Sciweavers

CORR
2011
Springer
176views Education» more  CORR 2011»
13 years 2 months ago
Maximizing Cloud Providers Revenues via Energy Aware Allocation Policies
—Cloud providers, like Amazon, offer their data centers’ computational and storage capacities for lease to paying customers. High electricity consumption, associated with runni...
Michele Mazzucco, Dmytro Dyachuk, Ralph Deters
CORR
2011
Springer
189views Education» more  CORR 2011»
13 years 2 months ago
Analysis of multi-stage open shop processing systems
We study algorithmic problems in multi-stage open shop processing systems that are centered around reachability and deadlock detection questions. We characterize safe and unsafe s...
Christian Eggermont, Alexander Schrijver, Gerhard ...
CORR
2011
Springer
188views Education» more  CORR 2011»
13 years 2 months ago
On the Decoding Complexity of Cyclic Codes Up to the BCH Bound
—The standard algebraic decoding algorithm of cyclic codes [n, k, d] up to the BCH bound t is very efficient and practical for relatively small n while it becomes unpractical fo...
Davide Schipani, Michele Elia, Joachim Rosenthal
CORR
2011
Springer
176views Education» more  CORR 2011»
13 years 2 months ago
Decoding by Embedding: Correct Decoding Radius and DMT Optimality
—In lattice-coded multiple-input multiple-output (MIMO) systems, optimal decoding amounts to solving the closest vector problem (CVP). Embedding is a powerful technique for the a...
Cong Ling, Shuiyin Liu, Laura Luzzi, Damien Stehl&...
CORR
2011
Springer
116views Education» more  CORR 2011»
13 years 2 months ago
Spatially Coupled Codes over the Multiple Access Channel
Shrinivas Kudekar, Kenta Kasai
CORR
2011
Springer
162views Education» more  CORR 2011»
13 years 2 months ago
Finitely generated free Heyting algebras via Birkhoff duality and coalgebra
Algebras axiomatized entirely by rank 1 axioms are algebras for a functor and thus the free algebras can be obtained by a direct limit process. Dually, the final coalgebras can be...
Nick Bezhanishvili, Mai Gehrke
CORR
2011
Springer
202views Education» more  CORR 2011»
13 years 2 months ago
Online Least Squares Estimation with Self-Normalized Processes: An Application to Bandit Problems
The analysis of online least squares estimation is at the heart of many stochastic sequential decision-making problems. We employ tools from the self-normalized processes to provi...
Yasin Abbasi-Yadkori, Dávid Pál, Csa...
CORR
2011
Springer
175views Education» more  CORR 2011»
13 years 2 months ago
The Dispersion of Lossy Source Coding
In this work we investigate the behavior of the minimal rate needed in order to guarantee a given probability that the distortion exceeds a prescribed threshold, at some fixed ...
Amir Ingber, Yuval Kochman
CORR
2011
Springer
186views Education» more  CORR 2011»
13 years 2 months ago
Key Reduction of McEliece's Cryptosystem Using List Decoding
Different variants of the code-based McEliece cryptosystem were proposed to reduce the size of the public key. All these variants use very structured codes, which open the door t...
Morgan Barbier
CORR
2011
Springer
159views Education» more  CORR 2011»
13 years 2 months ago
Multicriteria Steiner Tree Problem for Communication Network
Abstract—This paper addresses combinatorial optimization schemes for solving the multicriteria Steiner tree problem for communication network topology design (e.g., wireless mesh...
Mark Sh. Levin, Rustem I. Nuriakhmetov