- Vignesh Sethuraman, Bruce E. Hajek:
Comments on 'Bit Interleaved Coded Modulation'. CoRR abs/cs/0506052 (2005) - Hongyuan Zhang, Huaiyu Dai, Quan Zhou, Brian L. Hughes:
Analysis on Transmit Antenna Selection for Spatial Multiplexing Systems: A Geometrical Approach. CoRR abs/cs/0506053 (2005) - Ramesh Johari, Shie Mannor, John N. Tsitsiklis:
Efficiency Loss in a Network Resource Allocation Game: The Case of Elastic Supply. CoRR abs/cs/0506054 (2005) - Edith Hemaspaandra, Lane A. Hemaspaandra, Osamu Watanabe:
The Complexity of Kings. CoRR abs/cs/0506055 (2005) - Travis Gagie:
Large Alphabets and Incompressibility. CoRR abs/cs/0506056 (2005) - Victor Kromer:
About one 3-parameter Model of Testing. CoRR abs/cs/0506057 (2005) - Kapil Bhattad, Krishna R. Narayanan:
An MSE Based Ttransfer Chart to Analyze Iterative Decoding Schemes. CoRR abs/cs/0506058 (2005) - Hubie Chen:
Existentially Restricted Quantified Constraint Satisfaction. CoRR abs/cs/0506059 (2005) - Yong Luo:
Yet another normalisation proof for Martin-Lof's logical framework--Terms with correct arities are strongly normalising. CoRR abs/cs/0506060 (2005) - Daniele Gorla, Matthew Hennessy, Vladimiro Sassone:
Security Policies as Membranes in Systems for Global Computing. CoRR abs/cs/0506061 (2005) - Yoshiyuki Kabashima:
A CDMA multiuser detection algorithm based on survey propagation. CoRR abs/cs/0506062 (2005) - Slawomir Staworko, Jan Chomicki:
Priority-Based Conflict Resolution in Inconsistent Relational Databases. CoRR abs/cs/0506063 (2005) - Mitsugu Iwamoto, Hirosuke Yamamoto, Hirohisa Ogawa:
Optimal multiple assignments based on integer programming in secret sharing schemes with general access structures. CoRR abs/cs/0506064 (2005) - Mitsugu Iwamoto, Hirosuke Yamamoto:
Strongly secure ramp secret sharing schemes for general access structures. CoRR abs/cs/0506065 (2005) - Yoo Chung, Dongman Lee:
Impersonation with the Echo Protocol. CoRR abs/cs/0506066 (2005) - Juan José Amor, Gregorio Robles, Jesús M. González-Barahona:
Measuring Woody: The Size of Debian 3.0. CoRR abs/cs/0506067 (2005) - Chris Marriott, John Watrous:
Quantum Arthur-Merlin Games. CoRR abs/cs/0506068 (2005) - Rémi Monasson:
A generating function method for the average-case analysis of DPLL. CoRR abs/cs/0506069 (2005) - Yuriy A. Chashkov:
Data Visualization on Shared Usage Multi-Screen Environment. CoRR abs/cs/0506070 (2005) - Yu. Reznykov:
Signal transmission on lossy lines as a dissipative quantum state propagation. CoRR abs/cs/0506071 (2005) - Jing Jiang, Krishna R. Narayanan:
Performance Analysis of Algebraic Soft Decoding of Reed-Solomon Codes over Binary Symmetric and Erasure Channels. CoRR abs/cs/0506072 (2005) - Jing Jiang, Krishna R. Narayanan:
Iterative Soft Input Soft Output Decoding of Reed-Solomon Codes by Adapting the Parity Check Matrix. CoRR abs/cs/0506073 (2005) - Paolo Liberatore:
Redundancy in Logic II: 2CNF and Horn Propositional Formulae. CoRR abs/cs/0506074 (2005) - Bo Pang, Lillian Lee:
Seeing stars: Exploiting class relationships for sentiment categorization with respect to rating scales. CoRR abs/cs/0506075 (2005) - Wojciech Mazurczyk, Zbigniew Kotulski:
Alternative security architecture for IP Telephony based on digital watermarking. CoRR abs/cs/0506076 (2005) - K. C. V. Kalyanarama Sesha Sayee, Utpal Mukherji:
Stability of Scheduled Multi-access Communication over Quasi-static Flat Fading Channels with Random Coding and Independent Decoding. CoRR abs/cs/0506077 (2005) - David R. C. Dominguez, Kostadin Koroutchev, Eduardo Serrano, Francisco de Borja Rodríguez Ortiz:
Dynamical Neural Network: Information and Topology. CoRR abs/cs/0506078 (2005) - Ugo Dal Lago, Martin Hofmann:
Quantitative Models and Implicit Complexity. CoRR abs/cs/0506079 (2005) - Ugo Dal Lago:
The Geometry of Linear Higher-Order Recursion. CoRR abs/cs/0506080 (2005) - Gatis Midrijanis:
Three lines proof of the lower bound for the matrix rigidity. CoRR abs/cs/0506081 (2005)