default search action
CoRR, January 2011
- Aditya Dua, Nicholas Bambos:
Packet Scheduling in Switches with Target Outflow Profiles. - Katarzyna E. Paluch:
Popular b-matchings. - Emilie Charlier, Narad Rampersad:
The growth function of S-recognizable sets. - Jagbeer Singh:
An Algorithm to Reduce the Time Complexity of Earliest Deadline First Scheduling Algorithm in Real-Time System. - Eric Filiol:
PERSEUS Technology: New Trends in Information and Communication Security. - Naoya Kishiue, Masaya Nakahara, Shirou Maruyama, Hiroshi Sakamoto:
A Searchable Compressed Edit-Sensitive Parsing. - Evgenii Vityaev, Boris Kovalerchuk, Leonid I. Perlovsky, Stanislav Smerdov:
Probabilistic Dynamic Logic of Phenomena and Cognition. - Rathinakumar Appuswamy, Massimo Franceschetti, Nikhil Karamchandani, Kenneth Zeger:
Network coding for computing: Linear codes. - Gerald Schubert, Georg Hager, Holger Fehske, Gerhard Wellein:
Parallel sparse matrix-vector multiplication as a test case for hybrid MPI+OpenMP programming. - Markus Wittmann, Georg Hager:
Optimizing ccNUMA locality for task-parallel execution under OpenMP and TBB on multicore-based systems. - Anjan K., Jibi Abraham, Mamatha Jadhav V.:
Design of Transport Layer Based Hybrid Covert Channel Detection Engine. - Sergio España, Arturo González, Oscar Pastor, Marcela Ruiz:
Integration of Communication Analysis and the OO Method: Manual derivation of the Conceptual Model. The SuperStationery Co. lab demo. - Kojiro Higuchi, Arno Pauly:
The degree structure of Weihrauch-reducibility. - Herbert Toth:
Behavioral subtyping through typed assertions. - Jakub Kallas, Manfred Kufleitner, Alexander Lauser:
First-order Fragments with Successor over Infinite Words. - K. V. Rashmi, Nihar B. Shah, P. Vijay Kumar:
Enabling Node Repair in Any Erasure Code for Distributed Storage. - Carlos Barron-Romero:
The Complexity of Euclidian 2 Dimension Travelling Salesman Problem versus General Assign Problem, NP is not P. - Sameh Oueslati, Adnane Cherif, Bassel Solaiman:
Maximizing Strength of Digital Watermarks using Fuzzy Logic. - S. K. Jayanthi, S. Sasikala:
Link Spam Detection based on DBSpamClust with Fuzzy C-means Clustering. - A. A. Nippun Kumaar, Kiran G., T. S. B. Sudarshan:
Intelligent Lighting System Using Wireless Sensor Networks. - Li Ping Qian, Ying Jun Zhang, Mung Chiang:
Globally Optimal Distributed Power Control for Nonconcave Utility Maximization. - V. Ramesh, P. Subbaiah, N. Koteswar Rao, N. Subhashini, Narayana D.:
Performance Comparison and Analysis of Preemptive-DSR and TORA. - Ruoyun Gao, Michael S. Lew, Ling Shao:
Dynamic Feature Description in Human Action Recognition. - Thomas Steenbergen, Michael S. Lew:
Analysis of Using Browser-native Technology to Build Rich Internet Applications for Image Manipulation. - Erik R. Gast, Michael S. Lew:
A Framework for Real-Time Face and Facial Feature Tracking using Optical Flow Pre-estimation and Template Tracking. - Jaydip Sen:
An Intrusion Detection Architecture for Clustered Wireless Ad Hoc Networks. - Xiaojing Chen, Michael S. Lew:
Binary and nonbinary description of hypointensity in human brain MR images. - Liang Wang, Nies Huijsmans, Michael S. Lew, Dan Tsymbala:
Across Browsers SVG Implementation. - Jaydip Sen:
A Robust and Efficient Node Authentication Protocol for Mobile Ad Hoc Networks. - Shubham Chakraborty:
Use of Python and Phoenix-M Interface in Robotics. - Jaydip Sen:
A Robust and Fault-Tolerant Distributed Intrusion Detection System. - Jaydip Sen:
An Adaptive and Multi-Service Routing Protocol for Wireless Sensor Networks. - Sugreev Kaur, Rajesh Mehra:
High Speed and Area Efficient 2D DWT Processor based Image Compression" Signal & Image Processing. - Eberhard H.-A. Gerbracht:
"On the engineers' new toolbox" or Analog Circuit Design, using Symbolic Analysis, Computer Algebra, and Elementary Network Transformations. - Yu Zhang, Jaeok Park, Mihaela van der Schaar:
Social Norms for Networked Communities. - Mehdi Torbatian, Hossein Najafi, Mohamed Oussama Damen:
Asynchronous Interference Channel: Degrees of Freedom and Interference Alignment. - Edwin Hammerich:
On the heat channel and its capacity. - Lei Zhang, Dongning Guo:
Wireless Peer-to-Peer Mutual Broadcast via Sparse Recovery. - Matthew Brand:
Specular holography. - Rami Atar, Tsachy Weissman:
Mutual Information, Relative Entropy, and Estimation in the Poisson Channel. - Chinmay S. Vaze, Mahesh K. Varanasi:
The Degrees of Freedom Region of the Two-User MIMO Broadcast Channel with Delayed CSI. - Edward Grefenstette, Mehrnoosh Sadrzadeh, Stephen Clark, Bob Coecke, Stephen Pulman:
Concrete Sentence Spaces for Compositional Distributional Models of Meaning. - Mehdi Seyfi, Sami Muhaidat, Jie Liang:
On the Performance of Selection Cooperation with Imperfect Channel Estimation. - Walid Abediseid, Mohamed Oussama Damen:
Lattice Sequential Decoder for Coded MIMO Channel: Performance and Complexity Analysis. - Tobias Kretz:
A Round-Robin Tournament of the Iterated Prisoner's Dilemma with Complete Memory-Size-Three Strategies. - Yuya Dan:
Diffusion of Confidential Information on Networks. - Andrew Pavlo, Ning Shi:
Graffiti Networks: A Subversive, Internet-Scale File Sharing Model. - Randall J. Sobie, Ashok Agarwal, M. Anderson, Patrick Armstrong, K. Fransham, Ian Gable, D. Harris, C. Leavett-Brown, Michael Paterson, Duncan Penfold-Brown, M. Vliet, Andre Charbonneau, Roger Impey, Wayne Podaima:
Data Intensive High Energy Physics Analysis in a Distributed Cloud. - Ashish Ranjan Hota, Ankit Pat:
An Adaptive Quantum-inspired Differential Evolution Algorithm for 0-1 Knapsack Problem. - Benyuan Liu, Olivier Dousse, Philippe Nain, Donald F. Towsley:
Dynamic Coverage of Mobile Sensor Networks. - Chelsia Amy Doukim, Jamal Ahmad Dargham, Ali Chekima, Sigeru Omatu:
Combining Neural Networks for Skin Detection. - M. Emre Celebi:
Improving the Performance of K-Means for Color Quantization. - Gergely Alpár, Jaap-Henk Hoepman, Johanneke Siljee:
The Identity Crisis. Security, Privacy and Usability Issues in Identity Management. - Michael Fairbank, Eduardo Alonso:
The Local Optimality of Reinforcement Learning by Value Gradients, and its Relationship to Policy Gradient Learning. - Ayatullah Faruk Mollah, Subhadip Basu, Mita Nasipuri:
Segmentation of Camera Captured Business Card Images for Mobile Devices. - Junting Chen, Vincent K. N. Lau, Yong Cheng:
Distributive Network Utility Maximization (NUM) over Time-Varying Fading Channels. - Lars Kai Hansen, Adam Arvidsson, Finn Årup Nielsen, Elanor Colleoni, Michael Etter:
Good Friends, Bad News - Affect and Virality in Twitter. - Hartmut Klauck:
On Arthur Merlin Games in Communication Complexity. - Mehrdad Valipour, Farshad Lahouti:
Channel Optimized Distributed Multiple Description Coding. - Maurice Margenstern:
Coordinates for a new triangular tiling of the hyperbolic plane. - Fabian van den Broek:
Eavesdropping on GSM: state-of-affairs. - Tianji Li, Douglas J. Leith, David Malone:
Buffer Sizing for 802.11 Based Networks. - Jean Cardinal, Matias Korman:
Coloring Planar Homothets and Three-Dimensional Hypergraphs. - Derek Groen, Simon Portegies Zwart, Tomoaki Ishiyama, Junichiro Makino:
High Performance Gravitational N-body Simulations on a Planet-wide Distributed Supercomputer. - Paul Logasa Bogen II, Frank M. Shipman III, Richard Furuta:
Distributed Collections of Web Pages in the Wild. - Chandra Nair:
A note on outer bounds for broadcast channel. - Mehdi Seyfi, Sami Muhaidat, Jie Liang:
On the Performance of Selection Cooperation with Outdated CSI and Channel Estimation Errors. - Avaré Stewart, Ricardo Lage, Ernesto Diaz-Aviles, Peter Dolog:
Personalized Event-Based Surveillance and Alerting Support for the Assessment of Risk. - Miao Song:
The Role of Computer Graphics in Documentary Film Production. - G. A. Tarnavsky, Evgenii V. Vorozhtsov:
Computer Simulation Center in Internet. - Gerhard de Koning Gans, Eric R. Verheul:
Best Effort and Practice Activation Codes. - Noam Presman, Ofer Shapira, Simon Litsyn:
Binary Polar Code Kernels from Code Decompositions. - Venkata Ravinder Paruchuri:
Information Retrieval of Jumbled Words. - Raphaël Clifford, Markus Jalsenius:
Lower Bounds for Online Integer Multiplication and Convolution in the Cell-Probe Model. - Benjamin Doerr, Daniel Johannsen, Carola Winzen:
Multiplicative Drift Analysis. - Thomas Schoenemann, Simon Masnou, Daniel Cremers:
On a linear programming approach to the discrete Willmore boundary value problem and generalizations. - Sergey Tarasenko:
Emotionally Colorful Reflexive Games. - Joseph O'Rourke:
Convex Polyhedra Realizing Given Face Areas. - Péricles Lopes Machado:
O Algoritmo usado no programa de criptografia PASME. - Bing Hui, Manar Mohaisen, KyungHi Chang:
Improved Achievable Rates for Regularized Tomlinson-Harashima Precoding in Multiuser MIMO Downlink. - Hongsun An, Manar Mohaisen, KyungHi Chang:
Lattice Reduction Aided Precoding for Multiuser MIMO using Seysen's Algorithm. - Paul N. Balister, Béla Bollobás, Animashree Anandkumar, Alan S. Willsky:
Energy-Latency Tradeoff for In-Network Function Computation in Random Networks. - Jun Luo, Ying He:
GeoQuorum: Load Balancing and Energy Efficient Data Access in Wireless Sensor Networks. - Jamshid Abouei, J. David Brown, Konstantinos N. Plataniotis, Subbarayan Pasupathy:
Energy Efficiency and Reliability in Wireless Biomedical Implant Systems. - Yota Otachi, Ryohei Suda:
Bandwidth and pathwidth of three-dimensional grids. - Cody Roux:
Refinement Types as Higher Order Dependency Pairs. - Tobias Koch, Amos Lapidoth:
Does Output Quantization Really Cause a Loss of 2dB? - Haris Aziz, Bart de Keijzer:
Complexity of coalition structure generation. - Benjamin Morandi, Sebastian Nanz, Bertrand Meyer:
A comprehensive operational semantics of the SCOOP programming model. - Ishay Haviv, Michael Langberg:
Beating the Gilbert-Varshamov Bound for Online Channels. - Joel A. Tropp:
From joint convexity of quantum relative entropy to a concavity theorem of Lieb. - Alexander Rand:
On the Non-Termination of Ruppert's Algorithm. - Serguei A. Mokhov, Marc-André Laverdière, Nader Hatami, Ali Benssam:
Cryptolysis v.0.0.1 - A Framework for Automated Cryptanalysis of Classical Ciphers. - Yael Amsterdamer, Daniel Deutch, Val Tannen:
Provenance for Aggregate Queries. - Giuliano Andrea Pagani, Marco Aiello:
Towards Decentralized Trading: A Topological Investigation of the Dutch Medium and Low Voltage Grids. - Steve Chien, Prahladh Harsha, Alistair Sinclair, Srikanth Srinivasan:
Almost Settling the Hardness of Noncommutative Determinant. - Rishin Haldar, Debajyoti Mukhopadhyay:
Levenshtein Distance Technique in Dictionary Lookup Methods: An Improved Approach. - Yashar Ghiassi-Farrokhfal, Jörg Liebeherr, Almut Burchard:
Statistical Analysis of Link Scheduling on Long Paths. - Mian Dong, Lin Zhong:
Chameleon: A Color-Adaptive Web Browser for Mobile OLED Displays. - Ranjeet Devarakonda, Giriprakash Palanisamy:
Scientific data searching, sharing and retrieval. - Johanne Cohen, Christoph Dürr, Kim Thang Nguyen:
Non-clairvoyant Scheduling Games. - Brijnesh J. Jain, Klaus Obermayer:
Extending Bron Kerbosch for Solving the Maximum Weight Clique Problem. - Hermann Gruber:
Bounding the Feedback Vertex Number of Digraphs in Terms of Vertex Degrees. - Mojtaba Rahmati, Tolga M. Duman:
Analytical Lower Bounds on the Capacity of Insertion and Deletion Channels. - Weiliang Zeng, Chengshan Xiao, Mingxi Wang, Jianhua Lu:
Linear Precoding for Relay Networks with Finite-Alphabet Constraints. - Dae-Sung Jang, Sun-Il Kwon:
Fast Approximation Algorithms for Art Gallery Problems in Simple Polygons. - Walid Abediseid, Mohamed Oussama Damen:
Time-Out Lattice Sequential Decoding for the MIMO ARQ Channel. - Xiaoxiao Yang:
A Probabilistic Variant of Projection Temporal Logic. - Stephen A. Cook, Lila Fontes:
Formal Theories for Linear Algebra. - Sudipta Das, Lawrence Jenkins, Debasis Sengupta:
Comparison of Loss ratios of different scheduling algorithms. - Lorne Applebaum, Waheed U. Bajwa, Marco F. Duarte, A. Robert Calderbank:
Asynchronous Code-Division Random Access Using Convex Optimization. - Kyle W. Burke, Olivia George:
A PSPACE-complete Graph Nim. - Chuan Huang, Jinhua Jiang, Shuguang Cui:
On the Achievable Rates of the Diamond Relay Channel with Conferencing Links. - Michaël Cadilhac, Alain Finkel, Pierre McKenzie:
Storming the Parikh Automaton. - Charles Dossal, Marie-Line Chabanol, Gabriel Peyré, Jalal Fadili:
Sharp Support Recovery from Noisy Random Measurements by L1 minimization. - Nor Amizam Jusoh, Jasni Mohamad Zain:
Application of Freeman Chain Codes: An Alternative Recognition Technique for Malaysian Car Plates. - Jasni Mohamad Zain, Malcolm Clarke:
Reversible Region of Non-Interest (RONI) Watermarking for Authentication of DICOM Images. - Jasni Mohamad Zain, Mengkar Tey, Yingsoon Goh:
Probing a Self-Developed Aesthetics Measurement Application (SDA) in Measuring Aesthetics of Mandarin Learning Web Page Interfaces. - Jasni Mohamad Zain, Mengkar Tey, Yingsoon Goh:
Does Aesthetics of Web Page Interface Matters to Mandarin Learning? - Dominic Meier, Yvonne-Anne Pignolet, Stefan Schmid, Roger Wattenhofer:
On the Windfall and Price of Friendship: Inoculation Strategies on Social Networks. - Philipp Mayr, Philipp Schaer, Peter Mutschke:
A Science Model Driven Retrieval Prototype. - Philipp Mayr, Peter Mutschke, Vivien Petras, Philipp Schaer, York Sure:
Applying Science Models for Search. - Natalie Schluter:
Restarting Automata with Auxiliary Symbols and Small Lookahead. - Shunqing Zhang, Vincent K. N. Lau:
Multi-Relay Selection Design and Analysis for Multi-Stream Cooperative Communications. - Emilie Charlier, Michael Domaratzki, Tero Harju, Jeffrey O. Shallit:
Finite Orbits of Language Operations. - Ted Herman:
Safe Register Token Transfer in a Ring. - Ladan Baghai-Ravary, Sergio Grau, Greg Kochanski:
Detecting gross alignment errors in the Spoken British National Corpus. - Mustafa El-Halabi, Tie Liu, Costas N. Georghiades:
Secret Writing on Dirty Paper: A Deterministic View. - Aditya Bhaskara, Moses Charikar, Rajsekar Manokaran, Aravindan Vijayaraghavan:
On Quadratic Programming with a Ratio Objective. - Rahul Urgaonkar, Michael J. Neely:
Network Capacity Region and Minimum Energy Function for a Delay-Tolerant Mobile Ad Hoc Network. - Jagbeer Singh:
Precise Schedulability Analysis for unfeasible to notify separately for comprehensive - EDF Scheduling of interrupted Hard Real-Time Tasks on the similar Multiprocessors. - Krishnendu Chatterjee, Nathanaël Fijalkow:
Finitary languages. - Julien Cristau:
Automata and temporal logic over arbitrary linear time. - José Joaquín Bernal, Juan Jacobo Simón:
Information sets from defining sets in abelian codes. - Suvansh Lal:
A Logic Programming Approach for Formal Verification of NetBill Security and Transactions Protocol. - Suvansh Lal, Mohit Jain, Vikrant Chaplot:
Approaches to Formal Verification of Security Protocols. - Hrishikesh Karmarkar, Supratik Chakraborty:
Determinization of $\omega$-automata unified. - Sami Hissoiny, Philippe Després, Benoît Ozell:
Using graphics processing units to generate random numbers. - Patrick Solé, Jean-Claude Belfiore:
Constructive spherical codes near the Shannon bound. - Michael T. Goodrich, Nodari Sitchinava, Qin Zhang:
Sorting, Searching, and Simulation in the MapReduce Framework. - Stefano Galli:
A Novel Approach to the Statistical Modeling of Wireline Channels. - Mojtaba Vaezi, Mai Vu:
Superposition Coding-Based Bounds and Capacity for the Cognitive Z-Interference Channels. - Washington Taylor, Jud Leonard, Lawrence C. Stewart:
Efficient tilings of de Bruijn and Kautz graphs. - Siva K. Gorantla, Baris Nakiboglu, Todd P. Coleman, Lizhong Zheng:
Multi-layer Bit-wise Unequal Error Protection for Variable Length Blockcodes with Feedback. - Howard J. Karloff, Flip Korn, Konstantin Makarychev, Yuval Rabani:
On Parsimonious Explanations for 2-D Tree- and Linearly-Ordered Data. - Mohammad Karimadini, Hai Lin:
Necessary and Sufficient Conditions for Task Automaton Decomposition. - Mohammad Karimadini, Hai Lin:
Task Decomposability Under Event Failures for Two Cooperative Agents. - Ruoheng Liu, Tie Liu, H. Vincent Poor, Shlomo Shamai:
New Results on Multiple-Input Multiple-Output Broadcast Channels with Confidential Messages. - Ruijia Liao:
The Complexity of 3SAT_N and the P versus NP Problem. - Guyslain Naves, Vincent Jost:
The graphs with the max-Mader-flow-min-multiway-cut property. - Jyotirmoy Karjee, H. S. Jamadagni:
Data Accuracy Estimation for Cluster with Spatially Correlated Data in Wireless Sensor Networks. - Jyotirmoy Karjee, H. S. Jamadagni:
Data Accuracy Estimation for Spatially Correlated Data in Wireless Sensor Networks under Distributed Clustering. - Rafael Caballero, Mario Rodríguez-Artalejo, Carlos A. Romero-Díaz:
A Generic Scheme for Qualified Constraint Functional Logic Programming. - Ulrich Berger:
From coinductive proofs to exact real arithmetic: theory and applications. - David F. Gleich, Chen Greif, James M. Varah:
The power and Arnoldi methods in an algebra of circulants. - Urs Niesen, Phil Whiting:
The Degrees of Freedom of Compute-and-Forward. - Elena Veronica Belmega, Samson Lasaulce:
Power Allocation Games in Interference Relay Channels: Existence Analysis of Nash Equilibria. - Elizaveta Eidelman, Serguei A. Mokhov:
Alchymical Mirror: Real-time Interactive Sound- and Simple Motion-Tracking Set of Jitter/Max/MSP Patches. - Aripirala Manoj Kumar, G. Bharath Reddy, G. Krishna Chaitanya Reddy:
Modelling to study its non-linear effects on Communication System's performance with BER as performance measure. - Chenguang Lu:
Illustrating Color Evolution and Color Blindness by the Decoding Model of Color Vision. - Michael T. Goodrich, Michael Mitzenmacher:
Invertible Bloom Lookup Tables. - Manar Mohaisen, KyungHi Chang:
Fixed-complexity Sphere Encoder for Multi-user MIMO Systems. - Adriano Fagiolini, Hitoshi Arisumi, Antonio Bicchi:
Casting Robotic End-effectors To Reach Faraway Moving Objects. - Dario Marino, Adriano Fagiolini, Lucia Pallottino:
Distributed Collision-free Protocol for AGVs in Industrial Environments. - Adriano Fagiolini, Antonio Bicchi:
Logical Consensus for Distributed and Robust Intrusion Detection. - Adriano Fagiolini, Gianluca Dini, Antonio Bicchi:
Distributed Intrusion Detection for the Security of Societies of Robots. - Adriano Fagiolini, Nevio Dubbini, Antonio Bicchi:
Distributed Consensus on Set-valued Information. - Tuan Anh Nguyen, Minh Binh Do, Alfonso Gerevini, Ivan Serina, Biplav Srivastava, Subbarao Kambhampati:
Planning with Partial Preference Models. - Feng Liu, Chung Chan, Ying Jun Zhang:
On the Degree of Freedom for Multi-Source Multi-Destination Wireless Network with Multi-layer Relays. - Arash Mehrmand, Robert Feldt:
A Factorial Experiment on Scalability of Search Based Software Testing. - Jan Urban:
Automatic segmentation of HeLa cell images. - Makoto Tanahashi, Hideki Ochiai:
A Generalized MMSE Detection with Reduced Complexity for Spatially Multiplexed MIMO Signals. - Lluís A. Belanche Muñoz, Félix Fernando González-Navarro:
Review and Evaluation of Feature Selection Algorithms in Synthetic Problems. - Sándor P. Fekete, Joseph S. B. Mitchell, Christiane Schmidt:
Minimum Covering with Travel Cost. - Joachim Selke, Wolf-Tilo Balke:
Extracting Features from Ratings: The Role of Factor Models. - Uria Basher, Avihay Shirazi, Haim H. Permuter:
Capacity Region of Finite State Multiple-Access Channel with Delayed State Information at the Transmitters. - Petr N. Vabishchevich:
Domain decomposition schemes for evolutionary equations of first order with not self-adjoint operators. - Lilin Dan, Yue Xiao, Wei Ni, Shaoqian Li:
Improved Peak Cancellation for PAPR Reduction in OFDM Systems. - Eduardo Valle, Sandra Eliza Fontes de Avila, Antonio da Luz Jr., Fillipe Dias Moreira de Souza, Marcelo de Miranda Coelho, Arnaldo de Albuquerque Araújo:
Content-Based Filtering for Video Sharing Social Networks. - (Withdrawn) On Achievability of Gaussian Interference Channel Capacity to within One Bit.
- Vikas J. Dongre, Vijay H. Mankar:
A Review of Research on Devnagari Character Recognition. - Sanjay Karmakar, K. Pavan Srinath, B. Sundar Rajan:
Maximum Rate of Unitary-Weight, Single-Symbol Decodable STBCs. - K. Pavan Srinath, B. Sundar Rajan:
Generalized Silver Codes. - K. Pavan Srinath, B. Sundar Rajan:
A Low ML-decoding Complexity, Full-diversity, Full-rate MIMO Precoder. - Koen Simoens, Julien Bringer, Hervé Chabanne, Stefaan Seys:
Analysis of Biometric Authentication Protocols in the Blackbox Model. - Sanjay Bansal, Nirved Pandey:
An Overview of Portable Distributed Techniques. - Erik Agrell:
Errata list for "Error Control Coding" by Lin and Costello. - D. Prabhu, M. Adimoolam:
Bi-serial DNA Encryption Algorithm(BDEA). - Ninghui Li, Wahbeh H. Qardaji, Dong Su:
Provably Private Data Anonymization: Or, k-Anonymity Meets Differential Privacy. - Thomas Bernecker, Tobias Emrich, Hans-Peter Kriegel, Nikos Mamoulis, Matthias Renz, Andreas Züfle:
A Novel Probabilistic Pruning Approach to Speed Up Similarity Queries in Uncertain Databases. - Samir Datta, Gautam Prakriya:
Planarity Testing Revisited. - José M. Cecilia, José M. García, Manuel Ujaldon, Andy Nisbet, Martyn Amos:
Parallelization Strategies for Ant Colony Optimisation on GPUs. - Dustin Wehr:
Lower bound for deterministic semantic-incremental branching programs solving GEN. - Mauricio Romero-Torres, Maria Alejandra Tejada, Alberto Acosta:
A Proposal to Classify Latinamerican Scientific Journals using Citation Indicators: Case Study in Colombia. - Armin Eftekhari, Justin K. Romberg, Michael B. Wakin:
Matched Filtering from Limited Frequency Samples. - Jaydip Sen:
A Novel Mechanism for Detection of Distributed Denial of Service Attacks. - Sourjya Bhaumik, David Chuck, Girija J. Narlikar, Gordon T. Wilfong:
Energy-Efficient Design and Optimization of Wireline Access Networks. - Yao Yu, Athina P. Petropulu, H. Vincent Poor:
CSSF MIMO RADAR: Low-Complexity Compressive Sensing Based MIMO Radar That Uses Step Frequency. - Randa Zakhour, David Gesbert:
Optimized data sharing in multicell MIMO with finite backhaul capacity. - Son Hoang Dau, Vitaly Skachek, Yeow Meng Chee:
Index Coding and Error Correction. - Jaydip Sen:
An Efficient and User Privacy-Preserving Routing Protocol for Wireless Mesh Networks. - Jaydip Sen:
Routing Security Issues in Wireless Sensor Networks: Attacks and Defenses. - Apostolos Bessas, Spyros C. Kontogiannis, Christos D. Zaroliagis:
Robust Line Planning in case of Multiple Pools and Disruptions. - Sergey Goncharov, Lutz Schröder:
Powermonads and Tensors of Unranked Effects. - Keck Voon Ling, Jan M. Maciejowski, Arthur G. Richards, Bing Fang Wu:
Multiplexed Model Predictive Control. - Mohammed Abubakr:
On Logical Extension of Algebraic Division. - Manuel Kauers, Carsten Schneider:
A Refined Denominator Bounding Algorithm for Multivariate Linear Difference Equations. - Thomas Martin Gawlitza, David Monniaux:
Improving Strategies via SMT Solving. - Michael Carl Tschantz, Dilsun Kirli Kaynar, Anupam Datta:
Formal Verification of Differential Privacy for Interactive Systems. - Fabrizio Caruso, Giovanni Giuffrida, Calogero G. Zarba:
Subjective Collaborative Filtering. - Nicole Immorlica, Adam Tauman Kalai, Brendan Lucier, Ankur Moitra, Andrew Postlewaite, Moshe Tennenholtz:
Dueling Algorithms. - Punyashloka Biswal:
Hypercontractivity and its applications. - S. M. Sadegh Tabatabaei Yazdi, Serap A. Savari:
A Deterministic Polynomial--Time Algorithm for Constructing a Multicast Coding Scheme for Linear Deterministic Relay Networks. - Ariel Kulik, Hadas Shachnai, Tami Tamir:
Approximations for Monotone and Non-monotone Submodular Maximization with Knapsack Constraints. - Zoltán Kása, Leoan Tâmbulea:
Binary trees and number of states in buddy systems. - Salman Fadaei, MohammadAli Safari, MohammadAmin Fazli:
Maximizing Submodular Set Functions Subject to Different Constraints: Combined Algorithms. - Ash Mohammad Abbas:
Resequencing: A Method for Conforming to Conventions for Sharing Credits Among Multiple Authors. - Mahesh Pal:
Support vector machines/relevance vector machine for remote sensing classification: A review. - Basil K. Papadopoulos, Apostolos Syropoulos:
Generalizing Topology via Chu Spaces. - Omid Ghahabi, Mohammad Hasan Savoji:
Adaptive Variable Degree-k Zero-Trees for Re-Encoding of Perceptually Quantized Wavelet-Packet Transformed Audio and High Quality Speech. - Jaeok Park, Mihaela van der Schaar:
The Theory of Intervention Games for Resource Sharing in Wireless Communications. - Tobias Baumgartner, Ioannis Chatzigiannakis, Sándor P. Fekete, Christos Koninis, Alexander Kröller, Apostolos Pyrgelis:
Wiselib: A Generic Algorithm Library for Heterogeneous Sensor Networks. - Lei Ke, Aditya Ramamoorthy, Zhengdao Wang, Huarui Yin:
Degrees of Freedom Region for an Interference Network with General Message Demands. - Jaydip Sen:
A Robust and Secure Aggregation Protocol for Wireless Sensor Networks. - Walter Quattrociocchi, Rosaria Conte, Elena Lodi:
Simulating Opinion Dynamics in Heterogeneous Communication. - Dustin Maas, Neal Patwari, Daryl Leon Wasden, Sneha Kumar Kasera, Michael A. Jensen:
Experimental Performance Evaluation of Location Distinction for MIMO Channels. - Xinyu Xing, Yu-Li Liang, Hanqiang Cheng, Jianxun Dang, Sui Huang, Richard Han, Xue Liu, Qin Lv, Shivakant Mishra:
SafeVchat: Detecting Obscene Content and Misbehaving Users in Online Video Chat Services. - Chris Regenboog:
Reactive Valuations. - Angelos Mantzaflaris, Bernard Mourrain:
Deflation and Certified Isolation of Singular Zeros of Polynomial Systems. - Eloisa Bentivegna, Gabrielle Allen, Oleg Korobkin, Erik Schnetter:
Ensuring Correctness at the Application Level: a Software Framework Approach. - Petr Hlinený, Ondrej Moris:
Multi-Stage Improved Route Planning Approach: theoretical foundations. - Vahan V. Mkrtchyan, Petros A. Petrosyan:
A note on triangle-free graphs. - Manuel S. Stein:
Towards Optimal Schemes for the Half-Duplex Two-Way Relay Channel. - Giovanni Sabato, Mehdi Molkaraie:
Generalized Belief Propagation for the Noiseless Capacity and Information Rates of Run-Length Limited Constraints. - Walid Belkhir, Alain Giorgetti, Michel Lenczner:
Rewriting and Symbolic Transformations for Multiscale Methods. - Andreas Schenk, Robert F. H. Fischer:
Decision-Feedback Differential Detection in Impulse-Radio Ultra-Wideband Systems. - Jesper Bengtson, Magnus Johansson, Joachim Parrow, Björn Victor:
Psi-calculi: a framework for mobile processes with nominal data and logic. - Shurui Huang, Aditya Ramamoorthy:
A note on the multiple unicast capacity of directed acyclic networks. - Smriti Bhagat, Graham Cormode, S. Muthukrishnan:
Node Classification in Social Networks. - James King:
Fast Vertex Guarding for Polygons. - Alessandro Basso, Marco Milanesio, André Panisson, Giancarlo Ruffo:
Collaborative Filtering without Explicit Feedbacks for Digital Recorders. - Wei Dai, Olgica Milenkovic, Hoa Vinh Pham:
Structured sublinear compressive sensing via dense belief propagation. - Stephen O'Hara, Bruce A. Draper:
Introduction to the Bag of Features Paradigm for Image Classification and Retrieval. - Alexander V. Shafarenko, Raimund Kirner:
CAL: A Language for Aggregating Functional and Extrafunctional Constraints in Streaming Networks. - Facundo Bromberg, Federico Schlüter:
Efficient Independence-Based MAP Approach for Robust Markov Networks Structure Discovery. - Yao Sun, Dingkang Wang:
A Generalized Criterion for Signature Related Gröbner Basis Algorithms. - Thorsten Riess, Christian Dietz, Martin Tomas, Elisa Ferrando-May, Dorit Merhof:
Automated Image Processing for the Analysis of DNA Repair Dynamics. - Imen Harbaoui Dridi, Ryan Kammarti, Pierre Borne, Mekki Ksouri:
Multi-objective Optimization For The Dynamic Multi-Pickup and Delivery Problem with Time Windows. - Wenping Ma:
New Quadriphase Sequences families with Larger Linear Span and Size. - Fabrizio Caruso, Giovanni Giuffrida, Calogero G. Zarba:
Behavioral On-Line Advertising. - Dominique Duval, Rachid Echahed, Frédéric Prost:
Categorical Abstract Rewriting Systems and Functoriality of Graph Transformation. - Olivier Finkel:
Borel Hierarchy and Omega Context Free Languages. - Can Emre Koksal, Özgür Erçetin, Yunus Sarikaya:
Control of Wireless Networks with Secrecy. - Johannes Fischer:
Inducing the LCP-Array. - Pasquale Malacaria:
Algebraic Foundations for Information Theoretical, Probabilistic and Guessability measures of Information Flow. - Félix Balado:
Capacity of DNA Data Embedding Under Substitution Mutations. - Emanuel Gluskin:
The "psychological map of the brain", as a personal information card (file), - a project for the student of the 21st century. - Yajuan Sun, Hai Lin, Fuchun Liu:
Computation for Supremal Simulation-Based Controllable and Strong Observable Subautomata. - Guanfeng Liang, Nitin H. Vaidya:
Error-Free Multi-Valued Consensus with Byzantine Failures. - Xi Liu, Elza Erkip:
A Game-Theoretic View of the Interference Channel: Impact of Coordination and Bargaining. - Jin-San Cheng, Xiao-Shan Gao:
Multiplicity Preserving Triangular Set Decomposition of Two Polynomials. - Konstantin Voevodski, Maria-Florina Balcan, Heiko Röglin, Shang-Hua Teng, Yu Xia:
Clustering Protein Sequences Given the Approximation Stability of the Min-Sum Objective Function. - Mark Giesbrecht, Daniel S. Roche:
Diversification improves interpolation. - Sándor Soós, George Kampis:
Bio-inspired Methods for Dynamic Network Analysis in Science Mapping. - Taolue Chen, Tingting Han, Joost-Pieter Katoen, Alexandru Mereacre:
Model Checking of Continuous-Time Markov Chains Against Timed Automata Specifications. - Ni-Chun Wang, Ezio Biglieri, Kung Yao:
Systolic Arrays for Lattice-Reduction-Aided MIMO Detection. - B. T. Swapna, Atilla Eryilmaz, Ness B. Shroff:
Throughput-Delay Analysis of Random Linear Network Coding for Wireless Broadcasting. - Shriprakash Sinha:
An Unsupervised Conformal Learning Algorithm For Image Segmentation. - Luca Maria Aiello, Marco Milanesio, Giancarlo Ruffo, Rossano Schifanella:
Tagging with DHARMA, a DHT-based Approach for Resource Mapping through Approximation. - Valery I. Korzhik, Viktor Yakovlev, Guillermo Morales-Luna, Yuri Kovajkin:
Secret Key Agreement Over Multipath Channels Exploiting a Variable-Directional Antenna. - Abhimanyu Das, David Kempe:
Estimating the Average of a Lipschitz-Continuous Function from One Sample. - Radha Krishna Ganti, François Baccelli, Jeffrey G. Andrews:
Series Expansion for Interference in Wireless Networks. - Kolar Purushothama Naveen, Anurag Kumar:
Relay Selection with Partial Information in Wireless Sensor Networks. - Monica Vladoiu, Zoran Constantinescu:
U-Learning Within A Context-Aware Multiagent Environment. - Abuzer Yakaryilmaz:
Exact quantum algorithms for promise problems in automata theory. - Alexander Jung, Sebastian Schmutzhard, Franz Hlawatsch, Alfred O. Hero III:
Performance Bounds for Sparse Parametric Covariance Estimation in Gaussian Models. - Mohammed H. Sqalli, Sadiq M. Sait, Syed Asadullah:
OSPF Weight Setting Optimization for Single Link Failures. - Loet Leydesdorff, Lutz Bornmann, Rüdiger Mutz, Tobias Opthof:
Normalizing the measurement of citation performance: Principles for comparing sets of documents. - Edson Agustini, Sueli I. Rodrigues Costa:
An Upper Bound for Signal Transmission Error Probability in Hyperbolic Spaces. - Patricia Marcu, Wolfgang Hommel:
Inter-organizational fault management: Functional and organizational core aspects of management architectures. - Patricia Marcu, David Schmitz, Wolfgang Fritz, Mark Yampolskiy, Wolfgang Hommel:
Integrated monitoring of multi-domain backbone connections -- Operational experience in the LHC optical private network. - Heide Gluesing-Luerssen, Elizabeth A. Weaver:
Characteristic Generators and Dualization for Tail-Biting Trellises. - Greg N. Frederickson, Barry Wittman:
Two Multivehicle Routing Problems with Unit-Time Windows. - Greg N. Frederickson, Barry Wittman:
Speedup in the Traveling Repairman Problem with Constrained Time Windows. - Sebastian Müller, Iddo Tzameret:
Average-Case Separation in Proof Complexity: Short Propositional Refutations for Random 3CNF Formulas. - Nicolae Cleju, Nikolaos Thomos, Pascal Frossard:
Selection of network coding nodes for minimal playback delay in streaming overlays. - Matilde Santos, José Antonio Martín H., Victoria López:
Dyna-H: a heuristic planning reinforcement learning algorithm applied to role-playing-game strategy decision systems. - Heni Kaaniche, Fatma Louati, Mounir Frikha, Farouk Kamoun:
A QoS Routing Protocol based on Available Bandwidth Estimation for Wireless Ad Hoc Networks. - Ryutaroh Matsumoto, Masahito Hayashi:
Secure Multiplex Coding with a Common Message. - Hongda Xiao, Edmund M. Yeh:
The Impact of Incomplete Information on Games in Parallel Relay Networks. - Sebastian Kreft, Gonzalo Navarro:
Self-Index Based on LZ77. - Stephane Durocher, Jason Morrison:
Linear-Space Data Structures for Range Mode Query in Arrays. - Pang-Chang Lan, Chih-Yao Wu, Chia-han Lee, Ping-Cheng Yeh, Chen-Mou Cheng:
PMI-based MIMO OFDM PHY Integrated Key Exchange (P-MOPI) Scheme. - Michael A. Lexa, Mike E. Davies, John S. Thompson:
Reconciling Compressive Sampling Systems for Spectrally-sparse Continuous-time Signals. - Bruno Antunes, Francisco Correia, Paulo Gomes:
Context Capture in Software Development. - Elaine Pimentel, Betti Venneri, Joe B. Wells:
Proceedings Fifth Workshop on Intersection Types and Related Systems, ITRS 2010, Edinburgh, U.K., 9th July 2010. EPTCS 45, 2010 [contents] - Peter Z. Kunszt, Sergio Maffioletti, Riccardo Murri, Valery Tschopp:
GridCertLib: Use Shibboleth to Access the Grid from Web Portals. - Manfred Kufleitner, Alexander Lauser:
Languages of Dot-depth One over Infinite Words. - Victorin Martin, Jean-Marc Lasgouttes, Cyril Furtlehner:
The Role of Normalization in the Belief Propagation Algorithm. - Franck Butelle, Camille Coti:
A Model for Coherent Distributed Memory For Race Condition Detection. - Tomás Brázdil, Jan Krcál, Jan Kretínský, Antonín Kucera, Vojtech Rehák:
Measuring Performance of Continuous-Time Stochastic Processes using Timed Automata. - Saeed Abdallah, Ioannis N. Psaromiligkos:
Blind Channel Estimation for Amplify-and-Forward Two-Way Relay Networks Employing M-PSK Modulation. - Bo Ji, Changhee Joo, Ness B. Shroff:
Scheduling with Per-link Queues and No Per-flow information in Multi-hop Wireless Networks. - Himanshu Thapliyal, Nagarajan Ranganathan:
Reversible Logic Based Concurrent Error Detection Methodology For Emerging Nanocircuits. - Sam Staton:
Relating coalgebraic notions of bisimulation. - Yashwanth Kothapalli:
Indexing Properties of Primitive Pythagorean Triples for Cryptography Applications. - Nashid Shahriar, Mahfuza Sharmin, Reaz Ahmed, Raouf Boutaba:
Diurnal Availability for Peer-to-Peer Systems. - Tamás Horváth, Laszlo B. Kish, Jacob Scheuer:
Effective Privacy Amplification for Secure Classical Communications. - Axel Legay, Benoît Caillaud:
Proceedings Foundations for Interface Technologies, FIT 2010, Paris, France, 30th August 2010. EPTCS 46, 2010 [contents] - Rahmat Widia Sembiring, Jasni Mohamad Zain, Abdullah Embong:
A Comparative Agglomerative Hierarchical Clustering Method to Cluster Implemented Course. - Lei Bu, Xin Chen, Linzhang Wang, Xuandong Li:
Online Verification of Control Parameter Calculations in Communication Based Train Control System. - Pritam Som, Tanumay Datta, N. Srinidhi, Ananthanarayanan Chockalingam, B. Sundar Rajan:
Low-Complexity Detection/Equalization in Large-Dimension MIMO-ISI Channels Using Graphical Models. - Manuel Sorge:
On Making Directed Graphs Eulerian. - Lianming Zhang, Xiaoheng Deng, Jianping Yu, Xiangsheng Wu:
The degree and connectivity of Internet's scale-free topology. - Artiom Kovnatsky, Michael M. Bronstein, Alexander M. Bronstein, Ron Kimmel:
Diffusion framework for geometric and photometric data fusion in non-rigid shape analysis. - Quan-Lin Li, John C. S. Lui, Yang Wang:
A Matrix-Analytic Solution for Randomized Load Balancing Models with Phase-Type Service Times. - Pierre-François Marteau:
Discrete Time Elastic Vector Spaces. - Ebrahim B. Al-Safadi, Tareq Y. Al-Naffouri:
Peak Reduction and Clipping Mitigation by Compressive Sensing. - Yan Chen, Shunqing Zhang, Shugong Xu, Geoffrey Ye Li:
Fundamental Tradeoffs on Green Wireless Networks. - Jacques M. Bahi, Christophe Guyeux, Michel Salomon:
Building a Chaotic Proved Neural Network. - Elisa Burato, Matteo Cristani, Luca Viganò:
Meaning Negotiation as Inference. - Alexandre Miquel:
Existential witness extraction in classical realizability and via a negative translation. - Adam W. Strzebonski, Elias P. Tsigaridas:
Univariate real root isolation in an extension field. - Chen Avin, Michael Borokhovich, Keren Censor-Hillel, Zvi Lotker:
Order Optimal Information Spreading Using Algebraic Gossip. - Orit Arzi, Yonatan Aumann, Yair Dombb:
Throw One's Cake --- and Have It Too. - Razvan Deaconescu, Marius Sandu-Popa, Adriana Draghici, Nicolae Tapus:
BitTorrent Swarm Analysis through Automation and Enhanced Logging. - Adriana B. Compagnoni, Healfdene Goguen:
Relating Church-Style and Curry-Style Subtyping. 1-15 - Simona Ronchi Della Rocca, Alexis Saurin, Yiorgos Stavrinos, Anastasia Veneti:
Intersection Logic in sequent calculus style. 16-30 - Steffen van Bakel:
Sound and Complete Typing for lambda-mu. 31-44 - Mariangiola Dezani-Ciancaglini, Paola Giannini, Elena Zucca:
Intersection types for unbind and rebind. 45-58 - Jana Dunfield:
Untangling Typechecking of Intersections and Unions. 59-70 - Luca Padovani:
Session Types = Intersection Types + Union Types. 71-89 - Vilhelm Sjöberg, Aaron Stump:
Equality, Quasi-Implicit Products, and Large Eliminations. 90-100 - Huang Huang, Changbin Yu:
Parameter Optimization of Multi-Agent Formations based on LQR Design. - S. Ali A. Fakoorian, A. Lee Swindlehurst:
Solutions for the MIMO Gaussian Wiretap Channel with a Cooperative Jammer. - Santosh Kumar Singh, Gajendra Singh, Vibhakar Pathak, Krishna Chandra Roy:
Spectrum Management for Cognitive Radio based on Genetics Algorithm. - Andrew Drucker:
High-Confidence Predictions under Adversarial Uncertainty. - Daniel Golovin, Andreas Krause:
Adaptive Submodular Optimization under Matroid Constraints. - (Withdrawn) Remarks on the Restricted Isometry Property in Orthogonal Matching Pursuit algorithm.
- Antonio Bucciarelli:
Extensional Collapse Situations I: non-termination and unrecoverable errors. - Cristina Serban, Carmen Maftei:
Thermal Analysis of Climate Regions using Remote Sensing and Grid Computing. - Benedikt Bollig:
An automaton over data words that captures EMSO logic. - Salam Akoum, Marios Kountouris, Robert W. Heath Jr.:
Limited Feedback Over Temporally Correlated Channels for the Downlink of a Femtocell Network. - Daoud Clarke:
A Context-theoretic Framework for Compositionality in Distributional Semantics. - (Withdrawn) High-rate Space-Time-Frequency Codes Achieving Full-Diversity with Partial Interference Cancellation Group Decoding.
- Christophe Paul, Anthony Perez, Stéphan Thomassé:
Conflict Packing yields linear vertex-kernels for Rooted Triplet Inconsistency and other problems. - Mathieu Feuillet, Matthieu Jonckheere, Balakrishna J. Prabhu:
Responding to traffic surges: Stochastic networks under time-space-priority scalings. - Francesco Ricca, Giovanni Grasso, Mario Alviano, Marco Manna, Vincenzino Lio, Salvatore Iiritano, Nicola Leone:
Team-building with Answer Set Programming in the Gioia-Tauro Seaport. - Ming Lam Leung, Yang Li, Shengyu Zhang:
Tight bounds on the randomized communication complexity of symmetric XOR functions in one-way and SMP models. - Vadim E. Levit, Eugen Mandrescu:
A Set and Collection Lemma. - Alain Couvreur, Iwan M. Duursma:
Evaluation Codes from smooth Quadric Surfaces and Twisted Segre Varieties. - Alberto Pettarin, Andrea Pietracaprina, Geppino Pucci, Eli Upfal:
Tight Bounds on Information Dissemination in Sparse Mobile Networks. - Cihan Tepedelenlioglu, Adithya Rajan, Yuan Zhang:
Applications of Stochastic Ordering to Wireless Communications. - Serguei A. Mokhov, Marc-André Laverdière, Ali Benssam, Djamel Benredjem:
A Secure Web-Based File Exchange Server: Software Requirements Specification Document. - Serguei A. Mokhov, Marc-André Laverdière, Ali Benssam, Djamel Benredjem:
Design and Implementation of a Secure Web-Based File Exchange Server: Specification Design Document. - Adrian Dumitrescu, Minghui Jiang:
Sweeping an oval to a vanishing point. - Zizhuo Wang, Shiming Deng, Yinyu Ye:
Close the Gaps: A Learning-while-Doing Algorithm for a Class of Single-Product Revenue Management Problems. - Ken-ichi Kawarabayashi, Mikkel Thorup:
Minimum k-way cut of bounded size is fixed-parameter tractable. - Alastair A. Abbott, Cristian S. Calude:
Von Neumann Normalisation of a Quantum Random Number Generator. - Marc Arnaudon, Frank Nielsen:
On Approximating the Riemannian 1-Center. - Philip Schniter:
A Message-Passing Receiver for BICM-OFDM over Unknown Clustered-Sparse Channels. - Sebastian S. Bauer, Rolf Hennicker, Stephan Janisch:
Interface Theories for (A)synchronously Communicating Modal I/O-Transition Systems. 1-8 - Maria Grazia Buscemi, Hernán C. Melgratti:
Contracts for Abstract Processes in Service Composition. 9-27 - Michael Mendler:
An Algebra of Synchronous Scheduling Interfaces. 28-48 - Axel Legay, Andrzej Wasowski:
A Few Considerations on Structural and Logical Composition in Specification Theories. 49-54 - Osman Gunay, B. Ugur Töreyin, Kivanç Köse, A. Enis Çetin:
Online Adaptive Decision Fusion Framework Based on Entropic Projections onto Convex Sets with Application to Wildfire Detection in Video. - Ping Zhou, Loet Leydesdorff:
Fractional counting of citations in research evaluation: A cross- and interdisciplinary assessment of the Tsinghua University in Beijing. - Matus Telgarsky:
The Convergence Rate of AdaBoost and Friends. - Beom Hee Lee, Seong-Lyun Kim:
Mobility Control for Machine-to-Machine LTE Systems. - Wojciech Fraczek, Wojciech Mazurczyk, Krzysztof Szczypiorski:
Multi-Level Steganography: Improving Hidden Communication in Networks. - Jean-Paul Delahaye, Hector Zenil:
Numerical Evaluation of Algorithmic Complexity for Short Strings: A Glance into the Innermost Structure of Randomness. - Samuel Mimram:
The Structure of First-Order Causality (extended version). - Minhua Ding, Q. T. Zhang:
Source Optimization in MISO Relaying with Channel Mean Feedback: A Stochastic Ordering Approach. - Volker Diekert, Steffen Kopecki:
It Is NL-complete to Decide Whether a Hairpin Completion of Regular Languages Is Regular. - Philippe Moser:
A zero-one SUBEXP-dimension law for BPP. - Ridwan Al Iqbal:
Using Feature Weights to Improve Performance of Neural Networks. - Ridwan Al Iqbal:
A Generalized Method for Integrating Rule-based Knowledge into Inductive Methods Through Virtual Sample Creation. - Jirí Adámek, Stefan Milius, Jirí Velebil:
Semantics of Higher-Order Recursion Schemes. - Erwan Salaün, Maxime Gariel, Adan Vela, Eric Feron:
Aircraft Proximity Maps Based on Data-Driven Flow Modeling. - Rui Wang, Vincent K. N. Lau, Huang Huang:
Opportunistic Buffered Decode-Wait-and-Forward (OBDWF) Protocol for Mobile Wireless Relay Networks. - Olav Geil, Casper Thomsen:
List decoding of a class of affine variety codes. - Klaus Wehmuth, Artur Ziviani:
Distributed Algorithm to Locate Critical Nodes to Network Robustness based on Spectral Analysis. - Saif E. A. Alnawayseh, Pavel Loskot:
Order Statistics Based List Decoding Techniques for Linear Binary Block Codes. - Mohammadreza Abolghasemi-Dahaghani, Farzad Didehvar, Alireza Nowroozi:
A Novel Template-Based Learning Model. - Géraud Sénizergues:
Jancar's formal system for deciding bisimulation of first-order grammars and its non-soundness. - Peter beim Graben, Sabrina Gerth:
Geometric representations for minimalist grammars. - Kivanç Köse, Osman Gunay, A. Enis Çetin:
Compressive Sensing Using the Entropy Functional. - Yi-Ting Chen, Constantine Caramanis, Sanjay Shakkottai:
On Sharing Viral Video over an Ad Hoc Wireless Network. - Morten Mørup, Mikkel N. Schmidt, Lars Kai Hansen:
Infinite Multiple Membership Relational Modeling for Complex Networks. - Christopher J. Quinn, Todd P. Coleman, Negar Kiyavash:
Causal Dependence Tree Approximations of Joint Distributions for Multiple Random Processes. - J. Anitha, S. Immanuel Alex Pandian:
A Color Image Digital Watermarking Scheme Based on SOFM. - Thomas David Novlan, Radha Krishna Ganti, Arunabha Ghosh, Jeffrey G. Andrews:
Analytical Evaluation of Fractional Frequency Reuse for OFDMA Cellular Networks. - Matthew J. Patitz:
Simulation of Self-Assembly in the Abstract Tile Assembly Model with ISU TAS. - Jasni Mohamad Zain:
Strict Authentication Watermarking with JPEG Compression (SAW-JPEG) for Medical Images. - Steffen van Bakel, Stefano Berardi, Ulrich Berger:
Proceedings Third International Workshop on Classical Logic and Computation, CL&C 2010, Brno, Czech Republic, 21-22 August 2010. EPTCS 47, 2010 [contents] - Vinod M. Prabhakaran, Rohit Puri, Kannan Ramchandran:
Hybrid Digital-Analog Codes for Source-Channel Broadcast of Gaussian Sources over Gaussian Channels. - Guy Even, Moti Medina, Gregor Schaffrath, Stefan Schmid:
Competitive and Deterministic Embeddings of Virtual Networks. - Abuzer Yakaryilmaz, A. C. Cem Say:
NP has log-space verifiers with fixed-size public quantum registers. - Kenneth W. Shum:
Cooperative Regenerating Codes for Distributed Storage Systems. - Suenje Dallmeier-Tiessen, Robert Darby, Bettina Goerner, Jenni Hyppoelae, Peter Igo-Kemenes, Deborah Kahn, Simon C. Lambert, Anja Lengenfelder, Chris Leonard, Salvatore Mele, Malgorzata Nowicka, Panayiota Polydoratou, David Ross, Sergio Ruiz-Perez, Ralf Schimmer, Mark Swaisland, Wim van der Stelt:
Highlights from the SOAP project survey. What Scientists Think about Open Access Publishing. - Andrea Clementi, Riccardo Silvestri:
Parsimonious Flooding in Geometric Random-Walks. - Grenville J. Croll:
A Chronology of Torah Cryptography. - Ferkan Yilmaz, Mohamed-Slim Alouini:
A Novel Unified Expression for the Capacity and Bit Error Probability of Wireless Communication Systems over Generalized Fading Channels. - Laurent Jacques, Laurent Duval, Caroline Chaux, Gabriel Peyré:
A Panorama on Multiscale Geometric Representations, Intertwining Spatial, Directional and Frequency Selectivity. - Yi-Ling Hwong, Vincent J. J. Kusters, Tim A. C. Willemse:
Analysing the Control Software of the Compact Muon Solenoid Experiment at the Large Hadron Collider. - Ravi Gummadi, Anupam Khulbe, Aravind Kalavagattu, Sanil Salvi, Subbarao Kambhampati:
SmartInt: Using Mined Attribute Dependencies to Integrate Fragmented Web Databases. - Kamel Tourki, Hong-Chuan Yang, Mohamed-Slim Alouini:
Accurate Performance Analysis of Opportunistic Decode-and-Forward Relaying. - Sergio España, Arturo González, Oscar Pastor, Marcela Ruiz:
Message Structures: a modelling technique for information systems analysis and design. - Dana Ron, Ronitt Rubinfeld, Muli Safra, Omri Weinstein:
Approximating the Influence of a monotone Boolean function in O(\sqrt{n}) query complexity. - Farhat Masood:
RISC and CISC. - Chris Thachuk:
Succincter Text Indexing with Wildcards. - Michael A. Bender, Sándor P. Fekete, Tom Kamphans, Nils Schweer:
Maintaining Arrays of Contiguous Objects. - Panteleimon Rodis:
Connection errors in networks of linear features and the application of geometrical reduction in spatial data algorithms. - Luis Javier García-Villalba, José René Fuentes Cortez, Ana Lucila Sandoval Orozco, Mario Blaum:
Efficient Algorithms for Searching Optimal Shortened Cyclic Single-Burst-Correcting Codes. - Gerard Briscoe, Philippe De Wilde:
The Computing of Digital Ecosystems. - Federico Aschieri:
Interactive Learning Based Realizability and 1-Backtracking Games. 6-20 - Gilda Ferreira, Paulo Oliva:
On Various Negative Translations. 21-33 - Clément Houtmann:
Superdeduction in Lambda-Bar-Mu-Mu-Tilde. 34-43 - Reinhard Kahle, Isabel Oitavem:
An applicative theory for FPH. 44-56 - Luís Pinto, Tarmo Uustalu:
Relating Sequent Calculi for Bi-intuitionistic Propositional Logic. 57-72 - Trifon Trifonov:
Dialectica Interpretation with Marked Counterexamples. 73-84 - Kun Peng:
Failure of A Mix Network. - Jack H. Lutz:
Resource Bounded Measure. - Nasser Ghadiri, Ahmad Baraani-Dastjerdi, Nasser Ghasem-Aghaee, Mohammad Ali Nematbakhsh:
A Human-Centric Approach to Group-Based Context-Awareness. - Maciej Kurant, Minas Gjoka, Carter T. Butts, Athina Markopoulou:
Walking on a Graph with a Magnifying Glass. - Tom Cuypers, Se Baek Oh, Tom Haber, Philippe Bekaert, Ramesh Raskar:
Ray-Based Reflectance Model for Diffraction. - Mourad Gridach, Nouredine Chenfour:
Developing a New Approach for Arabic Morphological Analysis and Generation. - Nieves R. Brisaboa, Rodrigo Cánovas, Miguel A. Martínez-Prieto, Gonzalo Navarro:
Compressed String Dictionaries. - Fabio Ricciato, Martin Burkhart:
Reduce to the Max: A Simple Approach for Massive-Scale Privacy-Preserving Collaborative Network Measurements (Extended Version). - Kitty Meeks, Alexander Scott:
The complexity of Free-Flood-It on 2xn boards. - Piotr J. Puczynski:
T2Script Programming Language. - Daniele Perito, Claude Castelluccia, Mohamed Ali Kâafar, Pere Manils:
How Unique and Traceable are Usernames? - Nishita Aggarwal, Naveen Garg, Swati Gupta:
A 4/3-approximation for TSP on cubic 3-edge-connected graphs. - Anthony Bisong, Syed M. Rahman:
An Overview of the Security Concerns in Enterprise Cloud Computing. - Ozan Candogan, Kostas Bimpikis, Asuman E. Ozdaglar:
Optimal Pricing in Networks with Externalities. - Kian Hsiang Low, John M. Dolan, Pradeep K. Khosla:
Active Markov Information-Theoretic Path Planning for Robotic Environmental Sensing. - L. K. Joshila Grace, V. Maheswari, Dhinaharan Nagamalai:
Analysis of Web Logs and Web User in Web Mining. - Quan Geng, Huan Wang, John Wright:
On the Local Correctness of L^1 Minimization for Dictionary Learning. - Imdadullah Khan:
Perfect Matchings in 4-uniform hypergraphs. - Qin Li, Chengqing Li, Dongyang Long, Wai Hong Chan, Chun-Hui Wu:
On the impossibility of non-static quantum bit commitment between two parties. - Jonathan Pokrass, Alexander M. Bronstein, Michael M. Bronstein:
A correspondence-less approach to matching of deformable shapes. - Pål Anders Floor, Anna N. Kim, Niklas Wernersson, Tor A. Ramstad, Mikael Skoglund, Ilangko Balasingham:
On Transmission of Two Correlated Gaussian Memoryless Sources over a Gaussian MAC using Delay-Free Mappings. - Daniel W. Bliss, Siddhartan Govindasamy:
Minimizing Hidden-Node Network Interference by Optimizing SISO and MIMO Spectral Efficiency. - Michael Dinitz, Robert Krauthgamer:
Fault-Tolerant Spanners: Better and Simpler. - Yong Fang:
Sparse Matrix Recovery from Random Samples via 2D Orthogonal Matching Pursuit. - Arno Bastenhof:
Polarized Montagovian Semantics for the Lambek-Grishin calculus. - Debajyoti Mukhopadhyay, Chandrima Chakrabarti, Sounak Chakravorty:
A New Semantic Web Approach for Constructing, Searching and Modifying Ontology Dynamically. - Joan Bruna, Stéphane Mallat:
Geometric Models with Co-occurrence Groups. - Jason Cloud, Linda Zeger, Muriel Médard:
Co-Designing Multi-Packet Reception, Network Coding, and MAC Using a Simple Predictive Model. - Guoshen Yu, Guillermo Sapiro:
Statistical Compressed Sensing of Gaussian Mixture Models. - Béla Genge, Piroska Haller:
Using Planetlab to Implement Multicast at the Application Level. - Urtzi Ayesta, Martin Erausquin, Matthieu Jonckheere, Ina Maria Verloop:
Scheduling in a random environment: stability and asymptotic optimality. - Matteo Riondato, Mert Akdere, Ugur Çetintemel, Stanley B. Zdonik, Eli Upfal:
The VC-Dimension of Queries and Selectivity Estimation Through Sampling. - Chinmay S. Vaze, Mahesh K. Varanasi:
The Degrees of Freedom Region and Interference Alignment for the MIMO Interference Channel with Delayed CSI. - Imdadullah Khan:
Perfect matching in 3 uniform hypergraphs with large vertex degree. - Katy Daiger:
The Documents and Assets Created During the Video Game Production Process. - Krishnendu Chatterjee, Vinayak S. Prabhu:
Synthesis of Memory-Efficient Real-Time Controllers for Safety Objectives (Full Version). - Masato Tajima, Koji Okino, Takashi Miyagoshi:
Simultaneous Code/Error-Trellis Reduction for Convolutional Codes Using Shifted Code/Error-Subsequences. - Kitty Meeks, Alexander Scott:
The complexity of flood-filling games on graphs. - Sara Brunetti, Elena Lodi, Walter Quattrociocchi:
Dynamic Monopolies in Colored Tori. - Vojtech Prehnal:
Dialog interface for dynamic data models. - Kévin Perrot, Eric Rémila:
Avalanche Structure in the Kadanoff Sand Pile Model. - (Withdrawn) Random Walk on Directed Dynamic Graphs.
- Bojin Zheng, Deyi Li, Guisheng Chen, Jianmin Wang:
A Kind of Representation of Common Knowledge and its Application in Requirements Analysis. - Eirik Rosnes, Alexandre Graell i Amat:
On the Analysis of Weighted Nonbinary Repeat Multiple-Accumulate Codes. - Bojin Zheng, Jianmin Wang, Guisheng Chen, Jian Jiang, Xianjun Shen:
Hidden Tree Structure is a Key to the Emergence of Scaling in the World Wide Web. - Md Saifur Rahman, Aaron B. Wagner:
Optimality of Binning for Distributed Hypothesis Testing. - H. V. Beltrão Neto, Werner Henkel, Valdemar Cardoso da Rocha Jr.:
Multi-Edge type Unequal Error Protection LDPC codes. - Bojin Zheng, Yuanxiang Li:
New Model for Multi-Objective Evolutionary Algorithms. - Andrea Roli, Mattia Manfroni, Carlo Pinciroli, Mauro Birattari:
Boolean network robotics: a proof of concept. - Andrea Roli, Michela Milano:
Solving the Satisfiability Problem Through Boolean Networks. - Stefano Iellamo, Lin Chen, Marceau Coupechoux:
Let Cognitive Radios Imitate: Imitation-based Spectrum Access for Cognitive Radio Networks. - Andrea Roli, Cristian Arcaroli, Marco Lazzarini, Stefano Benedettini:
Boolean Networks Design by Genetic Algorithms. - Ricardo Lopes, Vítor Santos Costa, Fernando M. A. Silva:
A Design and Implementation of the Extended Andorra Model. - Sourabh Bhattacharya, Ali Khanafer, Tamer Basar:
Power Allocation in Team Jamming Games in Wireless Ad Hoc Networks. - François Rodier:
Some More Functions That Are Not APN Infinitely Often. The Case of Kasami exponents. - Jose Antonio Martin H.:
A polynomial 3-colorability algorithm with automatic generation of NO 3-colorability (i.e. Co-NP) short proofs. - Jiapu Zhang:
A Brief Review on Results and Computational Algorithms for Minimizing the Lennard-Jones Potential. - Toyohiro Tsurumaru, Masahito Hayashi:
Dual universality of hash functions and its applications to classical and quantum cryptography. - Shekhar Chandra, Imants D. Svalbe, Jean-Pierre V. Guédon, Andrew Kingston, Nicolas Normand:
Recovering Missing Slices of the Discrete Fourier Transform using Ghosts. - Jason Morton:
Pfaffian Circuits. - Madhur Srivastava, Prateek Katiyar, Yashwant Yashu, Satish Kumar Singh, Prasanta K. Panigrahi:
A Fast Statistical Method for Multilevel Thresholding in Wavelet Domain. - Sarika Jalan, Baowen Li:
Spectral Properties of Directed Random Networks with Modular Structure. - Reza Hosseini:
Conditional information and definition of neighbor in categorical random fields. - David R. Bickel:
Hypothesis support measured by likelihood in the presence of nuisance parameters, multiple studies, and multiple comparisons. - Hang-Hyun Jo, Márton Karsai, János Kertész, Kimmo Kaski:
Circadian pattern and burstiness in human communication activity. - Massimo Ostilli, A. L. Ferreira, José F. F. Mendes:
Critical behavior and correlations on scale-free small-world networks. Application to network design. - Mazen Al Borno:
Reduction in Solving Some Integer Least Squares Problems. - Scott Aaronson:
Impossibility of Succinct Quantum Proofs for Collision-Freeness. - Xiu-Lian Xu, Yan-Qin Qu, Shan Guan, Yu-Mei Jiang, Da-Ren He:
Interconnecting bilayer networks. - J. A. M. Vermaseren:
FORM development. - Gaetan Bisson, Andrew V. Sutherland:
A low-memory algorithm for finding short product representations in finite groups. - Jun Zhang, Xianbin Cao, Wenbo Du, Kaiquan Cai:
Evolution of Chinese airport network. - Alain Coulais, M. Schellens, J. Gales, S. Arabas, M. Boquien, P. Chanial, P. Messmer, D. Fillmore, O. Poplawski, S. Maret, G. Marchal, N. Galmiche, T. Mermet:
Status of GDL - GNU Data Language. - Andrew C. Thomas, Joseph K. Blitzstein:
Valued Ties Tell Fewer Lies: Why Not To Dichotomize Network Edges With Thresholds. - Vasco Brattka, Guido Gherardi, Alberto Marcone:
The Bolzano-Weierstrass Theorem is the Jump of Weak König's Lemma. - Stefano Galatolo, Mathieu Hoyrup, Cristobal Rojas:
Dynamical systems, simulation, abstract computation. - Tengyu Ma, Xiaoming Sun, Huacheng Yu:
A New Variation of Hat Guessing Games. - K. D. Prathapasinghe Dharmawansa, Matthew R. McKay:
Extreme Eigenvalue Distributions of Some Complex Correlated Non-Central Wishart and Gamma-Wishart Random Matrices. - Luc Habert, Michel Pocchiola:
Arrangements of double pseudolines. - Lingfei Wu, Jiang Zhang, Jonathan J. H. Zhu, Kai Lei, Qian Mo:
Diversity Leads to Accelerating Growth in Online Social Systems. - Paul Goulart, Sergei I. Chernyshenko:
Global Stability Analysis of Fluid Flows using Sum-of-Squares. - Suhan Ree:
Opinion dynamics of random-walking agents on a lattice. - Silvio C. Ferreira, Marcelo M. Martins:
Critical behavior of the contact process in a multiscale network. - Simon R. Blackburn:
The existence of k-radius sequences. - Lev B. Levitin, Tommaso Toffoli:
Work recoverable from two-particle information. - Bernd Sturmfels, Volkmar Welker:
Commutative Algebra of Statistical Ranking. - Jin-Li Guo, Chao Fan, Ya-Li Ji:
The Universality of the Attractiveness Model to Weighted Networks. - Yang Wang, Zengru Di, Ying Fan:
Detecting Important Nodes to Community Structure Using the Spectrum of the Graph. - José M. Peña:
A Correction of "Deriving a Minimal I-Map of a Belief Network Relative to a Target Ordering of its Nodes". - Valérie Berthé, Timo Jolivet, Anne Siegel:
Connectedness of fractals associated with Arnoux-Rauzy substitutions. - Rodney Coleman:
On Krawtchouk polynomials. - A. Yazdani, V. Nassehi:
Finite element solution of multi-scale transport problems using the least squares based bubble function enrichment. - Stefan Ragnarsson, Charles F. Van Loan:
Block Tensor Unfoldings. - Amir Bashan, Roni Parshani, Shlomo Havlin:
Percolation in networks composed of connectivity and dependency links. - Sándor P. Fekete, Alexander Kroeller, Martin Lorek, Marc E. Pfetsch:
Disruption Management with Rescheduling of Trips and Vehicle Circulations. - Krzysztof Malarz, Krzysztof Kulakowski:
Bounded confidence model: addressed information maintain diversity of opinions. - Maria Luisa Bonet, Simone Linz, Katherine St. John:
The Complexity of Finding Multiple Solutions to Betweenness and Quartet Compatibility. - Lloyd Wood, Charles Smith, Wesley M. Eddy, William D. Ivancic, Chris Jackson:
Taking Saratoga from Space-Based Ground Sensors to Ground-Based Space Sensors. - R. C. Venkatesan, Angel Plastino:
Scaled Bregman divergences in a Tsallis scenario. - Giacomo Como, Ketan Savla, Daron Acemoglu, Munther A. Dahleh, Emilio Frazzoli:
Stability Analysis of Transportation Networks with Multiscale Driver Decisions. - Andrew C. Thomas, Joseph K. Blitzstein:
Valued Ties Tell Fewer Lies, II: Why Not To Dichotomize Network Edges With Bounded Outdegrees. - Susan Khor:
Why aren't the small worlds of protein contact networks smaller. - Stéphane Mallat:
Group Invariant Scattering. - Katharina Fischer:
ε-Equilibria in Quitting Games - Basics. - Mohamed-Ali Belabbas:
Decentralized Formation Control Part I: Geometric Aspects. - Mohamed-Ali Belabbas:
Decentralized Formation Control Part II: Algebraic aspects of information flow and singularities. - Federico Ardila, Megan Owen, Seth Sullivant:
Geodesics in CAT(0) Cubical Complexes. - Vinko Zlatic, Diego Garlaschelli, Guido Caldarelli:
Complex networks with arbitrary edge multiplicities. - Chih-Ping Li, Michael J. Neely:
Delay and Power-Optimal Control in Multi-Class Queueing Systems. - László Gulyás, Gábor Horváth, Tamás Cséri, George Kampis:
An Estimation of the Shortest and Largest Average Path Length in Graphs of Given Density. - Gaston Heimeriks, Loet Leydesdorff:
Emerging Search Regimes: Measuring Co-evolutions among Research, Science, and Society. - Mark Walters:
Small components in k-nearest neighbour graphs. - Animesh Mukherjee, Francesca Tria, Andrea Baronchelli, Andrea Puglisi, Vittorio Loreto:
Aging in language dynamics. - (Withdrawn) Convergence to consensus in multiagent systems and the lengths of inter-communication intervals.
- Marcin Ostrowski:
Information and the arrow of time. - Benjamin A. Burton:
Detecting genus in vertex links for the fast enumeration of 3-manifold triangulations. - Sonny Ben-Shimon, Michael Krivelevich, Benny Sudakov:
On the resilience of Hamiltonicity and optimal packing of Hamilton cycles in random graphs. - Masato Hisakado, Shintaro Mori:
Digital herders and phase transition in a voting model. - Lily Chen, Xueliang Li, Yongtang Shi:
The complexity of determining the rainbow vertex-connection of graphs. - Ming Zhao, Changsong Zhou, Jinhu Lü, Choy Heng Lai:
Competition between Intra-community and Inter-community Synchronization. - David M. South:
Data Preservation in High Energy Physics. - K. V. Karelsky, A. S. Petrosyan, A. G. Slavin:
Quasi-two-layer finite-volume scheme for modeling shallow water flows with the presence of external forces. - Raymond Hemmecke, Shmuel Onn, Lyubov Romanchuk:
N-fold integer programming in cubic time. - Sergey G. Bobkov, Mokshay M. Madiman:
Dimensional behaviour of entropy and information. - Yukio Hayashi, Yasumasa Ono:
Traffic properties for stochastic routings on scale-free networks. - Amit Hagar, Giuseppe Sergioli:
Counting Steps: A New Approach to Objective Probability in Physics. - (Withdrawn) Infinity in computable probability.
- Christian Eder, John Edward Perry:
Signature-based algorithms to compute Groebner bases. - Donghui Yan, Peng Gong, Aiyou Chen, Liheng Zhong:
Classification under Data Contamination with Application to Remote Sensing Image Mis-registration. - Gitta Kutyniok:
Sparsity Equivalence of Anisotropic Decompositions. - Daniele Veneziano, Marta C. González:
Trip Length Distribution Under Multiplicative Spatial Models of Supply and Demand: Theory and Sensitivity Analysis. - David Lusseau, Louise Barrett, S. Peter Henzi:
Formalising the multidimensional nature of social networks. - Balázs Keszegh, Dömötör Pálvölgyi:
Octants are Cover Decomposable. - Sevag Gharibian, Julia Kempe:
Approximation algorithms for QMA-complete problems. - Fabio Pasqualetti, Antonio Franchi, Francesco Bullo:
On cooperative patrolling: optimal trajectories, complexity analysis, and approximation algorithms. - James M. Whitacre, Philipp Rohlfshagen, Axel Bender, Xin Yao:
Evolutionary Mechanics: new engineering principles for the emergence of flexibility in a dynamic and uncertain world. - Aram Galstyan, Greg Ver Steeg, Armen E. Allahverdyan:
Statistical Mechanics of Semi-Supervised Clustering in Sparse Graphs. - Zdenek Dvorák:
3-choosability of planar graphs with (<=4)-cycles far apart. - Ugo V. Boscain, Marco Caponigro, Thomas Chambrion, Mario Sigalotti:
A weak spectral condition for the controllability of the bilinear Schrödinger equation with application to the control of a rotating planar molecule. - Nithin Nagaraj, Mathew Shaji Kavalekalam, Arjun Venugopal T., Nithin Krishnan:
Lossless Compression and Complexity of Chaotic Sequences. - Oleg I. Mokhov:
On initial data in the problem of consistency on cubic lattices for 3 x 3 determinants. - Tobias Galla:
Cycles of cooperation and defection in imperfect learning. - Guohui Song, Haizhang Zhang, Fred J. Hickernell:
Reproducing Kernel Banach Spaces with the l1 Norm. - Wesley Pegden:
A finite goal set in the plane which is not a Winner. - Guohui Song, Haizhang Zhang:
Reproducing Kernel Banach Spaces with the l1 Norm II: Error Analysis for Regularized Least Square Regression. - Matthieu Deneufchâtel, Gérard Henry Edmond Duchamp, Vincel Hoang Ngoc Minh, Allan I. Solomon:
Independence of hyperlogarithms over function fields via algebraic combinatorics. - Francesco Calabrese, Zbigniew Smoreda, Vincent D. Blondel, Carlo Ratti:
The interplay between telecommunications and face-to-face interactions - an initial study using mobile phone data. - Marc Bailly-Bechet, Christian Borgs, Alfredo Braunstein, Jennifer T. Chayes, A. Dagkessamanskaia, J.-M. François, Riccardo Zecchina:
Finding undetected protein associations in cell signaling by belief propagation. - Tobias Heindel, Pawel Sobocinski:
Being Van Kampen is a universal property. - M. Kamrul Hassan, M. Zahedul Hassan, Neeaj I. Pavel:
Dynamic scaling, data-collapse and self-similarity in Barabási and Albert networks. - Francesca P. Carli, Augusto Ferrante, Michele Pavon, Giorgio Picci:
A Maximum Entropy solution of the Covariance Extension Problem for Reciprocal Processes. - Brittany D. Froese:
A numerical method for the elliptic Monge-Ampère equation with transport boundary conditions. - Sandro Bosio, Di Yuan:
Modeling and Solving AP Location and Frequency Assignment for Maximizing Access Efficiency in Wi-Fi Networks. - Atieh Mirshahvalad, Martin Rosvall:
Reinforced communication and social navigation: remember your friends and remember yourself. - Luo-Luo Jiang, Matjaz Perc, Wen-Xu Wang, Ying-Cheng Lai, Bing-Hong Wang:
Impact of link deletions on public cooperation in scale-free networks. - Peter Sheridan Dodds, Kameron Decker Harris, Isabel M. Kloumann, Catherine A. Bliss, Christopher M. Danforth:
Temporal patterns of happiness and information in a global social network: Hedonometrics and Twitter. - Francisco Aparecido Rodrigues, Guilherme Ferraz de Arruda, Luciano da Fontoura Costa:
A Complex Networks Approach for Data Clustering. - Chris Dowden:
A new axiomatic approach to diversity. - Fabrizio de Vico Fallani, Vincenzo Nicosia, Roberta Sinatra, Laura Astolfi, Febo Cincotti, Donatella Mattia, Christopher T. Wilke, A. Doud, Vito Latora, Bin He, Fabio Babiloni:
Defecting or not defecting: how to "read" human behavior during cooperative games by EEG measurements. - Olof Heden, Papa Amar Sissokho:
On the existence of a (2,3)-spread in V(7,2). - Scott Aaronson, Andrew Drucker:
Advice Coins for Classical and Quantum Computation. - Matheus P. Viana, João L. B. Batista, Luciano da F. Costa:
How Many Nodes are Effectively Accessed in Complex Networks? - August Lau, Chuan Yin:
Solvability by semigroup : Application to seismic imaging with complex decomposition of wave equations and migration operators with idempotents. - Peter Sheridan Dodds, Kameron Decker Harris, Joshua L. Payne:
Physical, transparent derivation of the contagion condition for spreading processes on generalized random networks. - Ivo Hedtke:
A Note on the Group-theoretic Approach to Fast Matrix Multiplication. - Tal Orenshtein, Igor Shinkar:
Greedy random walk. - Xueliang Li, Yuefang Sun:
Rainbow Connection of Graphs -- A Survey. - Gabriel Acosta, Inés Caridi, Sebastián Guala, Javier Marenco:
The Full Strategy Minority Game. - Ryohei Hisano, Didier Sornette, Takayuki Mizuno:
Predicted and verified evolution of power-law exponent in product market. - Raj Kumar Pan, Jari Saramäki:
Path lengths, correlations, and centrality in temporal networks. - Éric Colin de Verdière, Grégory Ginot, Xavier Goaoc:
Helly numbers of acyclic families. - E. S. Roberts, Anthony C. C. Coolen, Thomas Schlitt:
Tailored graph ensembles as proxies or null models for real networks II: results on directed graphs. - Stephan Weis:
Quantum Convex Support. - Benoîte de Saporta, François Dufour, Huilong Zhang, Charles Elegbede:
Optimal stopping for the predictive maintenance of a structure subject to corrosion. - Filippo Radicchi:
Who is the best player ever? A complex network analysis of the history of professional tennis. - Saikat Guha:
Structured optical receivers to attain superadditive capacity and the Holevo limit. - Adrian Kent:
Unconditionally Secure Bit Commitment with Flying Qudits. - Jan L. Cieslinski:
Locally exact modifications of numerical integrators. - Klaus Frick, Philipp Marnitz, Axel Munk:
Statistical Multiresolution Dantzig Estimation in Imaging: Fundamental Concepts and Algorithmic Framework. - Sébastien Gerchinovitz:
Sparsity regret bounds for individual sequences in online linear regression. - Osbert Bastani, Christopher J. Hillar, Dimitar Popov, J. Maurice Rojas:
Randomization, Sums of Squares, and Faster Real Root Counting for Tetranomials and Beyond. - Benno van den Berg, Chris Heunen:
No-go theorems for functorial localic spectra of noncommutative rings. 21-25
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.