Sciweavers

2143 search results - page 305 / 429
» corr 2010
Sort
View
112
Voted
CORR
2010
Springer
132views Education» more  CORR 2010»
14 years 10 months ago
New Frontiers of Network Security: The Threat Within
Nearly 70% of information security threats originate from inside the organization. The instances of insider threats have been increasing at an alarming rate with the latest trends ...
Sugata Sanyal, Ajit Shelat, Amit Gupta
82
Voted
CORR
2010
Springer
97views Education» more  CORR 2010»
14 years 10 months ago
On the Scaling Law for Compressive Sensing and its Applications
1 minimization can be used to recover sufficiently sparse unknown signals from compressed linear measurements. In fact, exact thresholds on the sparsity, as a function of the ratio...
Weiyu Xu, Ao Tang
95
Voted
CORR
2010
Springer
159views Education» more  CORR 2010»
14 years 10 months ago
On optimizing over lift-and-project closures
The lift-and-project closure is the relaxation obtained by computing all lift-and-project cuts from the initial formulation of a mixed integer linear program or equivalently by co...
Pierre Bonami
76
Voted
CORR
2010
Springer
106views Education» more  CORR 2010»
14 years 10 months ago
Simulating space and time
This paper explores the idea that the space-time of a virtual reality could appear to those within it as our space-time does to us. The likely processing needed to do this include...
Brian Whitworth
CORR
2010
Springer
98views Education» more  CORR 2010»
14 years 10 months ago
Coding for High-Density Recording on a 1-D Granular Magnetic Medium
In terabit-density magnetic recording, several bits of data can be replaced by the values of their neighbors in the storage medium. As a result, errors in the medium are dependent ...
Arya Mazumdar, Alexander Barg, Navin Kashyap