Sciweavers

CORR
2010
Springer
35views Education» more  CORR 2010»
13 years 10 months ago
The lattice of embedded subsets
Michel Grabisch
CORR
2010
Springer
52views Education» more  CORR 2010»
13 years 10 months ago
Cloud Migration: A Case Study of Migrating an Enterprise IT System to IaaS
Ali Khajeh-Hosseini, David Greenwood, Ian Sommervi...
CORR
2010
Springer
114views Education» more  CORR 2010»
13 years 10 months ago
Efficiently Discovering Hammock Paths from Induced Similarity Networks
ty networks are important abstractions in many information management applications such as recommender systems, corpora analysis, and medical informatics. For instance, in a recom...
M. Shahriar Hossain, Michael Narayan, Naren Ramakr...
CORR
2010
Springer
142views Education» more  CORR 2010»
13 years 10 months ago
Budget Feasible Mechanisms
We study a novel class of mechanism design problems in which the outcomes are constrained by the payments. This basic class of mechanism design problems captures many common econom...
Christos H. Papadimitriou, Yaron Singer
CORR
2010
Springer
59views Education» more  CORR 2010»
13 years 10 months ago
Refinement and Verification of Real-Time Systems
This paper discusses highly general mechanisms for specifying the refinement of a real-time system as a collection of lower level parallel components that preserve the timing and ...
Paul Z. Kolano, Carlo A. Furia, Richard A. Kemmere...
CORR
2010
Springer
135views Education» more  CORR 2010»
13 years 10 months ago
Modified EESM Based Link Adaptation Algorithm for Multimedia Transmission in Multicarrier Systems
The previous link adaptation algorithms on ofdm based systems use equal modulation order for all sub carrier index within a block. For multimedia transmission using ofdm as the mo...
R. Sandanalakshmi, Athilakshmi, K. Manivannan
CORR
2010
Springer
175views Education» more  CORR 2010»
13 years 10 months ago
Efficient Packet Forwarding Approach in Vehicular Ad Hoc Networks Using EBGR Algorithm
VANETs (Vehicular Ad hoc Networks) are highly mobile wireless ad hoc networks and will play an important role in public safety communications and commercial applications. Routing ...
K. Prasanth, K. Duraiswamy, K. Jayasudha, C. Chand...
CORR
2010
Springer
113views Education» more  CORR 2010»
13 years 10 months ago
A Strategy to enable Prefix of Multicast VoD through dynamic buffer allocation
In this paper we have proposed a dynamic buffer allocation algorithm for the prefix, based on the popularity of the videos. More cache blocks are allocated for most popular videos...
T. R. Gopalakrishnan Nair, P. Jayarekha
CORR
2010
Springer
219views Education» more  CORR 2010»
13 years 10 months ago
Cooperative Algorithms for MIMO Interference Channels
Interference alignment is a transmission technique for exploiting all available degrees of freedom in the symmetric frequency- or time-selective interference channel with an arbit...
Steven W. Peters, Robert W. Heath Jr.
CORR
2010
Springer
55views Education» more  CORR 2010»
13 years 10 months ago
Greedy Connectivity of Geographically Embedded Graphs
Jie Sun, Daniel ben-Avraham