Sciweavers

CORR
2010
Springer
89views Education» more  CORR 2010»
13 years 11 months ago
Coding objects related to Catalan numbers
A coding method using binary sequences is presented for different computation problems related to Catalan numbers. This method proves in a very easy way the equivalence of these pr...
Antal Bege, Zoltán Kása
CORR
2010
Springer
102views Education» more  CORR 2010»
13 years 11 months ago
On the Design of Efficient CSMA Algorithms for Wireless Networks
Recently, it has been shown that CSMA algorithms which use queue length-based link weights can achieve throughput optimality in wireless networks. In particular, a key result by Ra...
Javad Ghaderi, R. Srikant
CORR
2010
Springer
141views Education» more  CORR 2010»
13 years 11 months ago
FIFO anomaly is unbounded
Abstract. Virtual memory of computers is usually implemented by demand paging. For some page replacement algorithms the number of page faults may increase as the number of page fra...
Peter Fornai, Antal Iványi
CORR
2010
Springer
41views Education» more  CORR 2010»
13 years 11 months ago
Cleaning Interval Graphs
Dániel Marx, Ildikó Schlotter
CORR
2010
Springer
123views Education» more  CORR 2010»
13 years 11 months ago
Integrating Innate and Adaptive Immunity for Intrusion Detection
Abstract. Network Intrusion Detection Systems (NIDS) monitor a network with the aim of discerning malicious from benign activity on that network. While a wide range of approaches h...
Gianni Tedesco, Jamie Twycross, Uwe Aickelin
CORR
2010
Springer
59views Education» more  CORR 2010»
13 years 11 months ago
Hybrid approach for Image Encryption Using SCAN Patterns and Carrier Images
We propose a hybrid technique for image encryption which employs the concept of carrier image and SCAN patterns generated by SCAN methodology. Although it involves existing method ...
Panduranga H. T, Naveen Kumar S. K
CORR
2010
Springer
67views Education» more  CORR 2010»
13 years 11 months ago
From Frequency to Meaning: Vector Space Models of Semantics
Computers understand very little of the meaning of human language. This profoundly limits our ability to give instructions to computers, the ability of computers to explain their ...
Peter D. Turney, Patrick Pantel
CORR
2010
Springer
58views Education» more  CORR 2010»
13 years 11 months ago
Verifying Recursive Active Documents with Positive Data Tree Rewriting
This paper considers a tree-rewriting framework for modeling documents evolving through service calls. We focus on the automatic verification of properties of documents that may c...
Blaise Genest, Anca Muscholl, Zhilin Wu
CORR
2010
Springer
104views Education» more  CORR 2010»
13 years 11 months ago
Support Recovery of Sparse Signals
We study the tradeoffs between the number of measurements, the signal sparsity level, and the measurement noise level for exact support recovery of sparse signals via random noisy ...
Yuzhe Jin, Young-Han Kim, Bhaskar D. Rao
CORR
2010
Springer
129views Education» more  CORR 2010»
13 years 11 months ago
The complexity of positive first-order logic without equality
We study the complexity of evaluating positive equality-free sentences of first-order (FO) logic over a fixed, finite structure B. This may be seen as a natural generalisation of ...
Florent R. Madelaine, Barnaby Martin