


default search action
CoRR, December 2014
- Hao Su, Fan Wang, Li Yi, Leonidas J. Guibas:
3D-Assisted Image Feature Synthesis for Novel Views of an Object. - Johannes Stegmann:
Paradigm shifts. Part I. Collagen. Confirming and complementing the work of Henry Small. - Mohammed Korayem, Robert Templeman, Dennis Chen, David J. Crandall, Apu Kapadia:
ScreenAvoider: Protecting Computer Screens from Ubiquitous Cameras. - Pavel Panteleev
:
Preset Distinguishing Sequences and Diameter of Transformation Semigroups. - Aravindh Mahendran, Andrea Vedaldi:
Understanding Deep Image Representations by Inverting Them. - Aleksandar Nikolov:
Randomized Rounding for the Largest $j$-Simplex Problem. - Liang Wang, Jussi Kangasharju:
Fair Collaborative In-Network Caching Game and Its Cost Analysis on General Network Topologies. - Vinícius A. Battagello
, Carlos H. C. Ribeiro:
Analysis of the Effects of Failure and Noise in the Distributed Connectivity Maintenance of a Multi-robot System. - Simina Brânzei, Ariel D. Procaccia:
Verifiably Truthful Mechanisms. - Ross Drummond, David A. Howey, Stephen R. Duncan:
Low-Order Mathematical Modelling of Electric Double Layer Supercapacitors Using Spectral Methods. - Grégory Rogez, James Steven Supancic III, Deva Ramanan:
Egocentric Pose Recognition in Four Lines of Code. - Behnam Babagholami-Mohamadabadi, Amin Jourabloo, Ali Zarghami, Shohreh Kasaei:
A Bayesian Framework for Sparse Representation-Based 3D Human Pose Estimation. - Grégory Rogez, James Steven Supancic III, Maryam Khademi, José María Martínez Montiel, Deva Ramanan:
3D Hand Pose Detection in Egocentric RGB-D Images. - Yonglong Tian, Ping Luo, Xiaogang Wang, Xiaoou Tang:
Pedestrian Detection aided by Deep Learning Semantic Tasks. - Jingcheng Liu, Pinyan Lu:
FPTAS for #BIS with One Side Degree Bound. - Stefan Mathe, Cristian Sminchisescu:
Multiple Instance Reinforcement Learning for Efficient Weakly-Supervised Detection in Images. - Liang Wang, Jussi Kangasharju:
Inference on the Network Evolution in BitTorrent Mainline DHT. - Mounir Omari, Abdelkaher Ait Abdelouahad, Mohammed El Hassouni, Hocine Cherifi:
Color image quality assessment measure using multivariate generalized Gaussian distribution. - Bernhard von Stengel:
Recursive Inspection Games. - Blazej Zak, Anita Zbieg:
Heuristic for Network Coverage Optimization Applied in Finding Organizational Change Agents. - Alexander V. Evako:
Classification of digital n-manifolds. - Alexander V. Evako:
Topology preserving representations of compact 2D manifolds by digital 2-surfaces. Compressed digital models and digital weights of compact 2D manifolds. Classification of closed surfaces by digital tools. - Marzieh Adelnia, Mohammad Reza Khayyambashi:
Consistency of Commitments in Social Web Services. - Alexandre Défossez, Francis R. Bach:
Constant Step Size Least-Mean-Square: Bias-Variance Trade-offs and Optimal Sampling Distributions. - Onur Özyesil, Amit Singer:
Robust Camera Location Estimation by Convex Programming. - Sebastian Wild
, Markus E. Nebel, Conrado Martínez:
Analysis of Pivot Sampling in Dual-Pivot Quicksort. - Selvarajah Thuseethan, Sinnathamby Kuhanesan:
Usability Evaluation of Learning Management Systems in Sri Lankan Universities. - Alexander V. Evako:
Simple pairs of points in digital spaces. Topology-preserving transformations of digital spaces by contracting simple pairs of points. - Peng Cheng, Xiang Lian, Zhao Chen, Lei Chen, Jinsong Han, Jizhong Zhao:
Reliable Diversity-Based Spatial Crowdsourcing by Moving Workers. - Anna Choromanska, Mikael Henaff, Michaël Mathieu, Gérard Ben Arous, Yann LeCun:
The Loss Surface of Multilayer Networks. - Daniele Perrone, Paolo Favaro:
A Clearer Picture of Blind Deconvolution. - Junil Choi, David James Love, D. Richard Brown III:
Channel Estimation Techniques for Quantized Distributed Reception in MIMO Systems. - Shirin Jalali, Zolfa Zeinalpour-Yazdi, H. Vincent Poor:
Outage Performance of Uplink Two-tier Networks Under Backhaul Constraints. - Sadeep Jayasumana, Richard I. Hartley, Mathieu Salzmann, Hongdong Li, Mehrtash Tafazzoli Harandi:
Kernel Methods on Riemannian Manifolds with Gaussian RBF Kernels. - Ágnes Cseh, David F. Manlove:
Stable marriage and roommates problems with restricted edges: complexity and approximability. - George Papandreou, Iasonas Kokkinos, Pierre-André Savalle:
Untangling Local and Global Deformations in Deep Convolutional Networks for Image Classification and Sliding Window Detection. - Ajay Deshpande:
Guaranteed sensor coverage with the weighted-$D^2$ sampling. - Alan Guo, Swastik Kopparty:
List-decoding algorithms for lifted codes. - Tobias Friedrich, Markus Wagner:
Seeding the Initial Population of Multi-Objective Evolutionary Algorithms: A Computational Study. - Guy Van den Broeck, Mathias Niepert:
Lifted Probabilistic Inference for Asymmetric Graphical Models. - Yuping Shen, Xishun Zhao:
Canonical Logic Programs are Succinctly Incomparable with Propositional Formulas. - Jiajun Liu, Kun Zhao, Philipp Sommer, Shuo Shang, Brano Kusy, Raja Jurdak:
Bounded Quadrant System: Error-bounded Trajectory Compression on the Go. - Ashwin Arulselvan, Ágnes Cseh, Jannik Matuschke:
The Student/Project Allocation problem with group projects. - Jiajun Liu, Kun Zhao, Saeed Khan, Mark A. Cameron, Raja Jurdak:
Multi-scale Population and Mobility Estimation with Geo-tagged Tweets. - Yi-Kai Wang:
Beyond Baker's Technique. - Arturs Backurs, Piotr Indyk:
Edit Distance Cannot Be Computed in Strongly Subquadratic Time (unless SETH is false). - Wanchun Liu, Xiangyun Zhou, Salman Durrani, Petar Popovski:
Secure Communication with a Wireless-Powered Friendly Jammer. - Bahman Kalantari:
An Algorithmic Separating Hyperplane Theorem and Its Applications. - Manas Joglekar, Hector Garcia-Molina, Aditya G. Parameswaran:
Smart Drill Down. - Natarajan Meghanathan, Philip Mumford:
Node Failure Time and Coverage Loss Time Analysis for Maximum Stability Vs Minimum Distance Spanning Tree based Data Gathering in Mobile Sensor Networks. - Burak Demirel, Levent Guvenç:
Parameter Space Design of Repetitive Controllers for Satisfying a Robust Performance Requirement. - Christian Engels:
Dichotomy Theorems for Homomorphism Polynomials of Graph Classes. - John H. E. Lasseter:
The Interpreter In An Undergraduate Compilers Course. - Luís Torgo
:
An Infra-Structure for Performance Estimation and Experimental Comparison of Predictive Models in R. - Chern Hong Lim, Ekta Vats, Chee Seng Chan:
Fuzzy human motion analysis: A review. - Luca Del Pero, Susanna Ricco, Rahul Sukthankar, Vittorio Ferrari:
Recovering Spatiotemporal Correspondence between Deformable Objects by Exploiting Consistent Foreground Motion in Video. - Tejal Bhamre, Teng Zhang, Amit Singer:
Orthogonal Matrix Retrieval in Cryo-Electron Microscopy. - Reza Farrahi Moghaddam, Mohamed Cheriet:
SmartPacket: Re-Distributing the Routing Intelligence among Network Components in SDNs. - Alan J. Hamlet, Carl D. Crane III:
Robotic Behavior Prediction Using Hidden Markov Models. - Marco Autili
, Paola Inverardi, Massimo Tivoli:
Automatic adaptor synthesis for protocol transformation. - Josep Domingo-Ferrer, Alberto Blanco-Justicia:
Group Discounts Compatible with Buyer Privacy. - Emmanuel Filiot, Pierre-Alain Reynier:
On Streaming String Transducers and HDT0L Systems. - Elmar Langetepe, Andreas Lenerz, Bernd Brüggemann:
Strategic deployment in graphs. - Alexandre Talon, Jan Kratochvíl:
Completion of the mixed unit interval graphs hierarchy. - Michael B. Cohen
, Richard Peng:
ℓp Row Sampling by Lewis Weights. - G. Aravind, Gautham Vasan, T. S. B. Gowtham Kumar, Balaji Naresh:
A Control Strategy for an Autonomous Robotic Vacuum Cleaner for Solar Panels. - Naresh Balaji, Esin Yavuz, Thomas Nowotny:
Scalability and Optimization Strategies for GPU Enhanced Neural Networks (GeNN). - Pablo Rauzy, Sylvain Guilley:
Countermeasures Against High-Order Fault-Injection Attacks on CRT-RSA. - Mirko Prezioso, Farnood Merrikh-Bayat, Brian Hoskins, Gina C. Adam, Konstantin K. Likharev, Dmitri B. Strukov:
Training and Operation of an Integrated Neuromorphic Network Based on Metal-Oxide Memristors. - Francesco Renna, Liming Wang, Xin Yuan, Jianbo Yang, Galen Reeves, A. Robert Calderbank, Lawrence Carin, Miguel R. D. Rodrigues:
Classification and Reconstruction of High-Dimensional Signals from Low-Dimensional Noisy Features in the Presence of Side Information. - Mo Ghorbanzadeh, Eugene Visotsky, Weidong Yang, Prakash Moorut, Charles Clancy:
Radar In-Band and Out-of-Band Interference into LTE Macro and Small Cell Uplinks in the 3.5 GHz Band. - Sean Bell, Paul Upchurch, Noah Snavely, Kavita Bala:
Material recognition in the wild with the Materials in Context Database. - Ljubisa Stankovic, Milos Dakovic:
Reconstruction of Randomly Sampled Sparse Signals Using an Adaptive Gradient Algorithm. - Jonathan M. Smith, Neil J. Ross, Peter Selinger, Benoît Valiron:
Quipper: Concrete Resource Estimation in Quantum Algorithms. - Sean Anderson, Timothy D. Barfoot, Chi Hay Tong, Simo Särkkä:
Batch Nonlinear Continuous-Time Trajectory Estimation as Exactly Sparse Gaussian Process Regression. - David J. Rosenbaum:
Beating the Generator-Enumeration Bound for Solvable-Group Isomorphism. - Tuan L. Hoang, Jaime Marian, Vasily V. Bulatov, Peter Hosemann:
Computationally-efficient stochastic cluster dynamics method for modeling damage accumulation in irradiated materials. - Andson Marreiros Balieiro, Kelvin Lopes Dias:
Mapping of Secondary Virtual Networks onto Wireless Substrate based on Cognitive Radio: multi-objective formulation and analysis. - Igor L. Markov:
A review of "Memcomputing NP-complete problems in polynomial time using polynomial resources" (arXiv: 1411.4798). - Sanjeev Saxena:
Still Simpler Way of Introducing Interior-Point method for Linear Programming. - Ali Ayremlou, Thomas A. Goldstein, Ashok Veeraraghavan, Richard G. Baraniuk:
Fast Sublinear Sparse Representation using Shallow Tree Matching Pursuit. - Shuchi Chawla, Konstantin Makarychev, Tselil Schramm, Grigory Yaroslavtsev:
Near Optimal LP Rounding Algorithm for Correlation Clustering on Complete and Complete k-partite Graphs. - Hung D. Nguyen, Konstantin S. Turitsyn:
Robust Stability Assessment in the Presence of Load Dynamics Uncertainty. - Seyedbehzad Nabavi, Aranya Chakrabortty, Pramod P. Khargonekar:
A Global Identifiability Condition for Consensus Networks with Tree Graphs. - Ashutosh Saxena, Ashesh Jain, Ozan Sener, Aditya Jami, Dipendra Kumar Misra, Hema Swetha Koppula:
RoboBrain: Large-Scale Knowledge Engine for Robots. - Shuyang Gao, Greg Ver Steeg, Aram Galstyan:
Understanding confounding effects in linguistic coordination: an information-theoretic approach. - Shuang Song, Biju Issac
:
Analysis of WiFi and WiMAX and Wireless Network Coexistence. - John Wieting:
Tiered Clustering to Improve Lexical Entailment. - Abdelkader Baaziz
, Luc Quoniam:
How to use Big Data technologies to optimize operations in Upstream Petroleum Industry. - Prosenjit Bose, Rolf Fagerberg, André van Renssen, Sander Verdonschot:
Competitive Local Routing with Constraints. - Andrew Thornburg, Tianyang Bai, Robert W. Heath Jr.:
Performance Analysis of mmWave Ad Hoc Networks. - Du Tran, Lubomir D. Bourdev, Rob Fergus, Lorenzo Torresani, Manohar Paluri:
C3D: Generic Features for Video Analysis. - Heng Zhang, Yan Zhang:
Expressiveness of Logic Programs under General Stable Model Semantics. - Mohammadreza Mostajabi, Payman Yadollahpour, Gregory Shakhnarovich:
Feedforward semantic segmentation with zoom-out features. - Sariel Har-Peled:
Shortest Path in a Polygon using Sublinear Space. - Zhizhen Zhao, Yoel Shkolnisky, Amit Singer:
Fast Steerable Principal Component Analysis. - Linus Hamilton:
Braid is undecidable. - Vojtech Vorel, Adam Roman:
Complexity of Road Coloring with Prescribed Reset Words. - Poorna Banerjee Dasgupta:
Analytical Comparison of Noise Reduction Filters for Image Restoration Using SNR Estimation. - Xinping Yi, David Gesbert:
Topological Interference Management with Transmitter Cooperation. - Nikolaj S. Bjørner, Fabio Fioravanti, Andrey Rybalchenko, Valerio Senni:
Proceedings First Workshop on Horn Clauses for Verification and Synthesis, HCVS 2014, Vienna, Austria, 17 July 2014. EPTCS 169, 2014 [contents] - Fumin Shen, Chunhua Shen, Qinfeng Shi, Anton van den Hengel, Zhenmin Tang, Heng Tao Shen:
Hashing on Nonlinear Manifolds. - Peyman Siyari, Hassan Aghaeinia:
Fast and Optimal Power Control Games in Multiuser MIMO Networks. - Pierre-Cyrille Héam, Vincent Hugot, Olga Kouchnarenko:
The Emptiness Problem for Tree Automata with at Least One Disequality Constraint is NP-hard. - Vittorio Bilò:
On the Robustness of the Approximate Price of Anarchy in Generalized Congestion Games. - Thomas Hassan, Rafael Peixoto, Christophe Cruz, Aurélie Bertaux, Nuno Silva:
Semantic HMC for Big Data Analysis. - Yinglei Song:
On the Induced Matching Problem in Hamiltonian Bipartite Graphs. - Sean Gallagher, Wlodek Zadrozny, Walid Shalaby, Adarsh Avadhani:
Watsonsim: Overview of a Question Answering Engine. - Claudio Casetti, Carla-Fabiana Chiasserini, Luciano Curto Pelle, Carolina Del-Valle-Soto, Yufeng Duan, Paolo Giaccone:
Content-centric Routing in Wi-Fi Direct Multi-group Networks. - Meng Wang, Tharaka Samarasinghe, Jamie S. Evans:
Optimizing user selection schemes in vector broadcast channels. - Van Chan Ngo, Axel Legay, Jean Quilbeuf:
Dynamic Verification of SystemC with Statistical Model Checking. - Anas Chaaban, Aydin Sezgin:
On Channel Inseparability and the DoF Region of MIMO Multi-way Relay Channels. - Boris Bellalta, Alessandro Checco, Alessandro Zocca, Jaume Barceló:
On the Interactions between Multiple Overlapping WLANs using Channel Bonding. - Laura Toni, Thomas Maugey, Pascal Frossard:
Optimized Packet Scheduling in Multiview Video Navigation Systems. - Jingshu Chen, Marie Duflot, Stephan Merz:
Analyzing Conflict Freedom For Multi-threaded Programs With Time Annotations. - Boris Aronov, Matthew J. Katz:
Batched Point Location in SINR Diagrams via Algebraic Tools. - Mikhail Kaluzhsky
:
Dropshipping - a revolutionary form movement of goods in the global economic crisis. - Djamal Belazzougui, Travis Gagie, Pawel Gawrychowski, Juha Kärkkäinen, Alberto Ordóñez Pereira, Simon J. Puglisi, Yasuo Tabei:
Queries on LZ-Bounded Encodings. - Ruta Mehta, Vijay V. Vazirani, Sadra Yazdanbod:
Settling Some Open Problems on 2-Player Symmetric Nash Equilibria. - François Gonze, Raphaël M. Jungers, A. N. Trahtman:
A Note on a Recent Attempt to Improve the Pin-Frankl Bound. - Sergey Vostokin:
Templet: a Markup Language for Concurrent Programming. - Joakim Andén, Eugene Katsevich, Amit Singer:
Covariance estimation using conjugate gradient for 3D classification in Cryo-EM. - Zeyuan Allen Zhu, Zhenyu Liao, Lorenzo Orecchia:
Using Optimization to Find Maximum Inscribed Balls and Minimum Enclosing Balls. - Yi Luo, Tharmalingam Ratnarajah, Anastasios K. Papazafeiropoulos:
Degrees-of-Freedom Regions for $K$-User MISO Time-Correlated Broadcast Channel. - Alexei Botchkarev, Patrick Finnigan:
Complexity in the Context of Systems Approach to Project Management. - F. Betül Atalay, Sorelle A. Friedler, Dianna Xu:
Convex Hull for Probabilistic Points. - Marino Miculan, Marco Peressotti:
A CSP implementation of the bigraph embedding problem. - Ramón Casares:
Problem Theory. - (Withdrawn) Three Laws of Multivariable Feedback Systems, Extended Spectral Flatness (Extended Wiener Entropy), 'Uncertainty Principles' in Variance Minimization, and Performance Limitations in Minimum Variance Estimation/Filtering.
- Rie Johnson, Tong Zhang:
Effective Use of Word Order for Text Categorization with Convolutional Neural Networks. - Wolfgang Gatterbauer
, Dan Suciu:
Approximate Lifted Inference with Probabilistic Databases. - Marc Claesen, Jaak Simm, Dusan Popovic, Yves Moreau, Bart De Moor:
Easy Hyperparameter Search Using Optunity. - Gedas Bertasius, Jianbo Shi, Lorenzo Torresani:
DeepEdge: A Multi-Scale Bifurcated Deep Network for Top-Down Contour Detection. - Dmitry Itsykson, Anna Malova, Vsevolod Oparin, Dmitry Sokolov:
Tree-like resolution complexity of two planar problems. - Ahmad Lashgar, Alireza Majidi, Amirali Baniasadi:
IPMACC: Open Source OpenACC to CUDA/OpenCL Translator. - Rafail Ostrovsky, Will Rosenbaum:
It's Not Easy Being Three: The Approximability of Three-Dimensional Stable Matching Problems. - Judy Hoffman, Deepak Pathak, Trevor Darrell, Kate Saenko:
Detector Discovery in the Wild: Joint Multiple Instance and Representation Learning. - Ben D. Fulcher, Antoniya Georgieva, Christopher W. G. Redman, Nick S. Jones:
Highly comparative fetal heart rate analysis. - Dong-hyeon Park, Akhil Bagaria, Fabiha Hannan, Eric Storm, Josef B. Spjut:
Sphynx: A Shared Instruction Cache Exporatory Study. - Ahmed Otoom, Issa Atoum:
An Implementation Framework (IF) for the National Information Assurance and Cyber Security Strategy (NIACSS) of Jordan. - Nima Anari, Shayan Oveis Gharan:
The Kadison-Singer Problem for Strongly Rayleigh Measures and Applications to Asymmetric TSP. - Victor Y. Pan:
Matrix Multiplication, Trilinear Decompositions, APA Algorithms, and Summation. - Emanuele De Angelis
, Fabio Fioravanti
, Jorge A. Navas, Maurizio Proietti
:
Verification of Programs by Combining Iterated Specialization with Interpolation. 3-18 - Pierre-Loïc Garoche, Arie Gurfinkel
, Temesghen Kahsai:
Synthesizing Modular Invariants for Synchronous Code. 19-30 - Hossein Hojjat, Philipp Rümmer, Pavle Subotic, Wang Yi:
Horn Clauses for Communicating Timed Systems. 39-52 - Bishoksan Kafle, John P. Gallagher
:
Convex polyhedral abstractions, specialisation and property-based predicate splitting in Horn clause verification. 53-67 - Alan Perotti
, Guido Boella, Artur S. d'Avila Garcez:
Runtime Verification Through Forward Chaining. 68-81 - Joonseok Lee, Robert I. McKay:
Optimizing a Personalized Multigram Cellphone Keypad. - Jonathan Scott Morgan, Iman Barjasteh, Cliff Lampe, Hayder Radha:
The Entropy of Attention and Popularity in YouTube Videos. - Anthony Bonato, Marc Lozier, Dieter Mitsche, Xavier Pérez-Giménez, Pawel Pralat:
The domination number of on-line social networks and random geometric graphs. - James Martens:
New perspectives on the natural gradient method. - Feng Shi, Robert Laganière, Emil M. Petriu:
Gradient Boundary Histograms for Action Recognition. - Tianbao Yang, Lijun Zhang, Rong Jin, Shenghuo Zhu:
A Simple Homotopy Proximal Mapping for Compressive Sensing. - Hélène Pignot, Odile Piton:
Mary Astell's words in A Serious Proposal to the Ladies (part I), a lexicographic inquiry with NooJ. - Alexandra Heidsieck:
Simple Two-Dimensional Object Tracking based on a Graph Algorithm. - Jean-Emmanuel Deschaud, Xavier Brun, François Goulette:
Colorisation et texturation temps réel d'environnements urbains par système mobile avec scanner laser et caméra fish-eye. - Dae-Seong Kang, Keehang Kwon, Zulkarnine Mahmud:
Sequential Operations in LogicWeb. - Guillaume Villemaud, Florin Doru Hutu, Tanguy Risset, Jean-Marie Gorce:
Enjeux et propositions sur les architectures RF pour l'homme connecté à la société numérique. - (Withdrawn) SAT is a problem with exponential complexity measured by negentropy.
- Komei Fukuda, Bernd Gärtner, May Szedlák:
Combinatorial Redundancy Detection. - Tarek Toumi, Abdelmadjid Zidani:
From Human-Computer Interaction to Human-Robot Social Interaction. - Philip Bille, Inge Li Gørtz, Gad M. Landau, Oren Weimann:
Longest Common Extensions in Trees. - Amaro Barreal, Camilla Hollanti, Nadya Markin:
Fast-Decodable Space-Time Codes for the $N$-Relay and Multiple-Access MIMO Channel. - Faisal N. Abu-Khzam, Edouard Bonnet, Florian Sikora:
On the Complexity of Various Parameterizations of Common Induced Subgraph Isomorphism. - Yi Sun, Xiaogang Wang, Xiaoou Tang:
Deeply learned face representations are sparse, selective, and robust. - Rania Morsi, Diomidis S. Michalopoulos, Robert Schober:
On-Off Transmission Policy for Wireless Powered Communication with Energy Storage. - (Withdrawn) Deep Distributed Random Samplings for Supervised Learning: An Alternative to Random Forests?
- Jifeng Dai, Kaiming He, Jian Sun:
Convolutional Feature Masking for Joint Object and Stuff Segmentation. - Mariza Ferro, Antonio Roberto Mury, Laion F. Manfroi, Bruno Schulze:
High Performance Computing Evaluation A methodology based on Scientific Application Requirements. - Sayan Bhattacharya, Monika Henzinger, Giuseppe F. Italiano:
Deterministic Fully Dynamic Data Structures for Vertex Cover and Matching. - Jean-Baptiste Barreau, Théophane Nicolas, G. Bruniaux, Emilien Petit, Quentin Petit, Yann Bernard, Ronan Gaugne, Valérie Gouranton:
Ceramics Fragments Digitization by Photogrammetry, Reconstructions and Applications. - Diego R. Amancio:
A perspective on the advancement of natural language processing tasks via topological analysis of complex networks. - Ville Syrjälä, Koji Yamamoto, Mikko Valkama:
Analysis and Design Specifications for Full-Duplex Radio Transceivers under RF Oscillator Phase-Noise with Arbitrary Spectral Shape. - Marco Antoniotti:
CLAZY: Lazy Calling for Common Lisp. - Luis Sanabria-Russo, Jaume Barceló, Boris Bellalta:
A High Efficiency MAC Protocol for WLANs: Providing Fairness in Dense Scenarios. - Sariel Har-Peled, Nirman Kumar, David M. Mount, Benjamin Raichel:
Space Exploration via Proximity Search. - Kyung-Taek Jun:
Throat Finding Algorithms based on Throat Types. - Vladimir Hahanov, Wajeb Gharibi, Svetlana Chumachenko, Eugenia Litvinova:
Qubit Data Structures for Analyzing Computing Systems. - John Allen, David Scott, Malcolm Illingworth, Bartek Dobrzelecki, Davy Virdee, Steve Thorn, Sara Knott:
CloudQTL: Evolving a Bioinformatics Application to the Cloud. - Amit Sharma, Dan Cosley:
Studying and Modeling the Connection between People's Preferences and Content Sharing. - Christian Szegedy, Scott E. Reed, Dumitru Erhan, Dragomir Anguelov:
Scalable, High-Quality Object Detection. - Maxwell D. Collins, Pushmeet Kohli:
Memory Bounded Deep Convolutional Networks. - Noam Shazeer, Joris Pelemans, Ciprian Chelba:
Skip-gram Language Modeling Using Sparse Non-negative Matrix Probability Estimation. - Gil Ben-Artzi, Michael Werman, Shmuel Peleg:
Event Matching from Significantly Different Views using Motion Barcodes. - Çigdem Aslay, Wei Lu, Francesco Bonchi, Amit Goyal, Laks V. S. Lakshmanan:
Viral Marketing Meets Social Advertising: Ad Allocation with Minimum Regret. - Sébastien Giguère, Amélie Rolland, François Laviolette, Mario Marchand:
On the String Kernel Pre-Image Problem with Applications in Drug Discovery. - Chung-Kai Yu, Mihaela van der Schaar, Ali H. Sayed:
Information-Sharing over Adaptive Networks with Self-interested Agents. - Mostafa Haghir Chehreghani, Maurice Bruynooghe:
Mining Rooted Ordered Trees under Homeomorphism. - Paul Beame, Guy Van den Broeck, Eric Gribkoff, Dan Suciu:
Symmetric Weighted First-Order Model Counting. - Khamsa Djaroudib, Abdelmalik Taleb-Ahmed, Abdelmadjid Zidani:
Textural Approach for Mass Abnormality Segmentation in Mammographic Images. - Lawrence Ong, Chin Keong Ho, Fabian Lim:
The Single-Uniprior Index-Coding Problem: The Single-Sender Case and The Multi-Sender Extension. - Bicheng Ying, Ali H. Sayed:
Information Exchange and Learning Dynamics over Weakly-Connected Adaptive Networks. - Xianjie Chen, Alan L. Yuille:
Parsing Occluded People by Flexible Compositions. - Akram Aldroubi, Ilya A. Krishtal:
Krylov Subspace Methods in Dynamical Sampling. - Archontia C. Giannopoulou, George B. Mertzios:
New Geometric Representations and Domination Problems on Tolerance and Multitolerance Graphs. - Bhaskar Bagchi, Benjamin A. Burton, Basudeb Datta, Nitin Singh, Jonathan Spreer:
Efficient algorithms to decide tightness. - Hassan Mansour, Rayan Saab:
Recovery Analysis for Weighted ℓ1-Minimization Using a Null Space Property. - Liming Zhao, Xi Li, Jun Xiao, Fei Wu, Yueting Zhuang:
Metric Learning Driven Multi-Task Structured Output Optimization for Robust Keypoint Tracking. - Travis Gagie, Simon J. Puglisi:
Searching and Indexing Genomic Databases via Kernelization. - Jan Chorowski, Dzmitry Bahdanau, Kyunghyun Cho, Yoshua Bengio:
End-to-end Continuous Speech Recognition using Attention-based Recurrent NN: First Results. - Ilja Kuzborskij, Francesco Orabona:
Learning by Transferring from Auxiliary Hypotheses. - Christian Mainka, Vladislav Mladenov, Jörg Schwenk:
Do not trust me: Using malicious IdPs for analyzing and attacking Single Sign-On. - Donggeun Yoo, Sunggyun Park, Joon-Young Lee, In-So Kweon:
Fisher Kernel for Deep Neural Activations. - Lei Yu, Karl Moritz Hermann, Phil Blunsom, Stephen Pulman:
Deep Learning for Answer Sentence Selection. - Raed Jaberi:
On testing uni-connectivity in directed graphs and some related problems. - Tomás Masopust, Michaël Thomazo:
On $k$-piecewise testability (preliminary report). - Katerina Smiljkovikj, Liljana Gavrilovska, Petar Popovski:
Efficiency Analysis of Decoupled Downlink and Uplink Access in Heterogeneous Networks. - Gilwon Lee, Youngchul Sung, Junyeong Seo:
Randomly-Directional Beamforming in Millimeter-Wave Multi-User MIMO Downlink. - Camilo Thorne:
Chases and Bag-Set Certain Answers. - Mickaël Buchet, Frédéric Chazal, Tamal K. Dey, Fengtao Fan, Steve Y. Oudot, Yusu Wang:
Topological analysis of scalar fields with outliers. - Evangelos Anagnostopoulos, Ioannis Z. Emiris, Ioannis Psarros:
Low-quality dimension reduction and high-dimensional Approximate Nearest Neighbor. - Kaiming He, Jian Sun:
Convolutional Neural Networks at Constrained Time Cost. - Zhiguo Ding, Caijun Zhong, Derrick Wing Kwan Ng, Mugen Peng, Himal A. Suraweera, Robert Schober, H. Vincent Poor:
Application of Smart Antenna Technologies in Simultaneous Wireless Information and Power Transfer. - Tim Boykett, Gerhard Wendt:
J2 Radical in Automata Nearrings. - Suejb Memeti, Sabri Pllana:
PaREM: A Novel Approach for Parallel Regular Expression Matching. - Zengfeng Huang, Wai Ming Tai, Ke Yi:
Tracking the Frequency Moments at All Times. - Jérémy Frey
:
Heart Rate Monitoring as an Easy Way to Increase Engagement in Human-Agent Interaction. - Olivier Aubert
, Joscha Jaeger:
Annotating Video with Open Educational Resources in a Flipped Classroom Scenario. - Michael J. Bannister, William E. Devanny, David Eppstein:
ERGMs are Hard. - Felipe Yanez, Francis R. Bach:
Primal-Dual Algorithms for Non-negative Matrix Factorization with the Kullback-Leibler Divergence. - Jérémy Frey
, Renaud Gervais, Stéphanie Fleck, Fabien Lotte
, Martin Hachet:
Teegi: Tangible EEG Interface. - Ken-ichi Kawarabayashi, Anastasios Sidiropoulos:
Beyond the Euler characteristic: Approximating the genus of general graphs. - Roula Nassif, Cédric Richard, André Ferrari, Ali H. Sayed:
Multitask diffusion adaptation over asynchronous networks. - Dan Gillick, Nevena Lazic, Kuzman Ganchev, Jesse Kirchner, David Huynh:
Context-Dependent Fine-Grained Entity Type Tagging. - Paul F. Tupper:
Exemplar Dynamics and Sound Merger in Language. - Max Jaderberg, Karen Simonyan, Andrea Vedaldi, Andrew Zisserman:
Reading Text in the Wild with Convolutional Neural Networks. - Tariq Elahi, Steven J. Murdoch, Ian Goldberg:
Censorship Resistance: Let a Thousand Flowers Bloom? - Paul Égré
, Paul Marty, Bryan Renne:
Knowledge, Justification, and Reason-Based Belief. - Catherine Kerr, Terri Hoare, Jakub Marecek, Paula Carroll:
Integer Programming Ensemble of Classifiers for Temporal Relations. - (Withdrawn) A New Single-Source Shortest Path Algorithm for Positive Weight Graph with O(m+kn) Time Complexity.
- Guoxu Zhou, Andrzej Cichocki, Shengli Xie:
Decomposition of Big Tensors With Low Multilinear Rank. - Muhammad Rafi, Farnaz Amin, Mohammad Shahid Shaikh:
Document clustering using graph based document representation with constraints. - Anh Mai Nguyen, Jason Yosinski, Jeff Clune:
Deep Neural Networks are Easily Fooled: High Confidence Predictions for Unrecognizable Images. - Sarabjot Singh, Xinchen Zhang, Jeffrey G. Andrews:
Joint Rate and SINR Coverage Analysis for Decoupled Uplink-Downlink Biased Cell Associations in HetNets. - Rui Zhao, Wanli Ouyang, Xiaogang Wang:
Person Re-identification by Saliency Learning. - Santosh Mungle:
A Portfolio Approach to Algorithm Selection for Discrete Time-Cost Trade-off Problem. - Aditya A. V. Sastry:
Background Modelling using Octree Color Quantization. - Aditya A. V. Sastry, Kalyan Netti:
A parallel sampling based clustering. - Albert Y. S. Lam, Victor O. K. Li:
Opportunistic Routing for the Vehicular Energy Network. - Swarna Kamlam Ravindran, Anurag Mittal:
CoMIC: Good features for detection and matching at object boundaries. - Benjamin Schwartz, Ludwig Nägele, Andreas Angerer, Bruce A. MacDonald:
Towards a graphical language for quadrotor missions. - Nir Weinberger, Neri Merhav:
Simplified Erasure/List Decoding. - Guodong Shi, Alexandre Proutière, Mikael Johansson, John S. Baras, Karl Henrik Johansson:
Emergent Behaviors over Signed Random Dynamical Networks: Relative-State-Flipping Model. - Martina Cardone, Daniela Tuninetti, Raymond Knopp:
On the Optimality of Simple Schedules for Networks with Multiple Half-Duplex Relays. - Jeremy P. Vila, Philip Schniter, Sundeep Rangan, Florent Krzakala, Lenka Zdeborová:
Adaptive Damping and Mean Removal for the Generalized Approximate Message Passing Algorithm. - Sébastien Jean, Kyunghyun Cho, Roland Memisevic, Yoshua Bengio:
On Using Very Large Target Vocabulary for Neural Machine Translation. - Dimitrios Gkounis, Vasileios Kotronis, Xenofontas A. Dimitropoulos:
Towards Defeating the Crossfire Attack using SDN. - Jon M. Kleinberg, Sigal Oren:
Dynamic Models of Reputation and Competition in Job-Market Matching. - Félix A. Miranda, Fernando Castaños:
Robust Output Regulation of Linear Passive Systems with Multivalued Upper Semicontinuous Controls. - Shaofei Wang, Charless C. Fowlkes:
Learning Multi-target Tracking with Quadratic Object Interactions. - Victor May, Yosi Keller, Nir Sharon, Yoel Shkolnisky:
An algorithm for improving Non-Local Means operators via low-rank approximation. - João G. P. Rodrigues, Ana Aguiar, João Barros:
SenseMyCity: Crowdsourcing an Urban Sensor. - Andrea Ballatore:
The myth of the Digital Earth between fragmentation and wholeness. - Yingzhe Li, François Baccelli, Harpreet S. Dhillon, Jeffrey G. Andrews:
Statistical Modeling and Probabilistic Analysis of Cellular Networks with Determinantal Point Processes. - Arthur F. Ramos, Ruy J. G. B. de Queiroz, Anjolina Grisi de Oliveira:
Sequences of Rewrites: A Categorical Interpretation. - Wojciech Kotlowski:
Consistent optimization of AMS by logistic loss minimization. - (Withdrawn) Algebrisation in Distributed Graph Algorithms: Fast Matrix Multiplication in the Congested Clique.
- Toru Ohira:
Chases and Escapes, and Optimization Problems. - Abi J. Ashton, Pedro Russo, Thilina Heenatigala:
Crowdfunding Astronomy Outreach Projects: Lessons Learned from the UNAWE Crowdfunding Campaign. - Eduardo Bonelli, Delia Kesner, Carlos Lombardi, Alejandro Ríos:
An abstract normalisation result with applications to non-sequential calculi. - Víctor Ponce-López, Sergio Escalera, Marc Pérez, Oriol Janés, Xavier Baró:
Non-Verbal Communication Analysis in Victim-Offender Mediations. - Dawsen Hwang, Patrick Jaillet, Zhengyuan Zhou:
Distributed Multi-Depot Routing without Communications. - Natarajan Meghanathan, Gordon Skelton:
A Two-layer Architecture of Mobile Sinks and Static Sensors. - Omoniwa Babatunji:
Considering Fading Effects for Vertical Handover in Heterogenous Wireless Networks. - Natarajan Meghanathan, Gordon Skelton:
An Energy Efficient Risk Notification Message Dissemination Protocol for Vehicular Ad hoc Networks. - Leonel Arevalo, Rodrigo C. de Lamare, Raimundo Sampaio Neto:
Multi-Branch Lattice-Reduction SIC for Multiuser MIMO Systems. - Yi Xu, Shiwen Mao, Xin Su:
Interference Alignment Improves the Capacity of OFDM Systems. - Omoniwa Babatunji, Riaz Hussain:
Dwell Time Prediction Model for Minimizing Unnecessary Handovers in Heterogenous Wireless Networks, Considering Amoebic Shaped Coverage Region. - Hasan M. H. Owda, Babatunji Omoniwa, Ahmad Raza Shahid, Sheikh Ziauddin:
Using Artificial Neural Network Techniques for Prediction of Electric Energy Consumption. - Gadiel Seroussi, Marcelo J. Weinberger:
Optimal algorithms for universal random number generation from finite memory sources. - Hongyang Zhang, Zhouchen Lin, Chao Zhang, Junbin Gao:
Relations among Some Low Rank Subspace Recovery Models. - (Withdrawn) Practice in Synonym Extraction at Large Scale.
- Andrea Detti, Claudio Pisa, Nicola Blefari-Melazzi:
Multipath forwarding strategies in Information Centric Networks with AIMD congestion control. - Sagar Venkatesh Gubbi, Chandra Sekhar Seelamantula:
Risk Estimation Without Using Stein's Lemma - Application to Image Denoising. - Silvia Ghilezan, Jelena Ivetic, Pierre Lescanne, Silvia Likavec:
Resource control and intersection types: an intrinsic connection. - Zahra Vali, Massoud Reza Hashemi, Neda Moghim:
An Adaptive Load Balancing to Provide Quality of Service. - Vince Bárány, Balder ten Cate, Benny Kimelfeld, Dan Olteanu, Zografoula Vagena:
Declarative Statistical Modeling with Datalog. - Haris Aziz, Toby Walsh, Lirong Xia:
Possible and Necessary Allocations via Sequential Mechanisms. - Canyi Lu, Changbo Zhu, Chunyan Xu, Shuicheng Yan, Zhouchen Lin:
Generalized Singular Value Thresholding. - Masahiro Sato:
An Intuitionistic Set-theoretical Model of the Extended Calculus of Constructions. - Pedro Sanches, Eric-Oluf Svee, Markus Bylund, Benjamin Hirsch, Magnus Boman:
Knowing Your Population: Privacy-Sensitive Mining of Massive Data. - Florian Schmidt, Matteo Ceriotti, Niklas Hauser, Klaus Wehrle
:
HotBox: Testing Temperature Effects in Sensor Networks. - Marwa Bekrar:
Protection de la vie privée à base d'agents dans un système d'e-learning. - Feiran Wang, Chen Xu, Lingyang Song, Zhu Han:
Energy-Efficient Resource Allocation for Device-to-Device Underlay Communication. - Yang Yang, Yuxiao Dong, Nitesh V. Chawla:
Predicting Node Degree Centrality with the Node Prominence Profile. - Janusz A. Brzozowski, Marek Szykula:
Upper Bound on Syntactic Complexity of Suffix-Free Languages. - Juan C. López-González, Antonio Rueda-Toicen:
Search of Complex Binary Cellular Automata Using Behavioral Metrics. - Andreas I. Reppas, Konstantinos G. Spiliotis, Constantinos I. Siettos:
Tuning the average path length of complex networks and its influence to the emergent dynamics of the majority-rule model. - Aaron M. Andrews, Haitao Wang:
Minimizing the Aggregate Movements for Interval Coverage. - Weiguang Ding, Ruoyan Wang, Fei Mao, Graham W. Taylor:
Theano-based Large-Scale Visual Recognition with Multiple GPUs. - Sergii Dymchenko, Mariia Mykhailova:
Declaratively solving tricky Google Code Jam problems with Prolog-based ECLiPSe CLP system. - Andrej Karpathy, Li Fei-Fei:
Deep Visual-Semantic Alignments for Generating Image Descriptions. - Bo Waggoner:
ℓp Testing and Learning of Discrete Distributions. - Jose M. Faleiro, Daniel J. Abadi:
Rethinking serializable multiversion concurrency control. - Jiqiang Wu, Yipeng Zhou, Dah-Ming Chiu, Youwei Hua, Zirong Zhu:
Modeling Dynamics of Online Video Popularity. - Muhammad Taimoor Khan, Dimitrios N. Serpanos, Howard E. Shrobe:
On the Behavioural Formalization of the Cognitive Middleware AWDRAT. - Balder ten Cate, Cristina Civili, Evgeny Sherkhonov, Wang-Chiew Tan:
High-Level Why-Not Explanations using Ontologies. - Sriram V. Pemmaraju, Vivek B. Sardeshmukh:
Minimum-weight Spanning Tree Construction in $O(\log \log \log n)$ Rounds on the Congested Clique. - Vladimir Shatalov:
School of the future: smartphones as a laboratory in pocket of each student. - Natarajan Meghanathan:
An Algorithm to Determine Energy-aware Maximal Leaf Nodes Data Gathering Tree for Wireless Sensor Networks. - Madhav P. Desai, Virendra Sule:
Generalized cofactors and decomposition of Boolean satisfiability problems. - Hayaru Shouno:
Bayesian Image Restoration for Poisson Corrupted Image using a Latent Variational Method with Gaussian MRF. - Christophe Dubach, Grigori Fursin:
Proceedings of the 5th International Workshop on Adaptive Self-tuning Computing Systems 2015 (ADAPT'15). - Sándor Kolumbán, István Vajk, Johan Schoukens:
Perturbed Datasets Methods for Hypothesis Testing and Structure of Corresponding Confidence Sets. - Gautham Vasan, Arun Kumar Singh, K. Madhava Krishna:
Model Predictive Control for Micro Aerial Vehicle Systems (MAV) Systems. - Danushka Bollegala
, Takanori Maehara, Yuichi Yoshida, Ken-ichi Kawarabayashi:
Learning Word Representations from Relational Graphs. - Quentin F. Stout:
An Algorithm for L∞ Approximation by Step Functions. - Valery Anatolevich Kamaev, Alexey G. Finogeev, Anton A. Finogeev, Sergey Shevchenko:
Knowledge Discovery in the SCADA Databases Used for the Municipal Power Supply System. - Pavel Viktorovich Botvinkin, Valery Anatolevich Kamaev, Irina Sergeevna Nefedova, Aleksey Germanovich Finogeev, Egor Alekseevich Finogeev:
Analysis, classification and detection methods of attacks via wireless sensor networks in SCADA systems. - Mohsen Karimzadeh Kiskani, Hamid R. Sadjadpour:
Index Coding Increases Capacity of Information-Centric Networks. - Devansh Arpit, Ifeoma Nwogu, Venu Govindaraju:
Dimensionality Reduction with Subspace Structure Preservation. - Johannes Stegmann:
Paradigm shifts. Part II. Reverse Transcriptase. Analysis of reference stability and word frequencies. - Hantian Zhang:
Non-smooth Approach for Contact Dynamics and Impulse-based Control of Frictional Furuta Pendulum. - Reza Arablouei, Kutluyil Dogançay:
Mean-Square Performance of the Constrained LMS Algorithm. - Edward Meeds, Remco Hendriks, Said al Faraby, Magiel Bruntink, Max Welling:
MLitB: Machine Learning in the Browser. - Marcin Nagy, Thanh Bui, Emiliano De Cristofaro, N. Asokan, Jörg Ott, Ahmad-Reza Sadeghi:
How Far Removed Are You? Scalable Privacy-Preserving Estimation of Social Path Length with Social PaL. - (Withdrawn) A New Exact Algorithm for Traveling Salesman Problem with Time Complexity Interval (O(n^4), O(n^3*2^n)).
- M. Yahia Kaadan, Asaad Kaadan:
Rediscovering the Alphabet - On the Innate Universal Grammar. - Raka Kundu, Amlan Chakrabarti, Prasanna Kumar Lenka:
An Approach for Reducing Outliers of Non Local Means Image Denoising Filter. - Vikram P. Munishwar, Vinay Kolar, Praveen Jayachandran, Ravi Kokku:
RTChoke: Efficient Real-Time Traffic Chokepoint Detection and Monitoring. - Shihao Yan, Robert A. Malaney, Ido Nevat, Gareth W. Peters:
Location Verification Systems for VANETs in Rician Fading Channels. - Mark Bun, Thomas Steinke:
Weighted Polynomial Approximations: Limits for Learning and Pseudorandomness. - Ruth Breu, Radu Grosu, Franz Huber, Bernhard Rumpe, Wolfgang Schwerin:
Systems, Views and Models of UML. - Radu Grosu, Cornel Klein, Bernhard Rumpe:
Enhancing the SysLab System Model with State. - Amal Saha, Sugata Sanyal:
Applicability of DUKPT Key Management Scheme to Cloud Wallet and other Mobile Payments. - Nikhil Balaji, Samir Datta:
Bounded Treewidth and Space-Efficient Linear Algebra. - Jun Fang, Huiping Duan, Jing Li, Hongbin Li, Rick S. Blum:
Super-Resolution Compressed Sensing: A Generalized Iterative Reweighted L2 Approach. - Vikram Nathan, Sharath Raghvendra:
Accurate Streaming Support Vector Machines. - Yan Hu, Guohua Bai:
A systematic literature review of cloud computing in eHealth. - Priyanka Bhatia, Ronak Sumbaly:
Framework for Wireless Network Security using Quantum Cryptography. - (Withdrawn) Homonym Population Protocols, or Providing a Small Space of Computation Using a Few Identifiers.
- Phuong-Thanh Cao Thai, Hai Nam Ha, Hung Tran Cong:
Solving bandwidth-guaranteed routing problem using routing data. - Ederval Pablo Ferreira da Cruz, Luis Eduardo Gottardo, Franciele Pereira Rossini, Vinicius de Souza Oliveira, Lucas Cellim Pereira:
Evaluating Feasibility of Using Wireless Sensor Networks in a Coffee Crop Through Simulation of AODV, AOMDV, DSDV and Their Variants with 802.15.4 Mac Protocol. - Jayakrishnan Unnikrishnan:
Asymptotically Optimal Matching of Multiple Sequences to Source Distributions and Training Sequences. - Laurent Bulteau
, Vincent Froese, Nimrod Talmon:
Multi-Player Diffusion Games on Graph Classes. - Felix Dobslaw, Tingting Zhang, Mikael Gidlund:
End-to-End Reliability-aware Scheduling for Wireless Sensor Networks. - Ferdinando Cicalese, Martin Milanic, Romeo Rizzi:
On the complexity of the vector connectivity problem. - Vincent Delos, Denis Teissandier:
Minkowski sum of HV-polytopes in Rn. - Vincent Delos, Denis Teissandier:
Minkowski sum of polytopes defined by their vertices. - Srikant Manas Kala, Ranadheer Musham, M. Pavan Kumar Reddy, Bheemarjuna Reddy Tamma:
Radio Co-location Aware Generic Multi-Radio Multi-Channel Conflict Graph Generation. - Pierre Brunisholz, Marine Minier, Fabrice Valois:
The Gain of Network Coding in Wireless Sensor Networking. - S. Vinay, Shridhar Aithal, Sudhakara Adiga:
Integrating goals after prioritization and evaluation-A Goal-oriented requirements engineering method. - Adeline Decuyper, Alex Rutherford, Amit Wadhwa, Jean-Martin Bauer, Gautier Krings, Thoralf Gutierrez, Vincent D. Blondel, Miguel A. Luengo-Oroz
:
Estimating Food Consumption and Poverty Indices with Mobile Phone Data. - Zakaria Ye, Rachid El Azouzi, Tania Jiménez, Yuedong Xu:
Computing The Quality of Experience in Network Modeled by a Markov Modulated Fluid Model. - Reihaneh Rabbany, Osmar R. Zaïane:
Generalization of Clustering Agreements and Distances for Overlapping Clusters and Network Communities. - Georgia Gkioxari, Ross B. Girshick, Jitendra Malik:
Actions and Attributes from Wholes and Parts. - Gundram Leifert, Tobias Strauß, Tobias Grüning, Roger Labahn:
Cells in Multidimensional Recurrent Neural Networks. - Julien Bensmail, Aurélie Lagoutte
, Petru Valicov:
Strong edge-coloring of $(3, Δ)$-bipartite graphs. - Edwin J. Beggs, John V. Tucker:
Analogue-digital systems with modes of operation. - Siddhartha Satpathi, Rushil Nagda, Rahul Vaze:
Transmission strategies for an energy harvesting Transmitter-Receiver pair. - Dmitry Zakablukov:
Asymptotic bounds of the gate complexity for the reversible circuit consisting of NOT, CNOT and 2-CNOT gates. - (Withdrawn) Computing Exact Distances in the Congested Clique.
- Tao Gao, Daniel Harari, Joshua B. Tenenbaum, Shimon Ullman:
When Computer Vision Gazes at Cognition. - Marco Guazzone:
Mining the Workload of Real Grid Computing Systems. - Yaru Fan, Yilun Wang, Ting-Zhu Huang:
Enhanced joint sparsity via Iterative Support Detection. - Ali Aajli, Karim Afdel:
A New Approach of Learning Hierarchy Construction Based on Fuzzy Logic. - Hanie Sedghi, Anima Anandkumar:
Provable Methods for Training Neural Networks with Sparse Connectivity. - H. Ouahi, M. El Hajji, Karim Afdel:
Secure and Image Retrieval based on Multipurpose Watermarking for Mammography Images Database. - Abdelkaher Ait Abdelouahad, Mohammed El Hassouni, Hocine Cherifi, Driss Aboutajdine:
Image quality assessment measure based on natural image statistics in the Tetrolet domain. - Sampurna Biswas, Sunrita Poddar, Soura Dasgupta, Raghuraman Mudumbai, Mathews Jacob:
Subspace based low rank and joint sparse matrix recovery. - Chunhua Geng, Syed Ali Jafar:
On the Optimality of Treating Interference as Noise: Compound Interference Networks. - Daniel T. Citron, Paul Ginsparg:
Patterns of Text Reuse in a Scientific Corpus. - Jiliang Tang, Shiyu Chang, Charu C. Aggarwal, Huan Liu:
Negative Link Prediction in Social Media. - Shang Li, Xiaodong Wang:
Cooperative Change Detection for Online Power Quality Monitoring. - Carsten Schneider:
A streamlined difference ring theory: Indefinite nested sums, the alternating sign and the parameterized telescoping problem. - Thomas Pajor, Eduardo Uchoa, Renato F. Werneck:
A Robust and Scalable Algorithm for the Steiner Problem in Graphs. - Zhiguo Ding, Pingzhi Fan, H. Vincent Poor:
Impact of User Pairing on 5G Non-Orthogonal Multiple Access. - Ivan Titov, Ehsan Khoddam:
Unsupervised Induction of Semantic Roles within a Reconstruction-Error Minimization Framework. - Ningning Zhao, Adrian Basarab, Denis Kouame, Jean-Yves Tourneret:
Joint Segmentation and Deconvolution of Ultrasound Images Using a Hierarchical Bayesian Model based on Generalized Gaussian Priors. - Xiuli Wang:
Zipf's Law and the Frequency of Characters or Words of Oracles. - Vignesh Narayanan, Yu Zhang, Nathaniel Mendoza, Subbarao Kambhampati:
Plan or not: Remote Human-robot Teaming with Incomplete Task Information. - Amal Saha, Sugata Sanyal:
Survey of Strong Authentication Approaches for Mobile Proximity and Remote Wallet Applications - Challenges and Evolution. - Jagmohan Chauhan, Hassan Jameel Asghar, Mohamed Ali Kâafar, Anirban Mahanti:
Gesture-based Continuous Authentication for Wearable Devices: the Google Glass Case. - Jeril Kuriakose, V. Amruth, A. G. Sandesh, Jampu Venkata Naveenbabu, Mohammed Shahid, Ashish Shetty:
Analysis of Maximum Likelihood and Mahalanobis Distance for Identifying Cheating Anchor Nodes. - Majid Janzamin, Hanie Sedghi, Anima Anandkumar:
Score Function Features for Discriminative Learning: Matrix and Tensor Framework. - Inna Stainvas, Alexandra Manevitch, Isaac Leichter:
Cancer Detection with Multiple Radiologists via Soft Multiple Instance Logistic Regression and L1 Regularization. - Dominik Egarter, Wilfried Elmenreich:
Autonomous Load Disaggregation Approach based on Active Power Measurements. - Iza Marfisi-Schottman
, Sébastien George
, Franck Tarpin-Bernard:
Evaluating Learning Games during their Conception. - Mikhail Ivanov, Fredrik Brannstrom, Alexandre Graell i Amat, Petar Popovski:
Error Floor Analysis of Coded Slotted ALOHA over Packet Erasure Channels. - M. Majid Butt, Adnan Nasir, Amr Mohamed, Mohsen Guizani:
Trading Wireless Information and Power Transfer: Relay Selection to Minimize the Outage Probability. - Robin Nicolay:
Semantic Enhancement of Lecture Material. - Claudia Carapelle, Shiguang Feng, Alexander Kartzow, Markus Lohrey:
Satisfiability of ECTL* with tree constraints. - Yassine Sadqi, Ahmed Asimi, Younes Asimi:
A Cryptographic Mutual Authentication Scheme for Web Applications. - Yao-Hsiang Yang, Lu-Hung Chen, Chieh-Chih Wang, Chu-Song Chen:
Bayesian Fisher's Discriminant for Functional Data. - (Withdrawn) Network Criticality Analysis for Finite Sized Wireless Sensor Networks.
- Salman Onsori, Farshad Safaei:
Performance Enhancement of Routers in Networks-on-Chip Using Dynamic Virtual Channels Allocation. - Santosh S. Vempala, Ying Xiao:
Max vs Min: Independent Component Analysis with nearly Linear Sample Complexity. - Timo Greifenberg, Markus Look, Bernhard Rumpe
:
Integrating Heterogeneous Building and Periphery Data Models at the District Level: The NIM Approach. - Jan Oliver Ringert, Bernhard Rumpe, Andreas Wortmann:
Multi-Platform Generative Development of Component & Connector Systems using Model and Code Libraries. - Carsten Kolassa, Bernhard Rumpe:
The Influence of the Generator's License on Generated Artifacts. - Jose P. Miguel, David Mauricio, Glen Rodriguez:
A Review of Software Quality Models for the Evaluation of Software Products. - Joseph Y. Halpern:
Cause, Responsibility, and Blame: oA Structural-Model Approach. - Joseph Y. Halpern, Rafael Pass:
Algorithmic Rationality: Game Theory with Costly Computation. - Narkhede Sachin G., Deven Shah, Vaishali D. Khairnar, Sujata Kadu:
Brain Tumor Detection Based on Bilateral Symmetry Information. - Igor G. Vladimirov
:
Anisotropy-based optimal filtering in linear discrete time invariant systems. - Ali Alatabbi, Mohammad Sohel Rahman, William F. Smyth:
Computing Covers Using Prefix Tables. - Nicolas Le Scouarnec:
Fast Product-Matrix Regenerating Codes. - Florian Barbero, Gregory Z. Gutin, Mark Jones, Bin Sheng:
Parameterized and Approximation Algorithms for the Load Coloring Problem. - Yunpeng Pan, Evangelos A. Theodorou, Michail Kontitsis:
Model-based Path Integral Stochastic Control: A Bayesian Nonparametric Approach. - Albert Kim, Eric Blais, Aditya G. Parameswaran, Piotr Indyk, Sam Madden, Ronitt Rubinfeld:
Rapid Sampling for Visualizations with Ordering Guarantees. - Hanie Sedghi, Anima Anandkumar:
Provable Tensor Methods for Learning Mixtures of Classifiers. - Mohammad S. Qaseem
, A. Govardhan:
Phishing Detection in IMs using Domain Ontology and CBA - An innovative Rule Generation Approach. - Gadi Aleksandrowicz, Hana Chockler, Joseph Y. Halpern, Alexander Ivrii:
The Computational Complexity of Structure-Based Causality. - Bozhidar Bozhanov:
Computoser - rule-based, probability-driven algorithmic music composition. - Jan Elffers, Mathijs de Weerdt:
Scheduling with two non-unit task lengths is NP-complete. - Hengameh Keshavarz, Ravi R. Mazumdar, Rahul Roy, Farshid Zoghalchi:
On the number of active links in random wireless networks. - Wolfgang Gatterbauer
:
Semi-Supervised Learning with Heterophily. - Sateeshkrishna Dhuli, Yatindra Nath Singh:
Analysis of Average Travel Time for Stateless Opportunistic Routing Techniques. - Aniket Chakrabarti, Srinivasan Parthasarathy:
Sequential Hypothesis Tests for Adaptive Locality Sensitive Hashing. - Seungwhan Moon, Suyoun Kim, Haohan Wang:
Multimodal Transfer Deep Learning for Audio Visual Recognition. - Catherine Cramer, Lori Sheetz, Hiroki Sayama, Paul Trunfio, Harry Eugene Stanley, Stephen M. Uzzo:
NetSci High: Bringing Network Science Research to High Schools. - Joseph Redmon, Anelia Angelova:
Real-Time Grasp Detection Using Convolutional Neural Networks. - Ali Aajli, Karim Afdel:
A tool for implementation of a domain model based on fuzzy relationships. - Isaac C. Sheff, Robbert van Renesse, Andrew C. Myers:
Distributed Protocols and Heterogeneous Trust: Technical Report. - Naouel Karam, Shashishekar Ramakrishna, Adrian Paschke:
Rule reasoning for legal norm validation of FSTP facts. - Yichao Zhou, Yuexin Wu, Jianyang Zeng:
Computational Protein Design Using AND/OR Branch-and-Bound Search. - José M. Álvarez, Ferran Diego, Joan Serrat, Antonio M. López:
Road Detection via On-line Label Transfer. - Xiaoyu Wang, Tianbao Yang, Guobin Chen, Yuanqing Lin:
Object-centric Sampling for Fine-grained Image Classification. - MohammadHossein Bateni, Sina Dehghani, MohammadTaghi Hajiaghayi, Saeed Seddighin:
Revenue Maximization for Selling Multiple Correlated Items. - Samuel T. Blake, Andrew Z. Tirkel:
Array Orthogonality in Higher Dimensions. - I-Ting Liu, Bhiksha Ramakrishnan:
Bach in 2014: Music Composition with Recurrent Neural Network. - Jhelum Chakravorty, Aditya Mahajan:
Distortion-transmission trade-off in real-time transmission of Markov sources. - Kei Sakaguchi, Gia Khanh Tran, Hidekazu Shimodaira, Shinobu Nanba, Toshiaki Sakurai, Koji Takinami, Isabelle Siaud, Emilio Calvanese Strinati, Antonio Capone, Ingolf Karls, Reza Arefi, Thomas Haustein:
Millimeter-wave Evolution for 5G Cellular Networks. - Zhaoyu Dong, Bing Gao, Yinliang Zhao, Shaolong Song, Yanning Du:
Prophet: A Speculative Multi-threading Execution Model with Architectural Support Based on CMP. - Christian Mayr, Johannes Partzsch, Marko Noack, Stefan Hänzsche, Stefan Scholze, Sebastian Höppner, Georg Ellguth, René Schüffny:
A Biological-Realtime Neuromorphic System in 28 nm CMOS using Low-Leakage Switched Capacitor Circuits. - Hampei Sasahara, Masaaki Nagahara, Kazunori Hayashi, Yutaka Yamamoto:
Loop-Back Interference Suppression for OFDM Signals via Sampled-Data Control. - Marko Noack, Johannes Partzsch, Christian Mayr, Stefan Hänzsche, Stefan Scholze, Sebastian Höppner, Georg Ellguth, René Schüffny:
Switched-Capacitor Realization of Presynaptic Short-Term-Plasticity and Stop-Learning Synapses in 28 nm CMOS. - Malte Wirkus:
Towards Robot-independent Manipulation Behavior Description. - Luciano Argento, Angelo Furfaro:
A multi-protocol framework for the development of collaborative virtual environments. - Tamir Bendory, Shai Dekel, Arie Feuer:
Robust Recovery of Stream of Pulses using Convex Optimization. - Fred Mesnard, Étienne Payet:
A Second-Order Formulation of Non-Termination. - Emmanouil G. Androulakis, Christos Dimitrakakis:
Generalised Entropy MDPs and Minimax Regret. - Jérôme Euzenat:
The category of networks of ontologies. - Tamir Bendory, Arie Feuer:
Sparse Sampling in Helical Cone-Beam CT Perfect Reconstruction Algorithms. - Tamir Bendory, Shai Dekel, Arie Feuer:
Super-resolution on the Sphere using Convex Optimization. - Tamir Bendory, Shai Dekel, Arie Feuer:
Exact recovery of Dirac ensembles from the projection onto spaces of spherical harmonics. - Inibehe Emmanuel Akpannah:
Optimization of Software Quality Using Management and Technical Review Techniques. - Guillaume Moroz, Marc Pouget:
Numeric certified algorithm for the topology of resultant and discriminant curves. - Martin Henze
, Lars Hermerschmidt, Daniel Kerpen
, Roger Häußling, Bernhard Rumpe, Klaus Wehrle:
User-driven Privacy Enforcement for Cloud-based Services in the Internet of Things. - Ahmet Iscen, Teddy Furon, Vincent Gripon, Michael G. Rabbat, Hervé Jégou:
Memory vectors for similarity search in high-dimensional spaces. - Frod Prefect, Patrick Prosser:
Empirical Algorithmics: draw your own conclusions. - Takehiro Ito, Yota Otachi, Toshiki Saitoh, Hisayuki Satoh, Akira Suzuki, Kei Uchizawa, Ryuhei Uehara, Katsuhisa Yamanaka, Xiao Zhou:
Computational Complexity of Competitive Diffusion on (Un)weighted Graphs. - Narendra Karmarkar:
Towards a Broader View of Theory of Computing. - (Withdrawn) Statistical Patterns in Written Language.
- Wolfgang Mulzer, Yannik Stein:
Computational Aspects of the Colorful Caratheodory Theorem. - Neda Pourali:
Web image annotation by diffusion maps manifold learning algorithm. - Qi Duan, Jafar Haadi Jafarian, Ehab Al-Shaer, Jinhui Xu:
On DDoS Attack Related Minimum Cut Problems. - R. Arokia Paul Rajan, F. Sagayaraj Francis:
Experimenting with Request Assignment Simulator (RAS). - Faruk Ahmed, Daniel Tarlow, Dhruv Batra:
Candidate Constrained CRFs for Loss-Aware Structured Prediction. - Claudia Landi:
The rank invariant stability via interleavings. - Niall Murphy, Damien Woods:
Uniformity is weaker than semi-uniformity for some membrane systems. - Gang Chen, Sargur N. Srihari:
Sequential Labeling with online Deep Learning. - Christopher Clark, Amos J. Storkey:
Teaching Deep Convolutional Neural Networks to Play Go. - Itai Feigenbaum, Jay Sethuraman:
Strategyproof Mechanisms for One-Dimensional Hybrid and Obnoxious Facility Location. - Juan Eugenio Iglesias, Mert Rory Sabuncu:
Multi-Atlas Segmentation of Biomedical Images: A Survey. - Stephan Holzer, Nathan Pinsker:
Approximation of Distances and Shortest Paths in the Broadcast Congest Clique. - Yang Liu, Tiffany Jing Li, Xuanxuan Lu, Chau Yuen:
Beamforming for Centralized Wireless Sensor Network with Noisy Observation. - Eric Tzeng, Judy Hoffman, Ning Zhang, Kate Saenko, Trevor Darrell:
Deep Domain Confusion: Maximizing for Domain Invariance. - M. H. van Emden:
Logic programming beyond Prolog. - Carlos Alberto Fernández y Fernández:
Integrating formal methods into traditional practices for software development: an overview. - José M. Álvarez, Theo Gevers, Antonio M. López:
Road Detection by One-Class Color Classification: Dataset and Experiments. - Yossi Azar, Ilan Reuven Cohen, Debmalya Panigrahi:
Online Covering with Convex Objectives and Applications. - Joseph Y. Halpern:
Appropriate Causal Models and the Stability of Causation. - Maria Spichkova, Heinz W. Schmidt:
Towards Logical Architecture and Formal Analysis of Dependencies Between Services. - Varunya Attasena, Nouria Harbi, Jérôme Darmont
:
fVSS: A New Secure and Cost-Efficient Scheme for Cloud Data Warehouses. - Junyoung Chung, Çaglar Gülçehre, KyungHyun Cho, Yoshua Bengio:
Empirical Evaluation of Gated Recurrent Neural Networks on Sequence Modeling. - Bruno Grenet
:
Bounded-degree factors of lacunary multivariate polynomials. - Jan A. Bergstra:
Personal Multi-threading. - Muhammad Taimoor Khan, Dimitrios N. Serpanos, Howard E. Shrobe:
On the Formal Semantics of the Cognitive Middleware AWDRAT. - Sonja Hiltunen, Philippe Loubaton, Pascal Chevalier:
Asymptotic analysis of a GLRT test for detection with large sensor arrays. - Yair Poleg, Tavi Halperin, Chetan Arora, Shmuel Peleg:
EgoSampling: Fast-Forward and Stereo for Egocentric Videos. - Narine N. Davtyan, Rafayel R. Kamalian:
A necessary and sufficient condition for a graph $G$, which satisfies the equality $μ_{21}(G)=|V(G)|$. - Spyridoula D. Xenaki, Konstantinos Koutroumbas, Athanasios A. Rontogiannis:
A Novel Adaptive Possibilistic Clustering Algorithm. - Mostafa Zaman Chowdhury, Muhammad Shahin Uddin, Yeong Min Jang:
Dynamic Channel Allocation for Class-Based QoS Provisioning and Call Admission in Visible Light Communication. - Mostafa Zaman Chowdhury, Yeong Min Jang:
Class-Based Service Connectivity using Multi-Level Bandwidth Adaptation in Multimedia Wireless Networks. - Mostafa Zaman Chowdhury, Tuan Nguyen, Young-Il Kim, Won Ryu, Yeong Min Jang:
Radio Resource Allocation for Scalable Video Services over Wireless Cellular Networks. - Mostafa Zaman Chowdhury, Yeong Min Jang, Zygmunt J. Haas:
Call Admission Control based on Adaptive Bandwidth Allocation for Wireless Networks. - Jan Triska, Vilém Vychodil:
Logic of temporal attribute implications. - Mostafa Zaman Chowdhury, Yeong Min Jang:
Handover Management in Highly Dense Femtocellular Networks. - Mostafa Zaman Chowdhury, Yeong Min Jang, Zygmunt J. Haas:
Cost-Effective Frequency Planning for Capacity Enhancement of Femtocellular Networks. - Shiguang Feng, Markus Lohrey, Karin Quaas:
Path-Checking for MTL and TPTL over Data Words. - Fabrizio Angiulli, Luciano Argento, Angelo Furfaro:
PCkAD: an unsupervised intrusion detection technique exploiting within payload n-gram location distribution. - Devendra Bhave, Sagar Jha, Shankara Narayanan Krishna, Sven Schewe, Ashutosh Trivedi:
Bounded-Rate Multi-Mode Systems Based Motion Planning. - Soren Goyal, Paul Benjamin:
Object Recognition Using Deep Neural Networks: A Survey. - Gilles Deleuze, Nicolae Brinzei, Nicolas Villaume:
Modelling common cause failures of large digital I&C systems with coloured Petri nets. - Emanuele Giaquinta:
Run-Length Encoded Nondeterministic KMP and Suffix Automata. - Marcelo L. M. Marinho
, Suzana Cândido de Barros Sampaio, Telma Lima, Hermano P. Moura:
A Systematic Review of Uncertainties in Software Project Management. - S. S. Melnik, O. V. Usatenko:
Entropy and long-range correlations in random symbolic sequences. - Maria Sefidari, Felipe Ortega:
Evaluating arbitration and conflict resolution mechanisms in the Spanish Wikipedia. - Maxime Crochemore, Costas S. Iliopoulos, Tomasz Kociumaka, Jakub Radoszewski, Wojciech Rytter, Tomasz Walen:
Covering Problems for Partial Words and for Indeterminate Strings. - Felix Klein, Martin Zimmermann
:
How Much Lookahead is Needed to Win Infinite Games? - Weicong Ding, Prakash Ishwar, Venkatesh Saligrama:
A Topic Modeling Approach to Ranking. - Marc Goessling, Yali Amit:
Compact Part-Based Image Representations: Extremal Competition and Overgeneralization. - Abel Gonzalez-Garcia, Alexander Vezhnevets, Vittorio Ferrari:
An active search strategy for efficient object detection. - Jiwei Li:
Feature Weight Tuning for Recursive Neural Networks. - Natalia Efremova, Sergey Tarasenko:
Unsupervised Neural Architecture for Saliency Detection. - Debjyoti Saharoy, Sandeep Sen:
Approximation Algorithms for Budget Constrained Network Upgradeable Problems. - Ali Parsai, Quinten David Soetens, Alessandro Murgia, Serge Demeyer:
Considering Polymorphism in Change-Based Test Suite Reduction. - Étienne Payet, Frédéric Mesnard:
Non-termination of Dalvik bytecode via compilation to CLP. - Jeremy Debattista, Santiago Londoño, Christoph Lange, Sören Auer:
LUZZU - A Framework for Linked Data Quality Assessment. - Rama Krishna Bandi, Maheshanand Bhaintwal:
Negacyclic codes over Z4+uZ4. - Andrea L. Brennen, David Danico, Raul Harnasch, Maureen Hunter, Richard Larkin, Jeremy Mineweaser, Kevin Nam, B. David O'Gwynn, Harry Phan, Alexia Schulz, Michael Snyder, Diane Staheli, Tamara Yu:
A novel display for situational awareness at a network operations center. - Joris M. Mooij, Jonas Peters, Dominik Janzing, Jakob Zscheischler
, Bernhard Schölkopf:
Distinguishing cause from effect using observational data: methods and benchmarks. - Mugen Peng, Kecheng Zhang, Jiamo Jiang, Jiaheng Wang, Wenbo Wang:
Energy-Efficient Resource Assignment and Power Allocation in Heterogeneous Cloud Radio Access Networks. - Neil Rubens:
Turing Test for the Internet of Things. - Onur Dizdar, Erdal Arikan:
A High-Throughput Energy-Efficient Implementation of Successive-Cancellation Decoder for Polar Codes Using Combinational Logic. - Przemyslaw Gospodarczyk, Pawel Wozny:
Merging of Bézier curves with box constraints. - Matteo Pontecorvi, Vijaya Ramachandran:
Fully Dynamic All Pairs All Shortest Paths. - Félix A. Miranda, Fernando Castaños, Alexander S. Poznyak:
Min-max piecewise constant optimal control for multi-model linear systems. - Paraschos Koutris, Tova Milo, Sudeepa Roy, Dan Suciu:
Answering Conjunctive Queries with Inequalities. - Yuriy Hulovatyy, Huili Chen, Tijana Milenkovic:
Exploring the structure and function of temporal networks with dynamic graphlets. - Lu Yu, Junming Huang, Chuang Liu, Zi-Ke Zhang:
ILCR: Item-based Latent Factors for Sparse Collaborative Retrieval. - Marvin Damschen, Christian Plessl:
Easy-to-Use On-the-Fly Binary Program Acceleration on Many-Cores. - Valmi Dufour-Lussier, Alice Hermann, Florence Le Ber, Jean Lieber:
Belief revision in the propositional closure of a qualitative algebra. - Qi Zhang, Meizhu Li, Yuxian Du, Yong Deng:
Local structure entropy of complex networks. - Tamar Rott, Dorin Shriki, Tamir Bendory:
Edge Preserving Multi-Modal Registration Based On Gradient Intensity Self-Similarity. - Alexandre Abraham, Fabian Pedregosa, Michael Eickenberg, Philippe Gervais, Andreas Mueller, Jean Kossaifi, Alexandre Gramfort, Bertrand Thirion, Gaël Varoquaux:
Machine Learning for Neuroimaging with Scikit-Learn. - Kunal Dutta, Arijit Ghosh:
Size sensitive packing number for Hamming cube and its consequences. - Alexander Reshytko:
The OCDF diagram. A metamodel for object-oriented systems visual design. - Tobias Strauß, Tobias Grüning, Gundram Leifert, Roger Labahn:
CITlab ARGUS for historical handwritten documents. - Mohammed M. Abdelsamea:
An Automatic Seeded Region Growing for 2D Biomedical Image Segmentation. - Manuel S. Stein, Alexander Kürzl, Amine Mezghani, Josef A. Nossek:
Asymptotic Parameter Tracking Performance with Measurement Data of 1-bit Resolution. - Takehiro Ito, Hirotaka Ono, Yota Otachi:
Reconfiguration of Cliques in a Graph. - Martin Zimmermann:
Delay Games with WMSO+U Winning Conditions. - Frank Hoffmann, Klaus Kriegel, Max Willert:
Almost Tight Bounds for Conflict-Free Chromatic Guarding of Orthogonal Galleries. - Ioannis Z. Emiris, Vissarion Fisikopoulos, Bernd Gärtner:
Efficient edge-skeleton computation for polytopes defined by oracles. - Slawomir Lasota:
Bounded width = strict width 2, for coset templates. - Dat Quoc Nguyen, Dai Quoc Nguyen, Dang Duc Pham, Son Bao Pham:
A Robust Transformation-Based Learning Approach Using Ripple Down Rules for Part-Of-Speech Tagging. - Tom J. Ameloot, Gaetano Geck, Bas Ketsman, Frank Neven, Thomas Schwentick:
Parallel-Correctness and Transferability for Conjunctive Queries. - Jonas Degrave:
Resolving multi-proxy transitive vote delegation. - Zola Donovan, Vahan Mkrtchyan, K. Subramani:
Clustering without replication: approximation and inapproximability. - Mathieu Lagrange, Grégoire Lafay, Boris Defreville, Jean-Julien Aucouturier:
The bag-of-frames approach: a not so sufficient model for urban soundscapes. - Neil Toronto, Jay McCarthy, David Van Horn:
Running Probabilistic Programs Backwards. - Filipe Campos
, José Pereira
:
An Experimental Evaluation of Machine-to-Machine Coordination Middleware: Extended Version. - Riccardo Sven Risuleo, Giulio Bottegal, Håkan Hjalmarsson:
A kernel-based approach to Hammerstein system identification. - Giulio Bottegal, Riccardo Sven Risuleo, Håkan Hjalmarsson:
Blind system identification using kernel-based methods. - Irena Rusu:
Permutation Reconstruction from MinMax-Betweenness Constraints. - Marco Cogoni, Giovanni Busonera, Paolo Anedda, Gianluigi Zanetti:
Transition to congestion in communication/computation networks via Montecarlo simulations: from optimal resource allocation to real-world routing algorithms. - Marco Di Bartolomeo, Valentino Di Donato, Maurizio Pizzonia, Claudio Squarcella, Massimo Rimondini:
Mining Network Events using Traceroute Empathy. - Moreno Marzolla:
Quantitative Analysis of the Italian National Scientific Qualification. - Andrew Arnold, Mark Giesbrecht, Daniel S. Roche:
Faster Sparse Multivariate Polynomial Interpolation of Straight-Line Programs. - Chunyu Wang, John Flynn, Yizhou Wang, Alan L. Yuille:
Representing Data by a Mixture of Activated Simplices. - Christopher Blake, Frank R. Kschischang:
Energy Consumption of VLSI Decoders. - Kai Zhu, Zhen Chen, Lei Ying:
Locating Contagion Sources in Networks with Partial Timestamps. - Dat Quoc Nguyen, Dai Quoc Nguyen, Son Bao Pham:
Ripple Down Rules for Question Answering. - Arjun Muralidharan, Yuan Yan, Yasamin Mostofi:
Binary Log-Linear Learning with Stochastic Communication Links. - Mo Zhao, Robert H. Blick:
In-vivo Network of Sensors and Actuators. - Vikram Krishnamurthy, William Hoiles:
Information Diffusion in Social Sensing. - Sadeep Jayasumana, Richard I. Hartley, Mathieu Salzmann, Hongdong Li, Mehrtash Tafazzoli Harandi:
Kernel Methods on the Riemannian Manifold of Symmetric Positive Definite Matrices. - Sadeep Jayasumana, Mathieu Salzmann, Hongdong Li, Mehrtash Tafazzoli Harandi:
A Framework for Shape Analysis via Hilbert Space Embedding. - Sadeep Jayasumana, Richard I. Hartley, Mathieu Salzmann, Hongdong Li, Mehrtash Tafazzoli Harandi:
Optimizing Over Radial Kernels on Compact Manifolds. - Terrence Letiche, Michael Lissack:
What About Feedback? - Sam Hallman, Charless C. Fowlkes:
Oriented Edge Forests for Boundary Detection. - Eugene Borovikov:
A survey of modern optical character recognition techniques. - Kostadin Kratchanov, Emilia Golemanova, Tzanko Golemanov, Tuncay Ercan, Burak Ekici:
Procedural and Non-Procedural Implementation of Search Strategies in Control Network Programming. - Eugene Borovikov:
An Evaluation of Support Vector Machines as a Pattern Recognition Tool. - Jan Kyncl
, Bernard Lidický, Tomás Vyskocil:
Irreversible 2-conversion set in graphs of bounded degree. - Ahmadreza Baghaie, Hamid Abrishami Moghaddam:
Finite Element Method Based Modeling of Cardiac Deformation Estimation under Abnormal Ventricular Muscle Conditions. - Yuan-Ting Hu, Yen-Yu Lin, Hsin-Yi Chen, Kuang-Jui Hsu, Bing-Yu Chen:
Descriptor Ensemble: An Unsupervised Approach to Descriptor Fusion in the Homography Space. - Felix Brandt, Markus Brill, Warut Suksompong:
An Ordinal Minimax Theorem. - Xiaosha Zhao, Mandan Liu:
The application of the Bayes Ying Yang harmony based GMMs in on-line signature verification. - Arunava Banerjee:
Learning Spike Train to Spike Train Transformations in Multilayer Feedforward Neuronal Networks. - Yangjie Cao, Hongyang Sun, Depei Qian, Weiguo Wu:
Scalable Hierarchical Scheduling for Malleable Parallel Jobs on Multiprocessor-based Systems. - Dil Nawaz Hakro, Abdullah Zawawi Talib, Zeeshan Bhatti, G. N. Moja:
A Study of Sindhi Related and Arabic Script Adapted languages Recognition. - Jiguang He, Taejoon Kim, Hadi G. Ghauch, Kunpeng Liu, Guangjian Wang:
Millimeter Wave MIMO Channel Tracking Systems. - Riccardo Longo, Chiara Marcolla, Massimiliano Sala:
Two novel applications of bilinear groups to ABE encryption. - Thomas Baudel:
A Canonical Representation of Data-Linear Visualization Algorithms. - Michael Blondin, Alain Finkel, Stefan Göller, Christoph Haase, Pierre McKenzie:
Reachability in Two-Dimensional Vector Addition Systems with States is PSPACE-complete. - Mine Alsan:
Re-proving Channel Polarization Theorems: An Extremality and Robustness Analysis. - Wenjian Chen, Haizhang Zhang:
Exponential Approximation of Multivariate Bandlimited Functions from Average Oversampling. - Ardavan Salehi Nobandegani, Ioannis N. Psaromiligkos:
Multi-Context Models for Reasoning under Partial Knowledge: Generative Process and Inference Grammar. - Maciej Drwal:
Complexity of scheduling on parallel identical machines to minimize total flow time with interval data and minmax regret criterion. - Bo Jiang, Zhi-Li Zhang, Don Towsley:
Reciprocity in Social Networks with Capacity Constraints. - MingJie Tang, Ruby Y. Tahboub, Walid G. Aref, Qutaibah M. Malluhi, Mourad Ouzzani:
On Order-independent Semantics of the Similarity Group-By Relational Database Operator. - Babak Salimi, Leopoldo E. Bertossi:
From Causes for Database Queries to Repairs and Model-Based Diagnosis and Back. - Michael Cogswell, Xiao Lin, Senthil Purushwalkam, Dhruv Batra:
Combining the Best of Graphical Models and ConvNets for Semantic Segmentation. - Joseph Chee Chang, Chu-Cheng Lin:
Recurrent-Neural-Network for Language Detection on Twitter Code-Switching Corpus. - Oleg Mazonka, Vlad Popov:
Hasq Hash Chains. - Mostafa Zaman Chowdhury:
Adaptive Resource Management for Multimedia Applications in Femtocellular and Macrocellular Networks. - Daniel Lupei, Christoph Koch, Val Tannen:
Incremental View Maintenance for Nested-Relational Databases. - Mostafa Zaman Chowdhury, Nirzhar Saha, Sunghun Chae, Yeong Min Jang:
Handover Call Admission Control for Mobile Femtocells with Free-Space Optical and Macrocellular Backbone Networks. - Mostafa Zaman Chowdhury, Yeong Min Jang, Zygmunt J. Haas:
Priority based Bandwidth Adaptation for Multi-class Traffic in Wireless Networks. - Aridj Mohamed:
LH*TH: New fast Scalable Distributed Data Structures (SDDS). - Sofiane Abbar, Yelena Mejova, Ingmar Weber:
You Tweet What You Eat: Studying Food Consumption Through Twitter. - Norihiro Nakashima, Hajime Matsui:
Fast Decoding of Projective Reed-Muller Codes by Dividing a Projective Space into Affine Spaces. - Daniel Fried, Kevin Duh:
Incorporating Both Distributional and Relational Semantics in Word Representations. - Bharath K. Samanthula, Fang-Yu Rao, Elisa Bertino, Xun Yi, Dongxi Liu:
Privacy-Preserving and Outsourced Multi-User k-Means Clustering. - Yi Yang, Jacob Eisenstein:
Unsupervised Domain Adaptation with Feature Embeddings. - Silviu Stanciu, Lidia Dobrescu:
A New System For Recording The Radiological Effective Doses For Patients Investigated by Imaging Methods. - Chun-Hung Liu:
Adaptive Downlink CoMP in Heterogeneous Cellular Networks with Imperfect Overhead Messaging. - Rachel Gauci:
Dafny: Statically Verifying Functional Correctness. - Chantal Enguehard, Béatrice Daille, Emmanuel Morin:
Tools for Terminology Processing. - Lidia Dobrescu:
Domotic Embedded System. - Benjamin A. Miller, Nicholas Arcolano, Michael M. Wolf, Nadya T. Bliss:
Spectral Anomaly Detection in Very Large Graphs: Models, Noise, and Computational Complexity. - Jop Briët, Oded Regev:
Tight Hardness of the Non-commutative Grothendieck Problem. - Klaus M. Schneider, Kai Mast, Udo R. Krieger:
CCN Forwarding Strategies for Multihomed Mobile Terminals. - Yongxin Chen, Tryphon T. Georgiou, Michele Pavon:
On the relation between optimal transport and Schrödinger bridges: A stochastic control viewpoint. - Dai-Qiang Chen:
Inexact Alternating Direction Method Based on Proximal Hessian Matrix with Application to Poisson Image Deblurring. - Dai-Qiang Chen:
Fixed Point Algorithm Based on Quasi-Newton Method for Convex Minimization Problem with Application to Image Deblurring. - Tong Peng, Rodrigo C. de Lamare:
Adaptive Delay-Tolerant DSTBC in Opportunistic Relaying Cooperative MIMO Systems. - Oliver Kosut, Lalitha Sankar:
Asymptotics and Non-asymptotics for Universal Fixed-to-Variable Source Coding. - Max Klimm, Daniel Schmand:
Sharing Non-Anonymous Costs of Multiple Resources Optimally. - Hang Li, Chuan Huang, Fuad E. Alsaadi, Abdullah M. Dobaie, Shuguang Cui:
Opportunistic Multi-Channel Access in Heterogeneous Networks with Renewable Energy Supplies. - M. Praveen, B. Srivathsan:
Defining relations on graphs: how hard is it in the presence of node partitions? - Mostafa Sepahvand, Ghasem Alikhajeh, Meysam Ghaffari, Abdolreza Mirzaei:
Generating Graphical Chain by Mutual Matching of Bayesian Network and Extracted Rules of Bayesian Network Using Genetic Algorithm. - Walid Mahdi, Liming Chen, Mohsen Ardabilian:
Automatic video scene segmentation based on spatial-temporal clues and rhythm. - Dmitry Kosolobov:
Online Repetition Detection With Backtracking. - Ajay Thampi, Soung Chang Liew, Simon Armour, Zhong Fan, Lizhao You, Dritan Kaleshi:
Physical-layer Network Coding in Two-Way Heterogeneous Cellular Networks with Power Imbalance. - Long Zheng, Xiaofei Liao, Bingsheng He, Song Wu, Hai Jin:
On Performance Debugging of Unnecessary Lock Contentions on Multicore Processors: A Replay-based Approach. - Sebastian Rudolph, Michaël Thomazo, Jean-François Baget, Marie-Laure Mugnier:
Worst-case Optimal Query Answering for Greedy Sets of Existential Rules and Their Subclasses. - Sergey Tridenski, Ram Zamir:
Physical Interpretation for the Arimoto Algorithm. - Daniel Zahavi, Lili Zhang, Ivana Maric, Ron Dabora, Andrea J. Goldsmith, Shuguang Cui:
Diversity-Multiplexing Tradeoff for the Interference Channel with a Relay. - Hongsheng Li, Rui Zhao, Xiaogang Wang:
Highly Efficient Forward and Backward Propagation of Convolutional Neural Networks for Pixelwise Classification. - Andres Garcia-Saavedra, Albert Banchs, Pablo Serrano, Joerg Widmer:
Adaptive Mechanism for Distributed Opportunistic Scheduling. - Johan Sund Laursen, Jacob Pørksen Buch, Lars Carøe Sørensen
, Dirk Kraft
, Henrik Gordon Petersen
, Lars-Peter Ellekilde, Ulrik Pagh Schultz
:
Towards Error Handling in a DSL for Robot Assembly Tasks. - Alexios Balatsoukas-Stimming, Andrew Charles Mallory Austin, Pavle Belanovic, Andreas Burg:
Baseband and RF Hardware Impairments in Full-Duplex Wireless Systems: Experimental Characterisation and Suppression. - Damián Adalid, María-del-Mar Gallardo, Laura Titolo:
Modeling Hybrid Systems in Hy-tccp. - Blesson Varghese, Adam Barker:
Are Clouds Ready to Accelerate Ad hoc Financial Simulations? - Andrea Vedaldi, Karel Lenc:
MatConvNet - Convolutional Neural Networks for MATLAB. - Masoumeh Azghani, Mostafa Karimi, Farokh Marvasti:
Multi-Hypothesis Compressed Video Sensing Technique. - Bashir Mohammed, Mariam Kiran:
Experimental Report on Setting up a Cloud Computing Environment at the University of Bradford. - Sebastian Enqvist, Sumit Sourabh:
Generalized Vietoris Bisimulations. - Xiongbin Rao, Vincent K. N. Lau:
Distributed Fronthaul Compression and Joint Signal Recovery in Cloud-RAN. - Felix Weninger, Björn W. Schuller, Florian Eyben, Martin Wöllmer, Gerhard Rigoll:
A Broadcast News Corpus for Evaluation and Tuning of German LVCSR Systems. - Neal Lawton:
An Important Corollary for the Fast Solution of Dynamic Maximal Clique Enumeration Problems. - Daniel Augot, Matthieu Finiasz:
Direct Construction of Recursive MDS Diffusion Layers using Shortened BCH Codes. - Pablo Estefo, Miguel Campusano, Luc Fabresse, Johan Fabry, Jannik Laval, Noury Bouraqadi:
Towards Live Programming in ROS with PhaROS and LRP. - Magnus Skjegstad, Anil Madhavapeddy, Jon Crowcroft:
Kadupul: Livin' on the Edge with Virtual Currencies and Time-Locked Puzzles. - Floriana Gargiulo, Jacopo Bindi, Andrea Apolloni:
The topology of a discussion: the #occupy case. - Simon DeDeo:
"Wrong side of the tracks": Big Data and Protected Categories. - Maxime Crochemore, Robert Mercas:
Fewer runs than word length. - Vahid Garousi, Ahmet Coskunçay, Aysu Betin-Can, Onur Demirörs:
A Survey of Software Engineering Practices in Turkey (extended version). - Qing Qu, Ju Sun, John Wright:
Finding a sparse vector in a subspace: Linear sparsity using alternating directions. - Erik Tromp, Mykola Pechenizkiy:
Rule-based Emotion Detection on Social Media: Putting Tweets on Plutchik's Wheel. - Dominic P. Searson:
GPTIPS 2: an open-source software platform for symbolic data mining. - Jesus Diaz, David Arroyo, Francisco de Borja Rodríguez
:
Fair anonymity for the Tor network. - Flávio Keidi Miyazawa, Lehilton L. C. Pedrosa, Rafael Crivellari Saliba Schouery, Maxim Sviridenko, Yoshiko Wakabayashi:
Polynomial-Time Approximation Schemes for Circle and Other Packing Problems. - Sorin Adam, Ulrik Pagh Schultz:
Towards Interactive, Incremental Programming of ROS Nodes. - Abhishek Bhowmick, Shachar Lovett:
Nonclassical polynomials as a barrier to polynomial lower bounds. - Rustam Tagiew, Dmitry I. Ignatov, Fadi Amroush:
Experimental economics for web mining. - Subhashini Venugopalan, Huijuan Xu, Jeff Donahue, Marcus Rohrbach, Raymond J. Mooney, Kate Saenko:
Translating Videos to Natural Language Using Deep Recurrent Neural Networks. - David P. Helmbold, Philip M. Long:
On the Inductive Bias of Dropout. - Volker Diekert, Florent Martin
, Géraud Sénizergues, Pedro V. Silva:
Equations over free inverse monoids with idempotent variables. - James L. Caldwell
, Philip K. F. Hölzenspies, Peter Achten:
Proceedings 3rd International Workshop on Trends in Functional Programming in Education, TFPIE 2014, Soesterberg, The Netherlands, 25th May 2014. EPTCS 170, 2014 [contents] - Yuxiao Dong, Reid A. Johnson, Nitesh V. Chawla:
Will This Paper Increase Your h-index? Scientific Impact Prediction. - Vasile Patrascu:
Neutrosophic information in the framework of multi-valued representation. - Saeed R. Khosravirad, Leszek Szczecinski, Fabrice Labeau:
Opportunistic Relaying without CSI: Optimizing Variable-Rate HARQ. - Dean P. Foster, Howard J. Karloff, Justin Thaler:
Variable Selection is Hard. - Constantinos Daskalakis, Qinxuan Pan:
A Counter-Example to Karlin's Strong Conjecture for Fictitious Play. - MingJie Tang, Ruby Y. Tahboub, Walid G. Aref, Mikhail J. Atallah, Qutaibah M. Malluhi, Mourad Ouzzani, Yasin N. Silva:
Similarity Group-by Operators for Multi-dimensional Relational Data. - Ruokuang Lin, Qianli D. Y. Ma, Chunhua Bian:
Zipf and Heaps Laws in Human spoken English Language. - Ali Paikan, Giorgio Metta, Lorenzo Natale:
A representation of robotic behaviors using component port arbitration. - Yong Yao, Jia Xu, Lu Yang:
A Successive Resultant Projection for Cylindrical Algebraic Decomposition. - Konstantine Tsotsos, Alessandro Chiuso, Stefano Soatto:
Robust Inference for Visual-Inertial Sensor Fusion. - Changsheng Li, Qingshan Liu, Weishan Dong, Xin Zhang, Lin Yang:
Max-Margin based Discriminative Feature Learning. - Yuki Ishii, Kenichi Asai:
Report on a User Test and Extension of a Type Debugger for Novice Programmers. 1-18 - Marco T. Morazán
, Rosario Antunez:
Functional Automata - Formal Languages for Computer Science Students. 19-32 - Tim Olmer, Bastiaan Heeren, Johan Jeuring:
Evaluating Haskell expressions in a tutoring environment. 50-66 - Scott N. Walck:
Learn Physics by Programming in Haskell. 67-77 - Victor L. Winter:
Bricklayer: An Authentic Introduction to the Functional Programming Language SML. 33-49 - Prabhakar Ragde:
Simple Balanced Binary Search Trees. 78-87 - Hartmut Klauck, Supartha Podder:
New Bounds for the Garden-Hose Model. - Gangshan Jing, Yuanshi Zheng, Long Wang:
Consensus of Multi-agent Systems Under State-dependent Information Transmission. - Rémi Lebret, Ronan Collobert:
Rehabilitation of Count-based Models for Word Vector Representations. - Sankha Baran Dutta, Robert D. McLeod, Marcia R. Friesen:
GPU accelerated Nature Inspired Methods for Modelling Large Scale Bi-Directional Pedestrian Movement. - Luca Marchesotti, Naila Murray, Florent Perronnin:
Discovering beautiful attributes for aesthetic image analysis. - Paul Irofti:
Efficient GPU Implementation for Single Block Orthogonal Dictionary Learning. - Orestis Georgiou, Mohammud Z. Bocus, Mohammed R. Rahman, Carl P. Dettmann, Justin P. Coon:
Network connectivity in non-convex domains with reflections. - Himanshu Tyagi, Alexander Vardy:
Semantically-Secure Coding Scheme Achieving the Capacity of a Gaussian Wiretap Channel. - Anthony Knittel, Alan D. Blair
:
Sparse, guided feature connections in an Abstract Deep Network. - Sejun Park, Jinwoo Shin:
Max-Product Belief Propagation for Linear Programming: Convergence and Correctness. - Jan Dreier, Philipp Kuinke, Rafael Przybylski, Felix Reidl, Peter Rossmanith, Somnath Sikdar:
Overlapping Communities in Social Networks. - Huandong Wang, Yong Li, Ying Zhang, Depeng Jin:
Virtual Machine Migration Planning in Software-Defined Networks. - Hsiang-Fu Yu, Cho-Jui Hsieh, Hyokun Yun, S. V. N. Vishwanathan, Inderjit S. Dhillon:
A Scalable Asynchronous Distributed Algorithm for Topic Modeling. - Medhat H. M. Elsayed, Amr A. El-Sherif, Amr Mohamed:
DDSAT: Distributed Dynamic Spectrum Access Protocol Implementation Using GNURadio and USRP. - Jens Maßberg:
The rectilinear Steiner tree problem with given topology and length restrictions. - Daniel Augot, Françoise Levy-dit-Vehel, Abdullatif Shikfa:
A Storage-Efficient and Robust Private Information Retrieval Scheme Allowing Few Servers. - Ali Borji:
What is a salient object? A dataset and a baseline model for salient object detection. - Mikkel Abrahamsen:
Spiral Toolpaths for High-Speed Machining of 2D Pockets with or without Islands. - Michael Schreiber:
Restricting the h-index to a citation time window: A case study of a timed Hirsch index. - Johann Schlamp, Josef Gustafsson, Matthias Wählisch, Thomas C. Schmidt, Georg Carle:
The Abandoned Side of the Internet: Hijacking Internet Resources When Domain Names Expire. - Carlo Galiotto, Nuno K. Pratas, Nicola Marchetti, Linda Doyle:
A Stochastic Geometry Framework for LOS/NLOS Propagation in Dense Small Cell Networks. - Anton V. Eremeev, Julia V. Kovalenko:
Analysis of Optimal Recombination in Genetic Algorithm for a Scheduling Problem with Setups. - Shixiang Gu, Luca Rigazio:
Towards Deep Neural Network Architectures Robust to Adversarial Examples. - Gavin Harrison, Jeremy R. Johnson, B. David Saunders:
Probabilistic analysis of Wiedemann's algorithm for minimal polynomial computation. - David Eppstein:
$k$-best enumeration. - Ridvan Sahin, Muhammed Yigider:
A Multi-criteria neutrosophic group decision making metod based TOPSIS for supplier selection. - Qiang Qiu, Guillermo Sapiro, Alexander M. Bronstein:
Random Forests Can Hash. - Jan van Eijck, Bryan Renne:
Belief as Willingness to Bet. - Angjoo Kanazawa, Abhishek Sharma, David W. Jacobs:
Locally Scale-Invariant Convolutional Neural Networks. - Mohammadreza Doostmohammadian, Usman A. Khan:
Measurement partitioning and observational equivalence in state estimation. - Shervin Minaee, Haoping Yu, Yao Wang:
A Robust Regression Approach for Background/Foreground Segmentation. - Matthew Hague, Anthony Widjaja Lin, Luke Ong:
Detecting Redundant CSS Rules in HTML5 Applications: A Tree-Rewriting Approach. - (Withdrawn) Polynomial-time Method of Determining Subset Sum Solutions.
- Vassilis Vassiliadis, Konstantinos Parasyris, Charalambos Chalios, Christos D. Antonopoulos, Spyros Lalis, Nikolaos Bellas, Hans Vandierendonck, Dimitrios S. Nikolopoulos:
A Programming Model and Runtime System for Significance-Aware Energy-Efficient Computing. - Pablo Pérez-Lantero:
Area and Perimeter of the Convex Hull of Stochastic Points. - Ridvan Sahin:
Multi-criteria neutrosophic decision making method based on score and accuracy functions under neutrosophic environment. - Shoni Gilboa, Shay Gueron, Ben Morris:
How many queries are needed to distinguish a truncated random permutation from a random function? - Anish Acharya:
Are We Ready for Driver-less Vehicles? Security vs. Privacy- A Social Perspective. - Michal Lopuszynski:
Application of Topic Models to Judgments from Public Procurement Domain. - Esther Ezra:
Shallow Packings in Geometry. - Roger B. Grosse, David Kristjanson Duvenaud:
Testing MCMC code. - Il-Min Kim, Byoung-Hoon Kim, Joon Kui Ahn:
BER-Based Physical Layer Security with Finite Codelength: Combining Strong Converse and Error Amplification. - Yunlong Cai, Rodrigo C. de Lamare, Lie-Liang Yang, Minjian Zhao:
Robust MMSE Precoding for Multiuser MIMO Relay Systems using Switched Relaying and Side Information. - Katerina Marazopoulou, David T. Arbour, David D. Jensen:
Refining the Semantics of Social Influence. - Shuai Zhang, Jack Xin:
Minimization of Transformed L1 Penalty: Closed Form Representation and Iterative Thresholding Algorithms. - Yujia Li, Kevin Swersky, Richard S. Zemel:
Learning unbiased features. - Catherine S. Greenhill:
The switch Markov chain for sampling irregular graphs. - Alekh Jindal, Samuel Madden, Malú Castellanos, Meichun Hsu:
Graph Analytics using the Vertica Relational Database. - Bin Han, Zhenpeng Zhao, Xiaosheng Zhuang:
Directional Tensor Product Complex Tight Framelets with Low Redundancy. - Jun Fan, Ting Hu, Qiang Wu, Ding-Xuan Zhou:
Consistency Analysis of an Empirical Minimum Error Entropy Algorithm. - Ismail Nojavani, Azade Rezaeezade, S. Amirhassan Monadjemi:
Iranian cashes recognition using mobile. - Jose M. Such, Michael Rovatsos:
Privacy Policy Negotiation in Social Media. - Daniel Bundala, Michael Codish, Luís Cruz-Filipe, Peter Schneider-Kamp, Jakub Závodný:
Optimal-Depth Sorting Networks. - Tohid Ardeshiri, Emre Özkan, Umut Orguner:
Approximate Bayesian Smoothing with Unknown Process and Measurement Noise Covariances. - Maximilien Gadouleau, Adrien Richard, Eric Fanchon:
Reduction and Fixed Points of Boolean Networks and Linear Network Coding Solvability.