Sciweavers

CORR
2010
Springer
48views Education» more  CORR 2010»
13 years 8 months ago
Symmetric Determinantal Representation of Formulas and Weakly Skew Circuits
Bruno Grenet, Erich Kaltofen, Pascal Koiran, Natac...
CORR
2010
Springer
93views Education» more  CORR 2010»
13 years 8 months ago
Alternatives to Mobile Keypad Design: Improved Text Feed
In this paper we tried to focus on some of the problems with the mobile keypad and text entering in these devices, and tried to give some possible suggestions. We mainly took some...
Satish Narayana Srirama, M. A. A. Faruque, M. A. S...
CORR
2010
Springer
147views Education» more  CORR 2010»
13 years 8 months ago
Safety Message Power Transmission Control for Vehicular Ad hoc Networks
: Problem statement: Vehicular Ad hoc Networks (VANET) is one of the most challenging research area in the field of Mobile Ad Hoc Networks. Approach: In this research we proposed a...
Ghassan Samara, Sureswaran Ramadas, Wafaa A. H. Al...
CORR
2008
Springer
105views Education» more  CORR 2008»
13 years 8 months ago
Covert Channels in SIP for VoIP signalling
In this paper, we evaluate available steganographic techniques for SIP (Session Initiation Protocol) that can be used for creating covert channels during signaling phase of VoIP (V...
Wojciech Mazurczyk, Krzysztof Szczypiorski
CORR
2008
Springer
84views Education» more  CORR 2008»
13 years 8 months ago
Coupling Component Systems towards Systems of Systems
Systems of systems (SoS) are a hot topic in our "fully connected global world". Our aim is not to provide another definition of what SoS are, but rather to focus on the a...
Frédéric Autran, Jean-Philippe Auzel...
CORR
2008
Springer
122views Education» more  CORR 2008»
13 years 8 months ago
To Code or Not To Code in Multi-Hop Relay Channels
Multi-hop relay channels use multiple relay stages, each with multiple relay nodes, to facilitate communication between a source and destination. Previously, distributed space-tim...
Rahul Vaze, Robert W. Heath Jr.
CORR
2010
Springer
136views Education» more  CORR 2010»
13 years 8 months ago
Maximum Bipartite Matching Size And Application to Cuckoo Hashing
Cuckoo hashing with a stash is a robust high-performance hashing scheme that can be used in many real-life applications. It complements cuckoo hashing by adding a small stash stor...
Josef Kanizo, David Hay, Isaac Keslassy
CORR
2008
Springer
109views Education» more  CORR 2008»
13 years 8 months ago
LCSH, SKOS and Linked Data
Ed Summers, Antoine Isaac, Clay Redding, Dan Krech
CORR
2008
Springer
63views Education» more  CORR 2008»
13 years 8 months ago
A toolkit for a generative lexicon
In this paper we describe the conception of a software toolkit designed for the construction, maintenance and collaborative use of a Generative Lexicon. In order to ease its porta...
Patrick Henry, Christian Bassac