


default search action
CoRR, November 2005
- Syed Ali Jafar:
Capacity with Causal and Non-Causal Side Information - A Unified View. - Alberto Accomazzi, Michael J. Kurtz, Günther Eichhorn, Edwin A. Henneken, Carolyn Stern-Grant, Markus Demleitner, Stephen S. Murray:
Bibliographic Classification using the ADS Databases. - Michael B. Baer:
Optimal Prefix Codes for Infinite Alphabets with Nonlinear Costs. - A. E. Eiben, Marc Schoenauer:
Evolutionary Computing. - Santo Fortunato, Alessandro Flammini, Filippo Menczer, Alessandro Vespignani:
The egalitarian effect of search engines. - Jean Goubault-Larrecq, Slawomir Lasota, David Nowak:
Logical Relations for Monadic Types. - J. Ignacio Alvarez-Hamelin, Luca Dall'Asta, Alain Barrat, Alessandro Vespignani:
k-core decomposition: a tool for the analysis of large scale Internet graphs. - Yuming Jiang:
Analysis of Stochastic Service Guarantees in Communication Networks: A Basic Calculus. - Ioannis Kontoyiannis, Ram Zamir:
Mismatched codebooks and the role of entropy-coding in lossy data compression. - Nadir Kiyanclar:
A Survey of Virtualization Techniques Focusing on Secure On-Demand Cluster Computing. - Hamilton Link, Jared Saia, Terran Lane, Randall A. LaViolette:
The Impact of Social Networks on Multi-Agent Recommender Systems. - Hamilton Link, Randall A. LaViolette, Jared Saia, Terran Lane:
Parameters Affecting the Resilience of Scale-Free Networks to Random Failures. - Zengyou He, Xiaofei Xu, Shengchun Deng:
K-ANMI: A Mutual Information Based Clustering Algorithm for Categorical Data. - Helmut Seidl, Kumar Neeraj Verma:
Flat and One-Variable Clauses: Complexity of Verifying Cryptographic Protocols with Single Blind Copying. - Prashant:
Towards a Hierarchical Model of Consciousness, Intelligence, Mind and Body. - Santo Fortunato, Marián Boguñá, Alessandro Flammini, Filippo Menczer:
How to make the top ten: Approximating PageRank from in-degree. - Gus Gutoski:
Short Quantum Games. - Prashant:
From General Systems to Soft Systems to Soft Computing: Applications for Large and Complex Real World Systems. - Young-Han Kim:
A Counterexample to Cover's 2P Conjecture on Gaussian Feedback Capacity. - David S. Planeta:
Pbit and other list sorting algorithms. - Ravi Kannan, Thorsten Theobald:
Games of fixed rank: A hierarchy of bimatrix games. - Emanuel Diamant:
Does a Plane Imitate a Bird? Does Computer Vision Have to Follow Biological Paradigms? - Christel Baier, Nathalie Bertrand, Philippe Schnoebelen:
Verifying nondeterministic probabilistic channel systems against $\omega$-regular linear-time properties. - Bourgade Paul, Croissant Olivier:
Heat kernel expansion for a family of stochastic volatility models : delta-geometry. - James Cheney:
Logic Column 14: Nominal Logic and Abstract Syntax. - Aditya Mahajan, Demosthenis Teneketzis:
A Decision Theoretic Framework for Real-Time Communication. - Stephen P. Luttrell:
Discrete Network Dynamics. Part 1: Operator Theory. - Hyundong Shin, Moe Z. Win:
MIMO Diversity in the Presence of Double Scattering. - Rasika R. Perera, Tony S. Pollock, Thushara D. Abhayapala:
Non-coherent Rayleigh fading MIMO channels: Capacity Supremum. - Gregory Z. Gutin, Arash Rafiey, Stefan Szeider, Anders Yeo:
The Linear Arrangement Problem Parameterized Above Guaranteed Value. - Prashant:
Internet Protocol Black Holes: A E-Security Threat. - Yangli Hector Yee:
Spatiotemporal sensistivity and visual attention for efficient rendering of dynamic environments. - Martin Ziegler:
Fast (Multi-)Evaluation of Linearly Recurrent Sequences: Improvements and Applications. - Stanislav Bulygin:
Generalized Hermitian Codes over GF(2^r). - M. Ángeles Serrano, Ana Gabriela Maguitman, Marián Boguñá, Santo Fortunato, Alessandro Vespignani:
Decoding the structure of the WWW: facts versus sampling biases. - Mei Chen, Teng Li, Oliver M. Collins:
A Capacity Achieving and Low Complexity Multilevel Coding Scheme for ISI Channels. - Mei Chen, Oliver M. Collins:
Trellis Pruning for Peak-to-Average Power Ratio Reduction. - Pascal Hitzler, Sibylle Schwarz:
Towards a unified theory of logic programming semantics: Level mapping characterizations of selector generated models. - Cyril Measson, Andrea Montanari, Thomas J. Richardson, Rüdiger L. Urbanke:
The Generalized Area Theorem and Some of its Consequences. - Amir Bennatan, David Burshtein:
Design and Analysis of Nonbinary LDPC Codes for Arbitrary Discrete-Memoryless Channels. - Susumu Yamasaki:
Logic Programming with Default, Weak and Strict Negations. - Sebastian Bader, Pascal Hitzler:
Dimensions of Neural-symbolic Integration - A Structured Survey. - Damiano Bolzoni, Emmanuele Zambon, Sandro Etalle, Pieter H. Hartel:
Poseidon: a 2-tier Anomaly-based Intrusion Detection System. - Jozef Gruska, Salvatore La Torre, Margherita Napoli, Mimmo Parente:
Various Solutions to the Firing Squad Synchronization Problems. - Ugo Dal Lago, Simone Martini:
An Invariant Cost Model for the Lambda Calculus. - Xiangyong Zeng, Qingchong Liu, Lei Hu:
Generalized Kasami Sequences: The Large Set. - Chunxuan Ye, Prakash Narayan:
The Secret Key-Private Key Capacity Region for Three Terminals. - Nima Sarshar, Xiaolin Wu:
Joint Network-Source Coding: An Achievable Region with Diversity Routing. - (Withdrawn) Entropy, Convex Optimization, and Competitive Quantum Interactions.
- Chunxuan Ye, Prakash Narayan:
Secret Key and Private Key Constructions for Simple Multiterminal Source Models. - Chunxuan Ye, Prakash Narayan:
The Private Key Capacity Region for Three Terminals. - Gilson A. Giraldi, Antonio A. F. Oliveira, Leonardo Carvalho:
Mining Cellular Automata DataBases throug PCA Models. - Leland Smith, Muthukumar Thirunavukkarasu, Srinidhi Varadarajan, Naren Ramakrishnan:
A Model Based Approach to Reachability Routing. - Matthew J. M. Peacock, Iain B. Collings, Michael L. Honig:
Eigenvalue Distributions of Sums and Products of Large Random Matrices via Incremental Matrix Expansions. - Grigoris Antoniou, David Billington, Guido Governatori, Michael J. Maher:
Embedding Defeasible Logic into Logic Programming. - Junsheng Han, Paul H. Siegel:
Improved Upper Bounds on Stopping Redundancy. - Ratko V. Tomic:
Quantized Indexing: Beyond Arithmetic Coding. - Vladimir Vovk:
On-line regression competitive with reproducing kernel Hilbert spaces. - Ke Liu, Nael B. Abu-Ghazaleh:
Virtual Coordinate Backtracking for Void Traversal in Geographic Routing. - Jonghoon Ryu, Oscar Y. Takeshita:
On Quadratic Inverses for Quadratic Permutation Polynomials over Integer Rings. - Moritz Hammer, Alexander Knapp, Stephan Merz:
Truly On-The-Fly LTL Model Checking. - Gerd Bumiller, Liping Lu, Yeqiong Song:
Analytic performance comparison of routing protocols in master-slave PLC networks. - Michele Finelli:
Pathwords: a user-friendly schema for common passwords management. - Alexander V. Evako:
The consistency principle for a digitization procedure. An algorithm for building normal digital spaces of continuous n-dimensional objects. - Matthew R. McKay
, Alex J. Grant, Iain B. Collings:
Performance Analysis of MIMO-MRC in Double-Correlated Rayleigh Environments. - Jean-Guillaume Dumas
, Anna Urbanska:
An introspective algorithm for the integer determinant. - Dongqing He, Peisun Ma:
Effects of Initial Stance of Quadruped Trotting on Walking Stability. - Steffen Heinrich, Holger Dürr, T. Hanel, Jörg Lässig:
An Agent-based Manufacturing Management System for Production and Logistics within Cross-Company Regional and National Production Networks. - Ramdane Hedjar, Patrick Boucher:
Nonlinear Receding-Horizon Control of Rigid Link Robot Manipulators. - Arindam Mitra:
With minimum energy cost nothing can be transmitted faster than information. - Francesco Capasso:
A polynomial-time heuristic for Circuit-SAT. - Venkatesan Guruswami, Atri Rudra:
Explicit Codes Achieving List Decoding Capacity: Error-correction with Optimal Redundancy. - Eric Mjolsness:
Stochastic Process Semantics for Dynamical Grammar Syntax: An Overview. - David Doty:
Every Sequence is Decompressible from a Random One. - Michael Terribilini, Jae-Hyung Lee, Changhui Yan, Robert L. Jernigan, Susan Carpenter, Vasant G. Honavar, Drena Dobbs:
Identifying Interaction Sites in "Recalcitrant" Proteins: Predicted Protein and Rna Binding Sites in Rev Proteins of Hiv-1 and Eiav Agree with Experimental Data. - Blaise Potard, Yves Laprie:
Using phonetic constraints in acoustic-to-articulatory inversion. - Frank McCown, Sheffan Chan, Michael L. Nelson, Johan Bollen:
The Availability and Persistence of Web References in D-Lib Magazine. - Ambedkar Dukkipati, M. Narasimha Murty, Shalabh Bhatnagar:
Uniqueness of Nonextensive entropy under Renyi's Recipe. - Jean-Baptiste Maj, Anne Bonneau, Dominique Fohr, Yves Laprie:
An elitist approach for extracting automatically well-realized speech sounds with high confidence. - Alexandre O. Stauffer, Valmir Carneiro Barbosa:
A dissemination strategy for immunizing scale-free networks. - Shashi Borade, Lizhong Zheng:
Writing on Fading Paper and Causal Transmitter CSI. - Paola Bonizzoni, Gianluca Della Vedova, Riccardo Dondi:
Approximating Clustering of Fingerprint Vectors with Missing Values. - Olivier Powell, Aubin Jarry, Pierre Leone, José D. P. Rolim:
Gradient Based Routing in Wireless Sensor Networks: a Mixed Strategy. - Manor Mendel, Assaf Naor:
Ramsey partitions and proximity data structures. - R. A. Cohen:
Proving that P is not equal to NP and that P is not equal to the intersection of NP and co-NP. - Xin Wang, Georgios B. Giannakis:
Energy-Efficient Resource Allocation in Time Division Multiple-Access over Fading Channels. - Marco Zaffalon, Marcus Hutter:
Robust Inference of Trees. - Barak A. Pearlmutter
:
Bounds on Query Convergence. - Michael Vielhaber:
Continued Fraction Expansion as Isometry: The Law of the Iterated Logarithm for Linear, Jump, and 2--Adic Complexity. - Petra Hofstedt, Peter Pepper:
Integration of Declarative and Constraint Programming. - Carlos Kavka, Patricia Roggero, Marc Schoenauer:
Evolution of Voronoi based Fuzzy Recurrent Controllers. - Roberto M. Amadio:
The SL synchronous language, revisited. - Yann Semet, Sylvain Gelly, Marc Schoenauer, Michèle Sebag:
Artificial Agents and Speculative Bubbles. - Ignatios Souvatzis:
A Machine-Independent port of the MPD language run time system to NetBSD. - Ashish Khisti, Uri Erez, Amos Lapidoth, Gregory W. Wornell:
Carbon Copying Onto Dirty Paper. - Wei Kang, Sennur Ulukus:
A Single-letter Upper Bound for the Sum Rate of Multiple Access Channels with Correlated Sources. - Christopher Hardin:
Modularizing the Elimination of r=0 in Kleene Algebra. - Kenton K. Yee:
Information and Stock Prices: A Simple Introduction. - Na Li, Wen-Feng Qi:
Symmetric Boolean Function with Maximum Algebraic Immunity on Odd Number of Variables. - Vishwambhar Rathi, Rüdiger L. Urbanke:
Density Evolution, Thresholds and the Stability Condition for Non-binary LDPC Codes. - Shi Zhou, Guo-Qiang Zhang, Guoqing Zhang:
Chinese Internet AS-level Topology. - Jeremie Leguay, Timur Friedman, Vania Conan:
Evaluating Mobility Pattern Space Routing for DTNs. - Aaron B. Wagner, Venkat Anantharam:
An Infeasibility Result for the Multiterminal Source-Coding Problem. - Hossein Kakavand:
Channel Model and Upper Bound on the Information Capacity of the Fiber Optical Communication Channel Based on the Effects of XPM Induced Nonlinearity. - Erik M. Boczko, Todd R. Young:
The Signed Distance Function: A New Tool for Binary Classification. - Sergiu Theodor Chelcea, Alzennyr Da Silva, Yves Lechevallier, Doru Tanasa, Brigitte Trousse
:
Benefits of InterSite Pre-Processing and Clustering Methods in E-Commerce Domain. - J. G. Esteve, Fernando Falceto:
Phase transition in the assignment problem for random matrices. - A. Benabdallah, Günter Radons:
Parameter Estimation of Hidden Diffusion Processes: Particle Filter vs. Modified Baum-Welch Algorithm. - Alfredo Braunstein, Riccardo Zecchina:
Learning by message-passing in networks of discrete synapses. - Rami Kanhouche:
Combinatorial Approach to Object Analysis. - Carlos Gershenson, Stuart A. Kauffman, Ilya Shmulevich:
The Role of Redundancy in the Robustness of Random Boolean Networks. - J. R. Sánchez, Ricardo López-Ruiz:
Self-synchronization of Cellular Automata: an attempt to control patterns. - May Lim, Dan Braha, Sanith Wijesinghe, Stephenson Tucker, Yaneer Bar-Yam:
Connectivity and Cost Trade-offs in Multihop Wireless Networks. - Sergi Valverde, Ricard V. Solé:
Logarithmic growth dynamics in software networks. - Andrea Baronchelli, Luca Dall'Asta, Alain Barrat, Vittorio Loreto:
Strategies for fast convergence in semiotic dynamics. - David R. B. Stockwell, James Beach, Aimee Stewart, Gregory Vorontsov, David Vieglais, Ricardo Scachetti Pereira:
The use of the GARP genetic algorithm and internet grid computing in the Lifemapper world atlas of species biodiversity. - David R. B. Stockwell:
Improving ecological niche models by data mining large environmental datasets for surrogate models. - Dmitry Gavinsky, Julia Kempe, Oded Regev, Ronald de Wolf:
Bounded-Error Quantum State Identification and Exponential Separations in Communication Complexity. - G. David Forney Jr., Markus Grassl, Saikat Guha:
Convolutional and tail-biting quantum error-correcting codes. - François Le Gall:
Quantum Weakly Nondeterministic Communication Complexity. - Wolfgang Mauerer:
Semantics and simulation of communication in quantum programming. - Tal Mor:
On Classical Teleportation and Classical Nonlocality. - Eli Biham, Michel Boyer, P. Oscar Boykin, Tal Mor, Vwani P. Roychowdhury:
A Proof of the Security of Quantum Key Distribution. - Andris Ambainis, Robert Spalek, Ronald de Wolf:
A New Quantum Lower Bound Method, with Applications to Direct Product Theorems and Time-Space Tradeoffs. - Dan Kenigsberg, Tal Mor, Gil Ratsaby:
Quantum Advantage without Entanglement. - Sonny Ben-Shimon, Michael Krivelevich:
Random regular graphs of non-constant degree: Concentration of the chromatic number.

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.