Sciweavers

CORR
2010
Springer
259views Education» more  CORR 2010»
13 years 8 months ago
Community Detection in Networks: The Leader-Follower Algorithm
Natural networks such as those between humans observed through their interactions or biological networks predicted based on various experimental measurements contain a wealth of i...
Devavrat Shah, Tauhid Zaman
CORR
2010
Springer
147views Education» more  CORR 2010»
13 years 8 months ago
Modeling the structure and evolution of discussion cascades
We analyze the structure and evolution of discussion cascades in four popular websites: Slashdot, Barrapunto, Meneame and Wikipedia. Despite the big heterogeneities between these ...
Vicenç Gómez, Hilbert J. Kappen, And...
CORR
2008
Springer
95views Education» more  CORR 2008»
13 years 8 months ago
A Simple Algebraic Formulation for the Scalar Linear Network Coding Problem
In this work, we derive an algebraic formulation for the scalar linear network coding problem as an alternative to the one presented by Koetter et al in [1]. Using an equivalence b...
Abhay T. Subramanian, Andrew Thangaraj
CORR
2010
Springer
45views Education» more  CORR 2010»
13 years 8 months ago
Inter-arrival times of message propagation on directed networks
Tamara Mihaljev, Lucilla de Arcangelis, Hans J. He...
CORR
2008
Springer
104views Education» more  CORR 2008»
13 years 8 months ago
A General Framework for Sound and Complete Floyd-Hoare Logics
er presents an abstraction of Hoare logic to traced symmetric monoidal categories, a eral framework for the theory of systems. Our abstraction is based on a traced monoidal functor...
Rob Arthan, Ursula Martin, Erik A. Mathiesen, Paul...
CORR
2010
Springer
57views Education» more  CORR 2010»
13 years 8 months ago
Galois Theory of Algorithms
Noson S. Yanofsky
CORR
2008
Springer
155views Education» more  CORR 2008»
13 years 8 months ago
On Wiretap Networks II
We consider the problem of securing a multicast network against a wiretapper that can intercept the packets on a limited number of arbitrary network links of his choice. We assume ...
Salim Y. El Rouayheb, Emina Soljanin
CORR
2008
Springer
138views Education» more  CORR 2008»
13 years 8 months ago
An Improved Robust Fuzzy Extractor
We consider the problem of building robust fuzzy extractors, which allow two parties holding similar random variables W, W to agree on a secret key R in the presence of an active ...
Bhavana Kanukurthi, Leonid Reyzin
CORR
2010
Springer
180views Education» more  CORR 2010»
13 years 8 months ago
Dependability in Aggregation by Averaging
Abstract. Aggregation is an important building block of modern distributed applications, allowing the determination of meaningful properties (e.g. network size, total storage capac...
Paulo Jesus, Carlos Baquero, Paulo Sérgio A...