Sciweavers

CORR
2010
Springer
141views Education» more  CORR 2010»
14 years 12 months ago
Designing and Embedding Reliable Virtual Infrastructures
In a virtualized infrastructure where physical resources are shared, a single physical server failure will terminate several virtual servers and crippling the virtual infrastructu...
Wai-Leong Yeow, Cédric Westphal, Ulas C. Ko...
CORR
2010
Springer
69views Education» more  CORR 2010»
14 years 12 months ago
Using a Kernel Adatron for Object Classification with RCS Data
Marten F. Byl, James T. Demers, Edward A. Rietman
CORR
2010
Springer
137views Education» more  CORR 2010»
14 years 12 months ago
Positive Supercompilation for a Higher-Order Call-By-Value Language
Peter A. Jonsson, Johan Nordlander
CORR
2010
Springer
133views Education» more  CORR 2010»
14 years 12 months ago
On Byzantine Containment Properties of the $min+1$ Protocol
Self-stabilization is a versatile approach to fault-tolerance since it permits a distributed system to recover from any transient fault that arbitrarily corrupts the contents of a...
Swan Dubois, Toshimitsu Masuzawa, Sébastien...
CORR
2010
Springer
155views Education» more  CORR 2010»
14 years 12 months ago
Data-driven Co-clustering Model of Internet Usage in Large Mobile Societies
Design and simulation of future mobile networks will center around human interests and behavior. We propose a design paradigm for mobile networks driven by realistic models of use...
Saeed Moghaddam, Ahmed Helmy, Sanjay Ranka, Manas ...
CORR
2010
Springer
112views Education» more  CORR 2010»
14 years 12 months ago
Little Dragon Two: An efficient Multivariate Public Key Cryptosystem
In 1998 [8], Patarin proposed an efficient cryptosystem called Little Dragon which was a variant of Matsumoto Imai cryptosystem C . However Patarin later found that Little Dragon ...
Rajesh P. Singh, Anupam Saikia, B. K. Sarma
CORR
2010
Springer
110views Education» more  CORR 2010»
14 years 12 months ago
(Unconditional) Secure Multiparty Computation with Man-in-the-middle Attacks
In secure multi-party computation n parties jointly evaluate an n-variate function f in the presence of an adversary which can corrupt up till t parties. All honest parties are req...
Shailesh Vaya
CORR
2010
Springer
46views Education» more  CORR 2010»
14 years 12 months ago
A Formalization of the Turing Test
Evgeny Chutchev
CORR
2010
Springer
93views Education» more  CORR 2010»
14 years 12 months ago
Group-Strategyproof Irresolute Social Choice Functions
We axiomatically characterize the class of pairwise irresolute social choice functions that are group-strategyproof according to Kelly's preference extension. The class is na...
Felix Brandt
CORR
2010
Springer
98views Education» more  CORR 2010»
14 years 12 months ago
Analog Matching of Colored Sources to Colored Channels
Analog (uncoded) transmission provides a simple scheme for communicating a Gaussian source over a Gaussian channel under the mean squared error (MSE) distortion measure. Unfortuna...
Yuval Kochman, Ram Zamir