Sciweavers

CORR
2008
Springer
141views Education» more  CORR 2008»
13 years 8 months ago
Truthful Unsplittable Flow for Large Capacity Networks
The unsplittable flow problem is one of the most extensively studied optimization problems in the field of networking. An instance of it consists of an edge capacitated graph and ...
Yossi Azar, Iftah Gamzu, Shai Gutner
CORR
2008
Springer
118views Education» more  CORR 2008»
13 years 8 months ago
A Logic Programming Framework for Combinational Circuit Synthesis
Abstract. Logic Programming languages and combinational circuit synthesis tools share a common "combinatorial search over logic formulae" background. This paper attempts ...
Paul Tarau, Brenda Luderman
CORR
2008
Springer
127views Education» more  CORR 2008»
13 years 8 months ago
Comparing and Combining Methods for Automatic Query Expansion
Abstract. Query expansion is a well known method to improve the performance of information retrieval systems. In this work we have tested different approaches to extract the candid...
José R. Pérez-Agüera, Lourdes A...
CORR
2008
Springer
95views Education» more  CORR 2008»
13 years 8 months ago
Some properties of the regular asynchronous systems
: The asynchronous systems are the models of the asynchronous circuits from the digital electrical engineering. An asynchronous system f is a multi-valued function that assigns to ...
Serban E. Vlad
CORR
2010
Springer
142views Education» more  CORR 2010»
13 years 8 months ago
A Fault Analytic Method against HB+
The search for lightweight authentication protocols suitable for low-cost RFID tags constitutes an active and challenging research area. In this context, a family of protocols base...
Jose Carrijo, Rafael Tonicelli, Anderson C. A. Nas...
CORR
2010
Springer
65views Education» more  CORR 2010»
13 years 8 months ago
On Unconditionally Secure Computation with Vanishing Communication Cost
We propose a novel distortion-theoretic approach to a secure three-party computation problem. Alice and Bob have deterministic sequences, and Charlie wishes to compute a normalize...
Ye Wang, Shantanu Rane, Wei Sun, Prakash Ishwar
CORR
2010
Springer
99views Education» more  CORR 2010»
13 years 8 months ago
On Equivalence Between Network Topologies
One major open problem in network coding is to characterize the capacity region of a general multi-source multi-demand network. There are some existing computational tools for boun...
Michelle Effros, Tracey Ho, Shirin Jalali
CORR
2008
Springer
152views Education» more  CORR 2008»
13 years 8 months ago
Characterizing User Mobility in Second Life
In this work we present a measurement study of user mobility in Second Life. We first discuss different techniques to collect user traces and then focus on results obtained using ...
Chi-Anh La, Pietro Michiardi
CORR
2010
Springer
64views Education» more  CORR 2010»
13 years 8 months ago
Selfish Response to Epidemic Propagation
An epidemic spreading in a network calls for a decision on the part of the network members: They should decide whether to protect themselves or not. Their decision depends on the ...
George Theodorakopoulos, Jean-Yves Le Boudec, John...
CORR
2008
Springer
51views Education» more  CORR 2008»
13 years 8 months ago
Lambda-Free Logical Frameworks
Robin Adams