default search action
CoRR, March 2012
- Babak Bagheri Hariri, Diego Calvanese, Giuseppe De Giacomo, Alin Deutsch, Marco Montali:
Verification of Relational Data-Centric Dynamic Systems with External Services. - Chithrupa Ramesh, Henrik Sandberg, Karl Henrik Johansson:
Design of State-based Schedulers for a Network of Control Loops. - Junshan Li:
Connectivity in one-dimensional ad hoc networks with an access point. - Georgios Piliouras, Tomás Valla, László A. Végh:
LP-based Covering Games with Low Price of Anarchy. - Felix Halim, Stratos Idreos, Panagiotis Karras, Roland H. C. Yap:
Stochastic Database Cracking: Towards Robust Adaptive Indexing in Main-Memory Column-Stores. - Georgios Giannikis, Gustavo Alonso, Donald Kossmann:
SharedDB: Killing One Thousand Queries With One Stone. - Joachim Selke, Christoph Lofi, Wolf-Tilo Balke:
Pushing the Boundaries of Crowd-enabled Databases with Query-driven Schema Expansion. - Bo Zhao, Benjamin I. P. Rubinstein, Jim Gemmell, Jiawei Han:
A Bayesian Approach to Discovering Truth from Conflicting Sources for Data Integration. - Prasang Upadhyaya, Magdalena Balazinska, Dan Suciu:
How to Price Shared Optimizations in the Cloud. - Albert Angel, Nick Koudas, Nikos Sarkas, Divesh Srivastava:
Dense Subgraph Maintenance under Streaming Edge Weight Updates for Real-time Story Identification. - Iman Elghandour, Ashraf Aboulnaga:
ReStore: Reusing Results of MapReduce Jobs. - Luis Quesada:
Using Barriers to Reduce the Sensitivity to Edge Miscalculations of Casting-Based Object Projection Feature Estimation. - Vince Bárány, Balder ten Cate, Martin Otto:
Queries with Guarded Negation (full version). - Rina Panigrahy, Li Zhang:
The Mind Grows Circuits. - Pradip Sircar:
Joint Estimation of Angle and Delay of Radio Wave Arrival under Multiplicative Noise Environment. - Egor Ianovski:
Cake Cutting Mechanisms. - Giorgi Japaridze:
On the system CL12 of computability logic. - Tianrong Lin:
On equivalence of multi-letter and multi-letter measure-many quantum finite automata. - Gunnar Wilken, Andreas Weiermann:
Derivation Lengths Classification of Gödel's T Extending Howard's Assignment. - Mita Pal, Soubhik Chakraborty, N. C. Mahanti:
How does the Shift-insertion sort behave when the sorting elements follow a Normal distribution? - Pankaj Dayama, Aditya Karnik, Y. Narahari:
Optimal Mix of Incentive Strategies for Product Marketing on Social Networks. - (Withdrawn) The Horse Raced Past: Gardenpath Processing in Dynamical Systems.
- Yingyi Bu, Vinayak R. Borkar, Michael J. Carey, Joshua Rosen, Neoklis Polyzotis, Tyson Condie, Markus Weimer, Raghu Ramakrishnan:
Scaling Datalog for Machine Learning on Big Data. - G. S. Raghavendra, N. Prasanna Kumar:
Statistical Approach for Selecting Elite Ants. - S. Nirmala Sugirtha Rajini, T. Bhuvaneswari:
An Interface using SOA Framework For Mediclaim Provider. - Gabriel Dulac-Arnold, Ludovic Denoyer, Philippe Preux, Patrick Gallinari:
Fast Reinforcement Learning with Large Action Sets using Error-Correcting Output Codes for MDP Factorization. - Dov M. Gabbay:
The Equational Approach to CF2 Semantics. - Michael Dinitz, Guy Kortsarz, Ran Raz:
Label Cover instances with large girth and the hardness of approximating basic k-spanner. - Tapalina Bhattasali, Rituparna Chaki, Sugata Sanyal:
Sleep Deprivation Attack Detection in Wireless Sensor Network. - Tapalina Bhattasali, Rituparna Chaki:
A Survey of Recent Intrusion Detection Systems for Wireless Sensor Network. - Boris Alexeev, M. Brian Jacokes:
A rearrangement step with potential uses in priority queues. - S. Chitra, J. B. Bhattacharjee, B. Thilakavathi:
Image Fusion and Re-Modified SPIHT for Fused Image. - Varsha Dani, Valerie King, Mahnush Movahedi, Jared Saia:
Breaking the O(nm) Bit Barrier: Secure Multiparty Computation with a Static Adversary. - Krishna V. Kaipa, Harish K. Pillai:
Weight spectrum of codes associated with the Grassmannian G(3,7). - S. Aruna, S. P. Rajagopalan, L. V. Nandakishore:
Application of Gist SVM in Cancer Detection. - Niels Drost, Jason Maassen, Maarten A. J. van Meersbergen, Henri E. Bal, F. Inti Pelupessy, Simon Portegies Zwart, Michael Kliphuis, Henk A. Dijkstra, Frank J. Seinstra:
High-Performance Distributed Multi-Model / Multi-Kernel Simulations: A Case-Study in Jungle Computing. - Frederico Araújo Durão, Peter Dolog:
A Personalized Tag-Based Recommendation in Social Web Systems. - Alfredo Esposito:
Debunking some myths about biometric authentication. - Aaron Roth, Grant Schoenebeck:
Conducting Truthful Surveys, Cheaply. - Abhijit Chowdhury, Angshu Kumar Sinha, Saurabh Dutta:
Introduction of a Triple Prime Symmetric Key Block Cipher. - Valérie Monfort, Sihem Cherif:
Bridging the Gap between Technical Heterogeneity of Context-Aware Platforms: Experimenting a Service Based Connectivity between Adaptable Android, WComp and OpenORB. - Edith Hemaspaandra, Lane A. Hemaspaandra, Jörg Rothe:
Online Voter Control in Sequential Elections. - Jan Olaf Blech:
On Compositional Reasoning for Guaranteeing Probabilistic Properties. - Theo Dimitrakos, David Brossard, Pierre de Leusse:
Securing business operations in an SOA. - Pierre de Leusse, Krzysztof Zielinski:
Toward Governance of Cross-Cloud Application Deployment. - Katuru S. M. Kalyana Chakravarthy:
"openness of search engine": A critical flaw in search systems; a case study on google, yahoo and bing. - Pierre de Leusse, Bartosz Kwolek, Krzysztof Zielinski:
A common interface for multi-rule-engine distributed systems. - Rob Arthan, Paulo Oliva:
(Dual) Hoops Have Unique Halving. - Pierre de Leusse, Panos Periorellis, Theo Dimitrakos, Srijith K. Nair:
Self Managed Security Cell, a security model for the Internet of Things and Services. - Pierre de Leusse, Theo Dimitrakos:
SOA-based security governance middleware. - Liyong Shen, Jin-San Cheng, Xiaohong Jia:
Homeomorphic approximation of the intersection curve of two rational surfaces. - Pierre de Leusse, Panos Periorellis, Paul Watson, Andreas Maierhofer:
Secure & Rapid Composition of Infrastructure Services in the Cloud. - Alan J. Cain, Victor Maltcev:
Finitely presented monoids with linear Dehn function need not have regular cross-sections. - Sophie Morier-Genoud, Valentin Ovsienko:
Orthogonal Designs and a Cubic Binary Function. - Liyong Shen, Chun-Ming Yuan, Xiao-Shan Gao:
Certified Approximation of Parametric Space Curves with Cubic B-spline Curves. - Shu Kong, Donghui Wang:
Multi-Level Feature Descriptor for Robust Texture Classification via Locality-Constrained Collaborative Strategy. - (Withdrawn) Inconsistency of the Zermelo-Fraenkel set theory with the axiom of choice and its effects on the computational complexity.
- Amelia Carolina Sparavigna, Roberto Marazzato:
Georeferenced lives. - Haidara Abdalla, Dmitry Ageyev:
Application of Multi-layer Graphs In the Design of MPLS Networks. - Martin Bachwerk, Carl Vogel:
Modelling Social Structures and Hierarchies in Language Evolution. - Dmitry Ageyev, Haidara Abdalla:
Multiservice Telecommunication Systems Parametrical Synthesis by using of Multilayer Graph Mathematical Model. - Martin Bachwerk, Carl Vogel:
Establishing linguistic conventions in task-oriented primeval dialogue. - Dmitry Ageyev, Artem Ignatenko:
Describing and Modeling of Video-on-Demand Service with the Usage of Multi-Layer Graph. - Julián Urbano, Diego Martín, Mónica Marrero, Jorge Morato:
Overview of EIREX 2011: Crowdsourcing. - Ludo Waltman, Nees Jan van Eck:
A new methodology for constructing a publication-level classification system of science. - Emilio Ferrara, Pasquale De Meo, Giacomo Fiumara, Alessandro Provetti:
The role of strong and weak ties in Facebook: a community structure perspective. - Olga Goussevskaia, Magnús M. Halldórsson, Roger Wattenhofer:
Algorithms for Wireless Capacity. - Mrinal Nandi, Amiya Nayak, Bimal K. Roy, Santanu Sarkar:
Hypothesis Testing and Decision Theoretic Approach for Fault Detection in Wireless Sensor Networks. - (Withdrawn) Efficient Approximation Algorithms for Optimal Large-scale Network Monitoring.
- Corinna Cortes, Mehryar Mohri, Afshin Rostamizadeh:
Algorithms for Learning Kernels Based on Centered Alignment. - Alex Brik, Jeffrey B. Remmel:
Expressing Preferences using Preference Set Constraint Atoms. - Vitaly Feldman:
Learning DNF Expressions from Fourier Spectrum. - Yonghui Xiao, Li Xiong:
Online query answering with differential privacy: a utility-driven approach using Bayesian inference. - Dmitry V. Chistikov:
Checking Tests for Read-Once Functions over Arbitrary Bases. - Qasim Siddique:
Kerberos Authentication in Wireless Sensor Networks. - Mark Sh. Levin:
Towards Electronic Shopping of Composite Product. - Nikzad Babaii Rizvandi, Albert Y. Zomaya, Ali Javadzadeh Boloori, Javid Taheri:
On Modeling Dependency between MapReduce Configuration Parameters and Total Execution Time. - Vicenç Gómez, Hilbert J. Kappen, Nelly Litvak, Andreas Kaltenbrunner:
A likelihood-based framework for the analysis of discussion threads. - Yuri I. Manin, Matilde Marcolli:
Kolmogorov complexity and the asymptotic bound for error-correcting codes. - Ahmed Maalel, Habib Hadj Mabrouk:
Contribution of Case Based Reasoning (CBR) in the Exploitation of Return of Experience. Application to Accident Scenarii in Railroad Transport. - Osama Attia, Tamer A. ElBatt:
On the Role of Vehicular Mobility in Cooperative Content Caching. - Vladimir Hahanov, Wajeb Gharibi, Eugenia Litvinova, Svetlana Chumachenko:
Verification and Diagnosis Infrastructure of SoC HDL-model. - Chun-Ying Chiang, Liang-Hao Huang, Hong-Gwa Yeh:
Target set selection problem for honeycomb networks. - Beniamino Accattoli, Delia Kesner:
Preservation of Strong Normalisation modulo permutations for the structural lambda-calculus. - Mohammed Fadle Abdulla:
Manual and Fast C Code Optimization. - Animashree Anandkumar, Daniel J. Hsu, Sham M. Kakade:
A Method of Moments for Mixture Models and Hidden Markov Models. - Jacques M. Bahi, Nicolas Friot, Christophe Guyeux:
Lyapunov exponent evaluation of a digital watermarking scheme proven to be secure. - Matthew S. Nokleby, Behnaam Aazhang:
Cooperative Compute-and-Forward. - Joseph Y. Halpern, Willemien Kets:
Ambiguous Language and Differences in Beliefs. - Abdessamad Mouzoune:
Towards an intelligence based conceptual framework for e-maintenance. - Adel Alahmadi, Robert E. L. Aldred, Romar dela Cruz, Patrick Solé, Carsten Thomassen:
The maximum number of minimal codewords in an $[n,k]-$code. - Mohammad Hossein Yassaee, Mohammad Reza Aref, Amin Gohari:
Achievability proof via output statistics of random binning. - Farzin Haddadpour, Mohammad Hossein Yassaee, Amin Gohari, Mohammad Reza Aref:
Coordination via a relay. - Jaydip Sen:
Secure and Energy-Efficient Data Aggregation in Wireless Sensor Networks. - Bo Li, Yijian Pei, Bin Shen, Hao Wu, Min He, Jundong Yang:
Resource Availability-Aware Advance Reservation for Parallel Jobs with Deadlines. - Shu Kong, Donghui Wang:
A Report on Multilinear PCA Plus Multilinear LDA to Deal with Tensorial Data: Visual Classification as An Example. - Marco Quartulli, Igor G. Olaizola:
A review of EO Mining. - Giuseppe Castagna, Mariangiola Dezani-Ciancaglini, Luca Padovani:
On Global Types and Multi-Party Session. - Takayuki Katsuki, Masato Inoue:
Posterior Mean Super-Resolution with a Compound Gaussian Markov Random Field Prior. - Michael W. Mahoney:
Approximate Computation and Implicit Regularization for Very Large-scale Data Analysis. - Ahmed M. Mahran:
A handy systematic method for data hazards detection in an instruction set of a pipelined microprocessor. - Daniel Lokshtanov, N. S. Narayanaswamy, Venkatesh Raman, M. S. Ramanujan, Saket Saurabh:
Faster Parameterized Algorithms using Linear Programming. - Ronald de Haan:
Functional Logic Programming with Generalized Circular Coinduction. - Farzad Didehvar, Mohsen Mansouri, Zahra Taheri:
How much could we cover a set by c.e sets? - Shu Kong, Donghui Wang:
Online Discriminative Dictionary Learning for Image Classification Based on Block-Coordinate Descent Method. - Subhadip Basu, Nibaran Das, Ram Sarkar, Mahantapas Kundu, Mita Nasipuri, Dipak Kumar Basu:
An MLP based Approach for Recognition of Handwritten 'Bangla' Numerals. - Subhadip Basu, Nibaran Das, Ram Sarkar, Mahantapas Kundu, Mita Nasipuri, Dipak Kumar Basu:
Handwritten Bangla Alphabet Recognition using an MLP Based Classifier. - Hatem Ltaief, Rio Yokota:
Data-Driven Execution of Fast Multipole Methods. - José Ignacio Ronda, Antonio Valdés, Guillermo Gallego:
Autocalibration with the Minimum Number of Cameras with Known Pixel Shape. - Ionica Soare, Carmen Antohe:
Modeling the geographical studies with GeoGebra-software. - Luca Bortolussi, Jane Hillston:
Fluid Model Checking. - Georg Böcherer, Fabian Altenbach, Alex Alvarado, Steven Corroy, Rudolf Mathar:
An Efficient Algorithm to Calculate BICM Capacity. - Puripong Suthisopapan, Kenta Kasai, Anupap Meesomboon, Virasit Imtawil:
Near Capacity Approaching for Large MIMO Systems by Non-Binary LDPC Codes with MMSE Detection. - Fernando Brito e Abreu:
The cloud paradigm: Are you tuned for the lyrics? - Yuyang Wang, Roni Khardon, Pavlos Protopapas:
Infinite Shift-invariant Grouped Multi-task Learning for Gaussian Processes. - Ehsan Elhamifar, René Vidal:
Sparse Subspace Clustering: Algorithm, Theory, and Applications. - Loet Leydesdorff, Daniele Rotolo, Ismael Ràfols:
Bibliometric Perspectives on Medical Innovation using the Medical Subject Headings (MeSH) of PubMed. - Stéphane Ross, J. Andrew Bagnell:
Agnostic System Identification for Model-Based Reinforcement Learning. - Dimitrios I. Diochnos, Ioannis Z. Emiris, Elias P. Tsigaridas:
On the asymptotic and practical complexity of solving bivariate systems over the reals. - Ahmed Maalel, Habib Hadj Mabrouk, Lassaâd Mejri, Henda Hajjami Ben Ghézala:
Development of an Ontology to Assist the Modeling of Accident Scenarii "Application on Railroad Transport". - David R. Stoutemyer:
Can the Eureqa symbolic regression program, computer algebra and numerical analysis help each other? - Sandeep Gupta, Chinya V. Ravishankar:
Lower bounds for Arrangement-based Range-Free Localization in Sensor Networks. - Alessandro Borri, Giordano Pola, Maria Domenica Di Benedetto:
A Symbolic Approach to the Design of Nonlinear Networked Control Systems. - Shiteng Chen, Elad Verbin, Wei Yu:
Data Structure Lower Bounds on Random Access to Grammar-Compressed Strings. - Tom Schrijvers, Guido Tack, Pieter Wuille, Horst Samulowitz, Peter J. Stuckey:
Search Combinators. - Abhijeet Bhorkar, Mohammad Naghshvar, Tara Javidi:
Opportunistic Routing with Congestion Diversity in Wireless Ad-hoc Networks. - Dan Ladley, Ian Wilkinson, Louise Young:
The Evolution of Cooperation in Business. - Ashwin Guha, Ambedkar Dukkipati:
An Algorithmic Characterization of Polynomial Functions over Z_{p^n}. - Tomoyuki Yuasa, Susumu Shirayama:
A New Analysis Method for Simulations Using Node Categorizations. - Rahul Jain, Yaoyun Shi, Zhaohui Wei, Shengyu Zhang:
Correlation/Communication complexity of generating bipartite states. - Jaydip Sen:
Secure and Privacy-Preserving Data Aggregation Protocols for Wireless Sensor Networks. - Tichakorn Wongpiromsarn, Emilio Frazzoli:
Control of Probabilistic Systems under Dynamic, Partially Known Environments with Temporal Logic Specifications. - Tichakorn Wongpiromsarn, Alphan Ulusoy, Calin Belta, Emilio Frazzoli, Daniela Rus:
Incremental Temporal Logic Synthesis of Control Policies for Robots Interacting with Dynamic Agents. - Abhik Banerjee, Rachit Agarwal, Vincent Gauthier, Chai Kiat Yeo, Hossam Afifi, Bu-Sung Lee:
A Self-Organization Framework for Wireless Ad Hoc Networks as Small Worlds. - Michelangelo Bucci, Alessandro De Luca, Gabriele Fici:
Enumeration and Structure of Trapezoidal Words. - Luciano Panek, Marcelo Firer:
Codes Satisfying the Chain Condition with a Poset Weights. - Thomas Kesselheim:
Dynamic Packet Scheduling in Wireless Networks. - Olusegun Folorunso, Olufunke R. Vincent, Oluwatimilehin Salako:
An Exploratory Study of Critical Factors Affecting the Efficiency of Sorting Techniques (Shell, Heap and Treap). - Yongqiang Wang, Yutaka Hori, Shinji Hara, Francis J. Doyle III:
The collective oscillation period of inter-coupled Goodwin oscillators. - Ronald M. Caplan:
NLSEmagic: Nonlinear Schrödinger. - Octavio A. González-Estrada, Sundararajan Natarajan, Juan José Ródenas, Hung Nguyen-Xuan, Stéphane P. A. Bordas:
Efficient recovery-based error estimation for the smoothed finite element method for smooth and singular linear elasticity. - David R. Stoutemyer:
Subtotal ordering -- a pedagogically advantageous algorithm for computing total degree reverse lexicographic order. - Tiangao Gou, Syed Ali Jafar:
Optimal Use of Current and Outdated Channel State Information - Degrees of Freedom of the MISO BC with Mixed CSIT. - Thomas David Novlan, Harpreet S. Dhillon, Jeffrey G. Andrews:
Analytical Modeling of Uplink Cellular Networks. - N. Md. Jubair Basha, Salman Abdul Moiz, Mohammed Rizwanullah:
Model based Software Develeopment: Issues & Challenges. - N. Md. Jubair Basha, Salman Abdul Moiz, A. A. Moiz Qyser:
Performance Analysis of HR Portal Domain Components Extraction. - Ilir Çapuni, Péter Gács:
A Turing Machine Resisting Isolated Bursts Of Faults. - David R. Stoutemyer:
Simplifying products of fractional powers of powers. - David R. Stoutemyer:
Series misdemeanors. - Xiang He, Ashish Khisti, Aylin Yener:
MIMO Multiple Access Channel with an Arbitrarily Varying Eavesdropper. - Ernesto Diaz-Aviles, Avaré Stewart, Edward Velasco, Kerstin Denecke, Wolfgang Nejdl:
Epidemic Intelligence for the Crowd, by the Crowd (Full Version). - Negar Kiyavash, Amir Houmansadr, Nikita Borisov:
Multi-Flow Attacks Against Network Flow Watermarks: Analysis and Countermeasures. - Quan Phan, Gerda Janssens, Zoltan Somogyi:
Region-based memory management for Mercury programs. - Anirban Kundu, Chunlin Ji:
Swarm Behavior of Intelligent Cloud. - Yuval Lomnitz, Meir Feder:
Communication over Individual Channels -- a general framework. - Lucian Trifina, Daniela G. Tarniceriu:
Improved Method for Searching of Interleavers Using Garello's Method. - Wei Su, Xiaohu Tang, Alexander Pott:
A Note on a Conjecture for Balanced Elementary Symmetric Boolean Functions. - Fabrizio Dabbene, Mario Sznaier, Roberto Tempo:
Probabilistic Optimal Estimation and Filtering under Uncertainty. - Alexey Radul, Barak A. Pearlmutter, Jeffrey Mark Siskind:
AD in Fortran, Part 1: Design. - Alexey Radul, Barak A. Pearlmutter, Jeffrey Mark Siskind:
AD in Fortran, Part 2: Implementation via Prepreprocessor. - Anuj Gupta, Prasant Gopal, Piyush Bansal, Kannan Srinathan:
A New Look at Composition of Authenticated Byzantine Generals. - Riccardo Murri, Sergio Maffioletti:
Batch-oriented software appliances. - Di Liu, Matthew Lease, Rebecca Kuipers, Randolph G. Bias:
Crowdsourcing for Usability Testing. - Eduard Gabriel Bazavan, Fuxin Li, Cristian Sminchisescu:
Learning Random Kernel Approximations for Object Recognition. - Thomas Genet, Tristan Le Gall, Axel Legay, Valérie Murat:
Tree Regular Model Checking for Lattice-Based Automata. - Romain Giot, Christophe Rosenberger, Bernadette Dorizzi:
Performance Evaluation of Biometric Template Update. - Martin Dietzfelbinger, Michael Rink:
Towards Optimal Degree-distributions for Left-perfect Matchings in Random Bipartite Graphs. - Joan Bruna, Stéphane Mallat:
Invariant Scattering Convolution Networks. - Laming Chen, Yuantao Gu:
Near-oracle Recovery Performance of Greedy Pursuits with Replacement against General Perturbations. - Sheng-Yuan Tu, Ali H. Sayed:
On the Influence of Informed Agents on Learning and Adaptation over Networks. - Finley Freibert, Jon-Lark Kim:
Optimum Distance Profiles of Self-Dual Codes and Formally Self-Dual Codes. - Johnny Karout, Gerhard Kramer, Frank R. Kschischang, Erik Agrell:
A Two-Dimensional Signal Space for Intensity-Modulated Channels. - Guolong Su, Jian Jin, Yuantao Gu, Jian Wang:
Performance Analysis of $l_0$ Norm Constraint Least Mean Square Algorithm. - Andrea Biagioni, Francesca Lo Cicero, Alessandro Lonardo, Pier Stanislao Paolucci, Mersia Perra, Davide Rossetti, Carlo Sidore, Francesco Simula, Laura Tosoratto, Piero Vicini:
The Distributed Network Processor: a novel off-chip and on-chip interconnection network architecture. - Xiaohan Wang, Yuantao Gu, Laming Chen:
Proof of Convergence and Performance Analysis for Sparse Recovery via Zero-point Attracting Projection. - Andrej Bauer, Matija Pretnar:
Programming with Algebraic Effects and Handlers. - Yang You, Laming Chen, Yuantao Gu, Wei Feng, Hui Dai:
Retrieve Sparse Solution of Multiple-Measurement Vectors via Zero-point Attracting Projection. - Amir Houmansadr, Nikita Borisov:
BotMosaic: Collaborative Network Watermark for Botnet Detection. - Olaf Hartig:
SPARQL for a Web of Linked Data: Semantics and Computability (Extended Version). - Morteza Mardani, Gonzalo Mateos, Georgios B. Giannakis:
In-network Sparsity-regularized Rank Minimization: Algorithms and Applications. - Ahmad Abu Al Haija, Mai Vu:
Rate Maximization for Half-Duplex Multiple Access with Cooperating Transmitters. - Nathaniel Johnston:
The Complexity of the Puzzles of Final Fantasy XIII-2. - Anoosheh Heidarzadeh, Amir H. Banihashemi:
Coding Delay Analysis of Chunked Codes over Line Networks. - Sheng Yu, Subhash C. Kak:
A Survey of Prediction Using Social Media. - Qiyan Wang, Xun Gong, Giang T. K. Nguyen, Amir Houmansadr, Nikita Borisov:
CensorSpoofer: Asymmetric Communication with IP Spoofing for Censorship-Resistant Web Browsing. - Robert Lychev, Sharon Goldberg, Michael Schapira:
Network-Destabilizing Attacks. - Win Win Thant, Tin Myat Htwe, Ni Lar Thein:
Statistical Function Tagging and Grammatical Relations of Myanmar Sentences. - M. H. R. Khouzani, Soumya Sen, Ness B. Shroff:
An Analytical Approach to the Adoption of Asymmetric Bidirectional Firewalls: Need for Regulation? - Nicolas Bock, Matt Challacombe:
An Optimized Sparse Approximate Matrix Multiply. - Yaming Wang, Laming Chen, Yuantao Gu:
Quantization Reference Voltage of the Modulated Wideband Converter. - Jingbo Liu, Jian Jin, Yuantao Gu:
Efficient Recovery of Block Sparse Signals via Zero-point Attracting Projection. - Dohy Hong:
D-iteration: Evaluation of a Dynamic Partition Strategy. - Ivan Jureta:
Requirements Engineering Methods: A Classification Framework and Research Challenges. - Nongmaithem Ajith Singh, M. Hemalatha:
High performance computing network for cloud environment using simulators. - Anh Le, Athina Markopoulou:
NC-Audit: Auditing for Network Coding Storage. - (Withdrawn) An input-output Simulation Approach to Control Multi-Affine Systems for Linear Temporal Logic Specifications.
- Yajuan Sun, Hai Lin, Ben M. Chen:
Bisimilarity Enforcing Supervisory Control for Deterministic Specifications. - Hamza Aldabbas, Tariq Falah Alwada'n, Helge Janicke, Ali H. Al-Bayatti:
Data Confidentiality in Mobile Ad hoc Networks. - Akin Cellatoglu, Balasubramanian Karuppanan:
Remote Sensing and Control for Establishing and Maintaining Digital Irrigation. - Marek Cygan, Marcin Pilipczuk, Michal Pilipczuk:
Known algorithms for EDGE CLIQUE COVER are probably optimal. - Said El Kafhali, Abdelali El Bouchti, Mohamed Hanini, Abdelkrim Haqiq:
Performance Analysis for Bandwidth Allocation in IEEE 802.16 Broadband Wireless Networks using BMAP Queueing. - Juho Park, Gilwon Lee, Youngchul Sung, Masahiro Yukawa:
Coordinate Beamforming with Relaxed Zero Forcing: The Sequential Orthogonal Projection Combining Method and Rate Control. - José Antonio Mateo, Valentín Valero, Gregorio Díaz:
BPEL-RF: A formal framework for BPEL orchestrations integrating distributed resources. - Guillaume Kom, Alain Tiedeu, Martin Kom, John Ngundam:
A comparative evaluation of two algorithms of detection of masses on mammograms. - Tapalina Bhattasali, Rituparna Chaki:
AMC Model for Denial of Sleep Attack Detection. - Md. Emdadul Haque, Md. Golam Rashed, M. Hasnat Kabir:
A Comprehensive Study and Performance Comparison of M-ary Modulation Schemes for an Efficient Wireless Mobile Communication System. - Xue Wu:
Calculation of the minimum computational complexity based on information entropy. - Riadh Bouslimi, Jalel Akaichi:
Using Hausdorff Distance for New Medical Image Annotation. - Ramya Menon C., Vinod Pangracious:
Thermal analysis & optimization of a 3 dimensional heterogeneous structure. - Matthew Malloy, Robert D. Nowak:
Near-Optimal Compressive Binary Search. - Mingyu Guo, Evangelos Markakis, Krzysztof R. Apt, Vincent Conitzer:
Undominated Groves Mechanisms. - Antonino Simone, Boris Skoric, Nicola Zannone:
Flow-based reputation: more than just ranking. - Chelsy Sapna Josephus, S. Remya:
Enhancement Techniques for Local Content Preservation and Contrast Improvement in Images. - Niraj Kumar Singh, Mita Pal, Soubhik Chakraborty:
Partition Sort Revisited: Reconfirming the Robustness in Average Case and much more! - Josh C. Bongard, Paul D. H. Hines, Dylan Conger, Peter Hurd, Zhenyu Lu:
Crowdsourcing Predictors of Behavioral Outcomes. - Ohad Gidon, Yair Be'ery:
On Pseudocodewords and Improved Union Bound of Linear Programming Decoding of HDPC Codes. - Nissim Halabi, Guy Even:
Local-Optimality Guaranties for Optimal Decoding Based on Paths. - Saif M. Mohammad, Graeme Hirst:
Distributional Measures of Semantic Distance: A Survey. - Min Li, Osvaldo Simeone, Aylin Yener:
Degraded Broadcast Diamond Channels with Non-Causal State Information at the Source. - Saptarsi Goswami, Samiran Ghosh, Amlan Chakrabarti:
Outlier detection from ETL Execution trace. - G. Meenakshi:
Multi source feedback based performance appraisal system using Fuzzy logic decision support system. - Nitin H. Vaidya:
Matrix Representation of Iterative Approximate Byzantine Consensus in Directed Graphs. - Saif M. Mohammad, Graeme Hirst:
Distributional Measures as Proxies for Semantic Relatedness. - Peter M. van de Ven, Nidhi Hegde, Laurent Massoulié, Theodoros Salonidis:
Optimal control of end-user energy storage. - Mahdy Nabaee, Fabrice Labeau:
Restricted Isometry Property in Quantized Network Coding of Sparse Messages. - Greg Aloupis, Erik D. Demaine, Alan Guo:
Classic Nintendo Games are (NP-)Hard. - Ibrahim Alkore Alshalabi, Khaled M. Elleithy:
Effective M-learning design Strategies for computer science and Engineering courses. - Hannah Arendt, Jorgensen Jost:
Consensus on Moving Neighborhood Model of Peterson Graph. - Fabio R. J. Vieira, José Ferreira de Rezende, Valmir Carneiro Barbosa, Serge Fdida:
Local heuristic for the refinement of multi-path routing in wireless mesh networks. - Parinya Chalermsook, Shiva Kintali, Richard J. Lipton, Danupon Nanongkai:
Graph Pricing Problem on Bounded Treewidth, Bounded Genus and k-partite graphs. - Hung Q. Ngo, Ely Porat, Christopher Ré, Atri Rudra:
Worst-case Optimal Join Algorithms. - Jean Maitem, Rosmina Joy Cabauatan, Lorena Rabago, Bartolome Tanguilig III:
Math world: A game-based 3D Virtual Learning Environment (3D VLE) for second graders. - Naagesh S. Bhat:
Design and modelling of different SRAM's based on CNTFET 32nm technology. - Bryan Ford:
Icebergs in the Clouds: the Other Risks of Cloud Computing. - Sanjoy Das, D. K. Lobiyal:
Analysis of neighbour and isolated node of intersection area based geocasting protocol (IBGP) in VANET. - Zhaowen Wang, Jinjun Wang, Jing Xiao, Kai-Hsiang Lin, Thomas S. Huang:
Substructure and Boundary Modeling for Continuous Action Recognition. - Neal Glew, Leaf Petersen:
Type-Preserving Flow Analysis and Interprocedural Unboxing (Extended Version). - Xuequn Wang, Yanjun Yu:
Classify Participants in Online Communities. - Aneesh Reddy, Sujay Sanghavi, Sanjay Shakkottai:
On the Effect of Channel Fading on Greedy Scheduling. - T. Soni Madhulatha:
Overview of streaming-data algorithms. - T. Soni Madhulatha:
Graph partitioning advance clustering technique. - Sylvain Lespinats, Anke Meyer-Bäse, Michaël Aupetit:
A new supervised non-linear mapping. - Arun Sridharan, Can Emre Koksal:
A Greedy Link Scheduler for Wireless Networks with Fading Channels. - Mark Sh. Levin, Alexander V. Fimin:
Design of modular wireless sensor. - Anatolij Zubow, Robert Sombrutzki, Markus Scheidgen:
Towards MAC/Anycast Diversity in IEEE 802.11n MIMO Networks. - Rachid Haboub, Mohammed Ouzzif:
Secure and reliable routing in mobile adhoc networks. - Matthew Felice Pace:
BSP vs MapReduce. - G. Sudheer, B. V. S. Renuka Devi:
A Hybrid Image Cryptosystem Based On OMFLIP Permutation Cipher. - Chi-Yao Hong, Matthew Caesar, Nick G. Duffield, Jia Wang:
Tiresias: Online Anomaly Detection for Hierarchical Operational Network Data. - Naagesh S. Bhat:
Design and Implementation of IEEE 802.15.4 Mac Protocol on FPGA. - Stephen A. Cook:
Relativized Propositional Calculus. - Emna Ben Slimane, Slaheddine Jarboui, Ammar Bouallègue:
Blind Carrier Phase Recovery for General 2π/M-rotationally Symmetric Constellations. - Nando de Freitas, Alexander J. Smola, Masrour Zoghi:
Regret Bounds for Deterministic Gaussian Process Bandits. - Nidhi, D. K. Lobiyal:
Performance Evaluation of Realistic Vanet Using Traffic Light Scenario. - Ryan A. Rossi, Brian Gallagher, Jennifer Neville, Keith Henderson:
Role-Dynamics: Fast Mining of Large Dynamic Networks. - (Withdrawn) Exact-MSR Codes for Distributed Storage with Low Repair Complexity.
- Gilles Puy, José P. Marques, Rolf Gruetter, Jean-Philippe Thiran, Dimitri Van De Ville, Pierre Vandergheynst, Yves Wiaux:
Spread spectrum magnetic resonance imaging. - Risheng Liu, Zhouchen Lin, Fernando De la Torre, Zhixun Su:
Fixed-Rank Representation for Unsupervised Visual Learning. - Weiyu Xu, Alexandros G. Dimakis, Babak Hassibi:
On the Mixing Time of Markov Chain Monte Carlo for Integer Least-Square Problems. - Andreas Galanis, Daniel Stefankovic, Eric Vigoda:
Inapproximability of the Partition Function for the Antiferromagnetic Ising and Hard-Core Models. - Nidhi Bansal, Amit Awasthi:
Accomplish the Application Area in Cloud Computing. - Jyotirmoy Karjee, H. S. Jamadagni:
Optimal Node Selection using Estimated Data Accuracy Model in Wireless Sensor Networks. - Yongming Li, Qian Wang, Sanjiang Li:
On Quotients of Formal Power Series. - Yongming Li, Lijun Li:
Model-Checking of Linear-Time Properties Based on Possibility Measure. - Pieter Adriaans:
Facticity as the amount of self-descriptive information in a data set. - Supriya Raheja, Reena Dadhich, Smita Rajpal:
An Optimum Time Quantum Using Linguistic Synthesis for Round Robin Scheduling Algorithm. - Winter A. Mason, Aaron Clauset:
Friends FTW! Friendship and competition in Halo: Reach. - Gurpreet Singh, Ajay Kumar Roy, Surekha K. S., S. Pujari:
System on Programable Chip for Performance Estimation of Loom Machine. - Amir Houmansadr, Negar Kiyavash, Nikita Borisov:
Non-blind watermarking of network flows. - Vitthal Jadhav, Amar Buchade:
Modified Quine-McCluskey Method. - Sergey Petrov, José Fernando Fontanari, Leonid I. Perlovsky:
Categories of Emotion names in Web retrieved texts. - M. H. van Emden:
Discovering Algorithms with Matrix Code. - Samar Agnihotri, Sidharth Jaggi, Minghua Chen:
Analog Network Coding in General SNR Regime: Performance of A Greedy Scheme. - Nebojsa Milosavljevic, Sameer Pawar, Salim Y. El Rouayheb, Michael Gastpar, Kannan Ramchandran:
Minimum Cost Multicast with Decentralized Sources. - Maxim Makatchev, Reid G. Simmons, Majd F. Sakr:
A Cross-cultural Corpus of Annotated Verbal and Nonverbal Behaviors in Receptionist Encounters. - Valerio Capraro, Marco Scarsini:
Existence of equilibria in countable games: an algebraic approach. - Sergey Tarasenko:
Modeling multistage decision processes with Reflexive Game Theory. - Anand Muralidhar, P. R. Kumar:
Near-optimal quantization and linear network coding for relay networks. - Helmi Chaouech, Ridha Bouallegue:
Multiuser Detection in Asynchronous Multibeam Communications. - Franck Michel, Johan Montagnat, Tristan Glatard:
Technical support for Life Sciences communities on a production grid infrastructure. - Syed Ali Jafar:
Elements of Cellular Blind Interference Alignment - Aligned Frequency Reuse, Wireless Index Coding and Interference Diversity. - Ashraf Qadir, Jeremiah Neubert, William Semke:
On-Board Visual Tracking with Unmanned Aircraft System (UAS). - Wesam Gabran, Chun-Hao Liu, Przemyslaw Pawelczak, Danijela Cabric:
Primary User Traffic Estimation for Dynamic Spectrum Access. - Brij B. Gupta, Ramesh C. Joshi, Manoj Misra:
Estimating strength of DDoS attack using various regression models. - Brij B. Gupta, Manoj Misra, Ramesh C. Joshi:
An ISP Level Solution to Combat DDoS Attacks using Combined Statistical Based Approach. - Nobert Thomas Pallath, Tessamma Thomas:
Video Object Tracking and Analysis for Computer Assisted Surgery. - Einollah Pira:
An Optimal Algorithm for Conflict-Free Coloring for Tree of Rings. - Adrián Riesco, Juan Rodríguez-Hortalá:
Singular and Plural Functions for Functional Logic Programming. - (Withdrawn) Institutional repository 'eKMAIR': establishing and populating a research repository for the National University "Kyiv Mohyla Academy".
- Ramachandran Rajesh, Shahid Mehraj Shah, Vinod Sharma:
On Secrecy above Secrecy Capacity. - Michela Iezzi, Marco Di Renzo, Fabio Graziosi:
Diversity, Coding, and Multiplexing Trade-Off of Network-Coded Cooperative Wireless Networks. - Sharvari C. Tamane, Ratnadeep R. Deshmukh:
Blind 3D Model Watermarking Based on Multi-Resolution Representation and Fuzzy Logic. - Houda Amraoui, Riadh Bouslimi:
Fault detection system for Arabic language. - Ladislav Svoboda, Jan Novák, Jan Zeman, Lukás Kurilla:
A simple framework for integrated design of complex architectural forms. - Debajit Sensarma, Subhashis Banerjee, Krishnendu Basuli, Saptarshi Naskar, Samar Sen-Sarma:
On an optimization technique using Binary Decision Diagram. - Akin Cellatoglu, Balasubramanian Karuppanan:
Vibrating Cantilever Transducer Incorporated in Dual Diaphragms Structure for Sensing Differential Pneumatic Pressure. - Akin Cellatoglu, Balasubramanian Karuppanan:
Pneumatic Pressure Cell with Twin Diaphragms Embedding Spherical Corrugations in a Dual Diaphragm Structure. - Victor Seal, Arnab Raha, Shovan Maity, Souvik Kumar Mitra, Amitava Mukherjee, Mrinal Kanti Naskar:
A Simple Flood Forecasting Scheme Using Wireless Sensor Networks. - K. Sreedhar, B. Panlal:
Enhancement of Images using Morphological Transformation. - David Hillerkuss, René Schmogrow, Matthias Meyer, Stefan Wolf, Meinert Jordan, Philipp Kleinow, Nicole Lindenmann, Philipp C. Schindler, Argishti Melikyan, Xin Yang, Shalva Ben-Ezra, Bernd Nebendahl, Michael Dreschmann, Joachim Meyer, Francesca Parmigiani, Periklis Petropoulos, Bojan Resan, Andreas Oehler, Kurt Weingarten, Lars Altenhain, Tobias Ellermeyer, Matthias Moeller, Michael Hübner, Jürgen Becker, Christian Koos, Wolfgang Freude, Juerg Leuthold:
Single-laser 32.5 Tbit/s Nyquist WDM transmission. - Michael Robinson:
Knowledge-based antenna pattern extrapolation. - Kitty Meeks, Alexander Scott:
Spanning trees and the complexity of flood-filling games. - Hélio B. Macêdo Filho, Simone Dantas, Raphael C. S. Machado, Celina M. H. de Figueiredo:
Biclique-colouring powers of paths and powers of cycles. - Sheng Yang, Mari Kobayashi, David Gesbert, Xinping Yi:
Degrees of Freedom of Time Correlated MISO Broadcast Channel with Delayed CSIT. - Neeraj Gupta, Rajiv Shekhar, Prem Kumar Kalra:
A Probabilistic Transmission Expansion Planning Methodology based on Roulette Wheel Selection and Social Welfare. - David P. Helmbold, Philip M. Long:
On the Necessity of Irrelevant Variables. - Kai Cai, Hideaki Ishii:
Average Consensus on General Strongly Connected Digraphs. - Massimo Melucci:
When Index Term Probability Violates the Classical Probability Axioms Quantum Probability can be a Necessary Theory for Information Retrieval. - Xixuan Feng, Arun Kumar, Ben Recht, Christopher Ré:
Towards a Unified Architecture for in-RDBMS Analytics. - Qiyan Wang, Nikita Borisov:
Octopus: A Secure and Anonymous DHT Lookup. - Nurzhan Bakibayev, Dan Olteanu, Jakub Zavodny:
FDB: A Query Engine for Factorised Relational Databases. - Thomas Strohmer, Benjamin Friedlander:
Analysis of Sparse MIMO Radar. - Derrick Coetzee, Anand Bhaskar, George C. Necula:
A model and framework for reliable build systems. - Guanghui Song, Yuta Tsujii, Jun Cheng, Yoichiro Watanabe:
Analysis of Finite Field Spreading for Multiple-Access Channel. - Henry Lin, Frans Schalekamp:
On the Complexity of the Minimum Latency Scheduling Problem on the Euclidean Plane. - Nadeem Javaid, Ayesha Bibi, Zahoor Ali Khan, Karim Djouani:
On using Multiple Quality Link Metrics with Destination Sequenced Distance Vector Protocol for Wireless Multi-Hop Networks. - Nadeem Javaid, Ayesha Bibi, Karim Dridi, Zahoor Ali Khan, Safdar Hussain Bouk:
Modeling and Evaluating Enhancements in Expanding Ring Search Algorithm for Wireless Reactive Protocols. - Kadir Akbudak, Enver Kayaaslan, Cevdet Aykanat:
Analyzing and enhancing OSKI for sparse matrix-vector multiplication. - Szilárd András, Árpád Baricz:
New approximations for DQPSK transmission bit error rate. - Francesco Montorsi, Giorgio Matteo Vitetta:
On the Performance Limits of Pilot-Based Estimation of Bandlimited Frequency-Selective Communication Channels. - Tomer Peleg, Michael Elad:
Performance Guarantees of the Thresholding Algorithm for the Co-Sparse Analysis Model. - Inder Jeet Taneja:
Seven Means, Generalized Triangular Discrimination, and Generating Divergence Measures. - Eun Jung Kim, Daniel Gonçalves:
On Exact Algorithms for Permutation CSP. - Yannick Chevalier, Mounira Kourjieh:
Automated Synthesis of a Finite Complexity Ordering for Saturation. - Kenneth Sebesta, John Baillieul:
Animal-Inspired Agile Flight Using Optical Flow Sensing. - Andrzej Kisielewicz, Jakub Kowalski, Marek Szykula:
Fast algorithm finding the shortest reset words. - C. F. Larry Heimann, Alan Nochenson:
Identifying Tipping Points in a Decision-Theoretic Model of Network Security. - Ehud Lehrer, Marco Scarsini:
On the Core of Dynamic Cooperative Games. - Bin Li, Atilla Eryilmaz:
A Fast-CSMA Algorithm for Deadline-Constrained Scheduling over Wireless Fading Channels. - Francesco Montorsi, Fabrizio Pancaldi, Giorgio Matteo Vitetta:
Statistical Characterization and Mitigation of NLOS Errors in UWB Localization Systems. - Jan Egger, Tina Kapur, Thomas Dukatz, Malgorzata Kolodziej, Dzenan Zukic, Bernd Freisleben, Christopher Nimsky:
Square-Cut: A Segmentation Algorithm on the Basis of a Rectangle Shape. - Minji Kim, Thierry Klein, Emina Soljanin, João Barros, Muriel Médard:
Trade-off between cost and goodput in wireless. - Giuseppe Cocco, Deniz Gündüz, Christian Ibars:
Streaming Transmitter over Block-Fading Channels with Delay Constraint. - Janusz A. Brzozowski, David Liu:
Syntactic Complexity of Finite/Cofinite, Definite, and Reverse Definite Languages. - Medha Atre, Vineet Chaoji, Mohammed J. Zaki:
BitPath -- Label Order Constrained Reachability Queries over Large Graphs. - Joshua A. Grochow, Korben Rusek:
Report on "Mathematical Aspects of P vs. NP and its Variants.". - Francesco Montorsi, Fabrizio Pancaldi, Giorgio Matteo Vitetta:
Statistical Characterization and Mitigation of NLOS Bias in UWB Localization Systems. - Jean-Guillaume Dumas, Dominique Duval, Laurent Fousse, Jean-Claude Reynaud:
Decorated proofs for computational effects: Exceptions. - Anastasios Kyrillidis, Volkan Cevher:
Combinatorial Selection and Least Absolute Shrinkage via the CLASH Algorithm. - Pablo Serrano, Paul Patras, Andrea Mannocci, Vincenzo Mancuso, Albert Banchs:
Control Theoretic Optimization of 802.11 WLANs: Implementation and Experimental Evaluation. - David Bindel, Jon M. Kleinberg, Sigal Oren:
How Bad is Forming Your Own Opinion? - Surjeet Kumar Yadav, Brijesh Bharadwaj, Saurabh Pal:
Mining Education Data to Predict Student's Retention: A comparative Study. - Yoshua Bengio:
Evolving Culture vs Local Minima. - Jason L. Williams:
Hybrid Poisson and multi-Bernoulli filters. - Jason L. Williams:
Alternative multi-Bernoulli filters (extended version). - Neeraj K. Chasta:
High Speed, Low Power Current Comparators with Hysteresis. - Marin Bertier, Marko Obrovac, Cédric Tedeschi:
A Protocol for the Atomic Capture of Multiple Molecules at Large Scale. - Mehrez Boulares, Mohamed Jemni:
Toward an example-based machine translation from written text to ASL using virtual agent animation. - Nina Narodytska, Toby Walsh, Lirong Xia:
Combining Voting Rules Together. - David Garcia Sanchez, Bruno Lacarrière, Marjorie Musy, Bernard Bourges:
Application of sensitivity analysis in building energy simulations: combining first and second order elementary effects Methods. - Erhan Turan, Ali Ecder:
Set Reduction In Nonlinear Equations. - Pouya Fatehi, Seyyed Mohsen Hashemi:
An Agile Method for E-Service Composition. - Sébastien Moretti, Riccardo Murri, Sergio Maffioletti, Arnold Kuzniar, Briséïs Castella, Nicolas Salamin, Marc Robinson-Rechavi, Heinz Stockinger:
gcodeml: A Grid-enabled Tool for Detecting Positive Selection in Biological Evolution. - Otman Abdoun, Jaafar Abouchabaka:
A Comparative Study of Adaptive Crossover Operators for Genetic Algorithms to Resolve the Traveling Salesman Problem. - Ahmet A. Husainov, Ekaterina S. Kudryashova:
Generalized Asynchronous Systems. - Otman Abdoun, Jaafar Abouchabaka, Chakir Tajani:
Analyzing the Performance of Mutation Operators to Solve the Travelling Salesman Problem. - Sadaqat ur Rehman, Muhammad Bilal, Basharat Ahmad, Khawaja Muhammad Yahya, Anees Ullah, Obaid Ur Rehman:
Comparison Based Analysis of Different Cryptographic and Encryption Techniques Using Message Authentication Code (MAC) in Wireless Sensor Networks (WSN). - Maria-Luisa Sosas, Miguel-Octavio Arias:
Integrated three-dimensional reconstruction using reflectance fields. - G. David Forney Jr., Heide Gluesing-Luerssen:
Codes on Graphs: Observability, Controllability and Local Reducibility. - Farzad Didehvar:
A Semantic Without Syntax 1. - Vijayvaradharaj T. Muralidharan, B. Sundar Rajan:
Distributed Space Time Coding for Wireless Two-way Relaying. - Eduardo Arvelo, Nuno C. Martins:
A Receding Horizon Strategy for Systems with Interval-Wise Energy Constraints. - Cristiano Tapparello, Osvaldo Simeone, Michele Rossi:
Dynamic Compression-Transmission for Energy-Harvesting Multihop Networks with Correlated Sources. - Stephan Kreutzer:
On the Parameterized Intractability of Monadic Second-Order Logic. - Shampa Sengupta, Asit Kumar Das:
Single Reduct Generation Based on Relative Indiscernibility of Rough Set Theory. - Ashish Mani, C. Patvardhan:
A Fast fixed-point Quantum Search Algorithm by using Disentanglement and Measurement. - Nasser Eddine Mouhoub, Abdelhamid Benhocine:
An efficient algorithm for generating AoA networks. - Srinivas Yerramalli, Rahul Jain, Urbashi Mitra:
A Game Theoretic Model for the Gaussian Broadcast Channel. - Mohammad Hossein Yassaee, Amin Gohari, Mohammad Reza Aref:
Channel simulation via interactive communications. - Anton Loss:
Generalisation of language and knowledge models for corpus analysis. - Andrea Masiero, Angelo Cenedese:
Reconstruction error in a motion capture system. - Bijan Paul, Md. Ibrahim, Md. Abu Naser Bikas:
Performance Evaluation of AODV & DSR with Varying Pause Time & Speed Time Over TCP & CBR Connections in VANET. - Bo Tan, John S. Thompson:
The Parameters For Powerline Channel Modeling. - Maise Dantas da Silva, Fábio Protti, Uéverton dos Santos Souza:
Revisiting the Complexity of And/Or Graph Solution. - Sarah Cannon, Mashhood Ishaque, Csaba D. Tóth:
Conflict-free graph orientations with parity constraints. - Ali ParandehGheibi, Asuman E. Ozdaglar, Muriel Médard:
QoE-aware Media Streaming in Technology and Cost Heterogeneous Networks. - Ziyi Su, Frédérique Biennier:
Originator usage control with business process slicing. - Vishnu Namboodiri, B. Sundar Rajan:
Physical Layer Network Coding for Two-Way Relaying with QAM and Latin Squares. - Sushil Kumar Paul, Mohammad Shorif Uddin, Saïda Bouakaz:
Extraction of Facial Feature Points Using Cumulative Histogram. - Roberto Demontis:
What is the least number of moves needed to solve the 4-peg Towers of Hanoi problem? - Jagadeesh Harshan, Emanuele Viterbo, Jean-Claude Belfiore:
Practical Encoders and Decoders for Euclidean Codes from Barnes-Wall Lattices. - Masashi Kiyomi, Yoshio Okamoto, Toshiki Saitoh:
Efficient Enumeration of the Directed Binary Perfect Phylogenies from Incomplete Data. - Andrés Altieri, Leonardo Rey Vega, Pablo Piantanida, Cecilia G. Galarza:
The Overall Balance Between Cooperation and Interference for a Class of Wireless Networks. - Zhong Zheng, Lu Wei, Jyri Hämäläinen, Olav Tirkkonen:
Approximation to Distribution of Product of Random Variables Using Orthogonal Polynomials for Lognormal Density. - Yaroslav D. Sergeyev, Alfredo Garro:
Observability of Turing Machines: a Refinement of the Theory of Computation. - Constantin Jucovschi:
Cost-Effective Integration of MKM Semantic Services into Editing Environments. - Martino Borello:
The Automorphism Group of an Extremal [72,36,16] Code does not contain elements of order 6. - Tomasz Sobieszek:
A note on Shannon entropy. - Hassen Mohammed Alsafi, Wafaa Mustafa Abduallah, Al-Sakib Khan Pathan:
IDPS: An Integrated Intrusion Handling Model for Cloud. - (Withdrawn) A Detailed Survey on Various Aspects of SQL Injection: Vulnerabilities, Innovative Attacks, and Remedies.
- Adam Paszkiewicz, Tomasz Sobieszek:
On quantum information. - Mourad Amad, Ahmed Meddahi, Djamil Aïssani:
Peer to Peer Networks Management Survey. - Taimoor Abbas, Fredrik Tufvesson, Johan Karedal:
Measurement based Shadow Fading Model for Vehicle-to-Vehicle Network Simulations. - Bruce Edmonds, Carlos Gershenson:
Learning, Social Intelligence and the Turing Test - why an "out-of-the-box" Turing Machine will not pass the Turing Test. - Mikhail V. Berlinkov:
Synchronizing Automata on Quasi Eulerian Digraph. - Luis A. A. Meira, Vinícius R. Máximo, Álvaro Luiz Fazenda, Arlindo F. da Conceição:
A New Approach to Count Pattern Motifs Using Combinatorial Techniches. - Bryan Ford:
Plugging Side-Channel Leaks with Timing Information Flow Control. - K. S. Kuppusamy, Senthilraja R., Gnanasekaran Aghila:
A Model for Remote Access and Protection of Smartphones using Short Message Service. - Frédéric Prost:
On the Impact of Information Technologies on Society: an Historical Perspective through the Game of Chess. - Maxim Vashkevich, Alexander A. Petrovsky:
A low multiplicative complexity fast recursive DCT-2 algorithm. - Thomas A. Courtade, Richard D. Wesel:
Coded Cooperative Data Exchange in Multihop Networks. - Davide Proserpio, Sharon Goldberg, Frank McSherry:
A Workflow for Differentially-Private Graph Synthesis. - Kaizhu Huang, Rong Jin, Zenglin Xu, Cheng-Lin Liu:
Robust Metric Learning by Smooth Optimization. - Amrudin Agovic, Arindam Banerjee:
Gaussian Process Topic Models. - Amr Ahmed, Eric P. Xing:
Timeline: A Dynamic Hierarchical Dirichlet Process Model for Recovering Birth/Death and Evolution of Topics in Text Stream. - Nimar S. Arora, Rodrigo de Salvo Braz, Erik B. Sudderth, Stuart Russell:
Gibbs Sampling in Open-Universe Stochastic Languages. - Raouia Ayachi, Nahla Ben Amor, Salem Benferhat, Rolf Haenni:
Compiling Possibilistic Networks: Alternative Approaches to Possibilistic Inference. - Kim Bauters, Steven Schockaert, Martine De Cock, Dirk Vermeir:
Possibilistic Answer Set Programming Revisited. - Debarun Bhattacharjya, Ross D. Shachter:
Three new sensitivity analysis methods for influence diagrams. - Charles Blundell, Yee Whye Teh, Katherine A. Heller:
Bayesian Rose Trees. - Matthias Bröcheler, Lilyana Mihalkova, Lise Getoor:
Probabilistic Similarity Logic. - Alan Carlin, Nathan Schurr, Janusz Marecki:
ALARMS: Alerting and Reasoning Management System for Next Generation Aircraft Hazards. - Kamalika Chaudhuri, Yoav Freund, Daniel J. Hsu:
An Online Learning-based Framework for Tracking. - Yutian Chen, Max Welling, Alexander J. Smola:
Super-Samples from Kernel Herding. - Jaesik Choi, Eyal Amir, David J. Hill:
Lifted Inference for Relational Continuous Models. - Gabriel Corona, François Charpillet:
Distribution over Beliefs for Memory Bounded Dec-POMDP Planning. - Povilas Daniusis, Dominik Janzing, Joris M. Mooij, Jakob Zscheischler, Bastian Steudel, Kun Zhang, Bernhard Schölkopf:
Inferring deterministic causal relations. - Gal Elidan:
Inference-less Density Estimation using Copula Bayesian Networks. - Tom Erez, William D. Smart:
A Scalable Method for Solving High-Dimensional Continuous POMDPs Using Local Approximation. - Stefano Ermon, Jon Conrad, Carla P. Gomes, Bart Selman:
Playing games against nature: optimal policies for renewable resource allocation. - Xi Alice Gao, Avi Pfeffer:
Learning Game Representations from Data Using Rationality Constraints. - Robert Glaubius, Terry Tidwell, Christopher D. Gill, William D. Smart:
Real-Time Scheduling via Reinforcement Learning. - Vibhav Gogate, Pedro M. Domingos:
Formula-Based Probabilistic Inference. - Mithun Das Gupta, Thomas S. Huang:
Regularized Maximum Likelihood for Intrinsic Dimension Estimation. - Matthew J. Johnson, Alan S. Willsky:
The Hierarchical Dirichlet Process Hidden Semi-Markov Model. - Berk Kapicioglu, Robert E. Schapire, Martin Wikelski, Tamara Broderick:
Combining Spatial and Telemetric Features for Learning Animal Movement Models. - Kalev Kask, Rina Dechter, Andrew Gelfand:
BEEM : Bucket Elimination with External Memory. - Kevin T. Kelly, Conor Mayo-Wilson:
Causal Conclusions that Flip Repeatedly and Their Justification. - Arto Klami, Seppo Virtanen, Samuel Kaski:
Bayesian exponential family projections for coupled data sources. - Akshat Kumar, Shlomo Zilberstein:
Anytime Planning for Decentralized POMDPs using Expectation Maximization. - Ping Li:
Robust LogitBoost and Adaptive Base Class (ABC) LogitBoost. - Ping Li, Michael W. Mahoney, Yiyuan She:
Approximating Higher-Order Distances Using Random Projections. - Yijing Li, Prakash P. Shenoy:
Solving Hybrid Influence Diagrams with Deterministic Variables. - Qiang Liu, Alexander Ihler:
Negative Tree Reweighted Belief Propagation. - Qi Mao, Ivor W. Tsang:
Parameter-Free Spectral Kernel Learning. - Marina Meila, Harr Chen:
Dirichlet Process Mixtures of Generalized Mallows Models. - Tetsuro Morimura, Masashi Sugiyama, Hisashi Kashima, Hirotaka Hachiya, Toshiyuki Tanaka:
Parametric Return Density Estimation for Reinforcement Learning. - Enrique Munoz de Cote, Archie C. Chapman, Adam M. Sykulski, Nicholas R. Jennings:
Automated Planning in Repeated Adversarial Games. - Mathias Niepert:
A Delayed Column Generation Strategy for Exact k-Bounded MAP Inference in Markov Logic Networks. - Farheen Omar, Mathieu Sinn, Jakub Truszkowski, Pascal Poupart, James Yungjen Tung, Allen Caine:
Comparative Analysis of Probabilistic Models for Activity Recognition with an Instrumented Walker. - Sebastian Ordyniak, Stefan Szeider:
Algorithms and Complexity Results for Exact Bayesian Structure Learning. - Thorsten J. Ottosen, Finn Verner Jensen:
The Cost of Troubleshooting Cost Clusters with Inside Information. - Miika Pihlaja, Michael Gutmann, Aapo Hyvärinen:
A Family of Computationally Efficient and Simple Estimators for Unnormalized Statistical Models. - Yuan (Alan) Qi, Ahmed H. Abdel-Gawad, Thomas P. Minka:
Sparse-posterior Gaussian Processes for general likelihoods. - Guilin Qi, Jianfeng Du, Weiru Liu, David A. Bell:
Merging Knowledge Bases in Possibilistic Logic by Lexicographic Aggregation. - Erik Quaeghebeur:
Characterizing the Set of Coherent Lower Previsions with a Finite Number of Constraints or Vertices. - Michael Ramati, Yuval Shahar:
Irregular-Time Bayesian Networks. - Sebastian Riedel, David A. Smith, Andrew McCallum:
Inference by Minimizing Size, Divergence, or their Sum. - Chris Russell, Lubor Ladicky, Pushmeet Kohli, Philip H. S. Torr:
Exact and Approximate Inference in Associative Hierarchical Networks using Graph Cuts. - Ross D. Shachter, Debarun Bhattacharjya:
Dynamic programming in in uence diagrams with decision circuits. - Daniel Sheldon, Bistra Dilkina, Adam N. Elmachtoub, Ryan Finseth, Ashish Sabharwal, Jon Conrad, Carla P. Gomes, David B. Shmoys, William Allen, Ole Amundsen, William Vaughan:
Maximizing the Spread of Cascades Using Network Design. - Aleksandr Simma, Michael I. Jordan:
Modeling Events with Cascades of Poisson Processes. - Ajit Paul Singh, Geoffrey J. Gordon:
A Bayesian Matrix Factorization Model for Relational Data. - Jonathan Sorg, Satinder Singh, Richard L. Lewis:
Variance-Based Rewards for Approximate Bayesian Reinforcement Learning. - Gerald Tesauro, V. T. Rajan, Richard B. Segal:
Bayesian Inference in Monte-Carlo Tree Search. - Jin Tian, Ru He, Lavanya Ram:
Bayesian Model Averaging Using the k-best Bayesian Network Structures. - Maomi Ueno:
Learning networks determined by the ratio of prior and data. - Michal Valko, Branislav Kveton, Ling Huang, Daniel Ting:
Online Semi-Supervised Learning on Quantized Graphs. - Bart van den Broek, Wim Wiegerinck, Hilbert J. Kappen:
Risk Sensitive Path Integral Control. - Mark Voortman, Denver Dash, Marek J. Druzdzel:
Learning Why Things Change: The Difference-Based Causality Learner. - Tomás Werner:
Primal View on Belief Propagation. - Jens Witkowski:
Truthful Feedback for Sanctioning Reputation Mechanisms. - Feng Wu, Shlomo Zilberstein, Xiaoping Chen:
Rollout Sampling Policy Iteration for Decentralized POMDPs. - Yan Yan, Rómer Rosales, Glenn Fung, Jennifer G. Dy:
Modeling Multiple Annotator Expertise in the Semi-Supervised Learning Scenario. - Shuang-Hong Yang, Jiang Bian, Hongyuan Zha:
Hybrid Generative/Discriminative Learning for Automatic Image Annotation. - Changhe Yuan, XiaoJian Wu, Eric A. Hansen:
Solving Multistage Influence Diagrams using Branch-and-Bound Search. - Bai Zhang, Yue Joseph Wang:
Learning Structural Changes of Gaussian Graphical Models in Controlled Experiments. - Kun Zhang, Aapo Hyvärinen:
Source Separation and Higher-Order Causal Analysis of MEG and EEG. - Kun Zhang, Bernhard Schölkopf, Dominik Janzing:
Invariant Gaussian Process Latent Variable Models and Application in Causal Discovery. - Yu Zhang, Bin Cao, Dit-Yan Yeung:
Multi-Domain Collaborative Filtering. - Yu Zhang, Dit-Yan Yeung:
A Convex Formulation for Learning Task Relationships in Multi-Task Learning. - Qian Zhu, Branislav Kveton, Lily B. Mummert, Padmanabhan Pillai:
Automatic Tuning of Interactive Perception Applications. - Emma Brunskill, Stuart Russell:
RAPID: A Reachable Anytime Planner for Imprecisely-sensed Domains. - Loïc Colson, Vincent Demange:
Investigations on a Pedagogical Calculus of Constructions. - Ingmar Steiner, Slim Ouni:
Artimate: an articulatory animation framework for audiovisual speech synthesis. - Swan Dubois, Sébastien Tixeuil, Nini Zhu:
The Byzantine Brides Problem. - Takuro Fukunaga, R. Ravi:
Iterative rounding approximation algorithms for degree-bounded node-connectivity network design. - Tarek El-Shishtawy, Fatma El-Ghannam:
An Accurate Arabic Root-Based Lemmatizer for Information Retrieval Purposes. - Mohsen Pourvali, Mohammad Saniee Abadeh:
Automated Text Summarization Base on Lexicales Chain and graph Using of WordNet and Wikipedia Knowledge Base. - Eya Ben Ahmed, Ahlem Nabli, Faïez Gargouri:
Building MultiView Analyst Profile From Multidimensional Query Logs: From Consensual to Conflicting Preferences. - Peiji Chen, Wenjing Ma, Srinath Mandalapu, Chandrashekhar Nagarajan, Jayavel Shanmugasundaram, Sergei Vassilvitskii, Erik Vee, Manfai Yu, Jason Y. Zien:
Ad Serving Using a Compact Allocation Plan. - Niraj Shakhakarmi:
Secured Distributed Cognitive MAC. - Dhadesugoor R. Vaman, Niraj Shakhakarmi:
Integrated Key based Strict Friendliness Verification of Neighbors in MANET. - Niraj Shakhakarmi, Dhadesugoor R. Vaman:
Distributed Position Localization and Tracking (DPLT) of Malicious Nodes in Cluster Based Mobile Ad hoc Networks (MANET). - Erik D. Demaine, Martin L. Demaine, Yair N. Minsky, Joseph S. B. Mitchell, Ronald L. Rivest, Mihai Patrascu:
Picture-Hanging Puzzles. - Xiaoyong Liu, Hui Fu:
Literature-based knowledge discovery: the state of the art. - K. S. Kuppusamy, Gnanasekaran Aghila:
Morpes: A Model for Personalized Rendering of Web Content on Mobile Devices. - Vijay Bharadwaj, Peiji Chen, Wenjing Ma, Chandrashekhar Nagarajan, John A. Tomlin, Sergei Vassilvitskii, Erik Vee, Jian Yang:
SHALE: An Efficient Algorithm for Allocation of Guaranteed Display Advertising. - Keyur Parmar, Devesh Jinwala:
A Novel Approach for Verifiable Secret Sharing by using a One Way Hash Function. - Pawan Bhaladhare, Devesh Jinwala:
A Sensitive Attribute based Clustering Method for kanonymization. - Zhe Wang, Kai Hu, Baolin Yin:
An Improved Traffic Matrix Decomposition Method with Frequency Domain Regularization. - Annabell Berger, Matthias Müller-Hannemann:
How to Attack the NP-complete Dag Realization Problem in Practice. - Shraddha Dulera, Devesh Jinwala, Aroop Dasgupta:
Experimenting with the Novel Approaches in Text Steganography. - Sanjeev Patel, P. K. Gupta, Arjun Garg, Prateek Mehrotra, Manish Chhabra:
Comparative Analysis of Congestion Control Algorithms Using ns-2. - Amos Lapidoth, Nathan Levy, Shlomo Shamai, Michèle A. Wigger:
Cognitive Wyner Networks with Clustered Decoding. - Mohammadi Akheela Khanum, Shameem Fatima, Mousmi Ajay Chaurasia:
Arabic Interface Analysis Based on Cultural Markers. - Daniil Musatov:
Space-Bounded Kolmogorov Extractors. - Mohammad Alshehri, Hamza Aldabbas, James Sawle, Mai Abu Baqar:
Adopting E-commerce to User's Needs. - Marios Karagiannis, Ioannis Chatzigiannakis, José D. P. Rolim:
Multilateration: Methods For Clustering Intersection Points For Wireless Sensor Networks Localization With Distance Estimation Error. - Artur Jez:
Recompression: a simple and powerful technique for word equations. - François Hantry, Lakhdar Saïs, Mohand-Said Hacid:
On the Complexity of Computing Minimal Unsatisfiable LTL formulas. - Raja Mahmou, Khalid Faitah:
Designing of RF Single Balanced Mixer with a 65nm CMOS Technology Dedicated to Low Power Consumption Wireless Applications. - Antoine Miné:
Static Analysis of Run-Time Errors in Embedded Real-Time Parallel C Programs. - Anthony Perez:
On the kernelization of ranking r-CSP in tournaments. - Harshavardhan Kayarkar:
A Survey on Security Issues in Ad Hoc Routing Protocols and their Mitigation Techniques. - Roberto Bruttomesso, Silvio Ghilardi, Silvio Ranise:
From Strong Amalgamability to Modularity of Quantifier-Free Interpolation. - Carlo Blundo, Stelvio Cimato:
Constrained Role Mining. - Dane Henshall, Jeffrey O. Shallit:
Automatic Theorem-Proving in Combinatorics on Words. - Naveen Ashish, Antarip Biswas, Sumit Das, Saurav Nag, Rajiv Pratap:
The Abzooba Smart Health Informatics Platform (SHIP) TM - From Patient Experiences to Big Data to Insights. - Shahram Babaie, Seyed Sajad Pirahesh:
Hole Detection for Increasing Coverage in Wireless Sensor Network Using Triangular Structure. - Eduardo López-Sandoval, Alexandre Mello:
Spline Spectral Method. - Rahul Prabhu, Meera Sitharam, Aysegul Ozkan, Ruijin Wu:
Atlasing of Assembly Landscapes using Distance Geometry and Graph Rigidity. - Isolde Adler, Mark Weyer:
Tree-width for first order formulae. - Gitta Kutyniok:
Compressed Sensing: Theory and Applications. - Surjeet Kumar Yadav, Saurabh Pal:
Data Mining: A Prediction for Performance Improvement of Engineering Students using Classification. - Suneetha Chittineni, Raveendra Babu Bhogapathi:
A Study on the Behavior of a Neural Network for Grouping the Data. - Anshuman Sharma:
Handwritten digit Recognition using Support Vector Machine. - Anastasios Kyrillidis, Volkan Cevher:
Matrix ALPS: Accelerated Low Rank and Sparse Matrix Reconstruction. - Stig Fr. Mjølsnes, Joe-Kai Tsay:
Computational Security Analysis of the UMTS and LTE Authentication and Key Agreement Protocols. - Giuseppe D'Acquisto, Maurizio Naldi, Giuseppe F. Italiano:
Personal data disclosure and data breaches: the customer's viewpoint. - Bo Tan, John S. Thompson:
Powerline Communications Channel Modelling Methodology Based on Statistical Features. - Igor S. Sergeev:
A note on the fast power series' exponential. - Bogdan Alexandru Caprarescu, Dana Petcu:
Decentralized Probabilistic Auto-Scaling for Heterogeneous Systems. - (Withdrawn) An Open Question about Dependency of Life Time of Hardware Components and Dynamic Voltage Scaling.
- Muhammad Anshari, Mohammad Nabil Almunawar:
Building Healthcare - Patient Relationship with CRM 2.0: Lesson Learnt from Prita Mulyasari's Case. - Aditya Ahuja, K. Venkateswarlu, P. Venkata Krishna:
Stochastic Characteristics and Simulation of the Random Waypoint Mobility Model. - Mohammad Nabil Almunawar, Muhammad Anshari:
Health Information Systems (HIS): Concept and Technology. - Hussein Saad, Amr Mohamed, Tamer A. ElBatt:
Distributed Cooperative Q-learning for Power Allocation in Cognitive Femtocell Networks. - Matteo Camilli:
Preserving Co-Location Privacy in Geo-Social Networks. - M. P. Sivaram Kumar, S. Rajasekaran:
Path Planning Algorithm for Extinguishing Forest Fires. - Eyjolfur Ingi Asgeirsson, Magnús M. Halldórsson, Pradipta Mitra:
A Fully Distributed Algorithm for Throughput Performance in Wireless Networks. - Jörg Rothe, Lena Schend:
Control Complexity in Bucklin, Fallback, and Plurality Voting: An Experimental Approach. - Michael Menzel, Rajiv Ranjan:
CloudGenius: Decision Support for Web Server Cloud Migration. - Lei Yang, Yalin Evren Sagduyu, Jason Hongjun Li, Junshan Zhang:
Adaptive Network Coding for Scheduling Real-time Traffic with Hard Deadlines. - Ricardo Fabbri, Odemir Martinez Bruno, Luciano da Fontoura Costa:
Scilab and SIP for Image Processing. - Raghuram Ramanujan, Ashish Sabharwal, Bart Selman:
Understanding Sampling Style Adversarial Search Methods. - Eric Polizzi:
A High-Performance Numerical Library for Solving Eigenvalue Problems: FEAST Solver v2.0 User's Guide. - Niraj Shakhakarmi:
Quantitative Multiscale Analysis using Different Wavelets in 1D Voice Signal and 2D Image. - Beomkyu Shin, Seokbeom Hong, Hosung Park, Jong-Seon No, Dong-Joon Shin:
New decoding scheme for LDPC codes based on simple product code structure. - Amit Chakrabarti, Lisa Fleischer, Christophe Weibel:
When the Cut Condition is Enough: A Complete Characterization for Multiflow Problems in Series-Parallel Networks. - Matvey Arye, Erik Nordström, Robert Kiefer, Jennifer Rexford, Michael J. Freedman:
A Provably-Correct Protocol for Seamless Communication with Mobile, Multi-Homed Hosts. - Shah Mahmood, Yvo Desmedt:
Your Facebook Deactivated Friend or a Cloaked Spy (Extended Abstract). - Nikzad Babaii Rizvandi, Young Choon Lee, Albert Y. Zomaya:
On Modeling CPU Utilization of MapReduce Applications. - Petteri Kaski, Mikko Koivisto, Jesper Nederlof:
Homomorphic Hashing for Sparse Coefficient Extraction. - Mariette Annergren, Anders Hansson, Bo Wahlberg:
An ADMM Algorithm for Solving l_1 Regularized MPC. - Dimitrios Poulakis, Robert Rolland:
A Digital Signature Scheme for Long-Term Security. - Benjamin Doerr, Carola Winzen:
Reducing the Arity in Unbiased Black-Box Complexity. - Martin Dietzfelbinger, Hendrik Peilke, Michael Rink:
A More Reliable Greedy Heuristic for Maximum Matchings in Sparse Random Graphs. - Eric L. Seidel:
Metadata Management in Scientific Computing. - Ahmed H. M. Soliman, E. M. Saad, M. El-Bably, Hesham M. A. M. Keshk:
Designing a WISHBONE Protocol Network Adapter for an Asynchronous Network-on-Chip. - Sait Tunç, Mehmet A. Donmez, Suleyman Serdar Kozat:
Growth Optimal Portfolios in Discrete-time Markets Under Transaction Costs. - Marios Karagiannis, Laetitia Dallinge, José D. P. Rolim:
Irida: A real-time Wireless Sensor Network visualization feedback protocol. - Saptarsi Goswami, Amlan Chakrabarti:
Quartile Clustering: A quartile based technique for Generating Meaningful Clusters. - Nargiz Kalantarova, Mehmet A. Donmez, Suleyman Serdar Kozat:
A Novel Robust Approach to Least Squares Problems with Bounded Data Uncertainties. - Saptarsi Goswami, Samiran Ghosh, Amlan Chakrabarti:
Outlier Detection Techniques for SQL and ETL Tuning. - Nargiz Kalantarova, Kyeongyeon Kim, Suleyman Serdar Kozat, Andrew C. Singer:
Linear MMSE-Optimal Turbo Equalization Using Context Trees. - Alaa Mohamed Riad, Hamdy K. Elmonier, Samaa M. Shohieb, A. S. Asem:
SignsWorld; Deeping Into the Silence World and Hearing Its Signs (State of the Art). - Robert J. W. Tijssen, Ludo Waltman, Nees Jan van Eck:
Research collaboration and the expanding science grid: Measuring globalization processes worldwide. - Amir Daneshgar, Ramin Javadi, Basir Shariat Razavi:
Clustering Using Isoperimetric Number of Trees. - Kyeongyeon Kim, Jun Won Choi, Suleyman Serdar Kozat, Andrew C. Singer:
Low Complexity Turbo-Equalization: A Clustering Approach. - Mehmet A. Donmez, Sait Tunç, Suleyman Serdar Kozat:
A New Analysis of an Adaptive Convex Mixture: A Deterministic Approach. - Marco Guerini, Alberto Pepe, Bruno Lepri:
Do Linguistic Style and Readability of Scientific Abstracts affect their Virality? - Mahdi Abdelkafi, Lotfi Bouzguenda, Faïez Gargouri:
DiscopFlow: A new Tool for Discovering Organizational Structures and Interaction Protocols in WorkFlow. - Muhammad Asiful Islam, C. R. Ramakrishnan, I. V. Ramakrishnan:
Parameter Learning in PRISM Programs with Continuous Random Variables. - Muhammad Anshari, Mohammad Nabil Almunawar, Patrick Kim Cheng Low:
CRM 2.0 within E-Health Systems: Towards Achieving Health Literacy & Customer Satisfaction. - Yeow-Khiang Chia, Rajiv Soundararajan, Tsachy Weissman:
Estimation with a helper who knows the interference. - A. H. Azni, Rabiah Ahmad, Zul Azri Muhamad Noh, Abd. Samad Hasan Basari, Burairah Hussin:
Correlated Node Behavior Model based on Semi Markov Process for MANETS. - Xiaohui Bei, Wei Chen, Jialin Zhang:
Distributed Consensus Resilient to Both Crash Failures and Strategic Manipulations. - Abdelali El Bouchti, Abdelkrim Haqiq, Said El Kafhali:
Analysis of Quality of Service Performances of Connection Admission Control Mechanisms in OFDMA IEEE 802.16 Network using BMAP Queuing. - Marc Peter Deisenroth, Ryan D. Turner, Marco F. Huber, Uwe D. Hanebeck, Carl Edward Rasmussen:
Robust Filtering and Smoothing with Gaussian Processes. - (Withdrawn) Onboard Flight Control of a Small Quadrotor Using Single Strapdown Optical Flow Sensor.
- (Withdrawn) Real-time Image-based 6-DOF Localization in Large-Scale Environments.
- Neri Merhav:
On optimum parameter modulation-estimation from a large deviations perspective. - Marilyne Rosselle:
Teacher Module in an Assistance Tool - Adaptating a device to a teaching context and and teacher's preferences. - Hamidreza Barati, Nasrin Jaberi:
Thesis Report: Resource Utilization Provisioning in MapReduce. - Wojciech Mazurczyk:
VoIP Steganography and Its Detection - A Survey. - (Withdrawn) Analyzing closed frequent itemsets with convex polytopes.
- Hassan Tavakoli, Mahmoud Ahmadian-Attari, M. Reza Peyghami:
Optimal Rate and Maximum Erasure Probability LDPC Codes in Binary Erasure Channel. - Guillaume Desjardins, Aaron C. Courville, Yoshua Bengio:
On Training Deep Boltzmann Machines. - Aida Boussaada Zaier, Ridha Bouallegue:
Blind Channel Estimation Enhancement for Mimo- OFDM Systems under High Mobility Conditions. - Xiaohui Bei, Ning Chen, Nick Gravin, Pinyan Lu:
Budget Feasible Mechanism Design: From Prior-Free to Bayesian. - Niraj Shakhakarmi:
Optimization of Cellular Resources Evading Intra and Inter Tier Interference in Femto cells Equipped Macro cell Networks. - Niraj Shakhakarmi, Dhadesugoor R. Vaman:
Dynamic PL&T using Two Reference Nodes Equipped with Steered Directional Antenna for Significant PL&T Accuracy. - Niraj Shakhakarmi, Dhadesugoor R. Vaman:
Real Time Position Location & Tracking (PL&T) using Prediction Filter and Integrated Zone Finding in OFDM Channel. - Mir Sajjad Hussain Talpur, Murtaza Hussain Shaikh:
Automation of Mobile Pick and Place Robotic System for Small Food Industry. - Anastasios Kyrillidis, Volkan Cevher:
Matrix Recipes for Hard Thresholding Methods. - Frank Meyer:
Recommender systems in industrial contexts. - Piero Giacomelli, Giulia Munaro, Roberto Rosso:
Can an Ad-hoc ontology Beat a Medical Search Engine? The Chronious Search Engine case. - Bruno C. d. S. Oliveira, Tom Schrijvers, Wontae Choi, Wonchan Lee, Kwangkeun Yi:
Extended Report: The Implicit Calculus. - Niraj Shakhakarmi, Dhadesugoor R. Vaman:
Secured Position Location and Tracking (SPL&T) for Detection of Multiple Malicious Nodes Maintaining Two Friendly References in Mobile Ad hoc Networks. - Francis R. Bach, Simon Lacoste-Julien, Guillaume Obozinski:
On the Equivalence between Herding and Conditional Gradient Algorithms. - Zeev Dvir, János Kollár, Shachar Lovett:
Variety Evasive Sets. - Anunay Kulshrestha:
On the Hamming Distance between base-n representations of whole numbers. - Amir Beck, Yonina C. Eldar:
Sparsity Constrained Nonlinear Optimization: Optimality Conditions and Algorithms. - Liangbin Li, Hamid Jafarkhani:
Multi-Antenna System Design with Bright Transmitters and Blind Receivers. - Cagdas Bilen, Yao Wang, Ivan W. Selesnick:
High Speed Compressed Sensing Reconstruction in Dynamic Parallel MRI Using Augmented Lagrangian and Parallel Processing. - Stéphane Ballet, Robert Rolland:
Remarks on low weight codewords of generalized affine and projective Reed-Muller codes. - Huseyin Ozkan, Arda Akman, Suleyman Serdar Kozat:
A Novel Training Algorithm for HMMs with Partial and Noisy Access to the States. - Mehmet A. Donmez, Huseyin A. Inan, Suleyman Serdar Kozat:
Adaptive Mixture Methods Based on Bregman Divergences. - Tarek El-Shishtawy, Abdulwahab Al-sammak:
Arabic Keyphrase Extraction using Linguistic knowledge and Machine Learning Techniques. - Al-Sakib Khan Pathan:
On the Boundaries of Trust and Security in Computing and Communications Systems. - John Lindgren, Vibeke Libby:
An Arithmetic and Geometric Mean Invariant. - Yossi Azar, Debmalya Panigrahi:
Online Load Balancing on Unrelated Machines with Startup Costs. - Mohammad Naghshvar, Tara Javidi:
Active Sequential Hypothesis Testing. - Richard Cole, Vasilis Gkatzelis, Gagan Goel:
Truthful Mechanisms for Proportionally Fair Allocations. - Felix Ming Fai Wong, Soumya Sen, Mung Chiang:
Why Watching Movie Tweets Won't Tell the Whole Story? - K. Saravanan, L. Vijayanand, R. K. Negesh:
A Novel Bluetooth Man-In-The-Middle Attack Based On SSP using OOB Association model. - Amaury Pouly, Olivier Bournez, Daniel Silva Graça:
Turing machines can be efficiently simulated by the General Purpose Analog Computer. - Sumit Singh:
A Local Approach for Identifying Clusters in Networks. - Christian Kissling:
On the Stability of Contention Resolution Diversity Slotted ALOHA. - Devesh C. Jinwala, Dhiren R. Patel, Sankita J. Patel, Kankar S. Dasgupta:
Optimizing the Replay Protection at the Link Layer Security Framework in Wireless Sensor Networks. - Devesh Jinwala, Dhiren R. Patel, Kankar S. Dasgupta:
FlexiSec: A Configurable Link Layer Security Architecture for Wireless Sensor Networks. - Vivaksha J. Jariwala, Devesh Jinwala:
A Novel Approach for Secure Data Aggregation in Wireless Sensor Networks. - Andreas Abel, Gabriel Scherer:
On Irrelevance and Algorithmic Equality in Predicative Type Theory. - Loet Leydesdorff, Tobias Opthof:
Citation Analysis with Medical Subject Headings (MeSH) using the Web of Knowledge: A new routine. - Paola Bonizzoni, Peter J. Cameron, Gianluca Della Vedova, Alberto Leporati, Giancarlo Mauri:
A Unifying Framework to Characterize the Power of a Language to Express Relations. - Jason Priem, Heather A. Piwowar, Bradley M. Hemminger:
Altmetrics in the wild: Using social media to explore scholarly impact. - (Withdrawn) Sublinear Time, Approximate Model-based Sparse Recovery For All.
- Vincent Gramoli, Petr Kuznetsov, Srivatsan Ravi:
From Sequential to Concurrent: Correctness and Relative Efficiency. - Silvia Ghilezan, Pierre Lescanne, Dragisa Zunic:
Computational interpretation of classical logic with explicit structural rules. - Mikel Hernaez, Pedro M. Crespo, Javier Del Ser:
On the Design of a Novel Joint Network-Channel Coding Scheme for the Multiple Access Relay Channel. - Altay Brusan:
Very Short Literature Survey From Supervised Learning To Surrogate Modeling. - Marat V. Burnashev, Aslan Tchamkerten:
Estimating a Random Walk First-Passage Time from Noisy or Delayed Observations. - Andrew R. Curtis, Min Chih Lin, Ross M. McConnell, Yahav Nussbaum, Francisco J. Soulignac, Jeremy P. Spinrad, Jayme Luiz Szwarcfiter:
Isomorphism of graph classes related to the circular-ones property. - Mohammed Erritali, Oussama Mohamed Reda, Bouabid El Ouahidi:
UML modelling of geographic routing protocol "Greedy Perimeter Stateless Routing" for its integration into the "Java Network Simulator". - Anatolijs Gorbunovs:
On a New Method of Storing a Variable Size Array. - Abhijeet Bhorkar, Tara Javidi, Alex C. Snoeren:
Achieving Congestion Diversity in Multi-hop Wireless Mesh Networks. - (Withdrawn) Practical Coding Schemes for Cognitive Overlay Radios.
- Shervan Fekri Ershad:
Texture Classification Approach Based on Combination of Edge & Co-occurrence and Local Binary Pattern. - Himanshu Asnani, Haim H. Permuter, Tsachy Weissman:
Successive Refinement with Decoder Cooperation and its Channel Coding Duals. - Binyue Liu, Ning Cai:
Multi-hop Analog Network Coding: An Amplify-and-Forward Approach. - Zai Yang, Lihua Xie, Cishen Zhang:
Unified framework and algorithm for quantized compressed sensing. - Christopher Thorpe, Feng Li, Zijia Li, Zhan Yu, David Saunders, Jingyi Yu:
A Co-Prime Blur Scheme for Data Security in Video Surveillance. - Frank Neumann:
Computational Complexity Analysis of Multi-Objective Genetic Programming. - Keigo Takeuchi, Ralf R. Müller, Tsutomu Kawabata:
Large-System Analysis of Joint User Selection and Vector Precoding with Zero-Forcing Transmit Beamforming for MIMO Broadcast Channels. - Ashish Goel, Michael Kapralov, Ian Post:
Single pass sparsification in the streaming model with edge deletions. - Edith Cohen, Haim Kaplan:
How to Estimate Change from Samples. - Sean A. Fulop:
A survey of proof nets and matrices for substructural logics. - Lei Li, Sihai Zhang, Kaiwei Wang, Wuyang Zhou:
Combined Channel Aggregation and Fragmentation Strategy in Cognitive Radio Networks. - Livio Colussi:
Work function algorithm can forget history without losing competitiveness. - Mikel Hernaez, Pedro M. Crespo, Javier Del Ser:
A Flexible Channel Coding Approach for Short-Length Codewords. - Francesco Dinuzzo:
Kernels for linear time invariant system identification. - Kishorjit Nongmeikapam, Lairenlakpam Nonglenjaoba, Yumnam Nirmal, Sivaji Bandyopadhyay:
Reduplicated MWE (RMWE) helps in improving the CRF based Manipuri POS Tagger. - Luis Cabellos:
Advanced Programming Platform for efficient use of Data Parallel Hardware. - Amelia Carolina Sparavigna, Roberto Marazzato:
A tour about Isaac Newton's life. - Colm Ó'Dúnlaing:
CUDA implementation of Wagener's 2D convex hull PRAM algorithm. - Kuang Xu:
On the Power of Centralization in Distributed Processing. - Otman Abdoun, Chakir Tajani, Jaafar Abouchabaka:
Hybridizing PSM and RSM Operator for Solving NP-Complete Problems: Application to Travelling Salesman Problem. - Salim Haddad, Amer Baghdadi, Michel Jézéquel:
On the Convergence Speed of Turbo Demodulation with Turbo Decoding. - Esa Hyytiä, Samuli Aalto, Aleksi Penttinen:
Minimizing Slowdown in Heterogeneous Size-Aware Dispatching Systems (full version). - Leon Derczynski, Robert J. Gaizauskas:
Analysing Temporally Annotated Corpora with CAVaT. - Leon Derczynski, Robert J. Gaizauskas:
Using Signals to Improve Automatic Classification of Temporal Relations. - Leon Derczynski, Robert J. Gaizauskas:
USFD2: Annotating Temporal Expresions and TLINKs for TempEval-2. - Leon Derczynski, Robert J. Gaizauskas:
An Annotation Scheme for Reichenbach's Verbal Tense Structure. - Leon Derczynski, Robert J. Gaizauskas:
A Corpus-based Study of Temporal Signals. - Amev Burman, Arun Jayapal, Sathish Kannan, Madhu Kavilikatta, Ayman Alhelbawy, Leon Derczynski, Robert J. Gaizauskas:
USFD at KBP 2011: Entity Linking, Slot Filling and Temporal Bounding. - Leon Derczynski, Hector Llorens, Estela Saquete:
Massively Increasing TIMEX3 Resources: A Transduction Approach. - Tranos Zuva, Oludayo O. Olugbara, Sunday Olusegun Ojo, Seleman M. Ngwira:
Kernel Density Feature Points Estimator for Content-Based Image Retrieval. - Leon Derczynski, Jun Wang, Robert J. Gaizauskas, Mark A. Greenwood:
A Data Driven Approach to Query Expansion in Question Answering. - Saeed Alaei, Hu Fu, Nima Haghpanah, Jason D. Hartline, Azarakhsh Malekian:
Bayesian Optimal Auctions via Multi- to Single-agent Reduction. - Takahito Aoto, Yoshihito Toyama:
A Reduction-Preserving Completion for Proving Confluence of Non-Terminating Term Rewriting Systems. - Rajiv Khanna, Liang Zhang, Deepak Agarwal, Bee-Chung Chen:
Parallel Matrix Factorization for Binary Response. - Vikas Kawadia, Sameet Sreenivasan:
Online detection of temporal communities in evolving networks by estrangement confinement. - Kunal N. Chaudhury:
Acceleration of the shiftable O(1) algorithm for bilateral filtering and non-local means. - Vasilis Syrgkanis:
Bayesian Games and the Smoothness Framework. - Kee-Hoon Kim, Hyun-Bae Jeon, Jong-Seon No, Dong-Joon Shin:
A New Low-Complexity Selected Mapping Scheme Using Cyclic Shifted IFFT for PAPR Reduction in OFDM Systems. - Nikzad Babaii Rizvandi, Albert Y. Zomaya, Young Choon Lee, Ali Javadzadeh Boloori, Javid Taheri:
Multiple Frequency Selection in DVFS-Enabled Processors to Minimize Energy Consumption. - Frank Nielsen:
$k$-MLE: A fast algorithm for learning statistical mixture models. - Stefan Henß, Martin Monperrus, Mira Mezini:
Semi-Automatically Extracting FAQs to Improve Accessibility of Software Development Knowledge. - Rajkumar Buyya, Suraj Pandey, Christian Vecchiola:
Market-Oriented Cloud Computing and the Cloudbus Toolkit. - Robert J. Mokken:
Coteries, Social Circles and Hamlets Close Communities: A Study of Acquaintance Networks. - Bang Ye Wu, Jun-Lin Guo, Yue-Li Wang:
A linear time algorithm for the next-to-shortest path problem on undirected graphs with nonnegative edge lengths. - Youssef Bassil, Mohammad Alwani:
Post-Editing Error Correction Algorithm for Speech Recognition using Bing Spelling Suggestion. - Youssef Bassil, Paul Semaan:
Autonomic Model for Self-Configuring C#.NET Applications. - Youssef Bassil, Paul Semaan:
ASR Context-Sensitive Error Correction Based on Microsoft N-Gram Dataset. - Gregory D. Saxton, Chao Guo, I-Hsuan Chiu, Bo Feng:
Social Media and the Social Good: How Nonprofits Use Facebook to Communicate with the Public. - Florian Zuleger, Sumit Gulwani, Moritz Sinn, Helmut Veith:
Bound Analysis of Imperative Programs with the Size-change Abstraction (extended version). - Barnaby Martin:
Parameterized Proof Complexity and W[1]. - Paula Cristina Vaz, David Martins de Matos, Bruno Martins, Pável Calado:
Improving an Hybrid Literary Book Recommendation System through Author Ranking. - (Withdrawn) Exact-Repair Minimum Bandwidth Regenerating Codes Based on Evaluation of Linearized Polynomials.
- Lucia G. Menezo, Valentin Puente, José-Ángel Gregorio:
LOCKE Detailed Specification Tables. - Frantisek Polach:
Public-Key Cryptography Based on Modular Lattices. - Galina Jirásková, Jeffrey O. Shallit:
The state complexity of star-complement-star. - Mehmet Karaca, Yunus Sarikaya, Özgür Erçetin, Tansu Alpcan, Holger Boche:
Throughput Optimal Scheduling with Dynamic Channel Feedback. - Mohammad Noshad, Maïté Brandt-Pearce:
Expurgated PPM Using Symmetric Balanced Incomplete Block Designs. - Vibhor Rastogi, Ashwin Machanavajjhala, Laukik Chitnis, Anish Das Sarma:
Finding Connected Components on Map-reduce in Logarithmic Rounds. - Mohammad Hamed Firooz, Sumit Roy:
Data Dissemination in Wireless Networks with Network Coding. - Ido Ben-Zvi, Yoram Moses:
Agent-time Epistemics and Coordination. - Youssef Bassil:
Distributed, Cross-Platform, and Regression Testing Architecture for Service-Oriented Architecture. - Stasys Jukna:
Independent set problem for individual graphs has small communication complexity. - Yongji Wang, Xiaofeng Liao, Hu Wu, JingZheng Wu:
Incremental Collaborative Filtering Considering Temporal Effects. - Simona Ronchi Della Rocca, Elaine Pimentel:
Proceedings 6th Workshop on Logical and Semantic Frameworks with Applications, LSFA 2011, Belo Horizonte, Brazil, 27 August 2011. EPTCS 81, 2011 [contents] - Emile Richard, Andreas Argyriou, Theodoros Evgeniou, Nicolas Vayatis:
A Regularization Approach for Prediction of Edges and Node Features in Dynamic Graphs. - Martin Pelikan, Mark Hauschild:
Transfer Learning, Soft Distance-Based Bias, and the Hierarchical BOA. - Imtiez Fliss, Moncef Tagina:
Multiple faults diagnosis using causal graph. - Nesrine Ben Yahia, Narjès Bellamine Ben Saoud, Henda Ben Ghézala:
Modeling of Mixed Decision Making Process. - S. Muthukrishnan, Aleksandar Nikolov:
Optimal Private Halfspace Counting via Discrepancy. - Imtiez Fliss, Moncef Tagina:
A Novel Fault Detection Approach combining Adaptive Thresholding and Fuzzy Reasoning. - Ton Kloks:
A note on triangle partitions. - Chengqing Li, Leo Yu Zhang, Rong Ou, Kwok-Wo Wong:
Breaking a novel colour image encryption algorithm based on chaos. - Yanhua Li, Zhi-Li Zhang, Jie Bao:
Mutual or Unrequited Love: Identifying Stable Clusters in Social Networks with Uni- and Bi-directional Links. - Sameer Agarwal, Aurojit Panda, Barzan Mozafari, Samuel Madden, Ion Stoica:
BlinkDB: Queries with Bounded Errors and Bounded Response Times on Very Large Data. - Marco Guerini, Carlo Strapparava, Gözde Özbal:
Exploring Text Virality in Social Networks. - Antonios Argyriou:
Wireless Video Transmission with Over-the-Air Packet Mixing. - Bruno Scherrer:
On the Use of Non-Stationary Policies for Infinite-Horizon Discounted Markov Decision Processes. - Vitri Tundjungsari, Jazi Eko Istiyanto, Edi Winarko, Retantyo Wardoyo:
Achieving Consensus with Individual Centrality Approach. - Pierre-Olivier Amblard, Olivier J. J. Michel:
Causal conditioning and instantaneous coupling in causality graphs. - Xiaomeng Liu, Hai Lin, Ben M. Chen:
Graph-Theoretic Characterizations of Structural Controllability for Multi-Agent System with Switching Topology. - Peng Xu, Zhiguo Ding, Xuchu Dai, Kin K. Leung:
On the Application of Noisy Network Coding to the Relay-Eavesdropper Channel. - Chung-Chieh Fang:
Closed-Form Critical Conditions of Subharmonic Oscillations for Buck Converters. - Ronit Bustin, Miquel Payaró, Daniel Pérez Palomar, Shlomo Shamai:
On MMSE Properties and I-MMSE Implications in Parallel MIMO Gaussian Channels. - Amitabha Roy:
Memory Hierarchy Sensitive Graph Layout. - Ebru Aydin Gol, Calin Belta:
Time-Constrained Temporal Logic Control of Multi-Affine Systems. - Philipp Schaer, Thomas Lüke, Wilko van Hoek:
Building Custom Term Suggestion Web Services with OAI-Harvested Open Data. - Carme Àlvarez, Aleix Fernàndez:
Network Formation: Heterogeneous Traffic, Bilateral Contracting and Myopic Dynamics. - Giorgio Corani, Alessandro Antonucci:
Credal Classification based on AODE and compression coefficients. - Nabarun Mondal, Partha P. Ghosh:
Aperiodic Pseudo Random Number Generation from Chaos. - Martin Heller, Tomás Oberhuber:
Adaptive Row-grouped CSR Format for Storing of Sparse Matrices on GPU. - Raul Antonio Ferraz, Marinês Guerreiro, César Polcino Milies:
G-equivalence in group algebras and minimal abelian codes. - Shachar Lovett, Raghu Meka:
Constructive Discrepancy Minimization by Walking on The Edges. - Mohammad Muztaba Fuad, Debzani Deb, Jinsuk Baek:
Self-Healing by Means of Runtime Execution Profiling. - Carsten Fuhs, Cynthia Kop:
Polynomial Interpretations for Higher-Order Rewriting. - Vijayvaradharaj T. Muralidharan, B. Sundar Rajan:
Performance Analysis of Adaptive Physical Layer Network Coding for Wireless Two-way Relaying. - Cagdas Bilen, Yao Wang, Ivan W. Selesnick:
Compressed Sensing for Moving Imagery in Medical Imaging. - Krit Salah-ddine, Zared Kamal, Hassan Qjidaa, Zouak Mohcine:
A 100 mA Low Voltage Linear Regulators for Systems on Chip Applications Using 0.18 μm CMOS Technology. - Howard Cheng, Satyan L. Devadoss, Brian Li, Andrej Risteski:
Skeletal Rigidity of Phylogenetic Trees. - Cheng Wan:
Coalitions in nonatomic network congestion games. - Viet Hung Nguyen, Fabio Massacci:
An Independent Validation of Vulnerability Discovery Models. - David R. Stoutemyer:
Series Crimes. - Emmanuel J. Candès, Carlos Fernandez-Granda:
Towards a Mathematical Theory of Super-Resolution. - Rajeev Kumar Shakya, Yatindra Nath Singh, Nishchal K. Verma:
Optimizing Channel Access for Event-Driven Wireless Sensor Networks: Analysis and Enhancements. - Abhinav Ganesan, Teja Damodaram Bavirisetti, B. Sundar Rajan:
On the Feasibility of Network Alignment for Three-Source Three-Destination Multiple Unicast Networks with Delays. - Alex Borisevich, Gernot Schullerus:
Switching strategy based on homotopy continuation for non-regular affine systems with application in induction motor control. - Haifan Yin, David Gesbert, Miltiades Filippou, Yingzhuang Liu:
A Coordinated Approach to Channel Estimation in Large-scale Multiple-antenna Systems. - Matthew Aldridge:
Adaptive group testing as channel coding with feedback. - Sergio Cabello, Bojan Mohar:
Adding one edge to planar graphs makes crossing number and 1-planarity hard. - (Withdrawn) Bayesian Auctions with Friends and Foes.
- Rajdeep Borgohain, Moirangthem Tiken Singh, Chandrakant Sakharwade, Sugata Sanyal:
TSET: Token based Secure Electronic Transaction. - Graeme Pope, Annina Bracher, Christoph Studer:
Probabilistic Recovery Guarantees for Sparsely Corrupted Signals. - Benjamin Piwowarski:
The Kernel Quantum Probabilities (KQP) Library. - Algirdas Antano Maknickas:
How to solve kSAT in polynomial time. - Hengjun Zhao, Naijun Zhan, Deepak Kapur, Kim G. Larsen:
A "Hybrid" Approach for Synthesizing Optimal Controllers of Hybrid Systems: A Case Study of the Oil Pump Industrial Example. - Chiranjib Choudhuri, Young-Han Kim, Urbashi Mitra:
Causal State Communication. - Guodong Shi, Mikael Johansson, Karl Henrik Johansson:
Randomized Gossip Algorithm with Unreliable Communication. - Dohy Hong:
Revisiting the D-iteration method: from theoretical to practical computation cost. - Janyl Jumadinova, Prithviraj Dasgupta:
A Multi-Agent Prediction Market based on Partially Observable Stochastic Game. - Abhijit Chowdhury, Angshu Kumar Sinha, Saurabh Dutta:
Proposal of a New Block Cipher reasonably Non-Vulnerable against Cryptanalytic Attacks. - Tim Kraska, Gene Pang, Michael J. Franklin, Samuel Madden:
MDCC: Multi-Data Center Consistency. - Yehuda Afek, Eli Gafni:
Asynchrony from Synchrony. - Ryan A. Rossi, David F. Gleich:
Dynamic PageRank using Evolving Teleportation. - Zhiqiang Ren, Hongwei Xi:
A Programmer-Centric Approach to Program Verification in ATS. - Haotian Zhang, Shreyas Sundaram:
Robustness of Complex Networks: Reaching Consensus Despite Adversaries. - Dajun Qian, Osman Yagan, Lei Yang, Junshan Zhang:
Diffusion of Real-Time Information in Social-Physical Networks. - Olav Geil, Ryutaroh Matsumoto, Diego Ruano:
List Decoding Algorithm based on Voting in Groebner Bases for General One-Point AG Codes. - Olav Geil, Ryutaroh Matsumoto, Diego Ruano:
Generalization of the Lee-O'Sullivan List Decoding for One-Point AG Codes. - Kemal Davaslioglu, Ender Ayanoglu:
Power Control in Multi-Layer Cellular Networks. - Alex Rudnick:
Tree Transducers, Machine Translation, and Cross-Language Divergences. - Manfred Kufleitner, Pascal Weil:
The FO^2 alternation hierarchy is decidable. - Arnon Avron:
A Logical Framework for Set Theories. 3-15 - Favio Ezequiel Miranda-Perea, Lourdes Del Carmen González-Huesca:
Mendler-style Iso-(Co)inductive predicates: a strongly normalizing approach. 30-46 - Paulo A. S. Veloso, Sheila R. M. Veloso:
On Graph Refutation for Relational Inclusions. 47-62 - Andréia B. Avelar, André Luiz Galdino, Flávio L. C. de Moura, Mauricio Ayala-Rincón:
A Formalization of the Theorem of Existence of First-Order Most General Unifiers. 63-78 - Anderson de Araújo, Marcelo Finger:
Classical and quantum satisfiability. 79-84 - Hajar Ghahremani Gol, Asadollah Razavi, Farzad Didehva:
On Distance Function among Finite Set of Points. - Heru Susanto, Mohammad Nabil Almunawar, Yong Chee Tuan, Mehmet Sabih Aksoy, Wahyudin P. Syam:
Integrated Solution Modeling Software: A New Paradigm on Information Security Review and Assessment. - Abolfazl S. Motahari, Guy Bresler, David Tse:
Information Theory of DNA Sequencing. - Marco F. Huber:
Optimal Pruning for Multi-Step Sensor Scheduling. - Koujin Takeda, Yoshiyuki Kabashima:
A study of the universal threshold in the L1 recovery by statistical mechanics. - Greg Aloupis, Luis Barba, Stefan Langerman:
Circle separability queries in logarithmic time. - Zeev Nutov:
Small ℓ-edge-covers in k-connected graphs. - Achille Frigeri, Liliana Pasquale, Paola Spoletini:
Fuzzy Time in LTL. - Jun He, Tianshi Chen:
A General Analysis of Evolutionary Algorithms for Hard and Easy Fitness Functions. - Sougata Pal, Simon Oechsner, Boris Bellalta, Miquel Oliver:
Performance Optimization of Multiple Interconnected Heterogeneous Sensor Networks via Collaborative Information Sharing. - Erik Johannesson, Anders Rantzer, Bo Bernhardsson, Andrey Ghulchak:
Optimal Linear Joint Source-Channel Coding with Delay Constraint. - Lu Wei, K. D. Prathapasinghe Dharmawansa, Olav Tirkkonen:
Locally Best Invariant Test for Multiple Primary User Spectrum Sensing. - Dusko Pavlovic:
Tracing the Man in the Middle in Monoidal Categories. - Arnav V. Bhavsar:
Analysis of Magnification in Depth from Defocus. - Massimiliano Dal Mas:
Intelligent Interface Architectures for Folksonomy Driven Structure Network. - Christina Brandt, Nicole Immorlica, Gautam Kamath, Robert D. Kleinberg:
An Analysis of One-Dimensional Schelling Segregation. - Cristian Danescu-Niculescu-Mizil, Justin Cheng, Jon M. Kleinberg, Lillian Lee:
You had me at hello: How phrasing affects memorability. - Mingyi Hong, Ruoyu Sun, Hadi Baligh, Zhi-Quan Luo:
Joint Base Station Clustering and Beamformer Design for Partial Coordinated Transmission in Heterogenous Networks. - Mojtaba Rahmati, Tolga M. Duman:
Achievable Rates for Noisy Channels with Synchronization Errors. - Allan Borodin, Hyun Chul Lee, Yuli Ye:
Max-Sum Diversification, Monotone Submodular Functions and Dynamic Updates. - Nodira Khoussainova, Magdalena Balazinska, Dan Suciu:
PerfXplain: Debugging MapReduce Job Performance. - Francesco Gullo, Andrea Tagarelli:
Uncertain Centroid based Partitional Clustering of Uncertain Data. - Bahman Bahmani, Benjamin Moseley, Andrea Vattani, Ravi Kumar, Sergei Vassilvitskii:
Scalable K-Means++. - Michael Benedikt, Pierre Bourhis, Clemens Ley:
Querying Schemas With Access Restrictions. - Goetz Graefe, Harumi A. Kuno:
Definition, Detection, and Recovery of Single-Page Failures, a Fourth Class of Database Failures. - Goetz Graefe, Felix Halim, Stratos Idreos, Harumi A. Kuno, Stefan Manegold:
Concurrency Control for Adaptive Indexing. - Nilesh N. Dalvi, Ashwin Machanavajjhala, Bo Pang:
An Analysis of Structured Data on the Web. - Xu Chu Ding, Mircea Lazar, Calin Belta:
Formal Abstraction of Linear Systems via Polyhedral Lyapunov Functions. - Aquinas Hobor, Cristian Gherghina:
Barriers in Concurrent Separation Logic: Now With Tool Support! - Arash Azarfar, Jean-François Frigon, Brunilde Sansò:
Service Differentiation in Cognitive Radio Networks: A Priority Queueing Model. - T. R. Gopalakrishnan Nair, Vithal J. Sampagar, V. Suma, Ezhilarasan Maharajan:
A Scheme for Automation of Telecom Data Processing for Business Application. - T. R. Gopalakrishnan Nair, V. Suma, N. R. Shashi Kumar:
An Analytical Approach for Project Managers in Effective Defect Management in Software Process. - T. R. Gopalakrishnan Nair, V. Suma, Pranesh Kumar Tiwari:
Analysis of Test Efficiency during Software Development Process. - Béatrice Bérard, Serge Haddad, Mathieu Sassolas:
Interrupt Timed Automata: verification and expressiveness. - Mohammed Adam Ibrahim Fakharaldien, Jasni Mohamad Zain, Norrozila Sulaiman:
XRecursive: An Efficient Method to Store and Query XML Documents. - Damien Cassou, Julien Bruneau, Charles Consel, Emilie Balland:
Towards a Tool-based Development Methodology for Pervasive Computing Applications. - Ralf Osbild:
General Analysis Tool Box for Controlled Perturbation. - Aparna Das, Krzysztof Fleszar, Stephen G. Kobourov, Joachim Spoerhase, Sankar Veeramoni, Alexander Wolff:
Polylogarithmic Approximation for Generalized Minimum Manhattan Networks. - Rémy-Robert Joseph:
Global preferential consistency for the topological sorting-based maximal spanning tree problem. - Sakkaravarthi Ramanathan, Aymen Kamoun, Khalil Drira, Christophe Chassot:
Ontology-based collaborative framework for disaster recovery scenarios. - Jan Kuipers, Takahiro Ueda, J. A. M. Vermaseren, J. Vollinga:
FORM version 4.0. - Michiel de Bondt:
Solving Mahjong Solitaire boards with peeking. - Alexander Gruner, Michael Huber:
New Combinatorial Construction Techniques for Low-Density Parity-Check Codes and Systematic Repeat-Accumulate Codes. - Hideaki Ishii, Roberto Tempo:
Distributed Randomized Algorithms for the PageRank Computation. - Hideaki Ishii, Roberto Tempo, Er-Wei Bai:
A Web Aggregation Approach for Distributed Randomized PageRank Algorithms. - Gleb Polevoy, Rann Smorodinsky, Moshe Tennenholtz:
Signalling Competition and Social Welfare (Working Paper). - Heru Susanto, Mohammad Nabil Almunawar, Yong Chee Tuan:
A Novel Method on ISO 27001 Reviews: ISMS Compliance Readiness Level Measurement. - Junhua Tang, Bhaskar Krishnamachari:
Power Allocation over Two Identical Gilbert-Elliott Channels. - Valérie Gauthier, Ayoub Otmani, Jean-Pierre Tillich:
A Distinguisher-Based Attack of a Homomorphic Encryption Scheme Relying on Reed-Solomon Codes. - Umang Bhaskar, Lisa Fleischer:
Online Mixed Packing and Covering. - Ho Yee Cheung, Tsz Chiu Kwok, Lap Chi Lau:
Fast Matrix Rank Algorithms and Applications. - T. R. Gopalakrishnan Nair, Kavitha Sooda:
Application of Genetic Algorithm on Quality Graded Networks for Intelligent Routing. - T. R. Gopalakrishnan Nair, Meenakshi Malhotra:
Creating Intelligent Linking for Information Threading in Knowledge Networks. - T. R. Gopalakrishnan Nair, A. Christy Persya:
Critical Task Re-assignment under Hybrid Scheduling Approach in Multiprocessor Real-Time Systems. - Vinay Bettadapura:
Face Expression Recognition and Analysis: The State of the Art. - A. W. M. van Schijndel, P. W. M. nH. Steskens:
System Identification for Indoor Climate Control. - Erik Johannesson, Anders Rantzer, Bo Bernhardsson:
Optimal Linear Control over Channels with Signal-to-Noise Ratio Constraints. - Sabrina Gaito, Matteo Zignani, Gian Paolo Rossi, Alessandra Sala, Xiao Wang, Haitao Zheng, Ben Y. Zhao:
On the Bursty Evolution of Online Social Networks. - Marco F. Huber:
Adaptive Gaussian Mixture Filter Based on Statistical Linearization. - Jianwei Zhang, Yongchao Wang, Wei Xing, Dongming Lu:
Extended Equal Service and Differentiated Service Models for Peer-to-Peer File Sharing. - Donald R. Sheehy:
Linear-Size Approximations to the Vietoris-Rips Filtration. - Bernhard C. Geiger, Gernot Kubin:
Relative Information Loss - An Introduction. - Konstantina Christakou, Jean-Yves Le Boudec, Mario Paolone, Dan-Cristian Tomozei:
Efficient Computation of Sensitivity Coefficients of Node Voltages and Line Currents in Unbalanced Electrical Networks. - Carlo Bellettini, Matteo Camilli, Lorenzo Capra, Mattia Monga:
State Space Exploration of RT Systems in the Cloud. - Mónica Marrero, Sonia Sánchez-Cuadrado, Julián Urbano, Jorge Morato, José A. Moreiro:
Information Retrieval Systems Adapted to the Biomedical Domain. - Matthew J. Parkinson, Alexander J. Summers:
The Relationship Between Separation Logic and Implicit Dynamic Frames. - Mohsen Sardari, Ahmad Beirami, Faramarz Fekri:
Memory-Assisted Universal Compression of Network Flows. - Jean-Yves Marion, Romain Péchoux:
Complexity Information Flow in a Multi-threaded Imperative Language. - Di Zhou, Gregorio D'Agostino, Antonio Scala, Harry Eugene Stanley:
Assortativity Decreases the Robustness of Interdependent Networks. - Michael Dewar, Chris Wiggins, Frank D. Wood:
Inference in Hidden Markov Models with Explicit State Duration Distributions. - Richard F. Bass, Karlheinz Gröchenig:
Relevant Sampling of Band-limited Functions. - Aleks Kissinger:
Pictures of Processes: Automated Graph Rewriting for Monoidal Categories and Applications to Quantum Computing. - Carsten Lemmen, Kai W. Wirtz:
On the sensitivity of the simulated European Neolithic transition to climate extremes. - Theodore P. Hill, Marco Dall'Aglio:
Bayesian Posteriors Without Bayes' Theorem. - Song Liu, Makoto Yamada, Nigel Collier, Masashi Sugiyama:
Change-Point Detection in Time-Series Data by Relative Density-Ratio Estimation. - Frank Bauer, Joseph T. Lizier:
Identifying influential spreaders. - Marcel Celaya, Frank Ruskey:
An Undecidable Nested Recurrence Relation. - Steffen Eger:
Asymptotic normality of integer compositions inside a rectangle. - Güner D. Çelik, Long Bao Le, Eytan H. Modiano:
Dynamic Server Allocation over Time Varying Channels with Switchover Delay. - Animashree Anandkumar, Daniel J. Hsu, Sham M. Kakade:
Learning High-Dimensional Mixtures of Graphical Models. - Krzysztof Suchecki, Alkim Almila Akdag Salah, Cheng Gao, Andrea Scharnhorst:
Evolution of Wikipedia's Category Structure. - Guanghua Dong, Ning Wang, Yuanqiu Huang, Han Ren, Yanpei Liu:
Vertex Splitting and Upper Embeddable Graphs. - Pietro Galliani:
Transition Semantics - The Dynamics of Dependence Logic. - Jan Skowron, Andrew Gould:
General Complex Polynomial Root Solver and Its Further Optimization for Binary Microlenses. - Stephen G. Hartke, Derrick Stolee:
Uniquely K_r-Saturated Graphs. - Xiaoke Xu, Jian-Bo Wang, Ye Wu, Michael Small:
Pairwise interaction pattern in the weighted communication network. - Chuansheng Shen, Hanshuang Chen, Zhonghuai Hou:
An optimal strategy to suppress epidemic explosion in heterogeneous metapopulation networks. - Péter L. Erdös, Claude Tardif, Gábor Tardos:
On infinite-finite duality pairs of directed graphs. - Farhad Farokhi, Karl Henrik Johansson:
Limited Model Information Control Design for Linear Discrete-Time Systems with Stochastic Parameters. - Narendra M. Dixit, Piyush Srivastava, Nisheeth K. Vishnoi:
A Finite Population Model of Molecular Evolution: Theory and Computation. - Kristina Lerman, Rumi Ghosh:
Network Structure, Topology and Dynamics in Generalized Models of Synchronization. - Péter L. Erdös, Claude Tardif, Gábor Tardos:
Caterpillar dualities and regular languages. - Guido Caldarelli, Alessandro Chessa, Irene Crimaldi, Fabio Pammolli:
The Evolution of Complex Networks: A New Framework. - Samson Abramsky, Lucien Hardy:
Logical Bell Inequalities. - Pedro V. Silva:
Fixed points of endomorphisms of virtually free groups. - Vinicio Pelino, Filippo Maimone:
Towards a class of complex networks models for conflict dynamics. - Dániel Gerbner, Gyula O. H. Katona, Dömötör Pálvölgyi, Balázs Patkós:
Majority and Plurality Problems. - Fabrizio Altarelli, Alfredo Braunstein, Luca Dall'Asta, Riccardo Zecchina:
The Spread Optimization Problem. - Jean-François Bercher:
On a (β,q)-generalized Fisher information and inequalities involving q-Gaussian distributions. - Luce Prignano, Yamir Moreno, Albert Díaz-Guilera:
Exploring complex networks by means of adaptive walkers. - Olivier Fercoq:
PageRank optimization applied to spam detection. - Pascal Bianchi, Gersende Fort, Walid Hachem:
Performance of a Distributed Stochastic Approximation Algorithm. - Azadeh Khaleghi, Daniil Ryabko:
Multiple Change-Point Estimation in Stationary Ergodic Time-Series. - Nicolai Hähnle:
Constructing subset partition graphs with strong adjacency and end-point count properties. - Sanjay Mehrotra, Dávid Papp:
Generating nested quadrature formulas for general weight functions with known moments. - Emil Saucan:
Metric Ricci curvature for $PL$ manifolds. - Hachem Kadri, Alain Rakotomamonjy, Francis R. Bach, Philippe Preux:
Multiple Operator-valued Kernel Learning. - Christian Retoré:
Variable types for meaning assembly: a logical syntax for generic noun phrases introduced by most. - Sudhir R. Ghorpade, Samrith Ram:
Enumeration of Splitting Subspaces over Finite Fields. - Stéphane Le Roux:
From determinacy to Nash equilibrium. - Sandra González-Bailón, Javier Borge-Holthoefer, Yamir Moreno:
Broadcasters and Hidden Influentials in Online Protest Diffusion. - Manuel Bodirsky, Michael Pinsker:
Topological Birkhoff. - Jonas Hägglund:
On snarks that are far from being 3-edge colorable. - Dmitri V. Krioukov, Maksim Kitsak, Robert S. Sinkovits, David Rideout, David Meyer, Marián Boguñá:
Network Cosmology. - Steffen Eger:
Stirling's approximation for central polynomial coefficients. - Ken-ichi Kawarabayashi, Serguei Norine, Robin Thomas, Paul Wollan:
K_6 minors in 6-connected graphs of bounded tree-width. - Ken-ichi Kawarabayashi, Serguei Norine, Robin Thomas, Paul Wollan:
K_6 minors in large 6-connected graphs. - Cristiane M. Sato:
On the robustness of random k-cores. - Shun Motegi, Naoki Masuda:
A network-based dynamical ranking system. - Eric C. Chi, Kenneth Lange:
Techniques for Solving Sudoku Puzzles. - Jérémie Bettinelli:
Increasing Forests and Quadrangulations via a Bijective Approach. - Joseph F. Grcar:
Matrix Stretching for Linear Equations. - Mohamed Osama Ahmed, Pouyan T. Bibalan, Nando de Freitas, Simon Fauvel:
Decentralized, Adaptive, Look-Ahead Particle Filtering. - Anders Claesson, Henning Úlfarsson:
Sorting and preimages of pattern classes. - Dong Dai, Philippe Rigollet, Tong Zhang:
Deviation Optimal Learning using Greedy Q-aggregation. - Gilles Pisier:
Tripartite Bell inequality, random matrices and trilinear forms. - Rob Hall, Alessandro Rinaldo, Larry A. Wasserman:
Differential Privacy for Functions and Functional Data. - Allan Sly, Nike Sun:
The computational hardness of counting in two-spin models on d-regular graphs. - Yang-Yu Liu, Jean-Jacques E. Slotine, Albert-László Barabási:
Control centrality and hierarchical structure in complex networks. - James Allen Fill, Svante Janson, Mark Daniel Ward:
Partitions with Distinct Multiplicities of Parts: On An "Unsolved Problem" Posed By Herbert Wilf. - Yaoyun Shi:
Quantum Simpsons Paradox and High Order Bell-Tsirelson Inequalities. - Ian R. Petersen, Valery A. Ugrinovskii, Matthew R. James:
Robust Stability of Uncertain Quantum Systems. - Martin S. Andersen, Joachim Dahl, Lieven Vandenberghe:
Logarithmic barriers for sparse matrix cones. - Hossein Azari Soufiani, Edoardo M. Airoldi:
Graphlet decomposition of a weighted network. - Andrew Adamatzky, Selim G. Akl, Ramón Alonso-Sanz, Wesley van Dessel, Zuwairie Ibrahim, Andrew Ilachinski, Jeff Jones, Anne V. D. M. Kayem, Genaro Juárez Martínez, Pedro Paulo Balbi de Oliveira, Mikhail Prokopenko, Theresa Schubert, Peter M. A. Sloot, Emanuele Strano, Xin-She Yang:
Are motorways rational from slime mould's point of view? - Xu Chu Ding, Mircea Lazar, Calin Belta:
Receding Horizon Temporal Logic Control for Finite Deterministic Systems. - Zbigniew Koza, Maciej Matyka, Sebastian Szkoda, Lukasz Miroslaw:
Compressed Multiple-Row Storage Format. - An Zeng, Weiping Liu:
Enhancing network robustness for malicious attacks. - Lin Xiao, Tong Zhang:
A Proximal-Gradient Homotopy Method for the Sparse Least-Squares Problem. - Sebastiano Stramaglia, Guo-Rong Wu, Mario Pellicoro, Daniele Marinazzo:
Expanding the Transfer Entropy to Identify Information Subgraphs in Complex Systems. - Guillaume Deffuant, Timoteo Carletti, Sylvie Huet:
The Leviathan model: Absolute dominance, generalised distrust, small worlds and other patterns emerging from combining vanity with opinion propagation. - Yaroslav D. Sergeyev:
Numerical computations and mathematical modelling with infinite and infinitesimal numbers. - Yaroslav D. Sergeyev:
Higher order numerical differentiation on the Infinity Computer. - Yaroslav D. Sergeyev:
Methodology of Numerical Computations with Infinities and Infinitesimals. - Suhan Ree:
Dynamics of periodic node states on a model of static networks with repeated-averaging rules. - Susanne Still, David A. Sivak, Anthony J. Bell, Gavin E. Crooks:
The thermodynamics of prediction. - Masato Hisakado, Shintaro Mori:
Two kinds of Phase transitions in a Voting model. - Richard T. Meyer, Milos Zefran, Raymond A. DeCarlo:
A Comparison of the Embedding Method to Multi-Parametric Programming, Mixed-Integer Programming, Gradient-Descent, and Hybrid Minimum Principle Based Methods. - Dvir Falik, Ehud Friedgut:
Between Arrow and Gibbard-Satterthwaite; A representation theoretic approach. - Robin J. Evans, Thomas S. Richardson:
Maximum likelihood fitting of acyclic directed mixed graphs to binary data. - Firas Hamze, Nando de Freitas:
Intracluster Moves for Constrained Discrete-Space MCMC. - Judea Pearl:
On a Class of Bias-Amplifying Variables that Endanger Effect Estimates. - Judea Pearl:
On Measurement Bias in Causal Inference. - Judea Pearl, Azaria Paz:
Confounding Equivalence in Causal Inference. - Ilya Shpitser, Tyler J. VanderWeele, James M. Robins:
On the Validity of Covariate Adjustment for Estimating Causal Effects. - Jarno Vanhatalo, Aki Vehtari:
Speeding up the binary Gaussian process classification. - O-joung Kwon, Sang-il Oum:
Graphs of Small Rank-width are Pivot-minors of Graphs of Small Tree-width. - Michael S. Payne, Jens M. Schmidt, David R. Wood:
Which point sets admit a k-angulation? - Takehisa Hasegawa, Keita Konno, Koji Nemoto:
Robustness of correlated networks against propagating attacks. - Richard G. Everitt:
Bayesian Parameter Estimation for Latent Markov Random Fields and Social Networks. - Grégoire Montavon, Klaus-Robert Müller:
Learning Feature Hierarchies with Centered Deep Boltzmann Machines. - Adam N. Letchford, Saeideh D. Nasiri, Dirk Oliver Theis:
Compact Formulations of the Steiner Traveling Salesman Problem and Related Problems. - Animashree Anandkumar, Ragupathyraj Valluvan:
Learning Loopy Graphical Models with Latent Variables: Efficient Methods and Guarantees. - Troy Lee, Dirk Oliver Theis:
Lower bounds for sizes of semidefinite formulations for some combinatorial optimization problems. - Silvère Bonnabel, Rodolphe Sepulchre:
The geometry of low-rank Kalman filters. - Mirka Miller, Hebert Pérez-Rosés, Joe Ryan:
The Maximum Degree-and-Diameter-Bounded Subgraph in the Mesh. - Richard McKinley:
Canonical Proof nets for Classical Logic. - Carmen Pellicer-Lostao, Ricardo López-Ruiz:
Notions of Chaotic Cryptography: Sketch of a Chaos based Cryptosystem. - Sophie Laplante, Virginie Lerays, Jérémie Roland:
Classical and quantum partition bound and detector inefficiency. - Sait Tunç, Suleyman Serdar Kozat:
Optimal Investment Under Transaction Costs: A Threshold Rebalanced Portfolio Approach. - Francisco-Shu Kitaura:
The Initial Conditions of the Universe from Constrained Simulations. - Shaoshi Chen, Michael F. Singer:
Residues and Telescopers for Rational Functions. - Otkrist Gupta, Andreas Velten, Thomas Willwacher, Ashok Veeraraghavan, Ramesh Raskar:
Reconstruction of hidden 3D shapes using diffuse reflections. - Tomer Michaeli, Yonina C. Eldar, Guillermo Sapiro:
Semi-Supervised Single- and Multi-Domain Regression with Multi-Domain Training. - Serge Gaspers:
From edge-disjoint paths to independent paths. - Johan P. Hansen:
Quantum Codes from Toric Surfaces. - Joshua Zahl:
A Szemeredi-Trotter type theorem in $\mathbb{R}^4$. - Jørgen Bang-Jensen, Sven Simonsen:
Arc-Disjoint Paths and Trees in 2-Regular Digraphs. - Scott Aaronson, Paul F. Christiano:
Quantum Money from Hidden Subspaces. - Eliyahu Osherovich:
Numerical methods for phase retrieval. - Eliyahu Osherovich, Oren Cohen, Yonina C. Eldar, Mordechai Segev:
Designing and using prior data in Ankylography: Recovering a 3D object from a single diffraction intensity pattern. - Filipi Nascimento Silva, Francisco Aparecido Rodrigues, Osvaldo Novaes de Oliveira Jr., Luciano da Fontoura Costa:
Quantifying the interdisciplinarity of scientific journals and fields. - John D. Hobby, Gabriel H. Tucci:
Traffic Analysis in Random Delaunay Tessellations and Other Graphs. - Qing Jin, Zhen Wang:
Spontaneous Symmetry Breaking in Interdependent Networked Game. - Abel Molina:
Parallel Repetition of Prover-Verifier Quantum Interactions. - Basile Morcrette:
Fully Analyzing an Algebraic Polya Urn Model. - Bob Coecke, Ross Duncan, Aleks Kissinger, Quanlong Wang:
Strong complementarity and non-locality in categorical quantum mechanics. - Gabriel H. Tucci:
Random Regular Graphs are not Asymptotically Gromov Hyperbolic. - Svetlana V. Poroseva:
"Selfish" algorithm for optimizing the network survivability analysis. - Haye Hinrichsen:
Entropy-based Tuning of Musical Instruments. - Jason Cory Brunson, Steve Fassino, Antonio McInnes, Monisha Narayan, Brianna Richardson, Christopher Franck, Patrick Ion, Reinhard C. Laubenbacher:
Evolutionary Events in a Mathematical Sciences Research Collaboration Network. - Márton Pósfai, Yang-Yu Liu, Jean-Jacques E. Slotine, Albert-László Barabási:
Effect of correlations on network controllability. - Victoria Horan, Glenn Hurlbert:
Universal Cycles for Weak Orders. - Maxime Lenormand, Sylvie Huet, Floriana Gargiulo, Guillaume Deffuant:
A Universal Model of Commuting Networks. - Yue Guan, Jianfeng Hou, Yingyuan Yang:
An improved bound on acyclic chromatic index of planar graphs. - Elodie Leducq:
Second weight codewords of generalized Reed-Muller codes in some cases. - Nicola Perra, Bruno Gonçalves, Romualdo Pastor-Satorras, Alessandro Vespignani:
Activity driven modeling of dynamic networks. - Jing Lei, Larry A. Wasserman:
Distribution Free Prediction Bands. - Philippe Lauret, Auline Rodler, Marc Muselli, Mathieu David, Hadja Diagne, Cyril Voyant:
A Bayesian Model Committee Approach to Forecasting Global Solar Radiation. - Peter Scheiblechner:
Effective de Rham Cohomology - The General Case. - Karen L. Collins, Ann N. Trenk:
Nordhaus-Gaddum Theorem for the Distinguishing Chromatic Number. - Mark M. Wilde, Joseph M. Renes:
Polar codes for private classical communication. - Michael Möller, Martin Burger, Peter Dieterich, Albrecht Schwab:
A Framework for Automated Cell Tracking in Phase Contrast Microscopic Videos based on Normal Velocities. - Filippo Disanto, Luca Ferrari, Simone Rinaldi:
A partial order structure on interval orders. - Andrea Lancichinetti, Santo Fortunato:
Consensus clustering in complex networks. - Dean P. Foster, Jordan Rodu, Lyle H. Ungar:
Spectral dimensionality reduction for HMMs. - Ning Ning Chung, Lock Yue Chew, Jie Zhou, Choy Heng Lai:
Impact of edge-removal on the centrality betweenness of the best spreaders. - Ayaka Sakata, Yoshiyuki Kabashima:
Statistical Mechanics of Dictionary Learning. - Ross Duncan:
A graphical approach to measurement-based quantum computing. - Ankur Sinha, Pekka Malo, Timo Kuosmanen:
A Multi-objective Procedure for Efficient Regression Modeling. - Jesse A. Calvert, Michael J. Schuster, Stanislaw P. Radziszowski:
Computing the Ramsey Number $R(K_5-P_3,K_5)$. - Catherine S. Greenhill:
Making Markov chains less lazy. - Nuno Crokidakis, Marcio Argollo de Menezes:
Critical behavior of the SIS epidemic model with time-dependent infection rate. - Filippo Radicchi, Claudio Castellano:
A reverse engineering approach to the suppression of citation biases reveals universal properties of citation distributions. - Tadeusz Platkowski, Jan Zakrzewski:
Game Dynamics for Players with Social and Material Preferences. - Diana Alina Bistrian, Florica Ioana Dragomirescu, George Savii:
Spectral Differentiation Operators and Hydrodynamic Models for Stability of Swirling Fluid Systems. - Johannes Michael, Kurt Chudej, Jürgen Pannek:
Modelling and Optimal Control of a Docking Maneuver with an Uncontrolled Satellite. - Lars Grüne, Jürgen Pannek, Karl Worthmann:
Ensuring Stability in Networked Systems with Nonlinear MPC for Continuous Time Systems. - Luca Ferrari, Emanuele Munarini:
Enumeration of edges in some lattices of paths. - Luca Ferrari, Emanuele Munarini:
Enumeration of saturated chains in Dyck lattices. - David Arroyo, Jesus Diaz, Francisco de Borja Rodríguez:
Cryptanalysis of a one round chaos-based Substitution Permutation Network. - Mikhail Isaev, K. V. Isaeva:
On the class of gamma-mixing graphs. - Ville Salo, Ilkka Törmä:
On Shift Spaces with Algebraic Structure.
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.