perform computations. This paper presents a recursive hiding scheme for 3 out of 5 secret shar...
Sandeep Katta
CORR
2010
Springer
108views Education» more  CORR 2010»
13 years 11 months ago
Born to be Wild: Using Communities of Practice as a Tool for Knowledge Management
This paper looks at what happens when Communities of Practice are used as a tool for Knowledge Management. The original concept of a Community of Practice appears to have very lit...
Valérie Chanal, Chris Kimble
CORR
2010
Springer
109views Education» more  CORR 2010»
13 years 11 months ago
Polynomial Learning of Distribution Families
Abstract--The question of polynomial learnability of probability distributions, particularly Gaussian mixture distributions, has recently received significant attention in theoreti...
Mikhail Belkin, Kaushik Sinha
CORR
2010
Springer
68views Education» more  CORR 2010»
13 years 11 months ago
Indoor Positioning with Radio Location Fingerprinting
Mikkel Baun Kjærgaard
CORR
2010
Springer
156views Education» more  CORR 2010»
13 years 11 months ago
On the Existence of Optimal Exact-Repair MDS Codes for Distributed Storage
The high repair cost of (n, k) Maximum Distance Separable (MDS) erasure codes has recently motivated a new class of codes, called Regenerating Codes, that optimally trade off stor...
Changho Suh, Kannan Ramchandran
CORR
2010
Springer
147views Education» more  CORR 2010»
13 years 11 months ago
Chunky and Equal-Spaced Polynomial Multiplication
Finding the product of two polynomials is an essential and basic problem in computer algebra. While most previous results have focused on the worst-case complexity, we instead emp...
Daniel S. Roche
CORR
2010
Springer
142views Education» more  CORR 2010»
13 years 11 months ago
The Accuracy of Tree-based Counting in Dynamic Networks
Tree-based protocols are ubiquitous in distributed systems. They are flexible, they perform generally well, and, in static conditions, their analysis is mostly simple. Under churn...
Supriya Krishnamurthy, John Ardelius, Erik Aurell,...
CORR
2010
Springer
179views Education» more  CORR 2010»
13 years 11 months ago
Highway Mobility and Vehicular Ad-Hoc Networks in NS-3
The study of vehicular ad-hoc networks (VANETs) requires efficient and accurate simulation tools. As the mobility of vehicles and driver behavior can be affected by network messag...
Hadi Arbabi, Michele C. Weigle