Sciweavers

CORR
2010
Springer
155views Education» more  CORR 2010»
14 years 6 months ago
A Proof Theoretic Analysis of Intruder Theories
We consider the problem of intruder deduction in security protocol analysis: that is, deciding whether a given message M can be deduced from a set of messages under the theory of ...
Alwen Tiu, Rajeev Goré, Jeremy E. Dawson
79
Voted
CORR
2010
Springer
221views Education» more  CORR 2010»
14 years 6 months ago
Reduction of Feature Vectors Using Rough Set Theory for Human Face Recognition
In this paper we describe a procedure to reduce the size of the input feature vector. A complex pattern recognition problem like face recognition involves huge dimension of input ...
Debotosh Bhattacharjee, Dipak Kumar Basu, Mita Nas...
47
Voted
CORR
2010
Springer
96views Education» more  CORR 2010»
14 years 6 months ago
Construction of Codes for Network Coding
Andreas-Stephan Elsenhans, Axel Kohnert, Alfred Wa...
73
Voted
CORR
2010
Springer
124views Education» more  CORR 2010»
14 years 6 months ago
Lattice model refinement of protein structures
To find the best lattice model representation of a given full atom protein structure is a hard computational problem. Several greedy methods have been suggested where results are ...
Martin Mann, Alessandro Dal Palù
CORR
2010
Springer
161views Education» more  CORR 2010»
14 years 6 months ago
CrystalGPU: Transparent and Efficient Utilization of GPU Power
General-purpose computing on graphics processing units (GPGPU) has recently gained considerable attention in various domains such as bioinformatics, databases and distributed comp...
Abdullah Gharaibeh, Samer Al-Kiswany, Matei Ripean...
38
Voted
CORR
2010
Springer
202views Education» more  CORR 2010»
14 years 6 months ago
Using vector divisions in solving linear complementarity problem
Youssef Elfoutayeni, Mohamed Khaladi
CORR
2010
Springer
115views Education» more  CORR 2010»
14 years 6 months ago
Approximately achieving Gaussian relay network capacity with lattice codes
Abstract--Recently, it has been shown that a quantize-mapand-forward scheme approximately achieves (within a constant number of bits) the Gaussian relay network capacity for arbitr...
Ayfer Özgür, Suhas N. Diggavi
29
Voted
CORR
2010
Springer
43views Education» more  CORR 2010»
14 years 6 months ago
Watching Systems in graphs: an extension of Identifying Codes
David Auger, Irène Charon, Olivier Hudry, A...
CORR
2010
Springer
127views Education» more  CORR 2010»
14 years 6 months ago
On Turing machines, dynamical systems and the Atiyah problem
: We consider mixed Dirichlet-Robin problems on scale irregular domains. In particular, we study the asymptotic convergence of the solutions of elliptic problems with Robin boundar...
Lukasz Grabowski