Sciweavers

CORR
2008
Springer
105views Education» more  CORR 2008»
13 years 8 months ago
Simulation Optimization of the Crossdock Door Assignment Problem
: The purpose of this report is to present the Crossdock Door Assignment Problem, which involves assigning destinations to outbound dock doors of Crossdock centres such that travel...
Uwe Aickelin, Adrian Adewunmi
CORR
2008
Springer
128views Education» more  CORR 2008»
13 years 8 months ago
A Quantifier Elimination Algorithm for Linear Real Arithmetic
We propose a new quantifier elimination algorithm for the theory of linear real arithmetic. This algorithm uses as subroutines satisfiability modulo this theory and polyhedral pro...
David Monniaux
CORR
2008
Springer
106views Education» more  CORR 2008»
13 years 8 months ago
Dempster-Shafer for Anomaly Detection
In this paper, we implement an anomaly detection system using the Dempster-Shafer method. Using two standard benchmark problems we show that by combining multiple signals it is pos...
Qi Chen, Uwe Aickelin
CORR
2008
Springer
159views Education» more  CORR 2008»
13 years 8 months ago
Privacy Preserving ID3 over Horizontally, Vertically and Grid Partitioned Data
We consider privacy preserving decision tree induction via ID3 in the case where the training data is horizontally or vertically distributed. Furthermore, we consider the same pro...
Bart Kuijpers, Vanessa Lemmens, Bart Moelans, Karl...
CORR
2010
Springer
58views Education» more  CORR 2010»
13 years 8 months ago
Channel-coded Collision Resolution by Exploiting Symbol Misalignment
In random-access networks, such as the IEEE 802.11 network, different users may transmit their packets simultaneously, resulting in packet collisions. Traditionally, the collided p...
Lu Lu, Soung Chang Liew, Shengli Zhang
CORR
2008
Springer
81views Education» more  CORR 2008»
13 years 8 months ago
Proactive Service Migration for Long-Running Byzantine Fault Tolerant Systems
In this paper, we describe a proactive recovery scheme based on service migration for long-running Byzantine fault tolerant systems. Proactive recovery is an essential method for ...
Wenbing Zhao
CORR
2008
Springer
103views Education» more  CORR 2008»
13 years 8 months ago
The Capacity Region of the Degraded Finite-State Broadcast Channel
We consider the discrete, time-varying broadcast channel with memory, under the assumption that the channel states belong to a set of nite cardinality. We begin with the de nition...
Ron Dabora, Andrea J. Goldsmith
CORR
2010
Springer
108views Education» more  CORR 2010»
13 years 8 months ago
An Analysis of Transaction and Joint-patent Application Networks
Many firms these days, forced by increasing international competition and an unstable economy, are opting to specialize rather than generalize as a way of maintaining their compet...
Hiroyasu Inoue
CORR
2008
Springer
129views Education» more  CORR 2008»
13 years 8 months ago
Tight Bounds on the Capacity of Binary Input random CDMA Systems
Abstract-- We consider code division multiple access communication over a binary input additive white Gaussian noise channel using random spreading. For a general class of symmetri...
Satish Babu Korada, Nicolas Macris
CORR
2008
Springer
120views Education» more  CORR 2008»
13 years 8 months ago
Distributed Joint Source-Channel Coding on a Multiple Access Channel with Side Information
We consider the problem of transmission of several discrete sources over a multiple access channel (MAC) with side information at the sources and the decoder. Source-channel separa...
R. Rajesh, Vinod Sharma