default search action
CoRR, April 2005
- Andris Ambainis:
Probabilistic and Team PFIN-type Learning: General Properties. - Seon-Yeong Han, Nael B. Abu-Ghazaleh:
On the Effect of Fading on Ad hoc Networking. - Jun Chen, Chao Tian, Toby Berger, Sheila S. Hemami:
Multiple Description Quantization via Gram-Schmidt Orthogonalization. - Henning Bostelmann:
Statistical analysis of quality measures for mobile ad hoc networks. - Boris Ryabko, Jaakko Astola, Karen O. Egiazarian:
Fast Codes for Large Alphabets. - B. Ya. Ryabko, V. A. Monarev:
Using Information Theory Approach to Randomness Testing. - David Michael Turner, Vassilis Prevelakis, Angelos D. Keromytis:
The Bandwidth Exchange Architecture. - G. Raju Renjit:
An Extention to Object Oriented Programming Languages. - N. Srinivasan, C. Sanjeevakumar, L. Sudarsan, M. Kasi Rajan, R. Venkatesh:
Towards a Group Theoretic Quantum Encryption Scheme Based on Generalized Hidden Subgroup Problem. - P. Oscar Boykin, Vwani P. Roychowdhury:
Reversible Fault-Tolerant Logic. - Tadashi Wadayama:
Average Coset Weight Distribution of Combined LDPC Matrix Ensemble. - Luíz Henrique Gomes, Fernando D. O. Castro, Rodrigo B. Almeida, Luís M. A. Bettencourt, Virgílio A. F. Almeida, Jussara M. Almeida:
Improving Spam Detection Based on Structural Similarity. - Christine A. Kelley, Deepak Sridhara:
Pseudocodewords of Tanner graphs. - João Barros, Sergio D. Servetto:
Network Information Flow with Correlated Sources. - Fang Xu, Timothy N. Davidson, Jian-Kang Zhang, Kon Max Wong:
Design of Block Transceivers with Decision Feedback Detection. - Olgica Milenkovic, Navin Kashyap, David Leyba:
Shortened Array Codes of Large Girth. - Marcin Sikora, Daniel J. Costello Jr.:
A new SISO algorithm with application to turbo equalization. - Olivier Brunet:
A Rule-Based Logic for Quantum Information. - Guilin Wang, Feng Bao, Changshe Ma, Kefei Chen:
Efficient Authenticated Encryption Schemes with Public Verifiability. - G. David Forney Jr.:
The Viterbi Algorithm: A Personal History. - Xiaofei Huang:
Near Perfect Decoding of LDPC Codes. - Lillian Lee:
A Matter of Opinion: Sentiment Analysis and Business Intelligence (position paper). - Ioannis Giotis, Venkatesan Guruswami:
Correlation Clustering with a Fixed Number of Clusters. - Krzysztof R. Apt, Sebastian Brand:
Constraint-Based Qualitative Simulation. - G. Raju Renjit:
Introducing a New Datatype in Programming Languages. - Yongxi Cheng, Xiaoming Sun, Yiqun Lisa Yin:
Searching Monotone Multi-dimensional Arrays. - Víctor Dalmau:
Linear Datalog and Bounded Path Duality of Relational Structures. - Michael Peleg, Amichai Sanderovich, Shlomo Shamai:
On Extrinsic Information of Good Codes Operating Over Discrete Memoryless Channels. - Damon Mosk-Aoyama, Devavrat Shah:
Fast Distributed Algorithms for Computing Separable Functions. - Joris M. Mooij, Hilbert J. Kappen:
Sufficient conditions for convergence of the Sum-Product Algorithm. - Gilson A. Giraldi, Antonio Alberto Fernandes de Oliveira:
Convexity Analysis of Snake Models Based on Hamiltonian Formulation. - Marc P. C. Fossorier:
Critical Point for Maximum Likelihood Decoding of Linear Block Codes. - Arshad Ali, Ashiq Anjum, Tahir Azim, Julian J. Bunn, Atif Mehmood, Richard McClatchey, Harvey B. Newman, Waqas ur Rehman, Conrad Steenberg, Michael Thomas, Frank van Lingen, Ian Willers, Muhammad Adeel Zafar:
Resource Management Services for a Grid Analysis Environment. - Arshad Ali, Ashiq Anjum, Tahir Azim, Julian J. Bunn, Saima Iqbal, Richard McClatchey, Harvey B. Newman, S. Yousaf Shah, Tony Solomonides, Conrad Steenberg, Michael Thomas, Frank van Lingen, Ian Willers:
Heterogeneous Relational Databases for a Grid-enabled Analysis Environment. - Shane Legg, Marcus Hutter:
Fitness Uniform Deletion: A Simple Way to Preserve Diversity. - Richard K. Belew:
Scientific impact quantity and quality: Analysis of two sources of bibliographic data. - K. P. N. Murthy, M. Janani, B. Shenbga Priya:
Bayesian Restoration of Digital Images Employing Markov Chain Monte Carlo a Review. - Bodo Manthey:
On Approximating Restricted Cycle Covers. - A. G. Grozin:
TeXmacs-maxima interface. - Jeremie Leguay, Timur Friedman, Vania Conan:
DTN Routing in a Mobility Pattern Space. - Vitaly Schetinin, Joachim Schult:
Learning Polynomial Networks for Classification of Clinical Electroencephalograms. - Vitaly Schetinin, Jonathan E. Fieldsend, Derek Partridge, Wojtek J. Krzanowski, Richard M. Everson, Trevor C. Bailey, Adolfo Hernández:
The Bayesian Decision Tree Technique with a Sweeping Strategy. - Vitaly Schetinin, Derek Partridge, Wojtek J. Krzanowski, Richard M. Everson, Jonathan E. Fieldsend, Trevor C. Bailey, Adolfo Hernández:
Experimental Comparison of Classification Uncertainty for Randomised and Bayesian Decision Tree Ensembles. - Michael Thomas, Conrad Steenberg, Frank van Lingen, Harvey B. Newman, Julian J. Bunn, Arshad Ali, Richard McClatchey, Ashiq Anjum, Tahir Azim, Waqas ur Rehman, Faisal Khan, Jang-uk In:
JClarens: A Java Framework for Developing and Deploying Web Services for Grid Computing. - Stephanie Wehner:
Analyzing Worms and Network Traffic using Compression. - George M. Gemelos, Tsachy Weissman:
On the Entropy Rate of Pattern Processes. - David Doty, Jared Nichols:
Pushdown dimension. - Scott Aaronson:
Oracles Are Subtle But Not Malicious. - Gil I. Shamir:
Bounds on the Entropy of Patterns of I.I.D. Sequences. - Ivan Lanese, Ugo Montanari:
Mapping Fusion and Synchronized Hyperedge Replacement into Logic Programming. - Tassos Argyros, David R. Cheriton:
A Scalable Stream-Oriented Framework for Cluster Applications. - Vitaly Schetinin, Joachim Schult, Burkhart Scheidt, Valery Kuriakin:
Learning Multi-Class Neural-Network Models from Electroencephalograms. - Valentina V. Zharkova, Vitaly Schetinin:
A Neural-Network Technique for Recognition of Filaments in Solar Images. - Vitaly Schetinin:
Learning from Web: Review of Approaches. - Vitaly Schetinin:
A Learning Algorithm for Evolving Cascade Neural Networks. - Vitaly Schetinin:
Self-Organizing Multilayered Neural Networks of Optimal Complexity. - Vitaly Schetinin, Anatoly Brazhnikov:
Diagnostic Rule Extraction Using Neural Networks. - Vitaly Schetinin:
Polynomial Neural Networks Learnt to Classify EEG Signals. - Vitaly Schetinin:
A Neural Network Decision Tree for Learning Concepts from EEG Data. - George M. Gemelos, Styrmir Sigurjonsson, Tsachy Weissman:
Universal Minimax Discrete Denoising under Channel Uncertainty. - Stergos D. Afantenos, Vangelis Karkaletsis, Panagiotis Stamatopoulos:
Summarization from Medical Documents: A Survey. - Irit Dinur, Elchanan Mossel, Oded Regev:
Conditional Hardness for Approximate Coloring. - Zsolt Palotai, Csilla Farkas, András Lörincz:
Selection in Scale-Free Small World. - Vitaly Schetinin, Joachim Schult, Anatoly Brazhnikov:
Neural-Network Techniques for Visual Mining Clinical Electroencephalograms. - Vitaly Schetinin, Jonathan E. Fieldsend, Derek Partridge, Wojtek J. Krzanowski, Richard M. Everson, Trevor C. Bailey, Adolfo Hernández:
Estimating Classification Uncertainty of Bayesian Decision Tree Technique on Financial Data. - Vitaly Schetinin, Jonathan E. Fieldsend, Derek Partridge, Wojtek J. Krzanowski, Richard M. Everson, Trevor C. Bailey, Adolfo Hernández:
Comparison of the Bayesian and Randomised Decision Tree Ensembles within an Uncertainty Envelope Technique. - Vitaly Schetinin:
An Evolving Cascade Neural Network Technique for Cleaning Sleep Electroencephalograms. - Vitaly Schetinin, A. Kostunin:
Self-Organization of the Neuron Collective of Optimal Complexity. - Vitaly Schetinin, Joachim Schult:
A Neural-Network Technique to Learn Concepts from Electroencephalograms. - Vitaly Schetinin, Joachim Schult:
The Combined Technique for Detection of Artifacts in Clinical Electroencephalograms of Sleeping Newborns. - Byeong Ho Kang, Achim G. Hoffmann, Takahira Yamaguchi, Wai-Kiang Yeap:
Proceedings of the Pacific Knowledge Acquisition Workshop 2004. - Marc Barthelemy, Edmond Chow, Tina Eliassi-Rad:
Knowledge Representation Issues in Semantic Graphs for Relationship Detection. - Karim Seada, Ahmed Helmy:
Rendezvous Regions: A Scalable Architecture for Resource Discovery and Service Location in Large-Scale Mobile Networks. - Carlos Rodriguez:
Metalinguistic Information Extraction for Terminology. - Edith Hemaspaandra, Lane A. Hemaspaandra:
Dichotomy for Voting Systems. - Manoj Kumar:
An Improved Remote User Authentication Scheme Using Smart Cards. - Manoj Kumar:
The Modified Scheme is still vulnerable to the parallel Session Attack. - Marcus Hutter, Jan Poland:
Adaptive Online Prediction by Following the Perturbed Leader. - Boris Ryabko, Jaakko Astola:
Prediction of Large Alphabet Processes and Its Application to Adaptive Source Coding. - Rasika R. Perera, Tony S. Pollock, Thushara D. Abhayapala:
Performance of Gaussian Signalling in Non Coherent Rayleigh Fading Channels. - Matthew G. Earl, Raffaello D'Andrea:
A Decomposition Approach to Multi-Vehicle Cooperative Control. - Benjamin Lévêque, Frédéric Maffray, Bruce A. Reed, Nicolas Trotignon:
Coloring Artemis graphs. - Weiming Zhang, Shiqu Li:
On the Unicity Distance of Stego Key. - Marko A. Rodriguez, Johan Bollen, Herbert Van de Sompel:
The Convergence of Digital-Libraries and the Peer-Review Process. - Vignesh Sethuraman, Bruce E. Hajek:
Capacity per Unit Energy of Fading Channels with a Peak Constraint. - Kristiaan Pelckmans, Ivan Goethals, Jos De Brabanter, Johan A. K. Suykens, Bart De Moor:
Componentwise Least Squares Support Vector Machines. - (Withdrawn) Improved direct sum theorem in classical communication complexity.
- Paul M. B. Vitányi:
Time, Space, and Energy in Reversible Computing. - Paul M. B. Vitányi:
Universal Similarity. - Dmitry N. Kozlov:
Discrete Morse Theory for free chain complexes. - Joseph DeStefano, Erik G. Learned-Miller:
A Probabilistic Upper Bound on Differential Entropy. - Victor Korotkikh, Galina Korotkikh, Darryl Bond:
On Optimality Condition of Complex Systems: Computational Evidence. - Amit K. Awasthi, Sunder Lal:
A Multi-proxy Signature Scheme for Partial delegation with Warrant. - Amit K. Awasthi:
A New Remote User Authentication Scheme Using Smart Cards with Check Digits. - Amit K. Awasthi, Sunder Lal:
An Efficient Scheme for Sensitive Message Transmission using Blind Signcryption. - Lane A. Hemaspaandra, Leen Torenvliet:
P-Selectivity, Immunity, and the Power of One Bit. - Amit K. Awasthi, Sunder Lal:
ID-based Ring Signature and Proxy Ring Signature Schemes from Bilinear Pairings. - Vivek Mhatre, Catherine Rosenberg:
The Capacity of Random Ad hoc Networks under a Realistic Link Layer Model. - Sheng Bao, Shi Chen, Zhiqiang Jing, Ran Ren:
A DNA Sequence Compression Algorithm Based on LUT and LZ77. - Marko Znidaric:
Single-solution Random 3-SAT Instances. - Lars Eirik Danielsen, Matthew Geoffrey Parker:
Spectral Orbits and Peak-to-Average Power Ratio of Boolean Functions with respect to the {I,H,N}^n Transform. - Marek Chrobak, Claire Kenyon, John Noga, Neal E. Young:
Oblivious Medians via Online Bidding. - Marek Chrobak, Claire Kenyon, Neal E. Young:
The reverse greedy algorithm for the metric k-median problem. - G. Gordon Worley III:
Wikis in Tuple Spaces. - Hans L. Cycon, Thomas C. Schmidt, Matthias Wählisch, Mark Palkow, Henrik Regensburg:
A Distributed Multimedia Communication System and its Applications to E-Learning. - J. Ignacio Alvarez-Hamelin, Luca Dall'Asta, Alain Barrat, Alessandro Vespignani:
k-core decomposition: a tool for the visualization of large scale networks. - Derek Messie, Jae C. Oh:
Cooperative Game Theory within Multi-Agent Systems for Systems Scheduling. - Derek Messie, Mina Jung, Jae C. Oh, Shweta Shetty, Steven Nordstrom, Michael Haney:
Prototype of Fault Adaptive Embedded Software for Large-Scale Real-Time Systems. - Lawrence M. Ioannou:
Computing finite-dimensional bipartite quantum separability. - Karim Seada, Ahmed Helmy:
Efficient and Robust Geocasting Protocols for Sensor Networks. - S. George Djorgovski, R. Williams:
Virtual Observatory: From Concept to Implementation. - Bronislovas Kaulakys, Vygintas Gontis, M. Alaburda:
Point process model of 1/f noise versus a sum of Lorentzians. - Marc Mézard, Thierry Mora, Riccardo Zecchina:
Clustering of solutions in the random satisfiability problem. - Behnam Attaran Rezaei, Nima Sarshar, P. Oscar Boykin, Vwani P. Roychowdhury:
Disaster Management in Scale-Free Networks: Recovery from and Protection Against Intentional Attacks. - Vladimir V. Kornyak:
On Compatibility of Discrete Relations. - Bastien Chopard, Stephane Marconi:
Discrete Physics: a new way to look at cryptography. - Joseph S. Kong, P. Oscar Boykin, Behnam Attaran Rezaei, Nima Sarshar, Vwani P. Roychowdhury:
Let Your CyberAlter Ego Share Information and Manage Spam. - Sergey N. Dorogovtsev, J. F. F. Mendes, J. G. Oliveira:
Frequency of occurrence of numbers in the World Wide Web. - Simon J. Gay, Rajagopal Nagarajan, Nikolaos Papanikolaou:
Probabilistic Model-Checking of Quantum Protocols. - Andris Ambainis:
Quantum search algorithms. - Andrés Sicard, Juan Ospina, Mario Vélez:
Numerical Simulations of a Possible Hypercomputational Quantum Algorithm. - G. Gordon Worley III:
Applications of quantum message sealing. - Lars Eirik Danielsen, Matthew Geoffrey Parker:
On the Classification of All Self-Dual Additive Codes over GF(4) of Length up to 12. - Sébastien Roch:
A Short Proof that Phylogenetic Tree Reconstruction by Maximum Likelihood is Hard. - Robin Houston, Dominic J. D. Hughes, Andrea Schalk:
Modelling Linear Logic Without Units (Preliminary Results).
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.