Sciweavers

CORR
2011
Springer
189views Education» more  CORR 2011»
13 years 6 months ago
A Factorial Experiment on Scalability of Search Based Software Testing
Software testing is an expensive process, which is vital in the industry. Construction of the test-data in software testing requires the major cost and to decide which method to us...
Arash Mehrmand, Robert Feldt
CORR
2011
Springer
135views Education» more  CORR 2011»
13 years 6 months ago
Planning with Partial Preference Models
In many real-world planning scenarios, the users are interested in optimizing multiple objectives (such as makespan and execution cost), but are unable to express their exact trad...
Tuan A. Nguyen, Minh Binh Do, Alfonso Gerevini, Iv...
CORR
2011
Springer
142views Education» more  CORR 2011»
13 years 6 months ago
Power Allocation Games in Interference Relay Channels: Existence Analysis of Nash Equilibria
We consider a network composed of two interfering point-to-point links where the two transmitters can exploit one common relay node to improve their individual transmission rate. ...
Elena Veronica Belmega, Samson Lasaulce
CORR
2011
Springer
158views Education» more  CORR 2011»
13 years 6 months ago
The power and Arnoldi methods in an algebra of circulants
Circulant matrices play a central role in a recently proposed formulation of three-way data computations. In this setting, a three-way table corresponds to a matrix where each “...
David F. Gleich, Chen Greif, James M. Varah
CORR
2011
Springer
150views Education» more  CORR 2011»
13 years 6 months ago
Multi-layer Bit-wise Unequal Error Protection for Variable Length Blockcodes with Feedback
The multi-layer bit-wise unequal error protection problem is considered for variable length block codes with feedback. Inner and outer bounds are derived for achievable performanc...
Siva K. Gorantla, Baris Nakiboglu, Todd P. Coleman...
CORR
2011
Springer
216views Education» more  CORR 2011»
13 years 6 months ago
Approaches to Formal Verification of Security Protocols
— In recent times, many protocols have been proposed to provide security for various information and communication systems. Such protocols must be tested for their functional cor...
Suvansh Lal, Mohit Jain, Vikrant Chaplot
CORR
2011
Springer
175views Education» more  CORR 2011»
13 years 6 months ago
Finitary languages
Abstract The class of ω-regular languages provide a robust specification language in verification. Every ω-regular condition can be decomposed into a safety part and a liveness...
Krishnendu Chatterjee, Nathanaël Fijalkow
CORR
2011
Springer
167views Education» more  CORR 2011»
13 years 6 months ago
On Quadratic Programming with a Ratio Objective
Quadratic Programming (QP) is the well-studied problem of maximizing over {−1, 1} values the quadratic form i=j aijxixj. QP captures many known combinatorial optimization proble...
Aditya Bhaskara, Moses Charikar, Rajsekar Manokara...
CORR
2011
Springer
177views Education» more  CORR 2011»
13 years 6 months ago
Applying Science Models for Search
The paper proposes three different kinds of science models as value-added services that are integrated in the retrieval process to enhance retrieval quality. The paper discusses t...
Philipp Mayr, Peter Mutschke, Vivien Petras, Phili...
CORR
2011
Springer
139views Education» more  CORR 2011»
13 years 6 months ago
A Science Model Driven Retrieval Prototype
This paper is about a better understanding on the structure and dynamics of science and the usage of these insights for compensating the typical problems that arises in metadata-d...
Philipp Mayr, Philipp Schaer, Peter Mutschke