Sciweavers

CORR
2008
Springer
117views Education» more  CORR 2008»
13 years 8 months ago
Time Warp Edit Distance
: This technical report details a family of time warp distances on the set of discrete time series. This family is constructed as an editing distance whose elementary operations ap...
Pierre-Francois Marteau
CORR
2010
Springer
225views Education» more  CORR 2010»
13 years 8 months ago
Sensing Matrix Optimization for Block-Sparse Decoding
Recent work has demonstrated that using a carefully designed sensing matrix rather than a random one, can improve the performance of compressed sensing. In particular, a welldesign...
Kevin Rosenblum, Lihi Zelnik-Manor, Yonina C. Elda...
CORR
2008
Springer
97views Education» more  CORR 2008»
13 years 8 months ago
Voice-controlled Debugging of Spreadsheets
Developments in Mobile Computing are putting pressure on the software industry to research new modes of interaction that do not rely on the traditional keyboard and mouse combinat...
Derek Flood, Kevin McDaid
CORR
2010
Springer
135views Education» more  CORR 2010»
13 years 8 months ago
Spreadsheet Refactoring
Refactoring is a change made to the internal structure of software to make it easier to understand and cheaper to modify without changing its observable behaviour. A database refa...
Patrick O'Beirne
CORR
2010
Springer
156views Education» more  CORR 2010»
13 years 8 months ago
A Branch-and-Reduce Algorithm for Finding a Minimum Independent Dominating Set
A dominating set D of a graph G = (V, E) is a subset of vertices such that every vertex in V \ D has at least one neighbour in D. Moreover if D is an independent set, i.e. no verti...
Serge Gaspers, Mathieu Liedloff
CORR
2008
Springer
141views Education» more  CORR 2008»
13 years 8 months ago
Automatic Verification of Correspondences for Security Protocols
We present a new technique for verifying correspondences in security protocols. In particular, correspondences can be used to formalize authentication. Our technique is fully auto...
Bruno Blanchet
CORR
2008
Springer
94views Education» more  CORR 2008»
13 years 8 months ago
On the Structure of the Capacity Region of Asynchronous Memoryless Multiple-Access Channels
The asynchronous capacity region of memoryless multiple-access channels is the union of certain polytopes. It is well-known that vertices of such polytopes may be approached via a...
Ninoslav Marina, Bixio Rimoldi
CORR
2010
Springer
174views Education» more  CORR 2010»
13 years 8 months ago
Multiuser broadcast erasure channel with feedback - capacity and algorithms
We consider the N-user broadcast erasure channel where feedback from the users is fed back to the transmitter in the form of ACK messages. We provide a generic outer bound to the ...
Marios Gatzianas, Leonidas Georgiadis, Leandros Ta...
CORR
2010
Springer
216views Education» more  CORR 2010»
13 years 8 months ago
E2XLRADR (Energy Efficient Cross Layer Routing Algorithm with Dynamic Retransmission for Wireless Sensor Networks)
The main focus of this article is to achieve prolonged network lifetime with overall energy efficiency in wireless sensor networks through controlled utilization of limited energy...
Kanojia Sindhuben Babulal, Rajiv Ranjan Tewari