Sciweavers

CORR
2010
Springer
174views Education» more  CORR 2010»
13 years 9 months ago
Cut Elimination for a Logic with Induction and Co-induction
Proof search has been used to specify a wide range of computation systems. In order to build a framework for reasoning about such specifications, we make use of a sequent calculus...
Alwen Tiu, Alberto Momigliano
CORR
2010
Springer
162views Education» more  CORR 2010»
13 years 9 months ago
Multi-standard programmable baseband modulator for next generation wireless communication
Considerable research has taken place in recent times in the area of parameterization of software defined radio (SDR) architecture. Parameterization decreases the size of the soft...
Indranil Hatai, Indrajit Chakrabarti
CORR
2010
Springer
69views Education» more  CORR 2010»
13 years 9 months ago
Efficient Knowledge Base Management in DCSP
DCSP (Distributed Constraint Satisfaction Problem) has been a very important research area in AI (Artificial Intelligence). There are many application problems in distributed AI t...
Hong Jiang
CORR
2010
Springer
113views Education» more  CORR 2010»
13 years 9 months ago
A Fair and Efficient Packet Scheduling Scheme for IEEE 802.16 Broadband Wireless Access Systems
This paper proposes a fair and efficient QoS scheduling scheme for IEEE 802.16 BWA systems that satisfies both throughput and delay guarantee to various real and non-real time app...
Prasun Chowdhury, Iti Saha Misra
CORR
2010
Springer
139views Education» more  CORR 2010»
13 years 9 months ago
A Low Overhead Reachability Guaranteed Dynamic Route Discovery Mechanism for Dense MANETs
A crucial issue for a mobile ad hoc network is the handling of a large number of nodes. As more nodes join the mobile ad hoc network, contention and congestion are more likely. Th...
Sharmila Sankar, V. Sankaranarayanan
CORR
2010
Springer
131views Education» more  CORR 2010»
13 years 9 months ago
A proposed "osi based" network troubles identification model
The OSI model, developed by ISO in 1984, attempts to summarize complicated network cases on layers. Moreover, network troubles are expressed by taking the model into account. Howe...
Murat Kayri, Ismail Kayri
CORR
2010
Springer
90views Education» more  CORR 2010»
13 years 9 months ago
On the Optimality of Successive Decoding in Compress-and-Forward Relay Schemes
In the classical compress-and-forward relay scheme developed by (Cover and El Gamal, 1979), the decoding process operates in a successive way: the destination first decodes the co...
Xiugang Wu, Liang-Liang Xie
CORR
2010
Springer
51views Education» more  CORR 2010»
13 years 9 months ago
On ternary square-free circular words
Circular words are cyclically ordered finite sequences of letters. We give a computer-free proof of the following result by Currie: square-free circular words over the ternary alp...
Arseny M. Shur
CORR
2010
Springer
144views Education» more  CORR 2010»
13 years 9 months ago
A secure email login system using virtual password
In today's world password compromise by some adversaries is common for different purpose. In ICC 2008 Lei et al. proposed a new user authentication system based on the virtual...
Nishant Doshi