Sciweavers

CORR
2010
Springer
65views Education» more  CORR 2010»
13 years 7 months ago
Fishing in Poisson streams: focusing on the whales, ignoring the minnows
This paper describes a low-complexity approach for reconstructing average packet arrival rates and instantaneous packet counts at a router in a communication network, where the arr...
Maxim Raginsky, Sina Jafarpour, Rebecca Willett, A...
CORR
2010
Springer
148views Education» more  CORR 2010»
13 years 7 months ago
Low Rate Sampling of Pulse Streams with Application to Ultrasound Imaging
Signals comprised of a stream of short pulses appear in many applications including bio-imaging, radar, and ultrawideband communication. Recently, a new framework, referred to as f...
Ronen Tur, Yonina C. Eldar, Zvi Friedman
CORR
2010
Springer
72views Education» more  CORR 2010»
13 years 7 months ago
Fixed point theorem and aperiodic tilings
Bruno Durand, Andrei E. Romashchenko, Alexander Sh...
CORR
2010
Springer
64views Education» more  CORR 2010»
13 years 7 months ago
Near-Optimal Evasion of Convex-Inducing Classifiers
Classifiers are often used to detect miscreant activities. We study how an adversary can efficiently query a classifier to elicit information that allows the adversary to evade de...
Blaine Nelson, Benjamin I. P. Rubinstein, Ling Hua...
CORR
2010
Springer
90views Education» more  CORR 2010»
13 years 7 months ago
Table manipulation in simplicial databases
In [Spi], we developed a category of databases in which the schema of a database is represented as a simplicial set. Each simplex corresponds to a table in the database. There, our...
David I. Spivak
CORR
2010
Springer
183views Education» more  CORR 2010»
13 years 7 months ago
Forming the COUNCIL Based Clusters in Securing Wireless Ad Hoc Networks
-- In cluster-based routing protocol (CBRP), two-level hierarchical structure is successfully used to reduce over-flooding in wireless ad hoc networks. As it is vulnerable to a sin...
Alok Ojha, Hongmei Deng, Dharma P. Agrawal, Sugata...
CORR
2010
Springer
144views Education» more  CORR 2010»
13 years 7 months ago
Stochastic Games for Security in Networks with Interdependent Nodes
This paper studies a stochastic game theoretic approach to security and intrusion detection in communication and computer networks. Specifically, an Attacker and a Defender take pa...
Kien C. Nguyen, Tansu Alpcan, Tamer Basar
CORR
2010
Springer
204views Education» more  CORR 2010»
13 years 7 months ago
Limited Feedback Multi-Antenna Quantization Codebook Design-Part II: Multiuser Channels
This is the second part of a two-part paper on optimal design of limited feedback single-user and multiuser spatial multiplexing systems. The first part of the paper studies the si...
Behrouz Khoshnevis, Wei Yu
CORR
2010
Springer
176views Education» more  CORR 2010»
13 years 7 months ago
Limited Feedback Multi-Antenna Quantization Codebook Design-Part I: Single-User Channels
Abstract--In this two-part paper, we study the design and optimization of limited feedback single-user and multiuser systems with a multiple-antenna base station and single-antenna...
Behrouz Khoshnevis, Wei Yu
CORR
2010
Springer
45views Education» more  CORR 2010»
13 years 7 months ago
Rivals for the crown: Reply to Opthof and Leydesdorff
Anthony F. J. van Raan, Thed N. van Leeuwen, Marti...