Sciweavers

CORR
2011
Springer
198views Education» more  CORR 2011»
13 years 7 months ago
Quire: Lightweight Provenance for Smart Phone Operating Systems
Smartphone apps often run with full privileges to access the network and sensitive local resources, making it difficult for remote systems to have any trust in the provenance of ...
Michael Dietz, Shashi Shekhar, Yuliy Pisetsky, Anh...
CORR
2011
Springer
186views Education» more  CORR 2011»
13 years 7 months ago
A Comparison of Two Human Brain Tumor Segmentation Methods for MRI Data
Jan Egger, Dzenan Zukic, Miriam Helen Anna Bauer, ...
CORR
2011
Springer
157views Education» more  CORR 2011»
13 years 7 months ago
Convergence of type-symmetric and cut-balanced consensus seeking systems
We consider continuous-time consensus seeking systems whose time-dependent interactions are cut-balanced, in the following sense: if a group of agents influences the remaining on...
Julien M. Hendrickx, John N. Tsitsiklis
CORR
2011
Springer
148views Education» more  CORR 2011»
13 years 7 months ago
Modeling the pairwise key distribution scheme in the presence of unreliable links
Abstract— We investigate the secure connectivity of wireless sensor networks under the pairwise key distribution scheme of Chan et al.. Unlike recent work which was carried out u...
Osman Yagan, Armand M. Makowski
CORR
2011
Springer
245views Education» more  CORR 2011»
13 years 7 months ago
Joint Distributed Access Point Selection and Power Allocation in Cognitive Radio Networks
Spectrum management has been identified as a crucial step towards enabling the technology of the cognitive radio network (CRN). Most of the current works dealing with spectrum ma...
Mingyi Hong, Alfredo Garcia, Jorge Alviar
CORR
2011
Springer
212views Education» more  CORR 2011»
13 years 7 months ago
Analytical Study of Object Components for Distributed and Ubiquitous Computing Environment
: - The Distributed object computing is a paradigm that allows objects to be distributed across a heterogeneous network, and allows each of the components to interoperate as a unif...
Usha Batra, Deepak Dahiya, Sachin Bhardwaj
CORR
2011
Springer
176views Education» more  CORR 2011»
13 years 7 months ago
On Paraconsistent Weakening of Intuitionistic Negation
In [1], systems of weakening of intuitionistic negation logic called Zn and CZn were developed in the spirit of da Costa’s approach(c.f. [2]) by preserving, differently from da C...
Zoran Majkic
CORR
2011
Springer
199views Education» more  CORR 2011»
13 years 7 months ago
From Machine Learning to Machine Reasoning
A plausible definition of "reasoning" could be "algebraically manipulating previously acquired knowledge in order to answer a new question". This definition co...
Léon Bottou
CORR
2011
Springer
151views Education» more  CORR 2011»
13 years 7 months ago
Reversible Data Hiding Based on Two-level HDWT Coefficient Histograms
Xu-Ren Luo, Chen-Hui Jerry Lin, Te-Lung Yin
CORR
2011
Springer
151views Education» more  CORR 2011»
13 years 7 months ago
Generating Probability Distributions using Multivalued Stochastic Relay Circuits
— The problem of random number generation dates
David Lee, Jehoshua Bruck