Sciweavers

CORR
2010
Springer
131views Education» more  CORR 2010»
13 years 8 months ago
Multimode Control Attacks on Elections
In 1992, Bartholdi, Tovey, and Trick [1992] opened the study of control attacks on elections--attempts to improve the election outcome by such actions as adding/deleting candidate...
Piotr Faliszewski, Edith Hemaspaandra, Lane A. Hem...
CORR
2010
Springer
58views Education» more  CORR 2010»
13 years 8 months ago
Discrete denoising of heterogenous two-dimensional data
We consider discrete denoising of two-dimensional data with characteristics that may be varying abruptly between regions. Using a quadtree decomposition technique and space-fillin...
Taesup Moon, Tsachy Weissman, Jae-Young Kim
CORR
2010
Springer
68views Education» more  CORR 2010»
13 years 8 months ago
Can Random Coin Flips Speed Up a Computer?
David Zuckerman
CORR
2010
Springer
111views Education» more  CORR 2010»
13 years 8 months ago
Submodular Maximization by Simulated Annealing
We consider the problem of maximizing a nonnegative (possibly non-monotone) submodular set function with or without constraints. Feige et al. [9] showed a 2/5-approximation for th...
Shayan Oveis Gharan, Jan Vondrák
CORR
2010
Springer
104views Education» more  CORR 2010»
13 years 8 months ago
An Optimal Lower Bound for Buffer Management in Multi-Queue Switches
In the online packet buffering problem (also known as the unweighted FIFO variant of buffer management), we focus on a single network packet switching device with several input po...
Marcin Bienkowski
CORR
2010
Springer
46views Education» more  CORR 2010»
13 years 8 months ago
Intrusions into Privacy in Video Chat Environments: Attacks and Countermeasures
Xinyu Xing, Jianxun Dang, Richard Han, Xue Liu, Sh...
CORR
2010
Springer
142views Education» more  CORR 2010»
13 years 8 months ago
Integrality Gaps of Linear and Semi-definite Programming Relaxations for Knapsack
Recent years have seen an explosion of interest in lift and project methods, such as those proposed by Lov
Anna R. Karlin, Claire Mathieu, C. Thach Nguyen
CORR
2010
Springer
167views Education» more  CORR 2010»
13 years 8 months ago
Development of a Context Aware Virtual Smart Home Simulator
Context awareness is the most important research area in ubiquitous computing. In particular, for smart home, context awareness attempts to bring the best services to the home hab...
Tam Van Nguyen, Huy Anh Nguyen, Deokjai Choi
CORR
2010
Springer
157views Education» more  CORR 2010»
13 years 8 months ago
Context Ontology Implementation for Smart Home
Context awareness is one of the important fields in ubiquitous computing. Smart Home, a specific instance of ubiquitous computing, provides every family with opportunities to enjo...
Tam Van Nguyen, Wontaek Lim, Huy Anh Nguyen, Deokj...
CORR
2010
Springer
157views Education» more  CORR 2010»
13 years 8 months ago
Context Awareness Framework Based on Contextual Graph
- Nowadays computing becomes increasingly mobile and pervasive. One of the important steps in pervasive computing is context-awareness. Context-aware pervasive systems rely on info...
Tam Van Nguyen, Wontaek Lim, Huy Anh Nguyen, Deokj...