• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 199
Next 10 →

Hybrid concolic testing

by Rupak Majumdar , et al.
"... We present hybrid concolic testing, an algorithm that interleaves random testing with concolic execution to obtain both a deep and a wide exploration of program state space. Our algorithm generates test inputs automatically by interleaving random testing until saturation with bounded exhaustive symb ..."
Abstract - Cited by 137 (7 self) - Add to MetaCart
symbolic exploration of program points. It thus combines the ability of random search to reach deep program states quickly together with the ability of concolic testing to explore states in a neighborhood exhaustively. We have implemented our algorithm on top of CUTE and applied it to obtain better branch

1 Interference Channel with an Out-of-Band Relay

by Onur Sahin, Osvaldo Simeone, Elza Erkip
"... Abstract—A Gaussian interference channel (IC) with a relay is considered. The relay is assumed to operate over an orthogonal band with respect to the underlying IC, and the overall system is referred to as IC with an out-of-band relay (IC-OBR). The system can be seen as operating over two parallel i ..."
Abstract - Add to MetaCart
Abstract—A Gaussian interference channel (IC) with a relay is considered. The relay is assumed to operate over an orthogonal band with respect to the underlying IC, and the overall system is referred to as IC with an out-of-band relay (IC-OBR). The system can be seen as operating over two parallel interferencelimited channels: The first is a standard Gaussian IC and the second is a Gaussian relay channel characterized by two sources and destinations communicating through the relay without direct links. We refer to the second parallel channel as OBR Channel (OBRC). The main aim of this work is to identify conditions under which optimal operation, in terms of the capacity region of the IC-OBR, entails either signal relaying and/or interference forwarding by the relay, with either a separable or non-separable use of the two parallel channels, IC and OBRC. Here “separable ” refers to transmission of independent information over the two constituent channels. For a basic model in which the OBRC consists of four orthogonal channels from sources to relay and from relay to destinations (IC-OBR Type-I), a condition is identified under which signal relaying and separable operation is optimal. This condition entails the presence of a relay-to-destinations capacity bottleneck on the OBRC and holds irrespective of the IC. When this condition is not satisfied, various scenarios, which depend on the IC channel gains, are identified in which interference forwarding and non-separable operation are necessary to achieve optimal performance. In these scenarios, the system exploits the “excess capacity ” on the OBRC via interference forwarding to drive the IC-OBR system in specific interference regimes (strong or mixed). The analysis is then turned to a more complex IC-OBR, in which the OBRC consists of only two orthogonal channels, one from sources to relay and one from relay to destinations (IC-OBR Type-II). For this channel, some capacity resuls are derived that parallel the conclusions for IC-OBR Type-I and point to the additional analytical challenges. I.

Generating Parameterized Unit Tests

by Gordon Fraser, Andreas Zeller - in Proceedings of the 2011 International Symposium on Software Testing and Analysis , 2011
"... State-of-the art techniques for automated test generation focus on generating executions that cover program behavior. As they do not generate oracles, it is up to the developer to figure out what a test does and how to check the correctness of the observed behavior. In this paper, we present an appr ..."
Abstract - Cited by 17 (2 self) - Add to MetaCart
-tation steps. Evaluated on five open source libraries, the generat-ed parameterized unit tests are (a) more expressive, characterizing general rather than concrete behavior; (b) need fewer computation steps, making them easier to understand; and (c) achieve a higher coverage than regular unit tests.

Materials for an exploratory theory of the network society.

by Manuel Castells , Anthony Giddens , Alain Touraine , Anthony Smith , Benjamin Barber , Peter Hall , Roger-Pol Droit , Sophie Watson , Frank Webster , Krishan Kumar , David Lyon , Craig Calhoun , Jeffrey Henderson , Ramon Ramos , Jose E Rodrigues-Ibanez , Jose F Tezanos , Mary Kaldor , Stephen Jones , Christopher Freeman - The British Journal of Sociology , 2000
"... ABSTRACT This article aims at proposing some elements for a grounded theor y of the network society. The network society is the social structure characteristic of the Information Age, as tentatively identi ed by empirical, cross-cultural investigation. It permeates most societies in the world, in v ..."
Abstract - Cited by 122 (0 self) - Add to MetaCart
, understanding by personality the individuation of social relationships in speci c brains, in interaction with the brain's biological features. Power is founded upon the ability to exercise violence. Historically, it is the monopoly of physical violence, embodied in the state, which has been the main

representations of

by unknown authors
"... nite-context sources from fractal ..."
Abstract - Add to MetaCart
nite-context sources from fractal

Contents

by Maxwell Krohn, Michael O. Rabin, Michael Mitzenmacher , 1999
"... 1.1 Private and Public Key Cryptography..................... 5 ..."
Abstract - Add to MetaCart
1.1 Private and Public Key Cryptography..................... 5

On the Definitions of Cryptographic Security: Chosen-Ciphertext Attack Revisited

by unknown authors , 1999
"... ..."
Abstract - Add to MetaCart
Abstract not found

Akademisk avhandling för teknisk doktorsexamen vid

by Kungl Tekniska Högskolan, Kth Tryck , 1994
"... mcmxciv This thesis deals with combinatorics in connection with Coxeter groups, finitely generated but not necessarily finite. The representation theory of groups as nonsingular matrices over a field is of immense theoretical importance, but also basic for computational group theory, where the group ..."
Abstract - Add to MetaCart
mcmxciv This thesis deals with combinatorics in connection with Coxeter groups, finitely generated but not necessarily finite. The representation theory of groups as nonsingular matrices over a field is of immense theoretical importance, but also basic for computational group theory, where the group elements are data structures in a computer. Matrices are unnecessarily large structures, and part of this thesis is concerned with small and efficient representations of a large class of Coxeter groups (including most Coxeter groups that anyone ever payed any attention to.) The main contents of the thesis can be summarized as follows. • We prove that for all Coxeter graphs constructed from an n-path of unlabelled edges by adding a new labelled edge and a new vertex (sometimes two new edges and vertices), there is a permutational representation of the corresponding group. Group elements correspond to integer n-sequences and the nodes in the path generate all n! permutations. The extra node has a more complicated action, adding a certain quantity to some of the numbers.

1Local Identification of Overcomplete Dictionaries

by Karin Schnass
"... This paper presents the first theoretical results showing that stable identification of overcomplete µ-coherent dictionaries Φ ∈ Rd×K is locally possible from training signals with sparsity levels S up to the order O(µ−2) and signal to noise ratios up to O( d). In particular the dictionary is recove ..."
Abstract - Add to MetaCart
This paper presents the first theoretical results showing that stable identification of overcomplete µ-coherent dictionaries Φ ∈ Rd×K is locally possible from training signals with sparsity levels S up to the order O(µ−2) and signal to noise ratios up to O( d). In particular the dictionary

IEEE TRANSACTIONS ON COMMUNICATIONS (TO APPEAR) 1 Iterative Receiver Processing for OFDM Modulated Physical-Layer Network Coding in Underwater Acoustic Channels

by Zhaohui Wang, Student Member, Jie Huang, Shengli Zhou, Senior Member, Zhengdao Wang, Senior Member
"... Abstract—Physical-layer network coding (PLNC) allows two remote terminals to exchange information in two time slots via a half-duplex relay. In this paper, we consider PLNC in underwater acoustic (UWA) two-way relay networks, with particular attention on the recovery of the network-coded codeword at ..."
Abstract - Add to MetaCart
Abstract—Physical-layer network coding (PLNC) allows two remote terminals to exchange information in two time slots via a half-duplex relay. In this paper, we consider PLNC in underwater acoustic (UWA) two-way relay networks, with particular attention on the recovery of the network-coded codeword at the relay. Considering multiple paths in UWA channels with large delay spreads and temporal variations, orthogonal-frequency divisionmultiplexing (OFDM) is used as an underlying modulation. Distinct from existing works which mainly focus on the flat-fading channel and the non-iterative PLNC decoding, we investigate three iterative receivers at the relay in doubly-selective UWA channels. To estimate the network-coded codeword, the three receivers respectively adopt i) a conventional decoding scheme to recover the codewords from two terminals independently; ii) a decoding scheme to recover the network-coded codeword
Next 10 →
Results 1 - 10 of 199
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University