Sciweavers

CORR
2010
Springer
148views Education» more  CORR 2010»
13 years 8 months ago
Techniques for Enhanced Physical-Layer Security
Information-theoretic security--widely accepted as the strictest notion of security--relies on channel coding techniques that exploit the inherent randomness of propagation channel...
Pedro C. Pinto, João Barros, Moe Z. Win
CORR
2008
Springer
55views Education» more  CORR 2008»
13 years 8 months ago
Persistence of Wandering Intervals in Self-Similar Affine Interval Exchange Transformations
In this article we prove that given a self-similar interval exchange transformation T(,), whose associated matrix verifies a quite general algebraic condition, there exists an affi...
Xavier Bressaud, Pascal Hubert, Alejandro Maass
CORR
2010
Springer
77views Education» more  CORR 2010»
13 years 8 months ago
Pattern Classification In Symbolic Streams via Semantic Annihilation of Information
We propose a technique for pattern classification in symbolic streams via selective erasure of observed symbols, in cases where the patterns of interest are represented as Probabil...
Ishanu Chattopadhyay, Yicheng Wen, Asok Ray
CORR
2008
Springer
92views Education» more  CORR 2008»
13 years 8 months ago
On sign conditions over real multivariate polynomials
We present a new probabilistic algorithm to find a finite set of points intersecting the closure of each connected component of the realization of every sign condition over a fami...
Gabriela Jeronimo, Daniel Perrucci, Juan Sabia
CORR
2008
Springer
84views Education» more  CORR 2008»
13 years 8 months ago
Words and morphisms with Sturmian erasures
We say x {0, 1, 2}N is a word with Sturmian erasures if for any a {0, 1, 2} the word obtained erasing all a in x is a Sturmian word. A large family of such words is given coding ...
Fabien Durand, Adel Guerziz, Michel Koskas
CORR
2010
Springer
94views Education» more  CORR 2010»
13 years 8 months ago
Quantization of Discrete Probability Distributions
We study the problem of quantization of discrete probability distributions, arising in universal coding, as well as other applications. We show, that in many situations this probl...
Yuriy A. Reznik
CORR
2008
Springer
115views Education» more  CORR 2008»
13 years 8 months ago
Kolmogorov complexity in perspective
We survey diverse approaches to the notion of information: from Shannon entropy to Kolmogorov complexity. Two of the main applications of Kolmogorov complexity are presented: rand...
Marie Ferbus-Zanda, Serge Grigorieff
CORR
2008
Springer
78views Education» more  CORR 2008»
13 years 8 months ago
Set theoretical Representations of Integers, I
Marie Ferbus-Zanda, Serge Grigorieff
CORR
2010
Springer
134views Education» more  CORR 2010»
13 years 8 months ago
Bit-size estimates for triangular sets in positive dimension
We give bit-size estimates for the coefficients appearing in triangular sets describing positive-dimensional algebraic sets defined over Q. These estimates are worst case upper bo...
Xavier Dahan, Abdulilah Kadri, Éric Schost