


default search action
CoRR, December 2011
- David F. Gleich, C. Seshadhri:

Neighborhoods are good communities. - Gérald Kembellec, Imad Saleh, Catherine Sauvaget:

A model of Cross Language Retrieval for IT domain papers through a map of ACM Computing Classification System. - Michael Huber:

Information Theoretic Authentication and Secrecy Codes in the Splitting Model. - (Withdrawn) Query Optimization Using Genetic Algorithms in the Vector Space Model.

- (Withdrawn) Improving the User Query for the Boolean Model Using Genetic Algorithms.

- Nirmal Fernando, Yi Hong, Emanuele Viterbo:

Flip-OFDM for Unipolar Communication Systems. - Sancho McCann, David G. Lowe:

Local Naive Bayes Nearest Neighbor for Image Classification. - Sormeh Shadbakht, Babak Hassibi:

On the Entropy Region of Gaussian Random Variables. - Baocheng Wang, Chunming Tang, Yanfeng Qi, Yixian Yang, Maozhi Xu:

A new class of hyper-bent Boolean functions in binomial forms. - Zai Yang, Cishen Zhang, Lihua Xie:

Robustly Stable Signal Recovery in Compressed Sensing with Structured Matrix Perturbation. - Alexandre Mouradian, Isabelle Augé-Blum:

1-D Coordinate Based on Local Information for MAC and Routing Issues in WSNs. - Keqin Liu, Qing Zhao:

Dynamic Intrusion Detection in Resource-Constrained Cyber Networks. - Sarah Behrens, Cyril Nicaud, Pierre Nicodème:

An automaton approach for waiting times in DNA evolution. - Jayakrishnan Unnikrishnan, Martin Vetterli:

Sampling High-Dimensional Bandlimited Fields on Low-Dimensional Manifolds. - Achraf Othman, Mohamed Jemni:

Statistical Sign Language Machine Translation: from English written text to American Sign Language Gloss. - Christian Konrad, Frédéric Magniez, Claire Mathieu:

Maximum Matching in Semi-Streaming with Few Passes. - Chengwen Xing, Minghua Xia, Shaodan Ma, Yik-Chung Wu:

Cooperative Beamforming for Dual-Hop Amplify-and-Forward Multi-Antenna Relaying Cellular Networks. - Gerard Briscoe, Suzanne Sadedin, Philippe De Wilde:

Digital Ecosystems: Ecosystem-Oriented Architectures. - André Grüning, Ioana Sporea:

Supervised Learning of Logical Operations in Layered Spiking Neural Networks with Spike Train Encoding. - Andreas Griesmayer, Zhiming Liu, Charles Morisset, Shuling Wang:

A Framework for Automated and Certified Refinement Steps. - John Fearnley, Sven Schewe

:
Time and Space Results for Parity Games with Bounded Treewidth. - Thomas Bläsius, Ignaz Rutter:

Simultaneous PQ-Ordering with Applications to Constrained Embedding Problems. - Tian-Ming Bu, Chen Yuan, Peng Zhang:

Computing on Binary Strings. - Omur Ozel, Sennur Ulukus:

AWGN Channel under Time-Varying Amplitude Constraints with Causal Information at the Transmitter. - Georg Gottlob, Giorgio Orsi, Andreas Pieris:

Ontological Queries: Rewriting and Optimization (Extended Version). - Samson Abramsky:

Domain Theory and the Logic of Observable Properties. - Itzhak Tamo, Zhiying Wang, Jehoshua Bruck:

Zigzag Codes: MDS Array Codes with Optimal Rebuilding. - Cunsheng Ding, Keqin Feng, Rongquan Feng, Aixian Zhang:

Bounds on and Constructions of Unit Time-Phase Signal Sets. - Chinmoy Dutta, Gopal Pandurangan, Rajmohan Rajaraman, Zhifeng Sun:

Information Spreading in Dynamic Networks. - Saeid Bahanfar, Ladan Darougaran, Helia Kousha, Shahram Babaie:

Reliable Communication in Wireless Body Area Sensor Network for Health Monitoring. - Win Win Thant, Tin Myat Htwe, Ni Lar Thein:

Grammatical Relations of Myanmar Sentences Augmented by Transformation-Based Learning of Function Tagging. - Rafig Agaev, Pavel Chebotarev:

A Cyclic Representation of Discrete Coordination Procedures. - Stefano Ferretti:

Publish-Subscribe Systems via Gossip: a Study based on Complex Networks. - Samson Abramsky:

A Generalized Kahn Principle for Abstract Asynchronous Networks. - Tan Lu, Minghua Chen:

Simple and Effective Dynamic Provisioning for Power-Proportional Data Centers. - Erwin Riegler, Gunvor Elisabeth Kirkelund, Carles Navarro i Manchon, Bernard H. Fleury:

Merging Belief Propagation and the Mean Field Approximation: A Free Energy Approach. - Weiwei Cheng, Eyke Hüllermeier:

Label Ranking with Abstention: Predicting Partial Orders by Thresholding Probability Distributions (Extended Abstract). - Bin Fu:

On the Complexity of Approximate Sum of Sorted List. - Christoph Dürr, Maurice Queyranne, Frits C. R. Spieksma, Fabrice Talla Nobibon, Gerhard J. Woeginger:

The interval ordering problem. - Qiao Li, Rohit Negi:

Maximal Scheduling in Wireless Networks with Priorities. - Amlan Chakrabarti, Susmita Sur-Kolay, Ayan Chaudhury:

Linear Nearest Neighbor Synthesis of Reversible Circuits by Graph Partitioning. - Antony Akshay:

Analysis of Kak's Quantum Cryptography Protocol from the Perspective of Source Strength. - Bijoy Rahman Arif:

On the Footsteps to Generalized Tower of Hanoi Strategy. - Katarzyna Grygiel, Pawel M. Idziak, Marek Zaionc:

How big is BCI fragment of BCK logic. - Christoph Koutschan

, Thotsaporn "Aek" Thanatipanonda:
Advanced Computer Algebra for Determinants. - Min Zhang, Jie Zhang, Qiao-Yan Wen, Zhengping Jin, Hua Zhang:

Analysis and improvement of a strongly secure certificateless key exchange protocol without pairing. - Andras Gelencser, Themistoklis Prodromakis, Christofer Toumazou, Tamás Roska:

A Biomimetic Model of the Outer Plexiform Layer by Incorporating Memristive Devices. - Alain Tamayo, Carlos Granell, Joaquín Huerta:

Instance-based XML data binding for mobile devices. - Yannis Kopsinis, Konstantinos Slavakis, Sergios Theodoridis, Steve McLaughlin

:
Generalized Thresholding Sparsity-Aware Online Learning in a Union of Subspaces. - Thomas David Novlan, Radha Krishna Ganti, Arunabha Ghosh, Jeffrey G. Andrews:

Analytical Evaluation of Fractional Frequency Reuse for Heterogeneous Cellular Networks. - Ashwinkumar Badanidiyuru, Robert Kleinberg, Hooyeon Lee:

Approximating Low-Dimensional Coverage Problems. - Anne Driemel, Sariel Har-Peled, Benjamin Raichel:

On the Expected Complexity of Voronoi Diagrams on Terrains. - Yair Bartal, Lee-Ad Gottlieb, Robert Krauthgamer:

The Traveling Salesman Problem: Low-Dimensionality Implies a Polynomial Time Approximation Scheme. - David L. Donoho, Adel Javanmard, Andrea Montanari:

Information-Theoretically Optimal Compressed Sensing via Spatial Coupling and Approximate Message Passing. - Ehsan Karamad, Behrouz Khoshnevis, Raviraj Adve:

Quantization and Bit Allocation for Channel State Feedback for Relay-Assisted Wireless Networks. - Qiang Li, Azhar Iqbal, Minyou Chen, Derek Abbott:

Quantum Strategies Win in a Defector-Dominated Population. - Tianxi Liu, Lingyang Song, Yonghui Li, Qiang Huo, Bingli Jiao:

Performance Analysis of Hybrid Relay Selection in Cooperative Wireless Systems. - Lingyang Song, Rodrigo C. de Lamare, Are Hjørungnes, Alister G. Burr:

Approximate ML Decision Feedback Block Equalizer for Doubly Selective Fading Channels. - Md. Saiful Islam, Mohd. Zulfiquar Hafiz, Zerina Begum:

Quantum Cost Efficient Reversible BCD Adder for Nanotechnology Based Systems. - Michael A. Bender, Jeremy T. Fineman, Seth Gilbert, Robert Endre Tarjan:

A New Approach to Incremental Cycle Detection and Related Problems. - Massoud Babaie-Zadeh, Christian Jutten, G. Hosein Mohimani:

On the error of estimating the sparsest solution of underdetermined linear systems. - Ran Duan, Seth Pettie, Hsin-Hao Su:

Scaling algorithms for approximate and exact maximum weight matching. - Wolfgang Faber, Miroslaw Truszczynski, Stefan Woltran:

Strong Equivalence of Qualitative Optimization Problems. - Arnao Reinaldo Mayol, Luis A. Núñez, Antonio Lobo:

An Approach to Log Management: Prototyping a Design of Agent for Log Harvesting. - Shiqiang Wang, Qingyang Song, Lei Guo, Abbas Jamalipour:

Physical-Layer Network Coding with M-QAM Modulation. - Maria-Florina Balcan, Yingyu Liang:

Clustering under Perturbation Resilience. - Jolly Shah, Vikas Saxena:

Performance Study on Image Encryption Schemes. - Johannes Habich, Christian Feichtinger, Harald Köstler, Georg Hager, Gerhard Wellein:

Performance engineering for the Lattice Boltzmann method on GPGPUs: Architectural requirements and performance results. - Jelle Hellings, George H. L. Fletcher, Herman J. Haverkort:

I/O efficient bisimulation partitioning on very large directed acyclic graphs. - Sarit Buzaglo, Tuvi Etzion:

On the Existence of Perfect Codes for Asymmetric Limited-Magnitude Errors. - Johannes Oetsch, Jörg Pührer, Hans Tompits:

Extending Object-Oriented Languages by Declarative Specifications of Complex Objects using Answer-Set Programming. - Murdoch James Gabbay:

Finite and infinite support in nominal algebra and logic: nominal completeness theorems for free. - Jacques M. Bahi, Xiaole Fang, Christophe Guyeux, Qianxue Wang:

Randomness Quality of CI Chaotic Generators: Applications to Internet Security. - Marco Baldi, Giovanni Cancellieri, Franco Chiaraluce:

Interleaved Product LDPC Codes. - Jacques M. Bahi, Jean-François Couchot, Christophe Guyeux, Qianxue Wang:

Class of Trustworthy Pseudo-Random Number Generators. - Jacques M. Bahi, Xiaole Fang, Christophe Guyeux, Qianxue Wang:

On the design of a family of CI pseudo-random number generators. - Andrew Schumann:

Two Squares of Opposition: for Analytic and Synthetic Propositions. - Jan Lellmann, Frank Lenzen, Christoph Schnörr:

Optimality Bounds for a Variational Relaxation of the Image Partitioning Problem. - Koji Kobayashi:

Approach to solve P versus NP with Circular Founded Set. - Michalis Vafopoulos:

The Web economy: goods, users, models and policies. - Amr Elmasry, Jyrki Katajainen:

Worst-Case Optimal Priority Queues via Extended Regular Counters. - Catherine A. Bliss, Isabel M. Kloumann, Kameron Decker Harris, Christopher M. Danforth, Peter Sheridan Dodds:

Twitter reciprocal reply networks exhibit assortativity with respect to happiness. - Jason Jeffrey Jones, Robert M. Bond, Christopher J. Fariss, Jaime E. Settle, Adam D. I. Kramer, Cameron Marlow, James H. Fowler:

Yahtzee: An Anonymized Group Level Matching Procedure. - Iyad A. Kanj, Ge Xia:

What makes normalized weighted satisfiability tractable. - Tomás Brázdil, Stefan Kiefer:

Stabilization of Branching Queueing Networks. - Xin Li:

Non-Malleable Extractors for Entropy Rate <1/2. - Vinod Kumar Godavarty:

Using Quasigroups for Generating Pseudorandom Numbers. - Ioannis K. Paparrizos, Stylianos Basagiannis, Sophia G. Petridou:

Quantitative Analysis for Authentication of Low-cost RFID Tags. - Daniel M. Romero, Chenhao Tan, Johan Ugander:

Social-Topical Affiliations: The Interplay between Structure and Popularity. - Oren Weimann, Raphael Yuster:

Approximating the Diameter of Planar Graphs in Near Linear Time. - Mohammad Khabbaz, Smriti Bhagat, Laks V. S. Lakshmanan:

Finding Heavy Paths in Graphs: A Rank Join Approach. - Joan Bruna, Stéphane Mallat:

Classification with Invariant Scattering Representations. - Adrian Dumitrescu, Sariel Har-Peled, Csaba D. Tóth:

Minimum Convex Partitions and Maximum Empty Polytopes. - Daniel Y. Little, Friedrich T. Sommer:

Learning in embodied action-perception loops through exploration. - Joseph Modayil, Adam White, Richard S. Sutton:

Multi-timescale Nexting in a Reinforcement Learning Robot. - Siddharth Barman, Seeun Umboh, Shuchi Chawla, David L. Malec:

Secretary Problems with Convex Costs. - Nitin Garg, Ed Zhu, Fabiano C. Botelho:

Highly-Concurrent Doubly-Linked Lists. - Meng Wu, Jiansong Deng, Falai Chen:

The Dimension of Spline Spaces with Highest Order Smoothness over Hierarchical T-meshes. - Alessandro Chiesa, Silvio Micali, Zeyuan Allen Zhu:

Knightian Auctions. - Xi Fang, Dejun Yang, Guoliang Xue:

Wireless Communications and Networking Technologies for Smart Grid: Paradigms and Challenges. - Hassan Halabian, Ioannis Lambadaris, Chung-Horng Lung:

On the Stability Region of Multi-Queue Multi-Server Queueing Systems with Stationary Channel Distribution. - Pierre Lescanne:

Rationality and Escalation in Infinite Extensive Games. - Olivier Finkel:

The Determinacy of Context-Free Games. - Neus Sabater, Andrés Almansa, Jean-Michel Morel:

Meaningful Matches in Stereovision. - Duc Phu Chau, François Brémond, Monique Thonnat:

A multi-feature tracking algorithm enabling adaptation to context variations. - Jacques M. Bahi, Xiaole Fang, Christophe Guyeux, Qianxue Wang:

Evaluating Quality of Chaotic Pseudo-Random Generators: Application to Information Hiding. - Atish Das Sarma, Michael Dinitz, Gopal Pandurangan:

Efficient Computation of Distance Sketches in Distributed Networks. - Anna-Lena Trautmann, Felice Manganiello, Michael Braun, Joachim Rosenthal:

Cyclic Orbit Codes. - David Lipsky, Primoz Skraba, Mikael Vejdemo-Johansson:

A spectral sequence for parallelized persistence. - Jacques M. Bahi, Jean-François Couchot, Christophe Guyeux:

Steganography: a class of secure and robust algorithms. - Jacques M. Bahi, Jean-François Couchot, Christophe Guyeux:

Performance Analysis of a Keyed Hash Function based on Discrete and Chaotic Proven Iterations. - Petr N. Vabishchevich:

Additive schemes (splitting schemes) for some systems of evolutionary equations. - (Withdrawn) Small Private Circuits.

- Di Yuan, Vangelis Angelakis, Lei Chen, Eleftherios Karipidis, Erik G. Larsson:

On Optimal Link Activation with Interference Cancellation in Wireless Networking. - Emmanuel Polonowski:

Generic Environments in Coq. - Guodong Shi, Karl Henrik Johansson, Yiguang Hong:

Reaching an Optimal Consensus: Distributed Intersection Computation for Multi-agent Systems. - Guodong Shi, Yiguang Hong, Karl Henrik Johansson:

Connectivity and Set Tracking of Multi-agent Systems Guided by Multiple Moving Leaders. - Guodong Shi, Karl Henrik Johansson:

Randomized Consensus Processing over Random Graphs: Independence and Threshold. - Guodong Shi, Karl Henrik Johansson:

Towards a Global Agreement: the Persistent Graph. - Lars Lindbom, Robert Love, Sandeep Krishnamurthy, Chunhai Yao, Nobuhiko Miki, Vikram Chandrasekhar:

Enhanced Inter-cell Interference Coordination for Heterogeneous Networks in LTE-Advanced: A Survey. - Christian Laus, Dirk Oliver Theis:

On the satisfiability of random regular signed SAT formulas. - Ville-Matias Heikkilä:

Discovering novel computer music techniques by exploring the space of short computer programs. - Shankar Balachandran, Sajin Koroth:

A study on the number of Hierarchical Rectangular Partitions of Order k. - Fedor Zhdanov, Yuri Kalnishkan:

An Identity for Kernel Ridge Regression. - Shankar Balachandran, Sajin Koroth:

A Study on Hierarchical Floorplans of Order k. - Xavier Allamigeon:

Strongly connected components of directed hypergraphs. - Sheikh Shanawaz Mostafa, Khondker Jahid Reza, Md. Ziaul Amin, Mohiuddin Ahmad:

Intelligent Paging Strategy for Multi-Carrier CDMA System. - Yi Bao, Chao Wang, Ming Chen:

Multiuser Cellular Network. - Sudam Sekhar Panda, M. S. R. S. Prasad, Gunamani Jena:

POCS Based Super-Resolution Image Reconstruction Using an Adaptive Regularization Parameter. - Wan-Li Chen:

Multi-granular Perspectives on Covering. - Kaihua Zhang, Lei Zhang, Huihui Song, David Zhang:

Re-initialization Free Level Set Evolution via Reaction Diffusion. - Stefano Rini:

An Achievable Region for a General Multi-terminal Network and the corresponding Chain Graph Representation. - Jun He, Feidun He, Hongbin Dong:

Pure Strategy or Mixed Strategy? - Jayaprakash Rajasekharan, Jan Eriksson, Visa Koivunen:

Cooperative Game-Theoretic Approach to Spectrum Sharing in Cognitive Radios. - Menelaos I. Karavelas, Eleni Tzanaki:

Tight lower bounds on the number of faces of the Minkowski sum of convex polytopes via the Cayley trick. - Fedor V. Fomin, Michal Pilipczuk:

Jungles, bundles, and fixed parameter tractability. - L. Mylnikov, A. Trusov:

On an Approach to the Design of a Logical Model of Innovation Project Data. - Tristan Crolard, Emmanuel Polonowski:

A program logic for higher-order procedural variables and non-local jumps. - Alon Gonen, Sivan Sabato, Shai Shalev-Shwartz:

Active Learning Halfspaces under Margin Assumptions. - (Withdrawn) Generating k-Facets by Induction on the Dimension.

- Divesh Aggarwal, Chandan K. Dubey:

Improved hardness results for unique shortest vector problem. - Srishti Shukla, B. Sundar Rajan:

Wireless Network-Coded Three-Way Relaying Using Latin Cubes. - Smarajit Das, B. Sundar Rajan:

Low-delay, High-rate Non-square Complex Orthogonal Designs. - David López-Pérez, Ismail Güvenç, Guillaume de la Roche, Marios Kountouris, Tony Q. S. Quek, Jie Zhang:

Enhanced Inter-Cell Interference Coordination Challenges in Heterogeneous Networks. - Dominique Barth, Boubkeur Boudaoud, Thierry Mautor:

SLA Establishment with Guaranteed QoS in the Interdomain Network: A Stock Model. - Sergei V. Fedorenko:

A novel method for computation of the discrete Fourier transform over characteristic two finite field of even extension degree. - (Withdrawn) Identification of the Risk Related to a Process on Hospital Emergency Service: a Case Study.

- (Withdrawn) Urgency/Emergency Health Processes' Modelling: A Case Study.

- Casey Bennett, Thomas Doub:

Data Mining and Electronic Health Records: Selecting Optimal Clinical Treatments in Practice. - Casey Bennett, Thomas Doub, April Bragg, Jason Luellen, Christina Van Regenmorter, Jennifer Lockman, Randall Reiserer:

Data Mining Session-Based Patient. - Jacques M. Bahi, Jean-François Couchot, Christophe Guyeux:

Steganography: a Class of Algorithms having Secure Properties. - (Withdrawn) Quantifying synergistic information remains an unsolved problem.

- Jyue Tyan Low:

A literature review: What exactly should we preserve? How scholars address this question and where is the gap. - Jacques M. Bahi, Jean-François Couchot, Christophe Guyeux, Adrien Richard:

On the Link Between Strongly Connected Iteration Graphs and Chaotic Boolean Discrete-Time Dynamical Systems. - Naresh Sharma, Naqueeb Ahmad Warsi:

One-shot Slepian-Wolf. - Themistoklis Charalambous, Charalambos D. Charalambous, Farzad Rezaei:

Optimal Merging Algorithms for Lossless Codes with Generalized Criteria. - Samir Medina Perlaza, Hamidou Tembine, Samson Lasaulce, Mérouane Debbah:

Quality-Of-Service Provisioning in Decentralized Networks: A Satisfaction Equilibrium Approach. - Marcos Aurélio Domingues

, Solange Oliveira Rezende:
Using Taxonomies to Facilitate the Analysis of the Association Rules. - Weidong Huang, Leila Alem, Jalal Albasri:

HandsInAir: A Wearable System for Remote Collaboration. - Michael E. Cotterell, John A. Miller, Tom Horton:

Unicode in Domain-Specific Programming Languages for Modeling & Simulation: ScalaTion as a Case Study. - T. S. Jayram, Soumitra Pal, Vijay Arya:

Recovery of a Sparse Integer Solution to an Underdetermined System of Linear Equations. - Behzad Ahmadi, Ravi Tandon, Osvaldo Simeone, H. Vincent Poor:

Heegard-Berger and Cascade Source Coding Problems with Common Reconstruction Constraints. - Keqin Liu, Qing Zhao:

Extended UCB Policy for Multi-Armed Bandit with Light-Tailed Reward Distributions. - Rajai Nasser:

Polar codes for the m-user multiple access channels. - Chih-Hong Cheng, Saddek Bensalem, Rongjie Yan, Harald Ruess:

Distributed Priority Synthesis and its Applications. - Sylvie Boldo, François Clément, Jean-Christophe Filliâtre, Micaela Mayero, Guillaume Melquiond, Pierre Weis:

Wave Equation Numerical Resolution: Mathematics and Program. - László Kozma:

Minimum Average Distance Triangulations. - Sanjeev Arora, Rong Ge, Sushant Sachdeva, Grant Schoenebeck:

Finding Overlapping Communities in Social Networks: Toward a Rigorous Approach. - Timo Jolivet, Jarkko Kari:

Consistency of multidimensional combinatorial substitutions. - Tristan Crolard:

A Formally Specified Program Logic for Higher-Order Procedural Variables and non-local Jumps. - Michael Menzel, Marten Schönherr, Jens Nimis, Stefan Tai:

(MC2)2: A Generic Decision-Making Framework and its Application to Cloud Computing. - Chandramani Kishore Singh, Anurag Kumar, Rajesh Sundaresan:

Combined Base Station Association and Power Control in Multi-channel Cellular Networks. - Samir Medina Perlaza, Samson Lasaulce, Mérouane Debbah:

Equilibria of Channel Selection Games in Parallel Multiple Access Channel. - Bachir Chihani, Denis Collange:

A Multipath TCP model for ns-3 simulator. - Vincent Nesme, Guillaume Theyssier:

Selfsimilarity, Simulation and Spacetime Symmetries. - Sao Mai Nguyen

, Adrien Baranes, Pierre-Yves Oudeyer:
Bootstrapping Intrinsically Motivated Learning with Human Demonstrations. - Suman Kalyan Bera, Shalmoli Gupta, Amit Kumar, Sambuddha Roy:

Approximation Algorithms for Edge Partitioned Vertex Cover Problems. - Marina Sapir:

Bipartite ranking algorithm for classification and survival analysis. - Borhan Molazem Sanandaji, Tyrone L. Vincent, Michael B. Wakin:

Concentration of Measure Inequalities for Toeplitz Matrices with Applications. - Klara Stokes, Vicenç Torra:

Reidentification and k-anonymity: a model for disclosure risk in graphs. - C. Yang, C. Jiang, J. Wang:

Coded Single-Tone Signaling and Its Application to Resource Coordination and Interference Management in Femtocell Networks. - C. Jiang, L. Yang:

Efficient Neighbor Discovery for Proximity-Aware Networks. - Elena Grigorescu, Chris Peikert:

List Decoding Barnes-Wall Lattices. - Mark Braverman, Omri Weinstein:

A discrepancy lower bound for information complexity. - Joshua A. Grochow:

Lie algebra conjugacy. - Anamika Sharma:

A Framework for Picture Extraction on Search Engine Improved and Meaningful Result. - Rui Chen, Benjamin C. M. Fung, Bipin C. Desai:

Differentially Private Trajectory Data Publication. - Debasis Das, Rajiv Misra:

Programmable Cellular Automata Based Efficient Parallel AES Encryption Algorithm. - K. Sureshkumar, R. Rajalakshmi, A. Vetrikanimozhi:

Channel Estimation for MIMO MC-CDMA Systems. - Tin Tin Yee, Thinn Thu Naing:

PC-Cluster based Storage System Architecture for Cloud Storage. - Vijaykumar S.

, Saravanakumar S. G.:
Future Robotics Database Management System along with Cloud TPS. - Jae-Deok Lim, ByeongCheol Choi, SeungWan Han, ChoelHoon Lee:

Automatic Classification of X-rated Videos using Obscene Sound Analysis based on a Repeated Curve-like Spectrum Feature. - Bhawna Nigam, Poorvi Ahirwal, Sonal Salve, Swati Vamney:

Document Classification Using Expectation Maximization with Semi Supervised Learning. - Yashodhara V. Haribhakta, Parag A. Kulkarni:

Learning Context for Text Categorization. - A. V. Meenakshi, V. Punitham, R. Kayalvizhi, S. Asha:

Fast DOA estimation using wavelet denoising on MIMO fading channel. - Mahmoud Mohamed El-Khouly:

ECAKP: Encrypt Collect Authenticate Kill Play. - Vijayakumar V, Nedunchezhian Raju:

Recent Trends and Research Issues in Video Association Mining. - Saleh Ali Alomari

, Putra Sumari:
Statistical Information of the Increased Demand for Watch the VOD with the Increased Sophistication in the Mobile Devices,Communications and Internet Penetration in Asia. - Kurien Zacharia, Eldo P. Elias, Surekha Mariam Varghese:

Modelling Gesture Based Ubiquitous Applications. - Purvang Dalal, Nikhil Kothari, Kankar S. Dasgupta:

Improving TCP Performance over Wireless Network with Frequent Disconnections. - Ojuswini Arora, Amit Kumar Garg, Savita Punia:

Symmetrical Dispersion Compensation For High Speed Optical Links. - A. Bhuvaneswari

, G. R. Karpagam:
Ontology-Based Emergency Management System in a Social Cloud. - Anja Habacha Chaïbi, Ferihane Kboubi, Mohamed Ben Ahmed:

Thematic Analysis and Visualization of Textual Corpus. - Sao Mai Nguyen

, Masaki Ogino, Minoru Asada:
Real-time face swapping as a tool for understanding infant self-recognition. - B. Sarala, D. S. Venkateswarulu:

MC CDMA PAPR Reduction Techniques using Discrete Transforms and Companding. - Varun Raj Kompella, Matthew D. Luciw, Jürgen Schmidhuber:

Incremental Slow Feature Analysis: Adaptive and Episodic Learning from High-Dimensional Input Streams. - Andreas Goerdt, Lutz Falke:

Satisfiability thresholds beyond k-XORSAT. - Roman V. Yampolskiy:

Efficiency Theory: a Unifying Theory for Information, Computation and Intelligence. - Rangarajan Vasudevan, Sugata Sanyal:

A Novel Multipath Approach to Security in Mobile Ad Hoc Networks (MANETs). - S. P. Syed Ibrahim, K. R. Chandran:

Compact Weighted Class Association Rule Mining using Information Gain. - Robert Görke, Andrea Schumm, Dorothea Wagner:

Experiments on Density-Constrained Graph Clustering. - Alexandru Godescu:

An Information Theoretic Analysis of Decision in Computer Chess. - Alexandru Godescu:

Information and Search in Computer Chess. - Ali Karami, Ahmad Baraani-Dastjerdi:

A Concurrency Control Method Based on Commitment Ordering in Mobile Databases. - Jakub Kovác:

On the Complexity of Rearrangement Problems under the Breakpoint Distance. - P. Isakki alias Devi, S. P. Rajagopalan:

The Expert System Designed to Improve Customer Satisfaction. - Chih-Yu Wang, Yan Chen, K. J. Ray Liu:

Chinese Restaurant Game - Part II: Applications to Wireless Networking, Cloud Computing, and Online Social Networking. - Chih-Yu Wang, Yan Chen, K. J. Ray Liu:

Chinese Restaurant Game - Part I: Theory of Learning with Negative Network Externality. - Steve DiBenedetto, Paolo Gasti, Gene Tsudik, Ersin Uzun:

ANDaNA: Anonymous Named Data Networking Application. - Travis Denny:

Faked states attack and quantum cryptography protocols. - Prashant Pilla:

Enhancing Data Security by Making Data Disappear in a P2P Systems. - DaeHun Nyang, Abedelaziz Mohaisen, Taekyoung Kwon, Brent ByungHoon Kang, Angelos Stavrou:

Decryptable to Your Eyes: Visualization of Security Protocols at the User Interface. - Gurpreet Kaur, Partha Pratim Bhattacharya:

A Survey on Cooperative Diversity and Its Applications in Various Wireless Networks. - Michalis Vafopoulos:

Being, space and time in the Web. - Michalis Vafopoulos, Michael Oikonomou:

Recommendation systems: a joint analysis of technical aspects with marketing implications. - Abedelaziz Mohaisen, Huy Tran, Abhishek Chandra, Yongdae Kim:

SocialCloud: Using Social Networks for Building Distributed Computing Services. - Mina Rahbari, Mohammad Ali Jabraeil Jamali:

Efficient Detection of Sybil Attack Based on Cryptography in Vanet. - T. Meyyappan, S. M. Thamarai, N. M. Jeya Nachiaban:

Lossless Digital Image Compression Method for Bitmap Images. - Neri Merhav:

Perfectly secure encryption of individual sequences. - A. S. N. Chakravarthy, Penmetsa V. Krishna Raja, P. S. Avadhani:

A Novel Approach for Password Authentication Using Bidirectional Associative Memory. - Marek Cygan, Guy Kortsarz, Zeev Nutov:

Steiner Forest Orientation Problems. - Marek Cygan, Holger Dell, Daniel Lokshtanov, Dániel Marx, Jesper Nederlof, Yoshio Okamoto, Ramamohan Paturi, Saket Saurabh, Magnus Wahlström:

On Problems as Hard as CNFSAT. - Kostas Pentikousis, Hussein G. Badr, Asha Andrade:

A comparative study of aggregate TCP retransmission rates. - Sergey Andreyev:

A Door into Another World. - Sheng Yang, Mari Kobayashi, Pablo Piantanida, Shlomo Shamai:

Secrecy Degrees of Freedom of MIMO Broadcast Channels with Delayed CSIT. - René van Bevern:

Towards Optimal and Expressive Kernelization for d-Hitting Set. - Huan Chen, Mikolás Janota, João Marques-Silva:

QBF-Based Boolean Function Bi-Decomposition. - Wang Lin, Min Wu, Zhengfeng Yang, Zhenbing Zeng:

Exact Safety Verification of Hybrid Systems Using Sums-Of-Squares Representation. - Nasrin Mazaheri Soudani, Ahmad Baraani-Dastgerdi:

The Spatial Nearest Neighbor Skyline Queries. - Di Yuan, Jingon Joung, Chin Keong Ho, Sumei Sun:

On Tractability Aspects of Optimal Resource Allocation in OFDMA Systems. - Hongyu Cui, Rongqing Zhang, Lingyang Song, Bingli Jiao:

Performance Analysis of Bidirectional Relay Selection with Imperfect Channel State Information. - Omid Pakdelazar, Gholamali Rezai-Rad:

Improvement of BM3D Algorithm and Employment to Satellite and CFA Images Denoising. - Jean-Guillaume Dumas, Dominique Duval, Laurent Fousse, Jean-Claude Reynaud:

A duality between exceptions and states. - Jean-Guillaume Dumas

, Dominique Duval, Laurent Fousse, Jean-Claude Reynaud:
Decorated proofs for computational effects: States. 45-59 - Jihen Drira Rekik, Leïla Baccouche, Henda Ben Ghézala:

A Real-Time Database QoS-aware Service Selection Protocol for MANET. - Jihen Drira Rekik, Leïla Baccouche, Henda Ben Ghézala:

Performance Evaluation and Impact of Weighting Factors on an Energy and Delay Aware Dynamic Source Routing Protocol. - Intisar Al-Mejibli, Martin J. Colley:

Maximum Production of Transmission Messages Rate for Service Discovery Protocols. - Fabio Iannello, Osvaldo Simeone, Umberto Spagnolini:

Medium Access Control Protocols for Wireless Sensor Networks with Energy Harvesting. - Intisar Al-Mejibli, Martin J. Colley, Salah S. Al-Majeed:

Networks Utilization Improvements for Service Discovery Performance. - Arash Mohammadi, Amir Asif:

Distributed Particle Filter Implementation with Intermittent/Irregular Consensus Convergence. - Ömer Korçak, George Iosifidis, Tansu Alpcan, Iordanis Koutsopoulos:

Competition and Regulation in Wireless Services Markets. - Steffen Schreiner, Latchezar Betev, Costin Grigoras, Maarten Litmaath:

A Mediated Definite Delegation Model allowing for Certified Grid Job Submission. - Alireza Abbasi, Liaquat Hossain, Rolf T. Wigand:

Social Capital and Individual Performance: A Study of Academic Collaboration. - Tao Chen, Min-Yen Kan:

Creating a Live, Public Short Message Service Corpus: The NUS SMS Corpus. - (Withdrawn) Capacity Bounds and Exact Results for the Cognitive Z-interference Channel.

- Sylvain Gravier, Jérôme Javelle, Mehdi Mhalla, Simon Perdrix:

On Weak Odd Domination and Graph-based Quantum Secret Sharing. - Jesper W. Schneider:

Caveats for using statistical significance tests in research assessments. - Ritesh Vispute:

Errors in Improved Polynomial Algorithm For 3 Sat Proposed By Narendra Chaudhari. - Mahmoud S. Mahmoud, Andrew Ensor, Alain Biem, Bruce G. Elmegreen, Sergei Gulyaev:

Data Provenance and Management in Radio Astronomy: A Stream Computing Approach. - Houari Mahfoud, Abdessamad Imine:

Secure Querying of Recursive XML Views: A Standard XPath-based Technique. - Konstantinos Karanasos, Asterios Katsifodimos, Ioana Manolescu, Spyros Zoupanos:

The ViP2P Platform: XML Views in P2P. - Paola Di Maio

:
Towards a Reference Model for Open Access and Knowledge Sharing, Lessons from Systems Research. - Nesrine Talbi, Khaled Belarbi:

Fast Hybrid PSO and Tabu Search Approach for Optimization of a Fuzzy Controller. - Aravindh Krishnamoorthy, Leela Srikar Muppirisetty, Ravi Jandial:

Simulation Performance of MMSE Iterative Equalization with Soft Boolean Value Propagation. - José Hernández-Orallo, Peter A. Flach

, César Ferri:
Threshold Choice Methods: the Missing Link. - Julian Backes, Michael Backes, Markus Dürmuth, Sebastian Gerling, Stefan Lorenz:

X-pire! - A digital expiration date for images in social networks. - Jong P. Yoon:

Location- and Time-Dependent VPD for Privacy-Preserving Wireless Accesses to Cloud Services. - Sankar Rajagopal:

Customer Data Clustering using Data Mining Technique. - Muhammad Asiful Islam, C. R. Ramakrishnan, I. V. Ramakrishnan:

Inference in Probabilistic Logic Programs with Continuous Random Variables. - Brett Hern, Krishna R. Narayanan:

Multilevel Coding Schemes for Compute-and-Forward with Flexible Decoding. - Inder Singh, Devendra Kumar Punia:

Employees Adoption of E-Procurement System: An Empirical Study. - Dorna Bandari, Gregory J. Pottie, Pascal Frossard:

Correlation-aware Resource Allocation in Multi-Cell Networks. - Kristina Lerman, Suradej Intagorn, Jeon-Hyung Kang, Rumi Ghosh:

Using Proximity to Predict Activity in Social Networks. - Colleen Swanson, Douglas R. Stinson:

Extended Combinatorial Constructions for Peer-to-peer User-Private Information Retrieva. - Mangesh Gupte, Tina Eliassi-Rad:

Measuring Tie Strength in Implicit Social Networks. - Onur Güngör, Jian Tan, Can Emre Koksal, Hesham El Gamal, Ness B. Shroff:

Secrecy Outage Capacity of Fading Channels. - Masoomeh sanei, Nasrollah Moghaddam Charkari:

Hybrid Heuristic-Based Artificial Immune System for Task Scheduling. - Onur Güngör, Fangzhou Chen, Can Emre Koksal:

Secret Key Generation From Mobility. - Bernard Mans, Luke Mathieson:

On the Treewidth of Dynamic Graphs. - Andri Mirzal:

Design and Implementation of a Simple Web Search Engine. - Rosziati Ibrahim, Teoh Suk Kuan:

Steganography Algorithm to Hide Secret Message inside an Image. - Nima Torabkhani, Badri N. Vellambi, Ahmad Beirami, Faramarz Fekri:

Exact Modeling of the Performance of Random Linear Network Coding in Finite-buffer Networks. - Jing Xie, Yuming Jiang, Min Xie:

A Temporal Approach to Stochastic Network Calculus. - Xiumin Wang, Chau Yuen, Yinlong Xu:

Joint Rate Selection and Wireless Network Coding for Time Critical Applications. - Michael Luttenberger:

An Extension of Parikh's Theorem beyond Idempotence. - Frank R. Kschischang, Tobias Lutz:

A Constrained Coding Approach to Error-Free Half-Duplex Relay Networks. - Shai Bagon, Meirav Galun:

Large Scale Correlation Clustering Optimization. - Zachary Friggstad:

Multiple Traveling Salesmen in Asymmetric Metrics. - Tristan Crolard, Emmanuel Polonowski:

Deriving a Hoare-Floyd logic for non-local jumps from a formulae-as-types notion of control. - F. Peñuñuri, Ricardo Peón-Escalante, C. Villanueva, Carlos Alberto Cruz Villar:

Synthesis of Spherical 4R Mechanism for Path Generation using Differential Evolution. - Pablo Huijse, Pablo A. Estévez, Pablo Zegers, José Carlos Príncipe, Pavlos Protopapas:

Period Estimation in Astronomical Time Series Using Slotted Correntropy. - Dusan Jakovetic, João Manuel Freitas Xavier, José M. F. Moura:

Fast Distributed Gradient Methods. - Florent R. Madelaine, Barnaby Martin, Juraj Stacho:

Constraint Satisfaction with Counting Quantifiers. - Tsvi Achler:

Supervised Generative Reconstruction: An Efficient Way To Flexibly Store and Recognize Patterns. - Steven Heilman, Aukosh Jagannath, Assaf Naor:

Solution of the propeller conjecture in $\R^3$. - Karthik S. Gurumoorthy, Anand Rangarajan, Manu Sethi:

Fast convolution-based methods for computing the signed distance function and its derivatives. - Marco Tereso, Jorge Bernardino:

Open Source CRM Systems for SMEs. - Harsha Honnappa, Rahul Jain:

Strategic Arrivals into Queueing Networks: The Network Concert Queueing Game. - Pierre Clairambault:

Estimation of the length of interactions in arena game semantics. - Miriam Ney, Guy K. Kloss, Andreas Schreiber:

Using Provenance to support Good Laboratory Practice in Grid Environments. - Rui Wang, Meixia Tao:

Joint Source and Relay Precoding Designs for MIMO Two-Way Relaying Based on MSE Criterion. - Andrew Ensor, Seth Hall:

GPU-based Image Analysis on Mobile Devices. - Mohammad-Reza Feizi-Derakhshi, Azade Roohany:

Proposing Cluster_Similarity Method in Order to Find as Much Better Similarities in Databases. - Baofeng Wu, Kai Zhou, Zhuojun Liu:

A new proof to the complexity of the dual basis of a type I optimal normal basis. - Stefan Sommer, Mads Nielsen, Sune Darkner, Xavier Pennec:

Higher Order Kernels and Locally Affine LDDMM Registration. - Stefano Bilotta, Elisa Pergola, Renzo Pinzani:

A new approach to cross-bifix-free sets. - Ramin Norousi, Stephan Wickles, Thomas Becker, Roland Beckmann, Volker J. Schmid, Achim Tresch:

Automatic post-picking improves particle image detection from Cryo-EM micrographs. - Pierre Clairambault:

Isomorphisms of types in the presence of higher-order references. - Tugcan Aktas, Ali Özgür Yilmaz, Emre Aktas:

Practical Wireless Network Coding and Decoding Methods for Multiple Unicast Transmissions. - Zhong Liu, Shengyao Chen, Feng Xi:

A Compressed Sensing Framework of Frequency-Sparse Signals through Chaotic Systems. - Fedor V. Fomin, Serge Gaspers, Petr A. Golovach, Karol Suchan, Stefan Szeider, Erik Jan van Leeuwen, Martin Vatshelle, Yngve Villanger:

k-Gap Interval Graphs. - Vittorio Perduca, Grégory Nuel:

Exact Computation of Kullback-Leibler Distance for Hidden Markov Trees and Models. - Neil Zhenqiang Gong, Ameet Talwalkar, Lester W. Mackey, Ling Huang, Eui Chul Richard Shin, Emil Stefanov, Elaine Shi, Dawn Song:

Predicting Links and Inferring Attributes using a Social-Attribute Network (SAN). - Oliver Kosut, Lang Tong, David Tse:

Polytope Codes Against Adversaries in Networks. - Toryn Qwyllyn Klassen, Philipp Woelfel:

Independence of Tabulation-Based Hash Classes. - Andrew Ensor, Felipe Lillo:

Partial order approach to compute shortest paths in multimodal networks. - Osman Yagan:

Performance of the Eschenauer-Gligor key distribution scheme under an ON/OFF channel. - (Withdrawn) Percolation on the Signal to Interference Ratio Graph with Fading.

- Supriya Raheja, Reena Dhadich, Smita Rajpal:

An Alternative Interpretation of Linguistic Variables as Linguistic Finite Automata. - Jong Min Kim, Ok Kyun Lee, Jong Chul Ye:

Noise Robust Joint Sparse Recovery using Compressive Subspace Fitting. - Pierre Clairambault, Peter Dybjer:

The Biequivalence of Locally Cartesian Closed Categories and Martin-Löf Type Theories. - Girish N. Nair:

A Nonstochastic Information Theory for Communication and State Estimation. - Robert Crowston, Mark Jones, Matthias Mnich:

Max-Cut Parameterized Above the Edwards-Erdős Bound. - Zhong Fan, Parag Kulkarni, Sedat Görmüs, Costas Efthymiou, Georgios Kalogridis, Mahesh Sooriyabandara, Ziming Zhu, Sangarapillai Lambotharan, Woon Hau Chin:

Smart Grid Communications: Overview of Research Challenges, Solutions, and Standardization Activities. - Stefan Dobrev, Evangelos Kranakis, Danny Krizanc, Oscar Morales-Ponce, Ladislav Stacho:

Approximating the Edge Length of 2-Edge Connected Planar Geometric Graphs on a Set of Points. - Andrei M. Sukhov, D. Yu. Chemodanov:

Variation principle and the universal metric of dynamic routing. - Yajuan Sun, Hai Lin, Ben M. Chen:

Decentralized Supervisory Control of Discrete Event Systems for Bisimulation Equivalence. - Yuan Shen, Santiago Mazuelas, Moe Z. Win:

Cooperative Network Navigation: Fundamental Limit and its Geometrical Interpretation. - Julia Chuzhoy, Yury Makarychev, Aravindan Vijayaraghavan, Yuan Zhou:

Approximation Algorithms and Hardness of the k-Route Cut Problem. - C. Seshadhri, Tamara G. Kolda, Ali Pinar:

Community structure and scale-free collections of Erdös-Rényi graphs. - Cristian Danescu-Niculescu-Mizil, Lillian Lee, Bo Pang, Jon M. Kleinberg:

Echoes of power: Language effects and power differences in social interaction. - Po-An Chen, Bart de Keijzer, David Kempe, Guido Schäfer:

The Robust Price of Anarchy of Altruistic Games. - Zhen Wang, Felix Xiaozhu Lin, Lin Zhong, Mansoor Chishtie:

How Far Can Client-Only Solutions Go for Mobile Browser Speed? - Alexander Binder, Shinichi Nakajima, Marius Kloft, Christina Müller, Wojciech Samek, Ulf Brefeld, Klaus-Robert Müller, Motoaki Kawanabe:

Insights from Classifying Visual Concepts with Multiple Kernel Learning. - Youngmin Cho, Lawrence K. Saul:

Analysis and Extension of Arc-Cosine Kernels for Large Margin Classification. - Youngmin Cho, Lawrence K. Saul:

Nonnegative Matrix Factorization for Semi-supervised Dimensionality Reduction. - Mamoun M. Jamous, Safaai Bin Deris:

Web Services Non-Functional Classification to Enhance Discovery Speed. - Christine Michel

, Élise Lavoué:
KM and WEB 2.0 methods for project-based learning. MESHAT : a monitoring and experience sharing tool. - Enrico Paolini, Mark F. Flanagan, Marco Chiani, Marc P. C. Fossorier:

Stability of Iterative Decoding of Multi-Edge Type Doubly-Generalized LDPC Codes Over the BEC. - Vytautas Valancius, Cristian Lumezanu, Nick Feamster, Ramesh Johari, Vijay V. Vazirani:

Modeling Tiered Pricing in the Internet Transit Market. - Manjesh Kumar Hanawal, Eitan Altman, François Baccelli:

Stochastic Geometry based Medium Access Games in Mobile Ad hoc Networking. - Mohamed A. El-Zawawy:

Probabilistic pointer analysis for multithreaded programs. - Hamoon Mousavi, Jeffrey O. Shallit:

Filtrations of Formal Languages by Arithmetic Progressions. - Gero Greiner, Riko Jacob:

The Efficiency of MapReduce in Parallel External Memory. - Flávio Cruz, Ricardo Rocha

:
Single Time-Stamped Tries for Retroactive Call Subsumption. - João Raimundo, Ricardo Rocha

:
Global Trie for Subterms. - Paul Tarau:

Computing with Hereditarily Finite Sequences. - Paulo Moura

, Artur Miguel Dias:
L-FLAT: Logtalk Toolkit for Formal Languages and Automata Theory. - János Csorba, Zsolt Zombori, Péter Szeredi:

Using Constraint Handling Rules to Provide Static Type Analysis for the Q Functional Language. - Theofrastos Mantadelis, Gerda Janssens:

Nesting Probabilistic Inference. - Timon Van Overveldt, Bart Demoen:

High-Level Multi-Threading in hProlog. - Dario Campagna, Beata Sarna-Starosta, Tom Schrijvers:

Approximating Constraint Propagation in Datalog. - Paul Tarau:

Bijective Term Encodings. - Abdulla Alqaddoumi, Enrico Pontelli:

An Implementation of Bubbling. - Sodeif Ahadpour, Yaser Sadra, Zahra Arasteh-Fard:

A novel chaotic encryption scheme based on generalized threshold function. - Hien Quoc Ngo, Erik G. Larsson, Thomas L. Marzetta:

Energy and Spectral Efficiency of Very Large Multiuser MIMO Systems. - Alasdair Armstrong, Simon Foster, Georg Struth:

Dependently Typed Programming based on Automated Theorem Proving. - Özgür Saglam, Mehmet Emin Dalkiliç:

Cross Layer Implementation of Key Establishment and Configuration Protocols in WSN. - Nicolas Friot, Christophe Guyeux, Jacques M. Bahi:

Chaotic iterations for steganography: Stego-security and topological-security. - Christophe Guyeux, Nicolas Friot, Jacques M. Bahi:

Chaotic iterations versus Spread-spectrum: topological-security and stego-security. - S. Malathi, Sridhar Sundaramoorthy:

A Classical Fuzzy Approach for Software Effort Estimation on Machine Learning Technique. - Michael Menzel, Rajiv Ranjan:

CloudGenius: Automated Decision Support for Migrating Multi-Component Enterprise Applications to Clouds. - Emil Jerábek:

Root finding with threshold circuits. - Hui Zhang, Jian-Feng Cai, Lizhi Cheng, Jubo Zhu:

Strongly Convex Programming for Exact Matrix Completion and Robust Principal Component Analysis. - Emil Vassev, Serguei A. Mokhov:

Developing Autonomic Properties for Distributed Pattern-Recognition Systems with ASSL: A Distributed MARF Case Study. - Osman Yagan, Dajun Qian, Junshan Zhang, Douglas Cochran:

Conjoining Speeds up Information Diffusion in Overlaying Social-Physical Networks. - Constantinos Daskalakis, S. Matthew Weinberg:

On Optimal Multi-Dimensional Mechanism Design. - Zhengjun Cao, Hanyue Cao:

Note on fast division algorithm for polynomials using Newton iteration. - Phuc V. Nguyen:

The Study and Approach of Software Re-Engineering. - Phuc V. Nguyen:

ITIL frameworks to ITD Company for improving capabilities in service management. - Phuc V. Nguyen:

Mobile IP and protocol authentication extension. - Phuc V. Nguyen:

Legal Resources Information System for Information Agencies of Specialized Libraries. - Andri Mirzal:

Clustering and Latent Semantic Indexing Aspects of the Nonnegative Matrix Factorization. - Tejaswini Hilage, R. V. Kulkarni:

Application of Data Mining Techniques to a Selected Business Organisation with Special Reference to Buying Behaviour. - William K. Moses Jr., C. Pandu Rangan:

Rational Secret Sharing over an Asynchronous Broadcast Channel with Information Theoretic Security. - Hongyang Chen, Wentao Robin Ouyang, Chen Wang:

Distributed Source Localization in Wireless Underground Sensor Networks. - Loet Leydesdorff, Lutz Bornmann:

Testing Differences Statistically with the Leiden Ranking. - Hara Gopal Mani Pakala, Plh Varaprasad, Raju Kvsvn, Ibrahim Khan:

An Adaptive Design Methodology for Reduction of Product Development Risk. - Bartlomiej Placzek:

Fuzzy cellular model for on-line traffic simulation. - Bartlomiej Placzek:

Performance Evaluation of Road Traffic Control Using a Fuzzy Cellular Model. - Bartlomiej Placzek:

A real time vehicles detection algorithm for vision based sensors. - Bartlomiej Placzek:

Vehicles Recognition Using Fuzzy Descriptors of Image Segments. - Paschalis C. Sofotasios, Steven Freear:

Closed-Form Bounds to the Rice and Incomplete Toronto Functions and Incomplete Lipschitz-Hankel Integrals. - Nicholas Mastronarde, Karim Kanoun, David Atienza, Pascal Frossard, Mihaela van der Schaar:

Markov Decision Process Based Energy-Efficient On-Line Scheduling for Slice-Parallel Video Decoders on Multicore Systems. - Onur Ozan Koyluoglu, Rajiv Soundararajan, Sriram Vishwanath:

State Amplification Subject To Masking Constraints. - Nadir K. Salih, Tianyi Zang, Mingrui Sun:

Multi databases in Health Care Networks. - Jeff M. Phillips:

ε-Samples of Kernels. - Ravi Chugh, Ranjit Jhala:

Dependent Types for JavaScript. - Venkatesan Guruswami, Ali Kemal Sinop:

Certifying Graph Expansion and Non-Uniform Sparsity via Generalized Spectra. - Vincent Labatut

, Hocine Cherifi:
Evaluation of Performance Measures for Classifiers Comparison. - Günce Keziban Orman, Vincent Labatut

, Hocine Cherifi:
On Accuracy of Community Structure Discovery Algorithms. - Abdelkaher Ait Abdelouahad, Mohammed El Hassouni, Hocine Cherifi, Driss Aboutajdine:

A Reduced Reference Image Quality Measure Using Bessel K Forms Model for Tetrolet Coefficients. - Jalaluddin Qureshi, Chuan Heng Foh, Jianfei Cai:

Joint Network Coding for Interfering Wireless Multicast Networks. - Shervin Minaee, Mehran Fotouhi, Babak Hossein Khalaj:

A Geometric Approach For Fully Automatic Chromosome Segmentation. - Jakob Hoydis, Romain Couillet, Mérouane Debbah:

Iterative Deterministic Equivalents for the Performance Analysis of Communication Systems. - Laura Beckwith, Jácome Cunha, João Paulo Fernandes

, João Saraiva
:
An Empirical Study on End-users Productivity Using Model-based Spreadsheets. - Derek Flood, Rachel Harrison, Kevin McDaid:

Spreadsheets on the Move: An Evaluation of Mobile Spreadsheets. - Hyunggon Park, Nikolaos Thomos, Pascal Frossard:

Approximate Decoding Approaches for Network Coded Correlated Data. - Shunyuan Ye, Yanming Shen, Shivendra S. Panwar:

A Distributed Scheduling Algorithm for High-Speed Switching Systems. - Frank Nielsen, Richard Nock:

A closed-form expression for the Sharma-Mittal entropy of exponential families. - Ravi Teja Sukhavasi, Babak Hassibi:

Error Correcting Codes for Distributed Control. - Hirotoshi Yasuoka, Tachio Terauchi:

On Bounding Problems of Quantitative Information Flow. - Praveen Chandrashekar, Ashish Garg:

Vertex-centroid finite volume scheme on tetrahedral grids for conservation laws. - Ziqiang Shi, Jiqing Han, Tieran Zheng, Shiwen Deng:

Online Learning for Classification of Low-rank Representation Features and Its Applications in Audio Segment Classification. - Shubh Narayan Singh, Kanduru V. Krishna:

The Rank and Hanna Neumann Property of Some Submonoids of a Free Monoid. - Alfred M. Bruckstein, Tuvi Etzion, Raja Giryes, Noam Gordon, Robert J. Holt, Doron Shuldiner:

Simple and Robust Binary Self-Location Patterns. - Shubh Narayan Singh, Kanduru V. Krishna:

A Sufficient Condition for Hanna Neumann Property of Submonoids of a Free Monoid. - Mahdi Soltanolkotabi, Emmanuel J. Candès:

A Geometric Analysis of Subspace Clustering with Outliers. - T. Chandrasekhar, K. Thangavel, E. Elayaraja:

Performance Analysis of Enhanced Clustering Algorithm for Gene Expression Data. - Davide Bilò, Luciano Gualà, Guido Proietti:

Bounded-Distance Network Creation Games. - Akram Ajouli, Julien Cohen:

Refactoring Composite to Visitor and Inverse Transformation in Java. - Samir Datta, Rameshwar Pratap:

Computing Bits of Algebraic Numbers. - Antun Balaz, Ognjen Prnjat, Dusan Vudragovic, Vladimir Slavnic, Ioannis Liabotis, Emanouil I. Atanassov, Boro Jakimovski, Mihajlo Savic:

Development of Grid e-Infrastructure in South-Eastern Europe. - Loris Serafino:

Between theory and practice: guidelines for an optimization scheme with genetic algorithms - Part I: single-objective continuous global optimization. - Bachir Chihani, Denis Collange:

A Multipath Transport Protocol for Future Internet. - Giovanni Zappella:

A Scalable Multiclass Algorithm for Node Classification. - Damien Prot, Odile Bellenguez-Morineau

, Chams Lahlou:
A note on the paper "Minimizing total tardiness on parallel machines with preemptions" by Kravchenko and Werner [2010]. - Damien Prot, Odile Bellenguez-Morineau, Chams Lahlou:

Refining the boundary between P and NP for identical machine scheduling problems with preemption and release dates. - Jean-Charles Faugère, Mohab Safey El Din, Pierre-Jean Spaenlehauer:

On the Complexity of the Generalized MinRank Problem. - Fedor V. Fomin, Stefan Kratsch, Marcin Pilipczuk, Michal Pilipczuk, Yngve Villanger:

Subexponential fixed-parameter tractability of cluster editing. - Ido Ben-Zvi:

Causality, Knowledge and Coordination in Distributed Systems. - Abhijat Vichare:

What is an OS? - Ofer M. Shir, Jonathan Roslund, L. Darrell Whitley, Herschel Rabitz:

Evolutionary Hessian Learning: Forced Optimal Covariance Adaptive Learning (FOCAL). - Massimiliano Dal Mas:

Cluster Analysis for a Scale-Free Folksodriven Structure Network. - Bjarke Hammersholt Roune, Eduardo Sáenz-de-Cabezón:

Complexity and Algorithms for Euler Characteristic of Simplicial Complexes. - Sebastian Böcker, Quang Bao Anh Bui, François Nicolas, Anke Truß:

Intractability of the Minimum-Flip Supertree problem and its variants. - Kien T. Truong, Philippe J. Sartori, Robert W. Heath Jr.:

Cooperative Algorithms for MIMO Amplify-and-Forward Relay Networks. - Yang Cai, Constantinos Daskalakis, S. Matthew Weinberg:

An Algorithmic Characterization of Multi-Dimensional Mechanisms. - Sebastian Kreft, Gonzalo Navarro:

Self-Index based on LZ77 (thesis). - Steffen Brinkmann, José Gracia, Christoph Niethammer, Rainer Keller:

TEMANEJO - a debugger for task based parallel programming models. - Arash Afkanpour, Csaba Szepesvári, Michael H. Bowling:

Alignment Based Kernel Learning with a Continuous Set of Base Kernels. - Bartlomiej Placzek:

Selective data collection in vehicular networks for traffic control applications. - Roxana Smarandache:

Pseudocodewords from Bethe Permanents. - Jan-Hinrich Kämper, Stephen G. Kobourov, Martin Nöllenburg:

Circular-Arc Cartograms. - Habib Shah, Rozaida Ghazali, Nazri Mohd Nawi:

Using Artificial Bee Colony Algorithm for MLP Training on Earthquake Time Series Data Prediction. - Bartlomiej Placzek:

Fuzzy cellular model of signal controlled traffic stream. - Yuval Emek, Tobias Langner, Roger Wattenhofer:

Stability vs. Cost of Matchings. - Stefan Kiefer, Andrzej S. Murawski, Joël Ouaknine, Björn Wachter, James Worrell:

On the Complexity of the Equivalence Problem for Probabilistic Automata. - Clémence Magnien, Amelie Medem Kuatse, Fabien Tarissan:

Towards realistic modeling of IP-level routing topology dynamics. - Marek Trtík:

Abstracting Path Conditions for Effective Symbolic Execution. - Christopher D. Hollander, Ivan Garibay:

Transformation Networks: How Innovation and the Availability of Technology can Increase Economic Performance. - (Withdrawn) Modeling transition dynamics in MDPs with RKHS embeddings of conditional distributions.

- Bachir Chihani, Denis Collange:

Simulation-based study of MPTCP (Multipath TCP). - Han-Xin Yang, Wen-Xu Wang, Ying-Cheng Lai, Bing-Hong Wang:

Greedy routing on networks of mobile agents. - Usman Tariq, Yasir Malik, Manpyo Hong:

NACS: non-overlapping AP's caching scheme to reduce handoff in 802.11 wireless LAN. - Tobias Fritz, Rafael Chaves:

Entropic Inequalities and the Marginal Problem. - Mirela Damian, Erik D. Demaine, Robin Y. Flatland:

Unfolding Orthogonal Polyhedra with Quadratic Refinement: The Delta-Unfolding Algorithm. - Jaspreet Singh, Upamanyu Madhow:

Phase-Quantized Block Noncoherent Communication. - (Withdrawn) Random Coding Bound for the Reliability Function in Quantum Channel: General Case.

- Urs Niesen, Mohammad Ali Maddah-Ali:

Interference Alignment: From Degrees-of-Freedom to Constant-Gap Capacity Approximations. - Alexander Fish, Shamgar Gurevich, Ronny Hadani, Akbar M. Sayeed, Oded Schwartz:

Computing the Matched Filter in Linear Time. - Ziad G. Ghauch:

3D Finite Element Analysis of HMA Overlay Mix Design to Control Reflective Cracking. - Lila Kari, Steffen Kopecki:

Deciding if a Regular Language is Generated by a Splicing System. - Larry S. Yaeger, Virgil Griffith, Olaf Sporns:

Passive and Driven Trends in the Evolution of Complexity. - Yuichi Ikeda, Takashi Ikegami, Kazuto Kataoka, Kazuhiko Ogimoto:

A Unit Commitment Model with Demand Response for the Integration of Renewable Energies. - Jeremy Blackburn, Ramanuja Simha, Nicolas Kourtellis, Xiang Zuo, Clayton Long, Matei Ripeanu, John Skvoretz, Adriana Iamnitchi:

Cheaters in the Steam Community Gaming Social Network. - Leo Yu Zhang, Chengqing Li, Kwok-Wo Wong, Shi Shu, Guanrong Chen:

Cryptanalyzing a chaos-based image encryption algorithm using alternate structure. - Hugo Méric, Jérôme Lacan, Fabrice Arnal, Guy Lesthievent, Marie-Laure Boucheret:

Combining Adaptive Coding and Modulation with Hierarchical Modulation in Satcom Systems. - Serhat Nazim Avci, Ender Ayanoglu:

Coded Path Protection: Efficient Conversion of Sharing to Coding. - Meni Rosenfeld:

Analysis of Bitcoin Pooled Mining Reward Systems. - Salvador Abreu

, Vítor Santos Costa
:
Online Proceedings of the 11th International Colloquium on Implementation of Constraint LOgic Programming Systems (CICLOPS 2011), Lexington, KY, U.S.A., July 10, 2011. - Uday P. Khedker, Alan Mycroft, Prashant Singh Rawat:

Lazy Pointer Analysis. - Philippe Duchon:

Random generation of combinatorial structures: Boltzmann samplers and beyond. - Vladimir Anashin:

Automata finiteness criterion in terms of van der Put series of automata functions. - Nicolas Chaumont, Christoph Adami:

Evolution of sustained foraging in 3D environments with physics. - Ye Li, Matthew Danish, Richard West:

Quest-V: A Virtualized Multikernel for High-Confidence Systems. - Özgür Erçetin, Mehmet Ozerk Memis:

Comments on "Capacity with explicit delay guarantees for generic sources over correlated Rayleigh channel". - David P. Woodruff, Qin Zhang:

Tight Bounds for Distributed Functional Monitoring. - Philippe Matherat, Marc-Thierry Jaekel:

Relativistic causality and clockless circuits. - Jacques M. Bahi, Raphaël Couturier, Christophe Guyeux, Pierre-Cyrille Héam:

Efficient and Cryptographically Secure Generation of Chaotic Pseudorandom Numbers on GPU. - Jacques M. Bahi, Christophe Guyeux, Pierre-Cyrille Héam:

A Complexity Approach for Steganalysis. - Eitan Menahem, Lior Rokach, Yuval Elovici:

Combining One-Class Classifiers via Meta-Learning. - Renaud Lambiotte, Martin Rosvall:

Ranking and clustering of nodes in networks with smart teleportation. - Rasmus Ibsen-Jensen, Peter Bro Miltersen:

Solving simple stochastic games with few coin toss positions. - Yuanxin Wu, Hongliang Zhang, Meiping Wu, Xiaoping Hu, Dewen Hu:

Observability of Strapdown INS Alignment: A Global Perspective. - Yuanxin Wu, Zhenxiong Xiao:

On Position Translation Vector. - Tomás Werner:

Zero-Temperature Limit of a Convergent Algorithm to Minimize the Bethe Free Energy. - Jürgen Schmidhuber:

POWERPLAY: Training an Increasingly General Problem Solver by Continually Searching for the Simplest Still Unsolvable Problem. - Tobias Koch, Amos Lapidoth:

One-Bit Quantizers for Fading Channels. - Hari Krishna Malladi, Ambedkar Dukkipati:

A Parallel Cylindrical Algebraic Decomposition Algorithm for Quantifier Elimination on Real Closed Fields. - Imane Zaoui, Dalila Chiadmi, Laila Benhlima:

2P-Med: Building a Personalization Platform for Mediation Systems. - Arijit Laha:

Enhancing Support for Knowledge Works: A relatively unexplored vista of computing research. - Daan Fierens:

Improving the Efficiency of Approximate Inference for Probabilistic Logical Models by means of Program Specialization. - Saeed Alaei, Mohammad Taghi Hajiaghayi, Vahid Liaghat, Dan Pei, Barna Saha:

AdCell: Ad Allocation in Cellular Networks. - Purushottam Kar, Prateek Jain:

Similarity-based Learning via Data Driven Embeddings. - (Withdrawn) Alternating proximal gradient method for nonnegative matrix factorization.

- Ofer M. Shir, Jonathan Roslund, Zaki Leghtas, Herschel Rabitz:

Quantum Control Experiments as a Testbed for Evolutionary Multi-Objective Algorithms. - Gerth Stølting Brodal, Casper Kejlberg-Rasmussen:

Cache-Oblivious Implicit Predecessor Dictionaries with the Working Set Property. - John Scoville:

Critical Data Compression. - Nikzad Babaii Rizvandi, Javid Taheri, Albert Y. Zomaya:

A Study on Using Uncertain Time Series Matching Algorithms in Map-Reduce Applications. - Rahul Vaze:

Competitive Ratio Analysis of Online Algorithms to Minimize Data Transmission Time in Energy Harvesting Communication System. - Moritz Kreutzer, Georg Hager, Gerhard Wellein, Holger Fehske, Achim Basermann, Alan R. Bishop:

Sparse matrix-vector multiplication on GPGPU clusters: A new storage format and a scalable implementation. - Masoud Farivar, Russell Neal, Christopher R. Clarke, Steven H. Low:

Optimal Inverter VAR Control in Distribution Systems with High PV Penetration. - M. Tariq Banday, Nisar Ahmed Shah:

A Study of CAPTCHAs for Securing Web Services. - M. Tariq Banday, Jameel A. Qadri, Tariq R. Jan, Nisar Ahmed Shah:

Detecting Threat E-mails using Bayesian Approach. - M. Tariq Banday, Jameel A. Qadri:

SPAM -- Technological and Legal Aspects. - Brian Eriksson, Laura Balzano, Robert D. Nowak:

High-Rank Matrix Completion and Subspace Clustering with Missing Data. - Ye Wang, Shantanu Rane, Stark C. Draper, Prakash Ishwar:

A Theoretical Analysis of Authentication, Privacy and Reusability Across Secure Biometric Systems. - Jan Bulánek, Michal Koucký, Michael E. Saks:

Tight lower bounds for online labeling problem. - Elif Vural, Pascal Frossard:

Discretization of Parametrizable Signal Manifolds. - Elif Vural, Pascal Frossard:

Learning Smooth Pattern Transformation Manifolds. - Constantinos Daskalakis, Ilias Diakonikolas, Rocco A. Servedio, Gregory Valiant, Paul Valiant:

Testing $k$-Modal Distributions: Optimal Algorithms via Reductions. - Jan Strejcek, Marek Trtík:

Abstracting Path Conditions. - Muhammad Fahad Khan, Saira Beg:

Transferring Voice using SMS over GSM Network. - Kavita Pandey, Abhishek Swaroop:

A Comprehensive Performance Analysis of Proactive, Reactive and Hybrid MANETs Routing Protocols. - Symeon Chouvardas, Konstantinos Slavakis, Yannis Kopsinis, Sergios Theodoridis:

A Sparsity-Aware Adaptive Algorithm for Distributed Learning. - Claude-Pierre Jeannerod, Clément Pernet, Arne Storjohann:

Rank-profile revealing Gaussian elimination and the CUP matrix decomposition. - Jameel A. Qadri, M. Tariq Banday:

Web Accessibility - A timely recognized challenge. - M. Tariq Banday, Jameel A. Qadri:

Phishing - A Growing Threat to E-Commerce. - Eric Blais, Amit Weinstein, Yuichi Yoshida:

Partially Symmetric Functions are Efficiently Isomorphism-Testable. - Ramy Abdallah Tannious, Aria Nosratinia:

Relay-Assisted Interference Channel: Degrees of Freedom. - Catalin Boja:

Security Survey of Internet Browsers Data Managers. - Grigore Rosu, Feng Chen:

Semantics and Algorithms for Parametric Monitoring. - Daniel R. Figueiredo, Bruno F. Ribeiro, Edmundo de Souza e Silva, Don Towsley:

Characterizing Random Walks on Dynamic Graphs. - Muhammad Nazmul Islam, Narayan B. Mandayam, Sastry Kompella:

Optimal Resource Allocation and Relay Selection in Bandwidth and Time Exchange Based Cooperative Forwarding. - J. Christian Attiogbé

:
Dynamic Composition of Evolving Process Types. - Hanan Alhazmi, Nadine Akkari:

An Overview of Context-Aware Vertical Handover Schemes in Heterogeneous Networks. - Najmeh Kamyabpour, Doan B. Hoang:

A study on Modeling of Dependency between Configuration Parameters and Overall Energy Consumption in Wireless Sensor Network (WSN). - Najmeh Kamyabpour, Doan B. Hoang:

Modeling overall energy consumption in Wireless Sensor Networks. - Jan A. Bergstra:

Informatics Perspectives on Decision Taking. - Julio Martin Duarte-Carvajalino, Guillermo Sapiro, Guoshen Yu, Lawrence Carin:

Online Adaptive Statistical Compressed Sensing of Gaussian Mixture Models. - Tetsuo Asano, Kevin Buchin, Maike Buchin, Matias Korman, Wolfgang Mulzer, Günter Rote, André Schulz:

Memory-Constrained Algorithms for Simple Polygons. - Jaffer Gardezi, Leopoldo E. Bertossi:

Query Answering under Matching Dependencies for Data Cleaning: Complexity and Algorithms. - Julia Myint, Thinn Thu Naing:

Management of Data Replication for PC Cluster-based Cloud Storage System. - Sergiu Ivanov, Sergey Verlan:

Random Context and Semi-Conditional Insertion-Deletion Systems. - Zouheir Rezki, Mohamed-Slim Alouini

:
Secure Diversity-Multiplexing Tradeoff of Zero-Forcing Transmit Scheme at Finite-SNR. - (Withdrawn) Usage Des Mesures Pour La Génération Des Règles d'Associations Cycliques.

- M. A. Jaume, Josep Paradells:

Disseny d'un prototipus de xarxa. - (Withdrawn) Search space analysis with Wang-Landau sampling and slow adaptive walks.

- Jeongho Jeon, Anthony Ephremides:

On the Stability of Random Multiple Access with Stochastic Energy Harvesting. - Sina Akbari Mistani, Shervin Minaee, Emad Fatemizadeh:

Multispectral Palmprint Recognition Using a Hybrid Feature. - Jeongho Jeon, Anthony Ephremides:

Neighbor Discovery in a Wireless Sensor Network: Multipacket Reception Capability and Physical-Layer Signal Processing. - J. M. Landsberg, Giorgio Ottaviani:

New lower bounds for the border rank of matrix multiplication. - Meera Sitharam, Menghan Wang, Heping Gao:

Cayley Configuration Spaces of 1-dof Tree-decomposable Linkages, Part I: Structure and Extreme Points. - Meera Sitharam, Menghan Wang, Heping Gao:

Cayley Configuration Spaces of 1-dof Tree-decomposable Linkages, Part II: Combinatorial Characterization of Complexity. - Daniel L. Ruderman:

A self-rendering digital image encoding. - Jianqin Zhou, Jun Liu, Wanquan Liu:

Characterization of $2^n$-periodic binary sequences with fixed 3-error or 4-error linear complexity. - Philip Davies, David Newell, Abigail Davies, Damla Karagozlu:

Multi-Connected Ontologies. - Massimo Morara, Jacopo Mauro, Maurizio Gabbrielli:

Solving XCSP problems by using Gecode. - Juan Pablo Carrascal, Christopher J. Riederer, Vijay Erramilli, Mauro Cherubini, Rodrigo de Oliveira:

Your browsing behavior for a Big Mac: Economics of Personal Information Online. - Seong-Ho (Paul) Hur, Bhaskar D. Rao, Min-Joong Rim, James R. Zeidler:

On the optimal frequency selectivity to maximize multiuser diversity in an OFDMA scheduling system. - Robert Sámal, Tomás Valla:

On the complexity of the guarding game. - Katharine Turner:

Cone fields and topological sampling in manifolds with bounded curvature. - Laurent S. R. Simon, Emmanuel Vincent:

A general framework for online audio source separation. - Laurent Poinsot:

The Tutte-Grothendieck group of a convergent alphabetic rewriting system. - Quoc V. Le, Rajat Monga, Matthieu Devin, Greg Corrado, Kai Chen, Marc'Aurelio Ranzato, Jeffrey Dean, Andrew Y. Ng:

Building high-level features using large scale unsupervised learning. - Abdelaziz Marjane:

d-VFCSR or vectorial FCSR constructed on totally ramified extension of the p-adic numbers. - Muhammad Rafi, Mohammad Shahid Shaikh, Amir Farooq:

Document Clustering based on Topic Maps. - Aditya Mahajan:

Optimal decentralized control of coupled subsystems with control sharing. - M. Rafi, M. Maujood, M. M. Fazal, S. M. Ali:

A comparison of two suffix tree-based document clustering algorithms. - Shuangping Chen, Jun Li, Mi Zhou:

Low and Upper Bound of Approximate Sequence for the Entropy Rate of Binary Hidden Markov Processes. - Weiyu Xu, Meng Wang, Ao Tang:

Sparse Recovery from Nonlinear Measurements with Applications in Bad Data Detection for Power Networks. - Soumitra Pal, Abhiram Ranade:

Scheduling Light-trails in WDM Rings. - Marek Cygan, Marcin Pilipczuk, Michal Pilipczuk:

On group feedback vertex set parameterized by the size of the cutset. - Mingfei Li, Christoffer Ma, Li Ning:

(1+epsilon)-Distance Oracle for Planar Labeled Graph. - Magali Bardet, Jean-Charles Faugère, Bruno Salvy, Pierre-Jean Spaenlehauer:

On the Complexity of Solving Quadratic Boolean Systems. - Pavel Hrubes, Iddo Tzameret:

Short Proofs for the Determinant Identities. - Dhananjay D. M., C. V. Guru Rao, I. V. Muralikrishna:

Automated PolyU Palmprint sample Registration and Coarse Classification. - Fabio Mogavero, Aniello Murano, Giuseppe Perelli, Moshe Y. Vardi:

Reasoning About Strategies: On the Model-Checking Problem. - Loet Leydesdorff, Lutz Bornmann:

Percentile Ranks and the Integrated Impact Indicator (I3). - Esther Vlieger, Loet Leydesdorff:

Visualization and Analysis of Frames in Collections of Messages: Content Analysis and the Measurement of Meaning. - Jonathan Masci, Davide Migliore, Michael M. Bronstein, Jürgen Schmidhuber:

Descriptor learning for omnidirectional image matching. - Seyed Hamed Hassani, Nicolas Macris, Rüdiger L. Urbanke:

Threshold Saturation in Spatially Coupled Constraint Satisfaction Problems. - Alexander Sviridenko, Oleg Shcherbina:

Block local elimination algorithms for solving sparse discrete optimization problems. - Ashraf Hossain:

On the Impact of Energy Dissipation Model on Characteristic Distance in Wireless Networks. - Riccardo Colini-Baldeschi, Monika Henzinger, Stefano Leonardi, Martin Starnberger:

On Multiple Round Sponsored Search Auctions with Budgets. - Md Saifur Rahman, Aaron B. Wagner:

Rate Region of the Vector Gaussian One-Helper Source-Coding Problem. - Michael Moortgat, Richard Moot:

Proof nets for the Lambek-Grishin calculus. - Byron Boots, Geoffrey J. Gordon:

Two-Manifold Problems. - Christopher C. Johnson, Ali Jalali, Pradeep Ravikumar:

High-dimensional Sparse Inverse Covariance Estimation using Greedy Methods. - Aleksandar Stojmirovic, Alexander Bliskovsky, Yi-Kuo Yu:

CytoITMprobe: a network information flow plugin for Cytoscape. - E. Ben-Naim, Paul L. Krapivsky:

Popularity-Driven Networking. - Nicolás Della Penna, Mark D. Reid:

Bandit Market Makers. - Ke Hu, Yi Tang:

Immunization for complex network based on the effective degree of vertex. - Pavel Chebotarev, R. B. Bapat, R. Balaji:

Simple expressions for the long walk distance. - Viacheslav P. Belavkin, Matthew F. Brown:

Q-Adapted Quantum Stochastic Integrals and Differentials in Fock Scale. - Karol Wawrzyniak, Wojciech Wislicki:

Mesoscopic approach to minority games in herd regime. - Bernd Gärtner, Markus Sprecher:

A Polynomial-Time Algorithm for the Tridiagonal and Hessenberg P-Matrix Linear Complementarity Problem. - Weiping Liu, An Zeng, Yanbo Zhou:

Degree heterogeneity in spatial networks with total cost constraint. - Mohamed-Ali Belabbas:

Singularities and global stability of decentralized formations in the plane. - Ophir Flomenbom:

Fairness in society. - Arian Maleki, Manjari Narayan, Richard G. Baraniuk:

Anisotropic Nonlocal Means Denoising. - Fabrizio Bocchino, Javier López-Santiago

, Juan F. Albacete-Colombo, Niccolò Bucciantini
:
YouASTRO: a web-based bibliography management system with distributed comments and rating features for SAO/NASA ADS papers. - Hassan Halabian, Ioannis Lambadaris, Chung-Horng Lung:

Explicit Characterization of Stability Region for Stationary Multi-Queue Multi-Server Systems. - Nam H. Nguyen, Trac D. Tran:

Robust Lasso with missing and grossly corrupted observations. - Aleksandar Dogandzic, Renliang Gu, Kun Qiu:

Mask Iterative Hard Thresholding Algorithms for Sparse Image Reconstruction of Objects with Known Contour. - Gabriela Jeronimo, Daniel Perrucci, Elias P. Tsigaridas:

On the minimum of a polynomial function on a basic closed semialgebraic set and applications. - Andrew M. Childs, Shelby Kimmel, Robin Kothari:

The quantum query complexity of read-many formulas. - Adán Cabello, Lars Eirik Danielsen, Antonio J. Lopez-Tarrida, José Ramón Portillo:

Quantum social networks. - Theja Tulabandhula, Cynthia Rudin:

Machine Learning with Operational Costs. - Zhengjun Xi, Xiaoguang Wang, Yongming Li:

Measurement-induced nonlocality based on the relative entropy. - Amir Ali Ahmadi:

On the Difficulty of Deciding Asymptotic Stability of Cubic Homogeneous Vector Fields. - Massimo Brescia

, Anna Corazza, Stefano Cavuoti, Giovanni D'Angelo, Raffaele D'Abrusco, Ciro Donalek, S. George Djorgovski, Natalia Deniskina
, Michelangelo Fiore, Mauro Garofalo, Omar Laurino, Giuseppe Longo, Ashish Mahabal, Francesco Manna, Alfonso Nocella, B. Skordovski:
The DAME/VO-Neural Infrastructure: an Integrated Data Mining System Support for the Science Community. - Massimo Brescia, Stefano Cavuoti, Raffaele D'Abrusco, Omar Laurino, Giuseppe Longo:

DAME: A Distributed Data Mining & Exploration Framework within the Virtual Observatory. - Victor M. Preciado, Michael M. Zavlanos, Ali Jadbabaie:

Spectral Design of Dynamic Networks via Local Operations. - Akira Ishii, Takehiro Matsumoto, Shinji Miki:

Revenue Prediction of Local Event using Mathematical Model of Hit Phenomena. - Thomas P. Hayes:

How Not to Win a Million Dollars: A Counterexample to a Conjecture of L. Breiman. - Greg Kuperberg:

Knottedness is in NP, modulo GRH. - Alex Bombrun, Jean-Baptiste Pomet

:
The Averaged Control System of Fast Oscillating Control Systems. - Eduardo Cattani, María Angélica Cueto, Alicia Dickenstein, Sandra Di Rocco, Bernd Sturmfels:

Mixed Discriminants. - Huina Mao, Scott Counts, Johan Bollen:

Predicting Financial Markets: Comparing Survey,News, Twitter and Search Engine Data. - Mark Heiligman:

Quantum Verification of Minimum Spanning Tree. - Akira Ishii, Hisashi Arakaki, Naoya Matsuda, Sanae Umemura, Tamiko Urushidani, Naoya Yamagata, Narihiko Yoshda:

Mathematical model for hit phenomena as stochastic process of interactions of human interactions. - Michalis Vafopoulos:

Looking for grass-root sources of systemic risk: the case of "cheques-as-collateral" network. - Hassan Halabian, Ioannis Lambadaris, Chung-Horng Lung:

Optimal Server Assignment in Multi-Server Queueing Systems with Random Connectivities. - Philipp Hennig, Christian J. Schuler:

Entropy Search for Information-Efficient Global Optimization. - Michael Szell, Roberta Sinatra, Giovanni Petri, Stefan Thurner, Vito Latora:

Understanding mobility in a social petri dish. - Emanuele Massaro, Andrea Guazzini, Franco Bagnoli, Pietro Liò:

Information dynamics algorithm for detecting communities in networks. - Fabio Iannello, Osvaldo Simeone, Umberto Spagnolini:

On the Optimal Scheduling of Independent, Symmetric and Time-Sensitive Tasks. - Filippo Disanto, Thomas Wiehe:

Some combinatorial problems on binary rooted trees occurring in population genetics. - Chun-Ying Chiang, Liang-Hao Huang, Wei-Ting Huang, Hong-Gwa Yeh:

The Target Set Selection Problem on Cycle Permutation Graphs, Generalized Petersen Graphs and Torus Cordalis. - Claudius Gros:

Emotional control - conditio sine qua non for advanced artificial intelligences? - Michel Eduardo Beleza Yamagishi, Roberto Hirochi Herai:

Chargaff's "Grammar of Biology": New Fractal-like Rules. - David Conlon, Jacob Fox, Benny Sudakov:

Two extensions of Ramsey's theorem. - Gábor Mocsár, Balázs Kreith, Jan Buchholz, Jan Wolfgang Krieger, Jörg Langowski, György Vámosi:

Multiplexed multiple-τ auto- and cross- correlators on a single FPGA. - Alberto Accomazzi, Sébastien Derriere, Chris Biemesderfer

, Norman Gray:
Why don't we already have an Integrated Framework for the Publication and Preservation of all Data Products? - Jonathan Carroll-Nellenback, Brandon Shroyer, Adam Frank, Chen Ding:

Efficient Parallelization for AMR MHD Multiphysics Calculations; Implementation in AstroBEAR. - Carsten Grabow, Stefan Grosskinsky, Marc Timme:

Small-world spectra in mean field theory. - Raúl Isea, Er-Wei Bai, Karl E. Lonngren:

On the Long-term Health Care Crisis. A Possible Eradication Scenario. - Hassan Halabian, Ioannis Lambadaris, Chung-Horng Lung:

Delay Optimal Server Assignment to Symmetric Parallel Queues with Random Connectivities. - Alan J. Aw:

The multicovering radius problem for some types of discrete structures. - Joris Bierkens, Bert Kappen:

KL-learning: Online solution of Kullback-Leibler control problems. - G. D. Paparo, M. A. Martin-Delgado:

Google in a Quantum Network. - Vimal Kishore, M. S. Santhanam, R. E. Amritkar:

Extreme event-size fluctuations in biased random walks on networks. - Robert W. Chen, Burton Rosenberg:

How to Lose with Least Probability. - Joseph W. Norman:

Resolving Gödel's Incompleteness Myth: Polynomial Equations and Dynamical Systems for Algebraic Logic. - Simon J. Gay:

Stabilizer States as a Basis for Density Matrices. - Octavio A. González-Estrada, Juan José Ródenas, Stéphane P. A. Bordas, Marc Duflot, Pierre Kerfriden, Eugenio Giner:

On the role of enrichment and statical admissibility of recovered fields in a-posteriori error estimation for enriched finite element methods. - Massimo Di Pierro, James Hetrick, Shreyas Cholia, David Skinner:

Making QCD Lattice Data Accessible and Organized through Advanced Web Interfaces. - Javier Borge-Holthoefer, Yamir Moreno:

Absence of influential spreaders in rumor dynamics. - Anna Karpowicz, Krzysztof Szajowski:

Anglers' fishing problem. - Michalis Smyrnakis, David S. Leslie:

Adaptive Forgetting Factor Fictitious Play. - Haroldo V. Ribeiro, Luciano Zunino, Renio S. Mendes, Ervin K. Lenzi:

Complexity-entropy causality plane: a useful approach for distinguishing songs. - Bamdev Mishra, Gilles Meyer, Francis R. Bach, Rodolphe Sepulchre:

Low-rank optimization with trace norm penalty. - Jacob Fox, János Pach, Andrew Suk:

The number of edges in k-quasi-planar graphs. - Zhao-Guo Xuan, Zhan Li, Jian-Guo Liu:

Information Filtering via Implicit Trust-based Network. - Jian-Guo Liu, Tao Zhou, Qiang Guo:

Information filtering via biased heat conduction. - Alireza Abbasi:

Hybrid Centrality Measures and its application for co-authorship analysis. - Taichi Haruna, Kohei Nakajima:

Permutation Complexity via Duality between Values and Orderings. - Peter Scheiblechner:

Effective de Rham Cohomology - The Hypersurface Case. - Taichi Haruna, Kohei Nakajima:

Permutation Excess Entropy and Mutual Information between the Past and Future. - Taichi Haruna, Kohei Nakajima:

Symbolic transfer entropy rate is. - Matjaz Perc:

Success-driven distribution of public goods promotes cooperation but preserves defection. - Raffaella Burioni, Riccardo Scalco, Mario Casartelli:

Rohlin Distance and the Evolution of Influenza A virus: Weak Attractors and Precursors. - Xiao-Tong Yuan, Tong Zhang:

Truncated Power Method for Sparse Eigenvalue Problems. - Rob Hall, Alessandro Rinaldo, Larry A. Wasserman:

Random Differential Privacy. - Bernhard Schölkopf, Dominik Janzing, Jonas Peters, Kun Zhang:

Robust Learning via Cause-Effect Models. - Sasikanth Manipatruni, Dmitri E. Nikonov, Ian A. Young:

Circuit Theory for Analysis and Design of Spintronic Integrated Circuits. - Yohji Akama:

A new order theory of set systems and better quasi-orderings. - Shintaro Mori, Masato Hisakado, Taiki Takahashi:

Phase transition to two-peaks phase in an information cascade voting experiment. - Josep Freixas, Sascha Kurz:

On $α$-roughly weighted games. - Murray R. Bremner, Jiaxiong Hu:

The fundamental invariants of 3 x 3 x 3 arrays. - Christian M. Schneider, Tamara Mihaljev, Hans J. Herrmann:

Inverse targeting -- an effective immunization strategy. - Paul Cueva, Robert Hovden, Julia A. Mundy, Huolin L. Xin, David A. Muller:

Data Processing For Atomic Resolution EELS. - Andrew Ensor, Felipe Lillo:

Counting the Number of Minimal Paths in Weighted Coloured-Edge Graphs. - James M. Whitacre, Sergei P. Atamas:

The Diversity Paradox: How Nature Resolves an Evolutionary Dilemma. - James M. Whitacre, Axel Bender:

Pervasive Flexibility in Living Technologies through Degeneracy Based Design. - Fabien Alibart, Stéphane Pleutin, Olivier Bichler, Christian Gamrat, Teresa Serrano-Gotarredona, Bernabé Linares-Barranco, Dominique Vuillaume:

A memristive nanoparticle/organic hybrid synapstor for neuro-inspired computing. - Federica Cerina, Vincenzo De Leo, Marc Barthelemy, Alessandro Chessa:

Spatial correlations in attribute communities. - Till Hoffmann, Mason A. Porter, Renaud Lambiotte:

Generalized Master Equations for Non-Poisson Dynamics on Networks. - Andris Ambainis, Arturs Backurs, Kaspars Balodis, Dmitry Kravchenko, Raitis Ozols, Juris Smotrovs, Madars Virza:

Quantum strategies are better than classical in almost any XOR game. - Andris Ambainis, Arturs Backurs, Nikolajs Nahimovs, Raitis Ozols, Alexander Rivosh:

Search by quantum walks on two-dimensional grid without amplitude amplification. - Daniel Heldt, Kolja B. Knauer, Torsten Ueckerdt:

On the bend-number of planar and outerplanar graphs. - Silvia Ghilezan, Jelena Ivetic, Pierre Lescanne, Silvia Likavec:

Resource control and strong normalisation. - Stefano Cardanobile, Volker Pernice, Moritz Deger, Stefan Rotter:

Discovering universal statistical laws of complex networks. - Will Johnson:

The Combinatorial Game Theory of Well-Tempered Scoring Games. - Mark Huber, Sarah Schott:

Random construction of interpolating sets for high dimensional integration. - Christoph Adami:

The use of information theory in evolutionary biology. - Bassam Bamieh, Mihailo R. Jovanovic, Partha P. Mitra, Stacy Patterson:

Coherence in Large-Scale Networks: Dimension-Dependent Limitations of Local Feedback. - Theodore P. Hill, Erika Rogers:

Gender Gaps in the Mathematical Sciences: The Creativity Factor. - Fu Lin, Makan Fardad, Mihailo R. Jovanovic:

Optimal Control of Vehicular Formations with Nearest Neighbor Interactions. - Peggy Cénac, Brigitte Chauvin, Frédéric Paccaut, Nicolas Pouyanne:

Uncommon Suffix Tries. - Mikko Kivelä, Raj Kumar Pan, Kimmo Kaski, János Kertész, Jari Saramäki, Márton Karsai:

Multiscale Analysis of Spreading in a Large Communication Network. - David Duvenaud, Hannes Nickisch, Carl Edward Rasmussen:

Additive Gaussian Processes. - Fernando Ruiz-Vega, M. Carmen Clemente, Pablo Otero, José F. Paris:

Ricean Shadowed Statistical Characterization of Shallow Water Acoustic Channels for Wireless Communications. - Lucas D. Valdez, Pablo A. Macri, Lidia A. Braunstein:

Intermittent social distancing strategy for epidemic control. - Ery Arias-Castro, Joseph Salmon, Rebecca Willett:

Oracle inequalities and minimax rates for non-local means and related adaptive kernel-based methods. - Stefano Lonardi, Denisa Duma, Matthew Alpert, Francesca Cordero, Marco Beccuti, Prasanna Bhat, Yonghui Wu, Gianfranco Ciardo, Burair Alsaihati, Yaqin Ma, Steve Wanamaker, Josh Resnik, Timothy J. Close:

Barcoding-free BAC Pooling Enables Combinatorial Selective Sequencing of the Barley Gene Space. - Naohito Nakasato:

Implementation of a Parallel Tree Method on a GPU. - Wen-Qiang Wang, Qian-Ming Zhang, Tao Zhou:

Evaluating Network Models: A Likelihood Analysis. - Richard P. Brent:

Finding many D-optimal designs by randomised decomposition and switching. - Tom Britton, David Lindenstrand:

Inhomogeneous epidemics on weighted networks. - Scott D. Pauls, Daniel Remondini:

A measure of centrality based on the spectrum of the Laplacian. - Matjaz Perc:

Does strong heterogeneity promote cooperation by group interactions? - Steven Sperber, John Voight:

Computing zeta functions of sparse nondegenerate hypersurfaces. - Vladimir Anashin:

The Non-Archimedean Theory of Discrete Systems. - Katharine Anderson:

Collaboration Network Formation and the Demand for Problem Solvers with Heterogenous Skills. - Tianyi Zhou, Dacheng Tao:

Bilateral Random Projections. - Toshihiro Tanizawa, Shlomo Havlin, Harry Eugene Stanley:

Robustness of onion-like correlated networks against targeted attacks. - Steven Kelk, Leo van Iersel, Nela Lekic, Simone Linz, Céline Scornavacca, Leen Stougie:

Cycle killer... qu'est-ce que c'est? On the comparative approximability of hybridization number and directed feedback vertex set. - Yuriy V. Pershin, Massimiliano Di Ventra:

Teaching Memory Circuit Elements via Experiment-Based Learning. - John C. Snyder, Matthias Rupp, Katja Hansen, Klaus-Robert Müller, Kieron Burke:

Finding Density Functionals with Machine Learning. - Volker Gebhardt, Juan González-Meneses:

Generating random braids. - Joshua T. Vogelstein, John M. Conroy, Louis J. Podrazik, Steven G. Kratzer, Donniell E. Fishkind, R. Jacob Vogelstein, Carey E. Priebe:

Fast Inexact Graph Matching with Applications in Statistical Connectomics. - Deeparnab Chakrabarty, Sampath Kannan:

Variance on the Leaves of a Tree Markov Random Field: Detecting Character Dependencies in Phylogenies. - Vida Dujmovic, Gwenaël Joret, David R. Wood:

Nonrepetitive Colouring via Entropy Compression. - Yubo Wang, Gaoxi Xiao, Jian Liu:

Dynamics of competing ideas in complex social systems. - Wesley Nunes Gonçalves, Alexandre Souto Martinez, Odemir Martinez Bruno:

Complex network classification using partially self-avoiding deterministic walks. - Sivaraman Balakrishnan, Alessandro Rinaldo, Don Sheehy, Aarti Singh, Larry A. Wasserman:

Minimax Rates for Homology Inference. - Mike A. Botchev:

Residual, restarting and Richardson iteration for the matrix exponential, revised. - Zimo Yang, Tao Zhou:

Epidemic Spreading in Weighted Networks: An Edge-Based Mean-Field Solution. - Neil Houlsby, Ferenc Huszar, Zoubin Ghahramani, Máté Lengyel:

Bayesian Active Learning for Classification and Preference Learning. - Oliver Knill:

On the Dimension and Euler characteristic of random graphs. - Zuowei Shen, Zhiqiang Xu:

On B-spline framelets derived from the unitary extension principle. - G. J. Peterson, Ken A. Dill:

Power-law distribution functions derived from maximum entropy and a symmetry relationship. - Tamás Nepusz, Tamás Vicsek:

Controlling edge dynamics in complex networks. - Tiago P. Peixoto:

The entropy of stochastic blockmodel ensembles. - Diego R. Amancio, Eduardo G. Altmann, Osvaldo N. Oliveira Jr., Luciano da Fontoura Costa:

Comparing intermittency and network measurements of words and their dependency on authorship. - Yasuhiro Takahashi, Seiichiro Tani:

Constant-Depth Exact Quantum Circuits for the OR and Threshold Functions. - Nuno Crokidakis, Fabricio L. Forgerini:

Competition among reputations in the 2D Sznajd model: Spontaneous emergence of democratic states. - Stefano Gallozzi:

Holographic Grid Cloud, a futurable high storage technology for the next generation astronomical facilities. - Xiaochuan Zhao, Ali H. Sayed:

Diffusion Adaptation over Networks under Imperfect Information Exchange and Non-stationary Data. - Ery Arias-Castro:

Detecting a Vector Based on Linear Measurements. - Marina Jeaneth Machicao, Anderson G. Marco, Odemir Martinez Bruno:

Chaotic Encryption Method Based on Life-Like Cellular Automata. - Ricardo Fabbri, Wesley Nunes Gonçalves, Francisco J. P. Lopes, Odemir Martinez Bruno:

Multi-q Analysis of Image Patterns. - Feng Guo:

SDPTools: High Precision SDP Solver in Maple. - Jierui Xie, Jeffrey Emenheiser, Matthew Kirby, Sameet Sreenivasan, Boleslaw K. Szymanski, György Korniss:

Evolution of opinions on social networks in the presence of competing committed groups. - Shalosh B. Ekhad, Doron Zeilberger:

How to Gamble If You're In a Hurry. - Rob Seaman

:
An Inventory of UTC Dependencies for IRAF. - Farhad Farokhi

, Cedric Langbort, Karl Henrik Johansson:
Decentralized Disturbance Accommodation with Limited Plant Model Information. - Farhad Farokhi

, Cedric Langbort, Karl Henrik Johansson:
Optimal Structured Static State-Feedback Control Design with Limited Model Information for Fully-Actuated Systems. 


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID