Sciweavers

CORR
2010
Springer
117views Education» more  CORR 2010»
13 years 7 months ago
SMEmail - A New Protocol for the Secure E-mail in Mobile Environments
The electronic mail plays an unavoidable role in the humankind communications. With the great interest for the connection via mobile platforms, and the growing number of vulnerabil...
Mohsen Toorani
CORR
2010
Springer
66views Education» more  CORR 2010»
13 years 7 months ago
Solutions to the GSM Security Weaknesses
Recently, the mobile industry has experienced an extreme increment in number of its users. The GSM network with the greatest worldwide number of users succumbs to several security...
Mohsen Toorani, Ali Asghar Beheshti Shirazi
CORR
2010
Springer
71views Education» more  CORR 2010»
13 years 7 months ago
The relational model is injective for Multiplicative Exponential Linear Logic (without weakenings)
We show that for Multiplicative Exponential Linear Logic (without weakenings) the syntactical equivalence relation on proofs induced by cut-elimination coincides with the semantic ...
Daniel de Carvalho, Lorenzo Tortora de Falco
CORR
2010
Springer
67views Education» more  CORR 2010»
13 years 7 months ago
Using ATL to define advanced and flexible constraint model transformations
Abstract. Transforming constraint models is an important task in recent constraint programming systems. User-understandable models are defined during the modeling phase but rewriti...
Raphaël Chenouard, Laurent Granvilliers, Rica...
CORR
2010
Springer
44views Education» more  CORR 2010»
13 years 7 months ago
Open Access Mandates and the "Fair Dealing" Button
Arthur Sale, Marc Couture, Eloy Rodrigues, Leslie ...
CORR
2010
Springer
96views Education» more  CORR 2010»
13 years 7 months ago
Linear Capacity Scaling in Wireless Networks: Beyond Physical Limits?
We investigate the role of cooperation in wireless networks subject to a spatial degrees of freedom limitation. To address the worst case scenario, we consider a free-space lineof-...
Ayfer Özgür, Olivier Lévêqu...
CORR
2010
Springer
96views Education» more  CORR 2010»
13 years 7 months ago
On the Non-Coherent Wideband Multipath Fading Relay Channel
We investigate the multipath fading relay channel in the limit of a large bandwidth, and in the non-coherent setting, where the channel state is unknown to all terminals, including...
Nadia Fawaz, Muriel Médard
CORR
2010
Springer
101views Education» more  CORR 2010»
13 years 7 months ago
Bounds for binary codes relative to pseudo-distances of k points
We apply Schrijver's semidefinite programming method to obtain improved upper bounds on generalized distances and list decoding radii of binary codes.
Christine Bachoc, Gilles Zémor
CORR
2010
Springer
143views Education» more  CORR 2010»
13 years 7 months ago
The Complexity of Proving the Discrete Jordan Curve Theorem
The Jordan Curve Theorem (JCT) states that a simple closed curve divides the plane into exactly two connected regions. We formalize and prove the theorem in the context of grid gr...
Phuong Nguyen, Stephen Cook