Sciweavers

CORR
2010
Springer
132views Education» more  CORR 2010»
13 years 11 months ago
Distance Constraint Satisfaction Problems
Manuel Bodirsky, Víctor Dalmau, Barnaby Mar...
CORR
2010
Springer
42views Education» more  CORR 2010»
13 years 11 months ago
A Global Optimisation Toolbox for Massively Parallel Engineering Optimisation
Francesco Biscani, Dario Izzo, Chit Hong Yam
CORR
2010
Springer
89views Education» more  CORR 2010»
13 years 11 months ago
The SIMO Pre-Log Can Be Larger Than the SISO Pre-Log
Abstract--We establish a lower bound on the noncoherent capacity pre-log of a temporally correlated Rayleigh block-fading single-input multiple-output (SIMO) channel. Surprisingly,...
Veniamin I. Morgenshtern, Giuseppe Durisi, Helmut ...
CORR
2010
Springer
51views Education» more  CORR 2010»
13 years 11 months ago
A Gibbs distribution that learns from GA dynamics
Manabu Kitagata, Jun-ichi Inoue
CORR
2010
Springer
104views Education» more  CORR 2010»
13 years 11 months ago
Approximating the minimum directed tree cover
Given a directed graph G with non negative cost on the arcs, a directed tree cover of G is a directed tree such that either head or tail (or both of them) of every arc in G is touc...
Viet Hung Nguyen
CORR
2010
Springer
171views Education» more  CORR 2010»
13 years 11 months ago
An Object-Oriented Metamodel for Bunge-Wand-Weber Ontology
A UML based metamodel for Bunge-Wand-Weber (BWW) ontology is presented. BWW ontology is a generic framework for analysis and conceptualization of real world objects. It includes c...
Arvind W. Kiwelekar, Rushikesh K. Joshi
CORR
2010
Springer
152views Education» more  CORR 2010»
13 years 11 months ago
Neuroevolutionary optimization
Temporal difference methods are theoretically grounded and empirically effective methods for addressing reinforcement learning problems. In most real-world reinforcement learning ...
Eva Volná
CORR
2010
Springer
135views Education» more  CORR 2010»
13 years 11 months ago
Cryptanalysis of an Elliptic Curve-based Signcryption Scheme
The signcryption is a relatively new cryptographic technique that is supposed to fulfill the functionalities of encryption and digital signature in a single logical step. Although...
Mohsen Toorani, Ali Asghar Beheshti Shirazi
CORR
2010
Springer
47views Education» more  CORR 2010»
13 years 11 months ago
Lower bounds for the error decay incurred by coarse quantization schemes
Several analog-to-digital conversion methods for bandlimited signals used in applications, such as quantization schemes, employ coarse quantization coupled with oversampling. The...
Felix Krahmer, Rachel Ward
CORR
2010
Springer
88views Education» more  CORR 2010»
13 years 11 months ago
Communication and Round Efficient Information Checking Protocol
In this paper, we present a very important primitive called Information Checking Protocol (ICP) which plays an important role in constructing statistical Verifiable Secret Sharing...
Arpita Patra, C. Pandu Rangan