Sciweavers

CORR
2008
Springer
68views Education» more  CORR 2008»
13 years 8 months ago
Impact of Vehicular Communications Security on Transportation Safety
Transportation safety, one of the main driving forces of the development of vehicular communication (VC) systems, relies on high-rate safety messaging (beaconing). At the same time...
Panos Papadimitratos, Giorgio Calandriello, Jean-P...
CORR
2008
Springer
141views Education» more  CORR 2008»
13 years 8 months ago
Distributed Source Coding using Abelian Group Codes
In this work, we consider a distributed source coding problem with a joint distortion criterion depending on the sources and the reconstruction. This includes as a special case the...
Dinesh Krithivasan, S. Sandeep Pradhan
CORR
2008
Springer
54views Education» more  CORR 2008»
13 years 8 months ago
Parameterized Telescoping Proves Algebraic Independence of Sums
Usually creative telescoping is used to derive recurrences for sums. In this article we show that the non-existence of a creative telescoping solution, and more generally, of a par...
Carsten Schneider
CORR
2008
Springer
106views Education» more  CORR 2008»
13 years 8 months ago
GossiCrypt: Wireless Sensor Network Data Confidentiality Against Parasitic Adversaries
Resource and cost constraints remain a challenge for wireless sensor network security. In this paper, we propose a new approach to protect confidentiality against a parasitic adver...
Jun Luo, Panos Papadimitratos, Jean-Pierre Hubaux
CORR
2008
Springer
70views Education» more  CORR 2008»
13 years 8 months ago
A Refined Difference Field Theory for Symbolic Summation
In this article we present a refined summation theory based on Karr's difference field approach. The resulting algorithms find sum representations with optimal nested depth. ...
Carsten Schneider
CORR
2008
Springer
113views Education» more  CORR 2008»
13 years 8 months ago
A Simple E-Voting Protocol
We propose an e-voting protocol that seems to allow citizens to verify that their vote has been accurately taken into account while preserving its secrecy, without requiring the u...
Frederic Connes
CORR
2008
Springer
68views Education» more  CORR 2008»
13 years 8 months ago
Comparing human and automatic thesaurus mapping approaches in the agricultural domain
Knowledge organization systems (KOS), like thesauri and other controlled vocabularies, are used to provide subject access to information systems across the web. Due to the heterog...
Boris Lauser, Gudrun Johannsen, Caterina Caracciol...
CORR
2008
Springer
70views Education» more  CORR 2008»
13 years 8 months ago
Every Computably Enumerable Random Real Is Provably Computably Enumerable Random
We prove that every computably enumerable (c.e.) random real is provable in Peano Arithmetic (PA) to be c.e. random. A major step in the proof is to show that the theorem stating ...
Cristian S. Calude, Nicholas J. Hay
CORR
2008
Springer
115views Education» more  CORR 2008»
13 years 8 months ago
Lower Bounds on the Rate-Distortion Function of LDGM Codes
Abstract-- We analyze the performance of low-density generator matrix (LDGM) codes for lossy source coding. We first develop a generic technique for deriving lower bounds on the ef...
Alexandros G. Dimakis, Martin J. Wainwright, Kanna...