Sciweavers

CORR
2010
Springer
65views Education» more  CORR 2010»
14 years 12 months ago
Fishing in Poisson streams: focusing on the whales, ignoring the minnows
This paper describes a low-complexity approach for reconstructing average packet arrival rates and instantaneous packet counts at a router in a communication network, where the arr...
Maxim Raginsky, Sina Jafarpour, Rebecca Willett, A...
CORR
2010
Springer
148views Education» more  CORR 2010»
14 years 12 months ago
Low Rate Sampling of Pulse Streams with Application to Ultrasound Imaging
Signals comprised of a stream of short pulses appear in many applications including bio-imaging, radar, and ultrawideband communication. Recently, a new framework, referred to as f...
Ronen Tur, Yonina C. Eldar, Zvi Friedman
CORR
2010
Springer
72views Education» more  CORR 2010»
14 years 12 months ago
Fixed point theorem and aperiodic tilings
Bruno Durand, Andrei E. Romashchenko, Alexander Sh...
CORR
2010
Springer
64views Education» more  CORR 2010»
14 years 12 months ago
Near-Optimal Evasion of Convex-Inducing Classifiers
Classifiers are often used to detect miscreant activities. We study how an adversary can efficiently query a classifier to elicit information that allows the adversary to evade de...
Blaine Nelson, Benjamin I. P. Rubinstein, Ling Hua...
CORR
2010
Springer
90views Education» more  CORR 2010»
14 years 12 months ago
Table manipulation in simplicial databases
In [Spi], we developed a category of databases in which the schema of a database is represented as a simplicial set. Each simplex corresponds to a table in the database. There, our...
David I. Spivak
CORR
2010
Springer
183views Education» more  CORR 2010»
14 years 12 months ago
Forming the COUNCIL Based Clusters in Securing Wireless Ad Hoc Networks
-- In cluster-based routing protocol (CBRP), two-level hierarchical structure is successfully used to reduce over-flooding in wireless ad hoc networks. As it is vulnerable to a sin...
Alok Ojha, Hongmei Deng, Dharma P. Agrawal, Sugata...
CORR
2010
Springer
144views Education» more  CORR 2010»
14 years 12 months ago
Stochastic Games for Security in Networks with Interdependent Nodes
This paper studies a stochastic game theoretic approach to security and intrusion detection in communication and computer networks. Specifically, an Attacker and a Defender take pa...
Kien C. Nguyen, Tansu Alpcan, Tamer Basar
CORR
2010
Springer
204views Education» more  CORR 2010»
14 years 12 months ago
Limited Feedback Multi-Antenna Quantization Codebook Design-Part II: Multiuser Channels
This is the second part of a two-part paper on optimal design of limited feedback single-user and multiuser spatial multiplexing systems. The first part of the paper studies the si...
Behrouz Khoshnevis, Wei Yu
CORR
2010
Springer
176views Education» more  CORR 2010»
14 years 12 months ago
Limited Feedback Multi-Antenna Quantization Codebook Design-Part I: Single-User Channels
Abstract--In this two-part paper, we study the design and optimization of limited feedback single-user and multiuser systems with a multiple-antenna base station and single-antenna...
Behrouz Khoshnevis, Wei Yu
CORR
2010
Springer
45views Education» more  CORR 2010»
14 years 12 months ago
Rivals for the crown: Reply to Opthof and Leydesdorff
Anthony F. J. van Raan, Thed N. van Leeuwen, Marti...