Sciweavers

CORR
2010
Springer
107views Education» more  CORR 2010»
13 years 6 months ago
Yacc is dead
Abstract. We present two novel approaches to parsing context-free languages. The first approach is based on an extension of Brzozowski’s derivative from regular expressions to c...
Matthew Might, David Darais
CORR
2010
Springer
147views Education» more  CORR 2010»
13 years 6 months ago
Cluster based Key Management in Wireless Sensor Networks
—Wireless sensor networks consist of sensor nodes with limited computational and communication capabilities. In this paper, the whole network of sensor nodes is divided into clus...
Anvesh Aileni
CORR
2010
Springer
197views Education» more  CORR 2010»
13 years 6 months ago
Hedonic Coalition Formation for Distributed Task Allocation among Wireless Agents
—Autonomous wireless agents such as unmanned aerial vehicles, mobile base stations, or self-operating wireless nodes present a great potential for deployment in next-generation w...
Walid Saad, Zhu Han, Tamer Basar, Mérouane ...
CORR
2010
Springer
178views Education» more  CORR 2010»
13 years 6 months ago
Towards A Shape Analysis for Graph Transformation Systems
Graphs and graph transformation systems are a frequently used modelling technique for a wide range of different domains, covering areas as diverse as refactorings, network topolog...
Dominik Steenken, Heike Wehrheim, Daniel Wonisch
CORR
2010
Springer
189views Education» more  CORR 2010»
13 years 6 months ago
Robust PCA via Outlier Pursuit
Singular Value Decomposition (and Principal Component Analysis) is one of the most widely used techniques for dimensionality reduction: successful and efficiently computable, it ...
Huan Xu, Constantine Caramanis, Sujay Sanghavi
CORR
2010
Springer
130views Education» more  CORR 2010»
13 years 6 months ago
Discrete Laplace-Beltrami Operator Determines Discrete Riemannian Metric
The Laplace-Beltrami operator of a smooth Riemannian manifold is determined by the Riemannian metric. Conversely, the heat kernel constructed from its eigenvalues and eigenfunctio...
Xianfeng David Gu, Ren Guo, Feng Luo 0002, Wei Zen...
CORR
2010
Springer
255views Education» more  CORR 2010»
13 years 6 months ago
Multiplierless Modules for Forward and Backward Integer Wavelet Transform
: This article is about the architecture of a wavelet filter bank with reprogrammable logic. It is based on second generation of wavelets with a reduced of number of operations. A ...
Vasil Kolev
CORR
2010
Springer
80views Education» more  CORR 2010»
13 years 6 months ago
High-Throughput Random Access via Codes on Graphs
—Recently, contention resolution diversity slotted ALOHA (CRDSA) has been introduced as a simple but effective improvement to slotted ALOHA. It relies on MAC burst repetitions an...
Gianluigi Liva, Enrico Paolini, Marco Chiani
CORR
2010
Springer
123views Education» more  CORR 2010»
13 years 6 months ago
A Stackelberg Strategy for Routing Flow over Time
Routing games are used to to understand the impact of individual users’ decisions on network efficiency. Most prior work on routing games uses a simplified model of network fl...
Umang Bhaskar, Lisa Fleischer, Elliot Anshelevich
CORR
2010
Springer
115views Education» more  CORR 2010»
13 years 6 months ago
Broadcasting with an Energy Harvesting Rechargeable Transmitter
In this paper, we investigate the transmission completion time minimization problem in a two-user additive white Gaussian noise (AWGN) broadcast channel, where the transmitter is ...
Jing Yang, Omur Ozel, Sennur Ulukus