default search action
CoRR, October 2010
- Nam Yul Yu:
Deterministic Compressed Sensing Matrices from Additive Character Sequences. - James M. Coughlan, Huiying Shen:
An Embarrassingly Simple Speed-Up of Belief Propagation with Robust Potentials. - Byung-Gon Chun, Ling Huang, Sangmin Lee, Petros Maniatis, Mayur Naik:
Mantis: Predicting System Performance through Program Analysis and Modeling. - (Withdrawn) A stronger result on fractional strong colourings.
- Michael M. Zavlanos, Victor M. Preciado, Ali Jadbabaie:
Spectral Control of Mobile Robot Networks. - Wesam Gabran, Przemyslaw Pawelczak, Danijela Cabric:
Performance of Multi-Channel Multi-Stage Spectrum Sensing. - Mu-rong H. Wu:
A non-cooperative Pareto-efficient solution to a single-shot Prisoner's Dilemma. - Hironori Uchikawa, Kenta Kasai, Kohichi Sakaniwa:
Terminated LDPC Convolutional Codes over GF(2^p). - Michael Hartung, Anika Groß, Erhard Rahm:
Rule-based Generation of Diff Evolution Mappings between Ontology Versions. - Mithun Das Gupta, Sanjeev Kumar, Jing Xiao:
L1 Projections with Box Constraints. - Jørgen Villadsen, Niklas Skamriis Boss, Andreas Schmidt Jensen, Steen Vester:
Multi-Agent Programming Contest 2010 - The Jason-DTU Team. - Andreas Schmidt Jensen:
Implementing Lego Agents Using Jason. - Andreas Schmidt Jensen:
An Investigation of the Advantages of Organization-Centered Multi-Agent Systems. - Gerald Paul:
Comparative Performance of Tabu Search and Simulated Annealing Heuristics for the Quadratic Assignment Problem. - Mohammad Momani, Subhash Challa:
Survey of trust models in different network domains. - Massoud Masoumi:
A Novel and Highly Efficient AES Implementation Robust against Differential Power Analysis. - Alexandre J. Pierrot, Matthieu R. Bloch:
Strongly Secure Communications Over the Two-Way Wiretap Channel. - Yiwei Song, Natasha Devroye:
List decoding for nested lattices and applications to relay channels. - Beenish Anam, Kazi Sakib, M. Alamgir Hossain, Keshav P. Dahal:
Review on the Advancements of DNA Cryptography. - Nam Yul Yu:
Reed-Muller Codes for Peak Power Control in Multicarrier CDMA. - Yue Wang, Justin P. Coon:
Difference Antenna Selection and Power Allocation for Wireless Cognitive Systems. - Andrei A. Bulatov, Dániel Marx:
The complexity of global cardinality constraints. - Anthony Labarre, Josef Cibulka:
Polynomial-time sortable stacks of burnt pancakes. - Andreas Witzel:
Characterizing perfect recall in Epistemic Temporal Logic. - Lalitha Sankar, S. Raj Rajagopalan, H. Vincent Poor:
An Information-theoretic Approach to Privacy. - Kristina Lerman, Tad Hogg:
Using Stochastic Models to Describe and Predict Social Dynamics of Web Users. - Yeow Meng Chee, Xiande Zhang, Hui Zhang:
Infinite Families of Optimal Splitting Authentication Codes Secure Against Spoofing Attacks of Higher Order. - Rui Wang, Vincent K. N. Lau, Ying Cui:
Queue-Aware Distributive Resource Control for Delay-Sensitive Two-Hop MIMO Cooperative Systems. - Siby Abraham, Imre Kiss, Sugata Sanyal, Mukund A. Sanglikar:
Steepest Ascent Hill Climbing For A Mathematical Problem. - Anjan Kumar Kundu, Bijoy Bandyopadhyay, Sugata Sanyal:
A Microwave Imaging and Enhancement Technique from Noisy Synthetic Data. - G. Abhinav, B. Sundar Rajan:
Two-User Gaussian Interference Channel with Finite Constellation Input and FDMA. - (Withdrawn) Routing Protocols for Cognitive Radio Networks: A Survey.
- Ryuhei Mori, Toshiyuki Tanaka, Kenta Kasai, Kohichi Sakaniwa:
Effects of Single-Cycle Structure on Iterative Decoding for Low-Density Parity-Check Codes. - Xi Liu, Elza Erkip:
Alternating-Offer Bargaining Games over the Gaussian Interference Channel. - Anolan Milanés, Noemi de La Rocque Rodriguez, Roberto Ierusalimschy:
Reflection-based language support for the heterogeneous capture and restoration of running computations. - Charles Shen, Henning Schulzrinne:
On TCP-based Session Initiation Protocol (SIP) Server Overload Control. - Srinivasagopalan Srivathsan, Costas Busch, S. Sitharama Iyengar:
Oblivious Buy-at-Bulk in Planar Graphs. - Uriel Feige, Shlomo Jozeph:
Oblivious Algorithms for the Maximum Directed Cut Problem. - Inder Jeet Taneja:
Some Inequalities Among New Divergence Measures. - Yu Su, Margaret H. Dunham:
Visual-hint Boundary to Segment Algorithm for Image Segmentation. - Arthur Szlam, Koray Kavukcuoglu, Yann LeCun:
Convolutional Matching Pursuit and Dictionary Training. - Mohammad Javad Sayadi, Mahmood Fathy:
A New Approach in Packet Scheduling in the Vanet. - Mahdi Cheraghchi:
Derandomization and Group Testing. - (Withdrawn) Nations At War I: Why do we keep building weapons?
- B. Lakshmi, R. Srinivasan:
Statistical Modelling of ft to Process Parameters in 30 nm Gate Length Finfets. - Dimitris S. Papailiopoulos, Alexandros G. Dimakis:
Interference Alignment as a Rank Constrained Rank Minimization. - Dimitris S. Papailiopoulos, Alexandros G. Dimakis:
Distributed Storage Codes Meet Multiple-Access Wiretap Channels. - Suenje Dallmeier-Tiessen, Robert Darby, Bettina Goerner, Jenni Hyppoelae, Peter Igo-Kemenes, Deborah Kahn, Simon C. Lambert, Anja Lengenfelder, Chris Leonard, Salvatore Mele, Panayiota Polydoratou, David Ross, Sergio Ruiz-Perez, Ralf Schimmer, Mark Swaisland, Wim van der Stelt:
First results of the SOAP project. Open access publishing in 2010. - Rahul Jain:
Strong direct product conjecture holds for all relations in public coin randomized one-way communication complexity. - Shriprakash Sinha, Luca Nanetti:
Inaccessibility-Inside Theorem for Point in Polygon. - Bernhard Haeupler:
Analyzing Network Coding Gossip Made Easy. - Somayeh Abdi, Hossein Pedram, Somayeh Mohamadi:
The Impact of Data Replicatino on Job Scheduling Performance in Hierarchical data Grid. - Chenlu Qiu, Namrata Vaswani:
Real-time Robust Principal Components' Pursuit. - George Theodorakopoulos, Jean-Yves Le Boudec, John S. Baras:
Selfish Response to Epidemic Propagation. - Matteo Dell'Amico, Pietro Michiardi, Yves Roudier:
Back To The Future: On Predicting User Uptime. - Petteri Mannersalo, Georgios S. Paschos, Lazaros Gkatzikis:
Performance of wireless network coding: motivating small encoding numbers. - Zheng Wang, Jie Luo:
Error Performance of Channel Coding in Random Access Communication. - Michelle Effros, Tracey Ho, Shirin Jalali:
On Equivalence Between Network Topologies. - Ye Wang, Shantanu Rane, Wei Sun, Prakash Ishwar:
On Unconditionally Secure Computation with Vanishing Communication Cost. - Masoud Abbaszadeh, Horacio J. Marquez:
Robust H_infinity Filter Design for Lipschitz Nonlinear Systems via Multiobjective Optimization. - Michael W. Mahoney, Lorenzo Orecchia:
Implementing regularization implicitly via approximate eigenvector computation. - Ryutaroh Matsumoto, Masahito Hayashi:
Strong security and separated code constructions for the broadcast channels with confidential messages. - Shang-Guan H. Wu:
A note on hierarchies and bureaucracies. - José Carrijo, Rafael Tonicelli, Anderson C. A. Nascimento:
A Fault Analytic Method against HB+. - Chamberlain Fong, Mike Walters:
Methods for Accelerating Conway's Doomsday Algorithm (part 2). - Imen Harbaoui Dridi, Ryan Kammarti, Mekki Ksouri, Pierre Borne:
Genetic Algorithm for Mulicriteria Optimization of a Multi-Pickup and Delivery Problem with Time Windows. - Rahul Vaze:
Transmission Capacity of Spectrum Sharing Ad-hoc Networks with Multiple Antennas. - Robert Geisberger:
Engineering Time-dependent One-To-All Computation. - Rahul Jain:
A strong direct product theorem for two-way public coin communication complexity. - Victor Chepoi, Daniela Maftuleac:
Shortest path problem in rectangular complexes of global nonpositive curvature. - Michael Reckhaus, Nico Hochgeschwender, Paul-Gerhard Plöger, Gerhard K. Kraetzschmar:
A Platform-independent Programming Environment for Robot Control. - Dana Jansens, Prosenjit Bose, Paz Carmi, Anil Maheshwari, Pat Morin, Michiel H. M. Smid:
Improved Methods For Generating Quasi-Gray Codes. - Daniele Riboni, Linda Pareschi, Claudio Bettini:
Preserving Privacy in Sequential Data Release against Background Knowledge Attacks. - Namyoon Lee, Wonjae Shin, Bruno Clerckx:
Interference Alignment with Limited Feedback on Two-cell Interfering Two-User MIMO-MAC. - Namyoon Lee, Joohwan Chun:
Signal Space Alignment for an Encryption Message and Successive Network Code Decoding on the MIMO K-way Relay Channel. - Punit Sharma, Partha Sarathi Mandal:
Reconstruction of Aggregation Tree in spite of Faulty Nodes in Wireless Sensor Networks. - Imen Harbaoui Dridi, Ryan Kammarti, Pierre Borne, Mekki Ksouri:
Un Algorithme génétique pour le problème de ramassage et de livraison avec fenêtres de temps à plusieurs véhicules. - Imen Harbaoui Dridi, Ryan Kammarti, Mekki Ksouri, Pierre Borne:
Approche Multicritère pour le Problème de Ramassage et de Livraison avec Fenêtres de Temps à Plusieurs Véhicules. - Keith Wiley, Andrew J. Connolly, Jeffrey P. Gardner, K. Simon Krughoff, Magdalena Balazinska, Bill Howe, YongChul Kwon, Yingyi Bu:
Astronomy in the Cloud: Using MapReduce for Image Coaddition. - Brett Hern, Krishna R. Narayanan:
Multilevel Coding Schemes for Compute-and-Forward. - Ferdinando Cicalese, Ugo Vaccaro:
Superselectors: Efficient Constructions and Applications. - Yaniv Altshuler, Nadav Aharony, Yuval Elovici, Alex Pentland, Manuel Cebrián:
Stealing Reality. - Lei Zhou, Wei Yu:
On the Capacity of the $K$-User Cyclic Gaussian Interference Channel. - Anand Louis:
Cut-Matching Games on Directed Graphs. - Peiliang Xu, M. Elizabeth Cannon, Gérard Lachapelle:
Mixed integer programming for the resolution of GPS carrier phase ambiguities. - Alireza Vahid, Vaneet Aggarwal, Amir Salman Avestimehr, Ashutosh Sabharwal:
On the Capacity of Multi-Hop Wireless Networks with Partial Network Knowledge. - Marc de Falco:
An Explicit Framework for Interaction Nets. - (Withdrawn) Cooperative Distributed Sequential Spectrum Sensing.
- (Withdrawn) A Novel Algorithm for Cooperative Distributed Sequential Spectrum Sensing in Cognitive Radio.
- Alexey Pospelov:
Faster Polynomial Multiplication via Discrete Fourier Transforms. - Leonid Barenboim, Shlomi Dolev, Rafail Ostrovsky:
Deterministic and Energy-Optimal Wireless Synchronization. - Martin Avanzini, Naohi Eguchi, Georg Moser:
A Path Order for Rewrite Systems that Compute Exponential Time Functions (Technical Report). - Ahmet Kara, Thomas Schwentick, Thomas Zeume:
Temporal Logics on Words with Multiple Data Values. - Mikael Fernandus Simalango:
XML Query Processing and Query Languges: A Survey. - G. D. Raghava, B. Sundar Rajan:
Secrecy Capacity of the Gaussian Wire-Tap Channel with Finite Complex Constellation Input. - Arthur Sorkin, Peter Donovan:
LR(1) Parser Generation System: LR(1) Error Recovery, Oracles, and Generic Tokens. - Ioan Ovidiu Hupca, Joel Falcou, Laura Grigori, Radek Stompor:
Spherical harmonic transform with GPUs. - John C. Kieffer, Yu Liao:
Exact Hamming Distortion Analysis of Viterbi Encoded Trellis Coded Quantizers. - Jing Yang, Sennur Ulukus:
Optimal Packet Scheduling in an Energy Harvesting Communication System. - Ali Nazari, Achilleas Anastasopoulos, S. Sandeep Pradhan:
Error Exponent for Multiple-Access Channels:Lower Bounds. - Himanshu Asnani, Haim H. Permuter, Tsachy Weissman:
Probing Capacity. - Brent Heeringa, Marius Catalin Iordan, Louis Theran:
Searching in Dynamic Tree-Like Partial Orders. - Ali Nazari, Ramji Venkataramanan, Dinesh Krithivasan, S. Sandeep Pradhan, Achilleas Anastasopoulos:
Typicality Graphs:Large Deviation Analysis. - Ali Nazari, S. Sandeep Pradhan, Achilleas Anastasopoulos:
A New Upper Bound on the Average Error Exponent for Multiple-Access Channels. - Joost J. Joosten, Fernando Soler-Toscano, Hector Zenil:
Complejidad descriptiva y computacional en máquinas de Turing pequeñas. - Cuizhu Shi, Aditya Ramamoorthy:
Improved Combinatorial Algorithms for Wireless Information Flow. - Masahito Hayashi:
Tight exponential evaluation for information theoretical secrecy based on L1 distance. - Fedor V. Fomin, Daniel Lokshtanov, Neeldhara Misra, Geevarghese Philip, Saket Saurabh:
Hitting forbidden minors: Approximation and Kernelization. - Eric Berberich, Pavel Emeliyanenko, Michael Sagraloff:
An Elimination Method for Solving Bivariate Polynomial Systems: Eliminating the Usual Drawbacks. - Karthik Muralidhar, Kwok Hung Li:
On the Full Column-Rank Condition of the Channel Estimation Matrix in Doubly-Selective MIMO-OFDM Systems. - Eric Goles Chacc, Bruno Martin:
Computational Complexity of Avalanches in the Kadanoff two-dimensional Sandpile Model. - Benjamin Doerr, Thomas Jansen, Dirk Sudholt, Carola Winzen, Christine Zarges:
Optimizing Monotone Functions Can Be Difficult. - Walid Saad, Zhu Han, Are Hjørungnes, Dusit Niyato, Ekram Hossain:
Coalition Formation Games for Distributed Cooperation Among Roadside Units in Vehicular Networks. - Fangzhou Wei, Ali E. Yilmaz:
A Hybrid Parallelization of AIM for Multi-Core Clusters: Implementation Details and Benchmark Results on Ranger. - Per Austrin, Subhash Khot:
A Simple Deterministic Reduction for the Gap Minimum Distance of Code Problem. - Vishwakarma Singh, Ambuj K. Singh:
Profile Based Sub-Image Search in Image Databases. - Mohammad Ali Maddah-Ali, David Tse:
Completely Stale Transmitter Channel State Information is Still Very Useful. - Frederic Thouin, Mark Coates, Michael G. Rabbat:
Real-Time Multi-path Tracking of Probabilistic Available Bandwidth. - Zoltán Prekopcsák, Daniel Lemire:
Time Series Classification by Class-Based Mahalanobis Distances. - Mickey Brautbar, Michael J. Kearns:
A Clustering Coefficient Network Formation Game. - Dhinaharan Nagamalai, Beatrice Cynthia Dhinakaran, Jae-Kwang Lee:
Multi Layer Approach to Defend DDoS Attacks Caused by Spam. - Radha Krishna Ganti, Jeffrey G. Andrews, Martin Haenggi:
High-SIR Transmission Capacity of Wireless Networks with General Fading and Node Distribution. - Johannes Faber, Carsten Ihlemann, Swen Jacobs, Viorica Sofronie-Stokkermans:
Automatic Verification of Parametric Specifications with Complex Topologies. - Naqueeb Warsi, Rahul Vaze, Tapan Shah:
Communicating Under Channel Uncertainty. - Michael W. Mahoney:
Algorithmic and Statistical Perspectives on Large-Scale Data Analysis. - Adrià Tauste Campo, Albert Guillen i Fabregas, Ezio Biglieri:
Large-System Analysis of Multiuser Detection with an Unknown Number of Users: A High-SNR Approach. - Vishwambhar Rathi, Rüdiger L. Urbanke, Mattias Andersson, Mikael Skoglund:
Rate-Equivocation Optimal Spatially Coupled LDPC Codes for the BEC Wiretap Channel. - Roberto M. Amadio, Nicholas Ayache, Yann Régis-Gianas, Ronan Saillard:
Certifying cost annotations in compilers. - Mustafa Atay, Yezhou Sun, Dapeng Liu, Shiyong Lu, Farshad Fotouhi:
Mapping XML Data to Relational Data: A DOM-Based Approach. - Cédric Févotte, Jérôme Idier:
Algorithms for nonnegative matrix factorization with the beta-divergence. - (Withdrawn) Improved complexity bounds for real root isolation using Continued Fractions.
- Hesham El Gamal, John Tadrous, Atilla Eryilmaz:
Proactive Resource Allocation: Turning Predictable Behavior into Spectral Gain. - Muhammad Mahbubur Rahman, Afroza Nahar:
Modified Bully Algorithm using Election Commission. - Philipp Schaer, Philipp Mayr, Peter Mutschke:
Implications of Inter-Rater Agreement on a Student Information Retrieval Evaluation. - Thomas Mainguy:
A probabilistic top-down parser for minimalist grammars. - Leo Liberti, Benoît Masson, Jon Lee, Carlile Lavor, Antonio Mucherino:
On the number of solutions of the discretizable molecular distance geometry problem. - Holger Rauhut, Justin K. Romberg, Joel A. Tropp:
Restricted Isometries for Partial Random Circulant Matrices. - Silvio Ghilardi, Silvio Ranise:
Backward Reachability of Array-based Systems by SMT solving: Termination and Invariant Synthesis. - Richard Cole, Vasilis Gkatzelis, Vahab S. Mirrokni:
Coordination Mechanisms for Weighted Sum of Completion Times in Machine Scheduling. - Ilknur Icke, Andrew Rosenberg:
Multi-Objective Genetic Programming Projection Pursuit for Exploratory Data Modeling. - Guo-Qiang Zhang:
Link power coordination for energy conservation in complex communication networks. - Xuan Guang, Fang-Wei Fu:
The Failure Probability at Sink Node of Random Linear Network Coding. - Ash Mohammad Abbas:
Weighted Indices for Evaluating the Quality of Research with Multiple Authorship. - Iryna Andriyanova, Jean-Pierre Tillich:
On a Low-Rate TLDPC Code Ensemble and the Necessary Condition on the Linear Minimum Distance for Sparse-Graph Codes. - Sugata Sanyal, Ajit Shelat, Amit Gupta:
New Frontiers of Network Security: The Threat Within. - Dorit S. Hochbaum:
Submodular problems - approximations and algorithms. - Timothy M. Chan, Mihai Patrascu:
Transdichotomous Results in Computational Geometry, II: Offline Search. - Matthew Macauley, Henning S. Mortveit:
Coxeter Groups and Asynchronous Cellular Automata. - Stefano Galli, Anna Scaglione, Zhifang Wang:
For the Grid and Through the Grid: The Role of Power Line Communications in the Smart Grid. - Jingwei Chen, Yong Feng, Xiaolin Qin, Jingzhong Zhang:
Detecting Simultaneous Integer Relations for Several Real Vectors. - Peyman Razaghi, Giuseppe Caire:
Relay Strategies Based on Cross-Determinism for the Broadcast Relay Channel. - Henricus Bouwmeester, Julien Langou:
A Critical Path Approach to Analyzing Parallelism of Algorithmic Variants. Application to Cholesky Inversion. - Elias P. Tsigaridas:
Improved complexity bounds for real root isolation using Continued Fractions. - Shengtian Yang, Thomas Honold, Yan Chen, Zhaoyang Zhang, Peiliang Qiu:
Weight Distributions of Regular Low-Density Parity-Check Codes over Finite Fields. - Ran El-Yaniv, Noam Etzion-Rosenberg:
Hierarchical Multiclass Decompositions with Application to Authorship Determination. - Moslem Rashidi, Sara Mansouri:
Parameter Selection in Periodic Nonuniform Sampling of Multiband Signals. - Christine Michel, Élise Lavoué:
Combiner suivi de l'activite? et partage d'expe?riences en apprentissage par projet pour les acteurs tuteurs et apprenants. - Angela Bonifati, Giansalvatore Mecca, Domenica Sileo, Gianvito Summa:
Ontological Matchmaking in Recommender Systems. - Moslem Rashidi, Kasra Haghighi, Arash Owrang, Mats Viberg:
A Wideband Spectrum Sensing Method for Cognitive Radio using Sub-Nyquist Sampling. - Moslem Rashidi:
Non-uniform sampling and reconstruction of multi-band signals and its application in wideband spectrum sensing of cognitive radio. - T. Glek, Jan Hubicka:
Optimizing real world applications with GCC Link Time Optimization. - Akram Aldroubi, Ali Sekmen:
Reduction and Null Space Algorithms for the Subspace Clustering Problem. - Weiyu Xu, Ao Tang:
On the Scaling Law for Compressive Sensing and its Applications. - Maxim Raginsky, Alexander Rakhlin:
Information-based complexity, feedback and dynamics in sequential convex programming. - Maxim Raginsky:
Divergence-based characterization of fundamental limitations of adaptive dynamical systems. - Omar I. Al-Bataineh, Ron van der Meyden:
Abstraction for Epistemic Model Checking of Dining Cryptographers-based Protocols. - Javier Cámara, Carlos Canal, Gwen Salaün:
Proceedings International Workshop on Component and Service Interoperability, WCSI 2010, Málaga, Spain, 29th June 2010. EPTCS 37, 2010 [contents] - Riccardo Albertoni, Monica De Martino:
Using Context Dependent Semantic Similarity to Browse Information Resources: an Application for the Industrial Design. - Siim Karus, Marlon Dumas:
Predicting Coding Effort in Projects Containing XML Code. - Andrea Campagna, Rasmus Pagh:
On Finding Frequent Patterns in Event Sequences. - V. S. Usatyuk:
Lattice Problems and Their Reductions. (Russian). - Andrea Campagna, Rasmus Pagh:
On Finding Similar Items in a Stream of Transactions. - Loet Leydesdorff, Tobias Opthof:
Remaining problems with the "New Crown Indicator" (MNCS) of the CWTS. - Georg Böcherer, Fabian Altenbach, Rudolf Mathar:
Capacity Achieving Modulation for Fixed Constellations with Average Power Constraint. - Mihaiela Lupea, Doina Tatar, Zsuzsana Marian:
Learning Taxonomy for Text Segmentation by Formal Concept Analysis. - Petr N. Vabishchevich:
Splitting schemes for hyperbolic heat conduction equation. - Nathanaël Fijalkow, Florian Horn:
The surprizing complexity of reachability games. - Rachit Mohan Garg, Shipra Kapoor, Kapil Kumar, Mohd. Dilshad Ansari:
Transmitting Video-on-Demand Effectively. - Chih-Chun Wang:
Capacity of 1-to-K Broadcast Packet Erasure Channels with Channel Output Feedback. - Chih-Chun Wang:
Capacity of 1-to-K Broadcast Packet Erasure Channels with Channel Output Feedback (Full Version). - Omar Mehanna, John Marcos, Nihar Jindal:
On Achievable Rates of the Two-user Symmetric Gaussian Interference Channel. - Marco Aldinucci, Mario Coppo, Ferruccio Damiani, Maurizio Drocco, Massimo Torquati, Angelo Troina:
On Designing Multicore-aware Simulators for Biological Systems. - Roman V. Belavkin:
Conservation Law of Utility and Equilibria in Non-Zero Sum Games. - Giriprakash Palanisamy, Ranjeet Devarakonda, James M. Green, Bruce E. Wilson:
Enabling Data Discovery through Virtual Internet Repositories. - Dino Sejdinovic, Oliver Johnson:
Note on Noisy Group Testing: Asymptotic Bounds and Belief Propagation Reconstruction. - Tatini Mal-Sarkar, Swarup Bhunia:
Collaborative Trust: A Novel Paradigm of Trusted Mobile Computing. - Joseph O'Rourke:
Flat Zipper-Unfolding Pairs for Platonic Solids. - Leonid Barenboim, Michael Elkin:
Distributed Deterministic Edge Coloring using Bounded Neighborhood Independence. - Loet Leydesdorff, Jung C. Shin:
How to evaluate universities in terms of their relative citation impacts: Fractional counting of citations and the normalization of differences among disciplines. - Ruo-Wei Hung:
Constructing Two Edge-Disjoint Hamiltonian Cycles in Locally Twisted Cubes. - Zdenek Dvorák, Daniel Král, Robin Thomas:
Three-coloring triangle-free graphs on surfaces I. Extending a coloring to a disk with one triangle. - Serguei A. Mokhov:
The use of machine learning with signal- and NLP processing of source code to detect and classify vulnerabilities and weaknesses with MARFCAT. - Salim Y. El Rouayheb, Kannan Ramchandran:
Fractional Repetition Codes for Repair in Distributed Storage Systems. - Kaibin Huang, Rui Zhang:
Cooperative Precoding with Limited Feedback for MIMO Interference Channels. - Marie Ferbus-Zanda:
Kolmogorov Complexity in perspective. Part II: Classification, Information Processing and Duality. - Marie Ferbus-Zanda, Serge Grigorieff:
ASMs and Operational Algorithmic Completeness of Lambda Calculus. - Andrea Asperti, Claudio Sacerdoti Coen, Enrico Tassi:
Regular Expressions, au point. - Maximilien Gadouleau, Søren Riis:
Graph-theoretical Constructions for Graph Entropy and Network Coding Based Communications. - Ana Charpentier, Caroline Fontaine, Teddy Furon, Ingemar J. Cox:
An Asymmetric Fingerprinting Scheme based on Tardos Codes. - Konstantin Kolchin:
Surface Curvature Effects on Reflectance from Translucent Materials. - Jouni Sirén, Niko Välimäki, Veli Mäkinen:
Indexing Finite Language Representation of Population Genotypes. - Dongning Guo, Lei Zhang:
Virtual Full-Duplex Wireless Communication via Rapid On-Off-Division Duplex. - Lina Mroueh, Jean-Claude Belfiore:
How to Achieve the Optimal DMT of Selective Fading MIMO Channels? - Robert Kleinberg, Katrina Ligett:
Privacy-Compatibility For General Utility Metrics. - Willemien Visser:
Function and form of gestures in a collaborative design meeting. - Xiaohan Kang, Juan José Jaramillo, Lei Ying:
A Strategy-Proof and Non-monetary Admission Control Mechanism for Wireless Access Networks. - Camille Couprie, Leo J. Grady, Hugues Talbot, Laurent Najman:
Combinatorial Continuous Maximal Flows. - Behrang Nosrat-Makouei, Jeffrey G. Andrews, Robert W. Heath Jr.:
MIMO Interference Alignment Over Correlated Channels with Imperfect CSI. - Asif-ul Haque, Paul Ginsparg:
Last but not Least: Additional Positional Effects on Citation and Readership in arXiv. - Omar El Ayach, Robert W. Heath Jr.:
Interference Alignment with Analog Channel State Feedback. - Victoria Kostina, Sergey Loyka:
Optimum Power and Rate Allocation for Coded V-BLAST: Average Optimization. - Beatrice Cynthia Dhinakaran, Jae-Kwang Lee, Dhinaharan Nagamalai:
"Reminder: please update your details": Phishing Trends. - Kai Han, Yang Liu, Mingjun Xiao:
Minimum-Energy Multicasting in Asynchronous Duty-Cycled Wireless Ad Hoc Networks. - Antoine Beugnard, Jean-Marc Jézéquel, Noël Plouzeau:
Contract Aware Components, 10 years after. 1-11 - Markus Lumpe, Rajesh Vasa:
Partition Refinement of Component Interaction Automata: Why Structure Matters More Than Size. 12-26 - Rabéa Ameur-Boulifa, Ludovic Henrio, Eric Madelaine:
Behavioural Models for Group Communications. 42-56 - Romina Spalazzese, Paola Inverardi:
Components Interoperability through Mediating Connector Patterns. 27-41 - Meriem Ouederni, Gwen Salaün:
Tau Be or not Tau Be? - A Perspective on Service Compatibility and Substitutability. 57-70 - Mohamed Messabihi, Pascal André, J. Christian Attiogbé:
Multilevel Contracts for Trusted Components. 71-85 - Abdul Malik Khan, Sophie Chabridon, Antoine Beugnard:
A Reusable Component for Communication and Data Synchronization in Mobile Distributed Interactive Applications. 86-100 - Zilong Wang, Guang Gong, Rongquan Feng:
A Generalized Construction of OFDM M-QAM Sequences With Low Peak-to-Average Power Ratio. - Rongquan Feng, Zhenhua Gu, Zilong Wang, Hongfeng Wu, Kai Zhou:
On the Construction of Finite Oscillator Dictionary. - Weiya Yue, John V. Franco, Weiwei Cao:
Improved Complexity Bound of Vertex Cover for Low degree Graph. - Jan A. Bergstra:
Steering Fragments of Instruction Sequences. - (Withdrawn) Exchangeable equilibria contradict exactness of the Papadimitriou-Roughgarden algorithm.
- Linlin Wu, Rajkumar Buyya:
Service Level Agreement (SLA) in Utility Computing Systems. - Valentin Polishchuk, Mikko Sysikaski:
Improved approximations for robust mincut and shortest path. - Paul F. Christiano, Jonathan A. Kelner, Aleksander Madry, Daniel A. Spielman, Shang-Hua Teng:
Electrical Flows, Laplacian Systems, and Faster Approximation of Maximum Flow in Undirected Graphs. - Guangcan Liu, Zhouchen Lin, Shuicheng Yan, Ju Sun, Yong Yu, Yi Ma:
Robust Recovery of Subspace Structures by Low-Rank Representation. - Daniele Panozzo, Enrico Puppo:
Simplification of cross-field topology. - Stephen D. Howard, Douglas Cochran, William Moran, Frederick R. Cohen:
Estimation and Registration on Graphs. - Florent Foucaud, Reza Naserasr, Aline Parreau:
Extremal problems on identifying codes in digraphs and Bondy's theorem on induced subsets. - Petros A. Petrosyan, Arman Yu. Torosyan, N. A. Khachatryan:
Interval total colorings of graphs. - A. V. Balakrishnan, Ravi R. Mazumdar:
On Powers of Gaussian White Noise. - Jing Yang, Omur Ozel, Sennur Ulukus:
Broadcasting with an Energy Harvesting Rechargeable Transmitter. - Johan Bollen, Huina Mao, Xiao-Jun Zeng:
Twitter mood predicts the stock market. - Ramya Bhagavatula, Robert W. Heath Jr.:
Adaptive Bit Partitioning for Multicell Intercell Interference Nulling with Delayed Limited Feedback. - Umang Bhaskar, Lisa Fleischer, Elliot Anshelevich:
A Stackelberg Strategy for Routing Flow over Time. - Silvio R. L. Meira, Vanilson Arruda Burégio, Leandro Marques Nascimento, Elaine G. M. de Figueiredo, Misael Neto, Bruno P. Encarnação, Vinicius Cardoso Garcia:
The Emerging Web of Social Machines. - Lars Kolb, Andreas Thor, Erhard Rahm:
Parallel Sorted Neighborhood Blocking with MapReduce. - Neevan Ramalingam, Zhengdao Wang:
On the Rate Achievable for Gaussian Relay Channels Using Superposition Forwarding. - Bharat Adsul, Jugal Garg, Ruta Mehta, Milind A. Sohoni:
Rank-1 Bi-matrix Games: A Homeomorphism and a Polynomial Time Algorithm. - Daniel Golovin, Andreas Krause, Debajyoti Ray:
Near-Optimal Bayesian Active Learning with Noisy Observations. - Bob Diertens:
On Object-Orientation. - Ewa Matusiak, Yonina C. Eldar:
Sub-Nyquist Sampling of Short Pulses: Part I. - Yong Fang:
Application of DAC Codeword Spectrum: Expansion Factor. - Danilo Gligoroski, Svein Johan Knapskog, Smile Markovski, Rune Steinsmo Ødegård, Rune Erlend Jensen, Ludovic Perret, Jean-Charles Faugère:
The Digital Signature Scheme MQQ-SIG. - Xin Rong:
Introduction to the iDian. - Saber Salehkaleybar, Seyyed Arash Majd, Mohammad Reza Pakravan:
QoS-Aware Joint Policies in Cognitive Radio Networks. - Marie Ferbus-Zanda, Serge Grigorieff:
Kolmogorov Complexity in perspective. Part I: Information Theory and Randomnes. - Joshua White, Adam Pilbeam:
A Survey of Virtualization Technologies With Performance Testing. - Janusz A. Brzozowski, Yuli Ye:
Syntactic Complexity of Ideal and Closed Languages. - Mohamed Elsabagh, Yara Abdallah, Moustafa Youssef, Hesham El Gamal:
ARQ Security in Wi-Fi and RFID Networks. - Yeow Meng Chee, Gennian Ge, Lijun Ji, San Ling, Jianxing Yin:
List Decodability at Small Radii. - (Withdrawn) Hadamard Upper Bound (HUB) on Optimum Joint Decoding Capacity of Wyner Gaussian Cellular MAC.
- Arun Dua:
Wireless Sensor Network based Future of Telecom Applications. - Marco Chiani:
How to use our talents based on Information Theory - or spending time wisely. - Mohamed Ibrahim, Moustafa Youssef:
A Hidden Markov Model for Localization Using Low-End GSM Cell Phones. - Magnús M. Halldórsson:
Wireless Scheduling with Power Control. - Teng Zhang, Arthur Szlam, Yi Wang, Gilad Lerman:
Hybrid Linear Modeling via Local Best-fit Flats. - Koray Kavukcuoglu, Marc'Aurelio Ranzato, Yann LeCun:
Fast Inference in Sparse Coding Algorithms with Applications to Object Recognition. - Shuping Gong, Husheng Li, Lifeng Lai, Robert Caiming Qiu:
Decoding the 'Nature Encoded' Messages for Distributed Energy Generation Control in Microgrid. - Ilias Diakonikolas, Ryan O'Donnell, Rocco A. Servedio, Yi Wu:
Hardness Results for Agnostically Learning Low-Degree Polynomial Threshold Functions. - Satish Karra:
Diffusion of a fluid through a viscoelastic solid. - Zichong Chen, Guillermo Barrenetxea, Martin Vetterli:
Distributed Successive Approximation Coding using Broadcast Advantage: The Two-Encoder Case. - Gianluigi Liva, Enrico Paolini, Marco Chiani:
High-Throughput Random Access via Codes on Graphs. - Wei Liu, Ge Xu, Biao Chen:
The Common Information of N Dependent Random Variables. - Stéphane Martin, Pascal Urso, Stéphane Weiss:
Scalable XML Collaborative Editing with Undo short paper. - Souvik Ghosh, Soumyadip Ghosh:
A strong law for the rate of growth of long latency periods in cloud computing service. - Dániel Marx, Igor Razgon:
Fixed-parameter tractability of multicut parameterized by the size of the cutset. - Steffen Kopecki:
On the Iterated Hairpin Completion. - Jan A. Bergstra, Alban Ponse:
Short-circuit logic. - Vincent D. Blondel, Stéphane Gaubert, Natacha Portier:
The set of realizations of a max-plus linear sequence is semi-polyhedral. - Yeow-Khiang Chia, Haim H. Permuter, Tsachy Weissman:
Cascade, Triangular and Two Way Source Coding with degraded side information at the second user. - Mihai Patrascu:
Unifying the Landscape of Cell-Probe Lower Bounds. - Takeshi Tsukada, Atsushi Igarashi:
A Logical Foundation for Environment Classifiers. - Hao Yu, Shunqing Zhang, Vincent K. N. Lau:
Game Theoretical Power Control for Open-Loop Overlaid Network MIMO Systems with Partial Cooperation. - Aman Dhesi, Purushottam Kar:
Random Projection Trees Revisited. - Addepalli V. N. Krishna, A. Vinaya Babu:
A New Non Linear, Time Stamped & Feed Back Model Based Encryption Mechanism with Acknowledgement Support. - Alexandre Bargeton, Fabien Moutarde, Fawzi Nashashibi, Anne-Sophie Puthon:
Joint interpretation of on-board vision and static GPS cartography for determination of correct speed limit. - Aruna Prem Bianzino, Claude Chaudet, Dario Rossi, Jean-Louis Rougier:
A Survey of Green Networking Research. - (Withdrawn) Advancements in scientific data searching, sharing and retrieval.
- Abdelkader Chelouah:
Diffieties and Liouvillian Systems. - Pedro M. Q. Aguiar, Rui F. C. Guerreiro, Bruno B. Gonçalves:
3-D Rigid Models from Partial Views - Global Factorization. - Angad Singh, David Starobinski:
Exact Analysis of Rate Adaptation Algorithms in Wireless LANs. - Bernardo Esteves Pires, Pedro M. Q. Aguiar:
Maximum Likelihood Mosaics. - Cristina Videira Lopes, Pedro M. Q. Aguiar:
Alternatives to speech in low bit rate communication systems. - Husheng Li, Lifeng Lai, Seddik M. Djouadi:
Combating False Reports for Secure Networked Control in Smart Grid via Trustiness Evaluation. - Julia Chuzhoy, Yury Makarychev, Anastasios Sidiropoulos:
On Graph Crossing Number and Edge Planarization. - Arash Behboodi, Pablo Piantanida:
Broadcasting over the Relay Channel with Oblivious Cooperative Strategy. - Ranjeet Devarakonda, Giriprakash Palanisamy, James M. Green:
Digitizing scientific data and data retrieval techniques. - Pei Wu, Chi Ho Yeung, Weiping Liu, Ci-Hang Jin, Yi-Cheng Zhang:
Time-aware Collaborative Filtering with the Piecewise Decay Function. - Rengarajan Amirtharajan, Sandeep Kumar Behera, Motamarri Abhilash Swarup, Mohamed Ashfaaq K, John Bosco Balaguru Rayappan:
Colour Guided Colour Image Steganography. - Chadi Kari:
A Paradigm for Channel Assignment and Data Migration in Distributed Systems. - José Jeronimo Rodrigues, João M. F. Xavier, Pedro M. Q. Aguiar:
ANSIG - An Analytic Signature for Arbitrary 2D Shapes (or Bags of Unlabeled Points). - Flavien Léger, Guoshen Yu, Guillermo Sapiro:
Efficient Matrix Completion with Gaussian Models. - Jialong Cheng, Meera Sitharam:
Maxwell-independence: a better rank estimate for 3D rigidity matroids. - Vasil Kolev:
Multiplierless Modules for Forward and Backward Integer Wavelet Transform. - Bernhard Fischer:
Model-Based Development of Distributed Embedded Systems by the Example of the Scicos/SynDEx Framework. - Xianfeng David Gu, Ren Guo, Feng Luo, Wei Zeng:
Discrete Laplace-Beltrami Operator Determines Discrete Riemannian Metric. - Kamrul Hasan Talukder, Koichi Harada:
Haar Wavelet Based Approach for Image Compression and Quality Assessment of Compressed Image. - Norihito Toyota:
Generalized Clustering Coefficients and Milgram Condition for q-th Degrees of Separation. - (Withdrawn) Predicting Bugs' Components via Mining Bug Reports.
- Lorenzo Orecchia, Nisheeth K. Vishnoi:
Towards an SDP-based Approach to Spectral Methods: A Nearly-Linear-Time Algorithm for Graph Partitioning and Decomposition. - Hongyang Sun, Yuxiong He, Wen-Jing Hsu:
Energy-Efficient Multiprocessor Scheduling for Flow Time and Makespan. - András Lörincz, Zsolt Palotai, Gábor Szirtes:
Sparse and silent coding in neural circuits. - Konstantinos Nikitopoulos, Gerd Ascheid:
MIMO APP Receiver Processing with Performance-Determined Complexity. - João F. P. Crespo, Pedro M. Q. Aguiar:
Revisiting Complex Moments For 2D Shape Representation and Image Normalization. - Riyazuddin Mohammed:
Information Analysis of DNA Sequences. - Francis R. Bach:
Convex Analysis and Optimization with Submodular Functions: a Tutorial. - René Brandenberg, Stefan König:
No dimension independent Core-Sets for Containment under Homothetics. - Huan Xu, Constantine Caramanis, Sujay Sanghavi:
Robust PCA via Outlier Pursuit. - Rumi Ghosh, Kristina Lerman:
A Parameterized Centrality Metric for Network Analysis. - Magnús M. Halldórsson, Pradipta Mitra:
Wireless Capacity with Oblivious Power in General Metrics. - Xudong Ma:
Large-Scale Clustering Based on Data Compression. - Vijay V. Vazirani:
Rational Convex Programs, Their Feasibility, and the Arrow-Debreu Nash Bargaining Game. - Vijay V. Vazirani:
Non-Separable, Quasiconcave Utilities are Easy -- in a Perfect Price Discrimination Market Model. - Guoshen Yu, Guillermo Sapiro:
Statistical Compressive Sensing of Gaussian Mixture Models. - Václav Belák, Marcel Karnstedt, Conor Hayes:
Life-Cycles and Mutual Effects of Scientific Communities. - Hugo Hernández, Tobias Baumgartner, Maria J. Blesa, Christian Blum, Alexander Kröller, Sándor P. Fekete:
A Protocol for Self-Synchronized Duty-Cycling in Sensor Networks: Generic Implementation in Wiselib. - Kenneth L. Clarkson, Elad Hazan, David P. Woodruff:
Sublinear Optimization for Machine Learning. - Fabiano de S. Oliveira, Valmir Carneiro Barbosa:
Revisiting deadlock prevention: a probabilistic approach. - Alberto Griggio, Thi Thieu Hoa Le, Roberto Sebastiani:
Efficient Interpolant Generation in Satisfiability Modulo Linear Integer Arithmetic. - Dominik Steenken, Heike Wehrheim, Daniel Wonisch:
Towards A Shape Analysis for Graph Transformation Systems. - Ran El-Yaniv, Mordechai Nisenson:
On the Foundations of Adversarial Single-Class Classification. - Manoj K. Panda, Anurag Kumar:
State Dependent Attempt Rate Modeling of Single Cell IEEE~802.11 WLANs with Homogeneous Nodes and Poisson Packet Arrivals. - (Withdrawn) A Type II lattice of norm 8 in dimension 72.
- Walid Saad, Zhu Han, Tamer Basar, Mérouane Debbah, Are Hjørungnes:
Hedonic Coalition Formation for Distributed Task Allocation among Wireless Agents. - Walid Saad, Zhu Han, Tamer Basar, Mérouane Debbah, Are Hjørungnes:
Coalition Formation Games for Collaborative Spectrum Sensing. - Sándor P. Fekete, Tom Kamphans, Nils Schweer:
Online Square Packing. - Jerzy Marcinkowski, Jakub Michaliszyn:
The Last Paper on the Halpern-Shoham Interval Temporal Logic. - Elvira Albert, Puri Arenas, Germán Puebla, Manuel V. Hermenegildo:
Certificate size reduction in Abstraction-Carrying Code. - Aravind R. Iyengar, Marco Papaleo, Paul H. Siegel, Jack K. Wolf, Alessandro Vanelli-Coralli, Giovanni Emanuele Corazza:
Windowed Decoding of Protograph-based LDPC Convolutional Codes over Erasure Channels. - Ali Akbar Kiaei, Saeed Bagheri Shouraki, Seyed Hossein Khasteh, Mahmoud Khademi:
New S-norm and T-norm Operators for Active Learning Method. - Aravind R. Iyengar, Paul H. Siegel, Jack K. Wolf:
Write Channel Model for Bit-Patterned Media Recording. - Shant Karakashian, Robert J. Woodward, Berthe Y. Choueiry, Steven Prestwhich, Eugene C. Freuder:
A Partial Taxonomy of Substitutability and Interchangeability. - Michael P. Friedlander, Hassan Mansour, Rayan Saab, Özgür Yilmaz:
Recovering Compressively Sampled Signals Using Partial Support Information. - Antonio Wendell De Oliveira Rodrigues, Frédéric Guyomarc'h, Yvonnick Le Menach, Jean-Luc Dekeyser:
Parallel Sparse Matrix Solver on the GPU Applied to Simulation of Electrical Machines. - Antoine Girard:
Controller Synthesis for Safety and Reachability via Approximate Bisimulation. - Wei-Chiang Li, Tsung-Hui Chang, Che Lin, Chong-Yung Chi:
A convex approximation approach to Weighted Sum Rate Maximization of Multiuser MISO Interference Channel under outage constraints. - Bryan Bruns:
Navigating the Topology of 2x2 Games: An Introductory Note on Payoff Families, Normalization, and Natural Order. - Massimo Franceschet:
The small world of computer science. - Ignacio Ramírez, Guillermo Sapiro:
Sparse coding and dictionary learning based on the MDL principle. - Petr Jancar:
Short Decidability Proof for DPDA Language Equivalence via 1st Order Grammar Bisimilarity. - Indre Zliobaite:
Learning under Concept Drift: an Overview. - Matteo Cristani, Erisa Karafili, Luca Viganò:
Blocking Underhand Attacks by Hidden Coalitions (Extended Version). - Rajgopal Kannan, Costas Busch, Athanasios V. Vasilakos:
Polynomial Bottleneck Congestion Games with Optimal Price of Anarchy. - Anvesh Aileni:
Cluster based Key Management in Wireless Sensor Networks. - Serdar Yüksel:
On Optimal Causal Coding of Partially Observed Markov Sources in Single and Multi-Terminal Settings. - Neil D. Lawrence:
A Unifying Probabilistic Perspective for Spectral Dimensionality Reduction. - Danilo Valeros Bernardo, Doan B. Hoang:
Securing data transfer in the cloud through introducing identification packet and UDT-authentication option field: a characterization. - Sébastien Nedjar, Fabien Pesci, Lotfi Lakhal, Rosine Cicchetti:
Treillis des concepts skylines : Analyse multidimensionnelle des skylines fondée sur les ensembles en accord. - Pulkit Grover, Anant Sahai:
Implicit and explicit communication in decentralized control. - Pulkit Grover, Kristen Ann Woyach, Anant Sahai:
Towards a communication-theoretic understanding of system-level power consumption. - Salah A. Aly, Nirwan Ansari, Anwar I. Walid, H. Vincent Poor:
S-MATE: Secure Coding-based Multipath Adaptive Traffic Engineering. - Qingchun Zhao, Hongxi Yin:
Suggested Rules for Designing Secure Communication Systems Utilizing Chaotic Lasers: A Survey. - Mehmet Akif Antepli, Elif Uysal-Biyikoglu, Hakan Erkal:
Optimal Packet Scheduling on an Energy Harvesting Broadcast Link. - Muhammad Ibrahim Channa, Kazi M. Ahmed:
Emergency Response Communications and Associated Security Challenges. - Prabhu Ramachandran, Gaël Varoquaux:
Mayavi: a package for 3D visualization of scientific data. - Pablo Sprechmann, Ignacio Ramírez, Pablo Cancela, Guillermo Sapiro:
Collaborative Sources Identification in Mixed Signals via Hierarchical Sparse Modeling. - Anas Chaaban, Aydin Sezgin:
The Capacity Region of the 3-User Gaussian Interference Channel with Mixed Strong-Very Strong Interference. - Mahdi Hajiaghayi, Min Dong, Ben Liang:
Optimal Channel Pairing and Power Allocation for Multi-channel Multi-hop Relay Networks. - Victor Chen, Madhu Sudan, Ning Xie:
Property Testing via Set-Theoretic Operations. - Jaroslaw Adam Miszczak, Izabela Sobota-Miszczak:
Design-on-demand or how to create a target-oriented social web-site. - (Withdrawn) Local Component Analysis for Nonparametric Bayes Classifier.
- Mikael Fernandus Simalango, Mun-Young Kang, Sangyoon Oh:
Towards Constraint-based High Performance Cloud System in the Process of Cloud Computing Adoption in an Organization. - Soumyadip Bandyopadhyay:
Equivalence Checking in Embedded Systems Design Verification using PRES+ model. - Meng Zeng, Rui Zhang, Shuguang Cui:
On Design of Collaborative Beamforming for Two-Way Relay Networks. - Emmanouil A. Panaousis, George Drew, Grant P. Millar, Tipu Arvind Ramrekha, Christos Politis:
A Testbed Implementation for Securing OLSR in Mobile Ad hoc Networks. - Arnab Bhattacharyya, Elena Grigorescu, Asaf Shapira:
A Unified Framework for Testing Linear-Invariant Properties. - Matthew Might, David Darais:
Yacc is dead. - Dima Grigoriev, Vladimir Shpilrain:
Authentication from matrix conjugation. - Mueen Uddin, Azizah Abdul Rahman:
Dynamic Multi Layer Signature based Intrusion Detection system Using Mobile Agents. - Mueen Uddin, Azizah Abdul Rahman:
Server Consolidation: An Approach to make Data Centers Energy Efficient and Green. - John Augustine, Ning Chen, Edith Elkind, Angelo Fanelli, Nick Gravin, Dmitry Shiryaev:
Dynamics of Profit-Sharing Games. - Konstantinos G. Spiliotis, Constantinos I. Siettos:
Coarse-Grained Analysis of Microscopic Neuronal Simulators on Networks: Bifurcation and Rare-events computations. - Ahmed Ayadi, Patrick Maillé, David Ros:
TCP over low-power and lossy networks: tuning the segment size to minimize energy consumption. - Sundeep Rangan:
Generalized Approximate Message Passing for Estimation with Random Linear Mixing. - Dragana Bajovic, Dusan Jakovetic, João Manuel Freitas Xavier, Bruno Sinopoli, José M. F. Moura:
Distributed Detection over Time Varying Networks: Large Deviations Analysis. - Jaydip Sen:
A Distributed Trust Management Framework for Detecting Malicious Packet Dropping Nodes in a Mobile Ad Hoc Network. - Nicolas Bousquet, Jean Daligault, Stéphan Thomassé:
Multicut is FPT. - Christian Koller, Alexandre Graell i Amat, Jörg Kliewer, Francesca Vatta, Kamil Sh. Zigangirov, Daniel J. Costello Jr.:
Analysis and Design of Tuned Turbo Codes. - Andri Mirzal:
Converged Algorithms for Orthogonal Nonnegative Matrix Factorizations. - Wenping Ma, Shaohui Sun:
New Class of Optimal Frequency-Hopping Sequences by Polynomial Residue Class Rings. - Simon Bliudze, Roberto Bruni, Davide Grohmann, Alexandra Silva:
Proceedings Third Interaction and Concurrency Experience: Guaranteed Interaction, ICE 2010, Amsterdam, The Netherlands, 10th of June 2010. EPTCS 38, 2010 [contents] - Jean Berstel, Luc Boasson, Olivier Carton, Isabelle Fagnot:
Minimization of Automata. - Leto Peel:
Estimating Network Parameters for Selecting Community Detection Algorithms. - Shahab Asoodeh, Amos Lapidoth, Ligong Wang:
It takes half the energy of a photon to send one bit reliably on the Poisson channel with feedback. - Gianfranco L. Cariolaro, Alberto Vigato:
Helstrom's Theory on Quantum Binary Decision Revisited. - Emilie Charlier, Anne Lacroix, Narad Rampersad:
Multi-dimensional sets recognizable in all abstract numeration systems. - Pierre Bonami:
On optimizing over lift-and-project closures. - Ramachandran Rajesh, Vinod Sharma:
Capacity of Fading Gaussian Channel with an Energy Harvesting Sensor Node. - Subhash C. Kak:
On the Mesh Array for Matrix Multiplication. - Shuai Zheng, Kaiqi Huang, Tieniu Tan:
Translation-Invariant Representation for Cumulative Foot Pressure Images. - Arseny M. Shur:
Combinatorial Characterization of Formal Languages. - Ricard Gavaldà, María López-Valdés, Elvira Mayordomo, N. V. Vinodchandran:
Resource-bounded Dimension in Computational Learning Theory. - Redjan F. Shabani:
The nature of individual choice: a formalism for utility function based on set theory. - Tigran Tonoyan:
Algorithms for Scheduling with Power Control in Wireless Networks. - Guanfeng Liang, Nitin H. Vaidya:
Multiparty Equality Function Computation in Networks with Point-to-Point Links. - Seth A. Myers, Jure Leskovec:
On the Convexity of Latent Social Network Inference. - Peter Stobbe, Andreas Krause:
Efficient Minimization of Decomposable Submodular Functions. - Amine Mezghani, Josef A. Nossek:
Analysis of 1-bit Output Noncoherent Fading Channels in the Low SNR Regime. - Amine Mezghani, Michel T. Ivrlac, Josef A. Nossek:
Achieving near-Capacity on Large Discrete Memoryless Channels. - Amine Mezghani, Josef A. Nossek:
Belief Propagation based MIMO Detection Operating on Quantized Channel Output. - Amine Mezghani, Felix Antreich, Josef A. Nossek:
Multiple Parameter Estimation With Quantized Channel Output. - Andriy V. Miranskyy, Matthew Davison, Mark Reesor, Syed Shariyar Murtaza:
Using entropy measures for comparison of software traces. - Robin Scheibler, Paul Hurley, Amina Chebira:
Fast Continuous Haar and Fourier Transforms of Rectilinear Polygons from VLSI Layouts. - Christian Lambertz, Mila E. Majster-Cederbaum:
Port Protocols for Deadlock-Freedom of Component Systems. 7-11 - Marco Carbone, Søren Debois:
A Graphical Approach to Progress for Structured Communication in Web Services. 13-27 - Alejandro Mario Hernandez, Flemming Nielson:
History-sensitive versus future-sensitive approaches to security in distributed systems. 29-43 - Chiara Bodei, Viet Dung Dinh, Gian-Luigi Ferrari:
Safer in the Clouds (Extended Abstract). 45-49 - Ivan Lanese:
Static vs Dynamic SAGAs. 51-65 - Massimo Bartoletti, Roberto Zunino:
Primitives for Contract-based Synchronization. 67-82 - Matthieu Lemerre, Vincent David, Christophe Aussaguès, Guy Vidal-Naquet:
An Introduction to Time-Constrained Automata. 83-98 - Harsh Beohar, Pieter J. L. Cuijpers:
A theory of desynchronisable closed loop system. 99-114 - Renaud Sirdey, Pascal Aubry:
A linear programming approach to general dataflow process network verification and dimensioning. 115-119 - Xavier Leroy:
Mechanized semantics. - Bernard Jacquemin:
A derivational rephrasing experiment for question answering. - Krzysztof R. Apt, Jonathan A. Zvesper:
The Role of Monotonicity in the Epistemic Analysis of Strategic Games. - Weiyu Xu, Ao Kevin Tang:
A Generalized Coupon Collector Problem. - Ju Sun, Qiang Chen, Shuicheng Yan, Loong Fah Cheong:
Selective Image Super-Resolution. - Giovanna Carofiglio, Luca Muscariello, Dario Rossi, Claudio Testa, Silvio Valenti:
Rethinking low extra delay background transport protocols. - Louis Esperet, Sylvain Gravier, Mickaël Montassier, Pascal Ochem, Aline Parreau:
Locally identifying coloring of graphs. - Hu Xiong, Zhong Chen:
Privacy-Preserving English Auction Protocol with Round Efficiency. - Roope Vehkalahti, Camilla Hollanti, Frédérique E. Oggier:
Fast-Decodable Asymmetric Space-Time Codes from Division Algebras. - Minqi Shen, Anders Høst-Madsen:
The Wideband Slope of Interference Channels: The Infinite Bandwidth Case. - Pritam Roy, Paulo Tabuada, Rupak Majumdar:
Safety-Guarantee Controller Synthesis for Cyber-Physical Systems. - Chia-Shiang Tseng, Chang-Ching Chen, Che Lin:
A Bio-Inspired Robust Adaptive Random Search Algorithm for Distributed Beamforming. - Jean-Christophe Baillie, Akim Demaille, Quentin Hocquet, Matthieu Nottale:
Events! (Reactivity in urbiscript). - Dominik Scheder:
PPZ For More Than Two Truth Values - An Algorithm for Constraint Satisfaction Problems. - Bastian Steudel, Nihat Ay:
Information-theoretic inference of common ancestors. - Tomer Faktor, Yonina C. Eldar, Michael Elad:
Exploiting Statistical Dependencies in Sparse Representations for Signal Recovery. - David H. Wolpert, Michael Harré, Eckehard Olbrich, Nils Bertschinger, Jürgen Jost:
Hysteresis effects of changing parameters of noncooperative games. - Oliver Kullmann, Xishun Zhao:
On variables with few occurrences in conjunctive normal forms. - Stefano Rini, Daniela Tuninetti, Natasha Devroye:
Inner and Outer Bounds for the Gaussian Cognitive Interference Channel and New Capacity Results. - Shahrukh Khalid, Adnan Ali Khan:
An Alternative Approach to Data Acquisition Using Keyboard Emulation Technique. - Nikolai Todorov Stoianov, Veselin Tsenov Tselkov:
E-Net Models of a Software System for E-Mail Security. - Gregory Z. Gutin, Mark Jones, Anders Yeo:
Kernels for Below-Upper-Bound Parameterizations of the Hitting Set and Directed Dominating Set Problems. - Andrzej Kapanowski:
Python for education: the exact cover problem. - Liang Ma, Damien Chablat, Fouad Bennis, Wei Zhang, François Guillaume:
A new muscle fatigue and recovery model and its ergonomics application in human simulation. - José C. Pereira, Fernando G. Lobo:
An Optimized Divide-and-Conquer Algorithm for the Closest-Pair Problem in the Planar Case. - Constantin Jucovschi:
Editing Knowledge in Large Mathematical Corpora. A case study with Semantic LaTeX (sTeX). - Markus Geyer, Michael Kaufmann, Tamara Mchedlidze, Antonios Symvonis:
Upward Point-Set Embeddability. - Han Lun Yap, Christopher J. Rozell:
Stable Takens' Embeddings for Linear Dynamical Systems. - Olesya Mryglod, Yurij Holovatch, Ihor Mryglod:
Analysis of temporal characteristics of the editorial processing in scientific periodicals. - Szymon Chojnacki, Mieczyslaw A. Klopotek:
Random Graph Generator for Bipartite Networks Modeling. - Samir Datta, Nagarajan Krishnamurthy:
Some Tractable Win-Lose Games. - Szymon Chojnacki, Mieczyslaw A. Klopotek:
Random Graphs for Performance Evaluation of Recommender Systems. - Paul S. Bonsma, Daniel Lokshtanov:
Feedback Vertex Set in Mixed Graphs. - Florent Foucaud, Ralf Klasing, Adrian Kosowski, André Raspaud:
On the size of identifying codes in triangle-free graphs. - Shrinivas Kudekar, Henry D. Pfister:
The Effect of Spatial Coupling on Compressive Sensing. - Raef Bassily, Sennur Ulukus:
Ergodic Secret Alignment. - Mohammad Amin Ahmad Akhoundi, Ehsan Valavi:
Multi-Sensor Fuzzy Data Fusion Using Sensors with Different Characteristics. - Yu-Fang Chen, Ahmed Rezine:
Proceedings 12th International Workshop on Verification of Infinite-State Systems, INFINITY 2010, Singapore, Singapore, 21st September 2010. EPTCS 39, 2010 [contents] - Iulia Dragomir, Iulian Ober:
Well-formedness and typing rules for UML Composite Structures. - Rafael P. Laufer, Henri Dubois-Ferrière, Leonard Kleinrock:
Polynomial-Time Algorithms for Multirate Anypath Routing in Wireless Multihop Networks. - Ioannis Z. Emiris, Guillaume Moroz:
The assembly modes of rigid 11-bar linkages. - Leslie Ann Goldberg, Mark Jerrum:
A polynomial-time algorithm for estimating the partition function of the ferromagnetic Ising model on a regular matroid. - Grazia Bombini, Raquel Ros, Stefano Ferilli, Ramón López de Mántaras:
Analysing the behaviour of robot teams through relational sequential pattern mining. - Martine Hurault-Plantet, Elie Naulleau, Bernard Jacquemin:
GraphDuplex: visualisation simultanée de N réseaux couplés 2 par 2. - L. F. Johnson:
Symmetry in Shannon's Noiseless Coding Theorem. - Anas Chaaban, Aydin Sezgin:
On the Capacity of the 2-user Gaussian MAC Interfering with a P2P Link. - Kaya Tutuncuoglu, Aylin Yener:
Optimum Transmission Policies for Battery Limited Energy Harvesting Nodes. - Ye Tian, Aylin Yener:
Symmetric Capacity of the Gaussian Interference Channel with an Out-of-Band Relay to within 1.15 Bits. - Mark A. Iwen:
Improved Approximation Guarantees for Sublinear-Time Fourier Algorithms. - Cem Tekin, Mingyan Liu:
Online Learning in Opportunistic Spectrum Access: A Restless Bandit Approach. - Douglas N. Arnold, Kristine K. Fowler:
Nefarious Numbers. - Marc Barthelemy:
Spatial Networks. - Jiankui He, Michael W. Deem:
Structure and Response in the World Trade Network. - Rudolf Ahlswede, Igor Bjelakovic, Holger Boche, Janis Noetzel:
Quantum capacity under adversarial quantum noise: arbitrarily varying quantum channels. - Edgar Fisher, Nándor Sieben:
Rectangular Polyomino Set Weak (1,2)-achievement Games. - Martin Rosvall, Carl T. Bergstrom:
Multilevel compression of random walks on networks reveals hierarchical organization in large integrated systems. - Thomas L. Marzetta, Gabriel H. Tucci, Steven H. Simon:
A Random Matrix--Theoretic Approach to Handling Singular Covariance Estimates. - Shuang-Hong Yang:
Local Optimality of User Choices and Collaborative Competitive Filtering. - Gabriel H. Tucci, Philip A. Whiting:
Eigenvalue Results for Large Scale Random Vandermonde Matrices with Unit Complex Entries. - David R. Bickel:
Statistical inference optimized with respect to the observed sample for single or multiple comparisons. - Stefan Ragnarsson, Charles F. Van Loan:
Block tensors and symmetric embeddings. - Sandro Meloni, Jesús Gómez-Gardeñes:
Local Empathy provides Global Minimization of Congestion in Communication Networks. - Linyuan Lu, Tao Zhou:
Link Prediction in Complex Networks: A Survey. - Matthias Scholz:
Node similarity is the basic principle behind connectivity in complex networks. - Kamalika Basu Hajra, Anjan Kumar Chandra:
Coevolution of Glauber-like Ising dynamics on typical networks. - José Luis Herrera, Mario G. Cosenza, Kay Tucci:
Stratified economic exchange on networks. - James Zhao:
Hidden Markov Models with Multiple Observation Processes. - Olivier Bodini, Thomas Fernique, Damien Regnault:
Stochastic Flips on Two-letter Words. - Cheolwoo Park, Félix Hernández-Campos, J. S. Marron, Kevin Jeffay, F. Donelson Smith:
Analysis of dependence among size, rate and duration in internet flows. - Vicky Choi:
Different Adiabatic Quantum Optimization Algorithms for the NP-Complete Exact Cover and 3SAT Problems. - Mark M. Wilde, Min-Hsiu Hsieh:
Entanglement boosts quantum turbo codes. - Mahdi Shafiei, Hugh A. Chipman:
Mixed-Membership Stochastic Block-Models for Transactional Networks. - Sudhakar Prasad:
Certain Relations between Mutual Information and Fidelity of Statistical Estimation. - Cecilia Lagorio, Mark Dickison, F. Vazquez, Lidia A. Braunstein, Pablo A. Macri, M. V. Migueles, Shlomo Havlin, Harry Eugene Stanley:
Quarantine generated phase transition in epidemic spreading. - Steve Gregory:
Fuzzy overlapping communities in networks. - Pierre Jacob, Christian P. Robert, Murray H. Smith:
Using parallel computation to improve Independent Metropolis--Hastings based estimation. - Claudio Castellano, Romualdo Pastor-Satorras:
Thresholds for epidemic spreading in networks. - Xiaoke Xu, Jie Zhang, Michael Small:
Rich-club connectivity dominates assortativity and transitivity of complex networks. - Yanqing Hu, Yong Li, Zengru Di, Ying Fan:
Navigation in non-uniform density social networks. - Longbo Huang, Michael J. Neely:
Utility Optimal Scheduling in Processing Networks. - Roman Shevchuk, Andrew Snarskii:
Studying the structure of complex networks by the transition to acyclic networks. - Yin Sun, Árpád Baricz, Shidong Zhou:
Corrections to "Unified Laguerre polynomial-series-based distribution of small-scale fading envelopes''. - Daniel Gregory Brown, Jakub Truszkowski:
Fast error-tolerant quartet phylogeny algorithms. - Friedrich August, Philippe Blanchard, Sascha Delitzscher, Gerald Hiller, Tyll Krueger:
Passive Supporters of Terrorism and Phase Transitions. - Annalisa Marzuoli, Giandomenico Palumbo:
Post Quantum Cryptography from Mutant Prime Knots. - John C. Baez, Mike Stay:
Algorithmic Thermodynamics. - Tore Opsahl, Bernie Hogan:
Growth mechanisms in continuously-observed networks: Communication in a Facebook-like community. - Xuqing Huang, Jianxi Gao, Sergey V. Buldyrev, Shlomo Havlin, Harry Eugene Stanley:
Robustness of interdependent networks under targeted attack. - Dmytro V. Lande, A. A. Snarskii, M. Zhenirovskyy:
Complex network model of the phase transition on the wealth distributions - from Pareto to the society without middle class. - Anahita Mirtabatabaei, Francesco Bullo:
On Opinion Dynamics in Heterogeneous Networks. - Ian R. Manchester, Mark M. Tobenkin, Michael Levashov, Russ Tedrake:
Regions of Attraction for Hybrid Limit Cycles of Walking Robots. - Davood Shamsi, Yinyu Ye, Nicole Taheri:
On Sensor Network Localization Using SDP Relaxation. - Sinan Aksoy, Adam Azzam, Chaya Coppersmith, Julie Glass, Gizem Karaali, Xueying Zhao, Xinjing Zhu:
A Cost-Minimizing Algorithm for School Choice. - Matthias Schröder:
ℕℕℕ does not satisfy Normann's condition. - Daria Schymura:
An upper bound on the volume of the symmetric difference of a body and a congruent copy. - Malgorzata J. Krawczyk, Lev Muchnik, Anna Manka-Krason, Krzysztof Kulakowski:
Line graphs as social networks. - Dirk Helbing, Anders Johansson:
Cooperation, Norms, and Revolutions: A Unified Game-Theoretical Approach. - Yan-Qin Qu, Xiu-Lian Xu, Shan Guan, Kai-Jun Li, Si-Jun Pan, Chang-Gui Gu, Yu-Mei Jiang, Da-Ren He:
Empirical study on some interconnecting bilayer networks. - Franziska Hinkelmann, Elizabeth Arnold:
Fast Gröbner Basis Computation for Boolean Polynomials. - Sahand N. Negahban, Pradeep Ravikumar, Martin J. Wainwright, Bin Yu:
A unified framework for high-dimensional analysis of $M$-estimators with decomposable regularizers. - Dominic W. Berry:
Quantum algorithms for solving linear differential equations. - Christopher Batty, Robert Bridson:
A Variational Finite Difference Method for Time-Dependent Stokes Flow on Irregular Domains. - Massimo Mastrangeli, Martin Schmidt, Lucas Lacasa:
The roundtable: an abstract model of conversation dynamics. - Yael Dekel, Ori Gurel-Gurevich, Yuval Peres:
Finding Hidden Cliques in Linear Time with High Probability. - Omar Fawzi, Patrick M. Hayden, Pranab Sen:
From Low-Distortion Norm Embeddings to Explicit Uncertainty Relations and Efficient Information Locking. - Maria Monks:
Closure properties of predicates recognized by deterministic and non-deterministic asynchronous automata. - Brielin Brown, Steven T. Flammia, Norbert Schuch:
Computational Difficulty of Computing the Density of States. - Deniz Turgut, Ali Rana Atilgan, Canan Atilgan:
Assortative Mixing in Close-Packed Spatial Networks. - Ana Busic, Jean Mairesse, Irène Marcovici:
Probabilistic cellular automata, invariant measures, and perfect sampling. - Raj Kumar Pan, Mikko Kivelä, Jari Saramäki, Kimmo Kaski, János Kertész:
Explosive percolation on real-world networks. - Michael S. Sutherland, Brian M. Baughman, James J. Beatty:
CRT: A numerical tool for propagating ultra-high energy cosmic rays through Galactic magnetic field models. - Soumyajyoti Biswas, Anjan Kumar Chandra, Arnab Chatterjee:
Phase transitions and non-equilibrium relaxation in kinetic models of opinion formation. - Yuliy M. Baryshnikov, Gabriel H. Tucci:
Asymptotic Traffic Flow in an Hyperbolic Network I: Definition and Properties of the Core. - Yuliy M. Baryshnikov, Gabriel H. Tucci:
Asymptotic Traffic Flow in an Hyperbolic Network II: Non-uniform Traffic. - Szilárd András, Árpád Baricz, Yin Sun:
The generalized Marcum $Q-$function: an orthogonal polynomial approach. - Zdenek Dvorák, Bojan Mohar:
Spectrally degenerate graphs: Hereditary case. - A. Philip Dawid, Vanessa Didelez:
Identifying the consequences of dynamic treatment strategies: A decision-theoretic overview. - Andrea Scharnhorst, Eugene Garfield:
Tracing scientific influence. - Peng Wang, Xiao-Yi Xie, Chi Ho Yeung, Bing-Hong Wang:
Heterogenous scaling in interevent time of on-line bookmarking. - Daniele Vilone, Ángel Sánchez, Jesús Gómez-Gardeñes:
Random Topologies and the emergence of cooperation: the role of short-cuts. - Kevin T. Macon, Peter J. Mucha, Mason A. Porter:
Community Structure in the United Nations General Assembly. - Massimo Brescia, Giuseppe Longo, Fabio Pasian:
Mining Knowledge in Astrophysical Massive Data Sets. - Lei Gao, Jin-Li Guo, Chao Fan, Xuejiao Liu:
Individual and Group Dynamics in Purchasing Activity. - H. T. Ng, Franco Nori:
Linear-time approach for quantum factoring, searching and NP-complete problems. - Fabien Durand:
Cobham's theorem for substitutions. - Huawei Shen, Xueqi Cheng:
Spectral methods for the detection of network community structure: a comparative analysis. - Fabian Wissbrock:
O(αs3 TF2 NF) Contributions to the Heavy Flavor Wilson Coefficients of the Structure Function F2(x,Q2) at Q2 ≫ m2. - Leonid A. Bunimovich, Benjamin Z. Webb:
Isospectral Reductions of Dynamical Networks. - Greg Morrison, L. Mahadevan:
Generalized Erdos Numbers. - Andris Ambainis:
Variable time amplitude amplification and a faster quantum algorithm for solving systems of linear equations. - Roni Parshani, Sergey V. Buldyrev, Shlomo Havlin:
The critical effect of dependency groups on the function of networks. - José M. Peña:
Reading Dependencies from Covariance Graphs. - Roni Parshani, Celine Rozenblat, Daniele Ietri, Cesar Ducruet, Shlomo Havlin:
Inter-similarity between coupled networks. - Jake V. Bouvrie, Jean-Jacques E. Slotine:
On Learning, Uncertainty and Synchronization in Stochastic Neural Ensembles. - (Withdrawn) Replacing spectral techniques for expander ratio, normalized cut and conductance by combinatorial flow algorithms.
- Dajie Liu, Huijuan Wang, Piet Van Mieghem:
Spectral Perturbation and Reconstructability of Complex Networks. - Edward K. Agarwala, Hillel J. Chiel, Peter J. Thomas:
Information Maximization Fails to Maximize Expected Utility in a Simple Foraging Model. - G. Bruce Berriman, Ewa Deelman, Gideon Juve, Moira Regelson, Peter Plavchan:
The Application of Cloud Computing to Astronomy: A Study of Cost and Performance. - Gideon Juve, Ewa Deelman, Karan Vahi, Gaurang Mehta, G. Bruce Berriman, Benjamin P. Berman, Philip Maechling:
Data Sharing Options for Scientific Workflows on Amazon EC2. - Massimo Brescia, Giuseppe Longo, S. George Djorgovski, Stefano Cavuoti, Raffaele D'Abrusco, Ciro Donalek, Alessandro Di Guido, Michelangelo Fiore, Mauro Garofalo, Omar Laurino, Ashish Mahabal, Francesco Manna, Alfonso Nocella, Giovanni D'Angelo, Maurizio Paolillo:
DAME: A Web Oriented Infrastructure for Scientific Data Mining & Exploration. - Atsumi Ohara, Hiroshi Matsuzoe, Shun-ichi Amari:
Dually flat structure with escort probability and its application to alpha-Voronoi diagrams. - Won-kuk Cho, K.-I. Goh, I.-M. Kim:
Correlated couplings and robustness of coupled networks. - Jacqueline Banks, Scott Garrabrant, Mark L. Huber, Anne Perizzolo:
Using TPA to count linear extensions. - Gregory K. Fricke, Bruce W. Rogers, Devendra P. Garg:
On the Stability of Swarm Consensus Under Noisy Control. - Sanchari Goswami, Soham Biswas, Parongama Sen:
Complex Networks: effect of subtle changes in nature of randomness. - Olivier Rivoire, Stanislas Leibler:
The Value of Information for Populations in Varying Environments. - Dmitry Gavinsky, Tsuyoshi Ito:
Quantum Fingerprints that Keep Secrets. - Dimitris Bertsimas, David B. Brown, Constantine Caramanis:
Theory and Applications of Robust Optimization. - Åke Brännström, Thilo Gross, Bernd Blasius, Ulf Dieckmann:
Consequences of fluctuating group size for the evolution of cooperation. - Ching-Yi Lai, Todd A. Brun, Mark M. Wilde:
Dualities and Identities for Maximal-Entanglement Quantum Codes. - Ryan G. James, John R. Mahoney, Christopher J. Ellison, James P. Crutchfield:
Many Roads to Synchrony: Natural Time Scales and Their Algorithms. - Shin-ichi Tanigawa:
Generic Rigidity Matroids with Dilworth Truncations. - Hugues Randriambololona:
(2,1)-separating systems beyond the probabilistic bound. - Attila Szolnoki, Matjaz Perc:
Reward and cooperation in the spatial public goods game. - M. Ángeles Serrano, Dmitri V. Krioukov, Marián Boguñá:
Percolation in self-similar networks. - Jianxi Gao, Sergey V. Buldyrev, Shlomo Havlin, Harry Eugene Stanley:
Robustness of a Network of Networks. - Mathilde Bouvel, Luca Ferrari:
On the enumeration of d-minimal permutations. - Liang Tian, Da-Ning Shi:
The Nature of Explosive Percolation Phase Transition. - Reik V. Donner, Michael Small, Jonathan F. Donges, Norbert Marwan, Yong Zou, Ruoxi Xiang, Jürgen Kurths:
Recurrence-based time series analysis by means of complex network methods. - (Withdrawn) Network motifs in music sequences.
- Götz E. Pfander:
Sampling of operators. - Sander M. Bohté, Jaldert O. Rombouts:
Fractionally Predictive Spiking Neurons. - Benjamin A. Burton, Melih Ozlen:
A tree traversal algorithm for decision problems in knot theory and 3-manifold topology. - L. Sunil Chandran, Anita Das, Deepak Rajendraprasad, Nithin M. Varma:
Rainbow Connection Number and Connected Dominating Sets. - Vladimir Privman:
Control of Noise in Chemical and Biochemical Information Processing. - Martin E. Avendano, Ashraf Ibrahim, J. Maurice Rojas, Korben Rusek:
Faster p-adic Feasibility for Certain Multivariate Sparse Polynomials. - Shiva Prasad Kasiviswanathan, Cristopher Moore, Louis Theran:
The rigidity transition in random graphs. - Serdar Yüksel, Sean P. Meyn:
Random-Time, State-Dependent Stochastic Drift for Markov Chains and Application to Stochastic Stabilization Over Erasure Channels. - Laura Poggiolini, Marco Spadini:
Bang-bang trajectories with a double switching time: sufficient strong local optimality conditions. - Yohann de Castro:
Optimal designs for Lasso and Dantzig selector using Expander Codes. - Guofeng Zhang, Matthew R. James:
Direct and Indirect Couplings in Coherent Feedback Control of Linear Quantum Systems. - Ming Zhang, Zairong Xi, Jiahua Wei:
Manipulating quantum information on the controllable systems or subspaces. - Claudio De Persis, Rudolf Sailer, Fabian Wirth:
On a small-gain approach to distributed event-triggered control. - Francesca Ceragioli, Paolo Frasca:
Continuous-time Discontinuous Equations in Bounded Confidence Opinion Dynamics. - Hina Tabassum, Zaher Dawy, Mohamed-Slim Alouini:
Resource Allocation via Sum-Rate Maximization in the Uplink of Multi-Cell OFDMA Networks. - Niket K. Choudhary, Rakesh Ginjupalli, Sandeep Navada, Gaurav Khanna:
An Exploration of OpenCL for a Numerical Relativity Application. - Andrei Kupavskii, Andrei M. Raigorodskii:
Counterexamples to Borsuk's conjecture on spheres of small radii.
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.