default search action
CoRR, September 2010
- Dimitrios Panagopoulos:
A secret sharing scheme using groups. - Xin Liu, Xiaowei Yang, Yong Xia:
NetFence: Preventing Internet Denial of Service from Inside Out. - David Eppstein, Maarten Löffler, Elena Mumford, Martin Nöllenburg:
Optimal 3D Angular Resolution for Low-Degree Graphs. - Boyu Li, Ender Ayanoglu:
Golden Coded Multiple Beamforming. - Gokarna Sharma, Costas Busch:
A Competitive Analysis for Balanced Transactional Memory Workloads. - Wei Yang, Lihua Li, Gang Wu, Haifeng Wang, Ying Wang:
Joint Uplink and Downlink Relay Selection in Cooperative Cellular Networks. - Wei Yang, Lihua Li, Gang Wu, Haifeng Wang:
Joint Relay Selection and Link Adaptation for Distributed Beamforming in Regenerative Cooperative Networks. - (Withdrawn) Energy-Efficient Transmission Schemes in Cooperative Cellular Systems.
- Emanuel Diamant:
Not only a lack of right definitions: Arguments for a shift in information-processing paradigm. - Wei Yang, Lihua Li, Wanlu Sun:
Energy-Efficient Relay Selection and Optimal Relay Location in Cooperative Cellular Networks with Asymmetric Traffic. - Erin W. Chambers, David Eppstein, Michael T. Goodrich, Maarten Löffler:
Drawing Graphs in the Plane with a Prescribed Outer Face and Polynomial Area. - Arslan Shaukat, Ke Chen:
Emotional State Categorization from Speech: Machine vs. Human. - Arslan Shaukat, Ke Chen:
Exploring Language-Independent Emotional Acoustic Features via Feature Selection. - Telmo L. T. Menezes, Camille Roth, Jean-Philippe Cointet:
Precursors and Laggards: An Analysis of Semantic Temporal Relationships on a Blog Network. - Philippe Chassaing, Jean Mairesse:
A non-ergodic PCA with a unique invariant measure. - Amnon H. Eden, Epameinondas Gasparis:
Three Controlled Experiments in Software Engineering with the Two-Tier Programming Toolkit: Final Report. - Rémy Belmonte, Martin Vatshelle:
On graph classes with logarithmic boolean-width. - Wei Pan, Manuel Cebrián, Wen Dong, Taemie Kim, Alex Pentland:
Modeling Dynamical Influence in Human Interaction Patterns. - Ketan Mulmuley:
Explicit Proofs and The Flip. - Flavio Rizzolo, Iluju Kiringa, Rachel Pottinger, Kwok Wong:
The Conceptual Integration Modeling Framework: Abstracting from the Multidimensional Model. - Marián Boguñá, Fragkiskos Papadopoulos, Dmitri V. Krioukov:
Sustaining the Internet with Hyperbolic Mapping. - Christos Dimitrakakis, Aikaterini Mitrokotsa, Serge Vaudenay:
Expected loss analysis of thresholded authentication protocols in noisy conditions. - Maxim Raginsky:
Empirical processes, typical sequences and coordinated actions in standard Borel spaces. - Edith Elkind, Piotr Faliszewski, Arkadii M. Slinko:
Rationalizations of Condorcet-Consistent Rules via Distances of Hamming Type. - Yu-Chih Huang, Krishna R. Narayanan:
Joint Source-Channel Coding with Correlated Interference. - Sleiman Rabah, Jiang Li, Mingzhi Liu, Yuanwei Lai:
Comparative Studies of 10 Programming Languages within 10 Diverse Criteria -- a Team 7 COMP6411-S10 Term Report. - Jun Liu, Jieping Ye:
Fast Overlapping Group Lasso. - Xi Chen, Shang-Hua Teng:
A Complexity View of Markets with Social Influence. - Andreas Schutt, Thibaut Feydy, Peter J. Stuckey, Mark G. Wallace:
Solving the Resource Constrained Project Scheduling Problem with Generalized Precedences by Lazy Clause Generation. - Tomás Feder, Pavol Hell, David G. Schell, Juraj Stacho:
Dichotomy for tree-structured trigraph list homomorphism problems. - Sandeep Singh Rawat, Lakshmi Rajamani:
Discovering potential user browsing behaviors using custom-built apriori algorithm. - V. I. Ilyevsky:
The concept of an order and its application for research of the deterministic chains of symbols. - Tansu Alpcan, Holger Boche, Siddharth Naik:
A Unified Mechanism Design Framework for Networked Systems. - Rahmat Widia Sembiring, Jasni Mohamad Zain, Abdullah Embong:
Clustering high dimensional data using subspace and projected clustering algorithms. - Hussein Al-Bahadili, Khalid Kaabneh:
Analyzing the performance of probabilistic algorithm in noisy manets. - Hussein Al-Bahadili, Rami Jaradat:
Performance Evaluation of an OMPR Algorithm for Route Discovery in Noisy MANETs. - Khalid Nawaz, Alejandro P. Buchmann:
Acdmcp: An adaptive and completely distributed multi-hop clustering protocol for wireless sensor networks. - Nazim Burak Karahanoglu, Hakan Erdogan:
A* Orthogonal Matching Pursuit: Best-First Search for Compressed Sensing Signal Recovery. - Wided Oueslati, Jalel Akaichi:
Mobile Information Collectors' Trajectory Data Warehouse Design. - Murat Kayri, Ozlem Cakir:
An Applied Study on Educational Use of Facebook as a Web 2.0 Tool: The Sample Lesson of Computer Networks and Communication. - Thanasis Balafoutis, Anastasia Paparrizou, Kostas Stergiou:
Experimental Evaluation of Branching Schemes for the CSP. - Yuan Liu, Meixia Tao, Bin Li, Hui Shen:
Optimization Framework and Graph-Based Approach for Relay-Assisted Bidirectional OFDMA Cellular Networks. - Dipa Dixit, Jayant Gadge:
Automatic Recommendation for Online Users Using Web Usage Mining. - Albert Sunny, Joy Kuri, Saurabh Aggarwal:
Delay Modelling for a Single-hop Wireless Mesh Network under Light Aggregate Traffic. - Fabien Tencé, Cédric Buche, Pierre De Loor, Olivier Marc:
The Challenge of Believability in Video Games: Definitions, Agents Models and Imitation Learning. - Yevgeny Seldin:
A PAC-Bayesian Analysis of Graph Clustering and Pairwise Clustering. - Fabien Tencé, Cédric Buche:
Automatable Evaluation Method Oriented toward Behaviour Believability for Video Games. - Jeffrey G. Andrews, François Baccelli, Radha Krishna Ganti:
A Tractable Approach to Coverage and Rate in Cellular Networks. - Omid David-Tabibi, Moshe Koppel, Nathan S. Netanyahu:
Optimizing Selective Search in Chess. - Rahul Srivastava, Can Emre Koksal:
Basic Tradeoffs for Energy Management in Rechargeable Sensor Networks. - Zhiheng Zhou, Liang Zhou, Xing Wang, Yuanquan Tan:
Encoded packet-Assisted Rescue Approach to Reliable Unicast in Wireless Networks. - Christian A. Duncan, David Eppstein, Michael T. Goodrich, Stephen G. Kobourov, Martin Nöllenburg:
Lombardi Drawings of Graphs. - Christian A. Duncan, David Eppstein, Michael T. Goodrich, Stephen G. Kobourov, Martin Nöllenburg:
Drawing Trees with Perfect Angular Resolution and Polynomial Area. - P. Samundiswary, D. Sathian, Perumal Dananjayan:
Secured Greedy Perimeter Stateless Routing for Wireless Sensor Networks. - Louis Dorard, John Shawe-Taylor:
Gaussian Process Bandits for Tree Search. - Alessandro Nordio, Carla-Fabiana Chiasserini:
Field Reconstruction in Sensor Networks with Coverage Holes and Packet Losses. - Sakthivel Subramaniam, R. Lakshmipathi:
Weighted Attribute Fusion Model for Face Recognition. - Kalpana Sharma, Anurag S. Rathor, S. R. Biradar, Mrinal Kanti Ghose:
Power-efficient Routing & Increased Yield Approach For WSNs. - Nikolai T. Stoianov, Veselina Aleksandrova:
The E-net model for the Risk Analysis and Assessment System for the Information Security of Communication and Information Systems ("Defining" Subsystem). - Marko A. Rodriguez, Jennifer H. Watkins:
Grammar-Based Geodesics in Semantic Networks. - Carsten Ihlemann, Viorica Sofronie-Stokkermans:
System Description: H-PILoT (Version 1.9). - Andreas Kendziorra, Stefan E. Schmidt:
Network coding with modular lattices. - Amir Daneshgar, Ramin Javadi:
On Complexity of Isoperimetric Problems on Trees. - Felix Krahmer, Rachel A. Ward:
New and improved Johnson-Lindenstrauss embeddings via the Restricted Isometry Property. - David Eppstein, Michael T. Goodrich, Darren Strash, Lowell Trott:
Extended h-Index Parameterized Data Structures for Computing Dynamic Subgraph Statistics. - Charlie C. L. Wang, Yong Chen:
Layered Depth-Normal Images: a Sparse Implicit Representation of Solid Models. - Gerard Briscoe, Paolo Dini:
Towards Autopoietic Computing. - Geevarghese Philip, Venkatesh Raman, Yngve Villanger:
A Quartic Kernel for Pathwidth-One Vertex Deletion. - Jan Olaf Blech, Anton Hattendorf, Jia Huang:
Towards a Property Preserving Transformation from IEC 61131-3 to BIP. - Hamed khataeimaragheh, Hassan Rashidi:
A Novel Watermarking Scheme for Detecting and Recovering Distortions in Database Tables. - Jin-Li Guo:
Empirical study and modeling of human behaviour dynamics of comments on Blog posts. - Sajal Kabiraj, Vinay Topkar, R. C. Walke:
Going Green: A Holistic Approach to Transform Business. - M. Emre Celebi, Hassan A. Kingravi, Fatih Celiker:
Fast Color Space Transformations Using Minimax Approximations. - Mugurel Ionut Andreica, Andrei Dragus, Ana-Delia Sambotin, Nicolae Tapus:
Brief Announcement: Decentralized Construction of Multicast Trees Embedded into P2P Overlay Networks based on Virtual Geometric Coordinates. - R. Srikant:
Online Advertisement, Optimization and Stochastic Networks. - Han Xiao Wen:
Knowledge Recognition Algorithm enables P = NP. - Yongbin Zheng, Chunhua Shen, Richard I. Hartley, Xinsheng Huang:
Effective Pedestrian Detection Using Center-symmetric Local Binary/Trinary Patterns. - Farnood Merrikh-Bayat, Saeed Bagheri Shouraki:
Memristor Crossbar-based Hardware Implementation of Fuzzy Membership Functions. - Zvika Ben-Haim, Yonina C. Eldar:
Near-Oracle Performance of Greedy Block-Sparse Estimation Techniques from Noisy Measurements. - Bonnie Kirkpatrick, Yakir Reshef, Hilary K. Finucane, Haitao Jiang, Binhai Zhu, Richard M. Karp:
Algorithms for Comparing Pedigree Graphs. - Lorentz Jäntschi, Sorana D. Bolboaca, Mugur C. Balan, Radu E. Sestras:
Results of Evolution Supervised by Genetic Algorithms. - B. K. Pradeepa, Joy Kuri:
Aggregate AP Throughputs for Long File Transfers in a WLAN controlled by Inhomogeneous TCP Connections. - Zhiheng Zhou, Liang Zhou, Yuanquan Tan, Xing Wang:
An Efficient Retransmission Based on Network Coding with Unicast Flows. - Ammar Adl, Amr Badr, Ibrahim Farag:
A Note on the Membrane Computer. - Hao-En Chueh:
Mining Target-Oriented Sequential Patterns with Time-Intervals. - M. Emre Celebi:
Distance Measures for Reduced Ordering Based Vector Filters. - M. Emre Celebi:
Real-Time Implementation of Order-Statistics Based Directional Filters. - M. Emre Celebi, Hassan A. Kingravi, Rastislav Lukac, Fatih Celiker:
Cost-Effective Implementation of Order-Statistics Based Vector Filters Using Minimax Approximations. - M. Emre Celebi, Hassan A. Kingravi, Bakhtiyar Uddin, Y. Alp Aslandogan:
A Fast Switching Filter for Impulsive Noise Removal from Color Images. - M. Emre Celebi, Hassan A. Kingravi, Y. Alp Aslandogan:
Nonlinear Vector Filtering for Impulsive Noise Removal from Color Images. - B. Kiran Kumar:
ETP-Mine: An Efficient Method for Mining Transitional Patterns. - M. Emre Celebi, Hitoshi Iyatomi, William V. Stoecker, Randy H. Moss, Harold S. Rabinovitz, Giuseppe Argenziano, H. Peter Soyer:
Automatic Detection of Blue-White Veil and Related Structures in Dermoscopy Images. - M. Emre Celebi, Gerald Schaefer, Hitoshi Iyatomi, William V. Stoecker, Joseph M. Malters, James M. Grichnik:
An Improved Objective Evaluation Measure for Border Detection in Dermoscopy Images. - Piotr Bania:
JIT Spraying and Mitigations. - Jérôme Leroux:
The General Vector Addition System Reachability Problem by Presburger Inductive Invariants. - José F. Fontanari:
Social interaction as a heuristic for combinatorial optimization problems. - Elsa Tolone, Stavroula Voyatzi, Christian Leclère:
Constructions définitoires des tables du Lexique-Grammaire. - Kamaljit I. Lakhtaria, Dhinaharan Nagamalai:
Analyzing Web 2.0 Integration with Next Generation Networks for Services Rendering. - Kamaljit I. Lakhtaria, Dhinaharan Nagamalai:
Design & Deploy Web 2.0 enable services over Next Generation Network Platform. - Yaniv Altshuler, Shlomi Dolev, Yuval Elovici:
Efficient Collaborative Application Monitoring Scheme for Mobile Networks. - Kenta Kasai, Tomoharu Awano, David Declercq, Charly Poulliat, Kohichi Sakaniwa:
Weight Distributions of Multi-Edge type LDPC Codes. - David I. Spivak:
Functorial Data Migration. - Saipunidzam Mahamad, Mohammad Noor Ibrahim, Shakirah Mohd Taib:
M-Learning: A New Paradigm of Learning Mathematics in Malaysia. - Toby Walsh:
Parameterized Complexity Results in Symmetry Breaking. - Peyman Razaghi, Giuseppe Caire:
Coarse Network Coding: A Simple Relay Strategy to Resolve Interference. - Kanojia Sindhuben Babulal, Rajiv Ranjan Tewari:
E2XLRADR (Energy Efficient Cross Layer Routing Algorithm with Dynamic Retransmission for Wireless Sensor Networks). - Elmar Böhler, Nadia Creignou, Matthias Galota, Steffen Reith, Henning Schnoor, Heribert Vollmer:
Boolean Circuits as a Data Structure for Boolean Functions: Efficient Algorithms and Hard Problems. - Dae San Kim:
A family of sequences with large size and good correlation property arising from $M$-ary Sidelnikov sequences of period $q^d-1$. - Marios Gatzianas, Leonidas Georgiadis, Leandros Tassiulas:
Multiuser broadcast erasure channel with feedback - capacity and algorithms. - Moshe Mishali, Yonina C. Eldar:
Wideband Spectrum Sensing at Sub-Nyquist Rates. - Jean-Guillaume Dumas, Thierry Gautier, Clément Pernet, B. David Saunders:
LinBox founding scope allocation, parallel building blocks, and separate compilation. - Gabrielle Allen, Tom Goodale, Frank Löffler, David Rideout, Erik Schnetter, Eric L. Seidel:
Component Specification in the Cactus Framework: The Cactus Configuration Language. - Eric L. Seidel, Gabrielle Allen, Steven R. Brandt, Frank Löffler, Erik Schnetter:
Simplifying Complex Software Assembly: The Component Retrieval Language and Implementation. - László Toka, Matteo Dell'Amico, Pietro Michiardi:
On Scheduling and Redundancy for P2P Backup. - M. Emre Celebi, Hitoshi Iyatomi, Gerald Schaefer, William V. Stoecker:
Approximate Lesion Localization in Dermoscopy Images. - Akitoshi Kawamura:
Generalized Semimagic Squares for Digital Halftoning. - Serge Gaspers, Mathieu Liedloff:
A Branch-and-Reduce Algorithm for Finding a Minimum Independent Dominating Set. - Thomas Lemon, Ewen Ferguson:
A Practical Approach to Managing Spreadsheet Risk in a Global Business. - Sebastian Dewhurst:
Transforming Critical Spreadsheets into Web Applications at Zurich Financial. - Patrick O'Beirne:
Spreadsheet Refactoring. - Rahul Vaze, Kien T. Truong, Steven Weber, Robert W. Heath Jr.:
Two-Way Transmission Capacity of Wireless Ad-hoc Networks. - Alkim Almila Akdag Salah, Loet Leydesdorff:
The Development of the Journal Environment of Leonardo. - A. Saradha Devi, S. Suja Priyadharsini, S. Athinarayanan:
A Block Based Scheme for Enhancing Low Luminated Images. - Christine Bachoc:
Applications of semidefinite programming to coding theory. - Onay Urfalioglu, Orhan Arikan:
Artificial Neural Networks, Symmetries and Differential Evolution. - Dhruv Srivastava, Priya Ranjan:
An Application-oriented Model for Wireless Sensor Networks integrated with Telecom Infra. - Kevin Rosenblum, Lihi Zelnik-Manor, Yonina C. Eldar:
Sensing Matrix Optimization for Block-Sparse Decoding. - Darakhshan J. Mir, S. Muthukrishnan, Aleksandar Nikolov, Rebecca N. Wright:
Pan-private Algorithms: When Memory Does Not Help. - Christopher Earl, Matthew Might, David Van Horn:
Stack-Summarizing Control-Flow Analysis of Higher-Order Programs. - Julien Ferté, Vincent Pilaud, Michel Pocchiola:
On the number of simple arrangements of five double pseudolines. - JeongGil Ko, Amitabh Mishra:
DynaChanAl: Dynamic Channel Allocation with Minimal End-to-end Delay for Wireless Sensor Networks. - Sabu M. Thampi, K. Chandra Sekaran:
Protocols for Bio-Inspired Resource Discovery and Erasure Coded Replication in P2P Networks. - Ajay Sridharan, Yong Gao, Kui Wu, James Nastos:
Statistical Behavior of Embeddedness and Communities of Overlapping Cliques in Online Social Networks. - Tran The Truyen, Dinh Q. Phung, Svetha Venkatesh:
Probabilistic Models over Ordered Partitions with Application in Learning to Rank. - Oleg Titov:
One method of storing information. - George C. Violaris, Constandinos X. Mavromoustakis:
On the Performance Evaluation and Analysis of the Hybridised Bittorrent Protocol with Partial Mobility Characteristics. - Constandinos X. Mavromoustakis:
On the Impact of Caching and a Model for Storage-Capacity Measurements for Energy Conservation in Asymmetrical Wireless Devices. - Girish Varma:
Conductance and Eigenvalue. - Demijan Klinc, Carmit Hazay, Ashish Jagmohan, Hugo Krawczyk, Tal Rabin:
On Compression of Data Encrypted with Block Ciphers. - M. Kamaraju, K. Lal Kishore, A. V. N. Tilak:
Power optimized programmable embedded controller. - William Lovas, Frank Pfenning:
Refinement Types for Logical Frameworks and Their Interpretation as Proof Irrelevance. - Mark de Berg, Krzysztof Onak, Anastasios Sidiropoulos:
Fat Polygonal Partitions with Applications to Visualization and Embeddings. - Oleg V. Michailovich, Yogesh Rathi, Sudipto Dolui:
Spatially regularized compressed sensing of diffusion MRI data. - David Eppstein, Michael T. Goodrich, Roberto Tamassia:
Privacy-Preserving Data-Oblivious Geometric Algorithms for Geographic Data. - Rafael Caballero, Mario Rodríguez-Artalejo, Carlos A. Romero-Díaz:
A Transformation-based Implementation for CLP with Qualification and Proximity. - Mario Rodríguez-Artalejo, Carlos A. Romero-Díaz:
Fixpoint & Proof-theoretic Semantics for CLP with Qualification and Proximity. - P. Geetha, Vasumathi Narayanan:
Evolutionary Computational Method of Facial Expression Analysis for Content-based Video Retrieval using 2-Dimensional Cellular Automata. - Michael Thomas, Heribert Vollmer:
Complexity of Non-Monotonic Logics. - Zeeshan Ahmed:
Home Automation. - Zeeshan Ahmed:
Aero Fighter - 2D Gaming. - Zeeshan Ahmed:
AI 3D Cybug Gaming. - Alexandra Meliou, Wolfgang Gatterbauer, Katherine F. Moore, Dan Suciu:
The Complexity of Causality and Responsibility for Query Answers and non-Answers. - Hernan Haimovich, Julio H. Braslavsky:
Feedback stabilisation of switched systems via iterative approximate eigenvector assignment. - Vaishak Belle, Gerhard Lakemeyer:
Multi-Agent Only-Knowing Revisited. - Bo Yang, Jiming Liu:
Multiplex Structures: Patterns of Complexity in Real-World Networks. - Yang Yang, Yifu Zhang, Zixiang Xiong:
A new sufficient condition for sum-rate tightness in quadratic Gaussian multiterminal source coding. - Massimiliano Dal Mas:
Ontology Temporal Evolution for Multi-Entity Bayesian Networks under Exogenous and Endogenous Semantic Updating. - Evmorfia N. Argyriou, Michael A. Bekos, Antonios Symvonis:
Maximizing the Total Resolution of Graphs. - Sahand N. Negahban, Martin J. Wainwright:
Restricted strong convexity and weighted matrix completion: Optimal bounds with noise. - Tobias Christ, Dömötör Pálvölgyi, Milos Stojakovic:
Consistent digital line segments. - Mugurel Ionut Andreica, Eliana-Dina Tirsa:
Clustering, Encoding and Diameter Computation Algorithms for Multidimensional Data. - Lunjin Lu, John G. Cleary:
Simplifying Negative Goals Using Typed Existence Properties. - Karl Crary, Marino Miculan:
Proceedings 5th International Workshop on Logical Frameworks and Meta-languages: Theory and Practice, LFMTP 2010, Edinburgh, UK, 14th July 2010. EPTCS 34, 2010 [contents] - Justin F. Brunelle, Irwin B. Levinstein, Chutima Boonthum:
MiBoard: Metacognitive Training Through Gaming in iSTART. - Justin F. Brunelle, Kyle B. Dempsey, G. Tanner Jackson, Chutima Boonthum, Irwin B. Levinstein, Danielle S. McNamara:
MiBoard: iSTART Metacognitive Training through Gaming. - Kyle B. Dempsey, Justin F. Brunelle, G. Tanner Jackson, Chutima Boonthum, Irwin B. Levinstein, Danielle S. McNamara:
MiBoard: Multiplayer Interactive Board Game. - Kyle B. Dempsey, G. Tanner Jackson, Justin F. Brunelle, Michael Rowe, Danielle S. McNamara:
MiBoard: A Digital Game from a Physical World. - Justin F. Brunelle, G. Tanner Jackson, Kyle B. Dempsey, Chutima Boonthum, Irwin B. Levinstein, Danielle S. McNamara:
Gamed-based iSTART Practice: From MiBoard to Self-Explanation Showdown. - Amol Aggarwal:
On Unit Distances in a Convex Polygon. - Amol Aggarwal:
On Isosceles Triangles and Related Problems in a Convex Polygon. - Zvika Ben-Haim, Tomer Michaeli, Yonina C. Eldar:
Performance Bounds and Design Criteria for Estimating Finite Rate of Innovation Signals. - Eitan Altman, Philippe Nain, Adam Shwartz, Yuedong Xu:
Predicting the Impact of Measures Against P2P Networks on the Transient Behaviors. - Masud Hasan, Mohammad Monoar Hossain, Alejandro López-Ortiz, Sabrina Nusrat, Saad Altaful Quader, Nabila Rahman:
Some New Equiprojective Polyhedra. - Andrew M. Mironov:
Theory of processes. - Luciano Caroprese, Miroslaw Truszczynski:
Active Integrity Constraints and Revision Programming. - Amitav Mukherjee, A. Lee Swindlehurst:
Robust Beamforming for Security in MIMO Wiretap Channels with Imperfect CSI. - Anh Le, Athina Markopoulou, Michalis Faloutsos:
PhishDef: URL Names Say It All. - Jun Luo:
SNAP: SNowbAll multi-tree Pushing for Peer-to-Peer Media Streaming. - Xiangqiong Shi, Dan Schonfeld, Daniela Tuninetti:
Message Error Analysis of Loopy Belief Propagation for the Sum-Product Algorithm. - Ajay Prasad, Sandeep Chaurasia, Arjun Singh, Deepak Gour:
Mapping Cloud Computing onto Useful e-Governance. - Joseph Wun-Tat Chan, Francis Y. L. Chin, Xin Han, Ka-Cheong Lam, Hing-Fung Ting, Yong Zhang:
Deterministic Online Call Control in Cellular Networks and Triangle-Free Cellular Networks. - Thore Husfeldt, Nina Taslaman:
The Exponential Time Complexity of Computing the Probability That a Graph is Connected. - Mostafa Zaman Chowdhury, Yeong Min Jang, Zygmunt J. Haas:
Network evolution and QOS provisioning for integrated femtocell/macrocell networks. - Iryna Andriyanova, Emina Soljanin:
Optimized IR-HARQ Schemes Based on Punctured LDPC Codes over the BEC. - (Withdrawn) Ensuring Cache Freshness in On-demand Routing Protocols for Mobile Ad Hoc Network: A Cross-layer Framework.
- Martín Abadi, Gordon D. Plotkin:
A Model of Cooperative Threads. - Przemyslaw Kukielka, Zbigniew Kotulski:
Adaptation of the neural network-based IDS to new attacks detection. - Nikolai T. Stoianov:
A Protection Approach for Video Information transmitted in TCP/IP based networks. - Huang Huang, Vincent K. N. Lau:
Delay-Optimal User Scheduling and Inter-Cell Interference Management in Cellular Network via Distributive Stochastic Learning. - Deeparnab Chakrabarty, Chaitanya Swamy:
Facility Location with Client Latencies: Linear-Programming based Techniques for Minimum-Latency Problems. - Maksim Malkov:
Various virtual structures on single file system. - Nikolai T. Stoianov:
One software tool for testing square s-boxes. - Manuel Urueña, Petr Machnik, Maria Martinez, Marcin Niemiec, Nikolai T. Stoianov:
INDECT Advanced Security Requirements. - Danny Z. Chen, Haitao Wang:
An Improved Algorithm for Reconstructing a Simple Polygon from the Visibility Angles. - Pulkit Grover, Anant Sahai:
Is Witsenhausen's counterexample a relevant toy? - Sameer Pawar, Salim Y. El Rouayheb, Kannan Ramchandran:
Securing Dynamic Distributed Storage Systems against Eavesdropping and Adversarial Attacks. - Weiping Zhu:
Loss Rate Inference in Multi-Sources and Multicast-Based General Topology. - Punit Pandey, Deepshikha Pandey, Shishir Kumar:
Reinforcement Learning by Comparing Immediate Reward. - (Withdrawn) A New Route Maintenance in Dynamic Source Routing Protocol.
- (Withdrawn) On the Reduction of Broadcast Traffic in Mobile Ad Hoc Networks.
- (Withdrawn) A Simple Battery Aware Gossip Based Sleep Protocol for Densely Deployed Ad-hoc and Sensor Networks.
- M. Praveen:
Small Vertex Cover makes Petri Net Coverability and Boundedness Easier. - Telikepalli Kavitha, Meghana Nasre, Prajakta Nimbhorkar:
Popularity at Minimum Cost. - Hui Zhou, Pingyi Fan, Dongning Guo:
Joint Channel Probing and Proportional Fair Scheduling in Wireless Networks. - Anish Das Sarma, Sreenivas Gollapudi, Rina Panigrahy, Li Zhang:
Understanding Fashion Cycles as a Social Choice. - Anindya Das, Ifat Jahangir, Masud Hasan:
On the Design and Analysis of Quaternary Serial and Parallel Adders. - M. Abel, D. L. Shepelyansky:
Google matrix of business process management. - Qiyu Sun, Michael Unser:
Left-Inverses of Fractional Laplacian and Sparse Stochastic Processes. - Daron Acemoglu, Giacomo Como, Fabio Fagnani, Asuman E. Ozdaglar:
Opinion fluctuations and disagreement in social networks. - Artiom Alhazov, Sergey Verlan:
Minimization Strategies for Maximally Parallel Multiset Rewriting Systems. - Jan L. Cieslinski, Boguslaw Ratkiewicz:
Energy-preserving numerical schemes of high accuracy for one-dimensional Hamiltonian systems. - Karl Malbrain:
A Blink Tree latch method and protocol to support synchronous node deletion. - Ruth McKeever, Kevin McDaid:
How do Range Names Hinder Novice Spreadsheet Debugging Performance? - Ben G. Rittweger, Eoin Langan:
Spreadsheet Risk Management in Organisations. - Salvatore Aurigemma, Raymond R. Panko:
The Detection of Human Spreadsheet Errors by Humans versus Inspection (Auditing) Software. - Françoise Tort:
Teaching Spreadsheets: Curriculum Design Principles. - Andreas Abel, Brigitte Pientka:
Explicit Substitutions for Contextual Type Theory. 5-20 - John Tang Boyland:
Generating Bijections between HOAS and the Natural Numbers. 21-35 - Maribel Fernández, Murdoch James Gabbay:
Closed nominal rewriting and efficiently computable nominal algebra equality. 37-51 - Herman Geuvers, Robbert Krebbers, James McKinna, Freek Wiedijk:
Pure Type Systems without Explicit Contexts. 53-67 - Daniel R. Licata, Robert Harper:
A Monadic Formalization of ML5. 69-83 - Florian Rabe:
Representing Isabelle in LF. 85-99 - Anders Schack-Nielsen, Carsten Schürmann:
Pattern Unification for the Lambda Calculus with Linear and Affine Types. 101-116 - Dror Lederman:
Estimation of Infants' Cry Fundamental Frequency using a Modified SIFT algorithm. - Andrea Kohlhase, Michael Kohlhase:
What we understand is what we get: Assessment in Spreadsheets. - Dipti Kapoor Sarmah, Neha Bajpai:
Proposed System for data hiding using Cryptography and Steganography Proposed System for data hiding using Cryptography and Steganography. - K. R. Sahasranand, Nithin Nagaraj:
Sharing Graphs. - Mikolaj Bojanczyk, Luc Segoufin:
Tree Languages Defined in First-Order Logic with One Quantifier Alternation. - Katia Jaffrès-Runser, Jean-Marie Gorce, Cristina Comaniciu:
On the performance evaluation of wireless networks with broadcast and interference-limited channels. - Juha Kontinen, Heribert Vollmer:
On Second-Order Monadic Monoidal and Groupoidal Quantifiers. - Hariolf Betz, Thom W. Frühwirth:
Linear-Logic Based Analysis of Constraint Handling Rules with Disjunction. - Jan A. Bergstra:
Informal Control code logic. - Na Yi, Yi Ma, Rahim Tafazolli:
Underlay Cognitive Radio with Full or Partial Channel Quality Information. - Sanat Sarangi, Subrat Kar:
Performance Analysis of an Improved Graded Precision Localization Algorithm for Wireless Sensor Networks. - Mustafa Cenk Gursoy:
Throughput Analysis of Buffer-Constrained Wireless Systems in the Finite Blocklength Regime. - George K. Atia, Venugopal V. Veeravalli, Jason A. Fuemmeler:
Sensor Scheduling for Energy-Efficient Target Tracking in Sensor Networks. - Prosenjit Bose, Jean-Lou De Carufel:
Minimum Enclosing Area Triangle with a Fixed Angle. - Maxime Taquet, Laurent Jacques, Christophe De Vleeschouwer, Benoît Macq:
Invariant Spectral Hashing of Image Saliency Graph. - Chan Wong Wong, Tan F. Wong, John M. Shea:
Secret Sharing LDPC Codes for the Constrained Gaussian Wiretap Channel. - Ashish Khisti, Suhas N. Diggavi, Gregory W. Wornell:
Secret-key Agreement with Channel State Information at the Transmitter. - Peng Wang, Chunhua Shen, Nick Barnes, Hong Zheng, Zhang Ren:
Asymmetric Totally-corrective Boosting for Real-time Object Detection. - Stefano Rini, Daniela Tuninetti, Natasha Devroye:
The Capacity of the Semi-Deterministic Cognitive Interference Channel and its Application to Constant Gap Results for the Gaussian Channel. - Byung-Gon Chun, Sunghwan Ihm, Petros Maniatis, Mayur Naik:
CloneCloud: Boosting Mobile Device Applications Through Cloud Clone Execution. - Raymond H. Y. Louie, Matthew R. McKay, Iain B. Collings:
Open-Loop Spatial Multiplexing and Diversity Communications in Ad Hoc Networks. - A. C. Cem Say, Abuzer Yakaryilmaz:
Quantum function computation using sublogarithmic space (abstract & poster). - Arunkumar Subramanian, Andrew Thangaraj, Matthieu R. Bloch, Steven W. McLaughlin:
Strong Secrecy on the Binary Erasure Wiretap Channel Using Large-Girth LDPC Codes. - Gerth Stølting Brodal, Spyros Sioutas, Kostas Tsichlas, Christos D. Zaroliagis:
D2-Tree: A New Overlay with Deterministic Bounds. - Petros Boufounos:
Universal Rate-Efficient Scalar Quantization. - Jason A. Fuemmeler, George K. Atia, Venugopal V. Veeravalli:
Sensor Management for Tracking in Sensor Networks. - Stephen Chang, David Van Horn, Matthias Felleisen:
Evaluating Call-By-Need on the Control Stack. - Mahdi Cheraghchi, Ali Hormati, Amin Karbasi, Martin Vetterli:
Group Testing with Probabilistic Tests: Theory, Design and Application. - Mark Giesbrecht, Daniel S. Roche, Hrushikesh Tilak:
Computing sparse multiples of polynomials. - Paul S. Bonsma:
Shortest Path Reconfiguration is PSPACE-hard. - Arno Bastenhof:
Tableaux for the Lambek-Grishin calculus. - H. Brendan McMahan:
Follow-the-Regularized-Leader and Mirror Descent: Equivalence Theorems and Implicit Updates. - Deli Qiao, Mustafa Cenk Gursoy, Senem Velipasalar:
Transmission Strategies in Multiple Access Fading Channels with Statistical QoS Constraints. - Zhiying Wang, Alexandros G. Dimakis, Jehoshua Bruck:
Rebuilding for Array Codes in Distributed Storage Systems. - Gwen Salaün, Xiang Fu, Sylvain Hallé:
Proceedings Fourth International Workshop on Testing, Analysis and Verification of Web Software, TAV-WEB 2010, Antwerp, Belgium, 21 September 2010. EPTCS 35, 2010 [contents] - Eduardo G. Altmann, Janet B. Pierrehumbert, Adilson E. Motter:
Niche as a determinant of word fate in online groups. - Kaibin Huang, Rui Zhang:
Cooperative Feedback for MIMO Interference Channels. - Qinfeng Shi, Mark D. Reid, Tibério S. Caetano:
Conditional Random Fields and Support Vector Machines: A Hybrid Approach. - Alexander Onic, Mario Huemer:
Direct vs. Two-Step Approach for Unique Word Generation in UW-OFDM. - Jerome K. Vanclay:
An evaluation of the Australian Research Council's journal ranking. - Natarajan Lakshmi Prasad, B. Sundar Rajan:
Distributed STBCs with Partial Interference Cancellation Decoding. - Fernando Bobillo, Umberto Straccia:
Fuzzy Ontology Representation using OWL 2. - Hans Kurzweil, Mathis Seidl, Johannes B. Huber:
Collaborative Decoding of Interleaved Reed-Solomon Codes using Gaussian Elimination. - Caihong Kai, Soung Chang Liew:
Temporal Starvation in CSMA Wireless Networks. - Barbara Petit:
Semantics of Typed Lambda-Calculus with Constructors. - Kapil Netaji Vhatkar, Girish P. Bhole:
Internal Location Based System for Mobile Devices Using Passive RFID. - Carlo A. Furia, Alberto Leva, Martina Maggio, Paola Spoletini:
A control-theoretical methodology for the scheduling problem. - Felipe A. Cruz, Simon K. Layton, Lorena A. Barba:
How to obtain efficient GPU kernels: an illustration using FMM & FGT algorithms. - Amit Chakrabarti, Oded Regev:
An Optimal Lower Bound on the Communication Complexity of Gap-Hamming-Distance. - Manuel Mazzara, Anirban Bhattacharyya:
On Modelling and Analysis of Dynamic Reconfiguration of Dependable Real-Time Systems. - Albert Sunny, Joy Kuri, Saurabh Aggarwal:
Delay Modelling for Single Cell IEEE 802.11 WLANs Using a Random Polling System. - Erin W. Chambers, Alejandro Erickson, Sándor P. Fekete, Jonathan Lenchner, Jeff Sember, Srinivasan Venkatesh, Ulrike Stege, Svetlana Stolpner, Christophe Weibel, Sue Whitesides:
Connectivity graphs of uncertainty regions. - Meisam Razaviyayn, Maziar Sanjabi, Zhi-Quan Luo:
Linear Transceiver Design for Interference Alignment: Complexity and Computation. - Myunghwan Kim, Jure Leskovec:
Multiplicative Attribute Graph Model of Real-World Networks. - Krishnam Raju Jampani, Anna Lubiw:
Simultaneous Interval Graphs. - Boyu Li, Hong Ju Park, Ender Ayanoglu:
Reduced Complexity Decoding for Bit-Interleaved Coded Multiple Beamforming with Constellation Precoding. - (Withdrawn) Safe Feature Elimination in Sparse Supervised Learning.
- Boyu Li, Ender Ayanoglu:
Bit-Interleaved Coded Multiple Beamforming with Perfect Coding. - Han-Shin Jo, Ping Xia, Jeffrey G. Andrews:
Open, Closed, and Shared Access Femtocells in the Downlink. - M. Amin Khajehnejad, Weiyu Xu, Amir Salman Avestimehr, Babak Hassibi:
Analyzing Weighted ℓ1 Minimization for Sparse Recovery with Nonuniform Sparse Models. - Michael T. Goodrich, Darren Strash:
Priority Range Trees. - Fangying Xiao, Hanwu Chen:
Is A Quantum Stabilizer Code Degenerate or Nondegenerate for Pauli Channel? - Behrang Parhizkar, Abdulbasit Mohammad Abdulrahman Alazizi, Mohammad Nabil Sadegh Ali, Anand Ramachandran, Sujata Navaratnam:
PC 2 Phone Event Announcer. - Sungwook Moon, Ahmed Helmy:
Mobile Testbeds with an Attitude. - Frédéric Bastien, Yoshua Bengio, Arnaud Bergeron, Nicolas Boulanger-Lewandowski, Thomas M. Breuel, Youssouf Chherawala, Moustapha Cissé, Myriam Côté, Dumitru Erhan, Jeremy Eustache, Xavier Glorot, Xavier Muller, Sylvain Pannetier Lebeuf, Razvan Pascanu, Salah Rifai, François Savard, Guillaume Sicard:
Deep Self-Taught Learning for Handwritten Character Recognition. - Hamed Maleki, Syed Ali Jafar, Shlomo Shamai:
Retrospective Interference Alignment. - Pranjal Awasthi, Avrim Blum, Or Sheffet:
Center-based Clustering under Perturbation Stability. - Hugo Gouveia, Nelma Moreira, Rogério Reis:
Small NFAs from Regular Expressions: Some Experimental Results. - Fang Liu, Daiyuan Peng, Zhengchun Zhou, Xiaohu Tang:
Construction of Frequency Hopping Sequence Set Based upon Generalized Cyclotomy. - (Withdrawn) Geometric Decision Tree.
- Wei Gao, Zhi-Hua Zhou:
The kth, Median and Average Margin Bounds for AdaBoost. - Daniel Reichman:
Influence is a Matter of Degree: New Algorithms for Activation Problems. - (Withdrawn) A Survey on Low-cost RFID Authentication Protocols.
- Bo'az Klartag, Oded Regev:
Quantum One-Way Communication is Exponentially Stronger Than Classical Communication. - M. Zeeshan Shakir, Tariq S. Durrani:
MIMO Identical Eigenmode Transmission System (IETS) - A Channel Decomposition Perspective. - Christine Bachoc, Venkat Chandar, Gérard D. Cohen, Patrick Solé, Aslan Tchamkerten:
On Bounded Weight Codes. - Tanu Malik, Xiaodan Wang, Philip Little, Amitabh Chaudhary, Ani Thakar:
A Dynamic Data Middleware Cache for Rapidly-growing Scientific Repositories. - Aaron Grunthal:
Efficient Indexing of the BitTorrent Distributed Hash Table. - Richard Garner:
An abstract view on syntax with sharing. - Xiaowen Han, David Zhu, Cuifeng Zhou:
3-SAT Polynomial Solution of Knowledge Recognition Algorithm. - Zhihui Hao, Chunhua Shen, Nick Barnes, Bo Wang:
Totally Corrective Multiclass Boosting with Binary Weak Learners. - Jocelyn Simmonds, Shoham Ben-David, Marsha Chechik:
Optimizing Computation of Recovery Plans for BPEL Applications. 3-14 - Yi-Hsun Wang, Ching-Hao Mao, Hahn-Ming Lee:
Structural Learning of Attack Vectors for Generating Mutated XSS Attacks. 15-26 - Raymond Mui, Phyllis G. Frankl:
Preventing SQL Injection through Automatic Query Sanitization with ASSIST. 27-38 - Xiang Fu:
Relational Constraint Driven Test Case Synthesis for Web Applications. 39-50 - Benjamin Kersten, Michael Goedicke:
Browser-based Analysis of Web Framework Applications. 51-62 - Ben Rubinger, Tevfik Bultan:
Contracting the Facebook API. 63-74 - Gwen Salaün:
Analysis and Verification of Service Interaction Protocols - A Brief Survey. 75-86 - Prasad Krishnan, B. Sundar Rajan:
Network-Error Correcting Codes using Small Fields. - Georg Böcherer, Rudolf Mathar:
Matching Sources to Channels. - Peter Biener, François Degrave, Wim Vanhoof:
A Test Automation Framework for Mercury. - Petra Hofstedt:
Realizing evaluation strategies by hierarchical graph rewriting. - Nicos Angelopoulos, Paul Taylor:
An extensible web interface for databases and its application to storing biochemical data. - Paulo Moura:
Towards a Study of Meta-Predicate Semantics. - Mostafa Zaman Chowdhury, Yeong Min Jang:
Handover Control for WCDMA Femtocell Networks. - Ali ParandehGheibi, Mohammad Ali Akhaee, Ali Ayremlou, Mohammad Amin Rahimian, Farokh Marvasti:
Improved Iterative Techniques to Compensate for Interpolation Distortions. - Jan Wielemaker, Vítor Santos Costa:
Portability of Prolog programs: theory and case-studies. - Mohammad Amin Rahimian, Ali Ayremlou, Farokh Marvasti:
A General Analog Network Coding for Wireless Systems with Fading and Noisy Channels. - Dimitar Sht. Shterionov, Angelika Kimmig, Theofrastos Mantadelis, Gerda Janssens:
DNF Sampling for ProbLog Inference. - Vasco Pedro, Salvador Abreu:
Distributed Work Stealing for Constraint Solving. - Yuzhao Ni, Ju Sun, Xiaotong Yuan, Shuicheng Yan, Loong Fah Cheong:
Robust Low-Rank Subspace Segmentation with Semidefinite Guarantees. - Paulo André, Salvador Abreu:
Casting of the WAM as an EAM. - (Withdrawn) One, Two, Three and N Dimensional String Search Algorithms.
- Md. Saiful Islam, Muhammad Mahbubur Rahman, Zerina Begum, Mohd. Zulfiquar Hafiz:
Fault Tolerant Variable Block Carry Skip Logic (VBCSL) using Parity Preserving Reversible Gates. - Sergio Giro:
An algorithmic approximation of the infimum reachability probability for Probabilistic Finite Automata. - Virgile Garcia, Jean-Marie Gorce, Nikolai Lebedev:
Outage Probability for Multi-Cell Processing under Rayleigh Fading. - Chang-Ching Chen, Chia-Shiang Tseng, Che Lin:
A General Proof of Convergence for Adaptive Distributed Beamforming Schemes. - Joffrey Villard, Pablo Piantanida:
Secure Lossy Source Coding with Side Information at the Decoders. - Nathan Srebro, Karthik Sridharan, Ambuj Tewari:
Smoothness, Low-Noise and Fast Rates. - Manuel Mazzara:
Deriving Specifications of Dependable Systems: toward a Method. - Sergey Loyka, George Levin:
Finite-SNR Diversity-Multiplexing Tradeoff via Asymptotic Analysis of Large MIMO Systems. - Ji Zhu, Mudhakar Srivatsa:
Quantifying Information Leakage in Finite Order Deterministic Programs. - Konrad Rawlik, Marc Toussaint, Sethu Vijayakumar:
Approximate Inference and Stochastic Optimal Control. - Wenzhuo Ouyang, Sugumar Murugesan, Atilla Eryilmaz, Ness B. Shroff:
Exploiting Channel Memory for Joint Estimation and Scheduling in Downlink Networks. - Marco Levorato, Daniel O'Neill, Andrea J. Goldsmith, Urbashi Mitra:
Optimization of ARQ Protocols in Interference Networks with QoS Constraints. - Peter Csaba Ölveczky:
Proceedings First International Workshop on Rewriting Techniques for Real-Time Systems, RTRTS 2010, Longyearbyen, Norway, April 6-9, 2010. EPTCS 36, 2010 [contents] - Hieu Dinh, Sanguthevar Rajasekaran:
A memory-efficient data structure representing exact-match overlap graphs with application for next generation DNA assembly. - Eric Filiol:
Malicious cryptography techniques for unreversable (malicious or not) binaries. - Frank Nielsen:
A family of statistical symmetric divergences based on Jensen's inequality. - Geoffroy Gueguen:
Van Wijngaarden grammars, metamorphism and K-ary malwares. - Hiroyasu Inoue:
An Analysis of Transaction and Joint-patent Application Networks. - Sandra González-Bailón, Rafael E. Banchs, Andreas Kaltenbrunner:
Emotional Reactions and the Pulse of Public Opinion: Measuring the Impact of Political Events on the Sentiment of Online Discussions. - Germán Vidal, Neng-Fa Zhou:
Proceedings of CICLOPS-WLPE 2010. - Lu Lu, Soung Chang Liew, Shengli Zhang:
Channel-coded Collision Resolution by Exploiting Symbol Misalignment. - Zeeshan Ahmed:
A Middleware road towards Web (Grid) Services. - Kashif Mahmood, Amr Rizk, Yuming Jiang:
On the Flow-Level Delay of a Spatial Multiplexing MIMO Wireless Channel. - Björn Andres, Jörg H. Kappes, Ullrich Köthe, Fred A. Hamprecht:
The Lazy Flipper: MAP Inference in Higher-Order Graphical Models by Depth-limited Exhaustive Search. - Siddhartan Govindasamy, Daniel W. Bliss, David H. Staelin:
Asymptotic Spectral Efficiency of Multi-antenna Links in Wireless Networks with Limited Tx CSI. - Saeed Alaei, Azarakhsh Malekian:
Maximizing Sequence-Submodular Functions and its Application to Online Advertising. - Gene S. Kopp, John D. Wiltshire-Gordon:
When can several people simulate a private random oracle for someone else? - Pramod Ganapathi, Rama B:
A Versatile Algorithm to Generate Various Combinatorial Structures. - Laurent El Ghaoui, Vivian Viallon, Tarek Rabbani:
Safe Feature Elimination in Sparse Supervised Learning. - Martin Wirsing, Sebastian S. Bauer, Andreas Schroeder:
Modeling and Analyzing Adaptive User-Centric Systems in Real-Time Maude. 1-25 - Musab AlTurki, José Meseguer:
Dist-Orc: A Rewriting-based Distributed Implementation of Orc with Formal Analysis. 26-45 - Kyungmin Bae, Peter Csaba Ölveczky:
Extending the Real-Time Maude Semantics of Ptolemy to Hierarchical DE Models. 46-66 - Joakim Bjørk, Einar Broch Johnsen, Olaf Owe, Rudolf Schlatte:
Lightweight Time Modeling in Timed Creol. 67-81 - Muhammad Fadlisyah, Erika Ábrahám, Daniela Lepri, Peter Csaba Ölveczky:
A Rewriting-Logic-Based Technique for Modeling Thermal Systems. 82-100 - Daniela Lepri, Peter Csaba Ölveczky, Erika Ábrahám:
Model Checking Classes of Metric LTL Properties of Object-Oriented Real-Time Maude Specifications. 117-136 - Peter Csaba Ölveczky, José Meseguer:
Specification and Verification of Distributed Embedded Systems: A Traffic Intersection Product Family. 137-157 - Mu Sun, José Meseguer:
Distributed Real-Time Emulation of Formally-Defined Patterns for Safe Medical Device Control. 158-177 - (Withdrawn) Rank-Constrained Schur-Convex Optimization with Multiple Trace/Log-Det Constraints.
- I-Hsiang Wang:
Distributed Interference Cancellation in Multiple Access Channel with Transmitter Cooperation. - (Withdrawn) Tree-Structure Expectation Propagation for LDPC Decoding in Erasure Channels.
- Eddy Chiu, Vincent K. N. Lau, Huang Huang, Tao Wu, Sheng Liu:
Robust Transceiver Design for K-Pairs Quasi-Static MIMO Interference Channels via Semi-Definite Relaxation. - Mst. Farhana Rahman, S. M. Masud Karim, Kazi Shah Nawaz Ripon, Md. Iqbal Hossain Suvo:
Performance Analysis of Estimation of Distribution Algorithm and Genetic Algorithm in Zone Routing Protocol. - Byung-Hak Kim, Henry D. Pfister:
An Iterative Joint Linear-Programming Decoding of LDPC Codes and Finite-State Channels. - Ho-Leung Chan, Nicole Megow, Rob van Stee, René Sitters:
The Sorting Buffer Problem is NP-hard. - Arun S. Maiya, Tanya Y. Berger-Wolf:
Expansion and Search in Networks. - Minyu Fang, David Malone, Ken R. Duffy, Douglas J. Leith:
Decentralised Learning MACs for Collision-free Access in WLANs. - Olivier Laurent:
Game semantics for first-order logic. - Arseny M. Shur:
Numerical values of the growth rates of power-free languages. - Florent Becker, Martín Matamala, Nicolas Nisse, Ivan Rapaport, Karol Suchan, Ioan Todinca:
Adding a referee to an interconnection network: What can(not) be computed in one round. - Subhash C. Kak:
Unary Coding for Neural Network Learning. - Arunabha Sen, Pavel Ghosh, Tiffany Silva, Nibedita Das, Anjan Kundu:
Architecture and Algorithms for an Airborne Network. - Davide Barbieri, Daniela Tuninetti:
On Repetition Protocols and Power Control for Multiple Access Block-Fading Channels. - Bernhard Haeupler, Krishnam Raju Jampani, Anna Lubiw:
Testing Simultaneous Planarity when the Common Graph is 2-Connected. - S. M. Kamruzzaman:
An Energy Efficient Multichannel MAC Protocol for Cognitive Radio Ad Hoc Networks. - S. M. Kamruzzaman:
CR-MAC: A multichannel MAC protocol for cognitive radio ad hoc networks. - Monica, Ajay K. Sharma:
Comparative Investigation for Energy Consumption of Different Chipsets Based on Scheduling for Wireless Sensor Networks. - Ulrich M. Schwarz:
A PTAS for Scheduling with Tree Assignment Restrictions. - Maxime Gautier, Alexandre Janot, Pierre-Olivier Vandanjon:
A new closed-loop output error method for parameter identification of robot dynamics. - S. Ayyasamy, S. N. Sivanandam:
A Cluster Based Replication Architecture for Load Balancing in Peer-to-Peer Content Distribution. - Abu Bakar Siddiquee, Md. Ehsanul Hoque Mazumder, S. M. Kamruzzaman:
A Constructive Algorithm for Feedforward Neural Networks for Medical Diagnostic Reasoning. - S. M. Kamruzzaman, Md. Monirul Islam:
An Algorithm to Extract Rules from Artificial Neural Networks for Medical Diagnosis Problems. - Saber Jafarizadeh, Abbas Jamalipour:
Fastest Distributed Consensus on Star-Mesh Hybrid Sensor Networks. - S. M. Kamruzzaman, Md. Monirul Islam:
Extraction of Symbolic Rules from Artificial Neural Networks. - S. M. Kamruzzaman, Ahmed Ryadh Hasan, Abu Bakar Siddiquee, Md. Ehsanul Hoque Mazumder:
Medical diagnosis using neural network. - S. M. Kamruzzaman, Farhana Haider:
A hybrid learning algorithm for text classification. - Mohammed El Hassouni, Driss Aboutajdine:
3D-Mesh denoising using an improved vertex based anisotropic diffusion. - Chowdhury Mofizur Rahman, Ferdous Ahmed Sohel, Parvez Naushad, S. M. Kamruzzaman:
Text Classification using the Concept of Association Rule of Data Mining. - Md. Hijbul Alam, Abdul Kadar Muhammad Masum, Mohammad Mahadi Hassan, S. M. Kamruzzaman:
Optimal Bangla Keyboard Layout using Association Rule of Data Mining. - Muhammad Abul Kalam Azad, Rezwana Sharmeen, Shabbir Ahmad, S. M. Kamruzzaman:
A Unique 10 Segment Display for Bengali Numerals. - Henrik Schulze:
Diversity Spectra of Spatial Multipath Fading Processes. - Pascal Giorgi:
On Polynomial Multiplication in Chebyshev Basis. - Michael Katelman, José Meseguer:
Using the PALS Architecture to Verify a Distributed Topology Control Protocol for Wireless Multi-Hop Networks in the Presence of Node Failures. 101-116 - Amelia Carolina Sparavigna:
Geoglyphs of Titicaca as an ancient example of graphic design. - Maria-Florina Balcan, Florin Constantin:
Sequential item pricing for unlimited supply. - Vishwambhar Rathi, Mattias Andersson, Ragnar Thobaben, Jörg Kliewer, Mikael Skoglund:
Performance Analysis and Design of Two Edge Type LDPC Codes for the BEC Wiretap Channel. - Alberto Calvi, Silvio Ranise, Luca Viganò:
Automated Validation of Security-sensitive Web Services specified in BPEL and RBAC (Extended Version). - Mohammad Noshad, Kambiz Jamshidi:
Novel Codes Family for Modified Spectral-Amplitude-Coding OCDMA Systems and Performance Analysis. - Constandinos X. Mavromoustakis, Helen D. Karatza:
A Gossip-based optimistic replication for efficient delay-sensitive streaming using an interactive middleware support system. - Tapas Kumar Patra, Joy Kuri:
Threshold Policy for Route Discovery Initiation in Mobile Ad hoc Networks. - Victor Boyarshinov, Malik Magdon-Ismail:
Efficient Computation of Optimal Trading Strategies. - Konstantin Biatov:
A Fast Audio Clustering Using Vector Quantization and Second Order Statistics. - Eitan Altman, Rachid El Azouzi, Daniel Sadoc Menasché, Yuedong Xu:
Forever Young: Aging Control In DTNs. - Romain Tavenard, Laurent Amsaleg, Hervé Jégou:
Balancing clusters to reduce response time variability in large scale image search. - Vikram Dhillon:
Modeling Instantaneous Changes In Natural Scenes. - Jun Liu, Jieping Ye:
Efficient L1/Lq Norm Regularization. - Huyen Chi Bui, Jérôme Lacan, Marie-Laure Boucheret:
NCSA: A New Protocol for Random Multiple Access Based on Physical Layer Network Coding. - Yin Sun, Xiaofeng Zhong, Yunzhou Li, Shidong Zhou, Xibin Xu:
Spectrum Sharing between Cooperative Relay and Ad-hoc Networks: Dynamic Transmissions under Computation and Signaling Limitations. - Itamar Berger, Bosmat Eldar, Gal Zohar, Barak Raveh, Dan Halperin:
Improving the Quality of Non-Holonomic Motion by Hybridizing C-PRM Paths. - Masayuki Karasuyama, Naoyuki Harada, Masashi Sugiyama, Ichiro Takeuchi:
Multi-parametric Solution-path Algorithm for Instance-weighted Support Vector Machines. - Zoltán Ésik, Werner Kuich:
Free inductive K-semialgebras. - João Carreira, Adrian Ion, Cristian Sminchisescu:
Image Segmentation by Discounted Cumulative Ranking on Maximal Cliques. - B. K. Pradeepa, Joy Kuri:
TCP-controlled Long File Transfer Throughput in Multirate WLANs with Nonzero Round Trip Propagation Delays. - Slavcho Shtrakov, Jörg Koppitz:
Symmetric functions with non-trivial arity gap. - Timon Hertli, Robin A. Moser, Dominik Scheder:
Improving PPSZ for 3-SAT using Crtitical Variables. - Omer Khalid, Ivo Maljevic, Richard J. Anthony, Miltos Petridis, Kevin Parrott, Markus Schulz:
Dynamic scheduling of virtual machines running hpc workloads in scientific grids. - Omer Khalid, Ivo Maljevic, Richard J. Anthony, Miltos Petridis, Kevin Parrott, Markus Schulz:
Deadline aware virtual machine scheduler for scientific grids and cloud computing. - Tobias Baumgartner, Sándor P. Fekete, Tom Kamphans, Alexander Kroeller, Max Pagel:
Hallway Monitoring: Distributed Data Processing with Wireless Sensor Networks. - Andreas Steck, Christian Schlegel:
Towards Quality of Service and Resource Aware Robotic Systems through Model-Driven Software Development. - Gerald Paul:
An Efficient Implementation of the Robust Tabu Search Heuristic for Sparse Quadratic Assignment Problems. - Sanat Sarangi, Subrat Kar:
Location Estimation with Reactive Routing in Resource Constrained Sensor Networks. - Dongyue Xue, Eylem Ekici:
Delay-Guaranteed Cross-Layer Scheduling in Multi-Hop Wireless Networks. - S. M. Kamruzzaman:
RGANN: An Efficient Algorithm to Extract Rules from ANNs. - S. M. Kamruzzaman:
Text Classification using Artificial Intelligence. - Yang Hu, Yimin Liu, Huadong Meng:
High Range Resolution Profiling for Stepped-Frequency Radar with Sparse Reconstruction. - Quan-Lin Li:
Doubly Exponential Solution for Randomized Load Balancing Models with Markovian Arrival Processes and PH Service Times. - Saber Jafarizadeh:
Fastest Distributed Consensus on Petal Networks. - S. M. Kamruzzaman, A. N. M. Rezaul Karim, Md. Saiful Islam, Md. Emdadul Haque:
Speaker Identification using MFCC-Domain Support Vector Machine. - S. M. Kamruzzaman, Md. Anisur Rahman:
Performance Analysis of Pulse Shaping Technique for OFDM PAPR Reduction. - S. M. Kamruzzaman, Firoz Ahmed Siddiqi, Md. Saiful Islam, Md. Emdadul Haque, Mohammad Shamsul Alam:
Rotation Invariant Face Detection Using Wavelet, PCA and Radial Basis Function Networks. - S. M. Kamruzzaman, Farhana Haider, Ahmed Ryadh Hasan:
Text Classification using Association Rule with a Hybrid Concept of Naive Bayes Classifier and Genetic Algorithm. - Muhammad Abul Kalam Azad, Rezwana Sharmeen, S. M. Kamruzzaman:
Universal Numeric Segmented Display. - S. M. Kamruzzaman:
Extracting Symbolic Rules for Medical Diagnosis Problem. - Muhammad Abul Kalam Azad, Rezwana Sharmeen, Shabbir Ahmad, S. M. Kamruzzaman:
Smart Bengali Cell Phone Keypad Layout. - Rezwana Sharmeen, Muhammad Abul Kalam Azad, Shabbir Ahmad, S. M. Kamruzzaman:
Completely Enhanced Cell Phone Keypad. - Muhammad Abul Kalam Azad, Rezwana Sharmeen, Shabbir Ahmad, S. M. Kamruzzaman:
An Efficient Technique for Text Compression. - S. M. Kamruzzaman, Md. Hijbul Alam, Abdul Kadar Muhammad Masum, Md. Mahadi Hassan:
Optimal Bangla Keyboard Layout using Data Mining Technique. - S. M. Kamruzzaman, Ahmed Ryadh Hasan:
Pattern Classification using Simplified Neural Networks. - S. M. Kamruzzaman, Ahmed Ryadh Hasan:
Rule Extraction using Artificial Neural Networks. - S. M. Kamruzzaman, Farhana Haider, Ahmed Ryadh Hasan:
Text Classification using Data Mining. - S. M. Kamruzzaman:
REx: An Efficient Rule Generator. - S. M. Kamruzzaman:
Web Page Categorization Using Artificial Neural Networks. - S. M. Anamul Haque, S. M. Kamruzzaman, Md. Ashraful Islam:
A System for Smart Home Control of Appliances based on Timer and Speech Interaction. - S. M. Kamruzzaman, Chowdhury Mofizur Rahman:
Text Categorization using Association Rule and Naive Bayes Classifier. - Philipp Schaer, Philipp Mayr, Peter Mutschke:
Demonstrating a Service-Enhanced Retrieval System. - Henrik Mühe, Andreas Angerer, Alwin Hoffmann, Wolfgang Reif:
On reverse-engineering the KUKA Robot Language. - B. K. Pradeepa, Joy Kuri:
Bulk File Download Throughput in a Single Station WLAN with Nonzero Propagation Delay. - Qi Ge, Daniel Stefankovic:
The Complexity of Counting Eulerian Tours in 4-Regular Graphs. - Samir Medina Perlaza, Hamidou Tembine, Samson Lasaulce, Victor Manuel Quintero Florez:
On the Fictitious Play and Channel Selection Games. - Sophie Toulouse, Roberto Wolfler Calvo:
On the complexity of the multiple stack TSP, kSTSP. - Sophie Toulouse:
Approximability of the Multiple Stack TSP. - Imen Harbaoui Dridi, Ryan Kammarti, Mekki Ksouri, Pierre Borne:
A Genetic Algorithm for the Multi-Pickup and Delivery Problem with time windows. - B. V. Ashwinkumar:
Buyback Problem - Approximate matroid intersection with cancellation costs. - Abdul Kadar Muhammad Masum, Mohammad Mahadi Hassan, S. M. Kamruzzaman:
The Most Advantageous Bangla Keyboard Layout Using Data Mining Technique. - Kamrul Hasan Talukder:
Bus Protocols: MSC-Based Specifications and Translation into Program of Verification Tool for Formal Verification. - Shamim Hasnat Ripon, Kamrul Hasan Talukder, M. Khademul Islam Molla:
Modelling Variability for System Families. - Avik Chakraborty:
Testing of Bridging Faults in AND-EXOR based Reversible Logic Circuits. - Daniil Musatov:
Theorems about space-bounded Kolmogorov complexity obtained by "naive" derandomization. - (Withdrawn) Opportunistic Interference Alignment for $K$-user Interference Networks.
- (Withdrawn) FAST: Kernelization based on Graph Modular Decomposition.
- Yonghui Li, Raymond H. Y. Louie, Branka Vucetic:
Relay Selection with Network Coding in Two-Way Relay Channels. - Ali Tajer, Narayan Prasad, Xiaodong Wang:
Robust Linear Precoder Design for Multi-cell Downlink Transmission. - Eya Ben Ahmed, Mohamed Salah Gouider:
Towards an incremental maintenance of cyclic association rules. - Ramachandran Rajesh, Vinod Sharma:
Information Capacity of Energy Harvesting Sensor Nodes. - Konstantin Voevodski, Maria-Florina Balcan, Heiko Röglin, Shang-Hua Teng, Yu Xia:
Efficient Clustering with Limited Distance Information. - Florian Reitz:
A Framework for an Ego-centered and Time-aware Visualization of Relations in Arbitrary Data Repositories. - Stéphane Demri, Alexander Rabinovich:
The complexity of linear-time temporal logic over the class of ordinals. - Evmorfia N. Argyriou, Michael A. Bekos, Antonios Symvonis:
The Straight-Line RAC Drawing Problem is NP-Hard. - Nassib Nassar:
A Simple Abstraction for Data Modeling. - Xintao Liu, Bin Jiang:
Defining and Generating Axial Lines from Street Center Lines for better Understanding of Urban Morphologies. - Yong Fang:
Approximation of DAC Codeword Distribution for Equiprobable Binary Sources along Proper Decoding Paths. - Xin Liu, Ying Ding, Forrest Sheng Bao:
General Scaled Support Vector Machines. - Mladen Nikolic:
Measuring Similarity of Graphs and their Nodes by Neighbor Matching. - Albert Sunny, Joy Kuri, Saurabh Aggarwal:
Application Delay Modelling for Variable Length Packets in Single Cell IEEE 802.11 WLANs. - Somayeh Fatahi, Ali Reza Manashty, Zahra Forootan Jahromi:
Vast Educational Mobile Content Broadcasting using ARMrayan Multimedia Mobile CMS. - Mateus de Oliveira Oliveira:
Canonizable Partial Order Generators. - Murugesan Kuttikrishnan:
A Novel Approach for Cardiac Disease Prediction and Classification Using Intelligent Agents. - Ali Reza Manashty, Mohammad Reza Ahmadzadeh Raji, Zahra Forootan Jahromi, Amir Rajabzadeh:
ARMrayan Multimedia Mobile CMS: a Simplified Approach towards Content-Oriented Mobile Application Designing. - Philipp Mayr, Benjamin Zapilko, York Sure:
Establishing a Multi-Thesauri-Scenario based on SKOS and Cross-Concordances. - Tugkan Batu, Lance Fortnow, Ronitt Rubinfeld, Warren D. Smith, Patrick White:
Testing Closeness of Discrete Distributions. - Ali Reza Manashty, Amir Rajabzadeh, Zahra Forootan Jahromi:
A Scenario-Based Mobile Application for Robot-Assisted Smart Digital Homes. - Christina Aperjis, Bernardo A. Huberman:
Social Attention and the Provider's Dilemma. - Eric Brochu, Matthew W. Hoffman, Nando de Freitas:
Portfolio Allocation for Bayesian Optimization. - Serguei A. Mokhov, Joey Paquet, Mourad Debbabi:
The Need to Support of Data Flow Graph Visualization of Forensic Lucid Programs, Forensic Evidence, and their Evaluation by GIPSY. - Guohun Zhu:
Determining All Maximum Uniquely Restricted Matching in Bipartite Graphs. - Paul Merolla, Tristan Ursell, John V. Arthur:
The thermodynamic temperature of a rhythmic spiking network. - Sándor Soós, George Kampis:
Diversity and Polarization of Research Performance: Evidence from Hungary. - Amr Elmasry, Arash Farzan, John Iacono:
Priority Queues with Multiple Time Fingers. - Amir Rajabzadeh, Ali Reza Manashty, Zahra Forootan Jahromi:
A Mobile Application for Smart House Remote Control System. - Thomas Hugel, Yacine Boufkhad:
Second Moment Method on k-SAT: a General Framework. - Pierre Guillon, Pierre-Etienne Meunier, Guillaume Theyssier:
Clandestine Simulations in Cellular Automata. - Erik D. Demaine, Sándor P. Fekete, Günter Rote, Nils Schweer, Daria Schymura, Mariano Zelke:
Integer Point Sets Minimizing Average Pairwise L1-Distance: What is the Optimal Shape of a Town? - Tomás Brázdil, Václav Brozek, Kousha Etessami:
One-Counter Stochastic Games. - Simon R. Thorne:
Defending the future: An MSc module in End User Computing Risk Management. - Dermot Balson:
Changing User Attitudes to Reduce Spreadsheet Risk. - Angus Dunn:
Spreadsheets - the Good, the Bad and the Downright Ugly. - Roland Kays, Sameer Tilak, Bart Kranstauber, Patrick A. Jansen, Chris Carbone, Marcus J. Rowcliffe, Tony Fountain, Jay Eggert, Zhihai He:
Monitoring wild animal communities with arrays of motion sensitive camera traps. - Nishant Doshi:
A secure email login system using virtual password. - Deeparnab Chakrabarty, Chandra Chekuri, Sanjeev Khanna, Nitish Korula:
Approximability of Capacitated Network Design. - Sakrapee Paisitkriangkrai, Chunhua Shen, Jian Zhang:
Face Detection with Effective Feature Extraction. - Arseny M. Shur:
On ternary square-free circular words. - Shun Watanabe, Yasutada Oohama:
Secret Key Agreement from Vector Gaussian Sources by Rate Limited Public Communication. - Matthew D. Hoffman:
Approximate Maximum A Posteriori Inference with Entropic Priors. - Jiaji Wu, Yan Xing, Anand Paul, Yong Fang, Jechang Jeong, Licheng Jiao, Guangming Shi:
Morphological dilation image coding with context weights prediction. - Brian M. Kurkoski:
The E8 Lattice and Error Correction in Multi-Level Flash Memory. - Nicholas Mastronarde, Mihaela van der Schaar:
Fast Reinforcement Learning for Energy-Efficient Wireless Communications. - Martin R. Ehmsen, Jens S. Kohrt, Kim S. Larsen:
List Factoring and Relative Worst Order Analysis. - Yoram Bachrach, Ely Porat:
Fast Pseudo-Random Fingerprints. - Elena Dubrova:
Synthesis of Binary k-Stage Machines. - Yasutada Oohama, Shun Watanabe:
Capacity Results for Relay Channels with Confidential Messages. - Tobias Baumgartner, Sándor P. Fekete, Winfried Hellmann, Alexander Kroeller:
Simultaneous Event Execution in Heterogeneous Wireless Sensor Networks. - Jérémy Barbay, Johannes Fischer:
LRM-Trees: Compressed Indices, Adaptive Sorting, and Compressed Permutations. - Adrian Heissler:
Performance analysis of Xen virtual machines in real-world scenarios. - Leonid A. Levin:
Some Theorems on the Algorithmic Approach to Probability Theory and Information Theory. - Jiaming Xu, Jun Zhang, Jeffrey G. Andrews:
On the Accuracy of the Wyner Model in Cellular Networks. - J. M. Christian Bastien:
Usability testing: a review of some methodological and technical aspects of the method. - Mahdi Lotfinezhad, Peter Marbach:
Throughput-Optimal Random Access with Order-Optimal Delay. - Gam D. Nguyen:
Fast CRCs (Extended Version). - Xiugang Wu, Liang-Liang Xie:
On the Optimality of Successive Decoding in Compress-and-Forward Relay Schemes. - Raphael Pelossof, Zhiliang Ying:
The Attentive Perceptron. - Omur Ozel, Sennur Ulukus:
Information-Theoretic Analysis of an Energy Harvesting Communication System. - Jianshu Chen, Jian Wang, Xiuming Shan, Ning Ge, Xiang-Gen Xia:
Performance Analysis of the Matrix Pair Beamformer with Matrix Mismatch. - Reza Khosravi-Farsani, Farokh Marvasti:
Multiple Access Channels with Cooperative Encoders and Channel State Information. - Murat Kayri, Ismail Kayri:
A proposed "osi based" network troubles identification model. - Pavel Chebotarev:
Comments on "Consensus and Cooperation in Networked Multi-Agent Systems". - Sharmila Sankar, V. Sankaranarayanan:
A Low Overhead Reachability Guaranteed Dynamic Route Discovery Mechanism for Dense MANETs. - Jesus Selva:
Efficient Sampling of Band-limited Signals from Sine Wave Crossings. - Virag Shah, Bikash Kumar Dey, D. Manjunath:
Network Flows for Functions. - Jian Wang, Jianshu Chen, Jian Yuan, Ning Ge, Shuangqing Wei:
A Multi-Interference-Channel Matrix Pair Beamformer for CDMA Systems. - Prasun Chowdhury, Iti Saha Misra:
A Fair and Efficient Packet Scheduling Scheme for IEEE 802.16 Broadband Wireless Access Systems. - Novella Bartolini, Tiziana Calamoneri, Tom La Porta, Chiara Petrioli, Simone Silvestri:
Sensor Activation and Radius Adaptation (SARA) in Heterogeneous Sensor Networks. - M. A. Cerdà-Uguet, Michel P. Schellekens, Óscar Valero:
The Baire partial quasi-metric space: A mathematical tool for asymptotic complexity analysis in Computer Science. - Tobias Marschall, Sven Rahmann:
Exact Analysis of Pattern Matching Algorithms with Probabilistic Arithmetic Automata. - Clifton Phua, Vincent C. S. Lee, Kate Smith-Miles, Ross W. Gayler:
A Comprehensive Survey of Data Mining-based Fraud Detection Research. - Hong Jiang:
Efficient Knowledge Base Management in DCSP. - Indranil Hatai, Indrajit Chakrabarti:
Multi-standard programmable baseband modulator for next generation wireless communication. - Muhammad Shoaib Saleem, Éric Renault, Djamal Zeghlache:
NetInf Mobile Node Architecture and Mobility Management based on LISP Mobile Node. - Alwen Tiu, Alberto Momigliano:
Cut Elimination for a Logic with Induction and Co-induction. - Qing Chen, Mustafa Cenk Gursoy:
Goodput Maximization in Cooperative Networks with ARQ. - S. M. Thamarai, Kuppusamy Krishnamoorthy, T. Meyyappan:
Heuristic approach to optimize the number of test cases for simple circuits. - Junwei Zhang, Mustafa Cenk Gursoy:
Secure Relay Beamforming over Cognitive Radio Channels. - Junwei Zhang, Mustafa Cenk Gursoy:
Optimal Power Allocation for Secrecy Fading Channels Under Spectrum-Sharing Constraints. - Deli Qiao, Mustafa Cenk Gursoy, Senem Velipasalar:
Channel Coding over Multiple Coherence Blocks with Queueing Constraints. - Deli Qiao, Mustafa Cenk Gursoy, Senem Velipasalar:
On the Effective Capacity of Two-Hop Communication Systems. - Björn Andres, Ullrich Köthe, Thorben Kröger, Fred A. Hamprecht:
How to Extract the Geometry and Topology from Very Large 3D Segmentations. - H. G. Rangaraju, U. Venugopal, K. N. Muralidhara, K. B. Raja:
Low Power Reversible Parallel Binary Adder/Subtractor. - Keyvan Yahya, Jafar Biazar, Hossein Azari, Pouyan Rafiei Fard:
Variational Iteration Method for Image Restoration. - Jonathan Chappelon, Akihiro Matsuura:
On generalized Frame-Stewart numbers. - Xiao-Shan Gao, Wei Li, Chun-Ming Yuan:
Intersection Theory for Generic Differential Polynomials and Differential Chow Form. - Laurent Decreusefond, Philippe Martins, Than-Tung Vu:
An analytical model for evaluating outage and handover probability of cellular wireless networks. - Pablo Sánchez-Moreno, Daniel Manzano, Jesús Sánchez-Dehesa:
Direct spreading measures of Laguerre polynomials. - Matt DeVos, Stéphan Thomassé:
Edge Growth in Graph Cubes. - Kazuo Iwama, Harumichi Nishimura, Rudy Raymond, Junichi Teruyama:
Quantum Counterfeit Coin Problems. - Ricardo López-Ruiz, Juan R. Sánchez:
Complexity and Stochastic Synchronization in Coupled Map Lattices and Cellular Automata. - Attila Szolnoki, Zhen Wang, Jinlong Wang, Xiaodan Zhu:
Dynamically generated cyclic dominance in spatial prisoner's dilemma games. - Alexander Gutfraind, Aric A. Hagberg, David Izraelevitz, Feng Pan:
Interdiction of a Markovian Evader. - G. J. Peterson, Steve Pressé, Ken A. Dill:
Nonuniversal power law scaling in the probability distribution of scientific citations. - Kousuke Yakubo, Dean Korosak:
Scale-free networks embedded in fractal space. - Zhongzhi Zhang, Shuyang Gao, Wenlei Xie:
Impact of degree heterogeneity on the behavior of trapping in Koch networks. - Chris Dietz, Dinard van der Laan, Ad Ridder:
Approximate results for a generalized secretary problem. - T. S. Evans:
Clique Graphs and Overlapping Communities. - Houman Owhadi, Clint Scovel, Timothy John Sullivan, Mike McKerns, Michael Ortiz:
Optimal Uncertainty Quantification. - Songzi Du, Yair Livne:
Chaos and Unraveling in Matching Markets. - Mehryar Mohri, Ameet Talwalkar:
On the Estimation of Coherence. - Nicolas Gillis, François Glineur:
A Multilevel Approach For Nonnegative Matrix Factorization. - Pablo García-Risueño, Pablo Echenique:
Linearly scaling direct method for accurately inverting sparse banded matrices. - Shahar Hod:
Analytic treatment of the network synchronization problem with time delays. - Piotr Migdal:
A mathematical model of the Mafia game. - João F. C. Mota, João M. F. Xavier, Pedro M. Q. Aguiar, Markus Püschel:
Distributed Basis Pursuit. - Balázs Keszegh, János Pach, Dömötör Pálvölgyi:
Drawing planar graphs of bounded degree with few slopes. - Joshua E. S. Socolar, Joan M. Taylor:
Forcing nonperiodicity with a single tile. - Aseem Brahma, Sanmay Das, Malik Magdon-Ismail:
Comparing Prediction Market Structures, With an Application to Market Making. - Ricardo López-Ruiz, Héctor Mancini, Xavier Calbet:
A Statistical Measure of Complexity. - Prabha Mandayam, Stephanie Wehner:
Achieving the physical limits of the bounded-storage model. - Vincent Pilaud:
Multitriangulations, pseudotriangulations and some problems of realization of polytopes. - Christopher R. Laumann, R. Moessner, A. Scardicchio, S. L. Sondhi:
Statistical mechanics of classical and quantum computational complexity. - L. Tao, M. Ramakrishna:
Multi-scale turbulence modeling and maximum information principle. Part 1. - Dominik Janzing:
Is there a physically universal cellular automaton or Hamiltonian? - Matteo Barigozzi, Giorgio Fagiolo, Giuseppe Mangioni:
Identifying the Community Structure of the International-Trade Multi Network. - Esther Hänggi, Renato Renner:
Device-Independent Quantum Key Distribution with Commuting Measurements. - Tran The Truyen, Dinh Q. Phung, Hung Hai Bui, Svetha Venkatesh:
Hierarchical Semi-Markov Conditional Random Fields for Recursive Sequential Data. - L. G. Meredith, David F. Snyder:
Knots as processes: a new kind of invariant. - Ezra Miller:
Affine stratifications from finite misère quotients. - Xiaodi Wu:
Parallelized Solution to Semidefinite Programmings in Quantum Complexity Theory. - Amelia Carolina Sparavigna:
Symbolic landforms created by ancient earthworks near Lake Titicaca. - Monireh Houshmand, Saied Hosseini-Khayat:
Minimal-memory realization of pearl-necklace encoders of general quantum convolutional codes. - Vladimir Privman, Jan Halamek, Mary A. Arugula, Dmitriy A. Melnikov, Vera Bocharova, Evgeny Katz:
Biochemical Filter with Sigmoidal Response: Increasing the Complexity of Biomolecular Logic. - Hao Huang, Choongbum Lee:
Quasi-randomness of graph balanced cut properties. - Boris Bukh:
Radon partitions in convexity spaces. - Harry Buhrman, Nishanth Chandran, Serge Fehr, Ran Gelles, Vipul Goyal, Rafail Ostrovsky, Christian Schaffner:
Position-Based Quantum Cryptography: Impossibility and Constructions. - Jürgen Schmidhuber:
Evolution of National Nobel Prize Shares in the 20th Century. - Myung Jin Choi, Vincent Y. F. Tan, Animashree Anandkumar, Alan S. Willsky:
Learning Latent Tree Graphical Models. - Mai Gehrke, Jacob Vosmaer:
A view of canonical extension. - Ezra Miller:
Theory and applications of lattice point methods for binomial ideals. - Guillaume Chèze:
Computation of Darboux polynomials and rational first integrals with bounded degree in polynomial time. - Hans Noel, Brendan Nyhan:
The "Unfriending" Problem: The Consequences of Homophily in Friendship Retention for Causal Estimates of Social Influence. - Sebastian Schmutzhard, Alexander Jung, Franz Hlawatsch, Zvika Ben-Haim, Yonina C. Eldar:
A Lower Bound on the Estimator Variance for the Sparse Linear Model. - Steve Kirkland, Simone Severini:
Spin systems dynamics and faults detection in threshold networks. - Sam van Gool:
Duality and canonical extensions for stably compact spaces. - Giuseppe Scollo:
An integration of Euler's pentagonal partition. - Peter G. Casazza, Andreas Heinecke, Felix Krahmer, Gitta Kutyniok:
Optimally Sparse Frames. - Siegfried Bethke:
Data Preservation in High Energy Physics - why, how and when? - Serdar Yüksel, Tamás Linder:
Optimization and Convergence of Observation Channels in Stochastic Control. - Tomasz Przedzinski:
Software for physics of tau lepton decay in LHC experiments. - Golnoosh Bizhani, Vishal Sood, Maya Paczuski, Peter Grassberger:
Random Sequential Renormalization of Networks I: Application to Critical Trees. - Cristopher Moore, Alexander Russell:
Regarding a Representation-Theoretic Conjecture of Wigderson. - Christian Trott, Lars Winterfeld:
General purpose Molecular Dynamics Simulations on GPUs: Issues of Pair Forces and Scaling to large Clusters. - Boaz Barak, Zeev Dvir, Avi Wigderson, Amir Yehudayoff:
Rank Bounds for Design Matrices with Applications to Combinatorial Geometry and Locally Correctable Codes. - Boris N. Oreshkin, Xuan Liu, Mark Coates:
Efficient delay-tolerant particle filtering. - Andrey Yu. Rumyantsev, Maxim Ushakov:
Forbidden substrings, Kolmogorov complexity and almost periodic sequences. - L. Sunil Chandran, Rogers Mathew, Naveen Sivadasan:
Boxicity of Line Graphs. - Franco Ruzzenenti, Diego Garlaschelli, Riccardo Basosi:
Complex Networks and Symmetry II: Reciprocity and Evolution of World Trade. - Yoshihiko Kayama:
Complex networks derived from cellular automata. - Dömötör Pálvölgyi:
Decomposition of Geometric Set Systems and Graphs. - Stephen L. Adler:
Parameterized Adaptive Multidimensional Integration Routines (PAMIR): Localization by Repeated 2^p Subdivision. - Raluca Mihaela Andrei, Marco Callieri, Maria Francesca Zini, Tiziana Loni, Giuseppe Maraziti, Mike Chen Pan, Monica Zoppè:
BioBlender: a Software for Intuitive Representation of Surface Properties of Biomolecules. - Ioana Dumitriu:
Smallest eigenvalue distributions for $\beta$-Jacobi ensembles. - Veit Elser, Stefan Eisebitt:
Uniqueness transition in noisy phase retrieval. - Adolfo Paolo Masucci, Víctor M. Eguíluz, Emilio Hernández-García, Alkiviadis Kalampokis:
Extracting directed information flow networks: an application to genetics and semantics. - Andrea Baronchelli:
Do you agree? Role of feedback and broadcasting in the Naming Game. - Eliseo Sarmiento, Maria Vaz Pinto, Rafael H. Villarreal:
The minimum distance of parameterized codes of complete intersection vanishing ideals over finite fields. - Shun Wang, Eric de Sturler, Glaucio H. Paulino:
Dynamic Adaptive Mesh Refinement for Topology Optimization. - Andrey Yu. Rumyantsev:
Kolmogorov complexity, Lovasz local lemma and critical exponents. - Marius Buliga:
What is a space? Computations in emergent algebras and the front end visual system. - Scott Aaronson:
The Equivalence of Sampling and Searching. - Kevin H. Knuth:
Information Physics: The New Frontier. - Thomas Fernique, Nicolas Ollinger:
Combinatorial substitutions and sofic tilings. - Roy W. Keyes, Christian Romano, Dorian C. Arnold, Shuang Luan:
Radiation therapy calculations using an on-demand virtual cluster via cloud computing. - Ana L. Pastore y Piontti, Lidia A. Braunstein, Pablo A. Macri:
Jamming in complex networks with degree correlation. - Vincent Pilaud, Michel Pocchiola:
Multitriangulations, pseudotriangulations and primitive sorting networks. - Yukio Hayashi:
An approximative calculation of the fractal structure in self-similar tilings. - Pu Gao, Nicholas C. Wormald:
Orientability thresholds for random hypergraphs. - Ian R. Manchester:
Input Design for System Identification via Convex Relaxation. - Anmer Daskin, Sabre Kais:
Decomposition of Unitary Matrices for Finding Quantum Circuits. - Jonathan McLaughlin:
The Realizable Extension Problem and the Weighted Graph $(K_{3,3},l)$. - Bartlomiej Blaszczyszyn, D. Yogeshwaran:
Connectivity in Sub-Poisson Networks. - Josue G. Martinez, Jianhua Z. Huang, Robert C. Burghardt, Rola Barhoumi, Raymond J. Carroll:
Use of multiple singular value decompositions to analyze complex intracellular calcium ion signals. - Vladimir Vasilich Tregub:
Productivity tools to study constrained motion: electrician's approach to mechanician's problem. - David R. Bickel:
Minimum description length methods of medium-scale simultaneous inference. - Madhav P. Desai:
On Cycles in Random Graphs. - David Pritchard, Thomas Rothvoß:
Edge-Colouring Hypergraphs Properly (Covering with Matchings) or Polychromatically (Packing Covers). - Cristopher Moore, Alexander Russell:
Approximate Representations and Approximate Homomorphisms. - Daniel Heldt, Kolja Knauer, Torsten Ueckerdt:
Edge-intersection graphs of grid paths: the bend-number. - Zhouchen Lin, Minming Chen, Yi Ma:
The Augmented Lagrange Multiplier Method for Exact Recovery of Corrupted Low-Rank Matrices. - Filippo Radicchi, José J. Ramasco, Santo Fortunato:
Information filtering in complex weighted networks. - Esther Hänggi, Jürg Wullschleger:
Tight bounds for classical and quantum coin flipping. - Erhan Bayraktar, Yu-Jui Huang:
On the Multi-Dimensional Controller and Stopper Games. - Alekh Agarwal, Peter L. Bartlett, Pradeep Ravikumar, Martin J. Wainwright:
Information-theoretic lower bounds on the oracle complexity of stochastic convex optimization. - Daoyi Dong, Ian R. Petersen:
Sliding Mode Control of Two-Level Quantum Systems.
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.