Sciweavers

IPL
2011
94views more  IPL 2011»
14 years 7 months ago
Lower bounds for context-free grammars
Ellul, Krawetz, Shallit and Wang prove an exponential lower bound on the size of any context-free grammar generating the language of all permutations over some alphabet. We genera...
Yuval Filmus
IPL
2011
91views more  IPL 2011»
14 years 7 months ago
Fast leader election in anonymous rings with bounded expected delay
We propose a probabilistic network model, called asynchronous bounded expected delay (ABE), which requires a known bound on the expected message delay. In ABE networks all asynchr...
Rena Bakhshi, Jörg Endrullis, Wan Fokkink, Ju...
215
Voted
IPCAI
2011
14 years 7 months ago
Constrained 2-D/3-D Registration for Motion Compensation in AFib Ablation Procedures
Abstract. Fluoroscopic overlay images rendered from pre-operative volumetric data can provide additional guidance for physicians during catheter ablation procedures for treatment o...
Alexander Brost, Andreas Wimmer, Rui Liao, Joachim...
136
Voted
IOR
2011
96views more  IOR 2011»
14 years 7 months ago
An Ascending Vickrey Auction for Selling Bases of a Matroid
Consider selling bundles of indivisible goods to buyers with concave utilities that are additively separable in money and goods. We propose an ascending auction for the case when ...
Sushil Bikhchandani, Sven de Vries, James Schummer...
87
Voted
INFORMATION
2011
72views more  INFORMATION 2011»
14 years 7 months ago
Distribution of "Characteristic" Terms in MEDLINE Literatures
: Given the occurrence frequency of any term within any set of articles within MEDLINE, we define ―characteristic‖ terms as words and phrases that occur in that literature more...
Neil R. Smalheiser, Wei Zhou, Vetle I. Torvik
167
Voted
INFOCOM
2011
IEEE
14 years 7 months ago
General capacity scaling of wireless networks
—We study the general scaling laws of the capacity for random wireless networks under the generalized physical model. The generality of this work is embodied in three dimensions ...
Cheng Wang, Changjun Jiang, Xiang-Yang Li, ShaoJie...
144
Voted
INFOCOM
2011
IEEE
14 years 7 months ago
Prevalence and mitigation of forum spamming
—Forums on the Web are increasingly spammed by miscreants in order to attract visitors to their (often malicious) websites. In this paper, we study the prevalence of forum spammi...
Youngsang Shin, Minaxi Gupta, Steven A. Myers
158
Voted
INFOCOM
2011
IEEE
14 years 7 months ago
SocialFilter: Introducing social trust to collaborative spam mitigation
—We propose SocialFilter, a trust-aware collaborative spam mitigation system. Our proposal enables nodes with no email classification functionality to query the network on wheth...
Michael Sirivianos, Kyungbaek Kim, Xiaowei Yang