


default search action
CoRR, July 2009
- Huma Naeem, Asif Masood, Mukhtar Hussain, Shoab A. Khan:
A Novel Two-Staged Decision Support based Threat Evaluation and Weapon Assignment Algorithm, Asset-based Dynamic Weapon Scheduling using Artificial Intelligence Techinques. - Hamidreza Mahini, Alireza Mahini, Javad Ghofrani:
XDANNG: XML based Distributed Artificial Neural Network with Globus Toolkit. - Farzad Didehvar, Ali D. Mehrabi, Fatemeh Raee B:
On Unique Independence Weighted Graphs. - Céline Engelbeen, Samuel Fiorini, Antje Kiesel:
A closest vector problem arising in radiation therapy planning. - Narad Rampersad, Jeffrey O. Shallit, Zhi Xu:
The computational complexity of universality problems for prefixes, suffixes, factors, and subwords of regular languages. - Ghassan Hamarneh:
Multi-Label MRF Optimization via Least Squares s-t Cuts. - S. V. Polikarpov, V. S. Dergachev, K. E. Rumyantsev, D. M. Golubchikov:
A new model of artificial neuron: cyberneuron and its use. - Hazer Inaltekin, Mung Chiang, H. Vincent Poor:
A Cut-off Phenomenon in Location Based Random Access Games with Imperfect Information. - Simant Dube:
An Iterative Fingerprint Enhancement Algorithm Based on Accurate Determination of Orientation Flow. - Alin Bostan, Bruno Salvy, Khang Tran:
Generating functions of Chebyshev-like polynomials. - Leah Epstein, Asaf Levin, Julián Mestre, Danny Segev:
Improved approximation guarantees for weighted matching in the semi-streaming model. - Wojciech Mazurczyk, Krzysztof Szczypiorski:
Steganography in Handling Oversized IP Packets. - James M. Whitacre, Axel Bender:
Degenerate neutrality creates evolvable fitness landscapes. - James M. Whitacre:
Evidence of coevolution in multi-objective evolutionary algorithms. - James M. Whitacre:
Survival of the flexible: explaining the dominance of meta-heuristics within a rapidly evolving world. - James M. Whitacre, Ruhul A. Sarker, Q. Tuan Pham:
The Self-Organization of Interaction Networks for Nature-Inspired Optimization. - James M. Whitacre, Hussein A. Abbass, Ruhul A. Sarker, Axel Bender, Stephen Baker:
Strategic Positioning in Tactical Scenario Planning. - Krzysztof R. Apt, Andreas Witzel, Jonathan A. Zvesper:
Common Knowledge in Interaction Structures. - Sohail Safdar, Jamil Ahmad, Shaftab Ahmed, M. Tayyab Asghar, Saqib Saeed:
Agent based Model for providing optimized, synchronized and failure free execution of workflow process. - Andrew Kae, Gary B. Huang, Erik G. Learned-Miller:
Bounding the Probability of Error for High Precision Recognition. - (Withdrawn) Random DFAs are Efficiently PAC Learnable.
- Xiaohu Shang, Biao Chen, Gerhard Kramer, H. Vincent Poor:
Capacity Regions and Sum-Rate Capacities of Vector Gaussian Interference Channels. - Fahem Kebair, Frédéric Serin:
Agent-Oriented Approach for Detecting and Managing Risks in Emergency Situations. - Xiaohu Shang, Biao Chen, H. Vincent Poor:
Multi-User MISO Interference Channels with Single-User Detection: Optimality of Beamforming and the Achievable Rate Region. - (Withdrawn) Spontaneous organization leads to robustness in evolutionary algorithms.
- James M. Whitacre:
Adaptation and Self-Organization in Evolutionary Algorithms. - Hussein A. Abbass, Axel Bender, Helen Dam, Stephen Baker, James M. Whitacre, Ruhul A. Sarker:
Computational Scenario-based Capability Planning. - Christine Michel
, Marc-Eric Bobillier-Chaumon
, Véronique Cohen Montandreau, Franck Tarpin-Bernard:
Démarche d'évaluation de l'usage et des répercussions psychosociales d'un environnement STIC sur une population de personnes âgées en résidence médicalisée. - Rahul Gupta, Sunita Sarawagi, Ajit A. Diwan:
Generalized Collective Inference with Symmetric Clique Potentials. - James M. Whitacre, Q. Tuan Pham, Ruhul A. Sarker:
Credit Assignment in Adaptive Evolutionary Algorithms. - James M. Whitacre, Q. Tuan Pham, Ruhul A. Sarker:
Use of statistical outlier detection method in adaptive evolutionary algorithms. - James M. Whitacre, Axel Bender, Stephen Baker, Qi Fan, Ruhul A. Sarker, Hussein A. Abbass:
Network Topology and Time Criticality Effects in the Modularised Fleet Mix Problem. - Slawomir Wesolkowski, Michael Mazurek, James M. Whitacre, Axel Bender, Hussein A. Abbass:
Robustness and Adaptiveness Analysis of Future Fleets. - S. Butdee, Chaiwat Noomtong, Serge Tichkiewitch:
A process planning system with feature based neural network search strategy for aluminum extrusion die manufacturing. - Emilie Charlier, Tomi Kärki, Michel Rigo:
Multidimensional Generalized Automatic Sequences and Shape-symmetric Morphic Words. - Philipp Weis, Neil Immerman:
Structure Theorem and Strict Alternation Hierarchy for FO^2 on Words. - Jason P. Bell, Emilie Charlier, Aviezri S. Fraenkel, Michel Rigo:
A Decision Problem for Ultimately Periodic Sets in Non-standard Numeration Systems. - Michel Rigo, Laurent Waxweiler:
A note on syndeticity, recognizable sets and Cobham's theorem. - Benoît Darties, Fabrice Theoleyre, Andrzej Duda:
A Divide-and-Conquer Scheme for Assigning Roles in Multi-Channel Wireless Mesh Networks. - Piyush Kumar Shukla, Sanjay Silakari, Sarita Singh Bhadoria:
Design and Analysis of an Attack Resilient and Adaptive Medium access Control Protocol for Computer Networks. - Elaine M. Eschen, Chính T. Hoàng, R. Sritharan, Lorna Stewart:
On the complexity of deciding whether the distinguishing chromatic number of a graph is at most two. - Jonathan P. Sorenson:
A Sublinear Time Parallel GCD Algorithm for the EREW PRAM. - Ertugrul Basar, Ümit Aygölü:
High-Rate Full-Diversity Space-Time Block Codes for Three and Four Transmit Antennas. - Zachary Friggstad, Mohammad R. Salavatipour, Zoya Svitkina:
Asymmetric Traveling Salesman Path and Directed Latency Problems. - Travis Gagie, Yakov Nekrich:
Tight Bounds for Online Stable Sorting. - Marcus Hutter:
Open Problems in Universal Induction & Intelligence. - Dan R. Ghica:
Function Interface Models for Hardware Compilation: Types, Signatures, Protocols. - Gábor Ivanyos, Marek Karpinski, Nitin Saxena:
Deterministic Polynomial Time Algorithms for Matrix Completion Problems. - Hal Daumé III:
Bayesian Multitask Learning with Latent Hierarchies. - Hal Daumé III:
Cross-Task Knowledge-Constrained Self Training. - Hal Daumé III, Lyle Campbell:
A Bayesian Model for Discovering Typological Implications. - Hal Daumé III, John Langford, Daniel Marcu:
Search-based Structured Prediction. - James E. Raynolds, Lenore M. R. Mullin:
A generalized inner and outer product of arbitrary multi-dimensional arrays using A Mathematics of Arrays (MoA). - Lenore M. R. Mullin, James E. Raynolds:
Tensors and n-d Arrays:A Mathematics of Arrays (MoA), psi-Calculus and the Composition of Tensor and Array Operations. - Hal Daumé III, Daniel Marcu:
Induction of Word and Phrase Alignments for Automatic Document Summarization. - Hal Daumé III, Daniel Marcu:
A Noisy-Channel Model for Document Compression. - Hal Daumé III, Daniel Marcu:
A Large-Scale Exploration of Effective Global Features for a Joint Entity Detection and Tracking Model. - Hal Daumé III, Daniel Marcu:
A Bayesian Model for Supervised Clustering with the Dirichlet Process Prior. - Hal Daumé III, Daniel Marcu:
Learning as Search Optimization: Approximate Large Margin Methods for Structured Prediction. - Chengqing Li, Shujun Li, Kwok-Tung Lo:
Breaking a new substitution-diffusion based image cipher using chaotic standard and logistic maps. - Stephen L. Bloom, Zoltán Ésik:
Algebraic Ordinals. - Nir Ailon, Bernard Chazelle, Kenneth L. Clarkson, Ding Liu, Wolfgang Mulzer, C. Seshadhri:
Self-Improving Algorithms. - Sariel Har-Peled:
Randomized Incremental Construction of Compressed Quadtrees. - Yoshiyuki Kabashima, Tadashi Wadayama, Toshiyuki Tanaka:
Typical reconstruction limit of compressed sensing based on Lp-norm minimization. - Mihai Letia, Nuno M. Preguiça, Marc Shapiro:
CRDTs: Consistency without concurrency control. - Danny Bickson, Danny Dolev:
Distributed Sensor Selection via Gaussian Belief Propagation. - Nadia Creignou, Hervé Daudé, Uwe Egly, Raphaël Rossignol:
The threshold for random (1,2)-QSAT. - Thierry Petit, Emmanuel Poder:
The Soft Cumulative Constraint. - Emilie Charlier, Marion Le Gonidec, Michel Rigo:
Representing Real Numbers in a Generalized Numeration Systems. - Frédéric Didier, Yann Laigle-Chapuy:
Attacking the combination generator. - Julien Cohen:
A class of structured P2P systems supporting browsing. - Chao-Yang Pang, Wei Hu, Xia Li, Ben-Qiong Hu:
Apply Local Clustering Method to Improve the Running Speed of Ant Colony Optimization. - Mikhail Belkin, Kaushik Sinha:
Learning Gaussian Mixtures with Arbitrary Separation. - George K. Atia, Venkatesh Saligrama:
Boolean Compressed Sensing and Noisy Group Testing. - Ramasuri Narayanam, Y. Narahari:
Design of an Optimal Bayesian Incentive Compatible Broadcast Protocol for Ad hoc Networks with Rational Nodes. - (Withdrawn) Self-Assembling Systems are Distributed Systems.
- Matt Gibson, Gaurav Kanade, Erik Krohn, Kasturi R. Varadarajan:
Quasi-Polynomial Time Approximation Schemes for Target Tracking. - Niranjay Ravindran, Nihar Jindal:
Multi-User Diversity vs. Accurate Channel State Information in MIMO Downlink Channels. - Mihai Patrascu:
A Lower Bound for Succinct Rank Queries. - Sariel Har-Peled:
Approximating Spanning Trees with Low Crossing Number. - Tzipora Halevi, Nitesh Saxena, Shai Halevi:
Using HB Family of Protocols for Privacy-Preserving Authentication of RFID Tags in a Population. - Matteo Buferli, Matteo Magnani, Danilo Montesi:
ChOrDa: a methodology for the modeling of business processes with BPMN. - Tobias Kuhn
:
How Controlled English can Improve Semantic Wikis. - Tobias Kuhn
:
How to Evaluate Controlled Natural Languages. - Samir Medina Perlaza, Nadia Fawaz, Samson Lasaulce, Mérouane Debbah:
From Spectrum Pooling to Space Pooling: Opportunistic Interference Alignment in MIMO Cognitive Networks. - Nitesh Saxena, Jonathan Voris:
We Can Remember It for You Wholesale: Implications of Data Remanence on the Use of RAM for True Random Number Generation on RFID Tags (RFIDSec 2009). - Libin Jiang, Devavrat Shah, Jinwoo Shin, Jean C. Walrand:
Distributed Random Access Algorithm: Scheduling and Congesion Control. - James King, Erik Krohn:
The Complexity of Guarding Terrains. - Ankur Gupta, Anna Kispert, Jonathan P. Sorenson:
Online Sorting via Searching and Selection. - Scott M. Summers:
Reducing Tile Complexity for the Self-Assembly of Scaled Shapes Through Temperature Programming. - Xiaotie Deng, Qi Qi, Amin Saberi:
On the Complexity of Envy-Free Cake Cutting. - Jean-François Couchot, Alain Giorgetti, Nicolas Stouls
:
Graph Based Reduction of Program Verification Conditions. - Manjish Pal:
Towards an $O(\sqrt[3]{\log n})$-Approximation Algorithm for {\sc Balanced Separator}. - Cédric Chevalier, François Pellegrini
:
PT-Scotch: A tool for efficient parallel graph ordering. - (Withdrawn) Privacy constraints in regularized convex optimization.
- Adnan Raja, Vinod M. Prabhakaran, Pramod Viswanath:
Reciprocity in Linear Deterministic Networks under Linear Coding. - Arno Pauly:
How discontinuous is Computing Nash Equilibria? - Federico Penna, Roberto Garello:
Theoretical Performance Analysis of Eigenvalue-based Detection. - Sonja Georgievska, Suzana Andova:
Testing Probabilistic Processes: Can Random Choices Be Unobservable? - Se Baek Oh, George Barbastathis, Ramesh Raskar:
Augmenting Light Field to model Wave Optics effects. - James A. R. Marshall, Thomas Glyn Hinton:
Beyond No Free Lunch: Realistic Algorithms for Arbitrary Problem Classes. - Naveen Ashish, Sharad Mehrotra, Pouria Pirzadeh:
Incorporating Integrity Constraints in Uncertain Databases. - Chen Avin, Yuval Lando, Zvi Lotker:
Simple Random Walks on Radio Networks (Simple Random Walks on Hyper-Graphs). - Samar Agnihotri, Rajesh Venkatachalapathy:
Distributed Function Computation in Asymmetric Communication Scenarios. - Ryszard Janicki, Dai Tri Man Le:
Modelling Concurrency with Comtraces and Generalized Comtraces. - Samar Agnihotri, Rajesh Venkatachalapathy:
Worst-case Compressibility of Discrete and Finite Distributions. - Leslie Ann Goldberg, Mark Jerrum:
Inapproximability of the Tutte polynomial of a planar graph. - Linyuan Lu, Tao Zhou:
Role of Weak Ties in Link Prediction of Complex Networks. - Qing Wang, Pingyi Fan, Khaled Ben Letaief:
Throughput Improvement and Its Tradeoff with The Queuing Delay in the Diamond Relay Networks. - Pingyi Fan, Pei Sun, Khaled Ben Letaief:
Efficient Signal-Time Coding Design and its Application in Wireless Gaussian Relay Networks. - R. T. Faizullin, I. G. Khnykin, V. I. Dylkeyt:
The SAT solving method as applied to cryptographic analysis of asymmetric ciphers. - Chien-Chung Huang:
Classified Stable Matching. - Alexandre Soro, Jérôme Lacan:
FNT-based Reed-Solomon Erasure Codes. - Hal Daumé III:
Fast search for Dirichlet process mixture models. - Hal Daumé III:
Bayesian Query-Focused Summarization. - Hal Daumé III:
Frustratingly Easy Domain Adaptation. - Sheng-Gwo Chen, Mei-Hsiu Chi, Jyh-Yang Wu:
A new intrinsic numerical method for PDE on surfaces. - Michael E. Palmer, Daniel B. Miller:
An Evolved Neural Controller for Bipdedal Walking with Dynamic Balance. - Paola Bonizzoni, Gianluca Della Vedova, Riccardo Dondi:
A PTAS for the Minimum Consensus Clustering Problem with a Fixed Number of Clusters. - Syed T. Qaseem, Tareq Y. Al-Naffouri:
Compressive Sensing for Feedback Reduction in MIMO Broadcast Channels. - Olivier Bournez, Johanne Cohen:
Learning Equilibria in Games by Stochastic Distributed Algorithms. - Shaddin Dughmi, Hu Fu, Robert Kleinberg:
Amplified Hardness of Approximation for VCG-Based Mechanisms. - Matthew C. Clarke
:
On the Chances of Completing the Game of "Perpetual Motion". - Lei Zhao, Haim H. Permuter:
Zero-error feedback capacity via dynamic programming. - Sergei V. Fedorenko:
On semifast Fourier transform algorithms. - Matteo Magnani, Danilo Montesi:
BPDMN: A Conservative Extension of BPMN with Enhanced Data Representation Capabilities. - Oktie Hassanzadeh:
Automated Protein Structure Classification: A Survey. - Zhi Quan, Stephen J. Shellhammer, Wenyi Zhang, Ali H. Sayed:
Spectrum sensing by cognitive radios at very low SNR. - Tshilidzi Marwala:
Foundations for a Developmental State: A case for technical education. - David Déharbe, Bruno Emerson Gurgel Gomes, Anamaria Martins Moreira:
Refining interfaces: the case of the B method. - Noga Alon, Michal Feldman, Ariel D. Procaccia, Moshe Tennenholtz:
Strategyproof Approximation Mechanisms for Location on Networks. - Lukasz Jez:
Randomised Buffer Management with Bounded Delay against Adaptive Adversary. - Sylvain Lebresne:
A Type System For Call-By-Name Exceptions. - Prosenjit Bose, Karim Douïeb, Vida Dujmovic, John Howat:
Layered Working-Set Trees. - Lucas C. Cordeiro, Bernd Fischer, João Marques-Silva:
SMT-Based Bounded Model Checking for Embedded ANSI-C Software. - Ulas Bagci, Li Bai:
Multiresolution Elastic Medical Image Registration in Standard Intensity Scale. - Francesco Biscani:
The Piranha algebraic manipulator. - Adam C. Zelinski, Vivek K. Goyal, Elfar Adalsteinsson:
Simultaneously Sparse Solutions to Linear Inverse Problems with Multiple System Matrices and a Single Observation Vector. - Diego Arroyuelo, Francisco Claude, Sebastian Maneth, Veli Mäkinen, Gonzalo Navarro, Kim Nguyen, Jouni Sirén, Niko Välimäki:
Fast In-Memory XPath Search over Compressed Text and Tree Indexes. - Brijesh Kumar Rai, Bikash Kumar Dey:
Classification of \textit{sum-networks} based on network coding capacity. - Chandrashekhar Thejaswi P. S., Junshan Zhang, Man-On Pun, H. Vincent Poor, Dong Zheng:
Distributed Opportunistic Scheduling With Two-Level Probing. - Sergio R. Rodriguez:
Topology Discovery Using Cisco Discovery Protocol. - Stefano Crespi-Reghizzi, Dino Mandrioli:
Algebraic properties of structured context-free languages: old approaches and novel developments. - Mai-Anh Phan, Jörg Huschke:
Adaptive Point-to-Multipoint Transmission for Multimedia Broadcast Multicast Services in LTE. - Maxime Crochemore, Costas S. Iliopoulos, Marcin Kubica, Jakub Radoszewski, Wojciech Rytter, Tomasz Walen:
On the maximal number of highly periodic runs in a string. - Stéphane Bessy, Fedor V. Fomin, Serge Gaspers, Christophe Paul, Anthony Perez, Saket Saurabh, Stéphan Thomassé:
Kernels for Feedback Arc Set In Tournaments. - Oleg Mazonka:
Bit Copying - The Ultimate Computational Simplicity. - A. A. Krizhanovsky, F. Lin:
Related terms search based on WordNet / Wiktionary and its application in Ontology Matching. - Dilip Krishnaswamy, Shanyu Zhao:
Network-aware Adaptation with Real-Time Channel Statistics for Wireless LAN Multimedia Transmissions in the Digital Home. - Dilip Krishnaswamy:
AWiMA: An architecture for Adhoc Wireless Mobile internet Access. - Martin Klein, Michael L. Nelson:
Evaluating Methods to Rediscover Missing Web Pages from the Web Infrastructure. - Dingkang Wang, Yao Sun:
An Efficient Algorithm for Factoring Polynomials over Algebraic Extension Field. - Peter Rost, Gerhard P. Fettweis:
Protocols and Performance Limits for Half-Duplex Relay Networks. - Yupu Hu, Fengrong Zhang, Yiwei Zhang:
Hard Fault Analysis of Trivium. - Laurent Bienvenu, Rupert Hölzl, Thorsten Kräling, Wolfgang Merkle:
Separations of non-monotonic randomness notions. - Elisha Peterson:
Cooperation in Subset Team Games: Altruism and Selfishness. - Pedro Coronel, Helmut Bölcskei:
Optimal Diversity-Multiplexing Tradeoff in Selective-Fading MIMO Channels. - Edwin Hammerich:
Design of Pulse Shapes and Digital Filters Based on Gaussian Functions. - (Withdrawn) Computing Multidimensional Persistence.
- Shuchi Chawla, Jason D. Hartline, David L. Malec, Balasubramanian Sivan:
Sequential Posted Pricing and Multi-parameter Mechanism Design. - Koichi Takeuchi, Kyo Kageura, Teruo Koyama, Béatrice Daille, Laurent Romary:
Pattern Based Term Extraction Using ACABIT System. - Won-Yong Shin, Sae-Young Chung, Yong Hoon Lee:
Improved Power-Delay Trade-off in Wireless Networks Using Opportunistic Routing. - Oktie Hassanzadeh:
Benchmarking Declarative Approximate Selection Predicates. - Craig Weidert:
Extremal problems in ordered graphs. - Alexandros Marinos, Gerard Briscoe:
Community Cloud Computing. - Sang-Woon Jeon, Sae-Young Chung:
Capacity of a Class of Multi-source Relay Networks. - Eva Jaho, Ioannis Z. Koukoutsidis, Siyu Tang, Ioannis Stavrakakis, Piet Van Mieghem:
Gossip-based Search in Multipeer Communication Networks. - Emden R. Gansner, Yifan Hu, Stephen G. Kobourov:
GMap: Drawing Graphs as Maps. - Hung D. Ly, Tie Liu, Yingbin Liang:
Multiple-Input Multiple-Output Gaussian Broadcast Channels with Common and Confidential Messages. - Salem Said, Christian Lageman, Nicolas Le Bihan, Jonathan H. Manton:
Decompounding on compact Lie groups. - Pavel Hrubes, Amir Yehudayoff:
Homogeneous formulas and symmetric polynomials. - Paul S. Bonsma, Felix Breuer:
Finding Fullerene Patches in Polynomial Time. - Serguei A. Mokhov:
Towards Hybrid Intensional Programming with JLucid, Objective Lucid, and General Imperative Compiler Framework in the GIPSY. - Martin E. Dyer, Leslie Ann Goldberg, Markus Jalsenius, David Richerby:
The Complexity of Approximating Bounded-Degree Boolean #CSP. - Torleiv Kløve, Te-Tsung Lin, Shi-Chun Tsai, Wen-Guey Tzeng:
Permutation Arrays Under the Chebyshev Distance. - Vinod M. Prabhakaran, Pramod Viswanath:
Interference Channels with Destination Cooperation. - Stanley P. Y. Fung:
Bounded Delay Packet Scheduling in a Bounded Buffer. - A. N. Trahtman, Tomer Bauer, Noam Cohen:
The Visualization of the Road Coloring Algorithm in the package TESTAS. - Frédérique E. Oggier, Alfred M. Bruckstein:
On Cyclic and Nearly Cyclic Multiagent Interactions in the Plane. - Dai Tri Man Le:
Modelling Concurrent Behaviors in the Process Specification Language. - Peter Bürgisser, J. M. Landsberg, Laurent Manivel, Jerzy Weyman:
An overview of mathematical issues arising in the Geometric complexity theory approach to VP v.s. VNP. - Sheng-Yuan Tu, Kwang-Cheng Chen:
General Spectrum Sensing in Cognitive Radio Networks. - Thomas Bernecker, Hans-Peter Kriegel, Nikos Mamoulis, Matthias Renz, Andreas Züfle:
Scalable Probabilistic Similarity Ranking in Uncertain Databases (Technical Report). - Slawomir Stanczak, Michal Kaliszan, Nicholas Bambos:
Decentralized Admission Control for Power-Controlled Wireless Links. - Hassan Gobjuka:
4G Wireless Networks: Opportunities and Challenges. - Julien M. Hendrickx, Alexander Olshevsky, John N. Tsitsiklis:
Distributed anonymous function computation in information fusion and multiagent systems. - Chiranjeeb Buragohain, Luca Foschini, Subhash Suri:
Untangling the Braid: Finding Outliers in a Set of Streams. - Matthew A. Herman, Thomas Strohmer:
General Deviants: An Analysis of Perturbations in Compressed Sensing. - Serguei A. Mokhov:
Service-Oriented Architectures and Web Services: Course Tutorial Notes. - Zheng Wang, Jie Luo:
Fountain Communication using Concatenated Codes. - Martin Josef Geiger:
The Single Machine Total Weighted Tardiness Problem - Is it (for Metaheuristics) a Solved Problem ? - Martin Josef Geiger:
Improvements for multi-objective flow shop scheduling by Pareto Iterated Local Search. - Flavio D'Alessandro, Benedetto Intrigila, Stefano Varricchio:
On some counting problems for semi-linear sets. - Arash Rafiey, Pavol Hell:
Duality for Min-Max Orderings and Dichotomy for Min Cost Homomorphisms. - Dana Fisman, Orna Kupferman, Yoad Lustig:
Rational Synthesis. - Abdelkader Lahmadi, Olivier Festor
:
SecSip: A Stateful Firewall for SIP-based Networks. - Abdelkader Lahmadi, Laurent Andrey, Olivier Festor
:
Performance of Network and Service Monitoring Frameworks. - George Christodoulou, Annamária Kovács:
A deterministic truthful PTAS for scheduling related machines. - Stephan Kreutzer, Siamak Tazari:
On Brambles, Grid-Like Minors, and Parameterized Intractability of Monadic Second-Order Logic. - Matteo Pradella, Angelo Morzenti, Pierluigi San Pietro:
A Metric Encoding for Bounded Model Checking (extended version). - Kamal Ahmat:
Ethernet Topology Discovery: A Survey. - Kamal Ahmat:
Graph Theory and Optimization Problems for Very Large Networks. - Olivier Bournez, Manuel Lameiras Campagnolo:
A Survey on Continuous Time Computations. - Olivier Bournez
, Philippe Chassaing, Johanne Cohen, Lucas Gerin, Xavier Koegler:
On the Convergence of Population Protocols When Population Goes to Infinity. - Emmanuel Beffara, Olivier Bournez, Hassen Kacem, Claude Kirchner:
Verification of Timed Automata Using Rewrite Rules and Strategies. - Olivier Bournez, Jérémie Chalopin, Johanne Cohen, Xavier Koegler:
Population Protocols that Correspond to Symmetric Games. - Philip Bille:
Fast Searching in Packed Strings. - Stevan Harnad:
Commentary on: Citing and Reading Behavours in High-Energy Physics. - Chengqing Li, David Arroyo, Kwok-Tung Lo:
Breaking a Chaotic Cryptographic Scheme Based on Composition Maps. - Nedyalko Borisov, Shivnath Babu, Sandeep Uttamchandani, Ramani Routray, Aameek Singh:
Why Did My Query Slow Down? - Yourim Yoon, Yong-Hyuk Kim, Alberto Moraglio, Byung Ro Moon:
A Mathematical Unification of Geometric Crossovers Defined on Phenotype Space. - Yourim Yoon, Yong-Hyuk Kim, Alberto Moraglio, Byung Ro Moon:
Mathematical Interpretation between Genotype and Phenotype Spaces and Induced Geometric Crossovers. - Fedor V. Fomin, Serge Gaspers, Saket Saurabh, Stéphan Thomassé:
A Linear Vertex Kernel for Maximum Internal Spanning Tree. - Ulas Bagci, Li Bai:
Registration of Standardized Histological Images in Feature Space. - Ulas Bagci, Li Bai:
Fully Automatic 3D Reconstruction of Histological Images. - Ulas Bagci, Li Bai:
Parallel AdaBoost Algorithm for Gabor Wavelet Selection in Face Recognition. - Ulas Bagci, Engin Erzin:
Inter Genre Similarity Modelling For Automatic Music Genre Classification. - Walid Belkhir:
From Causal Semantics To Duration Timed Models. - Arno Pauly:
Infinite Oracle Queries in Type-2 Machines (Extended Abstract). - Alan Gibbons, Martyn Amos:
On filamental cellular automata. - Seyed Hamed Hassani, Satish Babu Korada, Rüdiger L. Urbanke:
The Compound Capacity of Polar Codes. - Zi-Ke Zhang, Tao Zhou:
Effective Personalized Recommendation in Collaborative Tagging Systems. - Carl Hewitt:
ActorScript(TM): Industrial strength integration of local and nonlocal concurrency for Client-cloud Computing. - Robert L. Broughton, Ian D. Coope, Peter Renaud, Rachael Tappenden:
A Barzilai-Borwein $l_1$-Regularized Least Squares Algorithm for Compressed Sensing. - Karim Khalil, Onur Ozan Koyluoglu, Hesham El Gamal, Moustafa Youssef:
Opportunistic Secrecy with a Strict Delay Constraint. - Mustapha Ouladsine, Gérard Bloch, Xavier Dovifaaz:
Neural Modeling and Control of Diesel Engine with Pollution Constraints. - Tor Helleseth, Alexander Kholosha:
New Binomial Bent Function over the Finite Fields of Odd Characteristic. - Itzhak Tamo, Moshe Schwartz:
Correcting Limited-Magnitude Errors in the Rank-Modulation Scheme. - Matteo Dell'Amico, Pietro Michiardi, Yves Roudier:
Measuring Password Strength: An Empirical Analysis. - Marcin Jurdzinski, Ashutosh Trivedi:
Reachability-time games on timed automata. - Martin Klein, Michael L. Nelson:
Investigating the Change of Web Pages' Titles Over Time. - Scott A. Turner, Manuel A. Pérez-Quiñones:
Exploring Peer Review in the Computer Science Classroom. - Salim Y. El Rouayheb, Emina Soljanin, Alexander Sprintson:
Secure Network Coding for Wiretap Networks of Type II. - Daniel Bruce, Chính T. Hoàng, Joe Sawada:
A certifying algorithm for 3-colorability of P5-free graphs. - Jaroslaw Byrka, Andreas Karrenbauer, Laura Sanità:
The interval constrained 3-coloring problem. - David L. Donoho, Arian Maleki, Andrea Montanari:
Message Passing Algorithms for Compressed Sensing. - Yonina C. Eldar, Volker Pohl:
Recovering Signals from Lowpass Data. - Yoo Chung, Dongman Lee:
Web of Lossy Adapters for Interface Interoperability: An Algorithm and NP-completeness of Minimization. - Jean-François Monin, Cristian Ene, Michaël Périn:
Gentzen-Prawitz Natural Deduction as a Teaching Tool. - Mark Grundland, Jirí Patera, Zuzana Masáková, Neil A. Dodgson
:
Image Sampling with Quasicrystals. - Venkatesh Ramaiyan, Anurag Kumar, Eitan Altman:
Optimal Routing and Power Control for a Single Cell, Dense, Ad Hoc Wireless Network. - Reid Andersen, Uriel Feige:
Interchanging distance and capacity in probabilistic mappings. - Jérôme Gauthier, Laurent Duval, Jean-Christophe Pesquet:
Optimization of Synthesis Oversampled Complex Filter Banks. - Mihailo Stojnic:
Various thresholds for ℓ1-optimization in compressed sensing. - Mihailo Stojnic:
Block-length dependent thresholds in block-sparse compressed sensing. - Andrei M. Sukhov, T. G. Sultanov, M. V. Strizhov, A. P. Platonov:
Throughput metrics and packet delay in TCP/IP networks. - Moritz Hardt, Kunal Talwar:
On the Geometry of Differential Privacy. - Katia Jaffrès-Runser, Jean-Marie Gorce, Cristina Comaniciu:
A multiobjective Tabu framework for the optimization and evaluation of wireless systems. - Vikraman Arvind, Pushkar S. Joglekar, Srikanth Srinivasan:
On Lower Bounds for Constant Width Arithmetic Circuits. - Stéphanie Léon:
Un système modulaire d'acquisition automatique de traductions à partir du Web. - Ayman Khalil, Matthieu Crussière, Jean-François Hélard:
Cross-layer Resource Allocation Scheme for Multi-band High Rate UWB Systems. - Éric Sopena, Jiaojiao Wu:
Incidence coloring of the Cartesian product of two cycles. - Colin Stirling:
Decidability of higher-order matching. - Thomas Guyet, Rene Quiniou, Wei Wang, Marie-Odile Cordier:
Self-adaptive web intrusion detection system. - C. Ravindranath Chowdary, P. Sreenivasa Kumar:
USUM: Update Summary Generation System. - Takao Namiki, Hiraku Kuroda, Shunsuke Naruse:
Experimental DML over digital repositories in Japan. - Julie Greensmith, Uwe Aickelin:
Artificial Dendritic Cells: Multi-faceted Perspectives. - Rubén Cuevas, Nikolaos Laoutaris, Xiaoyuan Yang, Georgos Siganos, Pablo Rodriguez:
Deep Diving into BitTorrent Locality. - André Luiz Barbosa:
P != NP Proof. - Shihuan Liu, Lei Ying, R. Srikant:
Throughput-Optimal Opportunistic Scheduling in the Presence of Flow-Level Dynamics. - Wenguang Wang, Wenguang Yu, Qun Li, Weiping Wang, Xichun Liu:
Service-oriented high level architecture. - Aleksandrs Slivkins:
Contextual Bandits with Similarity Information. - Vikraman Arvind, Pushkar S. Joglekar, Srikanth Srinivasan:
Arithmetic Circuits and the Hadamard Product of Polynomials. - Omar Mehanna, Ahmed K. Sultan, Hesham El Gamal:
Cognitive MAC Protocols for General Primary Network Models. - Derek Groen, Stefan Harfst, Simon Portegies Zwart:
The Living Application: a Self-Organising System for Complex Grid Tasks. - Syed Ishtiaque Ahmed, Masud Hasan, Md. Ariful Islam:
Cutting a Convex Polyhedron Out of a Sphere. - Amitabh Saxena:
A Secure Wireless Routing Protocol Using Enhanced Chain Signatures. - Kurt Ammon:
Beyond Turing Machines. - Miroslaw Truszczynski, Stefan Woltran:
Relativized hyperequivalence of logic programs for modular programming. - Xi Chen, Shang-Hua Teng:
Spending is not Easier than Trading: On the Computational Equivalence of Fisher and Arrow-Debreu Equilibria. - Gagan Goel, Sreenivas Gollapudi, Kamesh Munagala:
Budget Constrained Auctions with Heterogeneous Items. - Victor Yodaiken:
Primitive Recursion and State Machines. - Renuka Kandregula:
The Basic Discrete Hilbert Transform with an Information Hiding Application. - Vitaliy Kurlin, Alexei Lisitsa, Igor Potapov, Rafiq Saleh:
On Descriptional Complexity of the Planarity Problem for Gauss Words. - Maria Bras-Amorós, Klara Stokes:
The semigroup of combinatorial configurations. - Tony T. Lee, Lin Dai:
Buffered Aloha with K-Exponential Backoff -- Part I: Stability and Throughput Analysis. - Lin Dai, Tony T. Lee:
Buffered Aloha with K-Exponential Backoff -- Part II: Delay Analysis. - Berndt M. Gammel, Stefan Mangard:
On the Duality of Probing and Fault Attacks. - Anuj Dawar, Stephan Kreutzer:
Domination Problems in Nowhere-Dense Classes of Graphs. - Pascal Caron, Marianne Flouret:
Algorithms for Glushkov K-graphs. - Leah Epstein, Elena Kleiman, Julián Mestre:
Parametric packing of selfish items and the subset sum algorithm. - Krzysztof R. Apt, Frank S. de Boer, Ernst-Rüdiger Olderog:
Modular Verification of Recursive Programs. - Damian Eads, Edward Rosten, David P. Helmbold:
Learning Object Location Predictors with Boosting and Grammar-Guided Feature Extraction. - Yossi Azar, Benjamin E. Birnbaum, L. Elisa Celis, Nikhil R. Devanur, Yuval Peres:
Convergence of Local Dynamics to Balanced Outcomes in Exchange Networks. - Miao Song:
Dynamic Deformation of Uniform Elastic Two-Layer Objects. - Yoram Bachrach, Edith Elkind, Reshef Meir, Dmitrii V. Pasechnik, Michael Zuckerman, Jörg Rothe, Jeffrey S. Rosenschein:
The Cost of Stability in Coalitional Games. - Christopher M. Frenz, Steve Peters, Wilson Julien:
Evolution of Digital Logic Functionality via a Genetic Algorithm. - Martin Lévesque, Halima Elbiaze:
Graphical Probabilistic Routing Model for OBS Networks with Realistic Traffic Scenario. - Andrei M. Sukhov, Natalia Yu. Kuznetsova:
What type of distribution for packet delay in a global network should be used in the control theory? - Natasa Zivic:
Strategies and performances of Soft Input Decryption. - Nikos Tzevelekos:
Full abstraction for nominal general references. - Gregory Z. Gutin, Eun Jung Kim, Michael Lampis, Valia Mitsou:
Vertex Cover Problem Parameterized Above and Below Tight Bounds. - Gilberto de Paiva:
Pattern Recognition Theory of Mind. - Igor Gutman, Doron Ezri, Dov Wulich:
Grassmannian Beamforming for MIMO-OFDM Systems with Frequency and Spatially Correlated Channels Using Huffman Coding. - Zhaohua Luo:
Clone Theory and Algebraic Logic. - Janusz A. Brzozowski:
Quotient Complexity of Regular Languages. 17-28 - John Jack, Andrei Paun:
The Nondeterministic Waiting Time Algorithm: A Review. 29-46 - York Sure:
Fact Sheet on Semantic Web. - Gregory Z. Gutin, Eun Jung Kim, Stefan Szeider, Anders Yeo:
Solving MAX-2-SAT Above a Tight Lower Bound. - Elena V. Pribavkina:
Slowly synchronizing automata with zero and incomplete sets. - Christian Vecchiola, Xingchen Chu, Rajkumar Buyya:
Aneka: A Software Platform for .NET-based Cloud Computing. - Keiko Nakata, Masahito Hasegawa:
Small-step and big-step semantics for call-by-need. - Athina P. Petropulu, Yao Yu, H. Vincent Poor:
Distributed MIMO radar using compressive sampling. - (Withdrawn) Unsupervised and Non Parametric Iterative Soft Bit Error Rate Estimation for Any Communications System.
- Yao Yu, Athina P. Petropulu, H. Vincent Poor:
Compressive Sensing for MIMO Radar. - Asif-ul Haque, Paul Ginsparg:
Positional Effects on Citation and Readership in arXiv. - Arun Kumar, Nitesh Saxena, Ersin Uzun:
Alice Meets Bob: A Comparative Usability Study of Wireless Device Pairing Methods for a "Two-User" Setting. - Christel Baier, Nathalie Bertrand
, Marcus Größer:
Probabilistic Automata over Infinite Words: Expressiveness, Efficiency, and Decidability. 3-16 - Lance Fortnow, Joshua A. Grochow:
Complexity Classes of Equivalence Problems Revisited. - Robert L. Grossman, Yunhong Gu, Michal Sabala, Collin Bennett, Jonathan Seidman, Joe Mambretti:
The Open Cloud Testbed: A Wide Area Testbed for Cloud Computing Utilizing High Performance Network Services. - Amit Narayanan:
A Survey on BGP Issues and Solutions. - Oded Kafri:
The Distributions in Nature and Entropy Principle. - Kolar Purushothama Naveen, Anurag Kumar:
Tunable locally-optimal geographical forwarding in wireless sensor networks with sleep-wake cycling nodes. - Mukaddim Pathan, Rajkumar Buyya:
Architecture and Performance Models for QoS-Driven Effective Peering of Content Delivery Networks. - Liang Xiao, Larry J. Greenstein, Narayan B. Mandayam, Wade Trappe:
Fingerprints in the Ether: Using the Physical Layer for Wireless Authentication. - Rajkumar Buyya, Rajiv Ranjan, Rodrigo N. Calheiros:
Modeling and Simulation of Scalable Cloud Computing Environments and the CloudSim Toolkit: Challenges and Opportunities. - M. Vipin, K. R. Mohamed Imran:
Approximate mechanism for measuring stability of Internet link in aggregated Internet pipe. - Mark F. Flanagan, Enrico Paolini, Marco Chiani, Marc P. C. Fossorier:
Growth Rate of the Weight Distribution of Doubly-Generalized LDPC Codes: General Case and Efficient Evaluation. - Liang Xiao, Larry J. Greenstein, Narayan B. Mandayam, Wade Trappe:
MIMO-Assisted Channel-Based Authentication in Wireless Networks. - Liang Xiao, Larry J. Greenstein, Narayan B. Mandayam, Wade Trappe:
Using the Physical Layer for Wireless Authentication in Time-Variant Channels. - Maurice Margenstern:
Iterative pushdown automata and hyperbolic contour words. - Muthiah Annamalai:
Ezhil: A Tamil Programming Language. - Yousra Ben Jemaa, Sana Khanfir:
Automatic local Gabor Features extraction for face recognition. - Rajesh Kumar Pateriya, J. L. Rana, S. C. Shrivastava, Jaideep Patel:
A Proposed Algorithm to improve security & Efficiency of SSL-TLS servers using Batch RSA decryption. - Lun Dong, Zhu Han, Athina P. Petropulu, H. Vincent Poor:
Cooperative Jamming for Wireless Physical Layer Security. - Hurlee Gonchigdanzan:
How much does a Hamiltonian cycle weigh? - Pavlos Kazakopoulos, Panayotis Mertikopoulos, Aris L. Moustakas, Giuseppe Caire:
Living at the Edge: A Large Deviations Approach to the Outage MIMO Capacity. - Terence Chan, Alex J. Grant, Doris Kern:
Existence of new inequalities for representable polymatroids. - Shai Haim, Toby Walsh:
Restart Strategy Selection using Machine Learning Techniques. - Shai Haim, Toby Walsh:
Online Search Cost Estimation for SAT Solvers. - Yi Li:
An Explicit Construction of Gauss-Jordan Elimination Matrix. - Fevzi Belli, Mutlu Beyazit
:
Mutation of Directed Graphs -- Corresponding Regular Expressions and Complexity of Their Generation. 69-77 - Marco Almeida, Nelma Moreira
, Rogério Reis
:
Testing the Equivalence of Regular Languages. 47-57 - Hermann Gruber
, Markus Holzer
, Martin Kutrib
:
On Measuring Non-Recursive Trade-Offs. 141-150 - Galina Jirásková
, Alexander Okhotin
:
Nondeterministic State Complexity of Positional Addition. 151-161 - Marcello M. Bersani, Carlo A. Furia, Matteo Pradella, Matteo Rossi:
Integrated Modeling and Verification of Real-Time Systems through Multiple Paradigms. - M. Sakthi Balan
:
Serializing the Parallelism in Parallel Communicating Pushdown Automata Systems. 59-68 - Adrien Richard:
Negative circuits and sustained oscillations in asynchronous automata networks. - Franziska Biegler, Mark Daley, Ian McQuillan:
On the Shuffle Automaton Size for Words. 79-89 - Erzsébet Csuhaj-Varjú, György Vaszil:
On the Size Complexity of Non-Returning Context-Free PC Grammar Systems. 91-100 - Rudolf Freund, Andreas Klein, Martin Kutrib
:
On the Number of Membranes in Unary P Systems. 101-109 - Pierluigi Frisco, Oscar H. Ibarra:
On Languages Accepted by P/T Systems Composed of joins. 111-120 - Yuan Gao, Sheng Yu:
State Complexity Approximation. 121-130 - Florent Jacquemard, Michaël Rusinowitch:
Rewrite based Verification of XML Updates. - Viliam Geffert, Lubomíra Istonová:
Translation from Classical Two-Way Automata to Pebble Two-Way Automata. 131-140 - Martin Kutrib
, Andreas Malcher
:
Bounded Languages Meet Cellular Automata with Sparse Communication. 163-172 - Remco Loos
, Florin Manea, Victor Mitrana
:
Small Universal Accepting Networks of Evolutionary Processors with Filtered Connections. 173-182 - Tomás Masopust
, Alexander Meduna
:
Descriptional Complexity of Three-Nonterminal Scattered Context Grammars: An Improvement. 183-192 - Ralf Stiebe, Sherzod Turaev
:
Capacity Bounded Grammars and Petri Nets. 193-203 - Haipeng Zheng, Sanjeev R. Kulkarni, H. Vincent Poor:
Cooperative Training for Attribute-Distributed Data: Trade-off Between Data Transmission and Performance. - C.-A. Hsiao, H. Chen:
On Classification from Outlier View. - Anya Tafliovich, Eric C. R. Hehner:
Programming with Quantum Communication. - Oliver Johnson, Matthew Aldridge
, Robert J. Piechocki:
Interference alignment-based sum capacity bounds for random dense Gaussian interference networks. - Haipeng Zheng, Sanjeev R. Kulkarni, H. Vincent Poor:
Collaborative Training in Sensor Networks: A graphical model approach. - Shahar Dobzinski:
A Note on the Power of Truthful Approximation Mechanisms. - Subhash C. Kak:
Recursive Random Number Generator Using Prime Reciprocals. - Sean McPherson, Antonio Ortega:
Analysis of Internet Measurement Systems for Optimized Anomaly Detection System Design. - K. B. Nakshatrala, K. R. Rajagopal:
A numerical study of fluids with pressure dependent viscosity flowing through a rigid porous media. - Jürgen Dassow, Giovanni Pighizzini, Bianca Truthe:
Proceedings Eleventh International Workshop on Descriptional Complexity of Formal Systems, DCFS 2009, Magdeburg, Germany, July 6-9, 2009. EPTCS 3, 2009 [contents] - Robert Geisberger, Dennis Luxen, Sabine Neubauer, Peter Sanders, Lars Völker:
Fast Detour Computation for Ride Sharing. - Joaquim Borges, Cristina Fernández-Córdoba, Josep Rifà:
Propelinear structure of Z_{2k}-linear codes. - Alex Shkotin:
Program structure. - Tomoya Sakai:
Multiple pattern classification by sparse subspace decomposition. - Greg N. Frederickson, Barry Wittman:
Speedup in the Traveling Repairman Problem with Unit Time Windows. - Xiang He, Aylin Yener:
Providing Secrecy With Structured Codes: Tools and Applications to Two-User Gaussian Channels. - Divyanshu Vats, José M. F. Moura:
Recursive Estimation of Gauss-Markov Random Fields Indexed over 1-D Space. - Juan José Jaramillo, R. Srikant:
Optimal Scheduling for Fair Resource Allocation in Ad Hoc Networks with Elastic and Inelastic Traffic. - Gregory Z. Gutin, Eun Jung Kim, Matthias Mnich, Anders Yeo:
Ordinal Embedding Relaxations Parameterized Above Tight Lower Bound. - Muhammad Sohail, Abdur Rashid Khan:
Knowledge Elecitation for Factors Affecting Taskforce Productivity using a Questionnaire. - Eitan Altman, Francesco De Pellegrini, Lucile Sassatelli:
Dynamic control of Coding in Delay Tolerant Networks. - Ratnesh Kumar Jain, Ramveer S. Kasana, Suresh Jain:
Efficient Web Log Mining using Doubly Linked Tree. - Pranav Agrawal, Joy Kuri:
Key Distribution Scheme without Deployment Knowledge. - B. Narasimhan, S. Santhosh Baboo:
A Hop-by-Hop Congestion-Aware Routing Protocol for Heterogeneous Mobile Ad-hoc Networks. - Jian Li, Amol Deshpande, Samir Khuller:
On Computing Compression Trees for Data Collection in Sensor Networks. - H. S. Guruprasad, H. D. Maheshappa:
Dynamic Bandwidth Management in Distributed VoD based on the User Class Using Agents. - Pierre Lescanne:
Feasibility/Desirability Games for Normal Form Games, Choice Models and Evolutionary Games. - David Eppstein, Kevin A. Wortman:
Optimal Angular Resolution for Face-Symmetric Drawings. - Lee-Ad Gottlieb, Robert Krauthgamer:
A Nonlinear Approach to Dimension Reduction. - Yong Gao:
Treewidth of Erdös-Rényi Random Graphs, Random Intersection Graphs, and Scale-Free Random Graphs. - (Withdrawn) Network Coding for Delay Tolerant Networks with Byzantine Adversaries.
- Shan Zhou, Lei Ying:
On Delay Constrained Multicast Capacity of Large-Scale Mobile Ad-Hoc Networks. - Nanying Liang, Laurent Bougrain:
Decoding Finger Flexion using amplitude modulation from band-specific ECoG. - Georg Moser:
Proof Theory at Work: Complexity Analysis of Term Rewrite Systems. - Francesco Carraro, Sergio Fonte, Diego Turrini
, Maria Cristina De Sanctis, Livia Giacomini:
A preliminary XML-based search system for planetary data. - Pascal Koiran:
A hitting set construction, with application to arithmetic circuit lower bounds. - Peter de Blanc:
Convergence of Expected Utility for Universal AI. - Denis S. Krotov:
On weight distributions of perfect structures. - Denis S. Krotov:
On the binary codes with parameters of doubly-shortened 1-perfect codes. - Zhuo Li, Li-Juan Xing:
No More Perfect Codes: Classification of Perfect Quantum Codes. - Lasse Leskelä, Philippe Robert, Florian Simatos:
Stability Properties of Linear File-Sharing Networks. - Alessandro Pluchino, Andrea Rapisarda, Cesare Garofalo:
The Peter Principle Revisited: A Computational Study. - Yves Wiaux, Gilles Puy, Yannick Boursier, Pierre Vandergheynst:
Spread spectrum for imaging techniques in radio interferometry. - Filippo Radicchi, Santo Fortunato, Benjamin Markines, Alessandro Vespignani:
Diffusion of scientific credits and the ranking of scientists. - Nir Avni, Benjamin Weiss:
Generating Product Systems. - Jian-Guo Liu, Tao Zhou, Qiang Guo, Bing-Hong Wang, Yi-Cheng Zhang:
Effect of user tastes on personalized recommendation. - Jian-Guo Liu, Tao Zhou, Zhao-Guo Xuan, Hong-An Che, Bing-Hong Wang, Yi-Cheng Zhang:
Degree correlation effect of bipartite network on personalized recommendation. - Sergey Bravyi, Cristopher Moore, Alexander Russell:
Bounds on the quantum satisfibility threshold. - Rodrigo Costas, Thed N. van Leeuwen, Anthony F. J. van Raan:
Is scientific literature subject to a sell-by-date? A general methodology to analyze the durability of scientific documents. - Marcelo A. Montemurro, Damián H. Zanette:
Towards the quantification of the semantic information encoded in written language. - Jacob D. Biamonte:
The Computational Power of Minkowski Spacetime. - David M. South:
Data Preservation and Long Term Analysis in High Energy Physics. - Thomas Fischbacher, Hans Fangohr:
Continuum multi-physics modeling with scripting languages: the Nsim simulation compiler prototype for classical field theory. - Carlos Gershenson, David A. Rosenblueth:
Modeling self-organizing traffic lights with elementary cellular automata. - Zhaosong Lu, Yong Zhang:
An Augmented Lagrangian Approach for Sparse Principal Component Analysis. - K. R. Parthasarathy:
On the philosophy of Cramér-Rao-Bhattacharya Inequalities in Quantum Statistics. - Johannes Blümlein, D. J. Broadhurst, J. A. M. Vermaseren:
The Multiple Zeta Value Data Mine. - Richard H. Cyburt, Sam M. Austin, Timothy C. Beers, Alfredo Estrade, Ryan M. Ferguson, Alexander Sakharuk, Karl Smith, Scott Warren:
Managing Information for Sparsely Distributed Articles and Readers: The Virtual Journals of the Joint Institute for Nuclear Astrophysics (JINA). - Somphong Jitman, Patanee Udomkavanich:
The Gray Image of Codes over Finite Chain Rings. - S. George Djorgovski, Piet Hut, Steve McMillan, Enrico Vesperini, Robert A. Knop Jr., W. Farr, Matthew J. Graham:
Exploring the Use of Virtual Worlds as a Scientific Research Platform: The Meta-Institute for Computational Astrophysics (MICA). - Sergey Bravyi, Aram W. Harrow, Avinatan Hassidim:
Quantum algorithms for testing properties of distributions. - Megan Owen, J. Scott Provan:
A Fast Algorithm for Computing Geodesic Distances in Tree Space. - Dae San Kim:
Infinite Families of Recursive Formulas Generating Power Moments of Kloosterman Sums: Symplectic Case. - Dae San Kim:
Infinite Families of Recursive Formulas Generating Power Moments of Kloosterman Sums: O\^{+}(2n, 2r) Case. - Dae San Kim:
Simple Recursive Formulas Generating Power Moments of Kloosterman Sums. - Fabien Durand
, Michel Rigo:
Syndeticity and independent substitutions. - Narad Rampersad:
Further applications of a power series method for pattern avoidance. - Armen E. Allahverdyan, Aram Galstyan:
Community Detection with and without Prior Information. - Zhi-Qiang Jiang, Wei-Xing Zhou, Qun-Zhao Tan:
Online-offline activities and game-playing behaviors of avatars in a massive multiplayer online role-playing game. - John Panaretos, Chrisovaladis Malesios:
A population-modulated bibliometric measure with an application in the field of statistics. - Benoît Kloeckner:
Cutwidth and degeneracy of graphs. - Gábor Pataki, Mustafa Kemal Tural:
Basis Reduction, and the Complexity of Branch-and-Bound. - Jan A. Bergstra, Cornelis A. Middelburg:
Inversive Meadows and Divisive Meadows. - Farbod Shokrieh:
The monodromy pairing and discrete logarithm on the Jacobian of finite graphs. - Ruggero Carli, Fabio Fagnani, Paolo Frasca, Sandro Zampieri:
Gossip consensus algorithms via quantized communication. - Paul B. Slater:
Multiscale Network Reduction Methodologies: Bistochastic and Disparity Filtering of Human Migration Flows between 3, 000+ U. S. Counties. - Subhash C. Kak:
The Transactional Nature of Quantum Information.

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.