Sciweavers

CORR
2010
Springer
43views Education» more  CORR 2010»
13 years 11 months ago
Vcache: Caching Dynamic Documents
---- The traditional web caching is currently limited to static documents only. A page generated on the fly from a server side script may have different contents on different acces...
Vipul Goyal, Sugata Sanyal, Dharma P. Agrawal
CORR
2010
Springer
62views Education» more  CORR 2010»
13 years 11 months ago
Asymptotically-Good, Multigroup ML-Decodable STBCs
For a family/sequence of Space-Time Block Codes (STBCs) C1, C2, . . . , with increasing number of transmit antennas Ni, with rates Ri complex symbols per channel use, i = 1, 2, . ....
Natarajan Lakshmi Prasad, B. Sundar Rajan
CORR
2010
Springer
98views Education» more  CORR 2010»
13 years 11 months ago
Structure-Aware Stochastic Control for Transmission Scheduling
In this report, we consider the problem of real-time transmission scheduling over time-varying channels. We first formulate the transmission scheduling problem as a Markov decisio...
Fangwen Fu, Mihaela van der Schaar
CORR
2010
Springer
77views Education» more  CORR 2010»
13 years 11 months ago
Decreasing log data of multi-tier services for effective request tracing
Previous work shows request tracing systems help understand and debug the performance problems of multi-tier services. However, for large-scale data centers, more than hundreds of...
Bo Sang, Jianfeng Zhan, Guanhua Tian
CORR
2010
Springer
176views Education» more  CORR 2010»
13 years 11 months ago
Competitive Spectrum Management with Incomplete Information
An important issue in wireless communication is the interaction between selfish and independent wireless communication systems in the same frequency band. Due to the selfish natur...
Yair Noam, Amir Leshem, Hagit Messer
CORR
2010
Springer
72views Education» more  CORR 2010»
13 years 11 months ago
Minimizing weighted sum delay for one-to-many file transfer in peer-to-peer networks
Abstract-- This paper considers the problem of transferring a file from one source node to multiple receivers in a peer-to-peer (P2P) network. The objective is to minimize the weig...
Bike Xie, Mihaela van der Schaar, Richard D. Wesel
CORR
2010
Springer
112views Education» more  CORR 2010»
13 years 11 months ago
Negative Interactions in Irreversible Self-Assembly
This paper explores the use of negative (i.e., repulsive) interactions in the abstract Tile Assembly Model defined by Winfree. Winfree in his Ph.D. thesis postulated negative inte...
David Doty, Lila Kari, Benoît Masson
CORR
2010
Springer
191views Education» more  CORR 2010»
13 years 11 months ago
Dual Watermarking Scheme with Encryption
-- Digital Watermarking is used for copyright protection and authentication. In the proposed system, a Dual Watermarking Scheme based on DWT-SVD with chaos encryption algorithm, wi...
R. Dhanalakshmi, K. Thaiyalnayaki
CORR
2010
Springer
95views Education» more  CORR 2010»
13 years 11 months ago
M-Banking Security - a futuristic improved security approach
In last few decades large technology development raised various new needs. Financial sector has also no exception. People are approaching all over the world to fulfill there dream...
Geeta S. Navale, Swati S. Joshi, Aaradhana A. Desh...