Sciweavers

CORR
2011
Springer
160views Education» more  CORR 2011»
12 years 12 months ago
Provenance for Aggregate Queries
We study in this paper provenance information for queries with aggregation. Provenance information was studied in the context of various query languages that do not allow for aggr...
Yael Amsterdamer, Daniel Deutch, Val Tannen
CORR
2011
Springer
200views Education» more  CORR 2011»
12 years 12 months ago
Beating the Gilbert-Varshamov Bound for Online Channels
In the online channel coding model, a sender wishes to communicate a message to a receiver by transmitting a codeword x = (x1, . . . , xn) ∈ {0, 1}n bit by bit via a channel lim...
Ishay Haviv, Michael Langberg
CORR
2011
Springer
194views Education» more  CORR 2011»
12 years 12 months ago
Energy-Latency Tradeoff for In-Network Function Computation in Random Networks
—The problem of designing policies for in-network function computation with minimum energy consumption subject to a latency constraint is considered. The scaling behavior of the ...
Paul N. Balister, Béla Bollobás, Ani...
CORR
2011
Springer
148views Education» more  CORR 2011»
12 years 12 months ago
Convex Polyhedra Realizing Given Face Areas
Given n ≥ 4 positive real numbers, we prove in this note that they are the face areas of a convex polyhedron if and only if the largest number is not more than the sum of the ot...
Joseph O'Rourke
CORR
2011
Springer
220views Education» more  CORR 2011»
12 years 12 months ago
On a linear programming approach to the discrete Willmore boundary value problem and generalizations
We consider the problem of finding (possibly non connected) discrete surfaces spanning a finite set of discrete boundary curves in the three-dimensional space and minimizing (glo...
Thomas Schoenemann, Simon Masnou, Daniel Cremers
CORR
2011
Springer
226views Education» more  CORR 2011»
12 years 12 months ago
Buffer Sizing for 802.11 Based Networks
—We consider the sizing of network buffers in 802.11 based networks. Wireless networks face a number of fundamental issues that do not arise in wired networks. We demonstrate tha...
Tianji Li, Douglas J. Leith, David Malone
CORR
2011
Springer
158views Education» more  CORR 2011»
12 years 12 months ago
The Identity Crisis. Security, Privacy and Usability Issues in Identity Management
Abstract This paper studies the current ‘identity crisis’ caused by the substantial security, privacy and usability shortcomings encountered in existing systems for identity ma...
Gergely Alpár, Jaap-Henk Hoepman, Johanneke...
CORR
2011
Springer
212views Education» more  CORR 2011»
12 years 12 months ago
Combining Neural Networks for Skin Detection
Two types of combining strategies were evaluated namely combining skin features and combining skin classifiers. Several combining rules were applied where the outputs of the skin ...
Chelsia Amy Doukim, Jamal Ahmad Dargham, Ali Cheki...
CORR
2011
Springer
198views Education» more  CORR 2011»
12 years 12 months ago
Concrete Sentence Spaces for Compositional Distributional Models of Meaning
Coecke, Sadrzadeh, and Clark [3] developed a compositional model of meaning for distributional semantics, in which each word in a sentence has a meaning vector and the distributio...
Edward Grefenstette, Mehrnoosh Sadrzadeh, Stephen ...