Sciweavers

CORR
2008
Springer
141views Education» more  CORR 2008»
15 years 27 days ago
Truthful Unsplittable Flow for Large Capacity Networks
The unsplittable flow problem is one of the most extensively studied optimization problems in the field of networking. An instance of it consists of an edge capacitated graph and ...
Yossi Azar, Iftah Gamzu, Shai Gutner
CORR
2008
Springer
118views Education» more  CORR 2008»
15 years 27 days ago
A Logic Programming Framework for Combinational Circuit Synthesis
Abstract. Logic Programming languages and combinational circuit synthesis tools share a common "combinatorial search over logic formulae" background. This paper attempts ...
Paul Tarau, Brenda Luderman
104
Voted
CORR
2008
Springer
127views Education» more  CORR 2008»
15 years 27 days ago
Comparing and Combining Methods for Automatic Query Expansion
Abstract. Query expansion is a well known method to improve the performance of information retrieval systems. In this work we have tested different approaches to extract the candid...
José R. Pérez-Agüera, Lourdes A...
92
Voted
CORR
2008
Springer
95views Education» more  CORR 2008»
15 years 27 days ago
Some properties of the regular asynchronous systems
: The asynchronous systems are the models of the asynchronous circuits from the digital electrical engineering. An asynchronous system f is a multi-valued function that assigns to ...
Serban E. Vlad
CORR
2010
Springer
142views Education» more  CORR 2010»
15 years 27 days ago
A Fault Analytic Method against HB+
The search for lightweight authentication protocols suitable for low-cost RFID tags constitutes an active and challenging research area. In this context, a family of protocols base...
Jose Carrijo, Rafael Tonicelli, Anderson C. A. Nas...
75
Voted
CORR
2010
Springer
65views Education» more  CORR 2010»
15 years 27 days ago
On Unconditionally Secure Computation with Vanishing Communication Cost
We propose a novel distortion-theoretic approach to a secure three-party computation problem. Alice and Bob have deterministic sequences, and Charlie wishes to compute a normalize...
Ye Wang, Shantanu Rane, Wei Sun, Prakash Ishwar
CORR
2010
Springer
99views Education» more  CORR 2010»
15 years 27 days ago
On Equivalence Between Network Topologies
One major open problem in network coding is to characterize the capacity region of a general multi-source multi-demand network. There are some existing computational tools for boun...
Michelle Effros, Tracey Ho, Shirin Jalali
CORR
2008
Springer
152views Education» more  CORR 2008»
15 years 27 days ago
Characterizing User Mobility in Second Life
In this work we present a measurement study of user mobility in Second Life. We first discuss different techniques to collect user traces and then focus on results obtained using ...
Chi-Anh La, Pietro Michiardi
94
Voted
CORR
2010
Springer
64views Education» more  CORR 2010»
15 years 27 days ago
Selfish Response to Epidemic Propagation
An epidemic spreading in a network calls for a decision on the part of the network members: They should decide whether to protect themselves or not. Their decision depends on the ...
George Theodorakopoulos, Jean-Yves Le Boudec, John...
CORR
2008
Springer
51views Education» more  CORR 2008»
15 years 27 days ago
Lambda-Free Logical Frameworks
Robin Adams