Sciweavers

101
Voted
CORR
2008
Springer
128views Education» more  CORR 2008»
15 years 25 days ago
Efficient Energy Management Policies for Networks with Energy Harvesting Sensor Nodes
We study sensor networks with energy harvesting nodes. The generated energy at a node can be stored in a buffer. A sensor node periodically senses a random field and generates a pa...
Vinod Sharma, Utpal Mukherji, Vinay Joseph
CORR
2008
Springer
81views Education» more  CORR 2008»
15 years 25 days ago
Effect of Tuned Parameters on a LSA MCQ Answering Model
-- This paper presents the current state of a work in progress, whose objective is to better understand the effects of factors that significantly influence the performance of the L...
Alain Lifchitz, Sandra Jhean-Larose, Guy Denhi&egr...
98
Voted
CORR
2008
Springer
148views Education» more  CORR 2008»
15 years 25 days ago
Conversion/Preference Games
We introduce the concept of Conversion/Preference Games, or CP games for short. CP games generalize the standard notion of strategic games. First we exemplify the use of CP games. ...
Stéphane Le Roux, Pierre Lescanne, Ren&eacu...
67
Voted
CORR
2008
Springer
106views Education» more  CORR 2008»
15 years 25 days ago
A variant of Wiener's attack on RSA
Andrej Dujella
72
Voted
CORR
2008
Springer
233views Education» more  CORR 2008»
15 years 25 days ago
3D Face Recognition with Sparse Spherical Representations
Roser Sala Llonch, Effrosini Kokiopoulou, Ivana To...
119
Voted
CORR
2008
Springer
124views Education» more  CORR 2008»
15 years 25 days ago
Scheduling Kalman Filters in Continuous Time
A set of N independent Gaussian linear time invariant systems is observed by M sensors whose task is to provide the best possible steady-state causal minimum mean square estimate o...
Jerome Le Ny, Eric Feron, Munther A. Dahleh
82
Voted
CORR
2008
Springer
116views Education» more  CORR 2008»
15 years 25 days ago
To which extend is the "neural code" a metric ?
Here is proposed a review of the different choices to structure spike trains, using deterministic metrics. Temporal constraints observed in biological or computational spike train...
Bruno Cessac, Horacio Rostro-González, Juan...
93
Voted
CORR
2008
Springer
120views Education» more  CORR 2008»
15 years 25 days ago
Automorphisms of doubly-even self-dual binary codes
The automorphism group of a binary doubly-even self-dual code is always contained in the alternating group. On the other hand, given a permutation group G of degree n there exists...
Annika Guenther, Gabriele Nebe
105
Voted
CORR
2008
Springer
125views Education» more  CORR 2008»
15 years 25 days ago
Semidefinite programming for N-Player Games
Abstract. We introduce two min-max problems: the first problem is to minimize the supremum of finitely many rational functions over a compact basic semi-algebraic set whereas the s...
Rida Laraki, Jean B. Lasserre
86
Voted
CORR
2008
Springer
98views Education» more  CORR 2008»
15 years 25 days ago
Divisibility, Smoothness and Cryptographic Applications
This paper deals with products of moderate-size primes, familiarly known as smooth numbers. Smooth numbers play an crucial role in information theory, signal processing and crypto...
David Naccache, Igor Shparlinski