Sciweavers

CORR
2010
Springer
147views Education» more  CORR 2010»
13 years 9 months ago
Mechanized semantics
The goal of this lecture is to show how modern theorem provers--in this case, the Coq proof assistant--can be used to mechanize the specification of programming languages and their...
Xavier Leroy
CORR
2010
Springer
144views Education» more  CORR 2010»
13 years 9 months ago
Efficient Minimization of Decomposable Submodular Functions
Many combinatorial problems arising in machine learning can be reduced to the problem of minimizing a submodular function. Submodular functions are a natural discrete analog of co...
Peter Stobbe, Andreas Krause
CORR
2010
Springer
151views Education» more  CORR 2010»
13 years 9 months ago
On the Convexity of Latent Social Network Inference
In many real-world scenarios, it is nearly impossible to collect explicit social network data. In such cases, whole networks must be inferred from underlying observations. Here, w...
Seth A. Myers, Jure Leskovec
CORR
2010
Springer
57views Education» more  CORR 2010»
13 years 9 months ago
Minimization of Automata
Jean Berstel, Luc Boasson, Olivier Carton, Isabell...
CORR
2010
Springer
432views Education» more  CORR 2010»
13 years 9 months ago
A Distributed Trust Management Framework for Detecting Malicious Packet Dropping Nodes in a Mobile Ad Hoc Network
In a multi-hop mobile ad hoc network (MANET) mobile nodes communicate with each other forming a cooperative radio network. Security remains a major challenge for these networks du...
Jaydip Sen
CORR
2010
Springer
158views Education» more  CORR 2010»
13 years 9 months ago
Dynamic Multi Layer Signature based Intrusion Detection system Using Mobile Agents
Intrusion detection systems have become a key component in ensuring the safety of systems and networks. As networks grow in size and speed continues to increase, it is crucial tha...
Mueen Uddin, Azizah Abdul Rahman
CORR
2010
Springer
131views Education» more  CORR 2010»
13 years 9 months ago
Authentication from matrix conjugation
Abstract. We propose an authentication scheme where forgery (a.k.a. impersonation) seems infeasible without finding the prover's long-term private key. The latter is equivalen...
Dima Grigoriev, Vladimir Shpilrain
CORR
2010
Springer
176views Education» more  CORR 2010»
13 years 9 months ago
Emergency Response Communications and Associated Security Challenges
The natural or man-made disaster demands an efficient communication and coordination among first responders to save life and other community resources. Normally, the traditional c...
Muhammad Ibrahim Channa, Kazi M. Ahmed
CORR
2010
Springer
108views Education» more  CORR 2010»
13 years 9 months ago
Securing data transfer in the cloud through introducing identification packet and UDT-authentication option field: a characteriz
The emergence of various technologies has since pushed researchers to develop new protocols that support high density data transmissions in Wide Area Networks. Many of these proto...
Danilo Valeros Bernardo, Doan B. Hoang
CORR
2010
Springer
66views Education» more  CORR 2010»
13 years 9 months ago
A Partial Taxonomy of Substitutability and Interchangeability
Substitutability, interchangeability and related concepts in Constraint Programming were introduced approximately twenty years ago and have given rise to considerable subsequent re...
Shant Karakashian, Robert J. Woodward, Berthe Y. C...