default search action
CoRR, March 2008
- Keith Bishop:
Qtier-Rapor: Managing Spreadsheet Systems & Improving Corporate Performance, Compliance and Governance. - Peter Schneider-Kamp, Jürgen Giesl, Alexander Serebrenik, René Thiemann:
Automated Termination Proofs for Logic Programs by Term Rewriting. - Simon Murphy:
EuSpRIG 2006 Commercial Spreadsheet Review. - Deepak Ponvel Chermakani:
Deciding Solvability of a Univariate Polynomial Equation with Integer Coefficients. - Srivatsava Ranjit Ganta, Shiva Prasad Kasiviswanathan, Adam D. Smith:
Composition Attacks and Auxiliary Information in Data Privacy. - Leonid Andreev:
From a set of parts to an indivisible whole. Part I: Operations in a closed mode. - Tamer AbuHmed, Abedelaziz Mohaisen, DaeHun Nyang:
A Survey on Deep Packet Inspection for Intrusion Detection Systems. - Xin Dong, Gene Cooperman:
Scalable Task-Oriented Parallelism for Structure Based Incomplete LU Factorization. - Sabu M. Thampi, K. Chandra Sekaran:
Mobile Agents for Content-Based WWW Distributed Image Retrieval. - Alberto Dennunzio, Pierre Guillon, Benoît Masson:
A compact topology for sand automata. - Vahan V. Mkrtchyan, Samvel S. Petrosyan, Gagik N. Vardanyan:
TRACTATUS on disjoint matchings in cubic graphs. - Dorit S. Hochbaum:
Polynomial time algorithms for bi-criteria, multi-objective and ratio problems in clustering and imaging. Part I: Normalized cut and ratio regions. - V. R. Vemula, David Ball, Simon R. Thorne:
Towards a Spreadsheet Engineering. - Andrew Kumiega, Ben Van Vliet:
A Software Development Methodology for Research and Prototyping in Financial Markets. - Jocelyn Paine, Emre Tek, Duncan Williamson:
Rapid Spreadsheet Reshaping with Excelsior: multiple drastic changes to content and layout are easy when you represent enough structure. - Simon R. Thorne, David Ball:
Considering Functional Spreadsheet Operator Usage Suggests the Value of Example Driven Modelling for Decision Support Systems. - Raymond Payette:
Documenting Spreadsheets. - Richard Brath, Michael Peters:
Spreadsheet Validation and Analysis through Content Visualization. - Michael Purser, David Chadwick:
Does an awareness of differing types of spreadsheet errors aid end-users in identifying spreadsheets errors? - Kenneth R. Baker, Stephen G. Powell, Barry Lawson, Lynn Foster-Johnson:
Comparison of Characteristics and Practices amongst Spreadsheet Users with Different Levels of Experience. - Paul J. Blayney:
An Investigation of the Incidence and Effect of Spreadsheet Errors Caused by the Hard Coding of Input Data Values into Formulas. - Toshimitsu Masuzawa, Sébastien Tixeuil:
Quiescence of Self-stabilizing Gossiping among Mobile Agents in Graphs. - Radu Arsinte, Costin Miron:
Acquisition Accuracy Evaluation in Visual Inspection Systems - a Practical Approach. - Radu Arsinte, Attila Ferencz, Costin Miron:
DSP Based System for Real time Voice Synthesis Applications Development. - Tsiriniaina Andriamampianina:
Random hypergraphs and algorithmics. - Ariel Daliot, Danny Dolev, Hanna Parnas:
Self-Stabilizing Pulse Synchronization Inspired by Biological Pacemaker Networks. - Augustin Chaintreau, Pierre Fraigniaud, Emmanuelle Lebhar:
Networks become navigable as nodes move and forget. - Ying Wang, Pierre Moulin:
Blind Fingerprinting. - Erik D. Demaine, Martin L. Demaine, Sándor P. Fekete, Mashhood Ishaque, Eynat Rafalin, Robert T. Schweller, Diane L. Souvaine:
Staged Self-Assembly:Nanomanufacture of Arbitrary Shapes with O(1) Glues. - Jan A. Bergstra, Cornelis A. Middelburg:
Thread algebra for sequential poly-threading. - Josep Freixas, Xavier Molinero, Martin Olsen, Maria J. Serna:
The Complexity of Testing Properties of Simple Games. - Marco Franciosi, Giulia Menconi:
Multi-dimensional sparse time series: feature extraction. - Sander Wahls, Holger Boche, Volker Pohl:
Optimum Zero-Forcing Precoder for Single-Carrier MIMO Systems. - Florent de Dinechin, Christoph Quirin Lauter:
Optimizing polynomials for floating-point implementation. - Debprakash Patnaik, P. S. Sastry, K. P. Unnikrishnan:
Inferring Neuronal Network Connectivity from Spike Data: A Temporal Datamining Approach. - Edith Cohen, Nick G. Duffield, Haim Kaplan, Carsten Lund, Mikkel Thorup:
Variance optimal sampling based estimation of subset sums. - Christopher Pearson, Celina Gibbs, Yvonne Coady:
Intuitive Source Code Visualization Tools for Improving Student Comprehension: BRICS. - Said Hoceini, Abdelhamid Mellouk, Hayet Hafi:
Une approche modulaire probabiliste pour le routage à Qualité de Service intégrée. - Mathieu Barcikowski, Philippe Pernelle, Arnaud Lefebvre, Michel Martinez, Jean Renaud:
Evaluation and exploitation of knowledge robustness in knowledge-based systems. - Leonardo S. Cardoso, Mérouane Debbah, Pascal Bianchi, Jamal Najim:
Cooperative Spectrum Sensing Using Random Matrix Theory. - Peter Jung:
On the Approximate Eigenstructure of Time-Varying Channels. - Alexandros G. Dimakis, Brighten Godfrey, Yunnan Wu, Martin J. Wainwright, Kannan Ramchandran:
Network Coding for Distributed Storage Systems. - Joaquín García-Alfaro, Frédéric Cuppens, Nora Cuppens-Boulahia:
Aggregating and Deploying Network Access Control Policies. - Jakob Nordström, Johan Håstad:
Towards an Optimal Separation of Space and Length in Resolution. - Soumaya El Kadiri, Philippe Pernelle, Miguel Delattre, Abdelaziz Bouras:
An approach to control collaborative processes in PLM systems. - Noga Alon, Fedor V. Fomin, Gregory Z. Gutin, Michael Krivelevich, Saket Saurabh:
Spanning directed trees with many leaves. - Marie-Pierre Béal, Dominique Perrin:
A quadratic algorithm for road coloring. - Ning Chen, Zhiyuan Yan:
Complexity Analysis of Reed-Solomon Decoding over GF(2^m) Without Using Syndromes. - Florian M. Sebert, Leslie Ying, Yi Ming Zou:
Toeplitz Block Matrices in Compressed Sensing. - Maximilien Gadouleau, Zhiyuan Yan:
Constant-Rank Codes. - Bernhard Haeupler, Siddhartha Sen, Robert Endre Tarjan:
Incremental Topological Ordering and Strong Component Maintenance. - Husnain Mansoor Ali, Anthony Busson, Amina Meraihi Naimi, Véronique Vèque:
Un Algorithme de Gestion des Adjacences basé sur la Puissance du Signal. - Wei Dai, Olgica Milenkovic:
Subspace Pursuit for Compressive Sensing: Closing the Gap Between Performance and Complexity. - Biswajit Biswal:
Website Optimization through Mining User Navigational Pattern. - Laurent Evain:
Knapsack cryptosystems built on NP-hard instance. - Mihyun Kang, Oleg Pikhurko, Alexander Ravsky, Mathias Schacht, Oleg Verbitsky:
Obfuscated Drawings of Planar Graphs. - José M. Martín-García:
xPerm: fast index canonicalization for tensor computer algebra. - Milan Batista:
A Method for Solving Cyclic Block Penta-diagonal Systems of Linear Equations. - Leonardo S. Cardoso, Mari Kobayashi, Mérouane Debbah, Øyvind Ryan:
Vandermonde Frequency Division Multiplexing for Cognitive Radio. - Shiva Prasad Kasiviswanathan, Homin K. Lee, Kobbi Nissim, Sofya Raskhodnikova, Adam D. Smith:
What Can We Learn Privately? - Daniel A. Spielman, Nikhil Srivastava:
Graph Sparsification by Effective Resistances. - Vikram Chandrasekhar, Jeffrey G. Andrews, Alan Gatherer:
Femtocell Networks: A Survey. - Michael Hahsler, Christian Buchta, Kurt Hornik:
Selective association rule generation. - Benjamin Lévêque, Frédéric Maffray, Myriam Preissmann:
Characterizing path graphs by forbidden induced subgraphs. - Michael Hahsler, Kurt Hornik:
New probabilistic interest measures for association rules. - Samuel I. Daitch, Daniel A. Spielman:
Faster Approximate Lossy Generalized Flow via Interior Point Algorithms. - Tadashi Wadayama:
Asymptotic Concentration Behaviors of Linear Combinations of Weight Distributions on Random Linear Code Ensemble. - David Soloveichik:
Robust Stochastic Chemical Reaction Networks and Bounded Tau-Leaping. - Clement Vidal:
The Ultimate Future of Artificial Life: Towards Artificial Cosmogenesis. - Valentin Savin:
Self-Corrected Min-Sum decoding of LDPC codes. - Valentin Savin:
Min-Max decoding for non binary LDPC codes. - Valentin Savin:
Algebraic-geometric codes from vector bundles and their decoding. - Michael Hahsler:
Optimizing Web Sites for Customer Retention. - Abedelaziz Mohaisen, DaeHun Nyang, KyungHee Lee:
Hierarchical Grid-Based Pairwise Key Pre-distribution in Wireless Sensor Networks. - Tal Philosof, Ram Zamir:
The Rate Loss of Single-Letter Characterization: The "Dirty" Multiple Access Channel. - Nadia Fawaz, Keyvan Zarifi, Mérouane Debbah, David Gesbert:
Asymptotic Capacity and Optimal Precoding Strategy of Multi-Level Precode & Forward in Correlated Channels. - Deniz Gündüz, Elza Erkip, H. Vincent Poor:
Secure Lossless Compression with Side Information. - (Withdrawn) Serious Flaws in Korf et al.'s Analysis on Time Complexity of A*.
- Li Chen:
Hsiao-Code Check Matrices and Recursively Balanced Matrices. - Somitra Kumar Sanadhya, Palash Sarkar:
22-Step Collisions for SHA-2. - Mazen Zein, Philippe Wenger, Damien Chablat:
Non-Singular Assembly-mode Changing Motions for 3-RPR Parallel Manipulators. - Jean Creignou, Hervé Diet:
Linear programming bounds for unitary space time codes. - Steve Oudot:
On the Topology of the Restricted Delaunay Triangulation and Witness Complex in Higher Dimensions. - Fedor V. Fomin, Yngve Villanger:
Treewidth computation and extremal combinatorics. - Samir Medina Perlaza, Laura Cottatellucci, Mérouane Debbah:
A Game Theoretic Framework for Decentralized Power Allocation in IDMA Systems. - Nadja Kutz:
On the need for a global academic internet platform. - Robert Shour:
Lexical growth, entropy and the benefits of networking. - Ramachandran Rajesh, Vinod Sharma:
Distributed Joint Source-Channel Coding on a Multiple Access Channel with Side Information. - Satish Babu Korada, Nicolas Macris:
Tight Bounds on the Capacity of Binary Input random CDMA Systems. - Catherine Recanati:
Hybrid Reasoning and the Future of Iconic Representations. - Dean B. Krafft, Aaron Birkland, Ellen J. Cramer:
NCore: Architecture and Implementation of a Flexible, Collaborative Digital Library. - Ron Dabora, Andrea J. Goldsmith:
The Capacity Region of the Degraded Finite-State Broadcast Channel. - Wenbing Zhao:
Integrity-Enhancing Replica Coordination for Byzantine Fault Tolerant Systems. - Wenbing Zhao:
Proactive Service Migration for Long-Running Byzantine Fault Tolerant Systems. - Bart Kuijpers, Vanessa Lemmens, Bart Moelans, Karl Tuyls:
Privacy Preserving ID3 over Horizontally, Vertically and Grid Partitioned Data. - Qi Chen, Uwe Aickelin:
Dempster-Shafer for Anomaly Detection. - David Monniaux:
A Quantifier Elimination Algorithm for Linear Real Arithmetic. - Uwe Aickelin, Adrian Adewunmi:
Simulation Optimization of the Crossdock Door Assignment Problem. - Jarrad Springett, Jeroen Vendrig:
Spatio-activity based object detection. - Helen Celia, Christopher Clegg, Mark Robinson, Peer-Olaf Siebers, Uwe Aickelin, Christine Sprigg:
Using Intelligent Agents to understand organisational behaviour. - Peer-Olaf Siebers, Uwe Aickelin, Helen Celia, Christopher Clegg:
A Multi-Agent Simulation of Retail Management Practices. - Peer-Olaf Siebers, Uwe Aickelin, Helen Celia, Christopher Clegg:
Understanding Retail Productivity by Simulating Management Practise. - Peer-Olaf Siebers, Uwe Aickelin, Helen Celia, Christopher Clegg:
Using Intelligent Agents to Understand Management Practices and Retail Productivity. - Florian Simatos, Philippe Robert, Fabrice Guillemin:
A Queueing System for Modeling a File Sharing Principle. - Peer-Olaf Siebers, Uwe Aickelin, Helen Celia, Christopher Clegg:
An Agent-Based Simulation of In-Store Customer Experiences. - Amanda M. Whitbrook, Uwe Aickelin, Jonathan M. Garibaldi:
Genetic-Algorithm Seeding Of Idiotypic Networks For Mobile-Robot Navigation. - Matthew J. Patitz, Scott M. Summers:
Self-Assembly of Discrete Self-Similar Fractals. - S. Viznyuk:
Use of self-correlation metrics for evaluation of information properties of binary strings. - Lokman I. Meho, Yvonne Rogers:
Citation Counting, Citation Ranking, and h-Index of Human-Computer Interaction Researchers: A Comparison between Scopus and Web of Science. - A. P. Platonov, D. I. Sidelnikov, M. V. Strizhov, Andrei M. Sukhov:
Estimation of available bandwidth and measurement infrastructure for Russian segment of Internet. - Salwani Abdullah, Uwe Aickelin, Edmund K. Burke, Aniza Mohamed Din, Rong Qu:
Investigating a Hybrid Metaheuristic For Job Shop Rescheduling. - Chiachi Huang, Syed Ali Jafar:
Degrees of Freedom of the MIMO Interference Channel with Cooperation and Cognition. - Yusuf Jafry, Fredrika Sidoroff, Roger Chi:
A Computational Framework for the Near Elimination of Spreadsheet Risk. - John C. Nash, Andy Adler, Neil Smith:
TellTable Spreadsheet Audit: from Technical Possibility to Operating Prototype. - Simon R. Thorne, David Ball, Zoe Lawson:
A Novel Approach to Formulae Production and Overconfidence Measurement to Reduce Risk in Spreadsheet Modelling. - Thomas Watteyne, Dominique Barthel, Mischa Dohler, Isabelle Augé-Blum:
WiFly: experimenting with Wireless Sensor Networks and Virtual coordinates. - Ghassan M. Kraidy, Valentin Savin:
Minimum-Delay Decoding of Turbo-Codes for Upper-Layer FEC. - Olivier Finkel:
On Winning Conditions of High Borel Complexity in Pushdown Games. - Olivier Finkel:
On the Topological Complexity of Infinitary Rational Relations. - Olivier Finkel:
Closure Properties of Locally Finite Omega Languages. - Simon R. Thorne, David Ball:
Exploring Human Factors in Spreadsheet Development. - Deborah Cernauskas, Andrew Kumiega, Ben Van Vliet:
Risk Management for Complex Calculations: EuSpRIG Best Practices in Hybrid Applications. - Ziv Hellman:
Breaking Out of the Cell: On The Benefits of a New Spreadsheet User-Interaction Paradigm. - Fred Daneshgaran, Massimiliano Laddomada, Fabio Mesiti, Marina Mondin:
On the Throughput Allocation for Proportional Fairness in Multirate IEEE 802.11 DCF under General Load Conditions. - Pablo García-Sánchez, Juan Luis Jiménez Laredo, Juan P. Sevilla, Pedro A. Castillo, Juan Julián Merelo Guervós:
Improved evolutionary generation of XSLT stylesheets. - Luca Muscariello, Diego Perino:
Early Experiences in Traffic Engineering Exploiting Path Diversity: A Practical Approach. - Marco Lanucara, Riccardo Borghi:
Resampling and requantization of band-limited Gaussian stochastic signals with flat power spectrum. - Jean-Guillaume Dumas, Laurent Fousse, Bruno Salvy:
Compressed Modular Matrix Multiplication. - Adrian Adewunmi, Uwe Aickelin, Mike Byrne:
An Investigation of the Sequential Sampling Method for Crossdocking Simulation Output Variance Reduction. - Junwei Zhang, Mustafa Cenk Gursoy:
Achievable Rates and Optimal Resource Allocation for Imperfectly-Known Fading Relay Channels. - Uwe Aickelin, Edmund K. Burke, Jingpeng Li:
Improved Squeaky Wheel Optimisation for Driver Scheduling. - Jingpeng Li, Uwe Aickelin:
The Application of Bayesian Optimization and Classifier Systems in Nurse Scheduling. - Uwe Aickelin, Peter J. Bentley, Steve Cayzer, Jungwon Kim, Julie McLeod:
Danger Theory: The Link between AIS and IDS. - Jocelyn Paine:
Excelsior: Bringing the Benefits of Modularisation to Excel. - Yoann Pigné, Antoine Dutot, Frédéric Guinand, Damien Olivier:
GraphStream: A Tool for bridging the gap between Complex Systems and Dynamic Graphs. - Felix Fontein:
Groups from Cyclic Infrastructures and Pohlig-Hellman in Certain Infrastructures. - Natalia Osipova:
Comparison of the Discriminatory Processor Sharing Policies. - Jean-Luc Fouquet, Jean-Marie Vanherpe:
On $(P_5,\bar{P_5})$-sparse graphs and other families. - Mirela Damian, Saurav Pandit, Sriram V. Pemmaraju:
Local Approximation Schemes for Topology Control. - Christoph Koch, Dan Olteanu:
Conditioning Probabilistic Databases. - Andrei Marculescu, Sotiris E. Nikoletseas, Olivier Powell, José D. P. Rolim:
Lighweight Target Tracking Using Passive Traces in Sensor Networks. - Panagiotis Papadakos, Giorgos Vasiliadis, Yannis Theoharis, Nikos Armenatzoglou, Stella Kopidaki, Yannis Marketakis, Manos Daskalakis, Kostas Karamaroudis, Giorgos Linardakis, Giannis Makrydakis, Vangelis Papathanasiou, Lefteris Sardis, Petros Tsialiamanis, Georgia Troullinou, Kostas Vandikas, Dimitris Velegrakis, Yannis Tzitzikas:
The Anatomy of Mitos Web Search Engine. - Maximilien Gadouleau, Zhiyuan Yan:
On the Connection between Optimal Constant-Rank Codes and Optimal Constant-Dimension Codes. - Gerhard de Koning Gans, Jaap-Henk Hoepman, Flavio D. Garcia:
A Practical Attack on the MIFARE Classic. - Andrew Gacek:
System Description: Abella -- A System for Reasoning about Computations. - Valentin Goranko, Dmitry Shkatov:
Tableau-based decision procedures for logics of strategic ability in multi-agent systems. - Frédéric Guinand, Yoann Pigné:
Problem Solving and Complex Systems. - Jean-Philippe Cointet, David Chavalarias:
Science mapping with asymmetrical paradigmatic proximity. - João Gomes, Daniel Martins, Simão Melo de Sousa, Jorge Sousa Pinto:
Lissom, a Source Level Proof Carrying Code Platform. - A. A. Karawia:
Two Algorithms for Solving A General Backward Pentadiagonal Linear Systems. - Wee-Peng Tay, John N. Tsitsiklis, Moe Z. Win:
Data Fusion Trees for Detection: Does Architecture Matter? - Li Chen:
lambda-Connectedness Determination for Image Segmentation. - V. Sriram, Ganesh M. Narayan, K. Gopinath:
SAFIUS - A secure and accountable filesystem over untrusted storage. - Lenore R. Mullin, James E. Raynolds:
Conformal Computing: Algebraically connecting the hardware/software boundary using a uniform approach to high-performance computation for software and hardware applications. - Raphael Hunger, Michael Joham:
A General Rate Duality of the MIMO Multiple Access Channel and the MIMO Broadcast Channel. - Luciano da Fontoura Costa:
Trajectory Networks and Their Topological Changes Induced by Geographical Infiltration. - Idan Goldenberg, David Burshtein:
Upper Bound on Error Exponent of Regular LDPC Codes Transmitted over the BEC. - Gabriel Istrate, Madhav V. Marathe, S. S. Ravi:
Adversarial Scheduling Analysis of Game Theoretic Models of Norm Diffusion. - Vipin Samar, Sangeeta Patni:
Controlling the Information Flow in Spreadsheets. - James Bailey, Guozhu Dong, Anthony Widjaja To:
Logical Queries over Views: Decidability and Expressiveness. - Shashi Borade, Baris Nakiboglu, Lizhong Zheng:
Unequal Error Protection: Some Fundamental Limits. - Olivier Laval, Sophie Toulouse, Anass Nagih:
Rapport de recherche sur le problème du plus court chemin contraint. - Camilla Hollanti, Jyrki T. Lahtonen, Hsiao-feng Lu:
Maximal Orders in the Design of Dense Space-Time Lattice Codes. - Gerard Briscoe, Philippe De Wilde:
Digital Ecosystems: Self-Organisation of Evolving Agent Populations. - Carlos M. Fernandes, Antonio Miguel Mora, Juan Julián Merelo Guervós, Vitorino Ramos, Juan Luis Jiménez Laredo:
KohonAnts: A Self-Organizing Ant Algorithm for Clustering and Pattern Classification. - Mikhail V. Konnik:
Using Spatially Varying Pixels Exposures and Bayer-covered Photosensors for High Dynamic Range Imaging. - Simon Balon, Guy Leduc:
Combined Intra- and Inter-domain Traffic Engineering using Hot-Potato Aware Link Weights Optimization. - Mari Kobayashi, Xavier Mestre:
Impact of CSI on Distributed Space-Time Coding in Wireless Relay Networks. - Noga Alon, Yossi Azar, Shai Gutner:
Admission Control to Minimize Rejections and Online Set Cover with Repetitions. - T. Rothenberger, S. Oez, E. Tahirovic, Christoph Schommer:
Figuring out Actors in Text Streams: Using Collocations to establish Incremental Mind-maps. - Christiane Frougny, Wolfgang Steiner:
Minimal weight expansions in Pisot bases. - Kassel Hingee, Marcus Hutter:
Equivalence of Probabilistic Tournament and Polynomial Ranking Selection. - Uwe Aickelin, Kathryn A. Dowsland:
Enhanced Direct and Indirect Genetic Algorithm Approaches for a Mall Layout and Tenant Selection Problem. - Uwe Aickelin:
An Indirect Genetic Algorithm for Set Covering Problems. - Uwe Aickelin, Larry Bull:
On the Application of Hierarchical Coevolutionary Genetic Algorithms: Recombination and Evaluation Partners. - Uwe Aickelin, Paul White:
Building Better Nurse Scheduling Algorithms. - Uwe Aickelin, Kathryn A. Dowsland:
An Indirect Genetic Algorithm for a Nurse Scheduling Problem. - Steve Cayzer, Uwe Aickelin:
A Recommender System based on Idiotypic Artificial Immune Networks. - Uwe Aickelin, Jamie Twycross, Thomas Hesketh-Roberts:
Rule Generalisation in Intrusion Detection Systems using Snort. - Uwe Aickelin, Jingpeng Li:
An Estimation of Distribution Algorithm for Nurse Scheduling. - Amanda M. Whitbrook, Uwe Aickelin, Jonathan M. Garibaldi:
Idiotypic Immune Networks in Mobile Robot Control. - Peer-Olaf Siebers, Uwe Aickelin, Giuliana Battisti, Helen Celia, Christopher Clegg, Xiaolan Fu, Raphael De Hoyos, Alfonsiana Iona, Alina Petrescu, Peixoto Adriano:
The Role of Management Practices in Closing the Productivity Gap. - Adrien Poteaux, Marc Rybowicz:
Towards a Symbolic-Numeric Method to Compute Puiseux Series: The Modular Part. - Mark Burgin, Marc L. Smith:
Concurrent Composition and Algebras of Events, Actions, and Processes. - Shahab Oveis Gharan, Alireza Bayesteh, Amir K. Khandani:
On Diversity-Multiplexing Tradeoff in Multiple-Relay Networks. - Denis Pallez, Laurent Brisson, Thierry Baccino:
Towards a human eye behavior model by applying Data Mining Techniques on Gaze Information from IEC. - Luca Viganò, Marco Volpe:
Labeled Natural Deduction Systems for a Family of Tense Logics. - Denis Pallez, Philippe Collard, Thierry Baccino, Laurent Dumercy:
Eye-Tracking Evolutionary Algorithm to minimize user's fatigue in IEC applied to Interactive One-Max problem. - Michael Hahsler:
A Model-Based Frequency Constraint for Mining Associations from Transaction Data. - Avik Chaudhuri, Prasad Naldurg, Sriram K. Rajamani:
A Type System for Data-Flow Integrity on Windows Vista. - Victoria L. Lemieux:
Archiving: The Overlooked Spreadsheet Risk. - I. V. Lerner, I. V. Yurkevich, Alexander Stepanenko, Costas C. Constantinou:
Loss Fluctuations and Temporal Correlations in Network Queues. - Bhargava Kumar K, Ganesh M. Narayan, K. Gopinath:
Performance Evaluation of Multiple TCP connections in iSCSI. - Yoshiharu Maeno, Yukio Ohsawa:
Discovering covert node in networked organization. - Patrick O'Beirne:
Facing the Facts. - Wesley Calvert, John E. Porter:
Infinitary Queries in Spatial Databases. - Tomas Rokicki:
Twenty-Five Moves Suffice for Rubik's Cube. - Esam Mlaih, Salah A. Aly:
Secure Hop-by-Hop Aggregation of End-to-End Concealed Data in Wireless Sensor Networks. - Marc Lelarge, Jean Bolot:
A Local Mean Field Analysis of Security Investments in Networks. - Tad Hogg, Gábor Szabó:
Diversity of Online Community Activities. - Huan Xu, Shie Mannor, Constantine Caramanis:
Robustness, Risk, and Regularization in Support Vector Machines. - Fahem Kebair, Frédéric Serin:
Multiagent Approach for the Representation of Information in a Decision Support System. - V. K. Bansal, Mahesh Pal:
Geographic Information Systems in Evaluation and Visualization of Construction Schedule. - Daniel Raible, Henning Fernau:
A New Upper Bound for Max-2-Sat: A Graph-Theoretic Approach. - Michael Fairbank:
Reinforcement Learning by Value Gradients. - Carl Bracken:
New Families of Triple Error Correcting Codes with BCH Parameters. - Mikhail Nesterenko, Adnan Vora:
Void Traversal for Guaranteed Delivery in Geometric Routing. - Hariharan Narayanan:
Distributed Averaging using non-convex updates. - Ali Nazari, S. Sandeep Pradhan, Achilleas Anastasopoulos:
A New Sphere-Packing Bound for Maximal Error Exponent for Multiple-Access Channels. - Yeow Meng Chee, San Ling:
Improved Lower Bounds for Constant GC-Content DNA Codes. - Yeow Meng Chee, Son Hoang Dau, Alan C. H. Ling, San Ling:
The Sizes of Optimal q-Ary Codes of Weight Three and Distance Four: A Complete Solution. - L. Sunil Chandran, Mathew C. Francis, Naveen Sivadasan:
On the cubicity of AT-free graphs and circular-arc graphs. - Martin Dietzfelbinger, Rasmus Pagh:
Succinct Data Structures for Retrieval and Approximate Membership. - Costas C. Constantinou, Alexander Stepanenko:
Network protocol scalability via a topological Kadanoff transformation. - Leonid B. Litinskii:
Cluster Approach to the Domains Formation. - Rafael F. Wyrembelski, Tobias J. Oechtering, Igor Bjelakovic, Clemens Schnurr, Holger Boche:
Capacity of Gaussian MIMO Bidirectional Broadcast Channels. - Vitaly Skachek, Mark F. Flanagan:
Lower Bounds on the Minimum Pseudodistance for Linear Codes with $q$-ary PSK Modulation over AWGN. - Carl Bracken, Eimear Byrne, Nadya Markin, Gary McGuire:
Fourier Spectra of Binomial APN Functions. - Franck van Breugel, Babita Sharma, James Worrell:
Approximating a Behavioural Pseudometric without Discount for Probabilistic Systems. - Juan Carlos Nieves, Mauricio Osorio, Ulises Cortés:
Preferred extensions as stable models. - Krishna Srikanth Gomadam, Viveck R. Cadambe, Syed Ali Jafar:
Approaching the Capacity of Wireless Networks through Distributed Interference Alignment. - Ted Dunning:
Recorded Step Directional Mutation for Faster Convergence. - Alex S. Leong, Subhrakanti Dey, Jamie S. Evans:
Power allocation for state estimation over wireless channels using multiple sensors. - Pedro Comesaña, Neri Merhav, Mauro Barni:
Asymptotically Optimum Universal One-Bit Watermarking for Gaussian Covertexts and Gaussian Attacks. - Jingpeng Li, Uwe Aickelin, Edmund K. Burke:
A Component Based Heuristic Search method with Adaptive Perturbations for Hospital Personnel Scheduling. - Peer-Olaf Siebers, Uwe Aickelin:
Introduction to Multi-Agent Simulation. - Uwe Aickelin, Dipankar Dasgupta:
Artificial Immune Systems Tutorial. - Shiva Prasad Kasiviswanathan, Adam D. Smith:
A Note on Differential Privacy: Defining Resistance to Arbitrary Side Information. - Jaime Gutierrez, David Sevilla:
On Ritt's decomposition Theorem in the case of finite fields. - Bruno Gonçalves, José J. Ramasco:
Human dynamics revealed through Web analytics. - Ganesh M. Narayan, K. Gopinath, V. Sridhar:
Structure and Interpretation of Computer Programs. - David Eppstein:
Learning Sequences. - Ke Liu, Nael B. Abu-Ghazaleh:
Stateless and Delivery Guaranteed Geometric Routing on Virtual Coordinate System. - Yoshiharu Maeno, Yukio Ohsawa:
Reflective visualization and verbalization of unconscious preference. - J. G. Esteve, Fernando Falceto:
On the number of $k$-cycles in the assignment problem for random matrices. - Troy Lee, Rajat Mittal:
Product theorems via semidefinite programming. - Greig A. Cowan, Graeme A. Stewart, Andrew Elwell:
Unified storage systems for distributed Tier-2 centres. - Sébastien Vérel, Philippe Collard, Marco Tomassini, Leonardo Vanneschi:
Neutral Fitness Landscape in the Cellular Automata Majority Problem. - Maroun Bercachi, Philippe Collard, Manuel Clergue, Sébastien Vérel:
Evolving Dynamic Change and Exchange of Genotype Encoding in Genetic Algorithms for Difficult Optimization Problems. - David Simoncini, Philippe Collard, Sébastien Vérel, Manuel Clergue:
From Cells to Islands: An unified Model of Cellular Parallel Genetic Algorithms. - Jean-Marie Chauvet:
Combinatorial Explorations in Su-Doku. - Xin Han, Kazuo Iwama, Guochuan Zhang:
On Two Dimensional Orthogonal Knapsack Problem. - Marián Dvorský:
Common Permutation Problem. - Vandy Berten, Chi-Ju Chang, Tei-Wei Kuo:
Improving discretisation of continuous DVS scheme for frame based stochastic real-time systems using schedulability conditions. - Victor S. Grishchenko:
Locator/identifier split using the data link layer. - Samuel L. Marateck:
How good is the Warnsdorff's knight's tour heuristic? - (Withdrawn) A O(n^8) X O(n^7) Linear Programming Model of the Traveling Salesman Problem.
- Marko A. Rodriguez:
Grammar-Based Random Walkers in Semantic Networks. - Zaenal Akbar, Iman Firmansyah, Bambang Hermanto, Laksana Tri Handoko:
GRID Architecture through a Public Cluster. - Herbert Van de Sompel, Ryan Chute, Patrick Hochstenbach:
The aDORe Federation Architecture. - Robert Spalek:
A Dual Polynomial for OR. - Nithin Nagaraj, Prabhakar G. Vaidya:
One-Time Pad, Arithmetic Coding and Logic Gates: An unifying theme using Dynamical Systems. - Vincent D. Blondel, Jean-Loup Guillaume, Renaud Lambiotte, Etienne Lefebvre:
Fast unfolding of community hierarchies in large networks. - Daouda Niang Diatta, Bernard Mourrain, Olivier Ruatta:
On the Computation of the Topology of a Non-Reduced Implicit Space Curve. - George I. Bell:
The shortest game of Chinese Checkers and related problems. - A. Krzysztof Kwasniewski, Ewa Krot-Sieniawska:
On inversion formulas and Fibonomial coefficients. - A. K. Kwasniewski:
New formulas for Stirling-like numbers and Dobinski-like formulas. - Frédéric Guinand, Yoann Pigné:
An Ant-Based Model for Multiple Sequence Alignment. - Matthew A. Herman, Thomas Strohmer:
High-Resolution Radar via Compressed Sensing. - Joel A. Tropp, Deanna Needell:
CoSaMP: Iterative signal recovery from incomplete and inaccurate samples. - Etienne Gallais:
Combinatorial realization of the Thom-Smale complex via discrete Morse theory. - Gabriel Cardona, Mercè Llabrés, Francesc Rosselló, Gabriel Valiente:
A Distance Metric for Tree-Sibling Time Consistent Phylogenetic Networks. - Lenka Zdeborová, Marc Mézard:
Hard constraint satisfaction problems. - Guangyue Han, Brian H. Marcus:
Asymptotics of Input-Constrained Binary Symmetric Channel Capacity. - John McKay, David Sevilla:
Decomposing replicable functions. - Sergey N. Dorogovtsev, J. F. F. Mendes, Alexander N. Samukhin, Alexander Y. Zyuzin:
Organization of modular networks. - Benjamin Allen:
The Category-Theoretic Arithmetic of Information. - Laszlo B. Kish:
Unconditionally secure computers and hardware, such as memories, processors, and hard drives. - Andrea Baronchelli, Vittorio Loreto, Luc Steels:
In-depth analysis of the Naming Game dynamics: the homogeneous mixing case. - Alexander Feigel:
Essential conditions for evolution of communication within a species. - Salah A. Aly:
Asymmetric and Symmetric Subsystem BCH Codes and Beyond. - Sergey V. Petoukhov:
Matrix genetics, part 1: permutations of positions in triplets and symmetries of genetic matrices. - Travis R. Beals, Kevin P. Hynes, Barry C. Sanders:
Distributed authentication for randomly compromised networks. - Travis R. Beals, Barry C. Sanders:
Distributed Relay Protocol for Probabilistic Information-Theoretic Security in a Randomly-Compromised Network. - Arash A. Amini, Martin J. Wainwright:
High-dimensional analysis of semidefinite relaxations for sparse principal components. - Vladimir Privman, Guinevere Strack, Dmitry Solenov, Marcos Pita, Evgeny Katz:
Optimization of Enzymatic Biochemical Logic for Noise Reduction and Scalability: How Many Biocomputing Gates Can Be Interconnected in a Circuit? - Gusztáv Morvai, Benjamin Weiss:
On Sequential Estimation and Prediction for Discrete Time Series. - Andrew C. Doherty, Yeong-Cherng Liang, Ben Toner, Stephanie Wehner:
The quantum moment problem and bounds on entangled multi-prover games. - Jan A. Bergstra, Inge Bethke, Alban Ponse:
Cancellation Meadows: a Generic Basis Theorem and Some Applications. - James D. Currie, Narad Rampersad:
Infinite words containing squares at every position. - Vivek V. Shende, Igor L. Markov:
On the CNOT-cost of TOFFOLI gates. - Franklin L. Marquezino, Renato Portugal:
The QWalk Simulator of Quantum Walks. - Jens Christian Claussen:
Discrete stochastic processes, replicator and Fokker-Planck equations of coevolutionary dynamics in finite and infinite populations.
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.