Sciweavers

797 search results - page 57 / 160
» Observing Success in the Pi-Calculus
Sort
View
TIT
2008
79views more  TIT 2008»
14 years 9 months ago
Outage Capacity of MIMO Poisson Fading Channels
The information outage probability of a shot-noise limited direct detection multiple-input multipleoutput (MIMO) optical channel subject to block fading is considered. Information...
Kaushik Chakraborty, Subhrakanti Dey, Massimo Fran...
JSAC
2007
87views more  JSAC 2007»
14 years 9 months ago
Hidden-Action in Network Routing
— In communication networks, such as the Internet or mobile ad-hoc networks, the actions taken by intermediate nodes or links are typically hidden from the communicating endpoint...
Michal Feldman, John Chuang, Ion Stoica, Scott She...
LATINCRYPT
2010
14 years 8 months ago
How Leaky Is an Extractor?
This paper discusses the security of a leakage-resilient stream cipher presented at FOCS 2008, instantiated in a practical setting. Based on a case study, we put forward implementa...
François-Xavier Standaert
MANSCI
2010
113views more  MANSCI 2010»
14 years 8 months ago
Prediction Markets: Alternative Mechanisms for Complex Environments with Few Traders
Double auction prediction markets have proven successful in large-scale applications such as elections and sporting events. Consequently, several large corporations have adopted t...
Paul J. Healy, Sera Linardi, J. Richard Lowery, Jo...
ACL
2010
14 years 7 months ago
Finding Cognate Groups Using Phylogenies
A central problem in historical linguistics is the identification of historically related cognate words. We present a generative phylogenetic model for automatically inducing cogn...
David Hall, Dan Klein