default search action
CoRR, July 2010
- Patrick Armstrong, Ashok Agarwal, A. Bishop, Andre Charbonneau, Ronald J. Desmarais, K. Fransham, N. Hill, Ian Gable, S. Gaudet, Sharon Goliath, Roger Impey, C. Leavett-Brown, J. Ouellete, Michael Paterson, C. Pritchet, Duncan Penfold-Brown, Wayne Podaima, David Schade, Randall J. Sobie:
Cloud Scheduler: a resource manager for distributed compute clouds. - Yalin Chen, Jue-Sam Chou, Chun-Hui Huang:
Comments on Five Smart Card Based Password Authentication Protocols. - Yalin Chen, Jue-Sam Chou, Chun-Hui Huang:
Cryptanalysis on Four Two-Party Authentication Protocols. - Anton Beloglazov, Rajkumar Buyya, Young Choon Lee, Albert Y. Zomaya:
A Taxonomy and Survey of Energy-Efficient Data Centers and Cloud Computing Systems. - Nitin Bhatia, Vandana:
Survey of Nearest Neighbor Techniques. - Krishnan Kumar, J. Nafeesa Begum, V. Sumathy:
A Novel Approach towards Cost Effective Region-Based Group Key Agreement Protocol for Secure Group Communication. - Nayantara Bhatnagar, Andrej Bogdanov, Elchanan Mossel:
The Computational Complexity of Estimating Convergence Time. - Peter Harremoës, Igor Vajda:
On Pairs of f-divergences and their Joint Range. - Graham N. C. Kirby, Alan Dearle, Andrew J. McCarthy, Ronald Morrison, Kevin Mullen, Yanyan Yang, Richard Connor, Paula Welen, Andy Wilson:
First Smart Spaces. - Mubashir Husain Rehmani:
Channel Assortment Strategy for Reliable Communication in Multi-Hop Cognitive Radio Networks. - Thomas Ehrhard, Olivier Laurent:
Acyclic Solos and Differential Interaction Nets. - Mubashir Husain Rehmani, Aline Carneiro Viana, Hicham Khalife, Serge Fdida:
Adaptive and occupancy-based channel selection for unreliable cognitive radio networks. - Mubashir Husain Rehmani, Aline Carneiro Viana, Hicham Khalife, Serge Fdida:
A Cognitive Radio Based Internet Access Framework for Disaster Response Network Deployment. - Mubashir Husain Rehmani, Aline Carneiro Viana, Hicham Khalife, Serge Fdida:
Toward Reliable Contention-aware Data Dissemination in Multi-hop Cognitive Radio Ad Hoc Networks. - Martin Gebser, Torsten Schaub, Sven Thiele, Philippe Veber:
Detecting Inconsistencies in Large Biological Networks with Answer Set Programming. - Salvador Lucas:
From matrix interpretations over the rationals to matrix interpretations over the naturals. - Tansu Alpcan, Lacra Pavel, Nem Stefanovic:
An Optimization and Control Theoretic Approach to Noncooperative Game Design. - Adrian Kuhn, David Erni, Marcus Denker:
Empowering Collections with Swarm Behavior. - Neal E. Young:
A Bound on the Sum of Weighted Pairwise Distances of Points Constrained to Balls. - David Eppstein:
Regular Labelings and Geometric Structures. - Onur Sahin, Osvaldo Simeone, Elza Erkip:
Interference Channel with an Out-of-Band Relay. - Ajay Prasad, G. K. Panda, A. Mitra, Arjun Singh, Deepak Gour:
Applying l-Diversity in anonymizing collaborative social network. - Ajay Prasad, Saurabh Singh Verma, Ashok Kumar Sharma:
Certification Authority Monitored Multilevel and Stateful Policy Based Authorization in Services Oriented Grids. - Irfan Syamsuddin, Junseok Hwang:
The Application of AHP Model to Guide Decision Makers: A Case Study of E-banking Security. - Bill Fefferman, Christopher Umans:
Pseudorandom generators and the BQP vs. PH problem. - Duc Phu Chau, François Brémond, Etienne Corvée, Monique Thonnat:
Repairing People Trajectories Based on Point Clustering. - Markus Tauber:
Autonomic Management in a Distributed Storage System. - Benjamin Doerr, Marvin Künnemann, Magnus Wahlström:
Randomized Rounding for Routing and Covering Problems: Experiments and Improvements. - Amanda M. Whitbrook, Uwe Aickelin, Jonathan M. Garibaldi:
The Transfer of Evolved Artificial Immune System Behaviours between Small and Large Scale Robotic Platforms. - Fabian Lim, Aleksandar Kavcic:
Reliability Distributions of Truncated Max-log-map (MLM) Detectors Applied to ISI Channels. - Mithun Das Gupta:
Additive Non-negative Matrix Factorization for Missing Data. - René Ndoundam, Maurice Tchuenté, Claude Tadonki:
Parallel Chip Firing Game associated with n-cube orientations. - Tomoyuki Yamakami:
Approximate Counting for Complex-Weighted Boolean Constraint Satisfaction Problems. - David G. M. Mitchell, Roxana Smarandache, Michael Lentmaier, Daniel J. Costello Jr.:
Quasi-Cyclic Asymptotically Regular LDPC Codes. - Sergio Mascetti, Dario Freni, Claudio Bettini, Xiaoyang Sean Wang, Sushil Jajodia:
Privacy in geo-social networks: proximity notification with untrusted service providers and curious buddies. - Natarajan Meghanathan, Leslie C. Milton:
A Performance Comparison of Stability, Load-Balancing and Power-Aware Routing Protocols for Mobile Ad Hoc Networks. - Pooja Saini:
Impact Of Mobility and Transmission Range On The Performance of Backoff Algorithms For IEEE 802.11-Based Multi-hop Mobile Ad hoc Networks. - Addepalli V. N. Krishna, A. Vinaya Babu:
Role of Statistical tests in Estimation of the Security of a New Encryption Algorithm. - Ujwalla Gawande, Mukesh A. Zaveri, Avichal Kapur:
Improving Iris Recognition Accuracy By Score Based Fusion Method. - Dimple Juneja, Neha Arora:
An Ant Based Framework for Preventing DDoS Attack in Wireless Sensor Networks. - Krishna Chaithanya Lingashetty:
Delta Learning Rule for the Active Sites Model. - Aboulnasr Hassanien, Sergiy A. Vorobyov:
Transmit Energy Focusing for DOA Estimation in MIMO Radar with Colocated Antennas. - Jean-Claude Belfiore, Patrick Solé:
Unimodular Lattices for the Gaussian Wiretap Channel. - Kai Cai, Khaled Ben Letaief, Pingyi Fan, Rongquan Feng:
On the Solvability of 2-pair Unicast Networks --- A Cut-based Characterization. - Tetsuya Ishiu:
Notes on higher-dimensional tarai functions. - Byung-Hak Kim, Arvind Yedla, Henry D. Pfister:
IMP: A Message-Passing Algorithmfor Matrix Completion. - Blaine Nelson, Benjamin I. P. Rubinstein, Ling Huang, Anthony D. Joseph, Steven J. Lee, Satish Rao, J. D. Tygar:
Query Strategies for Evading Convex-Inducing Classifiers. - Yang Chen, Matthew R. McKay:
Perturbed Hankel Determinants: Applications to the Information Theory of MIMO Wireless Communications. - Glenn Langford:
An Improved Neighbourhood for the Traveling Tournament Problem. - Sundeep Rangan:
Femto-Macro Cellular Interference Control with Subband Scheduling and Interference Cancelation. - Steven W. Peters, Robert W. Heath Jr.:
User Partitioning for Less Overhead in MIMO Interference Channels. - Pranav Dandekar, Ashish Goel, Ramesh Govindan, Ian Post:
Liquidity in Credit Networks: A Little Trust Goes a Long Way. - Ahmed Badr, Ashish Khisti, Emin Martinian:
Diversity Embedded Streaming Erasure Codes (DE-SCo): Constructions and Optimality. - Farn Wang:
Simulation-Checking of Real-Time Systems with Fairness Assumptions. - Huy Anh Nguyen, Rong Zheng:
Binary Independent Component Analysis with OR Mixtures. - G. C. Pentzaropoulos:
Limits of responsiveness concerning human-readable knowledge bases: an operational analysis. - (Withdrawn) Computational Model of Music Sight Reading: A Reinforcement Learning Approach.
- Chandan Singh, Nitin Bhatia:
A Fast Decision Technique for Hierarchical Hough Transform for Line Detection. - (Withdrawn) A Reinforcement Learning Model Using Neural Networks for Music Sight Reading Learning Problem.
- Vikram Krishnamurthy:
Quickest Time Detection with Phase-Type Change Distribution and Social Learning. - George Katsirelos, Nina Narodytska, Toby Walsh:
On The Complexity and Completeness of Static Constraints for Breaking Row and Column Symmetry. - Christian Bessiere, George Katsirelos, Nina Narodytska, Claude-Guy Quimper, Toby Walsh:
Decomposition of the NVALUE constraint. - Toby Walsh:
Symmetry within and between solutions. - Toby Walsh:
Online Cake Cutting. - Santanu Halder, Debotosh Bhattacharjee, Mita Nasipuri, Dipak Kumar Basu, Mahantapas Kundu:
Face Synthesis (FASY) System for Determining the Characteristics of a Face Image. - Mausumi Bose, Rahul Mukerjee:
Anti-Collusion Digital Fingerprinting Codes via Partially Cover-Free Families. - Mrinal Kanti Bhowmik, Debotosh Bhattacharjee, Mita Nasipuri, Dipak Kumar Basu, Mahantapas Kundu:
Quotient Based Multiresolution Image Fusion of Thermal and Visual Images Using Daubechies Wavelet Transform for Human Face Recognition. - Mrinal Kanti Bhowmik, Debotosh Bhattacharjee, Mita Nasipuri, Dipak Kumar Basu, Mahantapas Kundu:
Fusion of Daubechies Wavelet Coefficients for Human Face Recognition. - Mrinal Kanti Bhowmik, Debotosh Bhattacharjee, Mita Nasipuri, Dipak Kumar Basu, Mahantapas Kundu:
Fusion of Wavelet Coefficients from Visual and Thermal Face Images for Human Face Recognition - A Comparative Study. - Mrinal Kanti Bhowmik, Debotosh Bhattacharjee, Mita Nasipuri, Dipak Kumar Basu, Mahantapas Kundu:
A Parallel Framework for Multilayer Perceptron for Human Face Recognition. - Mrinal Kanti Bhowmik, Debotosh Bhattacharjee, Mita Nasipuri, Dipak Kumar Basu, Mahantapas Kundu:
Image Pixel Fusion for Human Face Recognition. - Mrinal Kanti Bhowmik, Debotosh Bhattacharjee, Mita Nasipuri, Dipak Kumar Basu, Mahantapas Kundu:
Classification of Fused Images using Radial Basis Function Neural Network for Human Face Recognition. - Debotosh Bhattacharjee, Mrinal Kanti Bhowmik, Mita Nasipuri, Dipak Kumar Basu, Mahantapas Kundu:
Classification of fused face images using multilayer perceptron neural network. - Mrinal Kanti Bhowmik, Debotosh Bhattacharjee, Mita Nasipuri, Mahantapas Kundu, Dipak Kumar Basu:
Classification of Log-Polar-Visual Eigenfaces using Multilayer Perceptron. - Mirco Gelain, Maria Silvia Pini, Francesca Rossi, Kristen Brent Venable, Toby Walsh:
Local search for stable marriage problems with ties and incomplete lists. - Mrinal Kanti Bhowmik, Debotosh Bhattacharjee, Mita Nasipuri, Dipak Kumar Basu, Mahantapas Kundu:
Human Face Recognition using Line Features. - Fei Wei, Huazhong Yang:
Transmission Line Inspires A New Distributed Algorithm to Solve the Nonlinear Dynamical System of Physical Circuit. - Andreas U. Schmidt, Andreas Leicher, Yogendra Shah, Inhyok Cha:
Tree-formed Verification Data for Trusted Platforms. - Amnon Shashua, Gabi Pragier:
The Latent Bernoulli-Gauss Model for Data Analysis. - I-Hong Hou, P. R. Kumar:
Scheduling Periodic Real-Time Tasks with Heterogeneous Reward Requirements. - Avinash Achar, Srivatsan Laxman, P. S. Sastry:
A unified view of Automata-based algorithms for Frequent Episode Discovery. - John Robert Burger:
Artificial Learning in Artificial Memories. - Frederic Thouin, Mark Coates, Michael G. Rabbat:
Large scale probabilistic available bandwidth estimation. - Wojciech Mazurczyk, Milosz Smolarczyk, Krzysztof Szczypiorski:
Retransmission Steganography Applied. - Toby Walsh:
Is Computational Complexity a Barrier to Manipulation? - Zachary Snow, David Baelde, Gopalan Nadathur:
Redundancies in Dependently Typed Lambda Calculi and Their Relevance to Proof Search. - Guillermo Morales-Luna:
A Geometric Presentation of Probabilistic Satisfiability. - Kenta Kasai, Kohichi Sakaniwa:
Fountain Codes with Multiplicatively Repeated Non-Binary LDPC Codes. - Jing Han, Ming Li, Lei Guo:
Soft Control on Collective Behavior of a Group of Autonomous Agents by a Shill Agent. - Rémi Flamary, Benjamin Labbé, Alain Rakotomamonjy:
Filtrage vaste marge pour l'étiquetage séquentiel à noyaux de signaux. - Inês Lynce, Ralf Treinen:
Proceedings First International Workshop on Logics for Component Configuration, LoCoCo 2010, Edinburgh, UK, 10th July 2010. EPTCS 29, 2010 [contents] - Mirco Gelain, Maria Silvia Pini, Francesca Rossi, Kristen Brent Venable, Toby Walsh:
Local search for stable marriage problems. - Florian Dupuy, Philippe Loubaton:
On the Capacity Achieving Covariance Matrix for Frequency Selective MIMO Channels Using the Asymptotic Approach. - Vadim E. Levit, Eugen Mandrescu:
On the independence polynomial of an antiregular graph. - David Elkouss, Jesús Martínez-Mateo, Vicente Martín:
Secure rate-adaptive reconciliation. - Gyula Farkas, Béla Genge, Piroska Haller:
A Platform for Implementing Secure Wireless Ad Hoc Networks. - Jonathan Heusser, Pasquale Malacaria:
Quantifying Information Leak Vulnerabilities. - Béla Genge, Piroska Haller:
End-Host Distribution in Application-Layer Multicast: Main Issues and Solutions. - Arvind Yedla, Henry D. Pfister, Krishna R. Narayanan:
LDPC Code Design for Transmission of Correlated Sources Across Noisy Channels Without CSIT. - Jaroslaw Kwapien, Stanislaw Drozdz, Adam Orczyk:
Linguistic complexity: English vs. Polish, text vs. corpus. - Pedro A. Ortega, Daniel A. Braun:
An axiomatic formalization of bounded rationality based on a utility-information equivalence. - Gautam S. Thakur, Udayan Kumar, Ahmed Helmy, Wei-jen Hsu:
Analysis of Spatio-Temporal Preferences and Encounter Statistics for DTN Performance. - An Liu, Youjian Liu, Haige Xiang, Wu Luo:
MIMO B-MAC Interference Network Optimization under Rate Constraints by Polite Water-filling and Duality. - Oleg S. Pianykh:
Bilateral filters: what they can and cannot do. - Claude Michel, Michel Rueher:
Handling software upgradeability problems with MILP solvers. 1-10 - Josep Argelich, Daniel Le Berre, Inês Lynce, João Marques-Silva, Pascal Rapicault:
Solving Linux Upgradeability Problems Using Boolean Optimization. 11-22 - Paulo Trezentos:
Comparison of PBO solvers in a dependency solving domain. 23-31 - Emmanuel Ohayon, Matthieu Lemerre, Vincent David:
CONFIGEN: A tool for managing configuration options. 32-43 - Andreas Kübler, Christoph Zengler, Wolfgang Küchlin:
Model Counting in Product Configuration. 44-53 - Henryk Fuks:
Inflection system of a language as a complex network. - Ralf Koetter, Michelle Effros, Muriel Médard:
A Theory of Network Equivalence. - Edoardo Carta-Gerardino, Parisa Babaali:
Weighted Automata and Recurrence Equations for Regular Languages. - D. Sasikala, R. Neelaveni:
Registration of Brain Images using Fast Walsh Hadamard Transform. - Michael Ben-Or, Danny Dolev, Ezra N. Hoch:
Simple Gradecast Based Algorithms. - Annabelle McIver, Larissa Meinicke, Carroll Morgan:
Compositional closure for Bayes Risk in probabilistic noninterference. - Leonid Malinin, Natalia Malinina:
On the solution of the Graph Isomorphism Problem Part 1. - Patrik Wahlberg, Peter J. Schreier:
On the instantaneous frequency of Gaussian stochastic processes. - Dmitry V. Chistikov, Andrey A. Voronenko:
Learning Read-Once Functions Using Subcube Identity Queries. - Olesya Mryglod, Yurij Holovatch:
Intelligent data analysis based on the complex network theory methods: a case study. - Michael Okun:
On the Power of Impersonation Attacks. - Vojislav Gajic, Jianwei Huang, Bixio Rimoldi:
Competition of Wireless Providers for Atomic Users. - Chuan Heng Foh, Jianfei Cai, Jalaluddin Qureshi:
Collision Codes: Decoding Superimposed BPSK Modulated Wireless Transmissions. - Christian Hoffmann:
Exponential Time Complexity of Weighted Counting of Independent Sets. - Andreas Björklund, Thore Husfeldt, Petteri Kaski, Mikko Koivisto:
Narrow sieves for parameterized paths and packings. - Konstantin Kutzkov, Dominik Scheder:
Using CSP To Improve Deterministic 3-SAT. - Yanjun Ma, Jiandong Li, Rui Chen, Junliang Yao:
Group Based Interference Alignment. - Andréa W. Richa, Christian Scheideler, Stefan Schmid, Jin Zhang:
A Jamming-Resistant MAC Protocol for Multi-Hop Wireless Networks. - Omar Mehanna, Ahmed K. Sultan:
Inter-Sensing Time Optimization in Cognitive Radio Networks. - Xuebin Wu, Zhiyuan Yan, Ning Chen, Meghanad D. Wagh:
Prime Factor Cyclotomic Fourier Transforms with Reduced Complexity over Finite Fields. - Xuebin Wu, Meghanad D. Wagh, Ning Chen, Zhiyuan Yan, Ying Wang:
Composite Cyclotomic Fourier Transforms with Reduced Complexities. - Steven Bitner, Ovidiu Daescu:
Minimum Sum Dipolar Spanning Tree in R^3. - Vladimir Kolmogorov:
Submodularity on a tree: Unifying $L^\natural$-convex and bisubmodular functions. - Samir Kumar Bandyopadhyay, Indra Kanta Maitra:
An Alternative Approach of Steganography using Reference Image. - Stefano Rini, Daniela Tuninetti, Natasha Devroye:
New Results on the Capacity of the Gaussian Cognitive Interference Channel. - Eric Price:
Efficient Sketches for the Set Query Problem. - Jubin Jose, Sriram Vishwanath:
Queue-Architecture and Stability Analysis in Cooperative Relay Networks. - Michael T. Goodrich, Michael Mitzenmacher:
MapReduce Parallel Cuckoo Hashing and Oblivious RAM Simulations. - Richard Beigel, Bin Fu:
A Dense Hierarchy of Sublinear Time Approximation Schemes for Bin Packing. - Collin Bennett, Robert L. Grossman, David Locke, Jonathan Seidman, Steve Vejcik:
MalStone: Towards A Benchmark for Analytics on Large Data Clouds. - Huy Anh Nguyen, Tam Van Nguyen, Dong Il Kim, Deokjai Choi:
Network Traffic Anomalies Detection and Identification with Flow Monitoring. - Tam Van Nguyen, Wontaek Lim, Huy Anh Nguyen, Deokjai Choi:
Context Awareness Framework Based on Contextual Graph. - Huy Anh Nguyen, Deokjai Choi:
Network Anomaly Detection: Flow-based or Packet-based Approach? - Huy Anh Nguyen, Deokjai Choi:
Application of Data Mining to Network Intrusion Detection: Classifier Selection Model. - Dariusz Dereniowski:
From Pathwidth to Connected Pathwidth. - Huy Anh Nguyen, Tam Van Nguyen, Deokjai Choi:
How to Maximize User Satisfaction Degree in Multi-service IP Networks. - Gagan Aggarwal, Gagan Goel, Chinmay Karande, Aranyak Mehta:
Online Vertex-Weighted Bipartite Matching and Single-bid Budgeted Allocations. - (Withdrawn) Binary is Good: A Binary Inference Framework for Primary User Separation in Cognitive Radio Networks.
- Tam Van Nguyen, Wontaek Lim, Huy Anh Nguyen, Deokjai Choi, Chilwoo Lee:
Context Ontology Implementation for Smart Home. - Tam Van Nguyen, Huy Anh Nguyen, Deokjai Choi:
Development of a Context Aware Virtual Smart Home Simulator. - Vladimir Pestov:
A note on sample complexity of learning binary output neural networks under fixed input distributions. - Anna R. Karlin, Claire Mathieu, C. Thach Nguyen:
Integrality Gaps of Linear and Semi-definite Programming Relaxations for Knapsack. - Giorgi Japaridze:
Separating the basic logics of the basic recurrences. - Sven Schewe:
Minimisation of Deterministic Parity and Buchi Automata and Relative Minimisation of Deterministic Finite Automata. - Chetan S. Rao, Jeffrey John Geevarghese, Karthik Rajan:
Improved approximation bounds for Vector Bin Packing. - Marek Karpinski, Yakov Nekrich:
Top-K Color Queries for Document Retrieval. - Mayur Punekar, Mark F. Flanagan:
Low Complexity Linear Programming Decoding of Nonbinary Linear Codes. - Amin Coja-Oghlan, Charilaos Efthymiou:
On independent sets in random graphs. - Christian Feichtinger, Johannes Habich, Harald Köstler, Georg Hager, Ulrich Rüde, Gerhard Wellein:
A Flexible Patch-Based Lattice Boltzmann Parallelization Approach for Heterogeneous GPU-CPU Clusters. - Raphael Sznitman, Manaswi Gupta, Gregory D. Hager, Paulo E. Arratia, Josué Sznitman:
Multi-environment model estimation for motility analysis of Caenorhabditis Elegans. - Amir Ingber, Meir Feder:
Parallel Bit Interleaved Coded Modulation. - Edward Rosten, Gerhard Reitmayr, Tom Drummond:
Improved RANSAC performance using simple, iterative minimal-set solvers. - Xinyu Xing, Jianxun Dang, Richard Han, Xue Liu, Shivakant Mishra:
Intrusions into Privacy in Video Chat Environments: Attacks and Countermeasures. - Cihan Tepedelenlioglu, Mahesh K. Banavar, Andreas Spanias:
On Inequalities Relating the Characteristic Function and Fisher Information. - Erin W. Chambers, David Eppstein:
Flows in One-Crossing-Minor-Free Graphs. - Wei Chen, Pinyan Lu, Xiaorui Sun, Yajun Wang, Zeyuan Allen Zhu:
Pricing in Social Networks: Equilibrium and Revenue Maximization. - Ying-Yu Zhang, Song-Feng Lu:
Quantum search by partial adiabatic evolution. - Marcin Bienkowski:
An Optimal Lower Bound for Buffer Management in Multi-Queue Switches. - Konstantin Avrachenkov, Evsey Morozov:
Stability Analysis of GI/G/c/K Retrial Queue with Constant Retrial Rate. - Dhruv Srivastva:
An ICT based solution to make mines safer. - Yakov Nekrich:
A Fast Algorithm for Three-Dimensional Layers of Maxima Problem. - Alberto Pettarin, Andrea Pietracaprina, Geppino Pucci, Eli Upfal:
Infectious Random Walks. - Thomas Kesselheim:
A Constant-Factor Approximation for Wireless Capacity Maximization with Power Control in the SINR Model. - Juan José Jaramillo, R. Srikant, Lei Ying:
Scheduling for Optimal Rate Allocation in Ad Hoc Networks With Heterogeneous Delay Constraints. - Shayan Oveis Gharan, Jan Vondrák:
Submodular Maximization by Simulated Annealing. - Krishnendu Chatterjee, Laurent Doyen, Thomas A. Henzinger, Jean-François Raskin:
Generalized Mean-payoff and Energy Games. - Vahideh H. Manshadi, Shayan Oveis Gharan, Amin Saberi:
Online Stochastic Matching: Online Actions Based on Offline Statistics. - David Zuckerman:
Can Random Coin Flips Speed Up a Computer? - Sagarmoy Dutta, Piyush P. Kurur:
Quantum Cyclic Code. - Lim Huey Charn, Liyana Nuraini Rasid, Shahrel Azmin Suandi:
A Study on the Effectiveness of Different Patch Size and Shape for Eyes and Mouth Detection. - Ezra N. Hoch, Michael Ben-Or, Danny Dolev:
A Fault-Resistant Asynchronous Clock Function. - Tomás Brázdil, Stefan Kiefer, Antonín Kucera, Ivana Hutarová Vareková:
Runtime Analysis of Probabilistic Programs with Unbounded Recursion. - Rafael R. Kamalian, Petros A. Petrosyan:
A note on interval edge-colorings of graphs. - Hugo Lopes Tavares, Gustavo Guimaraes Rezende, Vanderson Mota dos Santos, Rodrigo Soares Manhães, Rogério Atem de Carvalho:
A tool stack for implementing Behaviour-Driven Development in Python Language. - Stoicho D. Stoichev:
Polynomial time and space exact and heuristic algorithms for determining the generators, orbits and order of the graph automorphism group. - Serge Gaspers, Mathieu Liedloff, Maya Stein, Karol Suchan:
Complexity of Splits Reconstruction for Low-Degree Trees. - Ahmed Badr, Ashish Khisti, Emin Martinian:
Diversity Embedded Streaming Erasure Codes (DE-SCo): Constructions and Optimality. - Randall A. Berry, David N. C. Tse:
Shannon Meets Nash on the Interference Channel. - Anthony Gidudu, Greg Hulley, Tshilidzi Marwala:
An svm multiclassifier approach to land cover mapping. - Marco Aldinucci, Andrea Bracciali, Pietro Liò, Anil Sorathiya, Massimo Torquati:
StochKit-FF: Efficient Systems Biology on Multicore Architectures. - Kenta Kasai, Manabu Hagiwara, Hideki Imai, Kohichi Sakaniwa:
Quantum Error Correction beyond the Bounded Distance Decoding Limit. - Federico Aschieri, Stefano Berardi:
Interactive Learning-Based Realizability for Heyting Arithmetic with EM1. - Taesup Moon, Tsachy Weissman, Jae-Young Kim:
Discrete denoising of heterogenous two-dimensional data. - Piotr Faliszewski, Edith Hemaspaandra, Lane A. Hemaspaandra:
Multimode Control Attacks on Elections. - Noga Alon, Hagit Attiya, Shlomi Dolev, Swan Dubois, Maria Gradinariu, Sébastien Tixeuil:
Practically Stabilizing Atomic Memory. - Jinhua Jiang, Ivana Maric, Andrea J. Goldsmith, Shlomo Shamai, Shuguang Cui:
On the Capacity of a Class of Cognitive Z-interference Channels. - Kristoffer Arnsfelt Hansen, Rasmus Ibsen-Jensen, Peter Bro Miltersen:
The complexity of solving reachability games using value and strategy iteration. - Brian M. Kurkoski:
Rewritable Codes for Flash Memories Based Upon Lattices, and an Example Using the E8 Lattice. - Dömötör Pálvölgyi:
Communication Complexity. - (Withdrawn) NP=PSPACE.
- Thomas W. Cusick:
Affine equivalence of cubic homogeneous rotation symmetric Boolean functions. - A. V. Vaniachine:
LHC Databases on the Grid: Achievements and Open Issues. - Josef Kanizo, David Hay, Isaac Keslassy:
Maximum Bipartite Matching Size And Application to Cuckoo Hashing. - Reza Mirghaderi, Andrea J. Goldsmith:
Communication with Rate-Limited Feedback. - Joseph O'Rourke:
On Flat Polyhedra deriving from Alexandrov's Theorem. - Michael R. Fellows, Serge Gaspers, Frances A. Rosamond:
Parameterizing by the Number of Numbers. - Joel Veness, Kee Siong Ng, Marcus Hutter, David Silver:
Reinforcement Learning via AIXI Approximation. - Arie Yeredor:
Independent Component Analysis Over Galois Fields. - Peter Sunehag, Marcus Hutter:
Consistency of Feature Markov Processes. - Minji Kim, Muriel Médard, João Barros:
A Multi-hop Multi-source Algebraic Watchdog. - Symeon Chatzinotas, Björn E. Ottersten:
Free Probability based Capacity Calculation of Multiantenna Gaussian Fading Channels with Cochannel Interference. - Evangelos Kranakis, Danny Krizanc, Pat Morin, Lata Narayanan, Ladislav Stacho:
A Tight Bound on the Maximum Interference of Random Sensors in the Highway Model. - Joey Paquet, Serguei A. Mokhov:
Comparative Studies of Programming Languages; Course Lecture Notes. - Michel X. Goemans, José A. Soto:
Symmetric Submodular Function Minimization Under Hereditary Family Constraints. - José A. Soto:
Matroid Secretary Problem in the Random Assignment Model. - Friedrich Eisenbrand, Dömötör Pálvölgyi, Thomas Rothvoß:
Bin Packing via Discrepancy of Permutations. - Jörg M. Hahn:
What's wrong with Phong - Designers' appraisal of shading in CAD-systems. - Stephen L. Smith, Jana Tumova, Calin Belta, Daniela Rus:
Optimal Path Planning under Temporal Logic Constraints. - Virginia Vassilevska Williams:
Faster Replacement Paths. - Qian Wang, Zesheng Chen, Chao Chen:
Darknet-Based Inference of Internet Worm Temporal Characteristics. - Guoqiang Zhang, Bruno Quoitin, Shi Zhou:
Phase Changes in the Evolution of the IPv4 and IPv6 AS-Level Internet Topologies. - Manu Basavaraju, L. Sunil Chandran:
Acyclic Edge Coloring of Triangle Free Planar Graphs. - Andrej Bogdanov, Elchanan Mossel:
On extracting common random bits from correlated sources. - Rubén Cuevas Rumín, Michal Kryczka, Ángel Cuevas, Sebastian Kaune, Carmen Guerrero, Reza Rejaie:
Is Content Publishing in BitTorrent Altruistic or Profit-Driven. - Oleksiy Kurganskyy, Igor Potapov:
A measure of state transition of collective of stateless automata in discrete environment. - Ulas Ayaz, Holger Rauhut:
Nonuniform Sparse Recovery with Gaussian Matrices. - Loris Bozzato, Mauro Ferrari:
A Note on Semantic Web Services Specification and Composition in Constructive Description Logics. - John W. Byers, Brent Heeringa, Michael Mitzenmacher, Georgios Zervas:
Heapable Sequences and Subsequences. - Maxim Raginsky, Sina Jafarpour, Zachary T. Harmany, Roummel F. Marcia, Rebecca Willett, A. Robert Calderbank:
Performance bounds for expander-based compressed sensing in Poisson noise. - Radu Gramatovici, Ionut Tutu:
A methodological approach on the architectural development of integrated e-learning systems. - (Withdrawn) Double Circulant Minimum Storage Regenerating Codes.
- Kyle Johnson, Clayton Chang, Hod Lipson:
Neural Network Based Reconstruction of a 3D Object from a 2D Wireframe. - Kamran Karimi:
A Brief Introduction to Temporality and Causality. - Omid Amini, Jean-Daniel Boissonnat, Pooran Memari:
Geometric Tomography With Topological Guarantees. - Hiroshi Fukuda, Chiaki Kanomata, Nobuaki Mutoh, Gisaku Nakamura, Doris Schattschneider:
Polyominoes and Polyiamonds as Fundamental Domains of Isohedral Tilings with Rotational Symmetry. - Yossi Azar, Iftah Gamzu:
Ranking with Submodular Valuations. - Rosa Camps, Xavier Mora, Laia Saumell:
A general method for deciding about logically constrained issues. - Bin Fu, Yunhui Fu:
Sublinear Time Motif Discovery from Multiple Sequences. - Artem Chebotko, Bin Fu:
XML Reconstruction View Selection in XML Databases: Complexity Analysis and Approximation Scheme. - Zhixiang Chen, Bin Fu:
The Complexity of Testing Monomials in Multivariate Polynomials. - Zhixiang Chen, Bin Fu, Yang Liu, Robert T. Schweller:
Algorithms for Testing Monomials in Multivariate Polynomials. - Zhixiang Chen, Bin Fu:
Approximating Multilinear Monomial Coefficients and Maximum Multilinear Monomials in Multivariate Polynomials. - Ragavendran Gopalakrishnan, Dimitrios Kanoulas, Naga Naresh Karuturi, C. Pandu Rangan, Rajmohan Rajaraman, Ravi Sundaram:
Capacitated Caching Games. - Parosh Aziz Abdulla, Pavel Krcál, Wang Yi:
Sampled Semantics of Timed Automata. - Pedro C. Pinto, Moe Z. Win:
A Unifying Framework for Local Throughput in Wireless Networks. - Miroslaw Truszczynski:
Trichotomy and Dichotomy Results on the Complexity of Reasoning with Disjunctive Logic Programs. - Neri Merhav:
Data processing theorems and the second law of thermodynamics. - Graeme Smith:
Quantum Channel Capacities. - Adam Megacz:
Multi-Level Languages are Generalized Arrows. - Guoqiang Zhang, Suqi Cheng, Guoqing Zhang:
LANC: locality-aware network coding for better P2P traffic localization. - Michael Thomas:
On the Applicability of Post's Lattice. - Wentu Song, Kai Cai, Rongquan Feng, Rui Wang:
Encoding Complexity for Intersession Network Coding with Two Simple Multicast Sessions. - Himanshu Tyagi, Prakash Narayan, Piyush Gupta:
When is a Function Securely Computable? - Hoang Trinh:
A Machine Learning Approach to Recovery of Scene Geometry from Images. - Satish Narayana Srirama:
Publishing and Discovery of Mobile Web Services in Peer to Peer Networks. - Satish Narayana Srirama, Matthias Jarke, Wolfgang Prinz:
A Mediation Framework for Mobile Web Service Provisioning. - Diego Figueira, Santiago Figueira, Sylvain Schmitz, Philippe Schnoebelen:
Ackermann and Primitive-Recursive Bounds with Dickson's Lemma. - Tomoyuki Yamakami:
The Roles of Advice to One-Tape Linear-Time Turing Machines and Finite Automata. - Steven Obua:
Purely Functional Structured Programming. - Marek Adamczyk:
Greedy algorithm for stochastic matching is a 2-approximation. - Hao Chen:
Strongly Resilient Non-Interactive Key Predistribution For Hierarchical Networks. - Ghassan Samara, Sureswaran Ramadas, Wafaa A. H. Al-Salihy:
Safety Message Power Transmission Control for Vehicular Ad hoc Networks. - (Withdrawn) Resolving the Connectivity-Throughput Trade-Off in Random Networks.
- Di Li, Changchuan Yin, Changhai Chen, Shuguang Cui:
A Selection Region Based Routing Protocol for Random Mobile ad hoc Networks. - Shengtian Yang:
Second-Order Weight Distributions. - Laurent Hubert, Thomas P. Jensen, Vincent Monfort, David Pichardie:
Enforcing Secure Object Initialization in Java. - John Alexandris, Gregory Karagiorgos, Ioannis Stavrakakis:
Enhanced Random Walk with Choice: An Empirical Study. - Marco Gavanelli, Fabrizio Riguzzi, Michela Milano, Paolo Cagnoli:
Logic-Based Decision Support for Strategic Environmental Assessment. - Joseph O'Rourke:
On Folding a Polygon to a Polyhedron. - Laurent Hubert:
A Non-Null Annotation Inferencer for Java Bytecode. - Evgeny Kharitonov, Anton Slesarev, Ilya Muchnik, Fedor Romanenko, Dmitry Belyaev, Dmitry Kotlyarov:
Link Graph Analysis for Adult Images Classification. - Robert Brummayer, Matti Järvisalo:
Testing and Debugging Techniques for Answer Set Solver Development. - B. K. Pradeepa, Joy Kuri:
Aggregate Download Throughput for TCP-controlled long file transfers in a WLAN with multiple STA-AP association rates. - Natan Rubin, Haim Kaplan, Micha Sharir:
Improved Bounds for Geometric Permutations. - Laurent Hubert, David Pichardie:
Soundly Handling Static Fields: Issues, Semantics and Analysis. - Elvira Albert, Miguel Gómez-Zamalloa, Laurent Hubert, German Puebla:
Verification of Java Bytecode using Analysis and Transformation of Logic Programs. - J. T. Stevanak, Lincoln D. Carr:
Distinguishing Fact from Fiction: Pattern Recognition in Texts Using Complex Networks. - Amel Benabbou, Safia Nait Bahloul, Youssef Amghar:
An Algorithmic Structuration of a Type System for an Orthogonal Object/Relational Model. - Yuichi Yoshida:
Lower Bounds on Query Complexity for Testing Bounded-Degree CSPs. - Sariel Har-Peled, Nirman Kumar:
Approximate Nearest Neighbor Search for Low Dimensional Queries. - Zhaohua Luo:
A New Approach to Abstract Machines - Introduction to the Theory of Configuration Machines. - Yasha Savelyev:
Time symmetric Go. - Liangbin Li, Yindi Jing, Hamid Jafarkhani:
Multi-User Transmissions for Relay Networks with Linear Complexity. - Pegah Sattari, Christina Fragouli, Athina Markopoulou:
Active Topology Inference using Network Coding. - T. G. Sultanov, Andrei M. Sukhov:
Simulation technique for available bandwidth estimation. - Jean-François Dufourd, Yves Bertot:
Formal study of plane Delaunay triangulation. - Laurent Hubert, Nicolas Barré, Frédéric Besson, Delphine Demange, Thomas P. Jensen, Vincent Monfort, David Pichardie, Tiphaine Turpin:
Sawja: Static Analysis Workshop for Java. - Dario Benedetto, Emanuele Caglioti, Giampaolo Cristadoro, Mirko Degli Esposti:
Relative entropy via non-sequential recursive pair substitutions. - Yakov Nekrich:
Searching in Dynamic Catalogs on a Tree. - Manosij Ghosh Dastidar:
Extension of Stanley's Theorem for Partitions. - Mohammad Hamed Firooz, Dustin Maas, Junxing Zhang, Neal Patwari, Sneha Kumar Kasera:
Channel Sounding for the Masses: Low Complexity GNU 802.11b Channel Impulse Response Estimation. - José Júlio Alferes, Matthias Knorr, Terrance Swift:
Query-driven Procedures for Hybrid MKNF Knowledge Bases. - Sirin Nitinawarat, Chunxuan Ye, Alexander Barg, Prakash Narayan, Alex Reznik:
Secret Key Generation for a Pairwise Independent Network Model. - Gagan Goel, Chinmay Karande, Lei Wang:
Single Parameter Combinatorial Auctions with Partially Public Valuations. - Tianyi Zhou, Dacheng Tao, Xindong Wu:
Manifold Elastic Net: A Unified Framework for Sparse Dimension Reduction. - Hessam Mahdavifar, Alexander Vardy:
Achieving the Secrecy Capacity of Wiretap Channels Using Polar Codes. - Cong Tian, Zhenhua Duan:
Making Abstraction Refinement Efficient in Model Checking. - Jesús Martínez-Mateo, David Elkouss, Vicente Martín:
Improved construction of irregular progressive edge-growth Tanner graphs. - Matteo Miraz:
On the Cooperation of Independent Registries. - Yossi Azar, Iftah Gamzu:
Efficient Submodular Function Maximization under Linear Packing Constraints. - Oswin Aichholzer, Franz Aurenhammer, Erik D. Demaine, Ferran Hurtado, Pedro Ramos, Jorge Urrutia:
On k-Convex Polygons. - Christian Wulff-Nilsen:
Min st-Cut of a Planar Graph in O(n loglog n) Time. - Jaroslaw Byrka, Mohammadreza Ghodsi, Aravind Srinivasan:
LP-rounding algorithms for facility-location problems. - Loïc Pottier:
Connecting Gröbner Bases Programs with Coq to do Proofs in Algebra, Geometry and Arithmetics. - Abuzer Yakaryilmaz, A. C. Cem Say:
Unbounded-error quantum computation with small space bounds. - Mario Rodríguez-Artalejo, Carlos A. Romero-Díaz:
A Declarative Semantics for CLP with Qualification and Proximity. - Satish Narayana Srirama, Matthias Jarke, Wolfgang Prinz:
Mobile Web Service Discovery in Peer to Peer Networks. - Satish Narayana Srirama, Mohammad Abdullah Al Faruque, M. A. S. Munni:
Alternatives to Mobile Keypad Design: Improved Text Feed. - Satish Narayana Srirama, Matthias Jarke, Wolfgang Prinz, Kiran Pendyala:
Security Aware Mobile Web Service Provisioning. - Satish Narayana Srirama, Matthias Jarke, Wolfgang Prinz:
A Performance Evaluation of Mobile Web Services Security. - Satish Narayana Srirama, Anton Naumenko:
Secure Communication and Access Control for Mobile Web Service Provisioning. - Ryuhei Mori, Toshiyuki Tanaka:
Non-Binary Polar Codes using Reed-Solomon Codes and Algebraic Geometry Codes. - Sabrina Baselice, Piero A. Bonatti:
A decidable subclass of finitary programs. - Ali Tajer, Xiaodong Wang:
(n,K)-user Interference Channels: Degrees of Freedom. - Chitta Baral, Gregory Gelfond, Enrico Pontelli, Tran Cao Son:
Logic Programming for Finding Models in the Logics of Knowledge and its Applications: A Case Study. - Dusan Jakovetic, João Manuel Freitas Xavier, José M. F. Moura:
Cooperative Convex Optimization in Networked Systems: Augmented Lagrangian Algorithms with Directed Gossip Communication. - Aaron D. Sterling:
Formal Verification of Self-Assembling Systems. - Benjamin Moseley:
Scheduling to Minimize Energy and Flow Time in Broadcast Scheduling. - Allen Y. Yang, Arvind Ganesh, Zihan Zhou, Shankar Sastry, Yi Ma:
A Review of Fast l1-Minimization Algorithms for Robust Face Recognition. - Satish Karra, K. R. Rajagopal:
Development of three dimensional constitutive theories based on lower dimensional experimental data. - Satish Karra, K. R. Rajagopal:
A thermodynamic framework to develop rate-type models for fluids without instantaneous elasticity. - Alexandra Silva, Marcello M. Bonsangue, Jan J. M. M. Rutten:
Non-Deterministic Kleene Coalgebras. - Stephen O'Hara:
Video Event Recognition for Surveillance Applications (VERSA). - Alexandra Meliou, Carlos Guestrin, Joseph M. Hellerstein:
Multiresolution Cube Estimators for Sensor Network Aggregate Queries. - Lucas Dixon, Ross Duncan, Aleks Kissinger:
Open Graphs and Computational Reasoning. 169-180 - Umar Syed, Aleksandrs Slivkins, Nina Mishra:
Adapting to the Shifting Intent of Search Queries. - Ning Chen, Nick Gravin, Pinyan Lu:
On the Approximability of Budget Feasible Mechanisms. - Bruno Grenet, Erich L. Kaltofen, Pascal Koiran, Natacha Portier:
Symmetric Determinantal Representation of Formulas and Weakly Skew Circuits. - Vitaly Skachek:
Characterization of Graph-cover Pseudocodewords of Codes over $F_3$. - Ping Hou, Broes De Cat, Marc Denecker:
FO(FD): Extending classical logic with rule-based fixpoint definitions. - Hariolf Betz, Frank Raiser, Thom W. Frühwirth:
A Complete and Terminating Execution Model for Constraint Handling Rules. - Nuno P. Lopes, Juan Antonio Navarro Pérez, Andrey Rybalchenko, Atul Singh:
Applying Prolog to Develop Distributed Systems. - Oleksiy Kurgansky:
A state of a dynamic computational structure distributed in an environment: a model and its corollaries. - Jon Sneyers, Wannes Meert, Joost Vennekens, Yoshitaka Kameya, Taisuke Sato:
CHR(PRISM)-based Probabilistic Logic Learning. - Chengqing Li, Michael Z. Q. Chen, Kwok-Tung Lo:
Breaking an image encryption algorithm based on chaos. - Sebastian Danicic, Robert M. Hierons, Michael R. Laurence:
Complexity of Data Dependence problems for Program Schemas with Concurrency. - Vasil Kolev:
Orthogonal multifilters image processing of astronomical images from scanned photographic plates. - Cassio P. de Campos:
New Results for the MAP Problem in Bayesian Networks. - Uriel Feige, Inbal Talgam-Cohen:
A Direct Reduction from k-Player to 2-Player Approximate Nash Equilibrium. - Shraga I. Bross, Amos Lapidoth:
The State-Dependent Multiple-Access Channel with States Available at a Cribbing Encoder. - Dakshina Ranjan Kisku, Phalguni Gupta, Jamuna Kanta Sing:
Ear Identification by Fusion of Segmented Slice Regions using Invariant Features: An Experimental Manifold with Dual Fusion Approach. - (Withdrawn) Distributed Detection over Random Networks: Large Deviations Analysis.
- Pablo Chico de Guzmán, Manuel Carro, David Scott Warren:
Swapping Evaluation: A Memory-Scalable Solution for Answer-On-Demand Tabling. - Pedro C. Pinto, Moe Z. Win:
Continuum Percolation in the Intrinsically Secure Communications Graph. - Sylvain Guillemot, Christophe Paul, Anthony Perez:
On the (non-)existence of polynomial kernels for Pl-free edge modification problems. - Krishnendu Chatterjee, Laurent Doyen, Thomas A. Henzinger:
Expressiveness and Closure Properties for Quantitative Languages. - Mario Alviano, Wolfgang Faber, Nicola Leone:
Disjunctive ASP with Functions: Decidable Queries and Effective Computation. - Yisong Wang, Jia-Huai You, Li-Yan Yuan, Yi-Dong Shen:
Loop Formulas for Description Logic Programs. - Harry Enke, Matthias Steinmetz, Hans-Martin Adorf, Alexander Beck-Ratzka, Frank Breitling, Thomas Bruesemeister, Arthur Carlson, Torsten A. Ensslin, Mikael Högqvist, Iliya Nickelt, Thomas Radke, Alexander Reinefeld, Angelika Reiser, Tobias Scholl, Rainer Spurzem, Juergen Steinacker, Wolfgang Voges, Joachim Wambsganss, Steve White:
AstroGrid-D: Grid Technology for Astronomical Science. - Bo Sang, Jianfeng Zhan, Zhihong Zhang, Lei Wang, Dongyan Xu, Yabing Huang, Dan Meng:
Precise, Scalable and Online Request Tracing for Multi-tier Services of Black Boxes. - Thibaut Lust, Jacques Teghem:
The multiobjective multidimensional knapsack problem: a survey and a new approach. - Mubashir Husain Rehmani, Sidney S. Doria, Mustapha Réda Senouci:
A Tutorial on the Implementation of Ad-hoc On Demand Distance Vector (AODV) Protocol in Network Simulator (NS-2). - Zeeshan Ali Khan, Mubashir Husain Rehmani:
A Tutorial on Broadcasting Packets over Multiple-Channels in a Multi-Inferface Network Setting in NS-2. - Mubashir Husain Rehmani, Aline Carneiro Viana:
Decoupling data dissemination from the mobile sink's trajectory in wireless sensor networks: Current Research and Open Issues. - Nicholas Loulloudes, George Pallis, Marios D. Dikaiakos:
The Dynamics of Vehicular Networks in Urban Environments. - (Withdrawn) An Application-oriented Model for Wireless Sensor Networks integrated with Telecom Infra.
- Symeon Chatzinotas, Björn E. Ottersten:
Interference Alignment for Clustered Multicell Joint Decoding. - Christian Drescher, Toby Walsh:
A Translational Approach to Constraint Answer Set Solving. - Svebor Karaman, Jenny Benois-Pineau, Rémi Mégret, Vladislavs Dovgalecs, Jean-François Dartigues, Yann Gaëstel:
Human Daily Activities Indexing in Videos from Wearable Cameras for Monitoring of Patients with Dementia Diseases. - Tomás Kulich:
Dynamic monopolies with randomized starting configuration. - Alberto Pettorossi, Maurizio Proietti, Valerio Senni:
Transformations of Logic Programs on Infinite Lists. - Kirstin Peters, Uwe Nestmann:
Breaking Symmetries. - Daniel M. Kane, Jelani Nelson, Ely Porat, David P. Woodruff:
Fast Moment Estimation in Data Streams in Optimal Space. - Robert Nowotniak, Jacek Kucharski:
Building Blocks Propagation in Quantum-Inspired Genetic Algorithm. - Artur Czumaj, Oded Goldreich, Dana Ron, C. Seshadhri, Asaf Shapira, Christian Sohler:
Finding Cycles and Trees in Sublinear Time. - Farzad Farnoud, Olgica Milenkovic:
Sorting of Permutations by Cost-Constrained Transpositions. - (Withdrawn) Polynomial complexity algorithm for Max-Cut problem.
- Makoto Hamana:
Initial Algebra Semantics for Cyclic Sharing Tree Structures. - Christopher Earl, Matthew Might, David Van Horn:
Pushdown Control-Flow Analysis of Higher-Order Programs. - Krishna P. Jagannathan, Mihalis G. Markakis, Eytan H. Modiano, John N. Tsitsiklis:
Queue Length Asymptotics for Generalized Max-Weight Scheduling in the presence of Heavy-Tailed Traffic. - Kohtaro Tadaki:
Properties of optimal prefix-free machines as instantaneous codes. - Rafit Izhak-Ratzin, Hyunggon Park, Mihaela van der Schaar:
Reinforcement Learning in BitTorrent Systems. - Adrian Kuhn, David Erni, Oscar Nierstrasz:
Embedding Spatial Software Visualization in the IDE: an Exploratory Study. - Yasir Safeer, Atika Mustafa, Anis Noor Ali:
Clustering Unstructured Data (Flat Files) - An Implementation in Text Mining Tool. - Kaveh Mahdaviani, Shervin Shahidi, Shima Haddadi, Masoud Ardakani, Chintha Tellambura:
Improving the Sphere-Packing Bound for Binary Codes over Memoryless Symmetric Channels. - Andréa W. Richa, Christian Scheideler, Stefan Schmid, Jin Zhang:
AntiJam: Efficient Medium Access despite Adaptive and Reactive Jamming. - (Withdrawn) On the Security of Non-Linear HB (NLHB) Protocol Against Passive Attack.
- Yasutada Oohama:
Distributed Source Coding of Correlated Gaussian Sources. - Vítor Santos Costa, Inês de Castro Dutra, Ricardo Rocha:
Threads and Or-Parallelism Unified. - David Van Horn, Matthew Might:
Abstracting Abstract Machines. - Sherif Welsen Shaker, Salwa Hussien Elramly, Khaled Ali Shehata:
FPGA Implementation of a Reconfigurable Viterbi Decoder for WiMAX Receiver. - Maurizio Gabbrielli, Jacopo Mauro, Maria Chiara Meo, Jon Sneyers:
Decidability properties for fragments of CHR. - M. P. Cullinan:
Piecewise Convex-Concave Approximation in the ℓ∞ Norm. - Teruhiko Yoneyama, Sanmay Das, Mukkai S. Krishnamoorthy:
A Hybrid Model for Disease Spread and an Application to the SARS Pandemic. - Barak Fishbain, Dorit S. Hochbaum, Stefan Müller:
Competitive Analysis of Minimum-Cut Maximum Flow Algorithms in Vision Problems. - Evgeniy Braginskiy, Avi Steiner, Shlomo Shamai:
Broadcast Approach and Oblivious Cooperative Strategies for the Wireless Relay Channel - Part I: Sequential Decode-and-Forward (SDF). - Evgeniy Braginskiy, Avi Steiner, Shlomo Shamai:
Broadcast Approach and Oblivious Cooperative Strategies for the Wireless Relay Channel - Part II: Block-Markov Decode-and-Forward (BMDF). - Kamal Jain, Vijay V. Vazirani:
Equilibrium Pricing of Digital Goods via a New Market Model. - Rio Yokota, Tsuyoshi Hamada, Jaydeep P. Bardhan, Matthew G. Knepley, Lorena A. Barba:
Biomolecular Electrostatics Simulation by an FMM-based BEM on 512 GPUs. - Guangyue Han, Brian H. Marcus:
Concavity of Mutual Information Rate for Input-Restricted Finite-State Memoryless Channels at High SNR. - Qingchun Zhao, Hongxi Yin:
Gbits/s physical-layer stream ciphers based on chaotic light. - Greg Durrett, Frank Neumann, Una-May O'Reilly:
Computational Complexity Analysis of Simple Genetic Programming On Two Problems Modeling Isolated Program Semantics. - Rade Vuckovac:
About functions where function input describes inner working of the function. - Zan Pan:
The Multiple Permutation Problem and Some Conjectures. - Timo Kötzing, Frank Neumann, Dirk Sudholt, Markus Wagner:
Simple Max-Min Ant Systems and the Optimization of Linear Pseudo-Boolean Functions. - A. A. Waskita, N. A. Prasetyo, Zaenal Akbar, Laksana Tri Handoko:
Public Infrastructure for Monte Carlo Simulation: publicMC@BATAN. - Apoorva Jindal, Konstantinos Psounis, Mingyan Liu:
CapEst: A Measurement-based Approach to Estimating Link Capacity in Wireless Networks. - Aron Culotta:
Detecting influenza outbreaks by analyzing Twitter messages. - Loet Leydesdorff, Lutz Bornmann:
How fractional counting affects the Impact Factor: Steps towards field-independent classifications of scholarly journals and literature. - Benedikt Bollig, Dietrich Kuske, Ingmar Meinecke:
Propositional Dynamic Logic for Message-Passing Systems. - Marcello Balduccini, Sara Girotto:
Formalization of Psychological Knowledge in Answer Set Programming and its Application. - Xiang He, Aylin Yener:
MIMO Wiretap Channels with Arbitrarily Varying Eavesdropper Channel States. - Qiao Li, Rohit Negi:
Greedy Maximal Scheduling in Wireless Networks. - Nadir Farhi, Bruno Gaujal:
Performance bounds in wormhole routing, a network calculus approach. - Guanfeng Liang, Nitin H. Vaidya:
Short Note on Complexity of Multi-Value Byzantine Agreement. - Martin Macko, Kate Larson, L'ubos Steskal:
Braess's Paradox for Flows Over Time. - Athar Kharal:
Predicting Suicide Attacks: A Fuzzy Soft Set Approach. - Venkat Chandar, Aslan Tchamkerten, David Tse:
Asynchronous Capacity per Unit Cost. - Lin Yuan, Jianfeng Zhan, Bo Sang, Lei Wang, Haining Wang:
PowerTracer: Tracing requests in multi-tier services to save cluster power consumption. - Peter Schneider-Kamp, Jürgen Giesl, Thomas Ströder, Alexander Serebrenik, René Thiemann:
Automated Termination Analysis for Logic Programs with Cut. - Michael Codish, Yoav Fekete, Carsten Fuhs, Peter Schneider-Kamp:
Optimal Base Encodings for Pseudo-Boolean Constraints. - Liangzhong Ruan, Vincent K. N. Lau:
Decentralized Dynamic Hop Selection and Power Control in Cognitive Multi-hop Relay Systems. - Rajeev Alur, Pavol Cerný:
Algorithmic Verification of Single-Pass List Processing Programs. - Johannes Oetsch, Jörg Pührer, Martin Schwengerer, Hans Tompits:
The System Kato: Detecting Cases of Plagiarism for Answer-Set Programs. - Johannes Oetsch, Jörg Pührer, Hans Tompits:
Catching the Ouroboros: On Debugging Non-ground Answer-Set Programs. - Mohammad Reza Mousavi, Gwen Salaün:
Proceedings Ninth International Workshop on the Foundations of Coordination Languages and Software Architectures, FOCLASA 2010, Paris, France, 4th September 2010. EPTCS 30, 2010 [contents] - James P. Delgrande:
A Program-Level Approach to Revising Logic Programs under the Answer Set Semantics. - Martin Hoefer, Thomas Kesselheim, Berthold Vöcking:
Approximation Algorithms for Secondary Spectrum Auctions. - Derek Leong, Alexandros G. Dimakis, Tracey Ho:
Symmetric Allocations for Distributed Storage. - Jihoon Park, Przemyslaw Pawelczak, Pål Grønsund, Danijela Cabric:
Subchannel Notching and Channel Bonding: Comparative Analysis of Opportunistic Spectrum OFDMA Designs. - Jan-Mark S. Wams, Maarten van Steen:
Simplified Distributed Programming with Micro Objects. 1-15 - Mayleen Lacouture, Hervé Grall, Thomas Ledoux:
CREOLE: a Universal Language for Creating, Requesting, Updating and Deleting Resources. 16-30 - Imene Ben Hafaiedh, Susanne Graf, Hammadi Khairallah:
Implementing Distributed Controllers for Systems with Priorities. 31-46 - Maryam Kamali, Linas Laibinis, Luigia Petre, Kaisa Sere:
Self-Recovering Sensor-Actor Networks. 47-61 - Javier Cubo, Ernesto Pimentel, Gwen Salaün, Carlos Canal:
Handling Data-Based Concurrency in Context-Aware Service Protocols. 62-77 - Abdessamad Imine:
On Coordinating Collaborative Objects. 78-92 - Young-Joo Moon, Alexandra Silva, Christian Krause, Farhad Arbab:
A Compositional Semantics for Stochastic Reo Connectors. 93-107 - Mohammad Mahdi Jaghoori, Tom Chothia:
Timed Automata Semantics for Analyzing Creol. 108-122 - Jessica Davies, George Katsirelos, Nina Narodytska, Toby Walsh:
An Empirical Study of Borda Manipulation. - Manish Patil, Rahul Shah, Sharma V. Thankachan:
Fully Dynamic Data Structure for Top-k Queries on Uncertain Data. - Toby Walsh:
Where are the hard manipulation problems? - Mohamed Abouelela, Luigi Benedicenti:
Bayesian Network Based XP Process Modelling. - Yiannis Kanellopoulos, Panagiotis Antonellis, Dimitris Antoniou, Christos Makris, Evangelos Theodoridis, Christos Tjortjis, Nikos Tsirakis:
Code Quality Evaluation Methodology Using The ISO/IEC 9126 Standard. - Maria Silvia Pini, Francesca Rossi, Kristen Brent Venable, Toby Walsh:
Stable marriage problems with quantitative preferences. - P. Shireesha, S. S. V. N. Sharma:
Building Reusable Software Component For Optimization Check in ABAP Coding. - Bee Bee Chua, June M. Verner:
Examining Requirements Change Rework Effort: A Study. - Zeeshan Ahmed:
Towards Performance Measurement And Metrics Based Analysis of PLA Applications. - Mohammed J. Islam, Majid Ahmadi, Maher A. Sid-Ahmed:
An Efficient Automatic Mass Classification Method In Digitized Mammograms Using Artificial Neural Network. - Giuseppe Della Penna, Benedetto Intrigila, Daniele Magazzeni, Fabio Mercorio:
Resource-Optimal Planning For An Autonomous Planetary Vehicle. - Ming-Chang Lee, To Chang:
Comparison of Support Vector Machine and Back Propagation Neural Network in Evaluating the Enterprise Financial Distress. - Ming-Shing Hsieh:
Perceptual Copyright Protection Using Multiresolution Wavelet-Based Watermarking And Fuzzy Logic. - Rajeswari Sridhar, A. Amudha, S. Karthiga, T. V. Geetha:
Comparison Of Modified Dual Ternary Indexing And Multi-Key Hashing Algorithms For Music Information Retrieval. - Anuradha Banerjee, Paramartha Dutta:
Reputation-Based Attack-Resistant Cooperation Stimulation (RACS) For Mobile Ad hoc Networks. - Ayman Atia, Jiro Tanaka:
Interaction With Tilting Gestures In Ubiquitous Environments. - Ramalingam Shankar, Timothy Rajkumar, Perumal Dananjayan:
Security Enhancement With Optimal QOS Using EAP-AKA In Hybrid Coupled 3G-WLAN Convergence Network. - R. Valli, Perumal Dananjayan:
A Non-Cooperative Game Theoretical Approach For Power Control In Virtual MIMO Wireless Sensor Network. - Samir Medina Perlaza, Hamidou Tembine, Samson Lasaulce, Mérouane Debbah:
Satisfaction Equilibrium: A General Framework for QoS Provisioning in Self-Configuring Networks. - Li Liu, Edward Dillon:
I-Interaction: An Intelligent In-Vehicle User Interaction Model. - Alessandro Dal Palù, Agostino Dovier, Federico Fogolari, Enrico Pontelli:
CLP-based protein fragment assembly. - Yuxin Deng, Rob J. van Glabbeek:
Characterising Probabilistic Processes Logically. - Miguel Gómez-Zamalloa, Elvira Albert, Germán Puebla:
Test Case Generation for Object-Oriented Imperative Languages in CLP. - Caihong Kai, Soung Chang Liew:
Applications of Belief Propagation in CSMA Wireless Networks. - Wei Chen, Yue Wang, Minghua Chen, Soung Chang Liew:
TCP Reno over Adaptive CSMA. - Josep Díaz, Alberto Marchetti-Spaccamela, Dieter Mitsche, Paolo Santi, Julinda Stefa:
Social-Aware Forwarding Improves Routing Performance in Pocket Switched Networks. - Soung Chang Liew, JiaLiang Zhang, Chi-Kin Chau, Minghua Chen:
Analysis of Frequency-Agile CSMA Wireless Networks. - Vladimir Pestov:
Intrinsic Dimensionality. - Yiyue Wu, Andreas Achtzehn, Marina Petrova, Petri Mähönen, A. Robert Calderbank:
The Value of Staying Current when Beamforming. - Panagiotis Pantazopoulos, Merkourios Karaliopoulos, Ioannis Stavrakakis:
Scalable distributed service migration via Complex Networks Analysis. - Markus Lohrey, Sebastian Maneth, Roy Mennicke:
Tree structure compression with RePair. - Giorgio Taricco:
A Lower Bound to the Receiver Operating Characteristic of a Cognitive Radio Network. - Henning Christiansen, Christian Theil Have, Ole Torp Lassen, Matthieu Petit:
Inference with Constrained Hidden Markov Models in PRISM. - Zhong Fan:
Distributed Demand Response and User Adaptation in Smart Grids. - Daniel Lokshtanov, Dániel Marx, Saket Saurabh:
Known Algorithms on Graphs of Bounded Treewidth are Probably Optimal. - John Whitbeck, Yoann Lopez, Jeremie Leguay, Vania Conan, Marcelo Dias de Amorim:
Relieving the Wireless Infrastructure: When Opportunistic Networks Meet Guaranteed Delays. - Christian Glaßer, Christian Reitwießner, Maximilian Witek:
Balanced Combinations of Solutions in Multi-Objective Optimization. - Rob J. van Glabbeek, Gordon D. Plotkin:
On CSP and the Algebraic Theory of Effects. - Rob J. van Glabbeek:
The Coarsest Precongruences Respecting Safety and Liveness Properties. - Erdem Koyuncu, Hamid Jafarkhani:
Distributed Beamforming in Wireless Multiuser Relay-Interference Networks with Quantized Feedback. - Andrew Adamatzky, Ben de Lacy Costello, Larry Bull:
On polymorphic logical gates in sub-excitable chemical medium. - Sergei Gepshtein, Ivan Tyukin, Thomas D. Albright:
Supplement: The uncertainty principle of measurement in vision. - Rafael Caballero, Blanca Collado-Iglesias, Sara Pozuelo-González, Antonio Fernández-Sánchez:
New Common Proper-Motion Pairs From the PPMX Catalog. - Wray L. Buntine, Marcus Hutter:
A Bayesian Review of the Poisson-Dirichlet Process. - Dimitris Kugiumtzis:
Transfer Entropy on Rank Vectors. - Ioannis Vlachos, Dimitris Kugiumtzis:
Non-uniform state space reconstruction and coupling detection. - Victor Chepoi, Feodor F. Dragan, Ilan Newman, Yuri Rabinovich, Yann Vaxès:
Constant approximation algorithms for embedding graph metrics into trees and outerplanar graphs. - Christopher R. Genovese, Marco Perone-Pacifico, Isabella Verdinelli, Larry A. Wasserman:
Minimax Manifold Estimation. - Divyanshu Vats, José M. F. Moura:
Graphical Models as Block-Tree Graphs. - Yair Hartman:
Large Semigroup of Cellular Automata. - Olivier Finkel, Stevo Todorcevic:
The Isomorphism Relation Between Tree-Automatic Structures. - Jean-Louis Krivine:
Realizability algebras II : new models of ZF + DC. - Olesya Mryglod, Yurij Holovatch:
Human activity as the decision-based queueing process: statistical data analysis of waiting times in scientific journals. - Jose H. Blanchet, Alexandre Stauffer:
Characterizing Optimal Sampling of Binary Contingency Tables via the Configuration Model. - Amin Coja-Oghlan:
On belief propagation guided decimation for random k-SAT. - Haoyang Wu:
On the justification of applying quantum strategies to the Prisoners' Dilemma and mechanism design. - Evgeny Lakshtanov, Vera Roshchina:
Finiteness in the Card Game of War. - Felipe Cucker, Teresa Krick, Gregorio Malajovich, Mario Wschebor:
A Numerical Algorithm for Zero Counting. III: Randomization and Condition. - Benjamin R. Barsdell, David G. Barnes, Christopher J. Fluke:
Analysing Astronomy Algorithms for GPUs and Beyond. - David Gamarnik, Dmitriy Katz:
Stability of Skorokhod problem is undecidable. - Akira Terui:
GPGCD, an Iterative Method for Calculating Approximate GCD of Univariate Polynomials, with the Complex Coefficients. - Akira Terui:
GPGCD, an Iterative Method for Calculating Approximate GCD, for Multiple Univariate Polynomials. - Ben Adcock, Anders C. Hansen:
A Generalized Sampling Theorem for Reconstructions in Arbitrary Bases. - Ivo Hedtke:
Strassen's Matrix Multiplication Algorithm for Matrices of Arbitrary Order. - Cem Tekin, Mingyan Liu:
Online Algorithms for the Multi-Armed Bandit Problem with Markovian Rewards. - Ricardo Restrepo, Daniel Stefankovic, Juan Carlos Vera, Eric Vigoda, Linji Yang:
Phase Transition for Glauber Dynamics for Independent Sets on Regular Trees. - Paolo Detti, Marco Moretti, Andrea Abrardo:
Radio resource allocation in OFDMA multi-cell networks. - Olivier Bernardi, Éric Fusy:
Schnyder decompositions for regular plane graphs and application to drawing. - Yuan Feng, Runyao Duan, Mingsheng Ying:
Bisimulation for quantum processes. - Jan Komenda, Tomás Masopust, Jan H. van Schuppen:
Supervisory Control Synthesis of Discrete-Event Systems using Coordination Scheme. - Samson Abramsky:
Relational Hidden Variables and Non-Locality. - Ashwin Nayak:
Inverting a permutation is as hard as unordered search. - Amnon Amir, Or Zuk:
Bacterial Community Reconstruction Using A Single Sequencing Reaction. - Sergei Friedland, Stéphane Gaubert:
Submodular spectral functions of principal submatrices of an hermitian matrix. - Barbara J. Breen, John F. Lindner:
Introduction to Xgrid: Cluster Computing for Everyone. - Victor A. Shcherbacov:
Quasigroups in cryptology. - Ashley Montanaro:
A new exponential separation between quantum and classical one-way communication complexity. - J. N. Leaw, Siew Ann Cheong:
Strategic Insights From Playing the Quantum Tic-Tac-Toe. - Jüri Lember, Alexey A. Koloydenko:
A generalized risk-based approach to segmentation based on hidden Markov models. - Ciro Cattuto, Wouter Van den Broeck, Alain Barrat, Vittoria Colizza, Jean-François Pinton, Alessandro Vespignani:
Dynamics of person-to-person interactions from distributed RFID sensor networks. - Serge Galam:
Integrating multiple coauthorship in the quantitative evaluation of individual's scientific records. - Benjamin Block, Peter Virnau, Tobias Preis:
Multi-GPU Accelerated Multi-Spin Monte Carlo Simulations of the 2D Ising Model. - Tsvi Tlusty:
A colorful origin for the genetic code: Information theory, statistical mechanics and the emergence of molecular codes. - Tsvi Tlusty:
A model for the emergence of the genetic code as a transition in a noisy information channel. - Tsvi Tlusty:
A simple model for the evolution of molecular codes driven by the interplay of accuracy, diversity and cost. - Takashi Iba:
Scale-Free Networks Hidden in Chaotic Dynamical Systems. - Tsvi Tlusty:
A rate-distortion scenario for the emergence and evolution of noisy molecular codes. - Ágnes Backhausz:
Limit distribution of degrees in random family trees. - Edoardo Di Napoli, Paolo Bientinesi:
Matrix Structure Exploitation in Generalized Eigenproblems Arising in Density Functional Theory. - Dinah Rosenberg, Eilon Solan, Nicolas Vieille:
Strategic Information Exchange. - Yonatan Savir, Tsvi Tlusty:
Molecular Recognition as an Information Channel: The Role of Conformational Changes. - Tsvi Tlusty:
The physical language of molecular codes: A rate-distortion approach to the evolution and emergence of biological codes. - Yonatan Savir, Tsvi Tlusty:
Optimal Design of a Molecular Recognizer: Molecular Recognition as a Bayesian Signal Detection Problem. - (Withdrawn) The Use of Scientific Data: A Content Analysis.
- Maël Le Treust, Samson Lasaulce:
A Repeated Game Formulation of Energy-Efficient Decentralized Power Control. - Jose H. Blanchet, Kevin Leder, Yixi Shi:
Analysis of a Splitting Estimator for Rare Event Probabilities in Jackson Networks. - Laurent Bienvenu, Adam R. Day, Mathieu Hoyrup, Ilya Mezhirov, Alexander Shen:
A constructive version of Birkhoff's ergodic theorem for Martin-Löf random points. - Laszlo B. Kish, Sunil P. Khatri, Sergey M. Bezrukov, Ferdinand Peper, Zoltan Gingl, Tamás Horváth:
Noise-based deterministic logic and computing: a brief survey. - James P. Crutchfield, Christopher J. Ellison, Ryan G. James, John R. Mahoney:
Synchronization and Control in Intrinsic and Designed Computation: An Information-Theoretic Analysis of Competing Models of Stochastic Computation. - Nathan Halko, Per-Gunnar Martinsson, Yoel Shkolnisky, Mark Tygert:
An algorithm for the principal component analysis of large data sets. - Manuel Kauers, Veronika Pillwein, Susanne Saminger-Platz:
Dominance in the family of Sugeno-Weber t-norms. - H. T. Ng, Franco Nori:
A proposal for factorization using Kerr nonlinearities between three harmonic oscillators. - Peng Wang, Tao Zhou, Xiao-Pu Han, Bing-Hong Wang:
Modeling correlated human dynamics. - Gerardo Iñiguez, Rafael A. Barrio, János Kertész, Kimmo Kaski:
Modelling opinion formation driven communities in social networks. - Mauricio Junca:
Optimal execution strategy in the presence of permanent price impact and fixed transaction cost. - Fabio Pasqualetti, Antonio Bicchi, Francesco Bullo:
Consensus Computation in Unreliable Networks: A System Theoretic Approach. - Georgi S. Medvedev:
Stochastic stability of continuous time consensus protocols. - Miguel Couceiro, Jean-Luc Marichal:
Axiomatizations of Lovász extensions of pseudo-Boolean functions. - Yajun Zhou:
Quantitative spectral analysis of electromagnetic scattering. I: $ L^2$ and Hilbert-Schmidt norm bounds.
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.