Sciweavers

CORR
2010
Springer
155views Education» more  CORR 2010»
13 years 5 months ago
A Proof Theoretic Analysis of Intruder Theories
We consider the problem of intruder deduction in security protocol analysis: that is, deciding whether a given message M can be deduced from a set of messages under the theory of ...
Alwen Tiu, Rajeev Goré, Jeremy E. Dawson
CORR
2010
Springer
221views Education» more  CORR 2010»
13 years 5 months ago
Reduction of Feature Vectors Using Rough Set Theory for Human Face Recognition
In this paper we describe a procedure to reduce the size of the input feature vector. A complex pattern recognition problem like face recognition involves huge dimension of input ...
Debotosh Bhattacharjee, Dipak Kumar Basu, Mita Nas...
CORR
2010
Springer
96views Education» more  CORR 2010»
13 years 5 months ago
Construction of Codes for Network Coding
Andreas-Stephan Elsenhans, Axel Kohnert, Alfred Wa...
CORR
2010
Springer
124views Education» more  CORR 2010»
13 years 5 months ago
Lattice model refinement of protein structures
To find the best lattice model representation of a given full atom protein structure is a hard computational problem. Several greedy methods have been suggested where results are ...
Martin Mann, Alessandro Dal Palù
CORR
2010
Springer
161views Education» more  CORR 2010»
13 years 5 months ago
CrystalGPU: Transparent and Efficient Utilization of GPU Power
General-purpose computing on graphics processing units (GPGPU) has recently gained considerable attention in various domains such as bioinformatics, databases and distributed comp...
Abdullah Gharaibeh, Samer Al-Kiswany, Matei Ripean...
CORR
2010
Springer
202views Education» more  CORR 2010»
13 years 5 months ago
Using vector divisions in solving linear complementarity problem
Youssef Elfoutayeni, Mohamed Khaladi
CORR
2010
Springer
115views Education» more  CORR 2010»
13 years 5 months ago
Approximately achieving Gaussian relay network capacity with lattice codes
Abstract--Recently, it has been shown that a quantize-mapand-forward scheme approximately achieves (within a constant number of bits) the Gaussian relay network capacity for arbitr...
Ayfer Özgür, Suhas N. Diggavi
CORR
2010
Springer
43views Education» more  CORR 2010»
13 years 5 months ago
Watching Systems in graphs: an extension of Identifying Codes
David Auger, Irène Charon, Olivier Hudry, A...
CORR
2010
Springer
127views Education» more  CORR 2010»
13 years 5 months ago
On Turing machines, dynamical systems and the Atiyah problem
: We consider mixed Dirichlet-Robin problems on scale irregular domains. In particular, we study the asymptotic convergence of the solutions of elliptic problems with Robin boundar...
Lukasz Grabowski