Sciweavers

CORR
2010
Springer
188views Education» more  CORR 2010»
13 years 6 months ago
A Novel Algorithm for Cooperative Distributed Sequential Spectrum Sensing in Cognitive Radio
This paper considers cooperative spectrum sensing in Cognitive Radios. In our previous work we have developed DualSPRT, a distributed algorithm for cooperative spectrum sensing usi...
Jithin K. S, Vinod Sharma
CORR
2010
Springer
115views Education» more  CORR 2010»
13 years 6 months ago
A strong direct product theorem for two-way public coin communication complexity
We show a direct product result for two-way public coin communication complexity of all relations in terms of a new complexity measure that we define. Our new measure is a general...
Rahul Jain
CORR
2010
Springer
141views Education» more  CORR 2010»
13 years 6 months ago
Data Preservation in High Energy Physics - why, how and when?
Long-term preservation of data and software of large experiments and detectors in high energy physics is of utmost importance to secure the heritage of (mostly unique) data and to...
Siegfried Bethke
CORR
2010
Springer
120views Education» more  CORR 2010»
13 years 6 months ago
LRM-Trees: Compressed Indices, Adaptive Sorting, and Compressed Permutations
LRM-Trees are an elegant way to partition a sequence of values into sorted consecutive blocks, and to express the relative position of the first element of each block within a prev...
Jérémy Barbay, Johannes Fischer
CORR
2010
Springer
107views Education» more  CORR 2010»
13 years 6 months ago
The E8 Lattice and Error Correction in Multi-Level Flash Memory
A construction using the E8 lattice and Reed-Solomon codes for error-correction in flash memory is given. Since E8 lattice decoding errors are bursty, a Reed-Solomon code over GF(2...
Brian M. Kurkoski
CORR
2010
Springer
70views Education» more  CORR 2010»
13 years 6 months ago
Bulk File Download Throughput in a Single Station WLAN with Nonzero Propagation Delay
We analyze TCP-controlled bulk file transfers in a single station WLAN with nonzero propagation delay between the file server and the WLAN. Our approach is to model the flow of pac...
B. K. Pradeepa, Joy Kuri
CORR
2010
Springer
96views Education» more  CORR 2010»
13 years 6 months ago
Quantifying Information Leakage in Finite Order Deterministic Programs
Information flow analysis is a powerful technique for reasoning about the sensitive information exposed by a program during its execution. While past work has proposed information...
Ji Zhu, Mudhakar Srivatsa
CORR
2010
Springer
312views Education» more  CORR 2010»
13 years 6 months ago
Quantum One-Way Communication is Exponentially Stronger Than Classical Communication
In STOC 1999, Raz presented a (partial) function for which there is a quantum protocol communicating only O(log n) qubits, but for which any classical (randomized, bounded-error) ...
Bo'az Klartag, Oded Regev
CORR
2010
Springer
121views Education» more  CORR 2010»
13 years 6 months ago
Deep Self-Taught Learning for Handwritten Character Recognition
Recent theoretical and empirical work in statistical machine learning has demonstrated the importance of learning algorithms for deep architectures, i.e., function classes obtaine...
Frédéric Bastien, Yoshua Bengio, Arn...
CORR
2010
Springer
142views Education» more  CORR 2010»
13 years 6 months ago
M-Learning: A New Paradigm of Learning Mathematics in Malaysia
M-Learning is a new learning paradigm of the new social structure with mobile and wireless technologies. Smart school is one of the four flagship applications for Multimedia Super...
Saipunidzam Mahamad, Mohammad Noor Ibrahim, Shakir...