default search action
CoRR, May 2010
- Maayan Gal-on, Shie Mannor:
Learning from Multiple Outlooks. - Bing Zeng, Xueming Tang, Ching-Fang Hsu:
A Framework For Fully-Simulatable h-Out-Of-n Oblivious Transfer. - Arvind Agarwal, Hal Daumé III:
A Geometric View of Conjugate Priors. - Byung-Hak Kim, Henry D. Pfister:
On the Joint Decoding of LDPC Codes and Finite-State Channels via Linear Programming. - Amparo Fúster-Sabater, Pino Caballero-Gil:
Global Linear Complexity Analysis of Filter Keystream Generators. - Pino Caballero-Gil, Candelaria Hernández-Goya:
Secret Sharing Based on a Hard-on-Average Problem. - Pino Caballero-Gil, Amparo Fúster-Sabater:
On the Design of Cryptographic Primitives. - Amparo Fúster-Sabater, Pino Caballero-Gil:
Linear solutions for cryptographic nonlinear sequence generators. - Rania El-Badry, Ahmed K. Sultan, Moustafa Youssef:
HyberLoc: Providing Physical Layer Location Privacy in Hybrid Sensor Networks. - Ying Cui, Vincent K. N. Lau:
Distributive Stochastic Learning for Delay-Optimal OFDMA Power and Subband Allocation. - Xiaoyu Chen:
Electronic Geometry Textbook: A Geometric Textbook Knowledge Management System. - Pino Caballero-Gil, Candelaria Hernández-Goya, Carlos Bruno-Castañeda:
A Rational Approach to Cryptographic Protocols. - Xiaohong Jia, Ron Goldman:
Using Smith Normal Forms and mu-Bases to Compute all the Singularities of Rational Planar Curves. - Pino Caballero-Gil, Amparo Fúster-Sabater, Oscar Delgado-Mohatar:
Linear Cellular Automata as Discrete Models for Generating Cryptographic Sequences. - Pino Caballero-Gil, Amparo Fúster-Sabater, Maria Eugenia Pazo-Robles:
New Attack Strategy for the Shrinking Generator. - Tom W. Kelsey, Lars Kotthoff:
The Exact Closest String Problem as a Constraint Satisfaction Problem. - Evgeny S. Sagatov, Andrei M. Sukhov, Prasad Calyam:
Influence of distortions of key frames on video transfer in wireless networks. - Pino Caballero-Gil, Amparo Fúster-Sabater:
A Simple Attack on Some Clock-Controlled Generators. - Rahul Gupta, Sunita Sarawagi:
Joint Structured Models for Extraction from Overlapping Sources. - Pino Caballero-Gil, Candelaria Hernández-Goya:
Self-Organized Authentication in Mobile Ad-hoc Networks. - Pino Caballero-Gil, Amparo Fúster-Sabater, Maria Eugenia Pazo-Robles:
Using Linear Difference Equations to Model Nonlinear Cryptographic Sequences. - Sugata Sanyal, Dhaval Gada, Rajat Gogri, Punit Rathod, Zalak Dedhia, Nirali Mody:
Security Scheme for Distributed DoS in Mobile Ad Hoc Networks. - Shirin Jalali, Michelle Effros:
On the Separation of Lossy Source-Network Coding and Channel Coding in Wireline Networks. - Dotan Di Castro, Shie Mannor:
Adaptive Bases for Reinforcement Learning. - Dimitry S. Ananichev, Vladimir V. Gusev, Mikhail V. Volkov:
Slowly synchronizing automata and digraphs. - Jayesh Kataria, Prabhakar S. Dhekne, Sugata Sanyal:
ACRR: Ad Hoc On-Demand Distance Vector Routing with Controlled Route Requests. - Andriy Kovalchuk, Vyacheslav Levitsky, Igor Samolyuk, Valentyn Yanchuk:
The Formulator MathML Editor Project: User-Friendly Authoring of Content Markup Documents. - Ali Alhazmi, Abdulrahman Al-Sharawi, Bing Liu, Deyvisson Oliveira, Kanj Sobh, Max Mayantz, Robin de Bled, Yu Ming Zhang:
Software Requirements Specification of the IUfA's UUIS - a Team 4 COMP5541-W10 Project Approach. - Manish Anand, P. R. Kumar:
A digital interface for Gaussian relay and interference networks: Lifting codes from the discrete superposition model. - Kanj Sobh, Deyvisson Oliveira, Bing Liu, Max Mayantz, Yu Ming Zhang, Ali Alhazmi, Robin de Bled, Abdulrahman Al-Sharawi:
Software Design Document, Testing, Deployment and Configuration Management, and User Manual of the UUIS -- a Team 4 COMP5541-W10 Project Approach. - Dongjie Yin, Pui King Wong, Tony T. Lee:
Analysis of Non-Persistent CSMA Protocols with Exponential Backoff Scheduling. - Nishant A. Mehta, Alexander G. Gray:
Generative and Latent Mean Map Kernels. - Houssem Jerbi, Geneviève Pujolle, Franck Ravat, Olivier Teste:
Personnalisation de Systèmes OLAP Annotés. - Franck Ravat, Olivier Teste, Gilles Zurfluh:
Personnalisation de bases de données multidimensionnelles. - Kevin Rosenblum, Lihi Zelnik-Manor, Yonina C. Eldar:
Dictionary Optimization for Block-Sparse Representations. - Frédéric Bret, Olivier Teste:
Construction graphique d'entrepôts et de magasins de données. - Franck Ravat, Olivier Teste, Gilles Zurfluh:
Algèbre OLAP et langage graphique. - Franck Ravat, Olivier Teste, Gilles Zurfluh:
Modélisation et extraction de données pour un entrepôt objet. - Gilles Hubert, Olivier Teste:
Analyse multigraduelle OLAP. - Faiza Ghozzi, Franck Ravat, Olivier Teste, Gilles Zurfluh:
Contraintes pour modèle et langage multidimensionnels. - Franck Ravat, Olivier Teste:
Modélisation et manipulation de données historisées et archivées dans un entrepôt orienté objet. - Olivier Teste:
Elaboration d'entrepôts de données complexes. - Olivier Teste:
Towards Conceptual Multidimensional Design in Decision Support Systems. - Andrea Campagna, Rasmus Pagh:
On Finding Frequent Patterns in Directed Acyclic Graphs. - Amir M. Ben-Amram:
Size-Change Termination, Monotonicity Constraints and Ranking Functions. - Wai Shing Fung, Nicholas J. A. Harvey:
Graph Sparsification by Edge-Connectivity and Random Spanning Trees. - Qiyu Sun:
Recovery of sparsest signals via ℓq-minimization. - Andri Mirzal, Masashi Furukawa:
Node-Context Network Clustering using PARAFAC Tensor Decomposition. - Moritz Wiese, Holger Boche, Igor Bjelakovic, Volker Jungnickel:
The Compound Multiple Access Channel with Partially Cooperating Encoders. - Abirami Sankaran, Andriy Samsonyuk, Maab Attar, Mohammad Parham, Olena Zayikina, Omar Jandali Rifai, Pavel Lepin, Rana Hassan:
Software Requirements Specification of the IUfA's UUIS -- a Team 1 COMP5541-W10 Project Approach. - Moazzam Islam Tiwana, Berna Sayraç, Zwi Altman:
Statistical Learning in Automated Troubleshooting: Application to LTE Interference Mitigation. - Andrea Asperti, Enrico Tassi:
Smart matching. - Christian Esteve Rothenberg, Carlos Alberto Braz Macapuna, Fábio Luciano Verdi, Maurício F. Magalhães:
The Deletable Bloom filter: A new member of the Bloom family. - Sami Akin, Mustafa Cenk Gursoy:
Performance Analysis of Cognitive Radio Systems under QoS Constraints and Channel Uncertainty. - Soheil Mohajer, Suhas N. Diggavi, Christina Fragouli, David N. C. Tse:
Approximate Capacity of Gaussian Interference-Relay Networks with Weak Cross Links. - Sertac Karaman, Emilio Frazzoli:
Incremental Sampling-based Algorithms for Optimal Motion Planning. - Rina Panigrahy, Kunal Talwar, Udi Wieder:
Lower Bounds on Near Neighbor Search via Metric Expansion. - Ersen Ekrem, Sennur Ulukus:
Capacity-Equivocation Region of the Gaussian MIMO Wiretap Channel. - Theodoros K. Dikaliotis, Alexandros G. Dimakis, Tracey Ho:
Security in Distributed Storage Systems by Communicating a Logarithmic Number of Bits. - Samuel Bucheli, Roman Kuznets, Thomas Studer:
Explicit Evidence Systems with Common Knowledge. - Tirza Routtenberg, Joseph Tabrikian:
Classes of lower bounds on outage error probability and MSE in Bayesian parameter estimation. - Luc Dartois, Manfred Kufleitner, Alexander Lauser:
Rankers over Infinite Words. - Endre Csóka:
Maximum flow is approximable by deterministic constant-time algorithm in sparse networks. - Amir M. Ben-Amram:
On Decidable Growth-Rate Properties of Imperative Programs. 1-14 - Guillaume Bonfante:
Observation of implicit complexity by non confluence. 15-29 - Ugo Dal Lago, Simone Martini, Margherita Zorzi:
General Ramified Recurrence is Sound for Polynomial Time. 47-62 - Luca Roversi, Luca Vercelli:
Safe Recursion on Notation into a Light Logic by Levels. 63-77 - Aloïs Brunel, Kazushige Terui:
Church => Scott = Ptime: an application of resource sensitive realizability. 31-46 - Mohak Shah, Mario Marchand, Jacques Corbeil:
Feature Selection with Conjunctions of Decision Stumps and Learning from Microarray Data. - Arash Behboodi, Pablo Piantanida:
Capacity of a Class of Broadcast Relay Channels. - Abirami Sankaran, Andriy Samsonyuk, Maab Attar, Mohammad Parham, Olena Zayikina, Omar Jandali Rifai, Pavel Lepin, Rana Hassan:
Software Design Document, Testing, and Deployment and Configuration Management of the UUIS - a Team 1 COMP5541-W10 Project Approach. - Manuel Kauers, Veronika Pillwein:
When can we decide that a P-finite sequence is positive? - Manuel Kauers, Carsten Schneider:
Partial Denominator Bounds for Partial Linear Difference Equations. - Vladimir L. Gavrikov, Rem G. Khlebopros:
An approach to visualize the course of solving of a research task in humans. - Kurt Ammon:
Informal Concepts in Machines. - Ahmed Daoudi, David Zerkler, Gay Hazan, Isabelle Toutant, Mariano Diaz, René Toutant, Virginia Cook, William Nzoukou, Yassine Amaiche:
Software Requirements Specification of the IUfA's UUIS -- a Team 3 COMP5541-W10 Project Approach. - Xiang He, Aylin Yener:
The Gaussian Many-to-1 Interference Channel with Confidential Messages. - Andrew Drucker:
Improved Direct Product Theorems for Randomized Query Complexity. - Patrick Baillot:
Proceedings International Workshop on Developments in Implicit Computational complExity, DICE 2010, Paphos, Cyprus, 27-28th March 2010. EPTCS 23, 2010 [contents] - Alexander Gallego, Nitesh Saxena, Jonathan Voris:
Security Through Entertainment: Experiences Using a Memory Game for Secure Device Pairing. - Daniel Golovin:
The B-Skip-List: A Simpler Uniquely Represented Alternative to B-Trees. - Omer Shahid Ahmad, Faisal Alrashdi, Jason Jun-Duo Chen, Najah Ilham, Jianhai Lu, Yiwei Sun, Tong Wang, Yongxin Zhu:
Software Design Document, Testing, Deployment and Configuration Management of the UUIS--a Team 2 COMP5541-W10 Project Approach. - Ramesh Hariharan, Debmalya Panigrahi:
A Linear-time Algorithm for Sparsification of Unweighted Graphs. - Sándor P. Fekete, Christiane Schmidt, Axel Wegener, Horst Hellbrück, Stefan Fischer:
Empowered by Wireless Communication: Self-Organizing Traffic Collectives. - Kasra Alishahi, Shayan Dashmiz, Pedram Pad, Farrokh Marvasti, M. H. Shafinia, M. S. Mansouri:
The Enigma of CDMA Revisited. - Jaeok Park, Mihaela van der Schaar:
Adaptive MAC Protocols Using Memory for Networks with Critical Traffic. - Mohammad Iqbal Bin Shahid, Joarder Kamruzzaman:
Weighted Soft Decision for Cooperative Sensing in Cognitive Radio Networks. - Jacques M. Bahi, Christophe Guyeux:
A chaos-based approach for information hiding security. - Christophe Guyeux, Nicolas Friot, Jacques M. Bahi:
Chaotic iterations versus Spread-spectrum: chaos and stego security. - Loet Leydesdorff:
The Production of Probabilistic Entropy in Structure/Action Contingency Relations. - Matthias Wilhelm, Ivan Martinovic, Jens B. Schmitt:
Key Generation in Wireless Sensor Networks Based on Frequency-selective Channels - Design, Implementation, and Analysis. - Zoran Hadzi-Velkov, Nikola Zlatanov:
Outage rates and outage durations of opportunistic relaying systems. - Nikola Zlatanov, Zoran Hadzi-Velkov, George K. Karagiannidis:
An efficient approximation to the correlated Nakagami-m sums and its application in equal gain diversity receivers. - Mathieu Baudet, Véronique Cortier, Stéphanie Delaune:
YAPA: A generic tool for computing intruder knowledge. - Jónathan Heras, Vico Pascual, Ana Romero, Julio Rubio:
Integrating multiple sources to answer questions in Algebraic Topology. - Nirmalendu Bikas Sinha, Manish sonal, Makar Chand Snai, R. Bera, Monojit Mitra:
Modelling and Implementation of ITWS: An ultimate solution to ITS. - David Auger, Irène Charon, Olivier Hudry, Antoine Lobstein:
Watching Systems in graphs: an extension of Identifying Codes. - Vincent Y. F. Tan, Animashree Anandkumar, Alan S. Willsky:
Learning High-Dimensional Markov Forest Distributions: Analysis of Error Rates. - Lamjed Touil, Abdessalem Ben Abdelali, Abdellatif Mtibaa, El-Bey Bourennane:
Towards Hardware implementation of video applications in new telecommunications devices. - Omer Shahid Ahmad, Faisal Alrashdi, Jason Jun-Duo Chen, Najah Ilham, Jianhai Lu, Yiwei Sun, Tong Wang, Yongxin Zhu:
Software Requirements Specification of the IUfA's UUIS -- a Team 2 COMP5541-W10 Project Approach. - Andy B. Yoo, Yang Liu, Sheila Vaidya, Stephen Poole:
A New Benchmark For Evaluation Of Graph-Theoretic Algorithms. - Sumit Ganguly, Purushottam Kar:
On Estimating the First Frequency Moment of Data Streams. - Robert S. Weigel, Doug M. Lindholm, Anne Wilson, Jeremy Faden:
TSDS: high-performance merge, subset, and filter software for time series-like data. - Sylvie Boldo, François Clément, Jean-Christophe Filliâtre, Micaela Mayero, Guillaume Melquiond, Pierre Weis:
Formal Proof of a Wave Equation Resolution Scheme: the Method Error. - Daniil Ryabko:
Clustering processes. - Jean-Guillaume Dumas, Thierry Gautier, Jean-Louis Roch:
Generic design of Chinese remaindering schemes. - Roberto M. Amadio, Patrick Baillot, Antoine Madet:
An affine-intuitionistic system of types and effects: confluence and termination. - Chris Armbruster, Laurent Romary:
Comparing Repository Types - Challenges and barriers for subject-based repositories, research repositories, national repository systems and institutional repositories in serving scholarly communication. - Yassine Amaiche, Virginia Cook, Ahmed Daoudi, Mariano Diaz, Gay Hazan, David Zerkler, William Nzoukou, Isabelle Toutant, René Toutant:
Software Design Document, Testing, Deployment and Configuration Management of the IUfA's UUIS -- a Team 3 COMP5541-W10 Project Approach. - Won-Yong Shin, Daniel Enrique Lucani, Muriel Médard, Milica Stojanovic, Vahid Tarokh:
On Capacity Scaling of Underwater Networks: An Information-Theoretic Perspective. - Teng Zhang, Arthur Szlam, Yi Wang, Gilad Lerman:
Randomized hybrid linear modeling by local best-fit flats. - Martianus Frederic Ezerman, San Ling, Patrick Solé, Olfa Yemen:
From Skew-Cyclic Codes to Asymmetric Quantum Codes. - Yi Su, Mihaela van der Schaar:
Structural Solutions For Additively Coupled Sum Constrained Games. - Jean-Marc Tacnet, Mireille Batton-Hubert, Jean Dezert:
A two-step fusion process for multi-criteria decision applied to natural hazards in mountains. - Pantelis Bouboulis, Sergios Theodoridis:
The Complex Gaussian Kernel LMS algorithm. - Pantelis Bouboulis, Sergios Theodoridis:
Extension of Wirtinger Calculus in RKH Spaces and the Complex Kernel LMS. - Yechang Fang, Kang Yen, Deng Pan, Zhuo Sun:
Buffer Management Algorithm Design and Implementation Based on Network Processors. - Yasser M. Alginaih, Abdul Ahad Siddiqi:
Multistage Hybrid Arabic/Indian Numeral OCR System. - Richard P. Brent:
George Forsythe's last paper. - Haim Kaplan, Natan Rubin, Micha Sharir:
A Kinetic Triangulation Scheme for Moving Points in The Plane. - Agnieszka Rowinska-Schwarzweller, Christoph Schwarzweller:
On Building a Knowledge Base for Stability Theory. - Dewan Md. Farid, Mohammad Zahidur Rahman:
Attribute Weighting with Adaptive NBTree for Reducing False Positives in Intrusion Detection. - Patrizio Frosini, Claudia Landi:
No embedding of the automorphisms of a topological space into a compact metric space endows them with a composition that passes to the limit. - Asgarali Bouyer, Mohammad Javad hoseyni, Abdul Hanan Abdullah:
Improving Overhead Computation and pre-processing Time for Grid Scheduling System. - Maman Abdurohman, Kuspriyanto, Sarwono Sutikno, Arif Sasongko:
The New Embedded System Design Methodology For Improving Design Process Performance. - Md. Golam Kaosar, Xun Yi:
Semi-Trusted Mixer Based Privacy Preserving Distributed Data Mining for Resource Constrained Devices. - S. Malathy, G. Sudha Sadhasivam, K. Murugan, S. Lokesh:
Adaptive Slot Allocation And Bandwidth Sharing For Prioritized Handoff Calls In Mobile Netwoks. - Mohit Soni, Sandesh Gupta, M. S. Rao, Phalguni Gupta:
An Efficient Vein Pattern-based Recognition System. - Adam Grabowski, Christoph Schwarzweller:
On Duplication in Mathematical Repositories. - S. Vijay Bhanu, R. M. Chandrasekaran, V. Balakrishnan:
Effective Bandwidth Utilization in IEEE802.11 for VOIP. - S. Karpagachelvi, M. Arthanari, M. Sivakumar:
ECG Feature Extraction Techniques - A Survey Approach. - H. S. Aravinda, H. D. Maheshappa, Ranjan Moodithaya:
Implementation of the Six Channel Redundancy to achieve fault tolerance in testing of satellites. - M. Umamaheswari, S. Sivasubramanian:
Performance Oriented Query Processing In GEO Based Location Search Engines. - Manish Kumar, M. C. Srivastava, Umesh Kumar:
Tunable Multifunction Filter Using Current Conveyor. - Bikrampal Kaur, Himanshu Aggarwal:
Artificial Neural Network based Diagnostic Model For Causes of Success and Failures. - J. Visumathi, K. L. Shunmuganathan:
Detecting Security threats in the Router using Computational Intelligence. - Sunil F. Rodd, Umakanth P. Kulkarni:
Adaptive Tuning Algorithm for Performance tuning of Database Management System. - Rakesh Kumar Jha, A. Wankhede Vishal, Upena D. Dalal:
A Survey of Mobile WiMAX IEEE 802.16m Standard. - György Elekes, Micha Sharir:
Incidences in Three Dimensions and Distinct Distances in the Plane. - David Sevilla, Daniel Wachsmuth:
Polynomial integration on regions defined by a triangle and a conic. - Stasys Jukna, Georg Schnitger:
Min-Rank Conjecture for Log-Depth Circuits. - Hermann von Issendorff:
Programming Discrete Physical Systems. - Matthew T. Dickerson, Michael T. Goodrich, Thomas D. Dickerson:
Round-Trip Voronoi Diagrams and Doubling Density in Geographic Networks. - Vineet Abhishek, Bruce E. Hajek:
Revenue Optimal Auction for Single-Minded Buyers. - Michael Lentmaier, David G. M. Mitchell, Gerhard P. Fettweis, Daniel J. Costello Jr.:
Asymptotically Regular LDPC Codes with Linear Distance Growth and Thresholds Close to Capacity. - David G. M. Mitchell, Michael Lentmaier, Daniel J. Costello Jr.:
New Families of LDPC Block Codes Formed by Terminating Irregular Protograph-Based LDPC Convolutional Codes. - (Withdrawn) Estimating small moments of data stream in nearly optimal space-time.
- Vineet Abhishek, Bruce E. Hajek:
Efficiency Loss in Revenue Optimal Auctions. - (Withdrawn) Estimating small frequency moments of data stream: a characteristic function approach.
- Manuel Bodirsky, Peter Jonsson, Timo von Oertzen:
Horn versus full first-order: complexity dichotomies in algebraic constraint satisfaction. - Xin Wang, Chenyang Yang:
Decentralized Estimation over Orthogonal Multiple-access Fading Channels in Wireless Sensor Networks - Optimal and Suboptimal Estimators. - Julien Bringer, Hervé Chabanne:
Negative Databases for Biometric Data. - Swan Dubois, Toshimitsu Masuzawa, Sébastien Tixeuil:
The Impact of Topology on Byzantine Containment in Stabilization. - Fernando G. Lobo, Marielba Zacarias, Paulo A. Condado, Teresa Romão, Rui Godinho, Manuel Moreno:
Evaluating Accessible Synchronous CMC Applications. - Richard P. Brent:
A Simple Approach to Error Reconciliation in Quantum Key Distribution. - Julien Cohen, Rémi Douence:
Views, Program Transformations, and the Evolutivity Problem. - Ayfer Özgür, Suhas N. Diggavi:
Approximately achieving Gaussian relay network capacity with lattice codes. - Marc Harper:
The Beauty Contest Game, a population-centric approach. - Richard P. Brent:
The myth of equidistribution for high-dimensional simulation. - Axel Legay, Benoît Delahaye:
Statistical Model Checking : An Overview. - Xi Liu, Elza Erkip:
Coordination and Bargaining over the Gaussian Interference Channel. - Jacek Gwizdka:
Distribution of Cognitive Load in Web Search. - Ali Al-Bashabsheh, Yongyi Mao, Abbas Yongaçoglu:
On Holant Theorem and Its Proof. - Sami Akin, Mustafa Cenk Gursoy:
Cognitive Radio Transmission under QoS Constraints and Interference Limitations. - ArunKumar Jayaprakasam, Vinod Sharma, Chandra R. Murthy, Prashant Narayanan:
Cooperative Sequential Spectrum Sensing Algorithms for OFDM. - Amit Weinstein:
Simultaneous communication in noisy channels. - Juan Dominguez-Montes:
Solution to the Counterfeit Coin Problem and its Generalization. - Leonardo Ermann, Alexei D. Chepelianskii, D. L. Shepelyansky:
Fractal Weyl law for Linux Kernel Architecture. - Youssef Elfoutayeni, Mohamed Khaladi:
Using vector divisions in solving linear complementarity problem. - Amir Finkelstein:
The Theory Behind The "Summed Area Tables" Algorithm: A Simple Approach To Calculus. - Daniel James Shepherd:
Quantum Complexity: restrictions on algorithms and architectures. - Jose Mathew Manimala:
RAmM Algorithm(Simplex). - Jean-Gabriel Kammerer, Reynald Lercier, Guénaël Renault:
Encoding points on hyperelliptic curves over finite fields in deterministic polynomial time. - Julien Cohen, Jean-Louis Giavitto, Olivier Michel:
Variable elimination for building interpreters. - Karin Schnass, Pierre Vandergheynst:
Classification via Incoherent Subspaces. - Jean-Vincent Loddo, Luca Saiu:
How to correctly prune tropical trees. - Shekhar S. Chandra:
Fast Digital Convolutions using Bit-Shifts. - Stefan Leijnen, Liane Gabora:
An Agent-based Simulation of the Effectiveness of Creative Leadership. - Liane Gabora:
Recognizability of Individual Creative Style Within and Across Domains: Preliminary Studies. - Sergey Bezzateev, Natalia A. Shekhunova:
Cumulative-Separable Codes. - Yufeng Li, Zhi-Hua Zhou:
S4VM: Safe Semi-Supervised Support Vector Machine. - Laszlo B. Kish, Sunil P. Khatri, Tamás Horváth:
Computation using Noise-based Logic: Efficient String Verification over a Slow Communication Channel. - Gianluigi Greco, Francesco Scarcello:
On The Power of Tree Projections: Structural Tractability of Enumerating CSP Solutions. - K. Raj Kumar, Giuseppe Caire:
Channel State Feedback over the MIMO-MAC. - Nihar B. Shah, K. V. Rashmi, P. Vijay Kumar, Kannan Ramchandran:
The MISER Code: An MDS Distributed Storage Code that Minimizes Repair Bandwidth for Systematic Nodes through Interference Alignment. - Hossein Bagheri, Abolfazl S. Motahari, Amir K. Khandani:
The Approximate Capacity Region of the Gaussian Z-Interference Channel with Conferencing Encoders. - John Scoville:
On Macroscopic Complexity and Perceptual Coding. - Ohad N. Feldheim, Rani Hod:
3/2 Firefighters are not enough. - Abdullah Gharaibeh, Samer Al-Kiswany, Matei Ripeanu:
CrystalGPU: Transparent and Efficient Utilization of GPU Power. - Meng Zeng, Rui Zhang, Shuguang Cui:
On Design of Distributed Beamforming for Two-Way Relay Networks. - Sang-Woon Jeon, Sae-Young Chung, Syed Ali Jafar:
Approximate Capacity of a Class of Multi-source Gaussian Relay Networks. - Christian Drescher, Martin Gebser, Benjamin Kaufmann, Torsten Schaub:
Heuristics in Conflict Resolution. - Stanislav Nonchev, Mikko Valkama:
Advanced Radio Resource Management for Multi Antenna Packet Radio Systems. - M. Rajesh Babu, S. Selvan:
A Lightweight and Attack Resistant Authenticated Routing Protocol for Mobile Adhoc Networks. - Kavi Kumar Khedo, Rajiv Perseedoss, Avinash Mungur:
A Wireless Sensor Network Air Pollution Monitoring System. - A. Sivagami, K. Pavai, D. Sridharan, S. A. V. Satya Murty:
Energy and Link Quality Based Routing for Data Gathering Tree in Wireless Sensor Networks Under TINYOS - 2.X. - Emmanouil A. Panaousis, Tipu Arvind Ramrekha, Grant P. Millar, Christos Politis:
Adaptive and Secure Routing Protocol for Emergency Mobile Ad Hoc Networks. - R. Manoharan, E. Ilavarasan:
Impact of Mobility on the Performance of Multicast Routing Protocols in MANET. - Dan J. Shepherd:
Binary Matroids and Quantum Probability Distributions. - Salman Abdul Moiz, Lakshmi Rajamani:
A Real Time Optimistic Strategy to achieve Concurrency Control in Mobile Environments Using On-demand Multicasting. - Abdelsalam B. Amer, Fayez Gebali:
General Model for Infrastructure Multi-channel Wireless LANs. - N. Ch. Sriman Narayana Iyengar, Syed Mohammad Ansar Sachin kumar, Piyush Nagar, Siddharth Sharma, Akshay Atrey:
An Efficient and Secure Routing Protocol for Mobile Ad-Hoc Networks. - Meriem Abid, Tara Ali-Yahiya, Guy Pujolle:
On the Minimization of Handover Decision Instability in Wireless Local Area Networks. - Kiarash Mizanian, Mehdi Vasef, Morteza Analoui:
Bandwidth Modeling and Estimation in Peer to Peer Networks. - Ubaid Abbasi, Toufik Ahmed:
Architecture for Cooperative Prefetching in P2P Video-on- Demand System. - Ayman Khalil, Matthieu Crussière, Jean-François Hélard:
Cross-Layer Resource Allocation Scheme Under Heterogeneous Constraints for Next Generation High Rate WPAN. - Soumen Kanrar, Mohammad Siraj:
Class Based Admission Control by Complete Partitioning -Video on Demand Server. - Amparo Fúster-Sabater, Pino Caballero-Gil:
On the Use of Cellular Automata in Symmetric Cryptography. - Yipeng Liu, Qun Wan:
Sidelobe Suppression for Robust Beamformer with The Improved Block-Sparse Constraint. - Nitiket N. Mhala, N. K. Choudhari:
An Envision of Low Cost Mobile Adhoc Network Test Bed in a Laboratory Environment Emulating an Actual MANET. - Yipeng Liu, Qun Wan, Xiaoli Chu:
Power-Efficient Ultra-Wideband Waveform Design Considering Radio Channel Effects. - Yipeng Liu, Qun Wan:
Sparse Support Recovery with Phase-Only Measurements. - Yipeng Liu, Qun Wan:
Robust Compressive Wideband Spectrum Sensing with Sampling Distortion. - Yipeng Liu, Qun Wan:
Compressive Wideband Spectrum Sensing for Fixed Frequency Spectrum Allocation. - Benjamin Steinberg:
The Cerny conjecture for one-cluster automata with prime length cycle. - Martin Mann, Alessandro Dal Palù:
Lattice model refinement of protein structures. - Mohsen Toorani, Ali Asghar Beheshti Shirazi:
An Elliptic Curve-based Signcryption Scheme with Forward Secrecy. - Marek Petrik, Gavin Taylor, Ronald Parr, Shlomo Zilberstein:
Feature Selection Using Regularization in Approximate Linear Programs for Markov Decision Processes. - Fernando Hernando, Michael E. O'Sullivan, Emanuel M. Popovici, Shraddha Srivastava:
Subfield-Subcodes of Generalized Toric codes. - Jo Stanley, Gerard Briscoe:
The ABC of Digital Business Ecosystems. - Abhinav Pandey, Akash Pandey, Ankit Tandon, Brajesh Kr Maurya, Upendra Kushwaha, Madhvendra Mishra, Vijayshree Tiwari:
Cloud Computing: Exploring the scope. - Alexey V. Chernov, Fedor Zhdanov:
Prediction with Expert Advice under Discounted Loss. - Bartosz Jankowski, Wojciech Mazurczyk, Krzysztof Szczypiorski:
Information Hiding Using Improper Frame Padding. - Michael L. Wick, Andrew McCallum, Gerome Miklau:
Scalable Probabilistic Databases with Factor Graphs and MCMC. - Sandipan Dey, Hameed Al-Qaheri, Suneeta Sane, Sugata Sanyal:
A Note On the Bounds for the Generalized Fibonacci-p-Sequence and its Application in Data-Hiding. - G. F. Ali Ahammed, Reshma Banu:
Analyzing the Performance of Active Queue Management Algorithms. - Ioannis Z. Emiris, André Galligo, Elias P. Tsigaridas:
Random polynomials and expected complexity of bisection methods for real solving. - Hamidreza Mahini, Reza Berangi, Alireza Mahini:
MLET: A Power Efficient Approach for TCAM Based, IP Lookup Engines in Internet Routers. - Sarbani Roy, Saikat Halder, Nandini Mukherjee:
A Multi-agent Framework for Performance Tuning in Distributed Environment. - Ajanta De Sarkar, Sarbani Roy, Sudipto Biswas, Nandini Mukherjee:
An Integrated Framework for Performance Analysis and Tuning in Grid Environment. - Hafedh Zayani, Kamel Barkaoui, Rahma Ben Ayed:
Probabilistic verification and evaluation of Backoff procedure of the WSN ECo-MAC protocol. - Nikola Zlatanov, Zoran Hadzi-Velkov, George K. Karagiannidis, Robert Schober:
Cooperative Diversity with Mobile Nodes: Outage Capacity Rates and Durations. - Serguei A. Mokhov, Mashrur Mia, Petr Solodov, Kai Zhao, Jihed Halimi:
A UI Design Case Study and a Prototype of a Travel Search Engine. - Zoltán Ésik, Andreas Maletti:
Simulations of Weighted Tree Automata. - Petr N. Vabishchevich:
On a new class of additive (splitting) operator-difference schemes. - Haoyang Wu:
Two examples to break through classical theorems on Nash implementation with two agents. - Ankan Saha, Ambuj Tewari:
On the Finite Time Convergence of Cyclic Coordinate Descent Methods. - Zhongmou Li, Hui Xiong, Yanchi Liu:
Detecting Blackholes and Volcanoes in Directed Networks. - Min Chih Lin, Francisco J. Soulignac, Jayme Luiz Szwarcfiter:
Arboricity, h-Index, and Dynamic Algorithms. - Adrian Dumitrescu, János Pach:
Opaque sets. - Félix de Moya-Anegón, Victor Herrero Solana:
Worldwide topology of the scientific subject profile: a macro approach on the country level. - Huan Xu, Shie Mannor:
Robustness and Generalization. - Tong Zhang:
Sparse Recovery with Orthogonal Matching Pursuit under RIP. - Onur Sahin, Osvaldo Simeone, Elza Erkip:
Interference Channel with a Half-Duplex Out-of-Band Relay. - (Withdrawn) On The Topology of a Boolean Function.
- Guan Gui, Wei Peng, Qun Wan, Fumiyuki Adachi:
A Fast Compressive Channel Estimation with Modified Smoothed L0 Algorithm. - Guan Gui, An-min Huang, Qun Wan:
Sparse Multipath Channel Estimation using DS Algorithm in Wideband Communication Systems. - Guan Gui, Qun Wan, Wei Peng, Fumiyuki Adachi:
Sparse Multipath Channel Estimation Using Compressive Sampling Matching Pursuit Algorithm. - Amparo Fúster-Sabater, L. Javier García-Villalba:
Likelihood that a pseudorandom sequence generator has optimal properties. - Amparo Fúster-Sabater, Pedro García-Mochales:
A Simple Computational Model for Acceptance/Rejection of Binary Sequence Generators. - Amparo Fúster-Sabater, Dolores de la Guía-Martínez:
Modelling Nonlinear Sequence Generators in terms of Linear Cellular Automata. - Greg Cohen:
A new algebraic technique for polynomial-time computing the number modulo 2 of Hamiltonian decompositions and similar partitions of a graph's edge set. - Nicolò Cesa-Bianchi, Shai Shalev-Shwartz, Ohad Shamir:
Online Learning of Noisy Data with Kernels. - Nicolò Maria Calcavecchia, Elisabetta Di Nitto:
Incorporating prediction models in the SelfLet framework: a plugin approach. - Vladimir Kolmogorov:
Generalized roof duality and bisubmodular functions. - Edwin A. Henneken, Michael J. Kurtz, Alberto Accomazzi, Carolyn Stern-Grant, Donna M. Thompson, Elizabeth Bohlen, Giovanni Di Milia, Jay Luker, Stephen S. Murray:
Finding Your Literature Match -- A Recommender System. - Richard P. Brent:
Some comments on C. S. Wallace's random number generators. - Patrick Mitran:
Typical Sequences for Polish Alphabets. - Stephen L. Bloom, YiDi Zhang:
A Note on Ordinal DFAs. - James Brotherston, Cristiano Calcagno:
Classical BI: Its Semantics and Proof Theory. - Volker Nannen:
A Short Introduction to Model Selection, Kolmogorov Complexity and Minimum Description Length (MDL). - Li Erran Li, Michael F. Nowlan, Y. R. Yang:
Mosaic: Policy Homomorphic Network Extension. - Jean-Louis Krivine:
Realizability algebras: a program to well order R. - Volker Nannen:
A Short Introduction to Kolmogorov Complexity. - Ozan Candogan, Ishai Menache, Asuman E. Ozdaglar, Pablo A. Parrilo:
Flows and Decompositions of Games: Harmonic and Potential Games. - Ernest Kurniawan, Sumei Sun, Kai Yen, Kai Fong Ernest Chong:
Network Coded Transmission of Fountain Codes over Cooperative Relay Networks. - Michael Drew Lamar:
Split digraphs. - Vadim R. Madgazin:
Dichotic harmony for the musical practice. - Nomica Imran, Imran Rao:
A Trustworthy and well-organized data disseminating scheme for ad-hoc wsns. - S. Sanyal, S. Iyengar, A. A. Roy, N. N. Karnik, N. M. Mengale, S. B. Menon, Wu Geng Feng:
Defuzzification Method for a Faster and More Accurate Control. - Jesús Martínez-Mateo, Susana Muñoz-Hernández, David Pérez-Rey:
A Discussion of Thin Client Technology for Computer Labs. - Quanquan Liang, Mingyan Liu:
Channel Estimation for Opportunistic Spectrum Access: Uniform and Random Sensing. - Alejandro Cornejo, Fabian Kuhn:
Deploying Wireless Networks with Beeps. - Kamran Karimi, Neil G. Dickson, Firas Hamze:
A Performance Comparison of CUDA and OpenCL. - Andri Mirzal, Masashi Furukawa:
Eigenvectors for clustering: Unipartite, bipartite, and directed graph cases. - Tugkan Batu, Petra Berenbrink, Colin Cooper:
Chains-into-Bins Processes. - Jin-yi Cai, Xi Chen, Richard J. Lipton, Pinyan Lu:
On Tractable Exponential Sums. - Stephen A. Cook, Pierre McKenzie, Dustin Wehr, Mark Braverman, Rahul Santhanam:
Pebbles and Branching Programs for Tree Evaluation. - Chen Feng, Danilo Silva, Frank R. Kschischang:
An Algebraic Approach to Physical-Layer Network Coding. - Saber Jafarizadeh:
Fastest Distributed Consensus Averaging Problem on Perfect and Complete n-ary Tree networks. - Carst Tankink, Herman Geuvers, James McKinna, Freek Wiedijk:
Proviola: A Tool for Proof Re-animation. - Andrei A. Bulatov, Martin E. Dyer, Leslie Ann Goldberg, Markus Jalsenius, Mark Jerrum, David Richerby:
The complexity of weighted and unweighted #CSP. - Si-Hyeon Lee, Sae-Young Chung:
Capacity of a Class of Multicast Tree Networks. - Georgios Tzimiropoulos, Stefanos Zafeiriou:
On the Subspace of Image Gradient Orientations. - Avner Magen, Anastasios Zouzias:
Low Rank Matrix-Valued Chernoff Bounds and Applications. - Wei Hou, Lin Zhang, Lei Yang, Heather Zheng, Xiuming Shan:
Cross-Band Interference Considered Harmful in OFDM Based Distributed Spectrum Sharing. - Eran Hof, Shlomo Shamai:
Secrecy-Achieving Polar-Coding for Binary-Input Memoryless Symmetric Wire-Tap Channels. - Eran Hof, Igal Sason, Shlomo Shamai:
Polar Coding for Reliable Communications over Parallel Channels. - Jan Vondrák:
A note on concentration of submodular functions. - Miguel Nicolau, Marc Schoenauer, Wolfgang Banzhaf:
Evolving Genes to Balance a Pole. - Éric Sopena:
Upper oriented chromatic number of undirected graphs and oriented colorings of product graphs. - Frédéric Didier, Thomas A. Henzinger, Maria Mateescu, Verena Wolf:
SABRE: A Tool for Stochastic Analysis of Biochemical Reaction Networks. - Tamaghna Acharya, Samiran Chattopadhyay, Rajarshi Roy:
Constructing Path Efficient and Energy Aware Virtual Multicast Backbones in Static Ad Hoc Wireless Networks. - Orest Shardt, John C. Bowman:
Surface Parametrization of Nonsimply Connected Planar Bézier Regions. - Andreas-Stephan Elsenhans, Axel Kohnert, Alfred Wassermann:
Construction of Codes for Network Coding. - Gregory Z. Gutin, Anders Yeo:
Note on Maximal Bisection above Tight Lower Bound. - Tirza Routtenberg, Joseph Tabrikian:
General Classes of Lower Bounds on the Probability of Error in Multiple Hypothesis Testing. - Nadjib Lazaar, Arnaud Gotlieb, Yahia Lebbah:
On Testing Constraint Programs. - Fabian Kuhn, Christoph Lenzen, Thomas Locher, Rotem Oshman:
Optimal Gradient Clock Synchronization in Dynamic Networks. - Ali Assaf, Alejandro Díaz-Caro, Simon Perdrix, Christine Tasson, Benoît Valiron:
Call-by-value, call-by-name and the vectorial behaviour of the algebraic λ-calculus. - Zoran Hadzi-Velkov, Boris Spasenovski:
Saturation Throughput - Delay Analysis of IEEE 802.11 DCF in Fading Channel. - Stefano Berardi, Ugo de'Liguoro:
Interactive Realizers and Monads. - S. Iyengar, N. Apte, A. A. Roy, S. Sanyal, Navin M. Singhi, Wu Geng Feng:
A Multiprocessor Communication Architecture For High Speed Networks. - Amina Chebira, Matthew Fickus, Dustin G. Mixon:
Filter Bank Fusion Frames. - Richard Altendorfer:
Observable dynamics and coordinate systems for vehicle tracking. - (Withdrawn) A Proof for P vs. NP Problem.
- Noah D. Stein, Pablo A. Parrilo, Asuman E. Ozdaglar:
A new proof of Nash's Theorem via exchangeable equilibria. - S. M. Nazrul Alam, Zygmunt J. Haas:
Hierarchical and Nonhierarchical Three-Dimensional Underwater Wireless Sensor Networks. - Zhiqiang Xu:
A remark about orthogonal matching pursuit algorithm. - Petros Drineas, Michael W. Mahoney:
Effective Resistances, Statistical Leverage, and Applications to Linear Equation Solving. - Pino Caballero-Gil, Jezabel Molina-Gil, Candelaria Hernández-Goya, Cándido Caballero-Gil:
Stimulating Cooperation in Self-Organized Vehicular Networks. - Katerina J. Argyraki, Petros Maniatis, Ankit Singla:
Verifiable Network-Performance Measurements. - Ruhollah Tavakoli:
Improvement Cache Efficiency of Explicit Finite Element Procedure and its Application to Parallel Casting Solidification Simulation. - Andreas Neu:
Virtual Texturing. - Sylvain Marlière, Daniela Urma, Jean-Loup Florens, Florence Marchi:
Multi-sensorial interaction with a nano-scale phenomenon : the force curve. - Nicolas Castagné, Claude Cadoz, Jean-Loup Florens, Annie Luciani:
Haptics in computer music : a paradigm shift. - Viktor Yakovlev, Valery I. Korzhik, Guillermo Morales-Luna, Mihail Bakaev:
Key Distribution Protocols Based on Extractors Under the Condition of Noisy Channels in the Presence of an Active Adversary. - Jean-Loup Florens, Alina Voda, Daniela Urma:
Dynamical issues in interactive representation of physical objects. - Annie Luciani:
From granular avalanches to fluid turbulences through oozing pastes. A mesoscopic physically-based particle model. - Pino Caballero-Gil, Cándido Caballero-Gil, Jezabel Molina-Gil, Candelaria Hernández-Goya:
Flexible Authentication in Vehicular Ad hoc Networks. - Savas Konur:
A Survey on Temporal Logics. - Savas Konur:
Real-time and Probabilistic Temporal Logics: An Overview. - Amparo Fúster-Sabater:
Cellular Automata in Stream Ciphers. - Derrick Wing Kwan Ng, Vincent Kin Nang Lau:
Power Control and Performance Analysis of Outage-Limited Cellular Network with MUD-SIC and Macro-Diversity. - David Pritchard:
An LP with Integrality Gap 1+epsilon for Multidimensional Knapsack. - Changho Suh, David Tse:
Feedback Capacity of the Gaussian Interference Channel to within 2 Bits. - Yipeng Liu, Qun Wan:
Digital Ultra-Wideband Beamformer Based on Minimum Variance Multi-Frequency Distortionless Restriction. - Swan Dubois, Toshimitsu Masuzawa, Sébastien Tixeuil:
Self-stabilization with Byzantine tolerance for global tasks. - Raphaël Cerf:
Critical control of a genetic algorithm. - Pino Caballero-Gil, Cándido Caballero-Gil, Jezabel Molina-Gil, Candelaria Hernández-Goya:
Self-Organized Authentication Architecture for Mobile Ad-hoc Networks. - Amittai Aviram, Shu-Chun Weng, Sen Hu, Bryan Ford:
Efficient System-Enforced Deterministic Parallelism. - Alka:
Efficient Algorithms and Data Structures for Massive Data Sets. - Prasad Chebolu, Mary Cryan, Russell A. Martin:
Exact counting of Euler Tours for generalized series-parallel graphs. - Jens Zumbrägel, Mark F. Flanagan, Vitaly Skachek:
Exploration of AWGNC and BSC Pseudocodeword Redundancy. - Lars Kotthoff, Ian P. Gent, Ian Miguel:
Using machine learning to make constraint solver implementation decisions. - Reza Khosravi-Farsani:
Two-Way Writing on Dirty Paper. - Varun Kanade, Leslie G. Valiant, Jennifer Wortman Vaughan:
Evolution with Drifting Targets. - Neri Merhav:
Threshold effects in parameter estimation as phase transitions in statistical mechanics. - Shai Shalev-Shwartz, Ohad Shamir, Karthik Sridharan:
Learning Kernel-Based Halfspaces with the Zero-One Loss. - Weiyu Xu, Babak Hassibi:
Compressive Sensing over the Grassmann Manifold: a Unified Geometric Framework. - Jordi Levy, Mateu Villaret:
Nominal Unification from a Higher-Order Perspective. - Guozhang Wang, Marcos Antonio Vaz Salles, Benjamin Sowell, Xun Wang, Tuan Cao, Alan J. Demers, Johannes Gehrke, Walker M. White:
Behavioral Simulations in MapReduce. - Fei Li:
A Better Memoryless Online Algorithm for FIFO Buffering Packets with Two Values. - Ruiming Yang, Qun Wan, Yipeng Liu, Wan-Lin Yang:
Improved OMP Approach to Sparse Multi-path Channel Estimation via Adaptive Inter-atom Interference Mitigation. - Shiro Ikeda, Kazunori Hayashi, Toshiyuki Tanaka:
Capacity and Modulations with Peak Power Constraint. - Nabil Hathout:
Morphonette: a morphological network of French. - Gilson O. dos Santos, Francisco M. de Assis, Aércio Ferreira de Lima:
A Scheme of Concatenated Quantum Code to Protect against both Computational Error and an Erasure. - Branko Malesevic, Ivana Jovovic, Milan Campara:
Groebner bases in Java with applications in computer graphics. - Mustapha Bahich, Mohamed Afifi, Elmostafa Barj:
Optical phase extraction algorithm based on the continuous wavelet and the Hilbert transforms. - Marisa R. De Giusti, Gonzalo L. Villarreal, Agustín Vosou, Juan P. Martínez:
An Ontology-based Context Aware System for Selective Dissemination of Information in a Digital Library. - E. Jenefa JebaJothi, V. Kavitha, T. Kavitha:
Contention Based Routing in Mobile Ad Hoc Networks with Multiple Copies. - Pariza Kamboj, A. K. Sharma:
Scalable Energy Efficient Location Aware Multicast Protocol for MANET (SEELAMP). - Sattar J. Aboud:
Criticism of Knapsack Encryption Scheme. - Sami Halawani, Abdul Waheed Khan:
Sensors Lifetime Enhancement Techniques in Wireless Sensor Networks - A Survey. - Gilbert Phuah Leong Siang, Nor Azman Ismail, Pang Yee Yong:
A Study on Potential of Integrating Multimodal Interaction into Musical Conducting Education. - A. N. Omara, Sherine M. Abd El-Kader, Hussein Sherif Eissa, Salwa H. El-Ramly:
A Prioritized Access Point Algorithm for 802.11b Networks in a Lossy Environment. - Bostan I:
Democracy, essential element of the electronic government. - M. Dinakaran, P. Balasubramanie:
A Route Optimization technique for registered and unregistered CN's in NEMO. - (Withdrawn) A grid environment consisting of heterogeneous compute resources for high performance computation.
- Salem Saleh Al-amri, Namdeo V. Kalyankar, Khamitkar S. D.:
Image Segmentation by Using Threshold Techniques. - P. V. G. D. Prasad Reddy, K. Rama Sudha, Rama Sree P., Ramesh S. N. S. V. S. C.:
Software Effort Estimation using Radial Basis and Generalized Regression Neural Networks. - Manas Ranjan Pradhan, E. G. Rajan:
Molecular Programming Pseudo-code Representation to Molecular Electronics. - Himani Bathla, Kanika Lakhani:
A Novel Method for Intrusion Detection System to Enhance Security in Ad hoc Network. - Siddharths Sankar Biswas:
A Soft Computing Model for Physicians' Decision Process. - Ali K. Hmood, Mussab alaa Zaidan, Hamdan O. Alanazi, Rami Alnaqeib, Yahya Al-Nabhani:
Dissertations Repository System Using Context Module. - Rami Alnaqeib, Hamdan O. Alanazi, Hamid Abdullah Jalab, Mussab alaa Zaidan, Ali K. Hmood:
Internet Banking System Prototype. - Hamdan O. Alanazi, Rami Alnaqeib, Ali K. Hmood, Mussab alaa Zaidan, Yahya Al-Nabhani:
On the Module of Internet Banking System. - Monika Sharma, Ashwani Mehra, Haresh Jola, Anand Kumar, Madhvendra Misra, Vijayshri Tiwari:
Scope of cloud computing for SMEs in India. - Surender Kumar Soni, Narottam Chand:
Energy Efficient Multi-Level Clustering To Prolong The Lifetime of Wireless Sensor Networks. - Sandhya Arora, Debotosh Bhattacharjee, Mita Nasipuri, Dipak Kumar Basu, Mahantapas Kundu:
Combining Multiple Feature Extraction Techniques for Handwritten Devnagari Character Recognition. - Alexandr Andoni, Robert Krauthgamer, Krzysztof Onak:
Polylogarithmic Approximation for Edit Distance and the Asymmetric Query Complexity. - Santanu Halder, Debotosh Bhattacharjee, Mita Nasipuri, Dipak Kumar Basu, Mahantapas Kundu:
Face Synthesis (FASY) System for Generation of a Face Image from Human Description. - Mrinal Kanti Bhowmik, Debotosh Bhattacharjee, Mita Nasipuri, Dipak Kumar Basu, Mahantapas Kundu:
Classification of Polar-Thermal Eigenfaces using Multilayer Perceptron for Human Face Recognition. - Debotosh Bhattacharjee, Dipak Kumar Basu, Mita Nasipuri, Mohantapash Kundu:
Reduction of Feature Vectors Using Rough Set Theory for Human Face Recognition. - Chunhua Shen, Peng Wang, Hanxi Li:
LACBoost and FisherBoost: Optimally Building Cascade Classifiers. - Gábor Erdélyi, Lena Piras, Jörg Rothe:
Bucklin Voting is Broadly Resistant to Control. - Sakrapee Paisitkriangkrai, Chunhua Shen, Jian Zhang:
Incremental Training of a Detector Using Online Sparse Eigen-decomposition. - (Withdrawn) On a new complete invariant of acyclic graphs.
- Shvetha Soundararajan, James D. Arthur:
A Structured Framework for Assessing the "Goodness" of Agile Methods. - Shay Solomon:
An Optimal-Time Construction of Euclidean Sparse Spanners with Tiny Diameter. - Andrew Lin:
The Complexity of Manipulating $k$-Approval Elections. - K. V. Rashmi, Nihar B. Shah, P. Vijay Kumar:
Optimal Exact-Regenerating Codes for Distributed Storage at the MSR and MBR Points via a Product-Matrix Construction. - Yipeng Liu, Qun Wan, Xiaoli Chu:
A Robust Beamformer Based on Weighted Sparse Constraint. - Y. Babykalpana, K. Thanushkodi:
Classification of LULC Change Detection using Remotely Sensed Data for Coimbatore City, Tamilnadu, India. - Xiaohui Bei, Zhiyi Huang:
Towards Optimal Bayesian Algorithmic Mechanism Design. - K. Chitra, G. Padmavathi:
Classification and Performance of AQM-Based Schemes for Congestion Avoidance. - S. B. Thorat, S. K. Nayak, Jyoti P. Dandale:
Facial Recognition Technology: An analysis with scope in India. - Najme Zehra, Mansi Sharma, Somya Ahuja, Shubha Bansal:
Bio-Authentication based Secure Transmission System using Steganography. - C. Srisailam, Mukesh Tiwari, Anurag Trivedi:
Reduction in iron losses in Indirect Vector-Controlled IM Drive using FLC. - Raju Barskar, Anjana Jayant Deen, Jyoti Bharti, Gulfishan Firdose Ahmed:
The Algorithm Analysis of E-Commerce Security Issues for Online Payment Transaction System in Banking Technology. - Uday Pratap Singh, Sanjeev Jain, Gulfishan Firdose Ahmed:
Content Base Image Retrieval Using Phong Shading. - R. Murali Prasad, P. Satish Kumar:
An Adaptive Power Efficient Packet Scheduling Algorithm for Wimax Networks. - V. Kavitha, M. Punithavalli:
Clustering Time Series Data Stream - A Literature Survey. - K. Delhi Babu, P. Govinda Rajulu, A. Ramamohana Reddy, A. N. Aruna Kumari:
Selection of Architecture Styles using Analytic Network Process for the Optimization of Software Architecture. - G. Arutchelvan, S. K. Srivatsa, R. Jagannathan:
Inaccuracy Minimization by Partioning Fuzzy Data Sets - Validation of Analystical Methodology. - C. S. Sridhar, R. ShashiKumar, S. Madhava Kumar, Manjula Sridhar, Varun D.:
E-Speed Governors For Public Transport Vehicles. - Mrigank Rajya, Sonal Rewri, Swati Sheoran:
Application Of Fuzzy System In Segmentation Of MRI Brain Tumor. - Sameer Singh, Michael L. Wick, Andrew McCallum:
Distantly Labeling Data for Large Scale Cross-Document Coreference. - Hadi Zayyani, Massoud Babaie-Zadeh, Christian Jutten:
Bayesian Cramér-Rao Bound for Noisy Non-Blind and Blind Compressed Sensing. - Stilian Stoev, George Michailidis, Joel Vaughan:
Global Modeling and Prediction of Computer Network Traffic. - Stilian Stoev, Murad S. Taqqu:
Max-stable sketches: estimation of Lp-norms, dominance norms and point queries for non-negative signals. - Larbi Kzaz, Hicham Elasri, Abderrahim Sekkaki:
A model for semantic integration of business components. - Zachary Snow, David Baelde, Gopalan Nadathur:
A Meta-Programming Approach to Realizing Dependently Typed Logic Programming. - Fei Li:
Scheduling Packets with Values and Deadlines in Size-bounded Buffers. - Joseph B. Collins:
An OpenMath Content Dictionary for Tensor Concepts. - Laure Heïgéas, Annie Luciani, Joëlle Thollot, Nicolas Castagné:
A physically-based particle model of emergent crowd behaviors. - Jack Coldridge, Martyn Amos:
Genetic algorithms and the art of Zen. - Alexander V. Lyaletski, Konstantin Verchinine:
Evidence Algorithm and System for Automated Deduction: A Retrospective View. - Phong S. Nguyen, Henry D. Pfister, Krishna R. Narayanan:
On Multiple Decoding Attempts for Reed-Solomon Codes. - Yong Cheng, Vincent K. N. Lau:
Distributive Power Control Algorithm for Multicarrier Interference Network over Time-Varying Fading Channels - Tracking Performance Analysis and Optimization. - Dewan Md. Farid, Nouria Harbi, Mohammad Zahidur Rahman:
Combining Naive Bayes and Decision Tree for Adaptive Intrusion Detection. - Eslam Gamal Ahmed, Eman Shaaban, Mohamed Hashem:
Lightweight Mutual Authentication Protocol for Low Cost RFID Tags. - S. Sangeetha, V. Vaidehi:
Fuzzy Aided Application Layer Semantic Intrusion Detection System - FASIDS. - Mohamed Elboukhari, Mostafa Azizi, Abdelmalek Azizi:
Analysis of the Security of BB84 by Model Checking. - Ulrich Herberg, Thomas H. Clausen:
Security Issues in the Optimized Link State Routing Protocol Version 2 (OLSRV2). - Alwen Tiu, Rajeev Goré, Jeremy E. Dawson:
A Proof Theoretic Analysis of Intruder Theories. - Yacine Boufkhad, Thomas Hugel:
Estimating Satisfiability. - Hicham Elasri, Larbi Kzaz, Abderrahim Sekkaki:
Towards an architecture for semantic integration of business components. - Haris Aziz, Felix Brandt, Hans Georg Seedig:
Optimal Partitions in Additively Separable Hedonic Games. - Josef Urban, Jesse Alama, Piotr Rudnicki, Herman Geuvers:
A Wiki for Mizar: Motivation, Considerations, and Initial Prototype. - Claire Guilbaud, Annie Luciani, Nicolas Castagné:
Physically-based particle simulation and visualization of pastes and gels. - Annie Luciani, Matthieu Evrard, Damien Couroussé, Nicolas Castagné, Claude Cadoz, Jean-Loup Florens:
A basic gesture and motion format for virtual reality multisensory applications. - R. Sivaraman, R. M. Chandrasekaran:
Effective Query Retrieval System In Mobile Business Environment. - S. John Peter, S. P. Victor:
A Novel Algorithm for Informative Meta Similarity Clusters Using Minimum Spanning Tree. - Josef Urban, Geoff Sutcliffe:
Automated Reasoning and Presentation Support for Formalizing Mathematics in Mizar. - Lunjin Lu:
Parametrizing Program Analysis by Lifting to Cardinal Power Domains. - Meng He, J. Ian Munro:
Succinct Representations of Dynamic Strings. - Norman J. Goldstein:
Nonsingular Efficient Modeling of Rotations in 3-space using three components. - Tanu Malik, Raghvendra Prasad, Sanket Patil, Amitabh Chaudhary, Venkat Venkatasubramanian:
Providing Scalable Data Services in Ubiquitous Networks. - Jeroen Bransen:
The Lambek-Grishin calculus is NP-complete. - Sushovan De, Subbarao Kambhampati:
Defining and Mining Functional Dependencies in Probabilistic Databases. - Djoerd Hiemstra, Vojkan Mihajlovic:
A database approach to information retrieval: The remarkable relationship between language models and region models. - Bastiaan Heeren, Johan Jeuring:
Adapting Mathematical Domain Reasoners. - Athina Markopoulou, Christina Fragouli, Minas Gjoka:
A Network Coding Approach to Loss Tomography. - Sumanth Sudeendra, Megha Saini, Shrisha Rao:
Fairness in Combinatorial Auctions. - Alexander Victor Berka:
Introduction to the Report "Interlanguages and Synchronic Models of Computation.". - Alexander Artikis:
A Formal Specification of Dynamic Protocols for Open Agent Systems. - Maurice Margenstern:
A new weakly universal cellular automaton in the 3D hyperbolic space with two states. - Enrico Paolini, Mark F. Flanagan, Marco Chiani, Marc P. C. Fossorier:
Spectral Shape of Check-Hybrid GLDPC Codes. - David Monniaux:
Automatic Modular Abstractions for Template Numerical Constraints. - Yuval Kochman, Ram Zamir:
Analog Matching of Colored Sources to Colored Channels. - Dominik Scheder:
Using a Skewed Hamming Distance to Speed Up Deterministic Local Search. - Felix Brandt:
Group-Strategyproof Irresolute Social Choice Functions. - Rumi Ghosh, Kristina Lerman:
Predicting Influential Users in Online Social Networks. - Sébastien Aubert, Manar Mohaisen, Fabienne Nouvel, KyungHi Chang:
Parallel QR decomposition in LTE-A systems. - Henk F. Moed:
The Source-Normalized Impact per Paper (SNIP) is a valid and sophisticated indicator of journal citation impact. - (Withdrawn) The diversity-multiplexing tradeoff of the symmetric MIMO half-duplex relay channel.
- Anon Plangprasopchok, Kristina Lerman, Lise Getoor:
Integrating Structured Metadata with Relational Affinity Propagation. - Mutsuo Saito:
A Variant of Mersenne Twister Suitable for Graphic Processors. - Rogério Atem de Carvalho, Rodrigo Soares Manhães, Fernando Luis de Carvalho e Silva:
Filling the Gap between Business Process Modeling and Behavior Driven Development. - Eleftheria Athanasopoulou, Loc Bui, Tianxiong Ji, R. Srikant, Alexander L. Stolyar:
Backpressure-based Packet-by-Packet Adaptive Routing in Communication Networks. - Shengqian Han, Chenyang Yang, Mats Bengtsson:
Channel Norm-Based User Scheduling Exploiting Channel Asymmetry in Base Station Cooperative Transmission Systems. - Evgeny Chutchev:
A Formalization of the Turing Test. - Jason Crampton:
Practical Constructions for the Efficient Cryptographic Enforcement of Interval-Based Access Control Policies. - Sitabhra Sinha, Md Izhar Ashraf, Raj Kumar Pan, Bryan Kenneth Wells:
Network analysis of a corpus of undeciphered Indus civilization inscriptions indicates syntactic organization. - Shailesh Vaya:
(Unconditional) Secure Multiparty Computation with Man-in-the-middle Attacks. - Rajesh P. Singh, Anupam Saikia, B. K. Sarma:
Little Dragon Two: An efficient Multivariate Public Key Cryptosystem. - Mark Edgington, Yohannes Kassahun, Frank Kirchner:
Dynamic Motion Modelling for Legged Robots. - Mario Bravetti:
File Managing and Program Execution in Web Operating Systems. - Hongsun An, Manar Mohaisen, DongKeol Han, KyungHi Chang:
Coordinated transmit and receive processing with adaptive multi-stream selection. - Shvetha Soundararajan, James D. Arthur, Amine Chigani:
Understanding the Tenets of Agile Software Engineering: Lecturing, Exploration and Critical Thinking. - Yara Abdallah, Mohamed Abdel Latif, Moustafa Youssef, Ahmed K. Sultan, Hesham El Gamal:
Keys through ARQ: Theory and Practice. - Manar Mohaisen, KyungHi Chang:
Upper-lower bounded-complexity QRD-M for spatial multiplexing MIMO-OFDM systems. - Anon Plangprasopchok, Kristina Lerman, Lise Getoor:
Growing a Tree in the Forest: Constructing Folksonomies by Integrating Structured Metadata. - Mathieu Nguyen-H, Chi Zhou:
Improving GPS/INS Integration through Neural Networks. - Gérard Chalhoub, François Delobel, Michel Misson:
Time Segmentation Approach Allowing QoS and Energy Saving for Wireless Sensor Networks. - Manfred Kerber:
Proofs, proofs, proofs, and proofs. - Iwan Adhicandra:
Using AMC and HARQ to Optimize System Capacity and Application Delays in WiMAX Networks. - Ahmed Elmorshidy:
Radio Frequency Identifiers: What are the Possibilities? - Pramod K. Suri, Kavita Taneja:
Exploring Selfish Trends of Malicious Mobile Devices in MANET. - Wahidin Wahab Hugeng, Dadang Gunawan:
Improved Method for Individualization of Head-Related Transfer Functions on Horizontal Plane Using Reduced Number of Anthropometric Measurements. - Pierre-François Marteau, Sylvie Gibet:
Constructing Positive Elastic Kernels with Application to Time Series Classification. - Pedro Sánchez Terraf:
Unprovability of the Logical Characterization of Bisimulation. - P. Bouboulis:
Wirtinger's Calculus in general Hilbert Spaces. - Saeed Moghaddam, Ahmed Helmy, Sanjay Ranka, Manas Somaiya:
Data-driven Co-clustering Model of Internet Usage in Large Mobile Societies. - Daniel Burfoot:
Compression Rate Method for Empirical Science and Application to Computer Vision. - Alexander Victor Berka:
Interlanguages and synchronic models of computation. - Aleksandrs Slivkins, Filip Radlinski, Sreenivas Gollapudi:
Learning optimally diverse rankings over large document collections. - Swan Dubois, Toshimitsu Masuzawa, Sébastien Tixeuil:
On Byzantine Containment Properties of the $min+1$ Protocol. - Michael Kohlhase, Florian Rabe, Vyacheslav Zholudev:
Towards MKM in the Large: Modular Representation and Scalable Software Architecture. - Jalil Boukhobza, Claude Timsit:
Simulation de traces réelles d'E/S disque de PC. - Sergio Guadarrama, David P. Pancho:
Using Soft Constraints To Learn Semantic Models Of Descriptions Of Shapes. - Toby Walsh:
An Empirical Study of the Manipulability of Single Transferable Voting. - George Katsirelos, Toby Walsh:
Symmetries of Symmetry Breaking Constraints. - Luis Álvarez Sabucedo, Luis E. Anido-Rifón:
A Restful Approach for Managing Citizen profiles Using A Semantic Support. - Tomonari Sei, Nobuki Takayama, Akimichi Takemura, Hiromasa Nakayama, Kenta Nishiyama, Masayuki Noro, Katsuyoshi Ohara:
Holonomic Gradient Descent and its Application to Fisher-Bingham Integral. - Peter A. Jonsson, Johan Nordlander:
Positive Supercompilation for a Higher-Order Call-By-Value Language. - Marten F. Byl, James T. Demers, Edward A. Rietman:
Using a Kernel Adatron for Object Classification with RCS Data. - Akash Kumar Gupta, Sanjeet Kumar:
VHDL Implementation of different Turbo Encoder using Log-MAP Decoder. - Wai-Leong Yeow, Cédric Westphal, Ulas C. Kozat:
Designing and Embedding Reliable Virtual Infrastructures. - Plamen P. Fiziev, Denitsa R. Staicova:
Two-dimensional generalization of the Muller root-finding algorithm and its applications. - Manuel Sorge:
Algorithmic Aspects of Golomb Ruler Construction. - Jiangyuan Li, Athina P. Petropulu, H. Vincent Poor:
On Cooperative Beamforming Based on Second-Order Statistics of Channel State Information. - Irina Kostitsyna, Valentin Polishchuk:
Simple Wriggling is Hard unless You Are a Fat Hippo. - Spits Warnars H. L. H:
Attribute oriented induction with star schema. - Nouha Arfaoui, Jalel Akaichi:
A Data Warehouse Assistant Design System Based on Clover Model. - Bettahally N. Keshavamurthy, Mitesh Sharma, Durga Toshniwal:
Efficient Support Coupled Frequent Pattern Mining Over Progressive Databases. - Y. Jayanta Singh, Yumnam Somananda Singh, Ashok Gaikwad, Suresh C. Mehrotra:
Dynamic management of transactions in distributed real-time processing system. - M. Dakshayini, T. R. Gopala Krishnan Nair:
Client-to-Client Streaming Scheme for VOD Applications. - Ch. Srinivasa Rao, Samayamantula Srinivas Kumar, B. Chandra Mohan:
Content Based Image Retrieval Using Exact Legendre Moments and Support Vector Machine. - Raddad Al King, Abdelkader Hameurlain, Franck Morvan:
Query Routing and Processing in Peer-To-Peer Data Sharing Systems. - Amer A. Al-Rahayfeh, Abdelshakour A. Abuzneid:
Detection of Bleeding in Wireless Capsule Endoscopy Images Using Range Ratio Color. - Surender Kumar, R. K. Chauhan, Parveen Kumar:
A Low Overhead Minimum Process Global Snapshop Collection Algorithm for Mobile Distributed System. - Loet Leydesdorff:
Eugene Garfield and Algorithmic Historiography: Co-Words, Co-Authors, and Journal Names. - Shailesh Kumar, Shrisha Rao:
Failover in cellular automata. - Fedor V. Fomin, Daniel Lokshtanov, Venkatesh Raman, Saket Saurabh:
Bidimensionality and EPTAS. - Andri Mirzal, Masashi Furukawa:
On the clustering aspect of nonnegative matrix factorization. - Solomiya Buk:
Quantitative parametrization of texts written by Ivan Franko: An attempt of the project. - Milan Bradonjic, Aric A. Hagberg, Nicolas W. Hengartner, Allon G. Percus:
Component Evolution in General Random Intersection Graphs. - Constantin Jucovschi, Michael Kohlhase:
sTeXIDE: An Integrated Development Environment for sTeX Collections. - Richard A. Formato:
On the Utility of Directional Information for Repositioning Errant Probes in Central Force Optimization. - Samaresh Chatterji, Ratnik Gandhi:
An Algebraic Approach for Computing Equilibria of a Subclass of Finite Normal Form Games. - Nir Ailon, Edo Liberty:
Almost Optimal Unrestricted Fast Johnson-Lindenstrauss Transform. - Yannis Delveroudis, Paraskevas V. Lekeas:
Managing Semantic Loss during Query Reformulation in Peer Data Management Systems. - David J. Brenes, Daniel Gayo-Avello, Rodrigo Garcia:
On the Fly Query Entity Decomposition Using Snippets. - Daniel Karapetyan, Gregory Z. Gutin:
Local Search Algorithms for the Generalized Traveling Salesman Problem. - Susan B. Davidson, Sanjeev Khanna, Debmalya Panigrahi, Sudeepa Roy:
Preserving Module Privacy in Workflow Provenance. - Oleksandr Korchenko, Yevhen Vasiliu, Sergiy Gnatyuk:
Modern Quantum Technologies of Information Security. - Ridwan Al Iqbal:
Empirical learning aided by weak domain knowledge in the form of feature importance. - Chengwen Xing, Shaodan Ma, Yik-Chung Wu, Tung-Sang Ng:
Robust Beamforming for Amplify-and-Forward MIMO Relay Systems Based on Quadratic Matrix Programming. - Chengwen Xing, Shaodan Ma, Yik-Chung Wu, Tung-Sang Ng:
Transceiver Design at Relay and Destination for Dual-Hop Non-regenerative MIMO-OFDM Relay Systems Under Channel Uncertainties. - Wei Wang, Zhi-Hua Zhou:
Multi-View Active Learning in the Non-Realizable Case. - Allan Sly:
Computational Transition at the Uniqueness Threshold. - Min-Zheng Shieh, Shi-Chun Tsai:
On the minimum weight problem of permutation codes under Chebyshev distance. - Matthieu Constant, Elsa Tolone:
A generic tool to generate a lexicon for NLP from Lexicon-Grammar tables. - Daniil Ryabko:
Sequence prediction in realizable and non-realizable cases. - D. Kesavaraja, R. Balasubramanian, D. Sasireka:
Implementation of a Cloud Data Server (CDS) for Providing Secure Service in E-Business. - Olivier Finkel:
On Infinitary Rational Relations and Borel Sets. - Ioannis Z. Emiris, Bernard Mourrain, Elias P. Tsigaridas:
The DMM bound: multivariate (aggregate) separation bounds. - Murtaza Ali Khan:
An Automated Algorithm for Approximation of Temporal Video Data Using Linear B'EZIER Fitting. - Yoann Pigné, Arnaud Casteigts, Frédéric Guinand, Serge Chaumette:
Construction et maintien d'une forêt couvrante dans un réseau dynamique. - Everardo Bárcenas, Pierre Genevès, Nabil Layaïda, Alan Schmitt:
A Tree Logic with Graded Paths and Nominals. - Ingo Scholtes:
Distributed Creation and Adaptation of Random Scale-Free Overlay Networks. - Anne Auger, Nikolaus Hansen, Jorge M. Perez Zerpa, Raymond Ros, Marc Schoenauer:
Experimental Comparisons of Derivative Free Optimization Algorithms. - Olivier Finkel:
On Omega Context Free Languages which are Borel Sets of Infinite Rank. - Olivier Finkel:
An Effective Extension of the Wagner Hierarchy to Blind Counter Automata. - Jörg Endrullis, Dimitri Hendriks:
Transforming Outermost into Context-Sensitive Rewriting. - Jan A. Bergstra, Inge Bethke:
On the contribution of backward jumps to instruction sequence expressiveness. - Yuval Shavitt, Noa Zilberman:
A Study of Geolocation Databases. - Curtis Menton:
Normalized Range Voting Broadly Resists Control. - Petr N. Vabishchevich:
SM stability for time-dependent problems. - Foto N. Afrati, Victor Kyritsis, Paraskevas V. Lekeas, Dora Souliou:
A New Framework for Join Product Skew. - Ralf Koetter, Jun Ma, Alexander Vardy:
The Re-Encoding Transformation in Algebraic List-Decoding of Reed-Solomon Codes. - Manas A. Pathak, Bhiksha Raj:
Large Margin Multiclass Gaussian Classification with Differential Privacy. - Yair Censor, Ran Davidi, Gabor T. Herman:
Perturbation Resilience and Superiorization of Iterative Algorithms. - Sang Hoon Lee, Meesoon Ha, Chanil Jeon, Hawoong Jeong:
Finite-Size Scaling in Random $K$-Satisfiability Problems. - Adam Gauci, Kristian Zarb Adami, John Abela, Alessio Magro:
Machine Learning for Galaxy Morphology Classification. - Marius Kloft, Ulrich Rückert, Peter L. Bartlett:
A Unifying View of Multiple Kernel Learning. - Shasha Li, Xueliang Li:
Hardness results on generalized connectivity. - Adam W. Bojanczyk, Richard P. Brent, Frank R. de Hoog:
A weakly stable algorithm for general Toeplitz systems. - Roy Kasher, Julia Kempe:
Two-Source Extractors Secure Against Quantum Adversaries. - Sourav Chakraborty, Eldar Fischer, Arie Matsliah, Ronald de Wolf:
New Results on Quantum Property Testing. - Kostadin Koroutchev, Elka Korutcheva:
Detecting the Most Unusual Part of Two and Three-dimensional Digital Images. - Marat V. Burnashev, Aslan Tchamkerten:
Tracking a Threshold Crossing Time of a Gaussian Random Walk Through Correlated Observations. - Douglas R. Sweet, Richard P. Brent:
Error analysis of a partial pivoting method for structured matrices. - Richard P. Brent:
Stability of fast algorithms for structured linear systems. - Thomas A. Henzinger, Maria Mateescu, Linar Mikeev, Verena Wolf:
Hybrid Numerical Solution of the Chemical Master Equation. - Richard P. Brent:
Note on Computing Ratings from Eigenvectors. - Xiaoran Yan, Yaojia Zhu, Jean-Baptiste Rouquier, Cristopher Moore:
Active Learning for Hidden Attributes in Networks. - Joachim von zur Gathen, Mark Giesbrecht, Konstantin Ziegler:
Composition collisions and projective polynomials. - Alistair Sinclair, Alexandre Stauffer:
Mobile Geometric Graphs, and Detection and Communication Problems in Mobile Wireless Networks. - Maarten Van den Nest:
Matchgate computations and linear threshold gates. - Grigori L. Litvinov, Victor P. Maslov, A. Ya. Rodionov, Andrei N. Sobolevski:
Universal algorithms, mathematics of semirings and parallel computations. - Jacob Fox, Mikhail Gromov, Vincent Lafforgue, Assaf Naor, János Pach:
Overlap properties of geometric expanders. - Colin Cooper, Alan M. Frieze:
Component structure induced by a random walk on a random graph. - Blaise Faugeras, Amel Ben Abda, Jacques Blum, Cédric Boulbe:
Minimization of a constitutive law error functional to solve a Cauchy problem arising in plasma physics: the reconstruction of the magnetic flux in the vacuum surrounding the plasma in a Tokamak. - Nikolay Dimitrov:
On Some Results Related to Napoleon's Configurations. - Brian Karrer, M. E. J. Newman:
Random graphs containing arbitrary distributions of subgraphs. - Carmeliza Navasca, Michael Opperman, Timothy Penderghest, Christino Tamon:
Tensors as module homomorphisms over group rings. - B. Ashok, T. K. Patra:
Locating phase transitions in computationally hard problems. - Boris G. Pittel, Ji-A. Yeum:
How frequently is a system of 2-linear Boolean equations solvable? - Richard P. Brent, Paul Zimmermann:
The great trinomial hunt. - Jin-Li Guo:
S-curve networks and a new method for estimating degree distributions of complex networks. - Evrim Acar, Tamara G. Kolda, Daniel M. Dunlavy, Morten Mørup:
Scalable Tensor Factorizations for Incomplete Data. - Don McLeish:
A general method for debiasing a Monte Carlo estimator. - Christos Dimitrakakis:
Context models on sequences of covers. - Jeff Jones, Andrew Adamatzky:
Towards Physarum Binary Adders. - Julien Cassaigne, Gwénaël Richomme, Kalle Saari, Luca Q. Zamboni:
Avoiding Abelian powers in binary words with bounded Abelian complexity. - Chi Ho Yeung, G. Cimini, C.-H. Jin:
Understanding Recommender Dynamics driving Box Office Revenues. - Emmanuel J. Candès, Yonina C. Eldar, Deanna Needell:
Compressed Sensing with Coherent and Redundant Dictionaries. - Aubrey da Cunha:
Turing Machines on Graphs and Inescapable Groups. - Fionn Murtagh, Pedro Contreras:
Hierarchical Clustering for Finding Symmetries and Other Patterns in Massive, High Dimensional Datasets. - Ewa Deelman, G. Bruce Berriman, Ann L. Chervenak, Óscar Corcho, Paul Groth, Luc Moreau:
Metadata and provenance management. - Saeed Salehi:
Herbrand Consistency of Some Arithmetical Theories. - Jacob Ratkiewicz, Filippo Menczer, Santo Fortunato, Alessandro Flammini, Alessandro Vespignani:
Characterizing and modeling the dynamics of online popularity. - James P. Crutchfield, Sean Whalen:
Structural Drift: The Population Dynamics of Sequential Learning. - Gideon Juve, Ewa Deelman, Karan Vahi, Gaurang Mehta, G. Bruce Berriman, Benjamin P. Berman, Philip Maechling:
Scientific Workflow Applications on Amazon EC2. - Choon Yik Tang, Jie Lu:
Controlled Hopwise Averaging: Bandwidth/Energy-Efficient Asynchronous Distributed Averaging for Wireless Networks. - Sergey Knysh, Vadim N. Smelyanskiy:
On the relevance of avoided crossings away from quantum critical point to the complexity of quantum adiabatic algorithm. - Chuang Liu, Wei-Xing Zhou:
An improved HeatS+ProbS hybrid recommendation algorithm based on heterogeneous initial resource configurations. - (Withdrawn) NZMATH 1.0.
- Daniel Andres, Michael Brickenstein, Viktor Levandovskyy, Jorge Martín-Morales, Hans Schönemann:
Constructive $D$-module Theory with \textsc{Singular}. - G. Bruce Berriman, Ewa Deelman:
The Role of Provenance Management in Accelerating the Rate of Astronomical Research. - Hamed O. Ghaffari:
Small World Property of a Rock Joint. - D. Hunt, György Korniss, Boleslaw K. Szymanski:
Network Synchronization in a Noisy Environment with Time Delays: Fundamental Limits and Trade-Offs. - Xi Chen, Seyoung Kim, Qihang Lin, Jaime G. Carbonell, Eric P. Xing:
Graph-Structured Multi-task Regression and an Efficient Optimization Method for General Fused Lasso. - Shakhar Smorodinsky:
Conflict-Free Coloring and its Applications. - Amparo Fúster-Sabater:
A Joint Criterion for Reachability and Observability of Nonuniformly Sampled Discrete Systems. - Belkacem Serrour, Alex Arenas, Sergio Gómez:
Detecting communities of triangles in complex networks using spectral optimization. - Mark M. Wilde, Min-Hsiu Hsieh:
Public and private resource trade-offs for a quantum channel. - Benjamin Depardon, Eddy Caron, Frédéric Desprez, Jérémy Blaizot, Hélène Courtois:
Cosmological Simulations on a Grid of Computers. - Richard McKinley:
Proof nets for Herbrand's Theorem. - Daniel M. Dunlavy, Tamara G. Kolda, Evrim Acar:
Temporal Link Prediction using Matrix and Tensor Factorizations. - Helmut G. Katzgraber:
Random Numbers in Scientific Computing: An Introduction. - Yakov M. Karandashev, Boris Kryzhanovsky, Leonid B. Litinskii:
Local Minima of a Quadratic Binary Functional with Quasi-Hebbian Connection Matrix. - Andrea Lancichinetti, Mikko Kivelä, Jari Saramäki, Santo Fortunato:
Characterizing the community structure of complex networks. - Joseph C. Jacob, Daniel S. Katz, G. Bruce Berriman, John Good, Anastasia C. Laity, Ewa Deelman, Carl Kesselman, Gurmeet Singh, Mei-Hui Su, Thomas A. Prince, Roy Williams:
Montage: a grid portal and software toolkit for science-grade astronomical image mosaicking. - Paul Groth, Ewa Deelman, Gideon Juve, Gaurang Mehta, G. Bruce Berriman:
Pipeline-Centric Provenance Model. - Enrique Martínez, Paul R. Monasterio, Jaime Marian:
Billion-atom Synchronous Parallel Kinetic Monte Carlo Simulations of Critical 3D Ising Systems. - Xi Chen, Qihang Lin, Seyoung Kim, Javier Peña, Jaime G. Carbonell, Eric P. Xing:
An Efficient Proximal-Gradient Method for Single and Multi-task Regression with Structured Sparsity. - Nam H. Nguyen, Petros Drineas, Trac D. Tran:
Tensor sparsification via a bound on the spectral norm of random tensors. - Reza Rezaeian Farashahi, Igor E. Shparlinski:
Pseudorandom Bits From Points on Elliptic Curves. - David J. Aldous:
When Knowing Early Matters: Gossip, Percolation and Nash Equilibria. - Cristopher Moore, Alexander Russell:
How close can we come to a parity function when there isn't one? - Michael Schreiber:
Twenty Hirsch index variants and other indicators giving more or less preference to highly cited papers. - Ming Lei, Pierre Del Moral, Christophe Baehr:
Error Analysis of Approximated PCRLBs for Nonlinear Dynamics. - Evghenii Gaburov, Jeroen Bédorf, Simon Portegies Zwart:
Gravitational tree-code on graphics processing units: implementation in CUDA. - Panagiotis Cheilaris, Shakhar Smorodinsky:
Choosability in geometric hypergraphs. - Ana Romero, Francis Sergeraert:
Discrete Vector Fields and Fundamental Algebraic Topology. - Yves Aubry, Jean-Christophe Godin, Olivier Togni:
Choosability of a weighted path and free-choosability of a cycle. - Colette Johnen, Ivan Lavallée, Christian Lavault:
Reliable Self-Stabilizing Communication for Quasi Rendezvous. - Alexander Jung, Zvika Ben-Haim, Franz Hlawatsch, Yonina C. Eldar:
Unbiased Estimation of a Sparse Vector in White Gaussian Noise. - David R. Wood, Svante Linusson:
Thomassen's Choosability Argument Revisited. - Nestor Caticha, Renato Vicente:
Agent-based Social Psychology: from Neurocognitive Processes to Social Data. - Sergiy Zhuk:
Minimax state estimation for linear continuous differential-algebraic equations. - Samuel Fiorini, Gwenaël Joret, Dirk Oliver Theis, David R. Wood:
Small Minors in Dense Graphs. - Paolo Frasca, Fabio Fagnani:
Broadcast gossip averaging algorithms: interference and asymptotical error in large networks. - Nathanael L. Ackerman, Cameron E. Freer, Daniel M. Roy:
On the computability of conditional probability. - Franklin L. Marquezino, Renato Portugal, F. D. Sasse:
Obtaining the Quantum Fourier Transform from the Classical FFT with QR Decomposition.
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.