Sciweavers

CORR
2008
Springer
115views Education» more  CORR 2008»
13 years 8 months ago
Coding over an Erasure Channel with a Large Alphabet Size
An erasure channel with a fixed alphabet size q, where q 1, is studied . It is proved that over any erasure channel (with or without memory), Maximum Distance Separable (MDS) codes...
Shervan Fashandi, Shahab Oveis Gharan, Amir K. Kha...
CORR
2010
Springer
42views Education» more  CORR 2010»
13 years 8 months ago
Flexible Session Management in a Distributed Environment
Zach Miller, Daniel C. Bradley, Todd Tannenbaum, I...
CORR
2008
Springer
106views Education» more  CORR 2008»
13 years 8 months ago
Quantization of Prior Probabilities for Hypothesis Testing
Abstract--In this paper, Bayesian hypothesis testing is investigated when the prior probabilities of the hypotheses, taken as a random vector, are quantized. Nearest neighbor and c...
Kush R. Varshney, Lav R. Varshney
CORR
2010
Springer
74views Education» more  CORR 2010»
13 years 8 months ago
Significance of Classification Techniques in Prediction of Learning Disabilities
The aim of this study is to show the importance of two classification techniques, viz. decision tree and clustering, in prediction of learning disabilities (LD) of school-age chil...
Julie M. David, Kannan Balakrishnan
CORR
2008
Springer
129views Education» more  CORR 2008»
13 years 8 months ago
On the Capacity of Wireless Multicast Networks
The problem of maximizing the average rate in a multicast network subject to a coverage constraint (minimum quality of service) is studied. Assuming the channel state information ...
Seyed Reza Mirghaderi, Alireza Bayesteh, Amir K. K...
CORR
2008
Springer
107views Education» more  CORR 2008»
13 years 8 months ago
Classification of Spreadsheet Errors
This paper describes a framework for a systematic classification of spreadsheet errors. This classification or taxonomy of errors is aimed at facilitating analysis and comprehensi...
Kamalasen Rajalingham, David R. Chadwick, Brian Kn...
CORR
2010
Springer
164views Education» more  CORR 2010»
13 years 8 months ago
Ciphertext Policy Attribute based Encryption with anonymous access policy
In Ciphertext Policy Attribute based Encryption scheme, the encryptor can fix the policy, who can decrypt the encrypted message. The policy can be formed with the help of attribut...
A. Balu, K. Kuppusamy
CORR
2010
Springer
90views Education» more  CORR 2010»
13 years 8 months ago
Level Shifter Design for Low Power Applications
With scaling of Vt sub-threshold leakage power is increasing and expected to become significant part of total power consumption.In present work three new configurations of level s...
Manoj Kumar, Sandeep K. Arya, Sujata Pandey
CORR
2010
Springer
53views Education» more  CORR 2010»
13 years 8 months ago
Lumpability Abstractions of Rule-based Systems
ity Abstractions of Rule-based Systems J
Jérôme Feret, Thomas A. Henzinger, He...
CORR
2008
Springer
76views Education» more  CORR 2008»
13 years 8 months ago
Succinct Geometric Indexes Supporting Point Location Queries
We propose to design data structures called succinct geometric indexes of negligible space (more precisely, o(n) bits) that support geometric queries in optimal time, by taking adv...
Prosenjit Bose, Eric Y. Chen, Meng He, Anil Mahesh...