default search action
CoRR, February 2012
- Sangwoo Park, Erchin Serpedin, Khalid A. Qaraqe:
On the equivalence between Stein and de Bruijn identities. - Houari Mahfoud, Abdessamad Imine:
A General Approach for Securely Querying and Updating XML Data. - Aitzaz Ahmad, Davide Zennaro, Erchin Serpedin, Lorenzo Vangelista:
Time-varying Clock Offset Estimation in Two-way Timing Message Exchange in Wireless Sensor Networks Using Factor Graphs. - Tad Hogg, Kristina Lerman:
Social Dynamics of Digg. - Harold S. Connamacher, Michael Molloy:
The Satisfiability Threshold for a Seemingly Intractable Random Constraint Satisfaction Problem. - Aboulnasr Hassanien, Sergiy A. Vorobyov, Alex B. Gershman:
Moving Target Parameters Estimation in Non-Coherent MIMO Radar Systems. - Jianhang Gao, Qing Zhao, Wei Ren, Ananthram Swami, Ram Ramanathan, Amotz Bar-Noy:
Dynamic Shortest Path Algorithms for Hypergraphs. - Yanlin Geng, Chandra Nair:
The capacity region of the two-receiver vector Gaussian broadcast channel with private and common messages. - Christine Fricker, Philippe Robert, James Roberts, Nada Sbihi:
Impact of traffic mix on caching performance in a content-centric network. - Yuriy Ostapov:
Inference and Plausible Reasoning in a Natural Language Understanding System Based on Object-Oriented Semantics. - Dor-Joseph Kampeas, Asaf Cohen, Omer Gurewitz:
Opportunistic Scheduling in Heterogeneous Networks: Distributed Algorithms and System Capacity. - Rohit Aggarwal, Can Emre Koksal, Philip Schniter:
On the Design of Large Scale Wireless Systems. - Themistoklis Charalambous, Charalambos D. Charalambous, Sergey Loyka:
Lossless Source Codes for a Class Described by Variational Distance and Optimal Merging Algorithm. - Yair Noam, Andrea Goldsmith:
Spatial MAC in MIMO Communications and its Application to Underlay Cognitive Radio. - Wei Yang, Giuseppe Durisi, Erwin Riegler:
On the Capacity of Large-MIMO Block-Fading Channels. - Jean-Charles Faugère, Mohab Safey El Din, Pierre-Jean Spaenlehauer:
Critical Points and Gröbner Bases: the Unmixed Case. - Oscar Gonzalez, Carlos Beltrán, Ignacio Santamaría:
On the Feasibility of Interference Alignment for the K-User MIMO Channel with Constant Coefficients. - Sindhu Chitikela, Subhash C. Kak:
Increasing Randomness Using Permutations on Blocks. - Mahtab Mirmohseni, Bahareh Akhbari, Mohammad Reza Aref:
On the Capacity of Interference Channel with Causal and Non-causal Generalized Feedback at the Cognitive Transmitter. - Chun Lam Chan, Sidharth Jaggi, Venkatesh Saligrama, Samar Agnihotri:
Non-adaptive Group Testing: Explicit bounds and novel algorithms. - Ömer Bulakci:
Multi-hop Moving Relays for IMT-Advanced and Beyond. - Ömer Bulakci:
On Backhauling of Relay Enhanced Networks in LTE-Advanced. - Fernand Meyer:
The watershed concept and its use in segmentation : a brief history. - V. Spoorthy Ella:
Randomization Using Quasigroups, Hadamard and Number Theoretic Transforms. - Fabian Lim, Manabu Hagiwara:
Linear Programming Upper Bounds on Permutation Code Sizes From Coherent Configurations Related to the Kendall Tau Distance Metric. - Daniel Zinn:
Weak Forms of Monotonicity and Coordination-Freeness. - Sertac Karaman, Emilio Frazzoli:
High-speed Flight in an Ergodic Forest. - Koralia N. Pappi, Nestor D. Chatzidiamantis, Theodore N. Chronis, George K. Karagiannidis:
Error Performance of Multidimensional Lattice Constellations-Part I: A Parallelotope Geometry Based Approach for the AWGN Channel. - Koralia N. Pappi, Nestor D. Chatzidiamantis, Theodore N. Chronis, George K. Karagiannidis:
Error Performance of Multidimensional Lattice Constellations-Part II: Evaluation over Fading Channels. - Barnabás Póczos, Liang Xiong, Danica J. Sutherland, Jeff G. Schneider:
Support Distribution Machines. - Ronen Dar, Meir Feder, Mark Shtaif:
The Jacobi MIMO Channel. - Petar Popovski, Zoran Utkovski:
Protocol Coding through Reordering of User Resources, Part I: Capacity Results. - Petar Popovski, Zoran Utkovski, Kasper F. Trillingsgaard:
Protocol Coding through Reordering of User Resources, Part II: Practical Coding Strategies. - Leslie Ann Goldberg, Mark Jerrum:
The Complexity of Computing the Sign of the Tutte Polynomial (and consequent #P-hardness of Approximation). - Sergio Cabello, Erin W. Chambers, Jeff Erickson:
Multiple-Source Shortest Paths in Embedded Graphs. - Giorgio Ausiello, Donatella Firmani, Luigi Laura:
Real-Time Monitoring of Undirected Networks: Articulation Points, Bridges, and Connected and Biconnected Components. - Louis Lei Yu, Sitaram Asur, Bernardo A. Huberman:
Artificial Inflation: The True Story of Trends in Sina Weibo. - Emilio Ferrara, Giacomo Fiumara:
Topological Features of Online Social Networks. - Roja Bandari, Sitaram Asur, Bernardo A. Huberman:
The Pulse of News in Social Media: Forecasting Popularity. - Hessam Mahdavifar, Alexander Vardy:
Algebraic List-decoding of Subspace Codes. - Anoosheh Heidarzadeh, Amir H. Banihashemi:
How Fast Can Dense Codes Achieve the Min-Cut Capacity of Line Networks? - Alexander M. Romanov:
On the admissible families of components of Hamming codes. - Yixuan Xie, Jun Li, Robert A. Malaney, Jinhong Yuan:
Channel Identification and its Impact on Quantum LDPC Code Performance. - Vijay Ganesh, Michael Carbin, Martin C. Rinard:
Cryptographic Path Hardening: Hiding Vulnerabilities in Software through Cryptography. - Ton Kloks:
A note on probe cographs. - Yair Noam, Andrea Goldsmith:
Blind Null-Space Learning for MIMO Underlay Cognitive Radio Networks. - Samar Agnihotri, Sidharth Jaggi, Minghua Chen:
Analog Network Coding in General SNR Regime. - Ihab Sbeity, Leonardo Brenner, Mohamed Dbouk:
Generating a Performance Stochastic Model from UML Specifications. - Yuval Lomnitz, Meir Feder:
Universal communication over unknown vector channels. - Josep Díaz, Leslie Ann Goldberg, George B. Mertzios, David Richerby, Maria J. Serna, Paul G. Spirakis:
Can Fixation be Guaranteed in the Generalized Moran Process? - Matej Hoffmann, Rolf Pfeifer:
The implications of embodiment for behavior and cognition: animal and robotic case studies. - Yang Zhu, Mai Vu:
Iterative Mode-Dropping for the Sum Capacity of MIMO-MAC with Per-Antenna Power Constraint. - Walid Saad, Zhu Han, H. Vincent Poor, Tamer Basar:
Game Theoretic Methods for the Smart Grid. - Hernan Haimovich, María M. Seron:
Bounds and Invariant Sets for a Class of Switching Systems with Delayed-state-dependent Perturbations. - Nicolas Le Scouarnec:
Exact Scalar Minimum Storage Coordinated Regenerating Codes. - Walid Saad, Zhu Han, H. Vincent Poor, Tamer Basar, Ju Bin Song:
A Cooperative Bayesian Nonparametric Framework for Primary User Activity Monitoring in Cognitive Radio Network. - Walid Saad, Zhu Han, Tamer Basar, Mérouane Debbah, Are Hjørungnes:
Network Formation Games Among Relay Stations in Next Generation Wireless Networks. - Walid Saad, Zhu Han, Rong Zheng, Are Hjørungnes, Tamer Basar, H. Vincent Poor:
Coalitional Games in Partition Form for Joint Spectrum Sensing and Access in Cognitive Radio Networks. - Philip Kelly, M. H. van Emden:
Relational Semantics for Databases and Predicate Calculus. - Kehao Wang, Lin Chen, Quan Liu, Khaldoun Al Agha:
On Optimality of Myopic Sensing Policy with Imperfect Sensing in Multi-channel Opportunistic Access. - Peter Abeles:
Resolving Implementation Ambiguity and Improving SURF. - Saikat Guha, Mark M. Wilde:
Polar coding to achieve the Holevo capacity of a pure-loss optical channel. - G. David Forney Jr., Heide Gluesing-Luerssen:
Observability, Controllability and Local Reducibility of Linear Codes on Graphs. - Venkatesan Guruswami, Srivatsan Narayanan, Carol Wang:
List decoding subspace codes from insertions and deletions. - Ersen Ekrem, Sennur Ulukus:
An Outer Bound for the Vector Gaussian CEO Problem. - Gautam S. Thakur, Mohsen Ali, Pan Hui, Ahmed Helmy:
Comparing Background Subtraction Algorithms and Method of Car Counting. - Steven A. Kieffer:
ProofFlow: Flow Diagrams for Proofs. - Tad Hogg, Robert A. Freitas Jr.:
Acoustic Communication for Medical Nanorobots. - (Withdrawn) A Constructive Proof of the Cycle Double Cover Conjecture.
- Ghazale Hosseinabadi, Nitin H. Vaidya:
Token-DCF: An Opportunistic MAC protocol for Wireless Networks. - Randa Zakhour, Stephen V. Hanly:
Min-max fair coordinated beamforming in cellular systems via large systems analysis. - Xiao Ma, Jia Liu, Baoming Bai:
On Parameterized Gallager's First Bounds for Binary Linear Codes over AWGN Channels. - Dorian Goldfeld, Paul E. Gunnells:
Defeating the Kalka--Teicher--Tsaban linear algebra attack on the Algebraic Eraser. - Chuan Huang, Shuguang Cui:
On the Alternative Relaying Diamond Channel with Conferencing Links. - Roberto Henry Herrera, Rubén Orozco, Manuel Rodríguez:
Wavelet-based deconvolution of ultrasonic signals in nondestructive evaluation. - Ravi Rastogi, Nitin, Durg Singh Chauhan, Mahesh Chandra Govil:
Disjoint Paths Multi-stage Interconnection Networks Stability Problem. - Shaily Mittal, Nitin:
A Resolution for Shared Memory Conflict in Multiprocessor System-on-a-Chip. - Ravi Rastogi, Amit Singh, Nikhil Singhal, Nitin, Durg Singh Chauhan:
Case Tool: Fast Interconnections with New 3-Disjoint Paths MIN Simulation Module. - Nitin, Ankush Bansal, Siddhartha Mahadev Sharma, Kapil Kumar, Anuj Aggarwal, Sheenu Goyal, Kanika Choudhary, Kunal Chawla, Kunal Jain, Manav Bhasin:
Classification of Flames in Computer Mediated Communications. - Xiao Ma, Jia Liu, Qiutao Zhuang:
New Geometrical Spectra of Linear Codes with Applications to Performance Analysis. - Hamish Cunningham:
Agile Research. - Ryuhei Mori, Toshiyuki Tanaka:
Central Approximation in Statistical Physics and Information Theory. - Urban Larsson, Johan Wästlund:
From heaps of matches to the limits of computability. - Matteo De Felice, Sandro Meloni, Stefano Panzieri:
Influence of Topological Features on Spatially-Structured Evolutionary Algorithms Dynamics. - F. Mehmet Ozcelik, Goksel Uctu, Elif Uysal-Biyikoglu:
Optimal Packet Scheduling on an Energy Harvesting Fading Channel. - Ivan Gazeau, Dale Miller, Catuscia Palamidessi:
A non-local method for robustness analysis of floating point programs. 63-76 - Glenn C. Rhoads, Laurent Bartholdi:
The Game of Pure Strategy is solved! - Qin Huang, Keke Liu, Zulin Wang:
Low-Density Arrays of Circulant Matrices: Rank and Row-Redundancy Analysis, and Quasi-Cyclic LDPC Codes. - Carlos Granell, Laura Díaz, Alain Tamayo, Joaquín Huerta:
Assessment of OGC Web Processing Services for REST principles. - Easton Li Xu, Weiping Shang, Guangyue Han:
A Graph Theoretical Approach to Network Encoding Complexity. - Lu Wei, Olav Tirkkonen, K. D. Prathapasinghe Dharmawansa, Matthew R. McKay:
On the Exact Distribution of the Scaled Largest Eigenvalue. - Weifei Zeng, Chris T. K. Ng, Muriel Médard:
Joint Coding and Scheduling Optimization in Wireless Systems with Varying Delay Sensitivities. - Jan Obdrzálek, Jiri Slaby, Marek Trtík:
STANSE: Bug-finding Framework for C Programs. - (Withdrawn) Protection from Unresponsive Flows with Geometric CHOKe.
- Tomás Brázdil, Krishnendu Chatterjee, Antonín Kucera, Petr Novotný:
Efficient Controller Synthesis for Consumption Games with Multiple Resource Types. - Xudong Ma:
On Coding Efficiency for Flash Memories. - Natalia Silberstein, Ankit Singh Rawat, Sriram Vishwanath:
Adversarial Error Resilience in Distributed Storage Using MRD Codes and MDS Array Codes. - Fatemeh Hamidi-Sepehr, Jean-François Chamberland, Henry D. Pfister:
On The Performance of Random Block Codes over Finite-State Fading Channels. - Mohit Thakur, Nadia Fawaz, Muriel Médard:
Reducibility of joint relay positioning and flow optimization problem. - Javier Insa-Cabrera, Jose-Luis Benacloch-Ayuso, José Hernández-Orallo:
On the influence of intelligence in (social) intelligence testing environments. - Ramji Venkataramanan, Antony Joseph, Sekhar Tatikonda:
Gaussian Rate-Distortion via Sparse Regression over Compact Dictionaries. - Josef Cibulka, Jan Kyncl, Viola Mészáros, Rudolf Stolar, Pavel Valtr:
Graph sharing games: complexity and connectivity. - Song-Nam Hong, Giuseppe Caire:
Reverse Compute and Forward: A Low-Complexity Architecture for Downlink Distributed Antenna Systems. - Buyue Qian, Xiang Wang, Ian Davidson:
A Reconstruction Error Formulation for Semi-Supervised Multi-task and Multi-view Learning. - Fan Cheng, Raymond W. Yeung, Kenneth W. Shum:
Imperfect Secrecy in Wiretap Channel II. - Aria Ghasemian Sahebi, S. Sandeep Pradhan:
Asymptotically Good Codes Over Non-Abelian Groups. - Aria Ghasemian Sahebi, S. Sandeep Pradhan:
Nested Lattice Codes for Arbitrary Continuous Sources and Channels. - Nan Ma, Kannan Ramchandran, David Tse:
A Compression Algorithm Using Mis-aligned Side-information. - Hessam Mahdavifar, Alexander Vardy:
List-decoding of Subspace Codes and Rank-Metric Codes up to Singleton Bound. - Guillermo D. Cañas:
Practical Conditions for Well-behaved-ness of Anisotropic Voronoi Diagrams. - Yuxin Chen, Yonina C. Eldar, Andrea J. Goldsmith:
Channel Capacity under General Nonuniform Sampling. - Tadashi Wadayama, Yuki Fujii:
A Coding Theoretic Approach for Evaluating Accumulate Distribution on Minimum Cut Capacity of Weighted Random Graphs. - Ranjan Pal:
Cyber-Insurance in Internet Security: A Dig into the Information Asymmetry Problem. - Ranjan Pal, Pan Hui:
The Impact of Secure OSs on Internet Security: What Cyber-Insurers Need to Know. - Photios A. Stavrou, Charalambos D. Charalambous, Christos K. Kourtellaris:
Causal Rate Distortion Function on Abstract Alphabets: Optimal Reconstruction and Properties. - Amin Aminzadeh Gohari, Chandra Nair, Venkat Anantharam:
On Marton's inner bound for broadcast channels. - Murdoch Gabbay, Aleksandar Nanevski:
Denotation of syntax and metaprogramming in contextual modal type theory (CMTT). - Daniel Gonçalves, Benjamin Lévêque:
Toroidal maps : Schnyder woods, orthogonal surfaces and straight-line representations. - Sebastian Rudolph, Markus Krötzsch, Pascal Hitzler:
Type-elimination-based reasoning for the description logic SHIQbs using decision diagrams and disjunctive datalog. - Wenbing Dang, Ali Pezeshki, Stephen D. Howard, William Moran, A. Robert Calderbank:
Coordinating Complementary Waveforms for Sidelobe Suppression. - Jérémie Du Boisberranger, Danièle Gardy, Yann Ponty:
The weighted words collector. - Ittai Abraham, Shiri Chechik, David Kempe, Aleksandrs Slivkins:
Low-distortion Inference of Latent Similarities from a Multiplex Social Network. - Farzad Farnoud, Narayana P. Santhanam, Olgica Milenkovic:
Alternating Markov Chains for Distribution Estimation in the Presence of Errors. - Farzad Farnoud, Vitaly Skachek, Olgica Milenkovic:
Rank Modulation for Translocation Error Correction. - Chiranjib Choudhuri, Urbashi Mitra:
Action Dependent Strictly Causal State Communication. - Abhishek Ghosh, Sudhakar Pamarti:
Dithered quantizers with negligible in-band dither power. - Mark A. Davenport, Ery Arias-Castro:
Compressive binary search. - Alex Pappachen James, Akshay Kumar Maan:
Improving feature selection algorithms using normalised feature histograms. - Charalambos D. Charalambous, Photios A. Stavrou:
Directed Information on Abstract spaces: Properties and Extremum Problems. - Stefano Rini:
A New Random Coding Technique that Generalizes Superposition Coding and Binning. - Stefano Rini:
On the Capacity of a General Multiple-Access Channel and of a Cognitive Network in the Very Strong Interference Regime. - Elchanan Mossel, Omer Tamuz:
Bundling Customers: How to Exploit Trust Among Customers to Maximize Seller Profit. - Josef Spillner, Alexander Schill:
π-Control: A Personal Cloud Control Centre. - Stefano Rini, Carolin Huppert:
The Capacity of the Semi-Deterministic Cognitive Interference Channel with a Common Cognitive Message and Approximate Capacity for the Gaussian Case. - Kenta Kasai, Takayuki Nozaki, Kohichi Sakaniwa:
Spatially-Coupled Binary MacKay-Neal Codes for Channels with Non-Binary Inputs and Affine Subspace Outputs. - Birte Glimm, Aidan Hogan, Markus Krötzsch, Axel Polleres:
OWL: Yet to arrive on the Web of Data? - Massimo Di Pierro:
Improving non-linear fits. - Sunghyu Han, Jon-Lark Kim:
Computational Results of Duadic Double Circulant Codes. - Ton Kloks:
Packing interval graphs with vertex-disjoint triangles. - K. V. Rashmi, Nihar B. Shah, Kannan Ramchandran, P. Vijay Kumar:
Regenerating Codes for Errors and Erasures in Distributed Storage. - Alex Rudnick:
Considering a resource-light approach to learning verb valencies. - Mike McKerns, Houman Owhadi, Clint Scovel, Timothy John Sullivan, Michael Ortiz:
The Optimal Uncertainty Algorithm in the Mystic Framework. - Michael M. McKerns, Leif Strand, Tim Sullivan, Alta Fang, Michael A. G. Aivazis:
Building a Framework for Predictive Science. - Yen-Cheng Hsu, Tofar Chih-Yuan Chang, Yu T. Su, Jian-Jia Weng:
A Non-Disjoint Group Shuffled Decoding for LDPC Codes. - Ravi Rastogi, Nitin, Durg Singh Chauhan, Mahesh Chandra Govil:
On Stability Problems of Omega and 3-Disjoint Paths Omega Multi-stage Interconnection Networks. - Dejan E. Lazich, Christian Senger, Martin Bossert:
Some Comments on the Strong Simplex Conjecture. - Moez Draief, Milan Vojnovic:
Bargaining Dynamics in Exchange Networks. - Sandeep Sen, V. N. Muralidhara:
The covert set-cover problem with application to Network Discovery. - Ömer Bulakci:
Towards 100 Gbps Ethernet: Development of Ethernet / Physical Layer Aspects. - Pablo Arrighi, Gilles Dowek:
Causal graph dynamics. - Ömer Bulakci:
Wavelets for Single Carrier Communications. - Po-Shen Loh, Rasmus Pagh:
Thresholds for Extreme Orientability. - Ranjitha Prasad, Chandra R. Murthy:
Cramer Rao-Type Bounds for Sparse Bayesian Learning. - Arash Gholami Davoodi, Mohammad Javad Emadi, Mohammad Reza Aref:
Optimum Power Allocations for Fading Decode-and-Forward Relay Channel. - Miron B. Kursa:
Random ferns method implementation for the general-purpose machine learning. - Ling-Hua Chang, Jwo-Yuh Wu:
Achievable Angles Between two Compressed Sparse Vectors Under Norm/Distance Constraints Imposed by the Restricted Isometry Property: A Plane Geometry Approach. - Volker Diekert, Manfred Kufleitner, Klaus Reinhardt, Tobias Walter:
Regular Languages are Church-Rosser Congruential. - Son Hoang Dau, Vitaly Skachek, Yeow Meng Chee:
Optimal Index Codes with Near-Extreme Rates. - Emmanuel Pollakis, Renato L. G. Cavalcante, Slawomir Stanczak:
Base station selection for energy efficient network operation with the majorization-minimization algorithm. - Yunus Sarikaya, Özgür Erçetin, Can Emre Koksal:
Wireless Network Control with Privacy Using Hybrid ARQ. - Yuval Emek, Jasmin Smula, Roger Wattenhofer:
Stone Age Distributed Computing. - Koji Kobayashi:
Topological approach to solve P versus NP. - Abdellatif Zaidi, Pablo Piantanida, Shlomo Shamai:
Wyner-Ziv Type Versus Noisy Network Coding For a State-Dependent MAC. - Yaniv Plan, Roman Vershynin:
Robust 1-bit compressed sensing and sparse logistic regression: A convex programming approach. - Christopher Portmann:
Key recycling in authentication. - (Withdrawn) In Defense of Bureaucracy in the Metric Facility Location Problem.
- Fernando Hernando, Michael E. O'Sullivan, Diego Ruano:
List decoding of repeated codes. - (Withdrawn) Optimal Sum-Rate of the Vector Gaussian CEO Problem.
- Alphan Ulusoy, Stephen L. Smith, Xu Chu Ding, Calin Belta:
Robust Multi-Robot Optimal Path Planning with Temporal Logic Constraints. - Fabio Mogavero, Aniello Murano, Giuseppe Perelli, Moshe Y. Vardi:
A Decidable Fragment of Strategy Logic. - Jiadong Wang, Guiqiang Dong, Tong Zhang, Richard D. Wesel:
Mutual-Information Optimized Quantization for LDPC Decoding of Accurately Modeled Flash Data. - Kyle Treleaven, Marco Pavone, Emilio Frazzoli:
Asymptotically Optimal Algorithms for Pickup and Delivery Problems with Application to Large-Scale Transportation Systems. - Masahito Hayashi, Ryutaroh Matsumoto:
Secure Multiplex Coding with Dependent and Non-Uniform Multiple Messages. - Alekh Agarwal, Miroslav Dudík, Satyen Kale, John Langford, Robert E. Schapire:
Contextual Bandit Learning with Predictable Rewards. - Heide Gluesing-Luerssen, G. David Forney Jr.:
Reducing complexity of tail-biting trellises. - Shiva Kumar Planjery, Bane Vasic, David Declercq:
Enhancing the Error Correction of Finite Alphabet Iterative Decoders via Adaptive Decimation. - Yi Huang, Jie Xu, Ling Qiu:
An Energy Efficient Semi-static Power Control and Link Adaptation Scheme in UMTS HSDPA. - Dung Viet Nguyen, Bane Vasic, Michael W. Marcellin:
Selecting Two-Bit Bit Flipping Algorithms for Collective Error Correction. - Justin Thaler, Mike Roberts, Michael Mitzenmacher, Hanspeter Pfister:
Verifiable Computation with Massively Parallel Interactive Proofs. - (Withdrawn) Error Probability Bounds for M-ary Relay Trees.
- Nidhi Bansal:
Investigation to implicate data on clouds. - Karissa McKelvey, Alex Rudnick, Michael D. Conover, Filippo Menczer:
Visualizing Communication on Social Media: Making Big Data Accessible. - Giordano Pola, Maria Domenica Di Benedetto:
Symbolic Models and Control of Discrete-Time Piecewise Affine Systems: An Approximate Simulation Approach. - (Withdrawn) Successive Secret Key Agreement over Generalized Multiple Access and Broadcast Channels.
- Majid Yousefikhoshbakht, Farzad Didehvar, Farhad Rahmati:
Modification of the Elite Ant System in Order to Avoid Local Optimum Points in the Traveling Salesman Problem. - Mario Huemer, Alexander Onic, Christian Hofbauer:
Classical and Bayesian Linear Data Estimators for Unique Word OFDM. - Roberto Sebastiani, Silvia Tomasi:
Optimization in SMT with LA(Q) Cost Functions. - Li Wei, Wangdong Qi:
Optimization in Multi-Frequency Interferometry Ranging: Theory and Experiment. - Augusto Salazar, Stefanie Wuhrer, Chang Shu, Flavio Prieto:
Fully Automatic Expression-Invariant Face Correspondence. - Ansuman Adhikary, Giuseppe Caire:
On the Coexistence of Macrocell Spatial Multiplexing and Cognitive Femtocells. - Addisu Eshete, Yuming Jiang:
On the Transient Behavior of CHOKe. - Adam R. Williamson, Tsung-Yi Chen, Richard D. Wesel:
A Rate-Compatible Sphere-Packing Analysis of Feedback Coding with Limited Retransmissions. - Benjamin Frank, Ingmar Poese, Georgios Smaragdakis, Steve Uhlig, Anja Feldmann:
Content-aware Traffic Engineering. - Mihai-Alin Badiu, Gunvor Elisabeth Kirkelund, Carles Navarro i Manchon, Erwin Riegler, Bernard H. Fleury:
Message-Passing Algorithms for Channel Estimation and Decoding Using Approximate Inference. - Peter Bro Miltersen, Or Sheffet:
Send Mixed Signals -- Earn More, Work Less. - Kittipong Kittichokechai, Tobias J. Oechtering, Mikael Skoglund:
Coding With Action-dependent Side Information and Additional Reconstruction Requirements. - Aravindh Krishnamoorthy, Kenan Kocagoez:
Singular Values using Cholesky Decomposition. - Zhao Yi, Stefano Soatto, Maneesh Dewan, Yiqiang Zhan:
Information Forests. - Penélope Hernández, Bernhard von Stengel:
Nash Codes for Noisy Channels. - Aida Boussaada Zaier, Ridha Bouallegue:
Channel Estimation Study for Block - Pilot Insertion in OFDM Systems under Slowly Time Varying Conditions. - Héctor Ratia, Luis Montesano, Ruben Martinez-Cantin:
On the Performance of Maximum Likelihood Inverse Reinforcement Learning. - Robert Nix, Murat Kantarcioglu:
Efficient Query Verification on Outsourced Data: A Game-Theoretic Approach. - Seungyeon Kim, Fuxin Li, Guy Lebanon, Irfan A. Essa:
Beyond Sentiment: The Manifold of Human Emotions. - Onur Ozan Koyluoglu, Kumar Appaiah, Hongbo Si, Sriram Vishwanath:
Expansion coding: Achieving the capacity of an AEN channel. - Dayu Huang, Sean P. Meyn:
Classification with High-Dimensional Sparse Samples. - Kai Han, Liu Xiang, Jun Luo, Yang Liu:
MEGCOM: Min-Energy Group COMmunication in Multi-hop Wireless Networks. - K. Karteeka Pavan, Allam Appa Rao, A. V. Dattatreya Rao, G. R. Sridhar:
Robust seed selection algorithm for k-means type algorithms. - K. Karteeka Pavan, Allam Appa Rao, A. V. Dattatreya Rao:
Automatic Clustering with Single Optimal Solution. - Yuval Emek, Michal Feldman, Iftah Gamzu, Renato Paes Leme, Moshe Tennenholtz:
Signaling Schemes for Revenue Maximization. - Chinmay Hegde, Richard G. Baraniuk:
Signal Recovery on Incoherent Manifolds. - Vasileios Ntranos, Giuseppe Caire, Alexandros G. Dimakis:
Allocations for Heterogenous Distributed Storage. - Nebojsa Milosavljevic, Sameer Pawar, Salim Y. El Rouayheb, Michael Gastpar, Kannan Ramchandran:
Data Exchange Problem with Helpers. - Nino Antulov-Fantulin, Alen Lancic, Hrvoje Stefancic, Mile Sikic:
FastSIR Algorithm: A Fast Algorithm for simulation of epidemic spread in large networks by using SIR compartment model. - Beniamino Accattoli, Ugo Dal Lago:
On the Invariance of the Unitary Cost Model for Head Reduction (Long Version). - Yuvalal Liron, Michael Langberg:
A characterization of the number of subsequences obtained via the deletion channel. - Holger M. Kienle:
Open Data: Reverse Engineering and Maintenance Perspective. - Laura Savu:
Signcryption scheme based on schnorr digital signature. - Sridhar Subramanian, Baskaran Ramachandran:
Trust Based Scheme for QoS Assurance in Mobile Ad-Hoc Networks. - Abdallah Rhattoy, Abdelkarim Zatni:
The impact of propagation environment and traffic load on the performance of routing protocols in ad hoc networks. - D. D. Kadam Patil, R. K. Shastri:
Design of wireless electronic stethoscope based on zigbee. - Emi Mathews, Ciby Mathew:
Deployment of mobile routers ensuring coverage and connectivity. - Valentina Emilia Balas, Iulia M. Motoc, Alina Barbulescu:
Combined Haar-Hilbert and Log-Gabor Based Iris Encoders. - J. Hannah Monisha, V. Rhymend Uthariaraj:
User profile based proportional share scheduling and mac protocol for manets. - Antonia Wachter-Zeh, Markus Stinner, Martin Bossert:
Efficient Decoding of Partial Unit Memory Codes of Arbitrary Rate. - Yun Jiang, Marcus Lim, Changxi Zheng, Ashutosh Saxena:
Learning to Place New Objects in a Scene. - Boris Mitavskiy, Jun He:
A Polynomial Time Approximation Scheme for a Single Machine Scheduling Problem Using a Hybrid Evolutionary Algorithm. - Maurice Margenstern:
A family of weakly universal cellular automata in the hyperbolic plane with two states. - Lance Fortnow, Rahul Sami:
Multi-outcome and Multidimensional Market Scoring Rules. - Ravi S. Iyer:
Improve the Practice of Software Development by Having a Software Development Career Track in CS & IT Academia. - Murtaza Hussain Shaikh:
Collaboration for enhancing the system development process in open source diligence. - Ahmed Harbouche, Mohammed Erradi, Aïcha Mokhtari:
A transformation approach for collaboration based requirement models. - Manish Sharma, Gurpadam Singh:
Performance evaluation aodv, dymo, olsr and zrpad hoc routing protocol for ieee 802.11 mac and 802.11 dcf in vanet using qualnet. - Abdoul Aziz Issaka Hassane, Renfa Li, Fanzi Zeng:
Handover Necessity Estimation for 4G Heterogeneous Networks. - Frederic Knabe, Omar Mohamed, Carolin Huppert:
Superiority of TDMA in a Class of Gaussian Multiple-Access Channels with a MIMO-AF-Relay. - Mohamed S. Nafea, Doha Hamza, Karim G. Seddik, Mohammed Nafie, Hesham El Gamal:
A Diversity-Multiplexing-Delay Tradeoff of ARQ Protocols in The Z-interference Channel. - Ahmed Rhif:
Stabilizing sliding mode control design and application for a dc motor: Speed control. - Mehdi Ebady Manaa, Angela Amphawan:
Review of syn-flooding attack detection mechanism. - Praneeth Netrapalli, Sujay Sanghavi:
Finding the Graph of Epidemic Cascades. - Weisheng Zhao, Sumanta Chaudhuri, Celso Accoto, Jacques-Olivier Klein, Claude Chappert, Pascale Mazoyer:
Cross-point architecture for spin transfer torque magnetic random access memory. - Bernhard Haeupler, Asaf Cohen, Chen Avin, Muriel Médard:
Network Coded Gossip with Correlated Data. - Kurien Zacharia, Eldo P. Elias, Surekha Mariam Varghese:
Personalised product design using virtual interactive techniques. - Mehdi Naghavi, Mohsen Sharifi:
A Proposed Architecture for Continuous Web Monitoring Through Online Crawling of Blogs. - Ferihane Kboubi, Anja Habacha Chaïbi, Mohamed Ben Ahmed:
Semantic Visualization and Navigation in Textual Corpus. - Ning Ruan, Ruoming Jin, Crown Guan Wang, Kun Huang:
Network Backbone Discovery Using Edge Clustering. - Kazuya Odagiri, Shogo Shimizu, Naohiro Ishii, Makoto Takizawa:
Principle of Virtual Use Method in Common Gateway Interface Program on the DACS Scheme. - Md. Tariq Aziz, Mohammad Saiful Islam, Md. Nazmul Islam Khan, Adrian Popescu:
Effect of Packet Delay Variation on Video-Voice over DiffServ-MPLS in IPv4-IPv6 Networks. - K. S. Kuppusamy, Gnanasekaran Aghila:
A personalized web page content filtering model based on segmentation. - N. Ugtakhbayar, D. Battulga, Shirmen Sodbileg:
Classification of artificial intelligence ids for smurf attack. - Fang Yuan, Chenyang Yang:
Equivalence of SLNR Precoder and RZF Precoder in Downlink MU-MIMO Systems. - Ei Shwe Sin, Nang Saing Moon Kham:
Hyper heuristic based on great deluge and its variants for exam timetabling problem. - R. Rathna, A. Sivasubramanian:
Improving energy efficiency in wireless sensor networks through scheduling and routing. - D. Sravana Kumar, Ch. Suneetha, A. Chandrasekhar:
Encryption of Data using Elliptic Curve over Finite fields. - (Withdrawn) The black-and-white coloring problem on circle graphs.
- D. Sravana Kumar, Ch. Suneetha, A. Chandrasekhar:
A Block Cipher using Rotation and Logical XOR Operations. - Mari Kobayashi, Sheng Yang, David Gesbert, Xinping Yi:
On the Degrees of Freedom of time correlated MISO broadcast channel with delayed CSIT. - Loet Leydesdorff, Stephen Carley, Ismael Ràfols:
Global Maps of Science based on the new Web-of-Science Categories. - Md. Golam Rabiul Alam, Chayan Biswas, Naushin Nower, Mohammed Shafiul Alam Khan:
A Reliable Semi-Distributed Load Balancing Architecture of Heterogeneous Wireless Networks. - Danny Dolev, Matthias Függer, Christoph Lenzen, Markus Posch, Ulrich Schmid, Andreas Steininger:
FATAL+: A Self-Stabilizing Byzantine Fault-tolerant Clocking Scheme for SoCs. - Markus Bläser, Bodo Manthey:
Smoothed Complexity Theory. - A. K. Sharma, Atul Mishra, Vijay Singh:
An Intelligent Mobile-Agent Based Scalable Network Management Architecture for Large-Scale Enterprise System. - Srimal Jayawardena, Di Yang, Marcus Hutter:
3D Model Assisted Image Segmentation. - R. Jayabrabu, V. Saravanan, K. Vivekanandan:
A framework: Cluster detection and multidimensional visualization of automated data mining using intelligent agents. - Murtaza Hussain Shaikh:
Arduino Tool: For Interactive Artwork Installations. - Hoda Jannati, Abolfazl Falahati:
Cryptanalysis and enhancement of two low cost rfid authentication protocols. - Alexander Kartzow:
First-Order Logic on Higher-Order Nested Pushdown Trees. - Leonid Barenboim, Michael Elkin, Seth Pettie, Johannes Schneider:
Fast Distributed Algorithms for Maximal Matching and Maximal Independent Set. - Upendra Kumar, Tapobrata Lahiri, Manoj Kumar Pal:
Non-parametric convolution based image-segmentation of ill-posed objects applying context window approach. - Mehdi M. Molu, Norbert Goertz:
A Comparison of Soft and Hard Coded Relaying. - Fabio F. G. Buono:
A New Type of Cipher. - P. Karunakaran, C. Venkatesh:
Traffic and Security using Randomized Dispersive Routes in Heterogeneous Sensor Network. - K. Saravanan, S. Karthik:
Packet Score based network security and Traffic Optimization. - Akira Saitoh, Robabeh Rahimi, Mikio Nakahara:
Semiclassical genetic algorithm with quantum crossover and mutation operations. - Lianlin Li:
Note on RIP-based Co-sparse Analysis. - Nicolas Sturmel, Laurent Daudet:
Informed Source Separation using Iterative Reconstruction. - Helmi Chaouech, Ridha Bouallegue:
Multiuser Detection and Channel Estimation for Multibeam Satellite Communications. - Viviana Bono, Luca Padovani:
Typing Copyless Message Passing. - Mira Gonen, Michael Langberg:
Coded Cooperative Data Exchange Problem for General Topologies. - Jiaming Xu, Bruce E. Hajek:
The Supermarket Game. - Bernhard Haeupler, Gopal Pandurangan, David Peleg, Rajmohan Rajaraman, Zhifeng Sun:
Discovery through Gossip. - Allan Borodin, Mark Braverman, Brendan Lucier, Joel Oren:
Truthful Mechanisms for Competing Submodular Processes. - Antonio C. de A. Campello Jr., Cristiano Torezzan, Sueli I. R. Costa:
Curves on torus layers and coding for continuous alphabet sources. - Debadeepta Dey, Tian Yu Liu, Martial Hebert, J. Andrew Bagnell:
Predicting Contextual Sequences via Submodular Function Maximization. - Huang Huang, Vincent K. N. Lau:
Decentralized Delay Optimal Control for Interference Networks with Limited Renewable Energy Storage. - Brian Michalski, Mukkai Krishnamoorthy, Tsz-Yam Lau:
Temporal Analysis of Literary and Programming Prose. - Everthon Valadao, Dorgival O. Guedes, Ricardo Duarte:
Caracterização de tempos de ida-e-volta na Internet. - Páidí Creed, Mary Cryan:
The number of Euler tours of a random directed graph. - Javad Azimi, Ruofei Zhang, Yang Zhou, Vidhya Navalpakkam, Jianchang Mao, Xiaoli Z. Fern:
The Impact of Visual Appearance on User Response in Online Display Advertising. - Clément Farabet, Camille Couprie, Laurent Najman, Yann LeCun:
Scene Parsing with Multiscale Feature Learning, Purity Trees, and Optimal Covers. - Eray Özkural:
Abstract Representations and Frequent Pattern Discovery. - Daniel J. Dougherty, Joshua D. Guttman:
Symbolic Protocol Analysis for Diffie-Hellman. - Raghav V. Sampangi, Saurabh Dey, Shalini R. Urs, Srinivas Sampalli:
A security suite for wireless body area networks. - Huazi Zhang, Huaiyu Dai, Zhaoyang Zhang:
On the Capacity Region for Cognitive Multiple Access over White Space Channels. - Xu Chu Ding, Jing Wang, Morteza Lahijanian, Ioannis Ch. Paschalidis, Calin Belta:
Temporal Logic Motion Control using Actor-Critic Methods. - K. S. Kuppusamy, Gnanasekaran Aghila:
Museum: Multidimensional web page segment evaluation model. - Sunil Simon, Krzysztof R. Apt:
Choosing Products in Social Networks. - Dmitry Ageyev, Alexander Pereverzev:
Wavelength Assignment in Design DWDM Transport Network Using Algorithm BCO-RWA. - S. Rajyalakshmi, Amitabha Bagchi, Soham Das, Rudra M. Tripathy:
Topic Diffusion and Emergence of Virality in Social Networks. - Yulong Liu, Shidong Li, Tiebin Mi:
Performance Analysis of ℓ1-synthesis with Coherent Frames. - Liang Liu, Rui Zhang, Kee-Chaing Chua:
Achieving Global Optimality for Weighted Sum-Rate Maximization in the K-User Gaussian Interference Channel with Multiple Antennas. - Ioana Sporea, André Grüning:
Supervised Learning in Multilayer Spiking Neural Networks. - Nissim Halabi, Guy Even:
Hierarchies of Local-Optimality Characterizations in Decoding Tanner Codes. - Jonathan Rogge, Dirk Aeyels:
Multi-robot coverage to locate fixed targets using formation structures. - Drazen Lucanin, Ivan Fabek:
A visual programming language for drawing and executing flowcharts. - Jean Goubault-Larrecq:
QRB-Domains and the Probabilistic Powerdomain. - Karl Bringmann, Kurt Mehlhorn, Adrian Neumann:
Remarks on Category-Based Routing in Social Networks. - Maria Luisa Bonet, Samuel R. Buss:
An Improved Separation of Regular Resolution from Pool Resolution and Clause Learning. - (Withdrawn) Detection Performance of M-ary Relay Trees with Non-binary Message Alphabets.
- Beth Trushkowsky, Tim Kraska, Michael J. Franklin, Purnamrita Sarkar:
Getting It All from the Crowd. - Christian Wulff-Nilsen:
Approximate Distance Oracles with Improved Query Time. - Khaled Masmoudi, Marc Antonini, Pierre Kornprobst:
Streaming an image through the eye: The retina seen as a dithered scalable image coder. - Sarah Y. Tang, Afzal Godil:
An evaluation of local shape descriptors for 3D shape retrieval. - John W. Byers, Michael Mitzenmacher, Georgios Zervas:
The Groupon Effect on Yelp Ratings: A Root Cause Analysis. - Dohy Hong:
Statistical reliability and path diversity based PageRank algorithm improvements. - James Chapman, Paul Blain Levy:
Proceedings Fourth Workshop on Mathematically Structured Functional Programming, MSFP@ETAPS 2012, Tallinn, Estonia, 25 March 2012. EPTCS 76, 2012 [contents] - Arash Khabbazibasmenj, Florian Roemer, Sergiy A. Vorobyov, Martin Haardt:
Sum-Rate Maximization in Two-Way AF MIMO Relaying: Polynomial Time Solutions to a Class of DC Programming Problems. - N. Prakash, Govinda M. Kamath, V. Lalitha, P. Vijay Kumar:
Optimal Linear Codes with a Local-Error-Correction Property. - Ahmed Rhif:
A High Order Sliding Mode Control with PID Sliding Surface: Simulation on a Torpedo. - Wajeb Gharibi, Maha Shaabi:
Cyber threats in social networking websites. - M. Rizwan Jameel Qureshi, Shaukat Ali Hayat:
The artifacts of component-based development. - Youssef Bassil, Mohammad Alwani:
Autonomic html interface generator for web applications. - Youssef Bassil:
Building sustainable ecosystem-oriented architectures. - Moataz M. Abdelwahab, Salah A. Aly, Islam Yousry:
Efficient Web-based Facial Recognition System Employing 2DHOG. - Xin Shuai, Alberto Pepe, Johan Bollen:
How the Scientific Community Reacts to Newly Submitted Preprints: Article Downloads, Twitter Mentions, and Citations. - Jierui Xie, Boleslaw K. Szymanski:
Towards Linear Time Overlapping Community Detection in Social Networks. - Amitabh Trehan:
Self-healing using virtual structures. - Neal Glew:
Subtyping for F-Bounded Quantifiers and Equirecursive Types (Extended Version). - M. Rizwan Jameel Qureshi, M. E. Sandhu:
Survey-Based Analysis of the Proposed Component-Based Development Process. - M. Rizwan Jameel Qureshi:
Evaluation of the Improved XP Software Development Model. - M. Rizwan Jameel Qureshi, S. A. Hussain:
An Improved XP Software Development Model. - Manuel Cebrián, Ramamohan Paturi, Daniel Ricketts:
Experimental study of the impact of historical information in human coordination. - M. R. J. Qureshi, Muhammad Kashif:
Seamless Long Term Learning in Agile Teams for Sustainable Leadership. - Nayyar Iqbal, M. Rizwan Jameel Qureshi:
Improvement of Key Problems of Software Testing in Quality Assurance. - M. Rizwan Jameel Qureshi, M. E. Sandhu:
A Validation of the Proposed Component-Based Development Process. - Nicolò Maria Calcavecchia, Bogdan Alexandru Caprarescu, Elisabetta Di Nitto, Daniel J. Dubois, Dana Petcu:
DEPAS: A Decentralized Probabilistic Algorithm for Auto-Scaling. - M. Rizwan Jameel Qureshi, Muhammad Rafiq Asim, Muhammad Nadeem, Asif Mehmood:
A New Teaching Model For The Subject Of Software Project Management. - Nadeem Ahmed, Muhammad Rafiq Asim, M. Rizwan Jameel Qureshi:
A Step Forward To Component-based Software Cost Estimation in Object-oriented Environment. - M. Rizwan Jameel Qureshi:
Empirical Evaluation of the Proposed eXScrum Model: Results of a Case Study. - Asif Irshad Khan, M. Rizwan Jameel Qureshi, Usman Ali Khan:
A Comprehensive Study of Commonly Practiced Heavy & Light Weight Software Methodologies. - Ahmed Barnawi, M. Rizwan Jameel Qureshi, Asif Irshad Khan:
A Framework for Next Generation Mobile and Wireless Networks Application Development using Hybrid Component Based Development Model. - Ahmed Barnawi, Abdurrahman H. Al-Talhi, M. Rizwan Jameel Qureshi, Asif Irshad Khan:
Novel Component Based Development Model For Sip-Based Mobile Application. - José A. García Gutiérrez, Carlos Cotta, Antonio José Fernández Leiva:
Evolutionary Computation in Astronomy and Astrophysics: A Review. - Adel Javanmard, Andrea Montanari:
Subsampling at Information Theoretically Optimal Rates. - Kevin Mader, Gil Reese:
Using Covariance Matrices as Feature Descriptors for Vehicle Detection from a Fixed Camera. - Pan Zhang, Abolfazl Ramezanpour, Lenka Zdeborová, Riccardo Zecchina:
Message passing for quantified Boolean formulas. - Ciprian Dobre, Florin Pop, Valentin Cristea:
A Simulation Model for Evaluating Distributed Systems Dependability. - Mohamed S. Nafea, Karim G. Seddik, Mohammed Nafie, Hesham El Gamal:
On the Diversity Gain Region of the Z-interference Channels. - Radu-Ioan Ciobanu, Ciprian Dobre:
Data Dissemination in Opportunistic Networks. - (Withdrawn) A Formal Approach for the Development of Service-Oriented Applications.
- Ciprian Dobre, George Cristian Tudor:
Mobile Advertisement in Vehicular Ad-Hoc Networks. - Imran Shafique Ansari, Ferkan Yilmaz, Mohamed-Slim Alouini, Oguz Kucur:
New Results on the Sum of Gamma Random Variates With Application to the Performance of Wireless Communication Systems over Nakagami-m Fading Channels. - Huazi Zhang, Zhaoyang Zhang, Huaiyu Dai:
Gossip-based Information Spreading in Mobile Networks. - Oliver Kullmann, Xishun Zhao:
On Davis-Putnam reductions for minimally unsatisfiable clause-sets. - K. S. Kuppusamy, Gnanasekaran Aghila:
Semantic snippet construction for search engine results based on segment evaluation. - K. S. Kuppusamy, Gnanasekaran Aghila:
Live-marker: A personalized web page content marking tool. - K. S. Kuppusamy, Gnanasekaran Aghila:
Segmentation Based Approach to Dynamic Page Construction from Search Engine Results. - K. S. Kuppusamy, Gnanasekaran Aghila:
We.I.Pe: Web Identification of People using e-mail ID. - K. S. Kuppusamy, Gnanasekaran Aghila:
A Model for Web Page Usage Mining Based on Segmentation. - M. Sreerama Murty, A. Veeraiah, Srinivas Rao:
"Performance Evaluation of Wi-Fi comparison with WiMAX Networks". - Graham Cormode, S. Muthukrishnan, Jinyun Yun:
Scienceography: the study of how science is written. - M. Puck Rombach, Mason A. Porter, James H. Fowler, Peter J. Mucha:
Core-Periphery Structure in Networks. - Ilan Shomorony, Amir Salman Avestimehr:
Worst-Case Additive Noise in Wireless Networks. - Maxime Berar, Françoise Tilotta, Joan Alexis Glaunès, Yves Rozenholc:
Craniofacial reconstruction as a prediction problem using a Latent Root Regression model. - Rashmi Gupta, Shalini Raghav:
Risk Assessment Techniques and Survey Method for COTS Components. - André Gaul:
Function call overhead benchmarks with MATLAB, Octave, Python, Cython and C. - Dan C. Ciresan, Ueli Meier, Jürgen Schmidhuber:
Multi-column Deep Neural Networks for Image Classification. - Sundeep Rangan, Alyson K. Fletcher:
Iterative Estimation of Constrained Rank-One Matrices in Noise. - Amir Hesam Salavati, Amin Karbasi:
Multi-Level Error-Resilient Neural Networks with Learning. - Christian Borgs, Michael Brautbar, Jennifer T. Chayes, Shang-Hua Teng:
Sublinear Time Algorithm for PageRank Computations and Related Applications. - Antonín Komenda, Peter Novák, Michal Pechoucek:
Decentralized Multi-agent Plan Repair in Dynamic Environments. - Nicolas Macris, Marc Vuffray:
Beyond the Bethe Free Energy of LDPC Codes via Polymer Expansions. - Nicolas Macris, Marc Vuffray:
Polymer Expansions for Cycle LDPC Codes. - Shahar Dobzinski, Jan Vondrák:
The Computational Complexity of Truthfulness in Combinatorial Auctions. - Shahar Dobzinski, Jan Vondrák:
On the Hardness of Welfare Maximization in Combinatorial Auctions with Submodular Valuations. - Vinay A. Vaishampayan:
Query Matrices for Retrieving Binary Vectors Based on the Hamming Distance Oracle. - Behrouz Maham, Aydin Behnad, Mérouane Debbah:
Efficient Relay Selection Scheme for Delay-Limited Non-Orthogonal Hybrid-ARQ Relay Channels. - Christina Boucher, Gad M. Landau, Avivit Levy, David Pritchard, Oren Weimann:
On Approximating String Selection Problems with Outliers. - Brian K. Butler, Paul H. Siegel:
Error Floor Approximation for LDPC Codes in the AWGN Channel. - Parinya Chalermsook, Khaled M. Elbassioni, Danupon Nanongkai, He Sun:
Multi-Attribute Profit-Maximizing Pricing (Extended Abstract). - Drazen Lucanin:
Visual definition of procedures for automatic virtual scene generation. - Hien Quoc Ngo, Michail Matthaiou, Trung Quang Duong, Erik G. Larsson:
Uplink Performance Analysis of Multicell MU-MIMO Systems with ZF Receivers. - George Christodoulou, Kurt Mehlhorn, Evangelia Pyrga:
Improving the Price of Anarchy for Selfish Routing via Coordination Mechanisms. - William Webber:
Approximate Recall Confidence Intervals. - Amin Emad, Olgica Milenkovic:
Semi-Quantitative Group Testing. - Shreyas Sekar, Patrick Maillé:
Exploiting the 'Web of Trust' to improve efficiency in collaborative networks. - Dmitry I. Ignatov, Jonas Poelmans, Vasily Zaharchuk:
Recommender System Based on Algorithm of Bicluster Analysis RecBi. - Jonas Poelmans, Paul Elzinga, Alexey Neznanov, Stijn Viaene, Sergei O. Kuznetsov, Dmitry I. Ignatov, Guido Dedene:
Concept Relation Discovery and Innovation Enabling Technology (CORDIET). - (Withdrawn) The weight Enumerator of some irreducible cyclic codes.
- Jane Butterfield, Daniel W. Cranston, Gregory J. Puleo, Douglas B. West, Reza Zamani:
Revolutionaries and spies: Spy-good and spy-bad graphs. - Yue Wang:
On Effectiveness of Backlog Bounds Using Stochastic Network Calculus in 802.11. - Patrick Bahr, Tom Hvitved:
Parametric Compositional Data Types. 3-24 - Chris Casinghino, Vilhelm Sjöberg, Stephanie Weirich:
Step-Indexed Normalization for a Language with General Recursion. 25-39 - Mauro Jaskelioff, Ondrej Rypacek:
An Investigation of the Laws of Traversals. 40-49 - José Pedro Magalhães, Andres Löh:
A Formal Comparison of Approaches to Datatype-Generic Programming. 50-67 - Tomas Petricek:
Evaluation strategies for monadic computations. 68-89 - Maciej Piróg, Jeremy Gibbons:
Tracing monadic computations and representing effects. 90-111 - Vilhelm Sjöberg, Chris Casinghino, Ki Yung Ahn, Nathan Collins, Harley D. Eades III, Peng Fu, Garrin Kimmell, Tim Sheard, Aaron Stump, Stephanie Weirich:
Irrelevance, Heterogeneous Equality, and Call-by-value Dependent Type Systems. 112-162 - Wouter Swierstra:
From Mathematics to Abstract Machine: A formal derivation of an executable Krivine machine. 163-177 - Anjana Kakoti Mahanta, Mala Dutta:
Detection of Calendar-Based Periodicities of Interval-Based Temporal Patterns. - Sharon Goldberg, Zhenming Liu:
Technology Diffusion in Communication Networks. - Dieter Duyck, Michael Heindlmaier, Daniele Capirone, Marc Moeneclaey:
Diversity Analysis, Code Design and Tight Error Rate Lower Bound for Binary Joint Network-Channel Coding. - Jin-Yi Zhou, Shu-Tao Xia, Yong Jiang, Hai-Tao Zheng:
Maximum Multiflow in Wireless Network Coding. - Bogdan Alexandru Caprarescu, Eva Kaslik, Dana Petcu:
Theoretical Analysis and Tuning of Decentralized Probabilistic Auto-Scaling. - Huasen Wu, Chenxi Zhu, Richard J. La, Xin Liu, Youguang Zhang:
Fast Adaptive S-ALOHA Scheme for Event-driven Machine-to-Machine Communications. - Brage Ellingsæter, Hemdan Bezabih, Josef Noll, Torleiv Maseng:
Using TV Receiver Information to Increase Cognitive White Space Spectrum. - Salvador Gabarda, Gabriel Cristóbal:
No-reference image quality assessment through the von Mises distribution. - Subhadip Basu, Chitrita Chaudhuri, Mahantapas Kundu, Mita Nasipuri, Dipak Kumar Basu:
Segmentation of Offline Handwritten Bengali Script. - Ritesh Ray Chaudhuri, Joydeep Basu, Tarun Kanti Bhattacharyya:
Design and Fabrication of Micromachined Resonators. - Jesper Buus Nielsen, Peter Sebastian Nordholt, Claudio Orlandi, Sai Sheshank Burra:
A New Approach to Practical Active-Secure Two-Party Computation. - Sébastien Bubeck, Nicolò Cesa-Bianchi, Sham M. Kakade:
Towards minimax policies for online linear optimization with bandit feedback. - Sébastien Gambs, Rachid Guerraoui, Florian Huc, Anne-Marie Kermarrec:
On Dynamic Distributed Computing. - Friedrich Slivovsky, Stefan Szeider:
Computing Resolution-Path Dependencies in Linear Time. - Dohy Hong:
D-iteration based asynchronous distributed computation. - Emilio Ferrara, Alfonso E. Romero:
V-index: a novel metric to measure virtuosity of academics. - Kristina Lerman, Rumi Ghosh, Tawan Surachawala:
Social Contagion: An Empirical Study of Information Spread on Digg and Twitter Follower Graphs. - Grey Ballard, James Demmel, Olga Holtz, Benjamin Lipshitz, Oded Schwartz:
Communication-Optimal Parallel Algorithm for Strassen's Matrix Multiplication. - Dale Miller, Zoltán Ésik:
Proceedings 8th Workshop on Fixed Points in Computer Science, FICS 2012, Tallinn, Estonia, 24th March 2012. EPTCS 77, 2012 [contents] - Grey Ballard, James Demmel, Olga Holtz, Benjamin Lipshitz, Oded Schwartz:
Strong Scaling of Matrix Multiplication Algorithms and Memory-Independent Communication Lower Bounds. - Ke Wang, Chao Han, Ada Wai-Chee Fu:
Randomization Resilient To Sensitive Reconstruction. - Xin Shuai, Xiaozhong Liu, Johan Bollen:
Improving News Ranking by Community Tweets. - Guy E. Blelloch, Jeremy T. Fineman, Julian Shun:
Greedy Sequential Maximal Independent Set and Matching are Parallel on Average. - Travis Gagie, Pawel Gawrychowski:
Linear-Space Substring Range Counting over Polylogarithmic Alphabets. - J. Malar Vizhi, T. Bhuvaneswari:
Data quality measurement on categorical data using genetic algorithm. - Gabriel Kerneis, Juliusz Chroboczek:
Lambda-lifting and CPS conversion in an imperative language. - Ada Wai-Chee Fu, Jia Wang, Ke Wang, Raymond Chi-Wing Wong:
Small Count Privacy and Large Count Utility in Data Publishing. - Xiumin Wang, Jianping Wang, Zeyu Zheng, Yinlong Xu, Mei Yang:
Service Composition in Service-Oriented Wireless Sensor Networks with Persistent Queries. - Toni Stojanovski, Ivan Velinov, Marko Vuckovic:
Scalability of Data Binding in ASP.NET Web Applications. - Alexandr Klimchik, Anatoly Pashkevich, Stéphane Caro, Damien Chablat:
Stiffness matrix of manipulators with passive joints: computational aspects. - Konstantin Avrachenkov, Nelly Litvak, Marina Sokol, Don Towsley:
Quick Detection of Nodes with Large Degrees. - Yde Venema, Steve Vickers, Jacob Vosmaer:
Generalized powerlocales via relation lifting. - Keisuke Goto, Hideo Bannai, Shunsuke Inenaga, Masayuki Takeda:
Speeding-up $q$-gram mining on grammar-based compressed texts. - Ugo Dal Lago, Paolo Parisen Toldin:
An Higher-Order Characterization of Probabilistic Polynomial Time (Long Version). - Chunsheng Gu:
Attack on Fully Homomorphic Encryption over the Integers. - Nicolò Cesa-Bianchi, Pierre Gaillard, Gábor Lugosi, Gilles Stoltz:
A new look at shifting regret. - Sarge Rogatch:
An efficient high-quality hierarchical clustering algorithm for automatic inference of software architecture from the source code of a software system. - Manfred Kufleitner, Alexander Lauser:
Lattices of Logical Fragments over Words. - Jonathan A. Kelner, Gary L. Miller, Richard Peng:
Faster Approximate Multicommodity Flow Using Quadratically Coupled Flows. - S. Padma, Ananthi Seshasaayee:
Towards Maximum Spanning Tree Model in Web 3.0 Design and Development for Students using Discriminant Analysis. - Chao Li, Gerome Miklau:
Measuring the achievable error of query sets under differential privacy. - Chun Meng, Abinesh Ramakrishnan, Athina Markopoulou, Syed Ali Jafar:
On the Feasibility of Precoding-Based Network Alignment for Three Unicast Sessions. - Fionn Murtagh, Pedro Contreras:
The Future of Search and Discovery in Big Data Analytics: Ultrametric Information Spaces. - Liyue Fan, Li Xiong:
Adaptively Sharing Time-Series with Differential Privacy. - Saeed Abdallah, Ioannis N. Psaromiligkos:
Partially-blind Estimation of Reciprocal Channels for AF Two-Way Relay Networks Employing M-PSK Modulation. - Raphaël Clifford, Markus Jalsenius, Ely Porat, Benjamin Sach:
Pattern Matching in Multiple Streams. - Jaideep Ray, Ali Pinar, C. Seshadhri:
Are we there yet? When to stop a Markov chain while generating random graphs. - (Withdrawn) Lower Bounds on Testing Functions of Low Fourier Degree.
- Arpita Ghosh, Patrick Hummel:
Implementing Optimal Outcomes in Social Computing: A Game-Theoretic Approach. - Yuan Feng, Yuxin Deng, Mingsheng Ying:
Symbolic bisimulation for quantum processes. - Mikhail V. Simkin, Vwani P. Roychowdhury:
Why does attention to web articles fall with time? - Andreas Abel:
Type-Based Termination, Inflationary Fixed-Points, and Mixed Inductive-Coinductive Types. 1-11 - Luca Aceto, Anna Ingólfsdóttir:
Characteristic Formulae for Relations with Nested Fixed Points. 15-22 - Axel Haddad:
IO vs OI in Higher-Order Recursion Schemes. 23-30 - André Hirschowitz, Marco Maggesi:
Initial Semantics for Strengthened Signatures. 31-38 - Martin Lange, Étienne Lozes:
Model-Checking the Higher-Dimensional Modal mu-Calculus. 39-46 - Grigori Mints, Thomas Studer:
Cut-elimination for the mu-calculus with one variable. 47-54 - Tarmo Uustalu:
Structured general corecursion and coinductive graphs [extended abstract]. 55-61 - Kazem Jahanbakhsh, Valerie King, Gholamali C. Shoja:
They Know Where You Live! - Christos Boutsidis, Petros Drineas, Malik Magdon-Ismail:
Rich Coresets For Constrained Linear Regression. - Jie Xu, Ling Qiu:
Energy Efficiency Optimization for MIMO Broadcasting Channels. - Baocheng Wang, Chunming Tang, Yanfeng Qi, Yixian Yang, Maozhi Xu:
A Note on Weight Distributions of Irreducible Cyclic Codes. - Samet Oymak, Babak Hassibi:
Recovering Jointly Sparse Signals via Joint Basis Pursuit. - Laura Bozzelli, Hans van Ditmarsch, Tim French, James Hales, Sophie Pinchinat:
Refinement Modal Logic. - Pierre Aboulker:
Excluding 4-wheels. - Patrick Bas, Teddy Furon:
The Effective Key Length of Watermarking Schemes. - Yue Wang, On-Ching Yue:
A Tutorial of 802.11 Implementation in NS-2. - Robert Hoehndorf, Michel Dumontier, Georgios V. Gkoutos:
Towards quantitative measures in applied ontology. - (Withdrawn) From Linear Codes to Hyperplane Arrangements via Thomas Decomposition.
- Karthekeyan Chandrasekaran, Richard M. Karp:
Finding the most biased coin with fewest flips. - Michael Erhard, Hans Strauch:
Control of Towing Kites for Seagoing Vessels. - Mansoor I. Yousefi, Frank R. Kschischang:
Information Transmission using the Nonlinear Fourier Transform, Part I: Mathematical Tools. - Juan F. Sequeda, Marcelo Arenas, Daniel P. Miranker:
On Directly Mapping Relational Databases to RDF and OWL (Extended Version). - Samer Al-Kiswany, Abdullah Gharaibeh, Matei Ripeanu:
GPUs as Storage System Accelerators. - Debojyoti Dutta, Michael Kapralov, Ian Post, Rajendra Shinde:
Optimal bandwidth-aware VM allocation for Infrastructure-as-a-Service. - Marius Leordeanu, Rahul Sukthankar, Cristian Sminchisescu:
Generalized Boundaries from Multiple Image Interpretations. - Ke Wang, Peng Wang, Ada Wai-Chee Fu, Raymond Chi-Wing Wong:
Inferential or Differential: Privacy Laws Dictate. - Udi Apsel, Ronen I. Brafman:
Extended Lifted Inference with Joint Formulas. - John Asmuth, Michael L. Littman:
Learning is planning: near Bayes-optimal reinforcement learning via Monte-Carlo tree search. - Yoram Bachrach, Reshef Meir, Michal Feldman, Moshe Tennenholtz:
Solving Cooperative Reliability Games. - Gowtham Bellala, Jason Stanley, Clayton Scott, Suresh K. Bhavnani:
Active Diagnosis via AUC Maximization: An Efficient Approach for Multiple Fault Identification in Large Scale, Noisy Networks. - Avleen Singh Bijral, Nathan D. Ratliff, Nathan Srebro:
Semi-supervised Learning with Density Based Distances. - E. Busra Celikkaya, Christian R. Shelton, William Lam:
Factored Filtering of Continuous-Time Systems. - Mithun Chakraborty, Sanmay Das, Malik Magdon-Ismail:
Near-Optimal Target Learning With Stochastic Binary Signals. - Archie C. Chapman, Simon Andrew Williamson, Nicholas R. Jennings:
Filtered Fictitious Play for Perturbed Observation Potential Games and Decentralised POMDPs. - Laurent Charlin, Richard S. Zemel, Craig Boutilier:
A Framework for Optimizing Paper Matching. - Shaunak Chatterjee, Stuart Russell:
A temporally abstracted Viterbi algorithm. - Xi Chen, Qihang Lin, Seyoung Kim, Jaime G. Carbonell, Eric P. Xing:
Smoothing Proximal Gradient Method for General Structured Sparse Learning. - Arthur Choi, Khaled S. Refaat, Adnan Darwiche:
EDML: A Method for Learning Parameters in Bayesian Networks. - SangIn Chun, Ross D. Shachter:
Strictly Proper Mechanisms with Cooperating Players. - Tom Claassen, Tom Heskes:
A Logical Characterization of Constraint-Based Causal Discovery. - Corinna Cortes, Mehryar Mohri, Afshin Rostamizadeh:
Ensembles of Kernel Predictors. - James Cussens:
Bayesian network learning with cutting planes. - Kun Deng, Joelle Pineau, Susan A. Murphy:
Active Learning for Developing Personalized Treatment. - Krishnamurthy Dvijotham, Emanuel Todorov:
A Unifying Framework for Linearly Solvable Control. - Narayanan Unny Edakunni, Gary Brown, Tim Kovacs:
Boosting as a Product of Experts. - Mahdi Milani Fard, Joelle Pineau, Csaba Szepesvári:
PAC-Bayesian Policy Evaluation for Reinforcement Learning. - Hélène Fargier, Nahla Ben Amor, Wided Guezguez:
On the Complexity of Decision Making in Possibilistic Decision Trees. - Daan Fierens, Guy Van den Broeck, Ingo Thon, Bernd Gutmann, Luc De Raedt:
Inference in Probabilistic Logic Programs using Weighted CNF's. - Thomas Furmston, David Barber:
Efficient Inference in Markov Control Problems. - Phan Hong Giang:
Dynamic consistency and decision making under vacuous belief. - Inmar E. Givoni, Clement Chung, Brendan J. Frey:
Hierarchical Affinity Propagation. - Vibhav Gogate, Pedro M. Domingos:
Approximation by Quantization. - Vibhav Gogate, Pedro M. Domingos:
Probabilistic Theorem Proving. - Quanquan Gu, Zhenhui Li, Jiawei Han:
Generalized Fisher Score for Feature Selection. - Andrew Guillory, Jeff A. Bilmes:
Active Semi-Supervised Learning using Submodular Functions. - Michael Gutmann, Junichiro Hirayama:
Bregman divergence as general framework to estimate unnormalized statistical models. - Hannaneh Hajishirzi, Julia Hockenmaier, Erik T. Mueller, Eyal Amir:
Reasoning about RoboCup Soccer Narratives. - Eric A. Hansen:
Suboptimality Bounds for Stochastic Shortest Path Problems. - Jouni Hartikainen, Simo Särkkä:
Sequential Inference for Latent Force Models. - Uri Heinemann, Amir Globerson:
What Cannot be Learned with Bethe Approximations. - Hoifung Poon, Pedro M. Domingos:
Sum-Product Networks: A New Deep Architecture. - Jean Honorio:
Lipschitz Parametrization of Probabilistic Graphical Models. - Jonathan Huang, Ashish Kapoor, Carlos Guestrin:
Efficient Probabilistic Inference with Partial Ranking Queries. - Antti Hyttinen, Frederick Eberhardt, Patrik O. Hoyer:
Noisy-OR Models with Latent Confounding. - Takanori Inazumi, Takashi Washio, Shohei Shimizu, Joe Suzuki, Akihiro Yamamoto, Yoshinobu Kawahara:
Discovering causal structures in binary exclusive-or skew acyclic models. - Dominik Janzing, Eleni Sgouritsa, Oliver Stegle, Jonas Peters, Bernhard Schölkopf:
Detecting low-complexity unobserved causes. - Alex Kulesza, Ben Taskar:
Learning Determinantal Point Processes. - Akshat Kumar, Shlomo Zilberstein:
Message-Passing Algorithms for Quadratic Programming Formulations of MAP Estimation. - Minyi Li, Quoc Bao Vo, Ryszard Kowalczyk:
An Efficient Protocol for Negotiation over Combinatorial Domains with Incomplete Information. - Shiau Hong Lim, Peter Auer:
Noisy Search with Comparative Feedback. - Qiang Liu, Alexander Ihler:
Variational Algorithms for Marginal MAP. - Jianbing Ma, Weiru Liu, Paul Miller:
Belief change with noisy sensing in the situation calculus. - Brandon M. Malone, Changhe Yuan, Eric A. Hansen, Susan Bridges:
Improving the Scalability of Optimal Bayesian Network Learning with External-Memory Frontier Breadth-First Branch and Bound Search. - Radu Marinescu, Nic Wilson:
Order-of-Magnitude Influence Diagrams. - Benjamin M. Marlin, Nando de Freitas:
Asymptotic Efficiency of Deterministic Estimators for Discrete Energy-Based Models: Ratio Matching and Pseudolikelihood. - David M. Mimno:
Reconstructing Pompeian Households. - Volodymyr Mnih, Hugo Larochelle, Geoffrey E. Hinton:
Conditional Restricted Boltzmann Machines for Structured Output Prediction. - Hala Mostafa, Victor R. Lesser:
Compact Mathematical Programs For DEC-MDPs With Structured Agent Interactions. - Ananda Narayanan B., Balaraman Ravindran:
Fractional Moments on Bandit Problems. - Swaprava Nath, Onno Zoeter, Yadati Narahari, Christopher R. Dance:
Dynamic Mechanism Design for Markets with Strategic Resources. - Nebojsa Jojic, Alessandro Perina:
Multidimensional counting grids: Inferring word order from disordered bags of words. - Teppo Niinimaki, Pekka Parviainen, Mikko Koivisto:
Partial Order MCMC for Structure Discovery in Bayesian Networks. - Eunsoo Oh, Kee-Eung Kim:
A Geometric Traversal Algorithm for Reward-Uncertain MDPs. - Takayuki Osogami:
Iterated risk measures for risk-sensitive Markov decision processes with discounted cost. - David M. Pennock, Lirong Xia:
Price Updating in Combinatorial Prediction Markets with Bayesian Networks. - Jonas Peters, Joris M. Mooij, Dominik Janzing, Bernhard Schölkopf:
Identifiability of Causal Graphs using Functional Models. - Barnabás Póczos, Liang Xiong, Jeff G. Schneider:
Nonparametric Divergence Estimation with Applications to Machine Learning on Distributions. - Gungor Polatkan, Oncel Tuzel:
Compressed Inference for Probabilistic Sequential Models. - Nima Reyhani, Hideitsu Hino, Ricardo Vigário:
New Probabilistic Bounds on Eigenvalues and Eigenvectors of Random Kernel Matrices. - Scott Sanner, Karina Valdivia Delgado, Leliane Nunes de Barros:
Symbolic Dynamic Programming for Discrete and Continuous State MDPs. - Ilya Shpitser, Thomas S. Richardson, James M. Robins:
An Efficient Algorithm for Computing Interventional Distributions in Latent Variable Causal Models. - Johannes Textor, Maciej Liskiewicz:
Adjustment Criteria in Causal Diagrams: An Algorithmic Perspective. - Maomi Ueno:
Robust learning Bayesian networks for prior belief. - Joop van de Ven, Fabio Ramos:
Distributed Anytime MAP Inference. - Michael P. Wellman, Lu Hong, Scott E. Page:
The Structure of Signals: Causal Interdependence Models for Games of Incomplete Information. - Feng Yan, Zenglin Xu, Yuan (Alan) Qi:
Sparse matrix-variate Gaussian process blockmodels for network modeling. - Jian-Bo Yang, Ivor W. Tsang:
Hierarchical Maximum Margin Learning for Multi-Class Classification. - Julian Yarkony, Ragib Morshed, Alexander T. Ihler, Charless C. Fowlkes:
Tightening MRF Relaxations with Planar Subproblems. - Yaoliang Yu, Dale Schuurmans:
Rank/Norm Regularization with Closed-Form Solutions: Application to Subspace Clustering. - Haohai Yu, Robert A. van Engelen:
Measuring the Hardness of Stochastic Sampling on Bayesian Networks with Deterministic Causalities: the k-Test. - Kun Zhang, Jonas Peters, Dominik Janzing, Bernhard Schölkopf:
Kernel-based Conditional Independence Test and Application in Causal Discovery. - Xinhua Zhang, Ankan Saha, S. V. N. Vishwanathan:
Smoothing Multivariate Performance Measures. - Lu Zheng, Ole J. Mengshoel, Jike Chong:
Belief Propagation by Message Passing in Junction Trees: Computing Each Message Faster Using GPU Parallelization. - Jun Zhu, Eric P. Xing:
Sparse Topical Coding. - Jakob Zscheischler, Dominik Janzing, Kun Zhang:
Testing whether linear equations are causal: A free probability theory approach. - Kareem Amin, Michael J. Kearns, Umar Syed:
Graphical Models for Bandit Problems. - Chao Li, Gerome Miklau:
An Adaptive Mechanism for Accurate Query Answering under Differential Privacy. - Rongqing Zhang, Lingyang Song, Zhu Han, Bingli Jiao:
Physical Layer Security for Two-Way Untrusted Relaying with Friendly Jammers. - Paul Potgieter:
The rapid points of a complex oscillation. - Kadir Akbudak, Enver Kayaaslan, Cevdet Aykanat:
Technical Report on Hypergraph-Partitioning-Based Models and Methods for Exploiting Cache Locality in Sparse-Matrix Vector Multiplication. - Thomas Pietrzak, Andrew Crossan, Stephen A. Brewster, Benoît Martin, Isabelle Pecci:
Creating Usable Pin Array Tactons for Non-Visual Information. - Dinesh Dileep Gaurav, Renu Ramesh:
A feature extraction technique based on character geometry for character recognition. - Paraskevas V. Lekeas, Giorgos Stamatopoulos:
Cooperative oligopoly games with boundedly rational firms. - Hamid Salimi, Davar Giveki, Mohammad Ali Soltanshahi, Javad Hatami:
Extended Mixture of MLP Experts by Hybrid of Conjugate Gradient Method and Modified Cuckoo Search. - Tor Lattimore, Marcus Hutter:
PAC Bounds for Discounted MDPs. - Kristoffer Arnsfelt Hansen, Michal Koucký, Niels Lauritzen, Peter Bro Miltersen, Elias P. Tsigaridas:
Exact Algorithms for Solving Stochastic Games. - Ferkan Yilmaz, Fahd Ahmed Khan, Mohamed-Slim Alouini:
Performance of Amplify-and-Forward Multihop Transmission over Relay Clusters with Different Routing Strategies. - Entao Liu, Edwin K. P. Chong:
On Greedy Adaptive Measurements. - Luca Barletta, Flaminio Borgonovo, Matteo Cesana:
A formal proof of the optimal frame setting for Dynamic-Frame Aloha with known population size. - Sylvain Malacria, Thomas Pietrzak, Aurélien Tabard, Eric Lecolinet:
U-Note: Capture the Class and Access it Everywhere. - Thomas Pietrzak, Andrew Crossan, Stephen A. Brewster, Benoît Martin, Isabelle Pecci:
Exploring Geometric Shapes with Touch. - Ludo Waltman, Clara Calero-Medina, Joost Kosten, Ed C. M. Noyons, Robert J. W. Tijssen, Nees Jan van Eck, Thed N. van Leeuwen, Anthony F. J. van Raan, Martijn S. Visser, Paul Wouters:
The Leiden Ranking 2011/2012: Data collection, indicators, and interpretation. - Daniel S. Katz, Timothy G. Armstrong, Zhao Zhang, Michael Wilde, Justin M. Wozniak:
Many-Task Computing and Blue Waters. - Niel de Beaudrap:
On the complexity of solving linear congruences and computing nullspaces modulo a constant. - Diego Figueira:
Alternating register automata on finite words and trees. - Christine Fricker, Philippe Robert, James Roberts:
A versatile and accurate approximation for LRU cache performance. - Benjamin Edwards, Tyler Moore, George Stelle, Steven A. Hofmeyr, Stephanie Forrest:
Beyond the Blacklist: Modeling Malware Spread and the Effect of Interventions. - Benjamin Edwards, Steven A. Hofmeyr, George Stelle, Stephanie Forrest:
Internet Topology over Time. - René Vidal, Yi Ma, Shankar Sastry:
Generalized Principal Component Analysis (GPCA). - Steven A. Hofmeyr, Tyler Moore, Stephanie Forrest, Benjamin Edwards, George Stelle:
Modeling Internet-Scale Policies for Cleaning up Malware. - Shashi Shekhar, Michael Dietz, Dan S. Wallach:
AdSplit: Separating smartphone advertising from applications. - Arun Sridharan, Can Emre Koksal:
Energy Efficient Greedy Link Scheduling and Power Control in wireless networks. - Christoph Studer, Erik G. Larsson:
PAR-Aware Large-Scale Multi-User MIMO-OFDM Downlink. - Jung Hyun Bae, Jungwon Lee, Inyup Kang:
Simple transmission strategies for interference channel. - Gilad Lerman, Michael B. McCoy, Joel A. Tropp, Teng Zhang:
Robust computation of linear models, or How to find a needle in a haystack. - Nishant A. Mehta, Alexander G. Gray:
On the Sample Complexity of Predictive Sparse Coding. - (Withdrawn) Secret sharing with a class of minimal linear codes.
- Sundus Hassan, Muhammad Rafi, Mohammad Shahid Shaikh:
Comparing SVM and Naive Bayes classifiers for text categorization with Wikitology as knowledge enrichment. - Leah Epstein, Asaf Levin:
An efficient polynomial time approximation scheme for load balancing on uniformly related machines. - Gregory Kucherov, Yakov Nekrich, Tatiana Starikovskaya:
Cross-Document Pattern Matching. - György Dósa, Leah Epstein:
Generalized selfish bin packing. - Xi Liu, Osvaldo Simeone, Elza Erkip:
Energy-Efficient Sensing and Communication of Parallel Gaussian Sources. - Fatima-Zahra Belouadha, Hajar Omrana, Ounsa Roudiès:
Web Services-Enhanced Agile Modeling and Integrating Business Processes. - Scott A. Hale:
Unsupervised Threshold for Automatic Extraction of Dolphin Dorsal Fin Outlines from Digital Photographs in DARWIN (Digital Analysis and Recognition of Whale Images on a Network). - Lei Song, Lijun Zhang, Jens Chr. Godskesen:
Late Weak Bisimulation for Markov Automata. - Nadeem Javaid, Ayesha Bibi, Zahoor Ali Khan, Umar Khan, Karim Djouani:
Evaluating Wireless Proactive Routing Protocols under Scalability and Traffic Constraints. - Loet Leydesdorff:
McCall's Area Transformation versus the Integrated Impact Indicator (I3). - Vahab S. Mirrokni, Nithum Thain, Adrian Vetta:
On the Implications of Lookahead Search in Game Playing. - Syed Hassan Ahmed, Safdar Hussain Bouk, Amjad Mehmood, Nadeem Javaid, Iwao Sasase:
Effect of Fast Moving Object on RSSI in WSN: An Experimental Approach. - Krishnendu Chatterjee, Martin Chmelik, Rupak Majumdar:
Equivalence of Games with Probabilistic Uncertainty and Partial-observation Games. - Adolfo Neto, Celso A. A. Kaestner, Marcelo Finger:
Towards an efficient prover for the C1 paraconsistent logic. - A. Karim Abu-Affash, Paz Carmi, Matthew J. Katz, Yohai Trabelsi:
Bottleneck Non-Crossing Matching in the Plane. - Wenqi Huang, Liang Yu:
Serial Symmetrical Relocation Algorithm for the Equal Sphere Packing Problem. - Frank Gurski, Patrick Gwydion Poullie:
Interval Routing Schemes for Circular-Arc Graphs. - S. V. Kozyrev:
Classification by Ensembles of Neural Networks. - Krishnendu Chatterjee, Manas Joglekar, Nisarg Shah:
Average Case Analysis of the Classical Algorithm for Markov Decision Processes with Büchi Objectives. - M. Heidari Khoozani, Farokh Marvasti, E. Azghani, Mona Ghassemian:
On Finding Sub-optimum Signature Matrices for Overloaded CDMA Systems. - Charles L. Cartledge, Michael L. Nelson:
When Should I Make Preservation Copies of Myself? - Feng Lin, Robert C. Qiu, Zhen Hu, Shujie Hou, James P. Browning, Michael C. Wicks:
Generalized FMD Detection for Spectrum Sensing Under Low Signal-to-Noise Ratio. - Stanislav Kikot, Roman Kontchakov, Vladimir V. Podolskii, Michael Zakharyaschev:
Exponential Lower Bounds and Separation for Query Rewriting. - Meng Yang, Lei Zhang, Jian Yang, David Zhang:
Regularized Robust Coding for Face Recognition. - Daniel Shawcross Wilkerson:
Harmony Explained: Progress Towards A Scientific Theory of Music. - Johannes Reich, Bernd Finkbeiner:
Proceedings Second International Workshop on Interactions, Games and Protocols, IWIGP 2012, Tallinn, Estonia, 25th March 2012. EPTCS 78, 2012 [contents] - Chung-Chieh Fang:
Unified model of voltage/current mode control to predict subharmonic oscillation. - Qiyang Zhao:
A Simple Unsupervised Color Image Segmentation Method based on MRF-MAP. - Michalis Vafopoulos, Petros S. Stefaneas, Ioannis Anagnostopoulos, Kieron O'Hara:
A methodology for internal Web ethics. - J. K. Mandal:
A Frequency Domain Steganography using Z Transform (FDSZT). - Ali Raza, Benito R. Fernández:
Immuno-inspired robotic applications: a review. - Henning Thielemann:
Live-Musikprogrammierung in Haskell. - Amir M. Ben-Amram, Michael Vainer:
Bounded Termination of Monotonicity-Constraint Transition Systems. - Johannes Mittmann, Nitin Saxena, Peter Scheiblechner:
Algebraic Independence in Positive Characteristic -- A p-Adic Calculus. - Johanne Cohen, Christoph Dürr, Kim Thang Nguyen:
Smooth Inequalities and Equilibrium Inefficiency in Scheduling Games. - Paraskevas V. Lekeas:
Should I quit using my resource? Modeling Resource Usage through Game Theory. - Paraskevas V. Lekeas:
Coalitional Beliefs of Cournot Network Agents. - Yuval Emek, Magnús M. Halldórsson, Adi Rosén:
Space-Constrained Interval Selection. - Serge Gaspers, Stefan Szeider:
Strong Backdoors to Nested Satisfiability. - Jayshree Ghorpade, Jitendra Parande, Madhura Kulkarni, Amit Bawaskar:
GPGPU Processing in CUDA Architecture. - George B. Purdy:
The Secure Generation of RSA Moduli Using Poor RNG. - Jose Gaite, German Fernandez-Rico:
Linear approach to the orbiting spacecraft thermal problem. - Salman Malik, Philippe Jacquet:
An Overview of Local Capacity in Wireless Networks. - Johannes Köbler, Sebastian Kuhnert, Oleg Verbitsky:
Solving the Canonical Representation and Star System Problems for Proper Circular-Arc Graphs in Log-Space. - Olivier Bournez, Daniel Silva Graça, Amaury Pouly:
On the complexity of solving initial value problems. - Petr A. Golovach, Daniël Paulusma, Erik Jan van Leeuwen:
Induced Disjoint Paths in Claw-Free Graphs. - Sarah Edge Mann, Michael Anderson, Marek Rychlik:
On the Reliability of RAID Systems: An Argument for More Check Drives. - Kagan Bakanoglu, Elza Erkip, Osvaldo Simeone, Shlomo Shamai:
Relay Channel with Orthogonal Components and Structured Interference Known at the Source. - Behzad Ahmadi, Osvaldo Simeone:
On Channels with Action-Dependent States. - Anit Kumar Sahu, Mrityunjoy Chakraborty:
Fast and Accurate Frequency Estimation Using Sliding DFT. - Michael J. Neely:
Wireless Peer-to-Peer Scheduling in Mobile Networks. - Jason Yosinski, Cooper Bills:
MAV Stabilization using Machine Learning and Onboard Sensors. - Sébastien Bubeck, Aleksandrs Slivkins:
The best of both worlds: stochastic and adversarial bandits. - Elad Hazan, Sham M. Kakade:
(weak) Calibration is Computationally Hard. - Yoann Dieudonné, Florence Levé, Franck Petit, Vincent Villain:
Deterministic Leader Election Among Disoriented Anonymous Sensors. - Vincent Canals, Antoni Morro, José Luis Rosselló:
Stochastic-Based Pattern Recognition Analysis. - Arvind Narayanan, Vincent Toubiana, Solon Barocas, Helen Nissenbaum, Dan Boneh:
A Critical Look at Decentralized Personal Data Architectures. - Noa Avigdor-Elgrabli, Yuval Rabani:
A Constant Factor Approximation Algorithm for Reordering Buffer Management. - Peter E. Bulychev, Alexandre David, Kim G. Larsen, Axel Legay, Marius Mikucionis:
Computing Nash Equilibrium in Wireless Ad Hoc Networks: A Simulation-Based Approach. 1-14 - Yoshifumi Manabe, Tatsuaki Okamoto:
A Cryptographic Moving-Knife Cake-Cutting Protocol. 15-23 - Johannes Reich:
Processes, Roles and Their Interactions. 24-38 - Simon Busard, Charles Pecheur:
Rich Counter-Examples for Temporal-Epistemic Logic Model Checking. 39-53 - A. Isabella, Emi Retna:
Study Paper on Test Case generation for GUI Based Testing. - K. Munivara Prasad, A. Rama Mohan Reddy, V. Jyothsna:
IP Traceback for Flooding attacks on Internet Threat Monitors (ITM) Using Honeypots. - Anirban Sarkar:
Conceptual Level Design of Semi-structured Database System: Graph-semantic Based Approach. - Chung-Chieh Fang:
Unified model of voltage/current mode control to predict saddle-node bifurcation. - Chung-Chieh Fang:
Bifurcation Boundary Conditions for Switching DC-DC Converters Under Constant On-Time Control. - Pedro Quaresma, Ralph-Johan Back:
Proceedings First Workshop on CTP Components for Educational Software, THedu'11, Wroclaw, Poland, 31th July 2011. EPTCS 79, 2011 [contents] - Chung-Chieh Fang:
Sampled-Data and Harmonic Balance Analyses of Average Current-Mode Controlled Buck Converter. - Francois Bentosela, Horia D. Cornean, Nicola Marchetti:
MIMO capacity for deterministic channel models: sublinear growth. - Seth Gilbert, Maxwell Young:
Making Evildoers Pay: Resource-Competitive Broadcast in Sensor Networks. - Tomasz Sobieszek:
Noncontinous additive entropies of partitions. - Adam Paszkiewicz, Tomasz Sobieszek:
Additive Entropies of Partitions. - John Wright, Arvind Ganesh, Kerui Min, Yi Ma:
Compressive Principal Component Pursuit. - (Withdrawn) The Černy conjecture.
- Kumar Nikhil, Swati Agarwal, Pankaj Sharma:
Securing a mobile adhoc network from routing attacks through the application of genetic algorithm. - Tiziana Calamoneri, Dario Frascaria, Blerina Sinaimeri:
All graphs with at most seven vertices are Pairwise Compatibility Graphs. - Edwin A. Henneken:
Publication Trends in Astronomy: The Lone Author. - Yang Yang, Jian Tan, Ness B. Shroff, Hesham El Gamal:
Delay Asymptotics with Retransmissions and Incremental Redundancy Codes over Erasure Channels. - Mohammad Reza Sohizadeh Abyaneh:
On the Privacy of Two Tag Ownership Transfer Protocols for RFIDs. - Zhongfeng Wang:
Super-FEC Codes for 40/100 Gbps Networking. - George B. Mertzios, Paul G. Spirakis:
Algorithms and Almost Tight Results for 3-Colorability of Small Diameter Graphs. - S. Venkata Krishnan, R. Sriram, N. Senthil Kumar:
Adaptive and Dynamic Wireless Routers with Smart Antenna for Power Management. - Barbara Petit:
A Categorical Model for the Lambda Calculus with Constructors. - Yun Wei, Chuanyi Ji, Floyd Galvan, Stephen Couvillon, George Orellana, James Momoh:
Non-Stationary Random Process for Large-Scale Failure and Recovery of Power Distributions. - Ahmed Hesham Mehana, Aria Nosratinia:
Diversity of MIMO Linear Precoding. - Katrina Ligett, Aaron Roth:
Take it or Leave it: Running a Survey when Privacy Comes at a Cost. - Wonsang You, M. S. Houari Sabirin, Munchurl Kim:
Real-time detection and tracking of multiple objects with partial decoding in H.264/AVC bitstream domain. - Kousha Etessami, Alistair Stewart, Mihalis Yannakakis:
Polynomial Time Algorithms for Branching Markov Decision Processes and Probabilistic Min(Max) Polynomial Bellman Equations. - Joseph J. Pfeiffer III, Timothy La Fond, Sebastián Moreno, Jennifer Neville:
Fast Generation of Large Scale Social Networks with Clustering. - Surjeet Kumar Yadav, Brijesh Bharadwaj, Saurabh Pal:
Data Mining Applications: A comparative Study for Predicting Student's performance. - Sanober Shaikh, Madhuri Rao:
Association Rule Mining Based On Trade List. - Chan-Su Shin:
A Note on Minimum-Cost Coverage by Aligned Disks. - Daniel Borchmann:
A General Form of Attribute Exploration. - Serge Autexier, Dominik Dietrich, Marvin R. G. Schiller:
Towards an Intelligent Tutor for Mathematical Proofs. 1-28 - Ralph-Johan Back, Johannes Eriksson:
An Exercise in Invariant-based Programming with Interactive and Automatic Theorem Prover Support. 29-48 - Francisco Botana, Miguel A. Abánades:
Automatic Deduction in Dynamic Geometry using Sage. 49-62 - Filip Maric, Ivan Petrovic, Danijela Petrovic, Predrag Janicic:
Formalization and Implementation of Algebraic Methods in Geometry. 63-81 - Walther Neuper:
Automated Generation of User Guidance by Combining Computation and Deduction. 82-101 - Vanda Santos, Pedro Quaresma:
Integrating DGSs and GATPs in an Adaptative and Collaborative Blended-Learning Web-Environment. 111-123 - Wolfgang Schreiner:
Computer-Assisted Program Reasoning Based on a Relational Semantics of Programs. 124-142 - Makarius Wenzel, Burkhart Wolff:
Isabelle/PIDE as Platform for Educational Tools. 143-153 - Usha Badhera, G. N. Purohit, S. Taruna:
Fault Based Techniques for Testing Boolean Expressions: A Survey. - Jordi Saludes, Sebastian Xambó:
The GF Mathematics Library. 102-110 - Yong Zeng, Erry Gunawan, Yong Liang Guan:
Improved Linear Precoding over Block Diagonalization in Multi-cell Cooperative Networks. - Carlo Alberto Boano, Kay Römer, Marco Antonio Zúñiga Zamalloa, Thiemo Voigt:
Jam-X: Wireless Agreement under Interference. - S. Rakesh, Ajitkumar A. Kaller, B. C. Shadakshari, B. Annappa:
Multilevel Image Encryption. - Massimo Gallo, Bruno Kauffmann, Luca Muscariello, Alain Simonian, Christian Tanguy:
Performance Evaluation of the Random Replacement Policy for Networks of Caches. - Tomoyuki Yamakami, Yuichi Kato:
The Dissecting Power of Regular Languages. - Andrea Asperti, Wilmer Ricciotti, Claudio Sacerdoti Coen, Enrico Tassi:
A Bi-Directional Refinement Algorithm for the Calculus of (Co)Inductive Constructions. - Justin Hsu, Sanjeev Khanna, Aaron Roth:
Distributed Private Heavy Hitters. - Jean-Vivien Millo, Robert de Simone:
Periodic scheduling of marked graphs using balanced binary words. - G. Shankar:
Innovative SQA Service Maturity Model using CMMI and ITIL. - Bheshaj Kumar, Kavita Thakur, G. R. Sinha:
A new hybrid jpeg image compression scheme using symbol reduction technique. - Sarah Miracle, Dana Randall, Amanda Pascoe Streib, Prasad Tetali:
Algorithms for Sampling 3-Orientations of Planar Triangulations. - Vahid Aref, Nicolas Macris, Rüdiger L. Urbanke, Marc Vuffray:
Lossy Source Coding via Spatially Coupled LDGM Ensembles. - Owen Kaser, Daniel Lemire:
Strongly universal string hashing is fast. - Raghu Meka:
A PTAS for Computing the Supremum of Gaussian Processes. - Arpita Ghosh, R. Preston McAfee:
Crowdsourcing with Endogenous Entry. - Jens M. Schmidt:
A Planarity Test via Construction Sequences. - Jennifer E. Padilla, Matthew J. Patitz, Raul Pena, Robert T. Schweller, Nadrian C. Seeman, Robert Sheline, Scott M. Summers, Xingsi Zhong:
Asynchronous Signal Passing for Tile Self-Assembly: Fuel Efficient Computation and Efficient Assembly of Shapes. - Changho Suh, I-Hsiang Wang, David Tse:
Two-way Interference Channels. - Lasse Kliemann:
The Price of Anarchy for Network Formation in an Adversary Model. - Isaac Fung, Konstantinos Georgiou, Jochen Könemann, Malcolm Sharpe:
Efficient Algorithms for Solving Hypergraphic Steiner Tree Relaxations in Quasi-Bipartite Instances. - David Eppstein:
Solving Single-digit Sudoku Subproblems. - Soumen Kanrar:
Analysis and implementation of the Large Scale Video-on-Demand System. - (Withdrawn) ISAR Image Formation Using Sequential Minimization of L0 and L2 Norms.
- Nicolas Bonichon, Cyril Gavoille, Nicolas Hanusse, Ljubomir Perkovic:
The Stretch Factor of L1- and L∞-Delaunay Triangulations. - Emil Stefanov, Elaine Shi:
Path O-RAM: An Extremely Simple Oblivious RAM Protocol. - Jean-Marc Fedou, Gabriele Fici:
Vertical representation of C{\infty}-words. - Romeo Rizzi, Florian Sikora:
Some results on more flexible versions of Graph Motif. - (Withdrawn) Sphere Decoding for Spatial Modulation Systems with Arbitrary Nt.
- Uttam Kr. Mondal, J. K. Mandal:
Fabrication of Message Digest to Authenticate Audio Signals with Alternation of Coefficients of Harmonics in Multi-Stages (MDAC). - Sheng Cai, Jihang Ye, Minghua Chen, Jianxin Yan, Sidharth Jaggi:
Secure Compressed Reading in Smart Grids. - Derek O'Callaghan, Martin Harrigan, Joe Carthy, Pádraig Cunningham:
Identifying Discriminating Network Motifs in YouTube Spam. - C. Seshadhri, Ali Pinar, Tamara G. Kolda:
Fast Triangle Counting through Wedge Sampling. - Tatiana Starikovskaya:
Computing Lempel-Ziv Factorization Online. - Oren Salzman, Michael Hemmer, Dan Halperin:
On the Power of Manifold Samples in Exploring Configuration Spaces and the Dimensionality of Narrow Passages. - Anindya De, Elchanan Mossel:
Explicit Optimal Hardness via Gaussian stability results. - Farrokh Etezadi, Ashish Khisti, Mitchell D. Trott:
Sequential Coding of Markov Sources over Burst Erasure Channels. - Vladimir Savic, Henk Wymeersch, Santiago Zazo:
Belief Consensus Algorithms for Distributed Target Tracking in Wireless Sensor Networks. - Mohammad Iftekhar Husain, Lokesh Mandvekar, Chunming Qiao, Ramalingam Sridhar:
How to Bypass Verified Boot Security in Chromium OS. - Aram Ter-Sarkisov:
Elitism Levels Traverse Mechanism For The Derivation of Upper Bounds on Unimodal Functions. - Elzbieta Zielinska, Wojciech Mazurczyk, Krzysztof Szczypiorski:
The Advent of Steganography in Computing Environments. - Raphael Fonteneau, Damien Ernst, Bernard Boigelot, Quentin Louveaux:
Min Max Generalization for Deterministic Batch Mode Reinforcement Learning: Relaxation Schemes. - Jacques M. Bahi, Jean-François Couchot, Nicolas Friot, Christophe Guyeux:
Application of Steganography for Anonymity through the Internet. - Maja Skataric, Eduardo D. Sontag:
A Characterization of Scale Invariant Responses in Enzymatic Networks. - Nikola Zlatanov, Robert Schober, Petar Popovski:
Buffer-Aided Relaying with Adaptive Link Selection. - Yonghui Xiao, Li Xiong, Liyue Fan, Slawomir Goryczka:
DPCube: Differentially Private Histogram Release through Multidimensional Partitioning. - Fei Yang, Yong Cao, Jie Tian:
Efficient and Effective Volume Visualization with Enhanced Isosurface Rendering. - Jiun-Hung Yu:
On the Joint Error-and-Erasure Decoding for Irreducible Polynomial Remainder Codes. - Zhongkui Li, Xiangdong Liu, Mengyin Fu, Lihua Xie:
Global H∞ Consensus of Multi-Agent Systems with Lipschitz Nonlinear Dynamics. - John Fearnley, Doron A. Peled, Sven Schewe:
Synthesis of Succinct Systems. - Arkaitz Zubiaga:
Enhancing Navigation on Wikipedia with Social Tags. - (Withdrawn) On the convergence of FOCUSS algorithm for sparse representation.
- Jiasong Wu, Xu Zhang, Xiaoqing Wang, Lotfi Senhadji, Huazhong Shu:
L1-norm minimization for quaternion signals. - Pan Cao, Eduard A. Jorswieck, Shuying Shi:
On the Pareto Boundary for the Two-User Single-Beam MIMO Interference Channel. - Arkaitz Zubiaga, Raquel Martínez-Unanue, Víctor Fresno:
Analyzing Tag Distributions in Folksonomies for Resource Classification. - Khawar Hasham, Antonio Delgado Peris, Ashiq Anjum, Dave Evans, Dirk Hufnagel, Eduardo Huedo, José M. Hernández, Richard McClatchey, Stephen Gowdy, Simon Metson:
CMS Workflow Execution using Intelligent Job Scheduling and Data Access Strategies. - Hanene Boussi Rahmouni, Kamran Munir, Mohammed Odeh, Richard McClatchey:
Risk-Driven Compliant Access Controls for Clouds. - Zaheer Abbas Khan, David Ludlow, Richard McClatchey, Ashiq Anjum:
An Architecture for Integrated Intelligence in Urban Management using Cloud Computing. - Jacob Beal, Stefan Dulman, Kyle Usbeck, Mirko Viroli, Nikolaus Correll:
Organizing the Aggregate: Languages for Spatial Computing. - Asif Osman, Ashiq Anjum, Naheed Batool, Richard McClatchey:
A Fault Tolerant, Dynamic and Low Latency BDII Architecture for Grids. - Ashiq Anjum, Peter Bloodsworth, Irfan Habib, Tom Lansdale, Richard McClatchey, Yasir Mehmood:
Reusable Services from the neuGRID Project for Grid-Based Health Applications. - Ashiq Anjum, Peter Bloodsworth, Andrew Branson, Irfan Habib, Richard McClatchey, Tony Solomonides:
Research Traceability using Provenance Services for Biomedical Analysis. - Saad Liaquat Kiani, Ashiq Anjum, Nick Antonopoulos, Michael Knappmeyer, Nigel Baker, Richard McClatchey:
Context-Aware Service Utilisation in the Clouds and Energy Conservation. - S. J. Thwaite, Pierre-Louis Giscard, D. Jaksch:
A basis for the ensemble of walks on digraphs with non-commuting edge weights. - Sanam Sadr, Raviraj Adve:
Hierarchical Resource Allocation in Femtocell Networks using Graph Algorithms. - Matthieu R. Bloch, Jörg Kliewer:
On Secure Communication with Constrained Randomization. - Yin Wang, R. Kent Dybvig:
Register Allocation By Model Transformer Semantics. - Vu Anh Huynh, Sertac Karaman, Emilio Frazzoli:
An Incremental Sampling-based Algorithm for Stochastic Optimal Control. - Javad Azimi, Ali Jalali, Xiaoli Z. Fern:
Hybrid Batch Bayesian Optimization. - Ali Jalali, Nathan Srebro:
Clustering using Max-norm Constrained Optimization. - Wei Mao, Matthew Thill, Babak Hassibi:
On the Ingleton-Violating Finite Groups and Group Network Codes. - Frank Broz, Chrystopher L. Nehaniv, Hatice Kose-Bagci, Kerstin Dautenhahn:
Interaction Histories and Short Term Memory: Enactive Development of Turn-taking Behaviors in a Childlike Humanoid Robot. - N. Md. Jubair Basha, Salman Abdul Moiz:
A Framework Studio for Component Reusability. - Sariel Har-Peled, Benjamin Raichel:
Fréchet Distance Revisited and Extended. - Katherine A. Bold, Karthikeyan Rajendran, Balázs Ráth, Ioannis G. Kevrekidis:
An equation-free approach to coarse-graining the dynamics of networks. - Soroush Alamdari, Elaheh Fata, Stephen L. Smith:
Min-Max Latency Walks: Approximation Algorithms for Monitoring Vertex-Weighted Graphs. - Debarghya Ghoshdastidar, Ambedkar Dukkipati, Shalabh Bhatnagar:
q-Gaussian based Smoothed Functional Algorithm for Stochastic Optimization. - Suman Saha, Saptarshi Das, Ratna Ghosh, Bhaswati Goswami, Amitava Gupta, R. Balasubramanian, A. K. Chandra, Shantanu Das:
Fractional Order Phase Shaper Design with Routh's Criterion for Iso-damped Control System. - Pawel Gawrychowski:
(Really) Tight bounds for dispatching binary methods. - Indranil Pan, Saptarshi Das, Amitava Gupta:
Handling Packet Dropouts and Random Delays for Unstable Delayed Processes in NCS by Optimal Tuning of PIλDμ Controllers with Evolutionary Algorithms. - Robert Krauthgamer, Tamar Zondiner:
Preserving Terminal Distances using Minors. - Saptarshi Das, Suman Saha, Shantanu Das, Amitava Gupta:
On the Selection of Tuning Methodology of FOPID Controllers for the Control of Higher Order Processes. - Saptarshi Das, Indranil Pan, Shantanu Das, Amitava Gupta:
A Novel Fractional Order Fuzzy PID Controller and Its Optimal Time Domain Tuning Based on Integral Performance Indices. - Saptarshi Das, Indranil Pan, Shantanu Das, Amitava Gupta:
Improved Model Reduction and Tuning of Fractional Order PIλDμ Controllers for Analytical Rule Extraction with Genetic Programming. - Saptarshi Das, Shantanu Das, Amitava Gupta:
Fractional Order Modeling of a PHWR Under Step-Back Condition and Control of Its Global Power with a Robust PIλDμ Controller. - Lavanya Sivakumar, Matthias Dehmer:
Information inequalities and Generalized Graph Entropies. - Saptarshi Das, Indranil Pan, Shantanu Das, Amitava Gupta:
Genetic Algorithm Based Improved Sub-Optimal Model Reduction in Nyquist Plane for Optimal Tuning Rule Extraction of PID and PIλDμ Controllers via Genetic Programming. - Basudev Majumder, Saptarshi Das, Indranil Pan, Sayan Saha, Shantanu Das, Amitava Gupta:
Estimation, Analysis and Smoothing of Self-Similar Network Induced Delays in Feedback Control of Nuclear Reactors. - Ayan Mukherjee, Anindya Pakhira, Saptarshi Das, Indranil Pan, Amitava Gupta:
Embedded Network Test-Bed for Validating Real-Time Control Algorithms to Ensure Optimal Time Domain Performance. - Saptarshi Das, Sayan Saha, Ayan Mukherjee, Indranil Pan, Amitava Gupta:
Adaptive Gain and Order Scheduling of Optimal Fractional Order PIλDμ Controllers with Radial Basis Function Neural-Network. - Saptarshi Das, Basudev Majumder, Anindya Pakhira, Indranil Pan, Shantanu Das, Amitava Gupta:
Optimizing Continued Fraction Expansion Based IIR Realization of Fractional Order Differ-Integrators with Genetic Algorithm. - George E. Dahl, Ryan Prescott Adams, Hugo Larochelle:
Training Restricted Boltzmann Machines on Word Observations. - Michalis Potamias:
The warm-start bias of Yelp ratings. - Danny Z. Chen, Haitao Wang:
Computing L1 Shortest Paths among Polygonal Obstacles in the Plane. - Sibin Mohan, Stanley Bak, Emiliano Betti, Heechul Yun, Lui Sha, Marco Caccamo:
S3A: Secure System Simplex Architecture for Enhanced Security of Cyber-Physical Systems. - Stefan Kratsch, Marcin Pilipczuk, Michal Pilipczuk, Magnus Wahlström:
Fixed-parameter tractability of multicut in directed acyclic graphs. - Kirill Kogan, Alejandro López-Ortiz, Gabriel Scalosub, Michael Segal:
Large Profits or Fast Gains: A Dilemma in Maximizing Throughput with Applications to Network Processors. - Inge Li Gørtz, Viswanath Nagarajan, Rishi Saket:
Stochastic Vehicle Routing with Recourse. - Zi-Ke Zhang, Tao Zhou, Yi-Cheng Zhang:
Tag-Aware Recommender Systems: A State-of-the-art Survey. - Alexander K. Petrenko, Holger Schlingloff:
Proceedings 7th Workshop on Model-Based Testing, MBT 2012, Tallinn, Estonia, 25 March 2012. EPTCS 80, 2012 [contents] - Pin-Hsun Lin, Szu-Hsiang Lai, Shih-Chun Lin, Hsuan-Jung Su:
On Secrecy Rate of the Generalized Artificial-Noise Assisted Secure Beamforming for Wiretap Channels. - Deyu Meng:
Divide-and-Conquer Method for L1 Norm Matrix Factorization in the Presence of Outliers and Missing Data. - Giorgio Delzanno, Arnaud Sangnier, Riccardo Traverso, Gianluigi Zavattaro:
The Cost of Parameterized Reachability in Mobile Ad Hoc Networks. - Alex Escala, Javier Herranz, Benoît Libert, Carla Ràfols:
Hierarchical Identity-Based Lossy Trapdoor Functions. - Camilla Hollanti, Nadya Markin:
Algebraic Fast-Decodable Relay Codes for Distributed Communications. - Marek Karpinski, Andrzej Rucinski, Edyta Szymanska:
Approximate Counting of Matchings in Sparse Hypergraphs. - Ashwin Ganesan:
Diameter of Cayley graphs generated by transposition trees. - Kai Stapel, Kurt Schneider:
FLOW-Methode - Methodenbeschreibung zur Anwendung von FLOW. - Nicolae Constantinescu:
Estimators in Cryptography. - Qasim Siddique:
Intelligent Car System. - P. Chenna Reddy:
TCP over IEEE 802.11. - Alina Oana Zamosteanu:
Computer applications in clinical psychology. - Luc Devroye, Pat Morin:
A Note on Interference in Random Point Sets. - Ripunjai Kumar Shukla, Soubhik Chakraborty:
On an Ethical Use of Neural Networks: A Case Study on a North Indian Raga. - Angelos Antonopoulos, Christos V. Verikoukis:
Game Theoretic Network Coding-aided MAC for Data Dissemination towards Energy Efficiency. - Dariusz Biernacki, Sergueï Lenglet:
Normal Form Bisimulations for Delimited-Control Operators. - Muhammad Taimoor Khan, Anila Usman:
Technique detection software for Sparse Matrices. - Deniz Gündüz, Elza Erkip, Andrea Goldsmith, H. Vincent Poor:
Joint Source-Channel Cooperative Transmission over Relay-Broadcast Networks. - Romain Giot, Mohamad El-Abed, Christophe Rosenberger:
Fast computation of the performance evaluation of biometric systems: application to multibiometric. - Josep Domingo-Ferrer:
Marginality: a numerical mapping for enhanced treatment of nominal and hierarchical attributes. - Christian Borgs, Michael Brautbar, Jennifer T. Chayes, Sanjeev Khanna, Brendan Lucier:
The Power of Local Information in Social Networks. - Nicholas Ruozzi:
The Bethe Partition Function of Log-supermodular Graphical Models. - Noam Wagner, Yonina C. Eldar, Arie Feuer, Zvi Friedman:
Compressed Beamforming in Ultrasound Imaging. - Marjan A. Baghaie, Dorit S. Hochbaum, Bhaskar Krishnamachari:
Multiflow Transmission in Delay Constrained Cooperative Wireless Networks. - Kevin S. Xu, Mark Kliger, Alfred O. Hero III:
A Regularized Graph Layout Framework for Dynamic Network Visualization. - Marcello Mamino:
On the computational complexity of a game of cops and robbers. - Venkatesan Guruswami, Ali Kemal Sinop, Yuan Zhou:
Constant Factor Lasserre Integrality Gaps for Graph Partitioning Problems. - Aleks Kissinger:
Synthesising Graphical Theories. - Venkatesan Guruswami, Srivatsan Narayanan:
Combinatorial limitations of a strong form of list decoding. - Liangzhong Ruan, Vincent K. N. Lau:
Interference Alignment for Partially Connected MIMO Cellular Networks. - Nitin H. Vaidya, Lewis Tseng, Guanfeng Liang:
Iterative Approximate Byzantine Consensus in Arbitrary Directed Graphs - Part II: Synchronous and Asynchronous Systems. - Yung-Yih Jian, Henry D. Pfister, Krishna R. Narayanan:
Approaching Capacity at High-Rates with Iterative Hard-Decision Decoding. - Parikshit Ram, Alexander G. Gray:
Maximum Inner-Product Search using Tree Data-structures. - Nesrine Ben Yahia, Narjès Bellamine Ben Saoud, Henda Ben Ghézala:
On the Convergence of Collaboration and Knowledge Management. - Kazutaka Kurihara, Koji Tsukada:
SpeechJammer: A System Utilizing Artificial Speech Disturbance with Delayed Auditory Feedback. - Maia Fraser:
Local Routing in Graphs Embedded on Surfaces of Arbitrary Genus. - Christos G. Cassandras, Xuchao Lin, Xu Chu Ding:
An Optimal Control Approach to the Persistent Monitoring Problem. - Ina Schieferdecker, Juergen Grossmann, Martin A. Schneider:
Model-Based Security Testing. 1-12 - Jan Olaf Blech, Dongyue Mou, Daniel Ratiu:
Reusing Test-Cases on Different Levels of Abstraction in a Model Based Development Tool. 13-27 - Maximiliano Cristiá, Claudia S. Frydman:
Applying SMT Solvers to the Test Template Framework. 28-42 - Dirk Richter, Christian Berg:
Exact Gap Computation for Code Coverage Metrics in ISO-C. 43-57 - Teemu Kanstrén, Olli-Pekka Puolitaival:
Using Built-In Domain-Specific Modeling Support to Guide Model-Based Test Generation. 58-72 - Bernhard K. Aichernig, Elisabeth Jöbstl:
Towards Symbolic Model-Based Mutation Testing: Combining Reachability and Refinement Checking. 88-102 - Gerjan Stokkink, Mark Timmer, Mariëlle Stoelinga:
Talking quiescence: a rigorous theory that supports parallel composition, action hiding and determinisation. 73-87 - Dimitry Polivaev:
Rule-based Test Generation with Mind Maps. 103-114 - Danel Ahman, Marko Kääramees:
Constraint-Based Heuristic On-line Test Generation from Non-deterministic I/O EFSMs. 115-129 - Yevgeny Gerlits, Alexey V. Khoroshilov:
Model-Based Testing of Safety Critical Real-Time Control Logic Software. 130-144 - Jianfeng Zhan, Lixin Zhang, Ninghui Sun, Lei Wang, Zhen Jia, Chunjie Luo:
High Volume Throughput Computing: Identifying and Characterizing Throughput Oriented Workloads in Data Centers. - Dohy Hong:
D-iteration: evaluation of the update algorithm. - Zhiyong Wang, Huarui Yin, Wenyi Zhang, Guo Wei:
Monobit Digital Receivers for QPSK: Design, Analysis and Performance. - Peter Baumgartner, Evgenij Thorstensen:
Instance Based Methods --- A Brief Overview. - Marcus Hutter:
One Decade of Universal Artificial Intelligence. - Luca Rose, Samir Medina Perlaza, Mérouane Debbah, Christophe J. Le Martret:
Distributed Power Allocation with SINR Constraints Using Trial and Error Learning. - Dohy Hong:
Optimized on-line computation of PageRank algorithm. - Alina Oana Zamosteanu:
E-learning and use of computer in forensic field. - Eddy Chiu, Vincent K. N. Lau, Shunqing Zhang, Bao S. M. Mok:
Precoder Design for Multi-antenna. - Kiril Solovey, Dan Halperin:
k-Color Multi-Robot Motion Planning. - Roghayeh Joda, Farshad Lahouti:
Delay-limited Source and Channel Coding of Quasi-Stationary Sources over Block Fading Channels: Design and Scaling Laws. - Marcus Hutter:
Can Intelligence Explode? - Pierre Machart, Liva Ralaivola:
Confusion Matrix Stability Bounds for Multiclass Classification. - Loet Leydesdorff, Daniele Rotolo, Wouter de Nooy:
Innovation as a Nonlinear Process, the Scientometric Perspective, and the Specification of an "Innovation Opportunities Explorer". - R. Gnanajeyaraman, G. Seenivasan:
Diagonalization Matrix Method of Solving the First Problem of Hidden Markov Model in Speech Recognition System. - Gregory Z. Gutin, Mark Jones:
Note on Existence and Non-Existence of Large Subsets of Binary Vectors with Similar Distances. - Ali Sadiqui, Noureddine Chenfour:
Realisation d'un systeme de reconnaissance automatique de la parole arabe base sur CMU Sphinx. - Arnaud Carayol, Zoltán Ésik:
The FC-rank of a context-free language. - Aly El Gamal, V. Sreekanth Annapureddy, Venugopal V. Veeravalli:
On Optimal Message Assignments for Interference Channels with CoMP Transmission. - Jordi Arjona Aroca, Antonio Fernández Anta:
Bisection (Band)Width of Product Networks with Application to Data Centers. - Naveen Goela, Michael Gastpar:
Reduced-Dimension Linear Transform Coding of Correlated Signals in Networks. - Aris L. Moustakas, Nicholas Bambos:
Power Optimization on a Network: The effects of randomness. - Matthias Baaz, Agata Ciabattoni, Christian G. Fermüller:
Theorem proving for prenex Gödel logic with Delta: checking validity and unsatisfiability. - Bernhard Haslhofer, Robert Sanderson, Rainer Simon, Herbert Van de Sompel:
Open Annotations on Multimedia Web Resources. - Arthur Szlam, Karol Gregor, Yann LeCun:
Fast approximations to structured sparse coding and applications to object classification. - Shiwali Mohan, John E. Laird:
Relational Reinforcement Learning in Infinite Mario. - Stephen A. Fenner:
Functions that preserve p-randomness. - Erik Agrell, Alex Alvarado:
Signal Shaping for BICM at Low SNR. - Jerry Anderson Pinheiro, Marcelo Firer:
Classification of poset-block spaces admitting MacWilliams-type identity. - Boulat A. Bash, Dennis Goeckel, Don Towsley:
Square Root Law for Communication with Low Probability of Detection on AWGN Channels. - Deanna Needell, Rachel A. Ward:
Stable image reconstruction using total variation minimization. - Obaid Ur Rehman, Ian R. Petersen, Baris Fidan:
A Mean Value Theorem Approach to Robust Control Design for Uncertain Nonlinear Systems. - Fumika Kino, Yushi Uno:
Solving Tantrix via Integer Programming. - Marcos Villagra, Masaki Nakanishi, Shigeru Yamashita, Yasuhiko Nakashima:
Tensor Rank and Strong Quantum Nondeterminism in Multiparty Communication. - Arvind Ganesh, Kerui Min, John Wright, Yi Ma:
Principal Component Pursuit with Reduced Linear Measurements. - Mingzhi Zhu, Gennian Ge:
Quaternary Constant-Composition Codes with Weight Four and Distances Five or Six. - Valerie King, Jared Saia, Maxwell Young:
Resource-Competitive Communication. - Xiaomu Shi, Jean-François Monin, Frédéric Tuong, Frédéric Blanqui:
First steps towards the certification of an ARM simulator using Compcert. - Frédéric Blanqui, Adam Koprowski:
CoLoR: a Coq library on well-founded rewrite relations and its application to the automated verification of termination certificates. - Eran Sharon, Idan Alrod:
Coding Scheme for Optimizing Random I/O Performance. - Seunghyun Lee, Kaibin Huang:
Coverage and Economy of Cellular Networks with Many Base Stations. - Michal Ciesla, Przemyslaw Koziol:
Eye Pupil Location Using Webcam. - Davide Albanese, Roberto Visintainer, Stefano Merler, Samantha Riccadonna, Giuseppe Jurman, Cesare Furlanello:
mlpy: Machine Learning Python. - Saeid Haghighatshoar, Emmanuel Abbe, Emre Telatar:
Adaptive sensing using deterministic partial Hadamard matrices. - Deyu Meng, Yee Leung, Qian Zhao, Zongben Xu:
Dictionary learning under global sparsity constraint. - Jesper Larsson Träff:
Simplified, stable parallel merging. - Giovanni Viglietta:
Lemmings is PSPACE-complete. - Luis Quesada, Fernando Berzal, Francisco J. Cortijo:
A Lexical Analysis Tool with Ambiguity Support. - Luis Quesada, Alejandro J. León:
Filling-Based Techniques Applied to Object Projection Feature Estimation. - A. T. Akinwale, F. T. Ibharalu:
Password Authentication Scheme with Secured Login Interface. - Luis Quesada, Fernando Berzal, Juan C. Cubero:
A Model-Driven Parser Generator, from Abstract Syntax Trees to Abstract Syntax Graphs. - Shuangyu Luo, Jiangyuan Li, Athina P. Petropulu:
Physical Layer Security with Uncoordinated Helpers Implementing Cooperative Jamming. - Shuangyu Luo, Jiangyuan Li, Athina P. Petropulu:
Outage Constrained Secrecy Rate Maximization Using Cooperative Jamming. - Bin Fu, Wenfeng Li, Zhiyong Peng:
Sublinear Time Approximate Sum via Uniform Random Sampling. - Ioan Despi, Lucian Luca:
On the Role of Service Concept in IT. - Xin Shuai, Ying Ding, Jerome R. Busemeyer:
Multiple spreaders affect the indirect influence on Twitter. - Claudine Métral, Nizar Ghoula, Gilles Falquet:
Towards an Integrated Visualization Of Semantically Enriched 3D City Models: An Ontology of 3D Visualization Techniques. - Igor L. Markov, Mehdi Saeedi:
Constant-Optimized Quantum Circuits for Modular Multiplication and Exponentiation. - Qusay F. Hassan:
Aspects of SOA: An Entry Point for Starters. - Edith Hemaspaandra, Lane A. Hemaspaandra, Curtis Menton:
Search versus Decision for Election Manipulation Problems. - Marek Cygan:
Deterministic parameterized connected vertex cover. - Edith Hemaspaandra, Lane A. Hemaspaandra, Jörg Rothe:
Controlling Candidate-Sequential Elections. - Oner Orhan, Elza Erkip:
Optimal Transmission Policies for Energy Harvesting Two-hop Networks. - Edith Hemaspaandra, Lane A. Hemaspaandra, Jörg Rothe:
The Complexity of Online Manipulation of Sequential Elections. - Chinmay S. Vaze, Mahesh K. Varanasi:
Independent signaling achieves the capacity region of the Gaussian interference channel with common information to within one bit. - Bruno Bauwens:
Complexity of complexity and maximal plain versus prefix-free Kolmogorov complexity. - Koorosh Firouzbakht, Guevara Noubir, Masoud Salehi:
On the Capacity of Rate-Adaptive Packetized Wireless Communication Links under Jamming. - Alin Deutsch, Richard Hull, Avinash Vyas, Kevin Keliang Zhao:
Trajectory and Policy Aware Sender Anonymity in Location Based Services. - Ilias Diakonikolas, Ragesh Jaiswal, Rocco A. Servedio, Li-Yang Tan, Andrew Wan:
On the Distribution of the Fourier Spectrum of Halfspaces. - Massimiliano Dal Mas:
Faceted Semantic Search for Personalized Social Search. - Petros A. Petrosyan, Hrant Khachatrian, Hovhannes Tananyan:
Interval edge-colorings of Cartesian products of graphs I. - Renato Aparecido Pimentel da Silva, Matheus Palhares Viana, Luciano da Fontoura Costa:
Predicting epidemic outbreak from individual features of the spreaders. - Giuliano Armano, Marco Alberto Javarone:
An Interacting Particle Model for Clustering Euclidean Datasets. - Hiram H. Lopez, Carlos Rentería-Márquez, Rafael H. Villarreal:
Affine cartesian codes. - Alexander Kartzow:
First-Order Model Checking on Generalisations of Pushdown Graphs. - Gábor Hegedüs, Josef Schicho, Hans-Peter Schröcker:
Factorization of Rational Curves in the Study Quadric and Revolute Linkages. - Bhaskar Bagchi, Basudeb Datta:
Higher dimensional analogues of the map colouring problem. - Enys Mones, Lilla Vicsek, Tamás Vicsek:
Hierarchy measure for complex networks. - Chi Ho Yeung, David Saad:
The Competition for Shortest Paths on Sparse Graphs. - James P. Bagrow, Yu-Ru Lin:
Spatiotemporal features of human mobility. - Nguyen Tien Viet, François Baccelli:
Generating Functionals of Random Packing Point Processes: From Hard-Core to Carrier Sensing. - Graham White:
Reasoning about Unreliable Actions. - Masahito Hayashi:
Classical and quantum security analysis via smoothing of Renyi entropy of order 2. - Masahito Hayashi:
Quantum wiretap channel with non-uniform random number and its exponent and equivocation rate of leaked information. - Yinghong Ma, Huijia Li, Xiao-Dong Zhang:
The weighted tunable clustering in local-world networks with incremental behaviors. - Krasimir Yordzhev:
On an Application of Bipartite Graphs. - Eliza-Olivia Lungu, Ana-Maria Zamfir, Eva Militaru, Cristina Mocanu:
Occupational mobility network of the Romanian higher education graduates. - Alcides Viamontes Esquivel, Martin Rosvall:
Comparing network covers using mutual information. - Peter Beelen, Diego Ruano:
Bounding the number of points on a curve using a generalization of Weierstrass semigroups. - Bowen Yan, Steve Gregory:
Detecting Communities in Networks by Merging Cliques. - Matthew J. Salganik, Karen E. C. Levy:
Wiki surveys: Open and quantifiable social data collection. - Leo Lahti, Juha E. A. Knuuttila, Samuel Kaski:
Global modeling of transcriptional responses in interaction networks. - Makoto Yamada, Wittawat Jitkrittum, Leonid Sigal, Masashi Sugiyama:
High-Dimensional Feature Selection by Feature-Wise Non-Linear Lasso. - Saikat Guha, Si-Hui Tan, Mark M. Wilde:
Explicit capacity-achieving receivers for optical communication and quantum reading. - Manabu Hagiwara:
On ML-Certificate Linear Constraints for Rank Modulation with Linear Programming Decoding and its Application to Compact Graphs. - Masahito Hayashi:
Precise evaluation of leaked information with universal2 privacy amplification in the presence of quantum attacker. - Imre Csiszár, Frantisek Matús:
Generalized minimizers of convex integral functionals, Bregman distance, Pythagorean identities. - Ville Junnila, Tero Laihonen:
Optimal lower bound for 2-identifying code in the hexagonal grid. - Ville Junnila:
New lower bound for 2-identifying code in the square grid. - Toni Ernvall, Roope Vehkalahti:
Construction of MIMO MAC Codes Achieving the Pigeon Hole Bound. - Petros A. Petrosyan:
On maximum matchings in almost regular graphs. - Lorenzo Fagiano, Mustafa Khammash:
Simulation of stochastic systems via polynomial chaos expansions and convex optimization. - Minglai Cai, Ning Cai, Christian Deppe:
Capacities of classical compound quantum wiretap and classical quantum compound wiretap channels. - Vincent Q. Vu, Jing Lei:
Minimax Rates of Estimation for Sparse PCA in High Dimensions. - Sarang Aravamuthan, Biswajit Ganguly:
e-Valuate: A Two-player Game on Arithmetic Expressions. - Dirk Hofmann, Manuel A. Martins:
On a coalgebraic view on Logic. - Saieed Akbari, Jaehoon Kim, Alexandr V. Kostochka:
Harmonious Coloring of Trees with Large Maximum Degree. - Moez Draief, Milan Vojnovic:
Convergence Speed of Binary Interval Consensus. - Linyuan Lü, Matús Medo, Chi Ho Yeung, Yi-Cheng Zhang, Zi-Ke Zhang, Tao Zhou:
Recommender Systems. - Peter Harremoës, Gábor E. Tusnády:
Information Divergence is more chi squared distributed than the chi squared statistics. - Gautier Krings, Márton Karsai, Sebastian Bernhardsson, Vincent D. Blondel, Jari Saramäki:
Effects of time window size and placement on the structure of aggregated networks. - Kaveh Khoshkhah, Hossein Soltani, Manouchehr Zaker:
On dynamic monopolies of graphs: the average and strict majority thresholds. - Dohy Hong:
D-iteration method or how to improve Gauss-Seidel method. - Frank Schweitzer, Laxmidhar Behera:
Optimal migration promotes the outbreak of cooperation in heterogeneous populations. - Arnau Mir, Francesc Rosselló, Lucia Rotger:
A new balance index for phylogenetic trees. - (Withdrawn) Object-image correspondence for curves under projections.
- Ru Wang, Qiuping Alexandre Wang:
A dual modelling of evolving political opinion networks. - Nicolas Broutin, Ralph Neininger, Henning Sulzbach:
A limit process for partial match queries in random quadtrees. - Longbo Huang, Sameer Pawar, Hao Zhang, Kannan Ramchandran:
Codes Can Reduce Queueing Delay in Data Centers. - Ralph Neininger, Henning Sulzbach:
On a functional contraction method. - Vijay K. Samalam:
Preferential attachment alone is not sufficient to generate scale free random networks. - Michael H. Albert, M. D. Atkinson:
Pattern classes and priority queues. - Endre Csóka:
Random local algorithms. - Vida Dujmovic, Fabrizio Frati, Gwenaël Joret, David R. Wood:
Nonrepetitive Colourings of Planar Graphs with $O(\log n)$ Colours. - Tobias Sutter, Debasish Chatterjee, Federico Ramponi, John Lygeros:
Isospectral flows on a class of finite-dimensional Jacobi matrices. - Vinesh Rajpaul:
Genetic algorithms in astronomy and astrophysics. - Daniel E. Whitney:
Growth Patterns of Subway/Metro Systems Tracked by Degree Correlation. - Oleg O. Vasil'ev:
Counting and computing regions of $D$-decomposition: algebro-geometric approach. - Riccardo Murri:
Fatgraph Algorithms and the Homology of the Kontsevich Complex. - Geoffrey Pritchard, Reyhaneh Reyhani, Mark C. Wilson:
Power measures derived from the sequential query process. - Carlos Pedro Gonçalves:
Quantum Financial Economics of Games of Strategy and Financial Decisions. - Il Memming Park, Marcel Nassar, Mijung Park:
Active Bayesian Optimization: Minimizing Minimizer Entropy. - Ramij Rahaman, Priyadarshi Majumdar, Banasri Basu:
Quantum Cournot equilibrium for the Hotelling-Smithies model of product choice. - (Withdrawn) Spectral Estimation from Undersampled Data: Correlogram and Model-Based Least Squares.
- Kevin Leckey, Ralph Neininger:
Asymptotic analysis of Hoppe trees. - Bonnie Kirkpatrick, Kay Kirkpatrick:
Optimal State-Space Reduction for Pedigree Hidden Markov Models. - Wang Liang:
Segmenting DNA sequence into 'words' based on statistical language model. - David J. Hand, Christoforos Anagnostopoulos:
A better Beta for the H measure of classification performance. - Carol Christian, Chris J. Lintott, Arfon M. Smith, Lucy Fortson, Steven Bamford:
Citizen Science: Contributions to Astronomy Research. - Jacob D. Abernethy, Rafael M. Frongillo, Andre Wibisono:
Minimax Option Pricing Meets Black-Scholes in the Limit. - David I. Spivak:
Database queries and constraints via lifting problems. - James Allen Fill, Svante Janson:
The number of bit comparisons used by Quicksort: an average-case analysis. - James Allen Fill, Takéhiko Nakama:
Distributional convergence for the number of symbol comparisons used by QuickSelect. - James Allen Fill:
Distributional convergence for the number of symbol comparisons used by QuickSort. - Vida Dujmovic, Daniel J. Harvey, Gwenaël Joret, Bruce A. Reed, David R. Wood:
A linear-time algorithm for finding a complete graph minor in a dense graph. - Shenggen Zheng, Daowen Qiu, Lvzhou Li:
State succinctness of two-way finite automata with quantum and classical states. - Qian-Ming Zhang, Linyuan Lü, Wen-Qiang Wang, Yu-Xiao Zhu, Tao Zhou:
Potential Theory for Directed Networks. - Linyuan Lu, Zi-Ke Zhang, Tao Zhou:
Scaling Laws in Human Language. - Alan J. Cain, Victor Maltcev:
Markov semigroups, monoids, and groups. - Cristian E. La Rocca, Lidia A. Braunstein, Pablo A. Macri:
Synchronization in Scale Free networks with degree correlation. - Márton Karsai, Kimmo Kaski, János Kertész:
Correlated dynamics in egocentric communication networks. - Alexander Rothkegel, Klaus Lehnertz:
Conedy: a scientific tool to investigate Complex Network Dynamics. - D. V. Karpov:
Spanning trees with many leaves: new lower bounds in terms of number of vertices of degree~3 and at least~4. - Kausik Gangopadhyay, Banasri Basu:
Evolution of Zipf's Law for Indian Urban Agglomerations vis-à-vis Chinese Urban Agglomerations. - Ben D. Lund, George B. Purdy, Justin W. Smith:
Some Results Related to a Conjecture of Dirac's. - Gabriel H. Tucci, Philip A. Whiting:
Asymptotic Behavior of the Maximum and Minimum Singular Value of Random Vandermonde Matrices. - Lovro Subelj, Marko Bajec:
Clustering assortativity, communities and functional modules in real-world networks. - Mahnoosh Alizadeh, Anna Scaglione, Robert J. Thomas:
From Packet to Power Switching: Digital Direct Load Scheduling. - Anthony Nixon:
A Constructive Characterisation of Circuits in the Simple (2,2)-sparsity Matroid. - Iryna Andriyanova, Denise Maurice, Jean-Pierre Tillich:
New constructions of CSS codes obtained by moving to higher alphabets. - Eduardo Rivera-Campo, Virginia Urrutia-Galicia:
A sufficient condition for the existence of plane spanning trees on geometric graphs. - Crevel Bautista-Santiago, Javier Cano, Ruy Fabila Monroy, David Flores-Peñaloza, Hernán González-Aguilar, Dolores Lara, Eliseo Sarmiento, Jorge Urrutia:
On the Connectedness and Diameter of a Geometric Johnson Graph. - Mark M. Wilde, Ivan Savov:
Joint source-channel coding for a quantum multiple access channel. - Eduardo Sánchez-Burillo, Jordi Duch, Jesús Gómez-Gardeñes, David Zueco:
Navigating and Ranking Complex Networks Quantum. - Jaime Sanudo, Ricardo López-Ruiz:
Calculation of statistical entropic measures in a model of solids. - Taha Yasseri, Róbert Sumi, András Rung, András Kornai, János Kertész:
Dynamics of conflicts in Wikipedia. - Brendan P. W. Ames:
Guaranteed clustering and biclustering via semidefinite programming. - Lukasz Czajka:
Higher-order illative combinatory logic. - Vinayak A. Rao, Yee Whye Teh:
Fast MCMC sampling for Markov jump processes and continuous time Bayesian networks. - Inma Tur, Robert Castelo:
Learning mixed graphical models from data with p larger than n. - Chao Zhang, Dacheng Tao:
Risk Bounds for Infinitely Divisible Distribution. - Michael Schreiber:
Inconsistencies of Recently Proposed Citation Impact Indicators and how to Avoid Them. - Mélanie Dulong de Rosnay:
Check Your Data Freedom: A Taxonomy to Assess Life Science Database Openness. - Andrew V. Sutherland:
On the evaluation of modular polynomials. - Benjamin A. Burton:
Complementary vertices and adjacency testing in polytopes. - Katherine H. Kenyon, Arjun Paramasivam, Jiachin Tu, Albert Zhang, Alister W. Graham:
Citations to Australian Astronomy: 5 and 10 Year Benchmarks. - Matthias Walter, Klaus Truemper:
Implementation of a Unimodularity Test. - Anna Saumell-Mendiola, M. Ángeles Serrano, Marián Boguñá:
Epidemic spreading on interconnected networks. - Ahmed M. Mahran:
Perception Lie Paradox: Mathematically Proved Uncertainty about Humans Perception Similarity. - Phillip J. Schulte, Anastasios A. Tsiatis, Eric B. Laber, Marie Davidian:
Q- and A-learning Methods for Estimating Optimal Dynamic Treatment Regimes. - Razvan Barbulescu, Joppe W. Bos, Cyril Bouvier, Thorsten Kleinjung, Peter L. Montgomery:
Finding ECM-Friendly Curves through a Study of Galois Properties. - Massimo Riccaboni, Alessandro Rossi, Stefano Schiavo:
Global Networks of Trade and Bits. - Daniel Augot, François Morain:
Discrete logarithm computations over finite fields using Reed-Solomon codes. - Peyman Mohajerin Esfahani, Debasish Chatterjee, John Lygeros:
On Stochastic Reach-Avoid Problem and Set Characterization for Diffusions. - Paolo Lella:
Computable Hilbert Schemes. - Lori Ziegelmeier, Michael Kirby, Chris Peterson:
Locally Linear Embedding Clustering Algorithm for Natural Imagery. - Amac Herdagdelen, Wenyun Zuo, Alexander Gard-Murray, Yaneer Bar-Yam:
An Exploration of Social Identity: The Geography and Politics of News-Sharing Communities in Twitter. - Alexander V. Goltsev, Sergey N. Dorogovtsev, J. G. Oliveira, José F. F. Mendes:
Localization and Spreading of Diseases in Complex Networks. - David Balduzzi, Pedro A. Ortega, Michel Besserve:
Metabolic cost as an organizing principle for cooperative learning. - Oliver Knill:
On index expectation and curvature for networks. - Nicola Bellomo, Miguel A. Herrero, Andrea Tosin:
On the dynamics of social conflicts: looking for the Black Swan. - Loïc Michel:
A unified model-free controller for switching minimum phase, non-minimum phase and time-delay systems. - Yves Aubry, Jean-Christophe Godin, Olivier Togni:
Vectorial solutions to list multicoloring problems on graphs. - Basile Audoly, Nicolas Clauvelin, Pierre-Thomas Brun, Miklós Bergou, Eitan Grinspun, Max Wardetzky:
A discrete geometric approach for simulating the dynamics of thin viscous threads. - Emilie Coupechoux, Marc Lelarge:
How Clustering Affects Epidemics in Random Networks. - Daniele Marinazzo, Mario Pellicoro, Guo-Rong Wu, Leonardo Angelini, Sebastiano Stramaglia:
Information flow in a network model and the law of diminishing marginal returns. - Hamed O. Ghaffari, R. Paul Young:
Network Theory, Cracking and Frictional Sliding. - Jianbo Gao, Jing Hu, Xiang Mao, Matjaz Perc:
Culturomics meets random fractal theory: Insights into long-range correlations of social and natural phenomena over the past two centuries. - László Lovász, Katalin Vesztergombi:
Nondeterministic graph property testing. - Juyong Lee, Steven P. Gross, Jooyoung Lee:
Mod-CSA: Modularity optimization by conformational space annealing. - Marco Reisert, Henrik Skibbe:
Left-Invariant Diffusion on the Motion Group in terms of the Irreducible Representations of SO(3). - Cheikh Ndour, Simplice Dossou-Gbété:
Classification approach based on association rules mining for unbalanced data. - Joshua Erde:
Knight's Tours in Higher Dimensions. - Mohammed Abdullah:
The Cover Time of Random Walks on Graphs. - Suman Saha, Saptarshi Das, Ratna Ghosh, Bhaswati Goswami, R. Balasubramanian, A. K. Chandra, Shantanu Das, Amitava Gupta:
Design of a Fractional Order Phase Shaper for Iso-damped Control of a PHWR under Step-back Condition. - Markus Hegland, Paul C. Leopardi:
Sparse grid quadrature on products of spheres. - Hsin-Hao Lai, Ko-Wei Lih:
Chordal Graphs are Fully Orientable. - Gabriel Beaulieu, Kyle G. Burke, Éric Duchêne:
Impartial coloring games. - Raoul Blankertz, Joachim von zur Gathen, Konstantin Ziegler:
Compositions and collisions at degree p2. - Andrew D. Barbour, Gesine Reinert:
Asymptotic behaviour of gossip processes and small world networks. - Rodrigo Aldecoa, Ignacio Marín:
Closed benchmarks for network community structure characterization. - Ruedi Stoop, Patrick Nüesch, Ralph Lukas Stoop, Leonid Bunimovich:
Fly out-smarts man. - Jannis Bulian, Ian M. Hodkinson:
Bare canonicity of representable cylindric and polyadic algebras. - Hyokun Yun, S. V. N. Vishwanathan:
Efficiently Sampling Multiplicative Attribute Graphs Using a Ball-Dropping Process. - Fabio Pasqualetti, Florian Dörfler, Francesco Bullo:
Attack Detection and Identification in Cyber-Physical Systems -- Part II: Centralized and Distributed Monitor Design. - Hal Daumé III, Jeff M. Phillips, Avishek Saha, Suresh Venkatasubramanian:
Protocols for Learning Classifiers on Distributed Data. - Dimitrios Giannakis, Andrew J. Majda:
Nonlinear Laplacian spectral analysis: Capturing intermittent and low-frequency spatiotemporal patterns in high-dimensional data. - Jianfeng Hou:
Acyclic edge coloring of sparse graphs. - Fabio Pasqualetti, Florian Dörfler, Francesco Bullo:
Attack Detection and Identification in Cyber-Physical Systems -- Part I: Models and Fundamental Limitations. - Lawrence Murray:
GPU acceleration of the particle filter: the Metropolis resampler. - Dohy Hong:
D-iteration: Evaluation of the Asynchronous Distributed Computation. - Daniela Kühn, Deryk Osthus:
Hamilton decompositions of regular expanders: a proof of Kelly's conjecture for large tournaments. - Emilie Morvant, Sokol Koço, Liva Ralaivola:
PAC-Bayesian Generalization Bound on Confusion Matrix for Multi-Class Classification. - Nicolas Le Roux, Mark Schmidt, Francis R. Bach:
A Stochastic Gradient Method with an Exponential Convergence Rate for Strongly-Convex Optimization with Finite Training Sets. - Mario Ullrich:
Rapid mixing of Swendsen-Wang and single-bond dynamics in two dimensions. - Lisi D'Alfonso, Gabriela Jeronimo, Pablo Solernó:
Effective Differential Lüroth's Theorem. - Lazaros K. Gallos, Pablo Barttfeld, Shlomo Havlin, Mariano Sigman, Hernán A. Makse:
Collective behavior and critical fluctuations in the spatial spreading of obesity, diabetes and cancer. - Jakob Lemvig, Christopher Miller, Kasso A. Okoudjou:
Prime tight frames. - José Fernando Fontanari, Marie-Claude Bonniot-Cabanac, Michel Cabanac, Leonid I. Perlovsky:
A structural model of emotions of cognitive dissonances. - Dragana Bajovic, João Manuel Freitas Xavier, José M. F. Moura, Bruno Sinopoli:
Consensus and Products of Random Stochastic Matrices: Exact Rate for Convergence in Probability. - Krikamol Muandet, Bernhard Schölkopf, Kenji Fukumizu, Francesco Dinuzzo:
Learning from Distributions via Support Measure Machines. - Mariusz Slonina, Krzysztof Gozdziewski, Cezary Migaszewski:
Mechanic: a new numerical MPI framework for the dynamical astronomy. - Min Liang, Li Yang:
On Quantum Turing Machine Halting Deterministically. - Pascal Schweitzer:
On Zero Divisors with Small Support in Group Rings of Torsion-Free Groups. - François G. Meyer, Xilin Shen:
Perturbation of the Eigenvectors of the Graph Laplacian: Application to Image Denoising. - Ahmed Barnawi, Abdulrahman H. Altalhi, M. Rizwan Jameel Qureshi, Asif Irshad Khan:
Novel Component-Based Development Model for SIP-Based Mobile Application (1202). - Nathanaël Schaeffer:
Efficient Spherical Harmonic Transforms aimed at pseudo-spectral numerical simulations. - Johannes Blümlein, Alexander Hasselhuhn, Carsten Schneider:
Evaluation of Multi-Sums for Large Scale Problems. - Igor G. Vladimirov, Ian R. Petersen:
Gaussian Stochastic Linearization for Open Quantum Systems Using Quadratic Approximation of Hamiltonians. - Timothy John Sullivan, Mike McKerns, Dominik Meyer, Florian Theil, Houman Owhadi, Michael Ortiz:
Optimal uncertainty quantification for legacy data observations of Lipschitz functions.
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.