Sciweavers

CORR
2006
Springer
121views Education» more  CORR 2006»
13 years 4 months ago
Heterogeneous Strong Computation Migration
The continuous increasing in performance requirements, for both scientic computation and industry, motivates the need of a powerful computing infrastructure. The Grid appeared as ...
Anolan Milanés, Noemi de La Rocque Rodrigue...
CORR
2006
Springer
92views Education» more  CORR 2006»
13 years 4 months ago
Highly robust error correction by convex programming
This paper discusses a stylized communications problem where one wishes to transmit a real-valued signal x Rn (a block of n pieces of information) to a remote receiver. We ask wh...
Emmanuel J. Candès, Paige A. Randall
CORR
2006
Springer
90views Education» more  CORR 2006»
13 years 4 months ago
Symmetric Subresultants and Applications
Schur's transforms of a polynomial are used to count its roots in the unit disk. These are generalized them by introducing the sequence of symmetric sub-resultants of two pol...
Cyril Brunie, Philippe Saux Picart
CORR
2006
Springer
102views Education» more  CORR 2006»
13 years 4 months ago
Architecture for Modular Data Centers
James R. Hamilton
CORR
2006
Springer
84views Education» more  CORR 2006»
13 years 4 months ago
Truncating the loop series expansion for Belief Propagation
Vicenç Gómez, Joris M. Mooij, Hilber...
CORR
2006
Springer
121views Education» more  CORR 2006»
13 years 4 months ago
On Using Matching Theory to Understand P2P Network Design
This paper aims to provide insight into stability of collaboration choices in P2P networks. We study networks where exchanges between nodes are driven by the desire to receive the...
Dmitry Lebedev, Fabien Mathieu, Laurent Viennot, A...
CORR
2006
Springer
86views Education» more  CORR 2006»
13 years 4 months ago
Maximum Entropy MIMO Wireless Channel Models
In this contribution, models of wireless channels are derived from the maximum entropy principle, for several cases where only limited information about the propagation environmen...
Maxime Guillaud, Mérouane Debbah, Aris L. M...
CORR
2006
Springer
91views Education» more  CORR 2006»
13 years 4 months ago
Improved results for a memory allocation problem
We consider a memory allocation problem. This problem can be modeled as a version of bin packing where items may be split, but each bin may contain at most two (parts of) items. T...
Leah Epstein, Rob van Stee
CORR
2006
Springer
112views Education» more  CORR 2006»
13 years 4 months ago
Algorithms and Approaches of Proxy Signature: A Survey
Numerous research studies have been investigated on proxy signatures over the last decade. This survey reviews the research progress on proxy signatures, analyzes a few notable pr...
Manik Lal Das, Ashutosh Saxena, Deepak B. Phatak
CORR
2006
Springer
88views Education» more  CORR 2006»
13 years 4 months ago
The Power and Perils of MDL
Practical use of MDL is full of pitfalls in which the practitioners tend to fall head over heels. We analyse the power and the perils in the use of MDL. Generally, the classical a...
Pieter W. Adriaans, Paul M. B. Vitányi