Sciweavers

CORR
2010
Springer
141views Education» more  CORR 2010»
13 years 7 months ago
Designing and Embedding Reliable Virtual Infrastructures
In a virtualized infrastructure where physical resources are shared, a single physical server failure will terminate several virtual servers and crippling the virtual infrastructu...
Wai-Leong Yeow, Cédric Westphal, Ulas C. Ko...
CORR
2010
Springer
69views Education» more  CORR 2010»
13 years 7 months ago
Using a Kernel Adatron for Object Classification with RCS Data
Marten F. Byl, James T. Demers, Edward A. Rietman
CORR
2010
Springer
137views Education» more  CORR 2010»
13 years 7 months ago
Positive Supercompilation for a Higher-Order Call-By-Value Language
Peter A. Jonsson, Johan Nordlander
CORR
2010
Springer
133views Education» more  CORR 2010»
13 years 7 months ago
On Byzantine Containment Properties of the $min+1$ Protocol
Self-stabilization is a versatile approach to fault-tolerance since it permits a distributed system to recover from any transient fault that arbitrarily corrupts the contents of a...
Swan Dubois, Toshimitsu Masuzawa, Sébastien...
CORR
2010
Springer
155views Education» more  CORR 2010»
13 years 7 months ago
Data-driven Co-clustering Model of Internet Usage in Large Mobile Societies
Design and simulation of future mobile networks will center around human interests and behavior. We propose a design paradigm for mobile networks driven by realistic models of use...
Saeed Moghaddam, Ahmed Helmy, Sanjay Ranka, Manas ...
CORR
2010
Springer
112views Education» more  CORR 2010»
13 years 7 months ago
Little Dragon Two: An efficient Multivariate Public Key Cryptosystem
In 1998 [8], Patarin proposed an efficient cryptosystem called Little Dragon which was a variant of Matsumoto Imai cryptosystem C . However Patarin later found that Little Dragon ...
Rajesh P. Singh, Anupam Saikia, B. K. Sarma
CORR
2010
Springer
110views Education» more  CORR 2010»
13 years 7 months ago
(Unconditional) Secure Multiparty Computation with Man-in-the-middle Attacks
In secure multi-party computation n parties jointly evaluate an n-variate function f in the presence of an adversary which can corrupt up till t parties. All honest parties are req...
Shailesh Vaya
CORR
2010
Springer
46views Education» more  CORR 2010»
13 years 7 months ago
A Formalization of the Turing Test
Evgeny Chutchev
CORR
2010
Springer
93views Education» more  CORR 2010»
13 years 7 months ago
Group-Strategyproof Irresolute Social Choice Functions
We axiomatically characterize the class of pairwise irresolute social choice functions that are group-strategyproof according to Kelly's preference extension. The class is na...
Felix Brandt
CORR
2010
Springer
98views Education» more  CORR 2010»
13 years 7 months ago
Analog Matching of Colored Sources to Colored Channels
Analog (uncoded) transmission provides a simple scheme for communicating a Gaussian source over a Gaussian channel under the mean squared error (MSE) distortion measure. Unfortuna...
Yuval Kochman, Ram Zamir