Sciweavers

CORR
2010
Springer
85views Education» more  CORR 2010»
13 years 11 months ago
Generic design of Chinese remaindering schemes
We propose a generic design for Chinese remainder algorithms. A Chinese remainder computation consists in reconstructing an integer value from its residues modulo non coprime inte...
Jean-Guillaume Dumas, Thierry Gautier, Jean-Louis ...
CORR
2010
Springer
89views Education» more  CORR 2010»
13 years 11 months ago
Distributed Control of the Laplacian Spectral Moments of a Network
It is well-known that the eigenvalue spectrum of the Laplacian matrix of a network contains valuable information about the network structure and the behavior of many dynamical proc...
Victor M. Preciado, Michael M. Zavlanos, Ali Jadba...
CORR
2010
Springer
66views Education» more  CORR 2010»
13 years 11 months ago
A Simple Message-Passing Algorithm for Compressed Sensing
We consider the recovery of a nonnegative vector x from measurements y = Ax, where A {0, 1}m
Venkat Chandar, Devavrat Shah, Gregory W. Wornell
CORR
2010
Springer
158views Education» more  CORR 2010»
13 years 11 months ago
A Minimal Propositional Type Theory
Propositional type theory, first studied by Henkin, is the restriction of simple type theory to a single base type that is interpreted as the set of the two truth values. We show ...
Mark Kaminski, Gert Smolka
CORR
2010
Springer
147views Education» more  CORR 2010»
13 years 11 months ago
Multistage Relaying Using Interference Networks
Wireless networks with multiple nodes that relay information from a source to a destination are expected to be deployed in many applications. In this work, we consider multihoppin...
Bama Muthuramalingam, Srikrishna Bhashyam, Andrew ...
CORR
2010
Springer
88views Education» more  CORR 2010»
13 years 11 months ago
Network Codes Resilient to Jamming and Eavesdropping
Abstract--We consider the problem of communicating information over a network secretly and reliably in the presence of a hidden adversary who can eavesdrop and inject malicious err...
Hongyi Yao, Danilo Silva, Sidharth Jaggi, Michael ...
CORR
2010
Springer
112views Education» more  CORR 2010»
13 years 11 months ago
Type-Safe Feature-Oriented Product Lines
Sven Apel, Christian Kästner, Armin Grö&...
CORR
2010
Springer
134views Education» more  CORR 2010»
13 years 11 months ago
Effective Defect Prevention Approach in Software Process for Achieving Better Quality Levels
Defect prevention is the most vital but habitually neglected facet of software quality assurance in any project. If functional at all stages of software development, it can condens...
V. Suma, T. R. Gopalakrishnan Nair
CORR
2010
Springer
214views Education» more  CORR 2010»
13 years 11 months ago
Hybrid Medical Image Classification Using Association Rule Mining with Decision Tree Algorithm
The main focus of image mining in the proposed method is concerned with the classification of brain tumor in the CT scan brain images. The major steps involved in the system are: p...
P. Rajendran, M. Madheswaran