Sciweavers

CORR
2010
Springer
90views Education» more  CORR 2010»
14 years 3 months ago
Table manipulation in simplicial databases
In [Spi], we developed a category of databases in which the schema of a database is represented as a simplicial set. Each simplex corresponds to a table in the database. There, our...
David I. Spivak
CORR
2010
Springer
183views Education» more  CORR 2010»
14 years 3 months ago
Forming the COUNCIL Based Clusters in Securing Wireless Ad Hoc Networks
-- In cluster-based routing protocol (CBRP), two-level hierarchical structure is successfully used to reduce over-flooding in wireless ad hoc networks. As it is vulnerable to a sin...
Alok Ojha, Hongmei Deng, Dharma P. Agrawal, Sugata...
CORR
2010
Springer
144views Education» more  CORR 2010»
14 years 3 months ago
Stochastic Games for Security in Networks with Interdependent Nodes
This paper studies a stochastic game theoretic approach to security and intrusion detection in communication and computer networks. Specifically, an Attacker and a Defender take pa...
Kien C. Nguyen, Tansu Alpcan, Tamer Basar
CORR
2010
Springer
204views Education» more  CORR 2010»
14 years 3 months ago
Limited Feedback Multi-Antenna Quantization Codebook Design-Part II: Multiuser Channels
This is the second part of a two-part paper on optimal design of limited feedback single-user and multiuser spatial multiplexing systems. The first part of the paper studies the si...
Behrouz Khoshnevis, Wei Yu
CORR
2010
Springer
176views Education» more  CORR 2010»
14 years 3 months ago
Limited Feedback Multi-Antenna Quantization Codebook Design-Part I: Single-User Channels
Abstract--In this two-part paper, we study the design and optimization of limited feedback single-user and multiuser systems with a multiple-antenna base station and single-antenna...
Behrouz Khoshnevis, Wei Yu
CORR
2010
Springer
45views Education» more  CORR 2010»
14 years 3 months ago
Rivals for the crown: Reply to Opthof and Leydesdorff
Anthony F. J. van Raan, Thed N. van Leeuwen, Marti...
CORR
2010
Springer
121views Education» more  CORR 2010»
14 years 3 months ago
Asynchronous Bounded Expected Delay Networks
We propose a natural generalisation of asynchronous bounded delay (ABD) network models. The commonly used ABD models assume a known bound on message delay. This assumption is ofte...
Rena Bakhshi, Jörg Endrullis, Wan Fokkink, Ju...
CORR
2010
Springer
109views Education» more  CORR 2010»
14 years 3 months ago
Fast space-variant elliptical filtering using box splines
The efficient realization of linear space-variant (non-convolution) filters is a challenging computational problem in image processing. In this paper, we demonstrate that it is po...
Kunal Narayan Chaudhury, Arrate Muñoz-Barru...
CORR
2010
Springer
163views Education» more  CORR 2010»
14 years 3 months ago
Distributed Principal Component Analysis for Wireless Sensor Networks
Abstract: The Principal Component Analysis (PCA) is a data dimensionality reduction technique well-suited for processing data from sensor networks. It can be applied to tasks like ...
Yann-Aël Le Borgne, Sylvain Raybaud, Gianluca...
CORR
2010
Springer
52views Education» more  CORR 2010»
14 years 3 months ago
Vulnerability of MRD-Code-based Universal Secure Network Coding against Stronger Eavesdroppers
Eitaro Shioji, Ryutaroh Matsumoto, Tomohiko Uyemat...