default search action
CoRR, February 2010
- Jacques Carette, James H. Davenport:
The Power of Vocabulary: The Case of Cyclotomic Polynomials. - Wei Lu, Namrata Vaswani:
Regularized Modified-BPDN for compressive sensing with partially known support. - Helena Rifà, Josep Rifà, Lorena Ronquillo:
Perfect Z2Z4-linear codes in Steganography. - Noah D. Stein, Asuman E. Ozdaglar, Pablo A. Parrilo:
Structure of Extreme Correlated Equilibria. - Phong S. Nguyen, Henry D. Pfister, Krishna R. Narayanan:
A Rate-Distortion Exponent Approach to Multiple Decoding Attempts for Reed-Solomon Codes. - Olivier Bodini, Yann Ponty:
Multi-dimensional Boltzmann Sampling of context-free Languages. - A. M. Rajesh, K. N. Bharath:
Solar Still Coupled With Solar Collector and Storage Tank. - Ali-Akbar Safilian, Farzad Didehvar:
Relation between the Usual Order and the Enumeration Orders of r.e. sets (2) : E-Reducibility. - Ali Kakhbod, Morteza Zadimoghaddam:
On the Carter-Gill Conjecture. - Florentin Smarandache:
\alpha-Discounting Multi-Criteria Decision Making (\alpha-D MCDM). - Petr Kubanek:
Genetic algorithm for robotic telescope scheduling. - Alexander Jung, Zvika Ben-Haim, Franz Hlawatsch, Yonina C. Eldar:
On Unbiased Estimation of Sparse Vectors Corrupted by Gaussian Noise. - Sang Joon Kim, Besma Smida, Natasha Devroye:
Achievable rate regions and outer bounds for a multi-pair bi-directional relay network. - Matti Åstrand, Valentin Polishchuk, Joel Rybicki, Jukka Suomela, Jara Uitto:
Local algorithms in (weakly) coloured graphs. - Lars Kotthoff:
Constraint solvers: An empirical evaluation of design decisions. - Lars Kotthoff:
Dominion -- A constraint solver generator. - P. S. Hiremath, Siddu P. Algur:
Extraction of Flat and Nested Data Records from Web Pages. - Nitin Saxena, C. Seshadhri:
From Sylvester-Gallai Configurations to Rank Bounds: Improved Black-box Identity Test for Depth-3 Circuits. - Pierre Humbert:
Usages et conception des TIC : Proposition d'un modèle d'aide à la représentation de problème de conception. - Christophe Weibel:
Maximal f-vectors of Minkowski sums of large numbers of polytopes. - Victor M. Preciado, Ali Jadbabaie:
Moment-Based Analysis of Synchronization in Small-World Networks of Oscillators. - Victor M. Preciado, Ali Jadbabaie:
Spectral Analysis of Virus Spreading in Random Geometric Networks. - Rajeev Goré, Florian Widmann:
Optimal Tableaux for Propositional Dynamic Logic with Converse. - C. N. Padhy, R. R. Panda:
Logical Evaluation of Consciousness: For Incorporating Consciousness into Machine Architecture. - Graham H. Norton:
Bézout Identities Associated to a Finite Sequence. - C. Sinan Güntürk, Alexander M. Powell, Rayan Saab, Özgür Yilmaz:
Sobolev Duals for Random Frames and Sigma-Delta Quantization of Compressed Sensing Measurements. - Emanuel Diamant:
Some considerations on how the human brain must be arranged in order to make its replication in a thinking machine possible. - Hua-Chieh Li, Ming-Yang Chen, John M. Cioffi:
On the Generality of $1+\mathbf{i}$ as a Non-Norm Element. - Serge Samper, Pierre-Antoine Adragna, Hugues Favrelière, Maurice Pillet:
Modeling of 2D and 3D Assemblies Taking Into Account Form Errors of Plane Surfaces. - Marie-Noëlle Bessagnet, Eric Kergosien, Mauro Gaio:
Extraction de termes, reconnaissance et labellisation de relations dans un thésaurus. - Matthew Aldridge, Oliver Johnson, Robert J. Piechocki:
Asymptotic Sum-Capacity of Random Gaussian Interference Networks Using Interference Alignment. - Eric Kergosien, Mouna Kamel, Christian Sallaberry, Marie-Noëlle Bessagnet, Nathalie Aussenac-Gilles, Mauro Gaio:
Construction et enrichissement automatique d'ontologie à partir de ressources externes. - Hugues Favrelière, Serge Samper, Pierre-Antoine Adragna:
Caractérisation des défauts d'une surface sphérique par décomposition modale. - Pierre-Antoine Adragna, Serge Samper, Maurice Pillet:
A proposition of 3D inertial tolerancing to consider the statistical combination of the location and orientation deviations. - Y. Ledoux, Hugues Favrelière, Serge Samper:
Optimization of a Classical Stamping Progression by Modal Correction of Anisotropy Ears. - Pierre-Antoine Adragna, Maurice Pillet, Fabien Formosa, Serge Samper:
Inertial tolerancing and capability indices in an assembly production. - Julie Greensmith, Uwe Aickelin:
Dendritic Cells for SYN Scan Detection. - Robert Crowston, Gregory Z. Gutin, Mark Jones, Eun Jung Kim, Imre Z. Ruzsa:
Systems of Linear Equations over F2 and Problems Parameterized Above Average. - Josep Rifà, Victor A. Zinoviev:
On lifting perfect codes. - Jayanthkumar Kannan, Petros Maniatis, Byung-Gon Chun:
A Data Capsule Framework For Web Services: Providing Flexible Data Access Control To Users. - Jinzhong Niu, Kai Cai, Simon Parsons:
A Grey-Box Approach to Automated Mechanism Design. - Dakshina Ranjan Kisku, Massimo Tistarelli, Jamuna Kanta Sing, Phalguni Gupta:
Face Recognition by Fusion of Local and Global Matching Scores using DS Theory: An Evaluation with Uni-classifier and Multi-classifier Paradigm. - Hunny Mehrotra, Dakshina Ranjan Kisku, V. Bhawani Radhika, Banshidhar Majhi, Phalguni Gupta:
Feature Level Clustering of Large Biometric Database. - Christoph Studer, Markus Wenk, Andreas Burg:
MIMO Transmission with Residual Transmit-RF Impairments. - Dakshina Ranjan Kisku, Ajita Rattani, Enrico Grosso, Massimo Tistarelli:
Face Identification by SIFT-based Complete Graph Topology. - Dakshina Ranjan Kisku, Hunny Mehrotra, Phalguni Gupta, Jamuna Kanta Sing:
SIFT-based Ear Recognition by Fusion of Detected Keypoints from Color Similarity Slice Regions. - Dakshina Ranjan Kisku, Phalguni Gupta, Jamuna Kanta Sing:
Feature Level Fusion of Biometrics Cues: Human Identification with Doddingtons Caricature. - Dakshina Ranjan Kisku, Phalguni Gupta, Jamuna Kanta Sing:
Fusion of Multiple Matchers using SVM for Offline Signature Identification. - Steven W. Peters, Robert W. Heath Jr.:
Cooperative Algorithms for MIMO Interference Channels. - William O. Wilson, Jan Feyereisl, Uwe Aickelin:
Detecting Motifs in System Call Sequences. - Ping Zhu, Qiaoyan Wen:
A note on "communicating between information systems". - Odile Piton, Hélène Pignot:
Étude et traitement automatique de l'anglais du XVIIe siècle : outils morphosyntaxiques et dictionnaires. - Odile Piton, Hélène Pignot:
"Mind your p's and q's": or the peregrinations of an apostrophe in 17th Century English. - Abdelmajid Ben Hamadou, Odile Piton, Héla Fehri:
Recognition and translation Arabic-French of Named Entities: case of the Sport places. - Aubin Jarry, Pierre Leone, José D. P. Rolim:
VRAC: Theory #1. - Odile Piton, Klara Lagji:
Morphological study of Albanian words, and processing with NooJ. - Aubin Lecointre, Daniela Dragomirescu, David Dubuc, Katia Grenier, Patrick Pons, Hervé Aubert, A. Muller, Pascal Berthou, Thierry Gayraud, Robert Plana:
Miniaturized wireless sensor network. - Aubin Lecointre, Daniela Dragomirescu, Robert Plana:
Software defined radio layer for IR-UWB systems in Wireless Sensor Network Context. - Aubin Lecointre, Daniela Dragomirescu, Robert Plana:
Study of Reconfigurable Mostly Digital Radio for Manet. - Daniela Dragomirescu, Aubin Lecointre, Robert Plana:
SOPC Co-Design Platform for UWB Systems in Wireless Sensor Network Context. - Loet Leydesdorff:
What Can Heterogeneity Add to the Scientometric Map? Steps towards algorithmic historiography. - Lada A. Adamic, Xiao Wei, Jiang Yang, Sean Gerrish, Kevin Kyung Nam, Gavin S. Clarkson:
Individual focus and knowledge contribution. - Michael Hoffmann, Jirí Matousek, Yoshio Okamoto, Philipp Zumstein:
Minimum and maximum against k lies. - Abdoulaye Berthe, Aubin Lecointre, Daniela Dragomirescu, Robert Plana:
Simulation Platform for Wireless Sensor Networks Based on Impulse Radio Ultra Wide Band. - Abdoulaye Berthe, Aubin Lecointre, Daniela Dragomirescu, Robert Plana:
Medium Access Control for Wireless Sensor Networks based on Impulse Radio Ultra Wideband. - Aubin Lecointre, Daniela Dragomirescu, Robert Plana:
Channel Capacity Limitations versus Hardware Implementation for UWB Impulse Radio Communications. - Aubin Lecointre, Abdoulaye Berthe, Daniela Dragomirescu, Robert Plana:
Performance Evaluation of Impluse Radio Ultra Wide Band Wireless Sensor Networks. - Aubin Lecointre, Daniela Dragomirescu, Robert Plana:
New methodology to design advanced MR-IRUWB communication system. - Van Tien Nguyen, Mauro Gaio, Christian Sallaberry:
Recherche de relations spatio-temporelles : une méthode basée sur l'analyse de corpus textuels. - Joachim Spoerhase:
An Optimal Algorithm for the Indirect Covering Subtree Problem. - Md. Atiur Rahman Siddique, Joarder Kamruzzaman:
Performance Analysis of m-retry BEB based DCF under Unsaturated Traffic Condition. - Andreas Faatz, Andreas Zinnen:
FORMT: Form-based Mutation Testing of Logical Specifications. - Jacob Binia:
Some Relations between Divergence Derivatives and Estimation in Gaussian channels. - Aubin Lecointre, Daniela Dragomirescu, Robert Plana:
IR-UWB Channel Capacity for Analog and Mostly Digital Implementation. - Julie Greensmith, Uwe Aickelin, Jamie Twycross:
Detecting Danger: Applying a Novel Immunological Concept to Intrusion Detection Systems. - Jon K. Nilsen, Xing Cai, Bjorn Hoyland, Hans Petter Langtangen:
Simplifying Parallelization of Scientific Codes by a Function-Centric Approach in Python. - Fedor Zhdanov, Alexey V. Chernov, Yuri Kalnishkan:
Aggregating Algorithm competing with Banach lattices. - Jon K. Nilsen, Salman Zubair Toor, Zsombor Nagy, Bjarte Mohn, Alexander L. Read:
Performance and Stability of the Chelonia Storage Cloud. - Saber Jafarizadeh:
Exact Determination of Optimal Weights for Fastest Distributed Consensus Algorithm in Path Network via SDP. - Mark van Hoeij, Andrew Novocin:
Gradual sub-lattice reduction and a new complexity for factoring polynomials. - Mahamed G. H. Omran, Faisal al-Adwani:
Using CODEQ to Train Feed-forward Neural Networks. - Peter Grünwald, Wojciech Kotlowski:
Prequential Plug-In Codes that Achieve Optimal Redundancy Rates even if the Model is Wrong. - Steven Wegmann:
Approximations to the MMI criterion and their effect on lattice-based MMI. - Emmanuel Abbe, Emre Telatar:
Polar Codes for the m-User MAC and Matroids. - Vahan V. Mkrtchyan, Eckhard Steffen:
Maximum $\Delta$-edge-colorable subgraphs of class II graphs. - Laura Balzano, Benjamin Recht, Robert D. Nowak:
High-Dimensional Matched Subspace Detection When Data are Missing. - François Baccelli, Bartek Blaszczyszyn:
A New Phase Transition for Local Delays in MANETs. - David Isaac Wolinsky, Pierre St. Juste, P. Oscar Boykin, Renato J. O. Figueiredo:
Towards Social Profile Based Overlays. - Roberto Grossi, Andrea Pietracaprina, Nadia Pisanti, Geppino Pucci, Eli Upfal, Fabio Vandin:
MADMX: A Novel Strategy for Maximal Dense Motif Extraction. - Serguei A. Mokhov:
On Event Structure in the Torn Dress. - Ping Zhu, Qiaoyan Wen:
Homomorphisms between fuzzy information systems revisited. - Hugo A. López, Carlos Olarte, Jorge A. Pérez:
Towards a Unified Framework for Declarative Structured Communications. 1-15 - Andi Bejleri, Raymond Hu, Nobuko Yoshida:
Session-Based Programming for Parallel Algorithms: Expressiveness and Performance. 17-29 - Marco Carbone, Joshua D. Guttman:
Execution Models for Choreographies and Cryptoprotocols. 31-41 - Matthew Kehrt, Laura Effinger-Dean, Michael Schmitz, Dan Grossman:
Programming Idioms for Transactional Events. 43-48 - Francisco Martins, Luís M. B. Lopes, João Barros:
Towards the Safe Programming of Wireless Sensor Networks. 49-62 - Stefan Marr, Michael Haupt, Stijn Timbermont, Bram Adams, Theo D'Hondt, Pascal Costanza, Wolfgang De Meuter:
Virtual Machine Support for Many-Core Architectures: Decoupling Abstract from Concrete Concurrency Models. 63-77 - Prodromos Gerakios, Nikolaos Papaspyrou, Konstantinos Sagonas:
A Concurrent Language with a Uniform Treatment of Regions and Locks. 79-93 - Vasco Thudichum Vasconcelos, Francisco Martins, Tiago Cogumbreiro:
Type Inference for Deadlock Detection in a Multithreaded Polymorphic Typed Assembly Language. 95-109 - Hoyoung Jeung, Man Lung Yiu, Xiaofang Zhou, Christian S. Jensen, Heng Tao Shen:
Discovery of Convoys in Trajectory Databases. - Benjamin Nguyen, François-Xavier Dudouet, Dario Colazzo, Antoine Vion, Ioana Manolescu, Pierre Senellart:
The WebStand Project. - Ciro Russo:
A Unified Algebraic Framework for Fuzzy Image Compression and Mathematical Morphology. - Leslie Ann Goldberg, Mark Jerrum:
Approximating the partition function of the ferromagnetic Potts model. - Guillaume Waignier, Estéban Duguepéroux, Anne-Françoise Le Meur, Laurence Duchien:
A Framework for Agile Development of Component-Based Applications. - Andrea Clementi, Angelo Monti, Riccardo Silvestri:
Modelling Mobility: A Discrete Revolution. - Robert Geisberger:
Heuristic Contraction Hierarchies with Approximation Guarantee. - Roberto da Silva, José Palazzo Moreira de Oliveira, José Valdeni de Lima, Viviane Pereira Moreira:
Statistics for Ranking Program Committees and Editorial Boards. - Prosenjit Bose, Luc Devroye, Karim Douïeb, Vida Dujmovic, James King, Pat Morin:
Odds-On Trees. - Frank Rudzicz, Serguei A. Mokhov:
Towards a Heuristic Categorization of Prepositional Phrases in English with WordNet. - Ioannis Chatzigiannakis, Georgios Mylonas, Orestis Akribopoulos, Marios Logaras, Panagiotis C. Kokkinos, Paul G. Spirakis:
The "Hot Potato" Case: Challenges in Multiplayer Pervasive Games Based on Ad hoc Mobile Sensor Networks and the Experimental Evaluation of a Prototype Game. - Adam Kirsch, Michael Mitzenmacher, Andrea Pietracaprina, Geppino Pucci, Eli Upfal, Fabio Vandin:
An Efficient Rigorous Approach for Identifying Statistically Significant Frequent Itemsets. - Nadeem Mahmood, S. M. Aqil Burney, Kamran Ahsan:
A Logical Temporal Relational Data Model. - M. Ramaswami, R. Bhaskaran:
A CHAID Based Performance Prediction Model in Educational Data Mining. - Md. Sakhawat Hossen, A. F. M. Sultanul Kabir, Razib Hayat Khan, Abdullah Azfar:
Interconnection between 802.15.4 Devices and IPv6: Implications and Existing Approaches. - Salem Saleh Al-amri, Namdeo V. Kalyankar, Santosh D. Khamitkar:
A Comparative Study of Removal Noise from Remote Sensing Image. - S. R. Vijayalakshmi, G. Padmavathi:
A Performance Study of GA and LSH in Multiprocessor Job Scheduling. - Mahdi Esmaeili, Fazekas Gabor:
Finding Sequential Patterns from Large Sequence Data. - Manju Sharma, Lalit Kumar Awasthi:
Realistic Approach towards Quantitative Analysis and Simulation of EEHC-Based Routing for Wireless Sensor Networks. - Mahalakshmi Chidambara Natarajan, Ramaswamy Muthiah, Alamelu Nachiappan:
Performance Investigation of Virtual Private Networks with Different Bandwidth Allocations. - Dorsaf Sebai, Abderrazak Jemai, Imed Bennour:
Performance Analysis of Software to Hardware Task Migration in Codesign. - M. Babu Reddy, L. S. S. Reddy:
Dimensionality Reduction: An Empirical Study on the Usability of IFE-CF (Independent Feature Elimination- by C-Correlation and F-Correlation) Measures. - K. Soorya Prakash, S. S. Mohamed Nazirudeen, M. Joseph Malvin Raj:
Establishment of Relationships between Material Design and Product Design Domains by Hybrid FEM-ANN Technique. - Yuval Cohen:
Mining The Successful Binary Combinations: Methodology and A Simple Case Study. - Abdullah Al Hasib, Abdullah Azfar, Muhammad Sarwar Jahan Morshed:
Towards Public Key Infrastructure less authentication in Session Initiation Protocol. - Shuchita Upadhayaya, Charu Gandhi:
Node Disjoint Multipath Routing Considering Link and Node Stability protocol: A characteristic Evaluation. - Sattar J. Aboud:
Efficient Password-Typed Key Agreement Scheme. - Akshay K. Ojha, Dushmanta Mallick, C. Mallick:
Existence and Global Logarithmic Stability of Impulsive Neural Networks with Time Delay. - T. R. Gopalakrishnan Nair, P. Jayarekha:
A Strategy to enable Prefix of Multicast VoD through dynamic buffer allocation. - Akshay K. Ojha, A. K. Das:
Geometric Programming Problem with Co-Efficients and Exponents Associated with Binary Numbers. - Fahd Benboubker, Farid Abdi, Ali Ahaitouf:
Shape-Adaptive Motion Estimation Algorithm for MPEG-4 Video Coding. - (Withdrawn) Adjacency Matrix based method to compute the node connectivity of a Computer Communication Network.
- Geeta S. Navale, Swati S. Joshi, Aaradhana A. Deshmukh:
M-Banking Security - a futuristic improved security approach. - Boufeldja Kadri, Miloud Boussahla, Fethi Tarik Bendimerad:
Phase-Only Planar Antenna Array Synthesis with Fuzzy Genetic Algorithms. - Mustapha Guezouri, Ahmed Blaha, Mokhtar Keche:
Adaptation of TURN protocol to SIP protocol. - Kamran Ahsan, Hanifa Shah, Paul Kingston:
RFID Applications: An Introductory and Exploratory Study. - Fu-Chien Kao, Siang-Ru Wang, Ting-Hao Huang:
The Design of Circuit-Measuring Collaborative Learning System with Embedded Broker. - R. Shivakumar, R. Lakshmipathi:
Implementation of an Innovative Bio Inspired GA and PSO Algorithm for Controller design considering Steam GT Dynamics. - Kanak Saxena, Rahul Shukla:
Significant Interval and Frequent Pattern Discovery in Web Log Data. - K. Prasanth, K. Duraiswamy, K. Jayasudha, C. Chandrasekar:
Efficient Packet Forwarding Approach in Vehicular Ad Hoc Networks Using EBGR Algorithm. - Akepogu Anand Rao, Karanam Madhavi:
Framework for Visualizing Model-Driven Software Evolution and its Application. - Muzhir Al-Ani, Qeethara Al-Shayea:
Unidirectional Error Correcting Codes for Memory Systems: A Comparative Study. - Dhirendra Sharma, Vikram Singh:
ICT in Universities of the Western Himalayan Region of India II: A Comparative SWOT Analysis. - T. R. Gopalakrishnan Nair, M. Dakshayini:
Stochastic Model Based Proxy Servers Architecture for VoD to Achieve Reduced Client Waiting Time. - R. Sandanalakshmi, Athilakshmi, K. Manivannan:
Modified EESM Based Link Adaptation Algorithm for Multimedia Transmission in Multicarrier Systems. - Lilly Raamesh, G. V. Uma:
Reliable Mining of Automatically Generated Test Cases from Software Requirements Specification (SRS). - Yousof Al-Hammadi, Uwe Aickelin:
Detecting Bots Based on Keylogging Activities. - S. S. Phulari, S. D. Khamitkar, N. K. Deshmukh, Parag U. Bhalchandra, S. N. Lokhande, A. R. Shinde:
Understanding Formulation of Social Capital in Online Social Network Sites (SNS). - Ulas Bagci, Jayaram K. Udupa, Li Bai:
The Influence of Intensity Standardization on Medical Image Registration. - Ulas Bagci, Jayaram K. Udupa, Xinjian Chen:
Ball-Scale Based Hierarchical Multi-Object Recognition in 3D Medical Images. - Vishwambhar Rathi, Erik Aurell, Lars K. Rasmussen, Mikael Skoglund:
Bounds on Threshold of Regular Random $k$-SAT. - Igor Nor, Danny Hermelin, Sylvain Charlat, Jan Engelstadter, Max Reuter, Olivier Duron, Marie-France Sagot:
Mod/Resc Parsimony Inference. - Mukul Agarwal, Sanjoy K. Mitter:
Communication to within a fidelity criterion over unknown networks by reduction to reliable communication problems over unknown networks. - George T. Amariucai, Shuangqing Wei:
Half-Duplex Active Eavesdropping in Fast Fading Channels: A Block-Markov Wyner Secrecy Encoding Scheme. - Srinivasan Venkatramanan, Anurag Kumar:
New Insights from an Analysis of Social Influence Networks under the Linear Threshold Model. - Si-Hyeon Lee, Sae-Young Chung:
Capacity Scaling of Wireless Ad Hoc Networks: Effect of Finite Wavelength. - Lalitha Sankar, S. Raj Rajagopalan, H. Vincent Poor:
Utility and Privacy of Data Sources: Can Shannon Help Conceal and Reveal Information? - Albert Xin Jiang, MohammadAli Safari:
Pure Nash Equilibria: Complete Characterization of Hard and Easy Graphical Games. - Yao Li, Emina Soljanin, Predrag Spasojevic:
Collecting Code Coupons Over Generations. - Yao Li, Emina Soljanin, Predrag Spasojevic:
Collecting Coded Coupons over Overlapping Generations. - Alastair R. Beresford, Simon J. Gay:
Proceedings Second International Workshop on Programming Language Approaches to Concurrency and Communication-cEntric Software, PLACES 2009, York, UK, 22nd March 2009. EPTCS 17, 2009 [contents] - Maarten H. van Emden:
Integrating Interval Constraints into Logic Programming. - Moshe Schwartz:
Constant-Weight Gray Codes for Local Rank Modulation. - Emmanuel Filiot, Jean-François Raskin, Pierre-Alain Reynier, Frédéric Servais, Jean-Marc Talbot:
On Functionality of Visibly Pushdown Transducers. - Pierre-Olivier Amblard, Olivier J. J. Michel:
On directed information theory and Granger causality graphs. - Mahmoud Ferdosizadeh Naeiny, Farokh Marvasti:
PAPR reduction of space-time and space-frequency coded OFDM systems using active constellation extension. - Emmanuel Filiot, Tristan Le Gall, Jean-François Raskin:
Iterated Regret Minimization in Game Graphs. - Anthony Widjaja To:
Parikh Images of Regular Languages: Complexity and Applications. - Salim Y. El Rouayheb, Alexander Sprintson, Parastoo Sadeghi:
On Coding for Cooperative Data Exchange. - Pedro A. Ortega, Daniel A. Braun:
A Minimum Relative Entropy Controller for Undiscounted Markov Decision Processes. - Maurice J. Jansen, Youming Qiao, Jayalal Sarma:
Deterministic Black-Box Identity Testing $\pi$-Ordered Algebraic Branching Programs. - (Withdrawn) The Degrees of Freedom Region of the MIMO Cognitive Interference Channel with No CSIT.
- Chinmay S. Vaze, Mahesh K. Varanasi:
A Large-System Analysis of the Imperfect-CSIT Gaussian Broadcast Channel with a DPC-based Transmission Strategy. - (Withdrawn) On the scaling of feedback bits to achieve the full multiplexing gain over the Gaussian broadcast channel using DPC.
- Andrey Breslav:
Extensible type checker for parser generation. - Hayato Takahashi:
Computational limits to nonparametric estimation for ergodic processes. - Douglas J. Leith, Qizhi Cao, Vijay G. Subramanian:
Max-min Fairness in 802.11 Mesh Networks. - John Tadrous, Ahmed K. Sultan, Mohammed Nafie, Amr El-Keyi:
Power Control for Maximum Throughput in Spectrum Underlay Cognitive Radio Networks. - Irit Dinur, Or Meir:
Derandomized Parallel Repetition of Structured PCPs. - Stephen L. Bloom, Zoltán Ésik:
Algebraic Linear Orderings. - Bartek Blaszczyszyn, Paul Mühlethaler:
Stochastic Analysis of Non-slotted Aloha in Wireless Ad-Hoc Networks. - Thomas Hugel, Yacine Boufkhad:
Non Uniform Selection of Solutions for Upper Bounding the 3-SAT Threshold. - Siti Rahayu Selamat, Robiah Yusof, S. Shahrin, Mohd Zaki Mas'ud, R. Irda, Mohd Faizal Abdollah:
Scenario Based Worm Trace Pattern Identification Technique. - Abderrahmane Baadache, Ali Belmehdi:
Avoiding Black Hole and Cooperative Black Hole Attacks in Wireless Ad hoc Networks. - K. Ramesh, K. Ayyar, A. Nirmalkumar, G. Gurusamy:
Design of Current Controller for Two Quadrant DC Motor Drive by Using Model Order Reduction Technique. - Mahendra Kumar S, Senthil Prakash. K:
Wireless Congestion Control Protocol For Multihop Ad Hoc Networks. - Ponnusamy Kumar, A. Krishnan:
Saturation Throughput Analysis of IEEE 802.11b Wireless Local Area Networks under High Interference Considering Capture Effects. - Sumon Kumar Debnath, Foez Ahmed, Nayeema Islam:
Performance Evaluation of Unicast and Broadcast Mobile Ad hoc Network Routing Protocols. - Yaping Feng, Lee-Sub Lee:
The Importance Analysis of Use Case Map with Markov Chains. - Andriy Burkov, Brahim Chaib-draa:
An Approximate Subgame-Perfect Equilibrium Computation Technique for Repeated Games. - Shujun Li, Junaid Jameel Ahmad, Dietmar Saupe, C.-C. Jay Kuo:
An Improved DC Recovery Method from AC Coefficients of DCT-Transformed Images. - Anna Oneto, Grazia Tamone:
On some invariants in numerical semigroups and estimations of the order bound. - Bruno F. Ribeiro, Donald F. Towsley:
Estimating and Sampling Graphs with Multidimensional Random Walks. - Philippe Wenger:
Cuspidal and Noncuspidal Robot Manipulators. - Carlo Innocenti, Philippe Wenger:
Position Analysis of the RRP-3(SS) Multi-Loop Spatial Structure. - Ehsan Ardestanizadeh, Michèle A. Wigger, Young-Han Kim, Tara Javidi:
Linear Sum Capacity for Gaussian Multiple Access Channels with Feedback. - Daniel Golovin, Matthew Faulkner, Andreas Krause:
Online Distributed Sensor Selection. - Paul Z. Kolano, Carlo A. Furia, Richard A. Kemmerer, Dino Mandrioli:
Refinement and Verification of Real-Time Systems. - Arnau Mir, Francesc Rosselló:
The median of the distance between two leaves in a phylogenetic tree. - Francisco Javier López-Fraguas, Juan Rodríguez-Hortalá:
The Full Abstraction Problem for Higher Order Functional-Logic Programs. - Ahmed Eleryan, Mohamed Elsabagh, Moustafa Youssef:
AROMA: Automatic Generation of Radio Maps for Localization Systems. - Francisco Bueno, Jorge A. Navas, Manuel V. Hermenegildo:
Towards Parameterized Regular Type Inference Using Set Constraints. - Herman J. Haverkort:
Recursive tilings and space-filling curves with little fragmentation. - A. S. Nandeppanavar, Mahantesh N. Birje, Sunilkumar S. Manvi, Shridhar:
Mobility Impact on Performance of Mobile Grids. - Sylvain Guillemot, Florian Sikora:
Finding and counting vertex-colored subtrees. - Linlin Zhang, Virginie Fresse, Mohammed A. S. Khalid, Dominique Houzet, Anne-Claire Legrand:
Evaluation and Design Space Exploration of a Time-Division Multiplexed NoC on FPGA for Image Analysis Applications. - Laurent Najman:
Ultrametric watersheds: a bijection theorem for hierarchical edge-segmentation. - Nestor D. Chatzidiamantis, Athanasios S. Lioumpas, George K. Karagiannidis, Shlomi Arnon:
Adaptive Subcarrier PSK Intensity Modulation in Free Space Optical Systems. - Vinod M. Prabhakaran, Manoj Prabhakaran:
Assisted Common Information with Applications to Secure Two-Party Computation. - Somnuk Sinthupoun, Ohm Sornil:
Thai Rhetorical Structure Analysis. - Gabriele Fici, Elena V. Pribavkina, Jacques Sakarovitch:
On the Minimal Uncompletable Word Problem. - Chaomei Chen, Jian Zhang, Michael S. E. Vogeley:
Making Sense of the Evolution of a Scientific Domain: A Visual Analytic Study of the Sloan Digital Sky Survey Research. - Brittany Terese Fasy:
Persistence Diagrams and the Heat Equation Homotopy. - Syed M. Rahman, Shannon E. Donahue:
Convergence of Corporate and Information Security. - Vipul H. Kondekar, Vijaykumar S. Kolkure, S. N. Kore:
Image Retrieval Techniques based on Image Features, A State of Art approach for CBIR. - R. Shashikumar, C. N. Vijay Kumar, M. Nagendrakumar, C. S. Hemanthkumar:
Ahb Compatible DDR Sdram Controller Ip Core for Arm Based Soc. - Hadj Zerrouki, Mohammed Feham:
High Throughput of WiMAX MIMO OFDM Including Adaptive Modulation and Coding. - K. K. Guatam, Anurag Rai:
Performance Modeling and Evaluation of Traffic management for Mobile Networks by SINR Prediction. - Chaomei Chen, Fidelia Ibekwe-Sanjuan, Jianhua Hou:
The Structure and Dynamics of Co-Citation Clusters: A Multiple-Perspective Co-Citation Analysis. - Nuno Alves:
Implementing Genetic Algorithms on Arduino Micro-Controllers. - Christophe Roche:
Dire n'est pas concevoir. - Benjamin I. P. Rubinstein, Aleksandr Simma:
On the Stability of Empirical Risk Minimization in the Presence of Multiple Risk Minimizers. - Mingyu Fan, Nannan Gu, Hong Qiao, Bo Zhang:
Intrinsic dimension estimation of data by principal component analysis. - Iftah Gamzu, Danny Segev:
A Sublogarithmic Approximation for Highway and Tollbooth Pricing. - S. K. Nayak, S. B. Thorat, N. V. Kalyankar:
Reaching the Unreached A Role of ICT in Sustainable Rural Development. - Fabrizio Grandoni, Rico Zenklusen:
Optimization with More than One Budget. - Raman Yazdani, Masoud Ardakani:
Efficient LLR Calculation for Non-Binary Modulations over Fading Channels. - Laurent Poinsot, Gérard Duchamp, Christophe Tollu:
Partial monoids: associativity and confluence. - T. Balakumaran, Ila Vennila, C. Gowri Shankar:
Detection of Microcalcification in Mammograms Using Wavelet Transform and Fuzzy Shell Clustering. - V. Ashok, T. Balakumaran, C. Gowri Shankar, Ila Vennila, A. Nirmal Kumar:
The Fast Haar Wavelet Transform for Signal & Image Processing. - K. K. Guatam, Anurag Rai:
A Survivability Strategy in Route Optimization Mobile Network by Memetic Algorithm. - M. A. Alim, M. M. Rahman, M. M. Hossain, A. Al Nahid:
Analysis of Large Scale Propagation Models for Mobile Communications in Urban Area. - Foez Ahmed, Sateesh Kumar Pradhan, Nayeema Islam, Sumon Kumar Debnath:
Performance Evaluation of TCP over Mobile Ad hoc Networks. - S. Sumathi, S. K. Srivatsa, M. Uma Maheswari:
Vision Based Game Development Using Human Computer Interaction. - Ismail I. Amr, Mohamed Amin, Passent Mohammed El-Kafrawy, Amr M. Sauber:
Using Statistical Moment Invariants and Entropy in Image Retrieval. - Bhaskar Nandi, Subhabrata Barman, Soumen Paul:
Genetic Algorithm Based Optimization of Clustering in Ad Hoc Networks. - S. Narmadha, V. Selladurai, G. Sathish:
Multi Product Inventory Optimization using Uniform Crossover Genetic Algorithm. - S. Narmadha, V. Selladurai, G. Sathish:
Efficient Inventory Optimization of Multi Product, Multiple Suppliers with Lead Time using PSO. - R. Jeevarathinam, Antony Selvadoss Thanamani:
Test Case Generation using Mutation Operators and Fault Classification. - K. Angayarkkani, N. Radhakrishnan:
An Intelligent System For Effective Forest Fire Detection Using Spatial Data. - Ramesh Kumar Gopala Pillai, Ramakanth Kumar P:
Modeling of Human Criminal Behavior using Probabilistic Networks. - Keehang Kwon, Hong Pyo Ha, Jiseung Kim:
A proof Procedure for Testing Membership in Regular Expressions. - Mosleh M. Abu-Alhaj, M. Halaiyqah, Muhannad A. Abu Hashem, Adnan A. Hnaif, Omar Amer Abouabdalla, Ahmed M. Manasrah:
An innovative platform to improve the performance of exact string matching algorithms. - Khalil Ghorbal, Eric Goubault, Sylvie Putot:
A Logical Product Approach to Zonotope Intersection. - Joe Suzuki:
A Generalization of the Chow-Liu Algorithm and its Application to Statistical Learning. - Mahdi Cheraghchi:
Improved Constructions for Non-adaptive Threshold Group Testing. - Nikhil Bansal:
Constructive Algorithms for Discrepancy Minimization. - Emmanuel Abbe, Lizhong Zheng:
A Coordinate System for Gaussian Networks. - Shenghao Yang, Siu-Wai Ho, Jin Meng, En-Hui Yang:
Linear Operator Channels over Finite Fields. - Jean-Marc Seigneur, Xavier Titi:
Reputation-based Telecommunication Network Selection. - Jean-Marc Seigneur:
Local ePolitics Reputation Case Study. - Christos H. Papadimitriou, Yaron Singer:
Budget Feasible Mechanisms. - Hamed Haddadi:
Fighting Online Click-Fraud Using Bluff Ads. - Nelson Antunes, Christine Fricker, Philippe Robert, James Roberts:
Upstream traffic capacity of a WDM EPON under online GATE-driven scheduling. - Nelson Antunes, Christine Fricker, Philippe Robert, James Roberts:
Traffic Capacity of Large WDM Passive Optical Networks. - Shamimul Qamar, Kumar Manoj:
Impact of Random Loss on TCP Performance in Mobile Ad hoc Networks (IEEE 802.11), A Simulation-Based Analysis. - D. Jayanthi, N. Devi, S. SwarnaParvathi:
Automatic diagnosis of retinal diseases from color retinal images. - Rashid Sheikh, Beerendra Kumar, Durgesh Kumar Mishra:
Changing Neighbors k Secure Sum Protocol for Secure Multi Party Computation. - R. Dhanalakshmi, K. Thaiyalnayaki:
Dual Watermarking Scheme with Encryption. - P. K. Suri, Gurdev Singh:
Effort minimization in UI development by reusing existing DGML based UI design for qualitative software development. - Md. Rafiqul Islam, A. W. Naji, A. A. Zaidan, B. B. Zaidan:
New System for Secure Cover File of Hidden Data in the Image Page within Executable File Using Statistical Steganography Techniques. - S. M. Ramesh, A. Shanmugam:
Medical Image Compression using Wavelet Decomposition for Prediction Method. - Periyathambi Ezhumalai, S. Manojkumar, C. Arun, P. Sakthivel, D. Sridharan:
High Performance Hybrid Two Layer Router Architecture for FPGAs Using Network On Chip. - Jatinder Singh, Savita Gupta, Lakhwinder Kaur:
A MAC Layer Based Defense Architecture for Reduction of Quality (RoQ) Attacks in Wireless LAN. - Olanrewaju Jelili Oyelade, Olufunke O. Oladipupo, Ibidun Christiana Obagbuwa:
Application of k Means Clustering algorithm for prediction of Students Academic Performance. - Jeffery L. Shipman, Martin Klein, Michael L. Nelson:
Using Web Page Titles to Rediscover Lost Web Pages. - Christoph Ambühl, Bernd Gärtner, Bernhard von Stengel:
Optimal Projective Algorithms for the List Update Problem. - Alejandro Chinea Manrique De Lara:
Modeling the Probability of Failure on LDAP Binding Operations in Iplanet Web Proxy 3.6 Server. - Kenza Guenda:
The Permutation Groups and the Equivalence of Cyclic and Quasi-Cyclic Codes. - Mukund Sundararajan, Qiqi Yan:
Robust Mechanisms for Risk-Averse Sellers. - Ajita Rattani, Dakshina Ranjan Kisku, Manuele Bicego, Massimo Tistarelli:
Feature Level Fusion of Face and Fingerprint Biometrics. - A. Jagadeesan, K. Duraiswamy:
Secured Cryptographic Key Generation From Multimodal Biometrics Feature Level Fusion Of Fingerprint And Iris. - Tomás Brázdil, Petr Jancar, Antonín Kucera:
Reachability Games on Extended Vector Addition Systems with States. - Jörg Endrullis, Dimitri Hendriks, Jan Willem Klop:
Modular Construction of Fixed Point Combinators and Clocked Boehm Trees. - Chris Gray, Frank Kammer, Maarten Löffler, Rodrigo I. Silveira:
Removing Local Extrema from Imprecise Terrains. - Sivan Gleichman, Yonina C. Eldar:
Blind Compressed Sensing. - Luca De Feo, Éric Schost:
Fast Arithmetics in Artin-Schreier Towers over Finite Fields. - Zoltán Kása:
Generating and ranking of Dyck words. - Evgeny D. Norman:
Assessment Of The Wind Farm Impact On The Radar. - Chun-Hung Liu, Jeffrey G. Andrews:
Multicast Outage Probability and Transmission Capacity of Multihop Wireless Networks. - S. Prakasha, R. Selvarani:
Performance Analysis of View Maintenance Techniques for DW. - T. P. Pushpavathi, N. R. Shashi Kumar, R. Selvarani:
IT in Power Sector A KPCL Implementation. - Chenwei Wang, Tiangao Gou, Syed Ali Jafar:
Aiming Perfectly in the Dark - Blind Interference Alignment through Staggered Antenna Switching. - Zoltán Kása:
On the d-complexity of strings. - Marco Aldinucci, Emilio Tuosto:
Toward a Formal Semantics for Autonomic Components. - Mira-Cristiana Anisiu, Valeriu Anisiu, Zoltán Kása:
Properties of palindromes in finite words. - Mira-Cristiana Anisiu, Zoltán Blázsik, Zoltán Kása:
Maximal Complexity of Finite Words. - David Doty, Lila Kari, Benoît Masson:
Negative Interactions in Irreversible Self-Assembly. - Dakshina Ranjan Kisku, Jamuna Kanta Sing, Phalguni Gupta:
Multibiometrics Belief Fusion. - Ruslan Salakhutdinov, Nathan Srebro:
Collaborative Filtering in a Non-Uniform World: Learning with the Weighted Trace Norm. - Richard A. Formato:
Comparative Results: Group Search Optimizer and Central Force Optimization. - Jubin Jose, Sriram Vishwanath:
Distributed Rate Allocation for Wireless Networks. - Emmanuel Lochin, Tanguy Pérennou, Laurent Dairaine:
When Should I Use Network Emulation? - N. R. Shashi Kumar, T. P. Pushpavathi, R. Selvarani:
Dynamic Cognitive Process Application of Blooms Taxonomy for Complex Software Design in the Cognitive Domain. - Massimo Franceschet:
PageRank: Stand on the shoulders of giants. - Luca Aceto, Matteo Cimini, Anna Ingólfsdóttir:
A Bisimulation-based Method for Proving the Validity of Equations in GSOS Languages. 1-16 - Magnus Johansson, Björn Victor, Joachim Parrow:
A Fully Abstract Symbolic Semantics for Psi-Calculi. 17-31 - Mohammad Reza Mousavi:
Causality in the Semantics of Esterel: Revisited. 32-45 - Filippo Bonchi, Fabio Gadducci, Giacoma Valentina Monreale:
On Barbs and Labels in Reactive Systems. 46-61 - Iain C. C. Phillips, Irek Ulidowski:
Reverse Bisimulations on Stable Configuration Structures. 62-76 - Gilles Dowek, César A. Muñoz, Camilo Rocha:
Rewriting Logic Semantics of a Plan Execution Language. 77-91 - Michel A. Reniers, Tim A. C. Willemse:
Analysis of Boolean Equation Systems through Structure Graphs. 92-107 - Raphaël Chenouard, Laurent Granvilliers, Ricardo Soto:
Model-Driven Constraint Programming. - Phuong Nguyen, Stephen A. Cook:
The Complexity of Proving the Discrete Jordan Curve Theorem. - Emil Saucan, Eli Appleboim, Yehoshua Y. Zeevi:
Geometric approach to sampling and communication. - Ping Xia, Vikram Chandrasekhar, Jeffrey G. Andrews:
Open vs Closed Access Femtocells in the Uplink. - Salah A. Aly, Alexei E. Ashikhmin:
Nonbinary Quantum Cyclic and Subsystem Codes Over Asymmetrically-decohered Quantum Channels. - Ebad Ahmed, Aaron B. Wagner:
Erasure Multiple Descriptions. - Bartek Klin, Pawel Sobocinski:
Proceedings Sixth Workshop on Structural Operational Semantics, SOS 2009, Bologna, Italy, August 31, 2009. EPTCS 18, 2009 [contents] - Abhishek Kotnala, R. Selvarani:
Cognitive Process of Comprehension in Requirement Analysis in IT Applications. - T. P. Pushpavathi, R. Selvarani, N. R. Shashi Kumar:
GPRS Video Streaming Surveillance System GVSS. - N. R. Shashi Kumar, R. Selvarani, T. P. Pushpavathi:
GPRS Based Intranet Remote Administration GIRA. - Raphaël Chenouard, Laurent Granvilliers, Ricardo Soto:
Rewriting Constraint Models with Metamodels. - Christine Bachoc, Gilles Zémor:
Bounds for binary codes relative to pseudo-distances of k points. - R. Selvarani, Wahida Banu, Kamakshi Prasad:
Quantifying the Deign Quality of Object Oriented System The metric based rules and heuristic. - Nadia Fawaz, Muriel Médard:
On the Non-Coherent Wideband Multipath Fading Relay Channel. - Ayfer Özgür, Olivier Lévêque, David N. C. Tse:
Linear Capacity Scaling in Wireless Networks: Beyond Physical Limits? - Arthur Sale, Marc Couture, Elóy Rodrigues, Leslie Carr, Stevan Harnad:
Open Access Mandates and the "Fair Dealing" Button. - Marc Mezzarobba:
NumGfun: a Package for Numerical and Analytic Computation with D-finite Functions. - Raphaël Chenouard, Laurent Granvilliers, Ricardo Soto:
Using ATL to define advanced and flexible constraint model transformations. - Hai-Feng Guo, Wen Zheng, Mahadevan Subramaniam:
L2C2: Logic-based LSC Consistency Checking. - Edward G. Coffman Jr., Philippe Robert, Florian Simatos, Shuzo Tarumi, Gil Zussman:
Channel Fragmentation in Dynamic Spectrum Access Systems - a Theoretical Study. - Pedro A. Ortega, Daniel A. Braun:
Convergence of Bayesian Control Rule. - Tanmoy Chakraborty, Eyal Even-Dar, Sudipto Guha, Yishay Mansour, S. Muthukrishnan:
Selective Call Out and Real Time Bidding. - Nissim Halabi, Guy Even:
LP Decoding of Regular LDPC Codes in Memoryless Channels. - Daniel de Carvalho, Lorenzo Tortora de Falco:
The relational model is injective for Multiplicative Exponential Linear Logic (without weakenings). - Mohsen Toorani, Ali Asghar Beheshti Shirazi:
SSMS - A Secure SMS Messaging Protocol for the M-payment Systems. - Mehdi Chehel Amirani, Mohsen Toorani, Asghar Beheshti:
A new approach to content-based file type detection. - Mohsen Toorani, Ali Asghar Beheshti Shirazi:
Solutions to the GSM Security Weaknesses. - Mohsen Toorani:
SMEmail - A New Protocol for the Secure E-mail in Mobile Environments. - Fabrizio Caruso:
Factorization of Non-Commutative Polynomials. - Vitaly Feldman:
A Complete Characterization of Statistical Query Learning with Applications to Evolvability. - Seyed Hamed Hassani, Kasra Alishahi, Rüdiger L. Urbanke:
On the scaling of Polar Codes: II. The behavior of un-polarized channels. - Sung Hoon Lim, Young-Han Kim, Abbas El Gamal, Sae-Young Chung:
Noisy Network Coding. - Quanyan Zhu, Carol J. Fung, Raouf Boutaba, Tamer Basar:
A Distributed Sequential Algorithm for Collaborative Intrusion Detection Networks. - Lili Zhang, Jinhua Jiang, Andrea J. Goldsmith, Shuguang Cui:
Study of Gaussian Relay Channels with Correlated Noises. - Mahmud Shahriar Hossain, Michael Narayan, Naren Ramakrishnan:
Efficiently Discovering Hammock Paths from Induced Similarity Networks. - Jeroen Keiren, Michel A. Reniers, Tim A. C. Willemse:
Structural Analysis of Boolean Equation Systems. - Arun Sridharan, Can Emre Koksal, Elif Uysal-Biyikoglu:
A Greedy link scheduler for Wireless Networks having Gaussian Broadcast and Multiple Access Channels. - Pascal Vallet, Philippe Loubaton, Xavier Mestre:
Improved subspace estimation for multivariate observations of high dimension: the deterministic signals case. - Benjamin Piwowarski, Ingo Frommholz, Mounia Lalmas, Keith van Rijsbergen:
Exploring a Multidimensional Representation of Documents and Queries (extended version). - Nicholas Ruozzi, Sekhar Tatikonda:
Convergent and Correct Message Passing Schemes for Optimization Problems over Graphical Models. - Christine Chevallereau, Jessy W. Grizzle, Ching-Long Shih:
Asymptotically Stable Walking of a Five-Link Underactuated 3D Bipedal Robot. - Mohsen Toorani, Ali Asghar Beheshti Shirazi:
LPKI - A Lightweight Public Key Infrastructure for the Mobile Environments. - Mohsen Toorani, Ali Asghar Beheshti Shirazi:
Cryptanalysis of an Efficient Signcryption Scheme with Forward Secrecy Based on Elliptic Curve. - Yusuke Watanabe, Kenji Fukumizu:
Graph Zeta Function in the Bethe Free Energy and Loopy Belief Propagation. - Sugumar Murugesan, Philip Schniter, Ness B. Shroff:
Multiuser Scheduling in a Markov-modeled Downlink using Randomly Delayed ARQ Feedback. - Mohsen Toorani, Asghar Beheshti:
A Directly Public Verifiable Signcryption Scheme based on Elliptic Curves. - Nirmalendu Bikas Sinha, Sourav Chakraborty, P. K. Sutradhar, R. Bera, Monojit Mitra:
Optimization of MIMO detectors: Unleashing the multiplexing gain. - Raungrong Suleesathira:
Co-channel Interference Cancellation for Space-Time Coded OFDM Systems Using Adaptive Beamforming and Null Deepening. - Mohammed A. Alhabeeb, Abdullah Mohammed Almuhaideb, Phu Dung Le:
Holistic Approach for Critical System Security: Flooding Prevention and Malicious Packet Stopping. - Boris S. Verkhovsky:
Design of Optimal Topology of Satellite-Based Terrestrial Communication Networks. - Md. M. Hossain, J. Hossain:
Error Performance Analysis to Increase Capacity of A Cellular System Using SDMA. - Mohsen Tarighi, Seyed A. Motamedi, Saeed Sharifian:
A new model for virtual machine migration in virtualized cluster server based on Fuzzy Decision Making. - Shamim Ripon, Michael J. Butler:
Deriving Relationship Between Semantic Models - An Approach for cCSP. - Sargam Parmar, Bhuvan Unhelkar:
Performance Comparisions of ICA Algorithms to DS-CDMA Detection. - Ijaj Md. Laisuzzaman, Nahid Imran, Abdullah Al Nahid, Md. Ziaul Amin, Md Abdul Alim:
The Framework for Implementing ECommerce: The Role of Bank and Telecom in Bangladesh. - Asok De, N. S. Raghava, Sagar Malhotra, Pushkar Arora, Rishik Bazaz:
Effect of different substrates on Compact stacked square Microstrip Antenna. - Ha Ryong Song, Vladimir Shin:
Limited Memory Prediction for Linear Systems with Different types of Observation. - S. N. Singh, A. K. Singh:
FPGA Based Sinusoidal Pulse Width Modulated Waveform Generation for Solar (PV) Rural Home Power Inverter. - Bertrand Georgeot, Olivier Giraud, Dima Shepelyansky:
Spectral properties of the Google matrix of the World Wide Web and other directed networks. - Alireza Nasiri Avanaki:
Iterative exact global histogram specification and SSIM gradient ascent: a proof of convergence, step size and parameter selection. - Andrew Guillory, Jeff A. Bilmes:
Interactive Submodular Set Cover. - Patrick Marsch, Gerhard P. Fettweis:
Uplink CoMP under a Constrained Backhaul and Imperfect Channel Knowledge. - Subhash C. Kak:
Aryabhata's Mathematics. - Jean-Louis Krivine:
Algèbres de réalisabilité: un programme pour bien ordonner R. - Bike Xie, Mihaela van der Schaar, Richard D. Wesel:
Minimizing weighted sum delay for one-to-many file transfer in peer-to-peer networks. - Luca Vercelli:
On the complexity of stratified logics. - Vincenzo Auletta, Diodato Ferraioli, Francesco Pasquale, Giuseppe Persiano:
Mixing Time and Stationary Expected Social Welfare of Logit Dynamics. - Paul Balanoiu:
Enhancing Privacy for Biometric Identification Cards. - Ali Khajeh-Hosseini, David Greenwood, Ian Sommerville:
Cloud Migration: A Case Study of Migrating an Enterprise IT System to IaaS. - Bruce E. Hajek, Ji Zhu:
The Missing Piece Syndrome in Peer-to-Peer Communication. - Marek Karpinski, J. Ian Munro, Yakov Nekrich:
Range Reporting for Moving Points on a Grid. - Ryuhei Mori:
Properties and Construction of Polar Codes. - Thomas Holenstein, Grant Schoenebeck:
General Hardness Amplification of Predicates and Puzzles. - Ilan Newman, Yuri Rabinovich:
On Cut Dimension of ℓ1 Metrics and Volumes, and Related Sparsification Techniques. - Mohsen Toorani, Abolfazl Falahati:
A Secure Variant of the Hill Cipher. - Xingkai Bao, Jing Li:
COTAR: An Accurate, Cost-Effective Cooperative Wireless Localization Strategy for Mobile Nodes. - Xingkai Bao, Jing Li:
Generalized Adaptive Network Coded Cooperation (GANCC): A Unified Framework for Network Coding and Channel Coding. - Andrew Drucker:
A PCP Characterization of AM. - Manas A. Pathak, Bhiksha Raj:
Privacy-Preserving Protocols for Eigenvector Computation. - Ivan Jureta, Alberto Siena, John Mylopoulos, Anna Perini, Angelo Susi:
Theory of Regulatory Compliance for Requirements Engineering. - Sara Nasso, Francesco Silvestri, Francesco Tisiot, Barbara Di Camillo, Andrea Pietracaprina, Gianna Maria Toffolo:
An Optimized Data Structure for High Throughput 3D Proteomics Data: mzRTree. - Andrea Clementi, Angelo Monti, Riccardo Silvestri:
Fast Flooding over Manhattan. - (Withdrawn) Improved bounds for stochastic matching.
- Lila Kari, Benoît Masson:
Polyominoes Simulating Arbitrary-Neighborhood Zippers and Tilings. - Antonia Pérez Arias, Uwe D. Hanebeck, Peter Ehrhardt, Stefan Hengst, Tobias Kretz, Peter Vortisch:
Extended Range Telepresence for Evacuation Training in Pedestrian Simulations. - Michel Grabisch:
The lattice of embedded subsets. - Prahladh Harsha, Moses Charikar, Matthew Andrews, Sanjeev Arora, Subhash Khot, Dana Moshkovitz, Lisa Zhang, Ashkan Aazami, Dev Desai, Igor Gorodezky, Geetha Jagannathan, Alexander S. Kulikov, Darakhshan J. Mir, Alantha Newman, Aleksandar Nikolov, David Pritchard, Gwen Spencer:
Limits of Approximation Algorithms: PCPs and Unique Games (DIMACS Tutorial Lecture Notes). - Frédérique Bassino, Mathilde Bouvel, Adeline Pierrot, Dominique Rossin:
Deciding the finiteness of the number of simple permutations contained in a wreath-closed class is polynomial. - Shuchi Chawla, David L. Malec, Balasubramanian Sivan:
The power of randomness in Bayesian optimal mechanism design. - Haengjin Choe:
Proposal new area of study by connecting between information theory and Weber-Fechner law. - Yair Noam, Amir Leshem, Hagit Messer:
Competitive Spectrum Management with Incomplete Information. - Dömötör Pálvölgyi:
Partitionability to two trees is NP-complete. - Prasanna Madhusudhanan, Juan G. Restrepo, Youjian Eugene Liu, Timothy X. Brown, Kenneth R. Baker:
Generalized Carrier to Interference Ratio Analysis for the Shotgun Cellular System. - Sonal Shrivastava, K. R. Pardasani, M. M. Malik:
SVM Model for Identification of human GPCRs. - Deepak Aggarwal, Kanwalvir Singh Dhindsa:
Effect of Embedding Watermark on Compression of the Digital Images. - Md. Imran Hossain, Syed Golam Rajib:
Supervised Learning of Digital image restoration based on Quantization Nearest Neighbor algorithm. - (Withdrawn) Performance analysis of Zone Routing Protocol in respect of Genetic Algorithm and Estimation of Distribution Algorithm.
- Cyrille Chavet, Philippe Coussy, Eric Martin, Pascal Urard:
Static Address Generation Easing: a Design Methodology for Parallel Interleaver Architectures. - Lucian Bercea, Gabriela Nemtoi, Ciprian Ungureanu:
The government of state's power bodies by means of the Internet. - H. R. Bhagyalakshmi, M. K. Venkatesha:
Optimized reversible BCD adder using new reversible logic gates. - N. Holban, V. Ditoiu, E. Iancu:
Determining the quality evaluation procedures using the expert systems. - Sheikh Muhammad Saqib, Shakeel Ahmad, Shahid Hussain, Bashir Ahmad, Arjamand Bano:
Improvement in RUP Project Management via Service Monitoring: Best Practice of SOA. - V. Grosu, E. Hlaciuc, E. Iancu, R. Petris, M. Socoliuc:
The Role of the XBRL Standard in Optimizing the Financial Reporting. - Shakeel Ahmad, Adli Mustafa, Zahid Awan, Bashir Ahmad, Najeebullah, Arjamand Bano:
E-Courseware Design and Implementation Issues and Strategies. - M. Habib Ullah, Md. Niamul Bari, A. Unggul Priantoro:
FPGA Implementation of LS Code Generator for CDM Based MIMO Channel Sounder. - Rashid Sheikh, Beerendra Kumar, Durgesh Kumar Mishra:
A Modified ck-Secure Sum Protocol for Multi-Party Computation. - Akshay K. Ojha, A. K. Das:
Multi-Objective Geometric Programming Problem Being Cost Coefficients as Continous Function with Weighted Mean Method. - Parneeta Dhaliwal, M. P. S. Bhatia, Priti Bansal:
A Cluster-based Approach for Outlier Detection in Dynamic Data Streams (KORM: k-median OutlieR Miner). - Manoj Kumar Singh:
Nature inspired artificial intelligence based adaptive traffic flow distribution in computer network. - Rio G. L. D'Souza, K. Chandrasekaran, A. Kandasamy:
Improved NSGA-II Based on a Novel Ranking Scheme. - Ayatullah Faruk Mollah, Subhadip Basu, Mita Nasipuri:
Text/Graphics Separation and Skew Correction of Text Regions of Business Card Images for Mobile Devices. - Ram Sarkar, Nibaran Das, Subhadip Basu, Mahantapas Kundu, Mita Nasipuri, Dipak Kumar Basu:
Word level Script Identification from Bangla and Devanagri Handwritten Texts mixed with Roman Script. - Salvatore Rampone, Ciro Russo:
A fuzzified BRAIN algorithm for learning DNF from incomplete data. - Bastian Steudel, Dominik Janzing, Bernhard Schölkopf:
Causal Markov condition for submodular information measures. - Ersen Ekrem, Sennur Ulukus:
An Alternative Proof for the Capacity Region of the Degraded Gaussian MIMO Broadcast Channel. - Shi Li:
On constant factor approximation for earth mover distance over doubling metrics. - Nibaran Das, Bindaban Das, Ram Sarkar, Subhadip Basu, Mahantapas Kundu, Mita Nasipuri:
Handwritten Bangla Basic and Compound character recognition using MLP and SVM classifier. - Mohammad Syafrullah, Naomie Salim:
Improving Term Extraction Using Particle Swarm Optimization Techniques. - F. A. Hla Myo Tun, S. B. Aye Thandar Phyo, T. C. Zaw Min Naing:
Equal Power Distribution and Dynamic Subcarrier Assignment in OFDM Using Minimum Channel Gain Flow with Robust Optimization Uncertain Demand. - K. Perumal, R. Bhaskaran:
Supervised Classification Performance of Multispectral Images. - Hamdan O. Alanazi, Rafidah Md. Noor, B. B. Zaidan, A. A. Zaidan:
Intrusion Detection System: Overview. - Satadal Saha, Subhadip Basu, Mita Nasipuri, Dipak Kr. Basu:
A Hough Transform based Technique for Text Segmentation. - Mahmoud Elnajjar, A. A. Zaidan, B. B. Zaidan, Mohamed Elhadi M. Sharif, Hamdan O. Alanazi:
Optimization Digital Image Watermarking Technique for Patent Protection. - Emmanuel Agullo, Henricus Bouwmeester, Jack J. Dongarra, Jakub Kurzak, Julien Langou, Lee Rosenberg:
Towards an Efficient Tile Matrix Inversion of Symmetric Positive Definite Matrices on Multicore Architectures. - Alina Beygelzimer, John Langford, Lihong Li, Lev Reyzin, Robert E. Schapire:
An Optimal High Probability Algorithm for the Contextual Bandit Problem. - Ozan Kahramanogullari:
Flux Analysis in Process Models via Causality. 20-39 - Robin Donaldson, Muffy Calder:
Modelling and Analysis of Biochemical Signalling Pathway Cross-talk. 40-54 - Federica Ciocchetta, Maria Luisa Guerriero, Jane Hillston:
Investigating modularity in the analysis of process algebra models of biochemical systems. 55-69 - Fiete Haack, Stefan Leye, Adelinde M. Uhrmacher:
A flexible architecture for modeling and simulation of diffusional association. 70-84 - Judit Zámborszky, Corrado Priami:
BlenX-based compositional modeling of complex reaction mechanisms. 85-102 - Sara Capecchi, Angelo Troina:
Types for BioAmbients. 103-115 - Chiara Bodei, Andrea Bracciali, Davide Chiarugi, Roberta Gori:
A Taxonomy of Causality-Based Biological Properties. 116-133 - Lila Kari, Benoît Masson, Shinnosuke Seki:
Properties of Pseudo-Primitive Words and their Applications. - Martianus Frederic Ezerman, San Ling, Patrick Solé:
Additive Asymmetric Quantum Codes. - Ashutosh Nayyar, Aditya Mahajan, Demosthenis Teneketzis:
Optimal Control Strategies in Delayed Sharing Information Structures. - Saurav Chakraborty, Subhadip Basu:
Design of a Smart Unmanned Ground Vehicle for Hazardous Environments. - Gokarna Sharma, Brett Estrade, Costas Busch:
Window-Based Greedy Contention Management for Transactional Memory. - John Iacono, Özgür Özkan:
Mergeable Dictionaries. - (Withdrawn) A Quantile-Based Sequential Feedback Scheme via Overhearing in Multicarrier Access Networks.
- Saif K. Mohammed, Emanuele Viterbo, Yi Hong, Ananthanarayanan Chockalingam:
Precoding by Pairing Subchannels to Increase MIMO Capacity with Discrete Input Alphabets. - Xu Liu, Lin Yuan, Jianfeng Zhan, Bibo Tu, Dan Meng:
Automatic Performance Debugging of SPMD Parallel Programs. - José L. Balcázar:
Redundancy, Deduction Schemes, and Minimum-Size Bases for Association Rules. - Maurice Margenstern:
A weakly universal cellular automaton in the hyperbolic 3D space with three states. - Haoyang Wu:
Signaling games with pattern recognition. - Wojciech Mazurczyk, Krzysztof Cabaj, Krzysztof Szczypiorski:
What are suspicious VoIP delays? - Reza Asvadi, Amir H. Banihashemi, Mahmoud Ahmadian-Attari:
Lowering the Error Floor of LDPC Codes Using Cyclic Liftings. - Ayalvadi Ganesh, Sarah Lilienthal, D. Manjunath, Alexandre Proutière, Florian Simatos:
Load Balancing via Random Local Search in Closed and Open systems. - Sourav Dutta, Arnab Bhattacharya:
Mining Statistically Significant Substrings Based on the Chi-Square Measure. - Amelia Carolina Sparavigna, Roberto Marazzato:
CLD-shaped Brushstrokes in Non-Photorealistic Rendering. - Jonathan Dees, Robert Geisberger, Peter Sanders, Roland Bader:
Defining and Computing Alternative Routes in Road Networks. - Abhisekh Sankaran, Supratik Chakraborty:
On Semantic Generalizations of the Bernays-Schönfinkel-Ramsey Class with Finite or Co-finite Spectra. - Dieter Mitsche, Maria Saumell, Rodrigo I. Silveira:
On the Number of Higher Order Delaunay Triangulations. - Xin Tong, Joey Paquet, Serguei A. Mokhov:
Complete Context Calculus Design and Implementation in GIPSY. - Joe Suzuki:
Nonparametric Estimation and On-Line Prediction for General Stationary Ergodic Sources. - Galen Reeves, Michael Gastpar:
Approximate Sparsity Pattern Recovery: Information-Theoretic Lower Bounds. - Frank Dehne, Hamidreza Zaboli:
Deterministic Sample Sort For GPUs. - Keigo Takeuchi, Mikko Vehkaperä, Toshiyuki Tanaka, Ralf R. Müller:
Large-System Analysis of Joint Channel and Data Estimation for MIMO DS-CDMA Systems. - Alex S. Leong, Subhrakanti Dey:
On Scaling Laws of Diversity Schemes in Decentralized Estimation. - Frank Dehne, Kumanan Yogaratnam:
Exploring the Limits of GPUs With Parallel Graph Algorithms. - Abdelwaheb Miled, Ahmed Ouertani:
Extended gcd of quadratic integers. - Joaquim Borges, Josep Rifà, Victor A. Zinoviev:
On linear q-ary completely regular codes with rho=2 and dual antipodal. - Livia Jakaite, Vitaly Schetinin, Carsten Maple:
Feature Importance in Bayesian Assessment of Newborn Brain Maturity from EEG. - Rangarajan Vasudevan, Ajith Abraham, Sugata Sanyal:
A Novel Scheme for Secured Data Transfer Over Computer Networks. - Rafael Caballero, John P. Gallagher:
Proceedings of the 19th Workshop on Logic-based methods in Programming Environments (WLPE 2009). CoRR abs/1002.4535 (2010) - Ashish Khisti:
Interference Alignment for the Multi-Antenna Compound Wiretap Channel. - Valerie King, Jared Saia:
Breaking the O(n^2) Bit Barrier: Scalable Byzantine agreement with an Adaptive Adversary. - Christophe Giraud, Vincent Verneuil:
Atomicity Improvement for Elliptic Curve Scalar Multiplication. - Hubie Chen:
Bounded Rationality, Strategy Simplification, and Equilibrium. - Vadim Nedzvetski:
Using Information Semantic Systems for Absolutely Secure Processing. - Arie Gurfinkel, Marsha Chechik:
Robust Vacuity for Branching Temporal Logic. - Ozgur E. Akman, Maria Luisa Guerriero, Laurence Loewe, Carl Troein:
Complementary approaches to understanding the plant circadian clock. 1-19 - Jordan L. Boyd-Graber, David M. Blei:
Syntactic Topic Models. - Marco Aldinucci, Marco Danelutto, Peter Kilpatrick, Massimiliano Meneghin, Massimo Torquati:
Accelerating sequential programs using FastFlow and self-offloading. - Dustin Wehr:
Pebbling and Branching Programs Solving the Tree Evaluation Problem. - Neelam Srivastava:
Challenges of Next-Generation Wireless Sensor Networks and its impact on Society. - Seokhyoung Lee, Vladimir Shin:
Low-complexity Fusion Filtering for Continuous-Discrete Systems. - Antoine Bret:
Transferring a symbolic polynomial expression from Mathematica to Matlab. - Md. M. Hossain, Md. M. Rahman, Md. A. Alim:
Performance Analysis of Uplink & Downlink Transmission in CDMA System. - Graham N. C. Kirby, Alan Dearle, Angus Macdonald, Alvaro A. A. Fernandes:
An Approach to Ad hoc Cloud Computing. - Olav Geil, Carlos Munuera, Diego Ruano, Fernando Torres:
On the order bound for one-point AG codes. - Horatiu Stefan Grif:
Neural daylight control system. - Changbo Chen, James H. Davenport, John P. May, Marc Moreno Maza, Bican Xia, Rong Xiao:
Triangular Decomposition of Semi-algebraic Systems. - Ricardo Bezerra de Andrade e Silva:
Gaussian Process Structural Equation Models with Latent Variables. - Florian S. Gysin, Adrian Kuhn:
A Trustability Metric for Code Search based on Developer Karma. - Yann Desalle, Bruno Gaume, Karine Duvignau:
SLAM : Solutions lexicales automatique pour métaphores. - (Withdrawn) Nonlinear System Identification and Behavioral Modeling.
- Fahad Ahmed Al-Zahrani, Hassan M. Mustafa, Ayoub Al-Hamadi:
On Analysis and Evaluation of Multi-Sensory Cognitive Learning of a Mathematical Topic Using Artificial Neural Networks. - Bharat Adsul, Ch. Sobhan Babu, Jugal Garg, Ruta Mehta, Milind A. Sohoni:
Nash equilibria in Fisher market. - Ahmed Mohamedou, Mohamed Othman:
Analytical Evaluation of Unfairness Problem in Wireless LANs. - Prasun Ghosal, Malabika Biswas, Manish Biswas:
Hardware Implementation of TDES Crypto System with On Chip Verification in FPGA. - Arabinda Roy, Kasturi Ghosh, Sekhar Mondal, Baidyanath Ray:
Processing of Communication Signal Using Operational Transconductance Amplifier. - Md. Mainul Islam Mamun, Tarek Hasan-Al-Mahmud, Sumon Kumar Debnath, Md Zahidul Islam:
Analyzing the Low Power Wireless Links for Wireless Sensor Networks. - Matthew J. Streeter, H. Brendan McMahan:
Less Regret via Online Conditioning. - Hulya Seferoglu, Athina Markopoulou:
Improving the Performance of TCP over Coded Wireless Networks. - John T. Gill III, William Wu:
Twenty Questions Games Always End With Yes. - H. Brendan McMahan, Matthew J. Streeter:
Adaptive Bound Optimization for Online Convex Optimization. - Emanuela Merelli, Paola Quaglia:
Proceedings Third Workshop From Biology To Concurrency and back, FBTC 2010, Paphos, Cyprus, 27th March 2010. EPTCS 19, 2010 [contents] - Lila Kari, Shinnosuke Seki, Zhi Xu:
Triangular Self-Assembly. - Ersen Ekrem, Sennur Ulukus:
Capacity Region of Gaussian MIMO Broadcast Channels with Common and Confidential Messages. - Eric Bach, Shuchi Chawla, Seeun Umboh:
Threshold rules for online sample selection. - Emil Saucan:
Curvature based triangulation of metric measure spaces. - Katharina Anna Zweig, Gergely Palla, Tamás Vicsek:
What makes a phase transition? Analysis of the random satisfiability problem. - Simon Foucart, Alain Pajor, Holger Rauhut, Tino Ullrich:
The Gelfand widths of ℓp-balls for 0<p≤1. - Elchanan Mossel, Omer Tamuz:
Efficient Bayesian Learning in Social Networks with Gaussian Estimators. - Sidney Redner:
On the meaning of the h-index. - Ciro Russo:
Quantale Modules and their Operators, with Applications. - Lucas Gerin:
Random sampling of lattice paths with constraints, via transportation. - Judith Wiesinger, Didier Sornette, Jeffrey Satinover:
Reverse Engineering Financial Markets with Majority and Minority Games using Genetic Algorithms. - Philip Maymin:
Markets are efficient if and only if P = NP. - Bhalchandra S. Pujari:
Exploiting Grids for applications in Condensed Matter Physics. - Amrita Priyam, B. M. Karan, G. Sahoo:
A Probabilistic Model For Sequence Analysis. - Salman Beigi:
Entanglement-assisted zero-error capacity is upper bounded by the Lovasz theta function. - Runyao Duan, Simone Severini, Andreas J. Winter:
Zero-error communication via quantum channels, non-commutative graphs and a quantum Lovasz theta function. - Sushil Subramanian:
Compressed Sensing for Sparse Underwater Channel Estimation: Some Practical Considerations. - Tobias Opthof, Loet Leydesdorff:
Caveats for the journal and field normalizations in the CWTS ("Leiden") evaluations of research performance. - Torsten A. Ensslin, Mona Frommert:
Reconstruction of signals with unknown spectra in information field theory with parameter uncertainty. - Wim van Dam, Qingqing Yuan:
Quantum Online Memory Checking. - Charo I. Del Genio, Hyunju Kim, Zoltán Toroczkai, Kevin E. Bassler:
Efficient and exact sampling of simple graphs with given arbitrary degree sequence. - Tian Qiu, Guang Chen, Li-Xin Zhong, Xiao-Run Wu:
Cooperation in the Snowdrift Game on Directed Small-World Networks. - Nikolaos Fountoulakis, Konstantinos Panagiotou:
Rumor Spreading on Random Regular Graphs and Expanders. - Eva Kopecká, Daniel Reem, Simeon Reich:
Zone diagrams in compact subsets of uniformly convex normed spaces. - Gowtham Bellala, Suresh K. Bhavnani, Clayton Scott:
Query Learning with Exponential Query Costs. - Jasmina Hasanhodzic, Andrew W. Lo, Emanuele Viola:
Is It Real, or Is It Randomized?: A Financial Turing Test. - Lek-Heng Lim, Pierre Comon:
Multiarray Signal Processing: Tensor decomposition meets compressed sensing. - D. L. Shepelyansky, O. V. Zhirov:
Towards Google matrix of brain. - Christoph Koutschan, Manuel Kauers, Doron Zeilberger:
Proof of George Andrews's and David Robbins's q-TSPP Conjecture. - Huan Xu, Constantine Caramanis, Shie Mannor:
Principal Component Analysis with Contaminated Data: The High Dimensional Case. - Jie Lu, Choon Yik Tang, Paul R. Regier, Travis D. Bow:
Gossip Algorithms for Convex Consensus Optimization over Networks. - Vasco Brattka, Matthew de Brecht, Arno Pauly:
Closed Choice and a Uniform Low Basis Theorem. - Max A. Alekseyev:
On the intersections of Fibonacci, Pell, and Lucas numbers.
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.