Sciweavers

CORR
2008
Springer
111views Education» more  CORR 2008»
13 years 4 months ago
Linear-Time Algorithms for Geometric Graphs with Sublinearly Many Crossings
We provide linear-time algorithms for geometric graphs with sublinearly many crossings. That is, we provide algorithms running in O(n) time on connected geometric graphs having n ...
David Eppstein, Michael T. Goodrich, Darren Strash
CORR
2008
Springer
110views Education» more  CORR 2008»
13 years 4 months ago
Justifications for Logic Programs under Answer Set Semantics
The paper introduces the notion of off-line justification for Answer Set Programming (ASP). Justifications provide a graph-based explanation of the truth value of an atom w.r.t. a ...
Enrico Pontelli, Tran Cao Son, Omar El-Khatib
CORR
2008
Springer
123views Education» more  CORR 2008»
13 years 4 months ago
Provenance Traces
Provenance is information about the origin, derivation, ownership, or history of an object. It has recently been studied extensively in scientific databases and other settings due...
James Cheney, Umut A. Acar, Amal Ahmed
CORR
2008
Springer
65views Education» more  CORR 2008»
13 years 4 months ago
An Introduction to Knowledge Management
Sabu M. Thampi
CORR
2008
Springer
73views Education» more  CORR 2008»
13 years 4 months ago
Secrecy Capacity of a Class of Broadcast Channels with an Eavesdropper
We study the security of communication between a single transmitter and multiple receivers in a broadcast channel in the presence of an eavesdropper. Characterizing the secrecy ca...
Ersen Ekrem, Sennur Ulukus
CORR
2008
Springer
176views Education» more  CORR 2008»
13 years 4 months ago
An evaluation of Bradfordizing effects
The purpose of this paper is to apply and evaluate the bibliometric method Bradfordizing for information retrieval (IR) experiments. Bradfordizing is used for generating core docu...
Philipp Mayr
CORR
2008
Springer
53views Education» more  CORR 2008»
13 years 4 months ago
Zigzag Persistence
Gunnar Carlsson, Vin de Silva
CORR
2008
Springer
104views Education» more  CORR 2008»
13 years 4 months ago
Stable normal forms for polynomial system solving
This paper describes and analyzes a method for computing border bases of a zero-dimensional ideal I. The criterion used in the computation involves specific commutation polynomial...
Bernard Mourrain, Philippe Trebuchet
CORR
2008
Springer
99views Education» more  CORR 2008»
13 years 4 months ago
Omnidirectional Relay in Wireless Networks
For wireless networks with multiple sources, an omnidirectional relay scheme is developed, where each node can help relay multiple messages in different directions. This is accomp...
Liang-Liang Xie
CORR
2008
Springer
153views Education» more  CORR 2008»
13 years 4 months ago
LACK - a VoIP Steganographic Method
The paper presents a new steganographic method called LACK (Lost Audio PaCKets Steganography) which is intended mainly for VoIP. The method is presented in a broader context of net...
Wojciech Mazurczyk, Józef Lubacz