Sciweavers

CORR
2010
Springer
178views Education» more  CORR 2010»
13 years 8 months ago
Towards A Shape Analysis for Graph Transformation Systems
Graphs and graph transformation systems are a frequently used modelling technique for a wide range of different domains, covering areas as diverse as refactorings, network topolog...
Dominik Steenken, Heike Wehrheim, Daniel Wonisch
CORR
2010
Springer
189views Education» more  CORR 2010»
13 years 8 months ago
Robust PCA via Outlier Pursuit
Singular Value Decomposition (and Principal Component Analysis) is one of the most widely used techniques for dimensionality reduction: successful and efficiently computable, it ...
Huan Xu, Constantine Caramanis, Sujay Sanghavi
CORR
2010
Springer
130views Education» more  CORR 2010»
13 years 8 months ago
Discrete Laplace-Beltrami Operator Determines Discrete Riemannian Metric
The Laplace-Beltrami operator of a smooth Riemannian manifold is determined by the Riemannian metric. Conversely, the heat kernel constructed from its eigenvalues and eigenfunctio...
Xianfeng David Gu, Ren Guo, Feng Luo 0002, Wei Zen...
CORR
2010
Springer
255views Education» more  CORR 2010»
13 years 8 months ago
Multiplierless Modules for Forward and Backward Integer Wavelet Transform
: This article is about the architecture of a wavelet filter bank with reprogrammable logic. It is based on second generation of wavelets with a reduced of number of operations. A ...
Vasil Kolev
CORR
2010
Springer
80views Education» more  CORR 2010»
13 years 8 months ago
High-Throughput Random Access via Codes on Graphs
—Recently, contention resolution diversity slotted ALOHA (CRDSA) has been introduced as a simple but effective improvement to slotted ALOHA. It relies on MAC burst repetitions an...
Gianluigi Liva, Enrico Paolini, Marco Chiani
CORR
2010
Springer
123views Education» more  CORR 2010»
13 years 8 months ago
A Stackelberg Strategy for Routing Flow over Time
Routing games are used to to understand the impact of individual users’ decisions on network efficiency. Most prior work on routing games uses a simplified model of network fl...
Umang Bhaskar, Lisa Fleischer, Elliot Anshelevich
CORR
2010
Springer
115views Education» more  CORR 2010»
13 years 8 months ago
Broadcasting with an Energy Harvesting Rechargeable Transmitter
In this paper, we investigate the transmission completion time minimization problem in a two-user additive white Gaussian noise (AWGN) broadcast channel, where the transmitter is ...
Jing Yang, Omur Ozel, Sennur Ulukus
CORR
2010
Springer
108views Education» more  CORR 2010»
13 years 8 months ago
Service Level Agreement (SLA) in Utility Computing Systems
In recent years, extensive research has been conducted in the area of Service Level Agreement (SLA) for utility computing systems. An SLA is a formal contract used to guarantee th...
Linlin Wu, Rajkumar Buyya
CORR
2010
Springer
130views Education» more  CORR 2010»
13 years 8 months ago
Fractional Repetition Codes for Repair in Distributed Storage Systems
Abstract—We introduce a new class of exact MinimumBandwidth Regenerating (MBR) codes for distributed storage systems, characterized by a low-complexity uncoded repair process tha...
Salim Y. El Rouayheb, Kannan Ramchandran
CORR
2010
Springer
83views Education» more  CORR 2010»
13 years 8 months ago
Flat Zipper-Unfolding Pairs for Platonic Solids
We show that four of the five Platonic solids’ surfaces may be cut open with a Hamiltonian path along edges and unfolded to a polygonal net each of which can “zipper-refold...
Joseph O'Rourke