


default search action
CoRR, June 2015
- Zhigang Lu, Hong Shen:

A Security-assured Accuracy-maximised Privacy Preserving Collaborative Filtering Recommendation Algorithm. - Brooke Logan, Hieu D. Nguyen:

Group Symmetries of Complementary Code Matrices. - Jie Dong, Nicole Sawyer, David B. Smith:

The Application of Non-Cooperative Stackelberg Game Theory in Behavioral Science: Social Optimality with any Number of Players. - Zachary Chase Lipton:

A Critical Review of Recurrent Neural Networks for Sequence Learning. - Michael Kazhdan, Gurprit Singh, Adrien Pilleboue, David Coeurjolly, Victor Ostromoukhov:

Variance Analysis for Monte Carlo Integration: A Representation-Theoretic Perspective. - Xiaohan Zhao, Qingyun Liu, Lin Zhou, Haitao Zheng, Ben Y. Zhao:

Graph Watermarks. - Charles R. Doss:

Bracketing Numbers of Convex Functions on Polytopes. - Stanislav Sobolevsky, Emanuele Massaro, Iva Bojic, Juan Murillo Arias, Carlo Ratti:

Predicting Regional Economic Indices using Big Data of Individual Bank Card Transactions. - Gilchan Park, Julia M. Taylor:

Using Syntactic Features for Phishing Detection. - Leonardo A. Duarte, Otávio Augusto Bizetto Penatti, Jurandy Almeida:

Bag-of-Genres for Video Genre Retrieval. - Martín Arjovsky:

Saddle-free Hessian-free optimization for Deep Learning. - Xiaohao Cai, Raymond H. Chan, Mila Nikolova, Tieyong Zeng:

A Three-stage Approach for Segmenting Degraded Color Images: Smoothing, Lifting and Thresholding (SLaT). - Daxin Zhu, Lei Wang, Yingjie Wu, Xiaodong Wang:

An Efficient Dynamic Programming Algorithm for STR-IC-SEQ-EC-LCS Problem. - Boulat A. Bash, Dennis Goeckel, Saikat Guha, Don Towsley:

Hiding Information in Noise: Fundamental Limits of Covert Wireless Communication. - (Withdrawn) Recognition of convolutional neural network based on CUDA Technology.

- (Withdrawn) Integration of Gene Expression Data and Methylation Reveals Genetic Networks for Glioblastoma.

- Behçet Açikmese:

Linear Matrix Inequalities for Ultimate Boundedness of Dynamical Systems with Conic Uncertain/Nonlinear Terms. - Tri Murti, Leon Andretti Abdillah

, Muhammad Sobri:
Sistem penunjang keputusan kelayakan pemberian pinjaman dengna metode fuzzy tsukamoto. - Athanasios N. Nikolakopoulos, John D. Garofalakis:

Random Surfing Without Teleportation. - Dmytro Klets:

Modeling of Mobile Vehicle Skid in Traction Movement Mode. - (Withdrawn) On the computational complexity of evolution.

- Alex Pappachen James, Belur V. Dasarathy:

A Review of Feature and Data Fusion with Medical Images. - Reza Azizi, Hasan Sedghi, Hamid Shoja, Alireza Sepas-Moghaddam:

A Novel Energy Aware Node Clustering Algorithm for Wireless Sensor Networks Using a Modified Artificial Fish Swarm Algorithm. - Gerasimos Razis

, Ioannis Anagnostopoulos:
Discovering similar Twitter accounts using semantics. - Eleni Rozaki:

Design and implementation for automated network troubleshooting using data mining. - (Withdrawn) IDSA: Intelligent Distributed Sensor Activation Algorithm For Target Tracking With Wireless Sensor Network.

- Pedro Quaresma, Vanda Santos, Milena Maric:

A Web Environment for Geometry. - Qingpei Guo, Chao Xu, Yang Song:

The Implementation of Hadoop-based Crawler System and Graphlite-based PageRank-Calculation In Search Engine. - Jon M. Kleinberg, Maithra Raghu:

Team Performance with Test Scores. - Jingbo Liu, Paul Cuff, Sergio Verdú:

Resolvability in Eγ with Applications to Lossy Compression and Wiretap Channels. - Shay Moran, Manfred K. Warmuth:

Labeled compression schemes for extremal classes. - Sagi Eppel:

Using curvature to distinguish between surface reflections and vessel contents in computer vision based recognition of materials in transparent vessels. - Liquan Qiu, Lianwen Jin, Ruifen Dai, Yuxiang Zhang, Lei Li:

An Open Source Testing Tool for Evaluating Handwriting Input Methods. - (Withdrawn) Forecasting popularity of videos in YouTube.

- Ingrid Daubechies, Rayan Saab:

A Deterministic Analysis of Decimation for Sigma-Delta Quantization of Bandlimited Functions. - Benjamin A. Braun, Suman Jana, Dan Boneh:

Robust and Efficient Elimination of Cache and Timing Side Channels. - Ruo-Wei Hung

:
Hamiltonian Cycles in Linear-Convex Supergrid Graphs. - Sanket Satpathy, Paul Cuff:

Gaussian Secure Source Coding and Wyner's Common Information. - Sanket Satpathy, Paul Cuff:

Secure Cascade Channel Synthesis. - Baolin Peng, Kaisheng Yao:

Recurrent Neural Networks with External Memory for Language Understanding. - Kaisheng Yao, Geoffrey Zweig:

Sequence-to-Sequence Neural Net Models for Grapheme-to-Phoneme Conversion. - Kyeong Soo Kim, Sanghyuk Lee, Tiew On Ting, Xin-She Yang:

Atomic Scheduling of Appliance Energy Consumption in Residential Smart Grid. - Dmitriy S. Malyshev:

A complexity dichotomy for the dominating set problem. - Zhuang Wang, Xiao Lv, Mingyu Yan, Wei Yang, Ge Li:

Fair Packet Scheduling in Network on Chip. - Anshoo Tandon, Mehul Motani, Lav R. Varshney:

Subblock-Constrained Codes for Real-Time Simultaneous Energy and Information Transfer. - Yajun Cui, Yang Zhao, Kafei Xiao, Chenglong Zhang, Lei Wang:

Parallel Spectral Clustering Algorithm Based on Hadoop. - Wei Liu:

Channel Equalization and Beamforming for Quaternion-Valued Wireless Communication Systems. - Bhavya Kailkhura, Sijia Liu, Thakshila Wimalajeewa, Pramod K. Varshney:

Measurement Matrix Design for Compressive Detection with Secrecy Guarantees. - Michael J. Kearns, Aaron Roth, Zhiwei Steven Wu, Grigory Yaroslavtsev:

Privacy for the Protected (Only). - Hui Wang, Anthony T. S. Ho, Shujun Li:

OR-Benchmark: An Open and Reconfigurable Digital Watermarking Benchmarking Framework. - Adham Beykikhoshk, Ognjen Arandjelovic, Dinh Q. Phung, Svetha Venkatesh, Terry Caelli:

Using Twitter to learn about the autism community. - Adi Jarden, Vadim E. Levit, Eugen Mandrescu:

Monotonic Properties of Collections of Maximum Independent Sets of a Graph. - Or Ordentlich, Ofer Shayevitz:

Minimum MS. E. Gerber's Lemma. - Adi Jarden, Vadim E. Levit, Eugen Mandrescu:

Critical and Maximum Independent Sets of a Graph. - André Merzky

, Shantenu Jha:
Synapse: Bridging the Gap Towards Predictable Workload Placement. - Badih Ghazi, Pritish Kamath, Madhu Sudan:

Communication Complexity of Permutation-Invariant Functions. - Shashi Narayan, Shay B. Cohen:

Diversity in Spectral Learning for Natural Language Parsing. - M. Andrecut:

A Matrix Public Key Cryptosystem. - Licheng Yu, Eunbyung Park, Alexander C. Berg, Tamara L. Berg:

Visual Madlibs: Fill in the blank Image Generation and Question Answering. - Mostafizur Rahman, Jiajun Shi, Mingyu Li, Santosh Khasanvis, Csaba Andras Moritz:

Manufacturing Pathway and Experimental Demonstration for Nanoscale Fine-Grained 3-D Integrated Circuit Fabric. - Yael Tauman Kalai, Ilan Komargodski:

Compressing Communication in Distributed Protocols. - Travis Wolfe, Mark Dredze, James Mayfield, Paul McNamee, Craig Harman, Tim Finin, Benjamin Van Durme:

Interactive Knowledge Base Population. - Emad Soroush, Magdalena Balazinska, K. Simon Krughoff, Andrew J. Connolly:

Efficient Iterative Processing in the SciDB Parallel Array Engine. - Masrour Zoghi, Zohar Shay Karnin, Shimon Whiteson, Maarten de Rijke:

Copeland Dueling Bandits. - Uichin Lee, Joshua Joy, Youngtae Noh:

Secure Personal Content Networking over Untrusted Devices. - Zhiguang Wang, Tim Oates:

Imaging Time-Series to Improve Classification and Imputation. - Shuqiao Jia, Behnaam Aazhang:

Signaling Design of Two-Way MIMO Full-Duplex Channel: Optimality Under Imperfect Transmit Front-End Chain. - Lin Ma, Zhengdong Lu, Hang Li:

Learning to Answer Questions From Image using Convolutional Neural Network. - Zhiguo Long, Sanjiang Li:

On Distributive Subalgebras of Qualitative Spatial and Temporal Calculi. - Khalid Raza:

Formal Concept Analysis for Knowledge Discovery from Biological Data. - Thanh The Van, Thanh Manh Le:

RBIR using Interest Regions and Binary Signatures. - Yankai Lin, Zhiyuan Liu, Maosong Sun:

Modeling Relation Paths for Representation Learning of Knowledge Bases. - Nitinder Mohan, Pushpendra Singh:

CCNCheck: Enabling Checkpointed Distributed Applications in Content Centric Networks. - Marcus Paradies, Michael Rudolf, Wolfgang Lehner

:
GraphVista: Interactive Exploration Of Large Graphs. - Roberto Toldo, Riccardo Gherardi, Michela Farenzena, Andrea Fusiello:

Hierarchical structure-and-motion recovery from uncalibrated images. - Amir Pouya Aghasadeghi, Mohadeseh Bastan, Shahram Khadivi:

Rebuilding Phrase Table Scores from Monolingual Resources Using Neural Networks Vector Representations. - Demia Della Penda, Liqun Fu, Mikael Johansson:

Energy efficient D2D communications in dynamic TDD systems. - Bo Jiang, Jiaying Wu, Xiuyu Shi, Ruhuan Huang:

Hadoop Scheduling Base On Data Locality. - Aravind Rajeswaran, Shankar Narasimhan:

A New Method for Reconstructing Network Topology from Flux Measurements. - Zhuo Wang, Longlong Tian, Dianjie Guo, Xiaoming Jiang:

Optimization and analysis of large scale data sorting algorithm based on Hadoop. - Andreas Darmann, Ulrich Pferschy, Joachim Schauer:

On the shortest path game: extended version. - Michal Lukasik, Trevor Cohn, Kalina Bontcheva:

Estimating collective judgement of rumours in social media. - Patrick Héas

, Angélique Drémeau, Cédric Herzet:
Estimation of Super-Resolved Video Dynamics. - Peter Jonsson, Johan Thapper:

Constraint Satisfaction and Semilinear Expansions of Addition over the Rationals and the Reals. - Weilin Huang, Hujun Yin:

Robust Face Recognition with Structural Binary Gradient Patterns. - Irini-Eleftheria Mens, Oded Maler:

Learning Regular Languages over Large Ordered Alphabets. - Ather Gattami:

Optimal Communication of States of Dynamical Systems over Gaussian Channels with Noisy Feedback: The Scalar Case. - Adam Barker, Blesson Varghese, Long Thai:

Cloud Services Brokerage: A Survey and Research Roadmap. - Silas L. Fong:

Cut-Set Bounds for Multimessage Multicast Networks with Independent Channels and Zero-Delay Edges. - Muhammad Ikram, Lucky Onwuzurike, Emiliano De Cristofaro, Arik Friedman, Guillaume Jourjon, Mohamed Ali Kâafar, M. Zubair Shafiq:

Spying on Spammers: Tracking Like Farm Accounts on Facebook. - Jimmy Ba, Kevin Swersky, Sanja Fidler, Ruslan Salakhutdinov:

Predicting Deep Zero-Shot Convolutional Neural Networks using Textual Descriptions. - Simone Bianco, Gianluigi Ciocca:

User Preferences Modeling and Learning for Pleasing Photo Collage Generation. - Chang Wang, Liangliang Cao, Bowen Zhou:

Medical Synonym Extraction with Concept Space Models. - Marco Zaffalon, Enrique Miranda:

Desirability and the birth of incomplete preferences. - Vipul Gupta, Bhavya Kailkhura, Thakshila Wimalajeewa, Pramod K. Varshney:

Joint Sparsity Pattern Recovery with 1-bit Compressive Sensing in Sensor Networks. - David Evan Zlotnik, James Richard Forbes:

Differential Geometric SLAM. - Martin Junghanns, André Petermann, Kevin Gómez, Erhard Rahm:

GRADOOP: Scalable Graph Data Management and Analytics with Hadoop. - Wladmir Cardoso Brandão:

Writing and Publishing Scientific Articles in Computer Science. - Yanpeng Yang, Ki Won Sung:

Technical Rate of Substitution of Spectrum in Future Mobile Broadband Provisioning. - Aristides T. Hatjimihail:

Calculation of the confidence bounds for the fraction nonconforming of normal populations of measurements in clinical laboratory medicine. - Han-Teng Liao, King-wa Fu, Scott A. Hale:

How much is said in a microblog? A multilingual inquiry based on Weibo and Twitter. - Yuri Obukhov, Pierre-Olivier Jubert, Daniel Bedau, Michael Grobis:

Two-dimensional Decoding Algorithms and Recording Techniques for Bit Patterned Media Feasibility Demonstrations. - William Blacoe:

On Quantum Generalizations of Information-Theoretic Measures and their Contribution to Distributional Semantics. - Long Thai, Blesson Varghese, Adam Barker:

Executing Bag of Distributed Tasks on Virtually Unlimited Cloud Resources. - Serveh Shalmashi, Emil Björnson, Marios Kountouris, Ki Won Sung, Mérouane Debbah:

Energy Efficiency and Sum Rate Tradeoffs for Massive MIMO Systems with Underlaid Device-to-Device Communications. - Alexander Kozachinskiy:

On Slepian-Wolf Theorem with Interaction. - Bart van Merriënboer, Dzmitry Bahdanau, Vincent Dumoulin, Dmitriy Serdyuk, David Warde-Farley, Jan Chorowski, Yoshua Bengio:

Blocks and Fuel: Frameworks for deep learning. - Olivier Buu:

Sensitivity Analysis of Resonant Circuits. - Jayadev Acharya, Ilias Diakonikolas, Jerry Zheng Li, Ludwig Schmidt:

Sample-Optimal Density Estimation in Nearly-Linear Time. - Pratik Ghosal, Adam Kunysz, Katarzyna E. Paluch:

Characterisation of Strongly Stable Matchings. - Cameron T. Chalk, Bin Fu, Alejandro Huerta, Mario A. Maldonado, Eric Martinez, Robert T. Schweller, Tim Wylie:

Flipping Tiles: Concentration Independent Coin Flips in Tile Self-Assembly. - Lorenzo Coviello, Massimo Franceschetti:

Matching markets with bundle discounts: computing efficient, stable and fair solutions. - Zhiying Wang, Viveck R. Cadambe:

Multi-Version Coding in Distributed Storage. - Rushikesh Kamalapurkar, Lindsey Andrews, Patrick Walters, Warren E. Dixon:

Model-based reinforcement learning for infinite-horizon approximate optimal tracking. - Archie C. Chapman, Gregor Verbic:

An Iterative On-Line Mechanism for Demand-Side Aggregation. - Ventsislav Chonev, Joël Ouaknine, James Worrell:

On the Decidability of the Bounded Continuous Skolem Problem. - Hendra Setiawan, Zhongqiang Huang, Jacob Devlin, Thomas Lamar, Rabih Zbib, Richard M. Schwartz, John Makhoul:

Statistical Machine Translation Features with Multitask Tensor Networks. - Ahmed M. Elgammal, Babak Saleh:

Quantifying Creativity in Art Networks. - Szilárd Páll, Mark James Abraham, Carsten Kutzner, Berk Hess, Erik Lindahl:

Tackling Exascale Software Challenges in Molecular Dynamics Simulations with GROMACS. - Charles L. A. Clarke, J. Shane Culpepper, Alistair Moffat:

Assessing Efficiency-Effectiveness Tradeoffs in Multi-Stage Retrieval Systems Without Using Relevance Judgments. - Ryuhei Mori, Osamu Watanabe:

Peeling Algorithm on Random Hypergraphs with Superlinear Number of Hyperedges. - Ryan Gabrys, Han Mao Kiah, Olgica Milenkovic:

Asymmetric Lee Distance Codes for DNA-Based Storage. - Xiaowang Zhang, Zhiyong Feng, Xin Wang, Guozheng Rao, Wenrui Wu:

Context-Free Path Queries on RDF Graphs. - Zhiyong Lin, Hai Liu, Lu Yu, Yiu-Wing Leung, Xiaowen Chu:

ZOS: A Fast Rendezvous Algorithm Based on Set of Available Channels for Cognitive Radios. - Luca Carlone, David M. Rosen, Giuseppe Carlo Calafiore, John J. Leonard, Frank Dellaert:

Lagrangian Duality in 3D SLAM: Verification Techniques and Optimal Solutions. - Chaoyang Jiang, Yeng Chai Soh, Hua Li:

Sensor placement by maximal projection on minimum eigenspace for linear inverse problem. - Yuanming Shi, Jun Zhang, Brendan O'Donoghue, Khaled Ben Letaief:

Large-Scale Convex Optimization for Dense Wireless Cooperative Networks. - Supasorn Suwajanakorn, Ira Kemelmacher-Shlizerman, Steven M. Seitz:

What Makes Kevin Spacey Look Like Kevin Spacey. - Chun Lam Chan, Winston Fernandes, Navin Kashyap, Manjunath Krishnapur:

Phase Transitions for the Uniform Distribution in the PML Problem and its Bethe Approximation. - Thanh The Van, Thanh Manh Le:

Image Retrieval Based on Binary Signature ang S-kGraph. - Zheng Cai, Donglin Cao, Rongrong Ji:

Video (GIF) Sentiment Analysis using Large-Scale Mid-Level Ontology. - Madhu Khurana, Vikas Saxena:

Soft Computing Techniques for Change Detection in remotely sensed images : A Review. - Eric Rutger Leukfeldt:

Comparing Victims of Phishing and Malware Attacks: Unraveling Risk Factors and Possibilities for Situational Crime Prevention. - Eimear Byrne, Marco Calderini:

Error Correction for Index Coding With Coded Side Information. - Wenhao Wang:

Notes on Rainbow Distinguished Point Method. - Xiangyu Zeng, Shi Yin, Dong Wang:

Learning Speech Rate in Speech Recognition. - (Withdrawn) Classify Images with Conceptor Network.

- Sebastian Daum, Fabian Kuhn, Yannic Maus:

Rumor Spreading with Bounded In-Degree. - Eugénio Ribeiro

, Ricardo Ribeiro
, David Martins de Matos
:
The Influence of Context on Dialogue Act Recognition. - Thomas L. Falch, Anne C. Elster:

Machine Learning Based Auto-tuning for Enhanced OpenCL Performance Portability. - Mulugeta K. Fikadu, Paschalis C. Sofotasios, Qimei Cui, Mikko Valkama, George K. Karagiannidis:

Exact Error Analysis and Energy-Efficiency Optimization of Regenerative Relay Systems with Spatial Correlation. - Mehdi S. M. Sajjadi, Morteza Alamgir, Ulrike von Luxburg:

Peer Grading in a Course on Algorithms and Data Structures: Machine Learning Algorithms do not Improve over Simple Baselines. - Artur Czumaj, Peter Davies:

Almost Optimal Deterministic Broadcast in Radio Networks. - Kewei Tu:

Stochastic And-Or Grammars: A Unified Framework and Logic Perspective. - Daniel Alberto Burbano Lombana, Mario di Bernardo:

Multiplex PI-Control for Consensus in Networks of Heterogeneous Linear Agents. - Jörg Endrullis, Clemens Grabmayer, Dimitri Hendriks, Hans Zantema:

The Degree of Squares is an Atom (Extended Version). - Joana Côrte-Real, Theofrastos Mantadelis, Inês de Castro Dutra, Ricardo Rocha:

SkILL - a Stochastic Inductive Logic Learner. - Xiongbin Rao, Vincent K. N. Lau:

Compressive Sensing with Prior Support Quality Information and Application to Massive MIMO Channel Estimation with Temporal Correlation. - Julia Kiseleva, Melanie J. I. Müller, Lucas Bernardi, Chad Davis, Ivan Kovacek, Mats Stafseng Einarsen, Jaap Kamps, Alexander Tuzhilin, Djoerd Hiemstra:

Where to Go on Your Next Trip? Optimizing Travel Destinations Based on User Preferences. - Catarina Runa Miranda, Pedro Mendes, Pedro Coelho, Xenxo Alvarez, João Freitas, Miguel Sales Dias, Verónica Costa Orvalho

:
Facial Expressions Tracking and Recognition: Database Protocols for Systems Validation and Evaluation. - Diogo Marques, Luís Carriço, Tiago João Vieira Guerreiro:

Assessing Inconspicuous Smartphone Authentication for Blind People. - Xiaozhe Wang, Konstantin S. Turitsyn:

Data-Driven Diagnostics of Mechanism and Source of Sustained Oscillations. - Hastagiri P. Vanchinathan, Andreas Marfurt, Charles-Antoine Robelin, Donald Kossmann, Andreas Krause:

Discovering Valuable Items from Massive Data. - Maise Dantas da Silva, Fábio Protti, Jayme Luiz Szwarcfiter:

Parameterized mixed cluster editing via modular decomposition. - Gergely Vadai, Robert Mingesz, Zoltan Gingl:

Generalized Kirchhoff-Law-Johnson-Noise (KLJN) secure key exchange system using arbitrary resistors. - Eduardo Graells-Garrido, Mounia Lalmas, Ricardo Baeza-Yates:

Finding Intermediary Topics Between People of Opposing Views: A Case Study. - Alicia Cantón, L. Fernández-Jambrina, E. Rosado María, María J. Vázquez-Gallo:

Geometric elements and classification of quadrics in rational Bézier form. - Gautier Marti, Philippe Very, Philippe Donnat:

Toward a generic representation of random variables for machine learning. - Giacomo Bacci, Samson Lasaulce, Walid Saad, Luca Sanguinetti:

Game Theory for Signal Processing in Networks. - Yao Lu:

Unsupervised Learning on Neural Network Outputs. - Alberto García-Durán, Antoine Bordes, Nicolas Usunier, Yves Grandvalet:

Combining Two And Three-Way Embeddings Models for Link Prediction in Knowledge Bases. - Lucius Gregory Meredith:

Linear Types Can Change the Blockchain. - Jules Hedges, Paulo Oliva, Evguenia Sprits, Viktor Winschel, Philipp Zahn:

Higher-Order Game Theory. - Jules Hedges, Paulo Oliva, Evguenia Sprits, Viktor Winschel, Philipp Zahn:

Higher-Order Decision Theory. - Emil Björnson, Michail Matthaiou, Antonios Pitarokoilis, Erik G. Larsson:

Distributed Massive MIMO in Cellular Networks: Impact of Imperfect Hardware and Number of Oscillators. - Ulrich Speidel, Etuate Cocker, Péter Vingelmann, Janus Heide, Muriel Médard:

Can network coding bridge the digital divide in the Pacific? - Emil Björnson, Luca Sanguinetti, Marios Kountouris:

Energy-Efficient Future Wireless Networks: A Marriage between Massive MIMO and Small Cells. - Frederik Ruelens, Sandro Iacovella, Bert J. Claessens, Ronnie Belmans:

Learning Agent for a Heat-Pump Thermostat With a Set-Back Strategy Using Model-Free Reinforcement Learning. - Eric Blais, Li-Yang Tan, Andrew Wan:

An inequality for the Fourier spectrum of parity decision trees. - Peng Lin

:
Performing Bayesian Risk Aggregation using Discrete Approximation Algorithms with Graph Factorization. - Jiwei Li, Minh-Thang Luong, Dan Jurafsky:

A Hierarchical Neural Autoencoder for Paragraphs and Documents. - Bahar Partov, Douglas J. Leith:

Utility Fair Rate Allocation in LTE/802.11 Networks. - Nan Zhou, Yangyang Xu, Hong Cheng, Jun Fang, Witold Pedrycz:

Local-Structure Adaptive Sparse Subspace Learning: An Iterative Approach to Unsupervised Feature Selection. - Panagiotis G. Ipeirotis, Evgeniy Gabrilovich:

Quizz: Targeted crowdsourcing with a billion (potential) users. - Jiwei Li, Xinlei Chen, Eduard H. Hovy, Dan Jurafsky:

Visualizing and Understanding Neural Models in NLP. - Xinyu Wu, Vishal Saxena, Kehan Zhu:

A CMOS Spiking Neuron for Dense Memristor-Synapse Connectivity for Brain-Inspired Computing. - Jiwei Li, Dan Jurafsky:

Do Multi-Sense Embeddings Improve Natural Language Understanding? - Aleksey Buzmakov, Sergei O. Kuznetsov, Amedeo Napoli:

Fast Generation of Best Interval Patterns for Nonmonotonic Constraints. - Xinyu Wu, Vishal Saxena, Kehan Zhu:

Homogeneous Spiking Neuromorphic System for Real-World Pattern Recognition. - Chien-Liang Fok, Gwendolyn Johnson, John D. Yamokoski, Aloysius K. Mok, Luis Sentis:

ControlIt! - A Software Framework for Whole-Body Operational Space Control. - Saullo Haniell Galvão de Oliveira, Rosana Veroneze, Fernando José Von Zuben:

On bicluster aggregation and its benefits for enumerative solutions. - Carlo Comin, Romeo Rizzi:

An Improved Upper Bound on Maximal Clique Listing via Rectangular Fast Matrix Multiplication. - Joshua Brody, Mario Sánchez:

Dependent Random Graphs and Multiparty Pointer Jumping. - Zhijie Zhu, Edward Schmerling, Marco Pavone:

A Convex Optimization Approach to Smooth Trajectories for Motion Planning with Car-Like Robots. - Saehoon Kim, Seungjin Choi:

Bilinear Random Projections for Locality-Sensitive Binary Codes. - Kelvin Guu, John Miller, Percy Liang:

Traversing Knowledge Graphs in Vector Space. - Sudeep Kamath, Venkat Anantharam, David N. C. Tse, Chih-Chun Wang:

The two-unicast problem. - Wenhong Tian, Minxian Xu, Aiguo Chen, GuoZhong Li, Xinyang Wang, Yu Chen:

Open-Source Simulators for Cloud Computing: Comparative Study and Challenging Issues. - Bokai Cao, Hucheng Zhou, Philip S. Yu:

Multi-view Machines. - Alexandros-Stavros Iliopoulos, Tiancheng Liu, Xiaobai Sun:

Hyperspectral Image Classification and Clutter Detection via Multiple Structural Embeddings and Dimension Reductions. - Zhun Zhong, Zongmin Li, Runlin Li, Xiaoxia Sun:

Unsupervised domain adaption dictionary learning for visual recognition. - Lu Yu, Hai Liu, Yiu-Wing Leung, Xiaowen Chu, Zhiyong Lin:

Efficient Channel-Hopping Rendezvous Algorithm Based on Available Channel Set. - Sudarshan Mukherjee, Saif Khan Mohammed:

CFO Estimation for Massive MU-MIMO Systems. - Qi Wu, Chunhua Shen, Anton van den Hengel, Lingqiao Liu, Anthony R. Dick:

Image Captioning with an Intermediate Attributes Layer. - Mingchao Yu, Parastoo Sadeghi, Alex Sprintson:

The Benefit of Limited Feedback to Generation-Based Random Linear Network Coding in Wireless Broadcast. - Mathieu Aubry, Bryan C. Russell:

Understanding deep features with computer-generated imagery. - Guido C. H. E. de Croon:

Distance estimation with efference copies and optical flow maneuvers: a stability-based strategy. - Mingchao Yu, Parastoo Sadeghi, Neda Aboutorab:

Performance Characterization and Transmission Schemes for Instantly Decodable Network Coding in Wireless Broadcast. - Baishakhi Ray, Vincent J. Hellendoorn, Zhaopeng Tu, Connie Nguyen, Saheel Godhane, Alberto Bacchelli, Premkumar T. Devanbu:

On the "Naturalness" of Buggy Code. - Yi-Hsiu Liao, Hung-yi Lee, Lin-Shan Lee:

Towards Structured Deep Neural Network for Automatic Speech Recognition. - Thanh Manh Le, Thanh The Van:

Image Retrieval System Base on EMD Similarity Measure and S-Tree. - Thanh The Van, Thanh Manh Le:

Color Image Retrieval Using Fuzzy Measure Hamming and S-Tree. - Stefano V. Albrecht, Subramanian Ramamoorthy:

A Game-Theoretic Model and Best-Response Learning Method for Ad Hoc Coordination in Multiagent Systems. - Ahmed G. M. ElSayed, Ahmed S. Salama, Alaa El-Din M. El Ghazali:

A Hybrid Model for Enhancing Lexical Statistical Machine Translation (SMT). - Leslie N. Smith:

No More Pesky Learning Rate Guessing Games. - Siyu Lei, Silviu Maniu, Luyi Mo, Reynold Cheng, Pierre Senellart:

Online Influence Maximization (Extended Version). - A. M. Brener, L. M. Musabekova:

Modeling of through-reactors with allowance of Large-Scale Effect on Heat and Mass Efficiency of Chemical Apparatuses. - Bo-Hsiang Tseng, Hung-yi Lee, Lin-Shan Lee:

Personalizing a Universal Recurrent Neural Network Language Model with User Characteristic Features by Crowdsouring over Social Networks. - Tianyi Liu, Shuangsang Fang, Yuehui Zhao, Peng Wang, Jun Zhang:

Implementation of Training Convolutional Neural Networks. - Edmond Nurellari, Desmond C. McLernon, Mounir Ghogho, Syed Ali Raza Zaidi:

Distributed Optimal Quantization and Power Allocation for Sensor Detection Via Consensus. - Edmond Nurellari, Sami A. Aldalahmeh, Mounir Ghogho, Desmond C. McLernon:

Quantized Fusion Rules for Energy-Based Distributed Detection in Wireless Sensor Networks. - Tehreem Masood, Aamer Nadeem, Gang-soo Lee:

A Safe Regression Testing Technique for Web Services based on WSDL Specification. - Zhiwei Zhao, Wei Dong, Jie Yu, Tao Gu, Jiajun Bu:

3D Wireless: Modeling Wireless Performance by Combining Spatial and Temporal Behaviors. - Thomas A. Henzinger, Jan Otop, Roopsha Samanta:

Lipschitz Robustness of Timed I/O Systems. - Xinhua Zhu, Fei Li, Hongchao Chen, Qi Peng:

A density compensation-based path computing model for measuring semantic similarity. - René Ndoundam, Stephane Gael Raymond Ekodeck:

PDF Steganography based on Chinese Remainder Theorem. - Marta Aparício, Paulo Figueiredo, Francisco Raposo

, David Martins de Matos
, Ricardo Ribeiro:
Summarization of Films and Documentaries Based on Subtitles and Scripts. - Vladimir V. Podolskii:

Circuit Complexity Meets Ontology-Based Data Access. - Rodrigo R. Esch, Fábio Protti, Valmir Carneiro Barbosa:

Adaptive event sensing in networks of autonomous mobile agents. - Mario Szegedy, Yixin Xu:

Impossibility Theorems and the Universal Algebraic Toolkit. - Sen Wang, Feiping Nie, Xiaojun Chang

, Lina Yao, Xue Li, Quan Z. Sheng:
Unsupervised Feature Analysis with Class Margin Optimization. - Vasil Slavov, Anas Katib, Praveen R. Rao, Srivenu Paturi, Dinesh Barenkala:

Fast Processing of SPARQL Queries on RDF Quadruples. - Jacob Whitehill:

Exploiting an Oracle that Reports AUC/2AFC Scores in Machine Learning Contests. - Aruni RoyChowdhury, Tsung-Yu Lin, Subhransu Maji, Erik G. Learned-Miller:

Face Identification with Bilinear CNNs. - Qian Yu:

Finding the Optimal Demodulator Under Implementation Constraints. - Jerry Zheng Li, Ludwig Schmidt:

A Nearly Optimal and Agnostic Algorithm for Properly Learning a Mixture of k Gaussians, for any Constant k. - Guoru Ding, Jinlong Wang, Qihui Wu, Yu-Dong Yao, Fei Song, Theodoros A. Tsiftsis:

Cellular-Base-Station Assisted Device-to-Device Communications in TV White Space. - Jismy Alphonse, Biju V. G.:

Recognition of Changes in SAR Images Based on Gauss-Log Ratio and MRFFCM. - Hugo Gualdron, Robson L. F. Cordeiro, José Fernando Rodrigues Jr., Duen Horng Chau, Minsuk Kahng, U Kang:

M-Flash: Fast Billion-scale Graph Computation Using Block Partition Model. - Mark Scanlon, Jason Farina, M. Tahar Kechadi

:
Network investigation methodology for BitTorrent Sync: A Peer-to-Peer based file synchronisation service. - Chiara Di Francescomarino, Marlon Dumas, Fabrizio Maria Maggi, Irene Teinemaa:

Clustering-Based Predictive Process Monitoring. - Mingming Liu, Fabian Wirth, Martin J. Corless, Robert Shorten:

On global convergence of consensus with nonlinear feedback, the Lure problem, and some applications. - Ondrej Kuzelka, Jesse Davis, Steven Schockaert:

Encoding Markov Logic Networks in Possibilistic Logic. - Mingming Liu, Rodrigo H. Ordóñez-Hurtado, Fabian Wirth, Yingqi Gu, Emanuele Crisostomi, Robert Shorten:

A Distributed and Privacy-Aware Speed Advisory System for Optimising Conventional and Electric Vehicles Networks. - Paul Hand, Choongbum Lee, Vladislav Voroninski:

ShapeFit: Exact location recovery from corrupted pairwise directions. - Sumit Ganguly:

Taylor Polynomial Estimator for Estimating Frequency Moments. - Qi Mu, Liqing Cui, Yufei Song:

The implementation and optimization of Bitonic sort algorithm based on CUDA. - Riad S. Wahby, Sebastian Angel, Max Howald, Joshua B. Leners, Andrew J. Blumberg, Michael Walfish:

Harmful devices considered harmless. - Matthew Burgess, Eytan Adar, Michael J. Cafarella:

Link-Prediction Enhanced Consensus Clustering for Complex Networks. - Dibya Jyoti Bora, Anil Kumar Gupta, Fayaz Ahmad Khan:

Comparing the Performance of L*A*B* and HSV Color Spaces with Respect to Color Image Segmentation. - Domenico Cantone, Marianna Nicolosi Asmundo:

The decision problem for a three-sorted fragment of set theory with restricted quantification and finite enumerations. - Tehreem Masood, Chantal Bonner Cherifi, Néjib Moalla:

Service Networks Monitoring for better Quality of Service. - Rui Han, Zhen Jia, Wanling Gao, Xinhui Tian, Lei Wang:

Benchmarking Big Data Systems: State-of-the-Art and Future Directions. - Shaoqing Ren, Kaiming He, Ross B. Girshick, Jian Sun:

Faster R-CNN: Towards Real-Time Object Detection with Region Proposal Networks. - Chunlei Liu:

Gold type codes of higher relative dimension. - Ashish Sureka, Ambika Tripathi, Savita Dabral:

Survey Results on Threats To External Validity, Generalizability Concerns, Data Sharing and University-Industry Collaboration in Mining Software Repository (MSR) Research. - Nematollah Zarmehi, Morteza Banagar, Mohammad Ali Akhaee:

Optimum Decoder for an Additive Video Watermarking with Laplacian Noise in H.264. - Fabio Lopez Pires, Benjamín Barán:

Virtual Machine Placement Literature Review. - David García, Frank Schweitzer:

Social signals and algorithmic trading of Bitcoin. - Sami Akin, Markus Fidler:

Backlog and Delay Reasoning in HARQ Systems. - Jayanta Kumar Das, Pabitra Pal Choudhury, Sudhakar Sahoo:

Carry Value Transformation (CVT) - Exclusive OR (XOR) Tree and Its Significant Properties. - Yvonne-Anne Pignolet, Matthieu Roy, Stefan Schmid, Gilles Trédan:

Exploring the Graph of Graphs: Network Evolution and Centrality Distances. - Lance R. Williams:

Programs as Polypeptides. - Roozbeh Rajabi, Hassan Ghassemian:

Multilayer Structured NMF for Spectral Unmixing of Hyperspectral Images. - Lidong Bing, Piji Li, Yi Liao, Wai Lam, Weiwei Guo, Rebecca J. Passonneau:

Abstractive Multi-Document Summarization via Phrase Selection and Merging. - Ghislain Fourny:

decimalInfinite: All Decimals In Bits, No Loss, Same Order, Simple. - Liana Hadarean, Alex Horn, Tim King:

A Concurrency Problem with Exponential DPLL(T) Proofs. - Pierre Courtieu, Lionel Rieg, Sébastien Tixeuil, Xavier Urbain:

A Certified Universal Gathering Algorithm for Oblivious Mobile Robots. - Martin Haenggi:

The Meta Distribution of the SIR in Poisson Bipolar and Cellular Networks. - Archontia C. Giannopoulou, George B. Mertzios, Rolf Niedermeier:

Polynomial Fixed-Parameter Algorithms: A Case Study for Longest Path on Interval Graphs. - Ashwini Rao, Florian Schaub, Norman M. Sadeh:

What do they know about me? Contents and Concerns of Online Behavioral Profiles. - Martin Bauer, Johannes Hötzer, Philipp Steinmetz, Marcus Jainta, Marco Berghoff, Florian Schornbaum, Christian Godenschwager, Harald Köstler, Britta Nestler, Ulrich Rüde:

Massively Parallel Phase-Field Simulations for Ternary Eutectic Directional Solidification. - Andrew Berns:

Avatar: A Time- and Space-Efficient Self-Stabilizing Overlay Network. - Bireswar Das, Murali Krishna Enduri, I. Vinod Reddy:

Polynomial-time Algorithm for Isomorphism of Graphs with Clique-width at most 3. - Anna Rohrbach, Marcus Rohrbach, Bernt Schiele:

The Long-Short Story of Movie Description. - Yakiv O. Kalinovsky, Yuliya E. Boyarinova, Iana V. Khitsko

:
Reversible Digital Filters Total Parametric Sensitivity Optimization using Non-canonical Hypercomplex Number Systems. - Dibya Jyoti Bora

, Anil Kumar Gupta:
A Novel Approach Towards Clustering Based Image Segmentation. - Juan M. C. Larrosa:

Coauthorship and Thematic Networks in AAEP Annual Meetings. - Sudeep Pillai, John J. Leonard:

Monocular SLAM Supported Object Recognition. - Roberto Battistoni, Roberto Di Pietro, Flavio Lombardi:

CloRoFor: Cloud Robust Forensics. - Nuno Moniz

, Luís Torgo
:
Socially Driven News Recommendation. - Vladimir Braverman, Rafail Ostrovsky, Gregory Vorsanger:

Weighted Sampling Without Replacement from Data Streams. - David Eppstein:

Metric Dimension Parameterized by Max Leaf Number. - Abdelmohsen Ali, Walaa Hamouda:

Low Power Wideband Sensing for One-Bit Quantized Cognitive Radio Systems. - Yuchi Ma, Ning Yang, Chuan Li, Lei Zhang, Philip S. Yu:

Predicting Neighbor Distribution in Heterogeneous Information Networks. - Daisuke Ishii, Naoki Yonezaki, Alexandre Goldsztejn:

Monitoring Bounded LTL Properties Using Interval Analysis. - Rajasekhar Inkulu, Sanjiv Kapoor:

Coresets of obstacles in approximating Euclidean shortest path amid convex obstacles. - Saurav Agarwal, Amirhossein Tamjidi, Suman Chakravorty:

Motion Planning in Non-Gaussian Belief Spaces (M3P): The Case of a Kidnapped Robot. - Philipp Sommer, Branislav Kusy, Philip Valencia, Ross Dungavell, Raja Jurdak:

Delay-Tolerant Networking for Long-Term Animal Tracking. - Amir Abboud, Virginia Vassilevska Williams, Joshua R. Wang:

Approximation and Fixed Parameter Subquadratic Algorithms for Radius and Diameter. - H. Eftun Orhon, Caner Odabas, Ismail Uyanik, Ömer Morgül, Uluc Saranli:

Extending The Lossy Spring-Loaded Inverted Pendulum Model with a Slider-Crank Mechanism. - Vincenzo De Florio:

On the quality of emergence in complex collective systems. - Harsiti, Tb. Ai Munandar, Haris Triono Sigit:

Implementation Of Fuzzy-C4.5 Classification As a Decision Support For Students Choice Of Major Specialization. - Rémi Lajugie, Piotr Bojanowski, Sylvain Arlot, Francis R. Bach:

Semidefinite and Spectral Relaxations for Multi-Label Classification. - Srdan Kitic, Nancy Bertin, Rémi Gribonval:

Sparsity and cosparsity for audio declipping: a flexible non-convex approach. - Derrick Wing Kwan Ng, Yan Sun, Robert Schober:

Power Efficient and Secure Full-Duplex Wireless Communication Systems. - Konstantin S. Yakovlev, Egor Baskin, Ivan Hramoin:

Grid-based angle-constrained path planning. - David Stotz, Helmut Bölcskei:

Characterizing degrees of freedom through additive combinatorics. - Yang Chen, Cheng Cheng, Qiyu Sun:

Reconstruction of sparse wavelet signals from partial Fourier measurements. - Jie Fan:

Logics of Essence and Accident. - Jifeng Xuan, Benoit Cornu, Matias Martinez, Benoit Baudry, Lionel Seinturier

, Martin Monperrus:
Dynamic Analysis can be Improved with Automatic Test Suite Refactoring. - Yossi Arjevani, Ohad Shamir:

Communication Complexity of Distributed Convex Learning and Optimization. - Hossam S. Ibrahim, Sherif M. Abdou, Mervat Gheith:

Idioms-Proverbs Lexicon for Modern Standard Arabic and Colloquial Sentiment Analysis. - Kunal Sankhe, Chandan Pradhan, Sumit Kumar, Garimella Ramamurthy:

Machine Learning Based Cooperative Relay Selection in Virtual MIMO. - Lionel Pigou, Aäron van den Oord, Sander Dieleman, Mieke Van Herreweghe, Joni Dambre:

Beyond Temporal Pooling: Recurrence and Temporal Convolutions for Gesture Recognition in Video. - Niklas Laxström, Pau Giner, Santhosh Thottingal:

Content Translation: Computer-assisted translation tool for Wikipedia articles. - Philippe Weinzaepfel, Zaïd Harchaoui, Cordelia Schmid:

Learning to track for spatio-temporal action localization. - Benjamin Lucien Kaminski, Joost-Pieter Katoen:

On the Hardness of Almost-Sure Termination. - Abdelmajid Hassan Mansour, Gafar Zen Alabdeen Salh, Ali Shaif Alhalemi:

Facial Expressions recognition Based on Principal Component Analysis (PCA). - Sakyoud Zakaria, Gaëtan Rey, Eladnani Mohamed, Stephane Lavirotte, Abdelaziz El Fazziki

, Jean-Yves Tigli
:
Smart Geographic object: Toward a new understanding of GIS Technology in Ubiquitous Computing. - Joshua Joy, Yu-Ting Yu, Victor Perez, Dennis Lu, Mario Gerla:

A New Approach to Coding in Content Based MANETs. - Norman Danner, Daniel R. Licata, Ramyaa Ramyaa:

Denotational cost semantics for functional languages with inductive types. - Steven T. Dougherty, Jon-Lark Kim, Buket Özkaya, Lin Sok, Patrick Solé:

The combinatorics of LCD codes: Linear Programming bound and orthogonal matrices. - Marie-Ange Lèbre, Frédéric Le Mouël, Eric Ménard, Alexandre Garnault, Benazouz Bradaï, Vanessa Picron:

Real scenario and simulations on GLOSA traffic light system for reduced CO2 emissions, waiting time and travel time. - Marco Baldi, Giacomo Ricciutelli, Nicola Maturo, Franco Chiaraluce:

Performance assessment and design of finite length LDPC codes for the Gaussian wiretap channel. - Cem Güneri, Buket Özkaya, Patrick Solé:

Quasi-Cyclic Complementary Dual Code. - Zeyuan Allen Zhu, Yang Yuan:

UniVR: A Universal Variance Reduction Framework for Proximal Stochastic Gradient Method. - Jinha Kim, Hyungyu Shin, Wook-Shin Han, Sungpack Hong, Hassan Chafi:

Taming Subgraph Isomorphism for RDF Query Processing. - Jeffrey R. Peters, Amit Surana, Luca F. Bertuccelli:

Eye-Tracking Metrics for Task-Based Supervisory Control. - Maria Glenski, Thomas J. Johnston, Tim Weninger:

Random Voting Effects in Social-Digital Spaces: A case study of Reddit Post Submissions. - Manaal Faruqui, Yulia Tsvetkov, Dani Yogatama, Chris Dyer, Noah A. Smith:

Sparse Overcomplete Word Vector Representations. - Shibdas Roy, Ian R. Petersen:

Robust H∞ Estimation of Uncertain Linear Quantum Systems. - James Li, Eric Bax, Nilanjan Roy, Andrea Leistra:

VCG Payments for Portfolio Allocations in Online Advertising. - Ragavendran Gopalakrishnan, Eric Bax, Krishna Prasad Chitrapura, Sachin Garg:

Portfolio Allocation for Sellers in Online Advertising. - Dor Shaviv, Phan-Minh Nguyen, Ayfer Özgür:

Capacity of the Energy Harvesting Channel with a Finite Battery. - Max Jaderberg, Karen Simonyan, Andrew Zisserman, Koray Kavukcuoglu:

Spatial Transformer Networks. - Dor Shaviv, Ayfer Özgür, Haim H. Permuter:

Can Feedback Increase the Capacity of the Energy Harvesting Channel? - Giulio Giaconi, Deniz Gündüz, H. Vincent Poor:

Smart Meter Privacy with an Energy Harvesting Device and Instantaneous Power Constraints. - Abhishek Bhowmick, Shachar Lovett:

Bias vs structure of polynomials in large fields, and applications in effective algebraic geometry and coding theory. - Haonan Yu, Jeffrey Mark Siskind:

Sentence Directed Video Object Codetection. - Vasile Patrascu:

Similarity, Cardinality and Entropy for Bipolar Fuzzy Set in the Framework of Penta-valued Representation. - Vasile Patrascu:

Entropy and Syntropy in the Context of Five-Valued Logics. - Jason Hiney, Tejas Dakve, Krzysztof Szczypiorski, Kris Gaj:

Using Facebook for Image Steganography. - Antoine Bordes, Nicolas Usunier, Sumit Chopra, Jason Weston:

Large-scale Simple Question Answering with Memory Networks. - Andrej Karpathy, Justin Johnson, Li Fei-Fei:

Visualizing and Understanding Recurrent Networks. - Michael M. Kazhdan, Kunal Lillaney, William R. Gray Roncal, Davi Bock, Joshua T. Vogelstein, Randal C. Burns:

Gradient-Domain Fusion for Color Correction in Large EM Image Stacks. - Ruben Martinez-Cantin:

Local Nonstationarity for Efficient Bayesian Optimization. - Philip B. Alipour

, Matteus Magnusson, Martin W. Olsson, Nooshin H. Ghasemi, Lawrence Henesey:
A Real-time Cargo Damage Management System via a Sorting Array Triangulation Technique. - Nemanja Spasojevic, Zhisheng Li, Adithya Rao, Prantik Bhattacharyya:

When-To-Post on Social Networks. - Therese Biedl:

Optimum-width upward order-preserving poly-line drawings of trees. - Khan Muhammad, Muhammad Sajjad, Irfan Mehmood, Seungmin Rho, Sung Wook Baik:

A novel magic LSB substitution method (M-LSB-SM) using multi-level encryption and achromatic component of an image. - Xinhua Wang:

Frequency-domain analysis of nonlinear and linear integrators. - Olga Russakovsky, Amy L. Bearman, Vittorio Ferrari, Li Fei-Fei:

What's the point: Semantic segmentation with point supervision. - Guosheng Lin, Chunhua Shen, Ian D. Reid, Anton van den Hengel:

Deeply Learning the Messages in Message Passing Inference. - David Maxwell Chickering, Christopher Meek:

Selective Greedy Equivalence Search: Finding Optimal Bayesian Networks Using a Polynomial Number of Score Evaluations. - Mingsheng Long, Jianmin Wang:

Learning Multiple Tasks with Deep Relationship Networks. - Wen-Jan Chang, Rua-Huan Tsaih, David C. Yen, Tzu-Shian Han:

The ICT predicament of new ICT-enabled service. - Chandan Pradhan, Kunal Sankhe, Sumit Kumar, Garimella Rama Murthy:

Full-Duplex eNodeB and UE Design for 5G Networks. - Shashank Vatedka, Navin Kashyap:

Nested Lattice Codes for Secure Bidirectional Relaying with Asymmetric Channel Gains. - Alessandro Facchini, Filip Murlak, Michal Skrzypczak:

Index problems for game automata. - Benyuan Liu, Hongqi Fan, Qiang Fu, Zhilin Zhang:

Bayesian De-quantization and Data Compression for Low-Energy Physiological Signal Telemonitoring. - Hiroyuki Kasai, Bamdev Mishra:

Riemannian preconditioning for tensor completion. - Jie Ding, Mohammad Noshad, Vahid Tarokh:

Complementary Lattice Arrays for Coded Aperture Imaging. - Shahin Jabbari, Ryan M. Rogers, Aaron Roth, Zhiwei Steven Wu:

Learning from Rational Behavior: Predicting Solutions to Unknown Linear Programs. - (Withdrawn) Capacity of Hexagonal Checkerboard Codes.

- Ayan Chakrabarti:

Color Constancy by Learning to Predict Chromaticity from Luminance. - Megha Rughani, D. Shivakrishna:

Hybridized Feature Extraction and Acoustic Modelling Approach for Dysarthric Speech Recognition. - Dimitrios Tzionas, Luca Ballan, Abhilash Srikantha, Pablo Aponte, Marc Pollefeys, Juergen Gall:

Capturing Hands in Action using Discriminative Salient Points and Physics Simulation. - Jun Ye, Hao Hu, Kai Li, Guo-Jun Qi, Kien A. Hua:

First-Take-All: Temporal Order-Preserving Hashing for 3D Action Videos. - Yinlam Chow, Aviv Tamar, Shie Mannor, Marco Pavone:

Risk-Sensitive and Robust Decision-Making: a CVaR Optimization Approach. - Lei Tang:

Top-k Recommendation with Temporal Dynamics. - Lesandro Ponciano

, Francisco Vilar Brasileiro, Nazareno Andrade, Lívia M. R. Sampaio:
Considering Human Aspects on Strategies for Designing and Managing Distributed Human Computation. - Matteo Ruggero Ronchi, Pietro Perona:

Describing Common Human Visual Actions in Images. - Chunlei Liu:

Kasami type codes of higher relative dimension. - Chao Dong, Ximei Zhu, Yubin Deng, Chen Change Loy, Yu Qiao:

Boosting Optical Character Recognition: A Super-Resolution Approach. - Jiawang Yi, Guanzheng Tan:

Nonlinear compressed sensing based on composite mappings and its pointwise linearization. - Junyoung Chung, Kyle Kastner, Laurent Dinh, Kratarth Goel, Aaron C. Courville, Yoshua Bengio:

A Recurrent Latent Variable Model for Sequential Data. - Hameer Abbasi, Shahid H. Abbassi, Ijaz Mansoor Qureshi:

A framework for the simulation of CR-VANET channel sensing, coordination and allocation. - Bingchen Wang, Chenglong Zhang, Lei Song, Lianhe Zhao, Yu Dou, Zihao Yu:

Design and optimization of DBSCAN Algorithm based on CUDA. - Ioannis Papoutsakis:

On approximating tree spanners that are breadth first search trees. - Min Chen, Amos Golan

:
What May Visualization Processes Optimize? - Gonzalo Galiano Casas, Emanuele Schiavi, Julián Velasco Valdés:

Well-possedness of the continuous Neighborhood filter and its reformulation through the decreasing rearrangement. - Zhiyuan Tang, Dong Wang, Yiqiao Pan, Zhiyong Zhang:

Knowledge Transfer Pre-training. - Dmitry Namiot, Manfred Sneps-Sneppe:

On Network Proximity in Web Applications. - Yedid Hoshen, Shmuel Peleg:

Visual Learning of Arithmetic Operations. - Yilun Wang, Sheng Zhang, Junjie Zheng, Heng Chen, Huafu Chen:

Randomized Structural Sparsity based Support Identification with Applications to Locating Activated or Discriminative Brain Areas: A Multi-center Reproducibility Study. - George Grispos, William Bradley Glisson, Tim Storer:

Recovering Residual Forensic Data from Smartphone Interactions with Cloud Storage Providers. - Thomas Kahl:

Topological abstraction of higher-dimensional automata. - Umashanthi Pavalanathan, Jacob Eisenstein:

Confounds and Consequences in Geotagged Twitter Data. - Zheng Chang, Tapani Ristaniemi, Zhu Han:

Queueing Game For Spectrum Access in Cognitive Radio Networks. - Vincenzo De Florio, Chris Blondia:

Robust and Tuneable Family of Gossiping Algorithms. - Oana Goga, Patrick Loiseau, Robin Sommer, Renata Teixeira, Krishna P. Gummadi:

On the Reliability of Profile Matching Across Large Online Social Networks. - Neil Zhenqiang Gong, Mathias Payer, Reza Moazzezi, Mario Frank:

Towards Forgery-Resistant Touch-based Biometric Authentication on Mobile Devices. - Shibamouli Lahiri:

SQUINKY! A Corpus of Sentence-level Formality, Informativeness, and Implicature. - Wojciech Fraczek, Krzysztof Szczypiorski:

StegBlocks: ensuring perfect undetectability of network steganography. - Renato de Pontes Pereira, Paulo Martins Engel:

A Framework for Constrained and Adaptive Behavior-Based Agents. - Cheng-Tao Chung, Cheng-Yu Tsai, Hsiang-Hung Lu, Yuan-ming Liou, Yen-Chen Wu, Yen-Ju Lu, Hung-yi Lee, Lin-Shan Lee:

A Multi-layered Acoustic Tokenizing Deep Neural Network (MAT-DNN) for Unsupervised Discovery of Linguistic Units and Generation of High Quality Features. - Guangnan Ye, Yitong Li, Hongliang Xu, Dong Liu, Shih-Fu Chang:

EventNet: A Large Scale Structured Concept Library for Complex Event Detection in Video. - Andrew Trask, David Gilmore, Matthew Russell:

Modeling Order in Neural Word Embeddings at Scale. - Vladimir Saveljev:

Wavelets and continuous wavelet transform for autostereoscopic multiview images. - Kamalika Chaudhuri, Sham M. Kakade, Praneeth Netrapalli, Sujay Sanghavi:

Convergence Rates of Active Learning for Maximum Likelihood Estimation. - Han Mao Kiah, Son Hoang Dau, Wentu Song, Chau Yuen:

Local Codes with Addition Based Repair. - (Withdrawn) Secure Ad-hoc Routing Scheme.

- Julien Chevallier, María J. Cáceres, Marie Doumic, Patricia Reynaud-Bouret:

Microscopic approach of a time elapsed neural model. - Maciej Bendkowski, Katarzyna Grygiel, Pierre Lescanne, Marek Zaionc:

A natural counting of Lambda terms. - Anca Muscholl:

Automated Synthesis of Distributed Controllers. - Eliav Buchnik, Edith Cohen:

Reverse Ranking by Graph Structure: Model and Scalable Algorithms. - Alan Brunton, Can Ates Arikan, Philipp Urban:

Pushing the Limits of 3D Color Printing: Error Diffusion with Translucent Materials. - Salil Kashyap, Emil Björnson, Erik G. Larsson:

On the Feasibility of Wireless Energy Transfer Using Massive Antenna Arrays. - Sajjad Rahmany, Abdolali Basiri, Benyamin M.-Alizadeh:

An Elimination Method to Solve Interval Polynomial Systems. - Kush Bhatia, Prateek Jain, Purushottam Kar:

Robust Regression via Hard Thresholding. - Gabriele Ranco, Darko Aleksovski, Guido Caldarelli, Igor Mozetic:

Investigating the Relations between Twitter Sentiment and Stock Prices. - Craig Henderson, Ebroul Izquierdo:

Reflection Invariance: an important consideration of image orientation. - Krishnendu Chatterjee, Kristoffer Arnsfelt Hansen, Rasmus Ibsen-Jensen:

Strategy Complexity of Concurrent Stochastic Games with Safety and Reachability Objectives. - John Schulman, Philipp Moritz, Sergey Levine, Michael I. Jordan, Pieter Abbeel:

High-Dimensional Continuous Control Using Generalized Advantage Estimation. - Irena Rusu:

NP-hardness of sortedness constraints. - Haya Shajaiah, Ahmed Abdel-Hadi, T. Charles Clancy:

An Efficient Multi-Carrier Resource Allocation with User Discrimination Framework for 5G Wireless Systems. - Neli Blagus, Lovro Subelj, Marko Bajec:

Empirical comparison of network sampling techniques. - Samy Abbes, Jean Mairesse:

Uniform generation in trace monoids. - Bernd Bischl, Pascal Kerschke, Lars Kotthoff, Marius Lindauer, Yuri Malitsky, Alexandre Fréchette, Holger H. Hoos, Frank Hutter, Kevin Leyton-Brown, Kevin Tierney, Joaquin Vanschoren:

ASlib: A Benchmark Library for Algorithm Selection. - (Withdrawn) On the Hardness of PCTL Satisfiability.

- Giovanni Bianchi, Nikolay V. Kuznetsov, Gennady A. Leonov, Marat V. Yuldashev, Renat V. Yuldashev:

Limitations of PLL simulation: hidden oscillations in SPICE analysis. - Lei Zhang, David Zhang:

SVM and ELM: Who Wins? Object Recognition with Deep Convolutional Features from ImageNet. - Onur Dikmen:

Learning Mixtures of Ising Models using Pseudolikelihood. - Vadim Lebedev, Victor S. Lempitsky:

Fast ConvNets Using Group-wise Brain Damage. - Edward Grefenstette, Karl Moritz Hermann, Mustafa Suleyman, Phil Blunsom:

Learning to Transduce with Unbounded Memory. - Chenxin Ma, Rachael Tappenden, Martin Takác:

Linear Convergence of the Randomized Feasible Descent Method Under the Weak Strong Convexity Assumption. - Clément Duhart, Pierre Sauvage, Cyrille Bertelle:

EMMA: A Resource Oriented Framework for Service Choreography over Wireless Sensor and Actor Networks. - Louis Fortier-Dubois, François Laviolette, Mario Marchand, Louis-Émile Robitaille, Jean-Francis Roy:

Efficient Learning of Ensembles with QuadBoost. - Sina Sanjari, Sadjaad Ozgoli:

Finite time analysis based on Sum of Squares Technique: Applied to the super-twisting second order sliding mode control. - Noman Islam, Zubair Ahmed Shaikh:

A novel approach to Service Discovery in Mobile Adhoc Network. - Youssef Mroueh, Stephen Voinea, Tomaso A. Poggio:

Learning with Group Invariant Features: A Kernel Perspective. - Noman Islam, Zubair Ahmed Shaikh:

Exploiting Correlation among Data Items for Cache Replacement in Ad-hoc Networks. - Noman Islam, Zubair Ahmed Shaikh:

Service Discovery in Mobile Ad hoc Networks Using Association Rules Mining. - Noman Islam, Zubair Ahmed Shaikh, Shahnawaz Talpur:

Towards a Grid-based approach to Traffic Routing in VANET. - Saïd Jabbour, Lakhdar Sais, Yakoub Salhi:

On SAT Models Enumeration in Itemset Mining. - Yong-Deok Kim, Taewoong Jang, Bohyung Han, Seungjin Choi:

Learning to Select Pre-Trained Deep Representations with Bayesian Evidence Framework. - Liqing Xu, Hao Chen:

Deterministic Construction of RIP Matrices in Compressed Sensing from Constant Weight Codes. - Prosenjit Bose, Jean-Lou De Carufel, Alina Shaikhet, Michiel H. M. Smid:

Probing Convex Polygons with a Wedge. - Olivia Simpson, C. Seshadhri, Andrew McGregor:

Catching the head, the tail, and everything in between: a streaming algorithm for the degree distribution. - Alexandra Simperler, Greg Wilson:

Software Carpentry get more done in less time. - Huizhen Yu:

On Convergence of Emphatic Temporal-Difference Learning. - Zhimin Peng, Prudhvi Gurram, Heesung Kwon, Wotao Yin:

Optimal Sparse Kernel Learning for Hyperspectral Anomaly Detection. - Matthijs Douze, Jérôme Revaud, Jakob Verbeek, Hervé Jégou, Cordelia Schmid:

Circulant temporal encoding for video retrieval and temporal alignment. - Qingyuan Zhao, Murat A. Erdogdu, Hera Y. He, Anand Rajaraman, Jure Leskovec:

SEISMIC: A Self-Exciting Point Process Model for Predicting Tweet Popularity. - Alex Dytso, Daniela Tuninetti, Natasha Devroye:

Interference as Noise: Friend or Foe? - Soumya Jyoti Banerjee, Mohammad Azharuddin, Debanjan Sen, Smruti Savale, Himadri Datta, Anjan Kr. Dasgupta, Soumen Roy:

Using complex networks towards information retrieval and diagnostics in multidimensional imaging. - Andreas Cord-Landwehr, Pascal Lenzner:

Network Creation Games: Think Global - Act Local. - Behnam Neyshabur, Ruslan Salakhutdinov, Nathan Srebro:

Path-SGD: Path-Normalized Optimization in Deep Neural Networks. - Nathan Bliss, Jeff Sommars, Jan Verschelde, Xiangcheng Yu:

Solving Polynomial Systems in the Cloud with Polynomial Homotopy Continuation. - Song Han, Jeff Pool, John Tran, William J. Dally:

Learning both Weights and Connections for Efficient Neural Networks. - Cynthia Dwork, Vitaly Feldman, Moritz Hardt, Toniann Pitassi, Omer Reingold, Aaron Roth:

Generalization in Adaptive Data Analysis and Holdout Reuse. - Prashanth L. A., Cheng Jie, Michael C. Fu, Steven I. Marcus:

Cumulative Prospect Theory Meets Reinforcement Learning: Estimation and Control. - Antonio Rieser

:
A Topological Approach to Spectral Clustering. - Paul Beame, Vincent Liew:

New Limits for Knowledge Compilation and Applications to Exact Model Counting. - Joseph Redmon, Santosh Kumar Divvala, Ross B. Girshick, Ali Farhadi:

You Only Look Once: Unified, Real-Time Object Detection. - Alon Gonen, Shai Shalev-Shwartz:

Faster SGD Using Sketched Conditioning. - Tamir Bendory:

Convex Optimization Approach for Stable Decomposition of Stream of Pulses. - Alexander V. Evako:

Topology-preserving digitization of n-dimensional objects by constructing cubical models. - Zhiguang Wang, Tim Oates, James Lo:

Adaptive Normalized Risk-Averting Training For Deep Neural Networks. - Yanting Ma, Junan Zhu, Dror Baron:

Approximate Message Passing with Universal Denoising. - Mohit Thakur, Gerhard Kramer:

Quasi-Concavity for Gaussian Multicast Relay Channels. - Paul Kirchner, Pierre-Alain Fouque:

An Improved BKW Algorithm for LWE with Applications to Cryptography and Lattices. - Mehryar Mohri, Andres Muñoz Medina:

Non-parametric Revenue Optimization for Generalized Second Price Auctions. - Arthur F. Ramos, Ruy J. G. B. de Queiroz, Anjolina Grisi de Oliveira:

On the Groupoid Model of Computational Paths. - Wei Song, Zhiguang Wang, Yangdong Ye, Ming Fan:

Empirical Studies on Symbolic Aggregation Approximation Under Statistical Perspectives for Knowledge Discovery in Time Series. - Hannah Rashkin, Sameer Singh, Yejin Choi:

Connotation Frames: Typed Relations of Implied Sentiment in Predicate-Argument Structure. - Yiwei Zhang, Gennian Ge:

Snake-in-the-Box Codes for Rank Modulation under Kendall's $τ$-Metric. - César A. Astudillo, B. John Oommen:

Self Organizing Maps Whose Topologies Can Be Learned With Adaptive Binary Search Trees Using Conditional Rotations. - Yuejie Chi:

Guaranteed Blind Sparse Spikes Deconvolution via Lifting and Convex Optimization. - Alexey Dosovitskiy, Thomas Brox:

Inverting Convolutional Networks with Convolutional Networks. - Shihao Ji, Hyokun Yun, Pinar Yanardag, Shin Matsushima, S. V. N. Vishwanathan:

WordRank: Learning Word Embeddings via Robust Ranking. - Xinhua Wang:

Design and frequency-domain analysis of linear high-gain integral-derivative observer. - Sumith YD:

Fast Geometric Fit Algorithm for Sphere Using Exact Solution. - Rasim M. Alguliyev, Ramiz M. Aliguliyev

, Nigar Ismayilova:
Weighted Impact Factor (WIF) for assessing the quality of scientific journals. - Danica J. Sutherland, Jeff G. Schneider:

On the Error of Random Fourier Features. - Dor Shaviv, Ayfer Özgür:

Capacity of the AWGN Channel with Random Battery Recharges. - Ahmad A. Kardan, Omid R. B. Speily, Yosra Bahrani:

Modelling the Effectiveness of Curriculum in Educational Systems Using Bayesian Networks. - Benoît Beroule, Alain-Jérôme Fougères, Egon Ostrosi:

Agent-Based Product Configuration: towards Generalized Consensus Seeking. - Stefano D'Aronco, Laura Toni, Sergio Mena, Xiaoqing Zhu, Pascal Frossard:

Improved Utility-based Congestion Control for Low-Delay Communication. - Miguel Báguena Albaladejo, Douglas J. Leith, Pietro Manzoni:

Measurement-Based Modelling of LTE Performance in Dublin City. - Kirana Kumara P:

Simulations using meshfree methods. - Xuechong Guan:

A study on central soft sets: Definitions and basic operations. - George Gkotsis, Maria Liakata, Carlos Pedrinaci, John Domingue:

Leveraging Textual Features for Best Answer Prediction in Community-based Question Answering. - Alexander Zeh, Markus Ulmschneider:

Decoding of Repeated-Root Cyclic Codes up to New Bounds on Their Minimum Distance. - Ludovic Courtès, Ricardo Wurmus:

Reproducible and User-Controlled Software Environments in HPC with Guix. - Albert Saà-Garriga, David Castells-Rufas, Jordi Carrabina:

OMP2HMPP: Compiler Framework for Energy Performance Trade-off Analysis of Automatically Generated Codes. - Nicola Basilico, Giuseppe De Nittis, Nicola Gatti:

Adversarial patrolling with spatially uncertain alarm signals. - Jean-Marc Champarnaud, Ludovic Mignot, Nadia Ouali Sebti, Djelloul Ziadi:

Bottom Up Quotients and Residuals for Tree Languages. - Relinde P. M. J. Jurrius, Ruud Pellikaan:

On defining generalized rank weights. - Akram Hakiri, Pascal Berthou

:
Leveraging SDN for The 5G Networks: Trends, Prospects and Challenges. - Koorosh Firouzbakht, Guevara Noubir, Masoud Salehi:

Constrained Bimatrix Games in Wireless Communications. - Edith Elkind, Piotr Faliszewski, Piotr Skowron, Arkadii M. Slinko:

Properties of Multiwinner Voting Rules. - Tomas Pfister, James Charles, Andrew Zisserman:

Flowing ConvNets for Human Pose Estimation in Videos. - Daniel J. Hsu, Aryeh Kontorovich, Csaba Szepesvári:

Mixing Time Estimation in Reversible Markov Chains from a Single Sample Path. - Dimitra Gkatzia, Helen F. Hastie:

An Ensemble method for Content Selection for Data-to-text Systems. - Abdulrahman Oladipupo Ibraheem:

Compact Shape Trees: A Contribution to the Forest of Shape Correspondences and Matching Methods. - Frantisek Duris:

Theory of the effectivity of human problem solving. - Penghui Yao:

Parity Decision Tree Complexity and 4-Party Communication Complexity of XOR-functions Are Polynomially Equivalent. - Naga VishnuKanth Irukulapati, Domenico Marsella, Pontus Johannisson, Erik Agrell, Marco Secondini, Henk Wymeersch:

Stochastic Digital Backpropagation with Residual Memory Compensation. - Benjamin Mood, Debayan Gupta, Kevin R. B. Butler, Joan Feigenbaum:

Reuse It Or Lose It: More Efficient Secure Computation Through Reuse of Encrypted Values. - Bin Li, Hui Shen, Kai Chen:

A Decision-Aided Parallel SC-List Decoder for Polar Codes. - Jitender Kumar, Kanduru V. Krishna:

Syntactic semigroup problem for the semigroup reducts of Affine Near-semirings over Brandt Semigroups. - Adam Karczmarz, Jakub Lacki:

Fast and simple connectivity in graph timelines. - José Fernando Rodrigues Jr., Agma J. M. Traina, Maria Cristina Ferreira de Oliveira, Caetano Traina Jr.:

Reviewing Data Visualization: an Analytical Taxonomical Study. - Chung-Yu Lou, Babak Daneshrad, Richard D. Wesel:

Convolutional-Code-Specific CRC Code Design. - Yingjie Guo, Linzhi Wu, Wei Yu, Bin Wu, Xiaotian Wang:

The Improved Job Scheduling Algorithm of Hadoop Platform. - Enrique Orduña-Malea, Juan Manuel Ayllon, Alberto Martín-Martín

, Emilio Delgado López-Cózar:
Methods for estimating the size of Google Scholar. - Ross Goroshin, Michaël Mathieu, Yann LeCun:

Learning to Linearize Under Uncertainty. - Enrique Orduña-Malea, Selenay Aytac:

Revealing the online network between University and Industry: The case of Turkey. - Yihan Gao, Aditya G. Parameswaran:

On the Uniform Convergence of Consistent Confidence Measures. - Kristina Lerman, Xiaoran Yan, Xin-Zeng Wu:

The Majority Illusion in Social Networks. - Enrique Orduña-Malea, Emilio Delgado López-Cózar, Jorge Serrano-Cobos, Nuria Lloret Romero:

Disclosing the network structure of private companies on the web: the case of Spanish IBEX 35 share index. - Joseph Y. Halpern, Rafael Pass, Lior Seeman:

Computational Extensive-Form Games. - Hui Xu, Yangfan Zhou, Michael R. Lyu:

N-Version Obfuscation: Impeding Software Tampering Replication with Program Diversity. - Jameson Cahill, Xuemei Chen, Rongrong Wang:

The gap between the null space property and the restricted isomety property. - Diana Borsa, Thore Graepel, Andrew D. Gordon:

The Wreath Process: A totally generative model of geometric shape based on nested symmetries. - Nadav Cohen, Or Sharir, Amnon Shashua:

Deep SimNets. - Vijay Kumar, Dan Levy:

Clustering by transitive propagation. - Samy Bengio, Oriol Vinyals, Navdeep Jaitly, Noam Shazeer:

Scheduled Sampling for Sequence Prediction with Recurrent Neural Networks. - Bo Dai, Niao He, Hanjun Dai, Le Song:

Scalable Bayesian Inference via Particle Mirror Descent. - Eric Eager, Megan Eberle, James Peirce:

How Infectious Was #Deflategate? - Marcin Nagy, Teemu Kärkkäinen, Arseny Kurnikov, Jörg Ott:

A Web Browser-based Interaction Framework for Mobile Opportunistic Applications. - Jani Biju Babjan:

License Plate Recognition System Based on Color Coding Of License Plates. - Tselil Schramm, Benjamin Weitz:

Low-Rank Matrix Completion with Adversarial Missing Entries. - Keenon Werling, Gabor Angeli, Christopher D. Manning:

Robust Subgraph Generation Improves Abstract Meaning Representation Parsing. - Keenon Werling, Arun Tejasvi Chaganty, Percy Liang, Christopher D. Manning:

On-the-Job Learning with Bayesian Decision Theory. - Donghyuk Lee, Gennady Pekhimenko, Samira Manabi Khan, Saugata Ghose, Onur Mutlu:

Simultaneous Multi Layer Access: A High Bandwidth and Low Cost 3D-Stacked Memory Interface. - Bilegsaikhan Naidan, Leonid Boytsov, Eric Nyberg:

Permutation Search Methods are Efficient, Yet Faster Search is Possible. - Guy Kindler, Ryan O'Donnell, David Witmer:

Continuous analogues of the Most Informative Function problem. - Kenji Yasunaga:

Correction of Samplable Additive Errors. - Manoj Gopalkrishnan:

A Scheme for Molecular Computation of Maximum Likelihood Estimators for Log-Linear Models. - Mohammad Shihabul Haque, Jorgen Peddersen, Andhi Janapsatya, Sri Parameswaran:

DEW: A Fast Level 1 Cache Simulation Approach for Embedded Processors with FIFO Replacement Policy. - Mohammad Shihabul Haque, Akash Kumar, Yajun Ha, Qiang Wu, Shaobo Luo:

TRISHUL: A Single-pass Optimal Two-level Inclusive Data Cache Hierarchy Selection Process for Real-time MPSoCs. - Xinyu Zhou, Shuchang Zhou, Cong Yao, Zhimin Cao, Qi Yin:

ICDAR 2015 Text Reading in the Wild Competition. - Mohammad Shihabul Haque, Jorgen Peddersen, Sri Parameswaran:

CIPARSim: Cache Intersection Property Assisted Rapid Single-pass FIFO Cache Simulation Technique. - Mohammad Shihabul Haque, Ang Li, Akash Kumar, Qingsong Wei:

Accelerating Non-volatile/Hybrid Processor Cache Design Space Exploration for Application Specific Embedded Systems. - Patrick Luciano, Ismail Rebai, Vincent Lemaire:

Increasing loyalty using predictive modeling in Business-to-Business Telecommunication. - Eleonora Guerrini, Alessio Meneghetti, Massimiliano Sala:

On optimal nonlinear systematic codes. - Bruno Golosio, Angelo Cangelosi, Olesya Gamotina, Giovanni Luca Masala:

A cognitive neural architecture able to learn and communicate through natural language. - Ligong Wang, Gregory W. Wornell, Lizhong Zheng:

Fundamental Limits of Communication with Low Probability of Detection. - Mikhail Olaniyi, Adebayo Omotosho, Esther Oluwatosin, Michael Adegoke, Tomi Akinmukomi:

Students Exeat Monitoring System Using Fingerprint Biometric Authentication and Mobile Short Message Service. - Jun Pang, Yang Liu, Sjouke Mauw

:
Proceedings 4th International Workshop on Engineering Safety and Security Systems, ESSS 2015, Oslo, Norway, June 22, 2015. EPTCS 184, 2015 [contents] - Jannik Steinbring, Martin Pander, Uwe D. Hanebeck:

The Smart Sampling Kalman Filter with Symmetric Samples. - Christina Boucher, Alexander Bowe, Travis Gagie, Giovanni Manzini, Jouni Sirén:

Relative Select. - Giacomo Indiveri, Shih-Chii Liu:

Memory and information processing in neuromorphic systems. - Matteo Ceccarello, Andrea Pietracaprina, Geppino Pucci, Eli Upfal:

A Practical Parallel Algorithm for Diameter Approximation of Massive Weighted Graphs. - Dov M. Gabbay, Michael Gabbay:

The Attack as Strong Negation, Part I. - Gergely Neu:

Explore no more: improved high-probability regret bounds for non-stochastic bandits. - Marin Bougeret

, Guillerme Duvillié, Rodolphe Giroudeau, Rémi Watrigant:
Multidimensional Binary Vector Assignment problem: standard, structural and above guarantee parameterizations. - Meirav Galun, Tal Amir, Tal Hassner, Ronen Basri, Yaron Lipman:

Wide baseline stereo matching with convex bounded-distortion constraints. - Konstantin Avrachenkov, Vikas Vikram Singh:

Stochastic Coalitional Better-response Dynamics and Strong Nash Equilibrium. - Junyoung Nam:

Capacity Bounds for the K-User Gaussian Interference Channel. - Junyoung Nam:

New Outer Bounds on the Capacity of the Two-User Gaussian Interference Channel. - Christoph Pohl, Kathrin Schlierkamp, Hans-Joachim Hof:

BREW: A Breakable Web Application for IT-Security Classroom Use. - Shixiang Gu, Zoubin Ghahramani, Richard E. Turner:

Neural Adaptive Sequential Monte Carlo. - Karl Moritz Hermann, Tomás Kociský, Edward Grefenstette, Lasse Espeholt, Will Kay, Mustafa Suleyman, Phil Blunsom:

Teaching Machines to Read and Comprehend. - Ivan Gaspar, Maximilian Matthé, Nicola Michailow, Luciano Leonel Mendes, Dan Zhang, Gerhard P. Fettweis:

GFDM Transceiver using Precoded Data and Low-complexity Multiplication in Time Domain. - Rami Mochaourab, Mats Bengtsson:

Linear Transceiver Optimization in Multicell MIMO Based on the Generalized Benders Decomposition. - Qi Zhang, Shi Jin, Matthew R. McKay

, David Morales-Jiménez, Hongbo Zhu:
Power Allocation Schemes for Multicell Massive MIMO Systems. - Junya Honda:

Exact Asymptotics for the Random Coding Error Probability. - Tony Clark

, Paul Sammut, James S. Willans:
Super-Languages: Developing Languages and Applications with XMF (Second Edition). - Fisher Yu, Yinda Zhang, Shuran Song, Ari Seff, Jianxiong Xiao:

LSUN: Construction of a Large-scale Image Dataset using Deep Learning with Humans in the Loop. - Tony Clark

:
Processing XML for Domain Specific Languages. - Shipra Agrawal, Nikhil R. Devanur, Lihong Li:

Contextual Bandits with Global Constraints and Objective. - Sieteng Soh

, Gongqi Lin, Subhash C. Kak:
Connectivity in Social Networks. - Che-Yu Liu, Lihong Li:

On the Prior Sensitivity of Thompson Sampling. - Emma Brunskill, Lihong Li:

The Online Discovery Problem and Its Application to Lifelong Reinforcement Learning. - Tony Clark

, Dean Kramer, Samia Oussena:
Model Driven Reactive Applications. - Tony Clark

:
Meta-Packages: Painless Domain Specific Languages. - Stephanos Matsumoto, Raphael M. Reischuk, Pawel Szalachowski, Tiffany Hyun-Jin Kim, Adrian Perrig:

Designing a Global Authentication Infrastructure. - Evan Everett, Ashutosh Sabharwal:

Spatial Self-Interference Isolation for In-Band Full-Duplex Wireless: A Degrees-of-Freedom Analysis. - Tony Clark

:
A General Architecture for Heterogeneous Language Engineering and Projectional Editor Support. - Neeti Pokhriyal, Wen Dong, Venu Govindaraju:

Virtual Networks and Poverty Analysis in Senegal. - Abdoulaye Tall, Zwi Altman, Eitan Altman:

Self-optimizing load balancing with backhaul-constrained radio access networks. - Albert No, Amir Ingber, Tsachy Weissman:

Strong Successive Refinability and Rate-Distortion-Complexity Tradeoff. - (Withdrawn) Convergence rates for pretraining and dropout: Guiding learning parameters using network structure.

- Krzysztof Choromanski, Sanjiv Kumar, Xiaofeng Liu:

Fast Online Clustering with Randomized Skeleton Sets. - Marcus Vinícius Midena Ramos, Ruy J. G. B. de Queiroz:

Formalization of closure properties for context-free grammars. - Guy Zyskind, Oz Nathan, Alex Pentland:

Enigma: Decentralized Computation Platform with Guaranteed Privacy. - Holger Petersen:

A Non-Oblivious Reduction of Counting Ones to Multiplication. - (Withdrawn) Image Tag Completion and Refinement by Subspace Clustering and Matrix Completion.

- Cheng Wan:

Strategic decentralization in binary choice composite congestion games. - Robert Feldt, Simon M. Poulding, David Clark, Shin Yoo:

Test Set Diameter: Quantifying the Diversity of Sets of Test Cases. - John Wieting, Mohit Bansal, Kevin Gimpel, Karen Livescu:

From Paraphrase Database to Compositional Paraphrase Model and Back. - Rachel Cummings, Stratis Ioannidis, Katrina Ligett:

Truthful Linear Regression. - Daniel Y. T. Chino, Letricia P. S. Avalhais, José Fernando Rodrigues Jr., Agma J. M. Traina:

BoWFire: Detection of Fire in Still Images by Integrating Pixel Color and Texture Analysis. - Angeliki Lazaridou, Dat Tien Nguyen, Raffaella Bernardi, Marco Baroni:

Unveiling the Dreams of Word Embeddings: Towards Language-Driven Image Generation. - Philip Bachman, Doina Precup:

Data Generation as Sequential Decision Making. - Maurice Herlihy, Vikram Saraph:

The Relative Power of Composite Loop Agreement Tasks. - Furong Huang, Animashree Anandkumar:

Convolutional Dictionary Learning through Tensor Factorization. - Kunihisa Okano, Hideaki Ishii:

Stabilization of uncertain systems using quantized and lossy observations and uncertain control inputs. - Samet Oymak, Benjamin Recht, Mahdi Soltanolkotabi:

Isometric sketching of any set via the Restricted Isometry Property. - Fintan Hegarty, Padraig Ó Catháin, Yunbin Zhao:

Sparsification of Matrices and Compressed Sensing. - Mahdi Amani, Kevin A. Lai, Robert Endre Tarjan:

Amortized Rotation Cost in AVL Trees. - Kangjin Kim, Joe Campbell, William Duong, Yu Zhang, Georgios Fainekos:

DisCoF$^+$: Asynchronous DisCoF with Flexible Decoupling for Cooperative Pathfinding in Distributed Systems. - Qiyu Sun, Wai-Shing Tang:

Nonlinear frames and sparse reconstructions in Banach spaces. - Ahmad Khonsari, Seyed Pooya Shariatpanahi, Abolfazl Diyanat, Hossein Shafiei:

On the Feasibility of Wireless Interconnects for High-throughput Data Centers. - Johan Arcile, Jean-Yves Didier

, Hanna Klaudel, Raymond Devillers, Artur Rataj:
Indefinite waitings in MIRELA systems. 5-18 - Simon Busard, Quentin Cappart, Christophe Limbrée, Charles Pecheur, Pierre Schaus:

Verification of railway interlocking systems. 19-31 - Sentot Kromodimoeljo, Peter A. Lindsay:

Automatic Generation of Minimal Cut Sets. 33-47 - Eike Möhlmann

, Oliver E. Theel:
Breaking Dense Structures: Proving Stability of Densely Structured Hybrid Systems. 49-63 - Linna Pang, Chen-Wei Wang, Mark Lawford, Alan Wassyng, Josh Newell, Vera Chow, David Tremaine:

Formal Verification of Real-Time Function Blocks Using PVS. 65-79 - Chen-Wei Wang, Jonathan S. Ostroff, Simon Hudon:

Using Indexed and Synchronous Events to Model and Validate Cyber-Physical Systems. 81-95 - Gabriele Fici, Filippo Mignosi:

Words with the Maximum Number of Abelian Squares. - Liqun Chen, Qin Li, Keith M. Martin, Siaw-Lynn Ng:

Private reputation retrieval in public - a privacy-aware announcement scheme for VANETs. - Sakyasingha Dasgupta, Dennis Goldschmidt, Florentin Wörgötter, Poramate Manoonpong:

Distributed Recurrent Neural Forward Models with Synaptic Adaptation for Complex Behaviors of Walking Robots. - Chengshi Zheng, Andreas Schwarz, Walter Kellermann, Xiaodong Li:

Binaural coherent-to-diffuse-ratio estimation for dereverberation using an ITD model. - Guilhem Chéron, Ivan Laptev, Cordelia Schmid:

P-CNN: Pose-based CNN Features for Action Recognition. - Florin F. Nichita:

Yang-Baxter Equations, Computational Methods and Applications. - Stephan C. Kramer, Matthew D. Piggott:

A correction to the enhanced bottom drag parameterisation of tidal turbines. - Georgios Konstantinidis, Athanasios Kehagias:

Simultaneously Moving Cops and Robbers. - Han Xiao, Xiaoyan Zhu:

Max-Entropy Feed-Forward Clustering Neural Network. - Daniel J. Mankowitz, Timothy A. Mann, Shie Mannor:

Bootstrapping Skills. - Ingo Feinerer, Enrico Franconi, Paolo Guagliardo:

Lossless Selection Views under Conditional Domain Constraints. - Han Xiao, Xiaoyan Zhu:

Margin-Based Feed-Forward Neural Network Classifiers. - Deepak Pathak, Philipp Krähenbühl, Trevor Darrell:

Constrained Convolutional Neural Networks for Weakly Supervised Segmentation. - Salah Eddine Hajri, Mohamad Assaad:

An Exclusion zone for Massive MIMO With Underlay D2D Communication. - Xiaozhe Wang, Hsiao-Dong Chiang, Jianhui Wang, Hui Liu, Tao Wang:

Long-Term Stability Analysis of Power Systems with Wind Power Based on Stochastic Differential Equations: Model Development and Foundations. - Thomas Hofmann, Aurélien Lucchi, Brian McWilliams:

Neighborhood Watch: Stochastic Gradient Descent with Neighbors. - Christian Hinrichs, Michael Sonnenschein:

Design, Analysis and Evaluation of Control Algorithms for Applications in Smart Grids. - Zolzaya Dashdorj, Stanislav Sobolevsky:

Impact of the spatial context on human communication activity. - Tobias Christiani, Rasmus Pagh, Mikkel Thorup:

From Independence to Expansion and Back Again. - Fatema Akhter:

A Novel Approach for Image Steganography in Spatial Domain. - Jamie Morgenstern, Tim Roughgarden:

The Pseudo-Dimension of Near-Optimal Auctions. - Edward Meeds, Max Welling:

Optimization Monte Carlo: Efficient and Embarrassingly Parallel Likelihood-Free Inference. - Grzegorz Chrupala, Ákos Kádár, Afra Alishahi:

Learning language through pictures. - Katharina Egger, Piotr Majdak, Bernhard Laback:

Channel Interaction and Current Level Affect Across-Electrode Integration of Interaural Time Differences in Bilateral Cochlear-Implant Listeners. - Youssef Mroueh, Steven J. Rennie, Vaibhava Goel:

Random Maxout Features. - Alberto Cappai, Ugo Dal Lago:

On Equivalences, Metrics, and Polynomial Time (Long Version). - Yeow Meng Chee, Han Mao Kiah, Punarbasu Purkayastha, Patrick Solé:

Product Construction of Affine Codes. - Bruno Grenet

:
Lacunaryx: Computing bounded-degree factors of lacunary polynomials. - Shashank Tiwari, Suvra Sekhar Das, Kalyan Kumar Bandyopadhyay:

Precoded GFDM System to Combat Inter Carrier Interference : Performance Analysis. - Udit Gupta:

Application of Multi factor authentication in Internet of Things domain. - Rajesh Hemant Chitnis, Hossein Esfandiari, MohammadTaghi Hajiaghayi, Rohit Khandekar, Guy Kortsarz, Saeed Seddighin:

A Tight Algorithm for Strongly Connected Steiner Subgraph On Two Terminals With Demands. - Javier V. Gómez, David Álvarez, Santiago Garrido, Luis Moreno:

Fast Methods for Eikonal Equations: an Experimental Survey. - Jingwen Liang, Lalitha Sankar, Oliver Kosut:

Vulnerability Analysis and Consequences of False Data Injection Attack on Power System State Estimation. - Prakhar Biyani, Cornelia Caragea, Narayan L. Bhamidipati:

Entity-Specific Sentiment Classification of Yahoo News Comments. - Siyao Xu:

Reversible Logic Synthesis with Minimal Usage of Ancilla Bits. - Marcelo Firer, Judy L. Walker:

Matched Metrics and Channels. - Rafid Mahmood, Ahmed Badr, Ashish Khisti:

Convolutional Codes with Maximum Column Sum Rank for Network Streaming. - Nicholas J. Cavanna, Mahmoodreza Jahanseir, Donald R. Sheehy:

A Geometric Perspective on Sparse Filtrations. - Amin Jourabloo, Xiaoming Liu:

Pose-Invariant 3D Face Alignment. - Hugo A. Mitre-Hernández, Arturo Mora-Soto, Héctor Pérez López-Portillo

, Carlos Lara-Alvarez:
Strategies for fostering Knowledge Management Programs in Public Organizations. - Juan Manuel R. Mosso:

Ciberseguridad Inteligente. - Weinan Zhang, Jun Wang:

Statistical Arbitrage Mining for Display Advertising. - Jiehua Chen, Kirk Pruhs, Gerhard J. Woeginger:

The one-dimensional Euclidean domain: Finitely many obstructions are not enough. - Szabolcs Iván:

Algebraic characterization of temporal logics on forests. - Marcos Vinicius Naves Bedo, Gustavo Blanco, Willian D. Oliveira, Mirela T. Cazzolato, Alceu Ferraz Costa, José F. Rodrigues Jr., Agma J. M. Traina, Caetano Traina Jr.:

Techniques for effective and efficient fire detection from social media images. - José F. Rodrigues Jr., Hanghang Tong, Agma J. M. Traina, Christos Faloutsos, Jure Leskovec:

GMine: A System for Scalable, Interactive Graph Visualization and Mining. - Wei Lu, Marco Di Renzo:

Stochastic Geometry Modeling of Cellular Networks: Analysis, Simulation and Experimental Validation. - Breno Piva

, Cid C. de Souza:
Counterexample for the 2-approximation of finding partitions of rectilinear polygons with minimum stabbing number. - Grey Ballard, Ali Pinar, Tamara G. Kolda

, C. Seshadhri:
Diamond Sampling for Approximate Maximum All-pairs Dot-product (MAD) Search. - Jörg Bornschein, Samira Shabanian, Asja Fischer, Yoshua Bengio:

Training opposing directed models using geometric mean matching. - Ji Xu, Guoyin Wang:

Leading Tree in DPCLUS and Its Impact on Building Hierarchies. - Dietmar Berwanger, Anup Basil Mathew, Marie van den Bogaard:

Hierarchical Information Patterns and Distributed Strategy Synthesis. - Dietmar Berwanger, Marie van den Bogaard:

Games with Delays. A Frankenstein Approach. - Yiyi Liao, Sarath Kodagoda

, Yue Wang, Lei Shi, Yong Liu:
Place classification with a graph regularized deep neural network model. - Jürgen Zechner, Benjamin Marussig, Gernot Beer, Thomas-Peter Fries:

The Isogeometric Nyström Method. - Georgia Tseliou, Ferran Adelantado, Christos V. Verikoukis:

Scalable RAN Virtualization in Multi-Tenant LTE-A Heterogeneous Networks (Extended version). - Jan Konecny, Michal Krupka:

Complete relations on fuzzy complete lattices. - Mahshid Majd, Farzaneh Shoeleh:

A Novel Hybrid Approach for Cephalometric Landmark Detection. - Longfei Lu:

Optimal γ and C for ε-Support Vector Regression with RBF Kernels. - Frédéric Blanqui

, Jean-Pierre Jouannaud, Albert Rubio
:
The computability path ordering. - Dmitry N. Kozlov:

Combinatorial topology of the standard chromatic subdivision and Weak Symmetry Breaking for 6 processes. - Jos W. H. M. Uiterwijk, Michael Barton:

New Results for Domineering from Combinatorial Game Theory Endgame Databases. - Abhishek Bichhawat, Vineet Rajani, Deepak Garg, Christian Hammer:

Generalizing Permissive-Upgrade in Dynamic Information Flow Analysis. - Xiaolin Qin, Juan Tang, Yong Feng, Bernhard Bachmann, Peter Fritzson:

Efficient algorithm for computing large scale systems of differential algebraic equations. - Martin Kolár, Michal Hradis, Pavel Zemcík:

Technical Report: Image Captioning with Semantically Similar Images. - Markus Wittmann, Thomas Zeiser, Georg Hager, Gerhard Wellein:

Short Note on Costs of Floating Point Operations on current x86-64 Architectures: Denormals, Overflow, Underflow, and Division by Zero. - Sohrab Ferdowsi, Svyatoslav Voloshynovskiy, Dimche Kostadinov:

Sparse Multi-layer Image Approximation: Facial Image Compression. - Farzaneh Shoeleh, Mahshid Majd, Ali Hamzeh, Sattar Hashemi:

Knowledge Representation in Learning Classifier Systems: A Review. - Sahar Vahdati, Farah Karim, Jyun-Yao Huang, Christoph Lange:

Mapping Large Scale Research Metadata to Linked Data: A Performance Comparison of HBase, CSV and XML. - Umberto Martínez-Peñas:

On the similarities between rank and Hamming weights and their applications to network coding. - Seyed Rasoul Etesami, Tamer Basar:

Approximation Algorithm for the Binary-Preference Capacitated Selfish Replication Game and a Tight Bound on its Price of Anarchy. - Lucia Maddalena, Alfredo Petrosino:

Towards Benchmarking Scene Background Initialization. - Luc Dartois, Pierre-Alain Reynier:

Aperiodic Transducers. - Milad Rezaee, Reza Kaboli, Mahtab Mirmohseni, Mohammad Reza Aref:

An Optimal Transmission Policy for Energy Harvesting Systems with Continuous Energy and Data Arrivals. - Aviv Ron, Alexandra Shulman-Peleg, Emanuel Bronshtein:

No SQL, No Injection? Examining NoSQL Security. - Hongyuan Mei, Mohit Bansal, Matthew R. Walter:

Listen, Attend, and Walk: Neural Mapping of Navigational Instructions to Action Sequences. - Vida Dujmovic:

The Utility of Untangling. - Christoph Lange, Saeedeh Shekarpour, Sören Auer:

The WDAqua ITN: Answering Questions using Web Data. - Nathaniel Fruchter, Hsin Miao, Scott Stevenson, Rebecca Balebako:

Variations in Tracking in Relation to Geographic Location. - Georgios Kontaxis, Monica Chew:

Tracking Protection in Firefox For Privacy and Performance. - Marta Piekarska, Yun Zhou, Dominik Strohmeier, Alexander Raake:

Because we care: Privacy Dashboard on Firefox OS. - Istemi Ekin Akkus, Nicholas Weaver:

The Case for a General and Interaction-based Third-party Cookie Policy. - Amit Levy, Henry Corrigan-Gibbs, Dan Boneh:

Stickler: Defending Against Malicious CDNs in an Unmodified Browser. - Wei Wang, Kenneth E. Shirley:

Breaking Bad: Detecting malicious domains using word segmentation. - Marcus Niemietz, Jörg Schwenk:

Owning Your Home Network: Router Security Revisited. - Mor Weiss, Boris Rozenberg, Muhammad Barham:

Practical Solutions For Format-Preserving Encryption. - Paul Syverson, Griffin Boyce:

Genuine onion: Simple, Fast, Flexible, and Cheap Website Authentication. - Antonio C. de A. Campello Jr., Vinay A. Vaishampayan:

A Generalization of Montucla's Rectangle-to-Rectangle Dissection to Higher Dimensions. - Igor Korkin

, Ivan Nesterov:
Applying Memory Forensics to Rootkit Detection. - Harsh Agrawal, Clint Solomon Mathialagan, Yash Goyal, Neelima Chavali, Prakriti Banik, Akrit Mohapatra, Ahmed Osman, Dhruv Batra:

CloudCV: Large Scale Distributed Computer Vision as a Cloud Service. - Igor Korkin

:
Two Challenges of Stealthy Hypervisors Detection: Time Cheating and Data Fluctuations. - Arnaud De Myttenaere, Boris Golden, Bénédicte Le Grand, Fabrice Rossi:

Reducing offline evaluation bias of collaborative filtering algorithms. - David Monniaux

, Francesco Alberti:
A simple abstraction of arrays and maps by program translation. - Romain Reuillon, Mathieu Leclaire, Jonathan Passerat-Palmbach

:
Model Exploration Using OpenMOLE - a workflow engine for large scale distributed design of experiments and parameter tuning. - Manuel Bodirsky, Marcello Mamino:

Max-Closed Semilinear Constraint Satisfaction. - Esteban Landerreche, David Fernández-Duque:

A case study in almost-perfect security for unconditionally secure communication. - Babak Fotouhi, Naghmeh Momeni:

Multiplex Networks with Intrinsic Fitness: Modeling the Merit-Fame Interplay via Latent Layers. - Zhiwei Deng, Mengyao Zhai, Lei Chen, Yuhao Liu, Srikanth Muralidharan, Mehrsan Javan Roshtkhari, Greg Mori:

Deep Structured Models For Group Activity Recognition. - Eric Balkanski, Jason D. Hartline:

Bayesian Budget Feasibility with Posted Pricing. - Konstantin Berlin

, David Slater, Joshua Saxe:
Malicious Behavior Detection using Windows Audit Logs. - Éric Tanter, Nicolas Tabareau:

Gradual Certified Programming in Coq. - Xingjian Shi, Zhourong Chen, Hao Wang, Dit-Yan Yeung, Wai-Kin Wong, Wang-chun Woo:

Convolutional LSTM Network: A Machine Learning Approach for Precipitation Nowcasting. - Mohamed Khochtali, Daniel S. Roche, Xisen Tian:

Parallel sparse interpolation using small primes. - (Withdrawn) On the Equivalence of CoCoA+ and DisDCA.

- Drona Pratap Chandu:

Improved Greedy Algorithm for Set Covering Problem. - Grigor Iliev, Nadezhda Borisova, Elena Karashtranova, Dafina Kostadinova

:
A Publicly Available Cross-Platform Lemmatizer for Bulgarian. - Elena Karashtranova, Grigor Iliev, Nadezhda Borisova, Yana Chankova, Irena Atanasova:

Evaluation of the Accuracy of the BGLemmatizer. - Mugen Peng, Shi Yan, Kecheng Zhang, Chonggang Wang:

Fog Computing based Radio Access Networks: Issues and Challenges. - Yuanming Shi, Jun Zhang, Khaled Ben Letaief, Bo Bai, Wei Chen:

Large-Scale Convex Optimization for Ultra-Dense Cloud-RAN. - Anisse Ismaili:

The Efficiency of Multi-objective Normal Form Games. - Matthew L. Malloy, Scott Alfeld, Paul Barford:

Contamination Estimation via Convex Relaxations. - Sinjan Chakraborty, Vineet Kumar:

A Study and Implementation of RSA Cryptosystem. - Tomasz Waclawczyk:

A consistent solution of the reinitialization equation in the conservative level-set method. - Fuan Pu, Jian Luo, Yulai Zhang, Guiming Luo:

Attacker and Defender Counting Approach for Abstract Argumentation. - Mehdi M. Molu:

Series Representation of Modified Bessel Functions and Its Application in AF Cooperative systems. - Babak Salimi, Leopoldo E. Bertossi:

Query-Answer Causality in Databases: Abductive Diagnosis and View-Updates. - Deepjyoti Deka, Ross Baldick, Sriram Vishwanath:

One Breaker is Enough: Hidden Topology Attacks on Power Grids. - Jeremy Maitin-Shepard, Viren Jain, Michal Januszewski, Peter Li, Pieter Abbeel:

Combinatorial Energy Learning for Image Segmentation. - Anastasia-Maria Leventi-Peetz, J.-V. Peetz:

Generating S-Box Multivariate Quadratic Equation Systems And Estimating Algebraic Attack Resistance Aided By SageMath. - Nesreen K. Ahmed, Jennifer Neville, Ryan A. Rossi, Nick G. Duffield:

Fast Parallel Graphlet Counting for Large Networks. - Tamás Lukovszki, Stefan Schmid:

Online Admission Control and Embedding of Service Chains. - Nikos Bikakis, John Liagouris, Maria Krommyda, George Papastefanatos, Timos K. Sellis

:
Towards Scalable Visual Exploration of Very Large RDF Graphs. - Jan Buys, Phil Blunsom:

A Bayesian Model for Generative Transition-based Dependency Parsing. - Wei Yang, Haiting Lin, Sing Bing Kang, Jingyi Yu:

Resolving Scale Ambiguity Via XSlit Aspect Ratio Analysis. - Rohit Pandey, Yingbo Zhou, Venu Govindaraju:

Deep Secure Encoding: An Application to Face Recognition. - Santiago Hernández-Orozco, Francisco Hernández Quiroz, Hector Zenil, Wilfried Sieg:

Rare Speed-up in Automatic Theorem Proving Reveals Tradeoff Between Computational Time and Information Value. - Parikshit Gopalan, Daniel M. Kane, Raghu Meka:

Pseudorandomness via the discrete Fourier transform. - Zhe Wang

, Kai Hu, Baolin Yin:
Internet Traffic Matrix Structural Analysis Based on Multi-Resolution RPCA. - Milan Rajkovic, Milos Milovanovic:

The Artists who Forged Themselves: Detecting Creativity in Art. 


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID