


default search action
CoRR, March 2010
- Joshua V. Dillon, Krishnakumar Balasubramanian, Guy Lebanon:
Asymptotic Analysis of Generative Semi-Supervised Learning. - Yiling Chen, Jennifer Wortman Vaughan:
A New Understanding of Prediction Markets Via No-Regret Learning. - Rahul Srivastava, Can Emre Koksal:
Energy Optimal Transmission Scheduling in Wireless Sensor Networks. - Shuiyin Liu, Cong Ling, Damien Stehlé:
Randomized Lattice Decoding. - Marius Kloft, Ulf Brefeld, Sören Sonnenburg, Alexander Zien:
Non-Sparse Regularization and Efficient Training with Multiple Kernels. - Fu-Te Hsu, Hsuan-Jung Su:
Random Access Game in Fading Channels with Capture: Equilibria and Braess-like Paradoxes. - Chih-Ning Hsu, Hsuan-Jung Su, Pin-Hsun Lin:
Joint Subcarrier Pairing and Power Allocation for OFDM Transmission with Decode-and-Forward Relaying. - Yu-Han Yang, Shih-Chun Lin, Hsuan-Jung Su:
Multiuser MIMO Downlink Beamforming with Average SINR Constraints. - Martin Churchill, James Laird, Guy McCusker:
A Concrete Representation of Observational Equivalence for PCF. - Tomás Brázdil, Václav Brozek, Antonín Kucera, Jan Obdrzálek:
Qualitative Reachability in Stochastic BPA Games. - Alexander L. Strehl, John Langford, Sham M. Kakade:
Learning from Logged Implicit Exploration Data. - Prosenjit Bose, Karim Douïeb, Vida Dujmovic, Rolf Fagerberg:
An O(loglog n)-Competitive Binary Search Tree with Optimal Worst-Case Access Times. - Lihong Li, Wei Chu, John Langford, Robert E. Schapire:
A Contextual-Bandit Approach to Personalized News Article Recommendation. - Yun Kuen Cheung, Philippe Flajolet, Mordecai J. Golin, C. Y. James Lee:
Multidimensional Divide-and-Conquer and Weighted Digital Sums. - (Withdrawn) When LP is the Cure for Your Matching Woes: Approximating Stochastic Matchings.
- Andrei M. Sukhov, Natalia Yu. Kuznetsova, A. K. Pervitsky, Aleksey A. Galtsev:
Generating Function For Network Delay. - Aarti Singh, Robert D. Nowak, A. Robert Calderbank:
Detecting Weak but Hierarchically-Structured Patterns in Networks. - Steven Wegmann, Larry Gillick:
Why has (reasonably accurate) Automatic Speech Recognition been so hard to achieve? - Dmitry M. Malioutov, Sujay Sanghavi, Alan S. Willsky:
Sequential Compressed Sensing. - Richard A. Formato:
Central Force Optimization Applied to the PBM Suite of Antenna Benchmarks. - Chung-Pi Lee, Hsuan-Jung Su:
Peak to Average Power Ratio Reduction for Space-Time Codes That Achieve Diversity-Multiplexing Gain Tradeoff. - Riccardo Giacomelli, Radha Krishna Ganti, Martin Haenggi:
Outage Probability of General Ad Hoc Networks in the High-Reliability Regime. - Feng Gu, Julie Greensmith, Uwe Aickelin:
Further Exploration of the Dendritic Cell Algorithm: Antigen Multiplier and Time Windows. - (Withdrawn) On the Optimal Number of Cooperative Base Stations in Network MIMO Systems.
- Andrey Kutuzov:
Change of word types to word tokens ratio in the course of translation (based on Russian translations of K. Vonnegut novels). - Jamie Twycross, Uwe Aickelin:
libtissue - implementing innate immunity. - Dan Claudiu Ciresan, Ueli Meier, Luca Maria Gambardella, Jürgen Schmidhuber:
Deep Big Simple Neural Nets Excel on Handwritten Digit Recognition. - Yong Jiang, Shu-Tao Xia, Fang-Wei Fu:
Stopping Set Distributions of Some Linear Codes. - Gopinadh Sirigineedi, Antonios Tsourdos, Brian A. White, Rafal Zbikowski:
Modelling and Verification of Multiple UAV Mission Using SMV. 22-33 - Emil Vassev, Mike Hinchey
:
Developing Experimental Models for NASA Missions with ASSL. 88 - Pablo Sprechmann, Ignacio Ramírez, Guillermo Sapiro, Yonina C. Eldar:
Collaborative Hierarchical Sparse Modeling. - Feng Gu, Julie Greensmith, Uwe Aickelin:
Exploration Of The Dendritic Cell Algorithm Using The Duration Calculus. - Joel A. Tropp:
The Sparsity Gap: Uncertainty Principles Proportional to Dimension. - Giorgi Japaridze:
A logical basis for constructive systems. - Piotr Kordy, Rom Langerak
, Jan Willem Polderman:
Re-verification of a Lip Synchronization Protocol using Robust Reachability. 49-62 - Kamyar Moshksar, Amir K. Khandani:
On The Design of Signature Codes in Decentralized Wireless Networks. - Anne Driemel, Sariel Har-Peled, Carola Wenk:
Approximating the Fréchet Distance for Realistic Curves in Near Linear Time. - Thorsten Strufe:
Profile Popularity in a Business-oriented Online Social Network. - Jon M. Kleinberg, Katrina Ligett:
Information-Sharing and Privacy in Social Networks. - Pinar Donmez, Krishnakumar Balasubramanian, Guy Lebanon:
Unsupervised Supervised Learning II: Training Margin Based Classifiers without Labels. - Nicolas Brener:
A definable number which cannot be approximated algorithmically. - Chunhua Shen, Junae Kim, Lei Wang:
Scalable Large-Margin Mahalanobis Distance Metric Learning. - Sameer Pawar, Salim Y. El Rouayheb, Kannan Ramchandran:
On Secure Distributed Data Storage Under Repair Dynamics. - Anastasios Zouzias:
Low Dimensional Euclidean Volume Preserving Embeddings. - Pulkit Grover
, Se Yong Park, Anant Sahai:
The finite-dimensional Witsenhausen counterexample. - Marcus Hutter, Minh-Ngoc Tran:
Model Selection with the Loss Rank Principle. - Pulkit Grover
, Aaron B. Wagner, Anant Sahai:
Information embedding meets distributed control. - Victor Yodaiken:
State machine models of timing and circuit design. - Arvind Agarwal, Jeff M. Phillips, Suresh Venkatasubramanian:
A Unified Algorithmic Framework for Multi-Dimensional Scaling. - Loïc Besnard, Thierry Gautier, Julien Ouy, Jean-Pierre Talpin, Jean-Paul Bodeveix, Alexandre Cortier, Marc Pantel, Martin Strecker
, Gérald Garcia, Ana-Elena Rugina, Jérémy Buisson, Fabien Dagnat:
Polychronous Interpretation of Synoptic, a Domain Specific Modeling Language for Embedded Flight-Software. 80-87 - Anahí Gajardo, Pierre Guillon:
Zigzags in Turing machines. - Sami Al-Maqtari, Habib Abdulrab, Eduard Babkin:
A new model for solution of complex distributed constrained problems. - Louise A. Dennis
, Michael Fisher
, Nicholas Lincoln, Alexei Lisitsa, Sandor M. Veres:
Agent Based Approaches to Engineering Autonomous Space Software. 63-67 - Yi Mao, Krishnakumar Balasubramanian, Guy Lebanon:
Linguistic Geometries for Unsupervised Dimensionality Reduction. - Mircea Lazar:
Flexible Lyapunov Functions and Applications to Fast Mechatronic Systems. 76-79 - Ayatullah Faruk Mollah, Subhadip Basu, Nibaran Das, Ram Sarkar, Mita Nasipuri, Mahantapas Kundu:
Text Region Extraction from Business Card Images for Mobile Devices. - Ayatullah Faruk Mollah, Subhadip Basu, Nibaran Das, Ram Sarkar, Mita Nasipuri, Mahantapas Kundu:
Binarizing Business Card Images for Mobile Devices. - Evan Ettinger, Yoav Freund:
Particle Filtering on the Audio Localization Manifold. - Mustapha Arfi, Bedine Ould M. Lemine, Carla Selmi:
Strategical languages of infinite words. - Joshua V. Dillon, Guy Lebanon:
Statistical and Computational Tradeoffs in Stochastic Composite Likelihood. - Arvind Agarwal, Hal Daumé III:
Exponential Family Hybrid Semi-Supervised Learning. - Anupam Gupta, Ravishankar Krishnaswamy, Viswanath Nagarajan, R. Ravi:
Approximation Algorithms for Optimal Decision Trees and Adaptive TSP Problems. - Chengfang Fang, Ee-Chien Chang:
Securing Kiosk using Mobile Devices coupled with Visual Inspection. - Ghadamali Bagherikaram, Abolfazl S. Motahari, Amir K. Khandani:
On the Secure Degrees-of-Freedom of the Multiple-Access-Channel. - Lili Zhang, Jinhua Jiang, Shuguang Cui:
Compress-and-Forward Performance in Low-SNR Relay Channels. - Raphaël Chenouard, Frédéric Jouault:
Automatically Discovering Hidden Transformation Chaining Constraints. - Aleksandar Kupusinac, Dusan Malbaski:
S-Program Calculus. - Roumen Anguelov, Inger Fabris-Rotelli:
Properties of the Discrete Pulse Transform for Multi-Dimensional Arrays. - Chenyi Zhang, Jun Pang:
On Probabilistic Alternating Simulations. - Julie Greensmith, Uwe Aickelin, Gianni Tedesco:
Information Fusion for Anomaly Detection with the Dendritic Cell Algorithm. - Florent R. Madelaine, Barnaby Martin:
The complexity of positive first-order logic without equality. - Yuzhe Jin, Young-Han Kim, Bhaskar D. Rao:
Support Recovery of Sparse Signals. - Ciamac Cyrus Moallemi, Devavrat Shah:
On the Flow-level Dynamics of a Packet-switched Network. - Wei Zhou, Jianfeng Zhan, Dan Meng, Dongyan Xu, Zhihong Zhang:
LogMaster: Mining Event Correlations in Logs of Large scale Cluster Systems. - Vicente H. F. Batista, George O. Ainsworth Jr., Fernando L. B. Ribeiro:
Parallel structurally-symmetric sparse matrix-vector products on multi-core processors. - Chi Wan Sung, Kenneth W. Shum, Wing Ho A. Yuen:
Information Flow in One-Dimensional Vehicular Ad Hoc Networks. - Zhihong Zhang, Jianfeng Zhan, Yong Li, Lei Wang, Dan Meng, Bo Sang:
Precise Request Tracing and Performance Debugging for Multi-tier Services of Black Boxes. - Jianfeng Zhan, Lei Wang, Weisong Shi, Shimin Gong, Xiutao Zang:
PhoenixCloud: Provisioning Resources for Heterogeneous Cloud Workloads. - Bo Sang, Jianfeng Zhan, Guanhua Tian:
Decreasing log data of multi-tier services for effective request tracing. - Blaise Genest, Anca Muscholl, Zhilin Wu:
Verifying Recursive Active Documents with Positive Data Tree Rewriting. - Richard A. Formato:
Parameter-Free Deterministic Global Search with Central Force Optimization. - Kathrin Knautz, Simone Soubusta, Wolfgang G. Stock:
Tag Clusters as Information Retrieval Interfaces. - Jörg Endrullis:
Levels of Undecidability in Infinitary Rewriting: Normalization and Reachability. - Carole Delporte-Gallet, Stéphane Devismes
, Hugues Fauconnier, Mikel Larrea:
Algorithms For Extracting Timeliness Graphs. - Satadal Saha, Subhadip Basu, Mita Nasipuri, Dipak Kumar Basu:
An Offline Technique for Localization of License Plates for Indian Commercial Vehicles. - Peter D. Turney, Patrick Pantel:
From Frequency to Meaning: Vector Space Models of Semantics. - Lunjin Lu, Dae-Kyoo Kim:
Semantics-based Refinement of Mandatory Behavior of Sequence Diagrams. - Deepak Ponvel Chermakani:
Repeating Patterns in Linear Programs that express NP-Complete Problems. - Lei Wang, Jianfeng Zhan, Weisong Shi, Yi Liang, Lin Yuan:
In Cloud, Do MTC or HTC Service Providers Benefit from the Economies of Scale? - Diego Calvanese, Giuseppe De Giacomo, Maurizio Lenzerini, Moshe Y. Vardi:
View Synthesis from Schema Mappings. - Panduranga H. T, Naveen Kumar S. K:
Hybrid approach for Image Encryption Using SCAN Patterns and Carrier Images. - Viswanath Gunturi, Shashi Shekhar, Arnab Bhattacharya:
Minimum Spanning Tree on Spatio-Temporal Networks. - Gianni Tedesco, Jamie Twycross, Uwe Aickelin:
Integrating Innate and Adaptive Immunity for Intrusion Detection. - Erik Agrell, Magnus Karlsson:
On the symbol error probability of regular polytopes. - Dániel Marx, Ildikó Schlotter:
Cleaning Interval Graphs. - Ulrike von Luxburg, Agnes Radl, Matthias Hein:
Hitting times, commute distances and the spectral gap for large random geometric graphs. - Alejandro Lorca, Eduardo Huedo, Ignacio Martín Llorente:
The Grid[Way] Job Template Manager, a tool for parameter sweeping. - Jaroslaw Byrka, Aravind Srinivasan, Chaitanya Swamy:
Fault-Tolerant Facility Location: a randomized dependent LP-rounding algorithm. - Shariefuddin Pirzada, Guofei Zhou:
On k-hypertournament losing scores. - Glencora Borradaile, Piotr Sankowski, Christian Wulff-Nilsen:
Min st-Cut Oracle for Planar Graphs with Near-Linear Preprocessing Time. - Peter Fornai, Antal Iványi:
FIFO anomaly is unbounded. - David H. Wolpert, Gregory Benford:
What does Newcomb's paradox teach us? - Simeon Warner:
Author Identifiers in Scholarly Repositories. - Xinhua Zhang, Ankan Saha, S. V. N. Vishwanathan:
Faster Rates for training Max-Margin Markov Networks. - Javad Ghaderi, R. Srikant:
On the Design of Efficient CSMA Algorithms for Wireless Networks. - Antal Bege, Zoltán Kása:
Coding objects related to Catalan numbers. - Gyöngyvér Márton:
Public-key cryptography in functional programming context. - Peter Burcsi, Attila Kovács, Antal Tátrai:
Start-phase control of distributed systems written in Erlang/OTP. - Stefan Korecko, Branislav Sobota:
Using Coloured Petri Nets for design of parallel raytracing environment. - Peter Václavík, Jaroslav Porubän, Marek Mezei:
Automatic derivation of domain terms and concept location based on the analysis of the identifiers. - Branislav Sobota, Milan Guzan:
Macro and micro view on steady states in state space. - Seungyeon Kim, Guy Lebanon:
Local Space-Time Smoothing for Versioned Documents. - Onur Ozan Koyluoglu, Hesham El Gamal:
Polar Coding for Secure Transmission and Key Agreement. - Glencora Borradaile, James R. Lee, Anastasios Sidiropoulos:
Randomly removing g handles at once. - V. S. Meenakshi, G. Padmavathi:
Securing Iris Templates using Combined User and Soft Biometric based Password Hardened Fuzzy Vault. - Heidar Mamosian, Amir Masoud Rahmani, Mashalla Abbasi Dezfouli:
A New Clustering Approach based on Page's Path Similarity for Navigation Patterns Mining. - N. Rama, Meenakshi Lakshmanan:
A Computational Algorithm based on Empirical Analysis, that Composes Sanskrit Poetry. - Devpriya Soni, Namita Shrivastava, M. Kumar:
A Methodology for Empirical Quality Assessment of Object-Oriented Design. - Reza Gharoie Ahangar, Mahmood Yahyazadehfar, Hassan Pournaghshband:
The Comparison of Methods Artificial Neural Network with Linear Regression Using Specific Variables for Prediction Stock Price in Tehran Stock Exchange. - A. Jagadeesan, K. Duraiswamy:
Secured Cryptographic Key Generation From Multimodal Biometrics: Feature Level Fusion of Fingerprint and Iris. - M. Barathi, S. Valli:
Ontology Based Query Expansion Using Word Sense Disambiguation. - Dharmendra Choukse, Umesh Kumar Singh, Deepak Sukheja, Rekha Shahapurkar:
Implementing New-age Authentication Techniques using OpenID for Security Automation. - Khan Farhan Rafat, Muhammad Sher:
State Of The Art In Digital Steganography Focusing ASCII Text Documents. - Shahram Babaie, Ahmad Khadem Zadeh, Ali Hosseinalipour:
New clustering method to decrease probability of failure nodes and increasing the lifetime in WSNs. - T. D. Roopamala, S. K. Katti:
Comments on "Routh Stability Criterion". - Bala Dhandayuthapani Veerasamy:
Concurrent Approach to Flynn's SPMD Classification through Java. - Akshay K. Ojha, K. K. Biswal:
Multi-objective Geometric Programming Problem With Weighted Mean Method. - Nitul Dutta, Iti Saha Misra:
Use of Service Curve for Resource Reservation in Wired-cum-Wireless Scenario. - C. Ravichandiran, Pethuru Raj Chelliah, V. Vaidhyanathan:
Analysis, Modification, and Implementation (AMI) of Scheduling Algorithm for the IEEE 802.116e (Mobile WiMAX). - Manish Kumar, M. C. Srivastava, Umesh Kumar:
Current Conveyor Based Multifunction Filter. - Harshvardhan Tiwari, Krishna Asawa:
A Secure Hash Function MD-192 With Modified Message Expansion. - Mariana Maceiras Cabrera, Ernesto Ocampo Edye:
Integration of Rule Based Expert Systems and Case Based Reasoning in an Acute Bacterial Meningitis Clinical Decision Support System. - Abderrahim El Qadi, Driss Aboutajdine, Yassine Ennouary:
Formal Concept Analysis for Information Retrieval. - Bala Dhandayuthapani Veerasamy:
Creating A Model HTTP Server Program Using java. - Mofreh A. Hogo:
Evaluation of E-Learners Behaviour using Different Fuzzy Clustering Models: A Comparative Study. - M. V. Vijaya Saradhi, B. R. Sastry, P. Satish:
Hierarchical Approach for Online Mining--Emphasis towards Software Metrics. - Farhan Hassan Khan, Saba Bashir, M. Younus Javed, Aihab Khan, Malik Sikandar Hayat Khiyal:
QoS Based Dynamic Web Services Composition & Execution. - Saba Bashir, Farhan Hassan Khan, M. Younus Javed, Aihab Khan, Malik Sikandar Hayat Khiyal:
Indexer Based Dynamic Web Services Discovery. - Deeparnab Chakrabarty, Elyot Grant, Jochen Könemann:
On Column-restricted and Priority Covering Integer Programs. - P. Babu, A. Krishnan:
A New Variable Threshold and Dynamic Step Size Based Active Noise Control System for Improving Performance. - Wongkot Sriurai, Phayung Meesad, Choochart Haruechaiyasak:
Hierarchical Web Page Classification Based on a Topic Model and Neighboring Pages Integration. - Rohit Katiyar, Vinay Kumar Pathak:
Clinical gait data analysis based on Spatio-Temporal features. - L. Thulasimani, M. Madheswaran:
Design and Performance Analysis of Unified Reconfigurable Data Integrity Unit for Mobile Terminals. - S. C. Lingareddy, B. Stephen Charles, Vinaya Babu, Kashyap Dhruve:
Soft Computing - A step towards building Secure Cognitive WLAN. - Anupam Gupta, Aaron Roth, Grant Schoenebeck, Kunal Talwar:
Constrained Non-Monotone Submodular Maximization: Offline and Secretary Algorithms. - Zoltán Kása:
On arc-disjoint Hamiltonian cycles in De Bruijn graphs. - Debasis Mishra, Arunava Sen:
Roberts' Theorem with Neutrality: A Social Welfare Ordering Approach. - Stephan Schroevers:
Expressiveness and Extensions of an Instruction Sequence Semigroup. - Fernando Bobillo, Félix Bou, Umberto Straccia:
On the Failure of the Finite Model Property in some Fuzzy Description Logics. - Jamie Twycross, Uwe Aickelin:
Information Fusion in the Immune System. - Leonid Barenboim, Michael Elkin:
Deterministic Distributed Vertex Coloring in Polylogarithmic Time. - Darko Veberic
:
Having Fun with Lambert W(x) Function. - Adrià Gascón, Guillem Godoy, Manfred Schmidt-Schauß:
Unification and Matching on Compressed Terms. - Yangfan Zhong, Yadong Wang, Fady Alajaji, Tamás Linder:
Inner and Outer Bounds for the Public Information Embedding Capacity Region Under Multiple Access Attacks. - Ágnes Achs:
A multivalued knowledge-base model. - Howard Barringer, Alex Groce, Klaus Havelund, Margaret H. Smith:
An Entry Point for Formal Methods: Specification and Analysis of Event Logs. 16-21 - Rüdiger Ehlers:
Generalised Rabin(1) synthesis. - Mai Vu:
MISO Capacity with Per-Antenna Power Constraint. - Alessandro Cimatti
, Marco Roveri
, Angelo Susi, Stefano Tonetta:
Formalization and Validation of Safety-Critical Requirements. 68-75 - Nick Doty, Deirdre K. Mulligan, Erik Wilde:
Privacy Issues of the W3C Geolocation API. - Eitaro Shioji, Ryutaroh Matsumoto, Tomohiko Uyematsu:
Vulnerability of MRD-Code-based Universal Secure Network Coding against Stronger Eavesdroppers. - Kobkul Kularbphettong, Gareth Clayton, Phayung Meesad:
A Hybrid System based on Multi-Agent System in the Data Preprocessing Stage. - D. Roopamala, S. K. Katti:
New Approach to Identify Common Eigenvalues of real matrices using Gerschgorin Theorem and Bisection method. - K. A. Vidhya, G. Aghila:
A Survey of Naïve Bayes Machine Learning approach in Text Document Classification. - Zunera Jalil
, Anwar M. Mirza, Maria Sabir:
Content based Zero-Watermarking Algorithm for Authentication of Text Documents. - D. SuganyaDevi, G. Padmavathi:
Secure Multicast Key Distribution for Mobile Ad Hoc Networks. - T. K. Thivakaran, R. M. Chandrasekaran:
Nonlinear Filter Based Image Denoising Using AMF Approach. - A. Rathika, R. Saranya, R. Iswarya:
Securing Our Bluetooth Mobiles From Intruder Attack Using Enhanced Authentication Scheme And Plausible Exchange Algorithm. - Mohsen Gerami:
Knowledge Management. - Mohsen Gerami:
Wireless IP Telephony. - Hamid Reza Naji:
Reconfigurable Parallel Data Flow Architecture. - Samir Elmougy, Ibrahim M. El-Henawy, Ahmed El-Azab:
Model Based Ceramic tile inspection using Discrete Wavelet Transform and Euclidean Distance. - Alok Ranjan, Harish Verma, Eatesh Kandpal, Joydip Dhar:
An Analytical Approach to Document Clustering Based on Internal Criterion Function. - Sabyasachi Pattanaik, Partha Pratim Ghosh:
Role of Data Mining in E-Payment systems. - Supriya Kapoor, Shruti Khanna, Rahul Bhatia:
Facial Gesture Recognition Using Correlation And Mahalanobis Distance. - Virendra Kumar Shrivastava, Parveen Kumar, K. R. Pardasani:
FP-tree and COFI Based Approach for Mining of Multiple Level Association Rules in Large Databases. - Syed Amjad Ali, Srinivasan Vathsal, K. Lal Kishore:
A GA based Window Selection Methodology to Enhance Window based Multi wavelet transformation and thresholding aided CT image denoising technique. - Vidhi Rawat, Alok Jain, Vibhakar Shrimali:
Investigation and Assessment of Disorder of Ultrasound B-mode Images. - Zhang Da, Feng Xia, Zhuo Yang, Lin Yao, Wenhong Zhao:
Localization Technologies for Indoor Human Tracking. - Nibaran Das, Ayatullah Faruk Mollah
, Sudip Saha, Syed Sahidul Haque:
Handwritten Arabic Numeral Recognition using a Multi Layer Perceptron. - Nibaran Das, Ayatullah Faruk Mollah
, Ram Sarkar, Subhadip Basu:
A comparative study of different feature sets for recognition of handwritten Arabic numerals using a Multi Layer Perceptron. - Kostas P. Peppas, A. Mansour, George S. Tombras:
Dual-hop transmissions with fixed-gain relays over Generalized-Gamma fading channels. - D. K. Ningtyas, A. B. Mutiara
:
Simulating Grover's Quantum Search in a Classical Computer. - Vamsi Kundeti, Sanguthevar Rajasekaran, Hieu Dinh:
Efficient Parallel and Out of Core Algorithms for Constructing Large Bi-directed de Bruijn Graphs. - Yann-Aël Le Borgne, Sylvain Raybaud, Gianluca Bontempi:
Distributed Principal Component Analysis for Wireless Sensor Networks. - Minghui Jiang:
The zero exemplar distance problem. - Kunal Narayan Chaudhury, Arrate Muñoz-Barrutia, Michael Unser:
Fast space-variant elliptical filtering using box splines. - Rena Bakhshi
, Jörg Endrullis, Wan J. Fokkink, Jun Pang:
Asynchronous Bounded Expected Delay Networks. - Anthony F. J. van Raan, Thed N. van Leeuwen, Martijn S. Visser, Nees Jan van Eck, Ludo Waltman:
Rivals for the crown: Reply to Opthof and Leydesdorff. - R. J. J. H. van Son:
Quantifying Shannon's Work Function for Cryptanalytic Attacks. - Husheng Li, Robert Caiming Qiu:
Need-based Communication for Smart Grid: When to Inquire Power Price? - Husheng Li, Weiyi Zhang:
QoS Routing in Smart Grid. - Ludo Waltman, Nees Jan van Eck, Thed N. van Leeuwen, Martijn S. Visser, Anthony F. J. van Raan:
Towards a new crown indicator: Some theoretical considerations. - Ludo Waltman, Nees Jan van Eck:
The relation between Eigenfactor, audience factor, and influence weight. - Alexey V. Chernov, Yuri Kalnishkan, Fedor Zhdanov, Vladimir Vovk:
Supermartingales in Prediction with Expert Advice. - Hassan Ghozlan, Gerhard Kramer:
Interference Focusing for Mitigating Cross-Phase Modulation in Optical Fiber. - Ulrich H. P. Fischer, Jens-Uwe Just, Christian Reinboth
:
Automated selection of LEDs by luminance and chromaticity coordinate. - Behrouz Khoshnevis, Wei Yu:
Limited Feedback Multi-Antenna Quantization Codebook Design-Part I: Single-User Channels. - Behrouz Khoshnevis, Wei Yu:
Limited Feedback Multi-Antenna Quantization Codebook Design-Part II: Multiuser Channels. - Rossano Schifanella, Alain Barrat, Ciro Cattuto, Benjamin Markines, Filippo Menczer:
Folks in Folksonomies: Social Link Prediction from Shared Metadata. - Jan Ekstein
, Jirí Fiala, Premysl Holub, Bernard Lidický:
The packing chromatic number of the square lattice is at least 12. - Jiangyuan Li, Athina P. Petropulu:
On Ergodic Secrecy Capacity for Gaussian MISO Wiretap Channels. - Kien C. Nguyen, Tansu Alpcan, Tamer Basar:
Stochastic Games for Security in Networks with Interdependent Nodes. - Kien C. Nguyen, Dilip V. Sarwate:
Up-sampling and Natural Sample Value Computation for Digital Pulse Width Modulators. - Manik Raina, Predrag Spasojevic:
Decoding Complexity of Irregular LDGM-LDPC Codes Over the BISOM Channels. - Rolly Seth, Rishi Kapoor, Hameed Al-Qaheri, Sugata Sanyal:
Piecemeal Journey To 'HALCYON' World Of Pervasive Computing : From past progress to future challenges. - Sreenivas Gollapudi, Rina Panigrahy:
Revisiting the Examination Hypothesis with Query Specific Position Bias. - Fangwen Fu, Mihaela van der Schaar:
Structure-Aware Stochastic Control for Transmission Scheduling. - Laurent Deniau:
The C Object System: Using C as a High-Level Object-Oriented Language. - Nees Jan van Eck, Ludo Waltman, Rommert Dekker, Jan van den Berg:
A comparison of two techniques for bibliometric mapping: Multidimensional scaling and VOS. - Loretta Mastroeni, Maurizio Naldi:
Spectrum Trading: An Abstracted Bibliography. - Francesca A. Lisi:
Inductive Logic Programming in Databases: from Datalog to DL+log. - Natarajan Lakshmi Prasad, B. Sundar Rajan:
Asymptotically-Good, Multigroup ML-Decodable STBCs. - Alok Ojha, Hongmei Deng, Dharma P. Agrawal, Sugata Sanyal:
Forming the COUNCIL Based Clusters in Securing Wireless Ad Hoc Networks. - Vipul Goyal, Sugata Sanyal, Dharma P. Agrawal:
Vcache: Caching Dynamic Documents. - Frédéric Dambreville:
Release ZERO.0.1 of package RefereeToolbox. - Robert Sanderson, Herbert Van de Sompel:
Making Web Annotations Persistent over Time. - Kirill A. Sorudeykin:
An Educative Brain-Computer Interface. - Kristina Lerman, Rumi Ghosh:
Information Contagion: an Empirical Study of the Spread of News on Digg and Twitter Social Networks. - Chih-Ping Li, Michael J. Neely:
On Achievable Network Capacity and Throughput-Achieving Policies over Markov ON/OFF Channels. - Razvi Doomun, Lollmahamod N., Auleear Nadeem, Mozafar Aukin:
Classified Ads Harvesting Agent and Notification System. - Chenggao Han, Naoki Suehiro, Takeshi Hashimoto:
A Systematic Framework for the Construction of Optimal Complete Complementary Codes. - David I. Spivak:
Table manipulation in simplicial databases. - Joanna Józefowska, Agnieszka Lawrynowicz, Tomasz Lukaszewski:
The role of semantics in mining frequent patterns from knowledge bases in description logics with rules. - Siby Abraham, Sugata Sanyal, Mukund A. Sanglikar:
Particle Swarm Optimization Based Diophantine Equation Solver. - Devavrat Shah, Jinwoo Shin:
Efficient Queue-based CSMA with Collisions. - Blaine Nelson, Benjamin I. P. Rubinstein, Ling Huang, Anthony D. Joseph, Shing-hon Lau, Steven J. Lee, Satish Rao, Anthony Tran, J. D. Tygar:
Near-Optimal Evasion of Convex-Inducing Classifiers. - Yin Sun, Árpád Baricz, Shidong Zhou:
On the monotonicity, log-concavity and tight bounds of the generalized Marcum and Nuttall Q-functions. - Kien C. Nguyen, Tansu Alpcan, Tamer Basar:
Security Games with Decision and Observation Errors. - K. Pavan Srinath, B. Sundar Rajan:
Reduced ML-Decoding Complexity, Full-Rate STBCs for $2^a$ Transmit Antenna Systems. - Lorenz Demey:
Some Remarks on the Model Theory of Epistemic Plausibility Models. - Bruno Durand, Andrei E. Romashchenko, Alexander Shen:
Fixed point theorem and aperiodic tilings. - (Withdrawn) A New Framework for Cognitive Medium Access Control: POSG Approach.
- Ronen Tur, Yonina C. Eldar, Zvi Friedman:
Low Rate Sampling of Pulse Streams with Application to Ultrasound Imaging. - Maxim Raginsky, Sina Jafarpour, Rebecca Willett, A. Robert Calderbank:
Fishing in Poisson streams: focusing on the whales, ignoring the minnows. - Vamsi Kundeti, Sanguthevar Rajasekaran, Hieu Dinh:
On the Border Length Minimization Problem (BLMP) on a Square Array. - Erik D. Demaine, Martin L. Demaine, Ryuhei Uehara, Takeaki Uno, Yushi Uno:
The complexity of UNO. - Julien Forget, Frédéric Boniol, David Lesens, Claire Pagetti:
Implementing Multi-Periodic Critical Systems: from Design to Code Generation. 34-48 - Jesus Selva:
Efficient Low-Sensitivity Sampling of Multiband Signals with Bounded Components. - Nassar Ksairi, Pascal Bianchi, Philippe Ciblat:
Nearly Optimal Resource Allocation for Downlink OFDMA in 2-D Cellular Networks. - Joffrey Villard, Pascal Bianchi, Eric Moulines, Pablo Piantanida:
High-Rate Quantization for the Neyman-Pearson Detection of Hidden Markov Processes. - Ignacio Ramírez, Guillermo Sapiro:
Universal Sparse Modeling. - Ioannis Koutis, Gary L. Miller, Richard Peng:
Approaching optimality for solving SDD systems. - John Fearnley:
Non-oblivious Strategy Improvement. - Nikhil Bansal, Rohit Khandekar, Jochen Könemann, Viswanath Nagarajan, Britta Peis:
On Generalizations of Network Design Problems with Degree Bounds. - Wenjie Fang:
A Computational Approach to the Graceful Tree Conjecture. - Jakob Nordström:
On the Relative Strength of Pebbling and Resolution. - Raymond H. Y. Louie, Matthew R. McKay
, Nihar Jindal, Iain B. Collings:
Spatial multiplexing with MMSE receivers: Single-stream optimality in ad hoc networks. - Aries Muslim, A. B. Mutiara
, Cut Maisyarah Karyati, Purnawarman Musa
:
An Algorithm for Index Multimedia Data (Video) using the Movement Oriented Method for Real-time Online Services. - Lintang Yuniar Banowosari, I. Wayan S. Wicaksana, A. B. Mutiara:
Agreement Maintenance Based on Schema and Ontology Change in P2P Environment. - A. V. Babu, Mukesh Kumar Singh:
Node Isolation Probability of Wireless Adhoc Networks in Nagakami Fading Channel. - Cristina Ribeiro, Alexander Ferworn, Jimmy Tran:
Wireless Mesh Network Performance for Urban Search and Rescue Missions. - Ebtisam Amar, Selma Boumerdassi, Éric Renault:
Hierarchical Location Service with Prediction in Mobile Ad-Hoc Networks. - Amin Daneshmand Malayeri, Jalal Abdollahi, R. Rezaei:
Graphically E-Learning introduction and its benefits in Virtual Learning. - Amin Daneshmand Malayeri, Jalal Abdollahi:
New designing of E-Learning systems with using network learning. - Bruno Durand, Andrei E. Romashchenko, Alexander Shen:
Effective closed subshifts in 1D can be implemented in 2D. - Martin Hoefer:
Strategic Cooperation in Cost Sharing Games. - Andrea Calì, Davide Martinenghi:
Querying Incomplete Data over Extended ER Schemata. - Xiaorong Hou, Junwei Shao:
Stability Analysis of Linear Uncertain Systems via Checking Positivity of Forms on Simplices. - Claude Castelluccia, Emiliano De Cristofaro, Daniele Perito:
Private Information Disclosure from Web Searches. (The case of Google Web History). - Olga Sofina, Yuriy Bunyak, Roman Kvetnyy:
Pattern recognition using inverse resonance filtration. - Ehsan Chiniforooshan, David Doty, Lila Kari, Shinnosuke Seki:
Scalable, Time-Responsive, Digital, Energy-Efficient Molecular Circuits using DNA Strand Displacement. - Antonio Mucherino, Sonia Cafieri
:
A New Heuristic for Feature Selection by Consistent Biclustering. - Bubacarr Bah, Jared Tanner:
Improved Bounds on Restricted Isometry Constants for Gaussian Matrices. - Maher Khemakhem, Abdelfettah Belghith:
Towards trusted volunteer grid environments. - Saurabh Mehta, Kyung Sup Kwak:
H-MAC: A Hybrid MAC Protocol for Wireless Sensor Networks. - Urmila Bhanja, Sudipta Mahapatra, Rajarshi Roy:
A Novel Solution to the Dynamic Routing and Wavelength Assignment Problem in Transparent Optical Networks. - Ahmad S. Al-Mogren:
A Powerful Optimization Approach for the Multi Channel Dissemination Networks. - G. G. Md. Nawaz Ali, Rajib Chakraborty, Md. Shihabul Alam, Edward Chan:
An Efficient Approach for Generalized Load Balancing in Multipath Packet Switched Networks. - Ling Zhou, Wei-xiong Ding, Yu-xi Zhu:
Delay-Constrained Multicast Routing Algorithm Based on Average Distance Heuristic. - Youcef Zafoune, Aïcha Mokhtari, Rushed Kanawati:
Mobile Codes Localization in Ad hoc Networks: a Comparative Study of Centralized and Distributed Approaches. - Khalid Abdelkader, Jan Broeckhove, Kurt Vanmechelen:
Resource Pricing In A Dynamic Multi-Commodity Market For Computational Resources. - Abhishek Sharma, Hao Shi:
Innovative Rated-Resource Peer-to-Peer Network. - Juergen Mangler, Gerhard Stuermer, Erich Schikuta:
Cloud Process Execution Engine - Evaluation of the Core Concepts. - Paolo Bottoni, Esther Guerra, Juan de Lara:
An Algebraic Formalization of the GoF Design Patterns. - Yeb Havinga, Willem Dijkstra, Ander de Keijzer:
Adding HL7 version 3 data types to PostgreSQL. - Edgar Martínez-Moro, Hakan Özadam, Ferruh Özbudak, Steve Szabo:
Monomial-like codes. - Michael J. Neely:
Stability and Capacity Regions or Discrete Time Queueing Networks. - John Fearnley:
Exponential Lower Bounds For Policy Iteration. - Hameed Al-Qaheri, Sandipan Dey, Sugata Sanyal:
Hiding Inside HTML and Other Source Codes. - Ana Busic, Varun Gupta, Jean Mairesse:
Stability of the bipartite matching model. - Gaiane Panina, Ileana Streinu:
Flattening single-vertex origami: the non-expansive case. - WeiGuo Zhang, GuoZhen Xiao:
Generalized Maiorana-McFarland Constructions for Almost Optimal Resilient Functions. - Eleanor Gilbert Rieffel, Don Kimber, Jim Vaughan:
Geometric reconstruction from point-normal data. - João Luiz Rebelatto, Bartolomeu F. Uchôa Filho, Yonghui Li, Branka Vucetic:
Generalized Distributed Network Coding Based on Nonbinary Linear Block Codes for Multi-User Cooperative Communications. - Lei Ke, Zhengdao Wang:
On the Degrees of Freedom Regions of Two-User MIMO Z and Full Interference Channels with Reconfigurable Antennas. - Rajkumar Kannan:
Topic Map: An Ontology Framework for Information Retrieval. - Rajkumar Kannan, Frédéric Andrès:
Towards Automated Lecture Capture, Navigation and Delivery System for Web-Lecture on Demand. - Bin Jiang, Xintao Liu:
Computing the Fewest-turn Map Directions based on the Connectivity of Natural Roads. - Saber Jafarizadeh:
Fastest Distributed Consensus Problem on Fusion of Two Star Networks. - Nilesh B. Prajapati, Rupal R. Agravat, Mosin I. Hasan:
Simulated Annealing for Location Area Planning in Cellular networks. - Anand Gupta, Harsh Bedi, M. S. Don Bosco, Vinay Shashidhar:
Simulation to track 3D location in GSM through NS2 and real life. - Bikramaditya Das, Susmita Das:
Performance Analysis of Ultra Wideband Receivers for High Data Rate Wireless Personal Area Network System. - Neeraj Kumar, Manoj Kumar
, R. B. Patel:
Coverage and Connectivity Aware Neural Network Based Energy Efficient Routing in Wireless Sensor Networks. - S. Sumathy, B. Upendra Kumar:
Secure Key Exchange and Encryption Mechanism for Group Communication in Wireless Ad Hoc Networks. - Saleh Ali K. Al-Omari, Putra Sumari:
An Overview of Mobile Ad Hoc Networks for the Existing Protocols and Applications. - Mahmoud Ibrahim Moussa:
An Algorithm for Odd Graceful Labeling of the Union of Paths and Cycles. - Aditya Goel:
Key distribution in PKC through Quantas. - Hung-Chin Jang:
Applications of Geometric Algorithms to Reduce Interference in Wireless Mesh Network. - Loet Leydesdorff, Ismael Ràfols:
Indicators of the Interdisciplinarity of Journals: Diversity, Centrality, and Citations. - Boris Ryabko:
Using Information Theory to Study the Efficiency and Capacity of Computers and Similar Devices. - Massimo Franceschet:
A logic for networks. - Aaron R. Bradley:
k-Step Relative Inductive Generalization. - Chitrakala Gopalan
, D. Manjula:
Sliding window approach based Text Binarisation from Complex Textual images. - Herbert Van de Sompel, Robert Sanderson, Michael L. Nelson, Lyudmila Balakireva
, Harihar Shankar, Scott Ainsworth:
An HTTP-Based Versioning Mechanism for Linked Data. - Sandipan Dey, Ajith Abraham, Bijoy Bandyopadhyay, Sugata Sanyal:
Data Hiding Techniques Using Prime and Natural Numbers. - Mayron César O. Moreira, Alysson M. Costa, Marcus Ritt, Antonio Augusto Chaves:
Simple heuristics for the assembly line worker assignment and balancing problem. - Andy Yoo, Keith W. Henderson:
Parallel Generation of Massive Scale-Free Graphs. - (Withdrawn) A Highly Efficient Parallel Algorithm for Computing the Fiedler Vector.
- Peiyush Jain:
On a variant of Monotone NAE-3SAT and the Triangle-Free Cut problem. - Changho Suh, Minnie Ho, David Tse:
Downlink Interference Alignment. - Victor V. Kryssanov, Shizuka Kumokawa, Igor Goncharenko, Hitoshi Ogawa:
Perceiving the Social: A Multi-Agent System to Support Human Navigation in Foreign Communities. - (Withdrawn) The Yao Graph Y_6 is a Spanner.
- Murat Guzeltepe, Mehmet Özen:
Nonbinary quantum stabilizer codes from codes over Gaussian integers with respect to the Mannheim metric. - Bingbing Zheng, Ling-ge Jiang, Chen He, Qingchuan Wang:
Design of Nested LDGM-LDPC Codes for Compress-and-Forward in Relay Channel. - Peer-Olaf Siebers, Uwe Aickelin, Helen Celia, Chris W. Clegg:
Modelling and simulating retail management practices: a first approach. - Peer-Olaf Siebers, Uwe Aickelin, Helen Celia, Chris W. Clegg:
Multi-Agent Simulation and Management Practices. - Adrian Adewunmi, Uwe Aickelin:
Optimisation of a Crossdocking Distribution Centre Simulation Model. - Peer-Olaf Siebers, Uwe Aickelin, Helen Celia, Chris W. Clegg:
Simulating Customer Experience and Word Of Mouth in Retail - A Case Study. - Frank Kienle, Norbert Wehn, Heinrich Meyr:
On Complexity, Energy- and Implementation-Efficiency of Channel Decoders. - Dan P. Guralnik:
A Formal Approach to Modeling the Memory of a Living Organism. - Lucas C. Cordeiro, Bernd Fischer:
Bounded Model Checking of Multi-threaded Software using SMT solvers. - David Greenwood, Ali Khajeh-Hosseini, James W. Smith, Ian Sommerville:
The Cloud Adoption Toolkit: Addressing the Challenges of Cloud Adoption in Enterprise. - Martin E. Dyer, David Richerby:
The Complexity of #CSP. - David Greenwood, Ali Khajeh-Hosseini, Ian Sommerville:
Lessons from the Failure and Subsequent Success of a Complex Healthcare Sector IT Project. - Chenyi Zhang:
Unwinding Conditional Noninterference. - Wei Zhang, Long Shi, Xiang-Gen Xia:
Full Diversity Space-Time Block Codes with Low-Complexity Partial Interference Cancellation Group Decoding. - G. F. Ali Ahammed, Reshma Banu:
Anakyzing the performance of Active Queue Management Algorithms. - Rajkumar Buyya, Rajiv Ranjan, Rodrigo N. Calheiros:
InterCloud: Utility-Oriented Federation of Cloud Computing Environments for Scaling of Application Services. - Sandipan Dey, Ajith Abraham, Sugata Sanyal:
An LSB Data Hiding Technique Using Natural Numbers. - Daniel Golovin, Andreas Krause:
Adaptive Submodularity: A New Approach to Active Learning and Stochastic Optimization. - Javier Turek, Irad Yavneh, Matan Protter, Michael Elad:
On MMSE and MAP Denoising Under Sparse Representation Modeling Over a Unitary Dictionary. - Raja Giryes, Michael Elad, Yonina C. Eldar:
The Projected GSURE for Automatic Parameter Tuning in Iterative Shrinkage Methods. - Michael Neufeld:
DIP: Disruption-Tolerance for IP. - Christoph Fretter, Lachezar Krumov, Karsten Weihe, Matthias Müller-Hannemann, Marc-Thorsten Hütt:
Phase Synchronization in Railway Timetables. - Antal Iványi:
Reconstruction of complete interval tournaments. - Vitaly Pimenov:
System-theoretic approach to image interest point detection. - Yakir Reshef, Salil P. Vadhan:
On Extractors and Exposure-Resilient Functions for Sublogarithmic Entropy. - Sandipan Dey, Ajith Abraham, Sugata Sanyal:
A Very Simple Approach for 3-D to 2-D Mapping. - M. Dakshayini, T. R. Gopalakrishnan Nair:
An Optimal Prefix Replication Strategy for VoD Services. - Raman Maini, Himanshu Aggarwal:
A Comprehensive Review of Image Enhancement Techniques. - Hyun Kwang Kim, Joon Yop Lee, Dong Yeol Oh:
Construction of optimal codes in deletion and insertion metric. - T. R. Gopalakrishnan Nair, P. Jayarekha:
A Rank Based Replacement Policy for Multimedia Server Cache Using Zipf-Like Law. - P. Suresh, Ramachandran Kesavan:
Analysis of Supply Chain Network Using RFID Technique with Hybrid Algorithm. - Neela Madheswari Annamalai, R. S. D. Wahida Banu:
Measuring Bandwidth for Super Computer Workloads. - Chien-Ying Chen, Jen-Yuan Yeh, Hao-Ren Ke:
Plagiarism Detection using ROUGE and WordNet. - S. Vidhya, S. Karthikeyan:
A Security Based Data Mining Approach in Data Grid. - P. G. JansiRani, R. Bhaskaran:
Computation of Reducts Using Topology and Measure of Significance of Attributes. - Pratima Gautam, K. R. Pardasani:
A Novel Approach For Discovery Multi Level Fuzzy Association Rule Mining. - Viral V. Kapadia
, Sudarshan N. Patel, Rutvij H. Jhaveri:
Comparative Study of Hidden Node Problem and Solution Using Different Techniques and Protocols. - Rashid Sheikh, Beerendra Kumar, Durgesh Kumar Mishra:
A Distributed k-Secure Sum Protocol for Secure Multi-Party Computations. - Shivaji P. Mirashe, N. V. Kalyankar:
Quality of Service with Bandwidth. - Shivaji P. Mirashe, N. V. Kalyankar:
Cloud Computing. - Ramazan Havangi, Mohammad Teshnehlab, Mohammad Ali Nekoui:
A Neuro-Fuzzy Multi Swarm FastSLAM Framework. - M. S. Danessh, C. Balasubramanian, K. Duraiswamy:
Similarity Data Item Set Approach: An Encoded Temporal Data Base Technique. - Muhammad Javed, Bashir Ahmad, Shahid Hussain, Shakeel Ahmad:
Mapping The Best Practices of XP and Project Management: Well defined approach for Project Manager. - Shrirang Ambaji Kulkarni, G. Raghavendra Rao:
A Group Vehicular Mobility Model for Routing Protocol Analysis in Mobile Ad Hoc Network. - Swathi. H:
Gene Expression Data Knowledge Discovery using Global and Local Clustering. - Nazleeni Samiha Haron, Nur S. Saleem, Mohd Hilmi Hasan, Mazeyanti M. Ariffin, Izzatdin Abdul Aziz:
A RFID-based Campus Context-Aware Notification System. - Razif Rashid, I. Elamvazuthi, Mumtaj Begam, M. Arrofiq:
Fuzzy-based Navigation and Control of a Non-Holonomic Mobile Robot. - Lindasalwa Muda, Mumtaj Begam, I. Elamvazuthi:
Voice Recognition Algorithms using Mel Frequency Cepstral Coefficient (MFCC) and Dynamic Time Warping (DTW) Techniques. - Hamdan O. Alanazi, A. A. Zaidan, B. B. Zaidan, Hamid Abdullah Jalab, Zaidoon Kh. Al-Ani:
New Classification Methods for Hiding Information into Two Parts: Multimedia Files and Non Multimedia Files. - Hamdan O. Alanazi, B. B. Zaidan, A. A. Zaidan, Hamid Abdullah Jalab, Mohamed Shabbir, Yahya Al-Nabhani:
New Comparative Study Between DES, 3DES and AES within Nine Factors. - Zaidoon Kh. Al-Ani, A. A. Zaidan, B. B. Zaidan, Hamdan O. Alanazi:
Overview: Main Fundamentals for Steganography. - Ratika Pradhan, Mohan P. Pradhan, Ashish Bhusan, Ronak K. Pradhan, Mrinal Kanti Ghose:
Land-cover Classification and Mapping for Eastern Himalayan State Sikkim. - Richa Gupta, Sanjiv Tokekar:
Proficient Pair of Replacement Algorithms on L1 and L2 Cache for Merge Sort. - Rodrigo Machado, Reiko Heckel, Leila Ribeiro:
Modeling and Reasoning over Distributed Systems using Aspect-Oriented Graph Grammars. 39-50 - Eryk Kopczynski:
Complexity of Problems for Commutative Grammars. - Feng Gu, Julie Greensmith, Uwe Aickelin:
Integrating Real-Time Analysis With The Dendritic Cell Algorithm Through Segmentation. - Mazlina Abdul Majid, Uwe Aickelin, Peer-Olaf Siebers:
Investigating Output Accuracy for a Discrete Event Simulation Model and an Agent Based Simulation Model. - Jungwon Kim, Julie Greensmith, Jamie Twycross, Uwe Aickelin:
Malicious Code Execution Detection and Response Immune System inspired by the Danger Theory. - Amanda M. Whitbrook, Uwe Aickelin, Jonathan M. Garibaldi:
Mimicking the Behaviour of Idiotypic AIS Robot Controllers Using Probabilistic Systems. - Michael J. Bommarito II, Daniel Martin Katz:
A Mathematical Approach to the Study of the United States Code. - Claude Martineau, Elsa Tolone, Stavroula Voyatzi:
Les Entités Nommées : usage et degrés de précision et de désambiguïsation. - Chris Armbruster, Laurent Romary:
Comparing Repository Types - Challenges and barriers for subject-based repositories, research repositories, national repository systems and institutional repositories in serving scholarly communication. - Peer-Olaf Siebers, Galina Sherman, Uwe Aickelin:
Development of a Cargo Screening Process Simulator: A First Approach. - Haishi Ning, Cong Ling, Kin K. Leung:
Wireless Network Coding with Imperfect Overhearing. - Peter Duersch, Joerg Oechssler, Burkhard C. Schipper:
Unbeatable Imitation. - Peter Duersch, Joerg Oechssler, Burkhard C. Schipper:
Pure Saddle Points and Symmetric Relative Payoff Games. - Mayank Kabra, Annie L. Conery, Eyleen J. O'Rourke, Xin Xie, Vebjorn Ljosa, Thouis R. Jones, Frederick M. Ausubel, Gary Ruvkun, Anne E. Carpenter, Yoav Freund:
Towards automated high-throughput screening of C. elegans on agar. - (Withdrawn) Optimal Unitary Linear Processing for Amplify-and-Forward Cooperative OFDM systems.
- Rajgopal Kannan, Costas Busch:
Bottleneck Routing Games with Low Price of Anarchy. - Daniel Karapetyan, Gregory Z. Gutin:
A New Approach to Population Sizing for Memetic Algorithms: A Case Study for the Multidimensional Assignment Problem. - Maribel Fernández, Olivier Namet:
Graph Creation, Visualisation and Transformation. 1-11 - Stefano Rini, Daniela Tuninetti, Natasha Devroye:
New inner and outer bounds for the discrete memoryless cognitive interference channel and some capacity results. - Sebastian Maneth, Kim Nguyen:
XPath Whole Query Optimization. - Xiaojun Sun, Chunming Zhao, Ming Jiang:
Closed-Form Expressions for Secrecy Capacity over Correlated Rayleigh Fading Channels. - Marco Nissen:
Graph Iterators: Decoupling Graph Structures from Algorithms. - Philippe Balbiani, Rachid Echahed, Andreas Herzig:
A Modal Logic for Termgraph Rewriting. - Michel Deza, Roman Shklyar:
Enumeration of Hamiltonian Cycles in 6-cube. - Bob Coecke, Mehrnoosh Sadrzadeh, Stephen Clark:
Mathematical Foundations for a Compositional Distributional Model of Meaning. - Stefan Endrullis, Andreas Thor, Erhard Rahm:
Evaluation of Query Generators for Entity Search Engines. - Heide Gluesing-Luerssen, Elizabeth A. Weaver:
Linear tail-biting trellises: Characteristic generators and the BCJR-construction. - Manuel Bodirsky, Éric Fusy, Mihyun Kang, Stefan Vigerske:
Boltzmann Samplers, Pólya Theory, and Cycle Pointing. - Bart Jacobs:
Involutive Categories and Monoids, with a GNS-correspondence. - Abubakar Hassan, Eugen Jiresch, Shinya Sato
:
An Implementation of Nested Pattern Matching in Interaction Nets. 13-25 - Detlef Plump, Sandra Steinert:
The Semantics of Graph Programs. 27-38 - Barbara Di Fabio, Claudia Landi:
Stability of Reeb graphs under function perturbations: the case of closed curves. - Dejan Spasov:
Unique and Minimum Distance Decoding of Linear Codes with Reduced Complexity. - Pedro Gonnet:
Efficient Construction, Update and Downdate Of The Coefficients Of Interpolants Based On Polynomials Satisfying A Three-Term Recurrence Relation. - Pedro Gonnet:
A Review of Error Estimation in Adaptive Quadrature. - Zhineng Chen, Juan Cao, Yicheng Song, Junbo Guo, Yongdong Zhang, Jintao Li:
Context-Oriented Web Video Tag Recommendation. - Alexey Pospelov:
Bounds for Bilinear Complexity of Noncommutative Group Algebras. - Giorgi Japaridze:
Introduction to clarithmetic I. - Changxin Shi, Randall A. Berry, Michael L. Honig:
Adaptive Beamforming in Interference Networks via Bi-Directional Training. - Meng Wang, Weiyu Xu, Ao Tang:
A Unique "Nonnegative" Solution to an Underdetermined System: from Vectors to Matrices. - Xu Miao, Rajesh P. N. Rao:
Large Margin Boltzmann Machines and Large Margin Sigmoid Belief Networks. - Claude Kirchner, Pierre-Etienne Moreau, Cláudia Tavares:
A Type System for Tom. 51-63 - Gabriel Falconieri Freitas, Márcio Cornélio, Tiago Massoni, Rohit Gheyi
:
Object-oriented Programming Laws for Annotated Java Programs. 65-76 - João Marcos
:
Automatic Generation of Proof Tactics for Finite-Valued Logics. 91-98 - Benoît Boyer, Thomas Genet:
Verifying Temporal Regular Properties of Abstractions of Term Rewriting Systems. 99-108 - Mariken H. C. Everdij, Henk A. P. Blom:
Bisimulation Relations Between Automata, Stochastic Differential Equations and Petri Nets. 1-15 - José Martinez, Carmelo Malta:
Tuple-based abstract data types: full parallelism. - Carmelo Malta, José Martinez:
A framework for designing concurrent and recoverable abstract data types based on commutativity. - Carmelo Malta, José Martinez:
Limits of Commutativity on Abstract Data Types. - Yannick Aoustin, Alexander M. Formal'sky:
Ball on a beam: stabilization under saturated input control with large basin of attraction. - Carmelo Malta, José Martinez:
Automating Fine Concurrency Control in Object-Oriented Databases. - Josep Rifà, Lorena Ronquillo:
Product Perfect Z2Z4-linear codes in Steganography. - Maxime Crochemore, Marcin Kubica, Jakub Radoszewski, Wojciech Rytter, Tomasz Walen:
On the maximal sum of exponents of runs in a string. - Natalia Silberstein, Tuvi Etzion:
Large Constant Dimension Codes and Lexicodes. - Michel Aurnague, Laure Vieu, Andrée Borillo:
La représentation formelle des concepts spatiaux dans la langue. - Michel Aurnague, Maya Hickmann, Laure Vieu:
Les entités spatiales dans la langue : étude descriptive, formelle et expérimentale de la catégorisation. - Abbas Dideban, Hassane Alla:
Feedback control logic synthesis for non safe Petri nets. - Marie-Céline Bezat, Vincent Roussarie, Richard Kronland-Martinet, Sølvi Ystad, Stephen McAdams:
Perceptual analyses of action-related impact sounds. - Laurent Poinsot:
Doubly Perfect Nonlinear Boolean Permutations. - Amine Chellali
, Cédric Dumas, Isabelle Milleville-Pennel, Eric Nouri:
Common Frame of reference in collaborative virtual environments and their impact on presence. - Gary L. Miller, Richard Peng, Russell Schwartz, Charalampos E. Tsourakakis:
Approximate Dynamic Programming for Fast Denoising of aCGH Data. - Paz Carmi, Lilach Chaitman:
Bounded Degree Planar Geometric Spanners. - (Withdrawn) Quickest Time Herding and Detection for Optimal Social Learning.
- C. Ravindranath Chowdary:
Local Popularity based Page Link Analysis. - Sébastien Nedjar, Alain Casali, Rosine Cicchetti, Lotfi Lakhal:
Cubes convexes. - Thomas Bonald, Mathieu Feuillet:
On the stability of flow-aware CSMA. - Xiaokui Xiao, Yufei Tao, Nick Koudas:
Transparent Anonymization: Thwarting Adversaries Who Know the Algorithm. - Justin P. Coon, Rafael Cepeda:
Power Loading in Parallel Channels with Channel Distribution Information at the Transmitter. - Ochirkhand Erdene-Ochir, Marine Minier, Fabrice Valois, Apostolos A. Kountouris:
Resilient networking in wireless sensor networks. - Anya Apavatjrut, Claire Goursaud, Katia Jaffrès-Runser, Cristina Comaniciu, Jean-Marie Gorce:
Towards increasing diversity for the relaying of LT Fountain Codes in Wireless Sensor Networks. - Charles A. B. Robert:
LEXSYS: Architecture and Implication for Intelligent Agent systems. - Christoph Lange:
wiki.openmath.org - how it works, how you can participate. - Christoph Lange:
SWiM -- A Semantic Wiki for Mathematical Knowledge Management. - Ronald Garcia, Andrew Lumsdaine, Amr Sabry:
Lazy Evaluation and Delimited Control. - Hakan Topakkaya, Zhengdao Wang:
Diversity-Multiplexing Tradeoff of Cooperative Communication with Linear Network Coded Relays. - Stefan Klus, Tuhin Sahai, Cong Liu, Michael Dellnitz:
An efficient algorithm for the parallel solution of high-dimensional differential equations. - Ketan Rajawat, Nikolaos Gatsis, Georgios B. Giannakis:
Cross-Layer Designs in Coded Wireless Fading Networks with Multicast. - Raphael Sznitman, Bruno Jedynak:
Active Testing for Face Detection and Localization. - Harsha Nagarajan, K. B. Nakshatrala:
Enforcing non-negativity constraint and maximum principles for diffusion with decay on general computational grids. - Amittai Aviram, Sen Hu, Bryan Ford, Ramakrishna Gummadi:
Determinating Timing Channels in Statistically Multiplexed Clouds. - V. S. Usatyuk:
Review of Lattice-based Public key Cryptography. (Russian). - David Tolpin, Solomon Eyal Shimony:
Rational Value of Information Estimation for Measurement Selection. - Alexandros G. Dimakis, Soummya Kar
, José M. F. Moura, Michael G. Rabbat, Anna Scaglione:
Gossip Algorithms for Distributed Signal Processing. - Alexander M. Bronstein, Michael M. Bronstein, Ron Kimmel:
The Video Genome. - George Kesidis, Youngmi Jin, Amar Prakash Azad, Eitan Altman:
Stable Nash equilibria of medium access games under symmetric, socially altruistic behavior. - Mark R. Meiss, John Duncan, Bruno Gonçalves, José J. Ramasco, Filippo Menczer:
What's in a Session: Tracking Individual Behavior on the Web. - Edith Cohen, Michal Feldman, Amos Fiat, Haim Kaplan, Svetlana Olonetsky:
Truth and Envy in Capacitated Allocation Games. - Mark R. Meiss, Bruno Gonçalves, José J. Ramasco, Alessandro Flammini, Filippo Menczer:
Agents, Bookmarks and Clicks: A topical model of Web traffic. - Edith Cohen, Michal Feldman, Amos Fiat, Haim Kaplan, Svetlana Olonetsky:
On the Interplay between Incentive Compatibility and Envy Freeness. - Daniel Karapetyan, Gregory Z. Gutin:
Lin-Kernighan Heuristic Adaptation for the Generalized Traveling Salesman Problem. - Samih Mohemmed Mostafa
:
Improving Waiting Time of Tasks Scheduled Under Preemptive Round Robin Using Changeable Time Quantum. - Pedram Pad, M. H. Shafinia, S. M. Mansouri, P. Kabir, Farrokh Marvasti:
Bounds for the Sum Capacity of Binary CDMA Systems in Presence of Near-Far Effect. - Daniel J. Dougherty:
An Improved Algorithm for Generating Database Transactions from Relational Algebra Specifications. 77-89 - Manuela-Luminita Bujorianu, Michael Fisher:
Proceedings FM-09 Workshop on Formal Methods for Aerospace, FMA 2009, Eindhoven, The Netherlands, 3rd November 2009. EPTCS 20, 2009 [contents] - Stergos D. Afantenos, Pascal Denis, Philippe Muller
, Laurence Danlos:
Learning Recursive Segments for Discourse Parsing. - Sreekanth Malladi, Bezawada Bruhadeshwar, Kishore Kothapalli:
Automatic analysis of distance bounding protocols. - Sreekanth Malladi:
Protocol indepedence through disjoint encryption under Exclusive-OR. - Sreekanth Malladi, Pascal Lafourcade
:
How to prevent type-flaw attacks on security protocols under algebraic properties. - Roman Kontchakov, Ian Pratt-Hartmann, Frank Wolter, Michael Zakharyaschev:
Spatial logics with connectedness predicates. - Sreekanth Malladi:
Disabling equational theories in unification for cryptographic protocol analysis through tagging. - Yong-Xiang Zhao, Chang-Jia Chen:
Modeling Multi-Point Transport Protocol in P2P Networks. - Andreea Ancuta Onofrei, Yacine Rebahi, Thomas Magedanz:
Preventing Distributed Denial-of-Service Attacks on the IMS Emergency Services Support through Adaptive Firewall Pinholing. - Siva Rama Krishnan Somayaji, Ch. A. S. Murty:
Securing Internet Protocol (IP) Storage: A Case Study. - Sanjay Kumar Pal, Samar Sen Sarma:
Computer Network Topology Design in Limelight of Pascal Graph Property. - Kilari Veera Swamy, B. Chandra Mohan, Y. V. Bhaskar Reddy, Samayamantula Srinivas Kumar:
Image Compression and Watermarking scheme using Scalar Quantization. - K. Prasanth, K. Duraiswamy, K. Jayasudha, C. Chandrasekar:
Improved Packet Forwarding Approach in Vehicular Ad Hoc Networks Using RDGR Algorithm. - Ye Ouyang, M. Hosein Fallah:
A Performance Analysis for UMTS Packet Switched Network Based on Multivariate KPIS. - Ratul Kr. Baruah:
Design of A Low Power Low Voltage CMOS Opamp. - K. Ayyappan, R. Kumar:
QoS Based Capacity Enhancement for WCDMA Network with Coding Scheme. - K. S. Vasundara Patel, K. S. Gurumurthy:
Arithmetic Operations in Multi-Valued Logic. - Andrew Gacek:
Relating Nominal and Higher-order Abstract Syntax Specifications. - Alexei D. Chepelianskii:
Towards physical laws for software architecture. - Jean-Luc Fouquet, Jean-Marie Vanherpe:
Seidel complementation on ($P_5$, $House$, $Bull$)-free graphs. - Jean-Luc Fouquet, Henri Thuillier, Jean-Marie Vanherpe:
On a family of cubic graphs containing the flower snarks. - Antonio Ignacio Vera:
A Note on Integer Factorization Using Lattices. - Ilia Zvedeniouk, Sanjay Chawla:
Angle Tree: Nearest Neighbor Search in High Dimensions with Low Intrinsic Dimensionality. - Elchanan Mossel, Omer Tamuz:
Truthful Fair Division. - Sandipan Dey, Ajith Abraham, Sugata Sanyal:
An LSB Data Hiding Technique Using Prime Numbers. - EphCOM: Practical Ephemeral Communications (How to implement ephemeral data with only primary Internet services).
- Marco Gaboardi
, Mauro Piccolo:
Categorical Models for a Semantically Linear Lambda-calculus. 1-13 - Paolo Torrini, Reiko Heckel:
Resource-Bound Quantification for Graph Transformation. 14-25 - Edsko de Vries, Adrian Francalanza
, Matthew Hennessy:
Uniqueness Typing for Resource Management in Message-Passing Concurrency. 26-37 - Maribel Fernández, Nikolaos Siafakas:
Labelled Lambda-calculi with Explicit Copy and Erase. 49-64 - Lingjie Duan, Jianwei Huang, Biying Shou:
Competition with Dynamic Spectrum Leasing. - Antonio Bucciarelli, Alberto Carraro
, Thomas Ehrhard, Antonino Salibra
:
On Linear Information Systems. 38-48 - Cornelis A. Middelburg:
Searching publications on operating systems. - Abdullah Mohammed Almuhaideb, Mohammed A. Alhabeeb, Phu Dung Le, Bala Srinivasan:
Flexible Authentication Technique for Ubiquitous Wireless Communication using Passport and Visa Tokens. - Pawan Kumar, Astik Biswas, Achyuta Nand Mishra, Mahesh Chandra:
Spoken Language Identification Using Hybrid Feature Extraction Methods. - Mahmoud I. Abdalla, Hanaa S. Ali:
Wavelet-Based Mel-Frequency Cepstral Coefficients for Speaker Identification using Hidden Markov Models. - M. A. Masud, Md. Samsuzzaman, M. A. Rahman:
Bit Error Rate Performance Analysis on Modulation Techniques of Wideband Code Division Multiple Access. - Moumita Majumder, Sumit Dhar:
A Mobile Message Scheduling and Delivery System using m-Learning framework. - Tarek Hasan-Al-Mahmud, M. Mahbubur Rahman, Sumon Kumar Debnath:
Performance Analysis of Best suited Adaptive Equalization Algorithm for Optical Communication. - Fahad Al-Zahrani:
Web-Based Learning and Training for Virtual Metrology Lab. - Hakim Alhussien, Jaekyun Moon:
The Error-Pattern-Correcting Turbo Equalizer. - Hakim Alhussien, Jaekyun Moon:
An Iteratively Decodable Tensor Product Code with Application to Data Storage. - Sitaram Asur, Bernardo A. Huberman:
Predicting the Future with Social Media. - Mário Florido
, Ian Mackie:
Proceedings First International Workshop on Linearity, LINEARITY 2009, Coimbra, Portugal, 12th September 2009. EPTCS 22, 2009 [contents] - Ashwin Rao, Arnaud Legout
, Walid Dabbous:
BitTorrent Experiments on Testbeds: A Study of the Impact of Network Latencies. - Iris Eshkol, Isabelle Tellier, Taalab Samer, Sylvie Billot:
Etiqueter un corpus oral par apprentissage automatique à l'aide de connaissances linguistiques. - Ian Mackie, Anamaria Martins Moreira:
Proceedings Tenth International Workshop on Rule-Based Programming, RULE 2009, Brasília, Brazil, 28th June 2009. EPTCS 21, 2009 [contents] - Fu-Te Hsu, Hsuan-Jung Su:
Analysis of a CSMA-Based Wireless Network with Heterogeneous Nodes: Feasible Throughput Region and Power Consumption. - Ye Ouyang, M. Hosein Fallah:
The impact of cell site re-homing on the performance of umts core networks. - Nadia Polikarpova, Carlo A. Furia, Bertrand Meyer:
Specifying Reusable Components. - Vahan V. Mkrtchyan, Eckhard Steffen:
Bricks and conjectures of Berge, Fulkerson and Seymour. - Vahan V. Mkrtchyan, Eckhard Steffen:
Measures of edge-uncolorability. - Rakesh Mohanty, Niharjyoti Sarangi, Sukant kumar Bishi:
A secured Cryptographic Hashing Algorithm. - Wei Zhou, Lei Wang, Dan Meng, Lin Yuan, Jianfeng Zhan:
Scalable Group Management in Large-Scale Virtualized Clusters. - Shi Zhou:
Why the Internet is so 'small'? - Roberto Marazzato, Amelia Carolina Sparavigna:
Tuning CLD Maps. - Matthew P. Szudzik:
The Computable Universe Hypothesis. - Dakshina Ranjan Kisku, Hunny Mehrotra, Phalguni Gupta, Jamuna Kanta Sing:
Robust multi-camera view face recognition. - Dakshina Ranjan Kisku, Phalguni Gupta, Jamuna Kanta Sing:
Offline Signature Identification by Fusion of Multiple Classifiers using Statistical Learning Theory. - Pankaj K. Agarwal, Jeff M. Phillips, Hai Yu:
Stability of epsilon-Kernels. - Henk F. Moed:
CWTS crown indicator measures citation impact of a research group's publication oeuvre. - Sandip Rakshit, Subhadip Basu:
Development of a multi-user handwriting recognition system using Tesseract open source OCR engine. - Sandip Rakshit, Subhadip Basu:
Recognition of Handwritten Roman Script Using Tesseract Open source OCR Engine. - Sandip Rakshit, Subhadip Basu, Hisashi Ikeda:
Recognition of Handwritten Textual Annotations using Tesseract Open Source OCR Engine for information Just In Time (iJIT). - Sandip Rakshit, Debkumar Ghosal, Tanmoy Das, Subhrajit Dutta, Subhadip Basu:
Development of a Multi-User Recognition Engine for Handwritten Bangla Basic Characters and Digits. - Sandip Rakshit, Amitava Kundu, Mrinmoy Maity, Subhajit Mandal, Satwika Sarkar, Subhadip Basu:
Recognition of handwritten Roman Numerals using Tesseract open source OCR engine. - Agnieszka Patyk:
Geometric Algebra Model of Distributed Representations. - Aleksander Madry:
Faster Approximation Schemes for Fractional Multicommodity Flow Problems via Dynamic Graph Algorithms. - Adam Megacz:
Multi-Stage Programs are Generalized Arrows. - Lihong Li, Wei Chu, John Langford:
An Unbiased, Data-Driven, Offline Evaluation Method of Contextual Bandit Algorithms. - Jiening Zhan, Bobak Nazer, Uri Erez, Michael Gastpar:
Integer-Forcing Linear Receivers. - Devavrat Shah, John N. Tsitsiklis, Yuan Zhong:
Qualitative Properties of alpha-Weighted Scheduling Policies. - Xiangyong Zeng, Jinyong Shan, Lei Hu:
A Triple-Error-Correcting Cyclic Code from the Gold and Kasami-Welch APN Power Functions. - (Withdrawn) Optimal (v, 4, 2, 1) optical orthogonal codes with small parameters.
- K. Ragini, M. Satyam, B. C. Jinaga:
Variable Threshold MOSFET Approach (Through Dynamic Threshold MOSFET) For Universal Logic Gates. - Christoph Spandl:
Computational Complexity of Iterated Maps on the Interval. - Satadal Saha, Subhadip Basu, Mita Nasipuri, Dipak Kumar Basu:
Development of an automated Red Light Violation Detection System (RLVDS) for Indian vehicles. - Satadal Saha, Subhadip Basu, Mita Nasipuri, Dipak Kumar Basu:
A novel scheme for binarization of vehicle images using hierarchical histogram equalization technique. - Anvesh Aileni:
A CF-Based Randomness Measure for Sequences. - Michael Gastpar, Amos Lapidoth, Michèle A. Wigger:
When Feedback Doubles the Prelog in AWGN Networks. - Bernhard Goebel, René-Jean Essiambre, Gerhard Kramer, Peter J. Winzer, Norbert Hanik:
Polar Decomposition of Mutual Information and Applications to Partially Coherent Channels. - Jan Jakubuv, J. B. Wells:
Expressiveness of Generic Process Shape Types. - Z. X. Guo:
Comment on "Fastest learning in small-world neural networks". - Uri Levy:
The Magnetic Tower of Hanoi. - Orr Shalit:
Stable polynomial division and essential normality of graded Hilbert modules. - Casey W. Miller, Michelle D. Chabot, Troy C. Messina:
A student's guide to searching the literature using online databases. - Matjaz Perc:
Zipf's law and log-normal distributions in measures of scientific output across fields and institutions: 40 years of Slovenia's research as an example. - Haiping Huang, Haijun Zhou:
Learning by random walks in the weight space of the Ising perceptron. - Valmir Carneiro Barbosa:
Network conduciveness with application to the graph-coloring and independent-set optimization transitions. - Troy Lee, Shengyu Zhang:
Composition theorems in communication complexity. - Xin-She Yang:
Biology-Derived Algorithms in Engineering Optimization. - Zi-Ke Zhang, Chuang Liu:
Hypergraph model of social tagging networks. - Dávid Pál, Barnabás Póczos, Csaba Szepesvári:
Estimation of Rényi Entropy and Mutual Information Based on Generalized Nearest-Neighbor Graphs. - Jure Leskovec, Daniel P. Huttenlocher, Jon M. Kleinberg:
Signed Networks in Social Media. - Jure Leskovec, Daniel P. Huttenlocher, Jon M. Kleinberg:
Predicting Positive and Negative Links in Online Social Networks. - Daniel M. Romero, Jon M. Kleinberg:
The Directed Closure Process in Hybrid Social-Information Networks, with an Analysis of Link Formation on Twitter. - Stephen Chestnut, Manuel E. Lladser:
Occupancy distributions in Markov chains via Doeblin's ergodicity coefficient. - Maxim A. Babenko, Ignat I. Kolesnichenko, Ilya P. Razenshteyn:
A Linear Time Algorithm for Finding Three Edge-Disjoint Paths in Eulerian Networks. - Toby S. Cubitt, Debbie W. Leung, William Matthews, Andreas J. Winter:
Zero-error channel capacity and simulation assisted by non-local correlations. - Ge Wang
, Jiansheng Yang:
Axiomatic Quantification of Co-authors' Relative Contributions. - Tanya Khovanova, Konstantin Knop, Alexey Radul:
Baron Munchhausen's Sequence. - Viktor Levandovskyy, Jorge Martín-Morales:
Algorithms for Checking Rational Roots of $b$-functions and their Applications. - Alicia Dickenstein, Enrique A. Tobis:
Independent Sets from an Algebraic Perspective. - Viktor Levandovskyy, Kristina Schindelar:
Computing diagonal form and Jacobson normal form of a matrix using Gröbner bases. - Holger Paul Keeler:
A stochastic analysis of greedy routing in a spatially-dependent sensor network. - Pavel Chebotarev:
The graph bottleneck identity. - Zoltan Gingl, Sunil P. Khatri, Laszlo B. Kish:
Towards brain-inspired computing. - Nathan Keller:
A tight quantitative version of Arrow's impossibility theorem. - Sou-Cheng T. Choi, Christopher C. Paige, Michael A. Saunders:
MINRES-QLP: a Krylov subspace method for indefinite or singular symmetric systems. - Assaf Naor:
L_1 embeddings of the Heisenberg group and fast estimation of graph isoperimetry. - Alexander Kushnerov:
High-Efficiency Self-Adjusting Switched Capacitor DC-DC Converter with Binary Resolution. - Roumen Anguelov, P. W. Butler, C. H. Rohwer, M. Wild:
The output distribution of important LULU-operators. - Anna Ivanova:
Identification of Convection Heat Transfer Coefficient of Secondary Cooling Zone of CCM based on Least Squares Method and Stochastic Approximation Method. - Andrej Muchnik, Ilya Mezhirov, Alexander Shen, Nikolai K. Vereshchagin:
Game interpretation of Kolmogorov complexity. - Xueliang Li, Yiyang Li:
The asymptotic value of Randic index for trees. - Andrea Bedini, Jesper Lykke Jacobsen:
Fast solution of NP-hard coloring problems on large random graphs. - Oleg Pikhurko, Oleg Verbitsky:
Logical complexity of graphs: a survey. - Ryan Prescott Adams, George E. Dahl, Iain Murray:
Incorporating Side Information in Probabilistic Matrix Factorization with Gaussian Processes. - Patrick M. Hayden, Andreas J. Winter:
The Fidelity Alternative and Quantum Measurement Simulation. - Ashish Kumar Upadhyay:
Contractible Hamiltonian Cycles in Triangulated Surfaces. - Vibeke Libby:
A Fast Algorithm for Determining the Existence and Value of Integer Roots of N. - Daniel Stefankovic, Eric Vigoda:
Fast Convergence of MCMC Algorithms for Phylogenetic Reconstruction with Homogeneous Data on Closely Related Species. - Jaroslav Hájek, András Szöllös, Jakub Sístek:
A New Mechanism for Maintaining Diversity of Pareto Archive in Multiobjective Optimization. - (Withdrawn) Statistical physics of optimization under uncertainty.
- Deping Ye:
On the comparison of volumes of quantum states. - Giacomo Como, Fabio Fagnani:
Scaling limits for continuous opinion dynamics systems. - Daniel Loebenberger, Michael Nüsken:
Coarse-grained integers - Smooth? Rough? Both! - Taeyoung Lee, Melvin Leok, N. Harris McClamroch:
Control of Complex Maneuvers for a Quadrotor UAV using Geometric Methods on SE(3). - Tomohiko Konno:
A Condition for Cooperation in a Game on Complex Networks.

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.