default search action
CoRR, June 2005
- Dmitry Mogilevsky, Sean Keller:
SafeMPI - Extending MPI for Byzantine Error Detection on Parallel Clusters. - Angela Bonifati, Elaine Qing Chang, Terence Ho, Laks V. S. Lakshmanan:
HepToX: Heterogeneous Peer to Peer XML Databases. - Andrea Pasquinucci:
Authentication and routing in simple Quantum Key Distribution networks. - Vladimir Vovk:
Non-asymptotic calibration and resolution. - Neng-Fa Zhou:
Programming Finite-Domain Constraint Propagators in Action Rules. - Nicolas Capit, Georges Da Costa, Yiannis Georgiou, Guillaume Huard, Cyrille Martin, Grégory Mounié, Pierre Neyron, Olivier Richard:
A batch scheduler with high level components. - Vladimir Vovk, Ilia Nouretdinov, Akimichi Takemura, Glenn Shafer:
Defensive forecasting for linear protocols. - Felix Klaedtke:
Bounds on the Automata Size for Presburger Arithmetic. - A. S. Madhu, Priti Shankar:
Approximate MAP Decoding on Tail-Biting Trellises. - Simeon Warner:
The OAI Data-Provider Registration and Validation Service. - Peter Sin, Qing Xiang:
On the dimensions of certain LDPC codes based on q-regular bipartite graphs. - Farhad Meshkati, H. Vincent Poor, Stuart C. Schwartz:
A Non-Cooperative Power Control Game in Delay-Constrained Multiple-Access Networks. - Prakash Ishwar, Pierre Moulin:
On the existence and characterization of the maxent distribution under general moment inequality constraints. - Joost Engelfriet, Sebastian Maneth:
The Equivalence Problem for Deterministic MSO Tree Transducers is Decidable. - Raju Gangishetti, M. Choudary Gorantla, Manik Lal Das, Ashutosh Saxena:
Cryptanalysis of Key Issuing Protocols in ID-based Cryptosystems. - Travis Gagie:
Compressing Probability Distributions. - Nizar Messai, Marie-Dominique Devignes, Malika Smaïl-Tabbone, Amedeo Napoli:
Treillis de concepts et ontologies pour l'interrogation d'un annuaire de sources de données biologiques (BioRegistry). - Kambiz Azarian, Hesham El Gamal, Philip Schniter:
On the Achievable Diversity-Multiplexing Tradeoffs in Half-Duplex Cooperative Channels. - Vicky Choi, Navin Goyal:
An Efficient Approximation Algorithm for Point Pattern Matching Under Noise. - Praveen Kumar Gopala, Hesham El Gamal:
On the Throughput-Delay Tradeoff in Cellular Multicast. - Rajgopal Kannan, Shuangqing Wei:
Analysis of Relationship between Strategic and Aggregate Energy Minimization in Delay-Constrained Wireless Networks. - Jan Poland, Marcus Hutter:
Asymptotics of Discrete MDL for Online Prediction. - Onureena Banerjee, Alexandre d'Aspremont, Laurent El Ghaoui:
Sparse Covariance Selection via Robust Maximum Likelihood Estimation. - Marko A. Rodriguez:
The Hyper-Cortex of Human Collective-Intelligence Systems. - Travis Gagie:
Dynamic Asymmetric Communication. - Rada Chirkova, Michael R. Genesereth:
Database Reformulation with Integrity Constraints (extended abstract). - Travis Gagie:
Sorting a Low-Entropy Sequence. - Youngchul Sung, Lang Tong, H. Vincent Poor:
Neyman-Pearson Detection of Gauss-Markov Signals in Noise: Closed-Form Error Exponent and Properties. - Arul D. Murugan, Hesham El Gamal, Mohamed Oussama Damen, Giuseppe Caire:
A Unified Framework for Tree Search Decoding : Rediscovering the Sequential Decoder. - Jonathan Ben-Naim:
Preferential and Preferential-discriminative Consequence relations. - Patrick Albert, Laurent Henocque, Mathias Kleiner:
A Constrained Object Model for Configuration Based Workflow Composition. - R. Shankar:
Framework for Hopfield Network based Adaptive routing - A design level approach for adaptive routing phenomena with Artificial Neural Network. - Reno Filla:
An Event-driven Operator Model for Dynamic Simulation of Construction Machinery. - Srikumar Venugopal, Rajkumar Buyya, Kotagiri Ramamohanarao:
A Taxonomy of Data Grids for Distributed Data Sharing, Management and Processing. - Jerome Collin, Michel R. Dagenais:
Fast Recompilation of Object Oriented Modules. - Marco Dalai, Riccardo Leonardi:
Non prefix-free codes for constrained sequences. - Sriram N. Kizhakkemadam, Panos Papamichalis, Mandyam D. Srinath, Dinesh Rajan:
Tradeoff Between Source and Channel Coding for Erasure Channels. - Wen Ding, William Yurcik:
A Game Theoretic Economics Framework to understanding Information Security Oursourcing Market. - Weijun Zhu, Heechoon Lee, Daniel N. Liu, Michael P. Fitz:
Antenna array geometry and coding performance. - Jie Liu, Sheng Bao, Zhiqiang Jing, Shi Chen:
A Fixed-Length Coding Algorithm for DNA Sequence Compression. - Vladimir Vovk:
Competitive on-line learning with a convex loss function. - Deepak Sridhara, Christine A. Kelley, Joachim Rosenthal:
Tree-Based Construction of LDPC Codes. - Krishna R. Narayanan, Kapil Bhattad:
A Decision Feedback Based Scheme for Slepian-Wolf Coding of sources with Hidden Markov Correlation. - Kapil Bhattad, Niranjan Ratnakar, Ralf Koetter, Krishna R. Narayanan:
Minimal Network Coding for Multicast. - Krishna R. Narayanan, Kapil Bhattad:
Decision Feedback Based Scheme for Slepian-Wolf Coding of sources with Hidden Markov Correlation. - Bernard Jacquemin:
Dictionaries merger for text expansion in question answering. - Bernard Jacquemin:
Analyse et expansion des textes en question-réponse. - Bernard Jacquemin, Caroline Brun, Claude Roux:
Enriching a Text by Semantic Disambiguation for Information Extraction. - Caroline Brun, Bernard Jacquemin, Frédérique Segond:
Exploitation de dictionnaires électroniques pour la désambiguïsation sémantique lexicale. - Alexander Wiesmaier, Vangelis Karatsiolis, Marcus Lippert, Johannes Buchmann:
The Workshop - Implementing Well Structured Enterprise Applications. - Heiko Herrmann, Gunnar Rueckner:
Comparison of two different implementations of a finite-difference-method for first-order pde in mathematica and matlab. - Vignesh Sethuraman, Bruce E. Hajek:
Comments on 'Bit Interleaved Coded Modulation'. - Hongyuan Zhang, Huaiyu Dai, Quan Zhou, Brian L. Hughes:
Analysis on Transmit Antenna Selection for Spatial Multiplexing Systems: A Geometrical Approach. - Ramesh Johari, Shie Mannor, John N. Tsitsiklis:
Efficiency Loss in a Network Resource Allocation Game: The Case of Elastic Supply. - Edith Hemaspaandra, Lane A. Hemaspaandra, Osamu Watanabe:
The Complexity of Kings. - Travis Gagie:
Large Alphabets and Incompressibility. - Victor Kromer:
About one 3-parameter Model of Testing. - Kapil Bhattad, Krishna R. Narayanan:
An MSE Based Ttransfer Chart to Analyze Iterative Decoding Schemes. - Hubie Chen:
Existentially Restricted Quantified Constraint Satisfaction. - Yong Luo:
Yet another normalisation proof for Martin-Lof's logical framework--Terms with correct arities are strongly normalising. - Daniele Gorla, Matthew Hennessy, Vladimiro Sassone:
Security Policies as Membranes in Systems for Global Computing. - Yoshiyuki Kabashima:
A CDMA multiuser detection algorithm based on survey propagation. - Slawomir Staworko, Jan Chomicki:
Priority-Based Conflict Resolution in Inconsistent Relational Databases. - Mitsugu Iwamoto, Hirosuke Yamamoto, Hirohisa Ogawa:
Optimal multiple assignments based on integer programming in secret sharing schemes with general access structures. - Mitsugu Iwamoto, Hirosuke Yamamoto:
Strongly secure ramp secret sharing schemes for general access structures. - Yoo Chung, Dongman Lee:
Impersonation with the Echo Protocol. - Juan José Amor, Gregorio Robles, Jesús M. González-Barahona:
Measuring Woody: The Size of Debian 3.0. - Chris Marriott, John Watrous:
Quantum Arthur-Merlin Games. - Rémi Monasson:
A generating function method for the average-case analysis of DPLL. - Yuriy A. Chashkov:
Data Visualization on Shared Usage Multi-Screen Environment. - Yu. Reznykov:
Signal transmission on lossy lines as a dissipative quantum state propagation. - Jing Jiang, Krishna R. Narayanan:
Performance Analysis of Algebraic Soft Decoding of Reed-Solomon Codes over Binary Symmetric and Erasure Channels. - Jing Jiang, Krishna R. Narayanan:
Iterative Soft Input Soft Output Decoding of Reed-Solomon Codes by Adapting the Parity Check Matrix. - Paolo Liberatore:
Redundancy in Logic II: 2CNF and Horn Propositional Formulae. - Bo Pang, Lillian Lee:
Seeing stars: Exploiting class relationships for sentiment categorization with respect to rating scales. - Wojciech Mazurczyk, Zbigniew Kotulski:
Alternative security architecture for IP Telephony based on digital watermarking. - K. C. V. Kalyanarama Sesha Sayee, Utpal Mukherji:
Stability of Scheduled Multi-access Communication over Quasi-static Flat Fading Channels with Random Coding and Independent Decoding. - David R. C. Dominguez, Kostadin Koroutchev, Eduardo Serrano, Francisco de Borja Rodríguez Ortiz:
Dynamical Neural Network: Information and Topology. - Ugo Dal Lago, Martin Hofmann:
Quantitative Models and Implicit Complexity. - Ugo Dal Lago:
The Geometry of Linear Higher-Order Recursion. - Gatis Midrijanis:
Three lines proof of the lower bound for the matrix rigidity. - Piotr Faliszewski, Lane A. Hemaspaandra:
Open Questions in the Theory of Semifeasible Computation. - Cyril Measson, Andrea Montanari, Rüdiger L. Urbanke:
Maxwell Construction: The Hidden Bridge between Iterative and Maximum a Posteriori Decoding. - Jason E. Holt:
The One Page Model Checker. - Jason E. Holt:
On the Job Training. - Sudharman K. Jayaweera:
Large System Decentralized Detection Performance Under Communication Constraints. - Ryutaroh Matsumoto, Kaoru Kurosawa, Toshiya Itoh, Toshimitsu Konno, Tomohiko Uyematsu:
Primal-dual distance bounds of linear codes with application to cryptography. - (Withdrawn) An Alternative to Huffman's Algorithm for Constructing Variable-Length Codes.
- Patrick C. McGuire, Javier Gómez-Elvira, José Antonio Rodríguez Manfredi, Eduardo Sebastián-Martínez, Jens Ormö, Enrique Díaz Martínez, Markus Oesker, Robert Haschke, Jörg Ontrup, Helge J. Ritter:
Field geology with a wearable computer: 1st results of the Cyborg Astrobiologist System. - Tobias Riege, Jörg Rothe:
An Exact 2.9416n Algorithm for the Three Domatic Number Problem. - Oscar Y. Takeshita:
A New Construction for LDPC Codes using Permutation Polynomials over Integer Rings. - Thomas Lux:
Emergent Statistical Wealth Distributions in Simple Monetary Exchange Models: A Critical Review. - Oscar Y. Takeshita:
On Maximum Contention-Free Interleavers and Permutation Polynomials over Integer Rings. - Boris Ryabko, Jaakko Astola:
Universal Codes as a Basis for Nonparametric Testing of Serial Independence for Time Series. - Yi-Dong Shen, Qiang Yang, Jia-Huai You, Li-Yan Yuan:
Deriving a Stationary Dynamic Bayesian Network from a Logic Program with Recursive Loops. - Nicolas Baudru, Rémi Morin:
Polynomial Synthesis of Asynchronous Automata. - Samuel Thibault:
A Flexible Thread Scheduler for Hierarchical Multiprocessor Machines. - Petra Berenbrink, Tom Friedetzky, Leslie Ann Goldberg, Paul W. Goldberg, Zengjian Hu, Russell A. Martin:
Distributed Selfish Load Balancing. - Yuval Shavitt, Eran Shir:
DIMES: Let the Internet Measure Itself. - Jirí Síma, Satu Elisa Schaeffer:
On the NP-Completeness of Some Graph Cluster Measures. - Patrick Haffner, Steven J. Phillips, Robert E. Schapire:
Efficient Multiclass Implementations of L1-Regularized Maximum Entropy. - John Little, Ryan Schwarz:
On m-dimensional toric codes. - Aneta Zwierko, Zbigniew Kotulski:
Security of mobile agents: a new concept of the integrity protection. - Zbigniew Lonc, Miroslaw Truszczynski:
Computing minimal models, stable models and answer sets. - Ren-Chiun Wang, Chou Chen Yang, Kun-Ru Mo:
A protected password change protocol. - Milan M. Cirkovic, Robert J. Bradbury:
Galactic Gradients, Postbiological Evolution and the Apparent Failure of SETI. - Sergey N. Dorogovtsev, Alexander V. Goltsev, J. F. F. Mendes:
Correlations in interacting systems with a network topology. - Mikhail G. Stepanov, Vladimir Y. Chernyak, Michael Chertkov, Bane Vasic:
Diagnosis of weaknesses in modern error correction codes: a physics approach. - Hervé Daudé, Marc Mézard, Thierry Mora, Riccardo Zecchina:
Pairs of SAT Assignment in Random Boolean Formulae. - L. Bogacz, Zdzislaw Burda, Wolfhard Janke, Bartlomiej Waclaw:
A program generating homogeneous random graphs with given weights. - Stefano Ciliberti, Marc Mézard:
The theoretical capacity of the Parity Source Coder. - Naoto Morikawa:
Discrete differential geometry of proteins: a new method for encoding three-dimensional structures of proteins. - Dimitri Grigoriev, Ilia N. Ponomarenko:
Constructions in public-key cryptography over matrix groups. - Radhakrishnan Srinivasan, H. P. Raghunandan:
Foundations of real analysis and computability theory in non-Aristotelian finitary logic. - Anne Micheli, Dominique Rossin:
Edit Distance between Unlabeled Ordered Trees. - Hugues Berry, Daniel Gracia Pérez, Olivier Temam:
Chaos in computer performance. - Bruno Cessac, Jacques-A. Sepulchre:
Transmitting a signal by amplitude modulation in a chaotic network. - Paolo Luchini, Maurizio Quadrio:
A low-cost parallel implementation of direct numerical simulation of wall turbulence. - Fabio Benatti, Tyll Krueger, Markus Müller, Rainer Siegmund-Schultze, Arleta Szkola:
Entropy and Quantum Kolmogorov Complexity: A Quantum Brudno's Theorem. - Wenjin Mao:
Solving Satisfiability Problems by the Ground-State Quantum Computer. - Claus-Jochen Haake, Akemi Kashiwada, Francis Edward Su:
The Shapley Value of Phylogenetic Trees. - Giorgi Japaridze:
Introduction to Cirquent Calculus and Abstract Resource Semantics. - Jason D. McEwen, Michael P. Hobson, Daniel J. Mortlock, Anthony N. Lasenby:
Fast directional continuous spherical wavelet transform algorithms.
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.