Sciweavers

CORR
2010
Springer
167views Education» more  CORR 2010»
13 years 8 months ago
Security Mitigations for Return-Oriented Programming Attacks
With the discovery of new exploit techniques, new protection mechanisms are needed as well. Mitigations like DEP (Data Execution Prevention) or ASLR (Address Space Layout Randomiz...
Piotr Bania
CORR
2010
Springer
109views Education» more  CORR 2010»
13 years 8 months ago
Hybrid tractability of soft constraint problems
The constraint satisfaction problem (CSP) is a central generic problem in artificial intelligence. Considerable effort has been made in identifying properties which ensure tractabi...
Martin C. Cooper, Stanislav Zivný
CORR
2008
Springer
85views Education» more  CORR 2008»
13 years 8 months ago
New Estimation Procedures for PLS Path Modelling
: Given R groups of numerical variables X1, ... XR, we assume that each group is the result of one underlying latent variable, and that all latent variables are bound together thro...
Xavier Bry
CORR
2008
Springer
84views Education» more  CORR 2008»
13 years 8 months ago
Message-Passing Decoding of Lattices Using Gaussian Mixtures
A belief-propagation decoder for low-density lattice codes, which represents messages explicitly as a mixture of Gaussians functions, is given. In order to prevent the mixture elem...
Brian M. Kurkoski, Justin Dauwels
CORR
2008
Springer
175views Education» more  CORR 2008»
13 years 8 months ago
Energy Aware Self-Organizing Density Management in Wireless Sensor Networks
Energy consumption is the most important factor that determines sensor node lifetime. The optimization of wireless sensor network lifetime targets not only the reduction of energy...
Erwan Le Merrer, Vincent Gramoli, Anne-Marie Kerma...
CORR
2010
Springer
41views Education» more  CORR 2010»
13 years 8 months ago
Collaborative Structuring of Knowledge by Experts and the Public
Tom Morris, Daniel Mietchen
CORR
2008
Springer
96views Education» more  CORR 2008»
13 years 8 months ago
Popularity, Novelty and Attention
We analyze the role that popularity and novelty play in attracting the attention of users to dynamic websites. We do so by determining the performance of three different strategie...
Fang Wu, Bernardo A. Huberman
CORR
2008
Springer
103views Education» more  CORR 2008»
13 years 8 months ago
Path Loss Exponent Estimation in Large Wireless Networks
In wireless channels, the path loss exponent (PLE) has a strong impact on the quality of the links, and hence, it needs to be accurately estimated for the efficient design and oper...
Sunil Srinivasa, Martin Haenggi
CORR
2008
Springer
104views Education» more  CORR 2008»
13 years 8 months ago
The Case for Structured Random Codes in Network Capacity Theorems
Random coding arguments are the backbone of most channel capacity achievability proofs. In this paper, we show that in their standard form, such arguments are insufficient for pro...
Bobak Nazer, Michael Gastpar
CORR
2010
Springer
155views Education» more  CORR 2010»
13 years 8 months ago
Combinatorial Approximation Algorithms for MaxCut using Random Walks
: We give the first combinatorial approximation algorithm for MAXCUT that beats the trivial 0.5 factor by a constant. The main partitioning procedure is very intuitive, natural, an...
Satyen Kale, C. Seshadhri