Sciweavers

CORR
2010
Springer
103views Education» more  CORR 2010»
13 years 9 months ago
Asymptotic Learning Curve and Renormalizable Condition in Statistical Learning Theory
Bayes statistics and statistical physics have the common mathematical structure, where the log likelihood function corresponds to the random Hamiltonian. Recently, it was discovere...
Sumio Watanabe
CORR
2010
Springer
130views Education» more  CORR 2010»
13 years 9 months ago
Sharp Bounds on the Entropy of the Poisson Law and Related Quantities
One of the difficulties in calculating the capacity of certain Poisson channels is that H(), the entropy of the Poisson distribution with mean , is not available in a simple form. ...
José A. Adell, Alberto Lekuona, Yaming Yu
CORR
2010
Springer
73views Education» more  CORR 2010»
13 years 9 months ago
On Touching Triangle Graphs
Abstract. In this paper, we consider the problem of representing graphs by triangles whose sides touch. We present linear time algorithms for creating touching triangles representa...
Emden R. Gansner, Yifan Hu, Stephen G. Kobourov
CORR
2010
Springer
83views Education» more  CORR 2010»
13 years 9 months ago
Grammatical Aspects for Language Descriptions
Andrey Breslav
CORR
2010
Springer
48views Education» more  CORR 2010»
13 years 9 months ago
A General Coding Scheme for Two-User Fading Interference Channels
Lalitha Sankar, Elza Erkip, H. Vincent Poor
CORR
2010
Springer
141views Education» more  CORR 2010»
13 years 9 months ago
Termination Detection of Local Computations
Contrary to the sequential world, the processes involved in a distributed system do not necessarily know when a computation is globally finished. This paper investigates the proble...
Emmanuel Godard, Yves Métivier, Gerard Tel
CORR
2010
Springer
131views Education» more  CORR 2010»
13 years 9 months ago
Detecting Botnets Through Log Correlation
Botnets, which consist of thousands of compromised machines, can cause significant threats to other systems by launching Distributed Denial of Service (DDoS) attacks, keylogging, a...
Yousof Al-Hammadi, Uwe Aickelin
CORR
2010
Springer
60views Education» more  CORR 2010»
13 years 9 months ago
Multiple Access Network Information-flow And Correction codes
Hongyi Yao, Theodoros K. Dikaliotis, Sidharth Jagg...
CORR
2010
Springer
125views Education» more  CORR 2010»
13 years 9 months ago
Delay-rate tradeoff for ergodic interference alignment in the Gaussian case
In interference alignment, users sharing a wireless channel are each able to achieve data rates of up to half of the non-interfering channel capacity, no matter the number of users...
Joseph C. Koo, William Wu, John T. Gill III
CORR
2010
Springer
57views Education» more  CORR 2010»
13 years 9 months ago
A new proof of Delsarte, Goethals and Mac Williams theorem on minimal weight codewords of generalized Reed-Muller code
We give a new proof of Delsarte, Goethals and Mac williams theorem on minimal weight codewords of generalized Reed-Muller codes published in 1970. To prove this theorem, we consid...
Elodie Leducq