Sciweavers

CORR
2010
Springer
77views Education» more  CORR 2010»
13 years 11 months ago
Stochastic Analysis of Non-slotted Aloha in Wireless Ad-Hoc Networks
: In this paper we propose two analytically tractable stochastic models of non-slotted Aloha for Mobile Ad-hoc NETworks (MANETs): one model assumes a static pattern of nodes while ...
Bartek Blaszczyszyn, Paul Mühlethaler
CORR
2010
Springer
45views Education» more  CORR 2010»
13 years 11 months ago
Algebraic Linear Orderings
Stephen L. Bloom, Zoltán Ésik
CORR
2010
Springer
136views Education» more  CORR 2010»
13 years 11 months ago
Max-min Fairness in 802.11 Mesh Networks
In this paper we build upon the recent observation that the 802.11 rate region is log-convex and, for the first time, characterise max-min fair rate allocations for a large class o...
Douglas J. Leith, Qizhi Cao, Vijay G. Subramanian
CORR
2010
Springer
143views Education» more  CORR 2010»
13 years 11 months ago
Parikh Images of Regular Languages: Complexity and Applications
We show that the Parikh image of the language of an NFA with n states over an alphabet of size k can be described as a finite union of linear sets with at most k generators and to...
Anthony Widjaja To
CORR
2010
Springer
125views Education» more  CORR 2010»
13 years 11 months ago
Iterated Regret Minimization in Game Graphs
Iterated regret minimization has been introduced recently by J.Y. Halpern and R. Pass in classical strategic games. For many games of interest, this new solution concept provides s...
Emmanuel Filiot, Tristan Le Gall, Jean-Franç...
CORR
2010
Springer
135views Education» more  CORR 2010»
13 years 11 months ago
Constant-Weight Gray Codes for Local Rank Modulation
We consider the local rank-modulation scheme in which a sliding window going over a sequence of real-valued variables induces a sequence of permutations. The local rankmodulation, ...
Moshe Schwartz
CORR
2010
Springer
61views Education» more  CORR 2010»
13 years 11 months ago
Utility and Privacy of Data Sources: Can Shannon Help Conceal and Reveal Information?
Abstract-- The problem of private information "leakage" (inadvertently or by malicious design) from the myriad large centralized searchable data repositories drives the n...
Lalitha Sankar, S. Raj Rajagopalan, H. Vincent Poo...
CORR
2010
Springer
107views Education» more  CORR 2010»
13 years 11 months ago
The Influence of Intensity Standardization on Medical Image Registration
Ulas Bagci, Jayaram K. Udupa, Li Bai
CORR
2010
Springer
177views Education» more  CORR 2010»
13 years 11 months ago
Understanding Formulation of Social Capital in Online Social Network Sites (SNS)
Online communities are the gatherings of like-minded people, brought together in cyberspace by shared interests. The shared interest has hidden social capital aspects and can be o...
S. S. Phulari, S. D. Khamitkar, N. K. Deshmukh, P....
CORR
2010
Springer
171views Education» more  CORR 2010»
13 years 11 months ago
Reliable Mining of Automatically Generated Test Cases from Software Requirements Specification (SRS)
Writing requirements is a two-way process. In this paper we use to classify Functional Requirements (FR) and Non Functional Requirements (NFR) statements from Software Requirement...
Lilly Raamesh, G. V. Uma