Sciweavers

CORR
2010
Springer
158views Education» more  CORR 2010»
13 years 7 months ago
Epistemic Model Checking for Knowledge-Based Program Implementation: an Application to Anonymous Broadcast
Knowledge-based programs provide an abstract level of description of protocols in which agent actions are related to their states of knowledge. The paper describes how epistemic mo...
Omar I. Al-Bataineh, Ron van der Meyden
CORR
2010
Springer
40views Education» more  CORR 2010»
13 years 7 months ago
Space Complexity of Perfect Matching in Bounded Genus Bipartite Graphs
Samir Datta, Raghav Kulkarni, Raghunath Tewari, N....
CORR
2010
Springer
220views Education» more  CORR 2010»
13 years 7 months ago
Multichannel Sampling of Pulse Streams at the Rate of Innovation
We consider minimal-rate sampling schemes for streams of delayed and weighted versions of a known pulse shape. Such signals belong to the class of finite rate of innovation (FRI) m...
Kfir Gedalyahu, Ronen Tur, Yonina C. Eldar
CORR
2010
Springer
72views Education» more  CORR 2010»
13 years 7 months ago
The Burbea-Rao and Bhattacharyya centroids
Frank Nielsen, Sylvain Boltz
CORR
2010
Springer
108views Education» more  CORR 2010»
13 years 7 months ago
Compressed Sensing: How sharp is the Restricted Isometry Property
Compressed sensing is a recent technique by which signals can be measured at a rate proportional to their information content, combining the important task of compression directly ...
Jeffrey D. Blanchard, Coralia Cartis, Jared Tanner
CORR
2010
Springer
138views Education» more  CORR 2010»
13 years 7 months ago
Shallow Circuits with High-Powered Inputs
A polynomial identity testing algorithm must determine whether an input polynomial (given for instance by an arithmetic circuit) is identically equal to 0. In this paper, we show ...
Pascal Koiran
CORR
2010
Springer
171views Education» more  CORR 2010»
13 years 7 months ago
Recursive Information Hiding in Visual Cryptography
: Visual Cryptography is a secret sharing scheme that uses the human visual system to perform computations. This paper presents a recursive hiding scheme for 3 out of 5 secret shar...
Sandeep Katta
CORR
2010
Springer
108views Education» more  CORR 2010»
13 years 7 months ago
Born to be Wild: Using Communities of Practice as a Tool for Knowledge Management
This paper looks at what happens when Communities of Practice are used as a tool for Knowledge Management. The original concept of a Community of Practice appears to have very lit...
Valérie Chanal, Chris Kimble
CORR
2010
Springer
109views Education» more  CORR 2010»
13 years 7 months ago
Polynomial Learning of Distribution Families
Abstract--The question of polynomial learnability of probability distributions, particularly Gaussian mixture distributions, has recently received significant attention in theoreti...
Mikhail Belkin, Kaushik Sinha
CORR
2010
Springer
68views Education» more  CORR 2010»
13 years 7 months ago
Indoor Positioning with Radio Location Fingerprinting
Mikkel Baun Kjærgaard