Sciweavers

CORR
2008
Springer
128views Education» more  CORR 2008»
13 years 8 months ago
Efficient Energy Management Policies for Networks with Energy Harvesting Sensor Nodes
We study sensor networks with energy harvesting nodes. The generated energy at a node can be stored in a buffer. A sensor node periodically senses a random field and generates a pa...
Vinod Sharma, Utpal Mukherji, Vinay Joseph
CORR
2008
Springer
81views Education» more  CORR 2008»
13 years 8 months ago
Effect of Tuned Parameters on a LSA MCQ Answering Model
-- This paper presents the current state of a work in progress, whose objective is to better understand the effects of factors that significantly influence the performance of the L...
Alain Lifchitz, Sandra Jhean-Larose, Guy Denhi&egr...
CORR
2008
Springer
148views Education» more  CORR 2008»
13 years 8 months ago
Conversion/Preference Games
We introduce the concept of Conversion/Preference Games, or CP games for short. CP games generalize the standard notion of strategic games. First we exemplify the use of CP games. ...
Stéphane Le Roux, Pierre Lescanne, Ren&eacu...
CORR
2008
Springer
106views Education» more  CORR 2008»
13 years 8 months ago
A variant of Wiener's attack on RSA
Andrej Dujella
CORR
2008
Springer
233views Education» more  CORR 2008»
13 years 8 months ago
3D Face Recognition with Sparse Spherical Representations
Roser Sala Llonch, Effrosini Kokiopoulou, Ivana To...
CORR
2008
Springer
124views Education» more  CORR 2008»
13 years 8 months ago
Scheduling Kalman Filters in Continuous Time
A set of N independent Gaussian linear time invariant systems is observed by M sensors whose task is to provide the best possible steady-state causal minimum mean square estimate o...
Jerome Le Ny, Eric Feron, Munther A. Dahleh
CORR
2008
Springer
116views Education» more  CORR 2008»
13 years 8 months ago
To which extend is the "neural code" a metric ?
Here is proposed a review of the different choices to structure spike trains, using deterministic metrics. Temporal constraints observed in biological or computational spike train...
Bruno Cessac, Horacio Rostro-González, Juan...
CORR
2008
Springer
120views Education» more  CORR 2008»
13 years 8 months ago
Automorphisms of doubly-even self-dual binary codes
The automorphism group of a binary doubly-even self-dual code is always contained in the alternating group. On the other hand, given a permutation group G of degree n there exists...
Annika Guenther, Gabriele Nebe
CORR
2008
Springer
125views Education» more  CORR 2008»
13 years 8 months ago
Semidefinite programming for N-Player Games
Abstract. We introduce two min-max problems: the first problem is to minimize the supremum of finitely many rational functions over a compact basic semi-algebraic set whereas the s...
Rida Laraki, Jean B. Lasserre
CORR
2008
Springer
98views Education» more  CORR 2008»
13 years 8 months ago
Divisibility, Smoothness and Cryptographic Applications
This paper deals with products of moderate-size primes, familiarly known as smooth numbers. Smooth numbers play an crucial role in information theory, signal processing and crypto...
David Naccache, Igor Shparlinski