Sciweavers

CORR
2010
Springer
88views Education» more  CORR 2010»
13 years 7 months ago
Network Codes Resilient to Jamming and Eavesdropping
Abstract--We consider the problem of communicating information over a network secretly and reliably in the presence of a hidden adversary who can eavesdrop and inject malicious err...
Hongyi Yao, Danilo Silva, Sidharth Jaggi, Michael ...
CORR
2010
Springer
112views Education» more  CORR 2010»
13 years 7 months ago
Type-Safe Feature-Oriented Product Lines
Sven Apel, Christian Kästner, Armin Grö&...
CORR
2010
Springer
134views Education» more  CORR 2010»
13 years 7 months ago
Effective Defect Prevention Approach in Software Process for Achieving Better Quality Levels
Defect prevention is the most vital but habitually neglected facet of software quality assurance in any project. If functional at all stages of software development, it can condens...
V. Suma, T. R. Gopalakrishnan Nair
CORR
2010
Springer
214views Education» more  CORR 2010»
13 years 7 months ago
Hybrid Medical Image Classification Using Association Rule Mining with Decision Tree Algorithm
The main focus of image mining in the proposed method is concerned with the classification of brain tumor in the CT scan brain images. The major steps involved in the system are: p...
P. Rajendran, M. Madheswaran
CORR
2010
Springer
64views Education» more  CORR 2010»
13 years 7 months ago
Proposing a New Method for Query Processing Adaption in DataBase
Mohammad-Reza Feizi-Derakhshi, Hasan Asil, Amir As...
CORR
2010
Springer
109views Education» more  CORR 2010»
13 years 7 months ago
Dirty Paper Coding using Sign-bit Shaping and LDPC Codes
Dirty paper coding (DPC) refers to methods for pre-subtraction of known interference at the transmitter of a multiuser communication system. There are numerous applications for DPC...
G. Shilpa, Andrew Thangaraj, Srikrishna Bhashyam
CORR
2010
Springer
117views Education» more  CORR 2010»
13 years 7 months ago
Relay Assisted Cooperative OSTBC Communication with SNR Imbalance and Channel Estimation Errors
In this paper, a two-hop relay assisted cooperative Orthogonal Space-Time Block Codes (OSTBC) transmission scheme is considered for the downlink communication of a cellular system,...
Bo Niu, Mihaela C. Beluri, Zinan Lin, Prabhakar Ch...
CORR
2010
Springer
166views Education» more  CORR 2010»
13 years 7 months ago
Software Metrics Evaluation Based on Entropy
Abstract. Software engineering activities in the Industry has come a long way with various improvements brought in various stages of the software development life cycle. The comple...
R. Selvarani, T. R. Gopalakrishnan Nair, Muthu Ram...
CORR
2010
Springer
166views Education» more  CORR 2010»
13 years 7 months ago
The dynamics of message passing on dense graphs, with applications to compressed sensing
`Approximate message passing' algorithms proved to be extremely effective in reconstructing sparse signals from a small number of incoherent linear measurements. Extensive num...
Mohsen Bayati, Andrea Montanari
CORR
2010
Springer
61views Education» more  CORR 2010»
13 years 7 months ago
Approximate Privacy: PARs for Set Problems
Joan Feigenbaum, Aaron D. Jaggard, Michael Schapir...