default search action
CoRR, August 2009
- Mohamed Abdel Latif, Ahmed K. Sultan, Hesham El Gamal:
Keys through ARQ. - B. V. Ashwinkumar, Robert Kleinberg:
Randomized Online Algorithms for the Buyback Problem. - Tadashi Wadayama:
On Random Construction of a Bipolar Sensing Matrix with Compact Representation. - Jagadeesh Harshan, B. Sundar Rajan, Are Hjørungnes:
High-Rate, Distributed Training-Embedded Complex Orthogonal Designs for Relay Networks. - Mugurel Ionut Andreica:
Algorithmic Decision Optimization Techniques for Multiple Types of Agents with Contrasting Interests. - J. C. Miraclin Joyce Pamila, K. Thanushkodi:
Log Management support for recovery in mobile computing Environment. - Abhik Kumar Das, Shweta Agrawal, Sriram Vishwanath:
Algebraic Traceback for Dynamic Networks. - Manas Paul, Tanmay Bhattacharya, Suvajit Pal, Ranit Saha:
A Novel Generic Session Based Bit Level Encryption Technique to Enhance Information Security. - Hamed O. Ghaffari, Majid Ejtemaei, Mehdi Irannajad:
Knowledge Discovery of Hydrocyclone s Circuit Based on SONFIS and SORST. - Azeez Nureni Ayofe, Osunade Oluwaseyifunmitan:
Approach To Solving Cybercrime And Cybersecurity. - Florentin Smarandache, Mark Alford:
A Class of DSm Conditional Rules. - Kalpana Sharma, Mrinal Kanti Ghose, Kuldeep:
Complete Security Framework for Wireless Sensor Networks. - Atta Ebrahim E. ElAlfi, M. Esmel ElAlami:
Intelligent Advisory System for Supporting University Managers in Law. - Alexei Barbosa de Aguiar, Alvaro de Menezes S. Neto, Plácido Rogério Pinheiro, André L. V. Coelho:
Applicability of a Novel Integer Programming Model for Wireless Sensor Networks. - Ariel Daliot, Danny Dolev:
Self-stabilizing Byzantine Agreement. - Liang-Liang Xie:
An Improvement of Cover/El Gamal's Compress-and-Forward Relay Scheme. - Alex A. Stewart, Marta F. Antoszkiewicz:
BGP Route Analysis and Management Systems. - Wenguang Wang, Andreas Tolk, Weiping Wang:
The Levels of Conceptual Interoperability Model: Applying Systems Engineering Principles to M&S. - A. W. Naji, Shihab A. Hameed, B. B. Zaidan, Wajdi F. Al-Khateeb, Othman O. Khalifa, A. A. Zaidan, Teddy Surya Gunawan:
Novel Framework for Hidden Data in the Image Page within Executable File Using Computation between Advanced Encryption Standard and Distortion Techniques. - Shilpa Kale, S. S. Shriramwar:
FPGA-based Controller for a Mobile Robot. - E. A. Mary Anita, V. Vasudevan:
Performance Evaluation of Mesh based Multicast Reactive Routing Protocol under Black Hole Attack. - Manfred Kufleitner:
On Bijective Variants of the Burrows-Wheeler Transform. - Eren Sasoglu, Emre Telatar, Erdal Arikan:
Polarization for arbitrary discrete memoryless channels. - Adimurthi, G. D. Veerappa Gowda, Jérôme Jaffré:
Applications of the DFLU flux to systems of conservation laws. - Siddharth Barman, Shuchi Chawla:
Region growing for multi-route cuts. - Yang Weng, Daniela Tuninetti:
Outage analysis of Block-Fading Gaussian Interference Channels. - I-Hong Hou, P. R. Kumar:
Utility Maximization for Delay Constrained QoS in Wireless. - Marko A. Rodriguez:
A Reflection on the Structure and Process of the Web of Data. - Karthekeyan Chandrasekaran, Navin Goyal, Bernhard Haeupler:
Deterministic Algorithms for the Lovasz Local Lemma. - Zohir Bouzid, Maria Potop-Butucaru, Sébastien Tixeuil:
Byzantine Convergence in Robots Networks: The Price of Asynchrony. - Emmanuelle Anceaume, Romaric Ludinard, Bruno Sericola, Frédéric Tronel, Francisco Vilar Brasileiro:
Analytical Study of Adversarial Strategies in Cluster-based Overlays. - Gerhard Mayer:
Data management in systems biology I - Overview and bibliography. - Slawomir Staworko, Jan Chomicki, Jerzy Marcinkowski:
Prioritized Repairing and Consistent Query Answering in Relational Databases. - Shenghui Su, Shuwang Lü:
REESSE1+ . Reward . Proof by Experiment. - Ares Ribó Mor, Günter Rote, André Schulz:
Small grid embeddings of 3-polytopes. - Francisco Javier López-Fraguas, Stephan Merz, Juan Rodríguez-Hortalá:
A Formalization of the Semantics of Functional-Logic Programming in Isabelle. - Minji Kim, Daniel Enrique Lucani, Xiaomeng Shi, Fang Zhao, Muriel Médard:
Network Coding for Multi-Resolution Multicast. - Hongyang Chen, Qingjiang Shi, Pei Huang, H. Vincent Poor, Kaoru Sezaki:
Mobile Anchor Assisted Node Localization for Wireless Sensor Networks. - Juan Julián Merelo Guervós:
Still doing evolutionary algorithms with Perl. - J. Hanumanthappa, D. H. Manjaiah:
IPv6 and IPv4 Threat reviews with Automatic Tunneling and Configuration Tunneling Considerations Transitional Model:A Case Study for University of Mysore Network. - Shishir Kumar, Umashankar Rawat, Sameer Kumar Jasra, Akshay Kumar Jain:
Efficient methodology for implementation of Encrypted File System in User Space. - Oktie Hassanzadeh, Anastasios Kementsietsidis, Lipyeow Lim, Renée J. Miller, Min Wang:
LinkedCT: A Linked Data Space for Clinical Trials. - Piyush Rai, Hal Daumé III:
The Infinite Hierarchical Factor Regression Model. - Piyush Rai, Hal Daumé III, Suresh Venkatasubramanian:
Streamed Learning: One-Pass SVMs. - Jeremy Pickens, Gene Golovchinsky, Meredith Ringel Morris:
Proceedings of 1st International Workshop on Collaborative Information Seeking. - Meredith Ringel Morris, Jaime Teevan:
Understanding Groups' Properties as a Means of Improving Collaborative Search Systems. - I-Hong Hou, P. R. Kumar:
Scheduling Heterogeneous Real-Time Traffic over Fading Wireless Channels. - Ke Xu, Lian-dong Liu, Xiao Liang:
Complex networks: A mixture of power-law and Weibull distributions. - Brynn M. Evans, Ed Huai-hsin Chi:
Towards a Model of Understanding Social Search. - Arash Amini, Farrokh Marvasti:
Deterministic Construction of Compressed Sensing Matrices using BCH Codes. - Laurent Jacques:
A Short Note on Compressed Sensing with Partially Known Signal Support. - Paolo Dini, Jaume Nin-Guerrero, Josep Mangues-Bafalluy, Lillian L. Dai, Sateesh Addepalli:
Interworking Scheme Using Optimized SIP Mobility for MultiHomed Mobile Nodes in Wireless Heterogeneous Networks. - Christian Wulff-Nilsen:
Girth of a Planar Digraph with Real Edge Weights in O(n(log n)^3) Time. - Max L. Wilson, m. c. schraefel:
Evaluating Collaborative Search Interfaces with Information Seeking Theory. - Gene Golovchinsky, Jeremy Pickens, Maribeth Back:
A Taxonomy of Collaboration in Online Information Seeking. - Chirag Shah:
Toward Collaborative Information Seeking (CIS). - Hongyi Yao, Sidharth Jaggi, Minghua Chen:
Network coding tomography for network failures. - Osameh M. Al-Kofahi, Ahmed E. Kamal:
Max-Flow Protection using Network Coding. - Gongguo Tang, Arye Nehorai:
Performance analysis for sparse support recovery. - Heide Gluesing-Luerssen, Uwe Helmke, José Ignacio Iglesias Curto:
Algebraic Decoding for Doubly Cyclic Convolutional Codes. - Madhu C. Reddy, Bernard J. Jansen:
Learning about Potential Users of Collaborative Information Retrieval Systems. - Daniel Golovin, Andreas Krause, Matthew J. Streeter:
Online Learning of Assignments that Maximize Submodular Functions. - Li Li:
Modulo-Limiter Modulation. - Dario Rossi, Claudio Testa, Silvio Valenti, Paolo Veglia, Luca Muscariello:
News from the Internet congestion control world. - Genaro Juárez Martínez, Andrew Adamatzky, Harold V. McIntosh:
Localization dynamics in a binary two-dimensional cellular automaton: the Diffusion Rule. - Petr R. Ivankov:
Top-down Paradigm in Engineering Software Integration. - Andrew Adamatzky, Genaro Juárez Martínez, Liang Zhang, Andrew Wuensche:
Operating binary strings using gliders and eaters in reaction-diffusion cellular automaton. - Tobias Renk, Holger Jaekel, Friedrich K. Jondral, Deniz Gündüz, Andrea J. Goldsmith:
Outage Capacity of Incremental Relaying at Low Signal-to-Noise Ratios. - Moustafa Seifeldin, Moustafa Youssef:
Nuzzer: A Large-Scale Device-Free Passive Localization System for Wireless Environments. - Onur Ozan Koyluoglu, Can Emre Koksal, Hesham El Gamal:
On Secrecy Capacity Scaling in Wireless Networks. - Colum Foley, Alan F. Smeaton:
Evaluation of Coordination Techniques in Synchronous Collaborative Information Retrieval. - Frank Hopfgartner, David Vallet, Martin Halvey, Joemon M. Jose:
Collaborative Search Trails for Video Search. - Angus Dunn:
Automated Spreadsheet Development. - Bill Bekenn, Ray Hooper:
Some Spreadsheet Poka-Yoke. - M. Sriram Iyengar, John R. Svirbely:
The Medical Algorithms Project. - Ruth McKeever, Kevin McDaid, Brian Bishop:
An Exploratory Analysis of the Impact of Named Ranges on the Debugging Performance of Novice Users. - Eddie White:
Clustering for Improved Learning in Maze Traversal Problem. - Yuval Emek, Amos Korman, Yuval Shavitt:
Computing the Expected Values of some Properties of Randomly Weighted Graphs. - A. Damodaram, H. Jayasri:
Authentication Without Identification using Anonymous Credential System. - Syed Sajjad Rizvi, Khaled M. Elleithy, Aasia Riasat:
Deterministic Formulization of SNR for Wireless Multiuser DS-CDMA Networks. - Syed Sajjad Rizvi, Khaled M. Elleithy:
A New Scheme for Minimizing Malicious Behavior of Mobile Nodes in Mobile Ad Hoc Networks. - Maryam Hosseini-Pozveh, Mohammad Ali Nematbakhsh, Naser Movahhedinia:
A multidimensional approach for context-aware recommendation in mobile commerce. - C. Balasubramanian, K. Duraiswamy:
An Application of Bayesian classification to Interval Encoded Temporal mining with prioritized items. - Abdulqader M. El-Sayed:
Ethernet Networks: Current Trends and Tools. - Tobias Renk, Holger Jaekel, Friedrich K. Jondral:
Outage Regions and Optimal Power Allocation for Wireless Relay Networks. - Durgesh Kumar Mishra, Neha Koria, Nikhil Kapoor, Ravish Bahety:
A Secure Multi-Party Computation Protocol for Malicious Computation Prevention for preserving privacy during Data Mining. - Rui Wang, Vincent K. N. Lau, Kaibin Huang:
A New Scaling Law on Throughput and Delay Performance of Wireless Mobile Relay Networks over Parallel Fading Channels. - Kamalesh V. N, S. K. Srivatsa:
Topological design of minimum cost survivable computer communication networks, Bipartite Graph Method. - Abd El Naser A. Mohammed, Mohamed M. E. El-Halawany, Ahmed Nabih Zaki Rashed, Mahmoud M. A. Eid:
Recent Applications of Optical Parametric Amplifiers in Hybrid WDM TDM Local Area Optical Networks. - Abd El Naser A. Mohammed, Mohamed M. E. El-Halawany, Ahmed Nabih Zaki Rashed, Amina E. M. El-Nabawy:
Transmission Performance Analysis of Digital Wire and Wireless Optical Links in Local and Wide Areas Optical Networks. - Chantal Enguehard, Rémi Lehn:
Vulnerability analysis of three remote voting methods. - Ali Tajer, Guido H. Jajamovich, Xiaodong Wang, George V. Moustakides:
Optimal Joint Target Detection and Parameter Estimation By MIMO Radar. - Rudy R. Negenborn, Bart De Schutter, Johannes Hellendoorn:
Multi-Agent Model Predictive Control: A Survey. - Ali Tajer, Narayan Prasad, Xiaodong Wang:
Beamforming and Rate Allocation in MISO Cognitive Radio Networks. - Anshuman Sinha:
Study of Proposed Methods for Improving TCP Performance Over Wireless Links. - Shahid Mumtaz, Atílio Gameiro, Rasool Sadeghi:
Enhanced Algorithm for Link to System level Interface Mapping. - Norbert Bátfai:
On the Running Time of the Shortest Programs. - Jagadeesh Harshan, B. Sundar Rajan:
STBCs with Reduced Sphere Decoding Complexity for Two-User MIMO-MAC. - Jagadeesh Harshan, B. Sundar Rajan:
Trellis Coded Modulation for Two-User Unequal-Rate Gaussian MAC. - Vijay V. Vazirani:
2-Player Nash and Nonsymmetric Bargaining via Flexible Budget Markets. - Carlos Javier Hernández-Castro, Arturo Ribagorda, Yago Sáez:
Side-channel attack on labeling CAPTCHAs. - Patrick O'Beirne:
Checks and Controls in Spreadsheets. - Jocelyn Paine:
Documenting Spreadsheets with Pseudo-Code: an Exercise with Cash-Flow and Loans. - Thomas A. Grossman, Özgür Özlük, Jan Gustavson:
The Lookup Technique to Replace Nested-IF Formulas in Spreadsheet Programming. - Etienne Vandeput:
Milestones for Teaching the Spreadsheet Program. - Leslie Bradley, Kevin McDaid:
Error Estimation in Large Spreadsheets using Bayesian Statistics. - Angela Collins:
Embedded Spreadsheet Modelling. - Matthew Dinmore:
Documenting Problem-Solving Knowledge: Proposed Annotation Design Guidelines and their Application to Spreadsheet Tools. - Derek Flood, Kevin McDaid, Fergal McCaffery:
NLP-SIR: A Natural Language Approach for Spreadsheet Information Retrieval. - Abolfazl S. Motahari, Shahab Oveis Gharan, Amir K. Khandani:
Real Interference Alignment with Real Numbers. - Maher Ben Jemaa, Maryam Kallel Zouari, Bachar Zouari:
A new approach to services differentiation between mobile terminals of a wireless LAN. - Ramachandran Rajesh, Vinod Sharma:
Distributed Joint Source-Channel Coding for Functions over a Multiple Access Channel. - Ramachandran Rajesh, Vinod Sharma:
Joint Source-Channel Coding over a Fading Multiple Access Channel with Partial Channel State Information. - Manish Agarwal, Michael L. Honig, Baris Ata:
Adaptive Training for Correlated Fading Channels with Feedback. - Mark F. Flanagan:
Exposing Pseudoweight Layers in Regular LDPC Code Ensembles. - Jürgen Bierbrauer, Stefano Marcugini, Fernanda Pambianco:
The non-existence of a [[13,5,4]] quantum stabilizer code. - Meijun Zhu, Pengfei Zhang:
Segmentation for radar images based on active contour. - Jonah Sherman:
Breaking the Multicommodity Flow Barrier for sqrt(log(n))-Approximations to Sparsest Cut. - Andrew Gacek, Dale Miller, Gopalan Nadathur:
Nominal Abstraction. - Julien M. Hendrickx, Alexander Olshevsky:
Matrix P-norms are NP-hard to approximate if p \neq 1,2,\infty. - Taposh Banerjee, Vinod Sharma:
Generalized Analysis of a Distributed Energy Efficient Algorithm for Change Detection. - Jonathan A. Kelner, Aleksander Madry:
Faster generation of random spanning trees. - Roya Asadi, Norwati Mustapha, Md Nasir Sulaiman:
Training Process Reduction Based On Potential Weights Linear Analysis To Accelarate Back Propagation Network. - Fen Zhou, Miklós Molnár, Bernard Cousin:
Distance priority based multicast routing in WDM networks considering sparse light splitting. - (Withdrawn) Asymmetric Transmitter Cooperation in Multiuser Wireless Networks: Achievable Rate Regions.
- Avraham Reani, Neri Merhav:
Efficient On-line Schemes for Encoding Individual Sequences with Side Information at the Decoder. - Robert Geisberger:
Contraction of Timetable Networks with Realistic Transfers. - Jay Kumar Sundararajan, Szymon Jakubczak, Muriel Médard, Michael Mitzenmacher, João Barros:
Interfacing network coding with TCP: an implementation. - Françoise Tort, François-Marie Blondel, Eric Bruillard:
From error detection to behaviour observation: first results from screen capture analysis. - Mel Glass, David Ford, Sebastian Dewhurst:
Reducing the Risk of Spreadsheet Usage - a Case Study. - George Kesidis:
A quantum computer network. - Christian A. Duncan, Michael T. Goodrich, Stephen G. Kobourov:
Planar Drawings of Higher-Genus Graphs. - Yi Su, Mihaela van der Schaar:
Linearly Coupled Communication Games. - Samir Medina Perlaza, Elena Veronica Belmega, Samson Lasaulce, Mérouane Debbah:
On the Base Station Selection and Base Station Sharing in Self-Configuring Networks. - Martianus Frederic Ezerman, Markus Grassl, Patrick Solé:
The Weights in MDS Codes. - Patrick Kuppinger, Giuseppe Durisi, Helmut Bölcskei:
Improved Sparsity Thresholds Through Dictionary Splitting. - Bert Huang, Tony Jebara:
Approximating the Permanent with Belief Propagation. - Naveen Kumar, Pranav Agarwal, Aditya Ramamoorthy, Murti V. Salapaka:
Maximum-Likelihood Sequence Detector for Dynamic Mode High Density Probe Storage. - Kajari Ghosh Dastidar, Ted Herman:
Separation of Circulating Tokens. - Javad Ghaderi, R. Srikant:
Towards a Theory of Anonymous Networking. - Hao Zhang, Gang Li, Huadong Meng:
An Efficient Greedy Algorithm for Sparse Recovery in Noisy Environment. - Urs Niesen, Devavrat Shah, Gregory W. Wornell:
Caching in Wireless Networks. - Patrick Erik Bradley:
A dyadic solution of relative pose problems. - Ketan Mulmuley:
On P vs. NP, Geometric Complexity Theory, Explicit Proofs and the Complexity Barrier. - Ketan Mulmuley:
On P vs. NP, Geometric Complexity Theory, and the Riemann Hypothesis. - I-Hsiang Wang, David N. C. Tse:
Interference Mitigation Through Limited Receiver Cooperation: Symmetric Case. - Roxana Smarandache, Mark F. Flanagan:
Spectral Graph Analysis of Quasi-Cyclic Codes. - Danny Bickson, Harel Avissar, Danny Dolev, Stephen P. Boyd, Alexander Ihler, Dror Baron:
Distributed Fault Identification via Non-parametric Belief Propagation. - Fabio Soldo, Anh Le, Athina Markopoulou:
Predictive Blacklisting as an Implicit Recommendation System. - Eric T. Meyer, Ralph Schroeder:
Untangling the Web of E-Research: Towards a Sociology of Online Knowledge. - Ryutaroh Matsumoto:
Problems in application of LDPC codes to information reconciliation in quantum key distribution protocols. - Christian Schulte, Guido Tack:
View-based Propagator Derivation. - Janusz A. Brzozowski, Galina Jirásková, Baiyu Li:
Quotient complexity of ideal languages. - Masoud Zaerin, Babak Seyfe, Hamid R. Nikoofar:
Multiuser Modulation Classification Based on Cumulants in AWGN Channel. - Bobak Nazer, Michael Gastpar:
Compute-and-Forward: Harnessing Interference through Structured Codes. - Magnus Bordewich, Michael H. Freedman, László Lovász, D. Welsh:
Approximate Counting and Quantum Computation. - Yucel Altug, Aaron B. Wagner:
Source and Channel Simulation Using Arbitrary Randomness. - Aboulnasr Hassanien, Sergiy A. Vorobyov:
Phased-MIMO Radar: A Tradeoff Between Phased-Array and MIMO Radars. - Suhan Choi:
Distributed Source Coding with One Distortion Criterion and Correlated Messages. - Maria Bras-Amorós, Michael E. O'Sullivan:
The Berlekamp-Massey Algorithm and the Euclidean Algorithm: a Closer Link. - Makesh Pravin Wilson, Krishna R. Narayanan:
Transmitting an analog Gaussian source over a Gaussian wiretap channel under SNR mismatch. - Gerald Krafft, Vladimir Getov:
Transaction-Oriented Simulation In Ad Hoc Grids: Design and Experience. - Redouane Ali, Suksant Sae Lor, Miguel Rio:
Two Algorithms for Network Size Estimation for Master/Slave Ad Hoc Networks. - Manu Basavaraju, L. Sunil Chandran:
Acyclic Edge coloring of Planar Graphs. - Nikhil Bansal, Nitish Korula, Viswanath Nagarajan:
On k-Column Sparse Packing Programs. - Wiroonsak Santipach, Michael L. Honig:
Optimization of Training and Feedback Overhead for Beamforming over Block Fading Channels. - Abolfazl S. Motahari, Shahab Oveis Gharan, Mohammad Ali Maddah-Ali, Amir K. Khandani:
Forming Pseudo-MIMO by Embedding Infinite Rational Dimensions Along a Single Real Line: Removing Barriers in Achieving the DOFs of Single Antenna Systems. - Danny Dolev, Ezra N. Hoch, Yoram Moses:
An Optimal Self-Stabilizing Firing Squad. - Yara Omar, Moustafa Youssef, Hesham El Gamal:
ARQ Secrecy: From Theory to Practice. - Tsuyoshi Ito:
Polynomial-Space Approximation of No-Signaling Provers. - Sariel Har-Peled:
Being Fat and Friendly is Not Enough. - Xiaojun Tang, Ruoheng Liu, Predrag Spasojevic, H. Vincent Poor:
Interference Assisted Secret Communication. - Andreas Witzel, Krzysztof R. Apt, Jonathan A. Zvesper:
Strategy elimination in games with interaction structures. - Mahboobeh Sedighizad, Babak Seyfe, Keivan Navaie:
MR-BART: Multi-Rate Available Bandwidth Estimation in Real-Time. - Makesh Pravin Wilson, Krishna R. Narayanan:
Power Allocation Strategies and Lattice Based Coding schemes for Bi-directional relaying. - Greg Aloupis, Sébastien Collette, Erik D. Demaine, Stefan Langerman, Vera Sacristán, Stefanie Wuhrer:
Reconfiguration of 3D Crystalline Robots Using O(log n) Parallel Moves. - Greg Aloupis, Jean Cardinal, Sébastien Collette, John Iacono, Stefan Langerman:
Detecting all regular polygons in a point set. - Ji Won Yoon, Hyoungshick Kim, Jun Ho Huh:
Hybrid Spam Filtering for Mobile Communication. - Joseph C. Koo, John T. Gill III:
Low-complexity non-uniform demand multicast network coding problems. - Andrew Chi-Chih Yao, Moti Yung, Yunlei Zhao:
Concurrent Knowledge-Extraction in the Public-Key Model. - Greg Aloupis, Erik D. Demaine, Martin L. Demaine, Vida Dujmovic, John Iacono:
Minimum feature size preserving decompositions. - S. T. Aditya, Onkar Dabeer, Bikash Kumar Dey:
A Channel Coding Perspective of Collaborative Filtering. - Chengqing Li, Shujun Li, Kwok-Tung Lo, Kyandoghere Kyamakya:
A Differential Cryptanalysis of Yen-Chen-Wu Multimedia Cryptography System (MCS). - Jyrki T. Lahtonen, Roope Vehkalahti, Hsiao-feng Lu, Camilla Hollanti, Emanuele Viterbo:
On the Decay of the Determinants of Multiuser MIMO Lattice Codes. - Bob Diertens:
Software Engineering with Process Algebra: Modelling Client / Server Architectures. - Mounita Saha, Dipanwita Roy Chowdhury:
A Secure and Efficient Protocol for Group Key agreement in Heterogeneous Environment. - Shunqing Zhang, Tianyu Wu, Vincent K. N. Lau:
A Low-Overhead Energy Detection Based Cooperative Sensing Protocol for Cognitive Radio Systems. - Anastasios Giovanidis, Slawomir Stanczak:
Stability and Distributed Power Control in MANETs with Outages and Retransmissions. - Claudiu-Florinel Bisu, Jean-Yves K'Nevez, Philippe Darnis, Raynald Laheurte, Alain Gérard:
New method to characterize a machining system: application in turning. - Davood Rafiei, Haobin Li:
Wild Card Queries for Searching Resources on the Web. - Scott Helmer, David Meger, Pooja Viswanathan, Sancho McCann, Matthew Dockrey, Pooyan Fazli, Tristram Southey, Marius Muja, Michael Joya, Jim Little, David G. Lowe, Alan K. Mackworth:
Semantic Robot Vision Challenge: Current State and Future Directions. - Pooyan Fazli, Alan K. Mackworth:
Human-Robot Teams in Entertainment and Other Everyday Scenarios. - Arash Amini, Farrokh Marvasti:
Deterministic Construction of Binary, Bipolar and Ternary Compressed Sensing Matrices. - Edward A. Hirsch, Dmitry Itsykson:
On optimal heuristic randomized semidecision procedures, with application to proof complexity. - Giovanna Carofiglio, Luca Muscariello:
On the impact of TCP and per-flow scheduling on Internet performance (extended version). - Anshul Chaurasia, Sudhanshu Dwivedi, Prateek Jain, Manish K. Gupta:
XTile: An Error-Correction Package for DNA Self-Assembly. - Dexter Kozen, Nicholas Ruozzi:
Applications of Metric Coinduction. - Phong S. Nguyen, Henry D. Pfister, Krishna R. Narayanan:
A Rate-Distortion Perspective on Multiple Decoding Attempts for Reed-Solomon Codes. - Yossi Azar, Benjamin E. Birnbaum, Anna R. Karlin, C. Thach Nguyen:
On Revenue Maximization in Second-Price Ad Auctions. - Aditya Ramamoorthy, Richard D. Wesel:
The Single Source Two Terminal Network with Network Coding. - Béla Genge, Piroska Haller, Iosif Ignat, Ovidiu Ratoi:
Informal specification-based performance evaluation of security protocols. - Hartmut Klauck:
A Strong Direct Product Theorem for Disjointness. - Huang Huang, Vincent K. N. Lau:
Delay-Sensitive Distributed Power and Transmission Threshold Control for S-ALOHA Network with Finite State Markov Fading Channels. - Que Thu Dung Nguyen:
Design and Implementation of a Distributed Middleware for Parallel Execution of Legacy Enterprise Applications. - Nihar B. Shah, K. V. Rashmi, P. Vijay Kumar, Kannan Ramchandran:
Explicit Codes Minimizing Repair Bandwidth for Distributed Storage. - John Hunt:
An approach for the automated risk assessment of structural differences between spreadsheets (DiffXL). - David W. Corne, Joshua D. Knowles:
Techniques for Highly Multiobjective Optimisation: Some Nondominated Points are Better than Others. - Ovidiu Ratoi, Piroska Haller, Ioan Salomie, Béla Genge:
Component based platform for multimedia applications. - Béla Genge, Piroska Haller, Ovidiu Ratoi, Iosif Ignat:
Term-based composition of security protocols. - Maxim A. Kolosovskiy:
Data structure for representing a graph: combination of linked list and hash table. - Béla Genge, Piroska Haller:
A Modeling Framework for Generating Security Protocol Specifications. - Attila Egri-Nagy, Chrystopher L. Nehaniv:
Computational Understanding and Manipulation of Symmetries. - Oren Somekh, Osvaldo Simeone, H. Vincent Poor, Shlomo Shamai:
Throughput of Cellular Uplink with Dynamic User Activity and Cooperative Base-Stations. - Subhash C. Kak:
Another Look at Quantum Neural Computing. - Hsiao-feng Lu, Jyrki T. Lahtonen, Roope Vehkalahti, Camilla Hollanti:
Remarks on the Criteria of Constructing MIMO-MAC DMT Optimal Codes. - Xiaohu Shang, Biao Chen, H. Vincent Poor:
On the Optimality of Beamforming for Multi-User MISO Interference Channels with Single-User Detection. - Krishna Chaithanya Lingashetty:
Location of Single Neuron Memories in a Hebbian Network. - Reinert Korsnes:
Rapid self-organised initiation of ad hoc sensor networks close above the percolation threshold. - A. Yavuz Oruç, Abdullah Atmaca:
Asymptotically Optimal Assignments In Ordinal Evaluations of Proposals. - Anoosheh Heidarzadeh, Amir H. Banihashemi:
Overlapped Chunked Network Coding. - Redha Boubertakh, Jean-François Giovannelli, Alain Herment, Alain De Cesare:
Non-quadratic convex regularized reconstruction of MR images from spiral acquisitions. - Nitin Salodkar, Abhay Karandikar:
Rate Constrained Random Access over a Fading Channel. - Nitin Salodkar, Abhay Karandikar, Vivek S. Borkar:
A Stable On-line Algorithm for Energy Efficient Multi-user Scheduling. - Serge Gorneff:
Mathematical Modeling of Aerodynamic Space -to - Surface Flight with Trajectory for Avoid Intercepting Process for Safety and Security Issues. - Andri Mirzal:
On the Relationship between Trading Network and WWW Network: A Preferential Attachment Perspective. - Marco Almeida, Nelma Moreira, Rogério Reis:
Exact generation of acyclic deterministic finite automata. - Vinith Reddy, Srinivas Shakkottai, Alexander Sprintson, Natarajan Gautam:
Multipath Wireless Network Coding: A Population Game Perspective. - Jacek Turski:
Geometric Analysis of the Conformal Camera for Intermediate-Level Vision and Perisaccadic Perception. - Laurent Denoue, Scott A. Carter, John Adcock, Gene Golovchinsky, Andreas Girgensohn:
WebNC: efficient sharing of web applications. - Willemien Visser:
The Function of Gesture in an Architectural Design Meeting. - Kunal Narayan Chaudhury, Michael Unser:
Construction of Hilbert Transform Pairs of Wavelet Bases and Gabor-like Transforms. - Kunal Narayan Chaudhury, Michael Unser:
On the Shiftability of Dual-Tree Complex Wavelet Transforms. - Jayanta Poray, Christoph Schommer:
A Cognitive Mind-map Framework to Foster Trust. - Mugurel Ionut Andreica, Ion Pargaru, Florin Ionescu, Cristina Teodora Andreica:
Algorithmic Aspects of Several Data Transfer Service Optimization Problems. - Mugurel Ionut Andreica, Mihai Aristotel Ungureanu, Romulus Andreica, Angela Andreica:
An Algorithmic Perspective on Some Network Design, Construction and Analysis Problems. - (Withdrawn) Interpolation-Based QR Decomposition in MIMO-OFDM Systems.
- Philippe Baptiste, Marek Chrobak, Christoph Dürr:
Polynomial Time Algorithms for Minimum Energy Scheduling. - Nan Ma, Prakash Ishwar:
Infinite-message Distributed Source Coding for Two-terminal Interactive Computing. - Liliana Cucu-Grosjean, Joël Goossens:
Predictability of Fixed-Job Priority Schedulers on Heterogeneous Multiprocessor Real-Time Systems. - Gene Golovchinsky:
Cognitive Dimensions Analysis of Interfaces for Information Seeking. - Zoran Hadzi-Velkov, Nikola Zlatanov, George K. Karagiannidis:
An Accurate Approximation to the Distribution of the Sum of Equally Correlated Nakagami-m Envelopes and its Application in Equal Gain Diversity Receivers. - Nikola Zlatanov, Zoran Hadzi-Velkov, George K. Karagiannidis:
Level Crossing Rate and Average Fade Duration of the Double Nakagami-m Random Process and Application in MIMO Keyhole Fading Channels. - Zoran Hadzi-Velkov, Nikola Zlatanov, George K. Karagiannidis:
On the Second Order Statistics of the Multihop Rayleigh Fading Channel. - Vida Dujmovic, Joachim Gudmundsson, Pat Morin, Thomas Wolle:
Notes on large angle crossing graphs. - Zoran Hadzi-Velkov, Nikola Zlatanov, George K. Karagiannidis:
Level Crossing Rate and Average Fade Duration of the Multihop Rayleigh Fading Channel. - Zoran Hadzi-Velkov:
Level Crossing Rate and Average Fade Duration of EGC Systems with Cochannel Interference in Rayleigh Fading. - Zoran Hadzi-Velkov:
Level Crossing Rate and Average Fade Duration of Dual Selection Combining with Cochannel Interference and Nakagami Fading. - Neri Merhav:
Another Look at the Physics of Large Deviations With Application to Rate-Distortion Theory. - Christian Esteve Rothenberg, Carlos Alberto Braz Macapuna, Alexander Wiesmaier:
In-packet Bloom filters: Design and networking applications. - Siti Rahayu Selamat, Robiah Yusof, S. Shahrin, Mohd Faizal Abdollah, Mohd Zaki Mas'ud, R. Irda:
Tracing Technique for Blaster Attack. - Aparna Das, Claire Mathieu, Daniel Ricketts:
Maximizing profit using recommender systems. - Dominique Duval, César Domínguez:
A parameterization process as a categorical construction. - Keiko Nakata:
Lazy mixin modules and disciplined effects. - Mugurel Ionut Andreica, Eliana-Dina Tirsa, Cristina Teodora Andreica, Romulus Andreica, Mihai Aristotel Ungureanu:
Optimal Geometric Partitions, Covers and K-Centers. - Devavrat Shah, Jinwoo Shin:
Randomized Scheduling Algorithm for Queueing Networks. - Renuka Kandregula:
A DHT Based Measure of Randomness. - Hong Ju Park, Ender Ayanoglu:
Bit-Interleaved Coded Multiple Beamforming with Constellation Precoding. - Aly El Gamal, Moustafa Youssef, Hesham El Gamal:
Randomization for Security in Half-Duplex Two-Way Gaussian Channels. - Moustafa Youssef, Adel M. Youssef, Mohamed F. Younis:
Overlapping Multi-hop Clustering for Wireless Sensor Networks. - Sariel Har-Peled:
Carnival of Samplings: Nets, Approximations, Relative and Sensitive. - César Domínguez, Dominique Duval:
Diagrammatic logic applied to a parameterization process. - Ashish Goel, Ian Post:
An Oblivious O(1)-Approximation for Single Source Buy-at-Bulk. - Jarkko Kari, Alexandr Kazda, Paula Steinby:
On Continuous Weighted Finite Automata. - Kunal Narayan Chaudhury, Michael Unser:
Gabor wavelet analysis and the fractional Hilbert transform. - Kunal Narayan Chaudhury, Arrate Muñoz-Barrutia, Michael Unser:
Fast adaptive elliptical filtering using box splines. - Stark C. Draper, Lingjia Liu, Andreas F. Molisch, Jonathan S. Yedidia:
Cooperative Routing for Wireless Networks using Mutual-Information Accumulation. - Harm Hollestelle:
On the Expressiveness of Line Drawings. - Minghui Jiang, Pedro J. Tejada:
Spreading grid cells. - David Eppstein:
Graph-Theoretic Solutions to Computational Geometry Problems. - Stephen L. Smith, Shaunak Dattaprasad Bopardikar, Francesco Bullo:
A Dynamic Boundary Guarding Problem with Translating Targets. - Michael Sirivianos, Xiaowei Yang, Kyungbaek Kim:
SocialFilter: Collaborative Spam Mitigation using Social Networks. - Alexandre Goldsztejn:
On the Exponentiation of Interval Matrices. - Hadj Mahboubi, Jérôme Darmont:
Enhancing XML Data Warehouse Query Performance by Fragmentation. - Yasutada Oohama:
Distributed Source Coding for Correlated Memoryless Gaussian Sources. - Samuel Mimram:
The Structure of First-Order Causality. - Ping Zhu:
An improved axiomatic definition of information granulation. - Emmanuel Nataf, Olivier Festor:
jYang : A YANG parser in java. - Norbert Bátfai:
Recombinations of Busy Beaver Machines. - Vadim E. Levit, David Tankus:
On Relating Edges in Graphs without Cycles of Length 4. - Alireza Bagheri, Mohammadreza Razzazi:
Complexity of Planar Embeddability of Trees inside Simple Polygons. - Venkat Chandar, Aslan Tchamkerten, Gregory W. Wornell:
Training-Based Schemes are Suboptimal for High Rate Asynchronous Communication. - Micha Sharir, Hayim Shaul:
Semi-algebraic Range Reporting and Emptiness Searching with Applications. - Sushma Kejgir, Manesh Kokare:
Optimization of Bit Plane Combination for Efficient Digital Image Watermarking. - Kyomin Jung, Devavrat Shah, Jinwoo Shin:
Distributed Averaging via Lifted Markov Chains. - Priti Maheswary, Namita Srivastava:
Retrieval of Remote Sensing Images Using Colour and Texture Attribute. - Alexander Barg, Arya Mazumdar:
Codes in Permutations and Error Correction for Rank Modulation. - Michael T. Goodrich, Roberto Tamassia, Nikos Triandopoulos:
Efficient Authenticated Data Structures for Graph Connectivity and Geometric Search Problems. - Ping Li:
ABC-LogitBoost for Multi-class Classification. - Suman Saha:
Consideration Points Detecting Cross-Site Scripting. - Nassar Ksairi, Philippe Ciblat, Pascal Bianchi, Walid Hachem:
Performance Analysis over Slow Fading Channels of a Half-Duplex Single-Relay Protocol: Decode or Quantize and Forward. - Zhenning Kong, Edmund M. Yeh, Emina Soljanin:
Coding Improves the Throughput-Delay Trade-off in Mobile Wireless Networks. - Salah Hamdi, Adel Soudani, Rached Tourki:
Experimental Performances Analysis of Load Balancing Algorithms in IEEE 802.11. - Muhammad Salman Asif, William Mantzel, Justin K. Romberg:
Channel Protection: Random Coding Meets Sparse Channels. - Khaled M. Khalil, M. Abdel-Aziz, Taymour T. Nazmy, Abdel-Badeeh M. Salem:
Bridging the Gap between Crisis Response Operations and Systems. - Francis Y. L. Chin, Marek Chrobak, Li Yan:
Algorithms for Placing Monitors in a Flow Network. - Béla Genge, Iosif Ignat, Piroska Haller:
Automated Composition of Security Protocols. - Azeez Nureni Ayofe, Azeez Raheem Ajetola:
Exploration of the Gap Between Computer Science Curriculum and Industrial I.T Skills Requirements. - Ratnesh Kumar Jain, Suresh Jain, Ramveer S. Kasana:
Visualization of Mined Pattern and Its Human Aspects. - Reza Gharoie Ahangar, Mohammad Farajpoor Ahangar:
Handwritten Farsi Character Recognition using Artificial Neural Network. - Patrice Lopez, Laurent Romary:
Multiple Retrieval Models and Regression Models for Prior Art Search. - Salah A. Aly, Hager S. Darwish, Moustafa Youssef, Mahmoud Zidan:
Distributed Flooding-based Storage Algorithms for Large-scale Sensor Networks. - Grenville J. Croll:
Spreadsheets and the Financial Collapse. - Matthew G. Knepley, Dmitry A. Karpeev:
Mesh Algorithms for PDE with Sieve I: Mesh Distribution. - B Prabhulla Chandran Pillai:
An OLAC Extension for Dravidian Languages. - Xiugang Wu, Liang-Liang Xie:
Asymptotic Equipartition Property of Output when Rate is above Capacity. - Rahul Jain, Hartmut Klauck, Shengyu Zhang:
Depth-Independent Lower bounds on the Communication Complexity of Read-Once Boolean Formulas. - Bruno Bauwens:
Additivity of on-line decision complexity is violated by a linear term in the length of a binary string. - Frédéric Boyer, Damien Chablat, Philippe Lemoine, Philippe Wenger:
The eel-like robot. - César Domínguez, Dominique Duval:
A parameterization process, functorially. - Joel Ratsaby:
Learning, complexity and information density. - Yann Strozecki:
A Logical Approach to Decomposable Matroids. - Jasmina Hasanhodzic, Andrew W. Lo, Emanuele Viola:
A Computational View of Market Efficiency. - Julien Mairal, Francis R. Bach, Jean Ponce, Guillermo Sapiro:
Online Learning for Matrix Factorization and Sparse Coding. - Sarah Filippi, Olivier Cappé, Aurélien Garivier:
Regret Bounds for Opportunistic Channel Access. - Greg Kuperberg:
How hard is it to approximate the Jones polynomial? - Yasuo Ohno, Yoshitaka Sasaki, Chika Yamazaki:
On exponential polynomials and quantum computing. - Almerima Jamakovic, Priya Mahadevan, Amin Vahdat, Marián Boguñá, Dmitri V. Krioukov:
How small are building blocks of complex networks. - Mohammad Naghshvar, Hairuo Zhuang, Tara Javidi:
A General Class of Throughput Optimal Routing Policies in Multi-hop Wireless Networks. - Hirotada Kobayashi, François Le Gall, Harumichi Nishimura, Martin Rötteler:
General Scheme for Perfect Quantum Network Coding with Free Classical Communication. - Saburo Higuchi, Marc Mézard:
Decimation flows in constraint satisfaction problems. - David I. Shuman, Mingyan Liu:
Energy-Efficient Transmission Scheduling with Strict Underflow Constraints. - Vincent Larivière, Yves Gingras:
On the relationship between interdisciplinarity and scientific impact. - Wilfred Ndifon, Joshua B. Plotkin, Jonathan Dushoff:
On the accessibility of adaptive phenotypes of a bacterial metabolic network. - Toby S. Cubitt, Jens Eisert, Michael M. Wolf:
Deciding whether a Quantum Channel is Markovian is NP-hard. - Gérard Henry Edmond Duchamp, Laurent Poinsot, Allan I. Solomon, Karol A. Penson, Pawel Blasiak, Andrzej Horzela:
Ladder Operators and Endomorphisms in Combinatorial Physics. - Andris Ambainis, Kazuo Iwama, Masaki Nakanishi, Harumichi Nishimura, Rudy Raymond, Seiichiro Tani, Shigeru Yamashita:
Average/Worst-Case Gap of Quantum Query Complexities by On-Set Size. - Zhi-Xi Wu, Petter Holme:
Modeling scientific-citation patterns and other triangle-rich acyclic networks. - Marvin Weinstein, David Horn:
Dynamic quantum clustering: a method for visual exploration of structures in data. - Alexander Saichev, Didier Sornette:
Effects of Diversity and Procrastination in Priority Queuing Theory: the Different Power Law Regimes. - Marcel Blattner:
B-Rank: A top N Recommendation Algorithm. - Boris Altshuler, Hari Krovi, Jérémie Roland:
Adiabatic quantum optimization fails for random instances of NP-complete problems. - Yuriy V. Pershin, Massimiliano Di Ventra:
Practical approach to programmable analog circuits with memristors. - Fermín Moscoso del Prado Martín:
The thermodynamics of human reaction times. - Vincent Larivière, Yves Gingras:
The impact factor's Matthew effect: a natural experiment in bibliometrics. - Ariel Caticha:
Quantifying Rational Belief. - Kumiko Hattori, Tetsuya Hattori:
Hydrodynamic limit of move-to-front rules and search cost probabilities. - Yuri I. Manin:
Renormalization and Computation II: Time Cut-off and the Halting Problem. - (Withdrawn) Entangled games do not require much entanglement.
- James H. Fowler, Nicholas A. Christakis:
Cooperative Behaviour Cascades in Human Social Networks. - Thimo Rohlf, Christopher R. Winkler:
Emergent Network Structure, evolvable Robustness and non-linear Effects of Point Mutations in an Artificial Genome Model. - Harry W. Bullen IV, Priya Ranjan:
Chaotic Transitions in Wall Following Robots. - Ramon van Handel:
On the minimal penalty for Markov order estimation. - Juan Carlos Cuevas-Tello, Peter Tiño, Somak Raychaudhury, Xin Yao, Markus Harva:
Uncovering delayed patterns in noisy and irregularly sampled time series: an astronomy application. - Jennifer S. Balakrishnan, Juliana Belding, Sarah Chisholm, Kirsten Eisenträger, Katherine E. Stange, Edlyn Teske:
Pairings on hyperelliptic curves. - Frank Herrmann, John Silberholz, Matias Bellone, Gustavo Guerberoff, Manuel Tiglio:
Integrating Post-Newtonian Equations on Graphics Processing Units. - Alexander Mozeika, David Saad, Jack Raymond:
Computing with Noise - Phase Transitions in Boolean Formulas. - (Withdrawn) Co-occurrence Matrix and Fractal Dimension for Image Segmentation.
- Charles D. Hill, Adrian P. Flitney, Nicolas C. Menicucci:
A competitive game whose maximal Nash-equilibrium payoff requires quantum resources for its achievement. - (Withdrawn) Secure Linear Programming Using Privacy-Preserving Simplex.
- Yusuke Watanabe, Kenji Fukumizu:
New graph polynomials from the Bethe approximation of the Ising partition function. - Andrea Baronchelli, Tao Gong, Andrea Puglisi, Vittorio Loreto:
Modeling the emergence of universality in color naming patterns. - Vadim E. Levit, Eugen Mandrescu:
On Konig-Egervary Square-Stable Graphs. - (Withdrawn) On integers as the sum of a prime and a $k$-th power.
- K. R. Guruprasad, Debasish Ghose:
Coverage Optimization using Generalized Voronoi Partition. - Yuval Peres, Sebastien Roch:
Reconstruction on Trees: Exponential Moment Bounds for Linear Estimators. - Sebastien Roch:
Sequence-Length Requirement of Distance-Based Phylogeny Reconstruction: Breaking the Polynomial Barrier. - Andrew Adamatzky:
Steering plasmodium with light: Dynamical programming of Physarum machine.
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.