Sciweavers

CORR
2007
Springer
137views Education» more  CORR 2007»
13 years 7 months ago
Bounds on the Network Coding Capacity for Wireless Random Networks
— Recently, it has been shown that the max flow capacity can be achieved in a multicast network using network coding. In this paper, we propose and analyze a more realistic mode...
Salah A. Aly, Vishal Kapoor, Jie Meng, Andreas Kla...
CORR
2007
Springer
124views Education» more  CORR 2007»
13 years 7 months ago
Neutrosophic Relational Data Model
In this paper, we present a generalization of the relational data model based on interval neutrosophic set [1]. Our data model is capable of manipulating incomplete as well as inc...
Haibin Wang, Rajshekhar Sunderraman, Florentin Sma...
CORR
2007
Springer
108views Education» more  CORR 2007»
13 years 7 months ago
Combining haplotypers
Matti Kääriäinen, Niels Landwehr, S...
CORR
2007
Springer
98views Education» more  CORR 2007»
13 years 7 months ago
WWW Spiders: an introduction
Massimiliano Zanin
CORR
2007
Springer
79views Education» more  CORR 2007»
13 years 7 months ago
L'analyse de l'expertise du point de vue de l'ergonomie cognitive
This paper presents a review of methods for collecting and analysing data on complex activities. Starting with methods developed for design, we examine the possibility to transpos...
Willemien Visser
CORR
2007
Springer
122views Education» more  CORR 2007»
13 years 7 months ago
Social Media as Windows on the Social Life of the Mind
This is a programmatic paper, marking out two directions in which the study of social media can contribute to broader problems of social science: understanding cultural evolution ...
Cosma Rohilla Shalizi
CORR
2007
Springer
119views Education» more  CORR 2007»
13 years 7 months ago
Distributed Source Coding in the Presence of Byzantine Sensors
—The distributed source coding problem is considered when the sensors, or encoders, are under Byzantine attack; that is, an unknown group of sensors have been reprogrammed by a m...
Oliver Kosut, Lang Tong
CORR
2007
Springer
124views Education» more  CORR 2007»
13 years 7 months ago
Anonymous Networking amidst Eavesdroppers
—The problem of security against packet timing based traffic analysis in wireless networks is considered in this work. An analytical measure of “anonymity” of routes in eave...
Parvathinathan Venkitasubramaniam, Ting He, Lang T...
CORR
2007
Springer
127views Education» more  CORR 2007»
13 years 7 months ago
Common Reusable Verification Environment for BCA and RTL Models
This paper deals with a common verification methodology and environment for SystemC BCA and RTL models. The aim is to save effort by avoiding the same work done twice by different...
Giuseppe Falconeri, Walid Naifer, Nizar Romdhane