default search action
CoRR, April 2010
- Kamran Karimi, Neil G. Dickson, Firas Hamze:
High-Performance Physics Simulations Using Multi-Core CPUs and GPGPUs in a Volunteer Computing Context. - Neil G. Dickson, Kamran Karimi, Firas Hamze:
Importance of Explicit Vectorization for CPU and GPU Software Performance. - Martin Haenggi:
Interference in Lattice Networks. - Sudipto Das, Ömer Egecioglu, Amr El Abbadi:
Anonimos: An LP based Approach for Anonymizing Weighted Social Network Graphs. - Andrés Arcia-Moret, Yubo Yang, Nicolas Montavont, David Ros:
A Study of Bandwidth-Perception Management Mechanisms in IEEE 802.16 Networks. - Dai Tri Man Le:
A Characterization of Combined Traces Using Labeled Stratified Order Structures. - Hirotoshi Yasuoka, Tachio Terauchi:
Quantitative Information Flow - Verification Hardness and Possibilities. - Yao Sun, Dingkang Wang:
A New Proof of the F5 Algorithm. - Akisato Kimura, Derek Pang, Tatsuto Takeuchi, Kouji Miyazato, Junji Yamato, Kunio Kashino:
A stochastic model of human visual attention with a dynamic Bayesian network. - Benjamin Hoffmann, Mikhail Lifshits, Yury Lifshits, Dirk Nowotka:
Maximal Intersection Queries in Randomized Input Models. - Rahul Jain, Hartmut Klauck, Miklos Santha:
Optimal Direct Sum Results for Deterministic and Randomized Decision Tree Complexity. - Joseph Blomer, Nihar Jindal:
Opportunistic Routing in Ad Hoc Networks: How many relays should there be? What rate should nodes use? - Kai Xie, Jing Li:
Precoded Turbo Equalizer for Power Line Communication Systems. - Alexandre Chapoutot:
Interval Slopes as Numerical Abstract Domain for Floating-Point Variables. - Julien Henaut, Aubin Lecointre, Daniela Dragomirescu, Robert Plana:
Radio Interface for High Data Rate Wireless Sensor Networks. - Oliver Johnson, Matthew Aldridge, Robert J. Piechocki:
Delay-rate tradeoff in ergodic interference alignment. - Anders Drachen, Lennart E. Nacke, Georgios N. Yannakakis, Anja Lee Pedersen:
Psychophysiological Correlations with Gameplay Experience Dimensions. - Lennart E. Nacke, Craig A. Lindley:
Affective Ludology, Flow and Immersion in a First- Person Shooter: Measurement of Player Experience. - Lennart E. Nacke:
From Playability to a Hierarchical Game Usability Model. - Sophie Stellmach, Lennart E. Nacke, Raimund Dachselt, Craig A. Lindley:
Trends and Techniques in Visual Gaze Analysis. - Lennart E. Nacke, Sophie Stellmach, Dennis Sasse, Craig A. Lindley:
Gameplay experience in a gaze interaction game. - Vincenzo Pellegrini, Luca Rose, Mario Di Dio:
On Memory Accelerated Signal Processing within Software Defined Radios. - Amine Laourine, Aaron B. Wagner:
The Degraded Poisson Wiretap Channel. - Salah-Eddine Elayoubi, Eitan Altman, Majed Haddad, Zwi Altman:
A hybrid decision approach for the association problem in heterogeneous networks. - Edith Elkind, Piotr Faliszewski:
Approximation Algorithms for Campaign Management. - Roghayeh Joda, Farshad Lahouti:
Network Code Design for Orthogonal Two-hop Network with Broadcasting Relay: A Joint Source Channel Network Coding Approach. - Srinivasagopalan Srivathsan, Costas Busch, S. Sitharama Iyengar:
An Oblivious Spanning Tree for Buy-at-Bulk Network Design Problems. - Tuvi Etzion, Alexander Vardy, Eitan Yaakobi:
Dense Error-Correcting Codes in the Lee Metric. - Sarif Sk. Hassan, Pabitra Pal Choudhury, Sugata Sanyal:
A Spatial Crypto Technique for Secure Data Transmission. - (Withdrawn) Facial Expression Representation Using Heteroscedastic Linear Discriminant Analysis and Gabor Wavelets.
- Soummya Kar, José M. F. Moura:
Gossip and Distributed Kalman Filtering: Weak Consensus under Weak Detectability. - Ali Tajer, Xiaodong Wang:
Multiuser Diversity Gain in Cognitive Networks. - Joseph M. Burdis, Irina A. Kogan:
Object-image correspondence for curves under finite and affine cameras. - Daniel S. Menasché, Antônio Augusto de Aragão Rocha, Edmundo de Souza e Silva, Rosa Maria Meri Leão, Donald F. Towsley, Arun Venkataramani:
Estimating Self-Sustainability in Peer-to-Peer Swarming Systems. - Marco Dalai:
A new bound for the capacity of the deletion channel with high deletion probabilities. - M. Amin Khajehnejad, Weiyu Xu, Amir Salman Avestimehr, Babak Hassibi:
Improved Sparse Recovery Thresholds with Two-Step Reweighted ℓ1 Minimization. - Alessandro Colantonio, Roberto Di Pietro:
CONCISE: Compressed 'n' Composable Integer Set. - Jasmine Norman, J. Paulraj Joseph, P. Prapoorna Roja:
A Faster Routing Scheme for Stationary Wireless Sensor Networks - A Hybrid Approach. - M. Anwar Hossain, Mohammed Tarique, Rumana Islam:
Shadowing Effects on Routing Protocol of Multihop Ad Hoc Networks. - Raphaël Clifford, Zvi Gotthilf, Moshe Lewenstein, Alexandru Popa:
Permuted Common Supersequence. - Zhiqiang Zhang, Yaoyun Shi:
On the parity complexity measures of Boolean functions. - Sergey Andreyev:
User-driven applications. - Sandipan Dey, Hameed Al-Qaheri, Sugata Sanyal:
Embedding Secret Data in HTML Web Page. - Mahmoud Khademi, Mohammad Hadi Kiapour, Mohammad Taghi Manzuri Shalmani, Ali Akbar Kiaei:
Analysis, Interpretation, and Recognition of Facial Action Units and Expressions Using Neuro-Fuzzy Modeling. - Sisir Koppaka, Ashish Ranjan Hota:
Superior Exploration-Exploitation Balance with Quantum-Inspired Hadamard Walks. - Mahmoud Khademi, Mohammad Taghi Manzuri Shalmani, Mohammad Hadi Kiapour, Ali Akbar Kiaei:
Recognizing Combinations of Facial Action Units with Different Intensity Using a Mixture of Hidden Markov Models and Neural Network. - Mahmoud Khademi, Mehran Safayani, Mohammad Taghi Manzuri Shalmani:
Multilinear Biased Discriminant Analysis: A Novel Method for Facial Action Unit Representation. - Robert Crowston, Gregory Z. Gutin, Mark Jones, Anders Yeo:
Linear-Number-of-Variables Kernel for Unit-Conflict-Free-Max-Sat Parameterized Above Expectation. - Shaunak Joshi, Przemyslaw Pawelczak, John D. Villasenor, Danijela Cabric, Sateesh Addepalli:
Impact of Connection Admission Process on Load Balancing in Cellular Networks. - Marco Levorato, Urbashi Mitra, Michele Zorzi:
Cognitive Interference Management in Retransmission-Based Wireless Networks. - Satish Babu Korada, Andrea Montanari:
Applications of Lindeberg Principle in Communications and Statistical Learning. - John Augustine, Sandip Das, Anil Maheshwari, Subhas C. Nandy, Sasanka Roy, Swami Sarvattomananda:
Recognizing the Largest Empty Circle and Axis-Parallel Rectangle in a Desired Location. - Rung Ching Chen, Kai-Fan Cheng, Chia-Fen Hsieh:
Using Rough Set and Support Vector Machine for Network Intrusion Detection. - Natarajan Meghanathan, Sumanth Reddy Allam, Loretta A. Moore:
Tools and techniques for Network Forensics. - G. N. Krishnamurthy, V. Ramaswamy:
Encryption Quality Analysis and Security Evaluation of CAST-128 Algorithm and its Modified Version using Digital Images. - Poonam Garg:
A Comparison between Memetic algorithm and Genetic algorithm for the cryptanalysis of Simplified Data Encryption Standard algorithm. - Debdutta Barman Roy, Rituparna Chaki, Nabendu Chaki:
A New Cluster-based Wormhole Intrusion detection algorithm for Mobile Ad-Hoc Networks. - Natasa Zivic:
Iterative method for improvement of coding and decryption. - Eric Ke Wang, Lucas Chi Kwong Hui, Siu-Ming Yiu:
A new key establishment scheme for wireless sensor networks. - Mohammed Misbahuddin, Sachin Narayanan, Bishwa Ranjan Ghosh:
Dynamic IDP Signature processing by fast elimination using DFA. - G. M. Tamilselvan, A. Shanmugam:
Effect of Inter Packet Delay in performance analysis of coexistence heterogeneous Wireless Packet Networks. - Mohammed A. Abuhelaleh, Khaled M. Elleithy, Thabet M. Mismar:
Clustered Hierarchy in Sensor Networks: Performance and Security. - Yoshito Kanamori, Seong-Moo Yoo:
Quantum Three-Pass protocol: Key distribution using quantum superposition states. - Natarajan Jaisankar, R. Saravanan, K. Durai Swamy:
Intelligent Detection System framework using Mobile agents. - Sugam Sharma, Hari Cohly, Tzusheng Pei:
On Generation of Firewall Log Status Reporter (SRr) Using Perl. - Alan Mink, Sheila Frankel, Ray A. Perlner:
Quantum Key Distribution (QKD) and Commodity Security Protocols: Introduction and Integration. - Dietrich Kuske, Jiamou Liu, Markus Lohrey:
The Isomorphism Problem for omega-Automatic Trees. - Oliver Kullmann:
Exact Ramsey Theory: Green-Tao numbers and SAT. - Kohtaro Tadaki:
A new representation of Chaitin Ωnumber based on compressible strings. - Anthony Kim, Muriel Médard:
Scalar-linear Solvability of Matroidal Networks Associated with Representable Matroids. - Ilango Sriram, Dave Cliff:
Effects of component-subscription network topology on large-scale data centre performance scaling. - Krishnendu Chatterjee, Thomas A. Henzinger, Barbara Jobstmann, Rohit Singh:
Measuring and Synthesizing Systems in Probabilistic Environments. - Valentin E. Brimkov:
Patrolling a Street Network is Strongly NP-Complete but in P for Tree Structures. - Mehran Safayani, Mohammad Taghi Manzuri Shalmani, Mahmoud Khademi:
Extended Two-Dimensional PCA for Efficient Face Representation and Recognition. - Mohamed Abid, Songbo Song, Hassnaa Moustafa, Hossam Afifi:
Integrating identity-based cryptography in IMS service authentication. - E. Sathiyamoorthy, N. Ch. Sriman Narayana Iyengar, V. Ramachandran:
Agent Based Trust Management Model Based on Weight Value Model for Online Auctions. - Ayatullah Faruk Mollah, Subhadip Basu, Mita Nasipuri, Dipak Kumar Basu:
Text/Graphics Separation for Business Card Images for Mobile Devices. - Mohammed Aijaz Ahmed, D. Rajya Lakshmi, Sayed Abdul Sattar:
Cryptanalysis of a more efficient and secure dynamic id-based remote user authentication scheme. - Yasir Arfat Malkani, Lachhman Das Dhomeja:
PSIM: A tool for analysis of device pairing methods. - M. Prabu Kumar, K. Praneesh Kumar Yadav:
Data security in mobile devices by geo locking. - Moheb R. Girgis, Tarek M. Mahmoud, Youssef S. Takroni, Hassan S. Hassan:
Performance evaluation of a new route optimization technique for mobile IP. - Jean-François Lalande, David Rodriguez, Christian Toinard:
Security properties in an open peer-to-peer network. - Johnneth de Sene Fonseca, Zair Abdelouahab, Denivaldo Lopes, Sofiane Labidi:
A security framework for SOA applications in mobile environment. - (Withdrawn) Securing AODV for MANETs using Message Digest with Secret Key.
- Soroush Akhlaghi, Abbas Kiani, Mohammad Reza Ghanavati:
Cost-Bandwidth Tradeoff In Distributed Storage Systems. - Somayeh Salimi, Mahmoud Salmasizadeh, Mohammad Reza Aref:
Generalized Secure Distributed Source Coding with Side Information. - Somayeh Salimi, Mahmoud Salmasizadeh, Mohammad Reza Aref:
Rate Regions of Secret Key Sharing in a New Source Model. - Jin-yi Cai, Sangxia Huang, Pinyan Lu:
From Holant To #CSP And Back: Dichotomy For Holant$^c$ Problems. - Daniel Gayo-Avello:
Nepotistic Relationships in Twitter and their Impact on Rank Prestige Algorithms. - Dmitry Gavinsky, Alexander A. Sherstov:
A Separation of NP and coNP in Multiparty Communication Complexity. - Laurent Bienvenu, Frank Stephan, Jason Teutsch:
How powerful are integer-valued martingales? - Dominic Dumrauf, Tim Süß:
On the Complexity of Local Search for Weighted Standard Set Problems. - Deli Qiao, Mustafa Cenk Gursoy, Senem Velipasalar:
Secure Communication over Fading Channels with Statistical QoS Constraints. - Deli Qiao, Mustafa Cenk Gursoy, Senem Velipasalar:
Secure Broadcasting over Fading Channels with Statistical QoS Constraints. - Qing Chen, Mustafa Cenk Gursoy:
Energy Efficiency Analysis in Amplify-and-Forward and Decode-and-Forward Cooperative Networks. - Junwei Zhang, Mustafa Cenk Gursoy:
Relay Beamforming Strategies for Physical-Layer Security. - Kimmo Fredriksson:
On building minimal automaton for subset matching queries. - Sami Akin, Mustafa Cenk Gursoy:
QoS Analysis of Cognitive Radio Channels with Perfect CSI at both Receiver and Transmitter. - Junwei Zhang, Mustafa Cenk Gursoy:
Collaborative Relay Beamforming for Secure Broadcasting. - Stevens Le Blond, Arnaud Legout, Fabrice Le Fessant, Walid Dabbous, Mohamed Ali Kâafar:
Spying the World from your Laptop -- Identifying and Profiling Content Providers and Big Downloaders in BitTorrent. - Kaushik Kumar Majumdar:
Indian policeman's dilemma: A game theoretic model. - Roberto Bagnara, Fred Mesnard, Andrea Pescetti, Enea Zaffanella:
The Automatic Synthesis of Linear Ranking Functions: The Complete Unabridged Version. - Marc Thurley:
The Complexity of Partition Functions on Hermitian Matrices. - David Doty, Matthew J. Patitz, Dustin Reishus, Robert T. Schweller, Scott M. Summers:
Strong Fault-Tolerance for Self-Assembly with Fuzzy Temperature. - Marko A. Rodriguez, Peter Neubauer:
The Graph Traversal Pattern. - Byung-Hak Kim, Arvind Yedla, Henry D. Pfister:
Message-Passing Inference on a Factor Graph for Collaborative Filtering. - Pablo Arrighi, Gilles Dowek:
On the completeness of quantum computation models. - Peter M. van de Ven, J. S. H. van Leeuwaarden, Dee Denteneer, A. J. E. M. Janssen:
Spatial fairness in linear wireless multi-access networks. - Yifan Chen, Chau Yuen:
Double-Directional Information Azimuth Spectrum and Relay Network Tomography for a Decentralized Wireless Relay Network. - Peter M. van de Ven, A. J. E. M. Janssen, J. S. H. van Leeuwaarden:
Optimal Tradeoff Between Exposed and Hidden Nodes in Large Wireless Networks. - Yuexian Hou, Tingxu Yan, Peng Zhang, Dawei Song, Wenjie Li:
On Tsallis Entropy Bias and Generalized Maximum Entropy Models. - Marcello M. Bersani, Achille Frigeri, Angelo Morzenti, Matteo Pradella, Matteo Rossi, Pierluigi San Pietro:
Bounded Reachability for Temporal Logic over Constraint Systems. - Emily J. King:
Grassmannian Fusion Frames. - Aditya Mahajan:
Optimal sequential transmission over broadcast channel with nested feedback. - Kenza Guenda:
New MDS Self-Dual Codes over Large Finite Fields. - Li Zhang, Shu Lin, Khaled A. S. Abdel-Ghaffar, Zhi Ding, Bo Zhou:
Circulant Arrays on Cyclic Subgroups of Finite Fields: Rank Analysis and Construction of Quasi-Cyclic LDPC Codes. - Danny Hermelin, Gad M. Landau, Shir Landau, Oren Weimann:
Unified Compression-Based Acceleration of Edit-Distance Computation. - Sami Akin, Mustafa Cenk Gursoy:
Ergodic Capacity Analysis in Cognitive Radio Systems under Channel Uncertainty. - Dung Viet Nguyen, Bane Vasic, Michael W. Marcellin, Shashi Kiran Chilappagari:
Structured LDPC Codes from Permutation Matrices Free of Small Trapping Sets. - Pushkar Tripathi:
A Deterministic Algorithm for the Vertex Connectivity Survivable Network Design Problem. - Avik Chaudhuri:
Liberalizing Dependency. - Elad Shaked, Oleg V. Michailovich:
Regularized Richardson-Lucy Algorithm for Sparse Reconstruction of Poissonian Images. - Zhi Xu:
Multi-Shift de Bruijn Sequence. - Dorit Ron, Ilya Safro, Achi Brandt:
Relaxation-based coarsening and multiscale graph organization. - Somayeh Fatahi, Nasser Ghasem-Aghaee:
Design and Implementation of an Intelligent Educational Model Based on Personality and Learner's Emotion. - Ismail A. Ismail, Mohammed A. Ramadan, Talaat S. El-Danaf, Ahmed H. Samak:
Signature Recognition using Multi Scale Fourier Descriptor And Wavelet Transform. - P. Anandhakumar, V. Balamurugan:
Feature-Based Adaptive Tolerance Tree (FATT): An Efficient Indexing Technique for Content-Based Image Retrieval Using Wavelet Transform. - Phanu Waraporn, Phayung Meesad, Gareth Clayton:
Ontology-supported processing of clinical text using medical knowledge integration for multi-label classification of diagnosis coding. - Hossein Rouhani Zeidanloo, Azizah Bt Abdul Manaf:
Botnet Detection by Monitoring Similar Communication Patterns. - (Withdrawn) Lightweight Distance bound Protocol for Low Cost RFID Tags.
- M. S. Saleem Basha, Dhavachelvan Ponnurangam:
Analysis of Empirical Software Effort Estimation Models. - Karl Schnaitter, Neoklis Polyzotis:
Semi-Automatic Index Tuning: Keeping DBAs in the Loop. - Ravindran Kannan:
Spectral Methods for Matrices and Tensors. - V. Chitraa, Antony Selvdoss Davamani:
A Survey on Preprocessing Methods for Web Usage Data. - Jacques Julliand, Nicolas Stouls, Pierre-Christophe Bué, Pierre-Alain Masson:
Syntactic Abstraction of B Models to Generate Tests. - Stevens Le Blond, Pere Manils, Chaabane Abdelberi, Mohamed Ali Kâafar, Arnaud Legout, Claude Castelluccia, Walid Dabbous:
De-anonymizing BitTorrent Users on Tor. - Lei Wang, Jianfeng Zhan, Weisong Shi, Yi Liang:
In Cloud, Can Scientific Communities Benefit from the Economies of Scale? - Xiaojun Sun, Chunming Zhao, Ming Jiang:
Closed-Form Expressions for Relay Selection with Secrecy Constraints. - Tobias Marschall:
Construction of minimal DFAs from biological motifs. - Gang Yu, Xiaoxiao Ma, Yong Shen, Wenbao Han:
Provable Secure Identity Based Generalized Signcryption Scheme. - Michael Burke, Neil C. Audsley:
Distributed Fault-Tolerant Avionic Systems - A Real-Time Perspective. - Anna Blasiak, Robert D. Kleinberg, Eyal Lubetzky:
Index coding via linear programming. - (Withdrawn) A note on the entropy of repetitive sequences of symmetry group permutations.
- Xiang He, Aylin Yener:
Strong Secrecy and Reliable Byzantine Detection in the Presence of an Untrusted Relay. - Paulo Feofiloff, Cristina G. Fernandes, Carlos Eduardo Ferreira, José Coelho de Pina:
A note on Johnson, Minkoff and Phillips' algorithm for the Prize-Collecting Steiner Tree Problem. - Shahar Dobzinski, Noam Nisan:
Multi-Unit Auctions: Beyond Roberts. - Nicolas Stouls, Marie-Laure Potet:
Security Policy Enforcement Through Refinement Process. - Pere Manils, Chaabane Abdelberi, Stevens Le Blond, Mohamed Ali Kâafar, Claude Castelluccia, Arnaud Legout, Walid Dabbous:
Compromising Tor Anonymity Exploiting P2P Information Leakage. - Didier Bert, Marie-Laure Potet, Nicolas Stouls:
GeneSyst: a Tool to Reason about Behavioral Aspects of B Event Specifications. Application to Security Properties. - Robert Ganian, Petr Hlinený, Joachim Kneis, Daniel Meister, Jan Obdrzálek, Peter Rossmanith, Somnath Sikdar:
Are there any good digraph width measures? - Tuvi Etzion, Alexander Vardy:
A New Construction for Constant Weight Codes. - Ludo Tolhuizen:
Bounds for codes for a non-symmetric ternary channel. - Florentin Smarandache, Jean Dezert:
Importance of Sources using the Repeated Fusion Method and the Proportional Conflict Redistribution Rules \#5 and \#6. - Te Sun Han:
Polymatroids with Network Coding. - (Withdrawn) A Streaming Approximation Algorithm for Klee's Measure Problem.
- Jinsong Tan:
The Networked Common Goods Game. - (Withdrawn) Belief Propagation for Min-cost Network Flow: Convergence and Correctness.
- Yam Ki Cheung, Ovidiu Daescu:
Approximate Point-to-Face Shortest Paths in R^3. - Anish Das Sarma, Alpa Jain, Philip Bohannon:
PROBER: Ad-Hoc Debugging of Extraction and Integration Pipelines. - Ludo Waltman, Nees Jan van Eck, Thed N. van Leeuwen, Martijn S. Visser, Anthony F. J. van Raan:
Towards a new crown indicator: An empirical analysis. - Anastasios Sidiropoulos:
Optimal stochastic planarization. - Yixin Cao, Jianer Chen, Yang Liu:
On Feedback Vertex Set, New Measure and New Structures. - J. O. Agushaka, M. M. Lawal, A. M. Bagiwa, B. F. Abdullahi:
Effect of Weighting Scheme to QoS Properties in Web Service Discovery. - Adiline T. Macriga, P. Anandha Kumar:
Seamless Data Services for Real Time Communication in a Heterogeneous Networks using Network Tracking and Management. - Shailja Shukla, Mukesh Tiwari:
Fuzzy Logic of Speed and Steering Control System for Three Dimensional Line Following of an Autonomous Vehicle. - P. Mohan Kumar, K. L. Shunmuganathan:
A reversible high embedding capacity data hiding technique for hiding secret data in images. - J. Arokia Renjit, K. L. Shunmuganathan:
Mining The Data From Distributed Database Using An Improved Mining Algorithm. - Arabinda Nanda, Amiya Kumar Rath, Saroj Kumar Rout:
Node Sensing & Dynamic Discovering Routes for Wireless Sensor Networks. - S. Zulaikha Beevi, M. Mohammed Sathik, K. Senthamaraikannan:
A Robust Fuzzy Clustering Technique with Spatial Neighborhood Information for Effective Medical Image Segmentation. - Bijia Pang, Ue-Li Pen, Michael Perrone:
Magnetohydrodynamics on Heterogeneous architectures: a performance comparison. - J. Nafeesa Begum, Krishnan Kumar, V. Sumathy:
Design And Implementation Of Multilevel Access Control In Medical Image Transmission Using Symmetric Polynomial Based Audio Steganography. - Sudhakar Sengan, S. Chenthur Pandian:
Enhanced Authentication and Locality Aided - Destination Mobility in Dynamic Routing Protocol for MANET. - H. B. Kekre, Tanuja K. Sarode:
New Clustering Algorithm for Vector Quantization using Rotation of Error Vector. - Jos A. E. Spaan:
The danger of pseudo science in Informetrics. - Sujata V. Mallapur, Sujata Terdal:
Enhanced Ad-Hoc on Demand Multipath Distance Vector Routing protocol. - C. V. Seshaiah, S. Nagarani:
A Survey on Space-Time Turbo Codes. - Manoranjan Kumar Singh, L. Rakesh:
Mathematical Principles in Software Quality Engineering. - Maciej Kurant, Athina Markopoulou, Patrick Thiran:
On the bias of BFS. - Zoltán Ésik:
An undecidable property of context-free languages. - Jan Treibig, Gerhard Wellein, Georg Hager:
Efficient multicore-aware parallelization strategies for iterative stencil computations. - G. Nathiya, S. C. Punitha, M. Punithavalli:
An Analytical Study on Behavior of Clusters Using K Means, EM and K* Means Algorithm. - A. Kumar, P. Chakrabarti, P. Saini:
Node inspection and analysis thereof in the light of area estimation and curve fitting. - Nabil Taib, Toufik Rekioua, Bruno Francois:
An Improved Fixed Switching Frequency Direct Torque Control of Induction Motor Drives Fed by Direct Matrix Converter. - Shamimul Qamar, Niranjan Lal, Mrityunjay Singh:
Internet ware cloud computing: Challenges. - Samidha Dwivedi Sharma, Ramveer S. Kasana:
Mobile Database System: Role of Mobility on the Query Processing. - P. S. Revenkar, Anisa Anjum, W. Z. Gandhare:
Secure Iris Authentication Using Visual Cryptography. - (Withdrawn) Regular LDPC Lattices are Capacity-Achieving.
- Iwan M. Duursma, Radoslav Kirov:
Improved Two-Point Codes on Hermitian Curves. - N. Saravana Selvam, S. Radhakrishnan:
Processor Based Active Queue Management for providing QoS in Multimedia Application. - M. Gomathi, P. Thangaraj:
A New Approach to Lung Image Segmentation using Fuzzy Possibilistic C-Means Algorithm. - K. Selvamani, A. Duraisamy, Arputharaj Kannan:
Protection of Web Applications from Cross-Site Scripting Attacks in Browser Side. - Neeta Deshpande, Archana M. Rajurkar, Ramchandra Manthalkar:
Review of Robust Video Watermarking Algorithms. - Uraiwan Inyaem, Choochart Haruechaiyasak, Phayung Meesad, Dat Tran:
Terrorism Event Classification Using Fuzzy Inference Systems. - T. Vengattaraman, P. Dhavachelvan, Ramachandran Baskaran:
A Model of Cloud Based Application Environment for Software Testing. - K. Valarmathi, N. Malmurugan:
Joint Design of Congestion Control Routing With Distributed Multi Channel Assignment in Wireless Mesh Networks. - Nafiz Imtiaz Bin Hamid, Md. Zakir Hossain, Md. R. H. Khandokar, Taskin Jamal, Md. A. Shoeb:
Mobile Broadband Possibilities considering the Arrival of IEEE 802.16m & LTE with an Emphasis on South Asia. - H. B. Kekre, Saylee M. Gharge, Tanuja K. Sarode:
SAR Image Segmentation using Vector Quantization Technique on Entropy Images. - S. Kurshid Jinna, L. Ganesan:
Reversible Image data Hiding using Lifting wavelet Transform and Histogram Shifting. - S. K. Nayak, S. B. Thorat, N. V. Kalyankar:
GIS: Geographic Information System An application for socio-economical data collection for rural area. - T. Krishna Kishore, T. Sasi Vardhan, N. Lakshmi Narayana:
Probabilistic Semantic Web Mining Using Artificial Neural Analysis. - P. J. Gayathri, S. C. Punitha, M. Punithavalli:
Document Clustering using Sequential Information Bottleneck Method. - Michael I. Trofimov:
Polynomial Time Algorithm for Graph Isomorphism Testing. - (Withdrawn) Existential Second Order Logic Expression With Horn First Order for Maximum Clique (Decision Version).
- Jeffrey D. Blanchard, Coralia Cartis, Jared Tanner, Andrew Thompson:
Phase Transitions for Greedy Sparse Approximation Algorithms. - Amit Kumar, Ravindran Kannan:
Clustering with Spectral Norm and the k-means Algorithm. - Maurice Margenstern:
About the embedding of one dimensional cellular automata into hyperbolic cellular automata. - Prasad Chebolu, Leslie Ann Goldberg, Russell A. Martin:
The Complexity of Approximately Counting Stable Matchings. - Pengkai Zhao, Babak Daneshrad:
Throughput Enhancement Using Multiple Antennas in OFDM-based Ad Hoc Networks under Transceiver Impairments. - Kai Brünnler:
Nested Sequents. - Elliot Anshelevich, Martin Hoefer:
Contribution Games in Social Networks. - Wenbing Zhao, P. M. Melliar-Smith, Louise E. Moser:
The Low Latency Fault Tolerance System. - Dakshina Ranjan Kisku, Phalguni Gupta, Jamuna Kanta Sing:
Feature Level Fusion of Face and Palmprint Biometrics by Isomorphic Graph-based Improved K-Medoids Partitioning. - Phalguni Gupta, Dakshina Ranjan Kisku, Jamuna Kanta Sing, Massimo Tistarelli:
Maximized Posteriori Attributes Selection from Facial Salient Landmarks for Face Recognition. - David Pritchard:
k-Edge-Connectivity: Approximation and LP Relaxation. - Itzhak Tamo, Moshe Schwartz:
On the Size of Optimal Anticodes over Permutations with the Infinity Norm. - Udayan B. Darji, Steve W. Seif:
A note on decidability of cellularity. - Chad E. Brown, Gert Smolka:
Analytic Tableaux for Simple Type Theory and its First-Order Fragment. - Yuval Lomnitz, Meir Feder:
An Achievable Rate for the MIMO Individual Channel. - Gregory Z. Gutin, Leo van Iersel, Matthias Mnich, Anders Yeo:
All Ternary Permutation Constraint Satisfaction Problems Parameterized Above Average Have Polynomial Kernels. - Dario García-García, Emilio Parrado-Hernández, Fernando Díaz-de-María:
State-Space Dynamics Distance for Clustering Sequential Data. - P. Chakrabarti:
Predictive Gain Estimation - A mathematical analysis. - Daohang Sha, Vladimir B. Bajic:
An optimized recursive learning algorithm for three-layer feedforward neural networks for mimo nonlinear system identifications. - Bernat Corominas-Murtra, Jordi Fortuny Andreu, Ricard V. Solé:
Coding and decoding in the Evolution of communication: Information richness and Referentiality. - Norbert Bátfai:
The Socceral Force. - Ameet Talwalkar, Afshin Rostamizadeh:
Matrix Coherence and the Nystrom Method. - Mohammad Gheshlaghi Azar, Hilbert J. Kappen:
Dynamic Policy Programming. - Vincenzo Bonifaci, Alberto Marchetti-Spaccamela:
Feasibility Analysis of Sporadic Real-Time Multiprocessor Task Systems. - Yashodhan Kanoria, Mohsen Bayati, Christian Borgs, Jennifer T. Chayes, Andrea Montanari:
Fast Convergence of Natural Bargaining Dynamics in Exchange Networks. - Yao Sun, Xiaodong Ma, Dingkang Wang:
On Computing Groebner Basis in the Rings of Differential Operators. - Richard P. Brent, Paul Zimmermann:
An O(M(n) log n) algorithm for the Jacobi symbol. - Jubin Jose, Sriram Vishwanath:
Sum Capacity of K User Gaussian Unit Rank Interference Channels. - Natarajan Lakshmi Prasad, B. Sundar Rajan:
A New Full-diversity Criterion and Low-complexity STBCs with Partial Interference Cancellation Decoding. - Mamta Juneja, Parvinder Singh Sandhu:
Improved information security using robust Steganography system. - Ahmad Kamran Malik, Muhammad Abdul Qadir, Nadeem Iftikhar, Muhammad Usman:
Constraint-based Query Distribution Framework for an Integrated Global Schema. - Iddo Tzameret:
Algebraic Proofs over Noncommutative Formulas. - Xavier Morselli, Marie-Laure Potet, Nicolas Stouls:
GénéSyst : Génération d'un système de transitions étiquetées à partir d'une spécification B événementiel. - Xiaofei Huang:
Equilibrium Point in Quantum Physics and its Inspiration to Game Theory. - Jacek Gwizdka:
What a Difference a Tag Cloud Makes: Effects of Tasks and Cognitive Abilities on Search Results Interface Use. - Anmer Daskin, Sabre Kais:
Group Leaders Optimization Algorithm. - John Robert Burger:
XOR at a Single Vertex -- Artificial Dendrites. - Ashish Goel, Ian Post:
One Tree Suffices: A Simultaneous O(1)-Approximation for Single-Sink Buy-at-Bulk. - Lawrence Ong, Sarah J. Johnson, Christopher M. Kellett:
An Optimal Coding Strategy for the Binary Multi-Way Relay Channel. - Lawrence Ong, Christopher M. Kellett, Sarah J. Johnson:
Capacity Theorems for the AWGN Multi-Way Relay Channel. - Lawrence Ong, Sarah J. Johnson, Christopher M. Kellett:
The Binary-Symmetric Parallel-Relay Network. - David Isaac Wolinsky, Pierre St. Juste, P. Oscar Boykin, Renato J. O. Figueiredo:
Addressing the P2P Bootstrap Problem for Small Networks. - Sumio Watanabe:
Asymptotic Equivalence of Bayes Cross Validation and Widely Applicable Information Criterion in Singular Learning Theory. - Guowei Wu, Chi Lin, Feng Xia, Lin Yao, He Zhang, Bing Liu:
Dynamical Jumping Real-Time Fault-Tolerant Routing Protocol for Wireless Sensor Networks. - Chun-Cheng Lin, Hsu-Chun Yen, Sheung-Hung Poon, Jia-Hao Fan:
Complexity Analysis of Balloon Drawing for Rooted Trees. - Nicolas Gast, Bruno Gaujal, Jean-Yves Le Boudec:
Mean field for Markov Decision Processes: from Discrete to Continuous Optimization. - Xavier Pessoles, Yann Landon, Walter Rubio:
Kinematic modelling of a 3-axis NC machine tool in linear and circular interpolation. - Daoshun Wang, Lin Dong, Xiaobo Li:
Towards Shift Tolerant Visual Secret Sharing Schemes. - Krishnendu Chatterjee, Thomas A. Henzinger, Barbara Jobstmann, Arjun Radhakrishna:
GIST: A Solver for Probabilistic Games. - Geert Jan Bex, Wouter Gelade, Frank Neven, Stijn Vansummeren:
Learning Deterministic Regular Expressions for the Inference of Schemas from XML Data. - Qianxue Wang, Christophe Guyeux, Jacques M. Bahi:
A novel pseudo-random number generator based on discrete chaotic iterations. - Øyvind Ryan:
On the optimal stacking of noisy observations. - John Augustine, Nick Gravin:
On the Continuous CNN Problem. - Vishwambhar Rathi, Erik Aurell, Lars K. Rasmussen, Mikael Skoglund:
Bounds on Thresholds Related to Maximum Satisfiability of Regular Random Formulas. - Zoltán Ésik, Andreas Maletti:
Simulation vs. Equivalence. - Deniz Gündüz, Aylin Yener, Andrea J. Goldsmith, H. Vincent Poor:
The Multi-way Relay Channel. - Evgeny Chutchev:
Some Mathematicians Are Not Turing Machines. - Jeremy Faden, Robert S. Weigel, Jan Merka, Reiner H. W. Friedel:
Autoplot: A browser for scientific data on the web. - An Liu, Youjian Liu, Haige Xiang, Wu Luo:
Duality, Polite Water-filling, and Optimization for MIMO B-MAC Interference Networks and iTree Networks. - Paul L. Williams, Randall D. Beer:
Nonnegative Decomposition of Multivariate Information. - Sreekanth Malladi:
How to prevent type-flaw and multi-protocol attacks on security protocols under Exclusive-OR. - Youngwook Ko, Sergiy A. Vorobyov, Masoud Ardakani:
How Much Multiuser Diversity is Required for Energy Limited Multiuser Systems? - A. H. Hunter, Nicholas Pippenger:
Local versus Global Search in Channel Graphs. - Zhifeng Luo, Zhu Han, Albert Kai-Sun Wong, Shuisheng Qiu:
Relay-Assisted Partial Packet Recovery with IDMA Method in CDMA Wireless Network. - Franck Cassez:
The Complexity of Codiagnosability for Discrete Event and Timed Systems. - Kamaljit I. Lakhtaria, Paresh Patel, Ankita Gandhi:
Enhancing Curriculum Acceptance among Students with E-learning 2.0. - Ning Chen, Xiaotie Deng, Arpita Ghosh:
Competitive Equilibria in Matching Markets with Budgets. - Reza Khosravi-Farsani, Bahareh Akhbari, Mohammad Reza Aref:
Achievable Rate Regions for Dirty Tape Channels and "Joint Writing on Dirty Paper and Dirty Tape". - Marijn Heule, Toby Walsh:
Symmetry within Solutions. - Christian Bessiere, George Katsirelos, Nina Narodytska, Claude-Guy Quimper, Toby Walsh:
Propagating Conjunctions of AllDifferent Constraints. - Lorenzo Cappellari:
Lossy Source Compression of Non-Uniform Binary Sources Using GQ-LDGM Codes. - Karine Altisen, Yanhong Liu, Matthieu Moy:
Performance Evaluation of Components Using a Granularity-based Interface Between Real-Time Calculus and Timed Automata. - Mathieu Chapelle:
Parameterized Complexity of Generalized Domination Problems on Bounded Tree-Width Graphs. - Chao Tian, Jun Chen, Suhas N. Diggavi, Shlomo Shamai:
Optimality and Approximate Optimality of Source-Channel Separation in Networks. - Laszlo B. Kish, Sunil P. Khatri, Ferdinand Peper:
Instantaneous noise-based logic. - Sergey Loyka, François Gagnon, Victoria Kostina:
Error Rates of Capacity-Achieving Codes Are Convex. - Krishnendu Chatterjee, Vishwanath Raman:
Assume-Guarantee Synthesis for Digital Contract Signing. - Lutz Schröder, Yde Venema:
Flat coalgebraic fixed point logics. - Martin Klein, Jeffery L. Shipman, Michael L. Nelson:
Is This a Good Title? - Péter L. Erdös, Lajos Soukup, Jens Stoye:
Balanced Vertices in Trees and a Simpler Algorithm to Compute the Genomic Distance. - João Luiz Rebelatto, Bartolomeu F. Uchôa Filho, Yonghui Li, Branka Vucetic:
Multi-User Cooperative Diversity through Network Coding Based on Classical Coding Theory. - Franck Cassez:
A Note on Fault Diagnosis Algorithms. - Alfons Laarman, Jaco van de Pol, Michael Weber:
Boosting Multi-Core Reachability Performance with Shared Hash Tables. - Long Shi, Wei Zhang, Xiang-Gen Xia:
High-Rate and Full-Diversity Space-Time Block Codes with Low Complexity Partial Interference Cancellation Group Decoding. - Thibaut Balabonski, Emmanuel Haucourt:
A Geometric Approach to the Problem of Unique Decomposition of Processes. - Romar dela Cruz, Patrick Solé:
An extension of Massey scheme for secret sharing. - Pierre Chambart, Alain Finkel, Sylvain Schmitz:
Forward Analysis and Model Checking for Bounded WSTS. - Franck Cassez, Stavros Tripakis:
Fault Diagnosis with Dynamic Observers. - Eric Goubault, Samuel Mimram:
Formal Relationships Between Geometrical and Classical Models for Concurrency. - Mong-Jen Kao, Han-Lin Chen:
Approximation Algorithms for the Capacitated Domination Problem. - G. R. Jithamithra, B. Sundar Rajan:
A Quadratic Form Approach to ML Decoding Complexity of STBCs. - Jamie Twycross, Uwe Aickelin:
Experimenting with Innate Immunity. - Yousof Al-Hammadi, Uwe Aickelin:
Behavioural Correlation for Detecting P2P Bots. - Uwe Aickelin:
Nurse Rostering with Genetic Algorithms. - Marcello M. Bersani, Luca Cavallaro, Achille Frigeri, Matteo Pradella, Matteo Rossi:
SMT-based Verification of LTL Specifications with Integer Constraints and its Application to Runtime Checking of Service Substitutability. - Nicola Di Mauro, Teresa Maria Altomare Basile, Stefano Ferilli, Floriana Esposito:
GRASP for the Coalition Structure Formation Problem. - Carlos Palazuelos, David Pérez-García, Ignacio Villanueva:
The communication complexity of XOR games via summing operators. - Ranjit Jhala, Rupak Majumdar, Andrey Rybalchenko:
Refinement type inference via abstract interpretation. - Kobbi Nissim, Rann Smorodinsky, Moshe Tennenholtz:
Approximately Optimal Mechanism Design via Differential Privacy. - Neil A. Ernst, Steve M. Easterbrook, John Mylopoulos:
Code forking in open-source software: a requirements perspective. - Adam Kasperski, Pawel Zielinski:
On the approximability of robust spanning tree problems. - Graham Cormode, Michael Mitzenmacher, Justin Thaler:
Streaming Graph Computations with a Helpful Advisor. - Pavol Hell, Arash Rafiey:
The Dichotomy of List Homomorphisms for Digraphs. - A. Robert Calderbank, Stephen D. Howard, Sina Jafarpour:
Sparse Reconstruction via The Reed-Muller Sieve. - John Joseph Horton, David G. Rand, Richard J. Zeckhauser:
The Online Laboratory: Conducting Experiments in a Real Labor Market. - Jian Li, Ke Yi, Qin Zhang:
Clustering with diversity. - Marek Cygan, Marcin Pilipczuk, Michal Pilipczuk, Jakub Onufry Wojtaszczyk:
Subset feedback vertex set is fixed parameter tractable. - Saumay Pushp, Priya Ranjan:
Hybrid CDN structure with a P2P based streaming protocol. - Yann Strozecki:
Enumeration of the Monomials of a Polynomial and Related Complexity Classes. - Shaoquan Jiang:
Persistent Asymmetric Password-Based Key Exchange. - Yannis Kopsinis, Konstantinos Slavakis, Sergios Theodoridis:
Online Sparse System Identification and Signal Reconstruction using Projections onto Weighted ℓ1 Balls. - Fabrizio Grandoni, Thomas Rothvoß:
Prizing on Paths: A PTAS for the Highway Problem. - Henry Corrigan-Gibbs, Bryan Ford:
Accountable Anonymous Group Messaging. - Kiryung Lee, Yoram Bresler:
iMUSIC: Iterative MUSIC Algorithm for Joint Sparse Recovery with Any Rank. - Shigeaki Kuzuoka, Akisato Kimura, Tomohiko Uyematsu:
Universal Coding of Ergodic Sources for Multiple Decoders with Side Information. - Richard P. Brent:
Fast normal random number generators on vector processors. - Richard P. Brent:
Uses of randomness in computation. - Yue Wang:
Applying Stochastic Network Calculus to 802.11 Backlog and Delay Analysis. - Richard P. Brent:
A fast vectorised implementation of Wallace's normal random number generator. - Richard P. Brent:
Some long-period random number generators using shifts and xors. - Samuel Mimram:
Focusing in Asynchronous Games. - Samuel Mimram:
Computing Critical Pairs in 2-Dimensional Rewriting Systems. - Uwe Aickelin:
Genetic Algorithms for Multiple-Choice Problems. - Waleed Ammar, Ahmed Eldawy, Moustafa Youssef:
Secure Localization in Wireless Sensor Networks: A Survey. - Rahul Jain, Ashwin Nayak:
The space complexity of recognizing well-parenthesized expressions. - Richard P. Brent:
MP users guide. - Moustafa Youssef, Mohamed Amir Yosef, Mohamed N. El-Derini:
GAC: Energy-Efficient Hybrid GPS-Accelerometer-Compass GSM Localization. - Mohamed Ibrahim, Moustafa Youssef:
CellSense: A Probabilistic RSSI-based GSM Positioning System. - (Withdrawn) Statistical Physics for Natural Language Processing.
- Julie Greensmith, Uwe Aickelin, Steve Cayzer:
Introducing Dendritic Cells as a Novel Immune-Inspired Algorithm for Anomoly Detection. - Aaron Roth:
Differential Privacy and the Fat-Shattering Dimension of Linear Queries. - Giorgi Japaridze:
Introduction to clarithmetic II. - James Cheney:
Causality and the semantics of provenance. - Jörg Olschewski, Michael Ummels:
The Complexity of Finding Reset Words in Finite Automata. - Zaenal Akbar:
Watermarking Java Programs using Dummy Methods with Dynamically Opaque Predicates. - Laura C. De Giusti, Franco Chichizola, Marcelo R. Naiouf, Armando De Giusti, Emilio Luque:
Automatic Mapping Tasks to Cores - Evaluating AMTHA Algorithm in Multicore Architectures. - Fatima-Zahra Belouadha, Hajar Omrana, Ounsa Roudiès:
A model-driven approach for composing SAWSDL semantic Web services. - Rahul Kala, Harsh Vazirani, Anupam Shukla, Ritu Tiwari:
Offline Handwriting Recognition using Genetic Algorithm. - Amir Mosavi:
Multiple Criteria Decision-Making Preprocessing Using Data Mining Tools. - Rosmayati Mohemad, Abdul Razak Hamdan, Zulaiha Ali Othman, Noor Maizura Mohamad Noor:
Decision Support Systems (DSS) in Construction Tendering Processes. - N. Rama, Meenakshi Lakshmanan:
A Computational Algorithm for Metrical Classification of Verse. - Aissam Berrahou, Mourad Rafi, Mohsine Eleuldj:
DRMS Co-design by F4MS. - Nikhil Raj, R. K. Sharma:
Modelling of Human Glottis in VLSI for Low Power Architectures. - Ramazan Havangi, Mohammad Ali Nekoui, Mohammad Teshnehlab:
Adaptive Neuro-Fuzzy Extended Kalman Filtering for Robot Localization. - Amir Mollanejad, Leili Mohammad Khanli, Mohammad Zeynali:
DBSR: Dynamic base station Repositioning using Genetic algorithm in wireless sensor network. - Vishal Sharma, Harsh Kumar Verma:
Optimized Fuzzy Logic Based Framework for Effort Estimation in Software Development. - Antonio Cimino, Francesco Longo, Giovanni Mirabelli:
A General Simulation Framework for Supply Chain Modeling: State of the Art and Case Study. - Nattapon Pannurat, Nittaya Kerdprasop, Kittisak Kerdprasop:
Database Reverse Engineering based on Association Rule Mining. - Chinmay Hegde, Richard G. Baraniuk:
Sampling and Recovery of Pulse Streams. - Kamal Sarkar, Mita Nasipuri, Suranjan Ghose:
A New Approach to Keyphrase Extraction Using Neural Networks. - Kruti Dangarwala, Jigar Shah:
C Implementation & comparison of companding & silence audio compression techniques. - Gajanan K. Kharate, Varsha H. Patil:
Color Image Compression Based On Wavelet Packet Best Tree. - Ezekiel Okike:
A Pedagogical Evaluation and Discussion about the Lack of Cohesion in Method (LCOM) Metric Using Field Experiment. - Hakan Topakkaya, Zhengdao Wang:
Wireless Network Code Design and Performance Analysis using Diversity-Multiplexing Tradeoff. - Amit Chakrabarti, Graham Cormode, Ranganath Kondapally, Andrew McGregor:
Information Cost Tradeoffs for Augmented Index and Streaming Language Recognition. - Christoph Koutschan:
A Fast Approach to Creative Telescoping. - Matt Gibson, Imran A. Pirwani:
Approximation Algorithms for Dominating Set in Disk Graphs. - (Withdrawn) An Efficient Hybrid Data Gathering Scheme in Wireless Sensor Networks.
- Dongning Guo, Yihong Wu, Shlomo Shamai, Sergio Verdú:
Estimation in Gaussian Noise: Properties of the Minimum Mean-Square Error. - Kamran Karimi, Howard J. Hamilton:
Generation and Interpretation of Temporal Decision Rules. - Xiaolin Shi, Jure Leskovec, Daniel A. McFarland:
Citing for High Impact. - Jittat Fakcharoenphol, Bundit Laekhanukit, Danupon Nanongkai:
Faster Algorithms for Semi-Matching Problems. - Florian Boudin, Juan-Manuel Torres-Moreno, Marc El-Bèze:
Improving Update Summarization by Revisiting the MMR Criterion. - Christian Senger, Vladimir Sidorenko, Steffen Schober, Victor V. Zyablov:
Adaptive Single-Trial Error/Erasure Decoding for Binary Codes. - Richard P. Brent:
On the precision attainable with various floating-point number systems. - (Withdrawn) Polynomial Bounds on the Rectangle Slicing Number.
- Catalin David, Michael Kohlhase, Christoph Lange, Florian Rabe, Nikita Zhiltsov, Vyacheslav Zholudev:
Publishing Math Lecture Notes as Linked Data. - Siamak Tazari:
Faster Approximation Schemes and Parameterized Algorithms on H-Minor-Free and Odd-Minor-Free Graphs. - Ioannis Chatzigiannakis, Othon Michail, Stavros Nikolaou, Andreas Pavlogiannis, Paul G. Spirakis:
Passively Mobile Communicating Logarithmic Space Machines. - Gábor Erdélyi, Lena Piras, Jörg Rothe:
Control Complexity in Fallback Voting. - (Withdrawn) An Optimized Lifetime Enhancement Scheme for Data Gathering in Wireless Sensor Networks.
- (Withdrawn) An Energy Efficient Scheme for Data Gathering in Wireless Sensor Networks Using Particle Swarm Optimization.
- Richard P. Brent:
Multiple-precision zero-finding methods and the complexity of elementary function evaluation. - Chandra Nair, Abbas El Gamal, Yeow-Khiang Chia:
An Achievability Scheme for the Compound Channel with State Noncausally Available at the Encoder. - Mugurel Ionut Andreica, Vasile Deac, Stelian Tipa:
Towards Providing Low-Risk and Economically Feasible Network Data Transfer Services. - Laurent Boyer, Guillaume Theyssier:
On Factor Universality in Symbolic Spaces. - Feng Gu, Julie Greensmith, Robert F. Oates, Uwe Aickelin:
PCA 4 DCA: The Application Of Principal Component Analysis To The Dendritic Cell Algorithm. - Carlos M. Lorenzetti, Ana Gabriela Maguitman:
Learning Better Context Characterizations: An Intelligent Information Retrieval Approach. - Jyh-Yang Wu, Mei-Hsiu Chi, Sheng-Gwo Chen:
Convergent discrete Laplace-Beltrami operators over surfaces. - Arpita Patra, C. Pandu Rangan:
Communication and Round Efficient Information Checking Protocol. - Felix Krahmer, Rachel A. Ward:
Lower bounds for the error decay incurred by coarse quantization schemes. - Mohsen Toorani, Ali Asghar Beheshti Shirazi:
Cryptanalysis of an Elliptic Curve-based Signcryption Scheme. - Victor M. Preciado, Alireza Tahbaz-Salehi, Ali Jadbabaie:
On Asymptotic Consensus Value in Directed Random Networks. - Reza Rabieyan:
Propose a Fuzzy Queuing Maximal Benefit Location Problem. - Jure Leskovec, Kevin J. Lang, Michael W. Mahoney:
Empirical Comparison of Algorithms for Network Community Detection. - Bassam Al-Mahadeen, Mokhled S. AlTarawneh, Islam H. AlTarawneh:
Signature Region of Interest using Auto cropping. - Sukhvinder S. Bamber, Ajay K. Sharma:
Comparative Performance Investigations of different scenarios for 802.15.4 WPAN. - Mohsen Gerami:
Policies and Economics of Digital Multimedia Transmission. - Eva Volná:
Neuroevolutionary optimization. - Angel Vassilev Nikolov, Lerato Lerato:
Comparison of the Performance of Two Service Disciplines for a Shared Bus Multiprocessor with Private Caches. - H. S. Ramesh Babu, Gowrishankar, P. S. Satyanarayana:
A QoS Provisioning Recurrent Neural Network based Call Admission Control for beyond 3G Networks. - P. Velvadivu, K. Duraisamy:
An Optimized Weighted Association Rule Mining On Dynamic Content. - G. Murugesan, C. Chellappan:
An Economic-based Resource Management and Scheduling for Grid Computing Applications. - Vikram Singh, Sapna Nagpal:
Integrating User's Domain Knowledge with Association Rule Mining. - Vikas Gupta, K. S. Kasana, Puneet Tandon:
Computer Aided Design Modeling for Heterogeneous Objects. - Loet Leydesdorff, Tobias Opthof:
Scopus's Source Normalized Impact per Paper (SNIP) versus a Journal Impact Factor based on Fractional Counting of Citations. - Richard P. Brent:
The complexity of multiple-precision arithmetic. - Qingshuo Song, Guanrong Chen, Daniel W. C. Ho:
Consensus over a Random Network Generated by i.i.d. Stochastic Matrices. - Yuya Inagaki, Jun-ichi Inoue:
Simultaneous Bayesian inference of motion velocity fields and probabilistic models in successive video-frames described by spatio-temporal MRFs. - Moshe Babaioff, Robert D. Kleinberg, Aleksandrs Slivkins:
Truthful Mechanisms with Implicit Payment Computation. - Tomás Masopust:
Comparison of Two Context-Free Rewriting Systems with Simple Context-Checking Mechanisms. - Arvind W. Kiwelekar, Rushikesh K. Joshi:
An Object-Oriented Metamodel for Bunge-Wand-Weber Ontology. - Christine Tasson, Lionel Vaux:
Transport of finiteness structures and applications. - Gábor Erdélyi, Michael R. Fellows:
Parameterized Control Complexity in Fallback Voting. - Viet Hung Nguyen:
Approximating the minimum directed tree cover. - Patrick Meumeu Yomsi, Vincent Nélis, Joël Goossens:
Scheduling Multi-Mode Real-Time Systems upon Uniform Multiprocessor Platforms. - Lizhi Du:
A Polynomial Time Algorithm for Hamilton Cycle and Its Proof. - Yongnan Ji, Pierre-Yves Hervé, Uwe Aickelin, Alain Pitiot:
Parcellation of fMRI Datasets with ICA and PLS-A Data Driven Approach. - Yuxin Chen, Jeffrey G. Andrews:
An Upper Bound on Multi-hop Transmission Capacity with Dynamic Multipath Routing. - Irina Iulia Lupu, Pierre Courbin, Laurent George, Joël Goossens:
Multi-Criteria Evaluation of Partitioning Schemes for Real-Time Systems. - Richard P. Brent, Franklin T. Luk, H. T. Kung:
Some linear-time algorithms for systolic arrays. - Brice Boyer, Jean-Guillaume Dumas, Pascal Giorgi:
Exact Sparse Matrix-Vector Multiplication on GPU's and Multicore Architectures. - Manabu Kitagata, Jun-ichi Inoue:
A Gibbs distribution that learns from GA dynamics. - Zi-Ke Zhang, Chuang Liu, Yi-Cheng Zhang, Tao Zhou:
Solving the Cold-Start Problem in Recommender Systems with Social Tags. - Shrinivas Kudekar, Cyril Measson, Thomas J. Richardson, Rüdiger L. Urbanke:
Threshold Saturation on BMS Channels via Spatial Coupling. - Mahmoud Ibrahim Moussa:
An Algorithm for Odd Graceful Labeling of the Union of Paths and Cycles. - Veniamin I. Morgenshtern, Giuseppe Durisi, Helmut Bölcskei:
The SIMO Pre-Log Can Be Larger Than the SISO Pre-Log. - Subhash C. Kak:
Pythagorean Triples and Cryptographic Coding. - Alain Couvreur:
Incidence structures from the blown up plane and LDPC codes. - Per Austrin:
Improved Inapproximability For Submodular Maximization. - Ping Li:
On Practical Algorithms for Entropy Estimation and the Improved Sample Complexity of Compressed Counting. - James S. Wolper:
Information Theory and Quadrature Rules. - Liangbin Li, Yindi Jing, Hamid Jafarkhani:
Interference Cancellation in Multi-Access Wireless Relay Networks. - Chris Hawblitzel, Erez Petrank:
Automated Verification of Practical Garbage Collectors. - Khaled M. Khalil, M. Abdel-Aziz, Taymour T. Nazmy, Abdel-Badeeh M. Salem:
Artificial Immune Systems Metaphor for Agent Based Modeling of Crisis Response Operations. - Jeremiah Blocki, Ryan Williams:
Resolving the Complexity of Some Data Privacy Problems. - Mithun Das Gupta, Thomas S. Huang:
Bregman Distance to L1 Regularized Logistic Regression. - Francesco Biscani, Dario Izzo, Chit Hong Yam:
A Global Optimisation Toolbox for Massively Parallel Engineering Optimisation. - Ali Al-Bashabsheh, Yongyi Mao:
Valiant Transform of Forney Graphs. - Manuel Bodirsky, Víctor Dalmau, Barnaby Martin, Michael Pinsker:
Distance Constraint Satisfaction Problems. - Patrick Kuppinger, Giuseppe Durisi, Helmut Bölcskei:
Where is Randomness Needed to Break the Square-Root Bottleneck? - William O. Wilson, Phil Birkin, Uwe Aickelin:
Oil Price Trackers Inspired by Immune Memory. - William O. Wilson, Phil Birkin, Uwe Aickelin:
Motif Detection Inspired by Immune Memory. - Sana Ullah, Bin Shen, S. M. Riazul Islam, Pervez Khan, Shahnaz Saleem, Kyung Sup Kwak:
A Study of Medium Access Control Protocols for Wireless Body Area Networks. - Yousof Al-Hammadi, Uwe Aickelin, Julie Greensmith:
Performance Evaluation of DCA and SRC on a Single Bot Detection. - Simon M. Garrett, Martin Robbins, Joanne H. Walker, William O. Wilson, Uwe Aickelin:
Modelling Immunological Memory. - William O. Wilson, Phil Birkin, Uwe Aickelin:
Price Trackers Inspired by Immune Memory. - Mehdi Karimi, Amir H. Banihashemi:
A Message-Passing Algorithm for Counting Short Cycles in a Graph. - Mithun Das Gupta:
Hashing Image Patches for Zooming. - David Doty:
An Oracle Strongly Separating Deterministic Time from Nondeterministic Time, via Kolmogorov Complexity. - Markus N. Rabe, Sven Schewe:
Finite Optimal Control for Time-Bounded Reachability in CTMDPs and Continuous-Time Markov Games. - Venkatesan Guruswami, Adam D. Smith:
Codes for Computationally Simple Channels: Explicit Constructions with Optimal Rate. - Gottfried Lechner, Troels Pedersen, Gerhard Kramer:
Analysis and Design of Binary Message-Passing Decoders. - Paul Lesov:
Database Security: A Historical Perspective. - Vitaly Osipov, Peter Sanders:
n-Level Graph Partitioning. - Grenville J. Croll:
Computers and the Conservation of Energy. - Subhojit Som, Lee C. Potter:
Sparsity Pattern Recovery in Bernoulli-Gaussian Signal Model. - Amit Deshpande, Luis Rademacher:
Efficient volume sampling for row/column subset selection. - Olivier Delmas, Sylvain Gravier, Mickaël Montassier, Aline Parreau:
On two variations of identifying codes. - Jay Cheng, Cheng-Shang Chang, Sheng-Hua Yang, Tsz-Hsuan Chao, Duan-Shin Lee, Ching-Ming Lien:
Constructions of Optical Queues With a Limited Number of Recirculations--Part I: Greedy Constructions. - Jean-Claude Belfiore, Frédérique E. Oggier:
Secrecy Gain: a Wiretap Lattice Code Design. - Ramesh Hariharan, Debmalya Panigrahi:
A General Framework for Graph Sparsification. - Gianni Tedesco, Uwe Aickelin:
Real-Time Alert Correlation with Type Graphs. - Jan Feyereisl, Uwe Aickelin:
STORM - A Novel Information Fusion and Cluster Interpretation Technique. - Pavel Ruzankin:
Operator-oriented programming: a new paradigm for implementing window interfaces and parallel algorithms. - Emanuel Gluskin:
An approximate analytical (structural) superposition in terms of two, or more, "alfa"-circuits of the same topology: Pt.1 - description of the superposition. - (Withdrawn) Simulation of Wireless Sensor Networks Using TinyOS- A case Study.
- Glyn Morrill, Oriol Valentín:
Displacement Calculus. - Sudheer Vakati, David Fernández-Baca:
Graph Triangulations and the Compatibility of Unrooted Phylogenetic Trees. - Alan P. Sexton, Richard Swinbank:
Symmetric M-tree. - Gongguo Tang, Arye Nehorai:
The ℓ1-Constrained Minimal Singular Value: a Computable Quantification of the Stability of Sparse Signal Reconstruction. - Ankur Moitra, Gregory Valiant:
Settling the Polynomial Learnability of Mixtures of Gaussians. - Alan M. Frieze, Gregory B. Sorkin:
Average case performance of heuristics for multi-dimensional assignment problems. - Anirban Dasgupta, Ravi Kumar, Tamás Sarlós:
A Sparse Johnson--Lindenstrauss Transform. - Shabnam Sodagari, Peyman Hesami, Alireza Nasiri Avanaki:
Error Concealment in Image Communication Using Edge Map Watermarking and Spatial Smoothing. - Irina B. Semenova:
Intelligent Technologies in Model Base Management System Design Automation. - Xuan-Chao Huang, Jay Cheng:
Constructions of Optical Queues With a Limited Number of Recirculations--Part II: Optimal Constructions. - Tomás Brázdil, Javier Esparza, Stefan Kiefer, Michael Luttenberger:
Space-efficient scheduling of stochastically generated tasks. - Charles L. Cartledge, Michael L. Nelson:
Analysis of Graphs for Digital Preservation Suitability. - Pengkai Zhao Babak Daneshrad:
Bounds on the Maximum Number of Concurrent Links in MIMO Ad Hoc Networks with QoS Constraints. - Viveck R. Cadambe, Syed Ali Jafar, Hamed Maleki:
Distributed Data Storage with Minimum Storage Regenerating Codes - Exact and Functional Repair are Asymptotically Equally Efficient. - Omid Taheri, Sergiy A. Vorobyov:
Segmented compressed sampling for analog-to-information conversion: Method and performance analysis. - MohammadHossein Bateni, MohammadTaghi Hajiaghayi, Nicole Immorlica, Hamid Mahini:
The cooperative game theory foundations of network bargaining games. - Udayan Kumar, Gautam S. Thakur, Ahmed Helmy:
PROTECT: Proximity-based Trust-advisor using Encounters for Mobile Societies. - Joseph Shtok, Michael Elad:
Analysis of Basis Pursuit Via Capacity Sets. - Hadi Ahmadi, Reihaneh Safavi-Naini:
New Results on Secret Key Establishment over a Pair of Broadcast Channels. - Martin Slota, João Leite:
Towards Closed World Reasoning in Dynamic Open Worlds (Extended Version). - Gautam S. Thakur, Mukul Sharma, Ahmed Helmy:
SHIELD: Social sensing and Help In Emergency using mobiLe Devices. - Kenton Born:
Browser-Based Covert Data Exfiltration. - Kenton Born, David Gustafson:
Detecting DNS Tunnels Using Character Frequency Analysis. - Kenton Born, David Gustafson:
NgViz: Detecting DNS Tunnels through N-Gram Visualization and Quantitative Analysis. - Joseph Shtok, Michael Zibulevsky, Michael Elad:
Spatially-Adaptive Reconstruction in Computed Tomography Based on Statistical Learning. - Erik D. Demaine, Matthew J. Patitz, Robert T. Schweller, Scott M. Summers:
Self-Assembly of Arbitrary Shapes with RNA and DNA tiles (extended abstract). - Jong Min Kim, Ok Kyun Lee, Jong Chul Ye:
Compressive MUSIC: A Missing Link Between Compressive Sensing and Array Signal Processing. - Eric Angel, Evripidis Bampis, Gerasimos G. Pollatos, Vassilis Zissimopoulos:
Optimal Data Placement on Networks With Constant Number of Clients. - Nicolò Cesa-Bianchi, Shai Shalev-Shwartz, Ohad Shamir:
Efficient Learning with Partially Observed Attributes. - Emanuel Gluskin:
An approximate analytical (structural) superposition in terms of two, or more, "alfa"-circuits of the same topology: Pt. 2 - the "internal circuit mechanism". - Jan Treibig, Georg Hager, Gerhard Wellein:
LIKWID: A lightweight performance-oriented tool suite for x86 multicore environments. - Rahul Vaze:
Throughput-Delay-Reliability Tradeoff with ARQ in Wireless Ad Hoc Networks. - Sungwook Moon, Ahmed Helmy:
Understanding periodicity and regularity of nodal encounters in mobile networks: A spectral analysis. - Alexandros G. Dimakis, Kannan Ramchandran, Yunnan Wu, Changho Suh:
A Survey on Network Codes for Distributed Storage. - H. S. Ramesh Babu, Gowrishankar, P. S. Satyanarayana:
An Intelligent Call Admission Control Decision Mechanism for Wireless Networks. - Sozan Abdulla:
New Visual Cryptography Algorithm For Colored Image. - Syed Wajahat Abbas Rizvi, R. A. Khan:
Maintainability Estimation Model for Object-Oriented Software in Design Phase (MEMOOD). - Salem Saleh Al-amri, Namdeo V. Kalyankar, Santosh D. Khamitkar:
Deblured Gaussian Blurred Images. - Ahmed Hamza Osman, Naomie Salim, Mohammed Salem Binwahlan:
Plagiarism Detection Using Graph-Based Representation. - Yee Ming Chen:
Improving Supply Chain Coordination by Linking Dynamic Procurement Decision to Multi-Agent System. - Cherif Foudil, Rabiaa Chighoub:
Crowd simulation influenced by agent's socio-psychological state. - Ibrahim A. Albidewi, Yap Teck Ann:
Combination of Subtractive Clustering and Radial Basis Function in Speaker Identification. - P. V. Hunagund, A. B. Kalpana:
Crosstalk Noise Modeling for RC and RLC interconnects in Deep Submicron VLSI Circuits. - Anjali Malviya, S. G. Bhirud:
Visual Infrared Video Fusion for Night Vision using Background Estimation. - Sumalatha Ramachandran, Sharon Joseph, Sujaya Paulraj, Vetriselvi Ramaraj:
Handling Overload Conditions In High Performance Trustworthy Information Retrieval Systems. - S. Saraswathi, Asma Siddhiqaa, K. Kalaimagal, M. Kalaiyarasi:
BiLingual Information Retrieval System for English and Tamil. - Mohd Nazir, Raees Ahmad Khan, Khurram Mustafa:
A Metrics Based Model for Understandability Quantification. - S. Saraswathi, Narasimha Sravan V, Sai Vamsi Krishna B. V, Suresh Reddy:
Audio enabled information extraction system for cricket and hockey domains. - Er. Anantdeep, Er. Sandeep Kaur, Er. Balpreet Kaur:
Mobile Zigbee Sensor Networks. - Er. Sandeep Kaur, Er. Anantdeep, Er. Deepak Aggarwal:
Effect of Crosstalk on Permutation in Optical Multistage Interconnection Networks. - Er. Deepak Aggarwal, Er. Sandeep Kaur, Er. Anantdeep:
An Efficient Watermarking Algorithm to Improve Payload and Robustness without Affecting Image Perceptual Quality. - Khawar Hameed, Kamran Ahsan, Weijun Yang:
Mobile Commerce and Applications: An Exploratory Study and Review. - P. Kamakshi, A. Vinaya Babu:
Preserving Privacy and Sharing the Data in Distributed Environment using Cryptographic Technique on Perturbed data. - Anuj Mehra, Anupam Shukla, Mahender Kumawat, Rajiv Ranjan, Ritu Tiwari:
Intelligent System for Speaker Identification using Lip features with PCA and ICA. - S. Ramakrishnan, S. Venugopalan, A. Ebenezer Jeyakumar:
Prediction of Retained Capacity and EODV of Li-ion Batteries in LEO Spacecraft Batteries. - Ravinder Yadav, Rinkle Rani Aggarwal:
Survey and Comparison of Optical Switch Fabrication Techniques and Architectures. - Viresh Patel:
Determining Edge Expansion and Other Connectivity Measures of Graphs of Bounded Genus. - Felix Effenberger, Daniel Weiskopf:
Finding and Classifying Critical Points of 2D Vector Fields: A Cell-Oriented Approach Using Group Theory. - (Withdrawn) Apologizing Comment on 'Quantum Quasi-Cyclic Low-Density Parity-Check codes'.
- Djoerd Hiemstra, Claudia Hauff:
MIREX: MapReduce Information Retrieval Experiments. - Ronit Bustin, Miquel Payaró, Daniel Pérez Palomar, Shlomo Shamai:
On MMSE Properties and I-MMSE Implications in Parallel MIMO Gaussian Channels. - Rami Mochaourab, Eduard A. Jorswieck:
Optimal Beamforming in Interference Networks with Perfect Local Channel Information. - Marco Baldi, Marco Bianchi, Franco Chiaraluce:
Non-Systematic Codes for Physical Layer Security. - Mike E. Davies, Yonina C. Eldar:
Rank Awareness in Joint Sparse Recovery. - Mitsugu Iwamoto, Hiroki Koga, Hirosuke Yamamoto:
Coding Theorems for Cheating-Detectable Secret Sharing Schemes with Two Shares. - Marek Rucinski, Dario Izzo, Francesco Biscani:
On the Impact of the Migration Topology on the Island Model. - Francesco Biscani:
Multiplication of sparse Laurent polynomials and Poisson series on modern hardware architectures. - Hadi Arbabi, Michele C. Weigle:
Highway Mobility and Vehicular Ad-Hoc Networks in NS-3. - Supriya Krishnamurthy, John Ardelius, Erik Aurell, Mads Dam, Rolf Stadler, Fetahi Wuhib:
The Accuracy of Tree-based Counting in Dynamic Networks. - George B. Mertzios, Derek G. Corneil:
A Simple Polynomial Algorithm for the Longest Path Problem on Cocomparability Graphs. - Nafiz Imtiaz Bin Hamid, Md. R. H. Khandokar, Taskin Jamal, Md. A. Shoeb, Md. Zakir Hossain:
In Quest of the Better Mobile Broadband Solution for South Asia Taking WiMAX and LTE into Consideration. - Iwan Adhicandra:
Measuring Data and VoIP Traffic in WiMAX Networks. - Ahmed Jedidi, Mohamed Abid:
Optimal Crosstalk Detection and Localization Method for Optical Time Division Multiplexed Transmission Systems. - Norrozila Sulaiman, Che Yahaya Yaakub:
Investigation on QoS of Campus-wide WiFi Networks. - (Withdrawn) Concatenated Coding for the AWGN Channel with Noisy Feedback.
- Saeed Tavakoli, Mahdieh Zeinadini, Shahram Mohanna:
Modelling and Design of a Microstrip Band-Pass Filter Using Space Mapping Techniques. - G. M. M. Bashir, M. J. Hossain, M. R. Karim:
Clustering of Content Supporting Computer Mediated Courseware Development. - S. M. Aqil Burney, M. Sadiq Ali Khan:
Revealing Method for the Intrusion Detection System. - Lamia Chaari, Lotfi Kamoun:
Wireless sensors networks MAC protocols analysis. - Atri Rudra, Steve Uurtamo:
Data Stream Algorithms for Codeword Testing. - Abdelati Malek Amel, Abdessalem Ben Abdelali, Abdellatif Mtibaa:
Video shot boundary detection using motion activity descriptor. - Heni Kaaniche, Farouk Kamoun:
Mobility Prediction in Wireless Ad Hoc Networks using Neural Networks. - Md. Shamim Reza, Md. Maruf Hossain, Satya Prasad Majumder:
Evaluation of Burst Loss Rate of an Optical Burst Switching (OBS) Network with Wavelength Conversion Capability. - Vitthal J. Gond, Aditya Goel:
Performance Evaluation of Wavelength Routed Optical Network with Wavelength Conversion. - Lamia Chaari, Rim Ayadi, Lotfi Kamoun:
Conception and FPGA implementation of IEEE 802.11s mesh network MAC layer transmitter. - Akitoshi Kawamura:
Lipschitz Continuous Ordinary Differential Equations are Polynomial-Space Complete. - Daniel S. Roche:
Chunky and Equal-Spaced Polynomial Multiplication. - Krzysztof R. Apt, Frank S. de Boer, Ernst-Rüdiger Olderog:
Verification of Object-Oriented Programs: a Transformational Approach. - Changho Suh, Kannan Ramchandran:
On the Existence of Optimal Exact-Repair MDS Codes for Distributed Storage. - Weiping Zhu:
Explicit Maximum Likelihood Loss Estimator in Multicast Tomography. - Eli Gafni, Petr Kuznetsov:
L-Resilient Adversaries and Hitting Sets. - Michael T. Goodrich:
Simulating Parallel Algorithms in the MapReduce Framework with Applications to Parallel Computational Geometry. - Laurent Massoulié:
Adaptive Content Placement for Peer-to-Peer Video-on-Demand Systems. - Richard P. Brent, Paul Zimmermann:
Modern Computer Arithmetic (version 0.5.1). - Kenneth W. Shum, Wing Shing Wong:
Construction of Short Protocol Sequences with Worst-Case Throughput Guarantee. - Woong-Kee Loh, Yang-Sae Moon, Jun-Gyu Kang:
A Data Cleansing Method for Clustering Large-scale Transaction Databases. - Krzysztof R. Apt:
Direct Proofs of Order Independence. - Venkatesan T. Chakaravarthy, Vinayaka Pandit, Yogish Sabharwal:
On the Complexity of the $k$-Anonymization Problem. - Marcin Ostrowski:
Minimum energy required to copy one bit of information. - Martin Josef Geiger:
On the comparison of plans: Proposition of an instability measure for dynamic machine scheduling. - Sudarshan Shinde:
A Design of Paraunitary Polyphase Matrices of Rational Filter Banks Based on (P,Q) Shift-Invariant Systems. - Mikkel Baun Kjærgaard:
Indoor Positioning with Radio Location Fingerprinting. - Nikolay P. Vabishchevich, Petr N. Vabishchevich:
VAGO method for the solution of elliptic second-order boundary value problems. - Roman K. Fedorov:
Logical methods of object recognition on satellite images using spatial constraints. - Henning Thielemann:
Compiling Signal Processing Code embedded in Haskell via LLVM. - Philippe Besnard, Marie-Odile Cordier, Yves Moinard:
Ontology-based inference for causal explanation. - Vadim E. Levit, Eugen Mandrescu:
When G^2 is a Konig-Egervary graph? - François Arnault, Thierry P. Berger, Marine Minier, Benjamin Pousse:
Revisiting LFSMs. - Vincent Lucas, Jean-Jacques Pansiot, Dominique Grad, Benoît Hilt:
Efficient multicast data transfer with congestion control using dynamic source channels. - Emmanuel Abbe, Rethnakaran Pulikkoonattu:
Universal A Posteriori Metrics Game. - Wriddhi Bhowmik, Shweta Srivastava:
Optimum Design of a 4x4 Planar Butler Matrix Array for WLAN Application. - Xueying Hou, Chenyang Yang:
Impact of Channel Asymmetry on Base Station Cooperative Transmission with Limited Feedback. - Md. Shamim Reza, Md. Maruf Hossain, Adnan Ahmed Chowdhury, S. M. Shamim Reza, Md. Moshiur Rahman:
Performance Evaluation of SCM-WDM System Using Different Linecoding. - Marcel Ausloos:
Punctuation effects in English and Esperanto texts. - Mikhail Belkin, Kaushik Sinha:
Polynomial Learning of Distribution Families. - Kun Qiu, Aleksandar Dogandzic:
ECME Thresholding Methods for Sparse Signal Reconstruction. - Natalia Silberstein:
Properties of Codes in the Johnson Scheme. - Yam Ki Cheung, Ovidiu Daescu:
Fréchet Distance Problems in Weighted Regions. - Valérie Chanal, Chris Kimble:
Born to be Wild: Using Communities of Practice as a Tool for Knowledge Management. - Sandeep Katta:
Recursive Information Hiding in Visual Cryptography. - Ashish Goel, Michael Kapralov, Sanjeev Khanna:
Graph Sparsification via Refinement Sampling. - Pablo Piantanida, Shlomo Shamai:
On the Capacity of Compound State-Dependent Channels with States Known at the Transmitter. - Devlin M. Gualtieri:
FauxCrypt - A Method of Text Obfuscation. - Yusuke Watanabe:
Discrete geometric analysis of message passing algorithm on graphs. - Stefano Rini, Daniela Tuninetti, Natasha Devroye:
Outer Bounds for the Interference Channel with a Cognitive Relay. - A. Robert Calderbank, Sina Jafarpour:
Reed Muller Sensing Matrices and the LASSO. - Pascal Koiran:
Shallow Circuits with High-Powered Inputs. - Hsuan-Yi Chu:
On the Achievable Rate Regions for a Class of Cognitive Radio Channels: Interference Channel with Degraded Message Sets with Unidirectional Destination Cooperation. - César Domínguez, Julio Rubio:
Computing in Coq with Infinite Algebraic Data Structures. - Marek Cygan, Marcin Pilipczuk, Michal Pilipczuk, Jakub Onufry Wojtaszczyk:
The stubborn problem is stubborn no more (a polynomial algorithm for 3-compatible colouring and the stubborn list partition problem). - Marek Cygan, Marcin Pilipczuk:
Bandwidth and Distortion Revisited. - Jeffrey D. Blanchard, Coralia Cartis, Jared Tanner:
Compressed Sensing: How sharp is the Restricted Isometry Property. - Franck Butelle, Florent Hivert, Micaela Mayero, Frédéric Toumazet:
Formal Proof of SCHUR Conjugate Function. - Frank Nielsen, Sylvain Boltz:
The Burbea-Rao and Bhattacharyya centroids. - Aaron C. Hurley, Ali Al-Radaideh, Bai Li, Uwe Aickelin, Ron Coxon, Paul Glover, Penny A. Gowland:
Tailored RF pulse optimization for magnetization inversion at ultra high field. - Kfir Gedalyahu, Ronen Tur, Yonina C. Eldar:
Multichannel Sampling of Pulse Streams at the Rate of Innovation. - Andrea Kohlhase, Michael Kohlhase, Christoph Lange:
Dimensions of Formality: A Case Study for MKM in Software Engineering. - Samir Datta, Raghav Kulkarni, Raghunath Tewari, N. V. Vinodchandran:
Space Complexity of Perfect Matching in Bounded Genus Bipartite Graphs. - Saber Jafarizadeh:
Optimal Weights of Certain Branches of an Arbitrary Connected Network for Fastest Distributed Consensus Averaging Problem. - (Withdrawn) Analyzing Random Network Coding with Differential Equations and Differential Inclusions.
- Omar I. Al-Bataineh, Ron van der Meyden:
Epistemic Model Checking for Knowledge-Based Program Implementation: an Application to Anonymous Broadcast. - Alireza Vahid, Amir Salman Avestimehr:
The Two-User Deterministic Interference Channel with Rate-Limited Feedback. - Ali Emre Pusane, Roxana Smarandache, Pascal O. Vontobel, Daniel J. Costello Jr.:
Deriving Good LDPC Convolutional Codes from LDPC Block Codes. - Paul Libbrecht:
Notations Around the World: Census and Exploitation. - Gordon V. Cormack, Mark D. Smucker, Charles L. A. Clarke:
Efficient and Effective Spam Filtering and Re-ranking for Large Web Datasets. - Jaewon Kim, Jonghyun Park:
Analysis of Feedback Overhead for MIMO Beamforming over Time-Varying Channels. - Ilya Safro, Boris Temkin:
Multiscale approach for the network compression-friendly ordering. - Neri Merhav:
Rate-distortion function via minimum mean square error estimation. - Daniil Ryabko:
Clustering processes. - Natalia Silberstein, Tuvi Etzion:
On Perfect Codes in the Johnson Graph. - Valentin Savin:
Split-Extended LDPC codes for coded cooperation. - Grazziela P. Figueredo, Uwe Aickelin, Amanda M. Whitbrook:
System Dynamics Modelling of the Processes Involving the Maintenance of the Naive T Cell Repertoire. - Matteo Gorgoglione, Valentin Savin, David Declercq:
Optimized puncturing distributions for irregular non-binary LDPC codes. - Mathieu Cunche, Valentin Savin, Vincent Roca:
Analysis of Quasi-Cyclic LDPC codes under ML decoding over the erasure channel. - Robert F. Oates, Julie Greensmith, Uwe Aickelin, Jonathan M. Garibaldi, Graham Kendall:
The Application of a Dendritic Cell Algorithm to a Robotic Classifier. - Sarah Filippi, Olivier Cappé, Aurélien Garivier:
Optimism in Reinforcement Learning Based on Kullback-Leibler Divergence. - Florent Foucaud, Eleonora Guerrini, Matjaz Kovse, Reza Naserasr, Aline Parreau, Petru Valicov:
Extremal graphs for the identifying code problem. - Stasys Jukna, Georg Schnitger:
Circuits with arbitrary gates for random operators. - Swan Dubois, Toshimitsu Masuzawa, Sébastien Tixeuil:
Construction auto-stabilisante d'arbre couvrant en dépit d'actions malicieuses. - Pierre Lescanne, Matthieu Perrinel:
On the Rationality of Escalation. - Anton Bondarenko:
On Application of the Local Search and the Genetic Algorithms Techniques to Some Combinatorial Optimization Problems. - Jean-Yves Baudais, Fahad Syed Muhammad, Jean-François Hélard:
Robustness maximization of parallel multichannel systems. - Guillaume Chèze:
Nearly Optimal Algorithms for the Decomposition of Multivariate Rational Functions and the Extended Lüroth's Theorem. - Chính T. Hoàng, Frédéric Maffray, Meriem Mechebbek:
A characterization of b-perfect graphs. - Tobias Tscheuschner:
The local max-cut problem is PLS-complete even on graphs with maximum degree five. - Kostyantyn M. Shchekotykhin, Gerhard Friedrich:
Query strategy for sequential ontology debugging. - Emil Saucan:
Isometric Embeddings in Imaging and Vision: Facts and Fiction. - Kristina Lerman, Tad Hogg:
Using a Model of Social Dynamics to Predict Popularity of News. - Kenta Kasai, David Declercq, Charly Poulliat, Kohichi Sakaniwa:
Multiplicatively Repeated Non-Binary LDPC Codes. - Dell Zhang, Jun Wang, Deng Cai, Jinsong Lu:
Self-Taught Hashing for Fast Similarity Search. - Xiaodi Wu:
Equilibrium Value Method for the Proof of QIP=PSPACE. - Scott Aaronson, Andrew Drucker:
A Full Characterization of Quantum Advice. - Mathieu Leconte, Jian Ni, R. Srikant:
Mixing Time of Glauber Dynamics With Parallel Updates and Heterogeneous Fugacities. - Salman Beigi, Peter W. Shor, John Watrous:
Quantum interactive proofs with short messages. - Georges Hébrail, Bernard Hugueney, Yves Lechevallier, Fabrice Rossi:
Exploratory Analysis of Functional Data via Clustering and Optimal Segmentation. - David L. Donoho, Arian Maleki, Andrea Montanari:
The Noise-Sensitivity Phase Transition in Compressed Sensing. - Ali Kakhbod, S. M. Sadegh Tabatabaei Yazdi:
On Describing the Routing Capacity Regions of Networks. - Felix Effenberger, Jonathan Spreer:
simpcomp -- A GAP toolbox for simplicial complexes. - David A. Meyer, James Pommersheim:
On the uselessness of quantum queries. - Bernard Chazelle:
The Total s-Energy of a Multiagent System. - Cristian S. Calude, Michael J. Dinneen, Monica Dumitrescu, Karl Svozil:
Experimental Evidence of Quantum Randomness Incomputability. - Bob Coecke, Simon Perdrix:
Environment and classical channels in categorical quantum mechanics. - Adrian Dumitrescu:
Approximate Euclidean Ramsey theorems. - Christian Herrmann, Martin Ziegler:
Expressiveness and Computational Complexity of Geometric Quantum Logic. - Cinzia Bisi, Giampiero Chiaselotti:
A Class of lattices and boolean functions related to some extremal sum problems. - Xueliang Li, Yiyang Li:
The asymptotic values of the general Zagreb and Randić indices of trees with bounded maximum degree. - Sergei A. Goreinov, Ivan V. Oseledets, Dmitry V. Savostyanov:
Wedderburn rank reduction and Krylov subspace method for tensor approximation. Part 1: Tucker case. - Devavrat Shah, Damon Wischik:
Switched networks with maximum weight policies: Fluid approximation and multiplicative state space collapse. - Lukasz Grabowski:
On Turing machines, dynamical systems and the Atiyah problem. - Julien M. Hendrickx, Alexander Olshevsky, John N. Tsitsiklis:
Distributed anonymous discrete function computation. - Maxim A. Babenko:
A Faster Algorithm for the Maximum Even Factor Problem. - Sodeif Ahadpour, Yaser Sadra:
Randomness criteria in binary visibility graph perspective. - Vicky Choi:
Adiabatic Quantum Algorithms for the NP-Complete Maximum-Weight Independent Set, Exact Cover and 3SAT Problems. - Dirk Hofmann, Pawel Waszkiewicz:
Approximation in quantale-enriched categories. - Jason K. Johnson, Michael Chertkov:
A Majorization-Minimization Approach to Design of Power Transmission Networks. - Patrick L. Harrington Jr., Alfred O. Hero III:
Spatio-Temporal Graphical Model Selection. - Xueliang Li, Yuefang Sun:
Note on the Rainbow $k$-Connectivity of Regular Complete Bipartite Graphs. - Tom Bohman, Alan M. Frieze, Eyal Lubetzky:
A note on the random greedy triangle-packing algorithm. - Bernard C. Levy, Ramine Nikoukhah:
Robust State Space Filtering with an Incremental Relative Entropy Tolerance. - Xavier Allamigeon, Stéphane Gaubert, Ricardo Katz:
Tropical polar cones, hypergraph transversals, and mean payoff games. - Torsten A. Ensslin, Cornelius Weig:
Inference with minimal Gibbs free energy in information field theory. - Kristina Schindelar, Viktor Levandovskyy, Eva Zerz:
Exact linear modeling using Ore algebras. - Bhaswar B. Bhattacharya:
On the Fermat-Weber Point of a Polygonal Chain. - David L. Donoho, Gitta Kutyniok:
Microlocal Analysis of the Geometric Separation Problem. - Kristian Ranestad, Bernd Sturmfels:
The Convex Hull of a Variety. - Tommaso Bolognesi:
Causal sets from simple models of computation. - Richard P. Brent, Peter L. Montgomery, Herman J. J. te Riele:
Factorizations of Cunningham numbers with bases 13 to 99. - Eva Kranz:
Structural Stability and Immunogenicity of Peptides. - Richard P. Brent:
Some integer factorization algorithms using elliptic curves. - Gennaro Amendola, Simona Settepanella:
Modularity and Optimality in Social Choice. - Ali ParandehGheibi, Muriel Médard, Asuman E. Ozdaglar, Srinivas Shakkottai:
Access-Network Association Policies for Media Streaming in Heterogeneous Environments. - Victor M. Preciado, Ali Jadbabaie:
From Local Measurements to Network Spectral Properties: Beyond Degree Distributions. - Nayantara Bhatnagar, Allan Sly, Prasad Tetali:
Reconstruction Threshold for the Hardcore Model. - Jure Leskovec, Daniel P. Huttenlocher, Jon M. Kleinberg:
Governance in Social Media: A case study of the Wikipedia promotion process. - Richard P. Brent:
Unrestricted algorithms for elementary and special functions. - A. D. Barbour, Oliver Johnson, Ioannis Kontoyiannis, Mokshay M. Madiman:
Compound Poisson Approximation via Information Functionals. - Xin-She Yang:
A New Metaheuristic Bat-Inspired Algorithm. - Valeriy K. Bulitko:
Reduction of behavior of additive cellular automata on groups. - Jian Ding, James R. Lee, Yuval Peres:
Cover times, blanket times, and majorizing measures. - Robert A. Malaney:
Quantum Location Verification in Noisy Channels. - Andrea Cerri, Patrizio Frosini:
Invariance properties of the multidimensional matching distance in Persistent Topology and Homology. - J. M. Landsberg, Laurent Manivel, Nicolas Ressayre:
Hypersurfaces with degenerate duals and the Geometric Complexity Theory Program. - Matjaz Perc:
Growth and structure of Slovenia's scientific collaboration network. - Mikhail Zaslavskiy, Francis R. Bach, Jean-Philippe Vert:
Many-to-Many Graph Matching: a Continuous Relaxation Approach. - Serge Galam:
Public debates driven by incomplete scientific data: the cases of evolution theory, global warming and H1N1 pandemic influenza. - Edward Farhi, David Gosset, Avinatan Hassidim, Andrew Lutomirski, Peter W. Shor:
Quantum money from knots. - Brian P. Sprouse, Christopher L. MacDonald, Gabriel A. Silva:
Computational efficiency of fractional diffusion using adaptive time step memory. - Stasa Milojevic:
Modes of Collaboration in Modern Science - Beyond Power Laws and Preferential Attachment. - Monireh Houshmand, Saied Hosseini-Khayat, Mark M. Wilde:
Minimal memory requirements for pearl necklace encoders of quantum convolutional codes. - Marcio de Moraes Marim, Michael Atlan, Elsa D. Angelini, Jean-Christophe Olivo-Marin:
Compressed Sensing with off-axis frequency-shifting holography. - Michael J. Barber, John W. Clark:
Designing neural networks that process mean values of random variables. - Pritam Roy:
Interface Building for Software by Modular Three-Valued Abstraction Refinement. - I-Hsiang Wang, David N. C. Tse:
Interference Mitigation through Limited Transmitter Cooperation. - Muhammad Muzzamil Luqman, Thierry Brouard, Jean-Yves Ramel:
Graphic Symbol Recognition using Graph Based Signature and Bayesian Network Classifier. - Muhammad Muzzamil Luqman, Mathieu Delalandre, Thierry Brouard, Jean-Yves Ramel, Josep Lladós:
Employing fuzzy intervals and loop-based methodology for designing structural signature: an application to symbol recognition. - Brian K. Butler, Paul H. Siegel:
On Distance Properties of Quasi-Cyclic Protograph-Based LDPC Codes. - Mark Giesbrecht:
Some Results on the Functional Decomposition of Polynomials. - Kang Ning:
Multiple oligo nucleotide arrays: Methods to reduce manufacture time and cost. - Richard P. Brent:
Parallel algorithms in linear algebra. - Wenyi Zhang, H. Vincent Poor:
On Minimax Robust Detection of Stationary Gaussian Signals in White Gaussian Noise. - Somnath Mukherjee, Pabitra Kumar Ghosh:
The Role of Boolean Function in Fractal Formation and it s Application to CDMA Wireless Communication. - Christoph Benzmueller:
Simple Type Theory as Framework for Combining Logics. - Jean-François Biasse, Michael J. Jacobson Jr., Alan K. Silvester:
Security Estimates for Quadratic Field Based Cryptosystems. - Nicolas Catusse, Victor Chepoi, Karim Nouioua, Yann Vaxès:
Minimum Manhattan network problem in normed planes with polygonal balls: a factor 2.5 approximation algorithm. - Joffrey Villard, Pascal Bianchi:
High-Rate Vector Quantization for the Neyman-Pearson Detection of Correlated Processes. - David A. Wheeler:
Fully Countering Trusting Trust through Diverse Double-Compiling. - Ananda Theertha Suresh, Arunkumar Subramanian, Andrew Thangaraj, Matthieu R. Bloch, Steven W. McLaughlin:
Strong Secrecy for Erasure Wiretap Channels. - David A. Wheeler:
Countering Trusting Trust through Diverse Double-Compiling. - Jacques Carette, Alan P. Sexton, Volker Sorge, Stephen M. Watt:
Symbolic Domain Decomposition. - Hemant Kowshik, P. R. Kumar:
Optimal computation of symmetric Boolean functions in Tree networks. - Hemant Kowshik, P. R. Kumar:
Optimal ordering of transmissions for computing Boolean threhold functions. - Vaneet Aggarwal, Amir Salman Avestimehr, Ashutosh Sabharwal:
On Achieving Local View Capacity Via Maximal Independent Graph Scheduling. - Alexander Barg, Punarbasu Purkayastha:
Near MDS poset codes and distributions. - Richard P. Brent:
On the periods of generalized Fibonacci recurrences. - Richard P. Brent:
On computing factors of cyclotomic polynomials. - Adam W. Bojanczyk, Richard P. Brent, Frank R. de Hoog, Douglas R. Sweet:
On the stability of the Bareiss and related Toeplitz factorization algorithms. - François Orieux, Jean-François Giovannelli, Thomas Rodet:
Bayesian estimation of regularization and PSF parameters for Wiener-Hunt deconvolution. - Rudolf Ahlswede, Igor Bjelakovic, Holger Boche, Janis Noetzel:
Entanglement Transmission over Arbitrarily Varying Quantum Channels. - Mark M. Wilde, Min-Hsiu Hsieh:
The quantum dynamic capacity formula of a quantum channel. - Nick S. Jones, John Moriarty:
Evolutionary Inference for Function-valued Traits: Gaussian Process Regression on Phylogenies. - Zhenwei Cao, Alexander Elgart:
Adiabatic quantum computation: Enthusiast and Sceptic's perspectives. - Feng Chen, Aiguo Xu, Guangcai Zhang, Yingjun Li, Sauro Succi:
Multiple-Relaxation-Time Lattice Boltzmann Approach to Compressible Flows with Flexible Specific-Heat Ratio and Prandtl Number. - Jean-Luc Marichal, Pierre Mathonet:
Symmetric approximations of pseudo-Boolean functions with applications to influence indexes. - Cosma Rohilla Shalizi, Andrew C. Thomas:
Homophily and Contagion Are Generically Confounded in Observational Social Network Studies. - Manuel Mazo Jr., Paulo Tabuada:
Decentralized event-triggered control over wireless sensor/actuator networks. - Manuel Mazo Jr., Paulo Tabuada:
Symbolic Approximate Time-Optimal Control. - Radoslav Fulek, Andrew Suk:
On disjoint crossing families in geometric graphs. - Mehdi Saeedi, Mehdi Sedighi, Morteza Saheb Zamani:
A Library-Based Synthesis Methodology for Reversible Logic. - Mehdi Saeedi, Morteza Saheb Zamani, Mehdi Sedighi, Zahra Sasanian:
Reversible Circuit Synthesis Using a Cycle-Based Approach. - Mona Arabzadeh, Mehdi Saeedi, Morteza Saheb Zamani:
Rule-Based Optimization of Reversible Circuits.
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.