Sciweavers

CORR
2010
Springer
90views Education» more  CORR 2010»
13 years 11 months ago
Table manipulation in simplicial databases
In [Spi], we developed a category of databases in which the schema of a database is represented as a simplicial set. Each simplex corresponds to a table in the database. There, our...
David I. Spivak
CORR
2010
Springer
183views Education» more  CORR 2010»
13 years 11 months ago
Forming the COUNCIL Based Clusters in Securing Wireless Ad Hoc Networks
-- In cluster-based routing protocol (CBRP), two-level hierarchical structure is successfully used to reduce over-flooding in wireless ad hoc networks. As it is vulnerable to a sin...
Alok Ojha, Hongmei Deng, Dharma P. Agrawal, Sugata...
CORR
2010
Springer
144views Education» more  CORR 2010»
13 years 11 months ago
Stochastic Games for Security in Networks with Interdependent Nodes
This paper studies a stochastic game theoretic approach to security and intrusion detection in communication and computer networks. Specifically, an Attacker and a Defender take pa...
Kien C. Nguyen, Tansu Alpcan, Tamer Basar
CORR
2010
Springer
204views Education» more  CORR 2010»
13 years 11 months ago
Limited Feedback Multi-Antenna Quantization Codebook Design-Part II: Multiuser Channels
This is the second part of a two-part paper on optimal design of limited feedback single-user and multiuser spatial multiplexing systems. The first part of the paper studies the si...
Behrouz Khoshnevis, Wei Yu
CORR
2010
Springer
176views Education» more  CORR 2010»
13 years 11 months ago
Limited Feedback Multi-Antenna Quantization Codebook Design-Part I: Single-User Channels
Abstract--In this two-part paper, we study the design and optimization of limited feedback single-user and multiuser systems with a multiple-antenna base station and single-antenna...
Behrouz Khoshnevis, Wei Yu
CORR
2010
Springer
45views Education» more  CORR 2010»
13 years 11 months ago
Rivals for the crown: Reply to Opthof and Leydesdorff
Anthony F. J. van Raan, Thed N. van Leeuwen, Marti...
CORR
2010
Springer
121views Education» more  CORR 2010»
13 years 11 months ago
Asynchronous Bounded Expected Delay Networks
We propose a natural generalisation of asynchronous bounded delay (ABD) network models. The commonly used ABD models assume a known bound on message delay. This assumption is ofte...
Rena Bakhshi, Jörg Endrullis, Wan Fokkink, Ju...
CORR
2010
Springer
109views Education» more  CORR 2010»
13 years 11 months ago
Fast space-variant elliptical filtering using box splines
The efficient realization of linear space-variant (non-convolution) filters is a challenging computational problem in image processing. In this paper, we demonstrate that it is po...
Kunal Narayan Chaudhury, Arrate Muñoz-Barru...
CORR
2010
Springer
163views Education» more  CORR 2010»
13 years 11 months ago
Distributed Principal Component Analysis for Wireless Sensor Networks
Abstract: The Principal Component Analysis (PCA) is a data dimensionality reduction technique well-suited for processing data from sensor networks. It can be applied to tasks like ...
Yann-Aël Le Borgne, Sylvain Raybaud, Gianluca...
CORR
2010
Springer
52views Education» more  CORR 2010»
13 years 11 months ago
Vulnerability of MRD-Code-based Universal Secure Network Coding against Stronger Eavesdroppers
Eitaro Shioji, Ryutaroh Matsumoto, Tomohiko Uyemat...