Sciweavers

CORR
2010
Springer
121views Education» more  CORR 2010»
13 years 8 months ago
Symmetric Allocations for Distributed Storage
We consider the problem of optimally allocating a given total storage budget in a distributed storage system. A source has a data object which it can code and store over a set of s...
Derek Leong, Alexandros G. Dimakis, Tracey Ho
CORR
2010
Springer
144views Education» more  CORR 2010»
13 years 8 months ago
Catching the Ouroboros: On Debugging Non-ground Answer-Set Programs
An important issue towards a broader acceptance of answer-set programming (ASP) is the deployment of tools which support the programmer during the coding phase. In particular, met...
Johannes Oetsch, Jörg Pührer, Hans Tompi...
CORR
2010
Springer
96views Education» more  CORR 2010»
13 years 8 months ago
The System Kato: Detecting Cases of Plagiarism for Answer-Set Programs
Plagiarism detection is a growing need among educational institutions and solutions for different purposes exist. An important field in this direction is detecting cases of source...
Johannes Oetsch, Jörg Pührer, Martin Sch...
CORR
2010
Springer
144views Education» more  CORR 2010»
13 years 8 months ago
Algorithmic Verification of Single-Pass List Processing Programs
We introduce streaming data string transducers that map input data strings to output data strings in a single left-to-right pass in linear time. Data strings are (unbounded) seque...
Rajeev Alur, Pavol Cerný
CORR
2010
Springer
140views Education» more  CORR 2010»
13 years 8 months ago
Automated Termination Analysis for Logic Programs with Cut
Termination is an important and well-studied property for logic programs. However, almost all approaches for automated termination analysis focus on definite logic programs, where...
Peter Schneider-Kamp, Jürgen Giesl, Thomas St...
CORR
2010
Springer
84views Education» more  CORR 2010»
13 years 8 months ago
On the Security of Non-Linear HB (NLHB) Protocol Against Passive Attack
As a variant of the HB authentication protocol for RFID systems, which relies on the complexity of decoding linear codes against passive attacks, Madhavan et al. presented Non-Line...
Mohammad Reza Sohizadeh Abyaneh
CORR
2010
Springer
76views Education» more  CORR 2010»
13 years 8 months ago
Queue Length Asymptotics for Generalized Max-Weight Scheduling in the presence of Heavy-Tailed Traffic
We investigate the asymptotic behavior of the steady-state queue length distribution under generalized maxweight scheduling in the presence of heavy-tailed traffic. We consider a s...
Krishna P. Jagannathan, Mihalis Markakis, Eytan Mo...
CORR
2010
Springer
139views Education» more  CORR 2010»
13 years 8 months ago
Pushdown Control-Flow Analysis of Higher-Order Programs
Context-free approaches to static analysis gain precision over classical approaches by perfectly matching returns to call sites-a property that eliminates spurious interprocedural...
Christopher Earl, Matthew Might, David Van Horn
CORR
2010
Springer
72views Education» more  CORR 2010»
13 years 8 months ago
Fast Moment Estimation in Data Streams in Optimal Space
We give a space-optimal algorithm with update time O(log2 (1/) log log(1/)) for (1
Daniel M. Kane, Jelani Nelson, Ely Porat, David P....
CORR
2010
Springer
58views Education» more  CORR 2010»
13 years 8 months ago
Transformations of Logic Programs on Infinite Lists
Alberto Pettorossi, Maurizio Proietti, Valerio Sen...