default search action
CoRR, October 2014
- Fabien Gouyon, Bob L. Sturm, João Lobato Oliveira, Nuno Hespanhol, Thibault Langlois:
On Evaluation Validity in Music Autotagging. - Thibaud Antignac, Daniel Le Métayer:
Privacy by Design: From Technologies to Architectures (Position Paper). - Bartlomiej Blaszczyszyn, Mohamed Kadhem Karray:
What frequency bandwidth to run cellular network in a given country? - a downlink dimensioning problem. - Ramoni O. Adeogun:
A Robust MUSIC Based Scheme for Interference Location in Satellite Systems with Multibeam Antennas. - Jie Fu, Ufuk Topcu:
Integrating active sensing into reactive synthesis with temporal logic constraints under partial observations. - Yao Sun, Dingkang Wang, Zhenyu Huang, Dongdai Lin:
A Monomial-Oriented GVW for Computing Gröbner Bases. - Jingchu Liu, Tao Zhao, Sheng Zhou, Yu Cheng, Zhisheng Niu:
CONCERT: A Cloud-Based Architecture for Next-generation Cellular Systems. - Atul Kanaujia:
Coupling Top-down and Bottom-up Methods for 3D Human Pose and Shape Estimation from Monocular Image Sequences. - Guillaume Desjardins, Heng Luo, Aaron C. Courville, Yoshua Bengio:
Deep Tempering. - Zheng Chang, Jie Gong, Tapani Ristaniemi, Zhisheng Niu:
Energy Efficient Resource Allocation and User Scheduling for Collaborative Mobile Clouds with Hybrid Receivers. - Meital Ben Sinai, Nimrod Partush, Shir Yadid, Eran Yahav:
Exploiting Social Navigation. - Özgür Yilmaz:
Reservoir Computing using Cellular Automata. - David Lillis, Rem W. Collier, Mauro Dragone, Gregory M. P. O'Hare:
An Agent-Based Approach to Component Management. - Iqbal Hussain, Ming Xiao, Lars K. Rasmussen:
Rateless Codes for the Multi-Way Relay Channel. - Eva Darulova, Viktor Kuncak:
On Numerical Error Propagation with Sensitivity. - Michael Shekelyan, Gregor Jossé, Matthias Schubert:
ParetoPrep: Fast computation of Path Skylines Queries. - Mateusz Malinowski, Mario Fritz:
A Multi-World Approach to Question Answering about Real-World Scenes based on Uncertain Input. - Iqbal Hussain, Ming Xiao, Lars K. Rasmussen:
Buffer-Based Distributed LT Codes. - Juheon Lee, Xiaohao Cai, Carola-Bibiane Schönlieb, David Coomes:
Non-parametric Image Registration of Airborne LiDAR, Hyperspectral and Photographic Imagery of Forests. - Dame Diongue, Ousmane Thiare:
An Energy Efficient Self-healing Mechanism for Long Life Wireless Sensor Networks. - Aleksandra Pizurica:
Pattern Encoding on the Poincare Sphere. - Benjamin Fish, Jeremy Kun, Ádám Dániel Lelkes, Lev Reyzin, György Turán:
On the Computational Complexity of MapReduce. - William B. March, Bo Xiao, George Biros:
ASKIT: Approximate Skeletonization Kernel-Independent Treecode in High Dimensions. - Chao Li, Michael Hay, Gerome Miklau, Yue Wang:
A Data- and Workload-Aware Algorithm for Range Queries Under Differential Privacy. - Julia Chuzhoy:
Improved Bounds for the Flat Wall Theorem. - Christian Häger, Alexandre Graell i Amat, Fredrik Brännström, Alex Alvarado, Erik Agrell:
Terminated and Tailbiting Spatially Coupled Codes with Optimized Bit Mappings for Spectrally Efficient Fiber-Optical Systems. - Tom De Smedt:
Modeling Creativity: Case Studies in Python. - Dirk Roorda, Gino Kalkman, Martijn Naaijer, Andreas van Cranenburgh:
LAF-Fabric: a data analysis tool for Linguistic Annotation Framework with an application to the Hebrew Bible. - Virgilio P. Sison:
Bases of the Galois Ring $GR(p^r, m)$ over the Integer Ring $Z_{p^r}$. - Yanchuan Sim:
A Morphological Analyzer for Japanese Nouns, Verbs and Adjectives. - Ilya Sergey, Aleksandar Nanevski, Anindya Banerjee:
Specifying and Verifying Concurrent Algorithms with Histories and Subjectivity. - Tomás Kaiser, Maria Saumell, Nico Van Cleemput:
10-Gabriel graphs are Hamiltonian. - Alexey Milovanov:
The properties of absolutely non-stochastic strings. - Subhadip Mukherjee, Rupam Basu, Chandra Sekhar Seelamantula:
A Robust Dictionary Learning Algorithm for Image Denoising. - Brian Lee Yung Rowe:
Using social network graph analysis for interest detection. - Qing Wang, Domenico Giustiniano, Daniele Puccinelli:
An Open-Source Research Platform for Embedded Visible Light Networking. - Lionel Eyraud-Dubois, Loris Marchal, Oliver Sinnen, Frédéric Vivien:
Parallel scheduling of task trees with limited memory. - Mahmadou Issoufou Tiado, Riadh Dhaou, André-Luc Beylot:
Cross-Layer Extended Persistent Timeout Policy for SCTP and DSDV. - Mahmadou Issoufou Tiado, Riadh Dhaou, André-Luc Beylot:
Cross layer Interaction Models for SCTP and OLSR. - Roman V. Yampolskiy:
The Universe of Minds. - Jagdish Lal Raheja, B. Ajay, Ankit Chaudhary:
Real Time Fabric Defect Detection System on an Embedded DSP Platform. - Aamir Shafi, Aleem Akhtar, Ansar Javed, Bryan Carpenter:
Teaching Parallel Programming Using Java. - Rafael M. Frongillo, Yiling Chen, Ian A. Kash:
Elicitation for Aggregation. - Michael Heindlmaier, Navid Reyhanian, Shirin Saeedi Bidokhti:
Capacity Regions of Two-Receiver Broadcast Packet Erasure Channels with Feedback and Memory. - M. Andrecut:
A String-Based Public Key Cryptosystem. - Viktoriia Sharmanska, Novi Quadrianto, Christoph H. Lampert:
Learning to Transfer Privileged Information. - Markus Wittmann, Thomas Zeiser, Georg Hager, Gerhard Wellein:
Modeling and analyzing performance for highly optimized propagation steps of the lattice Boltzmann method on sparse lattices. - Rafael M. Frongillo, Mark D. Reid:
Risk Dynamics in Trade Networks. - Nicolò Michelusi, Urbashi Mitra:
Cross-layer design of distributed sensing-estimation with quality feedback, Part I: Optimal schemes. - Nicolò Michelusi, Urbashi Mitra:
Cross-layer design of distributed sensing-estimation with quality feedback, Part II: Myopic schemes. - Alekh Agarwal, Alina Beygelzimer, Daniel J. Hsu, John Langford, Matus Telgarsky:
Scalable Nonlinear Learning with Adaptive Polynomial Expansions. - Masahito Hayashi, Himanshu Tyagi, Shun Watanabe:
Strong Converse for a Degraded Wiretap Channel via Active Hypothesis Testing. - Jiaqi Gu, Rodrigo C. de Lamare:
Joint SIC and Relay Selection for Cooperative DS-CDMA Systems. - Arash Golibagh Mahyari, Selin Aviyente:
Identification of Dynamic functional brain network states Through Tensor Decomposition. - Graeme N. Wilson, Alejandro Ramirez-Serrano, Qiao Sun:
Vehicle Parameter Independent Gain Matrix Selection for a Quadrotor using State-Space Controller Design Methods. - Jesper Larsson Träff, Martin Wimmer:
An improved, easily computable combinatorial lower bound for weighted graph bipartitioning. - Zakria Hussain, Arto Klami, Jussi Kujala, Alex Po Leung, Kitsuchart Pasupa, Peter Auer, Samuel Kaski, Jorma Laaksonen, John Shawe-Taylor:
PinView: Implicit Feedback in Content-Based Image Retrieval. - Dan Martinec, Ivo Herman, Michael Sebek:
The transfer-function approach to travelling waves in path graphs. - Nibaran Das, Sandip Pramanik, Subhadip Basu, Punam Kumar Saha, Ram Sarkar, Mahantapas Kundu, Mita Nasipuri:
Recognition of Handwritten Bangla Basic Characters and Digits using Convex Hull based Feature Set. - Ludovic Denoyer, Patrick Gallinari:
Deep Sequential Neural Network. - Farshid Sahba, Maryam Nazaridoust:
Museum Automation with RFID. - Fredrick Romanus Ishengoma:
Online Social Networks and Terrorism 2.0 in Developing Countries. - Adam B. Mtaho, Fredrick Romanus Ishengoma:
Factors Affecting QoS in Tanzania Cellular Networks. - Fredrick Romanus Ishengoma:
Authentication System for Smart Homes Based on ARM7TDMI-S and IRIS-Fingerprint Recognition Technologies. - Ahmad Biniaz, Anil Maheshwari, Michiel H. M. Smid:
Matching in Gabriel Graphs. - Richard John Preen, Larry Bull:
Design Mining Interacting Wind Turbines: Surrogate-Assisted Coevolution of Rapid Prototyped VAWT. - Vincent Cohen-Addad, Claire Mathieu:
The Unreasonable Success of Local Search: Geometric Optimization. - Jacopo Pantaleoni:
A massively parallel algorithm for constructing the BWT of large string sets. - Diego Fabregat-Traver, Paolo Bientinesi:
Automatic Generation of Loop-Invariants for Matrix Operations. - Diego Fabregat-Traver, Paolo Bientinesi:
Knowledge-Based Automatic Generation of Partitioned Matrix Expressions. - Stefanie Haustein, Vincent Larivière, Mike Thelwall, Didier Amyot, Isabella Peters:
Tweets vs. Mendeley readers: How do these two social media metrics differ? - Konstantin Avrachenkov, Nelly Litvak, Liudmila Ostroumova Prokhorenkova, Eugenia Suyargulova:
Quick Detection of High-degree Entities in Large Directed Networks. - A. Mani:
Algebraic Semantics of Proto-Transitive Rough Sets. - Thomas Nickson, Igor Potapov:
Broadcasting Automata and Patterns on Z^2. - Hugh L. Kennedy:
Multidimensional Digital Smoothing Filters for Target Detection. - Mateus de Oliveira Oliveira:
An Algorithmic Metatheorem for Directed Treewidth. - Ghislain Fourny:
Cell Stores. - Zhe Liu, Ingmar Weber:
Is Twitter a Public Sphere for Online Conflicts? A Cross-Ideological and Cross-Hierarchical Look. - Sithan Kanna, Dahir H. Dini, Yili Xia, Ron Shu-Yuen Hui, Danilo P. Mandic:
Distributed Widely Linear Frequency Estimation in Unbalanced Three Phase Power Systems. - Karel De Vogeleer, Gérard Memmi, Pierre Jouvelot, Fabien Coelho:
The Impact of Surface Size on the Radiative Thermal Behavior of Embedded Systems. - Hugo Jair Escalante, Mauricio A. García-Limón, Alicia Morales-Reyes, Mario Graff, Manuel Montes-y-Gómez, Eduardo F. Morales:
Term-Weighting Learning via Genetic Programming for Text Classification. - Christian Bauckhage:
A Note on Archetypal Analysis and the Approximation of Convex Hulls. - (Withdrawn) Stability of Asynchronous Networked Control Systems with Probabilistic Clocks.
- Mikhail Prisheltsev:
Adaptive two-dimensional wavelet transformation based on the Haar system. - Ying Li, Xin Wang:
BRVST: Efficient and Content-Expressive Information Matching Overlay in Wireless Networks. - Eduardo A. Canale, Pablo Romero, Gerardo Rubino:
A Full Characterization of Irrelevant Components in Diameter Constrained Reliability. - Dániel Kondor, László Dobos, István Csabai, András Bodor, Gábor Vattay, Tamás Budavári, Alexander S. Szalay:
Efficient classification of billions of points into complex geographic regions using hierarchical triangular mesh. - Ivan V. Oseledets, G. V. Ovchinnikov:
Fast, memory efficient low-rank approximation of SimRank. - Felix Hill, KyungHyun Cho, Sébastien Jean, Coline Devin, Yoshua Bengio:
Not All Neural Embeddings are Born Equal. - Laurent Jacques, Christophe De Vleeschouwer, Yannick Boursier, Prasad Sudhakar, C. De Mol, Aleksandra Pizurica, Sandrine Anthoine, Pierre Vandergheynst, Pascal Frossard, Cagdas Bilen, Srdan Kitic, Nancy Bertin, Rémi Gribonval, Nicolas Boumal, Bamdev Mishra, Pierre-Antoine Absil, Rodolphe Sepulchre, Shaun Bundervoet, Colas Schretter, Ann Dooms, Peter Schelkens, Olivier Chabiron, François Malgouyres, Jean-Yves Tourneret, Nicolas Dobigeon, Pierre Chainais, Cédric Richard, Bruno Cornelis, Ingrid Daubechies, David B. Dunson, Marie Danková, Pavel Rajmic, Kévin Degraux, Valerio Cambareri, Bert Geelen, Gauthier Lafruit, Gianluca Setti, Jean-François Determe, Jérôme Louveaux, François Horlin, Angélique Drémeau, Patrick Héas, Cédric Herzet, Vincent Duval, Gabriel Peyré, Alhussein Fawzi, Mike E. Davies, Nicolas Gillis, Stephen A. Vavasis, Charles Soussen, Luc Le Magoarou, Jingwei Liang, Jalal Fadili, Antoine Liutkus, David Martina, Sylvain Gigan, Laurent Daudet, Mauro Maggioni, Stanislav Minsker, Nate Strawn, C. Mory, Fred Maurice Ngolè Mboula, Jean-Luc Starck, Ignace Loris, Samuel Vaiter, Mohammad Golbabaee, Dejan Vukobratovic:
Proceedings of the second "international Traveling Workshop on Interactions between Sparse models and Technology" (iTWIST'14). - Roya Ensafi, Philipp Winter, Abdullah Mueen, Jedidiah R. Crandall:
Large-scale Spatiotemporal Characterization of Inconsistencies in the World's Largest Firewall. - Zhicheng Yan, Vignesh Jagadeesh, Dennis DeCoste, Wei Di, Robinson Piramuthu:
HD-CNN: Hierarchical Deep Convolutional Neural Network for Image Classification. - Brett W. Israelsen, Dale A. Smith:
Generalized Laguerre Reduction of the Volterra Kernel for Practical Identification of Nonlinear Dynamic Systems. - Qiaosong Wang, Vignesh Jagadeesh, Bryan Ressler, Robinson Piramuthu:
Im2Fit: Fast 3D Model Fitting and Anthropometrics using Single Consumer Depth Camera and Synthetic Data. - Sharan Chetlur, Cliff Woolley, Philippe Vandermersch, Jonathan Cohen, John Tran, Bryan Catanzaro, Evan Shelhamer:
cuDNN: Efficient Primitives for Deep Learning. - Chih-Hang Wang, De-Nian Yang, Wen-Tsuen Chen:
Scheduling for Multi-Camera Surveillance in LTE Networks. - Michael Elkin, Ofer Neiman, Christian Wulff-Nilsen:
Space-Efficient Path-Reporting Approximate Distance Oracles. - Andreas Brandstädt, Pavel Ficur, Arne Leitert, Martin Milanic:
Polynomial-time Algorithms for Weighted Efficient Domination Problems in AT-free Graphs and Dually Chordal Graphs. - Niv Buchbinder, Moran Feldman, Roy Schwartz:
Comparing Apples and Oranges: Query Tradeoff in Submodular Maximization. - Nadav Cohen, Amnon Shashua:
SimNets: A Generalization of Convolutional Networks. - Thomas Bonald, James W. Roberts:
Multi-resource fairness: Objectives, algorithms and performance. - Maciej Rafal Burak:
Multi-step Uniformization with Steady-State Detection in Nonstationary M/M/s Queuing Systems. - Junhua Li, Zbigniew R. Struzik, Liqing Zhang, Andrzej Cichocki:
Feature Learning from Incomplete EEG with Denoising Autoencoder. - Parisa Rahimzadeh, Farid Ashtiani:
Analytical Evaluation of Saturation Throughput of a Cognitive 802.11-based WLAN Overlaid on a WiMAX-TDD Network. - Krishnendu Chatterjee, Monika Henzinger, Veronika Loitzenbauer:
Improved Algorithms for One-Pair and k-Pair Streett Objectives. - Carl Boettiger:
An introduction to Docker for reproducible research, with examples from the R environment. - Bart M. P. Jansen, Dániel Marx:
Characterizing the easy-to-find subgraphs from the viewpoint of polynomial-time algorithms, kernels, and Turing kernels. - Shuchang Zhou, Zhihua Zhang, Xiaobing Feng:
Group Orbit Optimization: A Unified Approach to Data Normalization. - Jean Gregoire:
Priority-based coordination of mobile robots. - Silvio Traversaro, Daniele Pucci, Francesco Nori:
In Situ Calibration of Six-Axes Force Torque Sensors using Accelerometer Measurements. - Marino Miculan, Marco Peressotti:
Structural operational semantics for non-deterministic processes with quantitative aspects. - Kaibin Huang, Jiayi Chen, Vincent K. N. Lau:
Communications Using Ubiquitous Antennas: Free-Space Propagation. - Victor Adrian Prisacariu, Olaf Kähler, Ming-Ming Cheng, Carl Yuheng Ren, Julien P. C. Valentin, Philip H. S. Torr, Ian D. Reid, David William Murray:
A Framework for the Volumetric Integration of Depth Images. - Eugénio Rodrigues, Adélio Rodrigues Gaspar, Álvaro Gomes, Manuel Gameiro da Silva:
Contributions of natural ventilation on thermal performance of alternative floor plan designs. - Branislav Kveton, Zheng Wen, Azin Ashkan, Csaba Szepesvári:
Tight Regret Bounds for Stochastic Combinatorial Semi-Bandits. - Dennis Wei, Kush R. Varshney:
Robust Binary Hypothesis Testing Under Contaminated Likelihoods. - Federico Rossi, Marco Pavone:
Distributed consensus with mixed time/communication bandwidth performance metrics. - Abdul Kadir:
A Model of Plant Identification System Using GLCM, Lacunarity And Shen Features. - Inna Smirnova:
A Systematic Approach to Setting Up Distributed Global Collaborations for Software-based Products in the Automotive Domain. - Marcos Portnoi, Chien-Chung Shen:
Loc-Auth: Location-Enabled Authentication Through Attribute-Based Encryption. - Raja Giryes, Yaniv Plan, Roman Vershynin:
On the Effective Measure of Dimension in the Analysis Cosparse Model. - Le Li, Jianjun Yang, Yang Xu, Zhen Qin, Honggang Zhang:
Document Clustering Based On Max-Correntropy Non-Negative Matrix Factorization. - Steve Hanneke, Liu Yang:
Minimax Analysis of Active Learning. - Eva C. Song, Paul W. Cuff, H. Vincent Poor:
A Rate-Distortion Based Secrecy System with Side Information at the Decoders. - Giuseppe Di Battista, Fabrizio Frati:
A Survey on Small-Area Planar Graph Drawing. - Yen-Kai Liao, Chih-Han Wang, De-Nian Yang, Wen-Tsuen Chen:
Uplink Scheduling for LTE 4G Video Surveillance System. - Chandra Chekuri, Julia Chuzhoy:
Degree-3 Treewidth Sparsifiers. - Su Hu, Zi Long Liu, Yong Liang Guan, Wenhui Xiong, Guoan Bi, Shaoqian Li:
Sequence Design for Cognitive CDMA Communications under Arbitrary Spectrum Hole Constraint. - Rahul Rama Varior, Gang Wang, Jiwen Lu:
Learning Invariant Color Features for Person Re-Identification. - Frank Nielsen, Richard Nock:
Further results on the hyperbolic Voronoi diagrams. - Nannan Wang, Xinbo Gao, Dacheng Tao, Xuelong Li:
Facial Feature Point Detection: A Comprehensive Survey. - Stefan G. Weber:
Alltagstaugliche Biometrie: Entwicklungen, Herausforderungen und Chancen. - Wojciech Czerwinski, Wim Martens:
A Note on Decidable Separability by Piecewise Testable Languages. - Jiangbo Huang:
Programing implementation of the Quine-McCluskey method for minimization of Boolean expression. - Kezhi Wang, Yunfei Chen, Marco Di Renzo:
Outage Probability of Dual-Hop Selective AF With Randomly Distributed and Fixed Interferers. - Frédéric Giroire, Dorian Mazauric, Joanna Moulierac:
Energy Efficient Routing by Switching-Off Network Interfaces. - Alejandro López-Ortiz, Daniela Maftuleac:
Optimal Strategies for Search and Rescue Operations with Robot Swarms. - Valery D. Solovyev, Vladimir V. Bochkarev:
Generating abbreviations using Google Books library. - Arash Einolghozati, Mohsen Sardari, Faramarz Fekri:
Design and Analysis of Wireless Communication Systems Using Diffusion-Based Molecular Communication Among Bacteria. - Arash Einolghozati, Mohsen Sardari, Faramarz Fekri:
Relaying in Diffusion-Based Molecular Communication. - Christine P. D. M. van der Aa, Monique M. H. Pollmann, Aske Plaat, Rutger Jan van der Gaag:
Computer-mediated communication in adults with high-functioning Autism Spectrum Conditions. - Junhua Mao, Wei Xu, Yi Yang, Jiang Wang, Alan L. Yuille:
Explain Images with Multimodal Recurrent Neural Networks. - Sougata Chaudhuri, Ambuj Tewari:
Online Ranking with Top-1 Feedback. - Elliot Anshelevich, Shreyas Sekar:
Market price competition in networks: How do monopolies impact social welfare? - Mitsugu Iwamoto, Kazuo Ohta, Junji Shikata:
Security Formalizations and Their Relationships for Encryption and Key Agreement in Information-Theoretic Cryptography. - Xianwen Wang, Shenmeng Xu, Zhi Wang, Lian Peng, Chuanli Wang:
International Scientific Collaboration of China: Collaborating Countries, Institutions and Individuals. - Xianwen Wang, Shenmeng Xu, Di Liu, Yongxia Liang:
The Role of Chinese-American Scientists in China-US Scientific Collaboration: A Study in Nanotechnology. - Koen Samyn, Sofie Van Hoecke, Bart Pieters, Charles-Frederik Hollemeersch, Aljosha Demeulemeester, Rik Van de Walle:
Real-time animation of human characters with fuzzy controllers. - Walaa Medhat, Ahmed Hassan Yousef, Hoda Korashy Mohamed:
Corpora Preparation and Stopword List Generation for Arabic data in Social Network. - Roi Livni, Shai Shalev-Shwartz, Ohad Shamir:
On the Computational Efficiency of Training Neural Networks. - Stavros G. Kolliopoulos, Yannis Moysoglou:
Extended Formulation Lower Bounds via Hypergraph Coloring? - Yulia S. Maslennikova, Vladimir V. Bochkarev:
Training Algorithm for Neuro-Fuzzy Network Based on Singular Spectrum Analysis. - Amjed Tahir, Stephen G. MacDonell, Jim Buchan:
Understanding Class-level Testability Through Dynamic Analysis. - Aleksandar Milenkoski, Marco Vieira, Bryan D. Payne, Nuno Antunes, Samuel Kounev:
Technical Information on Vulnerabilities of Hypercall Handlers. - Aleksandar Milenkoski, Alexandru Iosup, Samuel Kounev, Kai Sachs, Piotr Rygielski, Jason Ding, Walfredo Cirne, Florian Rosenberg:
Cloud Usage Patterns: A Formalism for Description of Cloud Usage Scenarios. - Aleksandar Milenkoski, Samuel Kounev, Alberto Avritzer, Nuno Antunes, Marco Vieira:
On Benchmarking Intrusion Detection Systems in Virtualized Environments. - Rupesh Kumar Srivastava, Jonathan Masci, Faustino J. Gomez, Jürgen Schmidhuber:
Understanding Locally Competitive Networks. - Zeynab Bahrami Bidoni, Roy George:
Network Performance Rank: An Approach for Comparison of Complex Networks. - Himanshu Chauhan, Vijay K. Garg:
Necessary and Sufficient Conditions on Partial Orders for Modeling Concurrent Computations. - Sam Burnett, Nick Feamster:
Encore: Lightweight Measurement of Web Censorship with Cross-Origin Requests. - Thomas Steinke, Jonathan R. Ullman:
Interactive Fingerprinting Codes and the Hardness of Preventing False Discovery. - Devavrat Shah, Kang Zhang:
Bayesian regression and Bitcoin. - Pavel Sakov:
EnKF-C user guide. - Hao Lu, Mahantesh Halappanavar, Ananth Kalyanaraman:
Parallel Heuristics for Scalable Community Detection. - (Withdrawn) Multi-resource Fair Allocation with Bounded Number of Tasks in Cloud Computing Systems.
- Abhronil Sengupta, Sri Harsha Choday, Yusung Kim, Kaushik Roy:
Spin Orbit Torque Based Electronic Neuron. - Jan Olaf Blech, Maria Spichkova, Ian D. Peake, Heinz W. Schmidt:
Cyber-Virtual Systems: Simulation, Validation & Visualization. - Xun Zhou, Chin Keong Ho, Rui Zhang:
Wireless Power Meets Energy Harvesting: A Joint Energy Allocation Approach. - Akshay Kumar Maan, Dinesh Sasi Kumar, Sherin Sugathan, Alex Pappachen James:
Memristive Threshold Logic Circuit Design of Fast Moving Object Detection. - Kritsada Mamat, Wiroonsak Santipach:
On Transmit Beamforming for MISO-OFDM Channels With Finite-Rate Feedback. - Albert Y. S. Lam, Ka-Cheong Leung, Victor O. K. Li:
Capacity Management for Vehicle-to-Grid Power Regulation Services with Smart Charging Mechanism. - Rahul Vaze, Jainam Doshi, Kaibin Huang:
Receiver Antenna Partitioning for Simultaneous Wireless Information and Power Transfer. - Rushil Nagda, Siddhartha Satpathi, Rahul Vaze:
Optimal Offline and Competitive Online Strategies for Transmitter-Receiver Energy Harvesting. - Alkida Balliu, Dennis Olivetti, Özalp Babaoglu, Moreno Marzolla, Alina Sîrbu:
BiDAl: Big Data Analyzer for Cluster Traces. - Joan Boyar, Magnus Gausdal Find:
Constructive Relationships Between Algebraic Thickness and Normality. - Alberto Ravagnani:
Rank-metric codes and their MacWilliams identities. - Osama M. Abdalla, Sherif A. Hammad, H. Ahmed Yousef:
A Framework for Real Time Hardware in the loop Simulation for Control Design. - Walaa Medhat, Ahmed Hassan Yousef, Hoda Korashy Mohamed:
Combined Algorithm for Data Mining using Association rules. - Rasha Y. Tantawy, Ziad Farouk, Shereen Mohamed, Ahmed H. Yousef:
Using Professional Social Networking as an Innovative Method for Data Extraction: The ICT Alumni Index Case Study. - Angélique Dremeau, Florent Krzakala:
Phase recovery from a Bayesian point of view: the variational approach. - Javad B. Ebrahimi, Mahdi Jafari Siavoshani:
Linear Index Coding via Graph Homomorphism. - Chao-Kai Wen, Yongpeng Wu, Kai-Kit Wong, Robert Schober, Pangan Ting:
Performance Limits of Massive MIMO Systems Based on Bayes-Optimal Inference. - Sriram Nandha Premnath, Zygmunt J. Haas:
A Practical, Secure, and Verifiable Cloud Computing for Mobile Systems. - Karen I. Aardal, Pierre Le Bodic:
Approximation algorithms for the Transportation Problem with Market Choice and related models. - Nan Li, Rong Jin, Zhi-Hua Zhou:
Top Rank Optimization in Linear Time. - Axel Barrau, Silvère Bonnabel:
The invariant extended Kalman filter as a stable observer. - Farzana Afrin, Mohammad Saiedur Rahaman:
An adaptive quasi harmonic broadcasting scheme with optimal bandwidth requirement. - Apostolos Syropoulos:
Fuzzy Categories. - Jeremiah Blocki, Saranga Komanduri, Lorrie Faith Cranor, Anupam Datta:
Spaced Repetition and Mnemonics Enable Recall of Multiple Strong Passwords. - (Withdrawn) Energy-Efficient Resource Allocation for Fractional Frequency Reuse in Heterogeneous Networks.
- Marco Winkler, Jörg Reichardt:
Node-Specific Triad Pattern Mining: A Novel Tool for Complex-Network Analysis. - Xiang Xiang, Minh Dao, Gregory D. Hager, Trac D. Tran:
Hierarchical Sparse and Collaborative Low-Rank Representation for Emotion Recognition. - Devu Manikantan Shila, Xianghui Cao, Yu Cheng, Zequ Yang, Yang Zhou, Jiming Chen:
Ghost-in-the-Wireless: Energy Depletion Attack on ZigBee. - Bakthavachalam Elango, Periyaswamy Rajendran, Lutz Bornmann:
A macro level scientometric analysis of world tribology research output (1998 - 2012). - Zihui Liu, Jens Zumbrägel, Marcus Greferath, Xin-Wen Wu:
New Results on the Pseudoredundancy. - Yichen Jiang, Yi Ji, Tianhua Liu:
An Anonymous Communication Scheme based on Ring Signature in VANETs. - (Withdrawn) A Survey on Mobile Affective Computing.
- Zoltán Király, Sándor Kisfaludi-Bak:
Notes on dual-critical graphs. - Thierry Rakotoarivelo, Guillaume Jourjon, Olivier Mehani, Maximilian Ott, Mike Zink:
Repeatable Experiments with LabWiki. - Salman Fadaei, Martin Bichler:
A Truthful-in-expectation Mechanism for the Generalized Assignment Problem. - Manoj Gopalkrishnan:
A Cost/ Speed/ Reliability Trade-off in Erasing a Bit. - Ahmad Abdelfattah, David E. Keyes, Hatem Ltaief:
KBLAS: An Optimized Library for Dense Matrix-Vector Multiplication on GPU Accelerators. - Andrey A. Shchurov:
A Formal Model of Distributed Systems For Test Generation Missions. - Joshua Davis:
A Covert Channel Based on Web Read-time Modulation. - Stefanie Haustein, Timothy D. Bowman, Kim Holmberg, Isabella Peters, Vincent Larivière:
Astrophysicists on Twitter: An in-depth analysis of tweeting and scientific publication behavior. - Andrey A. Shchurov, Radek Marik:
A Formal Approach to Distributed System Tests Design. - Erik Schnetter, Marek Blazewicz, Steven R. Brandt, David M. Koppelman, Frank Löffler:
Chemora: A PDE Solving Framework for Modern HPC Architectures. - Fredrick Romanus Ishengoma:
A Novel Design of IEEE 802.15.4 and Solar Based Autonomous Water Quality Monitoring Prototype using ECHERP. - Yongjune Kim, B. V. K. Vijaya Kumar:
Writing on dirty flash memory. - Fabrizio Smith, Maurizio Proietti:
Ontology-based Representation and Reasoning on Process Models: A Logic Programming Approach. - (Withdrawn) Feature Engineering for Supervised Link Prediction on Dynamic Social Networks.
- Andrés R. Masegosa:
Stochastic Discriminative EM. - Rania Morsi, Diomidis S. Michalopoulos, Robert Schober:
Performance Analysis of Wireless Powered Communication with Finite/Infinite Energy Storage. - Joshua Juen, Anupam Das, Aaron Johnson, Nikita Borisov, Matthew Caesar:
Defending Tor from Network Adversaries: A Case Study of Network Path Prediction. - Cheng Cheng, Yingchun Jiang, Qiyu Sun:
Sampling and Galerkin reconstruction in reproducing kernel spaces. - Chinwendu Enyioha, Mohammad Amin Rahimian, George J. Pappas, Ali Jadbabaie:
Controllability and Fraction of Leaders in Infinite Network. - Nicolò Michelusi, Sahand Pirbadian, Mohamed Y. El-Naggar, Urbashi Mitra:
A Stochastic Model for Electron Transfer in Bacterial Cables. - Anamitra Roy Choudhury, Syamantak Das, Naveen Garg, Amit Kumar:
Rejecting Jobs to Minimize Load and Maximum Flow-time. - Wei-Cheng Kuo, Chih-Chun Wang:
Robust And Optimal Opportunistic Scheduling For Downlink 2-Flow Network Coding With Varying Channel Quality and Rate Adaptation. - Maurice Margenstern:
A weakly universal cellular automaton in the heptagrid with three states. - Lutz Bornmann:
Measuring impact in research evaluations. - Lu Liu, Xianghui Cao, Yu Cheng, Li Wang:
On Optimizing Energy Efficiency in Multi-Radio Multi-Channel Wireless Networks. - Luis M. Vaquero, Félix Cuadrado, Matei Ripeanu:
Systems for Near Real-Time Analysis of Large-Scale Dynamic Graphs. - Wentao Huang, Tracey Ho, Michael Langberg, Jörg Kliewer:
Single-Source/Sink Network Error Correction Is as Hard as Multiple-Unicast. - Yiling Chen, Or Sheffet, Salil P. Vadhan:
Privacy Games. - Mansoor I. Yousefi, Frank R. Kschischang:
On the Per-Sample Capacity of Nondispersive Optical Fibers. - Azam S. Zavar Moosavi, Adrian Sandu:
Approximate Exponential Algorithms to Solve the Chemical Master Equation. - D. Michael Freemon:
Maximizing Utilization and Performance of Guaranteed-Bandwidth Long Fat Networks and Virtual Circuits. - Qi Yu, Xinran He, Yan Liu:
GLAD: Group Anomaly Detection in Social Media Analysis- Extended Abstract. - Bomin Jiang, Zhiyong Sun, Brian D. O. Anderson:
Higher order Voronoi based mobile coverage control. - Travis E. Gibson, Zheng Qu, Anuradha M. Annaswamy, Eugene Lavretsky:
Adaptive Output Feedback based on Closed-loop Reference Models. - David Coleman, Ioan Alexandru Sucan, Mark Moll, Kei Okada, Nikolaus Correll:
Experience-Based Planning with Sparse Roadmap Spanners. - Oliver James, Heung-No Lee:
Restricted Isometry Random Variables: Probability Distributions, RIC Prediction and Phase Transition Analysis for Gaussian Encoders. - WeiQiang Xu, Wenchu Yuan, Qingjiang Shi, Xiaodong Wang, Yake Zhang:
Distributed Energy Efficient Cross-layer Optimization for Multihop MIMO Cognitive Radio Networks with Primary User Rate Protection. - Xianghui Cao, Xiangwei Zhou, Yu Cheng:
Energy Efficient Spectrum Sensing for State Estimation over A Wireless Channel. - WeiQiang Xu, Yushu Zhang, Qingjiang Shi, Xiaodong Wang:
Energy Management and Cross Layer Optimization for Wireless Sensor Network Powered by Heterogeneous Energy Sources. - David Menotti, Giovani Chiachia, Allan da Silva Pinto, William Robson Schwartz, Hélio Pedrini, Alexandre Xavier Falcão, Anderson Rocha:
Deep Representations for Iris, Face, and Fingerprint Spoofing Attack Detection. - V. Kiran Kumar:
Semantic Web Approach towards Interoperability and Privacy issues in Social Networks. - Chris Meissen, Laurent Lessard, Murat Arcak, Andrew K. Packard:
Compositional Performance Certification of Interconnected Systems using ADMM. - Maria Francis, Ambedkar Dukkipati:
Generalized Hash Functions based on Multivariate Ideal Lattices. - A. Albkerat, Biju Issac:
Analysis of IPv6 Transition Technologies. - Thomas Colcombet, Clemens Ley, Gabriele Puppis:
Logics with rigidly guarded data tests. - Kennedy Edemacu, Martin Euku, Richard Ssekibuule:
Packet Drop Attack Detection Techniques in Wireless Ad hoc Networks: A Review. - Anne Siemon, Stephan Menzel, Rainer Waser, Eike Linn:
A Complementary Resistive Switch-based Crossbar Array Adder. - Ashis Kumar Mandal, Rikta Sen:
Supervised learning Methods for Bangla Web Document Categorization. - Taymaz Rahkar-Farshi, Sara Behjat-Jamal, Mohammad-Reza Feizi-Derakhshi:
An improved multimodal PSO method based on electrostatic interaction using n- nearest-neighbor local search. - Adil H. M. Aldlawie, Ghassan A. QasMarrogy:
Performance evaluation of the effect ofnoise power jammer on the mobile bluetooth network. - Stefania Costantini:
Committment-Based Data-Aware Multi-Agent-Contexts Systems. - Pablo Dorta-González, María-Isabel Dorta-González, Rafael Suárez-Vega:
An approach to the author citation potential: Measures of scientific performance which are invariant across scientific fields. - Van Bang Le, Andrea Oversberg, Oliver Schaudt:
Squares of $3$-sun-free split graphs. - Yang Liu, Maosong Sun:
Contrastive Unsupervised Word Alignment with Non-Local Features. - Ashish Chandra, Mohammad Suaib, Rizwan Beg:
Low cost page quality factors to detect web spam. - Saman Feghhi, Douglas J. Leith:
A Successful Web Traffic Analysis Attack Using Only Timing Information. - Amirpasha Shirazinia, Subhrakanti Dey:
Sparse Gaussian Linear Dimensionality Reduction over Noisy Communication Channels. - Xianyan Wu, Qi Han, Dan Le, Xiamu Niu:
A New Method for Estimating the Widths of JPEG Images. - Jean Creusefond, Thomas Largillier, Sylvain Peyronnet:
Finding compact communities in large graphs. - Giulio Cimini, Tiziano Squartini, Nicolò Musmeci, Michelangelo Puliga, Andrea Gabrielli, Diego Garlaschelli, Stefano Battiston, Guido Caldarelli:
Reconstructing topological properties of complex networks using the fitness model. - George Grispos, Tim Storer, William Bradley Glisson:
Calm Before the Storm: The Challenges of Cloud Computing in Digital Forensics. - Nathalie Bertrand, Patricia Bouyer, Thomas Brihaye, Quentin Menet, Christel Baier, Marcus Größer, Marcin Jurdzinski:
Stochastic Timed Automata. - Waqas Aman:
A Framework for Analysis and Comparison of Dynamic Malware Analysis Tools. - Carlo Kleber da Silva Rodrigues:
On the Optimization of BitTorrent-Like Protocols for Interactive On-Demand Streaming Systems. - Chih-Hung Chang:
Strongly Mixing Properties of Multidimensional Cellular Automata. - Ehsan Ebrahimi Khaleghi, Jean-Claude Belfiore:
Compute-and-Forward for the Interference Channel: Diversity Precoding. - Roger Bilisoly:
Language-based Examples in the Statistics Classroom. - Luigi Nardi, Bruno Bodin, M. Zeeshan Zia, John Mawer, Andy Nisbet, Paul H. J. Kelly, Andrew J. Davison, Mikel Luján, Michael F. P. O'Boyle, Graham D. Riley, Nigel P. Topham, Steve B. Furber:
Introducing SLAMBench, a performance and accuracy benchmarking methodology for SLAM. - Andrej Gajduk, Mirko Todorovski, Ljupco Kocarev:
Improved steady-state stability of power grids with a communication infrastructure. - Khairul Azha A. Aziz, Shahrum Shah Abdullah:
Face Detection Using Radial Basis Functions Neural Networks With Fixed Spread. - Suman Shrestha:
Image Denoising using New Adaptive Based Median Filters. - Andrej Gajduk, Mirko Todorovski, Jürgen Kurths, Ljupco Kocarev:
Improving power grid transient stability by plug-in electric vehicles. - Yuxin Hu, Luming Zhang:
An Aerial Image Recognition Framework using Discrimination and Redundancy Quality Measure. - Jim Jing-Yan Wang, Xin Gao:
Learning manifold to regularize nonnegative matrix factorization. - Sharareh Alipour, Bahman Kalantari, Hamid Homapour:
Fast Approximation and Randomized Algorithms for Diameter. - June Zhang, José M. F. Moura:
Role of Subgraphs in Epidemics over Finite-Size Networks under the Scaled SIS Process. - Bahman Kalantari, Eric Lee:
Newton-Ellipsoid Method and its Polynomiography. - Lawrence Nehemiah:
Towards EHR interoperability in Tanzania hospitals: Issues, Challenges and Opportunities. - Shafii Muhammad Abdulhamid, Muhammad Shafie Abdul Latif:
League Championship Algorithm Based Job Scheduling Scheme for Infrastructure as a Service Cloud. - Alexander Golovnev, Alexander S. Kulikov, Ivan Mihajlin:
Families with infants: speeding up algorithms for NP-hard problems using FFT. - Anurag Acharya, Alex Verstak, Helder Suzuki, Sean Henderson, Mikhail Iakhiaev, Cliff Chiung-Yu Lin, Namit Shetty:
Rise of the Rest: The Growing Impact of Non-Elite Journals. - Brad Ballinger, Mirela Damian, David Eppstein, Robin Y. Flatland, Jessica Ginepro, Thomas C. Hull:
Minimum Forcing Sets for Miura Folding Patterns. - Martin Prantl:
Image compression overview. - Chetan Kaushik, Atul Mishra:
A Scalable, Lexicon Based Technique for Sentiment Analysis. - Ilias Diakonikolas, Daniel M. Kane, Vladimir Nikishkin:
Testing Identity of Structured Distributions. - Adam Clearwater, Clemens Puppe, Arkadii Slinko:
The single-crossing property on a tree. - Elsa Dupraz, David Declercq, Bane Vasic, Valentin Savin:
Analysis and Design of Finite Alphabet Iterative Decoders Robust to Faulty Hardware. - Daniela Maftuleac, SeoungKyou Lee, Sándor P. Fekete, Aditya Kumar Akash, Alejandro López-Ortiz, James McLurkin:
Local Policies for Efficiently Patrolling a Triangulated Region by a Robot Swarm. - Erin Wolf Chambers, Mikael Vejdemo-Johansson:
Computing minimum area homologies. - Jian Sun, Xiaofeng Zhong, Xuan Zhou, Xiaolong Fu:
Recommendation Scheme Based on Converging Properties for Contents Broadcasting. - Farrokh Etezadi, Ashish Khisti, Mitchell D. Trott:
Zero-Delay Sequential Transmission of Markov Sources Over Burst Erasure Channels. - Ashok Kumar Moses, Rajesh Sundaresan:
Minimization Problems Based on a Parametric Family of Relative Entropies I: Forward Projection. - R. Kaniezhil, C. Chandrasekar:
Improvement of Spectrum Sharing using Traffic pattern prediction. - (Withdrawn) Synthesis of Sequential Reversible Circuits through Finite State Machine.
- Leo van Iersel, Steven Kelk, Nela Lekic, Simone Linz:
Satisfying ternary permutation constraints by multiple linear orders or phylogenetic trees. - Vishal Pareek:
A New Gate for Optimal Fault Tolerant & Testable Reversible Sequential Circuit Design. - Todd Davies:
Digital Rights and Freedoms: A Framework for Surveying Users and Analyzing Policies. - R. M. Farouk, S. Badr, M. Sayed Elahl:
Recognition of cDNA microarray image Using Feedforward artificial neural network. - Qibin Zhao, Guoxu Zhou, Liqing Zhang, Andrzej Cichocki, Shun-ichi Amari:
Robust Bayesian Tensor Factorization for Incomplete Multiway Data. - Asghar Asgharian-Sardroud, Alireza Bagheri:
Unit-length embedding of cycles and paths on grid graphs. - Silas L. Fong, Vincent Y. F. Tan:
Asymptotic Expansions for Gaussian Channels with Feedback under a Peak Power Constraint. - Jelena Ignjatovic, Miroslav Ciric, Zorana Jancic:
Weighted finite automata with output. - WeiQiang Xu, Jianchen Tu, Qingjiang Shi:
Cross-Layer Control for Worse Case Delay Guarantees in Heterogeneous Powered Wireless Sensor Network via Lyapunov Optimization. - Adel M. Elmahdy, Amr El-Keyi, Tamer A. ElBatt, Karim G. Seddik:
On the Stable Throughput of Cooperative Cognitive Radio Networks with Finite Relaying Buffer. - Antoine Deleforge, Walter Kellermann:
Phase-Optimized K-SVD for Signal Extraction from Underdetermined Multichannel Sparse Mixtures. - Lazaros Lazaridis, Maria Papatsimouli, George F. Fragulis:
S.A.T.E.P.: Synchronous-Asynchronous Tele-education Platform. - Steven Schockaert, Sanjiang Li:
Realizing RCC8 networks using convex regions. - Bahidja Boukenadil:
Importance of realistic mobility models for vanet network simulation. - Olga Podolskaya:
On Circuit Complexity of Parity and Majority Functions in Antichain Basis. - Alexander Kurz, Stefan Milius, Dirk Pattinson, Lutz Schröder:
Simplified Coalgebraic Trace Equivalence. - Jalaj Upadhyay:
Circulant Matrices and Differential Privacy. - Haythem Ghazouani:
Genetic Stereo Matching Algorithm with Fuzzy Fitness. - Andreas Schwarz, Christian Huemmer, Roland Maas, Walter Kellermann:
Spatial Diffuseness Features for DNN-Based Speech Recognition in Noisy and Reverberant Environments. - (Withdrawn) Efficient On-line Detection of Temporal Patterns.
- Emily L. Spratt, Ahmed M. Elgammal:
Computational Beauty: Aesthetic Judgment at the Intersection of Art and Science. - Eric Bax, Lingjie Weng, Xu Tian:
Validation of k-Nearest Neighbor Classifiers Using Inclusion and Exclusion. - Armando Castañeda, Yannai A. Gonczarowski, Yoram Moses:
Unbeatable Consensus. - Jeremie Houssineau, Daniel E. Clark, Spela Ivekovic, Chee Sing Lee, Jose Franco:
A unified approach for multi-object triangulation, tracking and camera calibration. - Bishoy Moussa, Mahmoud Mostafa, Mahmoud El-Khouly:
XML Schema-based Minification for Communication of Security Information and Event Management (SIEM) Systems in Cloud Environments. - Kezhi Wang, Yunfei Chen, Jiming Chen:
Novel energy detection using uniform noise distribution. - Yun-He Cao, Xiang-Gen Xia:
IRCI Free MIMO OFDM SAR Using Circularly Shifted Zadoff-Chu Sequences. - Panayotis Mertikopoulos, Elena Veronica Belmega:
Transmit without regrets: Online optimization in MIMO-OFDM cognitive radio systems. - Alistair Sinclair, Piyush Srivastava, Daniel Stefankovic, Yitong Yin:
Spatial mixing and the connective constant: Optimal bounds. - Tadilo Endeshaw Bogale, Long Bao Le, Afshin Haghighat:
Hybrid Analog-Digital Beamforming: How Many RF Chains and Phase Shifters Do We Need? - Wenlong Shen, Weisheng Hong, Xianghui Cao, Bo Yin, Devu Manikantan Shila, Yu Cheng:
Secure Key Establishment for Device-to-Device Communications. - Andrew D. King, Catherine C. McGeoch:
Algorithm engineering for a quantum annealing platform. - David Lillis, Rem W. Collier, Howell R. Jordan:
Evaluation of a Conversation Management Toolkit for Multi Agent Programming. - David Lillis, Fergus Toolan, Rem W. Collier, John Dunnion:
Extending Probabilistic Data Fusion Using Sliding Windows. - Eric Price:
Optimal Lower Bound for Itemset Frequency Indicator Sketches. - Anudhyan Boral, Michael Mitzenmacher:
Multi-Party Set Reconciliation Using Characteristic Polynomials. - Mohamed Bebah, Amine Chennoufi, Azzeddine Mazroui, Abdelhak Lakhouaja:
Hybrid approaches for automatic vowelization of Arabic texts. - Gábor Erdélyi, Edith Hemaspaandra, Lane A. Hemaspaandra:
More Natural Models of Electoral Control by Partition. - Félix Balado, David Haughton:
Optimum Perfect Universal Steganography of Finite Memoryless Sources. - Shreyasee Mukherjee, Kai Su, Narayan B. Mandayam, K. K. Ramakrishnan, Dipankar Raychaudhuri, Ivan Seskar:
Evaluating Opportunistic Delivery of Large Content with TCP over WiFi in I2V Communication. - Florian Yger:
Challenge IEEE-ISBI/TCB : Application of Covariance matrices and wavelet marginals. - Forrest Fabian Jesse:
Entropy NAND: Early Functional Completeness in Entropy Networks. - Ferhat Özgür Çatak:
Polarization Measurement of High Dimensional Social Media Messages With Support Vector Machine Algorithm Using Mapreduce. - Sy-Quoc Le, Vincent Yan Fu Tan, Mehul Motani:
Second-Order Coding Rates for Conditional Rate-Distortion. - Amirhossein Aminfar, Eric Darve:
A Fast Sparse Solver for Finite-Element Matrices. - Michael G. Gowanlock, Henri Casanova:
Technical Report: Towards Efficient Indexing of Spatiotemporal Trajectories on the GPU for Distance Threshold Similarity Searches. - Minghui Yang, Jin Li, Keqin Feng, Dongdai Lin:
Generalized Hamming Weights of Irreducible Cyclic Codes. - Giovanni Caudullo:
Applying Geospatial Semantic Array Programming for a Reproducible Set of Bioclimatic Indices in Europe. - Jean-Philippe Hamiez, Jin-Kao Hao:
A note on a sports league scheduling problem. - Giuseppe Toscani:
A concavity property for the reciprocal of Fisher information and its consequences on Costa's EPI. - João F. C. Mota, Nikos Deligiannis, Miguel R. D. Rodrigues:
Compressed Sensing With Side Information: Geometrical Interpretation and Performance Bounds. - Srikanth Pai Bantwal, B. Sundar Rajan:
On the Bounds of Certain Maximal Linear Codes in a Projective Space. - Thorsten Ehlers, Mike Müller:
Faster Sorting Networks for $17$, $19$ and $20$ Inputs. - Georg Bachmeier, Michael Luttenberger, Maximilian Schlund:
Finite Automata for the Sub- and Superword Closure of CFLs: Descriptional and Computational Complexity. - Shenghao Yang, Soung Chang Liew, Lizhao You, Yi Chen:
Linearly-Coupled Fountain Codes. - Zheng Chen, Marios Kountouris:
Distributed SIR-Aware Opportunistic Access Control for D2D Underlaid Cellular Networks. - Hanli Qiao:
New SVD based initialization strategy for Non-negative Matrix Factorization. - Tiffany A. Huang, Matanya B. Horowitz, Joel W. Burdick:
Convex Model Predictive Control for Vehicular Systems. - Paulo Sérgio Almeida, Ali Shoker, Carlos Baquero:
Efficient State-based CRDTs by Delta-Mutation. - Michael Greenberg:
Space-Efficient Manifest Contracts. - Omar Alonso, Vasilis Kandylas:
A Study on Placement of Social Buttons in Web Pages. - Ryan Kavanagh, Jean-Marie Madiot:
On Coupled Logical Bisimulation for the Lambda-Calculus. - Ubiratam de Paula Junior, Lúcia M. A. Drummond, Daniel de Oliveira, Yuri Frota, Valmir Carneiro Barbosa:
Handling Flash-Crowd Events to Improve the Performance of Web Applications. - Ender Konukoglu, Melanie Ganz:
Approximate False Positive Rate Control in Selection Frequency for Random Forest. - Patrick K. Nicholson, Pawel Gawrychowski:
Encodings of Range Maximum-Sum Segment Queries and Applications. - Zhe Wang, Vaneet Aggarwal, Xiaodong Wang:
Multiuser Joint Energy-Bandwidth Allocation with Energy Harvesting - Part I: Optimum Algorithm & Multiple Point-to-Point Channels. - Rafael Dowsley, Anderson C. A. Nascimento:
On the Oblivious Transfer Capacity of Generalized Erasure Channels against Malicious Adversaries. - Zhe Wang, Vaneet Aggarwal, Xiaodong Wang:
Multiuser Joint Energy-Bandwidth Allocation with Energy Harvesting - Part II: Multiple Broadcast Channels & Proportional Fairness. - S. V. Kasmir Raja, V. Rajitha, Meenakshi Lakshmanan:
An Ontology for Comprehensive Tutoring of Euphonic Conjunctions of Sanskrit Grammar. - Curt Schieler, Paul W. Cuff:
The Henchman Problem: Measuring Secrecy by the Minimum Distortion in a List. - Omar Rafique:
Area Versus Speed Trade-off Analysis of a WiMAX Deinterleaver Circuit Design. - Thomas Genet:
Towards Static Analysis of Functional Programs using Tree Automata Completion. - Claude Carlet, Guang Gong, Yin Tan:
Quadratic Zero-Difference Balanced Functions, APN Functions and Strongly Regular Graphs. - Chung-Yu Lou, Babak Daneshrad, Richard D. Wesel:
Optimizing Pilot Length for a Go/No-Go Decision in Two-State Block Fading Channels with Feedback. - Daoud Clarke:
Riesz Logic. - Alexandros G. Dimakis, Anna Gál, Ankit Singh Rawat, Zhao Song:
Batch Codes through Dense Graphs without Short Cycles. - Wenbo Wang, Andres Kwasinski, Zhu Han:
Power allocation with stackelberg game in femtocell networks: a self-learning approach. - Philippe Vincent-Lamarre, Jade Boivin, Yassine Gargouri, Vincent Larivière, Stevan Harnad:
Estimating Open Access Mandate Effectiveness: I. The MELIBEA Score. - Weiliang Han, Xiang-Gen Xia, Jianhua Ge:
Cyclic Delay Transmission for Vector OFDM Systems. - Biao Luo, Derong Liu, Tingwen Huang:
Q-learning for Optimal Control of Continuous-time Systems. - Mohammed Javed, P. Nagabhushan, B. B. Chaudhuri:
Direct Processing of Document Images in Compressed Domain. - Shihao Yan, Robert A. Malaney, Ido Nevat, Gareth W. Peters:
Location Spoofing Detection for VANETs by a Single Base Station in Rician Fading Channels. - Yongpeng Wu, Chao-Kai Wen, Chengshan Xiao, Xiqi Gao, Robert Schober:
Linear Precoding for the MIMO Multiple Access Channel with Finite Alphabet Inputs and Statistical CSI. - Bakthavachalam Elango, Periyaswamy Rajendran:
Whole counting vs. whole-normalized counting: A country level comparative study of internationally collaborated papers on Tribology. - Jayakrushna Sahoo, Ashok Kumar Das, Adrijit Goswami:
An Algorithm for Mining High Utility Closed Itemsets and Generators. - Behrooz Razeghi, Ghosheh Abed Hodtani, Seyed Alireza Seyedin:
Coverage Region Analysis for MIMO Amplify-and-Forward Relay Channel with the Source to Destination Link. - Mustafa Anil Koçak, Elza Erkip:
Communicating Lists Over a Noisy Channel. - Rifkat I. Nabiyev, Rushan Ziatdinov:
A mathematical design and evaluation of Bernstein-Bezier curves' shape features using the laws of technical aesthetics. - Radoslav Fulek:
Toward the Hanani-Tutte Theorem for Clustered Graphs. - Mugen Peng, Yuan Li, Jiamo Jiang, Jian Li, Chonggang Wang:
Heterogeneous Cloud Radio Access Networks: A New Perspective for Enhancing Spectral and Energy Efficiencies. - Yu Cheng, Ho Yee Cheung, Shaddin Dughmi, Shang-Hua Teng:
Signaling in Quasipolynomial time. - Mohammad Momani, Maen Takruri, Rami Al-Hmouz:
Risk Assessment Algorithm in Wireless Sensor Networks using Beta Distribution. - Ruggiero Cavallo, Christopher A. Wilkens:
GSP with General Independent Click-Through-Rates. - Greg Yang:
Computabilities of Validity and Satisfiability in Probability Logics over Finite and Countable Models. - Tareq M. Malas, Georg Hager, Hatem Ltaief, Holger Stengel, Gerhard Wellein, David E. Keyes:
Multicore-optimized wavefront diamond blocking for optimizing stencil updates. - Derrick Wing Kwan Ng, Robert Schober:
Secure and Green SWIPT in Distributed Antenna Networks with Limited Backhaul Capacity. - Son Nguyen Hong, Hao Nguyen Anh, Trong Thua Huynh:
A Study on Impacts of RTT Inaccuracy on Dynamic Bandwidth Allocation in PON and Solution. - Xin Yuan, Patrick Llull, David J. Brady, Lawrence Carin:
Tree-Structure Bayesian Compressive Sensing for Video. - William Moran, Frederick R. Cohen, Zengfu Wang, Sofia Suvorova, Douglas Cochran, Tom Taylor, Peter Mark Farrell, Stephen D. Howard:
Bounds on Multiple Sensor Fusion. - Hengky Susanto, Byung-Guk Kim, Benyuan Liu:
QoE Support for Multi-Layered Multimedia Applications. - Asmae Drhima, Mustapha Najmeddine:
Duality for Modules and Applications to Decoding Linear Codes over Finite Commutative Rings. - Arijit Bishnu, Kunal Dutta, Arijit Ghosh, Subhabrata Paul:
$(1, j)$-set problem in graphs. - Javier Borge-Holthoefer, Walid Magdy, Kareem Darwish, Ingmar Weber:
Content and Network Dynamics Behind Egyptian Political Polarization on Twitter. - Hongyang Sun, Patricia Stolf, Jean-Marc Pierson, Georges Da Costa:
Energy-Efficient and Thermal-Aware Resource Management for Heterogeneous Datacenters. - Soumendu Chakraborty, Anand Singh Jalal, Charul Bhatnagar:
An Efficient Bit Plane X-OR Algorithm for Irreversible Image Steganography. - Soumendu Chakraborty, Anand Singh Jalal, Charul Bhatnagar:
Secret Image Sharing Using Grayscale Payload Decomposition and Irreversible Image Steganography. - Kristian Kersting, Martin Mladenov, Pavel Tokmakov:
Relational Linear Programs. - Peter Hossain, Adaulfo Komisarczuk, Garin Pawetczak, Sarah Van Dijk, Isabella Axelsen:
Machine Learning Techniques in Cognitive Radio Networks. - Sariel Har-Peled, Haim Kaplan, Micha Sharir, Shakhar Smorodinsky:
Epsilon-Nets for Halfspaces Revisited. - Álvaro García-Recuero, Sérgio Esteves, Luís Veiga:
Quality-of-Data for Consistency Levels in Geo-replicated Cloud Data Stores. - Paul Bendich, Ellen Gasparovic, John Harer, Rauf Izmailov, Linda Ness:
Multi-Scale Local Shape Analysis and Feature Selection in Machine Learning Applications. - Oliver Knill:
Characteristic Length and Clustering. - Dani Korpi, Timo Huusari, Yang-Seok Choi, Lauri Anttila, Shilpa Talwar, Mikko Valkama:
Full-Duplex Mobile Device - Pushing The Limits. - Matin Macktoobian, Mohammad Jafari, Erfan Attarzadeh Gh:
Applied Neural Cross-Correlation into the Curved Trajectory Detection Process for Braitenberg Vehicles. - Ntjatji Gosebo:
The Impact of e-Politician on the Adoption of e-Service: Perceptions from a sample of South African Municipal IT Heads. - Son Hoang Dau, Wentu Song, Chau Yuen:
Secure Erasure Codes With Partial Decodability. - Joaquín García-Alfaro, Gürkan Gür:
Proceedings 2014 International Workshop on Advanced Intrusion Detection and Prevention, AIDP 2014, Marrakesh, Morocco, June 2014. EPTCS 165, 2014 [contents] - Matthias Keil, Peter Thiemann:
Symbolic Solving of Extended Regular Expression Inequalities. - Bartlomiej Bosek, Hal A. Kierstead, Tomasz Krawczyk, Grzegorz Matecki, Matthew E. Smith:
An Improved Subexponential Bound for On-line Chain Partitioning. - Jaikumar Radhakrishnan, Pranab Sen, Naqueeb Warsi:
One-shot Marton inner bound for classical-quantum broadcast channel. - Ram Niwash Mahia, Deepak Fulwani, Mahaveer Singh:
Characterization of Driver Nodes of Anti-Stable Networks. - Jan Henrik Ziegeldorf, Nicolai Viol, Martin Henze, Klaus Wehrle:
POSTER: Privacy-preserving Indoor Localization. - (Withdrawn) The clique problem on inductive $k$-independent graphs.
- Paul Emmerich, Florian Wohlfart, Daniel Raumer, Georg Carle:
MoonGen: A Scriptable High-Speed Packet Generator. - Kalliopi Kravari, Nick Bassiliades:
DISARM: A Social Distributed Agent Reputation Model based on Defeasible Logic. - Joshua Parker, Arnold P. Boedihardjo:
Evidence of spatial embedding in the IPv4 router-level Internet network. - Haifang Li, Fei Tian, Wei Chen, Tao Qin, Tie-Yan Liu:
Generalization Analysis for Game-Theoretic Machine Learning. - (Withdrawn) Single Image Super Resolution via Manifold Approximation.
- Valerio Capraro, Joseph Y. Halpern:
Translucent Players: Explaining Cooperative Behavior in Social Dilemmas. - Paolo Baldan, Filippo Bonchi, Henning Kerstan, Barbara König:
Behavioral Metrics via Functor Lifting. - Jayadev Acharya, Constantinos Daskalakis:
Testing Poisson Binomial Distributions. - Michael Felderer, Elizabeth Bjarnason, Markus Borg, Michael Unterkalmsteiner, Mirko Morandini, Matt Staats:
Workshop Summary of the 1st International Workshop on Requirements and Testing (RET'14). - Fatemeh Rajabi-Alni, Alireza Bagheri, Behrouz Minaei-Bidgoli:
An O(n^3) time algorithm for the maximum weight b-matching problem on bipartite graphs. - Talha Cihad Gülcü, Alexander Barg:
Achieving Secrecy Capacity of the Wiretap Channel and Broadcast Channel with a Confidential Component. - Travis Gagie, Gonzalo Navarro, Yakov Nekrich, Alberto Ordóñez Pereira:
Efficient and Compact Representations of Prefix Codes. - David Abdurachmanov, Peter Elmer, Giulio Eulisse, Robert Knight, Tapio Niemi, Jukka K. Nurminen, Filip Nyback, Goncalo Pestana, Zhonghong Ou, Kashif Nizam Khan:
Techniques and tools for measuring energy efficiency of scientific software applications. - David Abdurachmanov, Brian Bockelman, Peter Elmer, Giulio Eulisse, Robert Knight, Shahzad Muzaffar:
Heterogeneous High Throughput Scientific Computing with APM X-Gene and Intel Xeon Phi. - Yongxin Chen, Tryphon T. Georgiou, Michele Pavon:
Optimal steering of a linear stochastic system to a final probability distribution, part II. - Junhui Shen, Peiyan Zhu, Rui Fan, Wei Tan:
Sentiment Analysis based on User Tag for Traditional Chinese Medicine in Weibo. - K. Brad Wray, Lutz Bornmann:
Philosophy of science viewed through the lense of "References Publication Years spectrosopy" (RPYS). - Xirong Li:
Tag Relevance Fusion for Social Image Retrieval. - Lavanya Sita Tekumalla, Chiranjib Bhattacharyya:
Mining Block I/O Traces for Cache Preloading with Sparse Temporal Non-parametric Mixture of Multivariate Poisson. - Hiroki Sayama, Roberta Sinatra:
Social Diffusion and Global Drift on Networks. - Nikolaos Pappas, Manolis Ploumidis, Apostolos Traganitis:
Performance Evaluation of Flow Allocation with Successive Interference Cancelation for Random Access WMNs. - Ali Eslami, Chuan Huang, Junshan Zhang, Shuguang Cui:
Cascading Failures in Finite-Size Random Geometric Networks. - Emil Björnson, Erik G. Larsson, Mérouane Debbah:
Optimizing Multi-Cell Massive MIMO for Spectral Efficiency: How Many Users Should Be Scheduled? - Yuriy V. Pershin, Fabio L. Traversa, Massimiliano Di Ventra:
Memcomputing with membrane memcapacitive systems. - Eyal En Gad, Yue Li, Jörg Kliewer, Michael Langberg, Anxiao Jiang, Jehoshua Bruck:
Asymmetric Error Correction and Flash-Memory Rewriting using Polar Codes. - Ryan A. Rossi, Nesreen K. Ahmed:
NetworkRepository: A Graph Data Repository with Visual Interactive Analytics. - Bahman Kalantari:
Randomized Triangle Algorithms for Convex Hull Membership. - Mohamad Trad, Raja Jurdak, Rajib Kumar Rana:
Guiding Ebola Patients to Suitable Health Facilities: An SMS-based Approach. - Marco Di Renzo:
Stochastic Geometry Modeling and Analysis of Multi-Tier Millimeter Wave Cellular Networks. - Abid Mehmood, Dayang N. A. Jawawi:
An exploratory study of the suitability of UML-based aspect modeling techniques with respect to their integration into Model-Driven Engineering context. - Masa-aki Takizawa, Masahiro Yukawa, Cédric Richard:
A stochastic behavior analysis of stochastic restricted-gradient descent algorithm in reproducing kernel Hilbert spaces. - Cem Tekin, Mihaela van der Schaar:
eTutor: Online Learning for Personalized Education. - Jan Vrsek, Miroslav Lávicka:
Recognizing implicitly given rational canal surfaces. - Saeid Sahraei, Michael Gastpar:
Compute-and-Forward: Finding the Best Equation. - Chengwen Xing, Zesong Fei, Yiqing Zhou, Zhengang Pan, Hualei Wang:
Transceiver Design with Matrix-Version Water-Filling Solutions under Mixed Power Constraints. - Symeon Chouvardas, Gerasimos Mileounis, Nicholas Kalouptsidis, Sergios Theodoridis:
Greedy Sparsity-Promoting Algorithms for Distributed Learning. - Iyed Khammassi, Rachid El Azouzi, Majed Haddad, Issam Mabrouki:
A Game Theoretic Model for Network Virus Protection. - Tong Zhang, Xiaofeng Tao, Qimei Cui:
Joint Multi-Cell Resource Allocation Using Pure Binary-Integer Programming for LTE Uplink. - Sardaouna Hamadou, Abdelouahed Gherbi, John Mullins, Sofiene Beji:
A Time-Triggered Constraint-Based Calculus for Avionic Systems. - Rita Ammanouil, André Ferrari, Cédric Richard:
A graph Laplacian regularization for hyperspectral data unmixing. - Xianwen Wang, Chen Liu, Wenli Mao:
Does A Paper Being Featured on The Cover of A Journal Guarantee More Attention and Greater Impact? - Haewoon Kwak, Jisun An:
Understanding News Geography and Major Determinants of Global News Coverage of Disasters. - Junyeong Seo, Youngchul Sung, Gilwon Lee, Donggun Kim:
Training Beam Sequence Design for Millimeter-Wave MIMO Systems: A POMDP Framework. - Fabrizio Montesi:
Process-aware web programming with Jolie. - Rifkat I. Nabiyev, Ilshat H. Nabiyev, Rushan Ziatdinov:
The potential of mobile exhibition as a form of implementation for social transformation and educational expo-design in addressing public social problems. - Chern Hong Lim, Anhar Risnumawan, Chee Seng Chan:
Scene Image is Non-Mutually Exclusive - A Fuzzy Qualitative Scene Understanding. - Xingqin Lin, Libin Jiang, Jeffrey G. Andrews:
Performance Analysis of Asynchronous Multicarrier Wireless Networks. - Adam Petcher, Greg Morrisett:
The Foundational Cryptography Framework. - Mei Kuan Lim, Chee Seng Chan, Dorothy Ndedi Monekosso, Paolo Remagnino:
Refined Particle Swarm Intelligence Method for Abrupt Motion Tracking. - Wai Lam Hoo, Chee Seng Chan:
Zero-Shot Object Recognition System based on Topic Model. - Wei Ren Tan, Chee Seng Chan, Yogarajah Pratheepan, Joan Condell:
A Fusion Approach for Efficient Human Skin Detection. - Wai Lam Hoo, Tae-Kyun Kim, Yuru Pei, Chee Seng Chan:
Enhanced Random Forest with Image/Patch-Level Learning for Image Understanding. - Mei Kuan Lim, Ven Jyn Kok, Chen Change Loy, Chee Seng Chan:
Crowd Saliency Detection via Global Similarity Structure. - Jakub Kozik, Grzegorz Matecki:
A lazy approach to on-line bipartite matching. - Nathanaël Fijalkow:
What is known about the Value 1 Problem for Probabilistic Automata? - Rishabh Jain, Sakshi Gupta:
Optimizing the For loop: Comparison of For loop and micro For loop. - Guozheng Li, Zining Cao, Zheng Gao:
Refinement Checking for Multirate Hybrid ZIA. - Andrew Harms, Waheed U. Bajwa, A. Robert Calderbank:
Identification of Linear Time-Varying Systems Through Waveform Diversity. - Rami Al-Rfou, Vivek Kulkarni, Bryan Perozzi, Steven Skiena:
POLYGLOT-NER: Massive Multilingual Named Entity Recognition. - Yi-Peng Wei, Sennur Ulukus:
Polar Coding for the General Wiretap Channel. - Hans L. Bodlaender, Marc J. van Kreveld:
Google Scholar makes it Hard - the complexity of organizing one's publications. - Aaradhna Goyal, Ali Alshamrani, Dhivyaa Nandakumar, Dileep Vanga, Dmitriy Fingerman, Parul Gupta, Riya Ray, Srikanth Suryadevara:
Towards Refactoring DMARF and GIPSY OSS. - James P. Balhoff, T. Alexander Dececchi, Paula M. Mabee, Hilmar Lapp:
Presence-absence reasoning for evolutionary phenotypes. - Andrea Del Prete, Francesco Nori, Giorgio Metta, Lorenzo Natale:
Prioritized motion-force control of constrained fully-actuated robots: "Task Space Inverse Dynamics". - Debdipta Goswami, Chiranjib Saha, Kunal Pal, Swagatam Das:
Multi-Agent Shape Formation and Tracking Inspired from a Social Foraging Dynamics. - Petrut Cobârzan:
A new upper bound for Achlioptas processes. - Srinadh Bhojanapalli, Prateek Jain, Sujay Sanghavi:
Tighter Low-rank Approximation via Sampling the Leveraged Element. - Robert Krauthgamer, Tal Wagner:
Cheeger-type approximation for sparsest $st$-cut. - Liang Zhang, Zheng Yan, Donghan Feng, Gang Wang, Shaolun Xu, Naihu Li, Lei Jing:
Centralized and Decentralized Optimal Scheduling for Charging Electric Vehicles. - Xiankai Lu, Zheng Fang, Tao Xu, Haiting Zhang, Hongya Tuo:
Efficient Image Categorization with Sparse Fisher Vector. - Wenya Zhu, Xiankai Lu, Tao Xu, Ziyi Zhao:
High Order Structure Descriptors for Scene Images. - Neil Shah, Alex Beutel, Brian Gallagher, Christos Faloutsos:
Spotting Suspicious Link Behavior with fBox: An Adversarial Perspective. - Jason Weston, Sumit Chopra, Antoine Bordes:
Memory Networks. - Mei Kuan Lim, Chee Seng Chan, Dorothy Ndedi Monekosso, Paolo Remagnino:
Detection of Salient Regions in Crowded Scenes. - Taisuke Sato, Keiichi Kubota, Yoshitaka Kameya:
A Logic-based Approach to Generatively Defined Discriminative Modeling. - Ponnurangam Kumaraguru, Niharika Sachdeva:
Privacy4ICTD in India: Exploring Perceptions, Attitudes and Awareness about ICT Use. - Ivo Herman, Dan Martinec, Zdenek Hurák, Michael Sebek:
Scaling of transfer functions in vehicular platoons: the role of asymmetry disputed. - Xiaohan Wang, Pengfei Liu, Yuantao Gu:
Local-set-based Graph Signal Reconstruction. - Le Liang, Wei Xu, Xiaodai Dong:
Low-Complexity Hybrid Precoding in Massive Multiuser MIMO Systems. - Siotai Cheong, Pinyi Fan:
Novel Degree Distribution Function for LT codes over Finite Field. - Loïc Michel:
Bernstein-based polynomial approach to study the stability of switched systems and formal verification using HOL Light. - Haythem Ghazouani:
Shape and Color Object Tracking for Real-Time Robotic Navigation. - Ting-Yu Ho, Yi-Nung Yeh, De-Nian Yang:
Multi-View 3D Video Multicast for Broadband IP Networks. - Harry J. F. Qiu, Ivan Wang Hei Ho, Chi K. Tse, Yu Xie:
Technical Report: A Methodology for Studying 802.11p VANET Broadcasting Performance with Practical Vehicle Distribution. - (Withdrawn) Model-Free 3D Reconstruction of Weld Joint Geometry Using Laser Scanning in Presence of Noise.
- Hamidreza Arjmandi, Gholamali Aminian, Amin Gohari, Masoumeh Nasiri-Kenari, Urbashi Mitra:
Capacity of Diffusion based Molecular Communication Networks over LTI-Poisson Channels. - Laureano Moreno-Pozas, Eduardo Martos-Naya:
A Random Matrix Model for $κ$-$μ$ Shadowed Fading. - Dean Eckles, Maurits Kaptein:
Thompson sampling with the online bootstrap. - Amir M. Ben-Amram, Aviad Pineles:
Flowchart Programs, Regular Expressions, and Decidability of Polynomial Growth-Rate. 24-49 - Subhadip Basu, Sudipta Dey, K. Mukherjee, T. S. Jana:
Online interpretation of numeric sign language using 2-d skeletal model. - Subhadip Basu, Mahantapas Kundu, Mita Nasipuri, Dipak Kumar Basu:
A two-pass fuzzy-geno approach to pattern classification. - Subhadip Basu, Saurav Chakraborty, K. Mukherjee, S. K. Pandit:
Online Tracking of Skin Colour Regions Against a Complex Background. - Dipak Kumar Kole, Subhadip Basu:
An Automated Group Key Authentication System Using Secret Image Sharing Scheme. - Paolo Ballarini:
Analysing oscillatory trends of discrete-state stochastic processes through HASL statistical model checking. - François Gonze, Raphaël M. Jungers:
On the Synchronizing Probability Function and the Triple Rendezvous Time for Synchronzing Automata. - Martin Lück, Arne Meier, Irina Schindler:
Parameterized Complexity of CTL: A Generalization of Courcelle's Theorem. - Karl Rupp, Josef Weinbub, Ansgar Jüngel, Tibor Grasser:
Pipelined Iterative Solvers with Kernel Fusion for Graphics Processing Units. - Lorenzo Clemente:
Unified Analysis of Collapsible and Ordered Pushdown Automata via Term Rewriting. - K. R. Sahasranand, Vinod Sharma:
Distributed Nonparametric Sequential Spectrum Sensing under Electromagnetic Interference. - Bernhard Rumpe, Christian Berger, Holger Krahn:
Softwaretechnische Absicherung intelligenter Systeme im Fahrzeug. - Pietro Codara, Ottavio M. D'Antona:
Generalized Fibonacci and Lucas cubes arising from powers of paths and cycles. - Wolfgang Pree, Marcus Fontoura, Bernhard Rumpe:
Product Line Annotations with UML-F. - Aldo de Luca, Alessandro De Luca:
Sturmian words and the Stern sequence. - Ian P. Mulholland, Enrico Paolini, Mark F. Flanagan:
Design of LDPC Code Ensembles with Fast Convergence Properties. - Barbara Paech, Bernhard Rumpe:
Towards Development of Correct Software using Views. - Ana Salagean, Matei Mandache-Salagean, Richard Winter, Raphael C.-W. Phan:
Higher Order Differentiation over Finite Fields with Applications to Generalising the Cube Attack. - Frank Duque, Carlos Hidalgo-Toscano:
An upper bound on the k-modem illumination problem. - Adam Case, Jack H. Lutz:
Mutual Dimension. - Stefanie Haustein, Timothy D. Bowman, Kim Holmberg, Andrew Tsou, Cassidy R. Sugimoto, Vincent Larivière:
Tweets as impact indicators: Examining the implications of automated bot accounts on Twitter. - Shadman Sakib, Rakibul Haq, Tariq Wazed:
Unified mobile public health care system (UMPHCS) for underdeveloped countries. - Shadman Sakib, Anik Chowdhury, Shekh Tanvir Ahamed, Syed Imam Hasan:
Maze solving Algorithm for line following robot and derivation of linear path distance from nonlinear path. - Belal Amro:
Mobile Agent Systems, Recent Security Threats and Counter Measures. - Anshul Gupta, Sven Schewe, Dominik Wojtczak:
Making the Best of Limited Memory in Multi-Player Discounted Sum Games. 16-30 - Roghayeh Joda, Michele Zorzi:
Access Policy Design for Two Cognitive Secondary Users under a Primary ARQ Process. - Foto N. Afrati, Manas Joglekar, Christopher Ré, Semih Salihoglu, Jeffrey D. Ullman:
GYM: A Multiround Join Algorithm In MapReduce. - (Withdrawn) An improved approximation algorithm for k-median problem using a new factor-revealing LP.
- Adrien Devresse, Fabrizio Furano:
Efficient HTTP based I/O on very large datasets for high performance computing with the libdavix library. - Samuel R. Bowman, Christopher Potts, Christopher D. Manning:
Learning Distributed Word Representations for Natural Logic Reasoning. - Biju Issac, K. Hamid, C. E. Tan:
Wireless Mobility Management with Prediction, Delay Reduction and Resource Management in 802.11 Networks. - Jashua Rajesh Modapothala, Biju Issac:
Analysis of corporate environmental reports using statistical techniques and data mining. - Taimoor Abbas, Jörg Nuckelt, Thomas Kürner, Thomas Zemen, Christoph F. Mecklenbräuker, Fredrik Tufvesson:
Simulation and Measurement Based Vehicle-to-Vehicle Channel Characterization: Accuracy and Constraint Analysis. - Enrico Bazzoli, Claudio Criscione, Federico Maggi, Stefano Zanero:
XSS Peeker: A Systematic Analysis of Cross-site Scripting Vulnerability Scanners. - Ron Adar, Leah Epstein:
Models for the k-metric dimension. - Jie Wang, Jieping Ye:
Two-Layer Feature Reduction for Sparse-Group Lasso via Decomposition of Convex Sets. - Nicolò Michelusi, Michele Zorzi:
Optimal Adaptive Random Multiaccess in Energy Harvesting Wireless Sensor Networks. - Brijesh Dongol, Ian J. Hayes, Georg Struth:
Convolution, Separation and Concurrency. - Seeun Umboh:
Online Network Design Algorithms via Hierarchical Decompositions. - Badih Ghazi, Euiwoong Lee:
LP/SDP Hierarchy Lower Bounds for Decoding Random LDPC Codes. - Long Le, Douglas L. Jones:
Optimal Simultaneous Detection and Signal and Noise Power Estimation. - Adam Noel, Karen C. Cheung, Robert Schober:
Joint Channel Parameter Estimation via Diffusive Molecular Communication. - Aude Marzuoli, Emmanuel Boidot, Eric Feron, Paul B. C. van Erp, Alexis Ucko, Alexandre M. Bayen, Mark Hansen:
Anatomy of a Crash. - Nariman Farsad, H. Birkan Yilmaz, Andrew W. Eckford, Chan-Byoung Chae, Weisi Guo:
A Comprehensive Survey of Recent Advancements in Molecular Communication. - Adrien Ickowicz:
Approximate Bayesian algorithms for multiple target tracking with binary sensors. - Bernhard Haeupler, Mark S. Manasse, Kunal Talwar:
Consistent Weighted Sampling Made Fast, Small, and Easy. - David G. Anderson, Ming Gu, Christopher Melgaard:
An Efficient Algorithm for Unweighted Spectral Graph Sparsification. - Jinming Wen, Baojian Zhou, Wai Ho Mow, Xiao-Wen Chang:
Compute-and-Forward Protocol Design Based on Improved Sphere Decoding. - Xiangang Li, Xihong Wu:
Constructing Long Short-Term Memory based Deep Recurrent Neural Networks for Large Vocabulary Speech Recognition. - Peng Wang, Yonghui Li, Lingyang Song, Branka Vucetic:
Multi-Gigabits Millimetre Wave Wireless Communications for 5G: From Fixed Access to Cellular Networks. - Vincent Gramoli, Guillaume Jourjon, Olivier Mehani:
Can SDN Mitigate Disasters? - Nourhene Ellouze, Slim Rekhis, Mohamed Allouche, Noureddine Boudriga:
Digital Investigation of Security Attacks on Cardiac Implantable Medical Devices. 15-30 - Chris Chapman, Scott Knight, Tom Dean:
USBcat - Towards an Intrusion Surveillance Toolset. 31-43 - Muhammad Sabir Idrees, Yves Roudier, Ludovic Apvrille:
Model the System from Adversary Viewpoint: Threats Identification and Modeling. 45-58 - Wentan Yi, Shaozhen Chen:
Multidimensional Zero-Correlation Linear Attacks on Reduced-Round MISTY1. - Zai Yang, Lihua Xie:
Achieving High Resolution for Super-resolution via Reweighted Atomic Norm Minimization. - Petar Popovski:
Ultra-Reliable Communication in 5G Wireless Systems. - Manasij Venkatesh, Vikas Majjagi, Deepu Vijayasenan:
Implicit segmentation of Kannada characters in offline handwriting recognition using hidden Markov models. - (Withdrawn) Enhanced Multiobjective Evolutionary Algorithm based on Decomposition for Solving the Unit Commitment Problem.
- Martín Hötzel Escardó, Paulo Oliva:
The Herbrand Functional Interpretation of the Double Negation Shift. - Robert A. Bridges, John P. Collins, Erik M. Ferragut, Jason A. Laska, Blair D. Sullivan:
Multi-Level Anomaly Detection on Streaming Graph Data. - Chang-Ick Song, Cong Ling, Jaehyun Park, Bruno Clerckx:
MIMO Broadcasting for Simultaneous Wireless Information and Power Transfer: Weighted MMSE Approaches. - Christoph R. Birkl, Damien F. Frost, Adrien M. Bizeray, Robert R. Richardson, David A. Howey:
Modular converter system for low-cost off-grid energy storage using second life Li-ion batteries. - Matthieu Barjon, Arnaud Casteigts, Serge Chaumette, Colette Johnen, Yessin M. Neggaz:
Maintaining a Spanning Forest in Highly Dynamic Networks: The Synchronous Case. - Seibu Mary Jacob, Biju Issac:
The mobile devices and its mobile learning usage analysis. - Biju Issac, K. Hamid, C. E. Tan:
Hybrid Mobility Prediction of 802.11 Infrastructure Nodes by Location Tracking and Data Mining. - Seibu Mary Jacob, Biju Issac:
Mobile Learning Culture and Effects in Higher Education. - Borislav Gajanovic, Bernhard Rumpe:
ALICE: An Advanced Logic for Interactive Component Engineering. - Christopher Herbon:
The HAWKwood Database. - Martina Eikel, Christian Scheideler, Alexander Setzer:
Minimum Linear Arrangement of Series-Parallel Graphs. - Biju Issac:
Secure ARP and Secure DHCP Protocols to Mitigate Security Attacks. - Ynte Vanderhoydonc, Wim Vanroose:
Constrained Runs algorithm as a lifting operator for the Boltzmann equation. - (Withdrawn) Optimal Allocation of Power Pool for Two-Cell Single-User Joint Transmission.
- Silvio Traversaro, Andrea Del Prete, Riccardo Muradore, Lorenzo Natale, Francesco Nori:
Inertial Parameter Identification Including Friction and Motor Dynamics. - Andrea Del Prete, Francesco Romano, Lorenzo Natale, Giorgio Metta, Giulio Sandini, Francesco Nori:
Prioritized Optimal Control. - Stefan Schulze Frielinghaus, Michael Petter, Helmut Seidl:
Inter-procedural Two-Variable Herbrand Equalities. - Sergio Grammatico, Francesca Parise, Marcello Colombino, John Lygeros:
Decentralized Convergence to Nash Equilibria in Constrained Mean Field Control. - Gopal Sarma:
Should we train scientific generalists? - Andrea Del Prete, Nicolas Mansard, Francesco Nori, Giorgio Metta, Lorenzo Natale:
Partial Force Control of Constrained Floating-Base Robots. - Ynte Vanderhoydonc, Wim Vanroose:
Initialization of lattice Boltzmann models with the help of the numerical Chapman-Enskog expansion. - Daniel J. Hsu:
Weighted sampling of outer products. - Brijesh Dongol, Victor B. F. Gomes, Georg Struth:
Principles for Verification Tools: Separation Logic. - Ariyan Zarei:
Improve CAPTCHA's Security Using Gaussian Blur Filter. - (Withdrawn) Power Allocation and Scheduling for Two-Cell Distributed Interference Subtraction System.
- Massimo Stella, Markus Brede:
Patterns in the English Language: Phonological Networks, Percolation and Assembly Models. - Parosh Aziz Abdulla, Lorenzo Clemente, Richard Mayr, Sven Sandberg:
Stochastic Parity Games on Lossy Channel Systems. - Alina Sîrbu, Özalp Babaoglu:
Towards a systematic analysis of cluster computing log data: the case of IBM BlueGene/Q. - Kato Mivule, Benjamin Harvey, Crystal Cobb, Hoda El-Sayed:
A Review of CUDA, MapReduce, and Pthreads Parallel Computing Models. - Alexios Balatsoukas-Stimming, Mani Bastani Parizi, Andreas Peter Burg:
On Metric Sorting for Successive Cancellation List Decoding of Polar Codes. - Ming Xu, Yiman Du, Jianping Wu, Yang Zhou, Yunpeng Xiao:
Map Matching based on Conditional Random Fields and Route Preference Mining for Uncertain Trajectories. - Raviteja Vemulapalli, Vinay Praneeth Boda, Rama Chellappa:
MKL-RT: Multiple Kernel Learning for Ratio-trace Problems via Convex Optimization. - Azam Khalili, Wael Bazzi, Amir Rastegarnia:
Analysis of incremental augmented affine projection algorithm for distributed estimation of complex signals. - Miguel Ángel Bautista, Antonio Hernández-Vela, Sergio Escalera, Laura Igual, Oriol Pujol, Josep Moya, Verónica Violant, María Teresa Anguera:
A Gesture Recognition System for Detecting Behavioral Patterns of ADHD. - Thibault Godin, Ines Klimann, Matthieu Picantin:
On Torsion-Free Semigroups Generated by Invertible Reversible Mealy Automata. - Jimmy Lin:
On the Feasibility and Implications of Self-Contained Search Engines in the Browser. - Tobias Isenberg, Heike Wehrheim:
Proof-Carrying Hardware via IC3. - Aakash Deshpande, Frédéric Herbreteau, B. Srivathsan, Thanh-Tung Tran, Igor Walukiewicz:
Fast detection of cycles in timed automata. - Bas Luttik, Fei Yang:
Executable Behaviour and the $π$-Calculus. - Michael Maire, Stella X. Yu, Pietro Perona:
Reconstructive Sparse Code Transfer for Contour Detection and Semantic Labeling. - Venkata N. Inukollu, Divya D. Keshamoni, Taeghyun Kang, Manikanta Inukollu:
Factors Influencing Quality of Mobile Apps: Role of Mobile App Development Life Cycle. - Alon Orlitsky, Narayana P. Santhanam:
Universal compression of Gaussian sources with unknown parameters. - Jayadeva, Suresh Chandra, Siddarth Sabharwal, Sanjit S. Batra:
Learning a hyperplane regressor by minimizing an exact bound on the VC dimension. - Dave Clites, Richard Orr, Jack Rieser, Michael Dellomo:
Providing Higher Throughput for a Single User with M-ary Orthogonal Walsh Codes. - Adrian Friebel, Johannes Neitsch, Tim Johann, Seddik Hammad, Jan G. Hengstler, Dirk Drasdo, Stefan Hoehme:
TiQuant: Software for tissue analysis, quantification and surface reconstruction. - Erte Pan, Zhu Han:
Non-parametric Bayesian Learning with Deep Learning Structure and Its Applications in Wireless Networks. - Zhuwei Wang, Xiaodong Wang, Lihan Liu:
Stochastic Optimal Linear Control of Wireless Networked Control Systems with Delays and Packet Losses. - Hamzah Asyrani Sulaiman, Abdullah Bade, Mohd Harun Abdullah:
Efficient Distance Computation Algorithm between Nearly Intersected Objects Using Dynamic Pivot Point in Virtual Environment Application. - Marlos C. Machado, Sriram Srinivasan, Michael Bowling:
Domain-Independent Optimistic Initialization for Reinforcement Learning. - Hirosuke Yamamoto, Masashi Ueda:
Identification Codes to Identify Multiple Objects. - Wojciech Zaremba, Ilya Sutskever:
Learning to Execute. - Derek Doran, Swapna S. Gokhale, Aldo Dagnino:
Accurate Local Estimation of Geo-Coordinates for Social Media Posts. - Joshua D. Guttman, Paul D. Rowe:
A Cut Principle for Information Flow. - Alireza Dirafzoon, Edgar J. Lobaton:
Robust Topological Feature Extraction for Mapping of Environments using Bio-Inspired Sensor Networks. - Kiyeon Kim, Sang-Woon Jeon, Janghoon Yang, Dong Ku Kim:
The Feasibility of Interference Alignment for Reverse TDD Systems in MIMO Cellular Networks. - Carl Vondrick, Hamed Pirsiavash, Aude Oliva, Antonio Torralba:
Acquiring Visual Classifiers from Human Imagination. - Darryl McAdams, Jonathan Sterling:
Dependent Types for Pragmatics. - Yilun Wang, Junjie Zheng, Sheng Zhang, Xujun Duan, Huafu Chen:
Randomized Structural Sparsity via Constrained Block Subsampling for Improved Sensitivity of Discriminative Voxel Identification. - Chayanika Sharma, Ritu Sibal:
Applications of different metaheuristic techniques for finding optimal tst order during integration testing of object oriented systems and their comparative study. - Biju Issac, Raymond Chiong, Seibu Mary Jacob:
Analysis of Phishing Attacks and Countermeasures. - Weiyang Liu, Zhiding Yu, Lijia Lu, Yandong Wen, Hui Li, Yuexian Zou:
KCRC-LCD: Discriminative Kernel Collaborative Representation with Locality Constrained Dictionary for Visual Categorization. - Seibu Mary Jacob, Biju Issac:
Formative Assessment and its E-learning Implementation. - Seibu Mary Jacob, Biju Issac:
Problem Based Learning and Implementations. - Ibrahim Abdelaziz, Sherif M. Abdou, Hassanin M. Al-Barhamtoshy:
Large Vocabulary Arabic Online Handwriting Recognition System. - Biju Issac, Khairuddhin Ab Hamid, C. E. Tan:
QoS Survey in IPv6 and Queuing Methods. - Biju Issac, Khairuddhin Ab Hamid, C. E. Tan:
Analysis of Demand Driven Ad-hoc Routing Protocols on Performance and Mobility. - (Withdrawn) Optimal Time Random Access to Grammar-Compressed Strings in Small Space.
- Derek Groen, David Abou Chacra, Rupert W. Nash, Jirí Jaros, Miguel O. Bernabeu, Peter V. Coveney:
Weighted decomposition in high-performance lattice-Boltzmann simulations: are some lattice sites more equal than others? - Junhui Hou, Lap-Pui Chau, Nadia Magnenat-Thalmann, Ying He:
Human Motion Capture Data Tailored Transform Coding. - Jakub Konecný, Jie Liu, Peter Richtárik, Martin Takác:
mS2GD: Mini-Batch Semi-Stochastic Gradient Descent in the Proximal Setting. - Gesualdo Scutari, Francisco Facchinei, Lorenzo Lampariello, Peiran Song:
Distributed Methods for Constrained Nonconvex Multi-Agent Optimization-Part I: Theory. - Ugonna Aralu:
Influence of Information Support System on ICT Use by distance learners in University of Lagos Nigeria. - Flaminia L. Luccio, Euripides Markou:
Mobile Agents Rendezvous in spite of a Malicious Agent. - Pablo Dorta-González, María-Isabel Dorta-González, Dolores-Rosa Santos-Peñate, Rafael Suárez-Vega:
Research status and trends in Operations Research and Management Science (OR/MS) journals: A bibliometric analysis based on the Web of Science database 2001-2012. - Farnood Merrikh-Bayat, Xinjie Guo, H. A. Ommani, N. Do, Konstantin K. Likharev, Dmitri B. Strukov:
Redesigning Commercial Floating-Gate Memory for Analog Computing Applications. - Wojciech Mazurczyk, Elzbieta Rzeszutko:
Security - a perpetual war: lessons from nature. - Mickael Randour, Jean-François Raskin, Ocan Sankur:
Percentile Queries in Multi-Dimensional Markov Decision Processes. - Parisa A. Eliasi, Sundeep Rangan, Theodore S. Rappaport:
Low-Rank Spatial Channel Estimation for Millimeter Wave Cellular Systems. - Chayanika Sharma, Sangeeta Sabharwal, Ritu Sibal:
Applying Genetic Algorithm for Prioritization of Test Case Scenarios Derived from UML Diagrams. - Yannis Haralambous, Yassir Elidrissi, Philippe Lenca:
Arabic Language Text Classification Using Dependency Syntax-Based Feature Selection. - Kush R. Varshney, Lav R. Varshney:
Olfactory Signals and Systems. - Kathrin Baker, Michael Bloodgood, Bonnie J. Dorr, Nathaniel Wesley Filardo, Lori S. Levin, Christine D. Piatko:
A Modality Lexicon and its use in Automatic Tagging. - Elisângela Silva Dias, Diane Castonguay, Humberto J. Longo, Walid Abdala Rfaei Jradi, Hugo A. D. do Nascimento:
Fast Parallel Algorithm for Enumerating All Chordless Cycles in Graphs. - William W. Hager, James T. Hungerford, Ilya Safro:
A Multilevel Bilinear Programming Algorithm For the Vertex Separator Problem. - Yuksel Ozan Basciftci, Can Emre Koksal:
Delay Optimal Secrecy in Two-Relay Network. - Filippo Del Tedesco, David Sands, Alejandro Russo:
Type-Directed Compilation for Fault-Tolerant Non-Interference. - Wajeb Gharibi, Gharib Gharibi:
Gharibi_FaceCard for Contacts and Easy Personal - Information Exchange. - Ashok Kumar Moses, Rajesh Sundaresan:
Relative $α$-Entropy Minimizers Subject to Linear Statistical Constraints. - Shota Nakagawa, Ichiro Hasuo:
Near-Optimal Scheduler Synthesis for LTL with Future Discounting. - Mohammad M. Mansour:
Pruned Bit-Reversal Permutations: Mathematical Characterization, Fast Algorithms and Architectures. - (Withdrawn) Settling the Randomized k-sever Conjecture on Some Special Metrics.
- David Insa, Josep Silva:
Transforming while/do/for/foreach-Loops into Recursive Methods. - Pooya Davoodi, Rajeev Raman, Srinivasa Rao Satti:
On Succinct Representations of Binary Trees. - Chiraag Lala, Shay B. Cohen:
The Visualization of Change in Word Meaning over Time using Temporal Word Embeddings. - Dimitris Kallergis, Konstantinos Chimos, Stefanos Vizikidis, Theodoros Karvounidis, Christos Douligeris:
Pirus: A Web-based File Hosting Service with Object Oriented Logic in Cloud Computing. - Lampros Goussis, Ioannis E. Foukarakis, Dimitrios N. Kallergis:
Aspects and challenges of mashup creator design. - Dimitrios N. Kallergis, Ioannis E. Foukarakis, George N. Prezerakos:
Design issues for distributed mobile social networks. - Pratikkumar Desai, Amit P. Sheth, Pramod Anantharam:
Semantic Gateway as a Service architecture for IoT Interoperability. - Muhammad Haris Mughees, Hamed Haddadi, Pan Hui:
Privacy Leakage in Mobile Computing: Tools, Methods, and Characteristics. - Ulrich Schöpp:
On the Relation of Interaction Semantics to Continuations and Defunctionalization. - Zhenwen Dai, Andreas C. Damianou, James Hensman, Neil D. Lawrence:
Gaussian Process Models with Parallelization and GPU acceleration. - Danesh Tarapore, Jean-Baptiste Mouret:
Evolvability signatures of generative encodings: beyond standard performance benchmarks. - Amin Emad, Olgica Milenkovic:
Code Construction and Decoding Algorithms for Semi-Quantitative Group Testing with Nonuniform Thresholds. - Muhammad Aamir:
Content-Priority based Interest Forwarding in Content Centric Networks. - Jad Hamza:
Linearizability is EXPSPACE-complete. - Zhao Wang, Ming Xiao, Mikael Skoglund, H. Vincent Poor:
Secrecy Degrees of Freedom of Wireless X Networks Using Artificial Noise Alignment. - Holger Stengel, Jan Treibig, Georg Hager, Gerhard Wellein:
Quantifying performance bottlenecks of stencil computations using the Execution-Cache-Memory model. - Jaijeet Roychowdhury:
Boolean Computation Using Self-Sustaining Nonlinear Oscillators. - Binbin Dai, Wei Yu:
Sparse Beamforming and User-Centric Clustering for Downlink Cloud Radio Access Network. - Shuiyin Liu, Yi Hong, Emanuele Viterbo:
Unshared Secret Key Cryptography. - Shuyang Jiang, Yuantao Gu:
Block-Sparsity-Induced Adaptive Filter for Multi-Clustering System Identification. - David C. Del Rey Fernández, David W. Zingg:
Generalized Summation-by-Parts Operators for the Second Derivative with Variable Coefficients. - Juha Kontinen, Antti Kuusisto, Jonni Virtema:
Decidable Fragments of Logics Based on Team Semantics. - Katsuhiko Sano, Jonni Virtema:
Axiomatizing Propositional Dependence Logics. - Jinming Wen, Xiao-Wen Chang:
Success probability of the Babai estimators for box-constrained integer linear models. - Yuichi Yoshida:
Gowers Norm, Function Limits, and Parameter Estimation. - Jun Fang, Yanning Shen, Fuwei Li, Hongbin Li:
Prior Support Knowledge-Aided Sparse Bayesian Learning with Partly Erroneous Support Information. - Radu Iosif, Adam Rogalewicz, Tomás Vojnar:
Abstraction Refinement for Trace Inclusion of Data Automata. - Syed Zulqarnain Gilani, Faisal Shafait, Ajmal S. Mian:
Dense 3D Face Correspondence. - Meirav Zehavi:
Solving Parameterized Problems by Mixing Color Coding-Related Techniques. - Georgios Pitsilis, Wei Wang:
Harnessing the power of Social Bookmarking for improving tag-based Recommendations. - Yang Yang, Gesualdo Scutari, Daniel Pérez Palomar, Marius Pesavento:
A Parallel Stochastic Approximation Method for Nonconvex Multi-Agent Optimization Problems. - William Waites:
On the Provenance of Linked Data Statistics. - Paolo Pareti, Ewan Klein:
Learning Vague Concepts for the Semantic Web. - Ali Mesbah, Stefan Streif:
Stability for Receding-horizon Stochastic Model Predictive Control with Chance Constraints. - Mehdi Ashraphijuo, Vaneet Aggarwal, Xiaodong Wang:
On the Capacity Regions of Two-Way Diamond Channels. - Cristina David, Daniel Kroening, Matt Lewis:
Propositional Reasoning about Safety and Termination of Heap-Manipulating Programs. - Cristina David, Daniel Kroening, Matt Lewis:
Unrestricted Termination and Non-Termination Arguments for Bit-Vector Programs. - Muhammad Safdar, Ming Ronnier Luo, Xiaoyu Liu:
Comparing CSI and PCA in Amalgamation with JPEG for Spectral Image Compression. - Diego Didona, Paolo Romano:
On Bootstrapping Machine Learning Performance Predictors via Analytical Models. - Guru Guruganesh, Laura Sanità, Chaitanya Swamy:
Improved Region-Growing and Combinatorial Algorithms for $k$-Route Cut Problems. - Tang Liu, Daniela Tuninetti, Syed Ali Jafar:
The DoF of the Asymmetric MIMO Interference Channel with Square Direct Link Channel Matrices. - Jairo Alonso Giraldo, Alvaro A. Cárdenas, Nicanor Quijano:
Attenuating the Impact of Integrity Attacks on Real-Time Pricing in Smart Grids. - Santiago Segarra, Alejandro Ribeiro:
Stability and Continuity of Centrality Measures in Weighted Graphs. - Wafa Elmannai, Abdul Razaque, Khaled M. Elleithy:
Simulation based Study of TCP Variants in Hybrid Network. - Abeer Alabass, Khaled M. Elleithy, Abdul Razaque:
Dynamic Cluster Head Node Election (DCHNE) Model over Wireless Sensor Networks (WSNs). - Khaled M. Elleithy, Abdul Razaque:
Fostering of innovative usability testing to develop mobile application for mobile collaborative learning (MCL). - Yong Wang:
An Algebra of Reversible Computation. - Prateek Jain, Ambuj Tewari, Purushottam Kar:
On Iterative Hard Thresholding Methods for High-dimensional M-Estimation. - Christian Borgs, Jennifer T. Chayes, Adrian Marple, Shang-Hua Teng:
Fixed-Points of Social Choice: An Axiomatic Approach to Network Communities. - Masaaki Nagahara:
Sparsity Methods for Networked Control. - Michael Mitzenmacher, Vikram Nathan:
Hardness of Peeling with Stashes. - Haewoon Kwak, Jeremy Blackburn:
Linguistic Analysis of Toxic Behavior in an Online Video Game. - Britta Dorn, Dominikus Krüger:
On the Hardness of Bribery Variants in Voting with CP-Nets. - Meryem Benammar, Pablo Piantanida, Shlomo Shamai:
On the Compound Broadcast Channel: Multiple Description Coding and Interference Decoding. - Gregory Z. Gutin, Mark Jones, Magnus Wahlström:
Structural Parameterizations of the Mixed Chinese Postman Problem. - (Withdrawn) Universal laws and absolute lower bounds of feedback systems: entropy rate never decreases, generalized Bode integral, Gaussianity-whiteness measure, Gaussianing-whitening control, and beyond.
- Alexander Kartzow:
The field of the Reals and the Random Graph are not Finite-Word Ordinal-Automatic. - Michal Cáp, Peter Novák, Alexander Kleiner:
Finding Near-optimal Solutions in Multi-robot Path Planning. - Matthew J. Hirn, David P. Widemann:
Frames for subspaces of $\mathbb{C}^N$. - Kijung Shin, U Kang:
Distributed Methods for High-dimensional and Large-scale Tensor Factorization. - Sergei O. Kuznetsov, Artem Revenko:
Interactive Error Correction in Implicative Theories. - Albert Gordo:
Supervised mid-level features for word image representation. - Sudarshan Mukherjee, Saif Khan Mohammed:
Energy-Spectral Efficiency Trade-off for a Massive SU-MIMO System with Transceiver Power Consumption. - Moritz Kreutzer, Georg Hager, Gerhard Wellein, Andreas Pieper, Andreas Alvermann, Holger Fehske:
Performance Engineering of the Kernel Polynomial Method on Large-Scale CPU-GPU Systems. - Hui Liu, Zhiyong Chen, Xiaohua Tian, Xinbing Wang, Meixia Tao:
On Content-centric Wireless Delivery Networks. - Lorenzo Livi, Guido Del Vescovo, Antonello Rizzi, Fabio Massimo Frattale Mascioli:
Building pattern recognition applications with the SPARE library. - Parthapratim De:
Computationally -Efficient Algorithms for Multiuser Detection in Short Code Wideband CDMA (TDD) Systems. - Robert Soulé, Bugra Gedik:
Optimized Disk Layouts for Adaptive Storage of Interaction Graphs. - Francesca Arrigo, Michele Benzi:
Updating and downdating techniques for optimizing network communicability. - (Withdrawn) Full Duplex Networking: Mission Impossible?
- Sebastian Raschka:
Naive Bayes and Text Classification I - Introduction and Theory. - Sebastian Raschka:
An Overview of General Performance Metrics of Binary Classifier Systems. - Wenqian Shen, Linglong Dai, Zhen Gao, Zhaocheng Wang:
Spatially correlated channel estimation based on block iterative support detection for large-scale MIMO. - Silas L. Fong:
Classes of Delay-Independent Multimessage Multicast Networks under the Generalized Model. - Fredrick Romanus Ishengoma, Adam B. Mtaho:
3D Printing: Developing Countries Perspectives. - Stefan Kiefer, Ines Marusic, James Worrell:
Minimisation of Multiplicity Tree Automata. - Robert Elsässer, Dominik Kaaser:
On the Influence of Graph Density on Randomized Gossiping. - Claudio Cusano, Paolo Napoletano, Raimondo Schettini:
Remote sensing image classification exploiting multiple kernel learning. - Hubie Chen:
Proof Complexity Modulo the Polynomial Hierarchy: Understanding Alternation as a Source of Hardness. - Eric L. Seidel, Niki Vazou, Ranjit Jhala:
Type Targeted Testing. - Amin Emad, Olgica Milenkovic:
Poisson Group Testing: A Probabilistic Model for Boolean Compressed Sensing. - María Svorenová, Jan Kretínský, Martin Chmelik, Krishnendu Chatterjee, Ivana Cerná, Calin Belta:
Temporal Logic Control for Stochastic Linear Systems using Abstraction Refinement of Probabilistic Games. - Dehua Cheng, Yu Cheng, Yan Liu, Richard Peng, Shang-Hua Teng:
Scalable Parallel Factorizations of SDD Matrices and Efficient Sampling for Gaussian Graphical Models. - Alex Graves, Greg Wayne, Ivo Danihelka:
Neural Turing Machines. - Panagiotis G. Tsalaportas, Vasilios M. Kapinas, George K. Karagiannidis:
Solar Lab Notebook (SLN): An Ultra-Portable Web-Based System for Heliophysics and High-Security Labs. - Antoine Thomas:
Rearrangement Problems with Duplicated Genomic Markers. - Michael Mpasios, Dimitris Kallergis, Konstantinos Chimos, Theodoros Karvounidis, Christos Douligeris:
Software in e-Learning Architecture, Processes and Management. - Russell A. Brown:
Building a Balanced k-d Tree in O(kn log n) Time. - Cezary Kaliszyk, Lionel Mamane, Josef Urban:
Machine Learning of Coq Proof Guidance: First Experiments. - Chang Liu, Yi Xu:
Feature Selection Based on Confidence Machine. - Cezary Kaliszyk, Josef Urban, Jirí Vyskocil:
Certified Connection Tableaux Proofs for HOL Light and TPTP. - Ramon Ferrer-i-Cancho:
A stronger null hypothesis for crossing dependencies. - Terence H. Chan, Siu-Wai Ho, Hirosuke Yamamoto:
Private Information Retrieval for Coded Storage. - Michael Bloodgood, Chris Callison-Burch:
Using Mechanical Turk to Build Machine Translation Evaluation Sets. - Shihao Yan, Ido Nevat, Gareth W. Peters, Robert A. Malaney:
Location Verification Systems Under Spatially Correlated Shadowing. - Jaspreet Singh, Sudhir Ramakrishna:
On the feasibility of beamforming in millimeter wave communication systems with multiple antenna arrays. - Rodrigo C. de Lamare, Raimundo Sampaio Neto:
Blind Adaptive MIMO Receivers for CDMA Systems with Space-Time Block-Codes and Low-Cost Algorithms. - Jie Feng, Wei Liu, Yan Wang:
Learning to Rank Binary Codes. - Ashok Kumar Moses, Rajesh Sundaresan:
Minimization Problems Based on a Parametric Family of Relative Entropies II: Reverse Projection. - Mikhail Tikhomirov:
On computational complexity of length embeddability of graphs. - Matthias Rolf, Minoru Asada:
Where do goals come from? A Generic Approach to Autonomous Goal-System Development. - Tareq M. Malas, Georg Hager, Hatem Ltaief, David E. Keyes:
Towards energy efficiency and maximum computational intensity for stencil algorithms using wavefront diamond temporal blocking. - Jason Crampton, Naomi Farley, Gregory Z. Gutin, Mark Jones, Bertram Poettering:
Cryptographic Enforcement of Information Flow Policies without Public Information. - Roberto Sebastiani, Patrick Trentin:
Pushing the envelope of Optimization Modulo Theories with Linear-Arithmetic Cost Functions. - Alberto G. Perotti, Branislav M. Popovic:
Non-Orthogonal Multiple Access for Degraded Broadcast Channels: RA-CEMA. - Arman Ahmadzadeh, Adam Noel, Robert Schober:
Analysis and Design of Multi-Hop Diffusion-Based Molecular Communication Networks. - Ramviyas Parasuraman:
Mobility Enhancement for Elderly. - Michael Hemmer, Michal Kleinbort, Dan Halperin:
Optimal randomized incremental construction for guaranteed logarithmic planar point location. - Joaquim Borges, Cristina Fernández-Córdoba, Roger Ten-Valls:
Z2-double cyclic codes. - Paolo Napoletano, Giuseppe Boccignone, Francesco Tisato:
Attentive monitoring of multiple video streams driven by a Bayesian foraging strategy. - Amihood Amir, Oren Kapah, Ely Porat, Amir Rothschild:
Polynomials: a new tool for length reduction in binary discrete convolutions. - Thanos G. Stavropoulos, Stelios Andreadis, Nick Bassiliades, Dimitris Vrakas, Ioannis P. Vlahavas:
The Tomaco Hybrid Matching Framework for SAWSDL Semantic Web Services. - Marcel Caria, Tamal Das, Admela Jukan, Marco Hoffmann:
Divide and Conquer: Partitioning OSPF networks with SDN. - Tamás Varga, András Király, János Abonyi:
Improvement of PSO algorithm by memory based gradient search - application in inventory management. - Malcolm A. Egan, Yansha Deng, Maged Elkashlan, Trung Quang Duong:
Variance-Constrained Capacity of the Molecular Timing Channel with Synchronization Error. - Malcolm A. Egan, Adam Noel, Yansha Deng, Maged Elkashlan, Trung Quang Duong:
The Unreasonable Effectiveness of Blood Pressure Measurement: Molecular Communication in Biological Systems. - Sahar Vahdati, Christoph Lange, Sören Auer:
OpenCourseWare Observatory - Does the Quality of OpenCourseWare Live up to its Promise? - Rajesh Sharma, Deepak Subramanian, Satish Narayana Srirama:
DAPriv: Decentralized architecture for preserving the privacy of medical data. - WeiQiang Xu, Yushu Zhang, Qingjiang Shi, Xiaodong Wang:
Dynamic Optimization For Heterogeneous Powered Wireless Multimedia Sensor Networks With Correlated Sources and Network Coding. - Yaron Velner:
Robust Multidimensional Mean-Payoff Games are Undecidable. - Maksym A. Girnyk, Mikko Vehkaperä, Lars K. Rasmussen:
Asymptotic Performance Analysis of a K-Hop Amplify-and-Forward Relay MIMO Channel. - M. S. S. Khan:
A Computer Virus Propagation Model Using Delay Differential Equations With Probabilistic Contagion And Immunity. - Debdipta Goswami, Heiko Hamann:
Investigation of A Collective Decision Making System of Different Neighbourhood-Size Based on Hyper-Geometric Distribution. - Daniel Kroening, Matt Lewis, Georg Weissenbacher:
Proving Safety with Trace Automata and Bounded Model Checking. - Giuseppa Alfano, Carla-Fabiana Chiasserini, Alessandro Nordio, Siyuan Zhou:
Closed-form Output Statistics of MIMO Block-Fading Channels. - Lutz Bornmann, Werner Marx:
Methods for the generation of normalized citation impact scores in bibliometrics: Which method best reflects the judgements of experts? - Ahmad Josi, Leon Andretti Abdillah, Suryayusra:
Penerapan teknik web scraping pada mesin pencari artikel ilmiah. - Sergio Cabello, David Gajser:
Simple PTAS's for families of graphs excluding a minor. - Jesus Robledo, Jonathan Leloux, Eduardo Lorenzo:
3D simulation of complex shading affecting PV systems taking benefit from the power of graphics cards developed for the video game industry. - Axel Legay, Sean Sedwards, Louis-Marie Traonouez:
Lightweight Verification of Markov Decision Processes with Rewards. - Amartya Hatua:
Optimal Feature Selection from VMware ESXi 5.1 Feature Set. - Mohamed H. E. Aouadi, Khalifa Toumi, Ana R. Cavalli:
Testing Security Policies for Distributed Systems: Vehicular Networks as a Case Study. - Santosh Kumar Majhi, Padmalochan Bera:
OHMF: A Query Based Optimal Healthcare Medication Framework. - Andrey Bogomolov, Bruno Lepri, Michela Ferron, Fabio Pianesi, Alex Pentland:
Daily Stress Recognition from Mobile Phone Data, Weather Conditions and Individual Traits. - Aaron B. Adcock, Erik D. Demaine, Martin L. Demaine, Michael P. O'Brien, Felix Reidl, Fernando Sánchez Villaamil, Blair D. Sullivan:
Zig-Zag Numberlink is NP-Complete. - Zhiguo Ding, Mugen Peng, H. Vincent Poor:
Cooperative Non-Orthogonal Multiple Access in 5G Systems. - Ramanathan V. Guha:
Towards a Model Theory for Distributed Representations. - Ran Xu, Gang Chen, Caiming Xiong, Wei Chen, Jason J. Corso:
Compositional Structure Learning for Action Understanding. - Holger Boche, Volker Pohl:
System Approximations and Generalized Measurements in Modern Sampling Theory. - Michael Bloodgood, Chris Callison-Burch:
Bucking the Trend: Large-Scale Cost-Focused Active Learning for Statistical Machine Translation. - Yujia Li, Richard S. Zemel:
Mean-Field Networks. - Mugen Peng, Shi Yan, H. Vincent Poor:
Ergodic Capacity Analysis of Remote Radio Head Associations in Cloud Radio Access Networks. - Raad Ahmed Hadi, Ghazali Sulong, Loay Edwar George:
Vehicle Detection and Tracking Techniques: A Concise Review. - Bhavya Kailkhura, Swastik Brahma, Berkan Dulek, Yunghsiang S. Han, Pramod K. Varshney:
Distributed Detection in Tree Networks: Byzantines and Mitigation Techniques. - Franck Dernoncourt:
Replacing the computer mouse. - Yonghui Xiao, Li Xiong:
Dynamic Differential Privacy for Location based Applications. - Huaizu Jiang, Zejian Yuan, Ming-Ming Cheng, Yihong Gong, Nanning Zheng, Jingdong Wang:
Salient Object Detection: A Discriminative Regional Feature Integration Approach. - Qian Gao, Chen Gong, Rui Wang, Zhengyuan Xu, Yingbo Hua:
Constellation Design for Multi-color Visible Light Communications. - Tarik Anouari, Abdelkrim Haqiq:
An Improved UGS Scheduling with QoE Metrics in WiMAX Network. - Maximilian Ernestus, Stephan Friedrichs, Michael Hemmer, Jan Kokemüller, Alexander Kröller, Mahdi Moeini, Christiane Schmidt:
Algorithms for Art Gallery Illumination. - (Withdrawn) An Application of Fixed-point Theory to Probabilistic Social Choice.
- Svante Janson, Alfredo Viola:
A unified approach to linear probing hashing with buckets. - Michael Luckeneder, Adam Barker:
Uncovering the Perfect Place: Optimising Workflow Engine Deployment in the Cloud. - Daniel Aubram:
Optimization-based smoothing algorithm for triangle meshes over arbitrarily shaped domains. - Henning Schnoor:
The Relative Succinctness and Expressiveness of Modal Logics Can Be Arbitrarily Complex. - Vladimir V'yugin:
Log-Optimal Portfolio Selection Using the Blackwell Approachability Theorem. - Jingyuan Zhang, Xiaoxiao Shi, Xiangnan Kong, Hong-Han Shuai, Philip S. Yu:
Discovering Organizational Correlations from Twitter. - Volker Diekert, Manfred Kufleitner:
A Survey on the Local Divisor Technique. - Karthik Upadhya, Chandra Sekhar Seelamantula, K. V. S. Hari:
A Risk Minimization Framework for Channel Estimation in OFDM Systems. - Toshimasa Ishii, Kazuhisa Makino:
Posimodular Function Optimization. - Anoop Thomas, R. Kavitha, A. Chandramouli, B. Sundar Rajan:
Optimal Index Coding with Min-Max Probability of Error over Fading Channels. - Roberto Sebastiani, Silvia Tomasi:
Optimization Modulo Theories with Linear Rational Costs. - Daniel Kroening, Subodh Sharma, Björn Wachter:
AbPress: Flexing Partial-Order Reduction and Abstraction. - Ivana Micic, Zorana Jancic, Jelena Ignjatovic, Miroslav Ciric:
Determinization of fuzzy automata by means of the degrees of language inclusion. - Shmuel Friedland, Lek-Heng Lim:
Computational Complexity of Tensor Nuclear Norm. - Rupak Majumdar, Vinayak S. Prabhu:
Computing the Skorokhod Distance between Polygonal Traces (Full Paper). - Alex Biryukov, Ivan Pustogarov:
Bitcoin over Tor isn't a good idea. - Osman Günay, Cem Emre Akbas, A. Enis Çetin:
Cosine Similarity Measure According to a Convex Cost Function. - Iván Blanco-Chacón, Camilla Hollanti, Montserrat Alsina, Dionís Remón:
Fuchsian codes with arbitrarily high code rate. - Ronan Hamon, Pierre Borgnat, Patrick Flandrin, Céline Robardet:
Heuristic for solving cyclic bandwidth sum problem by following the structure of the graph. - Edoardo Serra, Francesca Spezzano, V. S. Subrahmanian:
ChoiceGAPs: Competitive Diffusion as a Massive Multi-Player Game in Social Networks. - Matteo Dell'Amico, Damiano Carra, Pietro Michiardi:
PSBS: Practical Size-Based Scheduling. - Germán Ros, José M. Álvarez, Julio Guerrero:
Motion Estimation via Robust Decomposition with Constrained Rank. - Mark O. Riedl:
The Lovelace 2.0 Test of Artificial Creativity and Intelligence. - Tien Van Do, Binh Thai Vu, Nam H. Do, Lóránt Farkas, Csaba Rotter, Tamás Tarjányi:
Building Block Components to Control a Data Rate in the Apache Hadoop Compute Platform. - Tarik Anouari, Abdelkrim Haqiq:
A QoE-Based Scheduling Algorithm for UGS Service Class in WiMAX Network. - Alessandro Perina, Nebojsa Jojic:
Capturing spatial interdependence in image features: the counting grid, an epitomic representation for bags of features. - Brijesh Dongol, John Derrick:
Verifying linearizability: A comparative survey. - Sven Banisch:
The Probabilistic Structure of Discrete Agent-Based Models. - Martin Beck:
Enhanced TKIP Michael Attacks. - Erika De Benedetti, Simona Ronchi Della Rocca:
A type assignment for lambda-calculus complete both for FPTIME and strong normalization. - Junhua Li, Chao Li, Andrzej Cichocki:
Canonical Polyadic Decomposition with Assistant Information for Brain Computer Interface. - Yves van Gennip, Prashant Athavale, Jérôme Gilles, Rustum Choksi:
A Regularization Approach to Blind Deblurring and Denoising of QR Barcodes. - Pavel Hron, Daniel Jost, Peter Bastian, Claudia Gallert, Josef Winter, Olaf Ippisch:
Application of reactive transport modelling to growth and transport of microorganisms in the capillary fringe. - Toni Ernvall, Thomas Westerbäck, Camilla Hollanti, Ragnar Freij:
Constructions and Properties of Linear Locally Repairable Codes. - Paulo Oliva, Thomas Powell:
Bar recursion over finite partial functions. - Jonathan A. DeCastro, Rüdiger Ehlers, Matthias Rungger, Ayca Balkan, Paulo Tabuada, Hadas Kress-Gazit:
Dynamics-Based Reactive Synthesis and Automated Revisions for High-Level Robot Control. - Doron Kukliansky, Ohad Shamir:
Attribute Efficient Linear Regression with Data-Dependent Sampling. - Marzio De Biasi:
Permutation Reconstruction from Differences. - Abbas Mehrabian:
Justifying the small-world phenomenon via random recursive trees. - Nikolaos Fountoulakis, Tobias Friedrich, Danny Hermelin:
On the Average-case Complexity of Parameterized Clique. - Vladimir V. Bochkarev, Yulia S. Maslennikova:
Initialization of multilayer forecasting artifical neural networks. - Jingbo Shang, Tianqi Chen, Hang Li, Zhengdong Lu, Yong Yu:
A Parallel and Efficient Algorithm for Learning to Match. - Pawel Gawrychowski, Przemyslaw Uznanski:
Tight tradeoffs for approximating palindromes in streams. - Ji Zhao, Deyu Meng, Jiayi Ma:
Density-Based Region Search with Arbitrary Shape for Object Localization. - Jiahao Chen, Alan Edelman:
Parallel Prefix Polymorphism Permits Parallelization, Presentation & Proof. - Mikaël A. Mousse, Eugène C. Ezin, Cina Motamed:
Foreground-Background Segmentation Based on Codebook and Edge Detector. - Tarik Anouari, Abdelkrim Haqiq:
QoE-Based Scheduling Algorithm in WiMAX Network using Manhattan Grid Mobility Model. - Satish Bhambri:
Quantum Clouds: A future perspective. - Levon Haykazyan:
Decidability of the Clark's Completion Semantics for Monadic Programs and Queries. - Yunan Gu, Walid Saad, Mehdi Bennis, Mérouane Debbah, Zhu Han:
Matching Theory for Future Wireless Networks: Fundamentals and Applications. - Talal Rahwan, Tomasz P. Michalak:
Coalition Structure Generation on Graphs. - David Tolpin:
Justifying and Improving Meta-Agent Conflict-Based Search. - Erik D. Demaine, Jason S. Ku:
Filling a Hole in a Crease Pattern: Isometric Mapping from Prescribed Boundary Folding. - Ziming Zhang, Yuting Chen, Venkatesh Saligrama:
A Novel Visual Word Co-occurrence Model for Person Re-identification. - Raja Giryes:
Sampling in the Analysis Transform Domain. - Natarajan Lakshmi Prasad, Yi Hong, Emanuele Viterbo:
Lattice Index Coding. - Mihai Cucuringu, M. Puck Rombach, Sang Hoon Lee, Mason A. Porter:
Detection of Core-Periphery Structure in Networks Using Spectral Methods and Geodesic Paths. - Lan Zhang, Kebin Liu, Xiang-Yang Li, Puchun Feng, Cihang Liu, Yunhao Liu:
Enable Portrait Privacy Protection in Photo Capturing and Sharing. - Lan Zhang, Taeho Jung, Cihang Liu, Xuan Ding, Xiang-Yang Li, Yunhao Liu:
Outsource Photo Sharing and Searching for Mobile Devices With Privacy Protection. - Ankur Gupta, Ankit Chaudhary:
Hiding Sound in Image by K-LSB Mutation. - Lan Zhang, Taeho Jung, Puchun Feng, Xiang-Yang Li, Yunhao Liu:
Cloud-based Privacy Preserving Image Storage, Sharing and Search. - Dominik Bartuschat, Ulrich Rüde:
Parallel Multiphysics Simulations of Charged Particles in Microfluidic Flows. - M. Kavin, K. Keerthana, N. Sadagopan, Sangeetha S, R. Vinothini:
Some Combinatorial Problems on Halin Graphs. - Germán Corrales Madueño, Cedomir Stefanovic, Petar Popovski:
Reengineering GSM/GPRS Towards a Dedicated Network for Massive Smart Metering. - Germán Corrales Madueño, Cedomir Stefanovic, Petar Popovski:
Efficient LTE Access with Collision Resolution for Massive M2M Communications. - Gianluca Stringhini, Olivier Thonnard:
That Ain't You: Detecting Spearphishing Emails Before They Are Sent. - Paul Swoboda, Alexander Shekhovtsov, Jörg Hendrik Kappes, Christoph Schnörr, Bogdan Savchynskyy:
Partial Optimality by Pruning for MAP-Inference with General Graphical Models. - Juha Kontinen, Julian-Steffen Müller, Henning Schnoor, Heribert Vollmer:
A Van Benthem Theorem for Modal Team Semantics. - Matias Martinez, Martin Monperrus:
ASTOR: Evolutionary Automatic Software Repair for Java. - Benedikt Boehm:
StegExpose - A Tool for Detecting LSB Steganography. - Laurent Bulteau, Gustavo Sacomoto, Blerina Sinaimeri:
Computing an Evolutionary Ordering is Hard. - Volker Turau:
Analyzing the Fault-Containment Time of Self-Stabilizing Algorithms - A Case Study for Graph Coloring. - Yong Lai, Dayou Liu, Minghao Yin:
Augmenting Ordered Binary Decision Diagrams with Conjunctive Decomposition. - Larry Koved, Kapil Singh, Hao Chen, Mike Just:
Proceedings of the Third Workshop on Mobile Security Technologies (MoST) 2014. - Hisham Elshaer, Federico Boccardi, Mischa Dohler, Ralf Irmer:
Load & Backhaul Aware Decoupled Downlink/Uplink Access in 5G Systems. - Alexey Kolesnichenko, Christopher M. Poskitt, Sebastian Nanz, Bertrand Meyer:
Contract-Based General-Purpose GPU Programming. - Daniel Le Berre, Emmanuel Lonca, Pierre Marquis:
On the Complexity of Optimization Problems based on Compiled NNF Representations. - Olga Peled, Michael Fire, Lior Rokach, Yuval Elovici:
Matching Entities Across Online Social Networks. - Jurek Czyzowicz, Evangelos Kranakis, Danny Krizanc, Lata Narayanan, Jaroslav Opatrny:
Optimal online and offline algorithms for robot-assisted restoration of barrier coverage. - Sheng Huang, Ahmed M. Elgammal, Dan Yang:
On The Effect of Hyperedge Weights On Hypergraph Learning. - Martin Kroll, Simone Steinmetzer:
Automated Cryptanalysis of Bloom Filter Encryptions of Health Records. - Christoph Riedl, Richard Zanibbi, Marti A. Hearst, Siyu Zhu, Michael Menietti, Jason Crusan, Ivan Metelsky, Karim R. Lakhani:
Detecting Figures and Part Labels in Patents: Competition-Based Development of Image Processing Algorithms. - Michael Axtmann, Timo Bingmann, Peter Sanders, Christian Schulz:
Practical Massively Parallel Sorting - Basic Algorithmic Ideas. - Purushottam Kar, Harikrishna Narasimhan, Prateek Jain:
Online and Stochastic Gradient Methods for Non-decomposable Loss Functions. - Michael P. O'Brien, Blair D. Sullivan:
Locally Estimating Core Numbers. - Nidhi Sindhwani, Manjit Singh:
Transmit antenna subset selection in MIMO OFDM system using adaptive mutation Genetic algorithm. - Wojciech Mazurczyk, Luca Caviglione:
Steganography in Modern Smartphones and Mitigation Techniques. - Michael B. Cohen, Sam Elder, Cameron Musco, Christopher Musco, Madalina Persu:
Dimensionality Reduction for k-Means Clustering and Low Rank Approximation. - Jesús A. De Loera, Susan Margulies, Michael Pernpeintner, Eric Riedl, David Rolnick, Gwen Spencer, Despina Stasi, Jon Swenson:
Gröbner Bases and Nullstellensätze for Graph-Coloring Ideals. - Ramy Medhat, Borzoo Bonakdarpour, Sebastian Fischmeister:
Power Redistribution for Optimizing Performance in MPI Clusters. - Isik Baris Fidaner, Ali Taylan Cemgil:
Clustering Words by Projection Entropy. - Benjamin Larrousse, Olivier Beaude, Samson Lasaulce:
Crawford-Sobel meet Lloyd-Max on the grid. - Diederik Aerts, Sandro Sozzo, Tomas Veloz:
The Quantum Nature of Identity in Human Thought: Bose-Einstein Statistics for Conceptual Indistinguishability. - Alberto Dainotti, Karyn Benson, Alistair King, kc claffy, Eduard Glatz, Xenofontas A. Dimitropoulos, Philipp Richter, Alessandro Finamore, Alex C. Snoeren:
Lost in Space: Improving Inference of IPv4 Address Space Utilization. - Konrad K. Dabrowski, Petr A. Golovach, Pim van 't Hof, Daniël Paulusma:
Editing to Eulerian Graphs. - Qian Gao, Chen Gong, Rui Wang, Zhengyuan Xu, Yingbo Hua:
From DC-Biased to DC-Informative Optical OFDM. - (Withdrawn) Random Almost-Popular Matchings.
- Abdullah Masood, M. Asim Ali:
Applying Agile Requirements Engineering Approach for Re-engineering & Changes in existing Brownfield Adaptive Systems. - Laxmi Narayana M., Sunil Kumar Kopparapu:
Choice of Mel Filter Bank in Computing MFCC of a Resampled Speech. - Laxmi Narayana M., Sunil Kumar Kopparapu:
On the use of Stress information in Speech for Speaker Recognition. - Sunil Kumar Kopparapu, Lajish V. L.:
A Framework for On-Line Devanagari Handwritten Character Recognition. - Richard Kueng, Holger Rauhut, Ulrich Terstiege:
Low rank matrix recovery from rank one measurements. - Viktoras Veitas, David Weinbaum:
A World of Views: A World of Interacting Post-human Intelligences. - Robert Margolies, Maria Gorlatova, John Sarik, Peter R. Kinget, Ioannis Kymissis, Gil Zussman:
Project-based Learning within a Large-Scale Interdisciplinary Research Effort. - Aleksandr Cariow, Galina Cariowa:
A Hardware-oriented Algorithm for Complex-valued Constant Matrix-vector Multiplication. - Hamed O. Ghaffari, P. M. Benson, K. Xia, R. Paul Young:
Kibble-Zurek Mechanism in Microscopic Acoustic Cracking Noises. - Karan Mitra, Arkady B. Zaslavsky, Christer Åhlund:
QoE Modelling, Measurement and Prediction: A Review. - Gemma Morral, Pascal Bianchi, Gersende Fort:
Success and Failure of Adaptation-Diffusion Algorithms for Consensus in Multi-Agent Networks. - Vilém Vychodil:
Parameterizing the semantics of fuzzy attribute implications by systems of isotone Galois connections. - Christoph Becker, Ruzanna Chitchyan, Leticia Duboc, Steve Easterbrook, Martin Mahaux, Birgit Penzenstadler, Guillermo Rodríguez-Navas, Camille Salinesi, Norbert Seyff, Colin C. Venters, Coral Calero, Sedef Akinli Koçak, Stefanie Betz:
The Karlskrona manifesto for sustainability design. - Mariusz Bojarski, Anna Choromanska, Krzysztof Choromanski, Yann LeCun:
Differentially- and non-differentially-private random decision trees. - Apoorv Agarwal, Anna Choromanska, Krzysztof Choromanski:
Notes on using Determinantal Point Processes for Clustering with Applications to Text Clustering. - Edith Cohen, Daniel Delling, Thomas Pajor, Renato F. Werneck:
Timed Influence: Computation and Maximization. - Wasim Huleihel, Nir Weinberger, Neri Merhav:
Erasure/List Random Coding Error Exponents Are Not Universally Achievable. - Jean-Daniel Boissonnat, Ramsay Dyer, Arijit Ghosh, Steve Y. Oudot:
Only distances are required to reconstruct submanifolds. - Ivan Lanese, Alberto Lluch-Lafuente, Ana Sokolova, Hugo Torres Vieira:
Proceedings 7th Interaction and Concurrency Experience, ICE 2014, Berlin, Germany, 6th June 2014. EPTCS 166, 2014 [contents] - Jingying Ma, Yuanshi Zheng, Bin Wu, Long Wang:
Optimal topology of multi-agent systems with two leaders: a zero-sum game perspective. - Qiang Huo, Kun Yang, Lingyang Song, Yonghui Li, Bingli Jiao:
Compressed Relaying for Two-Way Relay Networks with Correlated Sources. - Amit Daniely:
A PTAS for Agnostically Learning Halfspaces. - Bijit Kumar Das, Mrityunjoy Chakraborty, Jerónimo Arenas-García:
Sparse Distributed Learning via Heterogeneous Diffusion Adaptive Networks. - Sander Beckers, Joost Vennekens:
Probabilistic Definitions of Actual Causation Using CP-logic. - Oscar Beijbom:
Cost-Effective Sampling for Pairs of Annotators. - Aleksandr N. Maksimenko:
Complexity of LP in Terms of the Face Lattice. - Marek Chrobak, Mordecai J. Golin, Tak Wah Lam, Dorian Nogneng:
Scheduling with Gaps: New Models and Algorithms. - Harris V. Georgiou:
Estimating the intrinsic dimension in fMRI space via dataset fractal analysis - Counting the 'cpu cores' of the human brain. - Barry Jay, Jose Vergara:
Confusion in the Church-Turing Thesis. - Nevin Lianwen Zhang, Chen Fu, Tengfei Liu, Kin Man Poon, Peixian Chen, Bao Xin Chen, Yun Ling Zhang:
An Evidence-Based Approach to Patient Classification in Traditional Chinese Medicine based on Latent Tree Analysis. - Peng Bao, Huawei Shen, Xueqi Cheng:
Prediction of "Forwarding Whom" Behavior in Information Diffusion. - Manasij Venkatesh, Chandra Sekhar Seelamantula:
Directional Bilateral Filters. - John-Alexander M. Assael, Ziyu Wang, Nando de Freitas:
Heteroscedastic Treed Bayesian Optimisation. - Martina Cardone, Daniela Tuninetti, Raymond Knopp:
The Approximate Optimality of Simple Schedules for Half-Duplex Multi-Relay Networks. - Fredrik Johansson:
Efficient implementation of elementary functions in the medium-precision range. - Leon Derczynski, Diana Maynard, Giuseppe Rizzo, Marieke van Erp, Genevieve Gorrell, Raphaël Troncy, Johann Petrak, Kalina Bontcheva:
Analysis of Named Entity Recognition and Linking for Tweets. - Borzoo Rassouli, Bruno Clerckx:
On the Capacity of Vector Gaussian Channels With Bounded Inputs. - Xuan Guang, Jiyong Lu, Fang-Wei Fu:
Repairable Threshold Secret Sharing Schemes. - Alberto Ravagnani:
Generalized weights: an anticode approach. - Daniel Castro, Paulo Félix, Jesús Presedo:
A method for context-based adaptive QRS clustering in real-time. - Félix Díaz-Hermida, Alberto Bugarín, David E. Losada:
The probatilistic Quantifier Fuzzification Mechanism FA: A theoretical analysis. - Benjamin Lucien Kaminski, Joost-Pieter Katoen:
Analyzing Expected Outcomes and Almost-Sure Termination of Probabilistic Programs is Hard. - Tobias Jacobs, Salvatore Longo:
A New Perspective on the Windows Scheduling Problem. - Abdou Guermouche, Loris Marchal, Bertrand Simon, Frédéric Vivien:
Scheduling Trees of Malleable Tasks for Sparse Linear Algebra. - Abhimanyu Sarin, Jagadish Nayak:
Iris Biometric System using a hybrid approach. - Abhishek Bhowmick, Ariel Gabizon, Thái Hoàng Lê, David Zuckerman:
Deterministic Extractors for Additive Sources. - Björn Gmeiner, Tobias Gradl, Francisco José Gaspar, Ulrich Rüde:
Optimization of the Multigrid-Convergence Rate on Semi-structured Meshes by Local Fourier Analysis. - Nikos Chondros, Stathis Maneas, Christos Patsonakis, Panos Diamantopoulos, Mema Roussopoulos:
Practical Asynchronous Interactive Consistency. - Zhigang Cao, Xujin Chen, Xiao-Dong Hu, Changjun Wang:
Pricing in Social Networks with Negative Externalities. - Bálint Antal, Bence Remenyik, András Hajdu:
An Unsupervised Ensemble-based Markov Random Field Approach to Microscope Cell Image Segmentation. - Katerina Smiljkovikj, Hisham Elshaer, Petar Popovski, Federico Boccardi, Mischa Dohler, Liljana Gavrilovska, Ralf Irmer:
Capacity Analysis of Decoupled Downlink and Uplink Access in 5G Heterogeneous Systems. - Yang Hu, Huadong Meng, Yimin Liu, Xiqin Wang:
High Range Resolution Profiling in Missing Data Case: A New Approach. - Alexander Herzog, Nicholas Rotella, Sean Mason, Felix Grimminger, Stefan Schaal, Ludovic Righetti:
Momentum Control with Hierarchical Inverse Dynamics on a Torque-Controlled Humanoid. - Chao-Kai Wen, Jun Zhang, Kai-Kit Wong, Jung-Chieh Chen, Chau Yuen:
On Sparse Vector Recovery Performance in Structurally Orthogonal Matrices via LASSO. - Sebastian Risi, Julian Togelius:
Neuroevolution in Games: State of the Art and Open Challenges. - Paul M. B. Vitányi:
Exact Expression For Information Distance. - Peter Hegarty, Anders Martinsson, Edvin Wedin:
The Hegselmann-Krause dynamics on the circle converge. - Divya Harika Nagabhyrava:
Efficient Key Generation for Dynamic Blom's Scheme. - Çagkan Yapar, Volker Pohl, Holger Boche:
Fast Compressive Phase Retrieval from Fourier Measurements. - Jianhua Mo, Robert W. Heath Jr.:
Capacity Analysis of One-Bit Quantized MIMO Systems with Transmitter Channel State Information. - Elizabeth Basha, Raja Jurdak, Daniela Rus:
In-Network Distributed Solar Current Prediction. - Jayadeva, Sanjit S. Batra, Siddarth Sabharwal:
Feature Selection through Minimization of the VC dimension. - Nicholas Rhinehart, Jiaji Zhou, Martial Hebert, J. Andrew Bagnell:
Visual Chunking: A List Prediction Framework for Region-Based Object Detection. - Kiran Kumar Bhuvanagiri, Sunil Kumar Kopparapu:
Modified Mel Filter Bank to Compute MFCC of Subsampled Speech. - Yunjin Chen:
Higher-order MRFs based image super resolution: MMSE or MAP? - Varun Jampani, S. M. Ali Eslami, Daniel Tarlow, Pushmeet Kohli, John M. Winn:
Consensus Message Passing for Layered Graphical Models. - Neeraj Dhungel, Gustavo Carneiro, Andrew P. Bradley:
Deep Structured learning for mass segmentation from Mammograms. - Daniel Povey, Xiaohui Zhang, Sanjeev Khudanpur:
Parallel training of Deep Neural Networks with Natural Gradient and Parameter Averaging. - Ahmed Ewaisha, Cihan Tepedelenlioglu:
Throughput Optimization in Multi-Channel Cognitive Radios with Hard Deadline Constraints. - Håkon Normann, Cristian Prisacariu, Thomas T. Hildebrandt:
Concurrency Models with Causality and Events as Psi-calculi. 4-20 - Sung-Shik T. Q. Jongmans, Farhad Arbab:
Toward Sequentializing Overparallelized Protocol Code. 38-44 - Diego Latella, Michele Loreti, Mieke Massink:
On-the-fly Probabilistic Model Checking. 45-59 - Nicolas Ninin, Emmanuel Haucourt:
The Boolean Algebra of Cubical Areas as a Tensor Product in the Category of Semilattices with Zero. 60-66 - Davide Basile, Pierpaolo Degano, Gian-Luigi Ferrari, Emilio Tuosto:
From Orchestration to Choreography through Contract Automata. 67-85 - Massimo Bartoletti, Tiziana Cimoli, G. Michele Pinna:
A note on two notions of compliance. 86-93 - H. Birkan Yilmaz, Chan-Byoung Chae, Burcu Tepekule, Ali Emre Pusane:
Arrival Modeling and Error Analysis for Molecular Communication via Diffusion with Drift. - Tianfei Zhou, Yao Lu, Feng Lv, Huijun Di, Qingjie Zhao, Jian Zhang:
Abrupt Motion Tracking via Nearest Neighbor Field Driven Stochastic Sampling. - Zhongkui Li, Zhisheng Duan:
Distributed Adaptive Consensus Protocols for Linear Multi-agent Systems with Directed Graphs and External Disturbances. - Namyoon Lee, François Baccelli, Robert W. Heath Jr.:
Spectral Efficiency Scaling Laws in Dense Random Wireless Networks with Multiple Receive Antennas. - Deeparnab Chakrabarty, Sanjeev Khanna, Shi Li:
On $(1, ε)$-Restricted Assignment Makespan Minimization. - Abhinav Kumar, Rahul Vaze, Sibi Raj B. Pillai, Aditya Gopalan:
Optimal WiFi Sensing via Dynamic Programming. - Oliver Friedmann, Thomas Dueholm Hansen, Uri Zwick:
Random-Facet and Random-Bland require subexponential time even for shortest paths. - Krzysztof Ciebiera, Piotr Godlewski, Piotr Sankowski, Piotr Wygocki:
Approximation Algorithms for Steiner Tree Problems Based on Universal Solution Frameworks. - Swaleha Saeed, M. Sarosh Umar, M. Athar Ali, Musheer Ahmad:
Fisher-Yates Chaotic Shuffling Based Image Encryption. - Benjamin Aminof, Aniello Murano, Sasha Rubin:
Satisfiability and Model Checking of CTL* with Graded Path Modalities. - Rourab Paul, Amlan Chakrabarti, Ranjan Ghosh:
Multi Core SSL/TLS Security Processor Architecture Prototype Design with automated Preferential Algorithm in FPGA. - Linchao Bao, Qingxiong Yang:
Robust Piecewise-Constant Smoothing: M-Smoother Revisited. - Kasim Sinan Yildirim, Önder Gürcan:
Adaptive Synchronization of Robotic Sensor Networks. - Romain Hollanders, Balázs Gerencsér, Jean-Charles Delvenne, Raphaël M. Jungers:
Improved bound on the worst case complexity of Policy Iteration. - Shipra Agrawal, Nikhil R. Devanur:
Fast Algorithms for Online Stochastic Convex Programming. - Zhifei Zhang, Alain Sarlette, Zhihao Ling:
Integral Control on Lie Groups. - Shashank Vatedka, Navin Kashyap:
Some "Goodness" Properties of LDA Lattices. - Martin Barczyk, Silvère Bonnabel, François Goulette:
Observability, Covariance and Uncertainty of ICP Scan Matching. - Suma D., U. Dinesh Acharya, M. Geetha, M. Raviraja Holla:
XML Information Retrieval: An overview. - Guy Bresler, David Gamarnik, Devavrat Shah:
Learning graphical models from the Glauber dynamics. - Praneeth Netrapalli, U. N. Niranjan, Sujay Sanghavi, Animashree Anandkumar, Prateek Jain:
Non-convex Robust PCA. - Damien Regnault, Eric Rémila:
Lost in Self-stabilization. - Ciro Donalek, S. George Djorgovski, Scott Davidoff, Alex Cioc, Anwell Wang, Giuseppe Longo, Jeffrey S. Norris, Jerry Zhang, Elizabeth Lawler, Stacy Yeh, Ashish Mahabal, Matthew J. Graham, Andrew J. Drake:
Immersive and Collaborative Data Visualization Using Virtual Reality Platforms. - Songtao Lu, Zhengdao Wang:
Achievable Rates and Training Optimization for Uplink Multiuser Massive MIMO Systems. - Fred Maurice Ngolè Mboula, Jean-Luc Starck, Samuel Ronayette, Koryo Okumura, Jérôme Amiaux:
Super-resolution method using sparse regularization for point-spread function recovery. - Sutanu Ghosh:
Performance evaluation with a Comparative analysis of mimo channel on The basis of doppler shift and other Probabilistic parameters in fading Environment. - Chengqing Li:
Network analysis of the state space of chaotic map in digital domain. - Mirco Giacobbe, Calin C. Guet, Ashutosh Gupta, Thomas A. Henzinger, Tiago Paixão, Tatjana Petrov:
Model Checking Gene Regulatory Networks. - Antti Juvonen, Tuomo Sipola:
Anomaly Detection Framework Using Rule Extraction for Efficient Intrusion Detection. - Krishnendu Chatterjee, Rasmus Ibsen-Jensen, Andreas Pavlogiannis, Prateesh Goyal:
Faster Algorithms for Algebraic Path Properties in RSMs with Constant Treewidth. - Yasel Garcés Suárez, Esley Torres, Osvaldo Pereira, Roberto Rodríguez:
New similarity index based on entropy and group theory. - Hilmi Günes Kayacik, Mike Just, Lynne Baillie, David Aspinall, Nicholas Micallef:
Data Driven Authentication: On the Effectiveness of User Behaviour Modelling with Mobile Device Sensors. - Vincent Primault, Sonia Ben Mokhtar, Cédric Lauradoux, Lionel Brunie:
Differentially Private Location Privacy in Practice. - Vasant Tendulkar, William Enck:
An Application Package Configuration Approach to Mitigating Android SSL Vulnerabilities. - Yihang Song, Madhur Kukreti, Rahul Rawat, Urs Hengartner:
Two Novel Defenses against Motion-Based Keystroke Inference Attacks. - Xinyang Ge, Hayawardh Vijayakumar, Trent Jaeger:
Sprobes: Enforcing Kernel Code Integrity on the TrustZone Architecture. - Sebastian Neuner, Victor van der Veen, Martina Lindorfer, Markus Huber, Georg Merzdovnik, Martin Mulazzani, Edgar R. Weippl:
Enter Sandbox: Android Sandbox Comparison. - Michael Bierma, Eric Gustafson, Jeremy Erickson, David Fritz, Yung Ryn Choe:
Andlantis: Large-scale Android Dynamic Analysis. - E. Paul Ratazzi, Yousra Aafer, Amit Ahlawat, Hao Hao, Yifei Wang, Wenliang Du:
A Systematic Security Evaluation of Android's Multi-User Framework. - Daniel DeFreez, Bhargava Shastry, Hao Chan, Jean-Pierre Seifert:
A First Look at Firefox OS Security. - Xing Jin, Tongbo Luo, Derek G. Tsui, Wenliang Du:
Code Injection Attacks on HTML5-based Mobile Apps. - Tobias Blanke, Mark Hedges:
Towards a Virtual Data Centre for Classics. - Reza Moazzezi:
A hierarchical framework for object recognition. - David M. Zajic, Michael Maxwell, David S. Doermann, Paul Rodrigues, Michael Bloodgood:
Correcting Errors in Digital Lexicographic Resources Using a Dictionary Manipulation Language. - Nguyen Quang-Hung, Nam Thoai, Nguyen Thanh Son, Duy-Khanh Le:
Energy-Aware Lease Scheduling in Virtualized Data Centers. - Yanshuai Cao, David J. Fleet:
Generalized Product of Experts for Automatic and Principled Fusion of Gaussian Process Predictions. - Azade Nazi, Zhuojie Zhou, Saravanan Thirumuruganathan, Nan Zhang, Gautam Das:
Walk, Not Wait: Faster Sampling Over Online Social Networks. - Oliver Schulte, Zhensong Qian, Arthur E. Kirkpatrick, Xiaoqian Yin, Yan Sun:
Fast Learning of Relational Dependency Networks. - Naoki Saito, Ernest Woei:
Tree simplification and the 'plateaux' phenomenon of graph Laplacian eigenvalues. - Andrew M. Connor:
A mutli-thread tabu search algorithm. - Christoph Benzmüller, Bruno Woltzenlogel Paleo:
Proceedings Eleventh Workshop on User Interfaces for Theorem Provers, UITP 2014, Vienna, Austria, 17th July 2014. EPTCS 167, 2014 [contents] - Andy M. Connor, Keith A. Seffen, Geoffrey T. Parks, P. John Clarkson:
Efficient optimisation of structures using tabu search. - Xiaoting Zhao, Peter I. Frazier:
A Markov Decision Process Analysis of the Cold Start Problem in Bayesian Information Filtering. - Hossein Azari Soufiani, David C. Parkes, Lirong Xia:
A Statistical Decision-Theoretic Framework for Social Choice. - Jian Li, Mugen Peng, Aolin Cheng, Yuling Yu, Chonggang Wang:
Resource Allocation Optimization for Delay-Sensitive Traffic in Fronthaul Constrained Cloud Radio Access Networks. - Oliver Friedmann, Thomas Dueholm Hansen, Uri Zwick:
Errata for: A subexponential lower bound for the Random Facet algorithm for Parity Games. - Minh Dao, Nam H. Nguyen, Nasser M. Nasrabadi, Trac D. Tran:
Collaborative Multi-sensor Classification via Sparsity-based Representation. - Shibani Santurkar, Bipin Rajendran:
A neural circuit for navigation inspired by C. elegans Chemotaxis. - Shibani Santurkar, Bipin Rajendran:
Sub-threshold CMOS Spiking Neuron Circuit Design for Navigation Inspired by C. elegans Chemotaxis. - Onur Atan, Cem Tekin, Mihaela van der Schaar:
Global Bandits with Holder Continuity. - Akif Cem Heren, H. Birkan Yilmaz, Chan-Byoung Chae, Tuna Tugcu:
Effect of Degradation in Molecular Communication: Impairment or Enhancement? - Alexander Mäcker, Manuel Malatyali, Friedhelm Meyer auf der Heide:
Online Top-k-Position Monitoring of Distributed Data Streams. - Mohammad Movahednasab, Mehdi Soleimanifar, Amin Gohari, Masoumeh Nasiri-Kenari, Urbashi Mitra:
Adaptive Molecule Transmission Rate for Diffusion Based Molecular Communication. - Vincenzo Musco, Martin Monperrus, Philippe Preux:
A Generative Model of Software Dependency Graphs to Better Understand Software Evolution. - Mikhail G. Mozerov:
Extended Dynamic Programming and Fast Multidimensional Search Algorithm for Energy Minization in Stereo and Motion. - Jesper W. Mikkelsen:
Optimal Online Edge Coloring of Planar Graphs with Advice. - Luis Sanabria-Russo, Francesco Gringoli, Jaume Barceló, Boris Bellalta:
Implementation and Experimental Evaluation of a Collision-Free MAC Protocol for WLANs. - Narine N. Davtyan, Arpine Khachatryan, Rafayel R. Kamalian:
A Description of the Subgraph Induced at a Labeling of a Graph by the Subset of Vertices with an Interval Spectrum. - Klaus Keimel:
On the equivalence of state transformer semantics and predicate transformer semantics. - Stepan Kochemazov, Alexander A. Semenov:
Using synchronous Boolean networks to model several phenomena of collective behavior. - Regina Motz, Edelweis Rohrer, Paula Severi:
Reasoning for ALCQ extended with a flexible meta-modelling hierarchy. - Jie Ding, Min-Yi Wang, Qiao Wang, Xinshan Zhu:
A novel wireless sensor network topology with fewer links. - Chia Wei Lim, Michael B. Wakin:
Technical Report: Compressive Temporal Higher Order Cyclostationary Statistics. - Jan Michelfeit, Tomás Knap, Martin Necaský:
Linked Data Integration with Conflicts. - Chiranjib Patra, Samiran Chattopadhyay, Matangini Chattopadhyay, Parama Bhaumik:
Understanding the Mechanics of Some Localized Protocols by Theory of Complex Networks. - Adam R. Williamson, Tsung-Yi Chen, Richard D. Wesel:
Variable-length Convolutional Coding for Short Blocklengths with Decision Feedback. - Ruifeng Duan, Riku Jäntti, Mohammed S. Elmusrati:
Performance Analysis of Mean Value-Based Power Allocation with Primary User Interference in Spectrum Sharing Systems. - Mateusz Malinowski, Mario Fritz:
Towards a Visual Turing Challenge. - Xudong Liu, Bin Zhang, Ting Zhang, Chang Liu:
Latent Feature Based FM Model For Rating Prediction. - Aymen Sassi, Faiza Charfi, Lotfi Kamoun, Yassin Elhillali, Atika Rivenq:
OFDM Transmission Performance Evaluation in V2X Communication. - Wei Dai, Abhimanu Kumar, Jinliang Wei, Qirong Ho, Garth A. Gibson, Eric P. Xing:
High-Performance Distributed ML at Scale through Parameter Server Consistency Models. - Kendra Lesser, Meeko M. K. Oishi:
Approximate Verification of Partially Observable Discrete Time Stochastic Hybrid Systems. - Fedor Shmarov, Paolo Zuliani:
ProbReach: Verified Probabilistic Delta-Reachability for Stochastic Hybrid Systems. - Shanu Sushmita, Si-Chi Chin:
Health Information Search Behavior on the Web: A Pilot Study. - Georg Böcherer:
Achievable Rates for Shaped Bit-Metric Decoding. - Moritz Wiese, Janis Nötzel, Holger Boche:
The Arbitrarily Varying Wiretap Channel - deterministic and correlated random coding capacities under the strong secrecy criterion. - Reginald D. Smith:
Malware "Ecology" Viewed as Ecological Succession: Historical Trends and Future Prospects. - Lydia Manikonda, Yuheng Hu, Subbarao Kambhampati:
Analyzing User Activities, Demographics, Social Network Structure and User-Generated Content on Instagram. - V. Sriram Siddhardh Nadendla, Pramod K. Varshney:
Design of Binary Quantizers for Distributed Detection under Secrecy Constraints. - Kristian Ejlebjerg Jensen, Gerard Gorman:
Anisotropic Mesh Adaptation, the Method of Moving Asymptotes and the global p-norm Stress Constraint. - Zoltán Ésik:
Equational properties of saturated least fixed points. - Ali Soltani Tehrani, Haiying Cao, Thomas Eriksson, Christian Fager:
Black-box Modeling and Compensation of Bursty Communication Signals in RF Power Amplifiers with Power-Dependent Parameters. - Ali Soltani Tehrani, Jessica Chani, Thomas Eriksson, Christian Fager:
Investigation of Parameter Adaptation in RF Power Amplifier Behavioral Models. - Yang Qi, Pierre Comon, Lek-Heng Lim:
Uniqueness of Nonnegative Tensor Approximations. - Paul Rodrigues, David M. Zajic, David S. Doermann, Michael Bloodgood, Peng Ye:
Detecting Structural Irregularity in Electronic Dictionaries Using Language Modeling. - Ahmet Iscen, Giorgos Tolias, Philippe Henri Gosselin, Hervé Jégou:
A comparison of dense region detectors for image search and fine-grained classification. - Kaveh Khoshkhah:
On finding orientations with fewest number of vartices with small out-degree. - Azam S. Zavar Moosavi, Paul Tranquilli, Adrian Sandu:
Solving stochastic chemical kinetics by Metropolis Hastings sampling. - Haobo Wang, Tsung-Yi Chen, Richard D. Wesel:
Histogram-Based Flash Channel Estimation. - Abbas Mehrabian, Ali Pourmiri:
Randomized Rumor Spreading in Poorly Connected Small-World Networks. - Kasim Sinan Yildirim, Ruggero Carli, Luca Schenato:
Proportional-Integral Clock Synchronization in Wireless Sensor Networks. - Jesko Hüttenhain, Christian Ikenmeyer:
Binary Determinantal Complexity. - Timothy M. Chan, Fabrizio Frati, Carsten Gutwenger, Anna Lubiw, Petra Mutzel, Marcus Schaefer:
Drawing Partially Embedded and Simultaneously Planar Graphs. - Thang Luong, Ilya Sutskever, Quoc V. Le, Oriol Vinyals, Wojciech Zaremba:
Addressing the Rare Word Problem in Neural Machine Translation. - Bernhard Beckert, Sarah Grebing, Florian Böhl:
How to Put Usability into Focus: Using Focus Groups to Evaluate the Usability of Interactive Theorem Provers. 4-13 - Andrew Butterfield:
UTP2: Higher-Order Equational Reasoning by Pointing. 14-22 - Gudmund Grov, Aleks Kissinger, Yuhui Lin:
Tinker, tailor, solver, proof. 23-34 - Tomer Libal, Martin Riener, Mikheil Rukhaia:
Advanced Proof Viewing in ProofTool. 35-47 - Florian Rabe:
A Logic-Independent IDE. 48-60 - Christian Sternagel, René Thiemann:
The Certification Problem Format. 61-72 - Carst Tankink:
PIDE for Asynchronous Interaction with Coq. 73-83 - Makarius Wenzel:
System description: Isabelle/jEdit in 2014. 84-94 - Brian Tomasik:
Do Artificial Reinforcement-Learning Agents Matter Morally? - Chris Dyer:
Notes on Noise Contrastive Estimation and Negative Sampling. - Karsten Lehmann, Alban Grastien, Pascal Van Hentenryck:
AC-Feasibility on Tree Networks is NP-Hard. - El Houssein Chouaib Harik, François Guerin, Frédéric Guinand, Jean-François Brethé, Hervé Pelvillain:
A Decentralized Interactive Architecture for Aerial and Ground Mobile Robots Cooperation. - Burcu Tepekule, Ali Emre Pusane, H. Birkan Yilmaz, Chan-Byoung Chae, Tuna Tugcu:
ISI Mitigation Techniques in Molecular Communication. - Andrea Turrini, Holger Hermanns:
Cost Preserving Bisimulations for Probabilistic Automata. - Elzbieta Rzeszutko, Wojciech Mazurczyk:
Insights from the Nature for Cybersecurity. - Nicholas H. Kirk:
Towards Learning Object Affordance Priors from Technical Texts. - Marthe Bonamy, Lukasz Kowalik:
A 13k-kernel for Planar Feedback Vertex Set via Region Decomposition. - Rahil Baber, Demetres Christofides, Ntah Ahn Dang, Søren Riis, Emil R. Vaughan:
Graph Guessing Games and non-Shannon Information Inequalities. - Long Thai, Blesson Varghese, Adam Barker:
Executing Bag of Distributed Tasks on the Cloud: Investigating the Trade-offs Between Performance and Cost. - Long Thai, Adam Barker, Blesson Varghese, Ozgur Akgun, Ian Miguel:
Optimal Deployment of Geographically Distributed Workflow Engines on the Cloud. - Mohammad Ali Sedaghat, Ralf R. Müller, Farrokh Marvasti:
On Optimum Asymptotic Multiuser Efficiency of Randomly Spread CDMA. - Arkadii G. D'yachkov, Ilya Vorobyev, Nikita Polyanskii, Vladislav Yu. Shchukin:
Symmetric Disjunctive List-Decoding Codes. - Nabarun Mondal, Partha P. Ghosh:
On The Dynamical Nature Of Computation. - Eric Blais, Clément L. Canonne, Igor C. Oliveira, Rocco A. Servedio, Li-Yang Tan:
Learning circuits with few negations. - Noam Presman, Ofer Shapira, Simon Litsyn, Tuvi Etzion, Alexander Vardy:
Binary Polarization Kernels from Code Decompositions. - Abhinav Ganesan, Javad Ebrahimi, Sidharth Jaggi, Venkatesh Saligrama:
Non-Adaptive Group Testing with Inhibitors. - Alberto Martín-Martín, Enrique Orduña-Malea, Juan Manuel Ayllon, Emilio Delgado López-Cózar:
Does Google Scholar contain all highly cited documents (1950-2013)? - Gilles Dowek, Ying Jiang:
Cut-elimination and the decidability of reachability in alternating pushdown systems. - Emma Strubell, Luke Vilnis, Andrew McCallum:
Training for Fast Sequential Prediction Using Dynamic Feature Selection. - Su Kim:
Photomapping Using Aerial Vehicle. - Laurent Dinh, David Krueger, Yoshua Bengio:
NICE: Non-linear Independent Components Estimation. - Alexander P. Giles, Orestis Georgiou, Carl P. Dettmann:
Betweenness Centrality in Dense Random Geometric Networks. - Flavia Bonomo, Oliver Schaudt, Maya Jakobine Stein:
3-Colouring graphs without triangles or induced paths on seven vertices. - Xu Wang, Konstantinos Slavakis, Gilad Lerman:
Riemannian Multi-Manifold Modeling. - J. M. R. Parrondo, Luis Dinis, Eduardo García-Toraño, B. Sotillo:
Collective decision making and paradoxical games. - Emilie Morvant:
Domain adaptation of weighted majority votes via perturbed variation-based self-labeling. - Madeleine Udell, Corinne Horn, Reza Zadeh, Stephen P. Boyd:
Generalized Low Rank Models. - Michael Golosovsky, Sorin Solomon:
Uncovering the dynamics of citations of scientific papers. - Jakub Konecný, Peter Richtárik:
Simple Complexity Analysis of Direct Search. - J. M. R. Parrondo, Luis Dinis:
Brownian motion and gambling: from ratchets to paradoxical games. - Luis Dinis, J. M. R. Parrondo:
Inefficiency of voting in Parrondo games. - Pierluigi Contucci, Cecilia Vernia:
Alienation in Italian cities. Social network fragmentation from collective data. - Rodrigo Echeveste, Claudius Gros:
Generating functionals for computational intelligence: the Fisher information as an objective function for self-limiting Hebbian learning rules. - Maria Pavlovskaia, Kewei Tu, Song-Chun Zhu:
Mapping Energy Landscapes of Non-Convex Learning Problems. - Babak Fotouhi, Naghmeh Momeni, Michael G. Rabbat:
Generalized Friendship Paradox: An Analytical Approach. - Roberto Santana, Ross B. McDonald, Helmut G. Katzgraber:
A probabilistic evolutionary optimization approach to compute quasiparticle braids. - Sherjil Ozair, Yoshua Bengio:
Deep Directed Generative Autoencoders. - Daniel L. Pimentel-Alarcón, Robert D. Nowak, Nigel Boston:
Deterministic Conditions for Subspace Identifiability from Incomplete Sampling. - Zbigniew Koziol:
Dynamics of Users Activity on Web-Blogs. - Maria Chudnovsky, Louis Esperet, Laetitia Lemoine, Peter Maceli, Frédéric Maffray, Irena Penev:
Graphs with no induced five-vertex path or antipath. - Xingchen Yu, Ernest Fokoué:
Probit Normal Correlated Topic Models. - Cedric Yen-Yu Lin, Han-Hsuan Lin:
Upper bounds on quantum query complexity inspired by the Elitzur-Vaidman bomb tester. - Faisal Shah Khan:
Dominant Strategies in Two Qubit Quantum Computations. - Oliver Knill:
Curvature from Graph Colorings. - Valerio Capraro:
The emergence of altruistic behaviour in conflictual situations. - David S. Medina, Amik St.-Cyr, Timothy Warburton:
High-Order Finite-differences on multi-threaded architectures using OCCA. - Morgan R. Frank, Jake Ryland Williams, Lewis Mitchell, James P. Bagrow, Peter Sheridan Dodds, Christopher M. Danforth:
Constructing a taxonomy of fine-grained human movement and activity motifs through social media. - Marc Kaplan:
Quantum attacks against iterated block ciphers. - Kaushik P. Seshadreesan, Mark M. Wilde:
Fidelity of recovery and geometric squashed entanglement. - Kaushik P. Seshadreesan, Mario Berta, Mark M. Wilde:
Rényi squashed entanglement, discord, and relative entropy differences. - Adrian Dumitrescu, Maarten Löffler, André Schulz, Csaba D. Tóth:
Counting Carambolas. - Tomonori Kouya:
Accelerated Multiple Precision Matrix Multiplication using Strassen's Algorithm and Winograd's Variant. - Ling Feng, Yanqing Hu, Baowen Li, Harry Eugene Stanley, Shlomo Havlin, Lidia A. Braunstein:
Competing for Attention in Social Media under Information Overload Conditions. - Andreas Weinmann, Laurent Demaret, Martin Storath:
Mumford-Shah and Potts Regularization for Manifold-Valued Data with Applications to DTI and Q-Ball Imaging. - Matthew Aldridge, Leonardo Baldassini, Karen Gunderson:
Almost Separable Matrices. - Snehal M. Shekatkar, G. Ambika:
Mediated attachment as a mechanism for growth of complex networks. - Xiang-Yu Zhao, Bin Huang, Ming Tang, Hai-Feng Zhang, Duan-Bing Chen:
Identifying effective multiple spreaders by coloring complex networks. - Zhihua Niu, Zhixiong Chen, Xiaoni Du:
Linear complexity problems of level sequences of Euler quotients and their related binary sequences. - Victor Bapst, Amin Coja-Oghlan, Felicia Raßmann:
A positive temperature phase transition in random hypergraph 2-coloring. - Peter J. Cameron, Ntah Ahn Dang, Søren Riis:
Guessing Games on Triangle-free Graphs. - Min Liang:
Quantum fully homomorphic encryption scheme based on universal quantum circuit. - Stephan Gouws, Yoshua Bengio, Greg Corrado:
BilBOWA: Fast Bilingual Distributed Representations without Word Alignments. - Anum Ali, Abdullatif Al-Rabah, Mudassir Masood, Tareq Y. Al-Naffouri:
Receiver-based Recovery of Clipped OFDM Signals for PAPR Reduction: A Bayesian Approach. - George L. Barnett, Simon W. Funke, Matthew D. Piggott:
Hybrid global-local optimisation algorithms for the layout design of tidal turbine arrays. - Jian Wang, Ping Li:
Recovery of Sparse Signals Using Multiple Orthogonal Least Squares. - Zhang Li, Xiaojun Lin, Borja Peleato-Inarrea, Ilya Pollak:
Optimal Monitoring and Mitigation of Systemic Risk in Financial Networks. - Zhen Wang, Attila Szolnoki, Matjaz Perc:
Different perceptions of social dilemmas: Evolutionary multigames in structured populations. - Zijia Li, Josef Schicho, Hans-Peter Schröcker:
Spatial Straight Line Linkages by Factorization of Motion Polynomials. - Johanna Hardin, Ghassan Sarkis, P. C. Urc:
Network Analysis with the Enron Email Corpus. - Paolo Barucca, Jacopo Rocchi, Enzo Marinari, Giorgio Parisi, Federico Ricci-Tersenghi:
Cross correlations of the American baby names. - Pengsheng Ji, Jiashun Jin:
Coauthorship and Citation Networks for Statisticians. - Alex Bredariol Grilo, Iordanis Kerenidis, Jamie Sikora:
QMA with subset state witnesses. - Zubair Al Azim, Xuanyao Fong, Thomas Ostler, Roy W. Chantrell, Kaushik Roy:
Laser Induced Magnetization Reversal for Detection in Optical Interconnects. - Enrique Mallada, Changhong Zhao, Steven H. Low:
Optimal load-side control for frequency regulation in smart grids. - Wuhua Hu, Wee Peng Tay, Athul Harilal, Gaoxi Xiao:
Network infection source identification under the SIRI model. - Piotr Knychala, Michal Banaszak:
Heuristic Monte Carlo Method Applied to Cooperative Motion Algorithm for Binary Lattice Fluid. - Michal Dziecielski, Krzysztof Lewandowski, Michal Banaszak:
Phase Diagram of Diblock Copolymer Melt in Dimension d=5. - Anurag Anshu, Vamsi Krishna Devabathini, Rahul Jain:
Near optimal bounds on quantum communication complexity of single-shot quantum state redistribution. - Zhan Shi, Hendra I. Nurdin:
Effect of phase shifts on EPR entanglement generated on two propagating Gaussian fields via coherent feedback. - Alexander V. Gasnikov, Denis Dmitriev:
Efficient randomized algorithms for PageRank problem. - Jesse Geneson, Lilly Shen:
Linear bounds on matrix extremal functions using visibility hypergraphs. - Svetlana Lockwood, Bala Krishnamoorthy:
Topological Features In Cancer Gene Expression Data. - Peter Hertling, Christoph Spandl:
Computing a Solution of Feigenbaum's Functional Equation in Polynomial Time. - Marion Neumann, Roman Garnett, Christian Bauckhage, Kristian Kersting:
Propagation Kernels. - Talayeh Razzaghi, Ilya Safro:
Fast Multilevel Support Vector Machines. - Antonio G. Ache, Micah W. Warren:
Coarse Ricci curvature and the manifold learning problem. - Mark Jerrum, Kitty Meeks:
The parameterised complexity of counting even and odd induced subgraphs. - Roberto Cavoretto, Alessandra De Rossi, Hanli Qiao, Bernhard Quatember, Wolfgang Recheis, Martin Mayr:
Computing Topology Preservation of RBF Transformations for Landmark-Based Image Registration. - Taposh Banerjee, Venugopal V. Veeravalli:
Data-Efficient Minimax Quickest Change Detection with Composite Post-Change Distribution. - Pierre Baldi, Peter J. Sadowski, Daniel Whiteson:
Enhanced Higgs to $τ^+τ^-$ Searches with Deep Learning. - Rob Seaman:
Data engineering for archive evolution. - Qian-Ming Zhang, Xiao-Ke Xu, Yu-Xiao Zhu, Tao Zhou:
Measuring multiple evolution mechanisms of complex networks. - Shogo Yamanaka, Masayuki Ohzeki, Aurélien Decelle:
Detection of cheating by decimation algorithm. - Lubos Brim, Juraj Niznan, David Safránek:
Compact Representation of Photosynthesis Dynamics by Rule-based Models (Full Version). - Jean Cardinal, Csaba D. Tóth, David R. Wood:
General Position Subsets and Independent Hyperplanes in d-Space. - Gevorg Poghosyan, Sanchit Matta, Achim Streit, Michal Bejger, Andrzej Królak:
Architecture, implementation and parallelization of the software to search for periodic gravitational wave signals. - Krzysztof Lewandowski, Piotr Knychala, Michal Banaszak:
Parallel-Tempering Monte-Carlo Simulation with Feedback-Optimized Algorithm Applied to a Coil-to-Globule Transition of a Lattice Homopolymer. - Pankaj Mehta, David J. Schwab:
An exact mapping between the Variational Renormalization Group and Deep Learning. - Jan Bok, Milan Hladík:
Selection-based approach to cooperative interval games. - Juan Augusto Maya, Leonardo Rey Vega, Cecilia G. Galarza:
Distributed Detection of a Random Process over a Multiple Access Channel under Energy and Bandwidth Constraints. - Robin Hirsch, Marcel Jackson, Szabolcs Mikulás:
The algebra of functions with antidomain and range. - Jakub Krajniak, Michal Banaszak:
Monte Carlo Study of Patchy Nanostructures Self-Assembled from a Single Multiblock Chain. - Philippe Dreesen, Mariya Ishteva, Johan Schoukens:
Decoupling Multivariate Polynomials Using First-Order Information. - Emanuele Frandi, Ricardo Ñanculef, Johan A. K. Suykens:
Complexity Issues and Randomization Strategies in Frank-Wolfe Algorithms for Machine Learning. - Anna Broniec:
Analysis of EEG signal by Flicker Noise Spectroscopy: Identification of right/left hand movement imagination. - Xinlei Yi, Wenlian Lu, Tianping Chen:
Pull-Based Distributed Event-triggered Consensus for Multi-agent Systems with Directed Topologies. - Anusha Lalitha, Tara Javidi, Anand D. Sarwate:
Social Learning and Distributed Hypothesis Testing. - Joël Akeret, Lukas Gamper, Adam Amara, Alexandre Refregier:
HOPE: A Python Just-In-Time compiler for astrophysical computations. - Paulo Oliva:
Unifying Functional Interpretations: Past and Future. - Justin Bedo, Cheng Soon Ong:
Multivariate Spearman's rho for aggregating ranks using copulas. - Srikant Sukumar, Maruthi R. Akella:
Stabilizing Controllers for Multi-Input, Singular Control Gain Systems. - Haydée Lugo, Maxi San Miguel:
Learning and coordinating in a multilayer network. - Finale Doshi-Velez, Byron C. Wallace, Ryan P. Adams:
Graph-Sparse LDA: A Topic Model with Structured Sparsity. - Stefan Streif, Matthias Karl, Ali Mesbah:
Stochastic Nonlinear Model Predictive Control with Efficient Sample Approximation of Chance Constraints. - Tamara G. Kolda:
Numerical Optimization for Symmetric Tensor Decomposition. - Attila Szolnoki, Matjaz Perc:
Coevolutionary success-driven multigames. - Krzysztof Lewandowski, Michal Banaszak:
Intra-Globular Structures in Multiblock Copolymer Chains from a Monte Carlo Simulation. - Jin Hua Zhao, Yusupjan Habibulla, Hai-Jun Zhou:
Statistical Mechanics of the Minimum Dominating Set Problem. - Martin Biel, Farhad Farokhi, Henrik Sandberg:
SiMpLIfy: A Toolbox for Structured Model Reduction. - Thomas Jahn:
Geometric Algorithms for Minimal Enclosing Discs in Strictly Convex Normed Planes. - Shahrouz Khalili, Osvaldo Simeone, Alexander M. Haimovich:
Cloud Radio-Multistatic Radar: Joint Optimization of Code Vector and Backhaul Quantization. - Richard G. Morris, Tony R. Martinez, Michael R. Smith:
A Hierarchical Multi-Output Nearest Neighbor Model for Multi-Output Dependence Learning. - Madeleine Udell, Karanveer Mohan, David Zeng, Jenny Hong, Steven Diamond, Stephen P. Boyd:
Convex Optimization in Julia. - Yaoliang Yu, Xinhua Zhang, Dale Schuurmans:
Generalized Conditional Gradient for Sparse Estimation. - Yoshiharu Maeno, Kenji Nishiguchi, Satoshi Morinaga, Hirokazu Matsushima:
Impact of shadow banks on financial contagion. - Yihui Ren, Mária Ercsey-Ravasz, Pu Wang, Marta C. González, Zoltán Toroczkai:
Predicting commuter flows in spatial networks using a radiation model based on temporal ranges. - Sébastien Combrexelle, Herwig Wendt, Nicolas Dobigeon, Jean-Yves Tourneret, Steve McLaughlin, Patrice Abry:
Bayesian estimation of the multifractality parameter for image texture using a Whittle approximation. - Pengfei Wang, Jianping Li:
On the relation between reliable computation time, float-point precision and the Lyapunov exponent in chaotic systems. - Tuomo Kauranne:
Finitely unstable theories and computational complexity. - Paul M. Riechers, Dowman P. Varn, James P. Crutchfield:
Diffraction Patterns of Layered Close-packed Structures from Hidden Markov Models. - Joseph Crawford, Tijana Milenkovic:
GREAT: GRaphlet Edge-based network AlignmenT. - Ryutaroh Matsumoto:
Strongly Secure Quantum Ramp Secret Sharing Constructed from Algebraic Curves over Finite Fields. - Dan Peng, Xiao-Pu Han, Zong-Wen Wei, Bing-Hong Wang:
Punctuated equilibrium dynamics in human communications. - Bren Cavallo, Delaram Kahrobaei:
A Polynomial Time Algorithm For The Conjugacy Decision and Search Problems in Free Abelian-by-Infinite Cyclic Groups. - Emmanuel Tsukerman:
Tropical Spectral Theory of Tensors. - Anshumali Shrivastava, Ping Li:
An Improved Scheme for Asymmetric LSH. - J. Rafael Sendra, David Sevilla, Carlos Villarino:
Missing sets in rational parametrizations of surfaces of revolution. - Behnam Neyshabur, Nathan Srebro:
On Symmetric and Asymmetric LSHs for Inner Product Search. - Saahil Ognawala, Justin Bayer:
Regularizing Recurrent Networks - On Injected Noise and Norm-based Methods. - Jingliang Gao, Yanbo Yang:
Quantum entropy-typical subspace and universal data compression. - A. B. Dieker, Santosh S. Vempala:
Stochastic billiards for sampling from the boundary of a convex set. - Andrey Bogomolov, Bruno Lepri, Fabio Pianesi:
Generalized Compression Dictionary Distance as Universal Similarity Measure. - Valentina Bono, Wasifa Jamal, Saptarshi Das, Koushik Maharatna:
Artifact reduction in multichannel pervasive EEG using hybrid WPT-ICA and WPT-EMD signal decomposition techniques. - Fabio D'Andreagiovanni, Jonatan Krolikowski, Jonad Pulaj:
A Fast Hybrid Primal Heuristic for Multiband Robust Capacitated Network Design with Multiple Time Periods. - Sivan Sabato, Rémi Munos:
Active Regression by Stratification. - Thomas Peters:
The physics of volume rendering. - Corentin Briat, Ankit Gupta, Mustafa Khammash:
Generic low-copy integral feedback for robust in-vivo adaptation. - Vassilis Kekatos, Georgios B. Giannakis, Ross Baldick:
Online Energy Price Matrix Factorization for Power Grid Topology Tracking. - Daniele D'Angeli, Emanuele Rodaro:
On the freeness of automata groups. - Benjamin Ivorra, M. RamosÁngel, Ngom Diène:
Be-CoDiS: An epidemiological model to predict the risk of human diseases spread worldwide. Application to the 2014 Ebola Virus Disease epidemic. - Aran Nayebi, Virginia Vassilevska Williams:
Quantum algorithms for shortest paths problems in structured instances. - Pengfei Wang:
Forward period analysis and the long term simulation of a periodic Hamiltonian system. - Sebastian Dorn, Torsten A. Enßlin, Maksim Greiner, Marco Selig, Vanessa Böhm:
Signal inference with unknown response: calibration uncertainty renormalized estimator. - Yossi Arjevani:
On Lower and Upper Bounds in Smooth Strongly Convex Optimization - A Unified Approach via Linear Iterative Methods. - Yong Kong:
Btrim: A fast, lightweight adapter and quality trimming program for next-generation sequencing technologies. - Afonso S. Bandeira, Dustin G. Mixon, Joel Moreira:
A conditional construction of restricted isometries. - Dehua Cheng, Xinran He, Yan Liu:
Analyzing the Number of Latent Topics via Spectral Decomposition. - Stacy Patterson:
In-Network Leader Selection for Acyclic Graphs. - Xiangyu Wang, Peichao Peng, David B. Dunson:
Median Selection Subset Aggregation for Parallel Inference. - Daniele Vilone, Francesca Giardini, Mario Paolucci:
Partner selection supports reputation-based cooperation in a Public Goods Game. - Daniyar S. Shamkanov:
Nested Sequents for Provability Logic GLP. - Mark Taylor:
Visualising Large Datasets in TOPCAT v4. - Tad Hogg, Kristina Lerman:
Effects of Social Influence in Peer Online Recommendation. - Pouyan Rafiei Fard, Moritz Grosse-Wentrup:
The Influence of Decoding Accuracy on Perceived Control: A Simulated BCI Study. - Igor Rivin:
Spectral Experiments+. - Mert Korkali, Jason G. Veneman, Brian F. Tivnan, Paul D. H. Hines:
Reducing Cascading Failure Risk by Increasing Infrastructure Network Interdependency. - Ryan Giordano, Tamara Broderick:
Covariance Matrices for Mean Field Variational Bayes. - Seunghak Lee, Eric P. Xing:
Screening Rules for Overlapping Group Lasso. - Namgil Lee, Andrzej Cichocki:
Very Large-Scale Singular Value Decomposition Using Tensor Train Networks. - Nebojsa Bozanic, Thomas Kreuz:
SPIKY: A graphical user interface for monitoring spike train synchrony. - Chang Xu, Tongliang Liu, Dacheng Tao, Chao Xu:
Local Rademacher Complexity for Multi-label Learning. - Trapit Bansal, Chiranjib Bhattacharyya, Ravindran Kannan:
A provable SVD-based algorithm for learning topics in dominant admixture corpus. - Musa Maharramov, Biondo Biondi:
Improved depth imaging by constrained full-waveform inversion. - Stewart N. Ethier, Jiyeon Lee:
On the three-person game baccara banque. - Krzysztof Szajowski:
On Some Distributed Disorder Detection. - Reza Eghbali, Jon Swenson, Maryam Fazel:
Exponentiated Subgradient Algorithm for Online Optimization under the Random Permutation Model. - Kai-Uwe Schmidt:
Symmetric bilinear forms over finite fields with applications to coding theory. - Nicolas Gillis, Abhishek Kumar:
Exact and Heuristic Algorithms for Semi-Nonnegative Matrix Factorization. - Miroslav Andjelkovic, Bosiljka Tadic, Slobodan Maletic, Milan Rajkovic:
Hierarchical sequencing of online social graphs. - Bing Liu, Soonho Kong, Sicun Gao, Paolo Zuliani, Edmund M. Clarke:
Towards Personalized Cancer Therapy Using Delta-Reachability Analysis. - Vishesh Karwa, Michael J. Pelsmajer, Sonja Petrovic, Despina Stasi, Dane Wilburne:
Statistical models for cores decomposition of an undirected random graph. - Greg Ver Steeg, Aram Galstyan:
Maximally Informative Hierarchical Representations of High-Dimensional Data. - Junier B. Oliva, Willie Neiswanger, Barnabás Póczos, Eric P. Xing, Jeff G. Schneider:
Fast Function to Function Regression. - Niklas Wahlström, Thomas B. Schön, Marc Peter Deisenroth:
Learning deep dynamical models from image pixels. - Xian Wang, Shaopeng Ma:
A Short Image Series Based Scheme for Time Series Digital Image Correlation. - Yu-Xiang Wang, James Sharpnack, Alexander J. Smola, Ryan J. Tibshirani:
Trend Filtering on Graphs. - Wasifa Jamal, Saptarshi Das, Ioana-Anastasia Oprescu, Koushik Maharatna, Fabio Apicella, Federico Sicca:
Classification of Autism Spectrum Disorder Using Supervised Learning of Brain Connectivity Measures Extracted from Synchrostates. - Paul Scott, Sylvie Thiébaux:
Dynamic Optimal Power Flow in Microgrids using the Alternating Direction Method of Multipliers. - Liane Gabora, Stefan Leijnen:
The Relationship between Creativity, Imitation, and Cultural Diversity. - Luca Canzian, Kun Zhao, Gerard C. L. Wong, Mihaela van der Schaar:
A Dynamic Network Formation Model for Understanding Bacterial Self-Organization into Micro-Colonies. - Riccardo Fusaroli, Marcus Perlman, Alan Mislove, Alexandra Paxton, Teenie Matlock, Rick Dale:
Timescales of Massive Human Entrainment. - Laszlo Gyongyosi:
Distribution Statistics and Random Matrix Formalism of Multicarrier Continuous-Variable Quantum Key Distribution. - Julie Josse, Stefan Wager:
Stable Autoencoding: A Flexible Framework for Regularized Low-Rank Matrix Estimation. - Yitao Zhu, Daniel Dopico, Corina Sandu, Adrian Sandu:
Dynamic Response Optimization of Complex Multibody Systems in a Penalty Formulation using Adjoint Sensitivity. - Scott A. Norris:
PyCraters: A Python framework for crater function analysis. - Mark B. Taylor:
External Use of TOPCAT's Plotting Library. - Christina Lantzaki, Yannis Tzitzikas:
Tasks that Require, or can Benefit from, Matching Blank Nodes. - Yongjune Kim, Robert Mateescu, Seung-Hwan Song, Zvonimir Bandic, B. V. K. Vijaya Kumar:
Coding scheme for 3D vertical flash memory. - Vincent Larivière, Cassidy R. Sugimoto, Andrew Tsou, Yves Gingras:
Team size matters: Collaboration and scientific impact since 1900. - Florian Bernard, Johan Thunberg, Peter Gemmar, Frank Hertel, Andreas Husch, Jorge M. Gonçalves:
A Solution for Multi-Alignment by Transformation Synchronisation. - Michael Bloodgood, Peng Ye, Paul Rodrigues, David M. Zajic, David S. Doermann:
A random forest system combination approach for error detection in digital dictionaries. - Arkadii G. D'yachkov, Ilya Vorobyev, Nikita Polyanskii, Vladislav Yu. Shchukin:
Almost Cover-Free Codes. - Bálint Antal, András Hajdu:
An ensemble-based system for automatic screening of diabetic retinopathy. - Bálint Antal, András Hajdu:
An Ensemble-based System for Microaneurysm Detection and Diabetic Retinopathy Grading. - Dilek Küçük, Yusuf Arslan:
Semi-Automatic Construction of a Domain Ontology for Wind Energy Using Wikipedia Articles. - Tao Chen, Damian Borth, Trevor Darrell, Shih-Fu Chang:
DeepSentiBank: Visual Sentiment Concept Classification with Deep Convolutional Neural Networks. - Abhijit Chandra, Oliva Kar:
Data Driven Prognosis: A multi-physics approach verified via balloon burst experiment. - Jie Chen, Haixian Zhang, Zhang Yi:
Symmetric low-rank representation for subspace clustering. - Aaron Defazio, Thore Graepel:
A Comparison of learning algorithms on the Arcade Learning Environment. - Shannon Fenn, Alexandre Mendes, David M. Budden:
Addressing the non-functional requirements of computer vision systems: A case study. - Akram Bin Sediq, Rainer Schoenen, Halim Yanikomeroglu, Gamini Senarath:
Optimized Distributed Inter-cell Interference Coordination (ICIC) Scheme using Projected Subgradient and Network Flow Optimization. - Xiao Lu, Dusit Niyato, Ping Wang, Dong In Kim, Zhu Han:
Wireless Charger Networking for Mobile Devices: Fundamentals, Standards, and Applications. - Zhiyuan Jiang, Sheng Zhou, Zhisheng Niu:
Dynamic Channel Acquisition in MU-MIMO. - Zihan Tan, Liwei Zeng, Jian Li:
On the Inequalities of Projected Volumes and the Constructible Region. - Yishi Lin, John C. S. Lui:
Algorithmic Design for Competitive Influence Maximization Problems. - Sahaaya Arul Mary, Jasmine Beulah Gnanadurai:
A Novel Predictive and Non-Predictive Cooperative Model for Routing in Ad Hoc Networks. - Dilek Küçük, Ralf Steinberger:
Experiments to Improve Named Entity Recognition on Turkish Tweets. - Meng Guo, Jana Tumova, Dimos V. Dimarogonas:
Communication-Free Multi-Agent Control under Local Temporal Tasks and Relative-Distance Constraints. - Alena Zemanová, Jan Zeman, Michal Sejnoha:
Finite element model based on refined plate theories for laminated glass units. - Marco Campani, Ruggero Vaglio:
A simple interpretation of the growth of scientific/technological research impact leading to hype-type evolution curves. - Jan A. Bergstra, Inge Bethke:
Note on paraconsistency and the logic of fractions. - Mohammed Amin Tahraoui, Éric Duchêne, Hamamache Kheddouci, Mariusz Wozniak:
Labeled embedding of (n, n-2)-graphs in their complements. - Jeril Kuriakose, Sandeep Joshi, V. I. George:
Localization in Wireless Sensor Networks: A Survey. - Irina E. Bocharova, Albert Guillén i Fàbregas, Boris D. Kudryashov, Alfonso Martinez, Adrià Tauste Campo, Gonzalo Vazquez-Vilar:
Multi-Class Source-Channel Coding. - Pedro Jussieu de Rezende, Cid C. de Souza, Stephan Friedrichs, Michael Hemmer, Alexander Kröller, Davi C. Tozoni:
Engineering Art Galleries. - Samar Agnihotri:
Analog Network Coding in Nonlinear Chains. - Pedro Camelo, João Moura, Ludwig Krippahl:
CONDENSER: A Graph-Based Approachfor Detecting Botnets. - Jiwei Li, Xun Wang, Eduard H. Hovy:
What a Nasty day: Exploring Mood-Weather Relationship from Twitter. - Pranjal Awasthi, Avrim Blum, Or Sheffet, Aravindan Vijayaraghavan:
Learning Mixtures of Ranking Models. - Yauhen Yakimenka, Vitaly Skachek:
Refined Upper Bounds on Stopping Redundancy of Binary Linear Codes. - Anish Varghese, Bob Edwards, Gaurav Mitra, Alistair P. Rendell:
Programming the Adapteva Epiphany 64-core Network-on-chip Coprocessor. - Konrad K. Dabrowski, Dominique de Werra, Vadim V. Lozin, Victor Zamaraev:
Combinatorics and algorithms for augmenting graphs. - Nicolas Gensollen, Vincent Gauthier, Michel Marot, Monique Becker:
Coalition Formation Algorithm of Prosumers in a Smart Grid Environment. - Nabil Khoufi, Chafik Aloulou, Lamia Hadrich Belguith:
Supervised learning model for parsing Arabic language. - Shahid Mehraj Shah, Vinod Sharma:
Achieving Shannon Capacity Region as Secrecy Rate Region in a Multiple Access Wiretap Channel. - Seyed Mohammad Azimi-Abarghouyi, Masoumeh Nasiri-Kenari, Behrouz Maham:
Integer Forcing-and-Forward Transceiver Design for MIMO Multi-Pair Two-Way Relaying. - Sariel Har-Peled:
Low Rank Matrix Approximation in Linear Time. - Reevana Balmahoon, A. J. Han Vinck, Ling Cheng:
Correlated Source Coded Sequences with Compromised Channel and Source Symbols using Shannon's Cipher System. - Paolo Pareti, Ewan Klein, Adam Barker:
A Semantic Web of Know-How: Linked Data for Community-Centric Tasks. - Gábor Braun, Sebastian Pokutta, Daniel Zink:
LP and SDP inapproximability of combinatorial problems. - Stefan Kratsch, Manuel Sorge:
On Kernelization and Approximation for the Vector Connectivity Problem. - Han Mao Kiah, Gregory J. Puleo, Olgica Milenkovic:
Codes for DNA Storage Channels. - Paul Madden, Eduardo G. Valente Jr.:
DDTS: A Practical System Testing Framework for Scientific Software. - Jonathan Kochems, C.-H. Luke Ong:
Decidable Models of Recursive Asynchronous Concurrency. - Mohammad Ayub Latif, Muhammad Naveed, Faraz Zaidi:
Resilience of Social Networks Under Different Attack Strategies. - Tiago A. Schieber, Laura C. Carpi, Alejandro César Frery, Osvaldo Anibal Rosso, Panos M. Pardalos, Martín Gómez Ravetti:
A New Network Robustness Topology Measure based on Information Theory. - Seungwon Shin, Jalel Chergui, Damir Juric:
A Solver for Massively Parallel Direct Numerical Simulation of Three-Dimensional Multiphase Flows. - Matthew Lawlor, Steven W. Zucker:
An Online Algorithm for Learning Selectivity to Mixture Means. - Amitabh Basu, Robert Hildebrand, Matthias Köppe:
Light on the Infinite Group Relaxation. - Shrawan Kumar, J. M. Landsberg:
Connections between conjectures of Alon-Tarsi, Hadamard-Howe, and integrals over the special unitary group. - Javier Ignacio Almarza, Santiago Figueira:
Normality in non-integer bases and polynomial time randomness. - Qiuyi Han, Kevin S. Xu, Edoardo M. Airoldi:
Consistent Estimation of Dynamic and Multi-layer Networks. - Hidekazu Oiwa, Ryohei Fujimaki:
Partition-wise Linear Models. - Dohyung Park, Constantine Caramanis, Sujay Sanghavi:
Greedy Subspace Clustering. - Kaj-Kolja Kleineberg, Marián Boguñá:
Ecology 2.0: Coexistence and Domination among Interacting Networks. - Anirban Roychowdhury, Brian Kulis:
Gamma Processes, Stick-Breaking, and Variational Inference. - Rasul Tutunov, Haitham Bou-Ammar, Ali Jadbabaie, Eric Eaton:
On the Degree Distribution of Pólya Urn Graph Processes. - Gabriele Scheler:
Universality of Logarithmic Coding for Neurons. - James K. Freericks, Branislav K. Nikolic, Ophir Frieder:
The Nonequilibrium Many-Body Problem as a paradigm for extreme data science. - James Schneeloch, Samuel H. Knarr, Gregory A. Howland, John C. Howell:
Demonstrating Continuous Variable EPR Steering in spite of Finite Experimental Capabilities using Fano Steering Bounds. - Clemens Huemer, Pablo Pérez-Lantero:
The intersection graph of the disks with diameters the sides of a convex $n$-gon. - Zhe He, Ming Li, Rui-Jie Xu, Bing-Hong Wang:
Network reconstruction by the stationary distribution of random walk process. - Martin Helmer:
A Direct Algorithm to Compute the Topological Euler Characteristic and Chern-Schwartz-MacPherson Class of Projective Complete Intersection Varieties. - Wai-Tong Louis Fan:
Discrete approximations to local times for reflected diffusions.
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.