Sciweavers

CORR
2010
Springer
64views Education» more  CORR 2010»
13 years 9 months ago
Selfish Response to Epidemic Propagation
An epidemic spreading in a network calls for a decision on the part of the network members: They should decide whether to protect themselves or not. Their decision depends on the ...
George Theodorakopoulos, Jean-Yves Le Boudec, John...
CORR
2010
Springer
147views Education» more  CORR 2010»
13 years 9 months ago
Distributed Storage Codes Meet Multiple-Access Wiretap Channels
We consider i) the overhead minimization of maximum-distance seperable (MDS) storage codes for the repair of a single failed node and ii) the total secure degrees-of-freedom (S-DoF...
Dimitris S. Papailiopoulos, Alexandros G. Dimakis
CORR
2010
Springer
116views Education» more  CORR 2010»
13 years 9 months ago
Interference Alignment as a Rank Constrained Rank Minimization
Abstract--We show that the maximization of the sum degreesof-freedom for the static flat-fading multiple-input multipleoutput (MIMO) interference channel is equivalent to a rank co...
Dimitris S. Papailiopoulos, Alexandros G. Dimakis
CORR
2010
Springer
34views Education» more  CORR 2010»
13 years 9 months ago
Statistical Modelling of ft to Process Parameters in 30 nm Gate Length Finfets
This paper investigates the effect of process variations on unity gain frequency (ft) in 30 nm gate length FinFET by performing extensive TCAD simulations. Six different geometric...
B. Lakshmi, R. Srinivasan
CORR
2010
Springer
172views Education» more  CORR 2010»
13 years 9 months ago
Alternating-Offer Bargaining Games over the Gaussian Interference Channel
This paper tackles the problem of how two selfish users jointly determine the operating point in the achievable rate region of a two-user Gaussian interference channel through barg...
Xi Liu, Elza Erkip
CORR
2010
Springer
159views Education» more  CORR 2010»
13 years 9 months ago
Survey of trust models in different network domains
This paper introduces the security and trust concepts in wireless sensor networks and explains the difference between them, stating that even though both terms are used interchang...
Mohammad Momani, Subhash Challa
CORR
2010
Springer
170views Education» more  CORR 2010»
13 years 9 months ago
Rule-based Generation of Diff Evolution Mappings between Ontology Versions
Ontologies such as taxonomies, product catalogs or web directories are heavily used and hence evolve frequently to meet new requirements or to better reflect the current instance d...
Michael Hartung, Anika Gross, Erhard Rahm
CORR
2010
Springer
55views Education» more  CORR 2010»
13 years 9 months ago
Use of multiple singular value decompositions to analyze complex intracellular calcium ion signals
Josue G. Martinez, Jianhua Z. Huang, Robert C. Bur...
CORR
2010
Springer
143views Education» more  CORR 2010»
13 years 9 months ago
Connectivity in Sub-Poisson Networks
: We consider a class of point processes, which we call sub-Poisson; these are point processes that can be directionallyconvexly (dcx) dominated by some Poisson point process. The ...
Bartlomiej Blaszczyszyn, D. Yogeshwaran
CORR
2010
Springer
141views Education» more  CORR 2010»
13 years 9 months ago
The Equivalence of Sampling and Searching
In a sampling problem, we are given an input x {0, 1} n , and asked to sample approximately from a probability distribution Dx over poly (n)-bit strings. In a search problem, we ...
Scott Aaronson