Sciweavers

CORR
2008
Springer
111views Education» more  CORR 2008»
15 years 3 months ago
Fast Integer Multiplication using Modular Arithmetic
We give an O(N
Anindya De, Piyush P. Kurur, Chandan Saha, Rampras...
76
Voted
CORR
2008
Springer
84views Education» more  CORR 2008»
15 years 3 months ago
The emerging field of language dynamics
Large linguistic databases, especially databases having a global coverage such as The World Atlas of Language Structures (Haspelmath et al. 2005), The Automated Simility Judgment ...
Søren Wichmann
CORR
2010
Springer
116views Education» more  CORR 2010»
15 years 3 months ago
LiquidXML: Adaptive XML Content Redistribution
We propose to demonstrate LiquidXML, a platform for managing large corpora of XML documents in large-scale P2P networks. All LiquidXML peers may publish XML documents to be shared...
Jesús Camacho-Rodríguez, Asterios Ka...
52
Voted
CORR
2010
Springer
47views Education» more  CORR 2010»
15 years 3 months ago
Strategy iteration is strongly polynomial for 2-player turn-based stochastic games with a constant discount factor
Thomas Dueholm Hansen, Peter Bro Miltersen, Uri Zw...
107
Voted
CORR
2008
Springer
83views Education» more  CORR 2008»
15 years 3 months ago
Alternating Hierarchies for Time-Space Tradeoffs
Nepomnjascii's Theorem states that for all 0 < 1 and k > 0 the class of languages recognized in nondeterministic time nk and space n , NTISP[nk , n ], is contained in ...
Chris Pollett, Eric Miles
CORR
2008
Springer
138views Education» more  CORR 2008»
15 years 3 months ago
Capacity Bounds for the Gaussian Interference Channel
Abstract-- The capacity region of the two-user Gaussian Interference Channel (IC) is studied. Two classes of channels are considered: weak and mixed Gaussian IC. For the weak Gauss...
Abolfazl S. Motahari, Amir K. Khandani
CORR
2010
Springer
214views Education» more  CORR 2010»
15 years 3 months ago
Modeling Network Coded TCP Throughput: A Simple Model and its Validation
We analyze the performance of TCP and TCP with network coding (TCP/NC) in lossy wireless networks. We build upon the simple framework introduced by Padhye et al. and characterize t...
MinJi Kim, Muriel Médard, João Barro...
50
Voted
CORR
2010
Springer
39views Education» more  CORR 2010»
15 years 3 months ago
Threat assessment of a possible Vehicle-Born Improvised Explosive Device using DSmT
Jean Dezert, Florentin Smarandache
CORR
2008
Springer
136views Education» more  CORR 2008»
15 years 3 months ago
Matrix Graph Grammars
Graph transformation is concerned with the manipulation of graphs by means of rules. Graph grammars have been traditionally studied using techniques from category theory. In previ...
Pedro Pablo Pérez Velasco
66
Voted
CORR
2010
Springer
141views Education» more  CORR 2010»
15 years 3 months ago
An FPTAS for Bargaining Networks with Unequal Bargaining Powers
Yashodhan Kanoria