


default search action
CoRR, May 2013
- Rozaimi Zakaria, Abd. Fatah Wahab, Rudrusamy U. Gobithaasan:
Perfectly normal type-2 fuzzy interpolation B-spline curve. - Firas A. Jassim:
Image Compression By Embedding Five Modulus Method Into JPEG. - Mario Blaum:
Construction of PMDS and SD Codes extending RAID 5. - Richard Gibson:
Regret Minimization in Non-Zero-Sum Games with Applications to Building Champion Multiplayer Computer Poker Agents. - Kevin S. Xu, Mark Kliger, Yilun Chen, Peter J. Woolf, Alfred O. Hero III:
Revealing social networks of spammers through spectral clustering. - Cunsheng Ding, Tor Helleseth:
Optimal Ternary Cyclic Codes from Monomials. - Martin Fink, Sergey Pupyrev:
Ordering Metro Lines by Block Crossings. - Michal Feldman, David Kempe, Brendan Lucier, Renato Paes Leme:
Pricing Public Goods for Private Sale. - Jiyan Yang, Xiangrui Meng, Michael W. Mahoney:
Quantile Regression for Large-scale Applications. - Pierre Lescanne:
Bubbles are rational. - Marthinus Christoffel du Plessis, Masashi Sugiyama:
Clustering Unclustered Data: Unsupervised Binary Labeling of Two Datasets Having Different Class Balances. - David Eppstein, Michael T. Goodrich, Daniel S. Hirschberg:
Combinatorial Pair Testing: Distinguishing Workers from Slackers. - Valérie Berthé, Clelia de Felice, Francesco Dolce, Dominique Perrin, Christophe Reutenauer, Giuseppina Rindone:
Return words in interval exchange transformations. - Mate Boban, João Barros, Ozan K. Tonguz:
Geometry-Based Vehicle-to-Vehicle Channel Modeling for Large-Scale Simulation. - Valérie Berthé, Clelia de Felice, Francesco Dolce, Dominique Perrin, Christophe Reutenauer, Giuseppina Rindone:
Bifix codes and the finite index basis property. - Gloria Lanci:
Translating cities: the use of digital technologies in urban environments. - Lee Naish, Harald Søndergaard
:
Truth versus information in logic programming. - Federico D. Sacerdoti:
The Software Garden. - Junting Chen, Vincent K. N. Lau:
Convergence Analysis of Mixed Timescale Cross-Layer Stochastic Optimization. - Markus J. Bauer, Anthony J. Cox, Giovanna Rosone, Marinella Sciortino:
Lightweight LCP Construction for Next-Generation Sequencing Datasets. - Ahmad Biniaz, Anil Maheshwari, Michiel H. M. Smid:
An Optimal Algorithm for the Euclidean Bottleneck Full Steiner Tree Problem. - Chiu-Wing Sham, Xu Chen, Francis Chung-Ming Lau, Yue Zhao, Wai Man Tam:
A 2.0 Gb/s Throughput Decoder for QC-LDPC Convolutional Codes. - Chantal Cherifi, Yvan Rivierre, Jean François Santucci:
A Community Based Algorithm for Large Scale Web Service Composition. - Chantal Cherifi, Jean François Santucci:
A Comparative Study of Web Services Composition Networks. - Chantal Cherifi, Jean François Santucci:
Analyzing Web Services Networks: a WS-NEXT Application. - Chantal Cherifi, Vincent Labatut, Jean François Santucci:
Benefits of Semantics on Web Service Composition from a Complex Network Perspective. - Cihan Aksoy, Vincent Labatut, Chantal Cherifi, Jean François Santucci:
MATAWS: A Multimodal Approach for Automatic WS Semantic Annotation. - Chantal Cherifi:
Similartity Network For Semantic Web Services Substitution. - Chantal Cherifi, Vincent Labatut, Jean François Santucci:
Topological Properties of Web Services Similarity Networks. - Arik Nemtsov, Amir Averbuch, Alon Schclar:
Matrix Compression using the Nystroöm Method. - Mehryar Mohri, Afshin Rostamizadeh:
Perceptron Mistake Bounds. - Aaron Gember
, Anand Krishnamurthy, Saul St. John, Robert Grandl, Xiaoyang Gao, Ashok Anand, Theophilus Benson, Aditya Akella, Vyas Sekar:
Stratos: A Network-Aware Orchestration Layer for Middleboxes in the Cloud. - Dina Dushnik, Alon Schclar, Amir Averbuch:
Video Segmentation via Diffusion Bases. - Tamal Das, Marek Drogon, Admela Jukan, Marco Hoffmann:
An Agent-based Modeling Approach of Network Migration to New Technologies. - Theodore Book, Martha Witick, Dan S. Wallach:
Automated generation of web server fingerprints. - Chantal Cherifi, Vincent Labatut, Jean François Santucci:
Web Services Dependency Networks Analysis. - David I. Spivak:
The operad of wiring diagrams: formalizing a graphical language for databases, recursion, and plug-and-play circuits. - Andrew Adamatzky, Genaro Juárez Martínez:
Bio-imitaiton of Mexican migration routes to the USA with slime mould on 3D terrains. - Zhenyu Guo, Z. Jane Wang:
An Adaptive Descriptor Design for Object Recognition in the Wild. - Paul Tune, Hung X. Nguyen, Matthew Roughan:
Hidden Markov Model Identifiability via Tensors. - Vladimir V. Gusev, Marina I. Maslennikova, Elena V. Pribavkina:
Finitely generated ideal languages and synchronizing automata. - Mauro Femminella, Gianluca Reali, Walter Colitti, Kris Steenhaut:
A Markovian Model for Assessing the Consistency of Vehicular Storage Systems. - Philipp Mayr:
Relevance distributions across Bradford Zones: Can Bradfordizing improve search? - Mauro Femminella, Gianluca Reali, Dario Valocchi, Roberto Francescangeli, Henning Schulzrinne:
Advanced Caching for Distributing Sensor Data through Programmable Nodes. - Arezoo Aghaei Chadegani, Hadi Salehi, Melor Md. Yunus, Hadi Farhadi, Masood Fooladi, Maryam Farhadi, Nader Ale Ebrahim:
A Comparison between Two Main Academic Literature Collections: Web of Science and Scopus Databases. - Masood Fooladi, Hadi Salehi, Melor Md. Yunus, Maryam Farhadi, Arezoo Aghaei Chadegani, Hadi Farhadi, Nader Ale Ebrahim:
Does Criticisms Overcome the Praises of Journal Impact Factor? - Prasanna Chaporkar, Alexandre Proutière:
Optimal Distributed Scheduling in Wireless Networks under the SINR interference model. - Andrzej Cichocki:
Tensor Decompositions: A New Concept in Brain Data Analysis? - Hugo Reboredo, João M. F. Xavier, Miguel R. D. Rodrigues:
Filter Design with Secrecy Constraints: The MIMO Gaussian Wiretap Channel. - Somayeh Danafar, Paola M. V. Rancoita, Tobias Glasmachers, Kevin Whittingstall, Jürgen Schmidhuber:
Testing Hypotheses by Regularized Maximum Mean Discrepancy. - Mathieu Chapelle, Mathieu Liedloff, Ioan Todinca, Yngve Villanger:
TREEWIDTH and PATHWIDTH parameterized by vertex cover. - Julien Leroy:
An S-adic characterization of minimal subshifts with first difference of complexity 1 ≤ p(n+1) - p(n) ≤ 2. - Emily S. Darling, David Shiffman, Isabelle M. Côté, Joshua A. Drew:
The role of twitter in the life cycle of a scientific publication. - Jie Zhou, Gang Yan, Choy Heng Lai:
Efficient routing on multilayered communication networks. - Yoshua Bengio:
Deep Learning of Representations: Looking Forward. - Akitoshi Kawamura, Stephen A. Cook:
Complexity Theory for Operators in Analysis. - Chantal Cherifi, Jean François Santucci:
On Topological Structure of Web Services Networks for Composition. - Chantal Cherifi, Jean François Santucci:
Community Structure in Interaction Web Service Networks. - A. V. Choudhari, N. A. Pande, M. R. Gupta:
Feasibility Analysis of Low Cost Graphical Processing Units for Electromagnetic Field Simulations by Finite Difference Time Domain Method. - Ruoming Jin, Guan Wang:
Simple, Fast, and Scalable Reachability Oracle. - Jaemin Han, Chih-Chun Wang, Ness B. Shroff:
Graph-Theoretic Characterization of The Feasibility of The Precoding-Based 3-Unicast Interference Alignment Scheme. - Ruoming Jin, Ning Ruan, Bo You, Haixun Wang:
Hub-Accelerator: Fast and Exact Shortest Path Computation in Large Social Networks. - Zhi Li, Xiaoqing Zhu, Joshua Gahm, Rong Pan, Hao Hu, Ali C. Begen, Dave Oran:
Probe and Adapt: Rate Adaptation for HTTP Video Streaming At Scale. - Chris Whidden, Robert G. Beiko, Norbert Zeh:
Fixed-Parameter and Approximation Algorithms for Maximum Agreement Forests of Multifurcating Trees. - Ruoming Jin, Yelong Shen, Lin Liu, Xue-wen Chen:
Limiting the Neighborhood: De-Small-World Network for Outbreak Prevention. - Petr Jancar:
Finiteness up to bisimilarity is decidable for pushdown processes. - Sushant Sachdeva, Nisheeth K. Vishnoi:
Matrix Inversion Is As Easy As Exponentiation. - Robert Kleinberg, Yang Yuan:
On the Ratio of Revenue to Welfare in Single-Parameter Mechanism Design. - Marco Bernardo, Rocco De Nicola, Michele Loreti:
A Companion of "Relating Strong Behavioral Equivalences for Processes with Nondeterminism and Probabilities". - Shang Shang, Yuk Hui, Pan Hui, Paul W. Cuff, Sanjeev R. Kulkarni:
Privacy Preserving Recommendation System Based on Groups. - Anelia Somekh-Baruch:
On Achievable Rates for Channels with Mismatched Decoding. - Stephen Clark, Bob Coecke, Edward Grefenstette, Stephen Pulman, Mehrnoosh Sadrzadeh:
A quantum teleportation inspired algorithm produces sentence meaning from word meaning and grammatical structure. - (Withdrawn) Extending Modern SAT Solvers for Enumerating All Models.
- Jirí Adámek, Stefan Milius, Lawrence S. Moss, Lurdes Sousa
:
Well-Pointed Coalgebras. - Changhong Zhao, Ufuk Topcu, Na Li, Steven H. Low:
Power System Dynamics as Primal-Dual Algorithm for Optimal Load Control. - Taha Hassan, Fahad Javed, Naveed Arshad:
An Empirical Investigation of V-I Trajectory based Load Signatures for Non-Intrusive Load Monitoring. - Shuchi Chawla, Jason D. Hartline, David L. Malec, Balasubramanian Sivan:
Prior-Independent Mechanisms for Scheduling. - Hu Fu, Brendan Lucier, Balasubramanian Sivan, Vasilis Syrgkanis:
Cost-Recovering Bayesian Algorithmic Mechanism Design. - Alireza Mahdian, Richard Han, Qin Lv, Shivakant Mishra:
Results from a Practical Deployment of the MyZone Decentralized P2P Social Network. - Redouane Sassioui, Aata El Hamss, Leszek Szczecinski, Mustapha Benjillali:
Resource Allocation for Downlink Channel Transmission Based on Superposition Coding. - Kamlesh Sharma, T. V. Prasad:
CONATION: English Command Input/Output System for Computers. - Fuqiang Chen:
An Improved EM algorithm. - Deqing Wang, Hui Zhang, Rui Liu, Weifeng Lv:
Feature Selection Based on Term Frequency and T-Test for Text Categorization. - Florian Bruse, Oliver Friedmann, Martin Lange:
Guarded Transformation for the Modal mu-Calculus. - Laurent Bulteau
, Christian Komusiewicz:
Minimum Common String Partition Parameterized by Partition Size is Fixed-Parameter Tractable. - Nikola Serafimovski, Abdelhamid Younis, Raed Mesleh, Pat Chambers, Marco Di Renzo, Cheng-Xiang Wang, Peter M. Grant, Mark A. Beach, Harald Haas:
Practical Implementation of Spatial Modulation. - Fuqiang Chen:
Spectral Classification Using Restricted Boltzmann Machine. - Ayad Ghany Ismaeel
, Raghad Zuhair Yousif, Essa F. Abdallh:
GUI Based Automatic Remote Control of Gas Reduction System using PIC Microcontroller. - Joan Boyar, Sushmita Gupta, Kim S. Larsen:
Relative Interval Analysis of Paging Algorithms on Access Graphs. - Ayad Ghany Ismaeel
, Sanaa Enwaya Rizqo:
Optimal Productivity of Succoring Patients System using Mobile GIS Based on WCF Technology. - Julian Arz, Johannes Fischer:
LZ-Compressed String Dictionaries. - Chantal Cherifi, Vincent Labatut, Jean François Santucci:
On Flexible Web Services Composition Networks. - Eyke Hüllermeier:
Learning from Imprecise and Fuzzy Observations: Data Disambiguation through Generalized Loss Minimization. - Nima Asadi, Jimmy Lin:
Fast, Incremental Inverted Indexing in Main Memory for Web-Scale Collections. - Nina Evseenko:
New hybrid distributed voting algorithm. - Onur Tan, Deniz Gündüz, H. Vincent Poor:
Increasing Smart Meter Privacy Through Energy Harvesting and Storage Devices. - Philipp Kindermann, Benjamin Niedermann, Ignaz Rutter, Marcus Schaefer, André Schulz, Alexander Wolff:
Multi-Sided Boundary Labeling. - Michael Hamann, Tanja Hartmann, Dorothea Wagner:
Hierarchies of Predominantly Connected Communities. - Matthew Crossley, Andy Nisbet, Martyn Amos:
Quantifying the Impact of Parameter Tuning on Nature-Inspired Algorithms. - Magnus Bordewich, Catherine S. Greenhill, Viresh Patel:
Mixing of the Glauber dynamics for the ferromagnetic Potts model. - Jonathan D. Hauenstein, Christian Ikenmeyer, J. M. Landsberg:
Computer aided methods for lower bounds on the border rank. - Daniel Dietsch, Andreas Podelski, Jaechang Nam, Pantelis M. Papadopoulos, Martin Schäf:
Monitoring Student Activity in Collaborative Software Development. - Manas Paul, Jyotsna Kumar Mandal:
A Novel Symmetric Key Cryptographic Technique at Bit Level Based on Spiral Matrix Concept. - YuLong Zou, Xianbin Wang, Weiming Shen:
Optimal Relay Selection for Physical-Layer Security in Cooperative Wireless Networks. - Jinchun Zhan, Namrata Vaswani:
Time Invariant Error Bounds for Modified-CS based Sparse Signal Sequence Recovery. - Yossi Gilad, Amir Herzberg, Haya Schulmann:
Off-Path Hacking: The Illusion of Challenge-Response Authentication. - Çagdas Çalik:
Nonlinearity Computation for Sparse Boolean Functions. - Sarasvathi V., N. Ch. S. N. Iyengar, Snehanshu Saha:
Interference Aware Channel Assignmnet Using Edge Coloring in Multi-Channel Multi-Radio Wireless Mesh Networks. - Chun Meng, Abhik Kumar Das, Abinesh Ramakrishnan, Syed Ali Jafar, Athina Markopoulou, Sriram Vishwanath:
Precoding-Based Network Alignment For Three Unicast Sessions. - Sameer Pawar, Kannan Ramchandran:
Computing a k-sparse n-length Discrete Fourier Transform using at most 4k samples and O(k log k) complexity. - Weifeng Liu, Xiaomeng Wang, Yanjiang Wang:
Dictionary learning based image enhancement for rarity detection. - Riccardo Pucella:
Knowledge and Security. - Hemal Shah, Yogeshwar Kosta, Vikrant Patel:
Characterizing and Evaluation :Temporal properties of real and synthetic datasets for DTN. - Ursula Martin, Alison Pease:
Mathematical practice, crowdsourcing, and social machines. - Ursula Martin, Alison Pease:
What does mathoverflow tell us about the production of mathematics? - Mostafa H. Dahshan:
Maximum-Bandwidth Node-Disjoint Paths. - Luca Barletta, Flaminio Borgonovo, Matteo Cesana:
An Asymptotically Efficient Backlog Estimate for Dynamic Frame Aloha. - Amir M. Ben-Amram:
A Comment on Budach's Mouse-in-an-Octant Problem. - Jalaluddin Qureshi, Chuan Heng Foh, Jianfei Cai:
Primer and Recent Developments on Fountain Codes. - M. A. Khayer Azad, Md. Shafiqul Islam, M. M. A. Hashem:
On Comparison between Evolutionary Programming Network-based Learning and Novel Evolution Strategy Algorithm-based Learning. - Fatima Boumahdi:
Endow a service-oriented architecture by a decisional aspect. - Debajyoti Mukhopadhyay, Manoj Sharma, Gajanan Joshi, Trupti Pagare, Adarsha Palwe:
Intelligent Agent Based Semantic Web in Cloud Computing Environment. - Piotr Faliszewski, Edith Hemaspaandra, Lane A. Hemaspaandra:
Weighted Electoral Control. - Martin Haenggi:
A Versatile Dependent Model for Heterogeneous Cellular Networks. - Iddo Tzameret:
On Sparser Random 3SAT Refutation Algorithms and Feasible Interpolation. - Grenville J. Croll
:
BiEntropy - The Approximate Entropy of a Finite Binary String. - Russell Ford, Changkyu Kim, Sundeep Rangan:
Opportunistic Third-Party Backhaul for Cellular Wireless Networks. - William Graham Hoover, Carol Griswold Hoover:
Time-Reversible Random Number Generators : Solution of Our Challenge by Federico Ricci-Tersenghi. - Yuan Zhang:
Optimization Approach to Parametric Tuning of Power System Stabilizer Based on Trajectory Sensitivity Analysis. - Charith Perera, Arkady B. Zaslavsky, Peter Christen, Dimitrios Georgakopoulos:
Context Aware Computing for The Internet of Things: A Survey. - Sun Sun, Min Dong, Ben Liang:
Real-Time Welfare-Maximizing Regulation Allocation in Dynamic Aggregator-EVs System. - Ji Won Yoon, Nial Friel:
Efficient Estimation of the number of neighbours in Probabilistic K Nearest Neighbour Classification. - Geoffroy Ville:
An Optimal Mastermind (4,7) Strategy and More Results in the Expected Case. - Vincent K. N. Lau, Fan Zhang, Ying Cui:
Low Complexity Delay-Constrained Beamforming for Multi-User MIMO Systems with Imperfect CSIT. - (Withdrawn) Simple Deep Random Model Ensemble.
- Ahmed Drissi, Ahmed Asimi:
A New Approch to Decoding of Rational Irreducible Goppa code. - Andrea Mercurio, Alessandro Di Giorgio, Fabio Purificato:
Optimal Fully Electric Vehicle load balancing with an ADMM algorithm in Smartgrids. - Firas Ajil Jassim, Fawzi H. Altaani:
Hybridization of Otsu Method and Median Filter for Color Image Segmentation. - Jaroslav Horácek, Milan Hladík:
Subsquares Approach - Simple Scheme for Solving Overdetermined Interval Linear Systems. - Laura Giordano, Valentina Gliozzi, Nicola Olivetti, Gian Luca Pozzato:
On Rational Closure in Description Logics of Typicality. - Shahriar Etemadi Tajbakhsh, Parastoo Sadeghi:
Random Linear Network Codes for Secrecy over Wireless Broadcast Channels. - Olav Geil, Stefano Martin:
Further improvements on the Feng-Rao bound for dual codes. - Luis I. Reyes Castro, Pratik Chaudhari, Jana Tumova, Sertac Karaman, Emilio Frazzoli, Daniela Rus:
Incremental Sampling-based Algorithm for Minimum-violation Motion Planning. - Tommaso Urli:
json2run: a tool for experiment design & analysis. - Djallel Bouneffouf:
Towards User Profile Modelling in Recommender System. - John Augustine, Anisur Rahaman Molla, Ehab Morsy, Gopal Pandurangan, Peter Robinson, Eli Upfal:
Storage and Search in Dynamic Peer-to-Peer Networks. - Urmila Shrawankar, Vilas M. Thakare:
Acoustic Echo Cancellation Postfilter Design Issues For Speech Recognition System. - Urmila Shrawankar, Vilas M. Thakare:
Techniques for Feature Extraction In Speech Recognition System : A Comparative Study. - Daoshun Wang, Ziwei Ye, Xiaobo Li:
How to Collaborate between Threshold Schemes. - Darko Dimitrov:
Efficient computation of trees with minimal atom-bond connectivity index. - Timo Bingmann, Peter Sanders:
Parallel String Sample Sort. - Lucas Paletta, Katrin Santner, Gerald Fritz, Albert Hofmann, Gerald Lodron, Georg Thallinger, Heinz Mayer:
A Computer Vision System for Attention Mapping in SLAM based 3D Models. - Mostepha Redouane Khouadjia, Marc Schoenauer, Vincent Vidal, Johann Dréo, Pierre Savéant:
Multi-Objective AI Planning: Comparing Aggregation and Pareto Approaches. - Frédéric Chazal, Jian Sun:
Gromov-Hausdorff Approximation of Metric Spaces with Linear Structure. - Jiri Filipovic, Matus Madzin, Jan Fousek, Ludek Matyska:
Optimizing CUDA Code By Kernel Fusion---Application on BLAS. - Mohammad Reza Khanzadi, Dan Kuylenstierna, Thomas Eriksson, Herbert Zirath:
Calculation of the Performance of Communication Systems from Measured Oscillator Phase Noise. - Thomas Feulner:
Canonical Forms and Automorphisms in the Projective Space. - Leslie N. Smith:
How to find real-world applications for compressive sensing. - Juan Cardelino, Vicent Caselles, Marcelo Bertalmío, Gregory Randall:
A Contrario Selection of Optimal Partitions for Image Segmentation. - Nicolás Robinson-García, Jose G. Moreno-Torres, Daniel Torres-Salinas, Emilio Delgado López-Cózar, Francisco Herrera:
The role of national university rankings in an international context: the case of the I-UGR Rankings of Spanish universities. - Mario Blaum, James S. Plank:
Construction of two SD Codes. - Jesper Larsson Träff:
A Note on (Parallel) Depth- and Breadth-First Search by Arc Elimination. - Farzad Rezaei, Charalambos D. Charalambous, Photios A. Stavrou:
Rate Distortion Function for a Class of Relative Entropy Sources. - Edwin Chobot, Daniel Newby, Renee Chandler, Nusaybah Abu-Mulaweh, Chao Chen, Carlos A. Pomalaza-Raez:
Design and Implementation of a Wireless Sensor and Actuator Network for Energy Measurement and Control at Home. - Grasha Jacob
, A. Murugan:
An Encryption Scheme with DNA Technology and JPEG Zigzag Coding for Secure Transmission of Images. - Xiang Ying, Shi-Qing Xin, Ying He:
Parallel Chen-Han (PCH) Algorithm for Discrete Geodesics. - Martin Dietzfelbinger, Philipp Woelfel:
Tight Lower Bounds for Greedy Routing in Higher-Dimensional Small-World Grids. - David Bamman, Noah A. Smith:
New Alignment Methods for Discriminative Book Summarization. - Quan Geng, Pramod Viswanath:
The Optimal Mechanism in $(ε,δ)$-Differential Privacy. - Arnim Bleier, Andreas Strotmann:
Towards an Author-Topic-Term-Model Visualization of 100 Years of German Sociological Society Proceedings. - Faouzi Benzarti, Hamid Amiri:
Speckle Noise Reduction in Medical Ultrasound Images. - Anupam Gupta, Kunal Talwar, David Witmer:
Sparsest Cut on Bounded Treewidth Graphs: Algorithms and Hardness Results. - Alexandr Andoni, Rina Panigrahy:
A Differential Equations Approach to Optimizing Regret Trade-offs. - Wei Gao, Rong Jin, Shenghuo Zhu, Zhi-Hua Zhou:
One-Pass AUC Optimization. - Fan Min, William Zhu:
Granular association rules for multi-valued data. - Fan Min, William Zhu:
Cold-start recommendation through granular association rules. - Rob Gysel:
Unique Perfect Phylogeny Characterizations via Uniquely Representable Chordal Graphs. - Matías Di Martino, Guzmán Hernández, Marcelo Fiori, Alicia Fernández:
A new framework for optimal classifier design. - Himanshu Tyagi, Prakash Narayan:
How Many Queries Will Resolve Common Randomness? - Feng Pan, Aaron Schild:
Interdiction Problems on Planar Graphs. - Jin-Yi Cai, Zhiguo Fu:
A Collapse Theorem for Holographic Algorithms with Matchgates on Domain Size at Most 4. - Shahriar Etemadi Tajbakhsh, Parastoo Sadeghi, Rodney A. Kennedy:
Centralized and Cooperative Transmission of Secure Multiple Unicasts using Network Coding. - Peter Wittek:
Somoclu: An Efficient Distributed Library for Self-Organizing Maps. - Urmila Shrawankar, Vilas M. Thakare:
Speech Enhancement Modeling Towards Robust Speech Recognition System. - Xiaoxiao Wu, Wing-Kin Ma, Anthony Man-Cho So:
Achievable Rate Derivations and Further Simulation Results for "Physical-Layer Multicasting by Stochastic Transmit Beamforming and Alamouti Space-Time Coding". - Urmila Shrawankar, Vilas M. Thakare:
Speech based Password Protected Cyber Applications. - Urmila Shrawankar, Anjali Mahajan:
Speech User Interface for Information Retrieval. - Ahmad Gharanjik, Bhavani Shankar Mysore Rama Rao, Pantelis-Daniel M. Arapoglou, Björn E. Ottersten:
Gateway Switching in Q/V Band Satellite Feeder Links. - Renyuan Zhang, Kai Cai, Yongmei Gan, Zhaoan Wang, Walter Murray Wonham:
Supervision Localization of Timed Discrete-Event Systems. - Mehmet Kayaoglu, Berkay Topcu, Umut Uludag:
Standard Fingerprint Databases: Manual Minutiae Labeling and Matcher Performance Analyses. - Pier Stanislao Paolucci
, Iuliana Bacivarov, Gert Goossens, Rainer Leupers, Frédéric Rousseau, Christoph Schumacher, Lothar Thiele, Piero Vicini
:
EURETILE 2010-2012 summary: first three years of activity of the European Reference Tiled Experiment. - Rushan Ziatdinov, Kenjiro T. Miura:
On the variety of planar spirals and their applications in computer aided design. - Bernhard Haslhofer, Simeon Warner, Carl Lagoze, Martin Klein, Robert Sanderson, Michael L. Nelson, Herbert Van de Sompel:
ResourceSync: Leveraging Sitemaps for Resource Synchronization. - Luciano Pandolfi:
Sharp control time for viscoelastic bodys. - Abdelhamid Younis, Sinan Sinanovic, Marco Di Renzo, Raed Mesleh, Harald Haas:
Generalised Sphere Decoding for Spatial Modulation. - Clemens G. Raab:
Generalization of Risch's Algorithm to Special Functions. - Daniel Torres-Salinas, Nicolás Robinson-García, Alvaro Cabezas-Clavijo, Evaristo Jiménez-Contreras:
Analyzing the citation characteristics of books: edited books, book series and types of publishers in the Book Citation Index. - Alvaro Cabezas-Clavijo, Nicolás Robinson-García, Daniel Torres-Salinas, Evaristo Jiménez-Contreras, Thomas Mikulka, Christian Gumpenberger
, Ambros Wemisch, Juan Gorraiz:
Most borrowed is most cited? Library loan statistics as a proxy for monograph selection in citation indexes. - Paul de Kerret, Maxime Guillaud, David Gesbert:
Degrees of Freedom of Certain Interference Alignment Schemes with Distributed CSIT. - Hong-Han Shuai, De-Nian Yang, Philip S. Yu, Ming-Syan Chen:
Willingness Optimization for Social Group Activity. - Ney Renau-Ferrer, Céline Rémi:
A Method for Visuo-Spatial Classification of Freehand Shapes Freely Sketched. - Saif Khan Mohammed, Erik G. Larsson:
Constant-Envelope Multi-User Precoding for Frequency-Selective Massive MIMO Systems. - Andrei Yu. Rumyantsev, Alexander Shen:
Probabilistic Constructions of Computable Objects and a Computable Version of Lovász Local Lemma. - M. A. Sorokina, S. K. Turitsyn:
Shannon capacity of nonlinear regenerative channels. - Alessandro Andrioni:
A Clifford Algebra approach to the Discretizable Molecular Distance Geometry Problem. - Aria Ghasemian Sahebi, S. Sandeep Pradhan:
Abelian Group Codes for Source Coding and Channel Coding. - Yu Cheng, Florin Rusu:
Formal Representation of the SS-DB Benchmark and Experimental Evaluation in EXTASCID. - Dmitry Namiot:
Location sharing without the central server. - José Hernández-Orallo:
A short note on estimating intelligence from user profiles in the context of universal psychometrics: prospects and caveats. - Alberto Savioli, Emanuele Goldoni, Pietro Savazzi, Paolo Gamba:
Low Complexity Indoor Localization in Wireless Sensor Networks by UWB and Inertial Data Fusion. - Boudjemaa Boudaa
:
Vers une Substitution des Services Web sans Inconsistance Sémantique. - Thiago Christiano Silva, Liang Zhao:
High Level Pattern Classification via Tourist Walks in Networks. - Konstantin Makarychev, Yury Makarychev, Aravindan Vijayaraghavan:
Bilu-Linial Stable Instances of Max Cut. - Nicholas Downing, Thibaut Feydy, Peter J. Stuckey:
Unsatisfiable Cores for Constraint Programming. - Yajun Wang, Sam Chiu-wai Wong:
Online Vertex Cover and Matching: Beating the Greedy Algorithm. - Rushi Longadge, Snehalata Dongre:
Class Imbalance Problem in Data Mining Review. - Meenesh Bhardwaj:
Optimization of stochastic database cracking. - Ziyi Su, Frédérique Biennier:
On attribute-based usage control policy ratification for cooperative computing context. - Duo Xu:
A Simple Technique for the Converse of Finite Blocklength Multiple Access Channels. - Duo Xu:
The Redundancy of Slepian-Wolf Coding Revisited. - Mark Thamm, Arnim Bleier:
When Politicians Tweet: A Study on the Members of the German Federal Diet. - Rushan Ziatdinov, Rifkat I. Nabiyev, Kenjiro T. Miura:
MC-curves and aesthetic measurements for pseudospiral curve segments. - Joong Chae Na, Heejin Park, Maxime Crochemore, Jan Holub, Costas S. Iliopoulos, Laurent Mouchard, Kunsoo Park:
Suffix Tree of Alignment: An Efficient Index for Similar Data. - Djallel Bouneffouf:
Mobile Recommender Systems Methods: An Overview. - Adam Noel, Karen C. Cheung, Robert Schober:
Improving Diffusion-Based Molecular Communication with Unanchored Enzymes. - Laurent Jacques, Kévin Degraux, Christophe De Vleeschouwer:
Quantized Iterative Hard Thresholding: Bridging 1-bit and High-Resolution Quantized Compressed Sensing. - Djallel Bouneffouf:
Evolution of the user's content: An Overview of the state of the art. - Adam Noel, Karen C. Cheung, Robert Schober:
Using Dimensional Analysis to Assess Scalability and Accuracy in Molecular Communication. - Federico Ricci-Tersenghi:
The solution to the challenge in "Time-Reversible Random Number Generators" by Wm. G. Hoover and Carol G. Hoover. - Marc Hellmuth, Manuel Noll, Lydia Ostermeier:
Strong Products of Hypergraphs: Unique Prime Factorization Theorems and Algorithms. - Ward Jaradat, Alan Dearle, Adam Barker:
A Dataflow Language for Decentralised Orchestration of Web Service Workflows. - Ward Jaradat, Alan Dearle, Adam Barker:
An Architecture for Decentralised Orchestration of Web Service Workflows. - (Withdrawn) Knowledge Networks Analysis.
- Gaurav Pande:
Performance Evaluation of Video Communications over 4G Network. - Hong Xie, John C. S. Lui:
Mathematical Modeling of Product Rating: Sufficiency, Misbehavior and Aggregation Rules. - Subhash C. Kak:
Residue Classes of the PPT Sequence. - Alexander V. Mamonov, Isabel N. Figueiredo, Pedro N. Figueiredo, Yen-Hsi Richard Tsai:
Automated polyp detection in colon capsule endoscopy. - Yin Tat Lee, Aaron Sidford:
Efficient Accelerated Coordinate Descent Methods and Faster Algorithms for Solving Linear Systems. - Urmila Shrawankar, Anjali Mahajan:
Speech: A Challenge to Digital Signal Processing Technology for Human-to-Computer Interaction. - Adam Noel, Karen C. Cheung, Robert Schober:
Improving Receiver Performance of Diffusive Molecular Communication with Enzymes. - Elena Camossi, Paola Villa, Luca Mazzola:
Semantic-based Anomalous Pattern Discovery in Moving Object Trajectories. - Tom Froese, Carlos Gershenson, David A. Rosenblueth:
The Dynamically Extended Mind -- A Minimal Modeling Case Study. - Nate Derbinsky, José Bento, Veit Elser, Jonathan S. Yedidia:
An Improved Three-Weight Message-Passing Algorithm. - Irit Dinur, David Steurer:
Analytical Approach to Parallel Repetition. - Madhur Srivastava, Satish Kumar Singh, Prasanta K. Panigrahi:
A Statistical Method for Non-Linear Quantization in Lossy JPEG2000 Compression. - David L. Dowe, José Hernández-Orallo:
On the universality of cognitive tests. - Sawood Alam, Charles L. Cartledge, Michael L. Nelson:
HTTP Mailbox - Asynchronous RESTful Communication. - Keehang Kwon:
Expressing Algorithms As Concise As Possible via Computability Logic. - Jierui Xie, Mingming Chen, Boleslaw K. Szymanski:
LabelRankT: Incremental Community Detection in Dynamic Networks via Label Propagation. - Jakub Bulin, Dejan Delic, Marcel Jackson
, Todd Niven:
On the reduction of the CSP dichotomy conjecture to digraphs. - Alexander Herzog, Ludovic Righetti, Felix Grimminger, Peter Pastor, Stefan Schaal:
Momentum-based Balance Control for Torque-controlled Humanoids. - Francis T. O'Donovan, Connie Fournelle, Steve Gaffigan, Oliver Brdiczka, Jianqiang Shen, Juan Liu, Kendra E. Moore:
Characterizing User Behavior and Information Propagation on a Social Multimedia Network. - Jacek Sroka, Krzysztof Stencel, Jerzy Tyszkiewicz:
Translating Relational Queries into Spreadsheets. - Sushmita Gupta, Shahin Kamali, Alejandro López-Ortiz:
On Advice Complexity of the k-server Problem under Sparse Metrics. - YuLong Zou, Xianbin Wang, Weiming Shen:
Intercept Probability Analysis of. - Xiaoxiao Wu, Wing-Kin Ma, Anthony Man-Cho So:
Physical-Layer Multicasting by Stochastic Transmit Beamforming and Alamouti Space-Time Coding. - Klaus Glashoff, Michael M. Bronstein:
Almost-commuting matrices are almost jointly diagonalizable. - Minh Ngo, Fabio Massacci, Olga Gadyatskaya:
MAP-REDUCE Runtime Enforcement of Information Flow Policies. - Hamed Maleki, Syed Ali Jafar:
Optimality of Orthogonal Access for One-dimensional Convex Cellular Networks. - Julien Herzen, Cédric Westphal, Patrick Thiran:
Scalable Routing Easy as PIE: a Practical Isometric Embedding Protocol (Technical Report). - Shenghuo Zhu:
Stochastic gradient descent algorithms for strongly convex functions at O(1/T) convergence rates. - Faouzi Benzarti, Hamid Amiri:
Repairing and Inpainting Damaged Images using Diffusion Tensor. - Robin Houston:
Linear Logic without Units. - Tianyang Bai, Robert W. Heath Jr.:
Asymptotic Coverage Probability and Rate in Massive MIMO Networks. - Andrew W. Eckford, Peter J. Thomas:
Capacity of a Simple Intercellular Signal Transduction Channel. - Madhur Srivastava, Prasanta K. Panigrahi:
Quantum Image Representation Through Two-Dimensional Quantum States and Normalized Amplitude. - William Yang Wang, Kathryn Mazaitis, William W. Cohen:
Programming with Personalized PageRank: A Locally Groundable First-Order Probabilistic Logic. - Mostepha Redouane Khouadjia, Marc Schoenauer, Vincent Vidal, Johann Dréo, Pierre Savéant:
Quality Measures of Parameter Tuning for Aggregated Multi-Objective Temporal Planning. - Fang Wang, Yi Li:
Beyond Physical Connections: Tree Models in Human Pose Estimation. - Seung Min Yu, Jinho Choi, Seong-Lyun Kim:
Spreading Information in Mobile Wireless Networks. - Omer Faruk Sozcu, Rushan Ziatdinov, Ismail Ipek:
The effects of computer assisted and distance learning of geometric modelling. - Chengfeng Wen, Lok Ming Lui:
Geometric Registration of High-genus Surfaces. - Klaus von Gleissenthall, Andrey Rybalchenko:
An Epistemic Perspective on Consistency of Concurrent Computations. - Joshua Bialkowski, Michael W. Otte, Emilio Frazzoli:
Fast Collision Checking: From Single Robots to Multi-Robot Teams. - Sowmyan Jegatheesan
:
Cookies Invading Our Privacy for Marketing Advertising and Security Issues. - Yehia El-khatib, Gordon S. Blair, Bholanathsingh Surajbali:
Experiences of Using a Hybrid Cloud to Construct an Environmental Virtual Observatory. - Harimalala Razanamanampisoa, Zely Arivelo Randriamanantany, Hery Tiana Rakotondramiarana, François Garde, Harry Boyer:
Simulation of a typical house in the region of Antananarivo, Madagascar. Determination of passive solutions using local materials. - Martin Hoefer, Thomas Kesselheim:
Universally Truthful Secondary Spectrum Auctions. - Rashmi Makhijani, Urmila Shrawankar, Vilas M. Thakare:
Speech Enhancement Using Pitch Detection Approach For Noisy Environment. - David P. Wipf, Haichao Zhang:
Revisiting Bayesian Blind Deconvolution. - Deepali Virmani, Dhruv Talwar, Arun Dhingra, Tushar Bahl:
Priority Based Energy-Efficient Data Forwarding Algorithm in Wireless Sensor Networks. - Deepali Virmani, Satbir Jain:
Scalable, Robust and Real Time Communication Architecture For Wireless Sensor Networks. - Klaus Glashoff, Michael M. Bronstein:
Asymptotic metrics on the space of matrices under the commutation relation. - Mohammad Ali Javidian, Rasoul Ramezanian:
Disappointment in Social Choice Protocols. - Jianxin Liao, Lei Zhang, Xiaomin Zhu, Jingyu Wang, Minyan Liao:
Loss Rate Based Fountain Codes for Data Transfer. - Shafigh Parsazad, Ehsan Saboori, Amin Allahyar:
Fast Feature Reduction in intrusion detection datasets. - Kohtaro Tadaki, Norihisa Doi:
Cryptography and Algorithmic Randomness. - Toshiro Kubota, Jessica Ranck, Briley Acker, Herman De Haan:
Shape Reconstruction and Recognition with Isolated Non-directional Cues. - Mikal Ziane, Mel Ó Cinnéide:
The Case for Explicit Coupling Constraints. - James J. Cusick:
Architecture and Production Readiness Reviews in Practice. - Djallel Bouneffouf:
Exponentiated Gradient LINUCB for Contextual Multi-Armed Bandits. - Thierry Moreau:
Towards a Better Approximation of Full Domain Hash - or - The Reef and Shoal Integrity Arrangement. - Yakov Babichenko:
Small Support Equilibria in Large Games. - Chao Tian:
Rate Region of the (4,3,3) Exact-Repair Regenerating Codes. - Itai Feigenbaum, Jay Sethuraman, Chun Ye:
Approximately Optimal Mechanisms for Strategyproof Facility Location: Minimizing $L_p$ Norm of Costs. - James R. Foulds, Levi Boyles, Christopher DuBois, Padhraic Smyth, Max Welling:
Stochastic Collapsed Variational Bayesian Inference for Latent Dirichlet Allocation. - Jonathan Starr, Omar El Ayach, Robert W. Heath Jr.:
Interference Alignment in Distributed Antenna Systems. - Omar El Ayach, Sridhar Rajagopal, Shadi Abu-Surra, Zhouyue Pi, Robert W. Heath Jr.:
Spatially Sparse Precoding in Millimeter Wave MIMO Systems. - Sonia Pérez-Díaz, Li-Yong Shen:
Characterization of Rational Ruled Surfaces. - Sonia Pérez-Díaz, Li-Yong Shen:
Determination and (re)parametrization of rational developable surfaces. - Takayuki Nozaki, Masaki Maehara, Kenta Kasai, Kohichi Sakaniwa:
Weight Distribution for Non-binary Cluster LDPC Code Ensemble. - Boris Mitavskiy, Jun He:
Combining Drift Analysis and Generalized Schema Theory to Design Efficient Hybrid and/or Mixed Strategy EAs. - Svetlana Selivanova, Victor L. Selivanov:
Computing Solution Operators of Boundary-value Problems for Some Linear Hyperbolic Systems of PDEs. - Boris Mitavskiy, Jun He:
A Further Generalization of the Finite-Population Geiringer-like Theorem for POMDPs to Allow Recombination Over Arbitrary Set Covers. - Ramkumar Lakshminarayanan, R. D. Balaji, Binod Kumar, Malathi Balaji:
Augmented Reality in ICT for Minimum Knowledge Loss. - Boris Mitavskiy, Elio Tuci, Chris Cannings, Jonathan E. Rowe, Jun He:
Geiringer Theorems: From Population Genetics to Computational Intelligence, Memory Evolutive Systems and Hebbian Learning. - Purushottam Kar, Bharath K. Sriperumbudur, Prateek Jain, Harish Karnick:
On the Generalization Ability of Online Learning Algorithms for Pairwise Loss Functions. - Rina Foygel, Lester W. Mackey:
Corrupted Sensing: Novel Guarantees for Separating Structured Signals. - Stéphane Ross, Jiaji Zhou, Yisong Yue, Debadeepta Dey, J. Andrew Bagnell:
Learning Policies for Contextual Submodular Prediction. - Dmitry Kosolobov, Mikhail Rubinchik, Arseny M. Shur:
Finding Distinct Subpalindromes Online. - Ashwinkumar Badanidiyuru, Robert Kleinberg, Aleksandrs Slivkins:
Bandits with Knapsacks. - Raúl H. Etkin, Farzad Parvaresh, Ilan Shomorony, Amir Salman Avestimehr:
On Min-Cut Algorithms for Half-Duplex Relay Networks. - Jun Wang, Xi Xiong, Peng Liu:
Practical Fine-grained Privilege Separation in Multithreaded Applications. - Kartik Talamadupula, Octavian Udrea, Anton Riabov, Anand Ranganathan:
Strategic Planning for Network Data Analysis. - Elad Domanovitz, Uri Erez:
On the Performance Limits of Scalar Coding Over MISO Channels. - R. D. Balaji, Brijesh Ramniklal, N. Balasupramanian, Er. R. Malathi:
Mnemonics for Higher Education Using Contemporary Technologies. - Ramkumar Lakshminarayanan, Binod Kumar, M. Raju:
Cloud Computing Benefits for Educational Institutions. - (Withdrawn) (k,m)-connectivity in Mobile Clustered Wireless Networks.
- Mark Korenblit:
Full Square Rhomboids and Their Algebraic Expressions. - Sheng Li, Rodrigo C. de Lamare:
Adaptive Frequency Domain Detectors for SC-FDE in Multiuser DS-UWB Systems with Structured Channel Estimation and Direct Adaptation. - Mark Korenblit, Vadim E. Levit:
On the Optimal Representation of Algebraic Expressions of Fibonacci Graphs. - Mark Korenblit, Vadim E. Levit:
Fibonacci Graphs and their Expressions. - Matus Telgarsky:
Boosting with the Logistic Loss is Consistent. - Samuel Zbarsky:
On Improved Bounds on Bounded Degree Spanning Trees for Points in Arbitrary Dimension. - Lawrence Ong, Fabian Lim, Chin Keong Ho:
The Multi-Sender Multicast Index Coding. - Sulaiman S. AlDahri:
A study for the effect of the Emphaticness and language and dialect for Voice Onset Time (VOT) in Modern Standard Arabic (MSA). - Achraf Karray, Rym Teyeb, Maher Ben Jemaa:
A Heuristic Approach for Web-Service Discovery and Selection. - Ali Tourani, Amir Seyed Danesh:
Using Exclusive Web Crawlers to Store Better Results in Search Engines' Database. - Duc Phu Chau, Monique Thonnat, François Brémond:
Automatic Parameter Adaptation for Multi-object Tracking. - Duc-Phong Le:
Further Refinements of Miller Algorithm on Edwards curves. - Ahmad Alamgir Khan:
Preventing Phishing Attacks using One Time Password and User Machine Identification. - Rafiullah Khan, Shaukat Ali:
Conceptual Framework of Redundant Link Aggregation. - Ijaz Bukhari:
Early Detection of Alzheimer's - A Crucial Requirement. - Samet Oymak, Babak Hassibi:
Asymptotically Exact Denoising in Relation to Compressed Sensing. - Said Broumi:
Generalized Neutrosophic Soft Set. - Gergely Neu, Gábor Bartók:
An efficient algorithm for learning with semi-bandit feedback. - Sylvain Guillemot, Dániel Marx:
A faster FPT algorithm for Bipartite Contraction. - Ahmet A. Husainov, Ekaterina S. Kudryashova:
Time Estimation Model of Concurrent Computing Systems. - Oumair Naseer, Rana Atif Ali Khan:
Hybrid fuzzy logic and pid controller based ph neutralization pilot plant. - Issam Sahmoudi, Abdelmonaime Lachkar:
Clustering Web Search Results For Effective Arabic Language Browsing. - Oumair Naseer, Ayesha Naseer, Rana Atif Ali Khan, Humza Naseer:
Using Page Size for Controlling Duplicate Query Results in Semantic Web. - François Mériaux, Samson Lasaulce, Hamidou Tembine:
Stochastic Differential Games and Energy-Efficient Power Control. - Nahier Aldhafferi, Charles Watson, A. S. M. Sajeev:
Personal Information Privacy Settings of Online Social Networks and their Suitability for Mobile Internet Devices. - Marc Gillé:
OBDD-Based Representation of Interval Graphs. - Xu Chen, François Mériaux, Stefan Valentin:
Predicting a User's Next Cell With Supervised Learning Based on Channel States. - Philip Bille, Patrick Hagge Cording, Inge Li Gørtz, Benjamin Sach, Hjalte Wedel Vildhøj, Søren Vind:
Fingerprints in Compressed Strings. - Fabian Pedregosa, Michael Eickenberg, Bertrand Thirion, Alexandre Gramfort:
HRF estimation improves sensitivity of fMRI encoding and decoding models. - Volker Pohl, Fanny Yang, Holger Boche:
Phaseless Signal Recovery in Infinite Dimensional Spaces using Structured Modulations. - Arthur J. Redfern, Kun Shi:
Quantization Noise Shaping for Information Maximizing ADCs. - Preeti Badar, Urmila Shrawankar:
Human Mood Detection For Human Computer Interaction. - Shweta V. Jain, Urmila Shrawankar:
Image Optimization and Prediction. - Rahila Patel, Urmila Shrawankar, Mukesh M. Raghuwanshi, Anil N. Jaiswal:
Performance Enhancement of Distributed Quasi Steady-State Genetic Algorithm. - Khushboo Thakkar, Urmila Shrawankar:
Test Model for Text Categorization and Text Summarization. - Andreas Kosmatopoulos, Kostas Tsichlas:
Dynamic Top-$k$ Dominating Queries. - Smita Narendra Pathak, Urmila Shrawankar:
Infrastructure to Vehicle Real Time Secured Communication. - Sumedha Chokhandre, Urmila Shrawankar:
An Algorithm to Improve Performance over Multihop Wireless Mesh Network. - Vinay Kapse, Urmila Shrawankar:
Interference-Aware Channel Assignment for Maximizing Throughput in WMN. - Rashmi Makhijani, Urmila Shrawankar, Vilas M. Thakare:
Opportunities & Challenges In Automatic Speech Recognition. - Neema Mishra, Urmila Shrawankar, Vilas M. Thakare:
An Overview of Hindi Speech Recognition. - Sultan Ullah, Xuefeng Zheng, Feng Zhou:
TCloud: A Dynamic Framework and Policies for Access Control across Multiple Domains in Cloud Computing. - Giovanni Viglietta:
Face-Guarding Polyhedra. - Ricardo Fabbri, Ivan N. Bastos, Francisco Duarte Moura Neto, Francisco J. P. Lopes, Wesley Nunes Gonçalves, Odemir Martinez Bruno:
Multi-q Pattern Classification of Polarization Curves. - Kiril Solovey, Oren Salzman, Dan Halperin:
Finding a Needle in an Exponential Haystack: Discrete RRT for Exploration of Implicit Roadmaps in Multi-Robot Motion Planning. - Renato B. Abreu, Lucas C. Cordeiro, Eddie B. L. Filho:
Verifying Fixed-Point Digital Filters using SMT-Based Bounded Model Checking. - Andreas Galanis, Daniel Stefankovic, Eric Vigoda:
Inapproximability for Antiferromagnetic Spin Systems in the Tree Non-Uniqueness Region. - Reza Farrahi Moghaddam, Fereydoun Farrahi Moghaddam, Mohamed Cheriet:
Unsupervised ensemble of experts (EoE) framework for automatic binarization of document images. - Neema Mishra, Urmila Shrawankar, Vilas M. Thakare:
Automatic Speech Recognition Using Template Model for Man-Machine Interface. - Mostafa Azami, Manij Ranjbar, Ali Shokouhi Rostami, Amir Jahani Amiri:
Increasing the Network life Time by Simulated Annealing Algorithm in WSN with Point Coverage. - Sheng Li, Rodrigo C. de Lamare:
Blind Adaptive Reduced-Rank Detectors for DS-UWB Systems Based on Joint Iterative Optimization and the Constrained Constant Modulus Criterion. - Sanat Kumar Bista, Keshav P. Dahal, Peter I. Cowling:
Evolution of Cooperation in an Incentive Based Business Game Environment. - Sanat Kumar Bista, Keshav P. Dahal, Peter I. Cowling, Bhadra Man Tuladhar:
Unraveling the Evolution of Defectors in Online Business Games. - Sanat Kumar Bista, Keshav P. Dahal, Peter I. Cowling, Bhadra Man Tuladhar:
Metrics for Computing Trust in a Multi-Agent Environment. - Yoshua Bengio:
Estimating or Propagating Gradients Through Stochastic Neurons. - Shaunak Mishra, I-Hsiang Wang, Suhas N. Diggavi:
Opportunistic Interference Management for Multicarrier systems. - Xingqin Lin, Harish Viswanathan:
Dynamic Spectrum Refarming of GSM Spectrum for LTE Small Cells. - Hong Huang, Satyajayant Misra, Wei Tang, Hajar Barani, Hussein Al-Azzawi:
Applications of Compressed Sensing in Communications Networks. - Dai-Qiang Chen, Lizhi Cheng:
Fast Linearized Alternating Direction Minimization Algorithm with Adaptive Parameter Selection for Multiplicative Noise Removal. - Kuang-Chih Lee, Ali Jalali, Ali Dasdan:
Real Time Bid Optimization with Smooth Budget Delivery in Online Advertising. - Dai-Qiang Chen, Lizhi Cheng:
Novel variational model for inpainting in the wavelet domain. - Ali Jalali, Santanu Kolay, Peter Foldes, Ali Dasdan:
Scalable Audience Reach Estimation in Real-time Online Advertising. - (Withdrawn) Wave Atom Based Watermarking.
- Ashkan Paya, Dan C. Marinescu:
Clustering Algorithms for Scale-free Networks and Applications to Cloud Resource Management. - Gongming Li, Hong An:
Phase-Priority based Directory Coherence for Multicore Processor. - Marek Smieja:
Weighted Approach to General Entropy Function. - Joan Boyar, Magnus Find:
Cancellation-Free Circuits in Unbounded and Bounded Depth. - Paolo Braca:
Running Consensus for Decentralized Detection. - Shaunak Mishra, Christina Fragouli, Vinod M. Prabhakaran, Suhas N. Diggavi:
Using Feedback for Secrecy over Graphs. - Anas Chaaban, Karlheinz Ochs, Aydin Sezgin:
The Degrees of Freedom of the MIMO Y-channel. - Marco Baldi, Marco Bianchi, Franco Chiaraluce, Nicola Laurenti, Stefano Tomasin, Francesco Renna:
Secrecy Transmission on Block Fading Channels: Theoretical Limits and Performance of Practical Codes. - Serge Abiteboul, Émilien Antoine, Gerome Miklau, Julia Stoyanovich, Jules Testard:
Rule-Based Application Development using Webdamlog. - Jialong Han, Ji-Rong Wen:
Mining Frequent Neighborhood Patterns in Large Labeled Graphs. - Michael R. Fellows, Bart M. P. Jansen:
FPT is Characterized by Useful Obstruction Sets. - Hassan Rashidi:
A fast method for implementation of the property lists in programming languages. - Daqiang Zhang, Qin Zou, Zhiren Sun:
SECA: Snapshot-based Event Detection for Checking Asynchronous Context Consistency in Ubiquitous Computing. - Sasa Petrovic, Miles Osborne, Victor Lavrenko:
I Wish I Didn't Say That! Analyzing and Predicting Deleted Messages in Twitter. - François Cuvelier, Caroline Japhet, Gilles Scarella:
An efficient way to perform the assembly of finite element matrices in Matlab and Octave. - Muhammad Hilman, Heru Suhartanto, Arry Yanuar:
Performance Analysis of Embarassingly Parallel Application on Cluster Computer Environment: A Case Study of Virtual Screening with Autodock Vina 1.1 on Hastinapura Cluster. - Dmitry Tishkovsky, Renate A. Schmidt:
Refinement in the Tableau Synthesis Framework. - M. Puck Rombach, Mason A. Porter:
Discriminating Power of Centrality Measures. - Xiao-Bo Jin, Qiang Lu, Feng Wang, Quan-gong Huo:
Qualitative detection of oil adulteration with machine learning approaches. - Dionna Amalie Glaze, David Van Horn:
Concrete Semantics for Pushdown Analysis: The Essence of Summarization. - Travis Gagie, Pawel Gawrychowski, Yakov Nekrich:
Heaviest Induced Ancestors and Longest Common Substrings. - Wen-Xiao Zhao, Han-Fu Chen, Haitao Fang:
Convergence of Distributed Randomized PageRank Algorithms. - Wassim Bouachir, Atousa Torabi, Guillaume-Alexandre Bilodeau, Pascal Blais:
A Bag of Words Approach for Semantic Segmentation of Monitored Scenes. - Philipp Winter, Tobias Pulls, Jürgen Fuß:
ScrambleSuit: A Polymorph Network Protocol to Circumvent Censorship. - Gurpreet Singh Saini, Ashish Kots, Manoj Kumar:
DREAM_OLSR PROTOCOL (Distance Routing Effective Algorithm for Mobility - Optimized Link State Routing). - Paritosh K. Pandya, Simoni S. Shah:
The Unary Fragments of Metric Interval Temporal Logic: Bounded versus Lower bound Constraints (Full Version). - Siu On Chan, Ilias Diakonikolas, Rocco A. Servedio, Xiaorui Sun:
Efficient Density Estimation via Piecewise Polynomial Approximation. - Sowmyan Jegatheesan, Nour El-Kadri:
Privacy and Security in IPv6. - Senthur Balan S., Sowmyan Jegatheesan, Sakthi Ganesh M.:
The Product Promotion and Consumer Retention Gap in Online Shopping. - David R. Stoutemyer:
A computer algebra user interface manifesto. - (Withdrawn) Computing Cliques is Intractable.
- Arya Mazumdar, Venkat Chandar, Gregory W. Wornell:
Update Efficiency and Local Repairability Limits for Capacity Approaching Codes. - Ruta Mehta, Vijay V. Vazirani:
An Incentive Compatible, Efficient Market for Air Traffic Flow Management. - Laszlo B. Kish, Chiman Kwan:
Physical uncloneable function hardware keys utilizing Kirchhoff-law-Johnson-noise secure key exchange and noise-based logic. - Marian Popescu, Peter Dugan, Mohammad Pourhomayoun, Denise Risch, Hal Lewis, Christopher W. Clark:
Bioacoustical Periodic Pulse Train Signal Detection and Classification using Spectrogram Intensity Binarization and Energy Projection. - Amitabha Sinha, Soumojit Acharyya, Suranjan Chakraborty, Mitrava Sarkar:
Field Programmable DSP Arrays - A. - Esteban N. Osella, Hernan Haimovich, María M. Seron:
Fault-tolerant control under controller-driven sampling using virtual actuator strategy. - Ketul Sheth, Shreya Shah, Darshan Shah, Anuja Odhekar:
Social Network for Smart Devices using Embedded Ethernet. - Flávia Linhalis Arantes:
Requirements Engineering of a Web Portal using Organizational Semiotics Artifacts and Participatory Practices. - Can Karakus, I-Hsiang Wang, Suhas N. Diggavi:
Interference Channel with Intermittent Feedback. - Jop Briët, Daniel Dadush, Sebastian Pokutta:
On the existence of 0/1 polytopes with high semidefinite extension complexity. - Maciej Skorski:
A Convex Analysis Approach to Computational Entropy. - Yongjune Kim, B. V. K. Vijaya Kumar:
Redundancy Allocation of Partitioned Linear Block Codes. - Harsh Taneja, Angela Xiao Wu:
Does the Great Firewall really isolate the Chinese? Integrating access blockage with cultural factors to explain web user behavior. - Shiri Chechik:
Approximate Distance Oracle with Constant Query Time. - Sheng Li, Rodrigo C. de Lamare:
Linear Reduced-Rank Interference Suppression for DS-UWB Systems Using Switched Approximations of Adaptive Basis Functions. - Saïd Jabbour, Lakhdar Sais, Yakoub Salhi:
A Mining-Based Compression Approach for Constraint Satisfaction Problems. - Scott Lapinski, Heather A. Piwowar, Jason Priem:
Riding the crest of the altmetrics wave: How librarians can help prepare faculty for the next generation of research impact metrics. - Dimitris Fotakis, Christos Tzamos:
Strategy-Proof Facility Location for Concave Cost Functions. - Cem Tekin, Mingyan Liu:
Online Learning in a Contract Selection Problem. - Siddharth Barman, Umang Bhaskar, Federico Echenique, Adam Wierman:
The Empirical Implications of Rank in Bimatrix Games. - Ching-Hsien Hsu, Daqiang Zhang, Chao-Tung Yang, Hai-Cheng Chu:
An Efficient Method for Optimizing RFID Reader Deployment and Energy Saving. - Weibin Sun, Robert Ricci:
Augmenting Operating Systems With the GPU. - Arnob Ghosh, Saswati Sarkar:
Quality Sensitive Price Competition in Spectrum Oligopoly. - Sandip Chakraborty, Soumyadip Majumder, Diganta Goswami:
Approximate Congestion Games for Load Balancing in Distributed Environment. - He Wang, Xiangyun Zhou, Mark C. Reed:
Analytical Evaluation of Coverage-Oriented Femtocell Network Deployment. - Satyajit Thakor, Terence Chan, Kenneth W. Shum:
Symmetry in Distributed Storage Systems. - Ritesh Kolte, Ayfer Özgür:
Generalized Diversity-Multiplexing Tradeoff of Half-Duplex Relay Networks. - Kumar Viswanatha, Emrah Akyol, Kenneth Rose:
On the Role of Common Codewords in Quadratic Gaussian Multiple Descriptions Coding. - Laura Bernadó, Thomas Zemen, Fredrik Tufvesson, Andreas F. Molisch, Christoph F. Mecklenbräuker:
Delay and Doppler Spreads of Non-Stationary Vehicular Channels for Safety Relevant Scenarios. - Naseem Biadsy, Lior Rokach, Armin Shmilovici:
Transfer Learning for Content-Based Recommender Systems using Tree Matching. - Daniel Augot, Matthieu Finiasz:
Exhaustive Search for Small Dimension Recursive MDS Diffusion Layers for Block Ciphers and Hash Functions. - Johannes Niedermayer, Andreas Züfle, Tobias Emrich, Matthias Renz, Nikos Mamoulis, Lei Chen, Hans-Peter Kriegel:
Probabilistic Nearest Neighbor Queries on Uncertain Moving Object Trajectories. - David Stotz, Erwin Riegler, Helmut Bölcskei:
Almost Lossless Analog Signal Separation. - Abdelhamid Younis, William H. Thompson, Marco Di Renzo, Cheng-Xiang Wang, Mark A. Beach, Harald Haas, Peter M. Grant:
Performance of Spatial Modulation using Measured Real-World Channels. - Sanjeel Parekh, Pratik Shah:
Nyquist Filter Design using POCS Methods: Including Constraints in Design. - Fulvio Forni, Rodolphe Sepulchre:
On differentially dissipative dynamical systems. - Karsten Fyhn, Marco F. Duarte, Søren Holdt Jensen:
Compressive Parameter Estimation for Sparse Translation-Invariant Signals Using Polar Interpolation. - Ana Isabel Fernandes, Miguel Goulão
, Armanda Rodrigues:
A Comparison of Maps Application Programming Interfaces. - Reinhard Heckel, Helmut Bölcskei:
Noisy Subspace Clustering via Thresholding. - Fabrice Guillemin, Alain Simonian:
Stationary analysis of the Shortest Queue First service policy. - Fabrice Guillemin, Alain Simonian:
Stationary analysis of the "Shortest Queue First" service policy: the asymmetric case. - Sreechakra Goparaju, Itzhak Tamo, A. Robert Calderbank:
An Improved Sub-Packetization Bound for Minimum Storage Regenerating Codes. - Tim Clark, Paolo Ciccarese, Carole A. Goble:
Micropublications: a Semantic Model for Claims, Evidence, Arguments and Annotations in Biomedical Communications. - George Metcalfe, Christoph Röthlisberger:
Admissibility in Finitely Generated Quasivarieties. - Fabrice Guillemin:
Analysis of a non-work conserving Generalized Processor Sharing queue. - Ralph Tanbourgi, Holger Jäkel, Friedrich K. Jondral:
Cooperative Relaying in a Poisson Field of Interferers: A Diversity Order Analysis. - Xin Jin, Li Erran Li, Laurent Vanbever, Jennifer Rexford:
SoftCell: Taking Control of Cellular Core Networks. - David Kordalewski:
New Greedy Heuristics For Set Cover and Set Packing. - Dilip Bethanabhotla, Giuseppe Caire, Michael J. Neely:
Utility Optimal Scheduling and Admission Control for Adaptive Video Streaming in Small Cell Networks. - Kaya Tutuncuoglu, Omur Ozel, Aylin Yener, Sennur Ulukus:
Binary Energy Harvesting Channel with Finite Energy Storage. - Ahmed Badr, Ashish Khisti, Wai-Tian Tan, John G. Apostolopoulos:
Robust Streaming Erasure Codes based on Deterministic Channel Approximations. - Manuel Gomez-Rodriguez, Jure Leskovec, Bernhard Schölkopf:
Modeling Information Propagation with Survival Theory. - Mohammad Pourhomayoun, Peter Dugan, Marian Popescu, Denise Risch, Hal Lewis, Christopher W. Clark:
Classification for Big Dataset of Bioacoustic Signals Based on Human Scoring System and Artificial Neural Network. - Mohammad Pourhomayoun, Peter Dugan, Marian Popescu, Christopher W. Clark:
Bioacoustic Signal Classification Based on Continuous Region Processing, Grid Masking and Artificial Neural Network. - Andreas Hellander, Michael J. Lawson, Brian Drawert, Linda R. Petzold:
Local error estimates for adaptive simulation of the Reaction-Diffusion Master Equation via operator splitting. - Paulo Shakarian, Patrick Roos, Devon Callahan, Cory Kirk:
Mining for Geographically Disperse Communities in Social Networks by Leveraging Distance Modularity. - Marcus Hutter:
Sparse Adaptive Dirichlet-Multinomial-like Processes. - Jianhang Gao, Qing Zhao, Ananthram Swami:
The Thinnest Path Problem. - He Wang, Xiangyun Zhou, Mark C. Reed:
Coverage and Throughput Analysis with a Non-Uniform Femtocell Deployment. - Jean-Marie Chauvet, Eric Mahe:
Secrets from the GPU. - (Withdrawn) New classes of quadratic bent functions in polynomial forms.
- Satyajit Thakor, Alex J. Grant, Terence Chan:
Cut-Set Bounds on Network Information Flow. - Jad Hachem, I-Hsiang Wang, Christina Fragouli, Suhas N. Diggavi:
Coding with Encoding Uncertainty. - Sepp Hartung, Christian Komusiewicz, André Nichterlein, Ondrej Suchý:
On Structural Parameterizations for the 2-Club Problem. - Madhumita Sengupta, J. K. Mandal:
Wavelet Based Authentication/Secret Transmission Through Image Resizing(WASTIR). - Jennifer D. Warrender, Phillip Lord:
The Karyotype Ontology: a computational representation for human cytogenetic patterns. - Niek Bouman, Sem C. Borst, Johan van Leeuwaarden:
Delay Performance and Mixing Times in Random-Access Networks. - Ali Bereyhi, Mohsen Bahrami, Mahtab Mirmohseni, Mohammad Reza Aref:
Empirical Coordination in a Triangular Multiterminal Network. - Gabriel Kronberger, Michael Kommenda:
Evolution of Covariance Functions for Gaussian Process Regression using Genetic Programming. - Hassan Mansour, Özgür Yilmaz:
A fast randomized Kaczmarz algorithm for sparse solutions of consistent linear systems. - (Withdrawn) Multi-View Learning for Web Spam Detection.
- Zahra Jafargholi, Emanuele Viola:
3SUM, 3XOR, Triangles. - Lorenzo De Stefani, Francesco Silvestri:
Exploiting non-constant safe memory in resilient algorithms and data structures. - Emmanuel Grolleau, Joël Goossens, Liliana Cucu-Grosjean:
On the periodic behavior of real-time schedulers on identical multiprocessor platforms. - Richard Ellis-Braithwaite:
Analysing the Assumed Benefits of Software Requirements. - Blerim Cici, Enrique Frías-Martínez, Nikolaos Laoutaris:
A tale of 2 continents and 4 cities about the influence of demographics and social constraints on ride-sharing. - Daniel Christen:
Rule-Based Semantic Tagging. An Application Undergoing Dictionary Glosses. - Sanjay Rawat, Dumitru Ceara, Laurent Mounier, Marie-Laure Potet:
Combining Static and Dynamic Analysis for Vulnerability Detection. - Dilip K. Prasad:
Geometric primitive feature extraction - concepts, algorithms, and applications. - Rodrigo C. de Lamare, Vítor H. Nascimento:
Joint Model-Order and Step-Size Adaptation using Convex Combinations of Adaptive Reduced-Rank Filters. - Curt Schieler, Paul Cuff:
Rate-Distortion Theory for Secrecy Systems. - Emrah Akyol, Kenneth Rose, Tamer Basar:
Gaussian Sensor Networks with Adversarial Nodes. - Reid Priedhorsky, Aron Culotta, Sara Y. Del Valle:
Inferring the Origin Locations of Tweets with Quantitative Confidence. - David T.-H. Kao, Ashutosh Sabharwal:
An Upper Bound on the Capacity of Vector Dirty Paper with Unknown Spin and Stretch. - Tony Shaska, Q. Wang:
On the automorphism groups of some AG-codes based on Ca, b curves. - A. Djimeli, Daniel Tchiotsop, René Tchinda:
Analysis Of Interest Points Of Curvelet Coefficients Contributions Of Microscopic Images And Improvement Of Edges. - (Withdrawn) Quantum codes from superelliptic curves.
- David Avis, Oliver Friedmann:
An exponential lower bound for Cunningham's rule. - Gauri Joshi, Yanpei Liu, Emina Soljanin:
On the Delay-Storage Trade-off in Content Download from Coded Distributed Storage Systems. - Jingon Joung, Chin Keong Ho, Sumei Sun:
Spectral Efficiency and Energy Efficiency of OFDM Systems: Impact of Power Amplifiers and Countermeasures. - Ibrahim Issa, Silas L. Fong, Amir Salman Avestimehr:
Two-Hop Interference Channels: Impact of Linear Time-Varying Schemes. - Chengxi Ye, Dacheng Tao, Mingli Song, David W. Jacobs, Min Wu:
Sparse Norm Filtering. - Jeffrey K. Wiens, John M. Stockie:
An efficient parallel immersed boundary algorithm using a pseudo-compressible fluid solver. - Puneet Kumar, Dharminder Kumar:
A Conceptual E-Governance Framework for Improving Child Immunization Process in India. - Kaixu Zhang, Can Wang, Maosong Sun:
Binary Tree based Chinese Word Segmentation. - Yang Cai, Constantinos Daskalakis, S. Matthew Weinberg:
Reducing Revenue to Welfare Maximization: Approximation Algorithms and other Generalizations. - Yang Cai, Constantinos Daskalakis, S. Matthew Weinberg:
Understanding Incentives: Mechanism Design becomes Algorithm Design. - Cédric Herzet, Charles Soussen, Jérôme Idier, Rémi Gribonval:
Exact Recovery Conditions for Sparse Representations with Partial Support Information. - Junzhou Zhao, Pinghui Wang, Jing Tao, Xiaobo Ma, Xiaohong Guan:
A Peep on the Interplays between Online Video Websites and Online Social Networks. - Jian-Ming Zhou:
Computability vs. Nondeterministic and P vs. NP. - Matthias Wilhelm, Ivan Martinovic, Jens B. Schmitt, Vincent Lenders:
Air Dominance in Sensor Networks: Guarding Sensor Motes using Selective Interference. - Hiroki Kuzuno, Satoshi Tonami:
Signature Generation for Sensitive Information Leakage in Android Applications. - Gwezheneg Robert, Pierre Loidreau, Daniel Augot:
Rank metric and Gabidulin codes in characteristic zero. - Ahmad Assaf, Aline Senart:
Data Quality Principles in the Semantic Web. - Ted Hurley:
Cryptography. key exchange, public key. - Syed Muhammad Arsalan Bashir:
Font Acknowledgment and Character Extraction of Digital and Scanned Images. - Fuqiang Chen:
Contractive Denoising Autoencoder. - Abir Messaoudi, Riadh Bouslimi, Jalel Akaichi:
Indexing Medical Images based on Collaborative Experts Reports. - Patrick Hop, Xinghao Pan:
Conditions for Convergence in Regularized Machine Learning Objectives. - Fabien Sacuto, Fabrice Labeau, Basile L. Agba:
Wide Band Time-Correlated Model for Wireless Communications under Impulsive Noise within Power Substation. - Nicolas Gensollen, Vincent Gauthier, Michel Marot, Monique Becker:
Modeling and optimizing a distributed power network : A complex system approach of the prosumer management in the smart grid. - Andrew Rudder, Wayne Goodridge, Shareeda Mohammed:
Using Bias Optimization for Reversible Data Hiding Using Image Interpolation. - Tomás Brázdil, Krishnendu Chatterjee, Vojtech Forejt, Antonín Kucera:
Trading Performance for Stability in Markov Decision Processes. - Paul C. Attie, Fadi A. Zaraket, Mohammad Fawaz, Mohamad Noureddine:
Semantic Guidance and Feedback for the Construction of Specifications and Implementations. - Andrew Gelfand, Jinwoo Shin, Michael Chertkov:
Belief Propagation for Linear Programming. - Mustafa Ilhan Akbas, Matthias R. Brust, Damla Turgut:
Social Network Generation and Role Determination Based on Smartphone Data. - Mouhamed Abdulla
, Yousef R. Shayan:
On the Peculiarities of Design: An Engineering Perspective. - Dmitry Namiot, Manfred Sneps-Sneppe:
Local Messages for Smartphones. - Florian Willomitzer, Svenja Ettl, Christian Faber, Gerd Häusler:
Flying Triangulation - towards the 3D movie camera. - Vida Dujmovic, Pat Morin, Michiel H. M. Smid:
Average Stretch Factor: How Low Does It Go? - Susan B. Davidson, Xiaocheng Huang, Julia Stoyanovich, Xiaojie Yuan:
Search and Result Presentation in Scientific Workflow Repositories. - Di Li, Lifeng Lai, Shuguang Cui:
Quickest Change Point Detection and Identification Across a Generic Sensor Array. - Uzi Chester, Joel Ratsaby:
Machine learning on images using a string-distance. - Omer H. Abdelrahman, Erol Gelenbe, Gökçe Görbil, Boris Oklander:
Mobile Network Anomaly Detection and Mitigation: The NEMESYS Approach. - Xingqin Lin, Jeffrey G. Andrews, Amitava Ghosh:
A Comprehensive Framework for Device-to-Device Communications in Cellular Networks. - Wei Yu, Junpeng Chen:
The state-of-the-art in web-scale semantic information processing for cloud computing. - Maghsood Parviz, Seyed Hassan Mousavi, Saeed Mirahmadi:
Key classification attack on block ciphers. - Wing-Kai Hon, Ton Kloks, Hsiang-Hsuan Liu, Sheung-Hung Poon, Yue-Li Wang:
Independent set in categorical products of cographs and splitgraphs. - Hongyu Cui, Rongqing Zhang, Lingyang Song, Bingli Jiao:
Relay Selection for Bidirectional AF Relay Network with Outdated CSI. - Loet Leydesdorff, Han Woo Park, Caroline S. Wagner:
International Co-authorship Relations in the Social Science Citation Index: Is Internationalization Leading the Network? - Zohra Sbaï, Mohamed Escheikh:
Model Checking Techniques for Verification of an Encryption Scheme for Wireless Sensor Networks. - Lvzhou Li, Daowen Qiu:
Decidability of minimization of fuzzy automata. - Peva Blanchard, Shlomi Dolev, Joffroy Beauquier, Sylvie Delaët:
Self-Stabilizing Paxos. - Yue Wu, Brian Tracey, Premkumar Natarajan, Joseph P. Noonan:
Blockwise SURE Shrinkage for Non-Local Means. - Alina Ene, Nitish Korula, Ali Vakilian:
Improved Approximation Algorithms for Connected Domatic Partitions and Related Problems. - Kuwar Pratap Singh, P. K. Gupta, G. Singh:
Performance Evaluation of Enhanced Interior Gateway Routing Protocol in IPv6 Network. - Sanket Satpathy, Paul Cuff:
Secure Cascade Channel Synthesis. - Peter L. Bartlett, Peter Grunwald, Peter Harremoës, Fares Hedayati, Wojciech Kotlowski:
Horizon-Independent Optimal Prediction with Log-Loss in Exponential Families. - Andreas Enge, Emmanuel Thomé:
Computing class polynomials for abelian surfaces. - Alon Schclar, Lior Rokach, Amir Amit:
Ensembles of Classifiers based on Dimensionality Reduction. - Dmitry Namiot, Manfred Sneps-Sneppe:
Mobile Services and Network Proximity. - Michael James Scott, Gheorghita Ghinea:
Promoting Game Accessibility: Experiencing an Induction on Inclusive Design Practice at the Global Games Jam. - Anjan K. Koundinya, G. Harish, N. K. Srinath, G. E. Raghavendra Kumar, Y. V. Pramod, R. Sandeep, G. Punith Kumar:
Performance Analysis of Parallel Pollard's Rho Algorithm. - Raphael Jolly:
Parallelizing Stream with Future. - Sasa Paporovic:
Realized collaboration across borders - Linux and the bioinformatic part. - Lukasz Swierczewski
:
3DES ECB Optimized for Massively Parallel CUDA GPU Architecture. - Klajdi Karanxha, Kapies Vallipuram, Herman Sonfack, Gustavo Barbieri Pereira:
Software Requirements Specification - Softbody Simulation System. - Igor S. Sergeev:
Implementation of linear maps with circulant matrices via modulo 2 rectifier circuits of bounded depth. - Arkadius G. Kalka, Mina Teicher:
Non-associative key establishment for leftdistributive systems. - Mayur Agrawal, David J. Love, Venkataramanan Balakrishnan:
Communicating over Filter-and-Forward Relay Networks with Channel Output Feedback. - Amitav Mukherjee:
Imbalanced Beamforming by a Multi-antenna Source for Secure Utilization of an Untrusted Relay. - Youfang Lin, Xuguang Jia, Mingjie Lin, Steve Gregory, Huaiyu Wan, Zhihao Wu:
Inferring High Quality Co-Travel Networks. - Xiangnan Kong, Bokai Cao, Philip S. Yu, Ying Ding, David J. Wild:
Meta Path-Based Collective Classification in Heterogeneous Information Networks. - Rushan Ziatdinov, Sajid Musa:
Rapid mental computation system as a tool for algorithmic thinking of elementary school students development. - Jun Zhang, Xinran Li, Fang-Wei Fu:
Multi-receiver Authentication Scheme for Multiple Messages Based on Linear Codes. - Jérémie Bigot, Claire Boyer, Pierre Weiss:
An analysis of block sampling strategies in compressed sensing. - Nathan O. Collier, Lisandro Dalcín, Victor M. Calo:
PetIGA: High-Performance Isogeometric Analysis. - Benjamin P. Vandervalk, E. Luke McCarthy, Mark D. Wilkinson
:
SHARE: A Web Service Based Framework for Distributed Querying and Reasoning on the Semantic Web. - Abidin Kaya, Bahattin Yildiz, Irfan Siap:
Quadratic Residue Codes over F_p+vF_p and their Gray Images. - Radoslav Fulek, Jan Kyncl, Igor Malinovic, Dömötör Pálvölgyi:
Efficient c-planarity testing algebraically. - Miron B. Kursa:
Robustness of the Random Forest-based gene selection methods. - Nenad Markus, Miroslav Frljak, Igor S. Pandzic, Jörgen Ahlberg, Robert Forchheimer:
A method for object detection based on pixel intensity comparisons. - Víctor Valls, Douglas J. Leith:
Proportional Fair MU-MIMO in 802.11 WLANs. - Govind Salvi, Puneet Sharma, Shanmuganathan Raman:
Efficient Image Retargeting for High Dynamic Range Scenes. - Baran Tan Bacinoglu, Elif Uysal-Biyikoglu:
Finite-horizon Online Transmission Rate and Power Adaptation on a Communication Link with Markovian Energy Harvesting. - Adam R. Williamson, Tsung-Yi Chen, Richard D. Wesel:
Reliability-based Error Detection for Feedback Communication with Low Latency. - Ramon Ferrer-i-Cancho:
Random crossings in dependency trees. - Jean Souviron:
Correcting self-intersecting polygons using minimal memory A simple and efficient algorithm and thoughts on line-segment intersection algorithms. - Krishna Gopal Benerjee
, Manish K. Gupta, Nikhil Agrawal:
Reconstruction and Repair Degree of Fractional Repetition Codes. - Subhash Khot, Nisheeth K. Vishnoi:
The Unique Games Conjecture, Integrality Gap for Cut Problems and Embeddability of Negative Type Metrics into ℓ1. - (Withdrawn) Parallel Coordinates Guided High Dimensional Transfer Function Design.
- Ludovic Courtès:
Functional Package Management with Guix. - Chunhua Geng, Navid Naderializadeh, Amir Salman Avestimehr, Syed Ali Jafar:
On the Optimality of Treating Interference as Noise. - (Withdrawn) The Process of Mobile Spectrum Allocation and its impact on Electronic Commerce and Mobile Commerce.
- Emil Björnson, Jakob Hoydis, Marios Kountouris, Mérouane Debbah:
Hardware Impairments in Large-scale MISO Systems: Energy Efficiency, Estimation, and Capacity Limits. - Amitabh Trehan:
Algorithms for Self-Healing Networks. - (Withdrawn) Joint Space Decomposition-and-Synthesis Theory for K-User MIMO Channels: Interference Alignment and DoF Region.
- Carlos Sarraute:
Aplicacion de las Redes Neuronales al Reconocimiento de Sistemas Operativos. - Mark Braverman, Faith Ellen, Rotem Oshman, Toniann Pitassi, Vinod Vaikuntanathan:
Tight Bounds for Set Disjointness in the Message Passing Model. - Srinivas Yerramalli, Rahul Jain, Urbashi Mitra:
Broadcast Channel Games: Equilibrium Characterization and a MIMO MAC-BC Game Duality. - Yu Yang, Deqiang Wang, Hua Wang, Hongbo Liu:
On BC-trees and BC-subtrees. - Danilo De Donno, Luca Catarinucci, Luciano Tarricone:
An UHF RFID Energy-Harvesting System Enhanced by a DC-DC Charge Pump in Silicon-on-Insulator Technology. - Danilo De Donno, Luca Catarinucci, Luciano Tarricone:
Enabling Self-Powered Autonomous Wireless Sensors with New-Generation I2C-RFID Chips. - Manju Prasad, Andhe Dharani:
A qoi based energy efficient clustering for dense wireless sensor network. - Pietro Galliani:
The Doxastic Interpretation of Team Semantics. - Nir Ailon:
A Lower Bound for Fourier Transform Computation in a Linear Model Over 2x2 Unitary Gates Using Matrix Entropy. - Remi A. Chou, Matthieu R. Bloch, Emmanuel Abbe:
Polar Coding for Secret-Key Generation. - Fabien de Montgolfier, Mathieu Raffinot, Irena Rusu:
Easy identification of generalized common nested intervals. - Maksym A. Girnyk, Mikko Vehkaperä, Lars K. Rasmussen:
Large-System Analysis of Correlated MIMO Multiple Access Channels with Arbitrary Signaling in the Presence of Interference. - Parasaran Raman, Suresh Venkatasubramanian:
Power to the Points: Validating Data Memberships in Clusterings. - Binh-Minh Bui-Xuan, Nick S. Jones:
How modular structure can simplify tasks on networks. - Marcin Kawalerowicz:
Classification of automatic software build methods. - Martin Horsch, Christoph Niethammer, Jadran Vrabec, Hans Hasse:
Computational molecular engineering as an emerging technology in process engineering. - Rasmus Melchior Jacobsen, Petar Popovski:
Reliable Reception of Wireless Metering Data with Protocol Coding. - Yessica Saez, Laszlo B. Kish:
Errors and their mitigation at the Kirchhoff-law-Johnson-noise secure key exchange. - Fan Min, William Zhu:
Mining top-k granular association rules for recommendation. - Stefan Gerhold, Manuel Kauers, Christoph Koutschan
, Peter Paule, Carsten Schneider, Burkhard Zimmermann:
Computer-Assisted Proofs of Some Identities for Bessel Functions of Fractional Order. - Mohamed Nader Jelassi, Sadok Ben Yahia, Engelbert Mephu Nguifo:
Nouvelle approche de recommandation personnalisee dans les folksonomies basee sur le profil des utilisateurs. - Shantanu Rane, Ye Wang, Stark C. Draper, Prakash Ishwar:
Secure Biometrics: Concepts, Authentication Architectures and Challenges. - Hugues Randriambololona:
An upper bound of Singleton type for the componentwise product of two linear codes. - Jia Xu, Ubbo Visser, E. Patrick Shironoshita, Nigel M. John, Mansur R. Kabuka:
Extract ABox Modules for Efficient Ontology Querying. - Christian Cachin, Dan Dobre, Marko Vukolic:
BFT Storage with 2t+1 Data Replicas. - Sergiu Hart, Noam Nisan:
The Query Complexity of Correlated Equilibria. - Martin Klein, Herbert Van de Sompel:
Extending Sitemaps for ResourceSync. - Jonathan Lutz, Charles J. Colbourn, Violet R. Syrotiuk:
ATLAS: Adaptive Topology- and Load-Aware Scheduling. - Xunrui Yin, Yan Wang, Zongpeng Li, Xin Wang, Xiangyang Xue:
A Graph Minor Perspective to Multicast Network Coding. - Emil Jerábek:
Rules with parameters in modal logic I. - Marek Cygan, Fabrizio Grandoni, Danny Hermelin:
Tight Kernel Bounds for Problems on Graphs with Small Degeneracy. - Mark Sh. Levin
:
Note on Evaluation of Hierarchical Modular Systems. - Arthur Gonçalves Carvalho, Aluízio F. R. Araújo:
Improving NSGA-II with an Adaptive Mutation Operator. - Renato Oliveira, Paulo J. L. Adeodato, Arthur Carvalho, Icamaan Viegas, Christian Diego, Tsang Ing Ren:
A Data Mining Approach to Solve the Goal Scoring Problem. - Alexander Bau, Johannes Waldmann:
Propositional Encoding of Constraints over Tree-Shaped Data. - M. E. J. Newman:
Community detection and graph partitioning. - Junil Choi, Zachary Chance, David J. Love, Upamanyu Madhow:
Noncoherent Trellis Coded Quantization: A Practical Limited Feedback Technique for Massive MIMO Systems. - Arash Khabbazibasmenj, Aboulnasr Hassanien, Sergiy A. Vorobyov, Matthew W. Morency:
Efficient Transmit Beamspace Design for Search-free Based DOA Estimation in MIMO Radar. - Hao Fang, Sergiy A. Vorobyov, Hai Jiang, Omid Taheri:
Permutation Meets Parallel Compressed Sensing: How to Relax Restricted Isometry Property for 2D Sparse Signals. - Julie Tibshirani, Christopher D. Manning:
Robust Logistic Regression using Shift Parameters. - Shengbo Chen, Tarun Bansal, Yin Sun, Prasun Sinha, Ness B. Shroff:
Life-Add: Lifetime Adjustable Design for WiFi Networks with Heterogeneous Energy Supplies. - Jie Gong, John S. Thompson, Sheng Zhou, Zhisheng Niu:
Base Station Sleeping and Resource Allocation in Renewable Energy Powered Cellular Networks. - Saied Mehdian, Ben Liang:
Optimal Frame Transmission for Scalable Video with Hierarchical Prediction Structure. - Arunasalam Sambhanthan, Samantha Thelijjagoda, Joseph Tan:
Implications for Utilizing YouTube based Community Interactions for Destination Marketing. - Shilpa Gulati, Chetan Jhurani, Benjamin Kuipers:
A Nonlinear Constrained Optimization Framework for Comfortable and Customizable Motion Planning of Nonholonomic Mobile Robots - Part I. - Shilpa Gulati, Chetan Jhurani, Benjamin Kuipers:
A Nonlinear Constrained Optimization Framework for Comfortable and Customizable Motion Planning of Nonholonomic Mobile Robots - Part II. - David Tolpin, Tal Beja, Solomon Eyal Shimony, Ariel Felner, Erez Karpas:
Towards Rational Deployment of Multiple Heuristics in A*. - Krzysztof R. Apt, Sunil Simon:
Social Network Games with Obligatory Product Selection. 180-193 - Palash Dey, Y. Narahari:
Asymptotic Collusion-proofness of Voting Rules when the Number of Candidates is Large. - Ralf Wimmer
, Nils Jansen
, Andreas Vorpahl, Erika Ábrahám
, Joost-Pieter Katoen
, Bernd Becker:
High-level Counterexamples for Probabilistic Automata. - Alicja Wieczorkowska, Miron B. Kursa:
A Comparison of Random Forests and Ferns on Recognition of Instruments in Jazz Recordings. - Yi Fang, Lin Wang, Kai-Kit Wong, Kin-Fai Tong:
Performance of Joint Channel and Physical Network Coding Based on Alamouti STBC. - Mario Berljafa, Edoardo Di Napoli:
A Parallel and Scalable Iterative Solver for Sequences of Dense Eigenproblems Arising in FLAPW. - Kei Sakaguchi, Van Ky Nguyen, Yu Tao, Gia Khanh Tran, Kiyomichi Araki:
Distributed Power Control Network and Green Building Test-bed for Demand Response in Smart Grid. - Lovro Subelj, Marko Bajec:
Groups of nodes in complex real-world networks: An algorithm and comparison of the state-of-the-art. - Bo Xiao, Yuefeng Jing, Yonghong Guan:
A novel automatic thresholding segmentation method with local adaptive thresholds. - Arthur Carvalho, Kate Larson:
A Truth Serum for Sharing Rewards. - Nathan Berg, Chunyu Chen, Murat Kantarcioglu:
Experiments in Information Sharing. - Salvatore Cuomo, Ardelio Galletti, Giulio Giunta, Alfredo Starace:
Surface Reconstruction from Scattered Point via RBF Interpolation on GPU. - Jean-Lou De Carufel, Carsten Grimm, Anil Maheshwari, Megan Owen, Michiel H. M. Smid:
A Note on the Unsolvability of the Weighted Region Shortest Path Problem. - Mingyue Ji, Giuseppe Caire, Andreas F. Molisch:
Wireless Device-to-Device Caching Networks: Basic Principles and System Performance. - Oscar Filio-Rodriguez, Serguei Primak, Valeri Y. Kontorovich, Abdallah Shami:
A Game Theory Interpretation for Multiple Access in Cognitive Radio Networks with Random Number of Secondary Users. - Parosh Aziz Abdulla, Lorenzo Clemente, Richard Mayr, Sven Sandberg:
Stochastic Parity Games on Lossy Channel Systems. - David Isaac Wolinsky, Ewa Syta, Bryan Ford:
Hang With Your Buddies to Resist Intersection Attacks. - Samy Abbes
:
Markov two-components processes. - Robert E. Kent:
FOLE: The First-order Logical Environment. - Bluma S. Gelley:
Investigating Deletion in Wikipedia. - Yin Zheng, Yu-Jin Zhang, Hugo Larochelle:
A Supervised Neural Autoregressive Topic Model for Simultaneous Image Classification and Annotation. - Ronald Y. Chang, Sian-Jheng Lin, Wei-Ho Chung:
Energy Efficient Transmission over Space Shift Keying Modulated MIMO Channels. - Roman Zapatrin:
A toy model of information retrieval system based on quantum probability. - Valery Tabakov:
System error of project ETONN and EIAS. - Adam Kasperski, Pawel Zielinski:
Combinatorial optimization problems with uncertain costs and the OWA criterion. - Luca Barletta, Maurizio Magarini, Arnaldo Spalvieri:
Tight Upper and Lower Bounds to the Information Rate of the Phase Noise Channel. - Manoj Gopalkrishnan:
A coercion-resistant protocol for conducting elections by telephone. - Anas Chaaban, Aydin Sezgin, Amir Salman Avestimehr:
Approximate Sum-Capacity of the Y-channel. - Wenkui Ding, Tao Wu, Tao Qin, Tie-Yan Liu:
Pure Price of Anarchy for Generalized Second Price Auction. - Marco Baldi, Marco Bianchi, Franco Chiaraluce, Joachim Rosenthal, Davide Schipani:
Using LDGM Codes and Sparse Syndromes to Achieve Digital Signatures. - Bruno Macchiavello, Camilo C. Dorea, Edson M. Hung, Gene Cheung, Wai-tian Tan:
Loss-resilient Coding of Texture and Depth for Free-viewpoint Video Conferencing. - Stewart N. Ethier, Carlos Gamez:
A game-theoretic analysis of baccara chemin de fer. - Erol Gelenbe, Gökçe Görbil, Dimitrios Tzovaras, Steffen Liebergeld, David García, Madalina Baltatu, George L. Lyberopoulos:
NEMESYS: Enhanced Network Security for Seamless Service Provisioning in the Smart Mobile Ecosystem. - John Scoville:
Fast Autocorrelated Context Models for Data Compression. - Subhash Khot, Madhur Tulsiani, Pratik Worah:
A Characterization of Strong Approximation Resistance. - Robert R. Tucci:
Introduction to Judea Pearl's Do-Calculus. - Mohsen Ghaffari, Fabian Kuhn:
Distributed Minimum Cut Approximation. - Shreyas Balakuntala, Sandeep Venkatesh, Rajarajeswari S., E. Abhiram, Ashwin R., K. M. Sunil Kumar:
An Intelligent System to Detect, Avoid and Maintain Potholes: A Graph Theoretic Approach. - Changchuan Yin
, Dongchul Yoo, Stephen S.-T. Yau:
Denoising the 3-Base Periodicity Walks of DNA Sequences in Gene Finding. - Omur Ozel, Khurram Shahzad, Sennur Ulukus:
Optimal Scheduling for Energy Harvesting Transmitters with Hybrid Energy Storage. - Alexander Bolshoy, Valery M. Kirzhner:
Algorithms of an optimal integer tree labeling. - Adam Chalcraft, Samuel Kutin, David Petrie Moulton:
The Promise Polynomial Hierarchy. - David P. Woodruff, Qin Zhang:
Subspace Embeddings and ℓp-Regression Using Exponential Random Variables. - Qiaoyang Ye, Mazin Al-Shalash, Constantine Caramanis, Jeffrey G. Andrews:
On/Off Macrocells and Load Balancing in Heterogeneous Cellular Networks. - Hao Feng, Andreas F. Molisch:
Diversity Backpressure Scheduling and Routing with Mutual Information Accumulation in Wireless Ad-hoc Networks. - Mahdi Shaghaghi, Sergiy A. Vorobyov:
Finite-Length and Asymptotic Analysis of Correlogram for Undersampled Data. - Wei Wang, Baochun Li, Ben Liang:
To Reserve or Not to Reserve: Optimal Online Multi-Instance Acquisition in IaaS Clouds. - Fred W. Glover, Tao Ye, Abraham P. Punnen, Gary A. Kochenberger:
Integrating tabu search and VLSN search to develop enhanced algorithms: A case study using bipartite boolean quadratic programs. - Alice C. Niemeyer, Tomasz Popiel, Cheryl E. Praeger:
Straight-line programs with memory and matrix Bruhat decomposition. - Vikram Arkalgud Chandrasetty, Sarah J. Johnson, Gottfried Lechner:
Memory Efficient Decoders using Spatially Coupled Quasi-Cyclic LDPC Codes. - Neri Merhav:
Erasure/list exponents for Slepian-Wolf decoding. - John Derrick
, Eerke A. Boiten, Steve Reeves
:
Proceedings 16th International Refinement Workshop, Refine@IFM 2013, Turku, Finland, 11th June 2013. EPTCS 115, 2013 [contents] - Seppo Ilari Tirri:
Algebraic Net Class Rewriting Systems, Syntax and Semantics for Knowledge Representation and Automated Problem Solving. - George Garbis, Kostis Kyzirakos, Manolis Koubarakis:
Geographica: A Benchmark for Geospatial RDF Stores. - Dmitry E. Chebukov, Alexander D. Izaak
, Olga G. Misyurina, Yuri A. Pupyrev, Alexey B. Zhizhchenko:
Math-Net.Ru as a Digital Archive of the Russian Mathematical Knowledge from the XIX Century to Today. - János Tapolcai, Gábor Rétvári, Attila Körösi:
Memory size bounds of prefix DAGs. - Abdelali Boussadi, Thibaut Caruba, Alexandre Karras, Sarah Berdot, Patrice Degoulet, Pierre Durieux, Brigitte Sabatier:
Validity of a clinical decision rule based alert system for drug dose adjustment in patients with renal failure intended to improve pharmacists' analysis of medication orders in hospitals. - Min Chen, Luciano Floridi, Rita Borgo:
What is Visualization Really for? - Rachit Agarwal, Vincent Gauthier, Monique Becker, Thouraya Toukabri, Hossam Afifi:
Enhancing Information Dissemination in Device to Device Metapopulation using Human Mobility Trace and Beamforming. - Pedro Quaresma, Vanda Santos, Seifeddine Bouallegue:
The Web Geometry Laboratory Project. - Carst Tankink, Cezary Kaliszyk, Josef Urban, Herman Geuvers:
Formal Mathematics on Display: A Wiki for Flyspeck. - Michael Brand:
Computing with and without arbitrary large numbers. - Antonio Franchi, Paolo Robuffo Giordano:
Online Leader Selection for Multi-Agent Collective Tracking and Formation Maintenance. - Paul Libbrecht:
Escaping the Trap of too Precise Topic Queries. - Ali El-Zaart, Wafaa Kamel Al-Jibory:
Edge Detection in Radar Images Using Weibull Distribution. - Khalid Raza, Rajni Jaiswal:
Reconstruction and Analysis of Cancer-specific Gene Regulatory Networks from Gene Expression Profiles. - Peter D. Bruza, Kirsty Kitto, Brentyn J. Ramm, Laurianne Sitbon:
A probabilistic framework for analysing the compositionality of conceptual combinations. - Fernand Meyer:
Flooding edge or node weighted graphs. - Fang Wei-Kleiner:
Tree Decomposition based Steiner Tree Computation over Large Graphs. - Zheng Wang, Shuiyin Liu, Cong Ling:
Decoding by Sampling II: Derandomization and Soft-output Decoding. - Oktay Ölmez, Aditya Ramamoorthy:
Replication based storage systems with local repair. - Moshe Schwartz:
Gray codes for vector spaces. - Shmuel Friedland, Qun Li, Dan Schonfeld:
Generalized Tensor Compressive Sensing. - Vivek Srikumar, Dan Roth:
An Inventory of Preposition Relations. - Marius Buliga:
Graphic lambda calculus. - Alexandru Cioaca, Adrian Sandu, Eric de Sturler:
Efficient methods for computing observation impact in 4D-Var data assimilation. - Dave Dice, Danny Hendler, Ilya Mirsky:
Lightweight Contention Management for Efficient Compare-and-Swap Operations. - Robert Piro:
Model Theoretic Characterisations of Description Logics. - Glencora Borradaile, Anna Harutyunyan:
Maximum st-flow in directed planar graphs via shortest paths. - Slim Bouker, Rabie Saidi, Sadok Ben Yahia, Engelbert Mephu Nguifo:
Towards a semantic and statistical selection of association rules. - Monica Shekhar, R. A. K. Saravanaguru:
Semantic Web Search based on Ontology Modeling using Protege Reasoner. - Laurent Lessard, Sanjay Lall:
Convexity of Decentralized Controller Synthesis. - An Liu, Vincent K. N. Lau, Liangzhong Ruan, Junting Chen, Dengkun Xiao:
Hierarchical Radio Resource Optimization for Heterogeneous Networks with Enhanced Inter-cell Interference Coordination (eICIC). - Jaydip Sen:
Homomorphic Encryption: Theory & Applications. - Farzin Haddadpour, Mohammad Hossein Yassaee, Mohammad Reza Aref, Amin Gohari:
When is it possible to simulate a DMC channel from another? - Justus H. Piater, Antonio Jose Rodríguez-Sánchez:
ÖAGM/AAPR 2013 - The 37th Annual Workshop of the Austrian Association for Pattern Recognition. - Fahd Ahmed Khan, Kamel Tourki, Mohamed-Slim Alouini
, Khalid A. Qaraqe:
Performance of Opportunistic Fixed Gain Bidirectional Relaying With Outdated CSI. - Kaixu Zhang, Maosong Sun:
Reduce Meaningless Words for Joint Chinese Word Segmentation and Part-of-speech Tagging. - Baofeng Wu, Jia Zheng:
A remark on algebraic immunity of Boolean functions. - Weihao Kong, Jian Li, Tao Qin, Tie-Yan Liu:
Revenue Optimization for Group-Buying Websites. - Sandeep Venkatesh, Shreyas Balakuntala, Rajarajeswari S., Nytika N. Shetty, Namratha Shetty, Neha Sudhakar:
Agent Based Intelligent Alert System for Smart-Phones. - Jan A. Bergstra, Karl de Leeuw:
Questions related to Bitcoin and other Informational Money. - Ahmed Alsum, Michael L. Nelson:
ArcLink: Optimization Techniques to Build and Retrieve the Temporal Web Graph. - Sheng Huang, Mikael Skoglund:
Coding for Computing Irreducible Markovian Functions of Sources with Memory. - Murdoch James Gabbay, Michael Gabbay:
Representation and duality of the. - Xinwen Jiang:
A Polynomial Time Algorithm for the Hamilton Circuit Problem. - Daqiang Zhang, Rongbo Zhu, Shuqiqiu Men, Vaskar Raychoudhury:
Query Representation with Global Consistency on User Click Graph. - Matthieu R. Bloch, Jörg Kliewer:
Strong Coordination over a Line Network. - Stavros G. Kolliopoulos, Yannis Moysoglou:
Integrality gaps for strengthened LP relaxations of Capacitated and Lower-Bounded Facility Location. - Wessam Afifi, Marwan Krunz:
Exploiting Self-Interference Suppression for Improved Spectrum Awareness/Efficiency in Cognitive Radio Systems. - (Withdrawn) Comparative Study of ERP Implementation Methodology Case Study: Accelerated SAP VS Dantes & Hasibuan Methodology.
- (Withdrawn) Information System as a Service: Issues and Challenges.
- Sheng-Ming Cai, Yi Gong:
Cognitive Beamforming for Multiple Secondary Data Streams With Individual SNR Constraints. - Guangwu Xu, Zhiqiang Xu:
On the ℓ1-Norm Invariant Convex k-Sparse Decomposition of Signals. - Mahmoud A. Abdel-Aty:
New Index for Quantifying an Individual's Scientific Research Output. - Tshilidzi Marwala:
Semi-bounded Rationality: A model for decision making. - Daniel Graziotin:
The Dynamics of Creativity in Software Development. - Sidahmed Mokeddem, Baghdad Atmani, Mostéfa Mokaddem:
Supervised Feature Selection for Diagnosis of Coronary Artery Disease Based on Genetic Algorithm. - William M. Farmer:
The Formalization of Syntax-Based Mathematical Algorithms Using Quotation and Evaluation. - Timofey E. Samsonov, Vladimir N. Semin, Pavel I. Konstantinov, Mikhail I. Varentzov:
Calculation of geometric characteristics of land cover and urban canyon for multi-scale parameterization of megalopolis meteorological models. - Andreas Holzer, Christian Schallhart, Michael Tautschnig, Helmut Veith:
On the Structure and Complexity of Rational Sets of Regular Languages. - Shawn X. Cui, Michael H. Freedman, Zhenghan Wang:
Complexity Classes as Mathematical Axioms II. - William Weiliang Li, Yuan Shen, Ying Jun, Ying Jun Zhang, Moe Z. Win:
Robust power allocation for energy-efficient location aware networks. - Jun-ichi Yamamoto, Tomohiro I, Hideo Bannai, Shunsuke Inenaga, Masayuki Takeda:
Faster Compact On-Line Lempel-Ziv Factorization. - Keehang Kwon:
Bounded Inputs for Logic Programming. - Emil Sekerinski, Tian Zhang:
On a New Notion of Partial Refinement. 1-14 - Brijesh Dongol
, John Derrick
:
Data refinement for true concurrency. 15-35 - Michael J. Butler, John Colley, Andrew Edmunds, Colin F. Snook
, Neil Evans, Neil Grant, Helen Marshall:
Modelling and Refinement in CODA. 36-51 - Frank Zeyda
, Ana Cavalcanti
:
Refining SCJ Mission Specifications into Parallel Handler Designs. 52-67 - Nuno Amálio:
Relaxing Behavioural Inheritance. 68-83 - Alexandre Madeira
, Manuel A. Martins
, Luís Soares Barbosa
:
Bisimilarity and refinement for hybrid(ised) logics. 84-98 - S. M. M. M. Kalyan Kumar, S. C. Pradhan:
Building Internal Cloud at NIC : A Preview. - Tuvi Etzion:
Problems on q-Analogs in Coding Theory. - Kian Hsiang Low, John M. Dolan, Pradeep K. Khosla:
Information-Theoretic Approach to Efficient Adaptive Path Planning for Mobile Robotic Environmental Sensing. - Khushraj Madnani, Shankara Narayanan Krishna, Paritosh K. Pandya:
On the Decidability and Complexity of Some Fragments of Metric Temporal Logic. - Vivek Narayanan, Ishan Arora, Arjun Bhatia:
Fast and accurate sentiment classification using an enhanced Naive Bayes model. - Tien Tuan Anh Dinh, Anwitaman Datta
:
Streamforce: outsourcing access control enforcement for stream data to the clouds. - Kien T. Truong, Robert W. Heath Jr.:
Effects of Channel Aging in Massive MIMO Systems. - Namyoon Lee, Xingqin Lin, Jeffrey G. Andrews, Robert W. Heath Jr.:
Power Control for D2D Underlaid Cellular Networks: Modeling, Algorithms and Analysis. - Shangdi Chen, Dawei Zhao:
New Construction of Authentication Codes with Arbitration from Pseudo-Symplectic Geometry over Finite Fields. - Tom Hirschowitz
:
Full abstraction for fair testing in CCS. - Steven D. Prestwich:
Improved Branch-and-Bound for Low Autocorrelation Binary Sequences. - Iulia Dumitru, Grigore Stamatescu, Ioana Fagarasan, Sergiu Stelian Iliescu:
Dynamic Management Techniques for Increasing Energy Efficiency within a Data Center. - Snigdha Paul, Nisheeth Joshi, Iti Mathur:
Development of a Hindi Lemmatizer. - Jean-François Bercher
:
Some results on a $χ$-divergence, an~extended~Fisher information and~generalized~Cramér-Rao inequalities. - Jean-François Bercher
:
On some interrelations of generalized $q$-entropies and a generalized Fisher information, including a Cramér-Rao inequality. - Vikram Arkalgud Chandrasetty, Syed Mahfuzul Aziz:
Resource Efficient LDPC Decoders for Multimedia Communication. - Grigore Stamatescu, Valentin Sgarciu:
Integration of Wireless Sensor Networks with Virtual Instrumentation in a Residential Environment. - Richard Moot:
Extended Lambek calculi and first-order linear logic. - (Withdrawn) A class of equivalent idle-time-order-based routing policies for heterogeneous multi-server systems.
- Anastasios Giovanidis, François Baccelli:
A Stochastic Geometry Framework for Analyzing Pairwise-Cooperative Cellular Networks. - Olesya Mryglod, Ralph Kenna, Yurij Holovatch, Bertrand Berche:
Comparison of a citation-based indicator and peer review for absolute and specific measures of research-group excellence. - Murdoch James Gabbay:
Semantics out of context: nominal absolute denotations for first-order logic and computation. - Juri Ranieri, Amina Chebira, Martin Vetterli:
Near-Optimal Sensor Placement for Inverse Problems. - Leslie Ann Goldberg, Mark Jerrum:
The Complexity of Approximately Counting Tree Homomorphisms. - Kristin Grace Erickson:
The Story of Telebrain: A multi-performer telematic platform for performatization. - Rodrigo C. de Lamare, Raimundo Sampaio Neto:
Adaptive Reduced-Rank Processing Using a Projection Operator Based on Joint Iterative Optimization of Adaptive Filters For CDMA Interference Suppression. - Jasleen Kaur, Filippo Radicchi, Filippo Menczer:
Universality of scholarly impact metrics. - Dawei Zhao, Haipeng Peng, Shudong Li, Yixian Yang:
An efficient dynamic ID based remote user authentication scheme using self-certified public keys for multi-server environment. - S. Karimi, K. B. Nakshatrala:
On multi-time-step monolithic coupling algorithms for elastodynamics. - Melor Md. Yunus, Julian Lau Kiing Tuan, Hadi Salehi:
Using Blogs to Promote Writing Skill in ESL Classroom. - Melor Md. Yunus, Hadi Salehi, Dexter Sigan Anak John:
Using Visual Aids as a Motivational Tool in Enhancing Students Interest in Reading Literary Texts. - Frank Vanderzwet:
Fractional Pebbling Game Lower Bounds. - Minh H.-T. Nguyen, Kok Kiong Tan, Wenyu Liang, Chek Sing Teo:
Robust Precision Positioning Control on Linear Ultrasonic Motor. - Jörg Hendrik Kappes, Markus Speth, Gerhard Reinelt, Christoph Schnörr:
Higher-order Segmentation via Multicuts. - Yu-e Sun, He Huang, Xiang-Yang Li, Zhili Chen, Wei Yang, Hongli Xu, Liusheng Huang:
Near-Optimal Truthful Auction Mechanisms in Secondary Spectrum Markets. - Minh Hoang-Tuan Nguyen, Kok Kiong Tan, Sunan Huang:
Enhanced Predictive Ratio Control of Interacting Systems. - Golnaz Badkobeh, Gabriele Fici, Zsuzsanna Lipták:
A Note on Words With the Smallest Number of Closed Factors. - Minh Hoang-Tuan Nguyen, Kok Kiong Tan:
From Parametric Model-based Optimization to robust PID Gain Scheduling. - Peter T. Breuer, Jonathan P. Bowen:
Towards Proving RISC Machine Code not Risky with respect to Memory Aliasing. - Arash Ahadi, Ali Dehghan:
The Complexity of the Proper Orientation Number. - Iheb Ben Amor, Athman Bouguettaya, Mourad Ouziri, Salima Benbernou, Mohamed Nadif:
Data Leak Aware Crowdsourcing in Social Network. - Martin Wimmer, Daniel Cederman, Jesper Larsson Träff, Philippas Tsigas:
Configurable Strategies for Work-stealing. - Junzhou Zhao, John C. S. Lui, Don Towsley, Xiaohong Guan, Pinghui Wang:
Social Sensor Placement in Large Scale Networks: A Graph Sampling Perspective. - Michael Hausenblas:
Notes on Physical & Logical Data Layouts. - Arthur Carvalho:
A Cooperative Coevolutionary Genetic Algorithm for Learning Bayesian Network Structures. - Gregory Malecha, Adam Chlipala, Thomas Braibant, Patrick Hulin, Edward Z. Yang:
MirrorShard: Proof by Computational Reflection with Verified Hints. - Michael A. Bender, Martin Farach-Colton, Sándor P. Fekete, Jeremy T. Fineman, Seth Gilbert:
Reallocation Problems in Scheduling. - Arthur Carvalho, Renato Oliveira:
Reinforcement Learning for the Soccer Dribbling Task. - Chandra Chekuri, Julia Chuzhoy:
Polynomial Bounds for the Grid-Minor Theorem. - Priyanka Kumar, Sathya Peri:
A TimeStamp based Multi-version STM Protocol that satisfies Opacity and Multi-Version Permissiveness. - Sven Apel, Dirk Beyer, Karlheinz Friedberger
, Franco Raimondi, Alexander von Rhein:
Domain Types: Selecting Abstractions Based on Variable Usage. - Stéphane Ross, Paul Mineiro, John Langford:
Normalized Online Learning. - Sheeraz Ahmad, Angela J. Yu:
Active Sensing as Bayes-Optimal Sequential Decision Making. - Trevor Campbell, Miao Liu, Brian Kulis, Jonathan P. How:
Dynamic Clustering via Asymptotics of the Dependent Dirichlet Process Mixture. - Yoshua Bengio, Li Yao, Guillaume Alain, Pascal Vincent:
Generalized Denoising Auto-Encoders as Generative Models. - Alejandro Erickson, Frank Ruskey:
Domino Tatami Covering is NP-complete. - Sergey Bereg, Ruy Fabila Monroy, David Flores-Peñaloza, Mario Alberto López, Pablo Pérez-Lantero:
Drawing the double circle on a grid of minimum size. - Yang Gao, Yan Chen, K. J. Ray Liu:
On Cost-Effective Incentive Mechanisms in Microtask Crowdsourcing. - Matthias Keil, Peter Thiemann:
Type-based Dependency Analysis for JavaScript. - Yulia Demyanova, Helmut Veith, Florian Zuleger:
On the Concept of Variable Roles and its Use in Software Analysis. - Shigeki Akiyama, Victor Marsault, Jacques Sakarovitch:
Auto-similarity in rational base number systems. - Nuno K. Pratas, Petar Popovski:
Low-Rate Machine-Type Communication via Wireless Device-to-Device (D2D) Links. - Marco Tomamichel, Vincent Yan Fu Tan:
ε-Capacities and Second-Order Coding Rates for Channels with General State. - Alison Callahan, Michel Dumontier:
Ovopub: Modular data publication with minimal provenance. - Krasimir Yordzhev:
A representation of context-free grammars with the help of finite digraphs. - (Withdrawn) Two Trivial Attacks on A5/1:A GSM Stream Cipher.
- Marie-Ange Lèbre, Frédéric Le Mouël, Eric Ménard:
Modèle multi-échelles pour les services dans les VANET. - Barbara Kordy, Piotr Kordy, Sjouke Mauw, Patrick Schweitzer:
ADTool: Security Analysis with Attack- Defense Trees (Extended Version). - Ernesto Estrada:
About the Discriminant Power of the Subgraph Centrality and Other Centrality Measures About the Discriminant Power of the Subgraph Centrality and Other Centrality Measures (Working paper). - Eduardo Nobre Lages, Eduardo S. S. da Silveira, D. T. Cintra, Alejandro César Frery:
An adaptive time integration strategy based on displacement history curvature. - Jürgen Kürsch:
Design and Realization of a Scalable Simulator of Magnetic Resonance Tomography. - Loet Leydesdorff, Ping Zhou:
Measuring the Knowledge-Based Economy of China in terms of Synergy among Technological, Organizational, and Geographic Attributes of Firms. - Ulric J. Ferner, Tong Wang, Muriel Médard, Emina Soljanin:
Resolution-aware network coded storage. - Joscha Diehl:
Rotation invariants of two dimensional curves based on iterated integrals. - Dirk Beyer, Stefan Löwe, Evgeny Novikov, Andreas Stahlbauer, Philipp Wendler:
Reusing Precisions for Efficient Regression Verification. - Thiago Vallin Spina, Mariano Tepper, Amy Esler, Vassilios Morellas, Nikolaos Papanikolopoulos, Alexandre X. Falcão, Guillermo Sapiro:
Video Human Segmentation using Fuzzy Object Models and its Application to Body Pose Estimation of Toddlers for Behavior Studies. - Eugenio Hernández, Daniel Vera:
Greedy type algorithms for RIP matrices. A study of two selection rules. - Patrick Loiseau, Galina Schwartz, John Musacchio, Saurabh Amin, S. Shankar Sastry:
Incentive Mechanisms for Internet Congestion Management: Fixed-Budget Rebate versus Time-of-Day Pricing. - Johan Ugander, Brian Karrer, Lars Backstrom, Jon M. Kleinberg:
Graph cluster randomization: network exposure to multiple universes. - Jie Dong, David B. Smith:
Coexistence and Interference Mitigation for Wireless Body Area Networks: Improvements using On-Body Opportunistic Relaying. - Yi Ouyang, Demosthenis Teneketzis:
On The Optimality of Myopic Sensing in Multi-State Channels. - Walaa Eldin Moustafa, Angelika Kimmig, Amol Deshpande, Lise Getoor:
Subgraph Pattern Matching over Uncertain Graphs with Identity Linkage Uncertainty. - Bohdan M. Pavlyshenko:
Tweets Miner for Stock Market Analysis. - Mathieu Desoubeaux, Cédric Herzet, William Puech, Gaëtan Le Guelvouit:
Enhanced blind decoding of Tardos codes with new map-based functions. - Dennis Guck, Hassan Hatefi, Holger Hermanns, Joost-Pieter Katoen, Mark Timmer:
Modelling, Reduction and Analysis of Markov Automata (extended version). - Kaihua Zhang, Lei Zhang, Kin-Man Lam, David Zhang:
A Local Active Contour Model for Image Segmentation with Intensity Inhomogeneity. - Uwe Aickelin:
Dienstplanerstellung in Krankenhaeusern mittels genetischer Algorithmen. - Sahar A. Mokhtar, Alaa M. Elsayad:
Predicting the Severity of Breast Masses with Data Mining Methods. - Nora Y. Ibrahim, Sahar A. Mokhtar, Hany M. Harb:
Towards an Ontology based integrated Framework for Semantic Web. - Prasenjit Chanak, Tuhina Samanta, Indrajit Banerjee:
Fault-tolerant multipath routing scheme for energy efficient wireless sensor networks. - Celestine Periale Maguedong-Djoumessi, José Hernández-Orallo:
Test cost and misclassification cost trade-off using reframing. - Mohamed Ahmed, Stefano Traverso, Paolo Giaccone, Emilio Leonardi, Saverio Niccolini:
Why Temporal Locality Matters: Evaluating Cache Performance for Content-on-Demand Distribution. - Bruno Courcelle, Irène Durand:
Computations by fly-automata beyond monadic second-order logic. - Guillaume Mercère:
Regression techniques for subspace-based black-box state-space system identification: an overview. - Gianni Tedesco, Uwe Aickelin:
Adaptive Alert Throttling for Intrusion Detection Systems. - William O. Wilson, Uwe Aickelin:
Memory Implementations - Current Alternatives. - Uwe Aickelin, Julie Greensmith, Jamie Twycross:
Immune System Approaches to Intrusion Detection - A Review (ICARIS). - Peer-Olaf Siebers, Uwe Aickelin, David Menachof, Galina Sherman, Peter Zimmerman:
Modelling and Analysing Cargo Screening Processes: A Project Outline. - Michele Coscia, Giulio Rossetti, Diego Pennacchioli, Damiano Ceccarelli, Fosca Giannotti:
"You Know Because I Know": a Multidimensional Network Approach to Human Resources Problem. - Pavels Zaicenkovs, Bert Gijsbers, Clemens Grelck, Olga Tveretina, Alexander V. Shafarenko:
Communication-Centric Solution for Cholesky Decomposition: Industrial Case Study for Coordination Programming. - Shawn Mankad, George Michailidis:
Structural and Functional Discovery in Dynamic Networks with Non-negative Matrix Factorization. - Gang Huang, Hong Jiang, Kim Matthews, Paul A. Wilford:
Lensless Imaging by Compressive Sensing. - Kai Cai, Hideaki Ishii:
Average Consensus on Arbitrary Strongly Connected Digraphs with Time-Varying Topologies. - Philippe A. Martin:
Collaborative ontology sharing and editing. - Philippe A. Martin:
For a Semantic Web based Peer-reviewing and Publication of Research Results. - Philippe A. Martin:
Organizing Linked Data Quality Related Methods. - Jianwei Xie, Sennur Ulukus:
Secure Degrees of Freedom of K-User Gaussian Interference Channels: A Unified View. - Balaji Lakshminarayanan, Yee Whye Teh:
Inferring ground truth from multi-annotator ordinal data: a probabilistic approach. - Gregory Ely, Shuchin Aeron:
Complexity penalized hydraulic fracture localization and moment tensor estimation under limited model information. - Zeinab Taghavi, Narjes S. Movahedi, Sorin Draghici, Hamidreza Chitsaz:
Distilled Single Cell Genome Sequencing and De Novo Assembly for Sparse Microbial Communities. - Samuel Reid:
On Generalizing a Temporal Formalism for Game Theory to the Asymptotic Combinatorics of S5 Modal Frames. - Lilian Janin, Giovanna Rosone, Anthony J. Cox:
Adaptive reference-free compression of sequence quality scores. - Amin Coja-Oghlan:
Upper-bounding the k-colorability threshold by counting covers. - Yves Berset, Matús Medo:
The effect of the initial network configuration on preferential attachment. - Akshay Krishnamurthy, James Sharpnack, Aarti Singh:
Recovering Graph-Structured Activations using Adaptive Compressive Measurements. - Nathan D. Monnig, Bengt Fornberg, François G. Meyer:
Inverting Non-Linear Dimensionality Reduction with Scale-Free Radial Basis Interpolation. - Richard J. Hughes, Jane E. Nordholt, Kevin P. McCabe, Raymond T. Newell
, Charles G. Peterson, Rolando D. Somma:
Network-Centric Quantum Communications with Application to Critical Infrastructure Protection. - Adel Javanmard, Andrea Montanari:
Model Selection for High-Dimensional Regression under the Generalized Irrepresentability Condition. - Hai-Feng Zhang, Zimo Yang, Zhi-Xi Wu, Bing-Hong Wang, Tao Zhou:
Braess's Paradox in Epidemic Game: Better Condition Results in Less Payoff. - Giuliano Andrea Pagani, Marco Aiello:
From the Grid to the Smart Grid, Topologically. - Matthew Babbitt, Jesse Geneson, Tanya Khovanova:
On k-visibility graphs. - Renaud Lambiotte, Lionel Tabourier, Jean-Charles Delvenne:
Burstiness and spreading on temporal networks. - David Garber, Delaram Kahrobaei, Ha T. Lam:
Analyzing the Length-Based Attack on Polycyclic Groups. - Matjaz Perc:
Self-organization of progress across the century of physics. - José M. Peña:
Marginal AMP Chain Graphs. - Vadym Kliuchnikov
, Dmitri Maslov
:
Optimization of Clifford Circuits. - Maris Ozols
, Graeme Smith, John A. Smolin:
Bound entangled states with secret key and their classical counterpart. - Andrés Gomberoff, Víctor Muñoz, Pierre Paul Romagnoli:
The physics of custody arrangements. - Rida Laraki, Panayotis Mertikopoulos:
Inertial game dynamics and applications to constrained optimization. - Andris Ambainis, Kaspars Balodis, Janis Iraids, Raitis Ozols, Juris Smotrovs:
Parameterized Quantum Query Complexity of Graph Collision. - Mohammad Gheshlaghi Azar, Alessandro Lazaric, Emma Brunskill:
Regret Bounds for Reinforcement Learning with Policy Advice. - Ting-Li Chen:
On the Convergence and Consistency of the Blurring Mean-Shift Process. - Coco Krumme, Alejandro Llorente, Manuel Cebrián, Alex Pentland, Esteban Moro Egido:
The predictability of consumer visitation patterns. - Lazaros K. Gallos, Fabricio Q. Potiguar, José S. Andrade Jr., Hernán A. Makse:
IMDB network revisited: unveiling fractal and modular properties from a typical small-world network. - Fabrizio Lecci, Alessandro Rinaldo, Larry A. Wasserman:
Statistical Analysis of Metric Graph Reconstruction. - Alessandro Mirone, Emmanuel Brun, Paola Coan:
A Convex Functional for Image Denoising based on Patches with Constrained Overlaps and its vectorial application to Low Dose Differential Phase Tomography. - Bernard C. Levy, Mattia Zorzi
:
A Contraction Analysis of the Convergence of Risk-Sensitive Filters. - Attila Szolnoki, Matjaz Perc:
Decelerated invasion and waning moon patterns in public goods games with delayed distribution. - Kevin C. Zatloukal:
Classical and Quantum Algorithms for Testing Equivalence of Group Extensions. - Nikolai Krivulin:
A constrained tropical optimization problem: complete solution and application example. - Alessandro Attanasi, Andrea Cavagna, Lorenzo Del Castello, Irene Giardina, Asja Jelic, Stefania Melillo, Leonardo Parisi, Edward Shen, Edmondo Silvestri, Massimiliano Viale:
Tracking in three dimensions via multi-path branching. - Julian Mautner, Adi Makmal, Daniel Manzano, Markus Tiersch, Hans J. Briegel:
Projective simulation for classical learning agents: a comprehensive investigation. - Yusuf Erol, Lei Li, Bharath Ramsundar, Stuart Russell:
The Extended Parameter Filter. - Carsten W. Scherer:
Structured H∞-Optimal Control for Nested Interconnections: A State-Space Solution. - Ronen Dar, Mark Shtaif, Meir Feder:
New Bounds on the Capacity of Fiber-Optics Communications. - Nikolaos Tziortziotis, Christos Dimitrakakis, Konstantinos Blekas:
Cover Tree Bayesian Reinforcement Learning. - Rajat Shuvro Roy, Debashish Bhattacharya, Alexander Schliep:
Turtle: Identifying frequent k-mers with cache-efficient algorithms. - François Bertault, Mirka Miller, Hebert Pérez-Rosés, Ramiro Feria-Purón, Elaheh Vaezpour:
A Heuristic for Magic and Antimagic Graph Labellings. - João F. C. Mota, João M. F. Xavier, Pedro M. Q. Aguiar, Markus Püschel:
Distributed Optimization With Local Domains: Applications in MPC and Network Flows. - Steven Thomas Smith:
Geometric Optimization Methods for Adaptive Filtering. - Andrew S. Lan, Christoph Studer, Andrew E. Waters, Richard G. Baraniuk:
Joint Topic Modeling and Factor Analysis of Textual Information and Graded Response Data. - Vasanthan Raghavan, Greg Ver Steeg, Aram Galstyan, Alexander G. Tartakovsky:
Modeling Temporal Activity Patterns in Dynamic Social Networks. - Manu Basavaraju, Mathew C. Francis:
Strong chromatic index of chordless graphs. - Patrick E. Meyer:
A Rank Minrelation - Majrelation Coefficient. - Igor Pak, Jed Yang:
The complexity of generalized domino tilings. - Gregory Ely, Shuchin Aeron:
Robust Hydraulic Fracture Monitoring (HFM) of Multiple Time Overlapping Events Using a Generalized Discrete Radon Transform. - Gregory Ely, Shuchin Aeron, Eric L. Miller:
Exploiting Structural Complexity for Robust and Rapid Hyperspectral Imaging. - Jonathan D. Hogg, Jennifer A. Scott:
Compressed threshold pivoting for sparse symmetric indefinite systems. - Michele Starnini, Anna Machens, Ciro Cattuto, Alain Barrat, Romualdo Pastor-Satorras:
Immunization strategies for epidemic processes in time-varying contact networks. - George A. Lozano:
Ethics of using language editing services in an era of digital communication and heavily multiauthored papers. - Po-Ling Loh, Martin J. Wainwright:
Regularized M-estimators with nonconvexity: Statistical and algorithmic theory for local optima. - Sonia Pérez-Díaz, Li-Yong Shen:
Numerical Reparametrization of Rational Parametric Plane Curves. - Zdenek Dvorák, Bernard Lidický:
3-coloring triangle-free planar graphs with a precolored 8-cycle. - Kristof Z. Szalay, Peter Csermely:
Perturbation centrality: a novel centrality measure obtained by the general network dynamics tool, Turbine. - Guiomar Niso, Ricardo Bruña, Ernesto Pereda, Ricardo Gutiérrez, Ricardo Bajo, Fernando Maestú, Francisco del Pozo:
HERMES: towards an integrated toolbox to characterize functional and effective brain connectivity. - Shai Shalev-Shwartz, Tong Zhang:
Accelerated Mini-Batch Stochastic Dual Coordinate Ascent. - Zdenek Dvorák, Bernard Lidický:
4-critical graphs on surfaces without contractible (<=4)-cycles. - Vinh Phu Nguyen, Pierre Kerfriden, Stéphane P. A. Bordas:
Isogeometric cohesive elements for two and three dimensional composite delamination analysis. - Bosiljka Tadic, Milovan Suvakov:
Can Human-Like Bots Control Collective Mood: Agent-Based Simulations of Online Chats. - Igor Pak, Jed Yang:
Tiling simply connected regions with rectangles. - Naoki Masuda, Konstantin Klemm, Víctor M. Eguíluz:
Temporal networks: slowing down diffusion by long lasting interactions. - Grady I. Lemoine, Miao-Jung Yvonne Ou:
Finite Volume Modeling of Poroelastic-Fluid Wave Propagation with Mapped Grids. - Julien Mairal:
Optimization with First-Order Surrogate Functions. - Marko Seslija, Jacquelien M. A. Scherpen, Arjan van der Schaft:
Reaction-Diffusion Systems as Complex Networks. - Gabriel C. Drummond-Cole:
An update on domineering on rectangular boards. - Rémi Louf, Pablo Jensen, Marc Barthelemy:
Emergence of hierarchy in cost driven growth of spatial networks. - Eric C. Chi, Kenneth Lange:
Stable Estimation of a Covariance Matrix Guided by Nuclear Norm Penalties. - Giovanni Birolo:
A Witness Extraction Technique by Proof Normalization Based on Interactive Realizability. - Walter Quattrociocchi, Guido Caldarelli, Antonio Scala:
Self-healing networks: redundancy and structure. - Alain Barrat, Ciro Cattuto:
Temporal networks of face-to-face human interactions. - Clive Elphick, Pawel Wocjan:
Strengthening Turan's Theorem for Irregular Graphs. - Erol Gelenbe, Omer H. Abdelrahman:
Search in Random Media with Lévy Flights. - Knut Skogstrand Gjerden:
Making the case of GPUs in courses on computational physics. - Changtao Yu:
On dually flat $(α,β)$-metrics. - Fada Li, Wansu Bao, Xiangqun Fu, Yuchao Zhang, Tan Li:
A subexponential-time quantum algorithm for LWE problem. - Ameer K. Mulla, Rachel K. Kalaimani, Debraj Chakraborty, Madhu N. Belur:
Formation control with pole placement for multi-agent systems. - Egbert Rijke, Bas Spitters:
Sets in homotopy type theory. - Giovanni Luca Ciampaglia:
A framework for the calibration of social simulation models. - Giovanna Miritello, Rubén Lara, Esteban Moro Egido:
Time allocation in social networks: correlation between social structure and human communication dynamics. - Anna Blasiak:
Multicut Lower Bounds via Network Coding. - Roarke Horstmeyer
, Benjamin Judkewitz, Ivo M. Vellekoop, Changhuei Yang:
Physical key-protected one-time pad. - Piotr Fronczak, Agata Fronczak, Maksymilian Bujok:
Exponential random graph models for networks with community structure. - Martin Horsch, Stefan Becker, Juan Manuel Castillo, Stephan Deublein, Agnes Fröscher, Steffen Reiser, Stephan Werth, Jadran Vrabec, Hans Hasse:
Molecular modelling and simulation of electrolyte solutions, biomolecules, and wetting of component surfaces. - I. Geisel, Kai Cordes, J. Mahnke, S. Jöllenbeck, Jörn Ostermann, J. Arlt, Wolfgang Ertmer, Carsten Klempt:
Evolutionary optimization of an experimental apparatus. - Daniel Perrucci, Marie-Françoise Roy:
Zero-nonzero and real-nonreal sign determination. - LeRoy Beasely, Troy Lee, Hartmut Klauck, Dirk Oliver Theis:
Dagstuhl Report 13082: Communication Complexity, Linear Optimization, and lower bounds for the nonnegative rank of matrices. - Ralf Meyer:
Efficient Parallelization of Short-Range Molecular Dynamics Simulations on Many-Core Systems. - Emmanuel Abbe, Andrea Montanari:
Conditional Random Fields, Planted Satisfaction, and Entropy Concentration. - Gunther Reißig:
On the maximum rank of Toeplitz block matrices of blocks of a given pattern. - Pietro Galliani:
Upwards Closed Dependencies in Team Semantics. 93-106 - Pablo Piedrahíta, Javier Borge-Holthoefer, Yamir Moreno, Alex Arenas:
Modeling self-sustained activity cascades in socio-technical networks. - Nikolai Krivulin:
Solution of linear equations and inequalities in idempotent vector spaces. - Hiromu Mori, Yoshihiro Matsumoto, Victor V. Kryssanov, Eric W. Cooper, Hitoshi Ogawa, Shoji Makino, Zbigniew R. Struzik, Tomasz M. Rutkowski:
Multi-command Tactile Brain Computer Interface: A Feasibility Study. - James P. Gleeson, Jonathan A. Ward, Kevin P. O'Sullivan, William T. Lee:
Competition-induced criticality in a model of meme popularity. - Michiaki Hamada, Hisanori Kiryu, Wataru Iwasaki, Kiyoshi Asai:
Generalized Centroid Estimators in Bioinformatics. - Junjie Qin, Baosen Zhang, Ram Rajagopal:
Risk Limiting Dispatch with Ramping Constraints. - Akira Saitoh:
Realistic cost for the model of coherent computing. - Gérard Henry Edmond Duchamp, Ladji Kane, Vincel Hoang Ngoc Minh, Christophe Tollu:
Dual bases for non commutative symmetric and quasi-symmetric functions via monoidal factorization. - Chen Bui, Gérard Henry Edmond Duchamp, Vincel Hoang Ngoc Minh:
Schützenberger's factorization on the (completed) Hopf algebra of $q-$stuffle product. - Shantanav Chakraborty, Subhashish Banerjee
, Satyabrata Adhikari, Atul Kumar:
Entanglement in the Grover's Search Algorithm. - Anand D. Sarwate, Tara Javidi:
Distributed Learning of Distributions via Social Sampling. - Jack Poulson, Laurent Demanet, Nicholas Maxwell, Lexing Ying:
A parallel butterfly algorithm. - Evguenii V. Kurmyshev, Héctor A. Juárez:
What is a leader of opinion formation in bounded confidence models? - David G. Messerschmitt:
End-to-end interstellar communication system design for power efficiency. - Zhaosong Lu, Lin Xiao:
On the Complexity Analysis of Randomized Block-Coordinate Descent Methods. - Vladimir Ejov, Michael Haythorpe, Serguei Rossomakhine:
A Linear-size Conversion of HCP to 3HCP. - Bruno Ziliotto:
Zero-sum repeated games: counterexamples to the existence of the asymptotic value and the conjecture maxmin=lim v(n). - Martin Rosvall, Alcides Viamontes Esquivel, Andrea Lancichinetti, Jevin D. West, Renaud Lambiotte:
Networks with Memory. - Marcos A. Kiwi, Cristina G. Fernandes:
Repetition-free longest common subsequence of random sequences. - Christopher J. Paciorek, Benjamin Lipshitz, Wei Zhuo, Prabhat, Cari Kaufman, Rollin C. Thomas:
Parallelizing Gaussian Process Calculations in R. - Joshua Garland, Elizabeth Bradley:
On the importance of nonlinear modeling in computer performance prediction. - Mohammadreza Chamanbaz, Fabrizio Dabbene, Roberto Tempo, Venkatakrishnan Venkataramanan, Qing-Guo Wang:
A Statistical Learning Theory Approach for Uncertain Linear and Bilinear Matrix Inequalities. - Yuchen Zhang, John C. Duchi, Martin J. Wainwright:
Divide and Conquer Kernel Ridge Regression: A Distributed Algorithm with Minimax Optimal Rates. - Jean-François Bercher
:
Some properties of generalized Fisher information in the context of nonextensive thermostatistics. - Wenyi Zhang, Wei Guan, Jihui Ma, Junfang Tian:
A nonlinear pair-wise swapping dynamic to model the selfish rerouting evolutionary game. - Neven Caplar, Mirko Suznjevic, Maja Matijasevic:
Analysis of player's in-game performance vs rating: Case study of Heroes of Newerth. - L. Sunil Chandran, Wilfried Imrich, Rogers Mathew, Deepak Rajendraprasad:
Boxicity and Cubicity of Product Graphs. - Christian Doerr, Norbert Blenn, Piet Van Mieghem:
Lognormal Infection Times of Online Information Spread. - Kerstin Dächert, Kathrin Klamroth:
A linear bound on the number of scalarizations needed to solve discrete tricriteria optimization problems. - Fernando G. S. L. Brandão, Michal Horodecki, Nelly Huei Ying Ng
, Jonathan Oppenheim, Stephanie Wehner:
The second laws of quantum thermodynamics. - Shie Mannor
, Vianney Perchet, Gilles Stoltz:
A Primal Condition for Approachability with Partial Monitoring. - Benjamin Smith
:
Families of fast elliptic curves from Q-curves. - Joshua Garland, Ryan G. James, Elizabeth Bradley:
Determinism, Complexity, and Predictability in Computer Performance. - Frédéric P. A. Vogt, Luke J. Shingles
:
Augmented Reality in Astrophysics. - Taha Yasseri, Anselm Spoerri, Mark Graham, János Kertész:
The most controversial topics in Wikipedia: A multilingual and geographical analysis. - Sijia Liu, Makan Fardad, Engin Masazade, Pramod K. Varshney:
Optimal Periodic Sensor Scheduling in Large-Scale Dynamical Networks. - Ruonan Wang, Christopher Harris:
Scaling Radio Astronomy Signal Correlation on Heterogeneous Supercomputers Using Various Data Distribution Methodologies. - Li Yang, Rui-Rui Zhou:
Post-quantum security of encrypted key exchange protocol. - Eckhard Hitzer, Tohru Nitta, Yasuaki Kuroe:
Applications of Clifford's Geometric Algebra. - Yin Song, Longbing Cao, Xuhui Fan, Wei Cao, Jian Zhang:
Characterizing A Database of Sequential Behaviors with Latent Dirichlet Hidden Markov Models. - Christopher Aicher, Abigail Z. Jacobs, Aaron Clauset:
Adapting the Stochastic Block Model to Edge-Weighted Networks. - Luca Consolini, Manfredi Maggiore:
Control of a Bicycle Using Virtual Holonomic Constraints. - Jie Chen, Nannan Cao, Kian Hsiang Low, Ruofei Ouyang, Colin Keng-Yan Tan, Patrick Jaillet:
Parallel Gaussian Process Regression with Low-Rank Covariance Matrix Approximations. - Shu-Zhen Lai, Hou-Biao Li, Zu-Tao Zhang:
A Symmetric Rank-one Quasi Newton Method for Non-negative Matrix Factorization. - Andrew Suk:
A note on order-type homogeneous point sets. - Yichen Huang:
Computational complexity of quantum correlation: quantum discord is NP-complete. - Pietro Galliani, Jouko A. Väänänen:
On Dependence Logic. - Laszlo Gyongyosi:
The Private Classical Capacity of a Partially Degradable Quantum Channel. - John C. Duchi, Michael I. Jordan, Martin J. Wainwright:
Local Privacy and Minimax Bounds: Sharp Rates for Probability Estimation. - Ron Aharoni, Pierre Charbit, David M. Howard:
On a Generalization of the Ryser-Brualdi-Stein Conjecture. - Dimitris Kugiumtzis:
Direct coupling information measure from non-uniform embedding. - William M. Farmer:
Chiron: A Set Theory with Types, Undefinedness, Quotation, and Evaluation. - Michael J. Barber:
Detecting hierarchical and overlapping network communities using locally optimal modularity changes. - Frédéric Chazal, Marc Glisse, Catherine Labruère, Bertrand Michel:
Optimal rates of convergence for persistence diagrams in Topological Data Analysis. - Zhengchao Wei, Zhi Ma:
Easily Implemented Rate Compatible Reconciliation Protocol for Quantum Key Distribution. - Lisi D'Alfonso, Gabriela Jeronimo, Pablo Solernó:
Effective Differential Nullstellensatz for Ordinary DAE Systems over the Complex Numbers. - Cristóbal A. Navarro, Fabrizio Canfora, Nancy Hitschfeld-Kahler:
Multi-core computation of transfer matrices for strip lattices in the Potts model. - Vance Faber:
Global communication algorithms for Cayley graphs. - Xiao Liang, Jichang Zhao, Li Dong, Ke Xu:
Unraveling the origin of exponential law in intra-urban human mobility. - Andrea Cerri, Claudia Landi:
Stability of persistence spaces of vector-valued continuous functions. - Michael Small, Kevin Judd, Thomas Stemler:
What is preferential to preferential attachment? - Pavel Chebotarev, Rafig Agaev:
Matrices of forests, analysis of networks, and ranking problems. - Gilad Gour:
General symmetric informationally complete measurements exist in all dimensions. - David Aristoff, Tony Lelièvre:
Mathematical Analysis of Temperature Accelerated Dynamics. - Maxime Viallet, Isabelle Baraffe, Rolf Walder:
Comparison of different nonlinear solvers for 2D time-implicit stellar hydrodynamics. - Daniel Oliveira Cajueiro, Roberto F. S. Andrade:
Controlling self-organized criticality in complex networks. - Efstratios Rappos, Stephan Robert:
Using GPU Simulation to Accurately Fit to the Power-Law Distribution. - Rafael R. Kamalian:
Examples of cyclically-interval non-colorable bipartite graphs. - John Kit Tang, Ilias Leontiadis, Salvatore Scellato, Vincenzo Nicosia, Cecilia Mascolo, Mirco Musolesi, Vito Latora:
Applications of Temporal Graph Metrics to Real-World Networks. - Markus Gusenbauer, Harald Özelt, Johann Fischbacher, Franz Reichel, Lukas Exl, Simon Bance, Nadezhda Kataeva, Claudia Binder, Hubert Brückl, Thomas Schrefl:
Simulation of magnetic active polymers for versatile microfluidic devices. - Markus Gusenbauer, Ha Nguyen, Franz Reichel, Lukas Exl, Simon Bance, Johann Fischbacher, Harald Özelt, Alexander Kovacs, Martin Brandl, Thomas Schrefl:
Guided self-assembly of magnetic beads for biomedical applications. - Jean-Florent Raymond, Dimitrios M. Thilikos:
Low Polynomial Exclusion of Planar Graph Patterns. - Mouhamed Abdulla, Yousef R. Shayan:
Harnessing Simultaneously the Benefits of UWB and MBWA: A Practical Scenario. - Ansuman Adhikary, Giuseppe Caire:
Joint Spatial Division and Multiplexing: Opportunistic Beamforming and User Grouping. - I. Ayachi, Ryan Kammarti, Mekki Ksouri, Pierre Borne:
Harmony search to solve the container storage problem with different container types. - Ali Seyfi:
A Focused Crawler Combinatory Link and Content Model Based on T-Graph Principles. - Liang Heng, Grace Xingxin Gao:
Accuracy of Range-Based Cooperative Localization in Wireless Sensor Networks: A Lower Bound Analysis. - Chunming Tang, Yanfeng Qi, Maozhi Xu:
A Note on Cyclic Codes from APN Functions. - Ying Wang, Chunhong Pan, Shiming Xiang, Feiyun Zhu:
Robust Hyperspectral Unmixing with Correntropy based Metric. - Minh-Quoc Nghiem, Giovanni Yoko Kristianto, Goran Topic, Akiko Aizawa:
A hybrid approach for semantic enrichment of MathML mathematical expressions. - Cenk M. Yetis, Yong Zeng, Kushal Anand, Yong Liang Guan, Erry Gunawan:
Sub-Stream Fairness and Numerical Correctness in MIMO Interference Channels. - M. Naresh Kumar:
Alternating Decision trees for early diagnosis of dengue fever. - Holger Hermanns, Jan Krcál, Jan Kretínský:
Compositional Verification and Optimization of Interactive Markov Chains. - Frank Dylla, Till Mossakowski, Thomas Schneider, Diedrich Wolter:
Algebraic Properties of Qualitative Spatio-Temporal Calculi. - Bharat Adsul, Jinesh Machchhar, Milind A. Sohoni:
Local and Global Analysis of Parametric Solid Sweeps. - Bruno Barras, Lourdes Del Carmen González-Huesca, Hugo Herbelin, Yann Régis-Gianas, Enrico Tassi, Makarius Wenzel, Burkhart Wolff:
Pervasive Parallelism in Highly-Trustable Interactive Theorem Proving Systems. - Jean-Florent Raymond, Dimitrios M. Thilikos:
Polynomial Gap Extensions of the Erdős-Pósa Theorem. - Roberto Di Pietro, Flavio Lombardi, Antonio Villani:
CUDA Leaks: Information Leakage in GPU Architectures. - Anwarul Azim:
Performance of Single User vs. Multiuser Modulation in Wireless Multicarrier (MC) Communications. - Jonathan Stuart Ward, Adam Barker:
Monitoring Large-Scale Cloud Systems with Layered Gossip Protocols. - Zhe Chen, Daqiang Zhang, Rongbo Zhu, Yinxue Ma, Ping Yin, Feng Xie:
A Review of Automated Formal Verification of Ad Hoc Routing Protocols for Wireless Sensor Networks. - Marie-Pierre Béal, Michel Blockelet, Catalin Dima:
Sofic-Dyck shifts. - Feng Gu, Julie Greensmith, Uwe Aickelin:
The Dendritic Cell Algorithm for Intrusion Detection. - Galina Sherman, Peer-Olaf Siebers, David Menachof, Uwe Aickelin:
Evaluating Different Cost-Benefit Analysis Methods for Port Security Operations. - Adrian Adewunmi, Uwe Aickelin:
Investigating the effectiveness of Variance Reduction Techniques in Manufacturing, Call Center and Cross-docking Discrete Event Simulation Models. - Marco Canini, Petr Kuznetsov, Dan Levin, Stefan Schmid:
A Distributed SDN Control Plane for Consistent Policy Updates. - Peter Grindrod, Desmond J. Higham:
Dynamical Systems to Monitor Complex Networks in Continuous Time. - Amanda M. Whitbrook, Uwe Aickelin, Jonathan M. Garibaldi:
Real-world Transfer of Evolved Artificial Immune System Behaviours between Small and Large Scale Robotic Platforms. - William O. Wilson, Phil Birkin, Uwe Aickelin:
Motif Detection Inspired by Immune Memory (JORS). - Tao Zhang, Peer-Olaf Siebers, Uwe Aickelin:
Modelling Electricity Consumption in Office Buildings: An Agent Based Approach. - Stefan Fafianie, Hans L. Bodlaender, Jesper Nederlof:
Speeding-up Dynamic Programming with Representative Sets - An Experimental Evaluation of Algorithms for Steiner Tree on Tree Decompositions. - Jan Feyereisl, Uwe Aickelin:
Privileged Information for Data Clustering. - Chris M. Roadknight, Uwe Aickelin, Galina Sherman:
Validation of a Microsimulation of the Port of Dover. - Yihui Liu, Uwe Aickelin, Jan Feyereisl, Lindy Durrant:
Wavelet feature extraction and genetic algorithm for biomarker detection in colorectal cancer data. - Feng Xia, Linqiang Wang, Daqiang Zhang, Xue Zhang, Ruixia Gao:
Ada-MAC: An Adaptive MAC Protocol for Real-time and Reliable Health Monitoring, . - Simon Miller, Susan Appleby, Jonathan M. Garibaldi, Uwe Aickelin:
Towards a More Systematic Approach to Secure Systems Design and Analysis. - Grazziela P. Figueredo, Peer-Olaf Siebers, Uwe Aickelin:
Investigating Mathematical Models of Immuno-Interactions with Early-Stage Cancer under an Agent-Based Modelling Perspective. - Feng Gu, Julie Greensmith, Uwe Aickelin:
Theoretical formulation and analysis of the deterministic dendritic cell algorithm. - Xiyang Liu, Zhongjie Ren, Xiuling Chang, Haichang Gao, Uwe Aickelin:
Draw a line on your PDA to authenticate. - Anirudha Majumdar, Ram Vasudevan, Mark M. Tobenkin, Russ Tedrake:
Technical Report: Convex Optimization of Nonlinear Feedback Controllers via Occupation Measures. - Liming Wang, Xiuling Chang, Zhongjie Ren, Haichang Gao, Xiyang Liu, Uwe Aickelin:
Against Spyware Using CAPTCHA in Graphical Password Scheme. - Farhan Sahito, Wolfgang Slany:
Advanced Personnel Vetting Techniques in Critical Multi-Tennant Hosted Computing Environments. - Michael A. Demetriou:
Adaptation and optimization of synchronization gains in networked distributed parameter systems. - Kevin Judd, Michael Small, Thomas Stemler:
What exactly are the properties of scale-free and other networks? - J. M. Landsberg:
Geometric Complexity Theory: an introduction for geometers. - L. Chakhmakhchyan, D. L. Shepelyansky:
PageRank model of opinion formation on Ulam networks. - Tian Qiu, Tiantian Wang, Zi-Ke Zhang, Li-Xin Zhong, Guang Chen:
Heterogeneity Involved Network-based Algorithm Leads to Accurate and Personalized Recommendations. - James P. Gleeson, Davide Cellai, Jukka-Pekka Onnela, Mason A. Porter, Felix Reed-Tsochas:
A Simple Generative Model of Collective Online Behaviour. - Luis Sola, Miguel Romance, Regino Criado, Julio Flores, Alejandro García del Amo, Stefano Boccaletti:
Eigenvector centrality of nodes in multiplex networks. - Jason D. Lee, Yuekai Sun, Jonathan E. Taylor:
On model selection consistency of regularized M-estimators. - Duanbing Chen, Rui Xiao, An Zeng, Yi-Cheng Zhang:
Path diversity improves the identification of influential spreaders. - Pavel Chebotarev:
Studying new classes of graph metrics. - Richard Jozsa, Maarten Van den Nest:
Classical simulation complexity of extended Clifford circuits. - Robert Lukotka, Ján Mazák, Xuding Zhu:
Maximum 4-degenerate subgraph of a planar graph. - Han Liu, Lie Wang, Tuo Zhao:
Calibrated Multivariate Regression with Application to Neural Semantic Basis Discovery.

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.