Sciweavers

105
Voted
CORR
2006
Springer
121views Education» more  CORR 2006»
15 years 23 days ago
On Performance of Event-to-Sink Transport in Transmit-Only Sensor Networks
We consider a hybrid wireless sensor network with regular and transmit-only sensors. The transmit-only sensors do not have receiver circuit, hence are cheaper and less energy consu...
Bartlomiej Blaszczyszyn, Bozidar Radunovic
106
Voted
CORR
2006
Springer
127views Education» more  CORR 2006»
15 years 23 days ago
Space Division Multiple Access with a Sum Feedback Rate Constraint
On a multiantenna broadcast channel, simultaneous transmission to multiple users by joint beamforming and scheduling is capable of achieving high throughput, which grows double log...
Kaibin Huang, Robert W. Heath Jr., Jeffrey G. Andr...
101
Voted
CORR
2006
Springer
136views Education» more  CORR 2006»
15 years 23 days ago
A Case for Peering of Content Delivery Networks
: The proliferation of Content Delivery Networks (CDN) reveals that existing content networks are owned and operated by individual companies. As a consequence, closed delivery netw...
Rajkumar Buyya, Al-Mukaddim Khan Pathan, James Bro...
34
Voted
CORR
2006
Springer
80views Education» more  CORR 2006»
15 years 23 days ago
Dichotomies and Duality in First-order Model Checking Problems
Barnaby Martin
88
Voted
CORR
2006
Springer
114views Education» more  CORR 2006»
15 years 23 days ago
Fast algorithms for computing isogenies between elliptic curves
We survey algorithms for computing isogenies between elliptic curves defined over a field of characteristic either 0 or a large prime. We introduce a new algorithm that computes an...
Alin Bostan, Bruno Salvy, François Morain, ...
116
Voted
CORR
2006
Springer
100views Education» more  CORR 2006»
15 years 23 days ago
Bilayer Low-Density Parity-Check Codes for Decode-and-Forward in Relay Channels
This paper describes an efficient implementation of binning for decode-and-forward (DF) in relay channels using lowdensity parity-check (LDPC) codes. Bilayer LDPC codes are devised...
Peyman Razaghi, Wei Yu
107
Voted
CORR
2006
Springer
206views Education» more  CORR 2006»
15 years 23 days ago
ANAP: Anonymous Authentication Protocol in Mobile Ad hoc Networks
The pervasiveness of wireless communication recently gave mobile ad hoc networks (MANET) a significant researcher's attention, due to its innate capabilities of instant commu...
Tomasz Ciszkowski, Zbigniew Kotulski
CORR
2006
Springer
113views Education» more  CORR 2006»
15 years 23 days ago
Combining typing and size constraints for checking the termination of higher-order conditional rewrite systems
In a previous work, the first author extended to higher-order rewriting and dependent types the use of size annotations in types, a termination proof technique called type or size ...
Frédéric Blanqui, Colin Riba
CORR
2006
Springer
84views Education» more  CORR 2006»
15 years 23 days ago
On the freeze quantifier in Constraint LTL: decidability and complexity
Stéphane Demri, Ranko Lazic, David Nowak
42
Voted
CORR
2006
Springer
72views Education» more  CORR 2006»
15 years 23 days ago
Extending an Information Extraction tool set to Central and Eastern European languages
Camelia Ignat, Bruno Pouliquen, António Rib...