Sciweavers

CORR
2010
Springer
99views Education» more  CORR 2010»
13 years 7 months ago
Security in Distributed Storage Systems by Communicating a Logarithmic Number of Bits
Abstract--We investigate the problem of maintaining an encoded distributed storage system when some nodes contain adversarial errors. Using the error-correction capabilities that a...
Theodoros K. Dikaliotis, Alexandros G. Dimakis, Tr...
CORR
2010
Springer
142views Education» more  CORR 2010»
13 years 7 months ago
Capacity-Equivocation Region of the Gaussian MIMO Wiretap Channel
We study the Gaussian multiple-input multiple-output (MIMO) wiretap channel, which consists of a transmitter, a legitimate user, and an eavesdropper. In this channel, the transmit...
Ersen Ekrem, Sennur Ulukus
CORR
2010
Springer
249views Education» more  CORR 2010»
13 years 7 months ago
Lower Bounds on Near Neighbor Search via Metric Expansion
In this paper we show how the complexity of performing nearest neighbor (NNS) search on a metric space is related to the expansion of the metric space. Given a metric space we loo...
Rina Panigrahy, Kunal Talwar, Udi Wieder
CORR
2010
Springer
134views Education» more  CORR 2010»
13 years 7 months ago
Incremental Sampling-based Algorithms for Optimal Motion Planning
During the last decade, incremental sampling-based motion planning algorithms, such as the Rapidly-exploring Random Trees (RRTs), have been shown to work well in practice and to po...
Sertac Karaman, Emilio Frazzoli
CORR
2010
Springer
173views Education» more  CORR 2010»
13 years 7 months ago
Towards Conceptual Multidimensional Design in Decision Support Systems
Multidimensional databases support efficiently on-line analytical processing (OLAP). In this paper, we depict a model dedicated to multidimensional databases. The approach we prese...
Olivier Teste
CORR
2010
Springer
275views Education» more  CORR 2010»
13 years 7 months ago
Dictionary Optimization for Block-Sparse Representations
Recent work has demonstrated that using a carefully designed dictionary instead of a predefined one, can improve the sparsity in jointly representing a class of signals. This has m...
Kevin Rosenblum, Lihi Zelnik-Manor, Yonina C. Elda...
CORR
2010
Springer
189views Education» more  CORR 2010»
13 years 7 months ago
ACRR: Ad Hoc On-Demand Distance Vector Routing with Controlled Route Requests
Reactive routing protocols like Ad-hoc On-Demand Distance Vector Routing (AODV) and Dynamic Source Routing in Ad-Hoc Wireless Networks (DSR) which are used in Mobile and Ad-hoc Ne...
Jayesh Kataria, P. S. Dhekne, Sugata Sanyal
CORR
2010
Springer
99views Education» more  CORR 2010»
13 years 7 months ago
Security Scheme for Distributed DoS in Mobile Ad Hoc Networks
In Mobile Ad hoc Networks (MANET), various types of Denial of Service Attacks (DoS) are possible because of the inherent limitations of its routing protocols. Considering the Ad ho...
Sugata Sanyal, Dhaval Gada, Rajat Gogri, Punit Rat...
CORR
2010
Springer
156views Education» more  CORR 2010»
13 years 7 months ago
The Exact Closest String Problem as a Constraint Satisfaction Problem
We report (to our knowledge) the first evaluation of Constraint Satisfaction as a computational framework for solving closest string problems. We show that careful consideration o...
Tom Kelsey, Lars Kotthoff
CORR
2010
Springer
43views Education» more  CORR 2010»
13 years 7 months ago
Linear Cellular Automata as Discrete Models for Generating Cryptographic Sequences
Pino Caballero-Gil, Amparo Fúster-Sabater, ...