Sciweavers

CORR
2010
Springer
127views Education» more  CORR 2010»
13 years 9 months ago
Profile Based Sub-Image Search in Image Databases
Sub-image search with high accuracy in natural images still remains a challenging problem. This paper proposes a new feature vector called profile for a keypoint in a bag of visual...
Vishwakarma Singh, Ambuj K. Singh
CORR
2010
Springer
165views Education» more  CORR 2010»
13 years 9 months ago
Coalition Formation Games for Distributed Cooperation Among Roadside Units in Vehicular Networks
Vehicle-to-roadside (V2R) communications enable vehicular networks to support a wide range of applications for enhancing the efficiency of road transportation. While existing work...
Walid Saad, Zhu Han, Are Hjørungnes, Dusit ...
CORR
2010
Springer
159views Education» more  CORR 2010»
13 years 9 months ago
An Elimination Method for Solving Bivariate Polynomial Systems: Eliminating the Usual Drawbacks
We present an exact and complete algorithm to isolate the real solutions of a zero-dimensional bivariate polynomial system. The proposed algorithm constitutes an elimination metho...
Eric Berberich, Pavel Emeliyanenko, Michael Sagral...
CORR
2010
Springer
144views Education» more  CORR 2010»
13 years 9 months ago
Hitting forbidden minors: Approximation and Kernelization
We study a general class of problems called F -Deletion problems. In an F -Deletion problem, we are asked whether a subset of at most k vertices can be deleted from a graph G such...
Fedor V. Fomin, Daniel Lokshtanov, Neeldhara Misra...
CORR
2010
Springer
101views Education» more  CORR 2010»
13 years 9 months ago
Probing Capacity
We consider the problem of optimal probing of states of a channel by transmitter and receiver for maximizing rate of reliable communication. The channel is discrete memoryless (DM...
Himanshu Asnani, Haim H. Permuter, Tsachy Weissman
CORR
2010
Springer
175views Education» more  CORR 2010»
13 years 9 months ago
Optimal Packet Scheduling in an Energy Harvesting Communication System
We consider the optimal packet scheduling problem in a single-user energy harvesting wireless communication system. In this system, both the data packets and the harvested energy ...
Jing Yang, Sennur Ulukus
CORR
2010
Springer
106views Education» more  CORR 2010»
13 years 9 months ago
Temporal Logics on Words with Multiple Data Values
The paper proposes and studies temporal logics for attributed words, that is, data words with a (finite) set of (attribute,value)-pairs at each position. It considers a basic logi...
Ahmet Kara, Thomas Schwentick, Thomas Zeume
CORR
2010
Springer
142views Education» more  CORR 2010»
13 years 9 months ago
A Fault Analytic Method against HB+
The search for lightweight authentication protocols suitable for low-cost RFID tags constitutes an active and challenging research area. In this context, a family of protocols base...
Jose Carrijo, Rafael Tonicelli, Anderson C. A. Nas...
CORR
2010
Springer
65views Education» more  CORR 2010»
13 years 9 months ago
On Unconditionally Secure Computation with Vanishing Communication Cost
We propose a novel distortion-theoretic approach to a secure three-party computation problem. Alice and Bob have deterministic sequences, and Charlie wishes to compute a normalize...
Ye Wang, Shantanu Rane, Wei Sun, Prakash Ishwar
CORR
2010
Springer
99views Education» more  CORR 2010»
13 years 9 months ago
On Equivalence Between Network Topologies
One major open problem in network coding is to characterize the capacity region of a general multi-source multi-demand network. There are some existing computational tools for boun...
Michelle Effros, Tracey Ho, Shirin Jalali