Sciweavers

CORR
2016
Springer
64views Education» more  CORR 2016»
8 years 26 days ago
Distinct 3D Glyphs with Data Layering for Highly Dense Multivariate Data Plots
—A carefully constructed scatterplot can reveal plenty about an underlying data set. However, in most cases visually mining and understanding a large multivariate data set requir...
Santiago V. Lombeyda
CORR
2016
Springer
71views Education» more  CORR 2016»
8 years 26 days ago
A New Approach for Testing Properties of Discrete Distributions
We study problems in distribution property testing: Given sample access to one or more unknown discrete distributions, we want to determine whether they have some global property ...
Ilias Diakonikolas, Daniel M. Kane
CORR
2016
Springer
77views Education» more  CORR 2016»
8 years 26 days ago
Wireless Energy Harvesting in a Cognitive Relay Network
Abstract—Wireless energy harvesting is regarded as a promising energy supply alternative for energy-constrained wireless networks. In this paper, a new wireless energy harvesting...
Yuanwei Liu, Seyed Ali Mousavifar, Yansha Deng, Cy...
CORR
2016
Springer
70views Education» more  CORR 2016»
8 years 26 days ago
Capacity Limits of Diffusion-Based Molecular Timing Channels
—This work introduces capacity limits for molecular timing (MT) channels, where information is modulated on the release timing of small information particles, and decoded from th...
Nariman Farsad, Yonathan Murin, Andrew W. Eckford,...
CORR
2016
Springer
68views Education» more  CORR 2016»
8 years 26 days ago
Regression Testing of Virtual Prototypes Using Symbolic Execution
Recently virtual platforms and virtual prototyping techniques have been widely applied for accelerating software development in electronics companies. It has been proved that thes...
Bin Lin, Dejun Qian
CORR
2016
Springer
49views Education» more  CORR 2016»
8 years 26 days ago
Bandit Structured Prediction for Learning from Partial Feedback in Statistical Machine Translation
We present an approach to structured prediction from bandit feedback, called Bandit Structured Prediction, where only the value of a task loss function at a single predicted point...
Artem Sokolov, Stefan Riezler, Tanguy Urvoy
CORR
2016
Springer
54views Education» more  CORR 2016»
8 years 26 days ago
On the scaling of functional spaces, from smart cities to cloud computing
The study of spacetime, and its role in understanding functional systems has received little attention in information science. Recent work, on the origin of universal scaling in c...
Mark Burgess
CORR
2016
Springer
71views Education» more  CORR 2016»
8 years 26 days ago
Local community detection by seed expansion: from conductance to weighted kernel 1-mean optimization
In local community detection by seed expansion a single cluster concentrated around few given query nodes in a graph is discovered in a localized way. Conductance is a popular obj...
Twan van Laarhoven, Elena Marchiori
CORR
2016
Springer
60views Education» more  CORR 2016»
8 years 26 days ago
Defeating the Ben-Zvi, Blackburn, and Tsaban Attack on the Algebraic Eraser
The Algebraic Eraser Diffie–Hellman (AEDH) protocol was introduced in 2005 and published in 2006 by I. Anshel, M. Anshel, D. Goldfeld, and S. Lemieux as a protocol suitable for ...
Iris Anshel, Derek Atkins, Dorian Goldfeld, Paul E...