default search action
CoRR, October 2009
- Mikolás Janota, João Marques-Silva, Radu Grigore:
Algorithms for finding dispensable variables. - Bruno Grenet:
Acceptable Complexity Measures of Theorems. - Patrick Briest, Sanjeev Khanna:
Improved Hardness of Approximation for Stackelberg Shortest-Path Pricing. - Andrea Campagna, Rasmus Pagh:
Finding Associations and Computing Similarity via Biased Pair Sampling. - Richard G. Clegg, Raul Landa, Miguel Rio:
Criticisms of modelling packet traffic using long-range dependence. - O. Said, S. Bahgat, M. Ghoniemy, Y. Elawdy:
Analysis, Design and Simulation of a New System for Internet Multimedia Transmission Guarantee. - Ivan Voras, Mario Zagar:
Web-enabling Cache Daemon for Complex Data. - Renuka A., K. C. Shet:
Hierarchical Approach for Key Management in Mobile Ad hoc Networks. - Venkatesh Saligrama, Manqi Zhao:
Compressed Blind De-convolution. - Deeparnab Chakrabarty, Jochen Könemann, David Pritchard:
Hypergraphic LP Relaxations for Steiner Trees. - Randall Dougherty, Christopher F. Freiling, Kenneth Zeger:
Linear rank inequalities on five or more variables. - George B. Purdy, Justin W. Smith:
On Finding Ordinary or Monochromatic Intersection Points. - P. Ganeshkumar, K. Thyagarajah:
An Analysis of Energy Consumption on ACK plus Rate Packet in Rate Based Transport Protocol. - Abbas Karimi, Faraneh Zarafshan, Adznan Bin Jantan, Abdul Rahman Ramli, M. Iqbal Saripan:
A New Fuzzy Approach for Dynamic Load Balancing Algorithm. - Jialing Liu, Nicola Elia:
Convergence of Fundamental Limitations in Feedback Communication, Estimation, and Feedback Control over Gaussian Channels. - Claudia Marinica, Fabrice Guillet, Henri Briand:
Post-Processing of Discovered Association Rules Using Ontologies. - Daniel Cederman, Philippas Tsigas:
Supporting Lock-Free Composition of Concurrent Data Objects. - Benjamin Steinberg:
The averaging trick and the Cerny conjecture. - Emmanuel J. Candès, Yaniv Plan:
Accurate low-rank matrix recovery from a small number of linear measurements. - Parinya Chalermsook, Bundit Laekhanukit, Danupon Nanongkai:
Stackelberg Pricing is Hard to Approximate within 2-ε. - Kamiar Rahnama Rad:
Sharp Sufficient Conditions on Exact Sparsity Pattern Recovery. - Andreas Björklund:
Exact Covers via Determinants. - Antonio Bucchiarone, Davide Di Ruscio, Henry Muccini, Patrizio Pelliccione:
From Requirements to code: an Architecture-centric Approach for producing Quality Systems. - José A. Soto:
Improved Analysis of a Max Cut Algorithm Based on Spectral Partitioning. - Imran S. Haque, Vijay S. Pande:
Hard Data on Soft Errors: A Large-Scale Assessment of Real-World Error Rates in GPGPU. - Ye Du:
Ranking via Arrow-Debreu Equilibrium. - Victor Gluzberg:
A Note On Higher Order Grammar. - Om Prasad Patri, Amit Kumar Mishra:
Pre-processing in AI based Prediction of QSARs. - Michel X. Goemans:
Combining Approximation Algorithms for the Prize-Collecting TSP. - Syed Ali Jafar:
Exploiting Channel Correlations - Simple Interference Alignment Schemes with no CSIT. - Michael Lampis:
Algorithmic Meta-Theorems for Graphs of Bounded Vertex Cover. - Sham M. Kakade, Shai Shalev-Shwartz, Ambuj Tewari:
Applications of strong convexity--strong smoothness duality to learning with matrices. - Alexandru Costan, Corina Stratan, Eliana-Dina Tirsa, Mugurel Ionut Andreica, Valentin Cristea:
Towards a Grid Platform for Scientific Workflows Management. - Gerard Briscoe, Suzanne Sadedin:
Digital Business Ecosystems: Natural Science Paradigms. - (Withdrawn) Capacity Region of a State Dependent Degraded Broadcast Channel with Noncausal Transmitter CSI.
- Benjamin Recht:
A Simpler Approach to Matrix Completion. - Himanshu Tyagi, Prakash Narayan:
The Gelfand-Pinsker Channel: Strong Converse and Upper Bound for the Reliability Function. - Fei Wei, Huazhong Yang:
From devil to angel, transmission lines boost parallel computing of linear resistor networks. - Yuan (Alan) Qi, Ahmed H. Abdel-Gawad, Thomas P. Minka:
Variable sigma Gaussian processes: An expectation propagation perspective. - Gerard Briscoe, Philippe De Wilde:
Computing of Applied Digital Ecosystems. - Laurent Poinsot, Gérard Henry Edmond Duchamp, Silvia Goodenough, Karol A. Penson:
Statistics on Graphs, Exponential Formula and Combinatorial Physics. - Dmytro V. Lande, A. A. Snarskii:
Self-similarity properties in a queuing network model. - Ciprian Mihai Dobre, Florin Pop, Alexandru Costan, Mugurel Ionut Andreica, Valentin Cristea:
Robust Failure Detection Architecture for Large Scale Distributed Systems. - Manar Mohaisen, KyungHi Chang:
Co-Channel Interference Cancellation in OFDM Networks using Coordinated Symbol Repetition and Soft Decision MLE CCI Canceler. - Erika De Francesco, Salvatore Iiritano, Antonino Spagnolo, Marco Iannelli:
A methodology for semi-automatic classification schema building. - Andrew Gacek:
A Framework for Specifying, Prototyping, and Reasoning about Computational Systems. - Adrien Richard:
Local negative circuits and fixed points in Boolean networks. - Glencora Borradaile, Brent Heeringa, Gordon T. Wilfong:
Approximation Algorithms for Constrained Knapsack Problems. - D. Shanmugapriya, G. Padmavathi:
A Survey of Biometric keystroke Dynamics: Approaches, Security and Challenges. - Md. Ashraful Islam, Riaz Uddin Mondal, Md. Zahid Hasan:
Performance Evaluation of Wimax Physical Layer under Adaptive Modulation Techniques and Communication Channels. - Adhistya Erna Permanasari, Dayang Rohaya Awang Rambli, P. Dhanapal Durai Dominic:
Prediction of Zoonosis Incidence in Human using Seasonal Auto Regressive Integrated Moving Average (SARIMA). - Anissa Lamani, Maria Potop-Butucaru, Sébastien Tixeuil:
Optimal deterministic ring exploration with oblivious asynchronous robots. - Harsh Beohar, Pieter J. L. Cuijpers, Jos C. M. Baeten:
Design of asynchronous supervisors. - Arpita Ghosh, Randolph Preston McAfee, Kishore Papineni, Sergei Vassilvitskii:
Bidding for Representative Allocations for Display Advertising. - Guanfeng Liang, Nitin H. Vaidya:
When Watchdog Meets Coding. - Sagar Shah, Yao Yu, Athina P. Petropulu:
Step-Frequency Radar with Compressive Sampling (SFR-CS). - Jamshid Abouei, Konstantinos N. Plataniotis, Subbarayan Pasupathy:
Green Modulation in Proactive Wireless Sensor Networks. - Yi Cao, Biao Chen:
Interference Channels with One Cognitive Transmitter. - Sajid M. Siddiqi, Byron Boots, Geoffrey J. Gordon:
Reduced-Rank Hidden Markov Models. - Tom Leinster:
A maximum entropy theorem with applications to the measurement of biodiversity. - Esteban Arcaute, Sergei Vassilvitskii:
Social Networks and Stable Matchings in the Job Market. - Soummya Kar, Bruno Sinopoli, José M. F. Moura:
A Random Dynamical Systems Approach to Filtering in Large-scale Networks. - Raghunandan H. Keshavan, Andrea Montanari, Sewoong Oh:
Low-rank Matrix Completion with Noisy Observations: a Quantitative Comparison. - Jiri Barnat, Lubos Brim, Ivana Cerná, Sven Drazan, Jana Fabriková, Jan Láník, David Safránek, Hongwu Ma:
BioDiVinE: A Framework for Parallel Analysis of Biological Models. 31-45 - Tomás Skopal, Jakub Lokoc:
On Metric Skyline Processing by PM-tree. - Ernie Cohen:
Pessimistic Testing. - Pierrick Tranouez, Antoine Dutot:
Building upon Fast Multipole Methods to Detect and Model Organizations. - Tristan Crolard, Emmanuel Polonowski:
A Formally Specified Type System and Operational Semantics for Higher-Order Procedural Variables. - Éric Daudé, Pierrick Tranouez, Patrice Langlois:
A multiagent urban traffic simulation. Part II: dealing with the extraordinary. - Ernie Cohen:
Weak Kleene Algebra is Sound and (Possibly) Complete for Simulation. - Nicolas Catusse, Victor Chepoi, Yann Vaxès:
Embedding into the rectilinear plane in optimal O*(n^2). - Alexandros G. Dimakis, Pascal O. Vontobel:
LP Decoding meets LP Decoding: A Connection between Channel Coding and Compressed Sensing. - Arvind Yedla, Henry D. Pfister, Krishna R. Narayanan:
Can Iterative Decoding for Erasure Correlated Sources be Universal? - Jun Li, Marwan Hadri Azmi, Robert A. Malaney, Jinhong Yuan:
Design of network-coding based multi-edge type LDPC codes for multi-source relaying systems. - Rahul Urgaonkar, Michael J. Neely:
Delay-Limited Cooperative Communication with Reliability Constraints in Wireless Networks. - Mark Braverman, Elchanan Mossel:
Sorting from Noisy Information. - Bogdan Aman, Gabriel Ciobanu:
Mutual Mobile Membranes with Timers. 1-15 - Pham Quang Dung, Yves Deville, Pascal Van Hentenryck:
A Local Search Modeling for Constrained Optimum Paths Problems (Extended Abstract). 5-11 - Farshid Hassani Bijarbooneh, Pierre Flener, Justin Pearson:
Dynamic Demand-Capacity Balancing for Air Traffic Management Using Constraint-Based Local Search: First Results. 27-40 - David Pereira, Inês Lynce, Steven D. Prestwich:
On Improving Local Search for Unsatisfiability. 41-53 - Gilles Audemard, Jean-Marie Lagniez, Bertrand Mazure, Lakhdar Sais:
Integrating Conflict Driven Clause Learning to Local Search. 55-68 - Fang He, Rong Qu:
A Constraint-directed Local Search Approach to Nurse Rostering Problems. 69-80 - Marie Pelleau, Pascal Van Hentenryck, Charlotte Truchet:
Sonet Network Design Problems. 81-95 - Salvador Abreu, Daniel Diaz, Philippe Codognet:
Parallel local search for solving Constraint Problems on the Cell Broadband Engine (Preliminary Results). 97-111 - Jun He, Pierre Flener, Justin Pearson:
Toward an automaton Constraint for Local Search. 13-25 - Olivier Finkel:
The Complexity of Infinite Computations In Models of Set Theory. - Taoufik Bdiri, Fabien Moutarde, Nicolas Bourdis, Bruno Steux:
Adaboost with "Keypoint Presence Features" for Real-Time Vehicle Visual Detection. - Bogdan Stanciulescu, Amaury Breheret, Fabien Moutarde:
Introducing New AdaBoost Features for Real-Time Vehicle Detection. - Taoufik Bdiri, Fabien Moutarde, Bruno Steux:
Visual object categorization with new keypoint-based adaBoost features. - Fabien Moutarde, Alexandre Bargeton, Anne Herbin, Lowik Chanussot:
Modular Traffic Sign Recognition applied to on-vehicle real-time visual detection of American and European speed limit signs. - Mehdi Torbatian, Mohamed Oussama Damen:
On the Outage Behavior of Asynchronous OFDM DF and AF Cooperative Networks. - Wei Mao, Babak Hassibi:
Violating the Ingleton Inequality with Finite Groups. - Tobias Jacobs:
Resistant Algorithms: Obtaining Simpler Proofs by Excluding Corner Cases. - Wei-Mei Chen, Hsien-Kuei Hwang, Tsung-Hsi Tsai:
Simple, efficient maxima-finding algorithms for multidimensional samples. - Ping Li:
On the Sample Complexity of Compressed Counting. - Yves Deville, Christine Solnon:
Proceedings 6th International Workshop on Local Search Techniques in Constraint Satisfaction, LSCS 2009, Lisbon, Portugal, 20 September 2009. EPTCS 5, 2009 [contents] - Luca Bortolussi, Alberto Policriti:
Hybrid Semantics of Stochastic Programs with Dynamic Reconfiguration. 63-76 - Yeow-Khiang Chia, Abbas El Gamal:
3-Receiver Broadcast Channels with Common and Confidential Messages. - Laurence Loewe, Stuart L. Moodie, Jane Hillston:
Quantifying the implicit process flow abstraction in SBGN-PD diagrams with Bio-PEPA. 93-107 - Heike Siebert:
Dynamical and Structural Modularity of Discrete Regulatory Networks. 109-124 - Sarif Sk. Hassan, Pabitra Pal Choudhury, Amita Pal, R. L. Brahmachary, Arunava Goswami:
Smelling Lilly of the Valley: Nature inspired or A Mathematical construct? - Maurice J. Jansen, Jayalal Sarma:
Balancing Bounded Treewidth Circuits. - Albena Tchamova, Jean Dezert, Florentin Smarandache:
Tracking object's type changes with fuzzy based fusion rule. - Maurice J. Jansen:
Weakening Assumptions for Deterministic Subexponential Time Non-Singular Matrix Completion. - Morten Hansen, Babak Hassibi, Alexandros G. Dimakis, Weiyu Xu:
Near-Optimal Detection in MIMO Systems using Gibbs Sampling. - P. Jayarekha, T. R. Gopalakrishnan Nair:
Prefetching of VoD Programs Based On ART1 Requesting Clustering. - M. Dakshayini, T. R. Gopalakrishnan Nair:
Prefix based Chaining Scheme for Streaming Popular Videos using Proxy servers in VoD. - Annapurna P. Patil, Narmada Sambaturu, Krittaya Chunhaviriyakul:
Convergence Time Evaluation of Algorithms in MANETs. - Alain Lecomte, Myriam Quatrini:
Ludics and its Applications to natural Language Semantics. - Apostolos Syropoulos:
Some Thoughts on Hypercomputation. - Ping Li:
Estimating Entropy of Data Streams Using Compressed Counting. - Xiang He, Aylin Yener:
Cooperation with an Untrusted Relay: A Secrecy Perspective. - Thomas Ang, Jeffrey O. Shallit:
Length of the Shortest Word in the Intersection of Regular Languages. - Yi Cao, Biao Chen:
Capacity Bounds for Two-Hop Interference Networks. - Manas K. Patra, Samuel L. Braunstein:
An algebraic framework for information theory: Classical Information. - Aaron D. Jaggard, Michael Schapira, Rebecca N. Wright:
Towards a Unified Approach to (In)Decision: Routing, Games, Circuits, Consensus, and Beyond. - Ralph-Johan Back, Ion Petre, Erik P. de Vink:
Proceedings Second International Workshop on Computational Models for Cell Processes, COMPMOD 2009, Eindhoven, the Netherlands, November 3, 2009. EPTCS 6, 2009 [contents] - Wei Lu, Namrata Vaswani:
Modified Basis Pursuit Denoising(MODIFIED-BPDN) for Noisy Compressive Sensing with Partially Known Support. - Goochul Chung, Sriram Vishwanath, Chan-Soo Hwang:
On the Fundamental Limits of Interweaved Cognitive Radios. - Hee-Kap Ahn, Sang Won Bae, Erik D. Demaine, Martin L. Demaine, Sang-Sub Kim, Matias Korman, Iris Reinbacher, Wanbin Son:
Covering Points by Disjoint Boxes with Outliers. - Dingyin Xia, Fei Wu, Xuqing Zhang, Yueting Zhuang:
Local and global approaches of affinity propagation clustering for large scale data. - Zuleita Ka Ming Ho, David Gesbert:
Balancing Egoism and Altruism on MIMO Interference Channel. - J. Christian Attiogbé:
Tool-Assisted Multi-Facet Analysis of Formal Specifications (Using Alelier-B and ProB). - Dominik Janzing, Bastian Steudel:
Justifying additive-noise-model based causal discovery via algorithmic information theory. - Federico Calzolari:
High availability using virtualization. - Laurent Tapie, Kwamiwi Mawussi:
Decomposition of forging die for high speed machining. - Laurent Tapie, Kwamiwi Mawussi, Bernard Anselmetti:
Circular tests for HSM machine tools: Bore machining application. - Laurent Tapie, Kwamiwi Mawussi, Bernard Anselmetti:
Machining strategy choice: performance VIEWER. - Laurent Tapie, Kwamiwi Mawussi, Bernard Anselmetti:
Decomposition of forging dies for machining planning. - Kwamiwi Mawussi, Laurent Tapie:
Définition d'une pièce test pour la caractérisation d'une machine UGV. - Eric Goubault, Sylvie Putot:
A zonotopic framework for functional abstractions. - Jaeweon Kim, Jeffrey G. Andrews:
Spectrum Sensing with Spectral Covariance for Cognitive Radio. - Cyril Furtlehner, Michèle Sebag, Xiangliang Zhang:
Scaling Analysis of Affinity Propagation. - Elaine M. Eschen, Chính T. Hoàng, Jeremy P. Spinrad, R. Sritharan:
Finding a sun in building-free graphs. - Manoj Kumar Singh:
Password Based a Generalize Robust Security System Design Using Neural Network. - Pascal Fallavollita:
3D/2D Registration of Mapping Catheter Images for Arrhythmia Interventional Assistance. - Mandhapati P. Raju:
Parallel Computation of Finite Element Navier-Stokes codes using MUMPS Solver. - Sanjay Silakari, Mahesh Motwani, Manish Maheshwari:
Color Image Clustering using Block Truncation Algorithm. - Mohammad Ali Jabraeil Jamali, Ahmad Khademzadeh:
DAMQ-Based Schemes for Efficiently Using the Buffer Spaces of a NoC Router. - Ahmad Shukri Mohd Noor, Md. Yazid Bin Mohd. Saman:
Distributed Object Medical Imaging Model. - Alexander A. Sherstov:
The intersection of two halfspaces has high threshold degree. - Ender Ayanoglu, Erik G. Larsson, Eleftherios Karipidis:
Computational Complexity of Decoding Orthogonal Space-Time Block Codes. - Yee Ming Chen, Bo-Yuan Wang:
Towards Participatory Design of Multi-agent Approach to Transport Demands. - Vishal Goyal, Gurpreet Singh Lehal:
Evaluation of Hindi to Punjabi Machine Translation System. - (Withdrawn) Management Of Volatile Information In Incremental Web Crawler.
- Mustafa Cenk Gursoy:
MIMO Wireless Communications under Statistical Queueing Constraints. - David Gross:
Recovering low-rank matrices from few coefficients in any basis. - J. Christian Attiogbé:
Can Component/Service-Based Systems Be Proved Correct? - Valentin Savin:
Binary Linear-Time Erasure Decoding for Non-Binary LDPC codes. - David Bremner, Dan Chen:
A Branch and Cut Algorithm for the Halfspace Depth Problem. - David Harvey:
Faster algorithms for the square root and reciprocal of power series. - Patricio Galeas, Ralph Kretschmer, Bernd Freisleben:
Information Retrieval via Truncated Hilbert-Space Expansions. - A. Robert Calderbank, Stephen D. Howard, Sina Jafarpour:
Construction of a Large Class of Deterministic Sensing Matrices that Satisfy a Statistical Isometry Property. - Sahand Haji Ali Ahmad, Mingyan Liu:
Multi-channel Opportunistic Access: A Case of Restless Bandits with Multiple Plays. - Ajinkya Kale, Shaunak Vaidya, Ashish Joglekar:
A Generalized Recursive Algorithm for Binary Multiplication based on Vedic Mathematics. - Rajkumar Buyya, Suraj Pandey, Christian Vecchiola:
Cloudbus Toolkit for Market-Oriented Cloud Computing. - Christian Vecchiola, Suraj Pandey, Rajkumar Buyya:
High-Performance Cloud Computing: A View of Scientific Applications. - Manuel Holtgrewe, Peter Sanders, Christian Schulz:
Engineering a Scalable High Quality Graph Partitioner. - Fan Zhang, Henry D. Pfister:
Modulation Codes for Flash Memory Based on Load-Balancing Theory. - Shengli Zhang, Soung Chang Liew, Lu Lu, Hui Wang:
Interference with Symbol-misalignment. - Jeff Cheeger, Bruce Kleiner, Assaf Naor:
A $(\log n)^{\Omega(1)}$ integrality gap for the Sparsest Cut SDP. - Shahram Jamali, Morteza Analoui:
Congestion Control in the Internet by Employing a Ratio dependent Plant Herbivore Carnivorous Model. - Roya Asadi, Norwati Mustapha, Md Nasir Sulaiman:
A Framework For Intelligent Multi Agent System Based Neural Network Classification Model. - Keyan Zahedi, Nihat Ay, Ralf Der:
Higher coordination with less control - A result of information maximisation in the sensori-motor loop. - Raymond J. Butler:
The Role of Spreadsheets in the Allied Irish Bank / Allfirst Currency Trading Fraud. - Philip B. Alipour:
A Lossless Fuzzy Binary AND/OR Compressor. - Thomas Britz, Bård Heiseldel, Trygve Johnsen, Dillon Mayhew, Keisuke Shiromoto:
Generalizations of Wei's Duality Theorem. - Guoqiang Zhang:
On cost-effective communication network designing. - Abhimanu Kumar, Sanjib Kumar Das:
A real world network pricing game with less severe Braess' Paradox. - Pedro Peris-Lopez, Julio C. Hernandez-Castro, Juan M. Estévez-Tapiador, Jan C. A. van der Lubbe:
Security Flaws in a Recent Ultralightweight RFID Protocol. - Richard G. Clegg, Carla Di Cairano-Gilfedder, Shi Zhou:
A critical look at power law modelling of the Internet. - Marine Minier, Benjamin Pousse:
Improving Integral Cryptanalysis against Rijndael with Large Blocks. - Jerome Tonetti, Lucile Vadcard, P. Girard, Michel Dubois, Philippe Merloz, Jocelyne Troccaz:
Assessment of a percutaneous iliosacral screw insertion simulator. - Han-Shin Jo, Cheol Mun, June Moon, Jong-Gwan Yook:
Self-optimized Coverage Coordination and Coverage Analysis in Femtocell Networks. - Roua Youssef, Alexandre Graell i Amat:
Distributed Turbo-Like Codes for Multi-User Cooperative Relay Networks. - Linda Mthembu, Tshilidzi Marwala, Michael I. Friswell, Sondipon Adhikari:
Finite element model selection using Particle Swarm Optimization. - Han-Shin Jo, Cheol Mun, June Moon, Jong-Gwan Yook:
Interference Mitigation Using Uplink Power Control for Two-Tier Femtocell Networks. - Zhu Han, Rong Zheng, H. Vincent Poor:
Repeated Auctions with Learning for Spectrum Access in Cognitive Radio Networks. - Daniel Cullina, Alexandros G. Dimakis, Tracey Ho:
Searching for Minimum Storage Regenerating Codes. - Shurui Huang, Aditya Ramamoorthy, Muriel Médard:
Minimum cost content distribution using network coding: Replication vs. coding at the source nodes. - Venkatesan Guruswami, Ali Kemal Sinop:
Improved Inapproximability Results for Maximum k-Colorable Subgraph. - Evan Hurwitz, Tshilidzi Marwala:
State of the Art Review for Applying Computational Intelligence and Machine Learning Techniques to Portfolio Optimisation. - Chunhua Shen, Junae Kim, Lei Wang, Anton van den Hengel:
Positive Semidefinite Metric Learning with Boosting. - Guoqing Zhang, Shi Zhou, Di Wang, Gang Yan, Guoqiang Zhang:
Enhancing network transmission capacity by efficiently allocating node capability. - Rui Zhang:
Cooperative Multi-Cell Block Diagonalization with Per-Base-Station Power Constraints. - Kazuhiro Inaba, Sebastian Maneth:
The Complexity of Translation Membership for Macro Tree Transducers. - Andreas W. M. Dress, Katharina T. Huber, Jacobus H. Koolen, Vincent Moulton, Andreas Spillner:
An algorithm for computing cutpoints in finite metric spaces. - Raymes Khoury, Bernd Burgstaller, Bernhard Scholz:
Accelerating the Execution of Matrix Languages on the Cell Broadband Engine Architecture. - Vikraman Arvind, Srikanth Srinivasan:
On the hardness of the noncommutative determinant. - Amelia Carolina Sparavigna:
Fractional differentiation based image processing. - Maya Ramanath, Kondreddi Sarath Kumar, Georgiana Ifrim:
Generating Concise and Readable Summaries of XML Documents. - Bruno Durand, Andrei E. Romashchenko, Alexander Shen:
Fixed-point tile sets and their applications. - Yanbin Lu, Gene Tsudik:
Towards Plugging Privacy Leaks in Domain Name System. - Yunnan Wu:
A Construction of Systematic MDS Codes with Minimum Repair Bandwidth. - Xiang He, Aylin Yener:
Interference Channels with Strong Secrecy. - Amitav Mukherjee, A. Lee Swindlehurst:
Utility of Beamforming Strategies for Secrecy in Multiuser MIMO Wiretap Channels. - Sung Ho Chae, Sang Won Choi, Sae-Young Chung:
Optimal Multiplexing Gain of K-user Line-of-Sight Interference Channels with Polarization. - M. Tariq Banday, Tariq R. Jan:
Effectiveness and Limitations of Statistical Spam Filters. - Mirko Rahn, Peter Sanders, Johannes Singler:
Scalable Distributed-Memory External Sorting. - Jingpeng Li, Uwe Aickelin, Edmund K. Burke:
A Component Based Heuristic Search Method with Evolutionary Eliminations. - Shengli Zhang, Soung Chang Liew:
PNC with multiple antennas. - Shengli Zhang, Soung Chang Liew:
Applying physical layer network coding in wireless networks. - Arijit Laha:
On challenges and opportunities of designing integrated IT platforms for supporting knowledge works in organizations. - Laurent Romary:
Communication scientifique : Pour le meilleur et pour le PEER. - Arijit Laha:
On building Information Warehouses. - Chinmay Karande:
Polynomially Correlated Knapsack is NP-complete. - Wonseok Chae:
Type Safe Extensible Programming. - Deeparnab Chakrabarty, Chinmay Karande, Ashish Sangwan:
The Effect of Malice on the Social Optimum in Linear Load Balancing Games. - Xiang He, Aylin Yener:
Two-hop Secure Communication Using an Untrusted Relay. - Usman A. Khan, Soummya Kar, José M. F. Moura:
DILAND: An Algorithm for Distributed Sensor Localization with Noisy Distance Measurements. - Rui Zhang, Shuguang Cui:
Cooperative Interference Management in Multi-Cell Downlink Beamforming. - R. Venkatachalam, A. Krishnan:
Multiple Cross-Layer Design Based Complete Architecture for Mobile Adhoc Networks. - Matteo Pradella, Alessandra Cherubini, Stefano Crespi-Reghizzi:
A unifying approach to picture grammars. - Justin Dauwels, Andrew W. Eckford, Sascha Korl, Hans-Andrea Loeliger:
Expectation Maximization as Message Passing - Part I: Principles and Gaussian Messages. - Marija Mitrovic, Bosiljka Tadic:
Bloggers Behavior and Emergent Communities in Blog Space. - Nao Hirokawa, Aart Middeldorp:
Decreasing Diagrams and Relative Termination. - Apostolos Syropoulos:
Can we debug the Universe? - Feng Gu, Uwe Aickelin, Julie Greensmith:
An Agent Based Classification Model. - Marcin Jurdzinski, Ashutosh Trivedi:
Average-Time Games on Timed Automata. - Pierre-Marc Jodoin, Venkatesh Saligrama, Janusz Konrad:
Behavior Subtraction. - Florin Pop, Ciprian Mihai Dobre, Alexandru Costan, Mugurel Ionut Andreica, Eliana-Dina Tirsa, Corina Stratan, Valentin Cristea:
Critical Analysis of Middleware Architectures for Large Scale Distributed Systems. - Yan Zhu, Dongning Guo:
Isotropic MIMO Interference Channels without CSIT: The Loss of Degrees of Freedom. - Mohab Safey El Din, Lihong Zhi:
Computing rational points in convex semi-algebraic sets and SOS decompositions. - Stefano Rini, Daniela Tuninetti, Natasha Devroye:
State of the cognitive interference channel: a new unified inner bound, and capacity to within 1.87 bits. - Ersen Ekrem, Sennur Ulukus:
Degraded Compound Multi-receiver Wiretap Channels. - Uwe Aickelin, Jingpeng Li, Edmund K. Burke:
An Evolutionary Squeaky Wheel Optimisation Approach to Personnel Scheduling. - Joaquim Borges, Steven T. Dougherty, Cristina Fernández-Córdoba:
Self-Dual Codes over Z_2xZ_4. - Achim Blumensath:
Guarded Second-Order Logic, Spanning Trees, and Network Flows. - Amanda M. Whitbrook, Uwe Aickelin, Jonathan M. Garibaldi:
An Idiotypic Immune Network as a Short Term Learning Architecture for Mobile Robots. - Jamie Twycross, Uwe Aickelin:
An Immune Inspired Approach to Anomaly Detection. - Alexandre Soro, Jérôme Lacan:
FFT-based Network Coding For Peer-To-Peer Content Delivery. - Johannes Fischer:
Wee LCP. - Gianni Tedesco, Uwe Aickelin:
An Immune Inspired Network Intrusion Detection System Utilising Correlation Context. - Jakob Nordström, Alexander A. Razborov:
On Minimal Unsatisfiability and Time-Space Trade-offs for k-DNF Resolution. - Paola Bonizzoni, Gianluca Della Vedova, Riccardo Dondi, Yuri Pirola:
Parameterized Complexity of the k-anonymity Problem. - Robert E. McGrath, Jason Kastner, Alejandro Rodríguez, Jim Myers:
Towards a Semantic Preservation System. - Krzysztof Onak:
Testing Distribution Identity Efficiently. - Sang-Woon Jeon, Sae-Young Chung, Syed Ali Jafar:
Degrees of Freedom of Multi-Source Relay Networks. - Andrew Chi-Chih Yao, Moti Yung, Yunlei Zhao:
Adaptive Concurrent Non-Malleability with Bare Public-Keys. - Jesun Sahariar Firoz, Masud Hasan, Ashik Zinnat Khan, M. Sohel Rahman:
The 1.375 Approximation Algorithm for Sorting by Transpositions Can Run in $O(n\log n)$ Time. - Julian J. McAuley, Tibério S. Caetano:
Exact Inference in Graphical Models: is There More to it? - Ian Mackie, Jorge Sousa Pinto, Miguel Vilaça:
Iterators, Recursors and Interaction Nets. - Harris V. Georgiou:
Algorithms for Image Analysis and Combination of Pattern Classifiers with Application to Medical Diagnosis. - Ping Li, Arnd Christian König:
b-Bit Minwise Hashing. - Marcelo Arenas, Jorge Pérez, Juan L. Reutter, Cristian Riveros:
Composition and Inversion of Schema Mappings. - David Baelde:
Least and greatest fixed points in linear logic. - Ernst Martin Witte, Filippo Borlenghi, Gerd Ascheid, Rainer Leupers, Heinrich Meyr:
A Scalable VLSI Architecture for Soft-Input Soft-Output Depth-First Sphere Decoding. - Yongzhi Cao, Guoqing Chen:
A Fuzzy Petri Nets Model for Computing With Words. - Matús Medo, Yi-Cheng Zhang, Tao Zhou:
Adaptive model for recommendation of news. - Vaneet Aggarwal, Youjian Liu, Ashutosh Sabharwal:
Sum-capacity of Interference Channels with a Local View: Impact of Distributed Decisions. - Benjamin A. Burton:
Searching a bitstream in linear time for the longest substring of any given density. - Mohammad Hossein Yassaee, Mohammad Reza Aref:
Slepian-Wolf Coding Over Cooperative Relay Networks. - Amir Herzberg, Haya Schulmann:
Stealth-MITM DoS Attacks on Secure Channels. - Felix Brandt, Paul Harrenstein:
Set-Rationalizable Choice and Self-Stability. - Ghadamali Bagherikaram, Abolfazl S. Motahari, Amir K. Khandani:
Secrecy Rate Region of the Broadcast Channel with an Eavesdropper. - Ilias Diakonikolas, Rocco A. Servedio:
Improved Approximation of Linear Threshold Functions. - Bingbing Xia, Fei Qiao, Huazhong Yang, Hui Wang:
A Fault-tolerant Structure for Reliable Multi-core Systems Based on Hardware-Software Co-design. - Béla Genge, Piroska Haller:
Performance Evaluation of Security Protocols. - Andreas Gaiser, Stefan Schwoon:
Comparison of Algorithms for Checking Emptiness on Buechi Automata. - Anas Chaaban, Aydin Sezgin:
On the transmit strategy for the interference MIMO relay channel in the low power regime. - Damien Chablat, Philippe Wenger, Stefan Staicu:
Dynamics of the Orthoglide parallel robot. - Vaneet Aggarwal, Amir Salman Avestimehr, Ashutosh Sabharwal:
Distributed Universally Optimal Strategies for Interference Channels with Partial Message Passing. - Martin Mann, Rolf Backofen, Sebastian Will:
Equivalence Classes of Optimal Structures in HP Protein Models Including Side Chains. - Martin Mann, Mohamed Abou Hamra, Kathleen Steinhöfel, Rolf Backofen:
Constraint-based Local Move Definitions for Lattice Protein Models Including Side Chains. - Victor M. Preciado, Alireza Tahbaz-Salehi, Ali Jadbabaie:
Variance Analysis of Randomized Consensus in Switching Directed Networks. - Mikolás Janota, Goetz Botterweck, Radu Grigore, João Marques-Silva:
How to Complete an Interactive Configuration Process? - Dimitrios Katselis, Eleftherios Kofidis, Athanasios A. Rontogiannis, Sergios Theodoridis:
Preamble-Based Channel Estimation for CP-OFDM and OFDM/OQAM Systems: A Comparative Study. - Jamshid Abouei, Alireza Bayesteh, Amir K. Khandani:
On the Delay-Throughput Tradeoff in Distributed Wireless Networks. - Theodoros K. Dikaliotis, Alexandros G. Dimakis, Tracey Ho, Michelle Effros:
On the Delay of Network Coding over Line Networks. - Chi Sing Chum, Xiaowen Zhang:
Improved Latin Square based Secret Sharing Scheme. - Raza Ur-Rehman, Stéphane Caro, Damien Chablat, Philippe Wenger:
Path placement optimization of manipulators based on energy consumption: application to the orthoglide 3-axis. - Daniel Kanaan, Philippe Wenger, Stéphane Caro, Damien Chablat:
Singularity Analysis of Lower-Mobility Parallel Manipulators Using Grassmann-Cayley Algebra. - Florian Huc, Aubin Jarry:
VRAC: Simulation Results #1. - Han Chen, Pasquale Malacaria:
Studying Maximum Information Leakage Using Karush-Kuhn-Tucker Conditions. 1-15 - Hector Zenil:
Compression-based investigation of the dynamical properties of cellular automata and other systems. - Jun Pang, Chenyi Zhang:
How to Work with Honest but Curious Judges? (Preliminary Report). 31-45 - Nizami Gasilov, Sahin Emrah Amrahov, Afet Golayoglu Fatullayev, Halil Ibrahim Karakas, Ömer Akin:
A Geometric Approach to Solve Fuzzy Linear Systems. - Andrei I. Yafimau:
Virtual-Threading: Advanced General Purpose Processors Architecture. - Qurat ul Ain Nizamani, Emilio Tuosto:
Heuristic Methods for Security Protocols. 61-75 - Filippo Del Tedesco, David Sands:
A User Model for Information Erasure. 16-30 - Jeroen Ketema, Jakob Grue Simonsen:
Infinitary Combinatory Reduction Systems: Confluence. - Chandrajit L. Bajaj, Andrew Gillette, Samrat Goswami, Bong June Kwon, Jose Rivera:
Complementary Space for Enhanced Uncertainty and Dynamics Visualization. - Sabu M. Thampi:
Swarm Intelligence. - Raghu Meka, David Zuckerman:
Pseudorandom Generators for Polynomial Threshold Functions. - Mustafa Cenk Gursoy:
Secure Communication in the Low-SNR Regime. - Deli Qiao, Mustafa Cenk Gursoy, Senem Velipasalar:
On the Achievable Throughput Region of Multiple-Access Fading Channels with QoS Constraints. - Junwei Zhang, Mustafa Cenk Gursoy:
Collaborative Relay Beamforming for Secrecy. - Li Chen, Soma Biswas:
Digital Curvatures Applied to 3D Object Analysis and Recognition: A Case Study. - Adrian Dumitrescu, Minghui Jiang:
Piercing translates and homothets of a convex body. - Sounak Gupta, Goutam Paul:
Revisiting Fermat's Factorization for the RSA Modulus. - Hsien-Po Shiang, Mihaela van der Schaar:
Media-TCP: A Quality-Centric TCP-Friendly Congestion Control for Multimedia Transmission. - Sahand Haji Ali Ahmad, Mingyan Liu, Yunnan Wu:
Congestion games with resource reuse and applications in spectrum sharing. - Alexander A. Sherstov:
Optimal bounds for sign-representing the intersection of two halfspaces by polynomials. - Rahul Jain, Hartmut Klauck:
The Partition Bound for Classical Communication Complexity and Query Complexity. - Vassilis Kostakos:
An empirical study of spatial and transpatial social networks using Bluetooth and Facebook. - Nizami Gasilov, Sahin Emrah Amrahov, Afet Golayoglu Fatullayev:
A Geometric Approach to Solve Fuzzy Linear Systems of Differential Equations. - Simon R. Blackburn, Maura B. Paterson, Douglas R. Stinson:
Putting Dots in Triangles. - G. David Forney Jr.:
Minimal realizations of linear systems: The "shortest basis" approach. - Joshua D. Guttman:
Fair Exchange in Strand Spaces. 46-60 - Sebastiaan Terwijn, Leen Torenvliet, Paul M. B. Vitányi:
Nonapproximablity of the Normalized Information Distance. - Michele Boreale, Steve Kremer:
Proceedings 7th International Workshop on Security Issues in Concurrency, SECCO 2009, Bologna, Italy, 5th September 2009. EPTCS 7, 2009 [contents] - K. Viswanathan Iyer, K. R. Uday Kumar Reddy:
Wiener index of binomial trees and Fibonacci trees. - Rémi Diana, Emmanuel Lochin:
ECN verbose mode: a statistical method for network path congestion estimation. - Andrea Masini, Luca Viganò, Marco Volpe:
A History of Until. - Samuel C. Skipsey, David Ambrose-Griffith, Greig Cowan, Mike Kenyon, Orlando Richards, Phil Roffe, Graeme Robert Stewart:
ScotGrid: Providing an Effective Distributed Tier-2 in the LHC Era. - Samuel C. Skipsey, Greig Cowan, Mike Kenyon, Stuart Purdie, Graeme Robert Stewart:
Optimised access to user analysis data using the gLite DPM. - Stefan Kratsch, Magnus Wahlström:
Preprocessing of Min Ones Problems: A Dichotomy. - Thomas Ang, Giovanni Pighizzini, Narad Rampersad, Jeffrey O. Shallit:
Automata and Reduced Words in the Free Group. - (Withdrawn) Classification with Tarskian system executions (Bakery Algorithms as an example).
- Ilango Sriram:
SPECI, a simulation tool exploring cloud-scale data centres. - Paul Bunn, Rafail Ostrovsky:
Throughput in Asynchronous Networks. - Ruoheng Liu, Yingbin Liang, H. Vincent Poor:
Fading Cognitive Multiple-Access Channels With Confidential Messages. - Jaeok Park, Mihaela van der Schaar:
A Game Theoretic Analysis of Incentives in Content Production and Sharing over Peer-to-Peer Networks. - Øyvind Ryan, Mérouane Debbah:
Convolution operations arising from Vandermonde matrices. - Francis R. Bach:
Self-concordant analysis for logistic regression. - Meicheng Liu, Dongdai Lin:
Fast Algebraic Attacks and Decomposition of Symmetric Boolean Functions. - Adam B. Yedidia:
Counting Independent Sets and Kernels of Regular Graphs. - Fatih Kocak, Hasari Celebi, Sinan Gezici, Khalid A. Qaraqe, Hüseyin Arslan, H. Vincent Poor:
Time Delay Estimation in Cognitive Radio Systems. - Jean-Charles Faugère, David Lubicz, Damien Robert:
Computing modular correspondences for abelian varieties. - Fedor Zhdanov, Vladimir Vovk:
Competing with Gaussian linear experts. - Olympia Hadjiliadis, Tobias Schaefer, H. Vincent Poor:
Quickest detection in coupled systems. - Noga Alon, Felix A. Fischer, Ariel D. Procaccia, Moshe Tennenholtz:
Sum of Us: Strategyproof Selection from the Selectors. - Jihoon Park, Przemyslaw Pawelczak, Danijela Cabric:
Performance of Joint Spectrum Sensing and MAC Algorithms for Multichannel Opportunistic Spectrum Access Ad Hoc Networks. - Rajashekar Annaji, Shrisha Rao:
Parallelization of the LBG Vector Quantization Algorithm for Shared Memory Systems. - Roberto Giacobazzi, Francesco Ranzato:
Abstraction-Guided Abstraction Simplification. - Azza Harbaoui, Malek Ghenima, Sahbi Sidhom:
Enrichissement des contenus par la réindexation des usagers : un état de l'art sur la problématique. - Gerald Schubert, Georg Hager, Holger Fehske:
Performance limitations for sparse matrix-vector multiplications on current multicore environments. - Patrick Erik Bradley:
A p-adic RanSaC algorithm for stereo vision using Hensel lifting. - Serguei A. Mokhov, Yingying She:
Yet Another Pacman 3D Adventures. - Jan Treibig, Georg Hager, Gerhard Wellein:
Multi-core architectures: Complexities of performance prediction and the impact of cache topology. - Lalitha Sankar, Jan Vondrák, H. Vincent Poor:
K-User Fading Interference Channels: The Ergodic Very Strong Case. - Uwe Aickelin, Dipankar Dasgupta:
Artificial Immune Systems. - Deniz Gündüz, Andrea J. Goldsmith, H. Vincent Poor:
Distortion Exponent in MIMO Channels with Feedback. - Julie Greensmith, Uwe Aickelin, Jamie Twycross:
Articulation and Clarification of the Dendritic Cell Algorithm. - Anthony Widjaja To, Leonid Libkin:
Algorithmic metatheorems for decidable LTL model checking over infinite systems. - Ashutosh Nayyar, Demosthenis Teneketzis:
On the Structure of Real-Time Encoders and Decoders in a Multi-Terminal Communication System. - Gordana Dodig-Crnkovic, Vincent C. Müller:
A Dialogue Concerning Two World Systems: Info-Computational vs. Mechanistic. - Oleg V. Michailovich:
An Iterative Shrinkage Approach to Total-Variation Image Restoration. - Chunxuan Ye, Suhas Mathur, Alex Reznik, Yogendra Shah, Wade Trappe, Narayan B. Mandayam:
Information-theoretically Secret Key Generation for Fading Wireless Channels. - Li Chen, Yong Liu, Feng Luo:
A Note on Gradually Varied Functions and Harmonic Functions. - Ana Maria Visan, Artem Y. Polyakov, Praveen S. Solanki, Kapil Arya, Tyler Denniston, Gene Cooperman:
Temporal Debugging using URDB. - Kenneth W. Shum, Wing Shing Wong, Chung Shue Chen:
A General Upper Bound on the Size of Constant-Weight Conflict-Avoiding Codes. - Hayato Takahashi:
Algorithmic randomness and monotone complexity on product space. - Yannick Chevalier, Michaël Rusinowitch:
Compiling and securing cryptographic protocols. - Arno Pauly:
The Complexity of Iterated Strategy Elimination. - Yuri I. Manin, Matilde Marcolli:
Error-correcting codes and phase transitions. - Maxim Raginsky, Zachary T. Harmany, Roummel F. Marcia, Rebecca Willett:
Compressed sensing performance bounds under Poisson noise. - Nikolaos Fountoulakis, Konstantinos Panagiotou:
Sharp Load Thresholds for Cuckoo Hashing. - Shuai Fan, Lin Zhang, Yong Ren:
Approximation Algorithms for Link Scheduling with Physical Interference Model in Wireless Multi-hop Networks. - Raghunandan H. Keshavan, Sewoong Oh:
A Gradient Descent Algorithm on the Grassman Manifold for Matrix Completion. - Onur Özyesil, Mehmet Kivanç Mihçak, Yucel Altug:
On Detection With Partial Information In The Gaussian Setup. - Abhinav Kumar, Satyanarayana V. Lokam, Vijay M. Patankar, Jayalal Sarma:
Using Elimination Theory to construct Rigid Matrices. - Yunus Sarikaya, Özgür Erçetin:
On Physically Secure and Stable Slotted ALOHA System. - Daniel Shumow:
Isogenies of Elliptic Curves: A Computational Approach. - Arijit Laha:
A theoretical foundation for building Knowledge-work Support Systems. - Guy McCusker:
A Graph Model for Imperative Computation. - Jan Feyereisl, Uwe Aickelin:
Artificial Immune Tissue using Self-Orgamizing Networks. - David Fernández-Amorós, Julio Gonzalo, Felisa Verdejo:
The Uned systems at Senseval-2. - David Fernández-Amorós:
Word Sense Disambiguation Based on Mutual Information and Syntactic Patterns. - Alonso Silva, Eitan Altman, Pierre Bernhard, Mérouane Debbah:
Continuum Equilibria and Global Optimization for Routing in Dense Static Ad Hoc Networks. - Matthias Petschow, Edoardo Di Napoli, Paolo Bientinesi:
An Example of Symmetry Exploitation for Energy-related Eigencomputations. - Mark Tygert:
Fast algorithms for spherical harmonic expansions, III. - Patrick C. McGuire, Christoph Gross, Lorenz Wendt, A. Bonnici, V. Souza-Egipsy, Jens Ormö, Enrique Díaz Martínez, B. H. Foing, R. Bose, Sebastian Walter, Markus Oesker, Jörg Ontrup, Robert Haschke, Helge J. Ritter:
The Cyborg Astrobiologist: Testing a Novelty-Detection Algorithm on Two Mobile Exploration Systems at Rivas Vaciamadrid in Spain and at the Mars Desert Research Station in Utah. - Manqi Zhao, Venkatesh Saligrama:
Anomaly Detection with Score functions based on Nearest Neighbor Graphs. - Alan M. Frieze, Páll Melsted:
Maximum Matchings in Random Bipartite Graphs and the Space Utilization of Cuckoo Hashtables. - Hana Godrich, Alexander M. Haimovich, H. Vincent Poor:
An Analysis of Phase Synchronization Mismatch Sensitivity for Coherent MIMO Radar Systems. - Alexander V. Spirov, Alexander B. Kazansky, Leonid Zamdborg, Juan Julián Merelo Guervós, Vladimir F. Levchenko:
Forced Evolution in Silico by Artificial Transposons and their Genetic Operators: The John Muir Ant Problem. - Damien Chablat, Philippe Wenger:
On the characterization of the regions of feasible trajectories in the workspace of parallel manipulators. - Jan A. Bergstra, Cornelis A. Middelburg:
Instruction sequence processing operators. - Ilkka Norros, Hannu Reittu, Timo Eirola:
On the stability of two-chunk file-sharing systems. - Shohreh Sharif Mansouri, Elena Dubrova:
An Improved Implementation of Grain. - Boaz Patt-Shamir, Dror Rawitz:
Vector Bin Packing with Multiple-Choice. - Alonso Silva, Eitan Altman, Mérouane Debbah, Giuseppa Alfano:
Magnetworks: how mobility impacts the design of Mobile Networks. - David Fernández-Amorós:
Word Sense Disambiguation Using English-Spanish Aligned Phrases over Comparable Corpora. - Eitan Yaakobi, Tuvi Etzion:
High Dimensional Error-Correcting Codes. - Joan Feigenbaum, Aaron D. Jaggard, Michael Schapira:
Approximate Privacy: Foundations and Quantification. - A. Vaniachine:
Scalable Database Access Technologies for ATLAS Distributed Computing. - Gianluca Argentini:
Searching the (really) real general solution of 2D Laplace differential equation. - Lyubov N. Positselskaya:
Noisy fighter-bomber duel. - Arnab Bhattacharyya, Swastik Kopparty, Grant Schoenebeck, Madhu Sudan, David Zuckerman:
Optimal Testing of Reed-Muller Codes. - Lazar L. Kish, Bruce Zhang, Laszlo B. Kish:
Cracking the Liu key exchange protocol in its most secure state with Lorentzian spectra. - Marc Bailly-Bechet, S. Bradde, Alfredo Braunstein, A. Flaxman, L. Foini, Riccardo Zecchina:
Clustering with shallow trees. - Pascal Bianchi, Mérouane Debbah, Mylène Maïda, Jamal Najim:
Performance of Statistical Tests for Source Detection using Random Matrix Theory. - Roberto Barbuti, Giulio Caravagna, Paolo Milazzo, Andrea Maggiolo-Schettini:
On the Interpretation of Delays in Delay Stochastic Simulation of Biological Systems. 17-29 - James R. Lee, Anastasios Sidiropoulos:
Pathwidth, trees, and random embeddings. - Daniela Besozzi, Paolo Cazzaniga, Matteo Dugo, Dario Pescini, Giancarlo Mauri:
A study on the combined interplay between stochastic fluctuations and the number of flagella in bacterial chemotaxis. 47-62 - R. Piasecki:
Unbiased hybrid structural pattern-reconstruction using entropic descriptors. - Jeff Cheeger, Bruce Kleiner, Assaf Naor:
Compression bounds for Lipschitz maps from the Heisenberg group to L1. - Hugo Zanghi, Franck Picard, Vincent Miele, Christophe Ambroise:
Strategies for Online Inference of Model-Based Clustering in large Networks. - Oleg I. Mokhov:
Consistency on cubic lattices for determinants of arbitrary orders. - Christopher R. Laumann, Andreas M. Läuchli, R. Moessner, A. Scardicchio, S. L. Sondhi:
On product, generic and random generic quantum satisfiability. - Keqin Liu, Qing Zhao:
Decentralized Multi-Armed Bandit with Multiple Distributed Players. - Samson Abramsky:
Big Toy Models: Representing Physical Systems As Chu Spaces. - J. M. Landsberg:
P versus NP and geometry. - Samson Abramsky:
Abstract Scalars, Loops, and Free Traced and Strongly Compact Closed Categories. - Samson Abramsky, Bob Coecke:
Abstract Physical Traces. - Andrew Drucker, Ronald de Wolf:
Quantum Proofs for Classical Theorems. - Robert Adler, John Ewing, Peter Taylor:
Citation Statistics. - Bernard W. Silverman:
Comment: Bibliometrics in the Context of the UK Research Assessment Exercise. - Sune Lehmann, Benny Lautrup, Andrew D. Jackson:
Comment: Citation Statistics. - David J. Spiegelhalter, Harvey Goldstein:
Comment: Citation Statistics. - Peter Gavin Hall:
Comment: Citation Statistics. - Robert Adler, John Ewing, Peter Taylor:
Rejoinder: Citation Statistics. - Pavel Chigansky, Ramon van Handel:
A complete solution to Blackwell's unique ergodicity problem for hidden Markov chains. - Brendan Juba:
On Learning Finite-State Quantum Sources. - Samson Abramsky:
Coalgebras, Chu Spaces, and Representations of Physical Systems. - Robert D. Nowak:
The Geometry of Generalized Binary Search. - Soummya Kar, José M. F. Moura:
Kalman Filtering with Intermittent Observations: Weak Convergence and Moderate Deviations. - Scott Aaronson:
BQP and the Polynomial Hierarchy. - Ashutosh Nayyar, Demosthenis Teneketzis:
A Sequential Problem in Decentralized Detection with Communication. - Lucie Galand, Olivier Spanjaard:
Exact algorithms for OWA-optimization in multiobjective spanning tree problems. - Dusko Pavlovic, Catherine Meadows:
Quantifying pervasive authentication: the case of the Hancke-Kuhn protocol. - Ravi Tandon, Sennur Ulukus, Kannan Ramchandran:
Secure Source Coding with a Helper. - Anatoly Pashkevich, Damien Chablat, Philippe Wenger, Roman Gomolitsky:
Calibration of 3-d.o.f. Translational Parallel Manipulators Using Leg Observations. - Giuseppe Notarstefano, Francesco Bullo:
Distributed Abstract Optimization via Constraints Consensus: Theory and Applications. - Slawomir Lasota, Marcin Poturalski:
Undecidability of performance equivalence of Petri nets. - Jean-Loup Carre, Charles Hymans:
From Single-thread to Multithreaded: An Efficient Static Analysis Algorithm. - Tony Tan:
On Pebble Automata for Data Languages with Decidable Emptiness Problem. - David O'Callaghan, Louise Doran, Brian A. Coghlan:
Evaluating Trust in Grid Certificates. - Prateek Jain, Brian Kulis, Jason V. Davis, Inderjit S. Dhillon:
Metric and Kernel Learning using a Linear Transformation. - Jennifer Kloke, Gunnar Carlsson:
Topological De-Noising: Strengthening the Topological Signal. - Mahmoud Taherzadeh, H. Vincent Poor:
Limits on the Robustness of MIMO Joint Source-Channel Codes. - Bernhard G. Bodmann, Peter G. Casazza, Gitta Kutyniok:
A quantitative notion of redundancy for finite frames. - Jop Briët, Fernando Mário de Oliveira Filho, Frank Vallentin:
The positive semidefinite Grothendieck problem with rank constraint. - José Bento, Andrea Montanari:
Which graphical models are difficult to learn? - Christos Dimitrakakis, Aikaterini Mitrokotsa:
Statistical Decision Making for Authentication and Intrusion Detection. - Rafig Agaev, Pavel Chebotarev:
Which Digraphs with Ring Structure are Essentially Cyclic? - James M. Whitacre, Axel Bender:
Degeneracy: a link between evolvability, robustness and complexity in biological systems. - Garvesh Raskutti, Martin J. Wainwright, Bin Yu:
Minimax rates of estimation for high-dimensional linear regression over $\ell_q$-balls. - Gabriel H. Tucci, Maria V. Vega:
A Note on Functional Averages over Gaussian Ensembles. - Steve Gregory:
Finding overlapping communities in networks by label propagation. - Daoyi Dong, Ian R. Petersen:
Quantum control theory and applications: A survey. - Gunther Reißig:
Computing abstractions of nonlinear systems. - Luigi Cimmino:
Shor's Algorithm from the Mindset of Quantum Oracles. - Florian Dörfler, Francesco Bullo:
Synchronization and Transient Stability in Power Networks and Non-Uniform Kuramoto Oscillators. - Alexander K. Kelmans:
Packing 3-vertex paths in claw-free graphs and related topics. - L. Sunil Chandran, Rajesh Chitnis, Ramanjit Kumar:
On the SIG dimension of trees under $L_{\infty}$ metric. - Federico Ramponi, Debasish Chatterjee, Sean Summers, John Lygeros:
On the connections between PCTL and Dynamic Programming. - Dominique Unruh:
Universally Composable Quantum Multi-Party Computation.
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.