


default search action
CoRR, April 2010
- Kamran Karimi, Neil G. Dickson, Firas Hamze:

High-Performance Physics Simulations Using Multi-Core CPUs and GPGPUs in a Volunteer Computing Context. - Neil G. Dickson, Kamran Karimi, Firas Hamze:

Importance of Explicit Vectorization for CPU and GPU Software Performance. - Martin Haenggi:

Interference in Lattice Networks. - Sudipto Das, Ömer Egecioglu, Amr El Abbadi:

Anonimos: An LP based Approach for Anonymizing Weighted Social Network Graphs. - Andrés Arcia-Moret, Yubo Yang, Nicolas Montavont, David Ros:

A Study of Bandwidth-Perception Management Mechanisms in IEEE 802.16 Networks. - Dai Tri Man Le:

A Characterization of Combined Traces Using Labeled Stratified Order Structures. - Hirotoshi Yasuoka, Tachio Terauchi:

Quantitative Information Flow - Verification Hardness and Possibilities. - Yao Sun, Dingkang Wang:

A New Proof of the F5 Algorithm. - Akisato Kimura, Derek Pang, Tatsuto Takeuchi, Kouji Miyazato, Junji Yamato, Kunio Kashino:

A stochastic model of human visual attention with a dynamic Bayesian network. - Benjamin Hoffmann, Mikhail Lifshits, Yury Lifshits, Dirk Nowotka:

Maximal Intersection Queries in Randomized Input Models. - Rahul Jain, Hartmut Klauck, Miklos Santha:

Optimal Direct Sum Results for Deterministic and Randomized Decision Tree Complexity. - Joseph Blomer, Nihar Jindal:

Opportunistic Routing in Ad Hoc Networks: How many relays should there be? What rate should nodes use? - Kai Xie, Jing Li:

Precoded Turbo Equalizer for Power Line Communication Systems. - Alexandre Chapoutot:

Interval Slopes as Numerical Abstract Domain for Floating-Point Variables. - Julien Henaut, Aubin Lecointre, Daniela Dragomirescu, Robert Plana:

Radio Interface for High Data Rate Wireless Sensor Networks. - Oliver Johnson, Matthew Aldridge

, Robert J. Piechocki:
Delay-rate tradeoff in ergodic interference alignment. - Anders Drachen, Lennart E. Nacke, Georgios N. Yannakakis, Anja Lee Pedersen:

Psychophysiological Correlations with Gameplay Experience Dimensions. - Lennart E. Nacke, Craig A. Lindley:

Affective Ludology, Flow and Immersion in a First- Person Shooter: Measurement of Player Experience. - Lennart E. Nacke:

From Playability to a Hierarchical Game Usability Model. - Sophie Stellmach, Lennart E. Nacke, Raimund Dachselt, Craig A. Lindley:

Trends and Techniques in Visual Gaze Analysis. - Lennart E. Nacke, Sophie Stellmach, Dennis Sasse, Craig A. Lindley:

Gameplay experience in a gaze interaction game. - Vincenzo Pellegrini, Luca Rose, Mario Di Dio:

On Memory Accelerated Signal Processing within Software Defined Radios. - Amine Laourine, Aaron B. Wagner:

The Degraded Poisson Wiretap Channel. - Salah-Eddine Elayoubi, Eitan Altman, Majed Haddad, Zwi Altman:

A hybrid decision approach for the association problem in heterogeneous networks. - Edith Elkind, Piotr Faliszewski:

Approximation Algorithms for Campaign Management. - Roghayeh Joda, Farshad Lahouti:

Network Code Design for Orthogonal Two-hop Network with Broadcasting Relay: A Joint Source Channel Network Coding Approach. - Srinivasagopalan Srivathsan, Costas Busch, S. Sitharama Iyengar

:
An Oblivious Spanning Tree for Buy-at-Bulk Network Design Problems. - Tuvi Etzion, Alexander Vardy, Eitan Yaakobi:

Dense Error-Correcting Codes in the Lee Metric. - Sarif Sk. Hassan, Pabitra Pal Choudhury, Sugata Sanyal:

A Spatial Crypto Technique for Secure Data Transmission. - (Withdrawn) Facial Expression Representation Using Heteroscedastic Linear Discriminant Analysis and Gabor Wavelets.

- Soummya Kar

, José M. F. Moura:
Gossip and Distributed Kalman Filtering: Weak Consensus under Weak Detectability. - Ali Tajer, Xiaodong Wang:

Multiuser Diversity Gain in Cognitive Networks. - Joseph M. Burdis, Irina A. Kogan:

Object-image correspondence for curves under finite and affine cameras. - Daniel S. Menasché, Antônio Augusto de Aragão Rocha, Edmundo de Souza e Silva, Rosa Maria Meri Leão, Donald F. Towsley, Arun Venkataramani:

Estimating Self-Sustainability in Peer-to-Peer Swarming Systems. - Marco Dalai:

A new bound for the capacity of the deletion channel with high deletion probabilities. - M. Amin Khajehnejad, Weiyu Xu, Amir Salman Avestimehr, Babak Hassibi:

Improved Sparse Recovery Thresholds with Two-Step Reweighted ℓ1 Minimization. - Alessandro Colantonio, Roberto Di Pietro:

CONCISE: Compressed 'n' Composable Integer Set. - Jasmine Norman, J. Paulraj Joseph, P. Prapoorna Roja:

A Faster Routing Scheme for Stationary Wireless Sensor Networks - A Hybrid Approach. - M. Anwar Hossain, Mohammed Tarique, Rumana Islam:

Shadowing Effects on Routing Protocol of Multihop Ad Hoc Networks. - Raphaël Clifford, Zvi Gotthilf, Moshe Lewenstein, Alexandru Popa:

Permuted Common Supersequence. - Zhiqiang Zhang, Yaoyun Shi:

On the parity complexity measures of Boolean functions. - Sergey Andreyev:

User-driven applications. - Sandipan Dey, Hameed Al-Qaheri, Sugata Sanyal:

Embedding Secret Data in HTML Web Page. - Mahmoud Khademi, Mohammad Hadi Kiapour, Mohammad Taghi Manzuri Shalmani, Ali Akbar Kiaei:

Analysis, Interpretation, and Recognition of Facial Action Units and Expressions Using Neuro-Fuzzy Modeling. - Sisir Koppaka, Ashish Ranjan Hota:

Superior Exploration-Exploitation Balance with Quantum-Inspired Hadamard Walks. - Mahmoud Khademi, Mohammad Taghi Manzuri Shalmani, Mohammad Hadi Kiapour, Ali Akbar Kiaei:

Recognizing Combinations of Facial Action Units with Different Intensity Using a Mixture of Hidden Markov Models and Neural Network. - Mahmoud Khademi, Mehran Safayani, Mohammad Taghi Manzuri Shalmani:

Multilinear Biased Discriminant Analysis: A Novel Method for Facial Action Unit Representation. - Robert Crowston, Gregory Z. Gutin, Mark Jones, Anders Yeo:

Linear-Number-of-Variables Kernel for Unit-Conflict-Free-Max-Sat Parameterized Above Expectation. - Shaunak Joshi, Przemyslaw Pawelczak, John D. Villasenor, Danijela Cabric, Sateesh Addepalli:

Impact of Connection Admission Process on Load Balancing in Cellular Networks. - Marco Levorato, Urbashi Mitra, Michele Zorzi:

Cognitive Interference Management in Retransmission-Based Wireless Networks. - Satish Babu Korada, Andrea Montanari:

Applications of Lindeberg Principle in Communications and Statistical Learning. - John Augustine, Sandip Das, Anil Maheshwari, Subhas C. Nandy, Sasanka Roy, Swami Sarvattomananda:

Recognizing the Largest Empty Circle and Axis-Parallel Rectangle in a Desired Location. - Rung Ching Chen, Kai-Fan Cheng, Chia-Fen Hsieh:

Using Rough Set and Support Vector Machine for Network Intrusion Detection. - Natarajan Meghanathan, Sumanth Reddy Allam, Loretta A. Moore:

Tools and techniques for Network Forensics. - G. N. Krishnamurthy, V. Ramaswamy:

Encryption Quality Analysis and Security Evaluation of CAST-128 Algorithm and its Modified Version using Digital Images. - Poonam Garg:

A Comparison between Memetic algorithm and Genetic algorithm for the cryptanalysis of Simplified Data Encryption Standard algorithm. - Debdutta Barman Roy, Rituparna Chaki, Nabendu Chaki:

A New Cluster-based Wormhole Intrusion detection algorithm for Mobile Ad-Hoc Networks. - Natasa Zivic:

Iterative method for improvement of coding and decryption. - Eric Ke Wang, Lucas Chi Kwong Hui, Siu-Ming Yiu:

A new key establishment scheme for wireless sensor networks. - Mohammed Misbahuddin, Sachin Narayanan, Bishwa Ranjan Ghosh:

Dynamic IDP Signature processing by fast elimination using DFA. - G. M. Tamilselvan, A. Shanmugam:

Effect of Inter Packet Delay in performance analysis of coexistence heterogeneous Wireless Packet Networks. - Mohammed A. Abuhelaleh, Khaled M. Elleithy, Thabet M. Mismar:

Clustered Hierarchy in Sensor Networks: Performance and Security. - Yoshito Kanamori, Seong-Moo Yoo:

Quantum Three-Pass protocol: Key distribution using quantum superposition states. - Natarajan Jaisankar, R. Saravanan, K. Durai Swamy:

Intelligent Detection System framework using Mobile agents. - Sugam Sharma, Hari Cohly, Tzusheng Pei:

On Generation of Firewall Log Status Reporter (SRr) Using Perl. - Alan Mink, Sheila Frankel, Ray A. Perlner:

Quantum Key Distribution (QKD) and Commodity Security Protocols: Introduction and Integration. - Dietrich Kuske, Jiamou Liu, Markus Lohrey:

The Isomorphism Problem for omega-Automatic Trees. - Oliver Kullmann:

Exact Ramsey Theory: Green-Tao numbers and SAT. - Kohtaro Tadaki:

A new representation of Chaitin Ωnumber based on compressible strings. - Anthony Kim, Muriel Médard:

Scalar-linear Solvability of Matroidal Networks Associated with Representable Matroids. - Ilango Sriram, Dave Cliff:

Effects of component-subscription network topology on large-scale data centre performance scaling. - Krishnendu Chatterjee, Thomas A. Henzinger, Barbara Jobstmann, Rohit Singh:

Measuring and Synthesizing Systems in Probabilistic Environments. - Valentin E. Brimkov:

Patrolling a Street Network is Strongly NP-Complete but in P for Tree Structures. - Mehran Safayani, Mohammad Taghi Manzuri Shalmani, Mahmoud Khademi:

Extended Two-Dimensional PCA for Efficient Face Representation and Recognition. - Mohamed Abid

, Songbo Song, Hassnaa Moustafa, Hossam Afifi:
Integrating identity-based cryptography in IMS service authentication. - E. Sathiyamoorthy, N. Ch. Sriman Narayana Iyengar, V. Ramachandran:

Agent Based Trust Management Model Based on Weight Value Model for Online Auctions. - Ayatullah Faruk Mollah

, Subhadip Basu, Mita Nasipuri, Dipak Kumar Basu:
Text/Graphics Separation for Business Card Images for Mobile Devices. - Mohammed Aijaz Ahmed, D. Rajya Lakshmi, Sayed Abdul Sattar:

Cryptanalysis of a more efficient and secure dynamic id-based remote user authentication scheme. - Yasir Arfat Malkani, Lachhman Das Dhomeja:

PSIM: A tool for analysis of device pairing methods. - M. Prabu Kumar, K. Praneesh Kumar Yadav:

Data security in mobile devices by geo locking. - Moheb R. Girgis, Tarek M. Mahmoud, Youssef S. Takroni, Hassan S. Hassan:

Performance evaluation of a new route optimization technique for mobile IP. - Jean-François Lalande, David Rodriguez, Christian Toinard:

Security properties in an open peer-to-peer network. - Johnneth de Sene Fonseca, Zair Abdelouahab, Denivaldo Lopes, Sofiane Labidi:

A security framework for SOA applications in mobile environment. - (Withdrawn) Securing AODV for MANETs using Message Digest with Secret Key.

- Soroush Akhlaghi, Abbas Kiani, Mohammad Reza Ghanavati:

Cost-Bandwidth Tradeoff In Distributed Storage Systems. - Somayeh Salimi, Mahmoud Salmasizadeh, Mohammad Reza Aref:

Generalized Secure Distributed Source Coding with Side Information. - Somayeh Salimi, Mahmoud Salmasizadeh, Mohammad Reza Aref:

Rate Regions of Secret Key Sharing in a New Source Model. - Jin-yi Cai, Sangxia Huang, Pinyan Lu:

From Holant To #CSP And Back: Dichotomy For Holant$^c$ Problems. - Daniel Gayo-Avello:

Nepotistic Relationships in Twitter and their Impact on Rank Prestige Algorithms. - Dmitry Gavinsky, Alexander A. Sherstov:

A Separation of NP and coNP in Multiparty Communication Complexity. - Laurent Bienvenu, Frank Stephan, Jason Teutsch:

How powerful are integer-valued martingales? - Dominic Dumrauf, Tim Süß:

On the Complexity of Local Search for Weighted Standard Set Problems. - Deli Qiao, Mustafa Cenk Gursoy, Senem Velipasalar:

Secure Communication over Fading Channels with Statistical QoS Constraints. - Deli Qiao, Mustafa Cenk Gursoy, Senem Velipasalar:

Secure Broadcasting over Fading Channels with Statistical QoS Constraints. - Qing Chen, Mustafa Cenk Gursoy:

Energy Efficiency Analysis in Amplify-and-Forward and Decode-and-Forward Cooperative Networks. - Junwei Zhang, Mustafa Cenk Gursoy:

Relay Beamforming Strategies for Physical-Layer Security. - Kimmo Fredriksson:

On building minimal automaton for subset matching queries. - Sami Akin, Mustafa Cenk Gursoy:

QoS Analysis of Cognitive Radio Channels with Perfect CSI at both Receiver and Transmitter. - Junwei Zhang, Mustafa Cenk Gursoy:

Collaborative Relay Beamforming for Secure Broadcasting. - Stevens Le Blond, Arnaud Legout

, Fabrice Le Fessant, Walid Dabbous, Mohamed Ali Kâafar:
Spying the World from your Laptop -- Identifying and Profiling Content Providers and Big Downloaders in BitTorrent. - Kaushik Kumar Majumdar:

Indian policeman's dilemma: A game theoretic model. - Roberto Bagnara, Fred Mesnard, Andrea Pescetti, Enea Zaffanella:

The Automatic Synthesis of Linear Ranking Functions: The Complete Unabridged Version. - Marc Thurley:

The Complexity of Partition Functions on Hermitian Matrices. - David Doty, Matthew J. Patitz, Dustin Reishus, Robert T. Schweller, Scott M. Summers:

Strong Fault-Tolerance for Self-Assembly with Fuzzy Temperature. - Marko A. Rodriguez, Peter Neubauer:

The Graph Traversal Pattern. - Byung-Hak Kim, Arvind Yedla, Henry D. Pfister:

Message-Passing Inference on a Factor Graph for Collaborative Filtering. - Pablo Arrighi, Gilles Dowek:

On the completeness of quantum computation models. - Peter M. van de Ven, J. S. H. van Leeuwaarden, Dee Denteneer, A. J. E. M. Janssen:

Spatial fairness in linear wireless multi-access networks. - Yifan Chen, Chau Yuen:

Double-Directional Information Azimuth Spectrum and Relay Network Tomography for a Decentralized Wireless Relay Network. - Peter M. van de Ven, A. J. E. M. Janssen, J. S. H. van Leeuwaarden:

Optimal Tradeoff Between Exposed and Hidden Nodes in Large Wireless Networks. - Yuexian Hou, Tingxu Yan, Peng Zhang, Dawei Song, Wenjie Li:

On Tsallis Entropy Bias and Generalized Maximum Entropy Models. - Marcello M. Bersani, Achille Frigeri, Angelo Morzenti, Matteo Pradella, Matteo Rossi, Pierluigi San Pietro:

Bounded Reachability for Temporal Logic over Constraint Systems. - Emily J. King

:
Grassmannian Fusion Frames. - Aditya Mahajan:

Optimal sequential transmission over broadcast channel with nested feedback. - Kenza Guenda:

New MDS Self-Dual Codes over Large Finite Fields. - Li Zhang, Shu Lin, Khaled A. S. Abdel-Ghaffar, Zhi Ding, Bo Zhou:

Circulant Arrays on Cyclic Subgroups of Finite Fields: Rank Analysis and Construction of Quasi-Cyclic LDPC Codes. - Danny Hermelin, Gad M. Landau, Shir Landau, Oren Weimann:

Unified Compression-Based Acceleration of Edit-Distance Computation. - Sami Akin, Mustafa Cenk Gursoy:

Ergodic Capacity Analysis in Cognitive Radio Systems under Channel Uncertainty. - Dung Viet Nguyen, Bane Vasic, Michael W. Marcellin, Shashi Kiran Chilappagari:

Structured LDPC Codes from Permutation Matrices Free of Small Trapping Sets. - Pushkar Tripathi:

A Deterministic Algorithm for the Vertex Connectivity Survivable Network Design Problem. - Avik Chaudhuri:

Liberalizing Dependency. - Elad Shaked, Oleg V. Michailovich:

Regularized Richardson-Lucy Algorithm for Sparse Reconstruction of Poissonian Images. - Zhi Xu:

Multi-Shift de Bruijn Sequence. - Dorit Ron, Ilya Safro, Achi Brandt:

Relaxation-based coarsening and multiscale graph organization. - Somayeh Fatahi, Nasser Ghasem-Aghaee:

Design and Implementation of an Intelligent Educational Model Based on Personality and Learner's Emotion. - Ismail A. Ismail, Mohammed A. Ramadan, Talaat S. El-Danaf

, Ahmed H. Samak:
Signature Recognition using Multi Scale Fourier Descriptor And Wavelet Transform. - P. Anandhakumar, V. Balamurugan:

Feature-Based Adaptive Tolerance Tree (FATT): An Efficient Indexing Technique for Content-Based Image Retrieval Using Wavelet Transform. - Phanu Waraporn, Phayung Meesad, Gareth Clayton:

Ontology-supported processing of clinical text using medical knowledge integration for multi-label classification of diagnosis coding. - Hossein Rouhani Zeidanloo, Azizah Bt Abdul Manaf:

Botnet Detection by Monitoring Similar Communication Patterns. - (Withdrawn) Lightweight Distance bound Protocol for Low Cost RFID Tags.

- M. S. Saleem Basha, Dhavachelvan Ponnurangam:

Analysis of Empirical Software Effort Estimation Models. - Karl Schnaitter, Neoklis Polyzotis:

Semi-Automatic Index Tuning: Keeping DBAs in the Loop. - Ravindran Kannan:

Spectral Methods for Matrices and Tensors. - V. Chitraa, Antony Selvdoss Davamani:

A Survey on Preprocessing Methods for Web Usage Data. - Jacques Julliand, Nicolas Stouls

, Pierre-Christophe Bué, Pierre-Alain Masson:
Syntactic Abstraction of B Models to Generate Tests. - Stevens Le Blond, Pere Manils, Chaabane Abdelberi, Mohamed Ali Kâafar, Arnaud Legout

, Claude Castelluccia, Walid Dabbous:
De-anonymizing BitTorrent Users on Tor. - Lei Wang, Jianfeng Zhan, Weisong Shi, Yi Liang:

In Cloud, Can Scientific Communities Benefit from the Economies of Scale? - Xiaojun Sun, Chunming Zhao, Ming Jiang:

Closed-Form Expressions for Relay Selection with Secrecy Constraints. - Tobias Marschall:

Construction of minimal DFAs from biological motifs. - Gang Yu, Xiaoxiao Ma, Yong Shen, Wenbao Han:

Provable Secure Identity Based Generalized Signcryption Scheme. - Michael Burke, Neil C. Audsley:

Distributed Fault-Tolerant Avionic Systems - A Real-Time Perspective. - Anna Blasiak, Robert D. Kleinberg, Eyal Lubetzky:

Index coding via linear programming. - (Withdrawn) A note on the entropy of repetitive sequences of symmetry group permutations.

- Xiang He, Aylin Yener:

Strong Secrecy and Reliable Byzantine Detection in the Presence of an Untrusted Relay. - Paulo Feofiloff, Cristina G. Fernandes, Carlos Eduardo Ferreira, José Coelho de Pina:

A note on Johnson, Minkoff and Phillips' algorithm for the Prize-Collecting Steiner Tree Problem. - Shahar Dobzinski, Noam Nisan:

Multi-Unit Auctions: Beyond Roberts. - Nicolas Stouls

, Marie-Laure Potet:
Security Policy Enforcement Through Refinement Process. - Pere Manils, Chaabane Abdelberi, Stevens Le Blond, Mohamed Ali Kâafar, Claude Castelluccia, Arnaud Legout

, Walid Dabbous:
Compromising Tor Anonymity Exploiting P2P Information Leakage. - Didier Bert, Marie-Laure Potet, Nicolas Stouls

:
GeneSyst: a Tool to Reason about Behavioral Aspects of B Event Specifications. Application to Security Properties. - Robert Ganian, Petr Hlinený, Joachim Kneis, Daniel Meister, Jan Obdrzálek, Peter Rossmanith, Somnath Sikdar:

Are there any good digraph width measures? - Tuvi Etzion, Alexander Vardy:

A New Construction for Constant Weight Codes. - Ludo Tolhuizen:

Bounds for codes for a non-symmetric ternary channel. - Florentin Smarandache

, Jean Dezert:
Importance of Sources using the Repeated Fusion Method and the Proportional Conflict Redistribution Rules \#5 and \#6. - Te Sun Han:

Polymatroids with Network Coding. - (Withdrawn) A Streaming Approximation Algorithm for Klee's Measure Problem.

- Jinsong Tan:

The Networked Common Goods Game. - (Withdrawn) Belief Propagation for Min-cost Network Flow: Convergence and Correctness.

- Yam Ki Cheung, Ovidiu Daescu:

Approximate Point-to-Face Shortest Paths in R^3. - Anish Das Sarma, Alpa Jain, Philip Bohannon:

PROBER: Ad-Hoc Debugging of Extraction and Integration Pipelines. - Ludo Waltman, Nees Jan van Eck, Thed N. van Leeuwen, Martijn S. Visser, Anthony F. J. van Raan:

Towards a new crown indicator: An empirical analysis. - Anastasios Sidiropoulos:

Optimal stochastic planarization. - Yixin Cao, Jianer Chen, Yang Liu:

On Feedback Vertex Set, New Measure and New Structures. - J. O. Agushaka, M. M. Lawal, A. M. Bagiwa, B. F. Abdullahi:

Effect of Weighting Scheme to QoS Properties in Web Service Discovery. - Adiline T. Macriga, P. Anandha Kumar:

Seamless Data Services for Real Time Communication in a Heterogeneous Networks using Network Tracking and Management. - Shailja Shukla, Mukesh Tiwari:

Fuzzy Logic of Speed and Steering Control System for Three Dimensional Line Following of an Autonomous Vehicle. - P. Mohan Kumar, K. L. Shunmuganathan:

A reversible high embedding capacity data hiding technique for hiding secret data in images. - J. Arokia Renjit, K. L. Shunmuganathan:

Mining The Data From Distributed Database Using An Improved Mining Algorithm. - Arabinda Nanda, Amiya Kumar Rath, Saroj Kumar Rout:

Node Sensing & Dynamic Discovering Routes for Wireless Sensor Networks. - S. Zulaikha Beevi, M. Mohammed Sathik, K. Senthamaraikannan:

A Robust Fuzzy Clustering Technique with Spatial Neighborhood Information for Effective Medical Image Segmentation. - Bijia Pang, Ue-Li Pen

, Michael Perrone:
Magnetohydrodynamics on Heterogeneous architectures: a performance comparison. - J. Nafeesa Begum, Krishnan Kumar, V. Sumathy:

Design And Implementation Of Multilevel Access Control In Medical Image Transmission Using Symmetric Polynomial Based Audio Steganography. - Sudhakar Sengan, S. Chenthur Pandian:

Enhanced Authentication and Locality Aided - Destination Mobility in Dynamic Routing Protocol for MANET. - H. B. Kekre, Tanuja K. Sarode:

New Clustering Algorithm for Vector Quantization using Rotation of Error Vector. - Jos A. E. Spaan:

The danger of pseudo science in Informetrics. - Sujata V. Mallapur, Sujata Terdal:

Enhanced Ad-Hoc on Demand Multipath Distance Vector Routing protocol. - C. V. Seshaiah, S. Nagarani:

A Survey on Space-Time Turbo Codes. - Manoranjan Kumar Singh, L. Rakesh:

Mathematical Principles in Software Quality Engineering. - Maciej Kurant, Athina Markopoulou, Patrick Thiran:

On the bias of BFS. - Zoltán Ésik:

An undecidable property of context-free languages. - Jan Treibig, Gerhard Wellein, Georg Hager:

Efficient multicore-aware parallelization strategies for iterative stencil computations. - G. Nathiya, S. C. Punitha, M. Punithavalli:

An Analytical Study on Behavior of Clusters Using K Means, EM and K* Means Algorithm. - A. Kumar, P. Chakrabarti, P. Saini:

Node inspection and analysis thereof in the light of area estimation and curve fitting. - Nabil Taib, Toufik Rekioua, Bruno Francois:

An Improved Fixed Switching Frequency Direct Torque Control of Induction Motor Drives Fed by Direct Matrix Converter. - Shamimul Qamar, Niranjan Lal, Mrityunjay Singh:

Internet ware cloud computing: Challenges. - Samidha Dwivedi Sharma, Ramveer S. Kasana:

Mobile Database System: Role of Mobility on the Query Processing. - P. S. Revenkar, Anisa Anjum, W. Z. Gandhare:

Secure Iris Authentication Using Visual Cryptography. - (Withdrawn) Regular LDPC Lattices are Capacity-Achieving.

- Iwan M. Duursma, Radoslav Kirov:

Improved Two-Point Codes on Hermitian Curves. - N. Saravana Selvam, S. Radhakrishnan:

Processor Based Active Queue Management for providing QoS in Multimedia Application. - M. Gomathi, P. Thangaraj:

A New Approach to Lung Image Segmentation using Fuzzy Possibilistic C-Means Algorithm. - K. Selvamani, A. Duraisamy, Arputharaj Kannan:

Protection of Web Applications from Cross-Site Scripting Attacks in Browser Side. - Neeta Deshpande, Archana M. Rajurkar, Ramchandra Manthalkar:

Review of Robust Video Watermarking Algorithms. - Uraiwan Inyaem, Choochart Haruechaiyasak, Phayung Meesad, Dat Tran:

Terrorism Event Classification Using Fuzzy Inference Systems. - T. Vengattaraman, P. Dhavachelvan, Ramachandran Baskaran:

A Model of Cloud Based Application Environment for Software Testing. - K. Valarmathi, N. Malmurugan:

Joint Design of Congestion Control Routing With Distributed Multi Channel Assignment in Wireless Mesh Networks. - Nafiz Imtiaz Bin Hamid, Md. Zakir Hossain, Md. R. H. Khandokar, Taskin Jamal, Md. A. Shoeb:

Mobile Broadband Possibilities considering the Arrival of IEEE 802.16m & LTE with an Emphasis on South Asia. - H. B. Kekre, Saylee M. Gharge, Tanuja K. Sarode:

SAR Image Segmentation using Vector Quantization Technique on Entropy Images. - S. Kurshid Jinna, L. Ganesan:

Reversible Image data Hiding using Lifting wavelet Transform and Histogram Shifting. - S. K. Nayak, S. B. Thorat, N. V. Kalyankar:

GIS: Geographic Information System An application for socio-economical data collection for rural area. - T. Krishna Kishore, T. Sasi Vardhan, N. Lakshmi Narayana:

Probabilistic Semantic Web Mining Using Artificial Neural Analysis. - P. J. Gayathri, S. C. Punitha, M. Punithavalli:

Document Clustering using Sequential Information Bottleneck Method. - Michael I. Trofimov:

Polynomial Time Algorithm for Graph Isomorphism Testing. - (Withdrawn) Existential Second Order Logic Expression With Horn First Order for Maximum Clique (Decision Version).

- Jeffrey D. Blanchard, Coralia Cartis, Jared Tanner, Andrew Thompson:

Phase Transitions for Greedy Sparse Approximation Algorithms. - Amit Kumar, Ravindran Kannan:

Clustering with Spectral Norm and the k-means Algorithm. - Maurice Margenstern:

About the embedding of one dimensional cellular automata into hyperbolic cellular automata. - Prasad Chebolu, Leslie Ann Goldberg, Russell A. Martin:

The Complexity of Approximately Counting Stable Matchings. - Pengkai Zhao, Babak Daneshrad:

Throughput Enhancement Using Multiple Antennas in OFDM-based Ad Hoc Networks under Transceiver Impairments. - Kai Brünnler:

Nested Sequents. - Elliot Anshelevich, Martin Hoefer:

Contribution Games in Social Networks. - Wenbing Zhao, P. M. Melliar-Smith, Louise E. Moser:

The Low Latency Fault Tolerance System. - Dakshina Ranjan Kisku, Phalguni Gupta, Jamuna Kanta Sing:

Feature Level Fusion of Face and Palmprint Biometrics by Isomorphic Graph-based Improved K-Medoids Partitioning. - Phalguni Gupta, Dakshina Ranjan Kisku, Jamuna Kanta Sing, Massimo Tistarelli:

Maximized Posteriori Attributes Selection from Facial Salient Landmarks for Face Recognition. - David Pritchard:

k-Edge-Connectivity: Approximation and LP Relaxation. - Itzhak Tamo, Moshe Schwartz:

On the Size of Optimal Anticodes over Permutations with the Infinity Norm. - Udayan B. Darji, Steve W. Seif:

A note on decidability of cellularity. - Chad E. Brown, Gert Smolka:

Analytic Tableaux for Simple Type Theory and its First-Order Fragment. - Yuval Lomnitz, Meir Feder:

An Achievable Rate for the MIMO Individual Channel. - Gregory Z. Gutin, Leo van Iersel, Matthias Mnich, Anders Yeo:

All Ternary Permutation Constraint Satisfaction Problems Parameterized Above Average Have Polynomial Kernels. - Dario García-García, Emilio Parrado-Hernández, Fernando Díaz-de-María:

State-Space Dynamics Distance for Clustering Sequential Data. - P. Chakrabarti:

Predictive Gain Estimation - A mathematical analysis. - Daohang Sha, Vladimir B. Bajic:

An optimized recursive learning algorithm for three-layer feedforward neural networks for mimo nonlinear system identifications. - Bernat Corominas-Murtra, Jordi Fortuny Andreu, Ricard V. Solé:

Coding and decoding in the Evolution of communication: Information richness and Referentiality. - Norbert Bátfai:

The Socceral Force. - Ameet Talwalkar, Afshin Rostamizadeh:

Matrix Coherence and the Nystrom Method. - Mohammad Gheshlaghi Azar, Hilbert J. Kappen:

Dynamic Policy Programming. - Vincenzo Bonifaci, Alberto Marchetti-Spaccamela:

Feasibility Analysis of Sporadic Real-Time Multiprocessor Task Systems. - Yashodhan Kanoria, Mohsen Bayati, Christian Borgs, Jennifer T. Chayes, Andrea Montanari:

Fast Convergence of Natural Bargaining Dynamics in Exchange Networks. - Yao Sun, Xiaodong Ma, Dingkang Wang:

On Computing Groebner Basis in the Rings of Differential Operators. - Richard P. Brent, Paul Zimmermann:

An O(M(n) log n) algorithm for the Jacobi symbol. - Jubin Jose, Sriram Vishwanath:

Sum Capacity of K User Gaussian Unit Rank Interference Channels. - Natarajan Lakshmi Prasad, B. Sundar Rajan:

A New Full-diversity Criterion and Low-complexity STBCs with Partial Interference Cancellation Decoding. - Mamta Juneja, Parvinder Singh Sandhu:

Improved information security using robust Steganography system. - Ahmad Kamran Malik, Muhammad Abdul Qadir, Nadeem Iftikhar, Muhammad Usman:

Constraint-based Query Distribution Framework for an Integrated Global Schema. - Iddo Tzameret:

Algebraic Proofs over Noncommutative Formulas. - Xavier Morselli, Marie-Laure Potet, Nicolas Stouls

:
GénéSyst : Génération d'un système de transitions étiquetées à partir d'une spécification B événementiel. - Xiaofei Huang:

Equilibrium Point in Quantum Physics and its Inspiration to Game Theory. - Jacek Gwizdka:

What a Difference a Tag Cloud Makes: Effects of Tasks and Cognitive Abilities on Search Results Interface Use. - Anmer Daskin, Sabre Kais:

Group Leaders Optimization Algorithm. - John Robert Burger:

XOR at a Single Vertex -- Artificial Dendrites. - Ashish Goel, Ian Post:

One Tree Suffices: A Simultaneous O(1)-Approximation for Single-Sink Buy-at-Bulk. - Lawrence Ong, Sarah J. Johnson, Christopher M. Kellett:

An Optimal Coding Strategy for the Binary Multi-Way Relay Channel. - Lawrence Ong, Christopher M. Kellett, Sarah J. Johnson:

Capacity Theorems for the AWGN Multi-Way Relay Channel. - Lawrence Ong, Sarah J. Johnson, Christopher M. Kellett:

The Binary-Symmetric Parallel-Relay Network. - David Isaac Wolinsky, Pierre St. Juste, P. Oscar Boykin, Renato J. O. Figueiredo:

Addressing the P2P Bootstrap Problem for Small Networks. - Sumio Watanabe:

Asymptotic Equivalence of Bayes Cross Validation and Widely Applicable Information Criterion in Singular Learning Theory. - Guowei Wu, Chi Lin, Feng Xia, Lin Yao, He Zhang, Bing Liu:

Dynamical Jumping Real-Time Fault-Tolerant Routing Protocol for Wireless Sensor Networks. - Chun-Cheng Lin, Hsu-Chun Yen, Sheung-Hung Poon, Jia-Hao Fan:

Complexity Analysis of Balloon Drawing for Rooted Trees. - Nicolas Gast, Bruno Gaujal, Jean-Yves Le Boudec:

Mean field for Markov Decision Processes: from Discrete to Continuous Optimization. - Xavier Pessoles, Yann Landon, Walter Rubio:

Kinematic modelling of a 3-axis NC machine tool in linear and circular interpolation. - Daoshun Wang, Lin Dong, Xiaobo Li:

Towards Shift Tolerant Visual Secret Sharing Schemes. - Krishnendu Chatterjee, Thomas A. Henzinger, Barbara Jobstmann, Arjun Radhakrishna:

GIST: A Solver for Probabilistic Games. - Geert Jan Bex, Wouter Gelade, Frank Neven, Stijn Vansummeren:

Learning Deterministic Regular Expressions for the Inference of Schemas from XML Data. - Qianxue Wang, Christophe Guyeux, Jacques M. Bahi:

A novel pseudo-random number generator based on discrete chaotic iterations. - Øyvind Ryan:

On the optimal stacking of noisy observations. - John Augustine, Nick Gravin:

On the Continuous CNN Problem. - Vishwambhar Rathi, Erik Aurell, Lars K. Rasmussen, Mikael Skoglund:

Bounds on Thresholds Related to Maximum Satisfiability of Regular Random Formulas. - Zoltán Ésik, Andreas Maletti:

Simulation vs. Equivalence. - Deniz Gündüz, Aylin Yener, Andrea J. Goldsmith, H. Vincent Poor:

The Multi-way Relay Channel. - Evgeny Chutchev:

Some Mathematicians Are Not Turing Machines. - Jeremy Faden, Robert S. Weigel, Jan Merka, Reiner H. W. Friedel:

Autoplot: A browser for scientific data on the web. - An Liu, Youjian Liu, Haige Xiang, Wu Luo:

Duality, Polite Water-filling, and Optimization for MIMO B-MAC Interference Networks and iTree Networks. - Paul L. Williams, Randall D. Beer:

Nonnegative Decomposition of Multivariate Information. - Sreekanth Malladi:

How to prevent type-flaw and multi-protocol attacks on security protocols under Exclusive-OR. - Youngwook Ko, Sergiy A. Vorobyov, Masoud Ardakani:

How Much Multiuser Diversity is Required for Energy Limited Multiuser Systems? - A. H. Hunter, Nicholas Pippenger:

Local versus Global Search in Channel Graphs. - Zhifeng Luo, Zhu Han, Albert Kai-Sun Wong, Shuisheng Qiu:

Relay-Assisted Partial Packet Recovery with IDMA Method in CDMA Wireless Network. - Franck Cassez:

The Complexity of Codiagnosability for Discrete Event and Timed Systems. - Kamaljit I. Lakhtaria, Paresh Patel, Ankita Gandhi:

Enhancing Curriculum Acceptance among Students with E-learning 2.0. - Ning Chen, Xiaotie Deng, Arpita Ghosh:

Competitive Equilibria in Matching Markets with Budgets. - Reza Khosravi-Farsani, Bahareh Akhbari, Mohammad Reza Aref:

Achievable Rate Regions for Dirty Tape Channels and "Joint Writing on Dirty Paper and Dirty Tape". - Marijn Heule, Toby Walsh:

Symmetry within Solutions. - Christian Bessiere, George Katsirelos, Nina Narodytska, Claude-Guy Quimper, Toby Walsh:

Propagating Conjunctions of AllDifferent Constraints. - Lorenzo Cappellari:

Lossy Source Compression of Non-Uniform Binary Sources Using GQ-LDGM Codes. - Karine Altisen, Yanhong Liu, Matthieu Moy:

Performance Evaluation of Components Using a Granularity-based Interface Between Real-Time Calculus and Timed Automata. - Mathieu Chapelle:

Parameterized Complexity of Generalized Domination Problems on Bounded Tree-Width Graphs. - Chao Tian, Jun Chen, Suhas N. Diggavi, Shlomo Shamai:

Optimality and Approximate Optimality of Source-Channel Separation in Networks. - Laszlo B. Kish, Sunil P. Khatri, Ferdinand Peper:

Instantaneous noise-based logic. - Sergey Loyka, François Gagnon, Victoria Kostina:

Error Rates of Capacity-Achieving Codes Are Convex. - Krishnendu Chatterjee, Vishwanath Raman:

Assume-Guarantee Synthesis for Digital Contract Signing. - Lutz Schröder, Yde Venema:

Flat coalgebraic fixed point logics. - Martin Klein, Jeffery L. Shipman, Michael L. Nelson:

Is This a Good Title? - Péter L. Erdös, Lajos Soukup, Jens Stoye:

Balanced Vertices in Trees and a Simpler Algorithm to Compute the Genomic Distance. - João Luiz Rebelatto, Bartolomeu F. Uchôa Filho, Yonghui Li, Branka Vucetic:

Multi-User Cooperative Diversity through Network Coding Based on Classical Coding Theory. - Franck Cassez:

A Note on Fault Diagnosis Algorithms. - Alfons Laarman

, Jaco van de Pol, Michael Weber:
Boosting Multi-Core Reachability Performance with Shared Hash Tables. - Long Shi, Wei Zhang, Xiang-Gen Xia:

High-Rate and Full-Diversity Space-Time Block Codes with Low Complexity Partial Interference Cancellation Group Decoding. - Thibaut Balabonski, Emmanuel Haucourt:

A Geometric Approach to the Problem of Unique Decomposition of Processes. - Romar dela Cruz, Patrick Solé:

An extension of Massey scheme for secret sharing. - Pierre Chambart, Alain Finkel, Sylvain Schmitz:

Forward Analysis and Model Checking for Bounded WSTS. - Franck Cassez, Stavros Tripakis:

Fault Diagnosis with Dynamic Observers. - Eric Goubault, Samuel Mimram:

Formal Relationships Between Geometrical and Classical Models for Concurrency. - Mong-Jen Kao, Han-Lin Chen:

Approximation Algorithms for the Capacitated Domination Problem. - G. R. Jithamithra, B. Sundar Rajan:

A Quadratic Form Approach to ML Decoding Complexity of STBCs. - Jamie Twycross, Uwe Aickelin:

Experimenting with Innate Immunity. - Yousof Al-Hammadi, Uwe Aickelin:

Behavioural Correlation for Detecting P2P Bots. - Uwe Aickelin:

Nurse Rostering with Genetic Algorithms. - Marcello M. Bersani, Luca Cavallaro, Achille Frigeri, Matteo Pradella, Matteo Rossi:

SMT-based Verification of LTL Specifications with Integer Constraints and its Application to Runtime Checking of Service Substitutability. - Nicola Di Mauro, Teresa Maria Altomare Basile, Stefano Ferilli, Floriana Esposito:

GRASP for the Coalition Structure Formation Problem. - Carlos Palazuelos, David Pérez-García, Ignacio Villanueva:

The communication complexity of XOR games via summing operators. - Ranjit Jhala, Rupak Majumdar, Andrey Rybalchenko:

Refinement type inference via abstract interpretation. - Kobbi Nissim, Rann Smorodinsky, Moshe Tennenholtz:

Approximately Optimal Mechanism Design via Differential Privacy. - Neil A. Ernst, Steve M. Easterbrook, John Mylopoulos:

Code forking in open-source software: a requirements perspective. - Adam Kasperski, Pawel Zielinski:

On the approximability of robust spanning tree problems. - Graham Cormode, Michael Mitzenmacher, Justin Thaler:

Streaming Graph Computations with a Helpful Advisor. - Pavol Hell, Arash Rafiey:

The Dichotomy of List Homomorphisms for Digraphs. - A. Robert Calderbank, Stephen D. Howard, Sina Jafarpour:

Sparse Reconstruction via The Reed-Muller Sieve. - John Joseph Horton, David G. Rand, Richard J. Zeckhauser:

The Online Laboratory: Conducting Experiments in a Real Labor Market. - Jian Li, Ke Yi, Qin Zhang:

Clustering with diversity. - Marek Cygan, Marcin Pilipczuk, Michal Pilipczuk, Jakub Onufry Wojtaszczyk:

Subset feedback vertex set is fixed parameter tractable. - Saumay Pushp, Priya Ranjan:

Hybrid CDN structure with a P2P based streaming protocol. - Yann Strozecki:

Enumeration of the Monomials of a Polynomial and Related Complexity Classes. - Shaoquan Jiang:

Persistent Asymmetric Password-Based Key Exchange. - Yannis Kopsinis, Konstantinos Slavakis, Sergios Theodoridis:

Online Sparse System Identification and Signal Reconstruction using Projections onto Weighted ℓ1 Balls. - Fabrizio Grandoni, Thomas Rothvoß:

Prizing on Paths: A PTAS for the Highway Problem. - Henry Corrigan-Gibbs, Bryan Ford:

Accountable Anonymous Group Messaging. - Kiryung Lee, Yoram Bresler:

iMUSIC: Iterative MUSIC Algorithm for Joint Sparse Recovery with Any Rank. - Shigeaki Kuzuoka, Akisato Kimura, Tomohiko Uyematsu:

Universal Coding of Ergodic Sources for Multiple Decoders with Side Information. - Richard P. Brent:

Fast normal random number generators on vector processors. - Richard P. Brent:

Uses of randomness in computation. - Yue Wang:

Applying Stochastic Network Calculus to 802.11 Backlog and Delay Analysis. - Richard P. Brent:

A fast vectorised implementation of Wallace's normal random number generator. - Richard P. Brent:

Some long-period random number generators using shifts and xors. - Samuel Mimram:

Focusing in Asynchronous Games. - Samuel Mimram:

Computing Critical Pairs in 2-Dimensional Rewriting Systems. - Uwe Aickelin:

Genetic Algorithms for Multiple-Choice Problems. - Waleed Ammar, Ahmed Eldawy, Moustafa Youssef:

Secure Localization in Wireless Sensor Networks: A Survey. - Rahul Jain, Ashwin Nayak:

The space complexity of recognizing well-parenthesized expressions. - Richard P. Brent:

MP users guide. - Moustafa Youssef, Mohamed Amir Yosef, Mohamed N. El-Derini:

GAC: Energy-Efficient Hybrid GPS-Accelerometer-Compass GSM Localization. - Mohamed Ibrahim, Moustafa Youssef:

CellSense: A Probabilistic RSSI-based GSM Positioning System. - (Withdrawn) Statistical Physics for Natural Language Processing.

- Julie Greensmith, Uwe Aickelin, Steve Cayzer:

Introducing Dendritic Cells as a Novel Immune-Inspired Algorithm for Anomoly Detection. - Aaron Roth:

Differential Privacy and the Fat-Shattering Dimension of Linear Queries. - Giorgi Japaridze:

Introduction to clarithmetic II. - James Cheney:

Causality and the semantics of provenance. - Jörg Olschewski, Michael Ummels:

The Complexity of Finding Reset Words in Finite Automata. - Zaenal Akbar:

Watermarking Java Programs using Dummy Methods with Dynamically Opaque Predicates. - Laura C. De Giusti, Franco Chichizola, Marcelo R. Naiouf, Armando De Giusti, Emilio Luque:

Automatic Mapping Tasks to Cores - Evaluating AMTHA Algorithm in Multicore Architectures. - Fatima-Zahra Belouadha, Hajar Omrana, Ounsa Roudiès:

A model-driven approach for composing SAWSDL semantic Web services. - Rahul Kala, Harsh Vazirani, Anupam Shukla, Ritu Tiwari:

Offline Handwriting Recognition using Genetic Algorithm. - Amir Mosavi

:
Multiple Criteria Decision-Making Preprocessing Using Data Mining Tools. - Rosmayati Mohemad, Abdul Razak Hamdan, Zulaiha Ali Othman, Noor Maizura Mohamad Noor:

Decision Support Systems (DSS) in Construction Tendering Processes. - N. Rama, Meenakshi Lakshmanan:

A Computational Algorithm for Metrical Classification of Verse. - Aissam Berrahou, Mourad Rafi, Mohsine Eleuldj:

DRMS Co-design by F4MS. - Nikhil Raj, R. K. Sharma:

Modelling of Human Glottis in VLSI for Low Power Architectures. - Ramazan Havangi, Mohammad Ali Nekoui, Mohammad Teshnehlab:

Adaptive Neuro-Fuzzy Extended Kalman Filtering for Robot Localization. - Amir Mollanejad, Leili Mohammad Khanli, Mohammad Zeynali:

DBSR: Dynamic base station Repositioning using Genetic algorithm in wireless sensor network. - Vishal Sharma, Harsh Kumar Verma:

Optimized Fuzzy Logic Based Framework for Effort Estimation in Software Development. - Antonio Cimino, Francesco Longo, Giovanni Mirabelli:

A General Simulation Framework for Supply Chain Modeling: State of the Art and Case Study. - Nattapon Pannurat, Nittaya Kerdprasop, Kittisak Kerdprasop:

Database Reverse Engineering based on Association Rule Mining. - Chinmay Hegde, Richard G. Baraniuk:

Sampling and Recovery of Pulse Streams. - Kamal Sarkar, Mita Nasipuri, Suranjan Ghose:

A New Approach to Keyphrase Extraction Using Neural Networks. - Kruti Dangarwala, Jigar Shah:

C Implementation & comparison of companding & silence audio compression techniques. - Gajanan K. Kharate, Varsha H. Patil:

Color Image Compression Based On Wavelet Packet Best Tree. - Ezekiel Okike:

A Pedagogical Evaluation and Discussion about the Lack of Cohesion in Method (LCOM) Metric Using Field Experiment. - Hakan Topakkaya, Zhengdao Wang:

Wireless Network Code Design and Performance Analysis using Diversity-Multiplexing Tradeoff. - Amit Chakrabarti, Graham Cormode, Ranganath Kondapally, Andrew McGregor:

Information Cost Tradeoffs for Augmented Index and Streaming Language Recognition. - Christoph Koutschan

:
A Fast Approach to Creative Telescoping. - Matt Gibson, Imran A. Pirwani:

Approximation Algorithms for Dominating Set in Disk Graphs. - (Withdrawn) An Efficient Hybrid Data Gathering Scheme in Wireless Sensor Networks.

- Dongning Guo, Yihong Wu, Shlomo Shamai, Sergio Verdú:

Estimation in Gaussian Noise: Properties of the Minimum Mean-Square Error. - Kamran Karimi, Howard J. Hamilton:

Generation and Interpretation of Temporal Decision Rules. - Xiaolin Shi, Jure Leskovec, Daniel A. McFarland

:
Citing for High Impact. - Jittat Fakcharoenphol, Bundit Laekhanukit, Danupon Nanongkai:

Faster Algorithms for Semi-Matching Problems. - Florian Boudin, Juan-Manuel Torres-Moreno, Marc El-Bèze:

Improving Update Summarization by Revisiting the MMR Criterion. - Christian Senger, Vladimir Sidorenko, Steffen Schober, Victor V. Zyablov:

Adaptive Single-Trial Error/Erasure Decoding for Binary Codes. - Richard P. Brent:

On the precision attainable with various floating-point number systems. - (Withdrawn) Polynomial Bounds on the Rectangle Slicing Number.

- Catalin David, Michael Kohlhase, Christoph Lange, Florian Rabe, Nikita Zhiltsov, Vyacheslav Zholudev:

Publishing Math Lecture Notes as Linked Data. - Siamak Tazari:

Faster Approximation Schemes and Parameterized Algorithms on H-Minor-Free and Odd-Minor-Free Graphs. - Ioannis Chatzigiannakis, Othon Michail, Stavros Nikolaou, Andreas Pavlogiannis, Paul G. Spirakis:

Passively Mobile Communicating Logarithmic Space Machines. - Gábor Erdélyi, Lena Piras, Jörg Rothe:

Control Complexity in Fallback Voting. - (Withdrawn) An Optimized Lifetime Enhancement Scheme for Data Gathering in Wireless Sensor Networks.

- (Withdrawn) An Energy Efficient Scheme for Data Gathering in Wireless Sensor Networks Using Particle Swarm Optimization.

- Richard P. Brent:

Multiple-precision zero-finding methods and the complexity of elementary function evaluation. - Chandra Nair, Abbas El Gamal, Yeow-Khiang Chia:

An Achievability Scheme for the Compound Channel with State Noncausally Available at the Encoder. - Mugurel Ionut Andreica, Vasile Deac, Stelian Tipa:

Towards Providing Low-Risk and Economically Feasible Network Data Transfer Services. - Laurent Boyer, Guillaume Theyssier:

On Factor Universality in Symbolic Spaces. - Feng Gu, Julie Greensmith, Robert F. Oates, Uwe Aickelin:

PCA 4 DCA: The Application Of Principal Component Analysis To The Dendritic Cell Algorithm. - Carlos M. Lorenzetti, Ana Gabriela Maguitman:

Learning Better Context Characterizations: An Intelligent Information Retrieval Approach. - Jyh-Yang Wu, Mei-Hsiu Chi, Sheng-Gwo Chen:

Convergent discrete Laplace-Beltrami operators over surfaces. - Arpita Patra, C. Pandu Rangan:

Communication and Round Efficient Information Checking Protocol. - Felix Krahmer, Rachel A. Ward:

Lower bounds for the error decay incurred by coarse quantization schemes. - Mohsen Toorani, Ali Asghar Beheshti Shirazi:

Cryptanalysis of an Elliptic Curve-based Signcryption Scheme. - Victor M. Preciado, Alireza Tahbaz-Salehi, Ali Jadbabaie:

On Asymptotic Consensus Value in Directed Random Networks. - Reza Rabieyan:

Propose a Fuzzy Queuing Maximal Benefit Location Problem. - Jure Leskovec, Kevin J. Lang, Michael W. Mahoney:

Empirical Comparison of Algorithms for Network Community Detection. - Bassam Al-Mahadeen, Mokhled S. AlTarawneh, Islam H. AlTarawneh:

Signature Region of Interest using Auto cropping. - Sukhvinder S. Bamber, Ajay K. Sharma:

Comparative Performance Investigations of different scenarios for 802.15.4 WPAN. - Mohsen Gerami:

Policies and Economics of Digital Multimedia Transmission. - Eva Volná:

Neuroevolutionary optimization. - Angel Vassilev Nikolov, Lerato Lerato:

Comparison of the Performance of Two Service Disciplines for a Shared Bus Multiprocessor with Private Caches. - H. S. Ramesh Babu, Gowrishankar, P. S. Satyanarayana:

A QoS Provisioning Recurrent Neural Network based Call Admission Control for beyond 3G Networks. - P. Velvadivu, K. Duraisamy:

An Optimized Weighted Association Rule Mining On Dynamic Content. - G. Murugesan, C. Chellappan:

An Economic-based Resource Management and Scheduling for Grid Computing Applications. - Vikram Singh, Sapna Nagpal:

Integrating User's Domain Knowledge with Association Rule Mining. - Vikas Gupta, K. S. Kasana, Puneet Tandon:

Computer Aided Design Modeling for Heterogeneous Objects. - Loet Leydesdorff, Tobias Opthof:

Scopus's Source Normalized Impact per Paper (SNIP) versus a Journal Impact Factor based on Fractional Counting of Citations. - Richard P. Brent:

The complexity of multiple-precision arithmetic. - Qingshuo Song, Guanrong Chen, Daniel W. C. Ho:

Consensus over a Random Network Generated by i.i.d. Stochastic Matrices. - Yuya Inagaki, Jun-ichi Inoue:

Simultaneous Bayesian inference of motion velocity fields and probabilistic models in successive video-frames described by spatio-temporal MRFs. - Moshe Babaioff, Robert D. Kleinberg, Aleksandrs Slivkins:

Truthful Mechanisms with Implicit Payment Computation. - Tomás Masopust:

Comparison of Two Context-Free Rewriting Systems with Simple Context-Checking Mechanisms. - Arvind W. Kiwelekar, Rushikesh K. Joshi:

An Object-Oriented Metamodel for Bunge-Wand-Weber Ontology. - Christine Tasson, Lionel Vaux

:
Transport of finiteness structures and applications. - Gábor Erdélyi, Michael R. Fellows:

Parameterized Control Complexity in Fallback Voting. - Viet Hung Nguyen:

Approximating the minimum directed tree cover. - Patrick Meumeu Yomsi, Vincent Nélis, Joël Goossens:

Scheduling Multi-Mode Real-Time Systems upon Uniform Multiprocessor Platforms. - Lizhi Du:

A Polynomial Time Algorithm for Hamilton Cycle and Its Proof. - Yongnan Ji, Pierre-Yves Hervé, Uwe Aickelin, Alain Pitiot:

Parcellation of fMRI Datasets with ICA and PLS-A Data Driven Approach. - Yuxin Chen, Jeffrey G. Andrews:

An Upper Bound on Multi-hop Transmission Capacity with Dynamic Multipath Routing. - Irina Iulia Lupu, Pierre Courbin, Laurent George, Joël Goossens:

Multi-Criteria Evaluation of Partitioning Schemes for Real-Time Systems. - Richard P. Brent, Franklin T. Luk, H. T. Kung:

Some linear-time algorithms for systolic arrays. - Brice Boyer, Jean-Guillaume Dumas

, Pascal Giorgi:
Exact Sparse Matrix-Vector Multiplication on GPU's and Multicore Architectures. - Manabu Kitagata, Jun-ichi Inoue:

A Gibbs distribution that learns from GA dynamics. - Zi-Ke Zhang, Chuang Liu, Yi-Cheng Zhang, Tao Zhou:

Solving the Cold-Start Problem in Recommender Systems with Social Tags. - Shrinivas Kudekar, Cyril Measson, Thomas J. Richardson, Rüdiger L. Urbanke:

Threshold Saturation on BMS Channels via Spatial Coupling. - Mahmoud Ibrahim Moussa:

An Algorithm for Odd Graceful Labeling of the Union of Paths and Cycles. - Veniamin I. Morgenshtern, Giuseppe Durisi, Helmut Bölcskei:

The SIMO Pre-Log Can Be Larger Than the SISO Pre-Log. - Subhash C. Kak:

Pythagorean Triples and Cryptographic Coding. - Alain Couvreur:

Incidence structures from the blown up plane and LDPC codes. - Per Austrin:

Improved Inapproximability For Submodular Maximization. - Ping Li:

On Practical Algorithms for Entropy Estimation and the Improved Sample Complexity of Compressed Counting. - James S. Wolper:

Information Theory and Quadrature Rules. - Liangbin Li, Yindi Jing, Hamid Jafarkhani:

Interference Cancellation in Multi-Access Wireless Relay Networks. - Chris Hawblitzel, Erez Petrank:

Automated Verification of Practical Garbage Collectors. - Khaled M. Khalil, Mohamed Hassan Abdel Aziz, Taymour T. Nazmy, Abdel-Badeeh M. Salem:

Artificial Immune Systems Metaphor for Agent Based Modeling of Crisis Response Operations. - Jeremiah Blocki, Ryan Williams:

Resolving the Complexity of Some Data Privacy Problems. - Mithun Das Gupta, Thomas S. Huang:

Bregman Distance to L1 Regularized Logistic Regression. - Francesco Biscani, Dario Izzo, Chit Hong Yam:

A Global Optimisation Toolbox for Massively Parallel Engineering Optimisation. - Ali Al-Bashabsheh, Yongyi Mao:

Valiant Transform of Forney Graphs. - Manuel Bodirsky, Víctor Dalmau, Barnaby Martin, Michael Pinsker:

Distance Constraint Satisfaction Problems. - Patrick Kuppinger, Giuseppe Durisi, Helmut Bölcskei:

Where is Randomness Needed to Break the Square-Root Bottleneck? - William O. Wilson, Phil Birkin, Uwe Aickelin:

Oil Price Trackers Inspired by Immune Memory. - William O. Wilson, Phil Birkin, Uwe Aickelin:

Motif Detection Inspired by Immune Memory. - Sana Ullah, Bin Shen, S. M. Riazul Islam, Pervez Khan, Shahnaz Saleem, Kyung Sup Kwak:

A Study of Medium Access Control Protocols for Wireless Body Area Networks. - Yousof Al-Hammadi, Uwe Aickelin, Julie Greensmith:

Performance Evaluation of DCA and SRC on a Single Bot Detection. - Simon M. Garrett, Martin Robbins, Joanne H. Walker, William O. Wilson, Uwe Aickelin:

Modelling Immunological Memory. - William O. Wilson, Phil Birkin, Uwe Aickelin:

Price Trackers Inspired by Immune Memory. - Mehdi Karimi, Amir H. Banihashemi:

A Message-Passing Algorithm for Counting Short Cycles in a Graph. - Mithun Das Gupta:

Hashing Image Patches for Zooming. - David Doty:

An Oracle Strongly Separating Deterministic Time from Nondeterministic Time, via Kolmogorov Complexity. - Markus N. Rabe, Sven Schewe:

Finite Optimal Control for Time-Bounded Reachability in CTMDPs and Continuous-Time Markov Games. - Venkatesan Guruswami, Adam D. Smith:

Codes for Computationally Simple Channels: Explicit Constructions with Optimal Rate. - Gottfried Lechner, Troels Pedersen, Gerhard Kramer:

Analysis and Design of Binary Message-Passing Decoders. - Paul Lesov:

Database Security: A Historical Perspective. - Vitaly Osipov, Peter Sanders:

n-Level Graph Partitioning. - Grenville J. Croll

:
Computers and the Conservation of Energy. - Subhojit Som, Lee C. Potter:

Sparsity Pattern Recovery in Bernoulli-Gaussian Signal Model. - Amit Deshpande, Luis Rademacher:

Efficient volume sampling for row/column subset selection. - Olivier Delmas, Sylvain Gravier, Mickaël Montassier, Aline Parreau:

On two variations of identifying codes. - Jay Cheng, Cheng-Shang Chang, Sheng-Hua Yang, Tsz-Hsuan Chao, Duan-Shin Lee, Ching-Ming Lien:

Constructions of Optical Queues With a Limited Number of Recirculations--Part I: Greedy Constructions. - Jean-Claude Belfiore, Frédérique E. Oggier:

Secrecy Gain: a Wiretap Lattice Code Design. - Ramesh Hariharan, Debmalya Panigrahi:

A General Framework for Graph Sparsification. - Gianni Tedesco, Uwe Aickelin:

Real-Time Alert Correlation with Type Graphs. - Jan Feyereisl, Uwe Aickelin:

STORM - A Novel Information Fusion and Cluster Interpretation Technique. - Pavel Ruzankin:

Operator-oriented programming: a new paradigm for implementing window interfaces and parallel algorithms. - Emanuel Gluskin:

An approximate analytical (structural) superposition in terms of two, or more, "alfa"-circuits of the same topology: Pt.1 - description of the superposition. - (Withdrawn) Simulation of Wireless Sensor Networks Using TinyOS- A case Study.

- Glyn Morrill, Oriol Valentín:

Displacement Calculus. - Sudheer Vakati, David Fernández-Baca:

Graph Triangulations and the Compatibility of Unrooted Phylogenetic Trees. - Alan P. Sexton, Richard Swinbank:

Symmetric M-tree. - Gongguo Tang, Arye Nehorai:

The ℓ1-Constrained Minimal Singular Value: a Computable Quantification of the Stability of Sparse Signal Reconstruction. - Ankur Moitra, Gregory Valiant:

Settling the Polynomial Learnability of Mixtures of Gaussians. - Alan M. Frieze, Gregory B. Sorkin:

Average case performance of heuristics for multi-dimensional assignment problems. - Anirban Dasgupta, Ravi Kumar, Tamás Sarlós:

A Sparse Johnson--Lindenstrauss Transform. - Shabnam Sodagari, Peyman Hesami, Alireza Nasiri Avanaki:

Error Concealment in Image Communication Using Edge Map Watermarking and Spatial Smoothing. - Irina B. Semenova

:
Intelligent Technologies in Model Base Management System Design Automation. - Xuan-Chao Huang, Jay Cheng:

Constructions of Optical Queues With a Limited Number of Recirculations--Part II: Optimal Constructions. - Tomás Brázdil, Javier Esparza, Stefan Kiefer, Michael Luttenberger:

Space-efficient scheduling of stochastically generated tasks. - Charles L. Cartledge, Michael L. Nelson:

Analysis of Graphs for Digital Preservation Suitability. - Pengkai Zhao Babak Daneshrad:

Bounds on the Maximum Number of Concurrent Links in MIMO Ad Hoc Networks with QoS Constraints. - Viveck R. Cadambe, Syed Ali Jafar, Hamed Maleki:

Distributed Data Storage with Minimum Storage Regenerating Codes - Exact and Functional Repair are Asymptotically Equally Efficient. - Omid Taheri, Sergiy A. Vorobyov:

Segmented compressed sampling for analog-to-information conversion: Method and performance analysis. - MohammadHossein Bateni, MohammadTaghi Hajiaghayi, Nicole Immorlica, Hamid Mahini:

The cooperative game theory foundations of network bargaining games. - Udayan Kumar, Gautam S. Thakur, Ahmed Helmy:

PROTECT: Proximity-based Trust-advisor using Encounters for Mobile Societies. - Joseph Shtok, Michael Elad:

Analysis of Basis Pursuit Via Capacity Sets. - Hadi Ahmadi, Reihaneh Safavi-Naini:

New Results on Secret Key Establishment over a Pair of Broadcast Channels. - Martin Slota, João Leite:

Towards Closed World Reasoning in Dynamic Open Worlds (Extended Version). - Gautam S. Thakur, Mukul Sharma, Ahmed Helmy:

SHIELD: Social sensing and Help In Emergency using mobiLe Devices. - Kenton Born:

Browser-Based Covert Data Exfiltration. - Kenton Born, David Gustafson:

Detecting DNS Tunnels Using Character Frequency Analysis. - Kenton Born, David Gustafson:

NgViz: Detecting DNS Tunnels through N-Gram Visualization and Quantitative Analysis. - Joseph Shtok, Michael Zibulevsky, Michael Elad:

Spatially-Adaptive Reconstruction in Computed Tomography Based on Statistical Learning. - Erik D. Demaine, Matthew J. Patitz, Robert T. Schweller, Scott M. Summers:

Self-Assembly of Arbitrary Shapes with RNA and DNA tiles (extended abstract). - Jong Min Kim, Ok Kyun Lee, Jong Chul Ye:

Compressive MUSIC: A Missing Link Between Compressive Sensing and Array Signal Processing. - Eric Angel, Evripidis Bampis, Gerasimos G. Pollatos, Vassilis Zissimopoulos:

Optimal Data Placement on Networks With Constant Number of Clients. - Nicolò Cesa-Bianchi, Shai Shalev-Shwartz, Ohad Shamir:

Efficient Learning with Partially Observed Attributes. - Emanuel Gluskin:

An approximate analytical (structural) superposition in terms of two, or more, "alfa"-circuits of the same topology: Pt. 2 - the "internal circuit mechanism". - Jan Treibig, Georg Hager, Gerhard Wellein:

LIKWID: A lightweight performance-oriented tool suite for x86 multicore environments. - Rahul Vaze:

Throughput-Delay-Reliability Tradeoff with ARQ in Wireless Ad Hoc Networks. - Sungwook Moon, Ahmed Helmy:

Understanding periodicity and regularity of nodal encounters in mobile networks: A spectral analysis. - Alexandros G. Dimakis, Kannan Ramchandran, Yunnan Wu, Changho Suh:

A Survey on Network Codes for Distributed Storage. - H. S. Ramesh Babu, Gowrishankar, P. S. Satyanarayana:

An Intelligent Call Admission Control Decision Mechanism for Wireless Networks. - Sozan Abdulla:

New Visual Cryptography Algorithm For Colored Image. - Syed Wajahat Abbas Rizvi, R. A. Khan:

Maintainability Estimation Model for Object-Oriented Software in Design Phase (MEMOOD). - Salem Saleh Al-amri, Namdeo V. Kalyankar, Santosh D. Khamitkar:

Deblured Gaussian Blurred Images. - Ahmed Hamza Osman, Naomie Salim, Mohammed Salem Binwahlan:

Plagiarism Detection Using Graph-Based Representation. - Yee Ming Chen:

Improving Supply Chain Coordination by Linking Dynamic Procurement Decision to Multi-Agent System. - Cherif Foudil, Rabiaa Chighoub:

Crowd simulation influenced by agent's socio-psychological state. - Ibrahim A. Albidewi

, Yap Teck Ann:
Combination of Subtractive Clustering and Radial Basis Function in Speaker Identification. - P. V. Hunagund, A. B. Kalpana:

Crosstalk Noise Modeling for RC and RLC interconnects in Deep Submicron VLSI Circuits. - Anjali Malviya, S. G. Bhirud:

Visual Infrared Video Fusion for Night Vision using Background Estimation. - Sumalatha Ramachandran, Sharon Joseph, Sujaya Paulraj, Vetriselvi Ramaraj:

Handling Overload Conditions In High Performance Trustworthy Information Retrieval Systems. - S. Saraswathi, Asma Siddhiqaa, K. Kalaimagal, M. Kalaiyarasi:

BiLingual Information Retrieval System for English and Tamil. - Mohd Nazir, Raees Ahmad Khan, Khurram Mustafa:

A Metrics Based Model for Understandability Quantification. - S. Saraswathi, Narasimha Sravan V, Sai Vamsi Krishna B. V, Suresh Reddy:

Audio enabled information extraction system for cricket and hockey domains. - Er. Anantdeep, Er. Sandeep Kaur, Er. Balpreet Kaur:

Mobile Zigbee Sensor Networks. - Er. Sandeep Kaur, Er. Anantdeep, Er. Deepak Aggarwal:

Effect of Crosstalk on Permutation in Optical Multistage Interconnection Networks. - Er. Deepak Aggarwal, Er. Sandeep Kaur, Er. Anantdeep:

An Efficient Watermarking Algorithm to Improve Payload and Robustness without Affecting Image Perceptual Quality. - Khawar Hameed, Kamran Ahsan, Weijun Yang:

Mobile Commerce and Applications: An Exploratory Study and Review. - P. Kamakshi, A. Vinaya Babu:

Preserving Privacy and Sharing the Data in Distributed Environment using Cryptographic Technique on Perturbed data. - Anuj Mehra, Anupam Shukla, Mahender Kumawat, Rajiv Ranjan, Ritu Tiwari:

Intelligent System for Speaker Identification using Lip features with PCA and ICA. - S. Ramakrishnan, S. Venugopalan, A. Ebenezer Jeyakumar:

Prediction of Retained Capacity and EODV of Li-ion Batteries in LEO Spacecraft Batteries. - Ravinder Yadav, Rinkle Rani Aggarwal:

Survey and Comparison of Optical Switch Fabrication Techniques and Architectures. - Viresh Patel:

Determining Edge Expansion and Other Connectivity Measures of Graphs of Bounded Genus. - Felix Effenberger, Daniel Weiskopf:

Finding and Classifying Critical Points of 2D Vector Fields: A Cell-Oriented Approach Using Group Theory. - (Withdrawn) Apologizing Comment on 'Quantum Quasi-Cyclic Low-Density Parity-Check codes'.

- Djoerd Hiemstra, Claudia Hauff:

MIREX: MapReduce Information Retrieval Experiments. - Ronit Bustin, Miquel Payaró, Daniel Pérez Palomar, Shlomo Shamai:

On MMSE Properties and I-MMSE Implications in Parallel MIMO Gaussian Channels. - Rami Mochaourab, Eduard A. Jorswieck:

Optimal Beamforming in Interference Networks with Perfect Local Channel Information. - Marco Baldi, Marco Bianchi, Franco Chiaraluce:

Non-Systematic Codes for Physical Layer Security. - Mike E. Davies, Yonina C. Eldar:

Rank Awareness in Joint Sparse Recovery. - Mitsugu Iwamoto, Hiroki Koga, Hirosuke Yamamoto:

Coding Theorems for Cheating-Detectable Secret Sharing Schemes with Two Shares. - Marek Rucinski, Dario Izzo, Francesco Biscani:

On the Impact of the Migration Topology on the Island Model. - Francesco Biscani:

Multiplication of sparse Laurent polynomials and Poisson series on modern hardware architectures. - Hadi Arbabi, Michele C. Weigle:

Highway Mobility and Vehicular Ad-Hoc Networks in NS-3. - Supriya Krishnamurthy, John Ardelius, Erik Aurell, Mads Dam, Rolf Stadler, Fetahi Wuhib:

The Accuracy of Tree-based Counting in Dynamic Networks. - George B. Mertzios, Derek G. Corneil:

A Simple Polynomial Algorithm for the Longest Path Problem on Cocomparability Graphs. - Nafiz Imtiaz Bin Hamid, Md. R. H. Khandokar, Taskin Jamal, Md. A. Shoeb, Md. Zakir Hossain:

In Quest of the Better Mobile Broadband Solution for South Asia Taking WiMAX and LTE into Consideration. - Iwan Adhicandra:

Measuring Data and VoIP Traffic in WiMAX Networks. - Ahmed Jedidi, Mohamed Abid:

Optimal Crosstalk Detection and Localization Method for Optical Time Division Multiplexed Transmission Systems. - Norrozila Sulaiman, Che Yahaya Yaakub:

Investigation on QoS of Campus-wide WiFi Networks. - (Withdrawn) Concatenated Coding for the AWGN Channel with Noisy Feedback.

- Saeed Tavakoli, Mahdieh Zeinadini, Shahram Mohanna:

Modelling and Design of a Microstrip Band-Pass Filter Using Space Mapping Techniques. - G. M. M. Bashir, M. J. Hossain, M. R. Karim:

Clustering of Content Supporting Computer Mediated Courseware Development. - S. M. Aqil Burney, M. Sadiq Ali Khan:

Revealing Method for the Intrusion Detection System. - Lamia Chaari, Lotfi Kamoun:

Wireless sensors networks MAC protocols analysis. - Atri Rudra, Steve Uurtamo:

Data Stream Algorithms for Codeword Testing. - Abdelati Malek Amel, Abdessalem Ben Abdelali, Abdellatif Mtibaa:

Video shot boundary detection using motion activity descriptor. - Heni Kaaniche, Farouk Kamoun:

Mobility Prediction in Wireless Ad Hoc Networks using Neural Networks. - Md. Shamim Reza, Md. Maruf Hossain, Satya Prasad Majumder:

Evaluation of Burst Loss Rate of an Optical Burst Switching (OBS) Network with Wavelength Conversion Capability. - Vitthal J. Gond, Aditya Goel:

Performance Evaluation of Wavelength Routed Optical Network with Wavelength Conversion. - Lamia Chaari, Rim Ayadi, Lotfi Kamoun:

Conception and FPGA implementation of IEEE 802.11s mesh network MAC layer transmitter. - Akitoshi Kawamura:

Lipschitz Continuous Ordinary Differential Equations are Polynomial-Space Complete. - Daniel S. Roche:

Chunky and Equal-Spaced Polynomial Multiplication. - Krzysztof R. Apt, Frank S. de Boer, Ernst-Rüdiger Olderog:

Verification of Object-Oriented Programs: a Transformational Approach. - Changho Suh, Kannan Ramchandran:

On the Existence of Optimal Exact-Repair MDS Codes for Distributed Storage. - Weiping Zhu:

Explicit Maximum Likelihood Loss Estimator in Multicast Tomography. - Eli Gafni, Petr Kuznetsov:

L-Resilient Adversaries and Hitting Sets. - Michael T. Goodrich:

Simulating Parallel Algorithms in the MapReduce Framework with Applications to Parallel Computational Geometry. - Laurent Massoulié:

Adaptive Content Placement for Peer-to-Peer Video-on-Demand Systems. - Richard P. Brent, Paul Zimmermann:

Modern Computer Arithmetic (version 0.5.1). - Kenneth W. Shum, Wing Shing Wong:

Construction of Short Protocol Sequences with Worst-Case Throughput Guarantee. - Woong-Kee Loh, Yang-Sae Moon, Jun-Gyu Kang:

A Data Cleansing Method for Clustering Large-scale Transaction Databases. - Krzysztof R. Apt:

Direct Proofs of Order Independence. - Venkatesan T. Chakaravarthy, Vinayaka Pandit, Yogish Sabharwal:

On the Complexity of the $k$-Anonymization Problem. - Marcin Ostrowski:

Minimum energy required to copy one bit of information. - Martin Josef Geiger:

On the comparison of plans: Proposition of an instability measure for dynamic machine scheduling. - Sudarshan Shinde:

A Design of Paraunitary Polyphase Matrices of Rational Filter Banks Based on (P,Q) Shift-Invariant Systems. - Mikkel Baun Kjærgaard:

Indoor Positioning with Radio Location Fingerprinting. - Nikolay P. Vabishchevich, Petr N. Vabishchevich:

VAGO method for the solution of elliptic second-order boundary value problems. - Roman K. Fedorov:

Logical methods of object recognition on satellite images using spatial constraints. - Henning Thielemann:

Compiling Signal Processing Code embedded in Haskell via LLVM. - Philippe Besnard, Marie-Odile Cordier, Yves Moinard:

Ontology-based inference for causal explanation. - Vadim E. Levit, Eugen Mandrescu:

When G^2 is a Konig-Egervary graph? - François Arnault, Thierry P. Berger, Marine Minier, Benjamin Pousse:

Revisiting LFSMs. - Vincent Lucas, Jean-Jacques Pansiot, Dominique Grad, Benoît Hilt:

Efficient multicast data transfer with congestion control using dynamic source channels. - Emmanuel Abbe, Rethnakaran Pulikkoonattu:

Universal A Posteriori Metrics Game. - Wriddhi Bhowmik, Shweta Srivastava:

Optimum Design of a 4x4 Planar Butler Matrix Array for WLAN Application. - Xueying Hou, Chenyang Yang:

Impact of Channel Asymmetry on Base Station Cooperative Transmission with Limited Feedback. - Md. Shamim Reza, Md. Maruf Hossain, Adnan Ahmed Chowdhury, S. M. Shamim Reza, Md. Moshiur Rahman:

Performance Evaluation of SCM-WDM System Using Different Linecoding. - Marcel Ausloos:

Punctuation effects in English and Esperanto texts. - Mikhail Belkin, Kaushik Sinha:

Polynomial Learning of Distribution Families. - Kun Qiu, Aleksandar Dogandzic:

ECME Thresholding Methods for Sparse Signal Reconstruction. - Natalia Silberstein:

Properties of Codes in the Johnson Scheme. - Yam Ki Cheung, Ovidiu Daescu:

Fréchet Distance Problems in Weighted Regions. - Valérie Chanal, Chris Kimble:

Born to be Wild: Using Communities of Practice as a Tool for Knowledge Management. - Sandeep Katta:

Recursive Information Hiding in Visual Cryptography. - Ashish Goel, Michael Kapralov, Sanjeev Khanna:

Graph Sparsification via Refinement Sampling. - Pablo Piantanida, Shlomo Shamai:

On the Capacity of Compound State-Dependent Channels with States Known at the Transmitter. - Devlin M. Gualtieri:

FauxCrypt - A Method of Text Obfuscation. - Yusuke Watanabe:

Discrete geometric analysis of message passing algorithm on graphs. - Stefano Rini, Daniela Tuninetti, Natasha Devroye:

Outer Bounds for the Interference Channel with a Cognitive Relay. - A. Robert Calderbank, Sina Jafarpour:

Reed Muller Sensing Matrices and the LASSO. - Pascal Koiran:

Shallow Circuits with High-Powered Inputs. - Hsuan-Yi Chu:

On the Achievable Rate Regions for a Class of Cognitive Radio Channels: Interference Channel with Degraded Message Sets with Unidirectional Destination Cooperation. - César Domínguez, Julio Rubio:

Computing in Coq with Infinite Algebraic Data Structures. - Marek Cygan, Marcin Pilipczuk, Michal Pilipczuk, Jakub Onufry Wojtaszczyk:

The stubborn problem is stubborn no more (a polynomial algorithm for 3-compatible colouring and the stubborn list partition problem). - Marek Cygan, Marcin Pilipczuk:

Bandwidth and Distortion Revisited. - Jeffrey D. Blanchard, Coralia Cartis, Jared Tanner:

Compressed Sensing: How sharp is the Restricted Isometry Property. - Franck Butelle, Florent Hivert, Micaela Mayero, Frédéric Toumazet:

Formal Proof of SCHUR Conjugate Function. - Frank Nielsen, Sylvain Boltz:

The Burbea-Rao and Bhattacharyya centroids. - Aaron C. Hurley, Ali Al-Radaideh, Bai Li, Uwe Aickelin, Ron Coxon, Paul Glover, Penny A. Gowland:

Tailored RF pulse optimization for magnetization inversion at ultra high field. - Kfir Gedalyahu, Ronen Tur, Yonina C. Eldar:

Multichannel Sampling of Pulse Streams at the Rate of Innovation. - Andrea Kohlhase, Michael Kohlhase, Christoph Lange:

Dimensions of Formality: A Case Study for MKM in Software Engineering. - Samir Datta, Raghav Kulkarni, Raghunath Tewari, N. V. Vinodchandran:

Space Complexity of Perfect Matching in Bounded Genus Bipartite Graphs. - Saber Jafarizadeh:

Optimal Weights of Certain Branches of an Arbitrary Connected Network for Fastest Distributed Consensus Averaging Problem. - (Withdrawn) Analyzing Random Network Coding with Differential Equations and Differential Inclusions.

- Omar I. Al-Bataineh, Ron van der Meyden:

Epistemic Model Checking for Knowledge-Based Program Implementation: an Application to Anonymous Broadcast. - Alireza Vahid, Amir Salman Avestimehr:

The Two-User Deterministic Interference Channel with Rate-Limited Feedback. - Ali Emre Pusane, Roxana Smarandache, Pascal O. Vontobel, Daniel J. Costello Jr.:

Deriving Good LDPC Convolutional Codes from LDPC Block Codes. - Paul Libbrecht:

Notations Around the World: Census and Exploitation. - Gordon V. Cormack, Mark D. Smucker, Charles L. A. Clarke:

Efficient and Effective Spam Filtering and Re-ranking for Large Web Datasets. - Jaewon Kim, Jonghyun Park:

Analysis of Feedback Overhead for MIMO Beamforming over Time-Varying Channels. - Ilya Safro, Boris Temkin:

Multiscale approach for the network compression-friendly ordering. - Neri Merhav:

Rate-distortion function via minimum mean square error estimation. - Daniil Ryabko:

Clustering processes. - Natalia Silberstein, Tuvi Etzion:

On Perfect Codes in the Johnson Graph. - Valentin Savin:

Split-Extended LDPC codes for coded cooperation. - Grazziela P. Figueredo, Uwe Aickelin, Amanda M. Whitbrook:

System Dynamics Modelling of the Processes Involving the Maintenance of the Naive T Cell Repertoire. - Matteo Gorgoglione, Valentin Savin, David Declercq:

Optimized puncturing distributions for irregular non-binary LDPC codes. - Mathieu Cunche, Valentin Savin, Vincent Roca:

Analysis of Quasi-Cyclic LDPC codes under ML decoding over the erasure channel. - Robert F. Oates, Julie Greensmith, Uwe Aickelin, Jonathan M. Garibaldi, Graham Kendall:

The Application of a Dendritic Cell Algorithm to a Robotic Classifier. - Sarah Filippi, Olivier Cappé, Aurélien Garivier:

Optimism in Reinforcement Learning Based on Kullback-Leibler Divergence. - Florent Foucaud

, Eleonora Guerrini, Matjaz Kovse, Reza Naserasr, Aline Parreau, Petru Valicov:
Extremal graphs for the identifying code problem. - Stasys Jukna, Georg Schnitger:

Circuits with arbitrary gates for random operators. - Swan Dubois

, Toshimitsu Masuzawa, Sébastien Tixeuil:
Construction auto-stabilisante d'arbre couvrant en dépit d'actions malicieuses. - Pierre Lescanne, Matthieu Perrinel:

On the Rationality of Escalation. - Anton Bondarenko:

On Application of the Local Search and the Genetic Algorithms Techniques to Some Combinatorial Optimization Problems. - Jean-Yves Baudais, Fahad Syed Muhammad, Jean-François Hélard:

Robustness maximization of parallel multichannel systems. - Guillaume Chèze:

Nearly Optimal Algorithms for the Decomposition of Multivariate Rational Functions and the Extended Lüroth's Theorem. - Chính T. Hoàng, Frédéric Maffray, Meriem Mechebbek:

A characterization of b-perfect graphs. - Tobias Tscheuschner:

The local max-cut problem is PLS-complete even on graphs with maximum degree five. - Kostyantyn M. Shchekotykhin, Gerhard Friedrich:

Query strategy for sequential ontology debugging. - Emil Saucan:

Isometric Embeddings in Imaging and Vision: Facts and Fiction. - Kristina Lerman, Tad Hogg:

Using a Model of Social Dynamics to Predict Popularity of News. - Kenta Kasai, David Declercq, Charly Poulliat, Kohichi Sakaniwa:

Multiplicatively Repeated Non-Binary LDPC Codes. - Dell Zhang, Jun Wang, Deng Cai, Jinsong Lu:

Self-Taught Hashing for Fast Similarity Search. - Xiaodi Wu:

Equilibrium Value Method for the Proof of QIP=PSPACE. - Scott Aaronson, Andrew Drucker:

A Full Characterization of Quantum Advice. - Mathieu Leconte, Jian Ni, R. Srikant:

Mixing Time of Glauber Dynamics With Parallel Updates and Heterogeneous Fugacities. - Salman Beigi, Peter W. Shor, John Watrous:

Quantum interactive proofs with short messages. - Georges Hébrail, Bernard Hugueney, Yves Lechevallier, Fabrice Rossi:

Exploratory Analysis of Functional Data via Clustering and Optimal Segmentation. - David L. Donoho, Arian Maleki, Andrea Montanari:

The Noise-Sensitivity Phase Transition in Compressed Sensing. - Ali Kakhbod, S. M. Sadegh Tabatabaei Yazdi:

On Describing the Routing Capacity Regions of Networks. - Felix Effenberger, Jonathan Spreer:

simpcomp -- A GAP toolbox for simplicial complexes. - David A. Meyer, James Pommersheim:

On the uselessness of quantum queries. - Bernard Chazelle:

The Total s-Energy of a Multiagent System. - Cristian S. Calude, Michael J. Dinneen, Monica Dumitrescu, Karl Svozil:

Experimental Evidence of Quantum Randomness Incomputability. - Bob Coecke, Simon Perdrix:

Environment and classical channels in categorical quantum mechanics. - Adrian Dumitrescu:

Approximate Euclidean Ramsey theorems. - Christian Herrmann, Martin Ziegler:

Expressiveness and Computational Complexity of Geometric Quantum Logic. - Cinzia Bisi, Giampiero Chiaselotti:

A Class of lattices and boolean functions related to some extremal sum problems. - Xueliang Li, Yiyang Li:

The asymptotic values of the general Zagreb and Randić indices of trees with bounded maximum degree. - Sergei A. Goreinov, Ivan V. Oseledets, Dmitry V. Savostyanov:

Wedderburn rank reduction and Krylov subspace method for tensor approximation. Part 1: Tucker case. - Devavrat Shah, Damon Wischik:

Switched networks with maximum weight policies: Fluid approximation and multiplicative state space collapse. - Lukasz Grabowski:

On Turing machines, dynamical systems and the Atiyah problem. - Julien M. Hendrickx, Alexander Olshevsky, John N. Tsitsiklis:

Distributed anonymous discrete function computation. - Maxim A. Babenko:

A Faster Algorithm for the Maximum Even Factor Problem. - Sodeif Ahadpour, Yaser Sadra:

Randomness criteria in binary visibility graph perspective. - Vicky Choi:

Adiabatic Quantum Algorithms for the NP-Complete Maximum-Weight Independent Set, Exact Cover and 3SAT Problems. - Dirk Hofmann, Pawel Waszkiewicz:

Approximation in quantale-enriched categories. - Jason K. Johnson, Michael Chertkov:

A Majorization-Minimization Approach to Design of Power Transmission Networks. - Patrick L. Harrington Jr., Alfred O. Hero III:

Spatio-Temporal Graphical Model Selection. - Xueliang Li, Yuefang Sun:

Note on the Rainbow $k$-Connectivity of Regular Complete Bipartite Graphs. - Tom Bohman, Alan M. Frieze, Eyal Lubetzky:

A note on the random greedy triangle-packing algorithm. - Bernard C. Levy, Ramine Nikoukhah:

Robust State Space Filtering with an Incremental Relative Entropy Tolerance. - Xavier Allamigeon, Stéphane Gaubert, Ricardo Katz:

Tropical polar cones, hypergraph transversals, and mean payoff games. - Torsten A. Ensslin

, Cornelius Weig:
Inference with minimal Gibbs free energy in information field theory. - Kristina Schindelar, Viktor Levandovskyy, Eva Zerz:

Exact linear modeling using Ore algebras. - Bhaswar B. Bhattacharya:

On the Fermat-Weber Point of a Polygonal Chain. - David L. Donoho, Gitta Kutyniok:

Microlocal Analysis of the Geometric Separation Problem. - Kristian Ranestad, Bernd Sturmfels:

The Convex Hull of a Variety. - Tommaso Bolognesi:

Causal sets from simple models of computation. - Richard P. Brent, Peter L. Montgomery, Herman J. J. te Riele:

Factorizations of Cunningham numbers with bases 13 to 99. - Eva Kranz:

Structural Stability and Immunogenicity of Peptides. - Richard P. Brent:

Some integer factorization algorithms using elliptic curves. - Gennaro Amendola, Simona Settepanella:

Modularity and Optimality in Social Choice. - Ali ParandehGheibi, Muriel Médard, Asuman E. Ozdaglar, Srinivas Shakkottai:

Access-Network Association Policies for Media Streaming in Heterogeneous Environments. - Victor M. Preciado, Ali Jadbabaie:

From Local Measurements to Network Spectral Properties: Beyond Degree Distributions. - Nayantara Bhatnagar, Allan Sly, Prasad Tetali:

Reconstruction Threshold for the Hardcore Model. - Jure Leskovec, Daniel P. Huttenlocher, Jon M. Kleinberg:

Governance in Social Media: A case study of the Wikipedia promotion process. - Richard P. Brent:

Unrestricted algorithms for elementary and special functions. - A. D. Barbour, Oliver Johnson, Ioannis Kontoyiannis, Mokshay M. Madiman:

Compound Poisson Approximation via Information Functionals. - Xin-She Yang:

A New Metaheuristic Bat-Inspired Algorithm. - Valeriy K. Bulitko:

Reduction of behavior of additive cellular automata on groups. - Jian Ding, James R. Lee, Yuval Peres:

Cover times, blanket times, and majorizing measures. - Robert A. Malaney:

Quantum Location Verification in Noisy Channels. - Andrea Cerri, Patrizio Frosini:

Invariance properties of the multidimensional matching distance in Persistent Topology and Homology. - J. M. Landsberg, Laurent Manivel, Nicolas Ressayre:

Hypersurfaces with degenerate duals and the Geometric Complexity Theory Program. - Matjaz Perc:

Growth and structure of Slovenia's scientific collaboration network. - Mikhail Zaslavskiy, Francis R. Bach, Jean-Philippe Vert:

Many-to-Many Graph Matching: a Continuous Relaxation Approach. - Serge Galam:

Public debates driven by incomplete scientific data: the cases of evolution theory, global warming and H1N1 pandemic influenza. - Edward Farhi, David Gosset, Avinatan Hassidim, Andrew Lutomirski, Peter W. Shor:

Quantum money from knots. - Brian P. Sprouse, Christopher L. MacDonald, Gabriel A. Silva:

Computational efficiency of fractional diffusion using adaptive time step memory. - Stasa Milojevic:

Modes of Collaboration in Modern Science - Beyond Power Laws and Preferential Attachment. - Monireh Houshmand, Saied Hosseini-Khayat, Mark M. Wilde:

Minimal memory requirements for pearl necklace encoders of quantum convolutional codes. - Marcio de Moraes Marim, Michael Atlan, Elsa D. Angelini, Jean-Christophe Olivo-Marin:

Compressed Sensing with off-axis frequency-shifting holography. - Michael J. Barber, John W. Clark:

Designing neural networks that process mean values of random variables. - Pritam Roy:

Interface Building for Software by Modular Three-Valued Abstraction Refinement. - I-Hsiang Wang, David N. C. Tse:

Interference Mitigation through Limited Transmitter Cooperation. - Muhammad Muzzamil Luqman, Thierry Brouard

, Jean-Yves Ramel:
Graphic Symbol Recognition using Graph Based Signature and Bayesian Network Classifier. - Muhammad Muzzamil Luqman, Mathieu Delalandre, Thierry Brouard

, Jean-Yves Ramel, Josep Lladós:
Employing fuzzy intervals and loop-based methodology for designing structural signature: an application to symbol recognition. - Brian K. Butler, Paul H. Siegel:

On Distance Properties of Quasi-Cyclic Protograph-Based LDPC Codes. - Mark Giesbrecht:

Some Results on the Functional Decomposition of Polynomials. - Kang Ning:

Multiple oligo nucleotide arrays: Methods to reduce manufacture time and cost. - Richard P. Brent:

Parallel algorithms in linear algebra. - Wenyi Zhang, H. Vincent Poor:

On Minimax Robust Detection of Stationary Gaussian Signals in White Gaussian Noise. - Somnath Mukherjee, Pabitra Kumar Ghosh:

The Role of Boolean Function in Fractal Formation and it s Application to CDMA Wireless Communication. - Christoph Benzmueller:

Simple Type Theory as Framework for Combining Logics. - Jean-François Biasse, Michael J. Jacobson Jr., Alan K. Silvester:

Security Estimates for Quadratic Field Based Cryptosystems. - Nicolas Catusse, Victor Chepoi, Karim Nouioua, Yann Vaxès:

Minimum Manhattan network problem in normed planes with polygonal balls: a factor 2.5 approximation algorithm. - Joffrey Villard, Pascal Bianchi:

High-Rate Vector Quantization for the Neyman-Pearson Detection of Correlated Processes. - David A. Wheeler:

Fully Countering Trusting Trust through Diverse Double-Compiling. - Ananda Theertha Suresh, Arunkumar Subramanian, Andrew Thangaraj, Matthieu R. Bloch, Steven W. McLaughlin:

Strong Secrecy for Erasure Wiretap Channels. - David A. Wheeler:

Countering Trusting Trust through Diverse Double-Compiling. - Jacques Carette, Alan P. Sexton, Volker Sorge, Stephen M. Watt:

Symbolic Domain Decomposition. - Hemant Kowshik, P. R. Kumar:

Optimal computation of symmetric Boolean functions in Tree networks. - Hemant Kowshik, P. R. Kumar:

Optimal ordering of transmissions for computing Boolean threhold functions. - Vaneet Aggarwal, Amir Salman Avestimehr, Ashutosh Sabharwal:

On Achieving Local View Capacity Via Maximal Independent Graph Scheduling. - Alexander Barg, Punarbasu Purkayastha:

Near MDS poset codes and distributions. - Richard P. Brent:

On the periods of generalized Fibonacci recurrences. - Richard P. Brent:

On computing factors of cyclotomic polynomials. - Adam W. Bojanczyk, Richard P. Brent, Frank R. de Hoog, Douglas R. Sweet:

On the stability of the Bareiss and related Toeplitz factorization algorithms. - François Orieux, Jean-François Giovannelli, Thomas Rodet:

Bayesian estimation of regularization and PSF parameters for Wiener-Hunt deconvolution. - Rudolf Ahlswede, Igor Bjelakovic, Holger Boche, Janis Noetzel:

Entanglement Transmission over Arbitrarily Varying Quantum Channels. - Mark M. Wilde, Min-Hsiu Hsieh:

The quantum dynamic capacity formula of a quantum channel. - Nick S. Jones, John Moriarty:

Evolutionary Inference for Function-valued Traits: Gaussian Process Regression on Phylogenies. - Zhenwei Cao, Alexander Elgart:

Adiabatic quantum computation: Enthusiast and Sceptic's perspectives. - Feng Chen, Aiguo Xu, Guangcai Zhang, Yingjun Li, Sauro Succi:

Multiple-Relaxation-Time Lattice Boltzmann Approach to Compressible Flows with Flexible Specific-Heat Ratio and Prandtl Number. - Jean-Luc Marichal, Pierre Mathonet:

Symmetric approximations of pseudo-Boolean functions with applications to influence indexes. - Cosma Rohilla Shalizi, Andrew C. Thomas:

Homophily and Contagion Are Generically Confounded in Observational Social Network Studies. - Manuel Mazo Jr., Paulo Tabuada:

Decentralized event-triggered control over wireless sensor/actuator networks. - Manuel Mazo Jr., Paulo Tabuada:

Symbolic Approximate Time-Optimal Control. 


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID