Sciweavers

CORR
2011
Springer
187views Education» more  CORR 2011»
13 years 6 months ago
Failure of A Mix Network
A mix network by Wikstrom fails in correctness, provable privacy and soundness. Its claimed advantages in security and efficiency are compromised. The analysis in this paper illus...
Kun Peng
CORR
2011
Springer
227views Education» more  CORR 2011»
13 years 6 months ago
Message Structures: a modelling technique for information systems analysis and design
Despite the increasing maturity of model-driven development (MDD), some research challenges remain open in the field of information systems (IS). For instance, there is a need to i...
Sergio España, Arturo González, Osca...
CORR
2011
Springer
210views Education» more  CORR 2011»
13 years 6 months ago
Competitive and Deterministic Embeddings of Virtual Networks
Network virtualization is a paradigm that allows for flexible and efficient allocation of the resources among multiple virtual networks (VNets). In this paper we deal with the p...
Guy Even, Moti Medina, Gregor Schaffrath, Stefan S...
CORR
2011
Springer
169views Education» more  CORR 2011»
13 years 6 months ago
Strict Authentication Watermarking with JPEG Compression (SAW-JPEG) for Medical Images
This paper proposes a strict authentication watermarking for medical images. In this scheme, we define region of interest (ROI) by taking the smallest rectangle around an image. T...
Jasni Mohamad Zain
CORR
2011
Springer
165views Education» more  CORR 2011»
13 years 6 months ago
Causal Dependence Tree Approximations of Joint Distributions for Multiple Random Processes
—We investigate approximating joint distributions of random processes with causal dependence tree distributions. Such distributions are particularly useful in providing parsimoni...
Christopher J. Quinn, Todd P. Coleman, Negar Kiyav...
CORR
2011
Springer
147views Education» more  CORR 2011»
13 years 6 months ago
A Generalized Method for Integrating Rule-based Knowledge into Inductive Methods Through Virtual Sample Creation
Hybrid learning methods use theoretical knowledge of a domain and a set of classified examples to develop a method for classification. Methods that use domain knowledge have been ...
Ridwan Al Iqbal
CORR
2011
Springer
200views Education» more  CORR 2011»
13 years 6 months ago
Using Feature Weights to Improve Performance of Neural Networks
Different features have different relevance to a particular learning problem. Some features are less relevant; while some very important. Instead of selecting the most relevant fe...
Ridwan Al Iqbal
CORR
2011
Springer
191views Education» more  CORR 2011»
13 years 6 months ago
A Message-Passing Receiver for BICM-OFDM over Unknown Clustered-Sparse Channels
We propose a factor-graph-based approach to joint channel-estimationand-decoding of bit-interleaved coded orthogonal frequency division multiplexing (BICM-OFDM). In contrast to ex...
Philip Schniter
CORR
2011
Springer
164views Education» more  CORR 2011»
13 years 6 months ago
Sweeping an oval to a vanishing point
Given a convex region in the plane, and a sweep-line as a tool, what is best way to reduce the region to a single point by a sequence of sweeps? The problem of sweeping points by ...
Adrian Dumitrescu, Minghui Jiang