Sciweavers

CORR
2008
Springer
139views Education» more  CORR 2008»
13 years 8 months ago
Exact two-terminal reliability of some directed networks
Abstract-- The calculation of network reliability in a probabilistic context has long been an issue of practical and academic importance. Conventional approaches (determination of ...
Christian Tanguy
CORR
2010
Springer
58views Education» more  CORR 2010»
13 years 8 months ago
Extending ArXiv.org to Achieve Open Peer Review and Publishing
Today's peer review process for scientic articles is unnecessarily opaque and oers few incentives to referees. Likewise, the publishing process is unnecessarily inecient and i...
Axel Boldt
CORR
2008
Springer
101views Education» more  CORR 2008»
13 years 8 months ago
Belief decision support and reject for textured images characterization
: The textured images' classification assumes to consider the images in terms of area with the same texture. In uncertain environment, it could be better to take an imprecise ...
Arnaud Martin
CORR
2010
Springer
50views Education» more  CORR 2010»
13 years 8 months ago
Multiparty Symmetric Sum Types
Lasse Nielsen, Nobuko Yoshida, Kohei Honda
CORR
2010
Springer
45views Education» more  CORR 2010»
13 years 8 months ago
Relating timed and register automata
Diego Figueira, Piotr Hofman, Slawomir Lasota
CORR
2008
Springer
63views Education» more  CORR 2008»
13 years 8 months ago
Graph Kernels
S. V. N. Vishwanathan, Karsten M. Borgwardt, Risi ...
CORR
2008
Springer
55views Education» more  CORR 2008»
13 years 8 months ago
Automatic Metadata Generation using Associative Networks
Marko A. Rodriguez, Johan Bollen, Herbert Van de S...
CORR
2010
Springer
58views Education» more  CORR 2010»
13 years 8 months ago
A calculus for costed computations
We develop a version of the picalculus Picost where channels are interpreted as resources which have costs associated with them. Code runs under the financial responsibility of own...
Matthew Hennessy
CORR
2008
Springer
127views Education» more  CORR 2008»
13 years 8 months ago
Intrusion Detection in Mobile Ad Hoc Networks Using Classification Algorithms
In this paper we present the design and evaluation of intrusion detection models for MANETs using supervised classification algorithms. Specifically, we evaluate the performance of...
Aikaterini Mitrokotsa, Manolis Tsagkaris, Christos...