Sciweavers

CORR
2010
Springer
113views Education» more  CORR 2010»
13 years 9 months ago
Multi-core: Adding a New Dimension to Computing
Invention of Transistors in 1948 started a new era in technology, called Solid State Electronics. Since then, sustaining development and advancement in electronics and fabrication ...
Md. Tanvir Al Amin
CORR
2010
Springer
268views Education» more  CORR 2010»
13 years 9 months ago
Bayesian Based Comment Spam Defending Tool
Spam messes up user's inbox, consumes network resources and spread worms and viruses. Spam is flooding of unsolicited, unwanted e mail. Spam in blogs is called blog spam or c...
Dhinaharan Nagamalai, Beatrice Cynthia Dhinakaran,...
CORR
2010
Springer
153views Education» more  CORR 2010»
13 years 9 months ago
Integration of Agile Ontology Mapping towards NLP Search in I-SOAS
In this research paper we address the importance of Product Data Management (PDM) with respect to its contributions in industry. Moreover we also present some currently available ...
Zeeshan Ahmed, Ina Tacheva
CORR
2010
Springer
183views Education» more  CORR 2010»
13 years 9 months ago
On the Energy Efficiency of LT Codes in Proactive Wireless Sensor Networks
This paper presents the first analysis on the energy efficiency of LT codes with Non-Coherent M-ary Frequency Shift Keying (NCMFSK), known as green modulation [1], in a proactive W...
Jamshid Abouei, J. David Brown, Konstantinos N. Pl...
CORR
2010
Springer
92views Education» more  CORR 2010»
13 years 9 months ago
How Do Emerging Technologies Conquer the World? An Exploration of Patterns of Diffusion and Network Formation
Grasping the fruits of "emerging technologies" is an objective of many government priority programs in a knowledge-based and globalizing economy. We use the publication ...
Loet Leydesdorff, Ismael Rafols
CORR
2010
Springer
70views Education» more  CORR 2010»
13 years 9 months ago
Web Conferencing Traffic - An Analysis using DimDim as Example
In this paper, we present an evaluation of the Ethernet traffic for host and attendees of the popular opensource web conferencing system DimDim. While traditional Internet-centric...
Patrick Seeling
CORR
2010
Springer
121views Education» more  CORR 2010»
13 years 9 months ago
System Virtualization and Efficient ID Transmission Method for RFID Tag Infrastructure Network
The use of RFID tag which identifies a thing and an object will be expanded with progress of ubiquitous society, and it is necessary to study how to construct RFID network system ...
Shin-ichi Kuribayashi
CORR
2010
Springer
44views Education» more  CORR 2010»
13 years 9 months ago
Approximately Optimal Wireless Broadcasting
Sreeram Kannan, Adnan Raja, Pramod Viswanath
CORR
2010
Springer
80views Education» more  CORR 2010»
13 years 9 months ago
New Set of Codes for the Maximum-Likelihood Decoding Problem
The maximum-likelihood decoding problem is known to be NP-hard for general linear and Reed-Solomon codes [1, 4]. In this paper, we introduce the notion of A-covered codes, that is...
Morgan Barbier
CORR
2010
Springer
85views Education» more  CORR 2010»
13 years 9 months ago
Optimally Solving the MCM Problem Using Pseudo-Boolean Satisfiability
In this report, we describe three encodings of the multiple constant multiplication (MCM) problem to pseudo-boolean satisfiability (PBS), and introduce an algorithm to solve the M...
Nuno P. Lopes, Levent Aksoy, Vasco M. Manquinho, J...