Sciweavers

CORR
2008
Springer
90views Education» more  CORR 2008»
13 years 8 months ago
An Indirect Genetic Algorithm for Set Covering Problems
This paper presents a new type of genetic algorithm for the set covering problem. It differs from previous evolutionary approaches first because it is an indirect algorithm, i.e. ...
Uwe Aickelin
CORR
2008
Springer
110views Education» more  CORR 2008»
13 years 8 months ago
Enhanced Direct and Indirect Genetic Algorithm Approaches for a Mall Layout and Tenant Selection Problem
During our earlier research, it was recognised that in order to be successful with an indirect genetic algorithm approach using a decoder, the decoder has to strike a balance betw...
Uwe Aickelin, Kathryn A. Dowsland
CORR
2008
Springer
112views Education» more  CORR 2008»
13 years 8 months ago
Minimal weight expansions in Pisot bases
For applications to cryptography, it is important to represent numbers with a small number of non-zero digits (Hamming weight) or with small absolute sum of digits. The problem of ...
Christiane Frougny, Wolfgang Steiner
CORR
2008
Springer
147views Education» more  CORR 2008»
13 years 8 months ago
Impact of CSI on Distributed Space-Time Coding in Wireless Relay Networks
We consider a two-hop wireless network where a transmitter communicates with a receiver via M relays with an amplify-and-forward (AF) protocol. Recent works have shown that sophis...
Mari Kobayashi, Xavier Mestre
CORR
2008
Springer
101views Education» more  CORR 2008»
13 years 8 months ago
Unequal Error Protection: Some Fundamental Limits
Various scenarios are considered where some information is more important than other and needs better protection. A general theoretical framework for unequal error protection is d...
Shashi Borade, Baris Nakiboglu, Lizhong Zheng
CORR
2008
Springer
59views Education» more  CORR 2008»
13 years 8 months ago
Logical Queries over Views: Decidability and Expressiveness
James Bailey, Guozhu Dong, Anthony Widjaja To
CORR
2008
Springer
102views Education» more  CORR 2008»
13 years 8 months ago
SAFIUS - A secure and accountable filesystem over untrusted storage
We describe SAFIUS, a secure accountable file system that resides over an untrusted storage. SAFIUS provides strong security guarantees like confidentiality, integrity, prevention ...
V. Sriram, Ganesh M. Narayan, K. Gopinath
CORR
2008
Springer
136views Education» more  CORR 2008»
13 years 8 months ago
Data Fusion Trees for Detection: Does Architecture Matter?
We consider the problem of decentralized detection in a network consisting of a large number of nodes arranged as a tree of bounded height, under the assumption of conditionally in...
Wee-Peng Tay, John N. Tsitsiklis, Moe Z. Win
CORR
2010
Springer
140views Education» more  CORR 2010»
13 years 8 months ago
Image Segmentation by Discounted Cumulative Ranking on Maximal Cliques
We propose a mid-level image segmentation framework that combines multiple figure-ground hypothesis (FG) constrained at different locations and scales, into interpretations that t...
João Carreira, Adrian Ion, Cristian Sminchi...
CORR
2008
Springer
61views Education» more  CORR 2008»
13 years 8 months ago
Science mapping with asymmetrical paradigmatic proximity
We propose a series of methods to represent the evolution of a field of science at different levels: namely micro, meso and macro levels. We use a previously introduced asymmetric...
Jean-Philippe Cointet, David Chavalarias