Sciweavers

CORR
2010
Springer
48views Education» more  CORR 2010»
13 years 11 months ago
A General Coding Scheme for Two-User Fading Interference Channels
Lalitha Sankar, Elza Erkip, H. Vincent Poor
CORR
2010
Springer
141views Education» more  CORR 2010»
13 years 11 months ago
Termination Detection of Local Computations
Contrary to the sequential world, the processes involved in a distributed system do not necessarily know when a computation is globally finished. This paper investigates the proble...
Emmanuel Godard, Yves Métivier, Gerard Tel
CORR
2010
Springer
131views Education» more  CORR 2010»
13 years 11 months ago
Detecting Botnets Through Log Correlation
Botnets, which consist of thousands of compromised machines, can cause significant threats to other systems by launching Distributed Denial of Service (DDoS) attacks, keylogging, a...
Yousof Al-Hammadi, Uwe Aickelin
CORR
2010
Springer
60views Education» more  CORR 2010»
13 years 11 months ago
Multiple Access Network Information-flow And Correction codes
Hongyi Yao, Theodoros K. Dikaliotis, Sidharth Jagg...
CORR
2010
Springer
125views Education» more  CORR 2010»
13 years 11 months ago
Delay-rate tradeoff for ergodic interference alignment in the Gaussian case
In interference alignment, users sharing a wireless channel are each able to achieve data rates of up to half of the non-interfering channel capacity, no matter the number of users...
Joseph C. Koo, William Wu, John T. Gill III
CORR
2010
Springer
57views Education» more  CORR 2010»
13 years 11 months ago
A new proof of Delsarte, Goethals and Mac Williams theorem on minimal weight codewords of generalized Reed-Muller code
We give a new proof of Delsarte, Goethals and Mac williams theorem on minimal weight codewords of generalized Reed-Muller codes published in 1970. To prove this theorem, we consid...
Elodie Leducq
CORR
2010
Springer
136views Education» more  CORR 2010»
13 years 11 months ago
On the Sets of Real Numbers Recognized by Finite Automata in Multiple Bases
This article studies the expressive power of finite automata recognizing sets of real numbers encoded in positional notation. We consider Muller automata as well as the restricted ...
Bernard Boigelot, Julien Brusten, Véronique...
CORR
2010
Springer
111views Education» more  CORR 2010»
13 years 11 months ago
A Tight Bound on the Performance of a Minimal-Delay Joint Source-Channel Coding Scheme
An analog source is to be transmitted across a Gaussian channel in more than one channel use per source symbol. This paper derives a lower bound on the asymptotic mean squared erro...
Marius Kleiner, Bixio Rimoldi
CORR
2010
Springer
92views Education» more  CORR 2010»
13 years 11 months ago
Outage Efficient Strategies for Network MIMO with Partial CSIT
We consider a multi-cell MIMO downlink (network MIMO) where B base-stations (BS) with M antennas, connected to a central station (CS), transmit K messages to K singleantenna user t...
Mari Kobayashi, Sheng Yang, Mérouane Debbah...
CORR
2010
Springer
143views Education» more  CORR 2010»
13 years 11 months ago
Dendritic Cells for Anomaly Detection
Artificial immune systems, more specifically the negative selection algorithm, have previously been applied to intrusion detection. The aim of this research is to develop an intrus...
Julie Greensmith, Jamie Twycross, Uwe Aickelin