default search action
CoRR, March 2013
- Feng Yan, Philippe Martins, Laurent Decreusefond:
Accuracy of Homology based Coverage Hole Detection for Wireless Sensor Networks on Sphere. - Denis S. Krotov, Vladimir N. Potapov:
Construction of transitive MDS codes. - Lamiaa Fattouh Ibrahim, Manal El Harby:
Enhancing Clustering Algorithm to Plan Efficient Mobile Network. - Min Chih Lin, Michel J. Mizrahi, Jayme Luiz Szwarcfiter:
An $O^*(1.1939^n)$ time algorithm for minimum weighted dominating induced matching. - Florent R. Madelaine, Barnaby Martin:
QCSP on partially reflexive cycles - the wavy line of tractability. - Zoltán Ésik:
A connection between concurrency and language theory. - Bogdan State, Patrick S. Park, Ingmar Weber, Yelena Mejova, Michael W. Macy:
The Mesh of Civilizations and International Email Flows. - Maziyar Hamdi, Vikram Krishnamurthy, Gang George Yin:
Tracking the Empirical Distribution of a Markov-modulated Duplication-Deletion Random Graph. - Mohammad Shahrokh Esfahani, Masoumeh Nasiri-Kenari:
A Cooperative MARC Scheme Using Analogue Network Coding to Achieve Second-Order Diversity. - Markus Klotzbücher, Geoffrey Biggs, Herman Bruyninckx:
Pure Coordination using the Coordinator--Configurator Pattern. - Shengtian Yang:
Entropy Distance. - Fabio Mogavero, Aniello Murano, Moshe Y. Vardi:
Proceedings 1st International Workshop on Strategic Reasoning, SR 2013, Rome, Italy, March 16-17, 2013. EPTCS 112, 2013 [contents] - Michael A. Forbes, Amir Shpilka:
Explicit Noether Normalization for Simultaneous Conjugation via Polynomial Identity Testing. - Nirmal Shende, Özgür Gürbüz, Elza Erkip:
Half-Duplex or Full-Duplex Relaying: A Capacity Analysis under Self-Interference. - Frank Havemann, Michael Heinz, Jochen Gläser, Alexander Struck:
Estimating Thematic Similarity of Scholarly Papers with Their Resistance Distance in an Electric Network Model. - Przemyslaw Kazienko, Katarzyna Musial, Tomasz Kajdanowicz:
Multidimensional Social Network in the Social Recommender System. - Tomasz Kajdanowicz, Przemyslaw Kazienko, Piotr Doskocz:
Label-dependent Feature Extraction in Social Networks for Node Classification. - Sanket Kamthe, Smriti Gopinath:
Optimal Threshold Scheduler for Cellular Networks. - Nina Vaits, Edward Moroshko, Koby Crammer:
Second-Order Non-Stationary Online Learning for Regression. - Pak Hou Che, Minghua Chen, Tracey Ho, Sidharth Jaggi, Michael Langberg:
Routing for Security in Networks with Adversarial Nodes. - Mojtaba Soltanalian, Petre Stoica:
Designing Unimodular Codes via Quadratic Optimization is not Always Hard. - Gabriel Prat-Masramon, Lluís Belanche:
Exploiting the Accumulated Evidence for Gene Selection in Microarray Gene Expression Data. - Hong-Han Shuai, De-Nian Yang, Philip S. Yu, Chih-Ya Shen, Ming-Syan Chen:
Pattern Based Graph Generator. - Michael Peleg, Shlomo Shamai:
On sparse sensing and sparse sampling of coded signals at sub-Landau rates. - Aysajan Abidin, Jan-Åke Larsson:
Direct Proof of Security of Wegman-Carter Authentication with Partially Known Key. - Phillip Lord:
The Semantic Web takes Wing: Programming Ontologies with Tawny-OWL. - Saravanan Kumarasamy, T. Stephen Thangaraj:
A Pattern Recognition Approach To Secure Cipher Documents. - Srishti Shukla, B. Sundar Rajan:
Wireless Network-Coded Multi-Way Relaying Using Latin Hyper-Cubes. - Liang Feng Zhang:
A Coding-Theoretic Application of Baranyai's Theorem. - Crysttian Arantes Paixão, Flávio Codeço Coelho:
Computable Compressed Matrices. - Wei-Lun Hung, Vijay K. Garg:
AutoSynch: An Automatic-Signal Monitor Based on Predicate Tagging. - Uri Kartoun:
Inverse Signal Classification for Financial Instruments. - Katarzyna Musial, Przemyslaw Kazienko, Tomasz Kajdanowicz:
Social Recommendations within the Multimedia Sharing Systems. - Arvind Yedla, Mostafa El-Khamy, Jungwon Lee, Inyup Kang:
Performance of Spatially-Coupled LDPC Codes and Threshold Saturation over BICM Channels. - Wesam Elshamy, Hassan M. Emara, Ahmed Bahgat:
Clubs-based Particle Swarm Optimization. - Ernst W. Mayer:
Efficient long division via Montgomery multiply. - Xi Li, Guosheng Lin, Chunhua Shen, Anton van den Hengel, Anthony R. Dick:
Learning Hash Functions Using Column Generation. - T. Tony Cai, Wenxin Zhou:
Matrix completion via max-norm constrained optimization. - Thiago C. Silva, Diego R. Amancio:
Network-based stochastic competitive learning approach to disambiguation in collaborative networks. - Hadi Ahmadi, Reihaneh Safavi-Naini:
Secure Distance Bounding Verification using Physical-Channel Properties. - Diego R. Amancio, Osvaldo N. Oliveira Jr., Luciano da F. Costa:
Structure-semantics interplay in complex networks and its effects on the predictability of similarity in texts. - Ramesh Babu, George Abraham, Kiransinh Borasia:
A Review On Securing Distributed Systems Using Symmetric Key Cryptography. - Jeremiah Blocki, Nicolas Christin, Anupam Datta, Ariel D. Procaccia, Arunesh Sinha:
Audit Games. - Xi Peng, Lei Zhang, Zhang Yi:
Inductive Sparse Subspace Clustering. - Gunjan Kumar, Saswata Shannigrahi:
New Online Algorithm for Dynamic Speed Scaling with Sleep State. - Alexander K. Petrenko, Holger Schlingloff:
Proceedings Eighth Workshop on Model-Based Testing, MBT 2013, Rome, Italy, 17th March 2013. EPTCS 111, 2013 [contents] - Derrick Wing Kwan Ng, Robert Schober:
Spectral Efficient Optimization in OFDM Systems with Wireless Information and Power Transfer. - Jan A. Bergstra, Cornelis A. Middelburg, Gheorghe Stefanescu:
Network algebra for synchronous dataflow. - Naim Bajçinca:
On computation of the total set of robust discrete-time PID controllers. - Thomas J. Lampoltshammer, Thomas Nowotny, Stefan Plank:
ICT System Design & Implementation Using Wireless Sensors to Support Elderly In-home Assistance. - Waqas Ahmed Imtiaz, Muhammad Afaq, Muhammad Asmatullah Khan Babar:
mSCTP Based Decentralized Mobility Framework. - Ahmad Al Badawi, Qasem Abu Al-Haija:
IRS for Computer Character Sequences Filtration: a new software tool and algorithm to support the IRS at tokenization process. - Xiujun Zhang, Yin Sun, Xiang Chen, Shidong Zhou, Jing Wang, Ness B. Shroff:
Distributed Power Allocation for Coordinated Multipoint Transmissions in Distributed Antenna Systems. - Kunal N. Chaudhury:
On the convergence of the IRLS algorithm in Non-Local Patch Regression. - Anwar Pasha Deshmukh, Riyazuddin Qureshi:
Transparent Data Encryption -- Solution for Security of Database Contents. - Ahmet Erdem Sariyüce, Kamer Kaya, Erik Saule, Ümit V. Çatalyürek:
Incremental Algorithms for Network Management and Analysis based on Closeness Centrality. - Naim Bajçinca:
Methods for robust PID control. - Andrew P. Black:
Object-oriented programming: some history, and challenges for the next fifty years. - Kanagavalli V. R., Raja K.:
Detecting and resolving spatial ambiguity in text using named entity extraction and self learning fuzzy logic techniques. - Boyan Bonev, Gema Ramírez-Sánchez, Sergio Ortiz-Rojas:
Statistical sentiment analysis performance in Opinum. - Kanagavalli V. R., Raja K.:
A Study on Application of Spatial Data Mining Techniques for Rural Progress. - Jayaraman J. Thiagarajan, Karthikeyan Natesan Ramamurthy, Andreas Spanias:
Learning Stable Multilevel Dictionaries for Sparse Representation of Images. - Min Wu, Zhengfeng Yang, Wang Lin:
Domain-of-Attraction Estimation for Uncertain Non-polynomial Systems. - Kawser Wazed Nafi, Tonny Shekha Kar, Md. Amjad Hossain, M. M. A. Hashem:
An Advanced Certain Trust Model Using Fuzzy Logic and Probabilistic Logic theory. - N. Priyadharshini, M. S. Vijaya:
Genetic Programming for Document Segmentation and Region Classification Using Discipulus. - Moslema Jahan, M. M. A. Hashem, Gazi Abdullah Shahriar:
Distributed Evolutionary Computation: A New Technique for Solving Large Number of Equations. - Dionysios S. Kalogerias, Nikolaos Chatzipanagiotis, Michael M. Zavlanos, Athina P. Petropulu:
Mobile Jammers for Secrecy Rate Maximization in Cooperative Networks. - Tanay Dey, M. M. A. Hashem, Subroto Kumar Mondal:
On Performance Analysis of AMBR Protocol in Mobile Ad Hoc Networks. - Mahsa Mohseni:
Has your organization compliance with ISMS? A case study in an Iranian Bank. - Shenshi Chen:
Monomial Testing and Applications. - Zhuangming Shen, Jiuai Sun, Hui Zhang, Binjie Qin:
Scale Selection of Adaptive Kernel Regression by Joint Saliency Map for Nonrigid Image Registration. - Djallel Bouneffouf:
Situation-Aware Approach to Improve Context-based Recommender System. - Folke Mitzlaff, Gerd Stumme:
Onomastics 2.0 - The Power of Social Co-Occurrences. - Djallel Bouneffouf:
Optimizing an Utility Function for Exploration / Exploitation Trade-off in Context-Aware Recommender System. - Leena H. Patil, Mohammed Atique:
A Semantic approach for effective document clustering using WordNet. - Kamal Kumar Ghanshala, Durgesh Pant, Jatin Pandey:
A Gaps Approach to Access the Efficiency and Effectiveness of IT-Initiatives In Rural Areas: case study of Samalta, a village in the central Himalayan Region of India. - Xiaogang Liu, Yuan Luo:
The Weight Distributions of a Class of Cyclic Codes with Three Nonzeros over F3. - Peter Sasvari, Zsuzsa Majoros:
Comparison of the Information Technology Development in Slovakia and Hungary. - Hakob Aslanyan, José D. P. Rolim:
Quantitative Characterization of Randomly Roving Agents. - Marco Di Renzo, Alessandro Guidotti, Giovanni Emanuele Corazza:
Average Rate of Downlink Heterogeneous Cellular Networks over Generalized Fading Channels - A Stochastic Geometry Approach. - Ayad Ghany Ismaeel, Anar Auda Ablahad:
Novel Method for Mutational Disease Prediction using Bioinformatics Techniques and Backpropagation Algorithm. - (Withdrawn) A Joint Localization and Clock Bias Estimation Technique Using Time-of-Arrival at Multiple Antenna Receivers.
- Jun Zhang, Xinran Li, Fang-Wei Fu:
Security Analysis on "An Authentication Code Against Pollution Attacks in Network Coding". - Taher Zaki, Mustapha Amrouch, Driss Mammass, Abdellatif Ennaji:
Arabic documents classification using fuzzy R.B.F. classifier with sliding window. - Matthew C. Valenti, Don J. Torrieri, Salvatore Talarico:
Adjacent-Channel Interference in Frequency-Hopping Ad Hoc Networks. - En-Hui Yang, Jin Meng:
New Non-asymptotic Random Channel Coding Theorems. - Jayaraman J. Thiagarajan, Karthikeyan Natesan Ramamurthy, Andreas Spanias:
Multiple Kernel Sparse Representations for Supervised and Unsupervised Learning. - Yichao Huang, Bhaskar D. Rao:
Random Beamforming with Heterogeneous Users and Selective Feedback: Individual Sum Rate and Individual Scaling Laws. - Dionysios S. Kalogerias, Athina P. Petropulu:
On the Coherence Properties of Random Euclidean Distance Matrices. - Tao Zhu, David Phipps, Adam Pridgen, Jedidiah R. Crandall, Dan S. Wallach:
The Velocity of Censorship: High-Fidelity Detection of Microblog Post Deletions. - Kawser Wazed Nafi, Tonny Shekha Kar, Sayed Anisul Hoque, M. M. A. Hashem:
A Newer User Authentication, File encryption and Distributed Server Based Cloud Computing Security Architecture. - Per Austrin, Petteri Kaski, Mikko Koivisto, Jussi Määttä:
Space--Time Tradeoffs for Subset Sum: An Improved Worst Case Algorithm. - Subra Mukherjee, Karen Das:
Omega Model for Human Detection and Counting for application in Smart Surveillance System. - Joyeeta Singha, Karen Das:
Indian Sign Language Recognition Using Eigen Value Weighted Euclidean Distance Based Classification Technique. - Jeemoni Kalita, Karen Das:
Recognition of Facial Expression Using Eigenvector Based Distributed Features and Euclidean Distance Based Decision Making Technique. - A. Meena, K. Raja:
Automatic symmetry based cluster approach for anomalous brain identification in PET scan image : An Analysis. - A. Meena, R. Raja:
Symmetry Based Cluster Approach for Automatic Recognition of the Epileptic Focus in Brain Using PET Scan Image : An Analysis. - Anwitaman Datta, Stefano Braghin, Jackson Tan Teck Yong:
The Zen of Multidisciplinary Team Recommendation. - A. Meena, R. Raja:
Spatial Fuzzy C Means PET Image Segmentation of Neurodegenerative Disorder. - Xiao-Lei Zhang, Ji Wu:
Denoising Deep Neural Networks Based Voice Activity Detection. - Florent Garcin, Christos Dimitrakakis, Boi Faltings:
Personalized News Recommendation with Context Trees. - Dipasree Pal, Mandar Mitra, Kalyankumar Datta:
Query Expansion Using Term Distribution and Term Association. - Wataru Kumagai, Masahito Hayashi:
Second Order Asymptotics for Random Number Generation. - Mohammad Hossein Yassaee, Mohammad Reza Aref, Amin Gohari:
Non-Asymptotic Output Statistics of Random Binning and Its Applications. - Mohammad Hossein Yassaee, Mohammad Reza Aref, Amin Gohari:
A Technique for Deriving One-Shot Achievability Results in Network Information Theory. - Gianmarco Romano, Domenico Ciuonzo, Pierluigi Salvo Rossi, Francesco Palmieri:
Low-complexity dominance-based Sphere Decoder for MIMO Systems. - Augusto Ferrante, Nicola Laurenti, Chiara Masiero, Michele Pavon, Stefano Tomasin:
On the Achievable Error Region of Physical Layer Authentication Techniques over Rayleigh Fading Channels. - Iztok Fister Jr., Tomaz Kosar, Iztok Fister, Marjan Mernik:
EasyTime++: A case study of incremental domain-specific language development. - Namita Sharma, Vineet Sahula, C. P. Ravikumar:
Energy Aware Task Scheduling for Soft Real Time Systems using an Analytical Approach for Energy Estimation. - Amol Deshpande, Lisa Hellerstein, Devorah Kletenik:
Approximation Algorithms for Stochastic Boolean Function Evaluation and Stochastic Submodular Set Cover. - Carola Doerr, G. Ramakrishna, Jens M. Schmidt:
Computing Minimum Cycle Bases in Weighted Partial 2-Trees in Linear Time. - A. A. Karawia:
New Symbolic Algorithms For Solving A General Bordered Tridiagonal Linear System. - Quentin Barthélemy, Cédric Gouy-Pailler, Yoann Isaac, Antoine Souloumiac, Anthony Larue, Jérôme I. Mars:
Multivariate Temporal Dictionary Learning for EEG. - Robert Hovden:
Bibliometrics for Internet Media: Applying the h-Index to YouTube. - Onur Ozdemir, Ruoyu Li, Pramod K. Varshney:
Hybrid Maximum Likelihood Modulation Classification Using Multiple Radios. - Petr Jancar, Jirí Srba:
Note on Undecidability of Bisimilarity for Second-Order Pushdown Processes. - Kristine Harjes, Pavel Naumov:
Functional Dependence in Strategic Games (extended abstract). 9-15 - Umberto Grandi, Andrea Loreggia, Francesca Rossi, Kristen Brent Venable, Toby Walsh:
Restricted Manipulation in Iterative Voting: Convergence and Condorcet Efficiency. 17-24 - Nicholas Asher, Soumya Paul:
Infinite games with uncertain moves. 25-32 - Nils Bulling, Valentin Goranko:
How to Be Both Rich and Happy: Combining Quantitative and Qualitative Strategic Reasoning about Multi-Player Games (Extended Abstract). 33-41 - Rayna Dimitrova, Bernd Finkbeiner:
Lossy Channel Games under Incomplete Information. 43-51 - Marta Z. Kwiatkowska, David Parker, Aistis Simaitis:
Strategic Analysis of Trust Models for User-Centric Networks. 53-59 - Truls Pedersen, Sjur K. Dyrkolbotn, Piotr Kazmierczak, Erik Parmann:
Concurrent Game Structures with Roles. 61-69 - Simon Busard, Charles Pecheur, Hongyang Qu, Franco Raimondi:
Reasoning about Strategies under Partial Observability and Fairness Constraints. 71-79 - Dimitar P. Guelev:
Reducing Validity in Epistemic ATL to Validity in Epistemic CTL. 81-89 - Christophe Chareton, Julien Brunel, David Chemouil:
Towards an Updatable Strategy Logic. 91-98 - Hélène Kirchner:
A rewriting point of view on strategies. 99-105 - Benedikt Brütsch:
Synthesizing Structured Reactive Programs via Deterministic Tree Automata. 107-113 - Bastien Maubert, Sophie Pinchinat, Laura Bozzelli:
The Complexity of Synthesizing Uniform Strategies. 115-122 - Anirban Dasgupta, Arpita Ghosh:
Crowdsourced Judgement Elicitation with Endogenous Proficiency. - Milad Sefidgaran, Aslan Tchamkerten:
On Cooperation in Multi-Terminal Computation and Rate Distortion. - Yann Ollivier:
Riemannian metrics for neural networks. - Jessica Sherette, Carola Wenk:
Simple Curve Embedding.