


default search action
CoRR, March 2009
- Vladimir Braverman, Rafail Ostrovsky:
Measuring Independence of Datasets. - Hari K. Pyla, Bharath Ramesh, Calvin J. Ribbens, Srinidhi Varadarajan:
ScALPEL: A Scalable Adaptive Lightweight Performance Evaluation Library for application performance monitoring. - Vit Niennattrakul, Chotirat Ann Ratanamahatana:
Learning DTW Global Constraint for Time Series Classification. - Abuzer Yakaryilmaz, A. C. Cem Say:
Succinctness of two-way probabilistic and quantum finite automata. - Petre Bucur, Lucian Luca:
Non Linear System for a Veritable PID Substitute. - Alexandra Fortis, Florin Fortis:
Workflow Patterns in Process Modeling. - Alexandra Fortis, Alexandru Cicortas, Victoria Iordan:
Considerations on Resource Usage in Exceptions and Failures in Workflows. - Matthias Hesse, Jérôme Lebrun
, Lutz H.-J. Lampe, Luc Deneire:
Separable Implementation of L2-Orthogonal STC CPM with Fast Decoding. - Xiang Yan, Benjamin Van Roy:
Manipulation Robustness of Collaborative Filtering Systems. - Pierre-Louis Cayrel, Philippe Gaborit, David Galindo, Marc Girault:
Improved identity-based identification using correcting codes. - Yi Su, Mihaela van der Schaar:
Dynamic Conjectures in Random Access Networks Using Bio-inspired Learning. - Manoj K. Panda, Anurag Kumar:
Modeling Multi-Cell IEEE 802.11 WLANs with Application to Channel Assignment. - Mehrdad Taki, Farshad Lahouti:
Spectral Efficiency Optimized Adaptive Transmission for Cognitive Radios in an Interference Channel. - Bernhard Haeupler, Siddhartha Sen, Robert Endre Tarjan:
Heaps Simplified. - Beihang He:
Villager's dilemma. - (Withdrawn) Recognition of Regular Shapes in Satelite Images.
- Daniel Cosmin Porumbel:
A polynomial graph extension procedure for improving graph isomorphism algorithms. - Patricio Galeas, Ralph Kretschmer, Bernd Freisleben:
Document Relevance Evaluation via Term Distribution Analysis Using Fourier Series Expansion. - Alexander Gutfraind, Aric A. Hagberg, Feng Pan:
Optimal Interdiction of Unreactive Markovian Evaders. - Zhe Chen, Dunwei Wen:
Accelerating and Evaluation of Syntactic Parsing in Natural Language Question Answering Systems. - Marko A. Rodriguez:
A Graph Analysis of the Linked Data Cloud. - Sean Cleary, Katherine St. John:
Rotation Distance is Fixed-Parameter Tractable. - Sean Cleary, Katherine St. John:
A Linear-Time Approximation Algorithm for Rotation Distance. - Marko A. Rodriguez, Alberto Pepe:
Faith in the Algorithm, Part 1: Beyond the Turing Test. - Fangwen Fu, Mihaela van der Schaar:
A Systematic Framework for Dynamically Optimizing Multi-User Wireless Video Transmission. - Christian Bessiere, Emmanuel Hebrard, Brahim Hnich, Zeynep Kiziltan, Toby Walsh:
Range and Roots: Two Common Patterns for Specifying and Propagating Counting and Occurrence Constraints. - Maziar M. Nekovee
:
Impact of Cognitive Radio on Future Management of Spectrum. - Jean Dezert, Florentin Smarandache
:
An introduction to DSmT. - (Withdrawn) Asymptotic Improvement of the Binary Gilbert-Varshamov Bound on the Code Rate.
- Satish Babu Korada, Rüdiger L. Urbanke:
Polar Codes are Optimal for Lossy Source Coding. - Joachim Gudmundsson, Pat Morin, Michiel H. M. Smid:
Algorithms for Marketing-Mix Optimization. - Marvin R. G. Schiller, Christoph Benzmüller:
Granularity-Adaptive Proof Presentation. - Rustam Tagiew:
General Game Management Agent. - Konstantin Makarychev, Yury Makarychev:
How to Play Unique Games on Expanders. - Yuriy Arbitman, Moni Naor, Gil Segev:
De-amortized Cuckoo Hashing: Provable Worst-Case Performance and Experimental Results. - Kazuhisa Makino, Hirotaka Ono:
Deductive Inference for the Interiors and Exteriors of Horn Theories. - Xiangyun Zhou, Parastoo Sadeghi, Tharaka A. Lamahewa, Salman Durrani:
Design Guidelines for Training-based MIMO Systems with Feedback. - Salah A. Aly, Zhenning Kong, Emina Soljanin:
Raptor Codes Based Distributed Storage Algorithms for Wireless Sensor Networks. - Alan M. Frisch, Brahim Hnich, Zeynep Kiziltan, Ian Miguel, Toby Walsh:
Filtering Algorithms for the Multiset Ordering Constraint. - Toby Walsh:
Breaking Value Symmetry. - Christian Bessiere, Emmanuel Hebrard, Brahim Hnich, Zeynep Kiziltan, Toby Walsh:
The Parameterized Complexity of Global Constraints. - Claude-Guy Quimper, Toby Walsh:
Decompositions of Grammar Constraints. - Christian Bessiere, Emmanuel Hebrard, Brahim Hnich, Zeynep Kiziltan, Toby Walsh:
SLIDE: A Useful Special Case of the CARDPATH Constraint. - George Katsirelos, Nina Narodytska, Toby Walsh:
Reformulating Global Grammar Constraints. - George Katsirelos, Nina Narodytska, Toby Walsh:
Combining Symmetry Breaking and Global Constraints. - Tiberiu Marius Karnyanszky, Dan Laurentiu Lacrama, Lucian Luca, Ioana Iacob:
Teacher's Evaluation - a Component of Quality Assessment System. - Andrea E. F. Clementi, Francesco Pasquale, Riccardo Silvestri:
MANETS: High mobility can make up for low transmission power. - Dan Laurentiu Lacrama, Florin Alexa, Adriana Balta:
Real-time Texture Error Detection. - Robin A. Moser, Gábor Tardos:
A constructive proof of the general Lovasz Local Lemma. - Li-Chia Choo, Kai-Kit Wong:
The Three-Receiver Broadcast Channel with Degraded Message Sets and Confidential Messages. - Jean-Pierre Tillich, Gilles Zémor:
Quantum LDPC codes with positive rate and minimum distance proportional to n^{1/2}. - Rolf Andreas Rasenack:
Adaptation of Black-Box Software Components. - Tiberiu Marius Karnyanszky, Corina Musuroi, Carla Amira Karnyanszky:
Expert Software for the Determination of Juvenile People's Obesity. - Tiberiu Marius Karnyanszky, Bogdan Ion Selariu:
About Testing the Speed of Calculating the Shortest Route. - Catalin Tuican, Tiberiu Marius Karnyanszky, Bogdan Ioan Selariu:
Expert System for Quality Assessment in "Tibiscus" University. - Xiaohu Shang, Biao Chen, Gerhard Kramer, H. Vincent Poor:
Noisy-interference Sum-rate Capacity of Parallel Gaussian Interference Channels. - Mahdi Lotfinezhad, Ben Liang, Elvino S. Sousa:
On Stability Region and Delay Performance of Linear-Memory Randomized Scheduling for Time-Varying Networks. - Edith Cohen, Haim Kaplan:
Leveraging Discarded Samples for Tighter Estimation of Multiple-Set Aggregates. - Mehmet Akçakaya, Jinsoo Park, Vahid Tarokh:
Compressive Sensing Using Low Density Frames. - Matthew R. McKay
, Iain B. Collings, Antonia M. Tulino:
Achievable Sum Rate of MIMO MMSE Recievers: A General Analytic Framework. - Robby G. McKilliam, Warren D. Smith, I. Vaughan L. Clarkson:
Linear-time nearest point algorithms for Coxeter lattices. - Raymond Chi-Wing Wong, Ada Wai-Chee Fu, Jia Liu, Ke Wang, Yabo Xu:
Preserving Individual Privacy in Serial Data Publishing. - Gerard Briscoe, Alexandros Marinos:
Digital Ecosystems in the Clouds: Towards Community Cloud Computing. - Shai Haim, Toby Walsh:
Online Estimation of SAT Solving Runtime. - Anne Benoit, Henri Casanova, Veronika Rehn-Sonigo, Yves Robert:
Resource Allocation for Multiple Concurrent In-Network Stream-Processing Applications. - Delia Sabina Stinga:
Grid Technologies. - Joost Broekens:
Modeling the Experience of Emotion. - Daniela Ilea:
C# - Connecting a Mobile Application to Oracle Server via Web Services. - Amitabha Bagchi, Sariel Har-Peled, Achal Premi, Adit Madan:
Hierarchical neighbor graphs: A low stretch connected structure for points in Euclidean space. - Carlos Loría-Sáenz:
On Requirements for Programming Exercises from an E-learning Perspective. - Ralf Küsters, Tomasz Truderung:
An Epistemic Approach to Coercion-Resistance for Electronic Voting Protocols. - Marko Horvat, Sinisa Popovic, Nikola Bogunovic, Kresimir Cosic:
Tagging multimedia stimuli with ontologies. - Vasco Manquinho, João Marques-Silva, Jordi Planes:
Algorithms for Weighted Boolean Optimization. - David Doty, Matthew J. Patitz:
A Domain-Specific Language for Programming in the Tile Assembly Model. - Freddy Muñoz, Benoit Baudry:
Artificial table testing dynamically adaptive systems. - Nathann Cohen, Fedor V. Fomin, Gregory Z. Gutin, Eun Jung Kim, Saket Saurabh, Anders Yeo:
Algorithm for Finding $k$-Vertex Out-trees and its Application to $k$-Internal Out-branching Problem. - Georgiana Petruta Fintineanu:
Directing RF Terminals Using TELNET Applications. - Leonard Mada:
Hospital Acquired Infections: Advantages of a Computerized Surveillance. - Diana Sophia Codat:
L'entreprise franco-roumaine face au Internet. - Saquib Razak, Vinay Kolar, Nael B. Abu-Ghazaleh, Khaled A. Harras:
How do Wireless Chains Behave? The Impact of MAC Interactions. - Emil D. Schwab:
On the Category of Partial Bijections. - Alyson K. Fletcher, Sundeep Rangan, Vivek K. Goyal:
On-Off Random Access Channels: A Compressed Sensing Framework. - Mohammad Raza, Philippa Gardner:
Footprints in Local Reasoning. - José Joaquín Bernal, Ángel del Río, Juan Jacobo Simón:
Group code structures on affine-invariant codes. - Tiberiu Marius Karnyanszky:
Home Heating Systems Design using PHP and MySQL Databases. - Ovidiu Crista, Tiberiu Marius Karnyanszky:
Application for Evaluation of the Professional Competencies of the Teaching Staff. - Edmund K. Burke, Jakub Marecek, Andrew J. Parkes, Hana Rudová:
Decomposition, Reformulation, and Diving in University Course Timetabling. - Ran Gilad-Bachrach, Aharon Bar-Hillel, Liat Ein-Dor:
Efficient Human Computation. - Toby Walsh:
Symmetry Breaking Using Value Precedence. - Toby Walsh:
Complexity of Terminating Preference Elicitation. - Christian Bessiere, Emmanuel Hebrard, Brahim Hnich, Toby Walsh:
The Complexity of Reasoning with Global Constraints. - Toby Walsh:
Breaking Value Symmetry. - Yasuhiko Takenaga, Toby Walsh:
Tetravex is NP-complete. - Armagan Tarim, Suresh Manandhar, Toby Walsh:
Stochastic Constraint Programming: A Scenario-Based Approach. - Toby Walsh:
Stochastic Constraint Programming. - Philippe Jacquet, Bernard Mans, Georgios Rodolakis:
Information Propagation Speed in Mobile and Delay Tolerant Networks. - Da Shan, Xiaoying Gan, Hsiao-Hwa Chen, Liang Qian:
Fast Cycle Frequency Domain Feature Detection for Cognitive Radio Systems. - Inge Bethke, Piet Rodenburg, Arjen Sevenster:
The structure of finite meadows. - Jan A. Bergstra, Alban Ponse:
An Instruction Sequence Semigroup with Involutive Anti-Automorphisms. - Benedetto Intrigila, Richard Statman:
The Omega Rule is Π11-Complete in the λβ-Calculus. - Nihar Jindal, Angel E. Lozano:
Optimum Pilot Overhead in Wireless Communication: A Unified Treatment of Continuous and Block-Fading Channels. - Christian Vecchiola, Michael Kirley, Rajkumar Buyya:
Multi-Objective Problem Solving With Offspring on Enterprise Clouds. - Chao Jin, Jayavardhana Gubbi, Rajkumar Buyya, Marimuthu Palaniswami:
Jeeva: Enterprise Grid-enabled Web Portal for Protein Secondary Structure Prediction. - Saurabh Kumar Garg, Pramod Konugurthi, Rajkumar Buyya:
A Linear Programming Driven Genetic Algorithm for Meta-Scheduling on Utility Grids. - Manoel B. Campêlo, Ricardo C. Corrêa:
A Lagrangian Relaxation for the Maximum Stable Set Problem. - Muhammad Salman Asif, Justin K. Romberg:
Dynamic updating for L1 minimization. - Amelia Carolina Sparavigna:
The Digital Restoration of Da Vinci's Sketches. - Isa Emin Hafalir, R. Ravi, Amin Sayedi:
Sort-Cut: A Pareto Optimal and Semi-Truthful Mechanism for Multi-Unit Auctions with Budget-Constrained Bidders. - Frédéric Dambreville:
Definition of evidence fusion rules on the basis of Referee Functions. - Emmanuel J. Candès, Terence Tao:
The Power of Convex Relaxation: Near-Optimal Matrix Completion. - Neri Merhav:
Physics of the Shannon Limits. - Youngchul Sung, H. Vincent Poor, Heejung Yu:
How Much Information can One Get from a Wireless Ad Hoc Sensor Network over a Correlated Random Field? - Dieter Duyck, Joseph Jean Boutros, Marc Moeneclaey:
Low-Density Graph Codes for slow fading Relay Channels. - Rabindranath Bera, Sanjib Sil, Sourav Dhar, Subir Kumar Sarkar:
Wi-Fi, WiMax and WCDMA A comparative study based on Channel Impairments and Equalization method used. - Rabindranath Bera, Sourav Dhar, Debdatta Kandar:
Digital Radar for Collision Avoidance and Automatic Cruise Control in Transportation. - Debdatta Kandar, Sourav Dhar, Rabindranath Bera, Chandan Kumar Sarkar:
MIMO Based Multimedia Communication System. - Natalia Silberstein, Tuvi Etzion:
Enumerative Encoding in the Grassmannian Space. - Mark F. Flanagan, Enrico Paolini, Marco Chiani, Marc P. C. Fossorier:
On the Growth Rate of the Weight Distribution of Irregular Doubly-Generalized LDPC Codes. - Puri Arenas, Damiano Zanardini:
18th Workshop on Logic-based methods in Programming Environments (WLPE 2008). - Shashi Kiran Chilappagari, Michael Chertkov, Mikhail G. Stepanov, Bane Vasic:
Instanton-based Techniques for Analysis and Reduction of Error Floors of LDPC Codes. - Julien Cassaigne, François Nicolas:
On the Morse-Hedlund complexity gap. - Zhe Chen:
Heuristic Reasoning on Graph and Game Complexity of Sudoku. - Aravind Kailas, Lakshmi V. Thanayankizil, Mary Ann Ingram:
A Simple Cooperative Transmission Protocol for Energy-Efficient Broadcasting Over Multi-Hop Wireless Networks. - (Withdrawn) Faceted Exploration of Emerging Resource Spaces.
- Wei Ren, Qing Zhao, Drasvin Cheowtirakul, Ananthram Swami:
Connectivity of Cognitive Radio Networks: Proximity vs. Opportunity. - Erez Louidor, Brian H. Marcus:
Improved Lower Bounds on Capacities of Symmetric 2-Dimensional Constraints using Rayleigh Quotients. - Tuvi Etzion:
Folding, Tiling, and Multidimensional Coding. - Sabu M. Thampi, K. Chandra Sekaran:
Review of Replication Schemes for Unstructured P2P Networks. - Dirk G. F. M. Bollen, Harry Halpin:
The Role of Tag Suggestions in Folksonomies. - Leslie Greengard, Chris Stucchio:
Reconstructing Curves from Points and Tangents. - James I. Lathrop, Jack H. Lutz, Scott M. Summers:
Strict Self-Assembly of Discrete Sierpinski Triangles. - Amos Lapidoth, Stefan M. Moser, Michèle A. Wigger:
On the Capacity of Free-Space Optical Intensity Channels. - José Espírito Santo, Ralph Matthes, Luís Pinto:
Continuation-Passing Style and Strong Normalisation for Intuitionistic Sequent Calculi. - Shrinivas Kudekar, Nicolas Macris:
Decay of Correlations for Sparse Graph Error Correcting Codes. - David Doty, Matthew J. Patitz, Scott M. Summers:
Limitations of Self-Assembly at Temperature 1. - Denis Mindolin, Jan Chomicki:
Contracting preference relations for database applications. - Miquel Payaró, Daniel Pérez Palomar:
Hessian and concavity of mutual information, differential entropy, and entropy power in linear vector Gaussian channels. - Xiqi Gao, Bin Jiang, Xiao Li, Alex B. Gershman, Matthew R. McKay
:
Statistical Eigenmode Transmission over Jointly-Correlated MIMO Channels. - Balder ten Cate, Laura Chiticariu, Phokion G. Kolaitis, Wang Chiew Tan:
Laconic schema mappings: computing core universal solutions by means of SQL queries. - Prasad Krishnan, B. Sundar Rajan:
Network error correction for unit-delay, memory-free networks using convolutional codes. - Vojislav Gajic, Jianwei Huang, Bixio Rimoldi:
On Competing Wireless Service Providers. - Kang Ning:
A Deposition and Post Processing Approach for the Longest Common Subsequence Problem. - Fernando Hernando, Gary McGuire:
Proof of a Conjecture on the Sequence of Exceptional Numbers, Classifying Cyclic Codes and APN Functions. - Laurent Lyaudet, Frédéric Mazoit, Stéphan Thomassé
:
Partitions versus sets : a case of duality. - Gérard Henry Edmond Duchamp, Christophe Tollu, H. Cheballah, Karol A. Penson, Gleb A. Koshevoy:
Combinatorial Deformations: Twisting and Perturbations. - Maurice Margenstern:
A new universal cellular automaton on the ternary heptagrid. - Matthias Fischer, Claudius Jähn, Martin Ziegler:
Adaptive Mesh Approach for Predicting Algorithm Behavior with Application to Visibility Culling in Computer Graphics. - Yousra Chabchoub, Christine Fricker, Hanene Mohamed:
Analysis of a Bloom Filter Algorithm via the Supermarket Model. - Eberhard H.-A. Gerbracht:
Supernodal Analysis Revisited. - Markus Triska, Ulrich Neumerkel, Jan Wielemaker:
Better Termination for Prolog with Constraints. - David F. Ferraiolo, D. Richard Kuhn:
Role-Based Access Controls. - Amir Leshem, Ephraim Zehavi:
Game theory and the frequency selective interference channel - A tutorial. - Arno Pauly:
On the (semi)lattices induced by continuous reducibilities. - Victor Pablos Ceruelo, Susana Muñoz-Hernández, Hannes Strass:
Rfuzzy framework. - Miguel Gómez-Zamalloa, Elvira Albert, Germán Puebla:
On the Generation of Test Data for Prolog by Partial Evaluation. - Michael Leuschel, Salvador Tamarit, Germán Vidal:
Improving Size-Change Analysis in Offline Partial Evaluation. - Erez Sabbag, Neri Merhav:
Achievable Error Exponents for Channel with Side Information - Erasure and List Decoding. - Francisco Javier López-Fraguas, Juan Rodríguez-Hortalá, Jaime Sánchez-Hernández:
A Lightweight Combination of Semantics for Non-deterministic Functions. - Yoshihiro Adachi:
Prolog Visualization System Using Logichart Diagrams. - Cemal Akçaba, Helmut Bölcskei:
On the achievable diversity-multiplexing tradeoff in interference channels. - Fan Zhang, Henry D. Pfister:
On the Iterative Decoding of High-Rate LDPC Codes With Applications in Compressed Sensing. - Edward D. Weinberger:
A Generalization of the Shannon-McMillan-Breiman Theorem and the Kelly Criterion Leading to a Definition of Pragmatic Information. - Adrian Prantl, Jens Knoop, Markus Schordan, Markus Triska:
Constraint solving for high-level WCET analysis. - Jens Bendisposto, Ian Endrijautzki, Michael Leuschel, David Schneider:
A Semantics-Aware Editing Environment for Prolog in Eclipse. - Rolf Harren, Rob van Stee:
An Absolute 2-Approximation Algorithm for Two-Dimensional Bin Packing. - Sang-Yong Lee, Antonio Ortega:
A Novel Approach for Compression of Images Captured using Bayer Color Filter Arrays. - Ian A. Kash, Eric J. Friedman, Joseph Y. Halpern:
Manipulating Scrip Systems: Sybils and Collusion. - Ian A. Kash, Eric J. Friedman, Joseph Y. Halpern:
Multiagent Learning in Large Anonymous Games. - Kang Ning, Hoong Kee Ng, Hon Wai Leong:
Analysis of the Relationships among Longest Common Subsequences, Shortest Common Supersequences and Patterns and its application on Pattern Discovery in Biological Sequences. - Cuizhu Shi, Aditya Ramamoorthy:
Design and Analysis of E2RC Codes. - Andy King:
Relations, Constraints and Abstractions: Using the Tools of Logic Programming in the Security Industry. - Jean Berstel, Luc Boasson, Olivier Carton, Isabelle Fagnot:
Infinite words without palindrome. - Jean-Yves Marion:
On tiered small jump operators. - Sachin Kadloor, Raviraj Adve:
Relay Selection and Power Allocation in Cooperative Cellular Networks. - Fabrizio Altarelli, Alfredo Braunstein, John Realpe-Gomez, Riccardo Zecchina:
Statistical mechanics of budget-constrained auctions. - Krishnendu Chatterjee, Luca de Alfaro, Marco Faella, Axel Legay:
Qualitative Logics and Equivalences for Probabilistic Systems. - Mehrnoosh Sadrzadeh, Roy Dyckhoff:
Positive Logic with Adjoint Modalities: Proof Theory, Semantics and Reasoning about Information. - Yijia Fan, Chao Wang, H. Vincent Poor, John S. Thompson:
Cooperative Multiplexing: Toward Higher Spectral Efficiency in Multi-antenna Relay Networks. - Aïda Ouangraoua, Anne Bergeron:
Parking functions, labeled trees and DCJ sorting scenarios. - Susan Khor:
Effect of Degree Distribution on Evolutionary Search. - Rodrigo N. Calheiros, Rajiv Ranjan, César A. F. De Rose, Rajkumar Buyya:
CloudSim: A Novel Framework for Modeling and Simulation of Cloud Computing Infrastructures and Services. - Chendong Li:
Airport Gate Assignment A Hybrid Model and Implementation. - Khaled M. Khalil, Mohamed Hassan Abdel Aziz, Taymour T. Nazmy, Abdel-Badeeh M. Salem:
Multi-Agent Crisis Response systems - Design Requirements and Analysis of Current Systems. - Nikos Zotos, Paraskevi Tzekou, George Tsatsaronis, Lefteris Kozanidis, Sofia Stamou, Iraklis Varlamis:
To Click or not to Click? The Role of Contextualized and User-Centric Web Snippets. - Irène Durand, Géraud Sénizergues:
Bottom-up rewriting for words and terms. - Susan Khor:
Generating Hierarchically Modular Networks via Link Switching. - Konstantinos G. Spiliotis, Constantinos I. Siettos:
Multiscale Computations on Neural Networks: From the Individual Neuron Interactions to the Macroscopic-Level Analysis. - Amir Salman Avestimehr, M. Amin Khajehnejad, Aydin Sezgin, Babak Hassibi:
Capacity region of the deterministic multi-pair bi-directional relay network. - Maximilien Gadouleau, Zhiyuan Yan:
Construction and Covering Properties of Constant-Dimension Codes. - Abedelaziz Mohaisen, Dowon Hong, DaeHun Nyang:
Privacy in Location Based Services: Primitives Toward the Solution. - Kang Ning:
A Pseudo DNA Cryptography Method. - Marco Pavone, Stephen L. Smith, Francesco Bullo, Emilio Frazzoli:
Dynamic Multi-Vehicle Routing with Multiple Classes of Demands. - Peter Fertl, Joakim Jaldén, Gerald Matz:
Performance Assessment of MIMO-BICM Demodulators based on System Capacity. - Gabriel Istrate:
On Hadwiger's Number of a graph with partial information. - Patric R. J. Östergård, Olli Pottonen, Kevin T. Phelps:
The Perfect Binary One-Error-Correcting Codes of Length 15: Part II--Properties. - Georg Tauboeck, Franz Hlawatsch, Holger Rauhut:
Compressive estimation of doubly selective channels: exploiting channel sparsity to improve spectral efficiency in multicarrier transmissions. - Sergio R. López-Permouth, Steve Szabo:
On the Hamming weight of Repeated Root Cyclic and Negacyclic Codes over Galois Rings. - Kostadin Koroutchev, Jian Shen, Elka Korutcheva, Manuel Cebrián:
Keyword Detection in Natural Language Based on Statistical Mechanics of Words in Written Texts. - Daniel A. Spielman, Jaeoh Woo:
A Note on Preconditioning by Low-Stretch Spanning Trees. - Debdeep Chatterjee, Tan F. Wong, Tat M. Lok:
Cooperative Transmission in a Wireless Cluster based on Flow Management. - Susmit Jha, Sanjit A. Seshia, Rhishikesh Limaye:
On the Computational Complexity of Satisfiability Solving for String Theories. - Kamalika Chaudhuri, Yoav Freund, Daniel J. Hsu:
A parameter-free hedging algorithm. - Kamalika Chaudhuri, Yoav Freund, Daniel J. Hsu:
Tracking using explanation-based modeling. - Patrick Erik Bradley:
On p-adic Classification. - Soummya Kar
, Bruno Sinopoli, José M. F. Moura:
Kalman Filtering with Intermittent Observations: Weak Convergence to a Stationary Distribution. - Andreas Bauer, Rajeev Goré, Alwen Tiu:
A decidable policy language for history-based transaction monitoring. - Jan A. Bergstra, Cornelis A. Middelburg:
A process calculus with finitary comprehended terms. - Samson Lasaulce, Yezekael Hayel, Rachid El Azouzi, Mérouane Debbah:
Introducing Hierarchy in Energy Games. - Ivo Danihelka:
Optimistic Simulated Exploration as an Incentive for Real Exploration. - Michele Morelli, Luca Sanguinetti, H. Vincent Poor:
A Robust Ranging Scheme for OFDMA-Based Networks. - Virtudes Tomás, Joachim Rosenthal, Roxana Smarandache:
Decoding of MDP Convolutional Codes over the Erasure Channel. - Ruoheng Liu, Tie Liu, H. Vincent Poor, Shlomo Shamai:
A Vector Generalization of Costa's Entropy-Power Inequality with Applications. - Wanbin Son, Mu-Woong Lee, Hee-Kap Ahn, Seung-won Hwang:
Spatial Skyline Queries: An Efficient Geometric Algorithm. - Kelly R. Fitz, Sean A. Fulop:
A Unified Theory of Time-Frequency Reassignment. - Ersen Ekrem, Sennur Ulukus:
The Secrecy Capacity Region of the Gaussian MIMO Multi-receiver Wiretap Channel. - Chunhua Shen, Sakrapee Paisitkriangkrai, Jian Zhang:
Efficiently Learning a Detection Cascade with Sparse Eigenvectors. - Toshimitsu Masuzawa, Sébastien Tixeuil:
Stabilizing Maximal Independent Set in Unidirectional Networks is Hard. - Karsten Held, Elena Rota Kops, Bernd J. Krause, William M. Wells III, Ron Kikinis, Hans-W. Müller-Gärtner:
Markov Random Field Segmentation of Brain MR Images. - Ahmed Bouajjani, Cezara Dragoi, Constantin Enea, Yan Jurski, Mihaela Sighireanu:
A Generic Framework for Reasoning about Dynamic Networks of Infinite-State Processes. - Tamir Hazan, Amnon Shashua:
Norm-Product Belief Propagation: Primal-Dual Message-Passing for Approximate Inference. - Emmanuel J. Candès, Yaniv Plan:
Matrix Completion With Noise. - Sourav Dhar, Debdatta Kandar, Tanushree Bose, Rabindranath Bera:
Smart Antenna Based Broadband communication in Intelligent Transportation system. - Victor Dutta, Rabindranath Bera, Sourav Dhar, Jaydeep Chakravorty, Nishant Bagehel:
Automated Vehicle Location (AVL) Using Global Positioning System (GPS). - Elena Dubrova:
Finding matching initial states for equivalent NLFSRs in the fibonacci and the galois configurations. - Jort F. Gemmeke, Bert Cranen:
TR02: State dependent oracle masks for improved dynamical features. - Christian Senger, Vladimir Sidorenko, Victor V. Zyablov:
On Generalized Minimum Distance Decoding Thresholds for the AWGN Channel. - Josh Karlin, Stephanie Forrest, Jennifer Rexford:
Nation-State Routing: Censorship, Wiretapping, and BGP. - Ke Zhang, Marcus Hutter, Huidong Jin:
A New Local Distance-Based Outlier Detection Approach for Scattered Real-World Data. - Ghadamali Bagherikaram, Abolfazl S. Motahari, Amir K. Khandani:
The Secrecy Capacity Region of the Gaussian MIMO Broadcast Channel. - Arvind Narayanan, Vitaly Shmatikov:
De-anonymizing Social Networks. - Yuedong Xu, John C. S. Lui, Dah-Ming Chiu:
On Oligopoly Spectrum Allocation Game in Cognitive Radio Networks with Capacity Constraints. - Frank Nielsen, Richard Nock:
Hyperbolic Voronoi diagrams made easy. - Jean-Guillaume Dumas
, Dominique Duval, Jean-Claude Reynaud:
Cartesian effect categories are Freyd-categories. - Shaoxu Song, Lei Chen:
Discovering Matching Dependencies. - Thomas Bréhard, Emmanuel Duflos, Philippe Vanheeghe, Pierre-Arnaud Coquelin:
Optimal Policies Search for Sensor Management. - Kohtaro Tadaki:
Fixed point theorems on partial randomness. - Carole Delporte-Gallet, Hugues Fauconnier, Andreas Tielmann:
Fault-Tolerant Consensus in Unknown and Anonymous Networks. - Luigi Santocanale:
A Nice Labelling for Tree-Like Event Structures of Degree 3 (Extended Version). - Teddy Furon, Luis Pérez-Freire:
Worst case attacks against binary probabilistic traitor tracing codes. - Amos Lapidoth, Stephan Tinguely:
Sending a Bivariate Gaussian Source over a Gaussian MAC with Feedback. - Apostolos Syropoulos:
Fuzzy Chemical Abstract Machines. - Jin-San Cheng, Xiao-Shan Gao, Jia Li:
Ambient Isotopic Meshing of Implicit Algebraic Surface with Singularities. - Boris N. Oreshkin, Mark Coates, Michael G. Rabbat:
Optimization and Analysis of Distributed Averaging with Short Node Memory. - Katy Börner, Andrea Scharnhorst:
Visual Conceptualizations and Models of Science. - Peter Krusche, Alexander Tiskin:
String comparison by transposition networks. - Mugurel Ionut Andreica, Sorin Briciu, Madalina Ecaterina Andreica:
Algorithmic Solutions to Some Transportation Optimization Problems with Applications in the Metallurgical Industry. - Marco Pavone, Emilio Frazzoli, Francesco Bullo:
Distributed and Adaptive Algorithms for Vehicle Routing in a Stochastic and Dynamic Environment. - Shamgar Gurevich, Ronny Hadani:
Statistical RIP and Semi-Circle Distribution of Incoherent Dictionaries. - Joel Ratsaby:
How random are a learner's mistakes? - Xiuli Wang:
Comment on "Language Trees and Zipping". - Emil Saucan, Eli Appleboim, Gershon Wolansky, Yehoshua Y. Zeevi:
Combinatorial Ricci Curvature and Laplacians for Image Processing. - Xin Li, Marc Moreno Maza, Wei Pan:
Computations modulo regular chains. - Jack Raymond:
Optimal sparse CDMA detection at high load. - Pablo Arrighi, Alejandro Díaz-Caro
:
Scalar System F for Linear-Algebraic Lambda-Calculus: Towards a Quantum Physical Logic. - Shah Asaduzzaman, Gregor von Bochmann:
GeoP2P: An adaptive peer-to-peer overlay for efficient search and update of spatial information. - Ruoheng Liu, Tie Liu, H. Vincent Poor, Shlomo Shamai:
Multiple-Input Multiple-Output Gaussian Broadcast Channels with Confidential Messages. - Benoît Combemale:
Personal report of the 3rd ECMDA-FA'07 conference. - Yves Bertot, Ekaterina Komendantskaya:
Using Structural Recursion for Corecursion. - Marius Zimand:
On generating independent random strings. - Osman Ugus, Dirk Westhoff, Ralf Laue, Abdulhadi Shoufan, Sorin A. Huss:
Optimized Implementation of Elliptic Curve Based Additive Homomorphic Encryption for Wireless Sensor Networks. - Martin Homik, Andreas Meier:
Designing a GUI for Proofs - Evaluation of an HCI Experiment. - Jinyu Chu, Ju Liu, Jianping Qiao, Xiaoling Wang, Yujun Li:
Gradient-based adaptive interpolation in super-resolution image restoration. - Jun Muramatsu, Shigeki Miyake:
Construction of Codes for Wiretap Channel and Secret Key Agreement from Correlated Source Outputs by Using Sparse Matrices. - Apostolos Kritikopoulos, Martha Sideri, Iraklis Varlamis:
BLOGRANK: Ranking Weblogs Based On Connectivity And Similarity Features. - Abbas Dideban, Hassane Alla:
Feedback control logic synthesis for non safe Petri nets. - Baris Baykant Alagöz:
Boolean Logic with Fault Tolerant Coding. - Laura Stefan:
The generating of Fractal Images Using MathCAD Program. - Shah Asaduzzaman, Muthucumaru Maheswaran:
Decentralized Management of Bi-modal Network Resources in a Distributed Stream Processing Platform. - Elvira Mayordomo, Philippe Moser, Sylvain Perifel:
Polylog space compression, pushdown compression, and Lempel-Ziv are incomparable. - Shah Asaduzzaman, Gregor von Bochmann:
Overlay Structure for Large Scale Content Sharing: Leveraging Geography as the Basis for Routing Locality. - Rohit Aggarwal, Philip Schniter, Can Emre Koksal:
Rate Adaptation via Link-Layer Feedback for Goodput Maximization over a Time-Varying Channel. - Amr Elmasry:
Pairing Heaps with Costless Meld. - Joaquín Goñi, Iñigo Martincorena, Bernat Corominas-Murtra, Gonzalo Arrondo, Sergio Ardanza-Trevijano, Pablo Villoslada:
Switcher-random-walks: a cognitive-inspired mechanism for network exploration. - G. David Forney Jr.:
MacWilliams Identities for Codes on Graphs. - Alina Beygelzimer, John Langford, Yury Lifshits, Gregory B. Sorkin, Alexander L. Strehl:
Conditional Probability Tree Estimation Analysis and Algorithms. - Artur J. Ferreira, Arlindo L. Oliveira, Mário A. T. Figueiredo:
On the Use of Suffix Arrays for Memory-Efficient Lempel-Ziv Data Compression. - Martin Burkhart, Mario Strasser, Xenofontas A. Dimitropoulos:
SEPIA: Security through Private Information Aggregation. - Florentina Anica Pintea:
On-Line Tests. - Martin Burkhart, Daniela Brauckhoff, Martin May, Elisa Boschi:
The Risk-Utility Tradeoff for IP Address Truncation. - Ioan Despi, Lucian Luca:
Delving into Transition to the Semantic Web. - Alexandra Emilia Fortis:
Analysis of some properties for a basic Petri net model. - Timur Chis:
Pipeline Leak Detection Techniques. - Timur Chis:
Computer Systems to Oil Pipeline Transporting. - Petre Bucur, Lucian Luca:
Non linear system become linear system. - Mihai Timis:
Design of Log-Map / Max-Log-Map Decoder. - Virgiliu Streian, Adela Ionescu:
Token Ring Project. - Daniela Ilea, Dan L. Lacrama:
ShopList: Programming PDA applications for Windows Mobile using C#. - Diana Sophia Codat:
Evaluation d'une requete en SQL. - Simona Apostol:
FISLAB - the Fuzzy Inference Tool-box for SCILAB. - Simona Apostol:
The development of a fuzzy regulator with an entry and an output in Fislab. - Dan L. Lacrama, Dorina Fera:
Virtual Reality. - Muhammad Torabi Dashti:
Sums of powers via integration. - Shah Asaduzzaman, Ying Qiao, Gregor von Bochmann:
CliqueStream: an efficient and fault-resilient live streaming network on a clustered peer-to-peer overlay. - Jörg Endrullis, Clemens Grabmayer, Dimitri Hendriks:
Complexity of Fractran and Productivity. - Shah Asaduzzaman, Muthucumaru Maheswaran:
Using Dedicated and Opportunistic Networks in Synergy for a Cost-effective Distributed Stream Processing Platform. - Amir M. Ben-Amram, Chin Soon Lee:
Ranking Functions for Size-Change Termination II. - Baris Nakiboglu, Lizhong Zheng:
Error-and-Erasure Decoding for Block Codes with Feedback. - Shah Asaduzzaman, Muthucumaru Maheswaran:
Towards a decentralized algorithm for mapping network and computational resources for distributed data-flow computations. - Daniel Enrique Lucani, Muriel Médard, Milica Stojanovic:
Capacity Scaling Laws for Underwater Networks. - Daniel Enrique Lucani, Muriel Médard, Milica Stojanovic:
Random Linear Network Coding for Time-Division Duplexing: Queueing Analysis. - Oleg Shcherbina:
Tree decomposition and postoptimality analysis in discrete optimization. - Daniel Enrique Lucani, Muriel Médard, Milica Stojanovic:
Broadcasting in Time-Division Duplexing: A Random Linear Network Coding Approach. - Anupam Gupta, Katrina Ligett, Frank McSherry, Aaron Roth, Kunal Talwar:
Differentially Private Approximation Algorithms. - (Withdrawn) Building the information kernel and the problem of recognition.
- Geevarghese Philip, Venkatesh Raman, Somnath Sikdar:
Polynomial Kernels for Dominating Set in Ki,j-free and d-degenerate Graphs. - Chinmay S. Vaze, Mahesh K. Varanasi:
On the Achievable Rate of the Fading Dirty Paper Channel with Imperfect CSIT. - Yusuke Watanabe, Kenji Fukumizu:
Graph polynomials and approximation of partition functions with Loopy Belief Propagation. - Lek-Heng Lim, Pierre Comon:
Nonnegative approximations of nonnegative tensors. - Jocelyne Troccaz
:
Computer- and robot-assisted Medical Intervention. - Mikko Malinen:
Fountain Codes and Invertible Matrices. - Xiao Juan Zhang, Yi Gong:
On the Achievable Diversity-Multiplexing Tradeoff in MIMO Fading Channels with Imperfect CSIT. - Mahdi Lotfinezhad, Ben Liang, Elvino S. Sousa:
Dynamic Control of Tunable Sub-optimal Algorithms for Scheduling of Time-varying Wireless Networks. - Olivier Finkel:
On Decidability Properties of One-Dimensional Cellular Automata. - Joshua Brown Kramer, Lucas Sabalka:
Multidimensional Online Robot Motion. - Travis Gagie:
Another Virtue of Wavelet Trees. - Jin-yi Cai, Xi Chen, Pinyan Lu:
Graph Homomorphisms with Complex Values: A Dichotomy Theorem. - Hong Ju Park, Ender Ayanoglu:
Constellation Precoded Beamforming. - Kiryung Lee, Yoram Bresler:
Guaranteed Minimum Rank Approximation from Linear Observations by Nuclear Norm Minimization with an Ellipsoidal Constraint. - Pabitra Pal Choudhury, Sudhakar Sahoo, Birendra Kumar Nayak, Sarif Sk. Hassan:
Act of CVT and EVT In The Formation of Number-Theoretic Fractals. - Binh-Minh Bui-Xuan, Jan Arne Telle, Martin Vatshelle:
Fast FPT algorithms for vertex subset and vertex partitioning problems using neighborhood unions. - Nayantara Bhatnagar, Elitza N. Maneva:
A computational method for bounding the probability of reconstruction on trees. - Bernd Gärtner, Joachim Giesen, Martin Jaggi:
An Exponential Lower Bound on the Complexity of Regularization Paths. - Fernando Hernando, Diego Ruano:
New Linear Codes from Matrix-Product Codes with Polynomial Units. - Bernd Gärtner, Joachim Giesen, Martin Jaggi, Torsten Welsch:
A Combinatorial Algorithm to Compute Regularization Paths. - Cyril Furtlehner, Jean-Marc Lasgouttes, Anne Auger:
Learning Multiple Belief Propagation Fixed Points for Real Time Inference. - Anshu Dubey, Lynn B. Reid, Katie Antypas, Murali K. Ganapathy, Katherine Riley, Daniel J. Sheeler, Andrew R. Siegel, Klaus Weide:
Extensible Component Based Architecture for FLASH, A Massively Parallel, Multiphysics Simulation Code. - Predrag R. Jelenkovic, Ana Radovanovic:
Asymptotic Optimality of the Static Frequency Caching in the Presence of Correlated Requests. - Sasun Hambartsumyan, Vahan V. Mkrtchyan, Vahe L. Musoyan, Hovhannes Sargsyan:
Complexity: an approach through independence. - Petar Kormushev, Kohei Nomoto, Fangyan Dong, Kaoru Hirota:
Time manipulation technique for speeding up reinforcement learning in simulations. - LianLin Li, Fang Li:
A Novel Algorithm for Compressive Sensing: Iteratively Reweighed Operator Algorithm (IROA). - Ioannis Z. Koukoutsidis:
TCP over 3G links: Problems and Solutions. - Yunji Chen, Tianshi Chen, Weiwu Hu:
Global Clock, Physical Time Order and Pending Period Analysis in Multiprocessor Systems. - Er. Akshay Bhardwaj:
Analysis Paralysis: when to stop? - Amelia Carolina Sparavigna:
Digital Restoration of Ancient Papyri. - Knud Thomsen:
Flow of Activity in the Ouroboros Model. - Namrata Vaswani, Wei Lu:
Modified-CS: Modifying Compressive Sensing for Problems with Partially Known Support. - Namrata Vaswani:
Analyzing Least Squares and Kalman Filtered Compressed Sensing. - Jun Zhang, Marios Kountouris, Jeffrey G. Andrews, Robert W. Heath Jr.:
Multi-mode Transmission for the MIMO Broadcast Channel with Imperfect Channel State Information. - Xiaofei Huang:
A Constructive Generalization of Nash Equilibrium for Better Payoffs and Stability. - Rakesh Pandey, H. S. Dhami:
Mathematical Model for Transformation of Sentences from Active Voice to Passive Voice. - Olivier Giraud, Bertrand Georgeot, Dima Shepelyansky:
Delocalization transition for the Google matrix. - Shlomi Dolev, Marina Kopeetsky, Adi Shamir:
RFID Authentication, Efficient Proactive Information Security within Computational Security. - Mohsen Ghaffari, Behnoosh Hariri, Shervin Shirmohammadi:
On the Necessary and Sufficient Condition of Greedy Routing Supporting Geographical Data Networks. - Changbo Chen, Marc Moreno Maza, Bican Xia, Lu Yang:
Computing Cylindrical Algebraic Decomposition via Triangular Decomposition. - Éric Archambault
, David Campbell, Yves Gingras, Vincent Larivière:
Comparing Bibliometric Statistics Obtained from the Web of Science and Scopus. - Lutz Straßburger, Alessio Guglielmi:
A System of Interaction and Structure IV: The Exponentials and Decomposition. - Marco Pavone, Alessandro Arsie, Emilio Frazzoli, Francesco Bullo:
Equitable Partitioning Policies for Mobile Robotic Networks. - Husheng Li:
Multi-agent Q-Learning of Channel Selection in Multi-user Cognitive Radio Systems: A Two by Two Case. - Vincent Rialle
, Annick Vila, Yves Besnard:
Heterogeneous knowledge representation using a finite automaton and first order logic: a case study in electromyography. - Andrei A. Muchnik, Yuri Pritykin, Alexei L. Semenov:
Sequences close to periodic. - Jacob D. Abernethy, Alekh Agarwal, Peter L. Bartlett, Alexander Rakhlin:
A Stochastic View of Optimal Regret through Minimax Duality. - Lucja Kot, Christoph Koch:
Cooperative Update Exchange in the Youtopia System. - (Withdrawn) A game theory approach for self-coexistence analysis among IEEE 802.22 networks.
- Paola Bruscoli
, Alessio Guglielmi
, Tom Gundersen, Michel Parigot:
Quasipolynomial Normalisation in Deep Inference via Atomic Flows and Threshold Formulae. - Peter Grunwald, Peter Harremoës:
Regret and Jeffreys Integrals in Exp. Families. - Peter Harremoës:
Testing Goodness-of-Fit via Rate Distortion. - Gourab Ghoshal, Vinko Zlatic, Guido Caldarelli, M. E. J. Newman:
Random hypergraphs and their applications. - Megan Owen:
Computing Geodesic Distances in Tree Space. - Vladimir V. Gotsulenko, Lyudmila A. Gaponova, Peter I. Kogut:
Definition of Strange Attractor in Benard problem for Generalized Couette Cell. - Andris Ambainis, Andrew M. Childs, François Le Gall, Seiichiro Tani:
The quantum query complexity of certification. - Saburo Higuchi, Marc Mézard:
Susceptibility Propagation for Constraint Satisfaction Problems. - Jochen Bröcker:
A Lower Bound on Arbitrary $f$--Divergences in Terms of the Total Variation. - Burzin Bhavnagri
:
Free actions and Grassmanian variety. - Christopher R. Laumann, R. Moessner, A. Scardicchio, S. L. Sondhi:
Phase transitions and random quantum satisfiability. - Nicolas Gast, Bruno Gaujal:
A Mean Field Approach for Optimization in Particles Systems and Applications. - Sergio Cabello, David Eppstein, Sandi Klavzar:
The Fibonacci dimension of a graph. - Dmitri V. Krioukov, Fragkiskos Papadopoulos, Amin Vahdat, Marián Boguñá:
On curvature and temperature of complex networks. - Chris Orum, Cliff A. Joslyn
:
Valuations and Metrics on Partially Ordered Sets. - Haijun Zhou, Hui Ma:
Community Structure in Single Solution Clusters of a Random K-Satisfiability Formula. - Saifallah Ghobber, Philippe Jaming:
On uncertainty principles in the finite dimensional setting. - Filippo Radicchi:
Human Activity in the Web. - Emmanuel Duflos, Marie De Vilmorin, Philippe Vanheeghe:
Time Allocation of a Set of Radars in a Multitarget Environment. - Michael J. Kurtz
, Alberto Accomazzi, Stephen S. Murray:
The Smithsonian/NASA Astrophysics Data System (ADS) Decennial Report. - Jean Pierre Boon:
Complexity, time and music. - Italo J. Dejter:
Quasiperfect domination in triangular lattices. - George I. Bell:
Notes on solving and playing peg solitaire on a computer. - Joshua Brown Kramer, Lucas Sabalka:
Projection-Forcing Multisets of Weight Changes. - Alexander Stroeer, John K. Cannizzo, Jordan B. Camp, Nicolas Gagarin:
Methods for detection and characterization of signals in noisy data with the Hilbert-Huang Transform. - Italo J. Dejter:
SQS-graph of Solov'eva-Phelps codes. - Ross Duncan:
Generalised Proof-Nets for Compact Categories with Biproducts. - Vyacheslav I. Yukalov, Didier Sornette:
Quantum decision theory as quantum theory of measurement. - Pierre Mozer, Michael Baumann, Grégoire Chevreau, Alexandre Moreau-Gaudry, Stéphane Bart, Raphaële Renard-Penna, Eva Comperat, Pierre Conort, Marc-Olivier Bitker, Emmanuel Chartier-Kastler, Francois Richard, Jocelyne Troccaz:
Mapping of transrectal ultrasonographic prostate biopsies: quality control and learning curve assessment by image processing. - René David, Christophe Raffalli, Guillaume Theyssier, Katarzyna Grygiel, Jakub Kozik
, Marek Zaionc:
Some properties of random lambda terms. - (Withdrawn) Differential Contrastive Divergence.
- Laszlo B. Kish, Tamás Horváth:
Notes on Recent Approaches Concerning the Kirchhoff-Law-Johnson-Noise-based Secure Key Exchange. - Wojciech Sarnowski, Krzysztof Szajowski:
Unspecified distribution in single disorder problem. - Marcus Hutter:
Exact Non-Parametric Bayesian Inference on Infinite Trees. - Alexander Yu. Vlasov:
Quantum Information Science and Nanotechnology. - Agung Trisetyarso, Rodney Van Meter:
Circuit Design for A Measurement-Based Quantum Carry-Lookahead Adder. - Ivan Yu. Tyukin, Erik Steur, Henk Nijmeijer, Cees van Leeuwen:
Adaptive Observers and Parameter Estimation for a Class of Systems Nonlinear in the Parameters. - Ruggero Carli, Fabio Fagnani, Paolo Frasca, Sandro Zampieri:
Efficient quantization for average consensus. - Paul B. Slater:
Matrix plots of reordered bistochastized transaction flow tables: A United States intercounty migration example.

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.