default search action
CoRR, September 2009
- Philip Olu Jegede:
Predictors Of Java Programming Self Efficacy Among Engineering Students In A Nigerian University. - Mohammad A. Mikki:
Energy Efficient Location Aided Routing Protocol for Wireless MANETs. - Rakesh Mohanty, N. S. Narayanaswamy:
Online Algorithms for Self-Organizing Sequential Search - A Survey. - Kamanashis Biswas, S. A. M. Harun:
Constraint Minimum Vertex Cover in K Partite Graph, Approximation Algorithm and Complexity Analysis. - Kamanashis Biswas, Md. Ashraful Islam:
Hardware Virtualization Support In INTEL, AMD And IBM Power Processors. - Zachary Chance, David James Love:
On Linear Processing for an AWGN Channel with Noisy Feedback. - Sébastien Briot, Anatoly Pashkevich, Damien Chablat:
On the optimal design of parallel robots taking into account their deformations and natural frequencies. - Sanjiang Li:
A Layered Graph Representation for Complex Regions. - R. Sivaraman, R. Prabakaran, S. Sujatha:
Dynamic Multimedia Content Retrieval System in Distributed Environment. - Sanjiang Li, Anthony G. Cohn:
Reasoning with Topological and Directional Spatial Information. - Xiaotong Zhang, Weiming Liu, Sanjiang Li, Mingsheng Ying:
Reasoning about Cardinal Directions between Extended Objects. - Mai Gehrke, Jacob Vosmaer:
Canonical extension and canonicity via DCPO presentations. - Robert Shour:
A theory of intelligence: networked problem solving in animal societies. - Stylianos Basagiannis, Panagiotis Katsaros, Andrew Pombortsis:
State Space Reduction with Message Inspection in Security Protocol Model Checking. - Somantika Datta, Stephen D. Howard, Douglas Cochran:
Geometry of the Welch Bounds. - Clément Dunand, Reynald Lercier:
Normal Elliptic Bases and Torus-Based Cryptography. - Vassilis Kostakos:
Is the crowd's wisdom biased? A quantitative asessment of three online communities. - Sourabh Rungta, Kshitij Verma, Neeta Tripathi, Anupam Shukla:
Enhanced Mode Selection Algorithm for H.264 encoder for Application in Low Computational power devices. - Abu Shamim Mohammad Arif, Asif Mahamud, Rashedul Islam:
An Enhanced Static Data Compression Scheme Of Bengali Short Message. - (Withdrawn) Channel Equalization in Digital Transmission.
- Tobias Harks, Max Klimm, Rolf H. Möhring:
Strong Nash Equilibria in Games with the Lexicographical Improvement Property. - Philippe Wenger, Damien Chablat:
Kinematic analysis of a class of analytic planar 3-RPR parallel manipulators. - Fionn Murtagh, Pedro Contreras, Jean-Luc Starck:
Scale-Based Gaussian Coverings: Combining Intra and Inter Mixture Models in Image Segmentation. - Chandra Chekuri, Kenneth L. Clarkson, Sariel Har-Peled:
On the Set Multi-Cover Problem in Geometric Settings. - Jie Luo, Anthony Ephremides:
A New Channel Coding Approach for Random Access with Bursty Traffic. - Boyu Li, Ender Ayanoglu:
A New Low Computational Complexity Sphere Decoding Algorithm. - Saad Ahmad Khan, Sheheryar Ali Arshad:
QoS Provisioning Using Hybrid FSO RF Based Hierarchical Model for Wireless Multimedia Sensor Networks. - Andri Mirzal, Masashi Furukawa:
A Method for Accelerating the HITS Algorithm. - Jalpa Bani, Syed Sajjad Rizvi:
Minimizing Cache Timing Attack Using Dynamic Cache Flushing (DCF) Algorithm. - G. Padmavathi, D. Shanmugapriya:
A Survey of Attacks, Security Mechanisms and Challenges in Wireless Sensor Networks. - Raheel Maqsood Hashmi, Arooj Mubashara Siddiqui, Memoona Jabeen, Khurram Saleem Alimgeer, Shahid A. Khan:
Computational Complexities and Breaches in Authentication Frameworks of Broadband Wireless Access. - José Ignacio Iglesias Curto, Uwe Helmke:
Receding horizon decoding of convolutional codes. - Md. Rabiul Islam, Md. Fayzur Rahman:
Codebook Design Method for Noise Robust Speaker Identification based on Genetic Algorithm. - Katsutoshi Yoshida, Atsushi Higeta, Shinichi Watanabe:
Effects of Mechanical Coupling on Dynamics of Balancing Tasks. - Amr Rizk, Markus Fidler:
Statistical End-to-end Performance Bounds for Networks under Long Memory FBM Cross Traffic. - Michel Verleysen, Fabrice Rossi, Damien François:
Advances in Feature Selection with Mutual Information. - Barbara Hammer, Alexander Hasenfuß, Fabrice Rossi:
Median topographic maps for biomedical data sets. - Oliver Johnson, Yaming Yu:
Monotonicity, thinning and discrete versions of the Entropy Power Inequality. - Shirin Sohrabi, Sheila A. McIlraith:
On Planning with Preferences in HTN. - Joel W. Branch, Chris Giannella, Boleslaw K. Szymanski, Ran Wolff, Hillol Kargupta:
In-Network Outlier Detection in Wireless Sensor Networks. - Ha Q. Nguyen, Lav R. Varshney, Vivek K. Goyal:
Concentric Permutation Source Codes. - Sariel Har-Peled, Micha Sharir:
Relative (p,epsilon)-Approximations in Geometry. - Shahid Hussain, Muhammad Zubair Asghar, Bashir Ahmad, Shakeel Ahmad:
A Step towards Software Corrective Maintenance Using RCM model. - Olivier Finkel, Dominique Lecomte:
Decision Problems For Turing Machines. - Antonio G. Marqués, Georgios B. Giannakis, Javier Ramos:
Optimizing Orthogonal Multiple Access based on Quantized Channel State Information. - Lei Ying, R. Srikant, Srinivas Shakkottai:
The Asymptotic Behavior of Minimum Buffer Size Requirements in Large P2P Streaming Networks. - Aihua Wu, Joey Paquet, Serguei A. Mokhov:
Object-Oriented Intensional Programming: Intensional Classes Using Java and Lucid. - Arian Maleki, David L. Donoho:
Optimally Tuned Iterative Reconstruction Algorithms for Compressed Sensing. - Joel Veness, Kee Siong Ng, Marcus Hutter, David Silver:
A Monte Carlo AIXI Approximation. - Binay K. Bhattacharya, Arijit Bishnu, Otfried Cheong, Sandip Das, Arindam Karmakar, Jack Snoeyink:
On Finding Non-dominated Points using Compact Voronoi Diagrams. - Francis R. Bach:
High-Dimensional Non-Linear Variable Selection through Hierarchical Kernel Learning. - Carlo A. Furia, Bertrand Meyer:
Inferring Loop Invariants using Postconditions. - Brendan Lucier, Allan Borodin:
Price of Anarchy for Greedy Auctions. - Eugen Staab, Martin Caminada:
Assessing the Impact of Informedness on a Consultant's Profit. - Michel X. Goemans, Nicholas J. A. Harvey, Kamal Jain, Mohit Singh:
A Randomized Rounding Algorithm for the Asymmetric Traveling Salesman Problem. - Ravi Teja Sukhavasi, Babak Hassibi:
The Kalman Like Particle Filter : Optimal Estimation With Quantized Innovations/Measurements. - Vaneet Aggarwal, Ashutosh Sabharwal:
Bits About the Channel: Multi-round Protocols for Two-way Fading Channels. - Pierrick Tranouez, Patrice Langlois, Éric Daudé:
A multiagent urban traffic simulation Part I: dealing with the ordinary. - Amir M. Ben-Amram:
The Euler Path to Static Level-Ancestors. - Michael T. Goodrich:
Randomized Shellsort: A Simple Oblivious Sorting Algorithm. - Alexei Barbosa de Aguiar, Plácido Rogério Pinheiro, Alvaro de Menezes S. Neto, Ruddy P. P. Cunha, Rebecca F. Pinheiro:
A Novel Model for Optimized GSM Network Design. - M. N. Doja, Dharmender Saini:
Electronic Authority Variation. - Gregory A. Kabatiansky, G. Oshanin:
Finding passwords by random walks: How long does it take? - Ankan Saha, S. V. N. Vishwanathan:
Efficient Approximation Algorithms for Minimum Enclosing Convex Shapes. - Edith Cohen, Michal Feldman, Amos Fiat, Haim Kaplan, Svetlana Olonetsky:
Envy-Free Makespan Approximation. - Stefan Göller, Markus Lohrey:
Branching-time model checking of one-counter processes. - Yan Zhu, Dongning Guo:
Capacity Region of Layered Erasure One-sided Interference Channels without CSIT. - Raymond Chi-Wing Wong, Ada Wai-Chee Fu, Ke Wang, Yabo Xu, Jian Pei, Philip S. Yu:
Anonymization with Worst-Case Distribution-Based Background Knowledge. - Richard V. Diamond:
User Experience, Software Interfaces, and The Unconscious. - Yi Yi Thaw, Ahmad Kamil Mahmood, P. Dhanapal Durai Dominic:
A Study on the Factors That Influence the Consumers Trust on Ecommerce Adoption. - Saurabh Kumar Garg, Chee Shin Yeo, Arun Anandasivam, Rajkumar Buyya:
Energy-Efficient Scheduling of HPC Applications in Cloud Computing Environments. - B Prabhulla Chandran Pillai:
Empowering OLAC Extension using Anusaaraka and Effective text processing using Double Byte coding. - Jean Sallantin, Antoine Seilles:
n-Opposition theory to structure debates. - Marco Aldinucci, Massimo Torquati, Massimiliano Meneghin:
FastFlow: Efficient Parallel Streaming Applications on Multi-core. - Dag Normann:
A rich hierarchy of functionals of finite types. - Oded Redlich, Doron Ezri, Dov Wulich:
SNR Estimation in Maximum Likelihood Decoded Spatial Multiplexing. - Virag Shah, Neelesh B. Mehta, Raymond Yim:
Optimal Timer Based Selection Schemes. - Jaap-Henk Hoepman, Rieks Joosten:
Practical Schemes For Privacy & Security Enhanced RFID. - Nataliya Sokolovska, Thomas Lavergne, Olivier Cappé, François Yvon:
Efficient Learning of Sparse Conditional Random Fields for Supervised Sequence Labelling. - Catalin Anghel:
Base Selection and Transmission Synchronization Algorithm in Quantum Cryptography. - Ankan Saha, Xinhua Zhang, S. V. N. Vishwanathan:
Lower Bounds for BMRM and Faster Rates for Training SVMs. - Keigo Hirakawa, Patrick J. Wolfe:
"Rewiring" Filterbanks for Local Fourier Analysis: Theory and Practice. - Hoon Huh, Haralabos C. Papadopoulos, Giuseppe Caire:
Multiuser MIMO Transmitter Optimization for Inter-Cell Interference Mitigation. - Daniel Lemire, Owen Kaser:
Reordering Columns for Smaller Indexes. - Dai Tri Man Le:
Statechart Verification with iState. - Wenguang Wang, Yongping Xu, Xin Chen, Qun Li, Weiping Wang:
High level architecture evolved modular federation object model. - Mohammed M. Kadhum, Suhaidi Hassan:
The Uniformization Process of the Fast Congestion Notification (FN). - Jean-Pierre Jung, Ibrahima Sakho:
On The Optimality Of All To All Broadcast In k ary n dimensional Tori. - Sayan Bhattacharya, Goutam Paul, Swagato Sanyal:
On Necessary and Sufficient Number of Cops in the Game of Cops and Robber in Multidimensional Grids. - Shengbao Wang:
On the Relations Between Diffie-Hellman and ID-Based Key Agreement from Pairings. - Dhananjoy Dey, Prasanna Raghaw Mishra, Indranath Sen Gupta:
HF-hash : Hash Functions Using Restricted HFE Challenge-1. - Iraj Ataollahi, Morteza Analoui:
Resource Matchmaking Algorithm using Dynamic Rough Set in Grid Environment. - V. Palanisamy, P. Annadurai:
Impact of Rushing attack on Multicast in Mobile Ad Hoc Network. - Mohsen Lashkargir, S. Amirhassan Monadjemi, Ahmad Baraani-Dastjerdi:
A Hybrid Multi Objective Particle Swarm Optimization Method to Discover Biclusters in Microarray Data. - Munendra Agrawal, Prashant Kushwah, Sunder Lal:
An Efficient and Publicly Verifiable Id-Based Multi-Signcryption Scheme. - Kunal Narayan Chaudhury:
L^p boundedness of the Hilbert transform. - Anatoly Pashkevich, Alexandr Klimchik, Damien Chablat, Philippe Wenger:
Accuracy Improvement for Stiffness Modeling of Parallel Manipulators. - Anatoly Pashkevich, Damien Chablat, Philippe Wenger:
Design optimization of parallel manipulators for high-speed precision machining applications. - Marco Aldinucci, Marco Danelutto, Peter Kilpatrick:
Autonomic management of multiple non-functional concerns in behavioural skeletons. - Jagadeesh Harshan, B. Sundar Rajan, Are Hjørungnes:
Training-Embedded, Single-Symbol ML-Decodable, Distributed STBCs for Relay Networks. - Adrian Dumitrescu, János Pach:
Minimum clique partition in unit disk graphs. - Hu Xiong, Matei Ripeanu, Zhiguang Qin:
Efficient and Spontaneous Privacy-Preserving Protocol for Secure Vehicular Communications. - Ha Q. Nguyen, Vivek K. Goyal, Lav R. Varshney:
Frame Permutation Quantization. - Guangliang Chen, Stefan Atev, Gilad Lerman:
Kernel Spectral Curvature Clustering (KSCC). - Guangliang Chen, Gilad Lerman:
Motion Segmentation by SCC on the Hopkins 155 Database. - Sudarshan Shinde:
Two channel paraunitary filter banks based on linear canonical transform. - Eleonora Guerrini, Emmanuela Orsini, Massimiliano Sala:
Computing the distance distribution of systematic non-linear codes. - Prasad Krishnan, B. Sundar Rajan:
Single-generation Network Coding for Networks with Delay. - Béla Genge, Piroska Haller:
Extending WS-Security to Implement Security Protocols for Web Services. - Attila Magyari, Béla Genge, Piroska Haller:
Certificate-based Single Sign-On Mechanism for Multi-Platform Distributed Systems. - Krishnendu Chatterjee, Laurent Doyen, Thomas A. Henzinger:
Qualitative Analysis of Partially-observable Markov Decision Processes. - Krishnendu Chatterjee, Laurent Doyen, Thomas A. Henzinger:
Probabilistic Weighted Automata. - Ching-an Hsiao:
How does certainty enter into the mind? - Nidhi Hegde, Fabien Mathieu, Diego Perino:
Size Does Matter (in P2P Live Streaming). - Nicolas Bruno:
Teaching an Old Elephant New Tricks. - William R. Marczak, David Zook, Wenchao Zhou, Molham Aref, Boon Thau Loo:
Declarative Reconfigurable Trust Management. - Xiaodan Wang, Randal C. Burns, Tanu Malik:
LifeRaft: Data-Driven, Batch Processing for the Exploration of Scientific Databases. - Ragib Hasan, Radu Sion, Marianne Winslett:
Remembrance: The Unbearable Sentience of Being Digital. - Uwe Röhm, José A. Blakeley:
Data Management for High-Throughput Genomics. - Arnab Nandi, H. V. Jagadish:
Qunits: queried units in database search. - Yi Zhang, Herodotos Herodotou, Jun Yang:
RIOT: I/O-Efficient Numerical Computing without SQL. - Willis Lang, Jignesh M. Patel:
Towards Eco-friendly Database Management Systems. - David B. Lomet, Alan D. Fekete, Gerhard Weikum, Michael J. Zwilling:
Unbundling Transaction Services in the Cloud. - Zachary G. Ives, Craig A. Knoblock, Steven Minton, Marie Jacob, Partha Pratim Talukdar, Rattapoom Tuchinda, José Luis Ambite, Maria Muslea, Cenk Gazen:
Interactive Data Integration through Smart Copy & Paste. - Benjamin Sowell, Alan J. Demers, Johannes Gehrke, Nitin Gupta, Haoyuan Li, Walker M. White:
From Declarative Languages to Declarative Processing in Computer Games. - Kenneth P. Smith, Michael Morse, Peter Mork, Maya Hao Li, Arnon Rosenthal, M. David Allen, Len Seligman, Chris Wolf:
The Role of Schema Matching in Large Enterprises. - Goetz Graefe, Harumi A. Kuno, Janet L. Wiener:
Visualizing the robustness of query execution. - Andrey Balmin, Latha S. Colby, Emiran Curtmola, Quanzhong Li, Fatma Özcan:
Search Driven Analysis of Heterogenous XML Data. - Georgia Koutrika, Benjamin Bercovitz, Robert Ikeda, Filip Kaliszan, Henry Liou, Zahra Mohammadi Zadeh, Hector Garcia-Molina:
Social Systems: Can we Do More Than Just Poke Friends? - Michael Armbrust, Armando Fox, David A. Patterson, Nick Lanham, Beth Trushkowsky, Jesse Trutna, Haruki Oh:
SCADS: Scale-Independent Storage for Social Computing Applications. - Laure Berti-Équille, Anish Das Sarma, Xin Dong, Amélie Marian, Divesh Srivastava:
Sailing the Information Ocean with Awareness of Currents: Discovery and Application of Source Dependence. - Yanlei Diao, Boduo Li, Anna Liu, Liping Peng, Charles Sutton, Thanh T. L. Tran, Michael Zink:
Capturing Data Uncertainty in High-Volume Stream Processing. - Nodira Khoussainova, Magdalena Balazinska, Wolfgang Gatterbauer, YongChul Kwon, Dan Suciu:
A Case for A Collaborative Query Management System. - Philippe Cudré-Mauroux, Eugene Wu, Samuel Madden:
The Case for RodentStore, an Adaptive, Declarative Storage System. - Luc Bouganim, Björn Þór Jónsson, Philippe Bonnet:
uFLIP: Understanding Flash IO Patterns. - Abhishek Mitra, Marcos R. Vieira, Petko Bakalov, Walid A. Najjar, Vassilis J. Tsotras:
Boosting XML Filtering with a Scalable FPGA-based Architecture. - Shel Finkelstein, Dean Jacobs, Rainer Brendle:
Principles for Inconsistency. - AnHai Doan, Jeffrey F. Naughton, Akanksha Baid, Xiaoyong Chai, Fei Chen, Ting Chen, Eric Chu, Pedro DeRose, Byron J. Gao, Chaitanya Gokhale, Jiansheng Huang, Warren Shen, Ba-Quy Vuong:
The Case for a Structured Approach to Managing Unstructured Data. - Stavros Harizopoulos, Mehul A. Shah, Justin Meza, Parthasarathy Ranganathan:
Energy Efficiency: The New Holy Grail of Data Management Systems Research. - Jayant Madhavan, Loredana Afanasiev, Lyublena Antova, Alon Y. Halevy:
Harnessing the Deep Web: Present and Future. - Alkis Simitsis, Yannis E. Ioannidis:
DBMSs Should Talk Back Too. - Pat Helland, David Campbell:
Building on Quicksand. - Fabien Mathieu, Diego Perino:
On Resource Aware Algorithms in Epidemic Live Streaming. - Fabien Mathieu:
Heterogeneity in Distributed Live Streaming: Blessing or Curse? - Vaibhav Srivastava, Kurt Plarre, Francesco Bullo:
Randomized Sensor Selection in Sequential Hypothesis Testing. - Muryong Kim, Sae-Young Chung:
Cooperative Transmission for a Vector Gaussian Parallel Relay Network. - Deniz Üstebay, Boris N. Oreshkin, Mark Coates, Michael G. Rabbat:
Greedy Gossip with Eavesdropping. - Aldar Chun-fai Chan:
A Graph Theoretic Approach for Optimizing Key Pre-distribution in Wireless SensorNetworks. - David Eppstein:
Optimally fast incremental Manhattan plane embedding and planar tight span construction. - David Eppstein:
Paired approximation problems and incompatible inapproximabilities. - Maurizio Martina, Guido Masera:
Turbo NOC: a framework for the design of Network On Chip based turbo decoder architectures. - Liva Ralaivola, Marie Szafranski, Guillaume Stempfel:
Chromatic PAC-Bayes Bounds for Non-IID Data: Applications to Ranking and Stationary \beta-Mixing Processes. - Fernando Alegre, Eric Feron, Santosh Pande:
Using Ellipsoidal Domains to Analyze Control Systems Software. - Peter Krusche, Alexander Tiskin:
Computing alignment plots efficiently. - Uriel Feige, Ofer Zeitouni:
Deterministic approximation for the cover time of trees. - Claudio Weidmann, Gottfried Lechner:
A Fresh Look at Coding for q-ary Symmetric Channels. - James Bowley, Laura Rebollo-Neira:
Sparsity and 'something else'. - Chi-Anh La, Pietro Michiardi, Claudio Casetti, Carla-Fabiana Chiasserini, Marco Fiore:
A Lightweight Distributed Solution to Content Replication in Mobile Networks. - Gregory Valiant, Paul Valiant:
Size Bounds for Conjunctive Queries with General Functional Dependencies. - Erich Schikuta, Thomas Weishäupl, Flavia Donno, Heinz Stockinger, Elisabeth Vinek, Helmut Wanek, Christoph Witzany, Irfan Ul Haq:
Business in the Grid. - Sihem Amer-Yahia, Laks V. S. Lakshmanan, Cong Yu:
SocialScope: Enabling Information Discovery on Social Content Sites. - Rafael Fernández-Moctezuma, Kristin Tufte, Jin Li:
Inter-Operator Feedback in Data Stream Management Systems via Punctuation. - V. Sreekanth Annapureddy, Venugopal V. Veeravalli:
Sum Capacity of MIMO Interference Channels in the Low Interference Regime. - Jan A. Bergstra, Cornelis A. Middelburg:
Indirect jumps improve instruction sequence performance. - Marc Dalmau, Philippe Roose, Sophie Laplace:
Context Aware Adaptable Applications - A global approach. - Hideyuki Takagi, Denis Pallez:
Paired Comparisons-based Interactive Differential Evolution. - Samia Bouzefrane, Julien Cordry, Pierre Paradinas:
MESURE Tool to benchmark Java Card platforms. - John Whitbeck, Vania Conan, Marcelo Dias de Amorim:
Intermittently-Connected Mobile Networks as Markovian Random Temporal Graphs. - Samuel Cruz-Lara, Patrice Bonhomme, Christophe De Saint-Rat, Laurent Romary:
A general XML-based distributed software architecture for accessing and sharing ressources. - Maurice Margenstern:
Navigation in tilings of the hyperbolic plane and possible applications. - Noha Ibrahim, Frédéric Le Mouël:
A Survey on Service Composition Middleware in Pervasive Environments. - Scott A. Carter, Laurent Denoue:
SeeReader: An (Almost) Eyes-Free Mobile Rich Document Viewer. - Santiago J. Barro Torres, Carlos J. Escudero Cascon:
Embedded Sensor System for Early Pathology Detection in Building Construction. - Dominique Tschopp, Suhas N. Diggavi:
Approximate Nearest Neighbor Search through Comparisons. - Jayakrishnan Unnikrishnan, Dayu Huang, Sean P. Meyn, Amit Surana, Venugopal V. Veeravalli:
Universal and Composite Hypothesis Testing via Mismatched Divergence. - Tiancheng Li, Ninghui Li, Jian Zhang, Ian M. Molloy:
Slicing: A New Approach to Privacy Preserving Data Publishing. - Xiao Z. Wang, Wei E. I. Sha:
Random Sampling Using Shannon Interpolation and Poisson Summation Formulae. - Andias Wira-Alam:
Simulation of Resource Usage in Parallel Evolutionary Peptide Optimization using JavaSpaces Technology. - Jun Tanaka:
Logic with Verbs. - Jerome Kelleher, Barry O'Sullivan:
Generating All Partitions: A Comparison Of Two Encodings. - (Withdrawn) Two-Phase Flow in Heterogeneous Media.
- Hamed Owladeghaffari, H. Aghababaei:
Back analysis based on SOM-RST system. - Andri Mirzal:
Weblog Clustering in Multilinear Algebra Perspective. - Md. Rabiul Islam, Md. Fayzur Rahman:
Improvement of Text Dependent Speaker Identification System Using Neuro-Genetic Hybrid Algorithm in Office Environmental Conditions. - Markus Schatten, Miroslav Baca, Mirko Cubrilo:
Towards a General Definition of Biometric Systems. - Maisa Halloush, Mai Sharif:
Global Heuristic Search on Encrypted Data (GHSED). - Muhammad Atif Qureshi, Arjumand Younus, Arslan Ahmed Khan:
Philosophical Survey of Passwords. - Kelly D. Lewis, James E. Lewis:
Web Single Sign-On Authentication using SAML. - Zine El Abidine Alaoui Ismaili, Ahmed Moussa:
Self-Partial and Dynamic Reconfiguration Implementation for AES using FPGA. - Jacques Saraydaryan, Fatiha Benali, Stéphane Ubéda:
Comprehensive Security Framework for Global Threads Analysis. - Payal N. Raj, Prashant B. Swadas:
Dpraodv: A Dyanamic Learning System Against Blackhole Attack in Aodv Based Manet. - M. Nageshkumar, P. K. Mahesh, M. N. S. Swamy:
An Efficient Secure Multimodal Biometric Fusion Using Palmprint and Face Image. - Mashud Kabir:
Similarity Matching Techniques for Fault Diagnosis in Automotive Infotainment Electronics. - Alexis Lazanas:
Performing Hybrid Recommendation in Intermodal Transportation-the FTMarket System's Recommendation Module. - Soumaya Zirari, Philippe Canalda, François Spies:
Geometric and Signal Strength Dilution of Precision (DoP)Wi-Fi. - Priyanka Gupta, Vishal Goyal:
Implementation of Rule Based Algorithm for Sandhi-Vicheda Of Compound Hindi Words. - Paul Cuff, Haim H. Permuter, Thomas M. Cover:
Coordination Capacity. - Tamara Broderick, David John Cameron MacKay:
Fast and flexible selection with a single switch. - Susan Allan:
Excel Modelling - Transparency, Auditing and Business Use. - Andrew McGeady, Joseph McGouran:
End User Computing in AIB Capital Markets: A Management Summary. - Nikolai Hungr, Jocelyne Troccaz, Nabil Zemiti, Nathanael Tripodi:
Design of an ultrasound-guided robotic brachytherapy needle insertion system. - Pu Yang, Jun Guo, Weiran Xu:
PrisCrawler: A Relevance Based Crawler for Automated Data Classification from Bulletin Board. - Pu Yang, Jun Guo, Guang Chen:
Pavideoge: A New Video Processing Method in Video Search Engine. - Dominique Tschopp, Suhas N. Diggavi, Matthias Grossglauser:
Hierarchical Routing over Dynamic Wireless Networks. - Pabitra Pal Choudhury, Sarif Sk. Hassan, Sudhakar Sahoo, Birendra Kumar Nayak:
Act of CVT in the Formation of Music Fractals. - Patric R. J. Östergård, Olli Pottonen:
Two Optimal One-Error-Correcting Codes of Length 13 That Are Not Doubly Shortened Perfect Codes. - Vadim Yatsenko:
Stochastic Optimization of Linear Dynamic Systems with Parametric Uncertainties. - Maxim A. Kolosovskiy:
Simple implementation of deletion from open-address hash table. - Jiangyuan Li, Athina P. Petropulu:
Transmitter Optimization for Achieving Secrecy Capacity in Gaussian MIMO Wiretap Channels. - Reza Akbarinia, Esther Pacitti, Patrick Valduriez:
Reducing Network Traffic in Unstructured P2P Systems Using Top-k Queries. - Susanne Salmon-Alt, Laurent Romary:
Reference Resolution within the Framework of Cognitive Grammar. - Ilia Toli:
Singularity of Sparse Circulant Matrices is NP-complete. - Aaron D. Sterling:
Memory Consistency Conditions for Self-Assembly Programming. - Wei Dai, Olgica Milenkovic:
SET: an algorithm for consistent matrix completion. - Yingwu Zhu:
Measurement and Analysis of an Online Content Voting Network: A Case Study of Digg. - Dan Cristea, Nancy Ide, Laurent Romary:
Marking-up multiple views of a Text: Discourse and Reference. - Nancy Ide, Laurent Romary, Tomaz Erjavec:
A Common XML-based Framework for Syntactic Annotations. - Nancy Ide, Laurent Romary:
Standards for Language Resources. - Minit Gupta, Laurent Romary:
Dynamically Generated Interfaces in XML Based Architecture. - Pierre Fraigniaud, Amos Korman:
An Optimal Labeling Scheme for Ancestry Queries. - Vahan V. Mkrtchyan, Samvel S. Petrosyan, Gagik N. Vardanyan:
On disjoint matchings in cubic graphs: maximum 3-edge-colorable subgraphs. - Hossein Bagheri, Abolfazl S. Motahari, Amir K. Khandani:
On the Symmetric Gaussian Interference Channel with Partial Unidirectional Cooperation. - Tamara Mchedlidze, Antonios Symvonis:
Crossing-Free Acyclic Hamiltonian Path Completion for Planar st-Digraphs. - Di Ge, Jérôme Idier, Eric Le Carpentier:
Enhanced sampling schemes for MCMC based blind Bernoulli-Gaussian deconvolution. - René van Bevern:
Graph-based data clustering: a quadratic-vertex problem kernel for s-Plex Cluster Vertex Deletion. - Emine Zerrin Sakir, Christian Feldbauer:
Efficient Quality-Based Playout Buffer Algorithm. - Jan A. Bergstra, Alban Ponse:
A progression ring for interfaces of instruction sequences, threads, and services. - Shayan Oveis Gharan, Amin Saberi:
Asymmetric Traveling Salesman Problem on Graphs with Bounded Genus. - Ashwin Jain, C. Hari:
A new efficient k-out-of-n Oblivious Transfer protocol. - Jonathan A. Kelner, Petar Maymounkov:
Electric routing and concurrent flow cutting. - David Eppstein, Michael T. Goodrich, Lowell Trott:
Going Off-road: Transversal Complexity in Road Networks. - Jun Zhang, Jeffrey G. Andrews:
Adaptive Spatial Intercell Interference Cancellation in Multicell Wireless Networks. - Vitaly Feldman:
Distribution-Specific Agnostic Boosting. - Dotan Di Castro, Ronny Meir:
A Convergent Online Single Time Scale Actor Critic Algorithm. - Emmanuel Prochasson, Christian Viard-Gaudin, Emmanuel Morin:
Language Models for Handwritten Short Message Services. - Emmanuel Prochasson, Emmanuel Morin, Christian Viard-Gaudin:
Vers la reconnaissance de mini-messages manuscrits. - Syed T. Qaseem, Tareq Y. Al-Naffouri:
Compressive Sensing Based Opportunistic Protocol for Throughput Improvement in Wireless Networks. - Jean-Philippe Cointet, Camille Roth:
Socio-semantic dynamics in a blog network. - Xin Liu, John Kountouriotis, Athina P. Petropulu, Kapil R. Dandekar:
ALOHA With Collision Resolution(ALOHA-CR): Theory and Software Defined Radio Implementation. - Jacob Chakareski, Pascal Frossard, Hervé Kerivin, Jimmy Leblet, Gwendal Simon:
A note on the data-driven capacity of P2P networks. - Teng Zhang, Arthur Szlam, Gilad Lerman:
Median K-flats for hybrid linear modeling with many outliers. - Adrian Dumitrescu, Minghui Jiang:
On the largest empty axis-parallel box amidst n points. - Shengtian Yang, Thomas Honold, Yan Chen, Zhaoyang Zhang, Peiliang Qiu:
Constructing Linear Codes with Good Spectra. - Jia Wang, Jun Chen, Lei Zhao, Paul Cuff, Haim H. Permuter:
A Random Variable Substitution Lemma With Applications to Multiple Description Coding. - Benoît Hudson:
Succinct Representation of Well-Spaced Point Clouds. - Frédérique E. Oggier, Hanane Fathi:
An Authentication Code against Pollution Attacks in Network Coding. - Evangelos Karapanos, Jean-Bernard Martens:
The quantitative side of the Repertory Grid Technique: some concerns. - Yilun Shang:
Finite-time Consensus for Nonlinear Multi-agent Systems with Fixed Topologies. - Arnab Bhattacharya, Purushottam Kar, Manjish Pal:
On Low Distortion Embeddings of Statistical Distance Measures into Low Dimensional Spaces. - Neeldhara Misra, Geevarghese Philip, Venkatesh Raman, Saket Saurabh, Somnath Sikdar:
FPT Algorithms for Connected Feedback Vertex Set. - Jaume Pujol, Josep Rifà, Lorena Ronquillo:
Construction of Additive Reed-Muller Codes. - Jean Cardinal, Erik D. Demaine, Samuel Fiorini, Gwenaël Joret, Ilan Newman, Oren Weimann:
The Stackelberg Minimum Spanning Tree Game on Planar and Bounded-Treewidth Graphs. - Stefano Buzzi, Luca Venturino, Alessio Zappone, Antonio De Maio:
Blind user detection in doubly-dispersive DS/CDMA channels. - Juan Gerardo Alcázar, Gema M. Diaz-Toca:
Topology of 2D and 3D Rational Curves. - Piotr Faliszewski, Edith Hemaspaandra, Lane A. Hemaspaandra, Jörg Rothe:
The Shield that Never Was: Societies with Single-Peaked Preferences are More Open to Manipulation and Control. - Christian Bessiere, George Katsirelos, Nina Narodytska, Claude-Guy Quimper, Toby Walsh:
Decomposition of the NVALUE constraint. - George Katsirelos, Toby Walsh:
Symmetries of Symmetry Breaking Constraints. - Manar Mohaisen, Yupeng Wang, KyungHi Chang:
Multiple antenna technologies. - Ashish Goel, Michael Kapralov, Sanjeev Khanna:
Perfect Matchings in O(n \log n) Time in Regular Bipartite Graphs. - Chi-Kin Chau, Minghua Chen, Soung Chang Liew:
Capacity of Large-scale CSMA Wireless Networks. - Atsushi Hatabu, Koujin Takeda, Yoshiyuki Kabashima:
Statistical mechanical analysis of the Kronecker channel model for MIMO wireless communication. - Anna Esparcia-Alcázar, Juan Julián Merelo Guervós, Anaís Martínez-García, Pablo García-Sánchez, Eva Alfaro-Cid, Ken Sharman:
Comparing Single and Multiobjective Evolutionary Approaches to the Inventory and Transportation Problem. - Ashley Montanaro, Tobias Osborne:
On the communication complexity of XOR functions. - Subhajit Karmakar, Sandip Sarkar:
A possible low-level explanation of "temporal dynamics of brightness induction and White's illusion". - Wenguang Wang, Weiping Wang, Justyna Zander, Yifan Zhu:
Three-dimensional conceptual model for service-oriented simulation. - Gerard Briscoe:
Digital Ecosystems. - Jonathan Marchand, Bruno Guillaume, Guy Perrier:
Analyse en dépendances à l'aide des grammaires d'interaction. - Ingrid Falk, Claire Gardent, Évelyne Jacquey, Fabienne Venant:
Grouping Synonyms by Definitions. - (Withdrawn) Résolution du "partition problem" par une approche arithmétique.
- Jérôme Kunegis, Alan Said, Winfried Umbrath:
The Universal Recommender. - Yilun Shang:
Multi-agent Coordination in Directed Moving Neighborhood Random Networks. - Pan Hui, Richard Mortier, Tristan Henderson, Jon Crowcroft:
Planet-scale Human Mobility Measurement. - Mahdi Cheraghchi, Ali Hormati, Amin Karbasi, Martin Vetterli:
Compressed Sensing with Probabilistic Measurements: A Group Testing Solution. - Ajinkya Kale, Ashish Gilda, Sudeep Pradhan:
Securing Remote Procedure Calls over HTTPS. - A. Yavuz Oruç, Abdullah Atmaca:
On Ordinal Covering of Proposals Using Balanced Incomplete Block Designs. - Harsh Kumar Verma, Abhishek Narain Singh, Raman Kumar:
Robustness of the Digital Image Watermarking Techniques against Brightness and Rotation Attack. - Joud S. Khoury, Chaouki T. Abdallah, Kate Krause, Jorge Crichigno:
Route Distribution Incentives. - Farzane Kabudvand:
ODMRP with Quality of Service and local recovery with security Support. - Peter Gilkey, Susana Lopez Ornat, Alexandra Karousou:
Mathematics, Recursion, and Universals in Human Languages. - Min-Ling Zhang, Zhi-Hua Zhou:
Classifier Ensemble with Unlabeled Data. - Chris Preston:
Specifying Data Objects with Initial Algebras. - Vinay Jethava:
Extension of Path Probability Method to Approximate Inference over Time. - Vinay Jethava, Krishnan Suresh, Chiranjib Bhattacharyya, Ramesh Hariharan:
Randomized Algorithms for Large scale SVMs. - Fei Li:
Packet Scheduling in a Size-Bounded Buffer. - Dénes Petz:
From f-divergence to quantum quasi-entropies and their use. - Joel Ratsaby:
Random scattering of bits by prediction. - Aggelos Kiayias, Yona Raekow, Alexander Russell, Narasimha K. Shashidhar:
Efficient Steganography with Provable Security Guarantees. - Mishari Al Mishari, Emiliano De Cristofaro, Karim M. El Defrawy, Gene Tsudik:
Harvesting SSL Certificate Data to Mitigate Web-Fraud. - Victor Chen, Elena Grigorescu, Ronald de Wolf:
Efficient and Error-Correcting Data Structures for Membership and Polynomial Evaluation. - Pranav Agrawal, Anurag Kumar, Joy Kuri, Manoj K. Panda, Vishnu Navda, Ramachandran Ramjee:
Analytical Models for Energy Consumption in Infrastructure WLAN STAs Carrying TCP Traffic. - Anatoly Pashkevich, Damien Chablat, Philippe Wenger:
Kinematic calibration of Orthoglide-type mechanisms from observation of parallel leg motions. - Mikhail V. Berlinkov:
On calculating length of minimal synchronizing words. - Mikhail V. Berlinkov:
Extension Method and The Cerny Conjecture. - Luigi Salemi:
Method of resolution of 3SAT in polynomial time. - James Nastos, Yong Gao:
A note on the hardness of graph diameter augmentation problems. - Yon Ping Chen, Tien Der Yeh:
A Method for Extraction and Recognition of Isolated License Plate Characters. - Anatoly Pashkevich, Alexandr Klimchik, Damien Chablat, Philippe Wenger:
Stiffness Analysis Of Multi-Chain Parallel Robotic Systems. - Sunil Pandey, Praveen Kaushik, S. C. Shrivastava:
Rossler Nonlinear Dynamical Machine for Cryptography Applications. - P. Ubaidulla, Ananthanarayanan Chockalingam:
Robust THP Transceiver Designs for Multiuser MIMO Downlink with Imperfect CSIT. - Vadim R. Madgazin:
The Information Theory of Emotions of Musical Chords. - Emmanuel Jeandel, Pascal Vanier:
Periodicity in tilings. - Robert Brijder, Hendrik Jan Hoogeboom:
The Group Structure of Pivot and Loop Complementation on Graphs and Set Systems. - Anna Adamaszek, Michal Adamaszek:
Large-girth roots of graphs. - David Monniaux:
Automatic modular abstractions for template numerical constraints. - Chiachi Huang, Syed Ali Jafar, Shlomo Shamai, Sriram Vishwanath:
On Degrees of Freedom Region of MIMO Networks without CSIT. - Marek Cygan, Marcin Pilipczuk, Jakub Onufry Wojtaszczyk:
Beyond O*(2^n) in domination-type problems. - Adrian Dumitrescu, Csaba D. Tóth:
Long non-crossing configurations in the plane. - Felipe Cucker, Teresa Krick, Gregorio Malajovich, Mario Wschebor:
A Numerical Algorithm for Zero Counting. II: Distance to Ill-posedness and Smoothed Analysis. - Yaming Yu:
On an Inequality of Karlin and Rinott Concerning Weighted Sums of i.i.d. Random Variables. - Tiangao Gou, Syed Ali Jafar, Chenwei Wang:
On the Degrees of Freedom of Finite State Compound Wireless Networks - Settling a Conjecture by Weingarten et. al. - Sabah S. Al-Fedaghi, Bernhard Thalheim:
Personal Information Databases. - S. Santhosh Baboo, Nikhil Lobo:
Improving Effectiveness Of ELearning In Maintenance Using Interactive 3D. - Young-Han Kim, Amos Lapidoth, Tsachy Weissman:
Error Exponents for the Gaussian Channel with Active Noisy Feedback. - Ljiljana Brankovic, Henning Fernau, Joachim Kneis, Dieter Kratsch, Alexander Langer, Mathieu Liedloff, Daniel Raible, Peter Rossmanith:
Breaking the 2^n-Barrier for Irredundance: A Parameterized Route to Solving Exact Puzzles. - Jacob Ziv:
On the optimality of universal classifiers for finite-length individual test sequences. - Akinola S. Olalekan, Adenike O. Osofisan:
An Empirical Comparative Study of Checklist based and Ad Hoc Code Reading Techniques in a Distributed Groupware Environment. - Jie Chen, Ilya Safro:
A Measure of the Connection Strengths between Graph Vertices with Applications. - Harry Bunt, Laurent Romary:
Towards Multimodal Content Representation. - David I. Spivak:
Higher-dimensional models of networks. - Paolo Ferragina, Travis Gagie, Giovanni Manzini:
Lightweight Data Indexing and Compression in External Memory. - Chandra Chekuri, Jan Vondrák:
Randomized Pipage Rounding for Matroid Polytopes and Applications. - Yilun Shang:
Leader-following Consensus Problems with a Time-varying Leader under Measurement Noises. - Yilun Wang, Wotao Yin:
Compressed Sensing via Iterative Support Detection. - Heidi Gebauer:
A Strategy for Maker in the Clique Game which Helps to Tackle some Open Problems by Beck. - Paola Flocchini, Bernard Mans, Nicola Santoro:
Exploration of Periodically Varying Graphs. - Mohamed A. El-Zawawy, Mohamed E. El-Sharkawi:
Clustering with Obstacles in Spatial Databases. - Mohamed E. El-Sharkawi, Mohamed A. El-Zawawy:
Algorithm for Spatial Clustering with Obstacles. - Olof Görnerup, Magnus Boman:
A baseline for content-based blog classification. - Maria Silvia Pini, Francesca Rossi, Kristen Brent Venable, Toby Walsh:
Manipulation and gender neutrality in stable marriage procedures. - Maria Silvia Pini, Francesca Rossi, Kristen Brent Venable, Toby Walsh:
Dealing with incomplete agents' preferences and an uncertain agenda in group decision making via sequential majority voting. - Mirco Gelain, Maria Silvia Pini, Francesca Rossi, Kristen Brent Venable, Toby Walsh:
Elicitation strategies for fuzzy constraint problems with missing preferences: algorithms and experimental studies. - Michael J. Maher, Nina Narodytska, Claude-Guy Quimper, Toby Walsh:
Flow-Based Propagators for the SEQUENCE and Related Global Constraints. - George Katsirelos, Nina Narodytska, Toby Walsh:
The Weighted CFG Constraint. - Walid Hachem, Eric Moulines, François Roueff:
Error exponents for Neyman-Pearson detection of a continuous-time Gaussian Markov process from noisy irregular samples. - José Ignacio Orlicki:
SQL/JavaScript Hybrid Worms As Two-stage Quines. - Amos Fiat, Amiram Wingarten:
Envy, Multi Envy, and Revenue Maximization. - Chris T. K. Ng, Howard C. Huang:
Efficient Linear Precoding in Downlink Cooperative Cellular Networks with Soft Interference Nulling. - Aggelos Kiayias, Alexander Russell, Narasimha K. Shashidhar:
Randomness-optimal Steganography. - Kai Cai, Rongquan Feng, Zhiming Zheng:
Cross-correlation properties of cyclotomic sequences. - Kai Cai:
Autocorrelation-Run Formula for Binary Sequences. - Ning Chen, Maximilien Gadouleau, Zhiyuan Yan:
Rank Metric Decoder Architectures for Noncoherent Error Control in Random Network Coding. - James Petterson, Tibério S. Caetano:
Scalable Inference for Latent Dirichlet Allocation. - Akbar Ghasemi, Abolfazl S. Motahari, Amir K. Khandani:
Interference Alignment for the K User MIMO Interference Channel. - Troy Lee:
A note on the sign degree of formulas. - Ernie Cohen, Norbert Schirmer:
A Better Reduction Theorem for Store Buffers. - Christian Knauer, Maarten Löffler, Marc Scherfenberg, Thomas Wolle:
The directed Hausdorff distance between imprecise point sets. - Haralampos Tsaknakis, Paul G. Spirakis:
A Graph Spectral Approach for Computing Approximate Nash Equilibria. - Frederic Dorn:
Planar Subgraph Isomorphism Revisited. - Elaine M. Eschen, Chính T. Hoàng, Jeremy P. Spinrad, R. Sritharan:
On graphs without a C4 or a diamond. - Ilias Diakonikolas, Rocco A. Servedio, Li-Yang Tan, Andrew Wan:
A regularity lemma, and low-weight approximators, for low-degree polynomial threshold functions. - Jason D. Hartline, Brendan Lucier:
Bayesian Algorithmic Mechanism Design. - Christine Bachoc:
Semidefinite programming, harmonic analysis and coding theory. - Michael J. Kurtz, Günther Eichhorn, Alberto Accomazzi, Carolyn Stern-Grant, Markus Demleitner, Stephen S. Murray:
Worldwide Use and Impact of the NASA Astrophysics Data System Digital Library. - Michael J. Kurtz, Günther Eichhorn, Alberto Accomazzi, Carolyn Stern-Grant, Markus Demleitner, Stephen S. Murray, Nathalie Martimbeau, Barbara Elwell:
The Bibliometric Properties of Article Readership Information. - Dusan Jakovetic, João Manuel Freitas Xavier, José M. F. Moura:
Consensus in Correlated Random Topologies: Weights for Finite Time Horizon. - B. Javad Ebrahimi, Christina Fragouli:
Combinatiorial Algorithms for Wireless Information Flow. - Ofer Shayevitz, Meir Feder:
Optimal Feedback Communication via Posterior Matching. - S. Rathi, K. Thanuskodi:
A Secure and Fault tolerant framework for Mobile IPv6 based networks. - Robiah Yusof, Siti Rahayu Selamat, Mohd Zaki Mas'ud, S. Shahrin, Mohd Faizal Abdollah, R. Marliza:
A New Generic Taxonomy on Hybrid Malware Detection Technique. - Andrei-Horia Mogos, Mugurel Ionut Andreica:
Approximating Mathematical Semantic Web Services Using Approximation Formulas and Numerical Methods. - Farah Jemili, Montaceur Zaghdoud, Mohamed Ben Ahmed:
Hybrid Intrusion Detection and Prediction multiAgent System HIDPAS. - Hagai Cohen, Ely Porat:
Range Non-Overlapping Indexing. - J. Christian Attiogbé:
Modelling and Analysing Dynamic Decentralised Systems. - Ivan Voras, Mario Zagar:
Characteristics of multithreading models for high-performance IO driven network applications. - Vladimir Dotsenko, Mikael Vejdemo-Johansson:
Implementing Gröbner bases for operads. - Juan Gerardo Alcázar:
On the Different Shapes Arising in a Family of Rational Curves Depending on a Parameter. - Juan Gerardo Alcázar:
Local Shape of Generalized Offsets to Algebraic Curves. - Charalampos E. Tsourakakis:
MACH: Fast Randomized Tensor Decompositions. - Kaibin Huang, Vincent K. N. Lau, Dong Ku Kim:
Event-Driven Optimal Feedback Control for Multi-Antenna Beamforming. - Marko V. Jankovic:
Geometrical Interpretation of Shannon's Entropy Based on the Born Rule. - Hrushikesh N. Mhaskar:
Eignets for function approximation on manifolds. - Mohammad Ali Maddah-Ali:
The Degrees of Freedom of the Compound MIMO Broadcast Channels with Finite States. - Kenneth W. Shum, Chi Wan Sung:
Achieving Capacity of Bi-Directional Tandem Collision Network by Joint Medium-Access Control and Channel-Network Coding. - Ilias Diakonikolas, Prasad Raghavendra, Rocco A. Servedio, Li-Yang Tan:
Average sensitivity and noise sensitivity of polynomial threshold functions. - Anthony Scemama:
IRPF90: a programming environment for high performance computing. - Clemens Thielen, Sven Oliver Krumke:
Complexity of Strong Implementability. 1-12 - Alain Bretto, Yannick Silvestre, Thierry Vallée:
Cartesian product of hypergraphs: properties and algorithms. 22-28 - Konstantinos Papalamprou, Leonidas S. Pitsoulis:
Regular Matroids with Graphic Cocircuits. 29-41 - Olga Tveretina, Carsten Sinz, Hans Zantema:
An Exponential Lower Bound on OBDD Refutations for Pigeonhole Formulas. 13-21 - Emmanuel Polonowski:
Deriving SN from PSN: a general proof technique. - Norbert Bátfai:
A Conceivable Origin of Machine Consciousness in the IDLE process. - Davide Di Ruscio, Patrizio Pelliccione, Alfonso Pierantonio, Stefano Zacchiroli:
Towards maintainer script modernization in FOSS distributions. - Ralf Treinen, Stefano Zacchiroli:
Expressing advanced user preferences in component installation. - Manuel Bodirsky, Martin Hils, Barnaby Martin:
On the Scope of the Universal-Algebraic Approach to Constraint Satisfaction. - George Katsirelos, Nina Narodytska, Toby Walsh:
Breaking Generator Symmetry. - Jeffrey G. Andrews, Steven Weber, Marios Kountouris, Martin Haenggi:
Random Access Transport Capacity. - George T. Amariucai, Shuangqing Wei:
Feedback-Based Collaborative Secrecy Encoding over Binary Symmetric Channels. - Hagai Cohen, Ely Porat:
Fast Set Intersection and Two Patterns Matching. - Neelu Khare, Neeru Adlakha, K. R. Pardasani:
An Algorithm for Mining Multidimensional Fuzzy Association Rules. - Prahladh Harsha, Adam R. Klivans, Raghu Meka:
Bounding the Sensitivity of Polynomial Threshold Functions. - Godwin Shen, Antonio Ortega:
Transform-based Distributed Data Gathering. - Moshe Mishali, Yonina C. Eldar:
Expected RIP: Conditioning of The Modulated Wideband Converter. - Charilaos Efthymiou:
Deterministic counting of graph colourings using sequences of subgraphs. - Jinglong Zhou, Vijay S. Rao, Przemyslaw Pawelczak, Daniel Wu, Prasant Mohapatra:
Practical Rate and Route Adaptation with Efficient Link Quality Estimation for IEEE 802.11b/g Multi-Hop Networks. - Sagar Shenvi, Bikash Kumar Dey:
A simple necessary and sufficient condition for the double unicast problem. - Fedor V. Fomin, Yngve Villanger:
Finding Induced Subgraphs via Minimal Triangulations. - Haris Aziz, Oded Lachish, Mike Paterson, Rahul Savani:
Wiretapping a hidden network. - Doha Hamza, Mohammed Nafie:
Cognitive Power Control Under Correlated Fading and Primary-Link CSI. - Vikraman Arvind, Srikanth Srinivasan:
The Remote Point Problem, Small Bias Space, and Expanding Generator Sets. - Vahab S. Mirrokni, S. Muthukrishnan, Uri Nadav:
Quasi-Proportional Mechanisms: Prior-free Revenue Maximization. - Nadia M. Benbernou, Erik D. Demaine, Martin L. Demaine, Aviv Ovadya:
A Universal Crease Pattern for Folding Orthogonal Shapes. - Kusum Lata, H. S. Jamadagni:
Formal Verification of Full-Wave Rectifier: A Case Study. - Rio Yokota, Lorena A. Barba, Matthew G. Knepley:
PetRBF--A parallel O(N) algorithm for radial basis function interpolation. - Joey Wilson, Neal Patwari:
Through-Wall Tracking Using Variance-Based Radio Tomography Networks. - Chinmay S. Vaze, Mahesh K. Varanasi:
The Degrees of Freedom Regions of MIMO Broadcast, Interference, and Cognitive Radio Channels with No CSIT. - Cihan Tepedelenlioglu, Adarsh B. Narasimhamurthy:
Robust Distributed Estimation over Multiple Access Channels with Constant Modulus Signaling. - Raghu Meka, Prateek Jain, Inderjit S. Dhillon:
Guaranteed Rank Minimization via Singular Value Projection. - Robert Sheng Xu, Oleg V. Michailovich, Magdy M. A. Salama:
Information tracking approach to segmentation of ultrasound imagery of prostate. - Elad Shaked, Oleg V. Michailovich:
Iterative Shrinkage Approach to Restoration of Optical Imagery. - Evangelos Markakis, Ioannis Milis:
Proceedings Fourth Athens Colloquium on Algorithms and Complexity, ACAC 2009, Athens, Greece, August 20-21, 2009. EPTCS 4, 2009 [contents] - Cuizhu Shi, Aditya Ramamoorthy:
Fast Algorithm for Finding Unicast Capacity of Linear Deterministic Wireless Relay Networks. - (Withdrawn) Clique and Vertex Cover are solvable in polynomial time if the input structure is ordered and contains a successor predicate.
- Xiaokui Xiao, Guozhang Wang, Johannes Gehrke:
Differential Privacy via Wavelet Transforms. - Michael Baumann, Pierre Mozer, Vincent Daanen, Jocelyne Troccaz:
Prostate Biopsy Assistance System with Gland Deformation Estimation for Enhanced Precision. - (Withdrawn) Two-Phase Flow Complexity in Heterogeneous Media.
- Nikolaj Leischner, Vitaly Osipov, Peter Sanders:
GPU sample sort. - John Fearnley, Marcin Jurdzinski, Rahul Savani:
Linear Complementarity Algorithms for Infinite Games. - Tamal K. Dey, Jian Sun, Yusu Wang:
Approximating Loops in a Shortest Homology Basis from Point Data. - D. Falie:
Improvements of the 3D images captured with Time-of-Flight cameras. - Brendan Lucier:
Beyond Equilibria: Mechanisms for Repeated Combinatorial Auctions. - Jan Draisma, Eyal Kushilevitz, Enav Weinreb:
Partition Arguments in Multiparty Communication Complexity. - Luís Daniel Abreu, Óscar Ciaurri, Juan Luis Varona:
Bilinear biorthogonal expansions and the spectrum of an integral operator. - Olivier Finkel, Pierre Simonnet:
On Recognizable Tree Languages Beyond the Borel Hierarchy. - Noam Shental, Amnon Amir, Or Zuk:
Rare-Allele Detection Using Compressed Se(que)nsing. - Pradeep Kiran Sarvepalli, Robert Raussendorf:
Matroids and Quantum Secret Sharing Schemes. - Tin Yin Lam, Irmtraud M. Meyer:
Efficient parameter training for hidden Markov models using posterior sampling training and Viterbi training. - Dae San Kim:
An Infinite Family of Recursive Formulas Generating Power Moments of Kloosterman Sums with Trace One Arguments: O(2n+1,2^r) Case. - Dae San Kim:
Ternary Codes Associated with O^-(2n,q) and Power Moments of Kloosterman Sums with Square Arguments. - Dae San Kim:
Recursive formulas generating power moments of multi-dimensional Kloosterman sums and m-multiple power moments of Kloosterman sums. - Dae San Kim:
Ternary Codes Associated with O(3,3^r) and Power Moments of Kloosterman Sums with Trace Nonzero Square Arguments. - Dae San Kim:
Infinite Families of Recursive Formulas Generating Power Moments of Ternary Kloosterman Sums with Trace Nonzero Square Arguments: O(2n+1,2^{r}) Case. - Dae San Kim:
Infinite Families of Recursive Formulas Generating Power Moments of Ternary Kloosterman Sums with Square Arguments Associated with O^{-}_{}(2n,q). - Vyacheslav I. Yukalov, Didier Sornette:
Scheme of thinking quantum systems. - Alexander I. Bobenko, Christian Mercat, Markus Schmies:
Conformal Structures and Period Matrices of Polyhedral Surfaces. - James Bowley, Laura Rebollo-Neira:
Sparse image representation by discrete cosine/spline based dictionaries. - Daowen Qiu, Paulo Mateus, Xiangfu Zou, Amílcar Sernadas:
One-way quantum finite automata together with classical states. - Vladimir V. Kisil:
Computation and Dynamics: Classical and Quantum. - Alin Bostan, Manuel Kauers:
The complete Generating Function for Gessel Walks is Algebraic. - Jan A. Bergstra, Cornelis A. Middelburg:
Arithmetical meadows. - Grégoire Chevreau, Jocelyne Troccaz, Pierre Conort, Raphaële Renard-Penna, Alain Mallet, Michel Daudon, Pierre Mozer:
Estimation of urinary stone composition by automated processing of CT images. - Lenka Zdeborová, Scott Backhaus, Michael Chertkov:
Message Passing for Integrating and Assessing Renewable Generation in a Redundant Power Grid. - Yin Xiang, LianLin Li, Fang Li:
Compressive sensing by white random convolution. - ShinnYih Huang, Hoda Bidkhori:
Strongly Cancellative and Recovering Sets On Lattices. - Terry Rudolph:
A simple encoding of a quantum circuit amplitude as a matrix permanent. - Koji Nuida:
Pattern occurrence in the dyadic expansion of square root of two and an analysis of pseudorandom number generators. - Robert Brijder, Hendrik Jan Hoogeboom:
Maximal Pivots on Graphs with an Application to Gene Assembly. - Bill Rosgen:
Computational Distinguishability of Quantum Channels. - Sebastian Bernhardsson, Luis Enrique Correa da Rocha, Petter Minnhagen:
The meta book and size-dependent properties of written language. - Loet Leydesdorff:
How are new citation-based journal indicators adding to the bibliometric toolbox? - Edward Farhi, Jeffrey Goldstone, David Gosset, Sam Gutmann, Harvey B. Meyer, Peter W. Shor:
Quantum Adiabatic Algorithms, Small Gaps, and Different Paths. - Luís Daniel Abreu:
Super-wavelets versus poly-Bergman spaces. - A. Mani:
A Program in Dialectical Rough Set Theory. - Ming-Sheng Shang, Linyuan Lu, Yi-Cheng Zhang, Tao Zhou:
Empirical analysis of web-based user-object bipartite networks. - Vincent Y. F. Tan, Animashree Anandkumar, Alan S. Willsky:
Learning Gaussian Tree Models: Analysis of Error Exponents and Extremal Structures. - Alexander A. Davydov, Massimo Giulietti, Stefano Marcugini, Fernanda Pambianco:
Some combinatorial aspects of constructing bipartite-graph codes. - Daniel M. Kane, Samuel A. Kutin:
Quantum interpolation of polynomials. - Alexandre Lung-Yut-Fong, Céline Lévy-Leduc, Olivier Cappé:
Distributed detection/localization of change-points in high-dimensional network traffic data. - Jan A. Bergstra, Cornelis A. Middelburg:
Partial Komori fields and imperative Komori fields. - Kirk D. Borne:
Astroinformatics: A 21st Century Approach to Astronomy. - Kirk D. Borne, Suzanne Jacoby, Karen Carney, Andy Connolly, Timothy E. Eastman, M. Jordan Raddick, J. Anthony Tyson, John F. Wallin:
The Revolution in Astronomy Education: Data Science for the Masses. - Marcus Hutter:
Discrete MDL Predicts in Total Variation. - Jacques Blum, Cédric Boulbe, Blaise Faugeras:
Reconstruction of the equilibrium of the plasma in a Tokamak and identification of the current density profile in real time. - Shigeru Yamashita, Igor L. Markov:
Fast Equivalence-checking for Quantum Circuits.
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.