default search action
CoRR, May 2014
- Moritz Kassner, William Patera, Andreas Bulling:
Pupil: An Open Source Platform for Pervasive Eye Tracking and Mobile Gaze-based Interaction. - Namyoon Lee, Robert W. Heath Jr.:
Space-Time Physical-Layer Network Coding. - Namyoon Lee, Ravi Tandon, Robert W. Heath Jr.:
Distributed Space-Time Interference Alignment. - Matthijs Vákár:
Syntax and Semantics of Linear Dependent Types. - Aaron Hunter:
Belief Revision and Trust. - T. El-Shishtawy:
A Mobile Management System for Reforming Subsidies Distribution in Developing Countries. - Zubair Nabi, Atif Alvi:
Clome: The Practical Implications of a Cloud-based Smart Home. - Paul F. Tupper:
Exemplar Dynamics Models of the Stability of Phonological Categories. - Giuseppe De Giacomo, Riccardo De Masellis, Marco Grasso, Fabrizio Maria Maggi, Marco Montali:
LTLf and LDLf Monitoring: A Technical Report. - Arseny M. Shur, Abuzer Yakaryilmaz:
Quantum, Stochastic, and Pseudo Stochastic Languages with Few States. - Haoyu Song, Jun Gong, Hongfei Chen, Justin Dustzadeh:
Unified POF Programming for Diversified SDN Data Plane. - Bertrand Wechsler, Dan Eilat, Nicolas Limal:
Information Flow Decomposition in Feedback Systems: Linear Time-Invariant Systems with Gaussian Channels. - Mahmoud Khademi, Louis-Philippe Morency:
Relative Facial Action Unit Detection. - Hoda Daou, Fabrice Labeau:
Medically Relevant Criteria used in EEG Compression for Improved Post-Compression Seizure Detection. - Hovhannes Tananyan:
Domination games played on line graphs of complete multipartite graphs. - C. Venkatesh, D. Nagaraju, T. Sunil Kumar Reddy:
Binary Protector: Intrusion Detection in Multitier Web Applications. - Antonios Michaloliakos, Ryan Rogalin, Yonglong Zhang, Konstantinos Psounis, Giuseppe Caire:
Performance Modeling of Next-Generation Wireless Networks. - Rajesh Hemant Chitnis, Graham Cormode, Mohammad Taghi Hajiaghayi, Morteza Monemizadeh:
Parameterized Streaming Algorithms for Vertex Cover. - Ms. Rajni, Ms. Reena:
Review of MANETS Using Distributed Public-key Cryptography. - Manju Kaushik, Rashmi Jain:
Natural User Interfaces: Trend in Virtual Interaction. - Christian A. Naesseth, Fredrik Lindsten, Thomas B. Schön:
Capacity estimation of two-dimensional channels using Sequential Monte Carlo. - Noémi Gaskó, Rodica Ioana Lung, D. Dumitrescu:
Computing Strong Nash Equilibria for Multiplayer Games. - Vaibhav Jha, Mohit Jha, G. K. Sharma:
Estimation of Optimized Energy and Latency Constraints for Task Allocation in 3d Network on Chip. - Phil Maguire, Philippe Moser, Rebecca Maguire, Virgil Griffith:
Is Consciousness Computable? Quantifying Integrated Information Using Algorithmic Information Theory. - Binbin Lin, Ji Yang, Xiaofei He, Jieping Ye:
Geodesic Distance Function Learning via Heat Flow on Vector Fields. - Kais Dukes:
Contextual Semantic Parsing using Crowdsourced Spatial Descriptions. - Ryutaroh Matsumoto:
Coding Theoretic Construction of Quantum Ramp Secret Sharing. - Anthony Bonato, David F. Gleich, Myunghwan Kim, Dieter Mitsche, Pawel Pralat, Amanda Tian, Stephen J. Young:
Dimensionality of social networks using motifs and eigenvalues. - Pierre de Buyl, Nelle Varoquaux:
Proceedings of the 6th European Conference on Python in Science (EuroSciPy 2013). - Matthieu Barjon, Arnaud Casteigts, Serge Chaumette, Colette Johnen, Yessin M. Neggaz:
Un algorithme de test pour la connexité temporelle des graphes dynamiques de faible densité. - Karim M. Mohamed, Mohamed A. Ismail, Nagia M. Ghanem:
VSCAN: An Enhanced Video Summarization using Density-based Spatial Clustering. - Amihood Amir, Timothy M. Chan, Moshe Lewenstein, Noa Lewenstein:
On Hardness of Jumbled Indexing. - Klesti Hoxha, Alda Kika, Eriglen Gani, Silvana Greca:
Towards a Modular Recommender System for Research Papers written in Albanian. - Navya Chodisetti:
Analysis of Digital Knapsack Based Sealed Bid Auction. - Alireza Vahid, Mohammad Ali Maddah-Ali, Amir Salman Avestimehr:
Binary Fading Interference Channel with No CSIT. - Florian Kerschbaum, Martin Beck, Dagmar Schönfeld:
Inference Control for Privacy-Preserving Genome Matching. - Sreejith T. Veetil, Kiran Kuchi, Radha Krishna Ganti:
Performance of PZF and MMSE Receivers in Cellular Networks with Multi-User Spatial Multiplexing. - Greg Castañón, Mohamed A. Elgharib, Venkatesh Saligrama, Pierre-Marc Jodoin:
Retrieval in Long Surveillance Videos using User Described Motion and Object Attributes. - Joe-Mei Feng, Felix Krahmer:
An RIP-based approach to $ΣΔ$ quantization for compressed sensing. - Federica Panella:
Approximate Query Answering in Inconsistent Databases. - James Whitacre, Sven Schellenberg, Antony Iorio:
Coal Blending: Business Value, Analysis, and Optimization. - Cláudia Nalon, João Marcos, Clare Dixon:
Clausal Resolution for Modal Logics of Confluence. - Alireza Goudarzi, Matthew R. Lakin, Darko Stefanovic:
Reservoir Computing Approach to Robust Computation using Unreliable Nanoscale Networks. - Tsung-Yi Lin, Michael Maire, Serge J. Belongie, Lubomir D. Bourdev, Ross B. Girshick, James Hays, Pietro Perona, Deva Ramanan, Piotr Dollár, C. Lawrence Zitnick:
Microsoft COCO: Common Objects in Context. - Anirban Bhattacharyya, Andrey Mokhov, Ken Pierce, Manuel Mazzara:
On Formalisms for Dynamic Reconfiguration of Dependable Systems. - Danko Adrovic, Jan Verschelde:
Computing all Affine Solution Sets of Binomial Systems. - Leonardo Aniello, Andrea Bondavalli, Andrea Ceccarelli, Claudio Ciccotelli, Marcello Cinque, Flavio Frattini, Antonella Guzzo, Antonio Pecchia, Andrea Pugliese, Leonardo Querzoni, Stefano Russo:
Big Data in Critical Infrastructures Security Monitoring: Challenges and Opportunities. - Giuseppe Cicotti, Luigi Coppolino, Salvatore D'Antonio, Luigi Romano:
Big Data Analytics for QoS Prediction Through Probabilistic Model Checking. - Yixin Cao, Luciano N. Grippo, Martín Darío Safe:
Forbidden Induced Subgraphs of Normal Helly Circular-Arc Graphs: Characterization and Detection. - Uzay Çetin, Haluk O. Bingol:
Iterated Prisoners Dilemma with limited attention. - Jody Sankey, Matthew K. Wright:
Dovetail: Stronger Anonymity in Next-Generation Internet Routing. - Umang Vipul:
Map-Reduce Parallelization of Motif Discovery. - Noémi Gaskó, Mihai Suciu, Rodica Ioana Lung, D. Dumitrescu:
Characterization and Detection of epsilon-Berge Zhukovskii Equilibria. - Meik Dörpinghaus, Günther Koliander, Giuseppe Durisi, Erwin Riegler, Heinrich Meyr:
Oversampling Increases the Pre-Log of Noncoherent Fading Channels. - Michael Huth, Jim Huan-Pu Kuo, Nir Piterman:
Fatal Attractors in Parity Games: Building Blocks for Partial Solvers. - Mansoor Ebrahim, Shujaat Khan, UmerBin Khalid:
Symmetric Algorithm Survey: A Comparative Analysis. - Mansoor Ebrahim, Shujaat Khan, Syed Sheraz Ul Hasan Mohani:
Peer-to-Peer Network Simulators: an Analytical Review. - Sylwia Polberg:
Extension-based Semantics of Abstract Dialectical Frameworks. - Fábio M. Bayer, Renato J. Cintra, Arjuna Madanayake, Uma Sadhvi Potluri:
Multiplierless Approximate 4-point DCT VLSI Architectures for Transform Block Coding. - Thomas Janson, Christian Schindelhauer:
Ad-Hoc Network Unicast in Time O(log log n) using Beamforming. - Sachin Lakra, T. V. Prasad, G. Ramakrishna:
Representation of a Sentence using a Polar Fuzzy Neutrosophic Semantic Net. - Rodica Bozianu, Catalin Dima, Emmanuel Filiot:
Safraless Synthesis for Epistemic Temporal Specifications. - Shao-Meng Qin, Hai-Jun Zhou:
Solving the undirected feedback vertex set problem by local search. - Fabrizio Grandoni, Tomasz Kociumaka, Michal Wlodarczyk:
An LP-Rounding $2\sqrt{2}$ Approximation for Restricted Maximum Acyclic Subgraph. - Ambedkar Dukkipati, Nithish Pai, Maria Francis, Abhishek Dubey:
Macaulay-Buchberger Basis Theorem for Residue Class Rings with Torsion and Border Bases over Rings. - Mehryar Mohri, Michael D. Riley:
On the Disambiguation of Weighted Automata. - Mathias Niepert, Pedro M. Domingos:
Exchangeable Variable Models. - Ines Marusic, James Worrell:
Complexity of Equivalence and Learning for Multiplicity Tree Automata. - Sina Lashgari, Amir Salman Avestimehr:
Blind Wiretap Channel with Delayed CSIT. - Aviad Rubinstein:
Computational Complexity of Approximate Nash Equilibrium in Large Games. - Moya Chen, Doris Xin, Damien Woods:
Parallel computation using active self-assembly. - Nicolas T. Courtois:
On The Longest Chain Rule and Programmed Self-Destruction of Crypto Currencies. - Radoslaw Michalski, Tomasz Kajdanowicz, Piotr Bródka, Przemyslaw Kazienko:
Seed Selection for Spread of Influence in Social Networks: Temporal vs. Static Approach. - Edward Hermann Haeusler:
How many times do we need and assumption ? - Sergei Gepshtein, Ivan Tyukin:
Optimal measurement of visual motion across spatial and temporal scales. - Antti Puurula, Jesse Read, Albert Bifet:
Kaggle LSHTC4 Winning Solution. - Omar S. Soliman, Eman AboElHamd:
Classification of Diabetes Mellitus using Modified Particle Swarm Optimization and Least Squares Support Vector Machine. - Jun Pang, Yang Liu:
Proceedings Third International Workshop on Engineering Safety and Security Systems, ESSS 2014, Singapore, Singapore, 13 May 2014. EPTCS 150, 2014 [contents] - Vladimir V. Rybakov:
A Note on Parameterised Knowledge Operations in Temporal Logic. - Vidit Sharma, Ashish Garg:
Numerical Investigation of Effects of Compound Angle and Length to Diameter Ratio on Adiabatic Film Cooling Effectiveness. - Ryoma Sin'ya, Kiminori Matsuzaki, Masataka Sassa:
Simultaneous Finite Automata: An Efficient Data-Parallel Model for Regular Expression Matching. - Lucas Antiqueira, Liang Zhao:
Spatial Neural Networks and their Functional Samples: Similarities and Differences. - Prabhjot Kaur:
Web Content Classification: A Survey. - (Withdrawn) On Lipschitz Continuity and Smoothness of Loss Functions in Learning to Rank.
- Sougata Chaudhuri, Ambuj Tewari:
Perceptron-like Algorithms and Generalization Bounds for Learning to Rank. - (Withdrawn) On the Construction of Maximum-Quality Aggregation Trees in Deadline-Constrained WSNs.
- Xuehan Xiong, Fernando De la Torre:
Supervised Descent Method for Solving Nonlinear Least Squares Problems in Computer Vision. - Aibek Makazhanov, Denilson Barbosa, Grzegorz Kondrak:
Extracting Family Relationship Networks from Novels. - James Brofos, Ajay Kannan, Rui Shu:
Automated Attribution and Intertextual Analysis. - Bin Li, Ruogu Li, Atilla Eryilmaz:
Throughput-Optimal Scheduling Design with Regular Service Guarantees in Wireless Networks. - Parosh Aziz Abdulla, Mohamed Faouzi Atig, Piotr Hofman, Richard Mayr, K. Narayan Kumar, Patrick Totzke:
Infinite-State Energy Games. - Vimalkumar Jeyakumar, Abdul Kabbani, Jeffrey C. Mogul, Amin Vahdat:
Flexible Network Bandwidth and Latency Provisioning in the Datacenter. - Mario Mastriani:
Rule of Three for Superresolution of Still Images with Applications to Compression and Denoising. - Michael F. Nowlan, Jose M. Faleiro, Bryan Ford:
Crux: Locality-Preserving Distributed Systems. - Xiaojun Wan:
x-index: a fantastic new indicator for quantifying a scientist's scientific impact. - Djamal Ziani:
Feature Selection On Boolean Symbolic Objects. - Djamal Ziani:
Configuration in ERP SaaS Multi-Tenancy. - Jin He, Mianxiong Dong, Kaoru Ota, Minyu Fan, Guangwei Wang:
NetSecCC: A Scalable and Fault-tolerant Architecture without Outsourcing Cloud Network Security. - Rajet Krishnan, Mohammad Reza Khanzadi, N. Krishnan, Alexandre Graell i Amat, Thomas Eriksson, Nicolò Mazzali, Giulio Colavolpe:
On the Impact of Oscillator Phase Noise on the Uplink Performance in a Massive MIMO-OFDM System. - Mohammadreza Malek-Mohammadi, Magnus Jansson, Arash Owrang, Ali Koochakzadeh, Massoud Babaie-Zadeh:
DOA Estimation in Partially Correlated Noise Using Low-Rank/Sparse Matrix Decomposition. - Manaal Faruqui:
"Translation can't change a name": Using Multilingual Data for Named Entity Recognition. - Bo Cheng, Ling Cheng:
Single machine slack due-window assignment and scheduling of linear time-dependent deteriorating jobs and a deteriorating maintenance activity. - Kangqi Liu, Meixia Tao:
Generalized Signal Alignment: On the Achievable DoF for Multi-User MIMO Two-Way Relay Channels. - Matthias Nickles, Alessandra Mileo:
Probabilistic Inductive Logic Programming Based on Answer Set Programming. - Hua Sun, Sundar R. Krishnamurthy, Syed Ali Jafar:
Rank Matching for Multihop Multiflow. - Euiwoong Lee:
Hardness of Graph Pricing through Generalized Max-Dicut. - Seyed M. Mirtaheri, Mustafa Emre Dinçtürk, Salman Hooshmand, Gregor von Bochmann, Guy-Vincent Jourdan, Iosif-Viorel Onut:
A Brief History of Web Crawlers. - Paul Accisano, Alper Üngör:
Finding a Curve in a Point Set. - Yonghong Yu, Can Wang, Yang Gao:
Attributes Coupling based Item Enhanced Matrix Factorization Technique for Recommender Systems. - Peng He, Bing Li, Deguang Zhang, Yutao Ma:
Simplification of Training Data for Cross-Project Defect Prediction. - Jingbo Liu, Emmanuel Abbe:
Polynomial complexity of polar codes for non-binary alphabets, key agreement and Slepian-Wolf coding. - John C. Duchi, Michael I. Jordan, Martin J. Wainwright, Yuchen Zhang:
Information-theoretic lower bounds for distributed statistical estimation with communication constraints. - Vishal Anand, Ramani S:
Fault Localization in a Software Project using Back-Tracking Principles of Matrix Dependency. - Tarushi Sharma, AmanPreet Kaur:
Analysis of Email Fraud detection using WEKA Tool. - Martin Skutella:
A note on the ring loading problem. - Hasan Abasi, Nader H. Bshouty, Hanna Mazzawi:
On Exact Learning Monotone DNF from Membership Queries. - Valmi Dufour-Lussier, Alice Hermann, Florence Le Ber, Jean Lieber:
Belief revision in the propositional closure of a qualitative algebra (extended version). - Hannes Strass:
On the Relative Expressiveness of Argumentation Frameworks, Normal Logic Programs and Abstract Dialectical Frameworks. - Xianrui Li, D. B. Pei, Q. Liu, Rui Shen:
Design of a capacitor-less low-dropout voltage regulator. - Jianmin Ji, Hannes Strass:
Implementing Default and Autoepistemic Logics via the Logic of GK. - P. Sakthivel, P. Krishna Sankar:
Multi-Path Routing and Wavelength Assignment (RWA) Algorithm for WDM Based Optical Networks. - Sascha Kurz:
Ready for the design of voting rules? - Serguei Kaniovski, Sascha Kurz:
The average representation - a cornucopia of power indices? - Alexander Zimin, Rasmus Ibsen-Jensen, Krishnendu Chatterjee:
Generalized Risk-Aversion in Stochastic Multi-Armed Bandits. - Krishnendu Chatterjee, Martin Chmelik, Przemyslaw Daca:
CEGAR for Qualitative Analysis of Probabilistic Systems. - Marcin Wrochna:
Reconfiguration in bounded bandwidth and treedepth. - Sergey Goncharov, Lutz Schröder, Christoph Rauch:
(Co-)Algebraic Foundations for Effect Handling and Iteration. - Florian Kammueller:
Confinement for Active Objects. - Zhana Bao:
Finding Inner Outliers in High Dimensional Space. - Zhana Bao:
Robust Subspace Outlier Detection in High Dimensional Space. - Marco Maratea, Luca Pulina, Francesco Ricca:
The Multi-engine ASP Solver ME-ASP: Progress Report. - Simon Kramer:
A Galois-Connection between Cattell's and Szondi's Personality Profiles. - Grzegorz Orynczak, Marcin Jakubek, Karol Wawrzyniak, Michal Klos:
Market Coupling as the Universal Algorithm to Assess Zonal Divisions. - Yanina Shkel, Vincent Y. F. Tan, Stark C. Draper:
Unequal Message Protection: Asymptotic and Non-Asymptotic Tradeoffs. - John S. H. Baxter, Martin Rajchl, Jing Yuan, Terry M. Peters:
A Continuous Max-Flow Approach to Multi-Labeling Problems under Arbitrary Region Regularization. - Xu Chen, Dongning Guo:
Many-Access Channels: The Gaussian Case with Random User Activities. - Talha Cihad Gülcü, Alexander Barg:
Interactive Function Computation via Polar Coding. - Matthias Henze, Rafel Jaume:
Bottleneck Partial-Matching Voronoi Diagrams. - Michelle Krüger Silvéria:
Virtual Windshields: Merging Reality and Digital Content to Improve the Driving Experience. - Hayder Raheem Hashim:
The Discrete Logarithm problem in the ElGamal cryptosystem over the abelian group U(n) Where n= p^m, or 2p^m. - Riccardo Zese:
Reasoning with Probabilistic Logics. - Chandranath Adak:
Gabor Filter and Rough Clustering Based Edge Detection. - Fabio L. Traversa, Massimiliano Di Ventra:
Universal Memcomputing Machines. - Mario Mastriani:
Lossless compression catalyst based on binary allocation via modular arithmetic. - Mohit Jha, Shailja Shukla:
Design Of Fuzzy Logic Traffic Controller For Isolated Intersections With Emergency Vehicle Priority System Using MATLAB Simulation. - Elena Cabrio, Serena Villata:
Towards a Benchmark of Natural Language Arguments. - Joseph Cheriyan, Zhihan Gao, Konstantinos Georgiou, Sahil Singla:
On Integrality Ratios for Asymmetric TSP in the Sherali-Adams Hierarchy. - Tomás Kociský, Karl Moritz Hermann, Phil Blunsom:
Learning Bilingual Word Representations by Marginalizing Alignments. - Ulrike Barthelmess, Ulrich Furbach:
Do we need Asimov's Laws? - (Withdrawn) Verifiable Privacy-Preserving Member and Order Queries on a List.
- Tsung-Yi Chen, Xu Chen, Dongning Guo:
Many-Broadcast Channels: Definition and Capacity in the Degraded Case. - Shiqi Zhang, Mohan Sridharan, Michael Gelfond, Jeremy L. Wyatt:
KR$^3$: An Architecture for Knowledge Representation and Reasoning in Robotics. - Glencora Borradaile, Theresa Migler, Gordon T. Wilfong:
Density decompositions of networks. - Mohammad Rastegari, Shobeir Fakhraei, Jonghyun Choi, David W. Jacobs, Larry S. Davis:
Comparing apples to apples in the evaluation of binary coding methods. - Mate Boban:
Realistic and Efficient Channel Modeling for Vehicular Networks. - V. C. K. P. Arul Oli, Elayaraja Ponram:
Wireless Fidelity Real Time Security System. - Siddhartha Mukherjee:
Study on performance improvement of oil paint image filter algorithm using parallel pattern library. - Zhana Bao:
K-NS: Section-Based Outlier Detection in High Dimensional Space. - Elisa Gorla, Maike Massierer:
Index Calculus in the Trace Zero Variety. - Hien Quoc Ngo, Himal A. Suraweera, Michail Matthaiou, Erik G. Larsson:
Multipair Full-Duplex Relaying with Massive Arrays and Linear Processing. - Jean-François Baget, Fabien Garreau, Marie-Laure Mugnier, Swan Rocher:
Revisiting Chase Termination for Existential Rules and their Extension to Nonmonotonic Negation. - Narada Wickramage:
Rapture in the Cartesian Wall between Real World Entities and their Abstract Models. - David T. H. Kao, Amir Salman Avestimehr:
Linear Degrees of Freedom of the MIMO X-Channel with Delayed CSIT. - Joel A. Tropp:
Convex recovery of a structured signal from independent random linear measurements. - Szabolcs Iván:
On state complexity of unions of binary factor-free languages. - Étienne André, Mohamed Mahdi Benmoussa, Christine Choppy:
Translating UML State Machines to Coloured Petri Nets Using Acceleo: A Report. 1-7 - Julien Brunel, Laurent Rioux, Stéphane Paul, Anthony Faucogney, Frédérique Vallée:
Formal Safety and Security Assessment of an Avionic Architecture with Alloy. 8-19 - Cornelius Diekmann, Lars Hupel, Georg Carle:
Directed Security Policies: A Stateful Network Implementation. 20-34 - Gurvan Le Guernic:
In my Wish List, an Automated Tool for Fail-Secure Design Analysis: an Alloy-Based Feasibility Draft. 50-55 - David Hauzar, Jan Kofron, Pavel Bastecký:
Data-flow Analysis of Programs with Associative Arrays. 56-70 - Alex Dytso, Daniela Tuninetti, Natasha Devroye:
On the Two-user Interference Channel with Partial Codebook Knowledge at one Receiver. - Yishi Zhang, Chao Yang, Chan Xiong, Xingchi Zhou, Zigang Zhang:
Feature selection for classification with class-separability strategy and data envelopment analysis. - Marcello Balduccini, William C. Regli, Duc N. Nguyen:
An ASP-Based Architecture for Autonomous UAVs in Dynamic Environments: Progress Report. - Wanchun Jiang, Fengyuan Ren, Xin Yue, Chuang Lin:
Scale Congestion Control to Ultra-High Speed Ethernet. - Vikram Krishnamurthy, Omid Namvar Gharehshiran, Maziyar Hamdi:
Interactive Sensing and Decision Making in Social Networks. - Ali Bou Nassif, Luiz Fernando Capretz, Danny Ho:
Analyzing the Non-Functional Requirements in the Desharnais Dataset for Software Effort Estimation. - Ioana Oriana Bercea, Navin Goyal, David G. Harris, Aravind Srinivasan:
On Computing Maximal Independent Sets of Hypergraphs in Parallel. - Alireza Vahid, Mohammad Ali Maddah-Ali, Amir Salman Avestimehr:
Approximate Capacity of the Two-User MISO Broadcast Channel with Delayed CSIT. - Farhana Bashar, S. M. Akramus Salehin, Thushara D. Abhayapala:
Analysis of Degrees of Freedom of Wideband Random Multipath Fields Observed Over Time and Space Windows. - Hatem Abou-zeid, Hossam S. Hassanein, Stefan Valentin, Mohamed Fathy Feteiha:
A Lookback Scheduling Framework for Long-Term Quality-of-Service Over Multiple Cells. - Yishun Dong, Farzan Farnia, Ayfer Özgür:
Near Optimal Energy Control and Approximate Capacity of Energy Harvesting Communication. - Hani A. Qudaih, Mohammed A. Bawazir, Shuaibu Hassan Usman, Jamaludin Ibrahim:
Persuasive Technology Contributions Toward Enhance Information Security Awareness in an Organization. - George Saad, Jared Saia:
Self-Healing Computation. - Daniel Le Berre:
Some thoughts about benchmarks for NMR. - Ulrich Furbach, Claudia Schon:
Semantically Guided Evolution of SHI ABoxes. - Petros T. Boufounos, Laurent Jacques, Felix Krahmer, Rayan Saab:
Quantization and Compressive Sensing. - Robert Mingesz, Gergely Vadai, Zoltan Gingl:
What kind of noise guarantees security for the Kirchhoff-Loop-Johnson-Noise key exchange? - Jian Yang, Jianjun Qian, Lei Luo, Fanlong Zhang, Yicheng Gao:
Nuclear Norm based Matrix Regression with Applications to Face Recognition with Occlusion and Illumination Changes. - Oscar M. Danielsson, Omid Aghazadeh:
Human Pose Estimation from RGB Input Using Synthetic Training Data. - Francisco Claude, Gonzalo Navarro, Alberto Ordóñez Pereira:
Efficient Compressed Wavelet Trees over Large Alphabets. - Sergio Cabello, Otfried Cheong, Lena Schlipf:
Finding Largest Rectangles in Convex Polygons. - Shahab Tasharrofi, Eugenia Ternovska:
Three Semantics for Modular Systems. - Abhishek Awasthi, Jörg Lässig, Oliver Kramer:
A Novel Approach to the Common Due-Date Problem on Single and Parallel Machines. - Jon M. Kleinberg, Sigal Oren:
Time-Inconsistent Planning: A Computational Problem in Behavioral Economics. - Mario Alviano, Wolfgang Faber:
Semantics and Compilation of Answer Set Programming with Generalized Atoms. - Everardo Bárcenas, Jesús Lavalle:
Global Numerical Constraints on Trees. - Michael X. Zhou:
Classic Lagrangian may not be applicable to the traveling salesman problem. - Giorgos Kouropoulos:
Calculation software for efficiency and penetration of a fibrous filter medium based on the mathematical models of air filtration. - Brijender Kahanwal:
Comparative Study of the Function Overloading and Function Overriding Using C++. - Akhlaqur Rahman, Sumaira Tasnim:
Application of Machine Learning Techniques in Aquaculture. - Igor Bilogrevic, Julien Freudiger, Emiliano De Cristofaro, Ersin Uzun:
What's the Gist? Privacy-Preserving Aggregation of User Profiles. - Rachel A. Ward:
A unified framework for linear dimensionality reduction in l1. - Wilhelmiina Hämäläinen:
General upper bounds for well-behaving goodness measures on dependency rules. - Olena Orobinska:
Automatic Method Of Domain Ontology Construction based on Characteristics of Corpora POS-Analysis. - Stefan Fafianie, Stefan Kratsch:
Streaming Kernelization. - Michael Kai Petersen:
When push comes to shove verbs literally shake due to latent semantic parameters of size and intensity. - Wilhelmiina Hämäläinen:
Assessing the statistical significance of association rules. - Namyoon Lee, David Morales-Jiménez, Angel E. Lozano, Robert W. Heath Jr.:
Spectral Efficiency of Dynamic Coordinated Beamforming: A Stochastic Geometry Approach. - Naman Agarwal, Guy Kindler, Alexandra Kolla, Luca Trevisan:
Unique Games on the Hypercube. - Ramin Pichevar, Jason Wung, Daniele Giacobello, Joshua Atkins:
Design and Optimization of a Speech Recognition Front-End for Distant-Talking Control of a Music Playback Device. - Calvin Newport:
Consensus with an Abstract MAC Layer. - Xiaozhe Wang, Hsiao-Dong Chiang:
Quasi Steady-State Model for Power System Stability: Limitations, Analysis and a Remedy. - Shamanth Kumar, Huan Liu, Sameep Mehta, L. Venkata Subramaniam:
From Tweets to Events: Exploring a Scalable Solution for Twitter Streams. - Shamim Ripon, Aoyan Barua, Mohammad Salah Uddin:
Analysis Tool for UNL-Based Knowledge Representation. - Thomas Bourgeat, Julien Bringer, Hervé Chabanne, Robin Champenois, Jérémie Clément, Houda Ferradi, Marc Heinrich, Paul Melotti, David Naccache, Antoine Voizard:
New Algorithmic Approaches to Point Constellation Recognition. - Rui Song, Hyunsuk Ko, C.-C. Jay Kuo:
MCL-3D: a database for stereoscopic image quality assessment using 2D-image-plus-depth source. - Omar S. Soliman, Aliaa Rassem:
A Network Intrusions Detection System based on a Quantum Bio Inspired Algorithm. - Sallam Abualhaija, Karl-Heinz Zimmermann:
D-Bees: A Novel Method Inspired by Bee Colony Optimization for Solving Word Sense Disambiguation. - Justin Cheng, Cristian Danescu-Niculescu-Mizil, Jure Leskovec:
How Community Feedback Shapes User Behavior. - Siamak Ravanbakhsh, Russell Greiner, Brendan J. Frey:
Training Restricted Boltzmann Machine by Perturbation. - Chenhao Tan, Lillian Lee, Bo Pang:
The effect of wording on message propagation: Topic- and author-controlled natural experiments on Twitter. - Chenhao Tan, Lillian Lee:
A Corpus of Sentence-level Revisions in Academic Writing: A Step towards Understanding Statement Strength in Communication. - Yimin Yang, Q. M. Jonathan Wu, Guangbin Huang, Yaonan Wang:
Pulling back error to the hidden-node parameter technology: Single-hidden-layer feedforward network without output weight. - Flavio V. D. de Figueiredo, Jussara M. Almeida, Yasuko Matsubara, Bruno Ribeiro, Christos Faloutsos:
Revisit Behavior in Social Media: The Phoenix-R Model and Discoveries. - Daniel Cullina, Negar Kiyavash:
Generalized sphere-packing and sphere-covering bounds on the size of codes for combinatorial channels. - Flávio du Pin Calmon, Mayank Varia, Muriel Médard:
An Exploration of the Role of Principal Inertia Components in Information Theory. - Charalampos E. Tsourakakis:
A Novel Approach to Finding Near-Cliques: The Triangle-Densest Subgraph Problem. - Danai Koutra, Paul N. Bennett, Eric Horvitz:
Events and Controversies: Influences of a Shocking News Event on Information Seeking. - Abdul Quamar, Amol Deshpande, Jimmy Lin:
NScale: Neighborhood-centric Large-Scale Graph Analytics in the Cloud. - Esa Ollila, Hyon-Jung Kim, Visa Koivunen:
Robust iterative hard thresholding for compressed sensing. - Corinna Cortes, Mehryar Mohri, Andres Muñoz Medina:
Adaptation Algorithm and Theory Based on Generalized Discrepancy. - Manju Kaushik:
System Software: Concepts and Approach. - Sascha Kurz, Nicola Maaser, Stefan Napel, Matthias Weber:
Mostly Sunny: A Forecast of Tomorrow's Power Index Research. - Neha Gupta, Ponnurangam Kumaraguru:
Exploration of gaps in Bitly's spam detection and relevant counter measures. - Maria Spichkova:
Stream processing components: Isabelle/HOL formalisation and case studies. - Ibrahim M. Alabdulmohsin:
A Mathematical Theory of Learning. - A. Bhuvaneswari, E. George Dharma Prakash Raj, V. Sinthu Janita Prakash:
ACO-ESSVHOA - Ant Colony Optimization based Multi-Criteria Decision Making for Efficient Signal Selection in Mobile Vertical Handoff. - Hanéne Mkaouar, Olfa Boubaker:
Compliant motion control for handling a single object by two similar industrial robots. - Holger H. Hoos, Marius Lindauer, Torsten Schaub:
claspfolio 2: Advances in Algorithm Selection for Answer Set Programming. - Bart Bogaerts, Joachim Jansen, Maurice Bruynooghe, Broes De Cat, Joost Vennekens, Marc Denecker:
Simulating dynamic systems using Linear Time Calculus theories. - Mohammad Mohammadi, Shahram Jafari:
An expert system for recommending suitable ornamental fish addition to an aquarium based on aquarium condition. - Hasan Abasi, Ali Z. Abdi, Nader H. Bshouty:
Learning Boolean Halfspaces with Small Weights from Membership Queries. - Ilya V. Otpuschennikov, Alexander A. Semenov, Stepan Kochemazov:
Transalg: a Tool for Translating Procedural Descriptions of Discrete Functions to SAT (Tool Paper). - Thomas Given-Wilson, Daniele Gorla, Barry Jay:
A Concurrent Pattern Calculus. - Sedat Görmüs, Mohammud Zubeir Bocus:
Efficient Cooperative Anycasting for AMI Mesh Networks. - Olaf Beyersdorff, Leroy Chew:
Tableau vs. Sequent Calculi for Minimal Entailment. - Jin-Li Guo, Qi Suo:
Comment on "Quantifying Long-term Scientific Impact". - Marcos Cramer, Pieter Van Hertum, Diego Agustín Ambrossio, Marc Denecker:
Modelling Delegation and Revocation Schemes in IDP. - Walid Gomaa:
Computability and Complexity over the Product Topology of Real Numbers. - Photios A. Stavrou, Christos K. Kourtellaris, Charalambos D. Charalambous:
Information Nonanticipative Rate Distortion Function and Its Applications. - Jacopo Staiano, Marco Guerini:
DepecheMood: a Lexicon for Emotion Analysis from Crowd-Annotated News. - Julie De Pril, János Flesch, Jeroen Kuipers, Gijs Schoenmakers, Koos Vrieze:
Existence of Secure Equilibrium in Multi-Player Games with Perfect Information. - Valerio Capraro, Conor Smyth, Kalliopi Mylona, Graham Niblo:
Benevolent characteristics promote cooperative behaviour among humans. - Victor Sadikov, Walter Pidkameny:
Complete Separation of the 3 Tiers - Divide and Conquer. - Zheng Wang, Cong Ling, Guillaume Hanrot:
Markov Chain Monte Carlo Algorithms for Lattice Gaussian Sampling. - Jie Fu, Rayna Dimitrova, Ufuk Topcu:
Abstractions and sensor design in partial-information, reactive controller synthesis. - Shay Kutten, Danupon Nanongkai, Gopal Pandurangan, Peter Robinson:
Distributed Symmetry Breaking in Hypergraphs. - Abuzer Yakaryilmaz, A. C. Cem Say, H. Gökalp Demirci:
Debates with small transparent quantum verifiers. - Ankit Garg, Tengyu Ma, Huy L. Nguyen:
Lower Bound for High-Dimensional Statistical Learning Problem via Direct-Sum Theorem. - Mohsen Ghaffari, Erez Kantor, Nancy A. Lynch, Calvin C. Newport:
Multi-Message Broadcast with Abstract MAC Layers and Unreliable Links. - Stefano Teso, Roberto Sebastiani, Andrea Passerini:
Structured Learning Modulo Theories. - (Withdrawn) RPCA-KFE: Key Frame Extraction for Consumer Video based Robust Principal Component Analysis.
- Chris Kimble:
What Cost Knowledge Management? The Example of Infosys. - (Withdrawn) Representative Selection for Big Data via Sparse Graph and Geodesic Grassmann Manifold Distance.
- Christoph Lenzen, Nancy A. Lynch, Calvin C. Newport, Tsvetomira Radeva:
Trade-offs between Selection Complexity and Performance when Searching the Plane without Communication. - Ling Fang, Yoriyuki Yamagata, Yutaka Oiwa:
Evaluation of A Resilience Embedded System Using Probabilistic Model-Checking. 35-49 - Raman Grover, Michael J. Carey:
Scalable Fault-Tolerant Data Feeds in AsterixDB. - Kutlu Emre Yilmaz:
Entropy Based Cartoon Texture Separation. - Tiep Le, Enrico Pontelli, Tran Cao Son, William Yeoh:
Logic and Constraint Logic Programming for Distributed Constraint Optimization. - Kutlu Emre Yilmaz, Ahmet Arslan, Özgür Yilmazel:
Turkish Text Retrieval Experiments Using Lemur Toolkit. - Bluma Gelley, Ajita John:
Like, Comment, Repin: User Interaction on Pinterest. - Massimo Franceschetti:
On Landau's eigenvalue theorem and information cut-sets. - Arka Bhattacharya:
Approximation Algorithms for the Asymmetric Traveling Salesman Problem : Describing two recent methods. - Ritesh Kolte, Ayfer Özgür, Suhas N. Diggavi:
When are dynamic relaying strategies necessary in half-duplex wireless networks? - Melika Abolhassani, MohammadHossein Bateni, MohammadTaghi Hajiaghayi, Hamid Mahini, Anshul Sawant:
Network Cournot Competition. - Hamed Haddadi, Georgios Smaragdakis, K. K. Ramakrishnan:
Opportunities in a Federated Cloud Marketplace. - Muthuraman Thangaraj, V. Gayathri:
A Retrieval Mechanism for Multi-versioned Digital Collection Using TAG. - Deepjoy Das, Sarat Saharia:
Implementation And Performance Evaluation Of Background Subtraction Algorithms. - N. V. S. N. Sarma, Mahesh Gopi:
Energy Efficient Clustering using Jumper Firefly Algorithm in Wireless Sensor Networks. - Haifa Mehdi, Olfa Boubaker:
Robust Tracking Control for Constrained Robots. - Ahmed Saeed, Azin Neishaboori, Amr Mohamed, Khaled A. Harras:
Up and Away: A Cheap UAV Cyber-Physical Testbed (Work in Progress). - Lorenz Klaus:
A Strongly Polynomial Reduction for Linear Programs over Grids. - Bart Bogaerts, Joost Vennekens, Marc Denecker, Jan Van den Bussche:
FO(C): A Knowledge Representation Language of Causality. - Meng Guo, Jana Tumova, Dimos V. Dimarogonas:
Cooperative Decentralized Multi-agent Control under Local LTL Tasks and Connectivity Constraints. - Emanuel Lacic, Dominik Kowald, Lukas Eberhard, Christoph Trattner, Denis Parra, Leandro Balby Marinho:
Utilizing Online Social Network and Location-Based Data to Recommend Items in an Online Marketplace. - Javier Esparza:
Keeping a Crowd Safe: On the Complexity of Parameterized Verification (Corrected version). - Emanuel Lacic, Dominik Kowald, Christoph Trattner:
SocRecM: A Scalable Social Recommender Engine for Online Marketplaces. - P. Cynthia Selvi, A. R. Mohammed Shanavas:
Output Privacy Protection With Pattern-Based Heuristic Algorithm. - Hisham Elshaer, Federico Boccardi, Mischa Dohler, Ralf Irmer:
Downlink and Uplink Decoupling: a Disruptive Architectural Design for 5G Networks. - Atreyee Kundu, Niranjan Balachandran, Debasish Chatterjee:
Algorithmic synthesis of stabilizing switching signals for discrete-time switched linear systems. - Marcin Andrychowicz, Stefan Dziembowski, Daniel Malinowski, Lukasz Mazurek:
Modeling Bitcoin Contracts by Timed Automata. - Bojana Koteska, Anastas Misev:
Change Management and Version Control of Scientific Applications. - Valery A. Ugrinovskii, Emilia Fridman:
A Round-Robin Type Protocol for Distributed Estimation with H∞ Consensus. - Antonia Wachter-Zeh, Tuvi Etzion:
Optimal Ferrers Diagram Rank-Metric Codes. - Kristina Ban, Ana Mestrovic, Sanda Martincic-Ipsic:
Initial Comparison of Linguistic Networks Measures for Parallel Texts. - Michael Hoffmann, Vincent Kusters, Tillmann Miltzow:
Halving Balls in Deterministic Linear Time. - Christian Schulz, Christoph von Tycowicz, Hans-Peter Seidel, Klaus Hildebrandt:
Proofs of two Theorems concerning Sparse Spacetime Constraints. - Márta Czenky:
The Efficiency Examination of Teaching of Different Normalization Methods. - Kazuki Kajiwara, Tuan Phung-Duc:
Asymptotic and Numerical Analysis of Multiserver Retrial Queue with Guard Channel for Cellular Networks. - Tebbi Hanane, Azzoune Hamid:
An Expert System for Automatic Reading of A Text Written in Standard Arabic. - Kimia Ghaffari, Mohammad Soltani Delgosha, Neda Abdolvand:
Towards Cloud Computing: A SWOT Analysis on its Adoption in SMEs. - Mohamed A. Hassan:
Hybrid Intelligent System; A Self-Adaptive Network Protection System "Using Soft Computing and Open-Source Tools". - Zhenyu Zhou, Mianxiong Dong, Kaoru Ota, Jun Wu, Takuro Sato:
Distributed Interference-Aware Energy-Efficient Resource Allocation for Device-to-Device Communications Underlaying Cellular Networks. - Antimo Barbato, Antonio Capone, Lin Chen, Fabio Martignon, Stefano Paris:
A Distributed Demand-Side Management Framework for the Smart Grid. - Ayushi Sinha, William R. Gray Roncal, Narayanan Kasthuri, Jeff W. Lichtman, Randal C. Burns, Michael M. Kazhdan:
Automatic Annotation of Axoplasmic Reticula in Pursuit of Connectomes using High-Resolution Neural EM Data. - M. Rajalakshmi, P. Subashini:
Texture Based Image Segmentation of Chili Pepper X-Ray Images Using Gabor Filter. - Prajakta P. Khairnar, C. A. Manjare:
Image Resolution and Contrast Enhancement of Satellite Geographical Images with Removal of Noise using Wavelet Transforms. - Sergio Consoli, José Andrés Moreno-Pérez, Kenneth Darby-Dowman, Nenad Mladenovic:
Mejora de la exploracion y la explotacion de las heuristicas constructivas para el MLSTP. - John Francisco, Victor Sadikov:
Structured Approach to Web Development. - Mohamed Mbida, Abdellah Ezzati:
OSCMAC Duty Cycle with Multi Helpers CT Mode WILEM Technology in Wireless Sensor Networks. - William A. Sethares, Selçuk S. Bayin:
Model-Driven Applications of Fractional Derivatives and Integrals. - Amr Abdelnasser, Ekram Hossain, Dong In Kim:
Tier-Aware Resource Allocation in OFDMA Macrocell-Small Cell Networks. - Christoph Lenzen, Boaz Patt-Shamir:
Improved Distributed Steiner Forest Construction. - Ahmed Hamdi Sakr, Ekram Hossain:
Cognitive and Energy Harvesting-Based D2D Communication in Cellular Networks: Stochastic Geometry Modeling and Analysis. - Hesham ElSawy, Ekram Hossain:
Analytical Modeling of Mode Selection and Power Control for Underlay D2D Communication in Cellular Networks. - Tobias Fehenberger, Norbert Hanik:
Mutual Information as a Figure of Merit for Optical Fiber Systems. - Rahali Bochra, Mohammed Feham, Junwu Tao:
Analysis of S Band Substrate Integrated Waveguide Power Divider, Circulator and Coupler. - Hsien-Pu Chen, Laszlo B. Kish, Claes-Goran Granqvist, Gabor Schmera:
On the "cracking" scheme in the paper "A directional coupler attack against the Kish key distribution system" by Gunn, Allison and Abbott. - Jeffrey Sukharev, Leonid Zhukov, Alexandrin Popescul:
Learning Alternative Name Spellings. - K. Sankeerth Rao, Vinod M. Prabhakaran:
A New Upperbound for the Oblivious Transfer Capacity of Discrete Memoryless Channels. - Ari Saptawijaya, Luís Moniz Pereira:
Joint Tabling of Logic Program Abductions and Updates. - Sriram Vajapeyam:
Understanding Shannon's Entropy metric for Information. - Pengfei Wan, Gene Cheung, Philip A. Chou, Dinei A. F. Florêncio, Cha Zhang, Oscar C. Au:
Precision Enhancement of 3D Surfaces from Multiple Compressed Depth Maps. - Bob J. Scurlock:
Use of ARAS 360 to Facilitate Rapid Development of Articulated Total Body Biomechanical Physics Simulations. - Jehad Al-Dallal:
How and When to Flatten Java Classes? - Chris Kimble:
Electronic Health Records: Cure-all or Chronic Condition? - Osvaldo Simeone, Elza Erkip, Shlomo Shamai:
Full-Duplex Cloud Radio Access Networks: An Information-Theoretic Viewpoint. - Anna Ma, Arjuna Flenner, Deanna Needell, Allon G. Percus:
Improving Image Clustering using Sparse Text and the Wisdom of the Crowds. - Zoltán Szabó:
Information Theoretical Estimators Toolbox. - Yanting Ma, Jin Tan, Nikhil Krishnan, Dror Baron:
Empirical Bayes and Full Bayes for Signal Estimation. - Xiaohao Cai:
Variational Image Segmentation Model Coupled with Image Restoration Achievements. - Arash Batni, Farshad Safaei:
A New Multi-Tiered Solid State Disk Using Slc/Mlc Combined Flash Memory. - Farhana Bashar, S. M. Akramus Salehin, Thushara D. Abhayapala:
Band Limited Signals Observed Over Finite Spatial and Temporal Windows: An Upper Bound to Signal Degrees of Freedom. - Elham Shadkam, Mehdi Bijari:
Evaluation The Efficiency Of Cuckoo Optimization Algorithm. - Madhumangal Pal, Anita Pal:
Scheduling algorithm to select $k$ optimal programme slots in television channels: A graph theoretic approach. - Dani Korpi, Lauri Anttila, Mikko Valkama:
Reference Receiver Aided Digital Self-Interference Cancellation in MIMO Full-Duplex Transceivers. - Dirk Lewandowski:
Evaluating the retrieval effectiveness of Web search engines using a representative query sample. - Dirk Lewandowski:
Why we need an independent index of the Web. - Nilesh Khambekar, Chad M. Spooner, Vipin Chaudhary:
Going Towards Discretized Spectrum Space: Quantification of Spectrum Consumption Spaces and a Quantified Spectrum Access Paradigm. - Stefano Rini, Shlomo Shamai:
On Capacity of the Dirty Paper Channel with Fading Dirt in the Strong Fading Regime. - Fatima Zohra Hadjam, Claudio Moraga:
Introduction to RIMEP2: A Multi-Expression Programming System for the Design of Reversible Digital Circuits. - Saptarshi Chakraborty, Dhrubajyoti Das:
An Overview of Face Liveness Detection. - Le Li, Jianjun Yang, Kaili Zhao, Yang Xu, Honggang Zhang, Zhuoyi Fan:
Graph Regularized Non-negative Matrix Factorization By Maximizing Correntropy. - Michael S. Gashler, Stephen C. Ashmore:
Training Deep Fourier Neural Networks To Fit Time-Series Data. - Camellia Ray, Jayanta Kumar Das, Pabitra Pal Choudhury:
On Analysis and Generation of some Biologically Important Boolean Functions. - Robert J. Lyon, J. M. Brooke, Joshua D. Knowles, Benjamin W. Stappers:
Hellinger Distance Trees for Imbalanced Streams. - Frank Hannig, Jürgen Teich:
Proceedings of the First Workshop on Resource Awareness and Adaptivity in Multi-Core Computing (Racing 2014). - Shaofeng Zou, Yingbin Liang, H. Vincent Poor, Xinghua Shi:
Nonparametric Detection of Anomalous Data via Kernel Mean Embedding. - Andrés Altieri, Pablo Piantanida, Leonardo Rey Vega, Cecilia G. Galarza:
On Fundamental Trade-offs of Device-to-Device Communications in Large Wireless Networks. - Thomas Bläsius, Guido Brückner, Ignaz Rutter:
Complexity of Higher-Degree Orthogonal Graph Embedding in the Kandinsky Model. - Piero Giacomelli, Åsa Smedberg:
The Eve of 3D Printing in Telemedicine: State of the Art and Future Challenges. - Bryan Poling, Gilad Lerman, Arthur Szlam:
Better Feature Tracking Through Subspace Constraints. - Elaine Pimentel, Carlos Olarte, Vivek Nigam:
A Proof Theoretic Study of Soft Concurrent Constraint Programming. - Sawood Alam, Charles L. Cartledge, Michael L. Nelson:
Support for Various HTTP Methods on the Web. - Jan Hazla, Thomas Holenstein:
Upper Tail Estimates with Combinatorial Proofs. - Yan Fang, Matthew J. Cotter, Donald M. Chiarulli, Steven P. Levitan:
Image Segmentation Using Frequency Locking of Coupled Oscillators. - Shahab Kaynama, Jeremy H. Gillula, Claire J. Tomlin:
A sampling-based approach to scalable constraint satisfaction in linear sampled-data systems - Part I: Computation. - Michael Carl Tschantz, Amit Datta, Anupam Datta, Jeannette M. Wing:
A Methodology for Information Flow Experiments. - Oswin Aichholzer, Greg Aloupis, Erik D. Demaine, Martin L. Demaine, Sándor P. Fekete, Michael Hoffmann, Anna Lubiw, Jack Snoeyink, Andrew Winslow:
Covering Folded Shapes. - Srayan Datta:
Predicting Central Topics in a Blog Corpus from a Networks Perspective. - Meng Wang, Tharaka Samarasinghe, Jamie S. Evans:
Transmission Rank Selection for Opportunistic Beamforming with Quality of Service Constraints. - Alexis Huck, François de Vieilleville, Pierre Weiss, Manuel Grizonnet:
Hyperspectral pan-sharpening: a variational convex constrained formulation to impose parallel level lines, solved with ADMM. - Norikazu Sugimoto, Voot Tangkaratt, Thijs Wensveen, Tingting Zhao, Masashi Sugiyama, Jun Morimoto:
Efficient Reuse of Previous Experiences to Improve Policies in Real Environment. - Reto Speck, Tobias Blanke, Conny Kristel, Michal Frankl, Kepa Joseba Rodríguez, Veerle Vanden Daelen:
The Past and the Future of Holocaust Research: From Disparate Sources to an Integrated European Holocaust Research Infrastructure. - Chih-Hong Cheng, Chung-Hao Huang, Harald Ruess, Stefan Stattelmann:
G4LTL-ST: Automatic Generation of PLC Programs. - Md. Habibur Rahman, Mohammad Nasiruddin:
Impact of Two Realistic Mobility Models for Vehicular Safety Applications. - Kerstin Andersson:
Exact Probability Distribution versus Entropy. - Amit Daniely, Shai Shalev-Shwartz:
Optimal Learners for Multiclass Problems. - Stefano Riverso, Fabio Sarzo, Giancarlo Ferrari-Trecate:
Plug-and-play voltage and frequency control of islanded microgrids with meshed topology. - Florent Foucaud, George B. Mertzios, Reza Naserasr, Aline Parreau, Petru Valicov:
Identification, location-domination and metric dimension on interval and permutation graphs. - Giuseppe Antonio Di Luna, Paola Flocchini, Sruti Gan Chaudhuri, Nicola Santoro, Giovanni Viglietta:
Robots with Lights: Overcoming Obstructed Visibility Without Colliding. - Lijiang Chen:
Coordinate System Selection for Minimum Error Rate Training in Statistical Machine Translation. - A. N. Trahtman:
The length of a minimal synchronizing word and the Černy conjecture. - Amer E. Mouawad, Naomi Nishimura, Venkatesh Raman, Marcin Wrochna:
Reconfiguration over tree decompositions. - Nima Anari, Gagan Goel, Afshin Nikzad:
Mechanisms Design for Crowdsourcing: An Optimal 1-1/e Approximate Budget-Feasible Mechanism for Large Markets. - Moshe Schwartz, Muriel Médard:
Quasi-linear Network Coding. - Götz E. Pfander, Pavel Zheltov:
Estimation of Overspread Scattering Functions. - Achilles Beros, Colin de la Higuera:
A Canonical Semi-Deterministic Transducer. - Nicola Gatti, Alessandro Lazaric, Marco Rocco, Francesco Trovò:
Truthful Learning Mechanisms for Multi-Slot Sponsored Search Auctions with Externalities. - Zubair Nabi:
The Zen of Graduate-level Programming. - Hamidreza Boostanimehr, Vijay K. Bhargava:
Unified and Distributed QoS-Driven Cell Association Algorithms in Heterogeneous Networks. - Luciano Caroprese, Irina Trubitsyna, Miroslaw Truszczynski, Ester Zumpano:
A Measure of Arbitrariness in Abductive Explanations. - Jeffrey M. Druce, Jarvis D. Haupt, Stefano Gonella:
Anomaly-Sensitive Dictionary Learning for Unsupervised Diagnostics of Solid Media. - Roman Barták, Neng-Fa Zhou:
Using Tabled Logic Programming to Solve the Petrobras Planning Problem. - Hadassa Daltrophe, Shlomi Dolev, Zvi Lotker:
Big Data Representation as High Dimensional Configuration. - Zubair Nabi:
A $35 Firewall for the Developing World. - Nikzad Babaii Rizvandi:
Performance Provisioning and Energy Efficiency in Cloud and Distributed Computing Systems. - Chulong Liang, Xiao Ma, Qiutao Zhuang, Baoming Bai:
Spatial Coupling of Generator Matrix: A General Approach to Design of Good Codes at a Target BER. - Dor Arad, Yael Mordechai, Hadas Shachnai:
Tighter Bounds for Makespan Minimization on Unrelated Machines. - Neng-Fa Zhou:
Combinatorial Search With Picat. - Dushyant Vaghela, Kapildev Naina:
A Review of Image Mosaicing Techniques. - Ryoma Sin'ya:
Graph Spectral Properties of Deterministic Finite Automata. - Deepesh Data, Bikash Kumar Dey, Manoj Mishra, Vinod M. Prabhakaran:
How to Securely Compute the Modulo-Two Sum of Binary Sources. - George Souza Oliveira, Anderson Faustino da Silva:
Towards an Efficient Prolog System by Code Introspection. - Kazuya Haraguchi:
An Efficient Local Search for Partial Latin Square Extension Problem. - Antonis G. Gotsis, Stelios Stefanatos, Angeliki Alexiou:
Spatial Coordination Strategies in Future Ultra-Dense Wireless Networks. - Aleksandar Haber, Michel Verhaegen:
Sparse approximate inverses of Gramians and impulse response matrices of large-scale interconnected systems. - Rahul Tejwani:
Sentiment Analysis: A Survey. - Ilias Tachmazidis, Grigoris Antoniou, Wolfgang Faber:
Efficient Computation of the Well-Founded Semantics over Big Data. - (Withdrawn) Decoding and Computing Algorithms for Linear Superposition LDPC Coded Systems.
- Yuyi Wang, Jan Ramon, Zheng-Chu Guo:
Learning from networked examples. - Bocong Chen, San Ling, Guanghui Zhang:
Self-dual cyclic codes over finite chain rings. - Hassan Ghozlan, Gerhard Kramer:
Phase Modulation for Discrete-time Wiener Phase Noise Channels with Oversampling at High SNR. - Wenbin Zhang, Steven Skiena:
News-Based Group Modeling and Forecasting. - Paul L. Borrill, Mark Burgess, Todd Craw, Mike Dvorkin:
A Promise Theory Perspective on Data Networks. - Xavier Lacoste, Mathieu Faverge, George Bosilca, Pierre Ramet, Samuel Thibault:
Taking advantage of hybrid systems for sparse direct solvers via task-based runtimes. - K. Jyothi, C. J. Prabhakar:
Multi Modal Face Recognition Using Block Based Curvelet Features. - Radhakrishnan Delhibabu:
An Abductive Framework for Horn Knowledge Base Dynamics. - Ronald Ortner, Odalric-Ambrym Maillard, Daniil Ryabko:
Selecting Near-Optimal Approximate State Representations in Reinforcement Learning. - Ji Zhao, Deyu Meng:
FastMMD: Ensemble of Circular Discrepancy for Efficient Two-Sample Test. - Tanmoy Sarkar, Sugata Sanyal:
Reversible and Irreversible Data Hiding Technique. - Manish B. Dave, Mitesh B. Nakrani:
Malicious User Detection in Spectrum Sensing for WRAN Using Different Outliers Detection Techniques. - Sergio Castro, Kim Mens, Paulo Moura:
Customisable Handling of Java References in Prolog Programs. - Sabina Sisovic, Sanda Martincic-Ipsic, Ana Mestrovic:
Comparison of the language networks from literature and blogs. - Paolo Zuliani:
Statistical Model Checking for Biological Applications. - Nafay Hifzur Rehman, Neelam Verma:
Application of Modified Multi Model Predictive Control Algorithm to Fluid Catalytic Cracking Unit. - Elisa Gorla, Maike Massierer:
An optimal representation for the trace zero subgroup. - Omer H. Abdelrahman, Erol Gelenbe:
Signalling Storms in 3G Mobile Networks. - Elisa Gorla, Alberto Ravagnani:
Subspace codes from Ferrers diagrams. - Myrto Arapinis, Stéphanie Delaune, Steve Kremer:
Dynamic Tags for Security Protocols. - Erol Gelenbe, Omer H. Abdelrahman:
Search in the Universe of Big Networks and Data. - Burak Çakmak, Ole Winther, Bernard H. Fleury:
S-AMP: Approximate Message Passing for General Matrix Ensembles. - Xiongbin Rao, Vincent K. N. Lau:
Distributed Compressive CSIT Estimation and Feedback for FDD Multi-user Massive MIMO Systems. - Theofrastos Mantadelis, Ricardo Rocha, Paulo Moura:
Tabling, Rational Terms, and Coinduction Finally Together! - Amira Aloulou, Olfa Boubaker:
A Relevant Reduction Method for Dynamic Modeling of a Seven-linked Humanoid Robot in the Three-dimensional Space. - Jun Wang, Ke Sun, Fei Sha, Stéphane Marchand-Maillet, Alexandros Kalousis:
Two-Stage Metric Learning. - Aya Saad, Thom W. Frühwirth, Carmen Gervet:
The P-Box CDF-Intervals: A Reliable Constraint Reasoning with Quantifiable Information. - Quentin Gemine, Damien Ernst, Bertrand Cornélusse:
Active network management for electrical distribution systems: problem formulation and benchmark. - Sanket S. Kalamkar, Adrish Banerjee:
On the Effect of Primary User Traffic on Secondary Throughput and Outage Probability Under Rayleigh Flat Fading Channel. - Ahmed El Shafie, Ahmed K. Sultan, Tamer Khattab:
Probabilistic Band-Splitting for a Buffered Cooperative Cognitive Terminal. - Ahmed El Shafie, Tamer Khattab:
On Orthogonal Band Allocation for Multi-User Mutli-Band Cognitive Radio Networks. - Ahmed El Shafie, Ahmed K. Sultan, Tamer Khattab:
Maximum Throughput of a Secondary User Cooperating with an Energy-Aware Primary User. - Alessio Meneghetti, Massimiliano Sala, Alessandro Tomasi:
A weight-distribution bound for entropy extractors using linear binary codes. - Xu Chen, Jianwei Huang:
Imitation-based Social Spectrum Sharing. - José R. Correa, Tobias Harks, Vincent J. C. Kreuzen, Jannik Matuschke:
Fare Evasion in Transit Networks. - Akshay Kumar, Ravi Tandon, T. Charles Clancy:
On the Latency of Erasure-Coded Cloud Storage Systems. - Ernst D. Berg:
Introduction to Dynamic Unary Encoding. - Georg Gottlob, Giorgio Orsi, Andreas Pieris:
Query Rewriting and Optimization for Ontological Databases. - Miguel Areias, Ricardo Rocha:
A Simple and Efficient Lock-Free Hash Trie Design for Concurrent Tabling. - Taolue Chen, Stefan Kiefer:
On the Total Variation Distance of Labelled Markov Chains. - Scott A. Hale, Taha Yasseri, Josh Cowls, Eric T. Meyer, Ralph Schroeder, Helen Z. Margetts:
Mapping the UK Webspace: Fifteen Years of British Universities on the Web. - Cesar Ghali, Ashok Narayanan, David Oran, Gene Tsudik:
Secure Fragmentation for Content-Centric Networks. - Georgios Papadopoulos, Hanna Kurniawati, Nicholas M. Patrikalakis:
Analysis of Asymptotically Optimal Sampling-based Motion Planning Algorithms for Lipschitz Continuous Dynamical Systems. - Dimitri Kartsaklis, Mehrnoosh Sadrzadeh:
A Study of Entanglement in a Categorical Framework of Natural Language. 249-261 - Chien-Ju Ho, Aleksandrs Slivkins, Jennifer Wortman Vaughan:
Adaptive Contract Design for Crowdsourcing Markets: Bandit Algorithms for Repeated Principal-Agent Problems. - Ahmed Hamdi Sakr, Ekram Hossain:
Location-Aware Cross-Tier Coordinated Multipoint Transmission in Two-Tier Cellular Networks. - Bruno Scherrer:
Approximate Policy Iteration Schemes: A Comparison. - Kartik Talamadupula, David E. Smith, Subbarao Kambhampati:
The Metrics Matter! On the Incompatibility of Different Flavors of Replanning. - Simone Bova, Robert Ganian, Stefan Szeider:
Model Checking Existential Logic on Partially Ordered Sets. - Klaus Reinhardt, Abuzer Yakaryilmaz:
The minimum amount of useful space: New results and new directions. - Swanand Kadhe, Alex Sprintson:
Weakly Secure Regenerating Codes for Distributed Storage. - Sushant Chaudhary:
Load Frequency Control For Distributed Grid Power System Single Area & Multi-area System. - Vahid Lari, Alexandru Tanase, Frank Hannig, Jürgen Teich:
Massively Parallel Processor Architectures for Resource-aware Computing. - Johny Paul, Walter Stechele, Manfred Kröhnert, Tamim Asfour:
Resource-Aware Programming for Robotic Vision. - Elisabeth Glocker, Qingqing Chen, Asheque M. Zaidi, Ulf Schlichtmann, Doris Schmitt-Landsiedel:
Emulated ASIC Power and Temperature Monitor System for FPGA Prototyping of an Invasive MPSoC Computing Architecture. - Oliver Mattes, Wolfgang Karl:
Evaluating the Self-Optimization Process of the Adaptive Memory Management Architecture Self-aware Memory. - Manfred Kröhnert, Nikolaus Vahrenkamp, Johny Paul, Walter Stechele, Tamim Asfour:
Resource Prediction for Humanoid Robots. - Mario Kicherer, Wolfgang Karl:
Heterogeneity-aware Fault Tolerance using a Self-Organizing Runtime System. - Björn Döbel, Robert Muschner, Hermann Härtig:
Resource-Aware Replication on Heterogeneous Multicores: Challenges and Opportunities. - Hananeh Aliee, Liang Chen, Mojtaba Ebrahimi, Michael Glaß, Faramarz Khosravi, Mehdi Baradaran Tahoori:
Towards Cross-layer Reliability Analysis of Transient and Permanent Faults. - Christoph W. Keßler, Usman Dastgeer, Lu Li:
Optimized Composition: Generating Efficient Code for Heterogeneous Systems from Multi-Variant Components, Skeletons and Containers. - Andi Drebes, Karine Heydemann, Antoniu Pop, Albert Cohen, Nathalie Drach:
Automatic Detection of Performance Anomalies in Task-Parallel Programs. - Aurang Zaib, Prashanth Raju, Thomas Wild, Andreas Herkersdorf:
A Layered Modeling and Simulation Approach to investigate Resource-aware Computing in MPSoCs. - Thomas Karcher, Christopher Guckes, Walter F. Tichy:
Autotuning and Self-Adaptability in Concurrency Libraries. - Hadi Daneshmand, Manuel Gomez-Rodriguez, Le Song, Bernhard Schölkopf:
Estimating Diffusion Network Structures: Recovery Conditions, Sample Complexity & Soft-thresholding Algorithm. - Jiang Wang, Xiaohan Nie, Yin Xia, Ying Wu, Song-Chun Zhu:
Cross-view Action Modeling, Learning and Recognition. - H. Lydia Deng, John A. Scales:
Characterizing the Topography of Multi-dimensional Energy Landscapes. - Jeffrey G. Andrews, Stefano Buzzi, Wan Choi, Stephen V. Hanly, Angel E. Lozano, Anthony C. K. Soong, Jianzhong (Charlie) Zhang:
What Will 5G Be? - Luca Venturino, Alessio Zappone, Chiara Risi, Stefano Buzzi:
Energy-Efficient Scheduling and Power Allocation in Downlink OFDMA Networks with Base Station Coordination. - Wei-Chiang Li, Tsung-Hui Chang, Chong-Yung Chi:
Multicell Coordinated Beamforming with Rate Outage Constraint-Part I: Complexity Analysis. - Wei-Chiang Li, Tsung-Hui Chang, Chong-Yung Chi:
Multicell Coordinated Beamforming with Rate Outage Constraint-Part II: Efficient Approximation Algorithms. - Alessio Venticinque, Nicola Mazzocca, Salvatore Venticinque, Massimo Ficco:
Semantic Support for Log Analysis of Safety-Critical Embedded Systems. - (Withdrawn) Entropies from Markov Models as Complexity Measures of Embedded Attractors.
- Roberto Baldoni, Mario Caruso, Adriano Cerocchi, Claudio Ciccotelli, Luca Montanari, Luca Nicoletti:
Correlating power consumption and network traffic for improving data centers resiliency. - Alessia Garofalo, Cesario Di Sarno, Ilaria Matteucci, Marco Vallini, Valerio Formicola:
Closing the loop of SIEM analysis to Secure Critical Infrastructures. - Alexander B. Romanovsky, Marc-Olivier Killijian:
The Tenth European Dependable Computer Conference. - Maria Spichkova:
Compositional properties of crypto-based components. - Maria Spichkova:
Formalisation and Analysis of Component Dependencies. - Zeeshan Bhatti, Ahmad Waqas, Imdad Ali Ismaili, Dil Nawaz Hakro, Waseem Javaid Soomro:
Phonetic based SoundEx & ShapeEx algorithm for Sindhi Spell Checker System. - Pinar Sen, Ali Özgür Yilmaz:
A Low-Complexity Graph-Based LMMSE Receiver for MIMO ISI Channels with M-QAM Modulation. - Pierre Ganty, Radu Iosif:
Generating Bounded Languages Using Bounded Control Sets. - Raphael Poss:
Haskell for OCaml programmers. - Raphael Poss:
Categories from scratch. - Neli Blagus, Gregor Weiss, Lovro Subelj:
Sampling node group structure of social and information networks. - Olfa Boubaker:
The inverted Pendulum: A fundamental Benchmark in Control Theory and Robotics. - (Withdrawn) A Cognitive Model for Humanoid Robot Navigation and Mapping using Alderbaran NAO.
- Boris Konev, Alexei Lisitsa:
Computer-Aided Proof of Erdos Discrepancy Properties. - Joachim Breitner:
The Correctness of Launchbury's Natural Semantics for Lazy Evaluation. - Andrea Monacchi, Dominik Egarter, Wilfried Elmenreich, Salvatore D'Alessandro, Andrea M. Tonello:
GREEND: An Energy Consumption Dataset of Households in Italy and Austria. - Yosra Arous, Olfa Boubaker:
Gait trajectory generation for a five link bipedal robot based on a reduced dynamical model. - Bichen Shi, Georgiana Ifrim, Neil Hurley:
Be In The Know: Connecting News Articles to Relevant Twitter Conversations. - Jean-Marc Kelif, Olivier Simon:
Impact of Directional Receiving Antennas on Wireless Networks. - Leila Pishdad, Fabrice Labeau:
A New Reduction Scheme for Gaussian Sum Filters. - Pokkuluri Kiran Sree, Inampudi Ramesh Babu:
Clonal-Based Cellular Automata in Bioinformatics. - Behnam Neyshabur, Yury Makarychev, Nathan Srebro:
Clustering, Hamming Embedding, Generalized LSH and the Max Norm. - Jian Zhang, Debin Zhao, Ruiqin Xiong, Siwei Ma, Wen Gao:
Image Restoration Using Joint Statistical Modeling in Space-Transform Domain. - Yong Deng:
D numbers theory: a generalization of Dempster-Shafer evidence theory. - Shangping Wang, Ru Zhao:
Lattice-Based Ring Signature Scheme under the Random Oracle Model. - Yuanming Shi, Jun Zhang, Khaled Ben Letaief:
Scalable Coordinated Beamforming for Dense Wireless Cooperative Networks. - Majid Gerami, Ming Xiao, Jun Li, Carlo Fischione, Zihuai Lin:
Repair for Distributed Storage Systems in Packet Erasure Networks. - Kaeser Md. Sabrin, Md. Haider Ali:
An Intelligent Pixel Replication Technique by Binary Decomposition for Digital Image Zooming. - Hasnae Rahimi, Hanan El Bakkali:
A New Trust Reputation System for E-Commerce Applications. - Parvathavarthini S., Shanthakumari R:
An Adaptive Watermarking Process in Hadamard Transform. - Jeremy Kun, Rajmonda Caceres, Kevin Carter:
Locally Boosted Graph Aggregation for Community Detection. - Elena Bellodi, Evelina Lamma, Fabrizio Riguzzi, Vítor Santos Costa, Riccardo Zese:
Lifted Variable Elimination for Probabilistic Logic Programming. - Éric Badouel, Loïc Hélouët, Georges Edouard Kouamou, Christophe Morvan:
A Grammatical Approach to Data-centric Case Management in a Distributed Collaborative Environment. - Manel Tagorti, Bruno Scherrer:
Rate of Convergence and Error Bounds for LSTD(λ). - S. Karimi, K. B. Nakshatrala:
A monolithic multi-time-step computational framework for advective-diffusive-reactive transient systems with disparate scales. - Chakir Tajani, Jaafar Abouchabaka:
An Alternating KMF Algorithm to Solve the Cauchy Problem for Laplaces Equation. - David A. Kosower, Juan J. Lopez-Villarejo:
Flowgen: Flowchart-Based Documentation for C++ Codes. - Eric Gribkoff, Guy Van den Broeck, Dan Suciu:
Understanding the Complexity of Lifted Inference and Asymmetric Weighted Model Counting. - Emmanuel Abbe, Afonso S. Bandeira, Georgina Hall:
Exact Recovery in the Stochastic Block Model. - Nicholas Kersting:
Fast and Fuzzy Private Set Intersection. - Tim Althoff, Cristian Danescu-Niculescu-Mizil, Dan Jurafsky:
How to Ask for a Favor: A Case Study on the Success of Altruistic Requests. - Samuel D. Johnson, Tsai-Ching Lu:
Algorithm Instance Games. - Claudio Maruccio, Laura De Lorenzis, Luana Persano, Dario Pisignano:
Computational homogenization of fibrous piezoelectric materials. - Beniamino Accattoli, Ugo Dal Lago:
Beta Reduction is Invariant, Indeed (Long Version). - Omar Besbes, Yonatan Gur, Assaf Zeevi:
Optimal Exploration-Exploitation in a Multi-Armed-Bandit Problem with Non-stationary Rewards. - James Neufeld, András György, Dale Schuurmans, Csaba Szepesvári:
Adaptive Monte Carlo via Bandit Allocation. - Aviad Rubinstein:
Inapproximability of Nash Equilibrium. - Niall Douglas:
Large Code Base Change Ripple Management in C++: My thoughts on how a new Boost C++ Library could help. - M. Ehsan Shafiee, Emily M. Zechman:
An Agent-based Modeling Framework for Sociotechnical Simulation of Water Distribution Contamination Events. - Jian Gao:
Linear Codes over Z9+uZ9 MacWilliams Identity, Self-Dual Codes, Quadratic Residue Codes and Constacyclic Codes. - Jian Zhang, Debin Zhao, Wen Gao:
Group-based Sparse Representation for Image Restoration. - Feng Lu, Ziqiang Chen:
Newton-Type Iterative Solver for Multiple View $L2$ Triangulation. - Minh-Quoc Nghiem, Giovanni Yoko Kristianto, Goran Topic, Akiko Aizawa:
Which one is better: presentation-based or content-based math search? - Mingrui Yang, Frank de Hoog:
New Coherence and RIP Analysis for Weak Orthogonal Matching Pursuit. - Cengis Hasan, Eitan Altman, Jean-Marie Gorce:
On the Nash Stability in the Hedonic Coalition Formation Games. - Rehan Abdul Aziz, Geoffrey Chu, Peter James Stuckey:
Grounding Bound Founded Answer Set Programs. - Yi Bi, Jia-Huai You, Zhiyong Feng:
A Well-Founded Semantics for FOL-Programs. - Rehan Abdul Aziz:
Bound Founded Answer Set Programming. - Lurong Jiang, Xinyu Jin, Yongxiang Xia, Bo Ouyang, Duanpo Wu, Xi Chen:
A Scale-Free Topology Construction Model for Wireless Sensor Networks. - Anthony Hunter, Matthias Thimm:
Probabilistic Argumentation with Epistemic Extensions and Incomplete Information. - Mboni Kibelloh, Yukun Bao:
Perceptions of International Female Students Towards E-learning in Resolving High Education and Family Role Strain. - Rafael Lahoz-Beltra:
The "crisis of noosphere" as a limiting factor to achieve the point of technological singularity. - Mboni Kibelloh, Yukun Bao:
Can Online MBA Programs Allow Professional Working Mothers to Balance Work, Family, and Career Progression? A Case Study in China. - Samaneh Khoshrou, Jaime S. Cardoso, Luís Filipe Teixeira:
Active Mining of Parallel Video Streams. - Sana Stojanovic, Julien Narboux, Marc Bezem, Predrag Janicic:
A Vernacular for Coherent Logic. - Gregory J. Duck, Rémy Haemmerlé, Martin Sulzmann:
On Termination, Confluence and Consistent CHR-based Type Inference. - Shangping Wang, Fang Feng:
Large Universe Attribute-Based Encryption Scheme from Lattices. - Nir Ailon, Thorsten Joachims, Zohar Shay Karnin:
Reducing Dueling Bandits to Cardinal Bandits. - Tieming Chen, Xu Zhang, Shichao Jin, Okhee Kim:
Efficient classification using parallel and scalable compressed model and Its application on intrusion detection. - Aftab Ahmed Chandio, Zhibin Yu, Feroz Shah Syed, Korejo Imtiaz Ali:
A Case Study on Job Scheduling Policy for Workload Characterization and Power Efficiency. - Marthe Bonamy, Benjamin Lévêque, Alexandre Pinlou:
Planar graphs with $Δ\geq 7$ and no triangle adjacent to a C4 are minimally edge and total choosable. - Moa Johansson, Dan Rosén, Nicholas Smallbone, Koen Claessen:
Hipster: Integrating Theory Exploration in a Proof Assistant. - Ugo Dal Lago, Claudia Faggian, Ichiro Hasuo, Akira Yoshimizu:
The Geometry of Synchronization (Long Version). - Ziaeddin Beheshtifard, Mohammad Reza Meybodi:
Online Channel Assignment in Multi-Radio Wireless Mesh Networks Using Learning Automata. - Cezary Kaliszyk, Josef Urban, Jirí Vyskocil, Herman Geuvers:
Developing Corpus-based Translation Methods between Informal and Formal Mathematics: Project Description. - Gang Mei:
A Straightforward Preprocessing Approach for Accelerating Convex Hull Computations on the GPU. - Fabián Riquelme:
Satisfaction in societies with opinion leaders and mediators: properties and an axiomatization. - Matthew England:
Formulating problems for real algebraic geometry. - Salvatore Cuomo, Raffaele Farina, Ardelio Galletti, Livia Marcellino:
An error estimate of Gaussian Recursive Filter in 3Dvar problem. - Ejder Bastug, Mehdi Bennis, Mérouane Debbah:
Cache-enabled Small Cell Networks: Modeling and Tradeoffs. - Zhizheng Zhang, Kaikai Zhao:
ESmodels: An Epistemic Specification Solver. - Petr Baudis:
COCOpf: An Algorithm Portfolio Framework. - Andrej Gajduk, Zoran Utkovski, Lasko Basnarkov, Ljupco Kocarev:
Energy-efficiency in Decentralized Wireless Networks: A Game-theoretic Approach inspired by Evolutionary Biology. - Petr Baudis:
Current Concepts in Version Control Systems. - Samah A. M. Ghanem, Munnujahan Ara:
Secure Data Transmission in Cooperative Modes: Relay and MAC. - Yoon Kim, Yi-I Chiu, Kentaro Hanaki, Darshan Hegde, Slav Petrov:
Temporal Analysis of Language through Neural Language Models. - Yoon Kim, Owen Zhang:
Credibility Adjusted Term Frequency: A Supervised Term Weighting Scheme for Sentiment Analysis and Text Classification. - Ken Chatfield, Karen Simonyan, Andrea Vedaldi, Andrew Zisserman:
Return of the Devil in the Details: Delving Deep into Convolutional Nets. - Aline Parreau, Michel Rigo, Eric Rowland, Élise Vandomme:
A new approach to the $2$-regularity of the l-abelian complexity of 2-automatic sequences. - Tamal K. Dey, Fengtao Fan, Yusu Wang:
Dimension Detection with Local Homology. - Fionn Murtagh, Adam Ganz:
Pattern Recognition in Narrative: Analysis of Narratives of Emotion. - Mario Alviano, Carmine Dodaro, Francesco Ricca:
Anytime Computation of Cautious Consequences in Answer Set Programming. - Terrance Swift:
Incremental Tabling in Support of Knowledge Representation and Reasoning. - Vincenzo Sciancalepore, Domenico Giustiniano, Albert Banchs, Andreea Picu:
Offloading Cellular Traffic through Opportunistic Communications: Analysis and Optimization. - Flávio Cruz, Ricardo Rocha, Seth Copen Goldstein, Frank Pfenning:
A Linear Logic Programming Language for Concurrent Programming over Graph Structures. - Iaakov Exman, Gilad Amar, Ran Shaltiel:
The Interestingness Tool for Search in the Web. - Stefano Gogioso:
Aspects of Statistical Physics in Computational Complexity. - Daniel Gall, Thom W. Frühwirth:
Exchanging Conflict Resolution in an Adaptable Implementation of ACT-R. - Marina I. Maslennikova:
Complexity of checking whether two automata are synchronized by the same language. - Vasiliy Usatyuk:
Application of lattice reduction block Korkin-Zolotarev method to MIMO-decoding. - Kyle Marple, Gopal Gupta:
Dynamic Consistency Checking in Goal-Directed Answer Set Programming. - Christian Antic:
On cascade products of answer set programs. - Nicholas Generous, Geoffrey Fairchild, Alina Deshpande, Sara Y. Del Valle, Reid Priedhorsky:
Detecting epidemics using Wikipedia article views: A demonstration of feasibility with language as location proxy. - Anh Le, Lorenzo Keller, Hulya Seferoglu, Blerim Cici, Christina Fragouli, Athina Markopoulou:
MicroCast: Cooperative Video Streaming using Cellular and D2D Connections. - Thomas Gransden, Neil Walkinshaw, Rajeev Raman:
Mining State-Based Models from Proof Corpora. - Yury Polyanskiy, Yihong Wu:
Dissipation of information in channels with input constraints. - Kian Win Ong, Yannis Papakonstantinou, Romain Vernoux:
The SQL++ Semi-structured Data Model and Query Language: A Capabilities Survey of SQL-on-Hadoop, NoSQL and NewSQL Databases. - Michael Gelfond, Yuanlin Zhang:
Vicious Circle Principle and Logic Programs with Aggregates. - Marco Comini, Laura Titolo, Alicia Villanueva:
Abstract Diagnosis for tccp using a Linear Temporal Logic. - Martin Gebser, Roland Kaminski, Benjamin Kaufmann, Torsten Schaub:
Clingo = ASP + Control: Preliminary Report. - Gauri Joshi, Yuval Kochman, Gregory W. Wornell:
Throughput-Smoothness Trade-offs in Multicasting of an Ordered Packet Stream. - Francesco Calimeri, Martin Gebser, Marco Maratea, Francesco Ricca:
The Design of the Fifth Answer Set Programming Competition. - Luís Moniz Pereira, Emmanuelle-Anna Dietz, Steffen Hölldobler:
Contextual Abductive Reasoning with Side-Effects. - Aftab Ahmed Chandio, Dingju Zhu, Ali Hassan Sodhro:
Integration of Inter-Connectivity of Information System (i3) using Web Services. - YuLong Zou, Jia Zhu, Xianbin Wang, Victor C. M. Leung:
Improving Physical-Layer Security in Wireless Communications Using Diversity Techniques. - Xi Qiu, Christopher Stewart:
Topic words analysis based on LDA model. - Sweta Rai:
Student Dropout Risk Assessment in Undergraduate Course at Residential University. - Priyanka Saini:
Building a Classification Model for Enrollment In Higher Educational Courses using Data Mining Techniques. - Erik D. Demaine, Nathan Pinsker, Jon Schneider:
Fast Dynamic Pointer Following via Link-Cut Trees. - Kyumin Lee, Jalal Mahmud, Jilin Chen, Michelle X. Zhou, Jeffrey Nichols:
Who Will Retweet This? Automatically Identifying and Engaging Strangers on Twitter to Spread Information. - Andrea Kohlhase:
Search Interfaces for Mathematicians. - Raphael Spreitzer:
PIN Skimming: Exploiting the Ambient-Light Sensor in Mobile Devices. - Yannis Haralambous, Julie Sauvage-Vincent, John Puentes:
INAUT, a Controlled Language for the French Coast Pilot Books Instructions nautiques. - Mohammad Gholami, Mehdi Samadieh:
Quasi Cyclic LDPC Codes Based on Finite Set Systems. - Domagoj Margan, Ana Mestrovic, Sanda Martincic-Ipsic:
Complex Networks Measures for Differentiation between Normal and Shuffled Croatian Texts. - Ana Sofia Gomes, José Júlio Alferes:
Transaction Logic with (Complex) Events. - Iulia Teodora Banu-Demergian, Gheorghe Stefanescu:
On contour representation of two dimensional patterns. - Angelos Charalambidis, Zoltán Ésik, Panos Rondogiannis:
Minimum Model Semantics for Extensional Higher-order Logic Programming with Negation. - Nada Sharaf, Slim Abdennadher, Thom W. Frühwirth:
Visualization of Constraint Handling Rules. - Grzegorz Jaskiewicz:
Logic Programming as Scripting Language for Bots in Computer Games - Research Overview. - Evanthia Papadopoulou, Maksym Zavershynskyi:
The Higher-Order Voronoi Diagram of Line Segments. - Lene M. Favrholdt, Jesper W. Mikkelsen:
Online Max-Edge-Coloring of Paths and Trees. - Marco Gavanelli, Stefano Bragaglia, Michela Milano, Federico Chesani, Elisa Marengo, Paolo Cagnoli:
Multi-Criteria Optimal Planning for Energy Policies in CLP. - Heike Stephan:
Application of Methods for Syntax Analysis of Context-Free Languages to Query Evaluation of Logic Programs. - Elad Hazan, Tomer Koren, Kfir Y. Levy:
Logistic Regression: Tight Bounds for Stochastic and Online Optimization. - Xu Chen, Jianwei Huang:
Spatial Spectrum Access Game. - Palash Dey, Neeldhara Misra, Y. Narahari:
Complexity of Kernelization in the Possible Winner Problem. - Max Jaderberg, Andrea Vedaldi, Andrew Zisserman:
Speeding up Convolutional Neural Networks with Low Rank Expansions. - Fayssal Bendaoud, Marwen Abdennebi, Fedoua Didi:
Allocation des ressources radio en LTE. - John P. Gallagher, Bishoksan Kafle:
Analysis and Transformation Tools for Constrained Horn Clause Verification. - Mário Abrantes, Luís Moniz Pereira:
Properties of Stable Model Semantics Extensions. - Xiang-Gen Xia, Tianxian Zhang, Lingjiang Kong:
MIMO OFDM Radar IRCI Free Range Reconstruction with Sufficient Cyclic Prefix. - Thibault Gauthier, Cezary Kaliszyk:
Matching concepts across HOL libraries. - Rahul A. Jichkar, M. B. Chandak:
An implementation on detection of trusted service provider in mobile ad-hoc networks. - Laurent Romary, Andreas Witt:
Méthodes pour la représentation informatisée de données lexicales / Methoden der Speicherung lexikalischer Daten. - Aadhityan A.:
A Novel Method for Developing Robotics via Artificial Intelligence and Internet of Things. - Kandeepan Sithamparanathan, Karina Mabell Gomez, Laurent Reynaud, Tinku Rasheed:
Aerial-Terrestrial Communications: Terrestrial Cooperation and Energy-Efficient Transmissions to Aerial-Base Stations. - Torbjörn Lager, Jan Wielemaker:
Pengines: Web Logic Programming Made Easy. - Zoran Majkic:
Saturation of the morphisms in the database category. - Elaheh Mohammadi, Farokh Marvasti:
Optimal Distortion of Non-Uniform Sampling. - Aya Saad:
CDF-Intervals: A Reliable Framework to Reason about Data with Uncertainty. - Anurag Bhardwaj, Vignesh Jagadeesh, Wei Di, Robinson Piramuthu, Elizabeth F. Churchill:
Enhancing Visual Fashion Recommendations with Users in the Loop. - Stefan Brass:
A Framework for Bottom-Up Simulation of SLD-Resolution. - Ben Kimmett, Alex Thomo, S. Venkatesh:
Three-Way Joins on MapReduce: An Experimental Study. - Anvesh Komuravelli, Arie Gurfinkel, Sagar Chaki:
SMT-based Model Checking for Recursive Programs. - Sanaz Khan Afshar, Vincent Aravantinos, Osman Hasan, Sofiène Tahar:
Formalization of Complex Vectors in Higher-Order Logic. - Ethan K. Jackson:
A Module System for Domain-Specific Languages. - Nicolás Guarín-Zapata, Juan Gómez, Juan Jaramillo:
Seismic Wave Scattering Through a Compressed Hybrid BEM/FEM Method. - (Withdrawn) An approximation algorithm for shortest path based on the hierarchy networks.
- Quoc V. Le, Tomás Mikolov:
Distributed Representations of Sentences and Documents. - Jianfeng Wang, Jingdong Wang, Jingkuan Song, Xin-Shun Xu, Heng Tao Shen, Shipeng Li:
Optimized Cartesian $K$-Means. - Stefano Ferretti:
On the Topology Maintenance of Dynamic P2P Overlays through Self-Healing Local Interactions. - Rukshan Alexander, Miroshan Alexander:
An ICT-Based Real-Time Surveillance System for Controlling Dengue in Sri Lanka. - Xuzhen Zhu, Hui Tian, Shi-Min Cai:
Personalized recommendation with corrected similarity. - Kristina Ban, Ivan Ivakic, Ana Mestrovic:
A preliminary study of Croatian Language Syllable Networks. - Kobi Cohen, Qing Zhao, Ananthram Swami:
Optimal Index Policies for Anomaly Localization in Resource-Constrained Cyber Systems. - Cristian Prisacariu:
Higher Dimensional Modal Logic. - Shikhar Kumar Gupta, Foram Joshi, Dixita Limbachiya, Manish K. Gupta:
3DNA: A Tool for DNA Sculpting. - Zoran Utkovski, Andrej Gajduk, Lasko Basnarkov, Darko Bosnakovski, Ljupco Kocarev:
On Energy-efficiency in Wireless Networks: A Game-theoretic Approach to Cooperation Inspired by Evolutionary Biology. - Enrico Paolini, Cedomir Stefanovic, Gianluigi Liva, Petar Popovski:
Coded Random Access: How Coding Theory Helps to Build Random Access Protocols. - Reza Azizi:
Empirical Study of Artificial Fish Swarm Algorithm. - Liang Chang, Uli Sattler, Tianlong Gu:
Algorithm for Adapting Cases Represented in a Tractable Description Logic. - Matthias Heizmann, Jochen Hoenicke, Andreas Podelski:
Termination Analysis by Learning Terminating Programs. - Parul Sharma, Anup Girdhar:
Security concerns of ipv6-slaac and security policies to diminish the risk associated with them. - Luca Bortolussi, Rytis Paskauskas:
Mean-Field approximation and Quasi-Equilibrium reduction of Markov Population Models. - Luisa F. Polanía, Rafael E. Carrillo, Manuel Blanco-Velasco, Kenneth E. Barner:
Exploiting Prior Knowledge in Compressed Sensing Wireless ECG Systems. - Joachim Jansen:
Model revision inference for extensions of first order logic. - Andrew Fish, Alexei Lisitsa:
Detecting unknots via equational reasoning, I: Exploration. - Qizhi Zhang, Deping Liu:
On the hopping pattern design for D2D Discovery. - Leopoldo E. Bertossi, Babak Salimi:
Unifying Causality, Diagnosis, Repairs and View-Updates in Databases. - Sourangsu Banerji:
Architectural Design of a RAM Arbiter. - Yannis Haralambous:
Les mathématiques de la langue : l'approche formelle de Montague. - Alejandro Serrano, Pedro López-García, Manuel V. Hermenegildo:
Resource Usage Analysis of Logic Programs via Abstract Interpretation Using Sized Types. - Mina Taheri, Nirwan Ansari:
Multi-power-level Energy Saving Management for Passive Optical Networks. - Jan A. Botha, Phil Blunsom:
Compositional Morphology for Word Representations and Language Modelling. - Pratik P. Chaphekar:
Survey of Key Distribution Schemes for Wireless Sensor Networks. - Meizhu Liu, Le Lu, Xiaojing Ye, Shipeng Yu:
Coarse-to-Fine Classification via Parametric and Nonparametric Models for Computer-Aided Diagnosis. - David B. Knoester, Heather Goldsby, Christoph Adami:
Leveraging Evolutionary Search to Discover Self-Adaptive and Self-Organizing Cellular Automata. - Akshay Gadde, Aamir Anis, Antonio Ortega:
Active Semi-Supervised Learning Using Sampling Theory for Graph Signals. - Mostafa Salehi, Rajesh Sharma, Moreno Marzolla, Danilo Montesi, Payam Siyari, Matteo Magnani:
Diffusion Processes on Multilayer Networks. - Laura M. Smith, Linhong Zhu, Kristina Lerman, Allon G. Percus:
Partitioning Networks with Node Attributes by Compressing Information Flow. - Hemant Kumar Saini, Satpal Singh Kushwaha, C. Rama Krishna:
Compressing the Data Densely by New Geflochtener to Accelerate Web. - Fei Tan, Yongxiang Xia, Boyao Zhu:
Link Prediction in Complex Networks: A Mutual Information Perspective. - Jin Tan, Dror Baron, Liyi Dai:
Wiener Filters in Gaussian Mixture Signal Estimation with Infinity-Norm Error. - Martin Haugh, Chun Wang:
Information Relaxations and Dynamic Zero-Sum Games. - Tomoyo Sasao, Shin'ichi Konomi, Masatoshi Arikawa, Hideyuki Fujita:
Touch Survey: Comparison with Paper and Web Questionnaires. - James Hegeman, Sriram V. Pemmaraju:
Lessons from the Congested Clique Applied to MapReduce. - Vijay Bhaskar Semwal, Shiv A. Katiyar, Pavan Chakraborty, Gora Chand Nandi:
Bipedal Model Based on Human Gait Pattern Parameters Bipedal Model Based on Human Gait Pattern Parameters for Sagittal Plane Movement. - Yannis Haralambous, Vitaly Klyuev:
Thematically Reinforced Explicit Semantic Analysis. - Yanjun Han, Huadong Meng, Yuan Shen, Xiao-Ping Zhang:
Performance Limits and Geometric Properties of Narrowband Array Localization. - Amaro Barreal, Camilla Hollanti, David A. Karpuk, Hsiao-feng Lu:
Algebraic Codes and a New Physical Layer Transmission Protocol for Wireless Distributed Storage Systems. - Mohammad Abu Alsheikh, Shaowei Lin, Hwee-Pink Tan, Dusit Niyato:
Area Coverage Under Low Sensor Density. - Tao Yang, Guoqiang Mao, Wei Zhang, Xiaofeng Tao:
Transport Capacity of Distributed Wireless CSMA Networks. - Shraddha Mehta, Vaishali Kalariya:
Efficient Tracking of a Moving Object using Inter-Frame Coding. - Shraddha Mehta, Vaishali Kalariya:
Real Time Object Tracking Based on Inter-frame Coding: A Review. - Sunny Mitra, Ritwik Mitra, Martin Riedl, Chris Biemann, Animesh Mukherjee, Pawan Goyal:
That's sick dude!: Automatic identification of word sense change across different timescales. - Michiel Stock, Thomas Fober, Eyke Hüllermeier, Serghei Glinca, Gerhard Klebe, Tapio Pahikkala, Antti Airola, Bernard De Baets, Willem Waegeman:
Identification of functionally related enzymes by learning-to-rank methods. - Chang Li, Jun Zhang, Martin Haenggi, Khaled Ben Letaief:
User-Centric Intercell Interference Nulling for Downlink Small Cell Networks. - Mohamed A. El-Zawawy, Mohammad N. Alanazi:
An Efficient Binary Technique for Trace Simplifications of Concurrent Programs. - Mohamed A. El-Zawawy, Mohammad N. Alanazi:
Probabilistic Alias Analysis for Parallel Programming in SSA Forms. - Yi Wang, Xuemin Zhao, Zhenlong Sun, Hao Yan, Lifeng Wang, Zhihui Jin, Liubin Wang, Yang Gao, Jia Zeng, Qiang Yang, Ching Law:
Towards Topic Modeling for Big Data. - Jan Leike, Matthias Heizmann:
Geometric Series as Nontermination Arguments for Linear Lasso Programs. - Daniel Graziotin, Xiaofeng Wang, Pekka Abrahamsson:
Software developers, moods, emotions, and performance. - Tapio Pahikkala, Michiel Stock, Antti Airola, Tero Aittokallio, Bernard De Baets, Willem Waegeman:
A two-step learning approach for solving full and almost full cold start problems in dyadic prediction. - Jin Tan, Yanting Ma, Dror Baron:
Compressive Imaging via Approximate Message Passing with Image Denoising. - Domagoj Margan, Sanda Martincic-Ipsic, Ana Mestrovic:
Preliminary Report on the Structure of Croatian Linguistic Co-occurrence Networks. - Vijay Bhaskar Semwal, Gora Chand Nandi:
Study of Humanoid Push Recovery Based on Experiments. - Guido Carlo Ferrante, Jocelyn Fiorina, Maria-Gabriella Di Benedetto:
Robustness of Time Reversal vs. All-Rake Transceivers in Multiple Access Channels. - Mohammad Abu Alsheikh, Shaowei Lin, Dusit Niyato, Hwee-Pink Tan:
Machine Learning in Wireless Sensor Networks: Algorithms, Strategies, and Applications. - Justin Shi:
On The Reproducibility and Scalability of Extreme Scale Applications. - Ofer Dekel, Jian Ding, Tomer Koren, Yuval Peres:
Online Learning with Composite Loss Functions. - Holger Dell:
A simple proof that AND-compression of NP-complete problems is hard. - Olga Muñoz, Antonio Pascual-Iserte, Josep Vidal:
Optimization of Radio and Computational Resources for Energy Efficiency in Latency-Constrained Application Offloading. - Ulrike Brandt, Hermann K.-G. Walter:
Unsolvability Cores in Classification Problems. - Xiaojiang Peng, Limin Wang, Xingxing Wang, Yu Qiao:
Bag of Visual Words and Fusion Methods for Action Recognition: Comprehensive Study and Good Practice. - Tao Ye, Tao Wang, Zhipeng Lü, Jin-Kao Hao:
A Multi-parent Memetic Algorithm for the Linear Ordering Problem. - Tao Ye, Kan Zhou, Zhipeng Lü, Jin-Kao Hao:
A Memetic Algorithm for the Linear Ordering Problem with Cumulative Costs. - Siddhartha Sarma, Samar Agnihotri, Joy Kuri:
Secure Transmission in Amplify and Forward Networks for Multiple Degraded Eavesdroppers. - Lakshmi Prabha S, T. N. Janakiraman:
Polynomial-time Approximation Algorithm for finding Highly Comfortable Team in any given Social Network. - Baoxin Xiu, Changjun Fan, Meilian Liang:
On Disjoint Golomb Rulers. - Dhruv Mahajan, S. Sathiya Keerthi, S. Sundararajan:
A Distributed Algorithm for Training Nonlinear Kernel Machines. - Dhruv Mahajan, S. Sathiya Keerthi, S. Sundararajan:
A distributed block coordinate descent method for training $l_1$ regularized linear classifiers. - Michael Benedikt, Rastislav Lenhardt, James Worrell:
Model Checking Markov Chains Against Unambiguous Buchi Automata. - Neville Grech, Kyriakos Georgiou, James Pallister, Steve Kerrison, Kerstin Eder:
Static energy consumption analysis of LLVM IR programs. - Tong Peng, Rodrigo C. de Lamare:
Adaptive Delay-Tolerant Distributed Space-Time Coding Based on Adjustable Code Matrices for Cooperative MIMO Relaying Systems. - R. Joshua Tobin, Conor J. Houghton:
A Kernel-Based Calculation of Information on a Metric Space. - Kristjan H. Greenewald, Alfred O. Hero III:
Kronecker PCA Based Spatio-Temporal Modeling of Video for Dismount Classification. - Wei Feng, Jiaya Jia, Zhi-Qiang Liu:
ESSP: An Efficient Approach to Minimizing Dense and Nonsubmodular Energy Functions. - Chao Zhang, Hong-cen Mei, Hao Yang:
A Parallel Way to Select the Parameters of SVM Based on the Ant Optimization Algorithm. - Hu Xie, Da-Zheng Feng, Ming-Dong Yuan:
Fast Adaptive Beamforming based on kernel method under Small Sample Support. - Zhenyu Huang, Yao Sun, Dongdai Lin:
On the Efficiency of Solving Boolean Polynomial Systems with the Characteristic Set Method. - Marjan Naderinejad, Mohammad Jafar Tarokh, Alireza Poorebrahimi:
Recognition and Ranking Critical Success Factors of Business Intelligence in Hospitals - Case Study: Hasheminejad Hospital. - Dalei Wu, Haiqing Wu:
Modelling Data Dispersion Degree in Automatic Robust Estimation for Multivariate Gaussian Mixture Models with an Application to Noisy Speech Processing. - Razvan Pascanu, Yann N. Dauphin, Surya Ganguli, Yoshua Bengio:
On the saddle point problem for non-convex optimization. - Bernardo Gonçalves, Fábio Porto:
$Υ$-DB: Managing scientific hypotheses as uncertain data. - Junting Chen, Vincent K. N. Lau:
Two-Tier Precoding for FDD Multi-cell Massive MIMO Time-Varying Interference Networks (Full Version). - Wanneng Shu, Wei Wang, Yunji Wang:
A novel energy-efficient resource allocation algorithm based on immune clonal optimization for green cloud computing. - Xiangyun Zhou:
Training-Based SWIPT: Optimal Power Splitting at the Receiver. - Junjie Yang, Shengli Xie, Xiangyun Zhou, Rong Yu, Yan Zhang:
A Semiblind Two-Way Training Method for Discriminatory Channel Estimation in MIMO Systems. - Evan Chou, C. Sinan Güntürk:
Distributed noise-shaping quantization: I. Beta duals of finite frames and near-optimal quantization of random measurements. - Hongbin Chen, Fangfang Zhou, Jun Cai, Zhao Feng, He Qian:
Geometric projection-based switching policy for multiple energy harvesting transmitters. - Pavel Klavík, A. Cristiano I. Malossi, Constantine Bekas, Alessandro Curioni:
Changing Computing Paradigms Towards Power Efficiency. - Rahul Vaze, Krishna P. Jagannathan:
Finite-Horizon Optimal Transmission Policies for Energy Harvesting Sensors. - Kobi Cohen, Qing Zhao:
Asymptotically Optimal Sequential Tests for Anomaly Detection: Switching with Memory. - Yuanshi Zheng, Tao Li, Long Wang:
Containment control of multi-agent systems with measurement noises. - Siu-Wing Cheng, Liam Mencel, Antoine Vigneron:
A Faster Algorithm for Computing Straight Skeletons. - Ye Yu, Chen Qian:
Space Shuffle: A Scalable, Flexible, and High-Bandwidth Data Center Network. - Athanasios Naskos, Emmanouela Stachtiari, Anastasios Gounaris, Panagiotis Katsaros, Dimitrios Tsoumakos, Ioannis Konstantinou, Spyros Sioutas:
Cloud elasticity using probabilistic model checking. - Gerardo Gómez, Lorenzo Hortiguela, Quiliano Pérez, Javier Lorca, Raquel García, Mari Carmen Aguayo Torres:
YouTube QoE Evaluation Tool for Android Wireless Terminals. - Huiyue Yi:
Local signal search enhanced RMT estimator for estimating the number of signals based on random matrix theory. - Erik Cuevas, Daniel Zaldivar, Marco Antonio Pérez Cisneros, Diego Oliva:
Block matching algorithm based on Differential Evolution for motion estimation. - Jean-François Raskin, Ocan Sankur:
Multiple-Environment Markov Decision Processes. - Justin Solomon, Keenan Crane, Adrian Butscher, Chris Wojtan:
A General Framework for Bilateral and Mean Shift Filtering. - Yacine Bouzidi, Sylvain Lazard, Guillaume Moroz, Marc Pouget, Fabrice Rouillier:
Improved algorithm for computing separating linear forms for bivariate systems. - Stefan Magureanu, Richard Combes, Alexandre Proutière:
Lipschitz Bandits: Regret Lower Bounds and Optimal Algorithms. - Devavrat Shah, John N. Tsitsiklis, Yuan Zhong:
On Queue-Size Scaling for Input-Queued Switches. - Juan Luis Valerdi, Fernando Raul Rodriguez:
Una metodología para realizar Diferenciación Automática Anidada. - Paritosh Parmar:
Use of Computer Vision to Detect Tangles in Tangled Objects. - Tianrong Lin:
Model-Checking PCTL Properties of Stateless Probabilistic Pushdown Systems. - Qixing Huang, Yuxin Chen, Leonidas J. Guibas:
Scalable Semidefinite Relaxation for Maximum A Posterior Estimation. - Jun Lin, Chenrong Xiong, Zhiyuan Yan:
A Reduced Latency List Decoding Algorithm for Polar Codes. - Prateek Dewan, Ponnurangam Kumaraguru:
It Doesn't Break Just on Twitter. Characterizing Facebook content During Real World Events. - Parvez Mahmood Khan, M. M. Sufyan Beg:
Measuring Cost of Quality (CoQ) on SDLC Projects is Indispensible for Effective Software Quality Assurance. - Safa Hamdare, Varsha Nagpurkar, Jayashri Mittal:
Securing SMS Based One Time Password Technique from Man in the Middle Attack. - Aaron Moss:
Derivatives of Parsing Expression Grammars. 180-194 - Joshua Atkins, Daniele Giacobello:
Trends and Perspectives for Signal Processing in Consumer Audio. - Meng Yue, Xiaoyu Wang:
A Revised Incremental Conductance MPPT Algorithm for Solar PV Generation Systems. - Sukhpal Singh Ghuman, Emanuele Giaquinta, Jorma Tarhio:
Alternative Algorithms for Lyndon Factorization. - Gabriel Lellouch, Amit Kumar Mishra:
Optimization of OFDM radar waveforms using genetic algorithms. - Zhen James Xiang, Yun Wang, Peter J. Ramadge:
Screening Tests for Lasso Problems. - Hubie Chen:
An Algebraic Hardness Criterion for Surjective Constraint Satisfaction. - Mishari Al Mishari, Ekin Oguz, Gene Tsudik:
Fighting Authorship Linkability with Crowdsourcing. - Adam W. Strzebonski:
Cylindrical Algebraic Decomposition Using Local Projections. - Carlos A. Freitas, Fabrício Benevenuto, Saptarshi Ghosh, Adriano Veloso:
Reverse Engineering Socialbot Infiltration Strategies in Twitter. - Shiv Ram Dubey, Anand Singh Jalal:
Adapted Approach for Fruit Disease Identification using Images. - Qiaoyang Ye, Mazin Al-Shalash, Constantine Caramanis, Jeffrey G. Andrews:
Distributed Resource Allocation in Device-to-Device Enhanced Cellular Networks. - Pili Hu, Sherman S. M. Chow, Wing Cheong Lau:
Secure Friend Discovery via Privacy-Preserving and Decentralized Community Detection. - Chenrong Xiong, Jun Lin, Zhiyuan Yan:
Symbol-Based Successive Cancellation List Decoder for Polar Codes. - Raja Giryes, Michael Elad, Alfred M. Bruckstein:
Sparsity Based Methods for Overparametrized Variational Problems. - Razen Al-Harbi, Yasser Ebrahim, Panos Kalnis:
PHD-Store: An Adaptive SPARQL Engine with Dynamic Partitioning for Distributed RDF Repositories. - Annina Bracher, Eran Hof, Amos Lapidoth:
Distributed Storage for Data Security. - Jiawei Xu, Shigang Yue, Ruisheng Wang, Chu Kiong Loo:
Perceiving Motion Cues Inspired by Microsoft Kinect Sensor on Game Experiencing. - Rongjie Yan, Chih-Hong Cheng, Guangquan Zhang, Yesheng Chai:
Formal Consistency Checking over Specifications in Natural Languages. - Francesco Romano, Daniele Pucci, Francesco Nori:
Collocated Adaptive Control of Underactuated Mechanical Systems. - Megha Arora, Raghav Gupta, Ponnurangam Kumaraguru:
Indian Premier League (IPL), Cricket, Online Social Media. - Anne-Marie Kermarrec, Christopher Thraves:
Signed graph embedding: when everybody can sit closer to friends than enemies. - Mark M. Christiansen, Ken R. Duffy, Flávio du Pin Calmon, Muriel Médard:
Quantifying the computational security of multi-user systems. - Michael G. Burke, Joan Lasenby:
Single camera pose estimation using Bayesian filtering and Kinect motion priors. - Mihai Polceanu, Cédric Buche:
Towards A Theory-Of-Mind-Inspired Generic Decision-Making Framework. - Hosein Azarbonyad, Reza Babazadeh:
A Genetic Algorithm for solving Quadratic Assignment Problem(QAP). - Erik Cuevas, Alonso Echavarría, Marte A. Ramírez-Ortegón:
An optimization algorithm inspired by the States of Matter that improves the balance between exploration and exploitation. - Lior Dikstein, Haim H. Permuter, Yossef Steinberg:
On State Dependent Broadcast Channels with Cooperation. - Richard Combes, Alexandre Proutière:
Unimodal Bandits: Regret Lower Bounds and Optimal Algorithms. - Junzhou Zhao, John C. S. Lui, Don Towsley, Pinghui Wang, Xiaohong Guan:
Design of Efficient Sampling Methods on Hybrid Social-Affiliation Networks. - Jean-Charles Faugère, Ayoub Otmani, Ludovic Perret, Frédéric de Portzamparc, Jean-Pierre Tillich:
Folding Alternant and Goppa Codes with Non-Trivial Automorphism Groups. - Michael Morak:
The Impact of Disjunction on Reasoning under Existential Rules: Research Summary. - Tanmoy Sarkar, Sugata Sanyal:
Steganalysis: Detecting LSB Steganographic Techniques. - Volker Diekert, Artur Jez, Wojciech Plandowski:
Finding All Solutions of Equations in Free Groups and Monoids with Involution. - Eli Gafni:
Set Consensus: Captured by a Set of Runs with Ramifications. - Everaldo Aguiar, Saurabh Nagrecha, Nitesh V. Chawla:
Predicting Online Video Engagement Using Clickstreams. - Ting Zhu, Yuxuan Zhu, Hong Yang, Hao Li:
Determination of Boiling Range of Xylene Mixed in PX Device Using Artificial Neural Networks. - Li-Ping Liu, Daniel Sheldon, Thomas G. Dietterich:
Gaussian Approximation of Collective Graphical Models. - Erik Cuevas, Mauricio Gonzalez, Daniel Zaldivar, Marco Antonio Pérez Cisneros:
Multi-ellipses detection on images inspired by collective animal behavior. - Martin Drohmann, Kevin Carlberg:
The ROMES method for statistical modeling of reduced-order-model error. - Erik Cuevas, Diego Oliva, Daniel Zaldivar, Marco Antonio Pérez Cisneros, Gonzalo Pajares:
Opposition Based ElectromagnetismLike for Global Optimization. - Bowei Chen, Shuai Yuan, Jun Wang:
A Dynamic Pricing Model for Unifying Programmatic Guarantee and Real-Time Bidding in Display Advertising. - Faruk Yavuz, Jun Zhao, Osman Yagan, Virgil D. Gligor:
Towards $k$-connectivity of the random graph induced by a pairwise key predistribution scheme with unreliable links. - Inaki Estella Aguerri, Deniz Gündüz:
Capacity of a Class of State-Dependent Relay Channels. - (Withdrawn) Optimization of Vehicle Dynamics based on Multibody Models using Adjoint Sensitivity Analysis.
- Narzu Tarannum, Nova Ahmed:
Efficient and Reliable Hybrid Cloud Architechture for Big Data. - Dongmo Zhang, Yan Zhang:
An Ordinal Bargaining Solution with Fixed-Point Property. - Altaf Rahman, Vincent Ng:
Narrowing the Modeling Gap: A Cluster-Ranking Approach to Coreference Resolution. - Ta Minh Thanh, Munetoshi Iwakiri:
An Incomplete Cryptography based Digital Rights Management with DCFF. - Xiaohui Huang, Xing Hu, Weichang Jiang, Zhi Yang, Hao Li:
Application of Multilayer Feedforward Neural Networks in Predicting Tree Height and Forest Stock Volume of Chinese Fir. - Alexander M. Rush, Michael Collins:
A Tutorial on Dual Decomposition and Lagrangian Relaxation for Inference in Natural Language Processing. - John Haslegrave:
Bounds on Herman's algorithm. - Khaoula Jayech, Nesrine Trimech, Mohamed Ali Mahjoub, Najoua Essoukri Ben Amara:
Dynamic Hierarchical Bayesian Network for Arabic Handwritten Word Recognition. - Anis Elbahi, Mohamed Ali Mahjoub, Mohamed Nazih Omri:
Hidden Markov Model for Inferring Learner Task Using Mouse Movement. - Stephen Makonin, Maryam H. Kashani, Lyn Bartram:
The Affect of Lifestyle Factors on Eco-Visualization Design. - Dana Dachman-Soled, Vitaly Feldman, Li-Yang Tan, Andrew Wan, Karl Wimmer:
Approximate resilience, monotonicity, and the complexity of agnostic learning. - Zoltán Ésik, Zoltán Fülöp:
Proceedings 14th International Conference on Automata and Formal Languages, AFL 2014, Szeged, Hungary, May 27-29, 2014. EPTCS 151, 2014 [contents] - Long Yu, Hongwei Liu:
The weight distribution of a family of p-ary cyclic codes. - Ricardo Queiroz de Araujo Fernandes, Edward Hermann Haeusler, Luiz Carlos Pereira:
Intuitionistic PUC-Logic for Constructive Counterfactuals. - Rabiah Ahmad, Shahrin Sahib, Muhamad Pahri Nor'Azuwa:
Effective Measurement Requirements for Network Security Management. - Hai Wang, Zhe Chen, Qingyuan Gong, Weidong Xu, Xu Zhang, Xin Wang:
Prometheus: LT Codes Meet Cooperative Transmission in Cellular Networks. - Shikha Jain:
Security Threats in MANETS : A Review. - Mahnush Movahedi, Jared Saia, Mahdi Zamani:
Secure Anonymous Broadcast. - Alon Kipnis, Andrea J. Goldsmith, Tsachy Weissman, Yonina C. Eldar:
Distortion-Rate Function of Sub-Nyquist Sampled Gaussian Sources. - Mingyue Ji, Giuseppe Caire, Andreas F. Molisch:
Fundamental Limits of Caching in Wireless D2D Networks. - Manish K. Thakur, Vikas Saxena, J. P. Gupta:
A hybrid video quality metric for analyzing quality degradation due to frame drop. - Alin Bostan, Xavier Caruso, Éric Schost:
A fast algorithm for computing the characteristic polynomial of the p-curvature. - Alin Bostan, Thierry Combot, Mohab Safey El Din:
Computing necessary integrability conditions for planar parametrized homogeneous potentials. - Raphaël Lallement, Lavindra de Silva, Rachid Alami:
HATP: An HTN Planner for Robotics. - Miguel Rodríguez-Pérez, Sergio Herrería-Alonso, Manuel Fernández-Veiga, Cándido López-García:
Improving Energy Efficiency in Upstream EPON Channels by Packet Coalescing. - Anna Harutyunyan, Tim Brys, Peter Vrancx, Ann Nowé:
Off-Policy Shaping Ensembles in Reinforcement Learning. - Miguel Rodríguez-Pérez, Sergio Herrería-Alonso, Manuel Fernández-Veiga, Cándido López-García:
The persistent congestion problem of FAST-TCP: analysis and solutions. - Miguel Rodríguez-Pérez, Sergio Herrería-Alonso, Manuel Fernández-Veiga, Cándido López-García:
Common Problems in Delay-Based Congestion Control Algorithms: A Gallery of Solutions. - Adam Kasperski, Pawel Zielinski:
Single machine scheduling problems with uncertain parameters and the OWA criterion. - Adam Kasperski, Pawel Zielinski:
Complexity of the robust weighted independent set problems on interval graphs. - Adam Kasperski, Adam Kurpisz, Pawel Zielinski:
Approximability of the robust representatives selection problem. - Kenza Hamidouche, Walid Saad, Mérouane Debbah:
Many-to-Many Matching Games for Proactive Social-Caching in Wireless Small Cell Networks. - Marie Kerjean:
Weak topologies for Linear Logic. - Erik Cuevas, Fernando Wario, Daniel Zaldivar, Marco Antonio Pérez Cisneros:
Circle detection on images using Learning Automata. - Kato Mivule:
A Codon Frequency Obfuscation Heuristic for Raw Genomic Data Privacy. - Liqi Wang, Shixin Zhu:
New quantum MDS codes derived from constacyclic codes. - Erik Cuevas, Daniel Zaldivar, Marco Antonio Pérez Cisneros, Edgar N. Sánchez, Marte A. Ramírez-Ortegón:
Robust Fuzzy corner detector. - Marcello Balduccini, William C. Regli, Duc N. Nguyen:
Towards an ASP-Based Architecture for Autonomous UAVs in Dynamic Environments (Extended Abstract). - Hosein Azarbonyad, Azadeh Shakery, Heshaam Faili:
Learning to Exploit Different Translation Resources for Cross Language Information Retrieval. - Alexey A. Melnikov, Adi Makmal, Hans J. Briegel:
Projective simulation applied to the grid-world and the mountain-car problem. - Dan Alistarh, Justin Kopinsky, Alexander Matveev, Nir Shavit:
The LevelArray: A Fast, Practical Long-Lived Renaming Algorithm. - Yannis Haralambous:
New Perspectives in Sinographic Language Processing Through the Use of Character Structure. - Robert Susik, Szymon Grabowski, Kimmo Fredriksson:
Multiple pattern matching revisited. - Marc'Aurelio Ranzato:
On Learning Where To Look. - Aditi Gupta, Ponnurangam Kumaraguru, Carlos Castillo, Patrick Meier:
TweetCred: A Real-time Web-based System for Assessing Credibility of Content on Twitter. - Yasir Q. Mohsin, Greg Ongie, Mathews Jacob:
Iterative Non-Local Shrinkage Algorithm for MR Image Reconstruction. - Dominik Kopczynski, Sven Rahmann:
Using the Expectation Maximization Algorithm with Heterogeneous Mixture Components for the Analysis of Spectrometry Data. - Tianqing Wu, Hong-Chuan Yang:
Improved Performance of RF Energy Powered Wireless Sensor Node with Cooperative Beam Selection. - V. Chitraa, Antony Selvadoss Thanamani:
Web Log Data Analysis by Enhanced Fuzzy C Means Clustering. - Sima Das:
On Local and Global Centrality in Large Scale Networks. - Bob Blakley, G. R. Blakley, Sean M. Blakley:
How to Draw Graphs: Seeing and Redrafting Large Networks in Security and Biology. - Erik Cuevas, Fernando Wario, Valentín Osuna-Enciso, Daniel Zaldivar, Marco Antonio Pérez Cisneros:
Fast algorithm for Multiple-Circle detection on images using Learning Automata. - Nianxia Cao, Swastik Brahma, Pramod K. Varshney:
Target Tracking via Crowdsourcing: A Mechanism Design Approach. - Hao Li, Dazuo Yang, Fudi Chen, Yibing Zhou, Zhilong Xiu:
Application of Artificial Neural Networks in Predicting Abrasion Resistance of Solution Polymerized Styrene-Butadiene Rubber Based Composites. - Jianhang Gao, Qing Zhao, Ananthram Swami:
Minimum Information Dominating Set for Opinion Sampling. - Jalal Mahmud, Michelle X. Zhou, Nimrod Megiddo, Jeffrey Nichols, Clemens Drews:
Recommending Targeted Strangers from Whom to Solicit Information on Social Media. - Sarah Ferguson, Brandon Luders, Robert C. Grande, Jonathan P. How:
Real-Time Predictive Modeling and Robust Avoidance of Pedestrians with Uncertain, Changing Intentions. - Mukund Raghothaman, Abhishek Udupa:
Language to Specify Syntax-Guided Synthesis Problems. - Arnaud Carayol, Matthew Hague:
Saturation algorithms for model-checking pushdown systems. 1-24 - Hermann Gruber, Markus Holzer:
From Finite Automata to Regular Expressions and Back-A Summary on Descriptional Complexity. 25-48 - Ondrej Klíma:
On Varieties of Automata Enriched with an Algebraic Structure (Extended Abstract). 49-54 - Christof Löding:
Decision Problems for Deterministic Pushdown Automata on Infinite Words. 55-73 - Sebastian Maneth:
Equivalence Problems for Tree Transducers: A Brief Survey. 74-93 - Mikhail Barash, Alexander Okhotin:
Grammars with two-sided contexts. 94-108 - Martin Berglund, Frank Drewes, Brink van der Merwe:
Analyzing Catastrophic Backtracking Behavior in Practical Regular Expression Matching. 109-123 - Henning Bordihn, Martin Kutrib, Andreas Malcher:
Measuring Communication in Parallel Communicating Finite Automata. 124-138 - Cezar Câmpeanu:
Simplifying Nondeterministic Finite Cover Automata. 162-173 - Vincent Carnino, Sylvain Lombardy:
On Determinism and Unambiguity of Weighted Two-way Automata. 188-200 - Kristína Cevorová, Galina Jirásková, Peter Mlynárcik, Matús Palmovský, Juraj Sebej:
Operations on Automata with All States Final. 201-215 - Stefano Crespi-Reghizzi, Pierluigi San Pietro:
Commutative Languages and their Composition by Consensual Methods. 216-230 - Chen Fei Du, Jeffrey O. Shallit:
Similarity density of the Thue-Morse word with overlap-free infinite binary words. 231-245 - Henning Fernau, Rudolf Freund, Markus Holzer:
Cooperating Distributed Grammar Systems of Finite Index Working in Hybrid Modes. 246-260 - László Hegedüs, Benedek Nagy:
Representations of Circular Words. 261-270 - Markus Holzer, Sebastian Jakobi:
More Structural Characterizations of Some Subregular Language Families by Biautomata. 271-285 - Milka Hutagalung, Martin Lange, Étienne Lozes:
Buffered Simulation Games for Büchi Automata. 286-300 - Andreas Maletti, Daniel Quernheim:
Hyper-Minimization for Deterministic Weighted Tree Automata. 314-326 - Maris Valdats:
Boolean Circuit Complexity of Regular Languages. 342-354 - Yuya Higashikawa, Mordecai J. Golin, Naoki Katoh:
Improved Algorithms for Multiple Sink Location Problems in Dynamic Path Networks. - Philip Schniter, Sundeep Rangan:
Compressive Phase Retrieval via Generalized Approximate Message Passing. - Samuel R. Buss, Leszek Aleksander Kolodziejczyk:
Small Stone in Pool. - Frédéric Cuppens, Alban Gabillon:
Cover Story Management. - Xiao Lu, Ping Wang, Dusit Niyato, Zhu Han:
Resource Allocation in Wireless Networks with RF Energy Harvesting and Transfer. - Tim Natusch:
Application of Lossless Data Compression Techniques to Radio Astronomy Data flows. - Lin Gao, George Iosifidis, Jianwei Huang, Leandros Tassiulas, Duozhe Li:
Bargaining-based Mobile Data Offloading. - Sandra Huber, Martin Josef Geiger, Marc Sevaux:
Interactive Reference Point-Based Guided Local Search for the Bi-objective Inventory Routing Problem. - Heike Stephan, Stefan Brass:
A Variant of Earley Deduction With Partial Evaluation. - Christian Blum, José Antonio Lozano, Pedro Pinacho Davidson:
Mathematical Programming Strategies for Solving the Minimum Common String Partition Problem. - Francesco Gadaleta, Nick Nikiforakis, Jan Tobias Mühlberg, Wouter Joosen:
HyperForce: Hypervisor-enForced Execution of Security-Critical Code. - Francesco Gadaleta, Nick Nikiforakis, Yves Younan, Wouter Joosen:
Hello rootKitty: A lightweight invariance-enforcing framework. - Lijiang Chen:
Machine Translation Model based on Non-parallel Corpus and Semi-supervised Transductive Learning. - Yan Kit Li, Min Xu, Chun-Ho Ng, Patrick P. C. Lee:
Efficient Hybrid Inline and Out-of-line Deduplication for Backup Storage. - Jörg Endrullis, Hans Zantema:
Non-termination using Regular Languages. - Victor Magron:
NLCertify: A Tool for Formal Nonlinear Optimization. - Sagar V. Ramani, Yagnik N. Tank:
Indoor Navigation on Google Maps and Indoor Localization Using RSS Fingerprinting. - Alban Gabillon:
A Logical Formalization of a Secure XML Database. - Mathieu Mangeot:
MotàMot project: conversion of a French-Khmer published dictionary for building a multilingual lexical system. - Dan Alistarh, Justin Kopinsky, Petr Kuznetsov, Srivatsan Ravi, Nir Shavit:
Inherent Limitations of Hybrid Transactional Memory. - Rolando Trujillo-Rasua, Benjamin Martin, Gildas Avoine:
Distance-bounding facing both mafia and distance frauds: Technical report. - Xueqing Huang, Nirwan Ansari:
Joint Spectrum and Power Allocation for Multi-node Cooperative Wireless Systems. - Hossein Azizpour, Stefan Carlsson:
Self-tuned Visual Subclass Learning with Shared Samples An Incremental Approach. - Arif Mahmood, Ajmal S. Mian:
Semi-supervised Spectral Clustering for Classification. - Stephen L. Reed:
Bitcoin Cooperative Proof-of-Stake. - Xueqing Huang, Tao Han, Nirwan Ansari:
On Green Energy Powered Cognitive Radio Networks. - Cristina Cano, David Malone:
Modeling, Analysis and Impact of a Long Transitory Phase in Random Access Protocols. - Michael Codish, Luís Cruz-Filipe, Michael Frank, Peter Schneider-Kamp:
Twenty-Five Comparators is Optimal when Sorting Nine Inputs (and Twenty-Nine for Ten). - Xueqing Huang, Nirwan Ansari:
Optimal Cooperative Power Allocation for Energy Harvesting Enabled Relay Networks. - (Withdrawn) Descriptor Matching with Convolutional Neural Networks: a Comparison to SIFT.
- James Cheney, Roly Perera:
An Analytical Survey of Provenance Sanitization. - Swen Jacobs:
Extended AIGER Format for Synthesis. - Samantha Leung, Edward Lui, Rafael Pass:
Voting with Coarse Beliefs. - Michele Dallachiesa, Charu C. Aggarwal, Themis Palpanas:
Node Classification in Uncertain Graphs. - Ben Pringle, Mukkai Krishnamoorthy, Kenneth Simons:
Case study to approaches to finding patterns in citation networks. - Jonathan D. Gammell, Siddhartha S. Srinivasa, Timothy D. Barfoot:
BIT*: Batch Informed Trees for Optimal Sampling-based Planning via Dynamic Programming on Implicit Random Geometric Graphs. - Juan Luis Valerdi:
Diferenciación Automática Anidada. Un enfoque algebraico. - Andreas F. Molisch, Giuseppe Caire, David Ott, Jeffrey R. Foerster, Dilip Bethanabhotla, Mingyue Ji:
Caching Eliminates the Wireless Bottleneck in Video-Aware Wireless Networks. - Prem Prakash Jayaraman, Charith Perera, Dimitrios Georgakopoulos, Arkady B. Zaslavsky:
MOSDEN: A Scalable Mobile Collaborative Platform for Opportunistic Sensing Applications. - James Atwood:
Learning to Generate Networks. - Jinchun Zhan, Namrata Vaswani, Chenlu Qiu:
Performance Guarantees for ReProCS - Correlated Low-Rank Matrix Entries Case. - Daphney-Stavroula Zois, Urbashi Mitra:
Nonlinear POMDPs for Active State Tracking with Sensing Costs. - Chantal Enguehard, Mathieu Mangeot:
Computerization of African languages-French dictionaries. - Pierre Courtieu, Lionel Rieg, Xavier Urbain, Sébastien Tixeuil:
Impossibility of Gathering, a Certification. - Bernardo Gonçalves, Fábio Porto:
Managing large-scale scientific hypotheses as uncertain data with support for predictive analytics. - Szymon Grabowski, Marcin Raniszewski:
Two simple full-text indexes based on the suffix array. - Brian de Silva, Ryan Compton:
Prediction of Foreign Box Office Revenues Based on Wikipedia Page Activity. - Ehsan Omidi:
Modeling and Nonlinear Control of Gantry Crane Using Feedback Linearization Method. - Christopher M. Poskitt, Detlef Plump:
Verifying Monadic Second-Order Properties of Graph Programs. - Kunihisa Okano, Hideaki Ishii:
Minimum data rate for stabilization of linear systems with parametric uncertainties. - Erik Cuevas, Daniel Zaldivar, Marco Antonio Pérez Cisneros, Marte A. Ramírez-Ortegón:
Polynomial trajectory algorithm for a biped robot. - Constantinos Daskalakis, S. Matthew Weinberg:
Bayesian Truthful Mechanisms for Job Scheduling from Bi-criterion Approximation Algorithms. - Jing Liu, Fei Qiao, Zhijian Ou, Huazhong Yang:
Low-complexity video encoder for smart eyes based on underdetermined blind signal separation. - Jacques Carette, William M. Farmer, Michael Kohlhase:
Realms: A Structure for Consolidating Knowledge about Mathematical Theories. - Miguel Á. Carreira-Perpiñán, Weiran Wang:
LASS: a simple assignment model with Laplacian smoothing. - Grégory Berhuy, Nadya Markin, B. A. Sethuraman:
Bounds of fast decodability of space time block codes, skew-Hermitian matrices, and Azumaya algebras. - Ejder Bastug, Mehdi Bennis, Mérouane Debbah:
Living on the Edge: The Role of Proactive Caching in 5G Wireless Networks. - Xiaoming Sun, Jia Zhang, Jialin Zhang:
Deterministic Protocol for Shared $Q$-queue $J$-choice $K$-best Secretary Problem. - Pramod Kumar Kewat, Bappaditya Ghosh, Sukhamoy Pattanayak:
Cyclic codes over the ring $ \Z_p[u, v]/\langle u^2, v^2, uv-vu\rangle$. - Hossein Rashmanlou, Madhumangal Pal:
Isometry on Interval-valued Fuzzy Graphs. - Johan Sebastian Rosenkilde Nielsen, Peter Beelen:
Sub-quadratic Decoding of One-point Hermitian Codes. - Qi Xie, Deyu Meng, Shuhang Gu, Lei Zhang, Wangmeng Zuo, Xiangchu Feng, Zongben Xu:
On the Optimal Solution of Weighted Nuclear Norm Minimization. - Joe Suzuki:
Universal Bayesian Measures and Universal Histogram Sequences. - Johann Brault-Baron, Florent Capelli, Stefan Mengel:
Understanding model counting for $β$-acyclic CNF-formulas. - Jawad Mirza, Peter J. Smith, Pawel A. Dmochowski, Mansoor Shafi:
Limited Feedback MU Massive MISO Systems with Differential TCQ in Temporally Correlated Channels. - Francesco Gadaleta, Raoul Strackx, Nick Nikiforakis, Frank Piessens, Wouter Joosen:
On the effectiveness of virtualization-based security. - Dmitry V. Lande:
Building of Networks of Natural Hierarchies of Terms Based on Analysis of Texts Corpora. - Anupam Chattopadhyay, Nilanjan Pal, Soumajit Majumder:
Ancilla-Quantum Cost Trade-off during Reversible Logic Synthesis using Exclusive Sum-of-Products. - Jacob D. Abernethy, Chansoo Lee, Abhinav Sinha, Ambuj Tewari:
Online Linear Optimization via Smoothing. - S. M. Ferdous, M. Sohel Rahman:
An Integer Programming Formulation of the Minimum Common String Partition problem. - Zongyan Huang, Matthew England, David J. Wilson, James H. Davenport, Lawrence C. Paulson:
A comparison of three heuristics to choose the variable ordering for CAD. - Matthew England, David J. Wilson, Russell J. Bradford, James H. Davenport:
Using the Regular Chains Library to build cylindrical algebraic decompositions by projecting and lifting. - Matthew England, Russell J. Bradford, James H. Davenport, David J. Wilson:
Choosing a variable ordering for truth-table invariant cylindrical algebraic decomposition by incremental triangular decomposition. - Adrian Francalanza, Edsko de Vries, Matthew Hennessy:
Compositional Reasoning for Explicit Resource Management in Channel-Based Concurrency. - Kurt Winkler, Tobias Kuhn, Martin Volk:
Evaluating the fully automatic multi-language translation of the Swiss avalanche bulletin. - Drashti H. Bhatt, Kirit R. Rathod, Shardul J. Agravat:
A Study of Local Binary Pattern Method for Facial Expression Detection. - Samy Ait-Aoudia, Roland Jégou, Dominique Michelucci:
Reduction of constraint systems. - Sunil Kumar Katiyar, P. V. Arun:
Comparative analysis of common edge detection techniques in context of object extraction. - Sunil Kumar Katiyar, P. V. Arun:
A review over the applicability of image entropy in analyses of remote sensing datasets. - Sunil Kumar Katiyar, P. V. Arun:
Cellular Automata based adaptive resampling technique for the processing of remotely sensed imagery. - P. V. Arun, Sunil Kumar Katiyar:
An evolutionary computational based approach towards automatic image registration. - Sunil Kumar Katiyar, P. V. Arun:
An enhanced neural network based approach towards object extraction. - Vladimir Aristov, Andrey Stroganov:
Development of the method of computer analogy for studying and solving complex nonlinear systems. - Phil Maguire, Philippe Moser, Rebecca Maguire, Mark T. Keane:
A Computational Theory of Subjective Probability. - Moshe Babaioff, Nicole Immorlica, Brendan Lucier, S. Matthew Weinberg:
A Simple and Approximately Optimal Mechanism for an Additive Buyer. - A. M. Raid, W. M. Khedr, Mohamed A. El-Dosuky, Wesam Ahmed:
Jpeg Image Compression Using Discrete Cosine Transform - A Survey. - M. Majid Butt, Eduard A. Jorswieck, Amr Mohamed:
Energy Efficient Multiuser Scheduling: Statistical Guarantees on Bursty Packet Loss. - Natalia Silberstein:
Fractional Repetition Batch Codes. - Mariano Tepper, Guillermo Sapiro:
A Bi-clustering Framework for Consensus Problems. - Ali Rakhshan, Evan Ray, Hossein Pishro-Nik:
Real-Time Estimation of the Distribution of Brake Response Times for an Individual Driver Using Vehicular Ad Hoc Network. - Alan Gray, Kevin Stratford:
targetDP: an Abstraction of Lattice Based Parallelism with Portable Performance. - Borui Li, Chundi Mu, Tao Wang, Qian Peng:
Revised Version of a JCIT Paper-Comparison of Feature Point Extraction Algorithms for Vision Based Autonomous Aerial Refueling. - Ion Androutsopoulos, Gerasimos Lampouras, Dimitrios Galanis:
Generating Natural Language Descriptions from OWL Ontologies: the NaturalOWL System. - D. Sachin Kumar, P. R. Seshadri, N. Vaishnav, Saraswathi Janaki:
Real Time Speckle Image De-Noising. - Spits Warnars:
Human Face as human single identity. - Takeshi Takahashi, Youki Kadobayashi, Hiroyuki Fujiwara:
Ontological Approach toward Cybersecurity in Cloud Computing. - Atul Singh Kushwah, Sachin Manglasheril:
Performance Estimation of 2*3 MIMO-MC-CDMA in Rayleigh Fading Channel. - Atul Singh Kushwah, Sachin Manglasheril:
Performance Estimation of 2*3 MIMO-MC-CDMA using Convolution Code. - Marghny H. Mohamed, Rasha M. Abd El-Aziz, Ahmed I. Taloba:
An Effective Evolutionary Clustering Algorithm: Hepatitis C Case Study. - (Withdrawn) Adaptive Minimum-Maximum Exclusive Mean Filter for Impulse Noise Removal.
- Md. Tarek Habib, Rahat Hossain Faisal, M. Rokonuzzaman, Farruk Ahmed:
Automated Fabric Defect Inspection: A Survey of Classifiers. - Mehdi Bahrami, Peyman Arebi, Hosseyn Bakhshizadeh, Hamed Barangi:
A Novel Self-Recognition Method for Autonomic Grid Networks Case Study: Advisor Labor Law Software Application. - Alireza Khoshkbarforoushha, Pooyan Jamshidi, Mahdi Fahmideh Gholami, Lizhe Wang, Rajiv Ranjan:
Metrics for BPEL Process Reusability Analysis in a Workflow System. - Benyuan Liu:
Py-oopsi: the python implementation of the fast-oopsi algorithm. - Pavankumar Tallapragada, Jorge Cortés:
Event-Triggered Stabilization of Linear Systems Under Bounded Bit Rates. - Mianxiong Dong, He Li, Kaoru Ota, Haojin Zhu:
HVSTO: Efficient Privacy Preserving Hybrid Storage in Cloud Data Center. - Mohammed Bakri Bashir, Muhammad Shafie Abdul Latif, Shafii Muhammad Abdulhamid, Cheah Tek Loon:
Grid-based Search Technique for Massive Academic Publications. - Akshai Aggarwal, Savita Gandhi, Nirbhay Chaubey, Naren Tada, Srushti Trivedi:
NDTAODV: Neighbor Defense Technique for Ad Hoc On-Demand Distance Vector(AODV) to mitigate flood attack in MANETS. - Tanveer Ahmad, Yan tian feng:
An improved accelerated frame slotted aloha (afsa) algorithm for tag collision in rfid. - Nevin Vunka Jungum, Razvi Doomun, Soulakshmee D. Ghurbhurrun, Sameerchand Pudaruth:
Collaborative Driving Support System in Mobile Pervasive Environments. - Maguy Trefois, Jean-Charles Delvenne:
Zero forcing number, constraint matchings and strong structural controllability. - Fangfang Li, Guandong Xu, Longbing Cao:
Coupled Item-based Matrix Factorization. - Edmundo de Souza e Silva, Rosa Maria Meri Leão, Daniel Sadoc Menasché, Don Towsley:
Scalability Issues in P2P Systems. - Ingo Wolf, Tobias Schröder, Jochen Neumann, Gerhard de Haan:
Changing minds about electric cars: An empirically grounded agent-based modeling approach. - Shahrouz Sharifi, Ahmet Korhan Tanc, Tolga M. Duman:
On LDPC Codes for Gaussian Interference Channels. - John C. Bowers:
Computing the Straight Skeleton of a Simple Polygon from its Motorcycle Graph in Deterministic O(n log n) Time. - Mayank Bansal, Kostas Daniilidis:
Geometric Polynomial Constraints in Higher-Order Graph Matching. - Xudong Ma:
Write-Once-Memory Codes by Source Polarization. - Hemalata A. Gosavi, Manish R. Umale:
Public Auditing and Data Dynamics for Storage Security in Cloud Computing. - Dong Liang, Shun'ichi Kaneko:
Improvements and Experiments of a Compact Statistical Background Model. - Daoyuan Wu, Xiapu Luo, Rocky K. C. Chang:
A Sink-driven Approach to Detecting Exposed Component Vulnerabilities in Android Apps. - David M. S. Rodrigues, Vitorino Ramos:
Traversing News with Ant Colony Optimisation and Negative Pheromones. - Konstantinos Poularakis, Leandros Tassiulas:
Exploiting User Mobility for Wireless Content Delivery. - Djallel Bouneffouf:
Étude des dimensions spécifiques du contexte dans un système de filtrage d'informations. - Ahmed H. Yousef:
Cross-Language Personal Name Mapping. - Fulvio Forni, Rodolphe Sepulchre:
Differentially positive systems. - Aditya Gopalan, Constantine Caramanis, Sanjay Shakkottai:
Wireless Scheduling with Partial Channel State Information: Large Deviations and Optimality. - Nikhil Krishnan, Dror Baron, Mehmet Kivanç Mihçak:
A Parallel Two-Pass MDL Context Tree Algorithm for Universal Source Coding. - Renato P. dos Santos:
Second Life: game, simulator, or serious game? - Thomas Seiller:
Interaction Graphs: Graphings. - Parvez Mahmood Khan, M. M. Sufyan Beg:
Application of Sizing Estimation Techniques for Business Critical Software Project Management. - Stefanos Nikolaidis, Keren Gu, Ramya Ramakrishnan, Julie A. Shah:
Efficient Model Learning for Human-Robot Collaborative Tasks. - Pawel Kaftan:
A more efficient algorithm for an NP-complete problem. - Nima Noorshams, Aravind Iyengar:
A Novel Stochastic Decoding of LDPC Codes with Quantitative Guarantees. - Yi Liu, Chau Yuen, Xianghui Cao, Naveed Ul L. Hassan, Jiming Chen:
Design of A Scalable Hybrid MAC Protocol for Heterogeneous M2M Networks. - Huda Ibeid, Rio Yokota, David E. Keyes:
A Performance Model for the Communication in Fast Multipole Methods on HPC Platforms. - Ben Ruijl, Jos Vermaseren, Aske Plaat, H. Jaap van den Herik:
HEPGAME and the Simplification of Expressions. - Clemens Grabmayer, Vincent van Oostrom:
Nested Term Graphs. 48-65 - Johannes Stegmann:
Research at UNIS - The University Centre in Svalbard. A bibliometric study. - Jeya Pradha J., Sanket S. Kalamkar, Adrish Banerjee:
Energy Harvesting Cognitive Radio with Channel-Aware Sensing Strategy. - Junjian Qi, Kai Sun:
Power System Dynamic State Estimation by Unscented Kalman Filter with Guaranteed Positive Semi-definite State Covariance. - Ali Mansouri, Mohamed Salim Bouhlel:
Exact values for the Grundy number of some graphs. - Ali Mansouri, Mohamed Salim Bouhlel:
Results for grundy number of the complement of bipartite graphs. - Yanwei Fu:
Multi-view Metric Learning for Multi-view Video Summarization. - Ahmed Abdel-Hadi, Awais Khawar, T. Charles Clancy:
Optimal Downlink Power Allocation in Cellular Networks. - Weiran Wang, Miguel Á. Carreira-Perpiñán:
The role of dimensionality reduction in linear classification. - Ahmed Abdel-Hadi, T. Charles Clancy:
An Optimal Resource Allocation with Joint Carrier Aggregation in 4G-LTE. - Jeong Ho Yeo, Joon Ho Cho, James S. Lehnert:
Joint Transmitter and Receiver Optimization for Improper-Complex Second-Order Stationary Data Sequence. - Yuansi Chen, Julien Mairal, Zaïd Harchaoui:
Fast and Robust Archetypal Analysis for Representation Learning. - Wentan Yi, Shaozhen Chen:
Integral Cryptanalysis of the Block Cipher E2. - Bohar Singh, Pawan Luthra:
Review of Linpack and Cloudsim on VMM. - Lei Gai, Wei Chen, Zhichao Xu, Changhe Qiu, Tengjiao Wang:
Towards Efficient Path Query on Social Network with Hybrid RDF Management. - Edmond Awad, Richard Booth, Fernando Tohmé, Iyad Rahwan:
Judgment Aggregation in Multi-Agent Argumentation. - Dan Stowell, Mark D. Plumbley:
Automatic large-scale classification of bird sounds is strongly improved by unsupervised feature learning. - Paridhi Jain, Ponnurangam Kumaraguru:
@I to @Me: An Anatomy of Username Changing Behavior on Twitter. - Zai Yang, Lihua Xie:
Continuous Compressed Sensing With a Single or Multiple Measurement Vectors. - Yongjie Yang:
Election Attacks with Few Candidates. - Fabio Cuzzolin, Diana Mateus, Radu Horaud:
Robust Temporally Coherent Laplacian Protrusion Segmentation of 3D Articulated Bodies. - Stephan Friedrichs, Michael Hemmer, Christiane Schmidt:
A PTAS for the continuous 1.5D Terrain Guarding Problem. - Wei Huang, Jian Lou, Zhonghua Wen:
Allocating Indivisible Resources under Price Rigidities in Polynomial Time. - Wei Huang, Jian Lou, Zhonghua Wen:
A Parallel Elicitation-Free Protocol for Allocating Indivisible Goods. - Zai Yang, Lihua Xie:
Exact Joint Sparse Frequency Recovery via Optimization Methods. - Christiane L. Kameni Ngassa, Valentin Savin, Elsa Dupraz, David Declercq:
Density Evolution and Functional Threshold for the Noisy Min-Sum Decoder. - (Withdrawn) Portable Camera-Based Product Label Reading For Blind People.
- Krzysztof Wojtas, Krzysztof Magiera, Tomasz Miasko, Piotr Faliszewski:
Possible Winners in Noisy Elections. - Binnan Zhuang, Dongning Guo, Michael L. Honig:
Traffic Driven Resource Allocation in Heterogenous Wireless Networks. - André Murbach Maidl, Sérgio Medeiros, Fabio Mascarenhas, Roberto Ierusalimschy:
Error Reporting in Parsing Expression Grammars. - Carlos Luis González-Valiente, Magda León Santos, Zoia Rivera:
El egresado de la carrera Ciencias de la Información y su inserción en la gestión de mercadotecnia. - Divyajyothi M. G., Rachappa, D. H. Rao:
A scenario based approach for dealing with challenges in a pervasive computing environment. - Suma Dawn, Vikas Saxena, Bhudev Sharma:
Cognitive-mapping and contextual pyramid based Digital Elevation Model Registration and its effective storage using fractal based compression. - Andreas M. Tillmann:
On the Computational Intractability of Exact and Approximate Dictionary Learning. - Puneet Singh Ludu:
Inferring gender of a Twitter user using celebrities it follows. - Viliam Geffert, Abuzer Yakaryilmaz:
Classical automata on promise problems. - Richard Moot:
Hybrid Type-Logical Grammars, First-Order Linear Logic and the Descriptive Inadequacy of Lambda Grammars. - Thierry Poibeau:
Optimality Theory as a Framework for Lexical Acquisition. - Piotr Plonski, Krzysztof Zaremba:
Visualizing Random Forest with Self-Organising Map. - Arash Asadi, Peter Jacko, Vincenzo Mancuso:
Modeling Multi-mode D2D Communications in LTE. - Glenn Lawyer:
Understanding the spreading power of all nodes in a network: a continuous-time perspective. - Karima Haddou ou Moussa, Ute Sondergeld, Philipp Mayr, Peter Mutschke, Marc Rittberger:
Assessing Educational Research - An Information Service for Monitoring a Heterogeneous Research Field. - Mahboobeh Houshmand, Morteza Saheb Zamani, Mehdi Sedighi, Mona Arabzadeh:
Decomposition of Diagonal Hermitian Quantum Gates Using Multiple-Controlled Pauli Z Gates. - Christoph Trabert, Andreas Ulbig, Göran Andersson:
Model Predictive Frequency Control Employing Stability Constraints. - Sridhar Mahadevan, Bo Liu, Philip S. Thomas, William Dabney, Stephen Giguere, Nicholas Jacek, Ian Gemp, Ji Liu:
Proximal Reinforcement Learning: A New Theory of Sequential Decision Making in Primal-Dual Spaces. - Dongmyoung Kim, Taejun Park, Hyoil Kim, Sunghyun Choi:
Load Balancing in Two-Tier Cellular Networks with Open and Hybrid Access Femtocells. - Panos P. Markopoulos, George N. Karystinos, Dimitrios A. Pados:
Optimal Algorithms for L1-subspace Signal Processing. - Kyatsandra G. Nagananda, Shalinee Kishore, Rick S. Blum:
A PMU Scheduling Scheme for Transmission of Synchrophasor Data in Electric Power Systems. - Vitaly Feldman, Pravesh Kothari:
Agnostic Learning of Disjunctions on Symmetric Distributions. - Uma Gupta:
Research On Permanent Magnet BLDC for small electric vehicle. - François Fouquet, Grégory Nain, Brice Morin, Erwan Daubert, Olivier Barais, Noël Plouzeau, Jean-Marc Jézéquel:
Kevoree Modeling Framework (KMF): Efficient modeling techniques for runtime use. - Javier Esparza, Philipp Hoffmann:
Negotiation Games. - Hiba Zaidi:
Mobile Application for GBAS Air Traffic Status Unit. - Haiko Lietz, Claudia Wagner, Arnim Bleier, Markus Strohmaier:
When Politicians Talk: Assessing Online Conversational Practices of Political Parties on Twitter. - Yushu Zhang, Kwok-Wo Wong, Leo Yu Zhang, Di Xiao:
Robust Coding of Encrypted Images via Structural Matrix. - Mostafa Salehi, Hamid R. Rabiee:
A Measurement Framework for Directed Networks. - Kenya Ueno:
Exact Algorithms for 0-1 Integer Programs with Linear Equality Constraints. - Szymon Grabowski, Sebastian Deorowicz, Lukasz Roguski:
Disk-based genome sequencing data compression. - Fabian Schuh, Johannes B. Huber:
Low Complexity Decoding for Higher Order Punctured Trellis-Coded Modulation Over Intersymbol Interference Channels. - Renato P. dos Santos, Waldir L. Roque:
On the design of an expert help system for computer algebra systems. - Rasmus Troelsgård, Bjørn Sand Jensen, Lars Kai Hansen:
A Topic Model Approach to Multi-Modal Similarity. - Juho Lauri, Melissa S. Keranen:
Computing Minimum Rainbow and Strong Rainbow Colorings of Block Graphs. - Truls Pedersen, Sjur K. Dyrkolbotn, Piotr Kazmierczak:
Big, but not unruly: Tractable norms for anonymous game structures. - Benjamin Larrousse, Samson Lasaulce:
Coded Power Control: Performance Analysis. - Michele Peroli, Luca Viganò, Matteo Zavatteri:
Non-collaborative Attackers and How and Where to Defend Flawed Security Protocols (Extended Version). - Ivan Ivek:
Supervised Dictionary Learning by a Variational Bayesian Group Sparse Nonnegative Matrix Factorization. - Omid Aghazadeh, Stefan Carlsson:
Large Scale, Large Margin Classification using Indefinite Similarity Measures. - Jürgen Christ, Jochen Hoenicke:
Weakly Equivalent Arrays. - Amelia Jane Gully, Rodrigo C. de Lamare:
Sparsity-Aware Filtered-X Affine Projection Algorithms for Active Noise Control. - Qi Zhang, Shi Jin, Kai-Kit Wong, Hongbo Zhu, Michail Matthaiou:
Power Scaling of Uplink Massive MIMO Systems with Arbitrary-Rank Channel Means. - János Farkas, Stephen Haddock, Panagiotis Saltsidis:
Software Defined Networking Supported by IEEE 802.1Q. - Waqar Ahmad, Osman Hasan, Sofiène Tahar, Mohammad Salah Hamdi:
Towards the Formal Reliability Analysis of Oil and Gas Pipelines. - Alessandro Checco, Douglas J. Leith:
Fast, Responsive Decentralised Graph Colouring. - Isabel Méndez-Díaz, Graciela L. Nasini, Daniel E. Severín:
An exact DSatur-based algorithm for the Equitable Coloring Problem. - Jeremy Avigad, Johannes Hölzl, Luke Serafin:
A formally verified proof of the Central Limit Theorem. - Robby G. McKilliam, Alex J. Grant, I. Vaughan L. Clarkson:
Finding a closest point in a lattice of Voronoi's first kind. - Isabel Méndez-Díaz, Graciela L. Nasini, Daniel E. Severín:
A tabu search heuristic for the Equitable Coloring Problem. - Thomas Steinke, Salil P. Vadhan, Andrew Wan:
Pseudorandomness and Fourier Growth Bounds for Width 3 Branching Programs. - Tao Luo, Zaifeng Shi:
An FPGA-based Parallel Architecture for Face Detection using Mixed Color Models. - Asiri Rathnayake, Hayo Thielecke:
Static Analysis for Regular Expression Exponential Runtime via Substructural Logics. - Vilém Vychodil:
On minimal sets of graded attribute implications. - Ronedo Ferreira, Waldir A. Moreira, Paulo Mendes, Mario Gerla, Eduardo Cerqueira:
Improving the Delivery Rate of Digital Inclusion Applications for Amazon Riverside Communities by Using an Integrated Bluetooth DTN Architecture. - Raef Bassily, Adam D. Smith, Abhradeep Thakurta:
Private Empirical Risk Minimization, Revisited. - Konrad K. Dabrowski, Daniël Paulusma:
Clique-width of Graph Classes Defined by Two Forbidden Induced Subgraphs. - Alexander M. Powell, J. Tyler Whitehouse:
Error bounds for consistent reconstruction: random polytopes and coverage processes. - Srinivasan Venkatramanan, Anurag Kumar:
Influence Spread in Social Networks: A Study via a Fluid Limit of the Linear Threshold Model. - Tim Althoff, Hyun Oh Song, Trevor Darrell:
Detection Bank: An Object Detection Based Video Representation for Multimedia Event Recognition. - Karl Wimmer, Yi Wu, Peng Zhang:
Optimal query complexity for estimating the trace of a matrix. - Ryan A. Rossi, Nesreen K. Ahmed:
Role Discovery in Networks. - Samir Lemes:
Održavanje računarskih sistema. - Ernst-Erich Doberkat, Pedro Sánchez Terraf:
Stochastic Nondeterminism and Effectivity Functions. - Vimalkumar Jeyakumar, Mohammad Alizadeh, Yilong Geng, Changhoon Kim, David Mazières:
Millions of Little Minions: Using Packets for Low Latency Network Programming and Visibility. - Margreta Kuijper, Anna-Lena Trautmann:
Iterative List-Decoding of Gabidulin Codes via Gröbner Based Interpolation. - Scott West, Sebastian Nanz, Bertrand Meyer:
Efficient and Reasonable Object-Oriented Concurrency. - Jun Zhu, Robert Schober, Vijay K. Bhargava:
Secure Transmission in Multi-Cell Massive MIMO Systems. - Lin Gao, Jianwei Huang, Ying-Ju Chen, Biying Shou:
Combining Spot and Futures Markets: A Hybrid Market Approach to Dynamic Spectrum Access. - Katsutoshi Yoshida, Shigeki Matsumoto, Yoichi Matsue:
Artificial Wrestling: A Dynamical Formulation of Autonomous Agents Fighting in a Coupled Inverted Pendula Framework. - Young-Ho Eom, Pablo Aragón, David Laniado, Andreas Kaltenbrunner, Sebastiano Vigna, Dima Shepelyansky:
Interactions of cultures and top people of Wikipedia from ranking of 24 language editions. - Toby Walsh:
The PeerRank Method for Peer Assessment. - Maria Prandini, Simone Garatti, Riccardo Vignali:
Performance assessment and design of abstracted models for stochastic hybrid systems through a randomized approach. - Linh Anh Nguyen, Joanna Golinska-Pilarek:
ExpTime Tableaux with Global Caching for the Description Logic SHOQ. - Erik Cuevas, Felipe Sención-Echauri, Daniel Zaldivar, Marco Antonio Pérez Cisneros, Humberto Sossa:
A Multi-threshold Segmentation Approach Based on Artificial Bee Colony Optimization. - Hüseyin Yigitler, Riku Jäntti, Ossi Kaltiokallio:
Detecting Human-induced Reflections using RSS of Narrowband Wireless Transceivers. - Erik Cuevas, Noé Ortega-Sánchez, Daniel Zaldivar, Marco Antonio Pérez Cisneros:
Circle detection by Harmony Search Optimization. - Uwe Egly, Martin Kronegger, Florian Lonsing, Andreas Pfandler:
Conformant Planning as a Case Study of Incremental QBF Solving. - Meng-Lin Ku, Yan Chen, K. J. Ray Liu:
Data-Driven Stochastic Models and Policies for Energy Harvesting Sensor Communications. - Motahareh Eslami Mehdiabadi, Hamid R. Rabiee, Mostafa Salehi:
Sampling from Diffusion Networks. - Matteo Interlandi, Letizia Tanca:
On the CALM Principle for Bulk Synchronous Parallel Computation. - A. A. Waskita, Heru Suhartanto, P. D. Persadha, Laksana Tri Handoko:
A simple statistical analysis approach for Intrusion Detection System. - Ricardo Queiroz de Araujo Fernandes, Edward Hermann Haeusler, Luiz Carlos Pereira:
PUC-Logic embedding of Lewis' Deontic Logics. - Christian T. Jacobs, Alexandros Avdis, Gerard J. Gorman, Matthew D. Piggott:
PyRDM: A Python-based library for automating the management and online publication of scientific software and data. - Peter Novák, Cees Witteveen:
On the cost-complexity of multi-context systems. - Calvin C. Newport:
Radio Network Lower Bounds Made Easy. - Daniel J. Fremont, Sanjit A. Seshia:
Speeding Up SMT-Based Quantitative Program Analysis. - Guangmo Tong, Cong Liu:
Supporting Soft Real-Time Sporadic Task Systems on Heterogeneous Multiprocessors with No Utilization Loss. - Omer Nebil Yaveroglu, Sean M. Fitzhugh, Maciej Kurant, Athina Markopoulou, Carter T. Butts, Natasa Przulj:
ergm.graphlets: A Package for ERG Modeling Based on Graphlet Statistics. - Bing Wang, Yao-hua Meng, Xiao Hong Yu:
Radial basis function process neural network training based on generalized frechet distance and GA-SA hybrid strategy. - Carlos E. Laciana, G. Gual, D. Kalmus, Nicolas Oteiza Aguirre, Santiago L. Rovere:
Diffusion of two brands in competition: cross-brand effect. - Erik Cuevas, Daniel Zaldivar, Marco Antonio Pérez Cisneros:
Seeking multi-thresholds for image segmentation with Learning Automata. - Erik Cuevas, Daniel Zaldivar, Marco Antonio Pérez Cisneros, Marte A. Ramírez-Ortegón:
Circle detection using Discrete Differential Evolution Optimization. - Niel de Beaudrap:
On the power of "modal quantum" computation. - Ali Mansouri, Mohamed Salim Bouhlel:
Coloration de nombre de Grundy pour les graphes triangulés. - Oktay Arslan, Evangelos A. Theodorou, Panagiotis Tsiotras:
Information-Theoretic Stochastic Optimal Control via Incremental Sampling-based Algorithms. - Kalpit V. Desai, Roopesh Ranjan:
Insights from the Wikipedia Contest (IEEE Contest for Data Mining 2011). - Vivekananda Gayen, Kamal Sarkar:
An HMM Based Named Entity Recognition System for Indian Languages: The JU System at ICON 2013. - Valentín Osuna-Enciso, Erik Cuevas, Humberto Sossa:
A Comparison of Nature Inspired Algorithms for Multi-threshold Image Segmentation. - Dengkui Zhu, Boyu Li, Ping Liang:
Power Allocation for Precoding in Large-Scale MU-MIMO Systems with Per-Antenna Constraint. - Alex Biryukov, Dmitry Khovratovich, Ivan Pustogarov:
Deanonymisation of clients in Bitcoin P2P network. - Edward Schmerling, Lucas Janson, Marco Pavone:
Optimal Sampling-Based Motion Planning under Differential Constraints: the Drift Case with Linear Affine Dynamics. - Jos Wetzels:
Broken keys to the kingdom: Security and privacy aspects of RFID-based car keys. - Ruben Martinez-Cantin:
BayesOpt: A Bayesian Optimization Library for Nonlinear Optimization, Experimental Design and Bandits. - Hieu Duy Nguyen, Rui Zhang, Sumei Sun:
Improper Signaling for Symbol Error Rate Minimization in K-User Interference Channel. - Jingbo Liu, Paul Cuff, Sergio Verdú:
Key Capacity with Limited One-Way Communication for Product Sources. - Gérard Favier, André L. F. de Almeida:
Overview of Constrained PARAFAC Models. - Tugba Erpek, Ahmed Abdel-Hadi, T. Charles Clancy:
An Optimal Application-Aware Resource Block Scheduling in LTE. - Tim Althoff, Damian Borth, Jörn Hees, Andreas Dengel:
Analysis and Forecasting of Trending Topics in Online Media Streams. - Bharat Adsul, Jinesh Machchhar, Milind A. Sohoni:
Incorporating Sharp Features in the General Solid Sweep Framework. - Jayadev Acharya, Ashkan Jafarpour, Alon Orlitsky, Ananda Theertha Suresh:
Universal Compression of Envelope Classes: Tight Characterization via Poisson Sampling. - Michael G. Gowanlock, Henri Casanova:
Technical Report: Parallel Distance Threshold Query Processing for Spatiotemporal Trajectory Databases on the GPU. - Anna-Lena Trautmann, Emanuele Viterbo:
Cross-Error Correcting Integer Codes over Z2m. - Andreas Klöckner:
Loo.py: transformation-based code generation for GPUs and CPUs. - Dibya Jyoti Bora, Anil Kumar Gupta:
Effect of Different Distance Measures on the Performance of K-Means Algorithm: An Experimental Study in Matlab. - Nils Ole Tippenhauer, William G. Temple, An Hoa Vu, Binbin Chen, David M. Nicol, Zbigniew Kalbarczyk, William H. Sanders:
Automatic Generation of Security Argument Graphs. - Lin Wang, Fa Zhang, Kai Zheng, Athanasios V. Vasilakos, Shaolei Ren, Zhiyong Liu:
Energy-Efficient Flow Scheduling and Routing with Hard Deadlines in Data Center Networks. - Mustafa Abdul Jabbar, Rio Yokota, David E. Keyes:
Asynchronous Execution of the Fast Multipole Method Using Charm++. - Paola Bonizzoni, Anna Paola Carrieri, Gianluca Della Vedova, Gabriella Trucco:
Algorithms for the Constrained Perfect Phylogeny with Persistent Characters. - Jörg Endrullis, Dimitri Hendriks, Jan Willem Klop, Andrew Polonsky:
An Introduction to the Clocked Lambda Calculus. - Deepali Virmani, Vikrant Malhotra, Ridhi Tyagi:
Aspect Based Sentiment Analysis to Extract Meticulous Opinion Value. - Paola Bonizzoni, Gianluca Della Vedova, Yuri Pirola, Marco Previtali, Raffaella Rizzi:
Constructing String Graphs in External Memory. - Tao Zhang, Jerod Michel, Tao Feng, Gennian Ge:
On the Existence of Certain Optimal Self-Dual Codes with Lengths Between 74 and 116. - Hai Thanh Nguyen, Jérémie Mary, Philippe Preux:
Cold-start Problems in Recommendation Systems via Contextual-bandit Algorithms. - Michael Sapienza, Fabio Cuzzolin, Philip H. S. Torr:
Feature sampling and partitioning for visual vocabulary generation on large action classification datasets. - Michael Gr. Voskoglou, Abdel-Badeeh M. Salem:
Analogy-Based and Case-Based Reasoning: Two sides of the same coin. - Bin Li, Tian-Tsong Ng, Xiaolong Li, Shunquan Tan, Jiwu Huang:
JPEG Noises beyond the First Compression Cycle. - Marco Baldi, Nicola Maturo, Eugenio Montali, Franco Chiaraluce:
AONT-LT: a Data Protection Scheme for Cloud and Cooperative Storage Systems. - Michal Jastrzebski:
On total communication complexity of collapsing protocols for pointer jumping problem. - Nicola Cufaro Petroni:
Entropy and its discontents: A note on definitions. - Dejanira Araiza-Illan, Kerstin Eder, Arthur Richards:
Formal Verification of Control Systems Properties with Theorem Proving. - David Bruce Wilson, Uri Zwick:
A forward-backward single-source shortest paths algorithm. - Billy Peralta:
Simultaneous Feature and Expert Selection within Mixture of Experts. - Rubi Kambo, Amit Yerpude:
Classification of Basmati Rice Grain Variety using Image Processing and Principal Component Analysis. - Abbas Bradai, Toufik Ahmed, Samir Medjiah:
QoE assessment for SVC streaming in ENVISION. - Motahareh Eslami Mehdiabadi, Hamid R. Rabiee, Mostafa Salehi:
Diffusion-Aware Sampling and Estimation in Information Diffusion Networks. - Lorenzo Rosasco, Andrea Tacchetti, Silvia Villa:
Regularization by Early Stopping for Online Learning Algorithms. - Hajime Ishihara:
Classical propositional logic and decidability of variables in intuitionistic propositional logic. - Max Sklar:
Fast MLE Computation for the Dirichlet Multinomial. - Maben Rabi, Chithrupa Ramesh, Karl Henrik Johansson:
Separated design of encoder and controller for networked linear quadratic optimal control. - Farshad Merrikh-Bayat, Seyedeh-Nafiseh Mirebrahimi, Mohammad-Reza Khalili:
Discrete-Time Fractional-Order PID Controller: Definition, Tuning, Digital Realization and Experimental Results. - Reza Mosayebi, Hamidreza Arjmandi, Amin Gohari, Masoumeh Nasiri-Kenari, Urbashi Mitra:
Receivers for Diffusion-Based Molecular Communication: Exploiting Memory and Sampling Rate. - (Withdrawn) No Superluminal Signaling Implies Unconditionally Secure Bit Commitment.
- Siamak Yousefi, Xiao-Wen Chang, Benoît Champagne:
Mobile Localization in Non-Line-of-Sight Using Constrained Square-Root Unscented Kalman Filter. - Sivaram Ambikasaran, Michael O'Neil:
Fast symmetric factorization of hierarchical matrices with applications. - Hovhannes Tananyan, Rafayel R. Kamalian:
On Simultaneous 2-locally-balanced 2-partition for Two Forests with Same Vertices. - Ilya Dumer, Alexey A. Kovalev, Leonid P. Pryadko:
Numerical Techniques for Finding the Distances of Quantum Codes. - Manlio De Domenico, Vincenzo Nicosia, Alex Arenas, Vito Latora:
Layer aggregation and reducibility of multilayer interconnected networks. - Marc Manzano, Eusebi Calle, Jordi Ripoll, Anna Manolova Fagertun, Victor Torres-Padrosa, Sakshi Pahwa, Caterina M. Scoglio:
Epidemic and Cascading Survivability of Complex Networks. - Brian Karrer, Mark E. J. Newman, Lenka Zdeborová:
Percolation on sparse networks. - Neil Robertson, Paul D. Seymour, Robin Thomas:
Girth six cubic graphs have Petersen minors. - Abdou Abdel-Rehim, Constantia Alexandrou, Nikos Anastopoulos, G. Koutsou, Ioannis Liabotis, N. Papadopoulou:
PLQCD library for Lattice QCD on multi-core machines. - Tao Wang, Yaqiong Zhang:
Further result on acyclic chromatic index of planar graphs. - Marcel Ausloos, Herbert Dawid, Ugo Merlone:
Spatial interactions in agent-based modeling. - Daniel E. Quevedo, Wann-Jiun Ma, Vijay Gupta:
Anytime Control using Input Sequences with Markovian Processor Availability. - Yichao Zhang, M. A. Aziz-Alaoui, Cyrille Bertelle, Shi Zhou, Wenting Wang:
Fence-sitters Protect Cooperation in Complex Networks. - Yichao Zhang, M. A. Aziz-Alaoui, Cyrille Bertelle, Shi Zhou, Wenting Wang:
Emergence of Cooperation in Non-scale-free Networks. - Steven H. Low:
Convex Relaxation of Optimal Power Flow, Part I: Formulations and Equivalence. - Steven H. Low:
Convex Relaxation of Optimal Power Flow, Part II: Exactness. - Manlio De Domenico, Mason A. Porter, Alex Arenas:
Multilayer Analysis and Visualization of Networks. - Kobi Kremnizer, André Ranchin:
Integrated Information-induced quantum collapse. - Jinhyuk Yun, Pan-Jun Kim, Hawoong Jeong:
Anatomy of Scientific Evolution. - James Belk, Collin Bleak:
Some undecidability results for asynchronous transducers and the Brin-Thompson group 2V. - Samuel Vaiter, Gabriel Peyré, Jalal Fadili:
Partly Smooth Regularization of Inverse Problems. - Mai Quyen Pham, Laurent Duval, Caroline Chaux, Jean-Christophe Pesquet:
A Primal-Dual Proximal Algorithm for Sparse Template-Based Adaptive Filtering: Application to Seismic Multiple Removal. - Shmuel Onn:
Huge Multiway Table Problems. - Wilhelmiina Hämäläinen:
New tight approximations for Fisher's exact test. - Hang-Hyun Jo, Young-Ho Eom:
Generalized friendship paradox in networks with tunable degree-attribute correlation. - Mustafa Khandwawala:
Belief propagation for minimum weight many-to-one matchings in the random complete graph. - Dong Huang, Jian-Huang Lai, Chang-Dong Wang:
Combining Multiple Clusterings via Crowd Agreement Estimation and Multi-Granularity Link Analysis. - Alexander I. Barvinok:
Computing the permanent of (some) complex matrices. - Mustafa Khandwawala:
Solutions to recursive distributional equations for the mean-field TSP and related problems. - Yingbo Zhou:
Learning Deep Autoencoders without Layer-wise Training. - Isabel N. Figueiredo, Carlos F. Leal, Giuseppe Romanazzi, Björn Engquist:
An Homogenization Model for Aberrant Crypt Foci. - M. E. J. Newman, Travis Martin:
Equitable random graphs. - Chris Heunen, Jamie Vicary, Linde Wester:
Mixed quantum states in higher categories. 304-315 - Yakov Babichenko, Omer Tamuz:
Graphical potential games. - Pierre Gaillard, Paul Baudin:
A consistent deterministic regression tree for non-parametric prediction of time series. - Baokui Wang, Zhenhua Pei, Long Wang:
Evolutionary dynamics of cooperation on interdependent networks with Prisoner's Dilemma and Snowdrift Game. - Antti Kuusisto:
Some Turing-Complete Extensions of First-Order Logic. 4-17 - Ming Yuan, Cun-Hui Zhang:
On Tensor Completion via Nuclear Norm Minimization. - Sen Pei, Lev Muchnik, José S. Andrade Jr., Zhiming Zheng, Hernán A. Makse:
Searching for superspreaders of information in real-world social media. - Mai H. Hassan, Md. Jahangir Hossain:
Cooperative Beamforming for Cognitive Radio-Based Broadcasting Systems with Asynchronous Interferences. - Meghdad Ghari:
Tableau Proof Systems for Justification Logics. - Jesse Alama:
Dialogues for proof search. - Wei Wang, Ming Tang, Hui Yang, Younghae Do, Ying-Cheng Lai, GyuWon Lee:
Asymmetrically interacting spreading dynamics on complex layered networks. - Laurent Fournier:
Merchant Sharing Towards a Zero Marginal Cost Economy. - Ken Yamamoto, Yoshihiro Yamazaki:
Structure and modeling of the network of two-Chinese-character compound words in the Japanese language. - Li-Xin Wang:
Gaussian-Chain Filters for Heavy-Tailed Noise with Application to Detecting Big Buyers and Big Sellers in Stock Market. - Mikolaj Bojanczyk, Christoph Dittmann, Stephan Kreutzer:
Decomposition Theorems and Model-Checking for the Modal $μ$-Calculus. - James Brofos:
A Hybrid Monte Carlo Architecture for Parameter Optimization. - Mohsen A. Bakouri:
Sensorless Physiological Control of Implantable Rotary Blood Pumps for Heart Failure Patients Using Modern Control Techniques. - Long Tran-Thanh, Jia Yuan Yu:
Functional Bandits. - Salman Beigi:
Maximal Entanglement - A New Measure of Entanglement. - Elena Nogina:
On Logic of Formal Provability and Explicit Proofs. - Hiroki Suyari, Antonio Maria Scarfone:
$α$-divergence derived as the generalized rate function in a power-law system. - Elham Azizi, James E. Galagan, Edoardo M. Airoldi:
Learning modular structures from network data and node variables. - Joshua Mason Joseph, Javier Vélez, Nicholas Roy:
Structural Return Maximization for Reinforcement Learning. - Akshay Balsubramani:
Sharp Uniform Martingale Concentration Bounds. - Prashanth L. A.:
Policy Gradients for CVaR-Constrained MDPs. - Benjamin A. Burton:
The cusped hyperbolic census is complete. - Akira Matsuo, Keisuke Fujii, Nobuyuki Imoto:
A quantum algorithm for additive approximation of Ising partition functions. - Peilin Zhao, Tong Zhang:
Accelerating Minibatch Stochastic Gradient Descent using Stratified Sampling. - Felix X. Yu, Sanjiv Kumar, Yunchao Gong, Shih-Fu Chang:
Circulant Binary Embedding. - Justo Puerto, Federico Perea:
On two solution concepts in a class of multicriteria games. - Xin Zhang:
The edge chromatic number of outer-1-planar graphs. - Taylor B. Arnold, Ryan J. Tibshirani:
Efficient Implementations of the Generalized Lasso Dual Path Algorithm. - Emilie Kaufmann, Olivier Cappé, Aurélien Garivier:
On the Complexity of A/B Testing. - Anastasios Kyrillidis, Rabeeh Karimi Mahabadi, Quoc Tran-Dinh, Volkan Cevher:
Scalable sparse covariance estimation via self-concordance. - Rafael Izbicki, Rafael Bassi Stern:
Learning with many experts: model selection and sparsity. - Ronald Hochreiter, Christoph Waldhauser:
Effects of Sampling Methods on Prediction Quality. The Case of Classifying Land Cover Using Decision Trees. - Thomas Nowak, Bernadette Charron-Bost:
An Overview of Transience Bounds in Max-Plus Algebra. - Akihiro Munemasa, Yoshio Sano, Tetsuji Taniguchi:
On the smallest eigenvalues of the line graphs of some trees. - Sylvia Wenmackers, Danny E. P. Vanpoucke, Igor Douven:
Probability of Inconsistencies in Theory Revision: A multi-agent model for updating logically interconnected beliefs under bounded confidence. - Olivier Nicol, Jérémie Mary, Philippe Preux:
Improving offline evaluation of contextual bandit algorithms via bootstrapping techniques. - Giorgio Corani, Andrea Mignatti:
Credal Model Averaging for classification: representing prior ignorance and expert opinions. - Tilman J. Sumpf, Andreas Petrovic, Martin Uecker, Florian Knoll, Jens Frahm:
Fast T2 Mapping with Improved Accuracy Using Undersampled Spin-echo MRI and Model-based Reconstructions with a Generating Function. - Vasyl Choliy:
DDscat.C++ User and programmer guide. - Bob Coecke:
Terminality implies non-signalling. 27-35 - Åsmund Ervik, Svend Tollak Munkejord, Bernhard Müller:
Extending a serial 3D two-phase CFD code to parallel execution over MPI by using the PETSc library for domain decomposition. - Michael Joswig, Frank H. Lutz, Mimi Tsuruga:
Heuristics for Sphere Recognition. - Berk Ustun, Cynthia Rudin:
Methods and Models for Interpretable Linear Classification. - Theodore P. Pavlic, Alyssa M. Adams, Paul C. W. Davies, Sara Imari Walker:
Self-referencing cellular automata: A model of the evolution of information control in biological systems. - Didier Sornette, Thomas Maillart, Giacomo Ghezzi:
How Much is the Whole Really More than the Sum of its Parts? 1+1 = 2.5: Superlinear Productivity in Collective Group Actions. - Stanislav Sobolevsky, Izabela Sitko, Sebastian Grauwin, Remi Tachet des Combes, Bartosz Hawelka, Juan Murillo Arias, Carlo Ratti:
Mining Urban Performance: Scale-Independent Classification of Cities Based on Individual Economic Transactions. - Fei Tan, Yongxiang Xia:
The robust-yet-fragile nature of interdependent networks. - Mingsheng Ying:
Quantum Recursion and Second Quantisation: Basic Ideas and Examples. - Clara Granell, Sergio Gómez, Alex Arenas:
Competing spreading processes on multiplex networks: awareness and epidemics. - Achraf Mallat, Sinan Gezici, Davide Dardari, Luc Vandendorpe:
Statistics of the MLE and Approximate Upper and Lower Bounds - Part 2: Threshold Computation and Optimal Signal Design. - Annette Pressman, Kai Hock:
Zgoubi: A startup guide for the complete beginner. - Sébastien Bubeck:
Theory of Convex Optimization for Machine Learning. - Gamaliel Percino, Peter Klimek, Stefan Thurner:
Instrumentational complexity of music genres and why simplicity sells. - Maxime Lenormand, Antònia Tugores, Pere Colet, José J. Ramasco:
Tweets on the road. - Ante Custic, Bettina Klinz, Gerhard J. Woeginger:
Planar 3-dimensional assignment problems with Monge-like cost arrays. - Giovanni Tumolo, Luca Bonaventura:
An accurate and efficient numerical framework for adaptive numerical weather prediction. - Dan Stahlke:
Quantum source-channel coding and non-commutative graph theory. - Robert Krone:
Numerical Hilbert functions for Macaulay2. - Olivier Fercoq, Zheng Qu, Peter Richtárik, Martin Takác:
Fast Distributed Coordinate Descent for Non-Strongly Convex Losses. - Atanu Kumar Ghosh, Arnab Chakraborty:
Compressive Sampling Using EM Algorithm. - Dimitris Bertsimas, J. Daniel Griffith, Vishal Gupta, Mykel J. Kochenderfer, Velibor V. Misic, Robert J. Moss:
A Comparison of Monte Carlo Tree Search and Mathematical Optimization for Large Scale Dynamic Resource Allocation. - Krikamol Muandet, Kenji Fukumizu, Bharath K. Sriperumbudur, Arthur Gretton, Bernhard Schölkopf:
Kernel Mean Shrinkage Estimators. - Marco Formentin, Alberto Lovison, Amos Maritan, Giovanni Zanzotto:
Universal activity pattern in human interactive dynamics. - Eduardo Ruiz Duarte, Octavio Páez Osuna:
Explicit endomorphism of the Jacobian of a hyperelliptic function field of genus 2 using base field operations. - Peng Luo, Yongli Li, Chong Wu:
Towards Cost-efficient Sampling Methods. - Roman V. Belavkin:
Asymmetry of Risk and Value of Information. - Anshumali Shrivastava, Ping Li:
Asymmetric LSH (ALSH) for Sublinear Time Maximum Inner Product Search (MIPS). - Michail Vlachos, Nikolaos M. Freris, Anastasios Kyrillidis:
Compressive Mining: Fast and Optimal Data Mining in the Compressed Domain. - Ales Ziberna:
Blockmodeling of multilevel networks. - Vasyl Palchykov, Kimmo Kaski, János Kertész:
Transmission of cultural traits in layered ego-centric networks. - Rahul Jain, Zhaohui Wei, Penghui Yao, Shengyu Zhang:
Approximate and Multipartite Quantum Correlation (Communication) Complexity. - V. Kandiah, Bertrand Georgeot, Olivier Giraud:
Move ordering and communities in complex networks describing the game of go. - Jukka-Pekka Onnela, Benjamin N. Waber, Alex Pentland, Sebastian Schnorf, David Lazer:
Using sociometers to quantify social interaction patterns. - Jing Yang, Lingli Xia, Maosheng Xiong:
Weight Distributions of a Class of Cyclic Codes with Arbitrary Number of Zeros II. - Yuichiro Fujiwara:
Instantaneous Quantum Channel Estimation during Quantum Information Processing. - Hiroki Sayama:
Four Classes of Morphogenetic Collective Systems. - Claus-Peter Wirth:
Herbrand's Fundamental Theorem: The Historical Facts and their Streamlining. - Renato P. dos Santos:
Second Life Physics: Virtual, real, or surreal? - Renato P. dos Santos:
Big Data as a Mediator in Science Teaching: A Proposal. - Renato P. dos Santos:
TATI - A Logo-like interface for microworlds and simulations for physics teaching in Second Life. - Gerhard Kurz, Igor Gilitschenski, Uwe D. Hanebeck:
Efficient Evaluation of the Probability Density Function of a Wrapped Normal Distribution. - Matthew O. Jackson, Stephen M. Nei:
Networks of Military Alliances, Wars, and International Trade. - David Morales-Jiménez, Raymond H. Y. Louie, Matthew R. McKay, Yang Chen:
Multiple-Antenna Signal Detection in Cognitive Radio Networks with Multiple Primary User Signals. - Enrique Mallada, Randy A. Freeman, Ao Tang:
Distributed Synchronization of Heterogeneous Oscillators on Networks with Arbitrary Topology. - Enrique Mallada, Xiaoqiao Meng, Michel Hack, Li Zhang, Ao Tang:
Skewless Network Clock Synchronization Without Discontinuity: Convergence and Performance. - Jörg Arndt:
Subset-lex: did we miss an order? - Andrew F. Magee, Michael R. May, Brian R. Moore:
The Dawn of Open Access to Phylogenetic Data. - Wei Sun, Xingye Qiao, Guang Cheng:
Nearest Neighbor Classifier with Optimal Stability. - Philippe Besse:
Statistique et Big Data Analytics; Volumétrie, L'Attaque des Clones. - Renato P. dos Santos:
Second Life as a Platform for Physics Simulations and Microworlds: An Evaluation. - Andrew R. Conway, Anthony J. Guttmann:
On the growth rate of 1324-avoiding permutations. - Zhuowen Tu, Piotr Dollár, Yingnian Wu:
Layered Logic Classifiers: Exploring the 'And' and 'Or' Relations. - Takayuki Kihara, Arno Pauly:
Point degree spectra of represented spaces. - Márton Karsai, Gerardo Iñiguez, Kimmo Kaski, János Kertész:
Complex contagion process in spreading of online innovation. - Bogdan Dumitrescu:
Faster Alternatives to the Randomized Extended Kaczmarz Algorithm. - Andrea Jiménez, Martin Loebl:
Directed cycle double covers and cut-obstacles. - Laszlo Gyongyosi:
Multidimensional Manifold Extraction for Multicarrier Continuous-Variable Quantum Key Distribution. - Max Kuhn:
Futility Analysis in the Cross-Validation of Machine Learning Models. - Philip Vos Fellman, Roxana Wright:
Modeling Terrorist Networks, Complex Systems at the Mid-range. - Greg Reid, Fei Wang, Wenyuan Wu:
Geometric involutive bases for positive dimensional polynomial ideals and SDP methods. - Francesco Becattini, Arnab Chatterjee, Santo Fortunato, Marija Mitrovic, Raj Kumar Pan, Pietro Della Briotta Parolo:
The Nobel Prize delay. - Abidin Kaya, Bahattin Yildiz, Irfan Siap:
New extremal binary self-dual codes from F_4 + uF_4-lifts of quadratic double circulant codes over F_4. - Michael R. Smith, Andrew White, Christophe G. Giraud-Carrier, Tony R. Martinez:
An Easy to Use Repository for Comparing and Improving Machine Learning Algorithm Usage. - Jacob D. Biamonte, Jason Morton, Jacob W. Turner:
Tensor Network Contractions for #SAT. - Marco Frailis, Stefano Sartor, Andrea Zacchei, Marcello Lodi, Roberto Cirami, Fabio Pasian, Massimo Trifoglio, Andrea Bulgarelli, Fulvio Gianotti, Enrico Franceschi, Luciano Nicastro, Vito Conforti, Andrea Zoli, Ricky Smart, Roberto Morbidelli, Mauro Dadina:
DAS: a data management system for instrument tests and operations. - Jürgen Sturm, Cyrill Stachniss, Wolfram Burgard:
A Probabilistic Framework for Learning Kinematic Models of Articulated Objects. - Yannai A. Gonczarowski, Noam Nisan, Rafail Ostrovsky, Will Rosenbaum:
A Stable Marriage Requires Communication. - David L. Chen, Joohyun Kim, Raymond J. Mooney:
Training a Multilingual Sportscaster: Using Perceptual Context to Learn Language. - Sophia Katrenko, Pieter W. Adriaans, Maarten van Someren:
Using Local Alignments for Relation Recognition. - Nina Narodytska, Toby Walsh:
The Computational Impact of Partial Votes on Strategic Voting. - Sukru Burc Eryilmaz, Duygu Kuzum, Rakesh Gnana David Jeyasingh, SangBum Kim, Matthew BrightSky, Chung Lam, H.-S. Philip Wong:
Experimental Demonstration of Array-level Learning with Phase Change Synaptic Devices. - Sajan Goud Lingala, Edward DiBella, Mathews Jacob:
Deformation corrected compressed sensing (DC-CS): a novel framework for accelerated dynamic MRI. - Elsayed Ahmed, Ahmed M. Eltawil, Zhouyuan Li, Bedri A. Cetiner:
Full-Duplex Systems Using Multi-Reconfigurable Antennas. - Andrey Rybalchenko:
(Quantified) Horn Constraint Solving for Program Verification and Synthesis. - Hooyeon Lee, Yoav Shoham:
Stable Invitations. - Branislav Kveton, Zheng Wen, Azin Ashkan, Michal Valko:
Learning to Act Greedily: Polymatroid Semi-Bandits. - Suma Dawn, Vikas Saxena, Bhu Dev Sharma:
DEM Registration and Error Analysis using ASCII values. - André van Schaik, Jonathan Tapson:
Online and Adaptive Pseudoinverse Solutions for ELM Weights. - Jonathan Tapson, André van Schaik:
ELM Solutions for Event-Based Systems. - Chandranath Adak:
OPTICS Based Coverage in Wireless Sensor Network. - Ovidiu-Andrei Schipor:
Improving Computer Assisted Speech Therapy Through Speech Based Emotion Recognition. - Ovidiu-Andrei Schipor, Felicia Florentina Giza-Belciug, Stefan Gheorghe Pentiuc, Cristian-Eduard Belciug, Titus-Marian Nestor:
Software Package with Exercises for Therapy of Children with Dyslalia. - Ziv Goldfeld, Haim H. Permuter, Gerhard Kramer:
Duality of a Source Coding Problem and the Semi-Deterministic Broadcast Channel with Rate-Limited Cooperation. - Vladimir Kolmogorov, Michal Rolínek:
Superconcentrators of Density 25.3. - Ginés Dólera Tormo, Félix Gómez Mármol, Gregorio Martínez Pérez:
ROMEO: ReputatiOn Model Enhancing OpenID Simulator. - Nitesh A. Funde, P. R. Pardhi:
Analysis Of Possible Attack On AODV Protocol In MANET. - Farid M. Ablayev, Aida Gainutdinova, Kamil Khadiev, Abuzer Yakaryilmaz:
Very narrow quantum OBDDs and width hierarchies for classical OBDDs. - Kostas P. Peppas, Martin Zamkotsian, Fotis I. Lazarakis, Panayotis G. Cottis:
Asymptotic Error Performance Analysis of Spatial Modulation under Generalized Fading. - Peter Mutschke, Andrea Scharnhorst, Christophe Guéret, Philipp Mayr, Preben Hansen, Aida Slavic:
Knowledge Maps and Information Retrieval (KMIR). - Yixin Cao, Dániel Marx:
Chordal Editing is Fixed-Parameter Tractable. - Ovidiu-Andrei Schipor, Felicia Florentina Giza:
Vocal signal digital processing. Instrument for analog to digital conversion study. - Priya Bajaj, Supriya Raheja:
A Vague Improved Markov Model Approach for Web Page Prediction. - Priya Bajaj, Supriya Raheja:
Integrating Vague Association Mining with Markov Model. - Alex Eftimiades:
Kahler: An Implementation of Discrete Exterior Calculus on Hermitian Manifolds. - Mina Kemiha:
Empirical mode decomposition and normalshrink tresholding for speech denoising. - Brijnesh J. Jain:
Flip-Flop Sublinear Models for Graphs: Proof of Theorem 1. - Nataliia Stulova, José F. Morales, Manuel V. Hermenegildo:
Towards Assertion-based Debugging of Higher-Order (C)LP Programs. - Carsten Gottschlich, Dominic Schuhmacher:
The Shortlist Method for Fast Computation of the Earth Mover's Distance and Finding Optimal Solutions to Transportation Problems. - Peter D. Turney:
Semantic Composition and Decomposition: From Recognition to Generation. - Christos Boutsidis, David P. Woodruff:
Optimal CUR Matrix Decompositions. - Petr Jancar:
Bisimulation Equivalence of First-Order Grammars. - Shruti Jadon, Anubhav Singhal, Suma Dawn:
Military Simulator - A Case Study of Behaviour Tree and Unity based architecture. - George Teodoro, Tony Pan, Tahsin M. Kurç, Jun Kong, Lee A. D. Cooper, Scott Klasky, Joel H. Saltz:
Region Templates: Data Representation and Management for Large-Scale Image Analysis. - Julien Henry, Mihail Asavoae, David Monniaux, Claire Maïza:
How to Compute Worst-Case Execution Time by Optimization Modulo Theory and a Clever Encoding of Program Semantics. - Faruk Karaaslan:
Neutrosophic soft sets with applications in decision making. - Ercan Canhasi:
Multi-layered graph-based multi-document summarization model. - José Ricardo Furlan Ronqui, Gonzalo Travieso:
Analyzing complex networks through correlations in centrality measurements. - Theja Tulabandhula, Cynthia Rudin:
Generalization Bounds for Learning with Linear, Polygonal, Quadratic and Conic Side Knowledge. - Zimo Yang, Defu Lian, Nicholas Jing Yuan, Xing Xie, Yong Rui, Tao Zhou:
Indigenization of Urban Mobility. - Namgil Lee, Andrzej Cichocki:
Fundamental Tensor Operations for Large-Scale Data Analysis in Tensor Train Formats. - Enrique Burgos, Laura Hernández, Horacio Ceva, Roberto P. J. Perazzo:
Entropic determination of the phase transition in a coevolving opinion-formation model. - Ludvig Bohlin, Alcides Viamontes Esquivel, Andrea Lancichinetti, Martin Rosvall:
Robustness of journal rankings by network flows with different amounts of memory. - Edward Dobson, Ademir Hujdurovic, Martin Milanic, Gabriel Verret:
Vertex-transitive CIS graphs. - Romeo Ortega, Elena Panteley:
When is a Parameterized Controller Suitable for Adaptive Control? - Marius Buliga:
Zipper logic. - Nobuyuki Matsumoto, Yuta Michimura, Yoichi Aso, Kimio Tsubono:
An optically trapped mirror for reaching the standard quantum limit. - Xiangru Xu, Yiguang Hong:
Leader-following Consensus of Multi-agent Systems over Finite Fields. - Richard W. Kenyon, Charles Radin, Kui Ren, Lorenzo Sadun:
Multipodal Structure and Phase Transitions in Large Constrained Graphs. - Jason Morton:
Belief propagation in monoidal categories. 262-269
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.