Sciweavers

CORR
2010
Springer
87views Education» more  CORR 2010»
13 years 6 months ago
Quantum money from knots
Quantum money is a cryptographic protocol in which a mint can produce a quantum state, no one else can copy the state, and anyone (with a quantum computer) can verify that the sta...
Edward Farhi, David Gosset, Avinatan Hassidim, And...
CORR
2010
Springer
137views Education» more  CORR 2010»
13 years 6 months ago
Quantum interactive proofs with short messages
This paper considers three variants of quantum interactive proof systems in which short (meaning logarithmic-length) messages are exchanged between the prover and verifier. The ...
Salman Beigi, Peter W. Shor, John Watrous
CORR
2010
Springer
105views Education» more  CORR 2010»
13 years 6 months ago
Optimism in Reinforcement Learning Based on Kullback-Leibler Divergence
We consider model-based reinforcement learning in finite Markov Decision Processes (MDPs), focussing on so-called optimistic strategies. Optimism is usually implemented by carryin...
Sarah Filippi, Olivier Cappé, Aurelien Gari...
CORR
2010
Springer
96views Education» more  CORR 2010»
13 years 6 months ago
Rate-distortion function via minimum mean square error estimation
Abstract—We derive a simple general parametric representation of the rate–distortion function of a memoryless source, where both the rate and the distortion are given by integr...
Neri Merhav
CORR
2010
Springer
136views Education» more  CORR 2010»
13 years 6 months ago
NgViz: Detecting DNS Tunnels through N-Gram Visualization and Quantitative Analysis
This paper introduced NgViz, a tool that examines DNS traffic and shows anomalies in n-gram frequencies. This is accomplished by comparing input files against a fingerprint of leg...
Kenton Born, David Gustafson
CORR
2010
Springer
90views Education» more  CORR 2010»
13 years 6 months ago
An Upper Bound on Multi-hop Transmission Capacity with Dynamic Multipath Routing
This paper develops upper bounds on the end-to-end transmission capacity of multi-hop wireless networks. Potential source-destination paths are dynamically selected from a pool of...
Yuxin Chen, Jeffrey Andrews
CORR
2010
Springer
47views Education» more  CORR 2010»
13 years 6 months ago
Sampling and Recovery of Pulse Streams
Chinmay Hegde, Richard G. Baraniuk
CORR
2010
Springer
47views Education» more  CORR 2010»
13 years 6 months ago
Applications of Lindeberg Principle in Communications and Statistical Learning
We use a generalization of the Lindeberg principle developed by Sourav Chatterjee to prove universality properties for various problems in communications, statistical learning and...
Satish Babu Korada, Andrea Montanari
CORR
2010
Springer
100views Education» more  CORR 2010»
13 years 6 months ago
A New Proof of the F5 Algorithm
The F5 algorithm is presented by Faug`ere in 2002. However, Faug`ere have not provide the rigorous proofs so far. In this paper, we will give a new complete proof and hence reveal ...
Yao Sun, Dingkang Wang