![](https://dblp1.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp1.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp1.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
default search action
CoRR, November 2005
- Syed Ali Jafar:
Capacity with Causal and Non-Causal Side Information - A Unified View. - Alberto Accomazzi, Michael J. Kurtz, Günther Eichhorn, Edwin A. Henneken, Carolyn Stern-Grant, Markus Demleitner, Stephen S. Murray:
Bibliographic Classification using the ADS Databases. - Michael B. Baer:
Optimal Prefix Codes for Infinite Alphabets with Nonlinear Costs. - A. E. Eiben, Marc Schoenauer:
Evolutionary Computing. - Santo Fortunato, Alessandro Flammini, Filippo Menczer, Alessandro Vespignani:
The egalitarian effect of search engines. - Jean Goubault-Larrecq, Slawomir Lasota, David Nowak:
Logical Relations for Monadic Types. - J. Ignacio Alvarez-Hamelin, Luca Dall'Asta, Alain Barrat, Alessandro Vespignani:
k-core decomposition: a tool for the analysis of large scale Internet graphs. - Yuming Jiang:
Analysis of Stochastic Service Guarantees in Communication Networks: A Basic Calculus. - Ioannis Kontoyiannis, Ram Zamir:
Mismatched codebooks and the role of entropy-coding in lossy data compression. - Nadir Kiyanclar:
A Survey of Virtualization Techniques Focusing on Secure On-Demand Cluster Computing. - Hamilton Link, Jared Saia, Terran Lane, Randall A. LaViolette:
The Impact of Social Networks on Multi-Agent Recommender Systems. - Hamilton Link, Randall A. LaViolette, Jared Saia, Terran Lane:
Parameters Affecting the Resilience of Scale-Free Networks to Random Failures. - Zengyou He, Xiaofei Xu, Shengchun Deng:
K-ANMI: A Mutual Information Based Clustering Algorithm for Categorical Data. - Helmut Seidl, Kumar Neeraj Verma:
Flat and One-Variable Clauses: Complexity of Verifying Cryptographic Protocols with Single Blind Copying. - Prashant:
Towards a Hierarchical Model of Consciousness, Intelligence, Mind and Body. - Santo Fortunato, Marián Boguñá, Alessandro Flammini, Filippo Menczer:
How to make the top ten: Approximating PageRank from in-degree. - Gus Gutoski:
Short Quantum Games. - Prashant:
From General Systems to Soft Systems to Soft Computing: Applications for Large and Complex Real World Systems. - Young-Han Kim:
A Counterexample to Cover's 2P Conjecture on Gaussian Feedback Capacity. - David S. Planeta:
Pbit and other list sorting algorithms. - Ravi Kannan, Thorsten Theobald:
Games of fixed rank: A hierarchy of bimatrix games. - Emanuel Diamant:
Does a Plane Imitate a Bird? Does Computer Vision Have to Follow Biological Paradigms? - Christel Baier, Nathalie Bertrand, Philippe Schnoebelen:
Verifying nondeterministic probabilistic channel systems against $\omega$-regular linear-time properties. - Bourgade Paul, Croissant Olivier:
Heat kernel expansion for a family of stochastic volatility models : delta-geometry. - James Cheney:
Logic Column 14: Nominal Logic and Abstract Syntax. - Aditya Mahajan, Demosthenis Teneketzis:
A Decision Theoretic Framework for Real-Time Communication. - Stephen P. Luttrell:
Discrete Network Dynamics. Part 1: Operator Theory. - Hyundong Shin, Moe Z. Win:
MIMO Diversity in the Presence of Double Scattering. - Rasika R. Perera, Tony S. Pollock, Thushara D. Abhayapala:
Non-coherent Rayleigh fading MIMO channels: Capacity Supremum. - Gregory Z. Gutin, Arash Rafiey, Stefan Szeider, Anders Yeo:
The Linear Arrangement Problem Parameterized Above Guaranteed Value. - Prashant:
Internet Protocol Black Holes: A E-Security Threat. - Yangli Hector Yee:
Spatiotemporal sensistivity and visual attention for efficient rendering of dynamic environments. - Martin Ziegler:
Fast (Multi-)Evaluation of Linearly Recurrent Sequences: Improvements and Applications. - Stanislav Bulygin:
Generalized Hermitian Codes over GF(2^r). - M. Ángeles Serrano, Ana Gabriela Maguitman, Marián Boguñá, Santo Fortunato, Alessandro Vespignani:
Decoding the structure of the WWW: facts versus sampling biases. - Mei Chen, Teng Li, Oliver M. Collins:
A Capacity Achieving and Low Complexity Multilevel Coding Scheme for ISI Channels. - Mei Chen, Oliver M. Collins:
Trellis Pruning for Peak-to-Average Power Ratio Reduction. - Pascal Hitzler, Sibylle Schwarz:
Towards a unified theory of logic programming semantics: Level mapping characterizations of selector generated models. - Cyril Measson, Andrea Montanari, Thomas J. Richardson, Rüdiger L. Urbanke:
The Generalized Area Theorem and Some of its Consequences. - Amir Bennatan, David Burshtein:
Design and Analysis of Nonbinary LDPC Codes for Arbitrary Discrete-Memoryless Channels. - Susumu Yamasaki:
Logic Programming with Default, Weak and Strict Negations. - Sebastian Bader, Pascal Hitzler:
Dimensions of Neural-symbolic Integration - A Structured Survey. - Damiano Bolzoni, Emmanuele Zambon, Sandro Etalle, Pieter H. Hartel:
Poseidon: a 2-tier Anomaly-based Intrusion Detection System. - Jozef Gruska, Salvatore La Torre, Margherita Napoli, Mimmo Parente:
Various Solutions to the Firing Squad Synchronization Problems. - Ugo Dal Lago, Simone Martini:
An Invariant Cost Model for the Lambda Calculus. - Xiangyong Zeng, Qingchong Liu, Lei Hu:
Generalized Kasami Sequences: The Large Set. - Chunxuan Ye, Prakash Narayan:
The Secret Key-Private Key Capacity Region for Three Terminals. - Nima Sarshar, Xiaolin Wu:
Joint Network-Source Coding: An Achievable Region with Diversity Routing. - (Withdrawn) Entropy, Convex Optimization, and Competitive Quantum Interactions.
- Chunxuan Ye, Prakash Narayan:
Secret Key and Private Key Constructions for Simple Multiterminal Source Models. - Chunxuan Ye, Prakash Narayan:
The Private Key Capacity Region for Three Terminals. - Gilson A. Giraldi, Antonio A. F. Oliveira, Leonardo Carvalho:
Mining Cellular Automata DataBases throug PCA Models. - Leland Smith, Muthukumar Thirunavukkarasu, Srinidhi Varadarajan, Naren Ramakrishnan:
A Model Based Approach to Reachability Routing. - Matthew J. M. Peacock, Iain B. Collings, Michael L. Honig:
Eigenvalue Distributions of Sums and Products of Large Random Matrices via Incremental Matrix Expansions. - Grigoris Antoniou, David Billington, Guido Governatori, Michael J. Maher:
Embedding Defeasible Logic into Logic Programming. - Junsheng Han, Paul H. Siegel:
Improved Upper Bounds on Stopping Redundancy. - Ratko V. Tomic:
Quantized Indexing: Beyond Arithmetic Coding. - Vladimir Vovk:
On-line regression competitive with reproducing kernel Hilbert spaces. - Ke Liu, Nael B. Abu-Ghazaleh:
Virtual Coordinate Backtracking for Void Traversal in Geographic Routing. - Jonghoon Ryu, Oscar Y. Takeshita:
On Quadratic Inverses for Quadratic Permutation Polynomials over Integer Rings. - Moritz Hammer, Alexander Knapp, Stephan Merz:
Truly On-The-Fly LTL Model Checking. - Gerd Bumiller, Liping Lu, Yeqiong Song:
Analytic performance comparison of routing protocols in master-slave PLC networks. - Michele Finelli:
Pathwords: a user-friendly schema for common passwords management. - Alexander V. Evako:
The consistency principle for a digitization procedure. An algorithm for building normal digital spaces of continuous n-dimensional objects. - Matthew R. McKay
, Alex J. Grant, Iain B. Collings:
Performance Analysis of MIMO-MRC in Double-Correlated Rayleigh Environments. - Jean-Guillaume Dumas
, Anna Urbanska:
An introspective algorithm for the integer determinant. - Dongqing He, Peisun Ma:
Effects of Initial Stance of Quadruped Trotting on Walking Stability. - Steffen Heinrich, Holger Dürr, T. Hanel, Jörg Lässig:
An Agent-based Manufacturing Management System for Production and Logistics within Cross-Company Regional and National Production Networks. - Ramdane Hedjar, Patrick Boucher:
Nonlinear Receding-Horizon Control of Rigid Link Robot Manipulators. - Arindam Mitra:
With minimum energy cost nothing can be transmitted faster than information. - Francesco Capasso:
A polynomial-time heuristic for Circuit-SAT. - Venkatesan Guruswami, Atri Rudra:
Explicit Codes Achieving List Decoding Capacity: Error-correction with Optimal Redundancy. - Eric Mjolsness:
Stochastic Process Semantics for Dynamical Grammar Syntax: An Overview. - David Doty:
Every Sequence is Decompressible from a Random One. - Michael Terribilini, Jae-Hyung Lee, Changhui Yan, Robert L. Jernigan, Susan Carpenter, Vasant G. Honavar, Drena Dobbs:
Identifying Interaction Sites in "Recalcitrant" Proteins: Predicted Protein and Rna Binding Sites in Rev Proteins of Hiv-1 and Eiav Agree with Experimental Data. - Blaise Potard, Yves Laprie:
Using phonetic constraints in acoustic-to-articulatory inversion. - Frank McCown, Sheffan Chan, Michael L. Nelson, Johan Bollen:
The Availability and Persistence of Web References in D-Lib Magazine. - Ambedkar Dukkipati, M. Narasimha Murty, Shalabh Bhatnagar:
Uniqueness of Nonextensive entropy under Renyi's Recipe. - Jean-Baptiste Maj, Anne Bonneau, Dominique Fohr, Yves Laprie:
An elitist approach for extracting automatically well-realized speech sounds with high confidence. - Alexandre O. Stauffer, Valmir Carneiro Barbosa:
A dissemination strategy for immunizing scale-free networks. - Shashi Borade, Lizhong Zheng:
Writing on Fading Paper and Causal Transmitter CSI. - Paola Bonizzoni, Gianluca Della Vedova, Riccardo Dondi:
Approximating Clustering of Fingerprint Vectors with Missing Values. - Olivier Powell, Aubin Jarry, Pierre Leone, José D. P. Rolim:
Gradient Based Routing in Wireless Sensor Networks: a Mixed Strategy. - Manor Mendel, Assaf Naor:
Ramsey partitions and proximity data structures. - R. A. Cohen:
Proving that P is not equal to NP and that P is not equal to the intersection of NP and co-NP. - Xin Wang, Georgios B. Giannakis:
Energy-Efficient Resource Allocation in Time Division Multiple-Access over Fading Channels. - Marco Zaffalon, Marcus Hutter:
Robust Inference of Trees. - Barak A. Pearlmutter
:
Bounds on Query Convergence. - Michael Vielhaber:
Continued Fraction Expansion as Isometry: The Law of the Iterated Logarithm for Linear, Jump, and 2--Adic Complexity. - Petra Hofstedt, Peter Pepper:
Integration of Declarative and Constraint Programming. - Carlos Kavka, Patricia Roggero, Marc Schoenauer:
Evolution of Voronoi based Fuzzy Recurrent Controllers. - Roberto M. Amadio:
The SL synchronous language, revisited. - Yann Semet, Sylvain Gelly, Marc Schoenauer, Michèle Sebag:
Artificial Agents and Speculative Bubbles. - Ignatios Souvatzis:
A Machine-Independent port of the MPD language run time system to NetBSD. - Ashish Khisti, Uri Erez, Amos Lapidoth, Gregory W. Wornell:
Carbon Copying Onto Dirty Paper. - Wei Kang, Sennur Ulukus:
A Single-letter Upper Bound for the Sum Rate of Multiple Access Channels with Correlated Sources. - Christopher Hardin:
Modularizing the Elimination of r=0 in Kleene Algebra. - Kenton K. Yee:
Information and Stock Prices: A Simple Introduction. - Na Li, Wen-Feng Qi:
Symmetric Boolean Function with Maximum Algebraic Immunity on Odd Number of Variables. - Vishwambhar Rathi, Rüdiger L. Urbanke:
Density Evolution, Thresholds and the Stability Condition for Non-binary LDPC Codes. - Shi Zhou, Guo-Qiang Zhang, Guoqing Zhang:
Chinese Internet AS-level Topology. - Jeremie Leguay, Timur Friedman, Vania Conan:
Evaluating Mobility Pattern Space Routing for DTNs. - Aaron B. Wagner, Venkat Anantharam:
An Infeasibility Result for the Multiterminal Source-Coding Problem. - Hossein Kakavand:
Channel Model and Upper Bound on the Information Capacity of the Fiber Optical Communication Channel Based on the Effects of XPM Induced Nonlinearity. - Erik M. Boczko, Todd R. Young:
The Signed Distance Function: A New Tool for Binary Classification. - Sergiu Theodor Chelcea, Alzennyr Da Silva, Yves Lechevallier, Doru Tanasa, Brigitte Trousse:
Benefits of InterSite Pre-Processing and Clustering Methods in E-Commerce Domain. - J. G. Esteve, Fernando Falceto:
Phase transition in the assignment problem for random matrices. - A. Benabdallah, Günter Radons:
Parameter Estimation of Hidden Diffusion Processes: Particle Filter vs. Modified Baum-Welch Algorithm. - Alfredo Braunstein, Riccardo Zecchina:
Learning by message-passing in networks of discrete synapses. - Rami Kanhouche:
Combinatorial Approach to Object Analysis. - Carlos Gershenson, Stuart A. Kauffman, Ilya Shmulevich:
The Role of Redundancy in the Robustness of Random Boolean Networks. - J. R. Sánchez, Ricardo López-Ruiz:
Self-synchronization of Cellular Automata: an attempt to control patterns. - May Lim, Dan Braha, Sanith Wijesinghe, Stephenson Tucker, Yaneer Bar-Yam:
Connectivity and Cost Trade-offs in Multihop Wireless Networks. - Sergi Valverde, Ricard V. Solé:
Logarithmic growth dynamics in software networks. - Andrea Baronchelli, Luca Dall'Asta, Alain Barrat, Vittorio Loreto:
Strategies for fast convergence in semiotic dynamics. - David R. B. Stockwell, James Beach, Aimee Stewart, Gregory Vorontsov, David Vieglais, Ricardo Scachetti Pereira:
The use of the GARP genetic algorithm and internet grid computing in the Lifemapper world atlas of species biodiversity. - David R. B. Stockwell:
Improving ecological niche models by data mining large environmental datasets for surrogate models. - Dmitry Gavinsky, Julia Kempe, Oded Regev, Ronald de Wolf:
Bounded-Error Quantum State Identification and Exponential Separations in Communication Complexity. - G. David Forney Jr., Markus Grassl, Saikat Guha:
Convolutional and tail-biting quantum error-correcting codes. - François Le Gall:
Quantum Weakly Nondeterministic Communication Complexity. - Wolfgang Mauerer:
Semantics and simulation of communication in quantum programming. - Tal Mor:
On Classical Teleportation and Classical Nonlocality. - Eli Biham, Michel Boyer, P. Oscar Boykin, Tal Mor, Vwani P. Roychowdhury:
A Proof of the Security of Quantum Key Distribution. - Andris Ambainis, Robert Spalek, Ronald de Wolf:
A New Quantum Lower Bound Method, with Applications to Direct Product Theorems and Time-Space Tradeoffs. - Dan Kenigsberg, Tal Mor, Gil Ratsaby:
Quantum Advantage without Entanglement. - Sonny Ben-Shimon, Michael Krivelevich:
Random regular graphs of non-constant degree: Concentration of the chromatic number.
![](https://dblp1.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.