


default search action
CoRR, August 2012
- Mouti Hammami:
Maintenance de l'outil Wr2fdr de traduction de Wright vers CSP. - Junze Han, Xiang-Yang Li:
Network Agile Preference-Based Prefetching for Mobile Devices. - Sutanay Choudhury, Lawrence B. Holder, George Chin Jr., John Feo:
Large-scale continuous subgraph queries on streams. - Lawrence Ong:
Capacity Results for Two Classes of Three-Way Channels. - Sashank Dara:
Confidentiality without Encryption For Cloud Computational Privacy. - Ahmed Badr, Ashish Khisti, Wai-Tian Tan, John G. Apostolopoulos:
Streaming Codes for Channels with Burst and Isolated Erasures. - Dong-Wan Choi, Chin-Wan Chung, Yufei Tao:
A Scalable Algorithm for Maximizing Range Sum in Spatial Databases. - Ahmed M. Aly, Walid G. Aref, Mourad Ouzzani:
Spatial Queries with Two kNN Predicates. - Cheng Sheng, Nan Zhang, Yufei Tao, Xin Jin:
Optimal Algorithms for Crawling a Hidden Database in the Web. - Lu Qin, Jeffrey Xu Yu, Lijun Chang:
Diversifying Top-K Results. - Xin Cao, Lisi Chen, Gao Cong, Xiaokui Xiao:
Keyword-aware Optimal Route Search. - Bogdan Cautis, Evgeny Kharlamov:
Answering Queries using Views over Probabilistic XML: Complexity and Tractability. - Abhay Kumar Jha, Dan Suciu:
Probabilistic Databases with MarkoViews. - Konstantinos Mamouras, Sigal Oren, Lior Seeman, Lucja Kot, Johannes Gehrke:
The Complexity of Social Coordination. - Xiaofei Zhang, Lei Chen, Min Wang:
Efficient Multi-way Theta-Join Processing Using MapReduce. - Harold Lim, Herodotos Herodotou, Shivnath Babu:
Stubby: A Transformation-based Optimizer for MapReduce Workflows. - Zhuowei Bao, Susan B. Davidson, Tova Milo:
Labeling Workflow Views with Fine-Grained Dependencies. - Jaroslaw Szlichta, Parke Godfrey, Jarek Gryz:
Fundamentals of Order Dependencies. - Yu Cao, Chee-Yong Chan, Jie Li, Kian-Lee Tan:
Optimization of Analytic Window Functions. - Fabian Hueske, Mathias Peters, Matthias Sax, Astrid Rheinländer, Rico Bergmann, Aljoscha Krettek, Kostas Tzoumas:
Opening the Black Boxes in Data Flow Optimization. - Stephan Ewen, Kostas Tzoumas, Moritz Kaufmann, Volker Markl:
Spinning Fast Iterative Data Flows. - Svilen R. Mihaylov, Zachary G. Ives, Sudipto Guha:
REX: Recursive, Delta-Based Data-Centric Computation. - James Cheng, Zechao Shang, Hong Cheng, Haixun Wang, Jeffrey Xu Yu:
K-Reach: Who is in Your Small World. - Wenfei Fan, Xin Wang, Yinghui Wu:
Performance Guarantees for Distributed Reachability Queries. - Pirooz Chubak, Davood Rafiei:
Efficient Indexing and Querying over Syntactically Annotated Trees. - Ninghui Li, Wahbeh H. Qardaji, Dong Su, Jianneng Cao:
PrivBasis: Frequent Itemset Mining with Differential Privacy. - Ganzhao Yuan, Zhenjie Zhang, Marianne Winslett, Xiaokui Xiao, Yin Yang, Zhifeng Hao:
Low-Rank Mechanism: Optimizing Batch Queries under Differential Privacy. - Taeho Jung, Xiang-Yang Li:
Search Me If You Can: Privacy-preserving Location Query Service. - Denis Brechka:
Analysis of access in the Take-Grant model. - Stefan Kratsch, Pascal Schweitzer:
Graph Isomorphism for Graph Classes Characterized by two Forbidden Induced Subgraphs. - He Huang, Yu-e Sun, Xiang-Yang Li, Hongli Xu, Yousong Zhou, Liusheng Huang:
Truthful Auction Mechanism for Heterogeneous Spectrum Allocation in Wireless Networks. - Saida Aissi, Mohamed Salah Gouider:
Personalization in Geographic information systems: A survey. - Saida Aissi, Mohamed Salah Gouider:
Spatial and Spatio-Temporal Multidimensional Data Modelling: A Survey. - Othon Michail, Ioannis Chatzigiannakis, Paul G. Spirakis:
Naming and Counting in Anonymous Unknown Dynamic Networks. - (Withdrawn) Opportunistic Forwarding with Partial Centrality.
- Fabian Schuh, Andreas Schenk, Johannes B. Huber:
Matched Decoding for Punctured Convolutional Encoded Transmission Over ISI-Channels. - Asma Boudhief, Mohsen Maraoui, Mounir Zrigui:
Adaptation of pedagogical resources description standard (LOM) with the specificity of Arabic language. - Sándor P. Fekete:
The Complexity of MaxMin Length Triangulation. - Saida Aissi, Mohamed Salah Gouider:
Towards the Next Generation of Data Warehouse Personalization System: A Survey and a Comparative Study. - Jun Zhang, Zhenjie Zhang, Xiaokui Xiao, Yin Yang, Marianne Winslett:
Functional Mechanism: Regression Analysis under Differential Privacy. - Jianneng Cao, Panagiotis Karras:
Publishing Microdata with a Robust Privacy Guarantee. - Ziyu Guan, Xifeng Yan, Lance M. Kaplan:
Measuring Two-Event Structural Correlations on Graphs. - Jeffrey Jestes, Jeff M. Phillips, Feifei Li, Mingwang Tang:
Ranking Large Temporal Data. - Florian Funke, Alfons Kemper, Thomas Neumann
:
Compacting Transactional Data in Hybrid OLTP & OLAP Databases. - Alexander Hall, Olaf Bachmann, Robert Büssow, Silviu Ganceanu, Marc Nunkesser:
Processing a Trillion Cells per Mouse Click. - Danica Porobic, Ippokratis Pandis, Miguel Branco, Pinar Tözün, Anastasia Ailamaki:
OLTP on Hardware Islands. - Daniel Sheldon, Neal E. Young:
Hamming Approximation of NP Witnesses. - Antonio Munoz-Canavate, Pedro Hipola:
Electronic administration in Spain: from its beginnings to the present. - Stacy Patterson, Aaron J. Elmore, Faisal Nawab, Divyakant Agrawal, Amr El Abbadi:
Serializability, not Serial: Concurrency Control and Availability in Multi-Datacenter Datastores. - Alvin Cheung, Owen Arden, Samuel Madden, Andrew C. Myers:
Automatic Partitioning of Database Applications. - Caleb Chen Cao, Jieying She, Yongxin Tong, Lei Chen:
Whom to Ask? Jury Selection for Decision Making Tasks on Micro-blog Services. - Xiaochun Yang, Honglei Liu, Bin Wang:
ALAE: Accelerating Local Alignment with Affine Gap Exactly in Biosequence Databases. - K. Selçuk Candan, Rosaria Rossini, Maria Luisa Sapino, Xiaolan Wang:
sDTW: Computing DTW Distances using Locally Relevant Constraints based on Salient Feature Alignments. - Farhan Tauheed, Thomas Heinis, Felix Schürmann, Henry Markram, Anastasia Ailamaki:
SCOUT: Prefetching for Latent Feature Following Queries. - Kaibo Wang, Yin Huai, Rubao Lee, Fusheng Wang, Xiaodong Zhang, Joel H. Saltz:
Accelerating Pathology Image Data Cross-Comparison on CPU-GPU Hybrid Systems. - Jiexing Li, Arnd Christian König, Vivek R. Narasayya, Surajit Chaudhuri:
Robust Estimation of Resource Consumption for SQL Queries using Statistical Techniques. - Cosmin Bonchis, Gabriel Istrate:
A Parametric Worst-Case Approach to Fairness in TU-Cooperative Games. - Mahashweta Das, Saravanan Thirumuruganathan, Sihem Amer-Yahia, Gautam Das, Cong Yu:
Who Tags What? An Analysis Framework. - Haohan Zhu, George Kollios, Vassilis Athitsos:
A Generic Framework for Efficient and Effective Subsequence Retrieval. - Jens Dittrich, Jorge-Arnulfo Quiané-Ruiz, Stefan Richter, Stefan Schuh, Alekh Jindal, Jörg Schad:
Only Aggressive Elephants are Fast Elephants. - Rui Li, Shengjie Wang, Kevin Chen-Chuan Chang:
Multiple Location Profiling for Users and Relationships from Social Network and Content. - Woon-Hak Kang, Sang-Won Lee, Bongki Moon:
Flash-based Extended Cache for Higher Throughput and Faster Recovery. - Michael A. Bender, Martin Farach-Colton, Rob Johnson, Russell Kraner, Bradley C. Kuszmaul, Dzejla Medjedovic, Pablo Montes, Pradeep Shetty, Richard P. Spillane, Erez Zadok:
Don't Thrash: How to Cache Your Hash on Flash. - Robert Isele, Christian Bizer:
Learning Expressive Linkage Rules using Genetic Programming. - Yongxin Tong, Lei Chen, Yurong Cheng, Philip S. Yu:
Mining Frequent Itemsets over Uncertain Databases. - Christoph Lange, Till Mossakowski, Oliver Kutz, Christian Galinski, Michael Grüninger, Daniel Couto Vale:
The Distributed Ontology Language (DOL): Use Cases, Syntax, and Extensibility. - Simina Brânzei, Clara Forero, Kate Larson, Peter Bro Miltersen:
Equilibria of Chinese Auctions. - Jessica Chang, Harold N. Gabow, Samir Khuller:
A Model for Minimizing Active Processor Time. - Saptarshi Das, Indranil Pan, Khrist Sur, Shantanu Das:
Artificial Neural Network Based Prediction of Optimal Pseudo-Damping and Meta-Damping in Oscillatory Fractional Order Dynamical Systems. - Zahra Aminzare, Eduardo D. Sontag:
Logarithmic Lipschitz norms and diffusion-induced instability. - Mark A. Davenport, Deanna Needell, Michael B. Wakin:
Signal Space CoSaMP for Sparse Recovery with Redundant Dictionaries. - Amed Leiva-Mederos, José A. Senso, Sandor Dominguez-Velasco, Pedro Hipola:
An Automat for the Semantic Processing of Structured Information. - Julian Yarkony, Alexander Ihler, Charless C. Fowlkes:
Fast Planar Correlation Clustering for Image Segmentation. - Joan Feigenbaum, Michael Mitzenmacher, Georgios Zervas:
An Economic Analysis of User-Privacy Options in Ad-Supported Services. - Shaoli Liu, Yunji Chen, Tianshi Chen, Ling Li, Chao Lu:
Global Adaptive Routing Algorithm Without Additional Congestion Propagation Network. - Marko Savic, Milos Stojakovic:
Linear Time Algorithm for Optimal Feed-link Placement. - Andy Nguyen:
Solving Cyclic Longest Common Subsequence in Quadratic Time. - Shrutivandana Sharma, Demosthenis Teneketzis:
Local public good provisioning in networks: A Nash implementation mechanism. - Yun Jiang, Marcus Lim, Ashutosh Saxena:
Multidimensional Membership Mixture Models. - Esraa Alomari, Selvakumar Manickam, Brij B. Gupta, Shankar Karuppayah, Rafeef Alfaris:
Botnet-based Distributed Denial of Service (DDoS) Attacks on Web Servers: Classification and Art. - Zhili Chen, He Huang, Liusheng Huang:
True-MCSA: A Framework for Truthful Double Multi-Channel Spectrum Auctions. - Sergey Andreyev:
Fixed Interfaces, Adaptive Interfaces... What is next? Total movability - a new paradigm for the user interface. - Zhiping Jiang, Jizhong Zhao, Xiang-Yang Li, Jinsong Han, Wei Xi:
Rejecting the Attack: Source Authentication for Wi-Fi Management Frames using CSI Information. - Yun-Chol Jong:
Grey Power Models Based on Optimization of Initial Condition and Model Parameters. - Ju Sun, Yuqian Zhang, John Wright:
Efficient Point-to-Subspace Query in ℓ1 with Application to Robust Face Recognition. - Caijun Zhong, Himal A. Suraweera, Aiping Huang, Zhaoyang Zhang, Chau Yuen:
Outage Probability of Dual-Hop Multiple Antenna AF Relaying Systems with Interference. - Alice Miller, Patrick Prosser:
Diamond-free Degree Sequences. - Esa Hyytiä, Jörg Ott:
Criticality of Large Delay Tolerant Networks via Directed Continuum Percolation in Space-Time. - Ugo Dal Lago
, Simone Martini
:
On Constructor Rewrite Systems and the Lambda Calculus. - Shang Shang, Paul W. Cuff, Sanjeev R. Kulkarni, Pan Hui:
An Upper Bound on the Convergence Time for Distributed Binary Consensus. - Mária Ercsey-Ravasz, Zoltán Toroczkai:
Optimization hardness as transient chaos in an analog approach to constraint satisfaction. - Christopher Schwaab, Jeremy G. Siek:
Modular Type-Safety Proofs using Dependant Types. - Simon T. Powers, Jun He:
A hybrid artificial immune system and Self Organising Map for network intrusion detection. - Wen-Qi Duan:
A Constructive Algorithm to Prove P=NP. - Petteri Kaski, Mikko Koivisto, Janne H. Korhonen:
Fast Monotone Summation over Disjoint Sets. - Jing Yang, Stark C. Draper, Robert D. Nowak:
Learning the Interference Graph of a Wireless Network. - Lena Chekina, Dudu Mimran, Lior Rokach, Yuval Elovici, Bracha Shapira:
Detection of Deviations in Mobile Applications Network Behavior. - Anzar Ahmad, R. Gowri, S. C. Gupta:
Simulation Study For Performance Comparison in Hierarchical Network With CHG Approach in MANET. - Daniel Kharitonov:
Green Telecom Metrics in Perspective. - Ulrich Menne, Christian Raack, Roland Wessäly, Daniel Kharitonov:
Optimal Degree of Optical Circuit Switching in IP-over-WDM Networks. - Partha Pratim Ray:
Translation of Bengali Terms in Mobile Phones: a Simplified Approach Based on the Prescriptions of Conventional Accent Understand Ability. - Poulami Majumder, Partha Pratim Ray:
Hatch-Sens: a Theoretical Bio-Inspired Model to Monitor the Hatching of Plankton Culture in the Vicinity of Wireless Sensor Network. - (Withdrawn) Debugging Invariant Issues in Pseudo Embedded Program: an Analytical Approach.
- Partha Pratim Ray:
The green grid saga - a green initiative to data centers: a review. - Partha Pratim Ray, Ansuman Banerjee:
Debugging Memory Issues In Embedded Linux: A Case Study. - Foto N. Afrati, Dimitris Fotakis, Jeffrey D. Ullman:
Enumerating Subgraph Instances Using Map-Reduce. - XiaoHua Xu, Jiannong Cao, Xiang-Yang Li:
MLLS: Minimum Length Link Scheduling Under Physical Interference Model. - Wayes Tushar, Walid Saad, H. Vincent Poor, David B. Smith:
Economics of Electric Vehicle Charging: A Game Theoretic Approach. - Wei Gao, Zhi-Hua Zhou:
On the consistency of AUC Optimization. - Gregory Crosswhite:
Embracing divergence: a formalism for when your semiring is simply not complete, with applications in quantum simulation. - Yin Wang, Yuan He, Dapeng Cheng, Yunhao Liu, Xiang-Yang Li:
Triggercast: Enabling Wireless Collisions Constructive. - Frank Stephan, Jason Teutsch:
Things that can be made into themselves. - Mahnoosh Kholghi, Mohammad Reza Keyvanpour:
Comparative Evaluation of Data Stream Indexing Models. - Jizhong Zhao, Wei Xi, Jinsong Han, Shaojie Tang, Xiang-Yang Li, Yunhao Liu, Yihong Gong, Zehua Zhou:
Efficient and Secure Key Extraction using CSI without Chasing down Errors. - Hamed Hassanzadeh, Mohammad Reza Keyvanpour:
Semantic Web Requirements through Web Mining Techniques. - Diodato Ferraioli, Paolo Penna:
Imperfect best-response mechanisms. - Pith Xie:
Numerical Computations For Real Number System By Logical Calculus. - Bojan Marinkovic, Paola Glavan, Zoran Ognjanovic:
Description of the Chord Protocol using ASMs Formalism. - Manfred Kufleitner
, Pascal Weil:
On logical hierarchies within FO2-definable languages. - Éric Duchêne, Gabriel Renault:
Vertex Nim played on graphs. - Partha Pratim Ray:
Universal Numeric Segment Display for Indian Scheduled Languages: an Architectural View. - Partha Pratim Ray:
Web based e-learning in india: the cumulative views of different aspects. - Shang Shang, Pan Hui, Sanjeev R. Kulkarni, Paul W. Cuff:
Wisdom of the Crowd: Incorporating Social Influence in Recommendation Models. - Shang Shang, Sanjeev R. Kulkarni, Paul W. Cuff, Pan Hui:
A Random Walk Based Model Incorporating Social Information for Recommendations. - Michael Mitzenmacher, George Varghese:
Biff (Bloom Filter) Codes : Fast Error Correction for Large Data Sets. - Nilanjan Dey, Anamitra Bardhan Roy, Sayantan Dey:
A Novel Approach of Color Image Hiding using RGB Color planes and DWT. - Jorge Pedraza Arpasi:
On the control of abelian group codes with information group of prime order. - Guanhong Pei, Anil Kumar S. Vullikanti:
Efficient Algorithms for Maximum Link Scheduling in Distributed Computing Models with SINR Constraints. - Martin E. Dyer, Alan M. Frieze, Catherine S. Greenhill:
On the chromatic number of a random hypergraph. - Ting Hu, Jun Fan, Qiang Wu, Ding-Xuan Zhou:
Learning Theory Approach to Minimum Error Entropy Criterion. - Mutaz M. Al-Debei, Enas M. Al-Lozi:
Implementations of ICT Innovations: A Comparative Analysis in terms of Challenges between Developed and Developing Countries. - Enas M. Al-Lozi, Mutaz M. Al-Debei:
A Framework of Value Exchange and Role Playing in Web 2.0 WebSites. - Dima Jalal, Mutaz M. Al-Debei:
Portals and Task Innovation: A Theoretical Framework Founded on Business Intelligence Thinking. - Yaqin Zhou, Xiang-Yang Li, Min Liu, Zhongcheng Li:
Link Scheduling for Throughput Maximization in Multihop Wireless Networks Under Physical Interference. - Nader Ale Ebrahim, Shamsuddin Ahmed, Zahari Taha:
Establishing Virtual R&D Teams: Obliged Policy. - Andrew Clark, Linda Bushnell, Radha Poovendran:
A Supermodular Optimization Framework for Leader Selection under Link Noise in Linear Multi-Agent Systems. - Tanmay Bhattacharya, Nilanjan Dey, S. R. Bhadra Chaudhuri:
A Session based Multiple Image Hiding Technique using DWT and DCT. - Paolo Gasti, Gene Tsudik, Ersin Uzun, Lixia Zhang:
DoS and DDoS in Named-Data Networking. - Sergey V. Yakhontov:
NP=NL and, therefore, P=NP as long as the polynomial upper bound is explicitly known for each language A in NP. - Misha Denil, Nando de Freitas:
Recklessly Approximate Sparse Coding. - Hema Swetha Koppula, Rudhir Gupta, Ashutosh Saxena:
Human Activity Learning using Object Affordances from RGB-D Videos. - Riad Akrour
, Marc Schoenauer, Michèle Sebag:
APRIL: Active Preference-learning based Reinforcement Learning. - Nasif Muslim, Md. Tanvir Adnan, Mohammad Zahidul Kabir, Md. Humayun Kabir, Sheikh Mominul Islam:
Design and implementation of a digital clock showing digits in Bangla font using microcontroller AT89C4051. - Laurent Reynaud, Tinku Rasheed, Kandeepan Sithamparanathan:
An Integrated Aerial Telecommunications Network that Supports Emergency Traffic. - Laurent Reynaud, Salim Zaïmi, Yvon Gourhant:
Competitive Assessments for HAP Delivery of Mobile Services in Emerging Countries. - Shiyu Ji, Xiaojun Tong, Miao Zhang:
Image encryption schemes for JPEG and GIF formats based on 3D baker with compound chaotic sequence generator. - Georgios Pitsilis, Svein J. Knapskog:
Social Trust as a solution to address sparsity-inherent problems of Recommender systems. - Dirk Lewandowski:
Credibility in Web Search Engines. - Giuseppe Savaré, Giuseppe Toscani:
The concavity of Rènyi entropy power. - Zahra Aminzare:
Remarks on contractions of reaction-diffusion PDE's on weighted L^2 norms. - Christopher Rose, I. Saira Mian, Ruochen Song:
Timing Channels with Multiple Identical Quanta. - N. S. Bhuvaneswari, R. Praveena, R. Divya:
System identification and modeling for interacting and non-interacting tank systems using intelligent techniques. - Fabian Altenbach, Steven Corroy, Georg Böcherer, Rudolf Mathar:
Strategies for Distributed Sensor Selection Using Convex Optimization. - Georg Böcherer:
Optimal Non-Uniform Mapping for Probabilistic Shaping. - Jasper De Bock, Gert de Cooman:
Credal nets under epistemic irrelevance. - Bartlomiej Placzek:
Uncertainty-dependent data collection in vehicular sensor networks. - Vladimir M. Blinovsky, Minglai Cai:
Classical-Quantum Arbitrarily Varying Wiretap Channel. - Viet Tung Hoang, Ben Morris, Phillip Rogaway:
An Enciphering Scheme Based on a Card Shuffle. - Andrea Simonetto, Tamás Keviczky, Mikael Johansson:
A Regularized Saddle-Point Algorithm for Networked Optimization with Resource Allocation Constraints. - Paul Dütting, Felix A. Fischer, Pichayut Jirapinyo, John K. Lai, Benjamin Lubin, David C. Parkes:
Payment Rules through Discriminant-Based Classifiers. - Stamatina Thomaidou, Michalis Vazirgiannis, Kyriakos Liakopoulos:
Toward an Integrated Framework for Automated Development and Optimization of Online Advertising Campaigns. - Reza Farahbakhsh, Naser Movahhedinia:
Seamless Handover for IMS over Mobile-IPv6 Using Context Transfer. - Rkia Aouinatou, Mostafa Belkasmi:
An efficient classification in IBE Provide with an improvement of BB2 to an efficient Commutative Blinding scheme. - Neri Merhav, Wojciech Szpankowski:
Average redundancy of the Shannon code for Markov sources. - Corentin Briat, Emre A. Yavuz, Gunnar Karlsson:
A conservation-law-based modular fluid-flow model for network congestion modeling. - Foteini Alvanaki, Sebastian Michel, Aleksandar Stupar:
Building and Maintaining Halls of Fame over a Database. - Marek Cygan, Marcin Pilipczuk:
On fixed-parameter algorithms for Split Vertex Deletion. - Ping Li, Art B. Owen, Cun-Hui Zhang:
One Permutation Hashing for Efficient Search and Learning. - Julia Chuzhoy, Shi Li:
A Polylogarithimic Approximation Algorithm for Edge-Disjoint Paths with Congestion 2. - Raj Rao Nadakuditi, M. E. J. Newman:
Spectra of random graphs with arbitrary expected degrees. - Holger Petersen:
The Power of Centralized PC Systems of Pushdown Automata. - Negin Golrezaei, Alexandros G. Dimakis, Andreas F. Molisch:
Scaling Behaviors of Wireless Device-to-Device Communications with Distributed Caching. - Shafigh Parsazad, Ehsan Saboori, Amin Allahyar:
Data Selection for Semi-Supervised Learning. - Brian K. Butler, Paul H. Siegel:
Numerical Issues Affecting LDPC Error Floors. - Kent E. Morrison:
The multiplication game. - Jeff Burke, Paolo Gasti, Naveen Nathan, Gene Tsudik:
Securing Instrumented Environments over Content-Centric Networking: the Case of Lighting Control. - Denis Brechka:
Algorithm for searching bridges of specified types in the protection graph for Take-Grant protection model. - Xianwen Wang, Zhi Wang, Shenmeng Xu:
Tracing scientists' research trends realtimely. - Yi Fang, Jing Xu, Lin Wang, Guanrong Chen:
Performance of MIMO Relay DCSK-CD Systems over Nakagami Fading Channels. - Christian Sternagel:
A Locale for Minimal Bad Sequences. - Christian Sternagel:
Getting Started with Isabelle/jEdit. - Ignacio Gomez Portillo:
Building Cooperative Networks. - Megumi Kaneko, Khaldoun Al Agha:
Compressed Sensing based Protocol. - Aman Chadha, Bharatraaj Savardekar, Jay Padhya:
Analysis of a Modern Voice Morphing Approach using Gaussian Mixture Models for Laryngectomees. - Geetishree Mishra, Rajeshwari Hegde, K. S. Gurumurthy:
Deploying Health Monitoring ECU Towards Enhancing the Performance of In-Vehicle Network. - Cheng Chen, Kui Wu, Srinivasan Venkatesh, R. Kesav Bharadwaj:
The Best Answers? Think Twice: Online Detection of Commercial Campaigns in the CQA Forums. - Atish Das Sarma, Ashwin Lall, Danupon Nanongkai, Amitabh Trehan:
Dense Subgraphs on Dynamic Networks. - Renate A. Schmidt, Dmitry Tishkovsky:
Using Tableau to Decide Description Logics with Full Role Negation and Identity. - Amy Zhang, Nadia Fawaz, Stratis Ioannidis, Andrea Montanari:
Guess Who Rated This Movie: Identifying Users Through Subspace Clustering. - Robert T. Schweller, Michael Sherman:
Fuel Efficient Computation in Passive Self-Assembly. - Yan Shvartzshnaider, Maximilian Ott:
Design For Change: Information-Centric Architecture to Support Agile Disaster Response. - Zaafir Barahim, M. Razvi Doomun, Nazrana Joomun:
Low-Cost Bluetooth Mobile Positioning for Location-based Application. - Christian Sternagel, René Thiemann, Sarah Winkler, Harald Zankl:
CeTA - A Tool for Certified Termination Analysis. - K. Pavan Srinath, B. Sundar Rajan:
Improved Perfect Space-Time Block Codes. - K. Pavan Srinath, B. Sundar Rajan:
Fast-Decodable MIDO Codes with large Coding Gain. - Christian Sternagel, René Thiemann:
Certification extends Termination Techniques. - Christian Sternagel, René Thiemann:
A Relative Dependency Pair Framework. - Thomas Sternagel, René Thiemann, Harald Zankl, Christian Sternagel:
Recording Completion for Finding and Certifying Proofs in Equational Logic. - René Thiemann:
Towards the Certification of Complexity Proofs. - Jingchao Chen:
A Dynamic Phase Selection Strategy for Satisfiability Solvers. - Tomás Brázdil, Antonín Kucera, Petr Novotný:
Determinacy in Stochastic Games with Unbounded Payoff Functions. - Christoph Dittmann, Stephan Kreutzer, Alexandru I. Tomescu:
Graph Operations on Parity Games and Polynomial-Time Algorithms. - Piotr Krzysztof Skowron, Piotr Faliszewski, Arkadii M. Slinko:
Proportional Representation as Resource Allocation: Approximability Results. - Josphineleela Ramakrishnan, Ramakrishnan Malaisamy:
Performance Measurement and Method Analysis (PMMA) for Fingerprint Reconstruction. - Josphineleela Ramakrishnan, M. Ramakrishnan:
An Efficient Automatic Attendance System Using Fingerprint Reconstruction Technique. - Swaprava Nath
, Pankaj Dayama, Dinesh Garg, Y. Narahari, James Y. Zou:
Mechanism Design for Time Critical and Cost Critical Task Execution via Crowdsourcing. - Ou Wu:
Color Assessment and Transfer for Web Pages. - Serge Gaspers, Eun Jung Kim, Sebastian Ordyniak, Saket Saurabh, Stefan Szeider:
Don't Be Strict in Local Search! - Serge Gaspers, Mikko Koivisto, Mathieu Liedloff, Sebastian Ordyniak, Stefan Szeider:
On Finding Optimal Polytrees. - Bin Dai, A. J. Han Vinck, Zhuojun Zhuang, Yuan Luo:
Information-Theoretical Security for Several Models of Multiple-Access Channel. - Radeep B. H., Sanjay Singh:
Ownership Authentication Transfer Protocol for Ubiquitous Computing Devices. - Valentin Goranko, Paolo Turrini:
Non-cooperative games with preplay negotiations. - Abhijeet Pareek, Philipp Woelfel:
RMR-Efficient Randomized Abortable Mutual Exclusion. - Amir Noori:
On the Relation between Centrality Measures and Consensus Algorithms. - (Withdrawn) Hybrid systems modeling for gas transmission network.
- Perrine Pittet, Christophe Nicolle, Christophe Cruz:
Guidelines for a Dynamic Ontology - Integrating Tools of Evolution and Versioning in Ontology. - Valentin Goranko:
Transformations of normal form games by preplay offers for payments among players. - Leonid B. Litinskii, Boris V. Kryzhanovsky, Anatoly B. Fonarev:
Operator formalism for optical neural network based on the parametrical four-wave mixing process. - Xi Chen, Martin E. Dyer, Leslie Ann Goldberg, Mark Jerrum, Pinyan Lu, Colin McQuillan, David Richerby:
The complexity of approximating conservative counting CSPs. - Ilan Shomorony, Amir Salman Avestimehr, Himanshu Asnani, Tsachy Weissman:
Worst-Case Source for Distributed Compression with Quadratic Distortion. - Xiaohua Xu, Xiang-Yang Li, Shaojie Tang, XuFei Mao:
Distributed Scheduling for Real-Time Convergecast in Wireless Sensor Networks. - Tasha Frankie, Gordon F. Hughes, Kenneth Kreutz-Delgado:
Analysis of Trim Commands on Overprovisioning and Write Amplification in Solid State Drives. - Qinghuai Gao:
The Super Robustness of Maximum Likelihood Location Estimator of Exponential Power Distribution, when p < 1. - Peter Sarlin:
Self-Organizing Time Map: An Abstraction of Temporal Multivariate Patterns. - Qiang Qian, Songcan Chen:
Metric Learning across Heterogeneous Domains by Respectively Aligning Both Priors and Posteriors. - Guangxu Guo, Songcan Chen:
Margin Distribution Controlled Boosting. - Sahand Negahban, Benjamin I. P. Rubinstein, Jim Gemmell:
Scaling Multiple-Source Entity Resolution using Statistically Efficient Transfer Learning. - Qi Wang, Yue Zhou:
New Classes of Zero-Difference Balanced Functions. - Supreeth K. Rao, Arpitha Prasad B., Anushree R. Shetty, Chinmai, R. Bhakthavathsalam, Rajeshwari Hegde:
Stereo Acoustic Perception based on Real Time Video Acquisition for Navigational Assistance. - Mohammad Waris Abdullah, Nazar Waheed
:
Performance and Detection of M-ary Frequency Shift Keying in Triple Layer Wireless Sensor Network. - Raghu Anantharangachar, Srinivasan Ramani:
Semantic Web Techniques for Yellow Page Service Providers. - Poo Kuan Hoong, Ian K. T. Tan, Chee Yik Keong:
Bittorrent Network Traffic Forecasting With ARMA. - Mina Mishra, Vijay H. Mankar:
Message Embedded cipher using 2-D chaotic map. - Richard Perry:
Batch Spreadsheet for C Programmers. - Mahdi Aiash, Glenford E. Mapp, Aboubaker Lasebae:
A Survey on Authentication and Key Agreement Protocols in Heterogeneous Networks. - Jean-Louis Dessalles:
Algorithmic Simplicity and Relevance. - Probir Roy, Md. Mejbah Ul Alam, Nishita Das:
Heuristic based task scheduling in multiprocessor systems with genetic algorithm by choosing the eligible processor. - Yucel Altug, Aaron B. Wagner:
Moderate Deviations in Channel Coding. - Laxmi Choudhary, Bhawani Shankar Burdak:
Role of Ranking Algorithms for Information Retrieval. - Jiannan Wang, Tim Kraska, Michael J. Franklin, Jianhua Feng:
CrowdER: Crowdsourcing Entity Resolution. - Michele Dallachiesa, Besmira Nushi, Katsiaryna Mirylenka, Themis Palpanas:
Uncertain Time-Series Similarity: Return to the Basics. - Tamraparni Dasu, Ji Meng Loh:
Statistical Distortion: Consequences of Data Cleaning. - Willis Lang, Stavros Harizopoulos, Jignesh M. Patel, Mehul A. Shah, Dimitris Tsirogiannis:
Towards Energy-Efficient Database Cluster Design. - Frédéric Rodriguez:
Technical report: CSVM dictionaries. - Santiago Ontañón:
Experiments with Game Tree Search in Real-Time Strategy Games. - B. Thirumala Rao, L. S. S. Reddy:
Scheduling Data Intensive Workloads through Virtualization on MapReduce based Clouds. - Fahimeh Farahbod, Mahdi Eftekhari:
Comparison of different T-norm operators in classification problems. - Kai Yang, Xi Zhou:
MIDI-LAB, a Powerful Visual Basic Program for Creating MIDI Music. - Akshai Aggarwal, Savita Gandhi, Nirbhay Chaubey, Pathik Shah, Madhvi Sadhwani:
AODVSEC: A Novel Approach to Secure Ad Hoc on-Demand Distance Vector (AODV) Routing Protocol from Insider Attacks in MANETs. - Richard Perry:
An Internet Approach for Engineering Student Exercises. - Manuel Rodriguez Rodriguez, Bobby Philip, Zhen Wang, Mark A. Berrill:
Block-Relaxation Methods for 3D Constant-Coefficient Stencils on GPUs and Multicore CPUs. - Sarabjot Singh, Harpreet S. Dhillon, Jeffrey G. Andrews:
Offloading in Heterogeneous Networks: Modeling, Analysis and Design Insights. - Ravi Tandon:
Determination Of Optimal Number Of Clusters In Wireless Sensor Networks. - Sukhpal Singh:
An algorithm for improving the quality of compacted JPEG image by minimizes the blocking artifacts. - Krishnama Raju Kanchu, Subhash C. Kak:
Goldbach Ellipse Sequences for Cryptographic Applications. - Horia Vlad Balan, Konstantinos Psounis:
Tag Spotting at the Interference Range. - Alvin Cheung, Armando Solar-Lezama, Samuel Madden:
Inferring SQL Queries Using Program Synthesis. - Francis R. Bach:
Sharp analysis of low-rank kernel matrix approximations. - Abdelhakim Khlifi, Ridha Bouallegue:
Comparison between Performances of Channel Estimation Techniques for CP-LTE and ZP-LTE Downlink Systems. - Abdul Razaque, Khaled M. Elleithy:
Discovery of Malicious Attacks to Improve Mobile Collaborative Learning (MCL). - Ryul Kim, Myongson Sihn, Okhyon Song:
Upper Bounds on the Number of Codewords of Some Separating Codes. - Vo Tam Van, Chau Yuen, Jing (Tiffany) Li:
Non-homogeneous distributed storage systems. - A. Forootaninia, M. B. Ghaznavi-Ghoushchi:
An Improved Watchdog Technique Based On Power-Aware Hierarchical Design For Ids In Wireless Sensor Networks. - M. Rajalakshmi, P. Subashini:
A study on non-destructive method for detecting Toxin in pepper using Neural networks. - Abdul Kareem, Mohammad Fazle Azeem:
A Novel Fuzzy Logic Based Adaptive Supertwisting Sliding Mode Control Algorithm for Dynamic Uncertain Systems. - Qifeng Qiao, Peter A. Beling:
Inverse Reinforcement Learning with Gaussian Process. - Ismael Etxeberria Agiriano, Isidro Calvo, Liliana Montero, Ivan Alonso:
A DDS-Based Scalable and Reconfigurable Framework for Cyber-Physical Systems. - K. Ishaque Ashar, V. Prathyusha, Srikrishna Bhashyam, Andrew Thangaraj:
Outer Bounds for the Capacity Region of a Gaussian Two-way Relay Channel. - Murali Sridhar, Srikrishna Bhashyam:
On the Sum Rate of a 2 x 2 Interference Network. - Volker Diekert, Anca Muscholl:
On distributed monitoring of asynchronous systems. - V. P. Gladis Pushpa Rathi, S. Palani:
Brain tumor MRI image classification with feature selection and extraction using linear discriminant analysis. - Harro Wimmel, Karsten Wolf:
Applying CEGAR to the Petri Net State Equation. - Khaled Merit, Abdelazziz Ouamri:
Securing Speech in GSM Networks using DES with Random Permutation and Inversion Algorithm. - Michael J. Bell, Colin S. Gillespie
, Daniel Swan, Phillip W. Lord:
An approach to describing and analysing bulk biological annotation quality: a case study using UniProtKB. - Mohammad Havaei, Nandivada Krishna Prasad, Velleshala Sudheer:
Elimination of ISI Using Improved LMS Based Decision Feedback Equalizer. - Sanaz Moshirian, Soheil Ghadami, Mohammad Havaei:
Blind Channel Equalization. - Fereydoun Farrahi Moghaddam, Reza Farrahi Moghaddam, Mohamed Cheriet:
Curved Space Optimization: A Random Search based on General Relativity Theory. - Dmytro Taranovsky:
Space-Efficient Circuit Evaluation. - Philip N. Klein, Shay Mozes, Christian Sommer:
Structured Recursive Separator Decompositions for Planar Graphs in Linear Time. - Ernest K. Ryu, Sean Choi:
Stochastic Kronecker Graph on Vertex-Centric BSP. - Xizhong Zheng, Robert Rettinger:
Point-Separable Classes of Simple Computable Planar Curves. - (Withdrawn) Analysis of Statistical Hypothesis based Learning Mechanism for Faster Crawling.
- Ranjita Kumari Swain, Prafulla Kumar Behera, Durga Prasad Mohapatra:
Minimal TestCase Generation for Object-Oriented Software with State Charts. - Kush R. Varshney, Peter M. van de Ven:
Balancing Lifetime and Classification Accuracy of Wireless Sensor Networks. - Mariano Tepper, Guillermo Sapiro:
L1 Splines for Robust, Simple, and Fast Smoothing of Grid Data. - Sofya Raskhodnikova, Grigory Yaroslavtsev:
Learning pseudo-Boolean k-DNF and Submodular Functions. - M. Razvi Doomun, K. M. Sunjiv Soyjaudah:
LOTKIP: Low Overhead TKIP Optimization for Ad Hoc Wireless Network. - Weiyu Xu, Lifeng Lai:
Compressed Hypothesis Testing: to Mix or Not to Mix? - Marwah Almasri, Khaled M. Elleithy, Abdul Razaque:
Analytical Study of Pre-congestion notification (PCN) techniques. - Olaf Mersmann, Bernd Bischl, Heike Trautmann, Markus Wagner, Frank Neumann:
A Novel Feature-Based Approach to Characterize Algorithm Performance for the Traveling Salesman Problem. - M. Anas, Nadeem Javaid, Anzar Mahmood, S. M. Raza, U. Qasim, Zahoor Ali Khan:
Minimizing Electricity Theft using Smart Meters in AMI. - Taisuke Izumi, Tadashi Wadayama:
A New Direction for Counting Perfect Matchings. - Rafael E. Carrillo, Jason D. McEwen, Dimitri Van De Ville, Jean-Philippe Thiran, Yves Wiaux:
Sparsity Averaging for Compressive Imaging. - Nadeem Javaid, Abida Sharif, Anzar Mahmood, Saeed Ahmed, Umar Qasim, Zahoor Ali Khan:
Monitoring and Controlling Power using Zigbee Communications. - Qurat ul Ain, Amarah Ikram, Nadeem Javaid, Umar Qasim, Zahoor Ali Khan:
Modeling Propagation Characteristics for Arm-Motion in Wireless Body Area Sensor Networks. - Arindam Sarkar, J. K. Mandal:
Energy Efficient Wireless Communication using Genetic Algorithm Guided Faster Light Weight Digital Signature Algorithm (GADSA). - Arindam Sarkar, J. K. Mandal:
Multilayer Perceptron Guided Key Generation Through Mutation with Recursive Replacement in Wireless Communication (MLPKG). - A. A. Khan, Nadeem Javaid, U. Qasim, Z. Lu, Zahoor Ali Khan:
HSEP: Heterogeneity-aware Hierarchical Stable Election Protocol for WSNs. - Tianshi Chen, Ke Tang, Guoliang Chen, Xin Yao:
A Large Population Size Can Be Unhelpful in Evolutionary Algorithms. - Azizur Rahim, Nadeem Javaid, Muhammad Aslam, Ziaur Rahman, U. Qasim, Zahoor Ali Khan:
A Comprehensive Survey of MAC Protocols for Wireless Body Area Networks. - Maxim Zhukovskiy, Dmitry Vinogradov, Yuri Pritykin, Liudmila Ostroumova, Evgeny Grechnikov, Gleb Gusev, Pavel Serdyukov, Andrei M. Raigorodskii:
Empirical Validation of the Buckley--Osthus Model for the Web Host Graph: Degree and Edge Distributions. - Yossi Gilad, Amir Herzberg:
TCP Injections for Fun and Clogging. - Kenza Guenda, T. Aaron Gulliver, S. Arash Sheikholeslam:
Lexicodes over Rings. - Diederik Aerts, Jan Broekaert, Liane Gabora, Tomas Veloz:
The Guppy Effect as Interference. - Ahmad Lashgar, Amirali Baniasadi, Ahmad Khonsari:
Dynamic Warp Resizing in High-Performance SIMT. - Aziz Ur Rehman, Mansoor Mustafa, Nadeem Javaid, Umar Qasim, Zahoor Ali Khan:
Analytical Survey of Wearable Sensors. - Danish Mahmood, Nadeem Javaid, U. Qasim, Zahoor Ali Khan:
Routing Load of Route Calculation and Route Maintenance in Wireless Proactive Routing Protocols. - Clemens Grabmayer, Jan Rochel:
Expressibility in the Lambda Calculus with Letrec. - Parastoo Sadeghi, Mingchao Yu:
Instantly Decodable versus Random Linear Network Coding: A Comparative Framework for Throughput and Decoding Delay Performance. - Yi Fang, Pingping Chen, Lin Wang, Francis Chung-Ming Lau, Kai-Kit Wong:
Performance Analysis of Protograph-based LDPC Codes with Spatial Diversity. - K. Latif, M. Jaffar, Nadeem Javaid, M. N. Saqib, U. Qasim, Zahoor Ali Khan:
Performance Analysis of Hierarchical Routing Protocols in Wireless Sensor Networks. - M. S. Fareed, Nadeem Javaid, Mariam Akbar, Saniah Rehman, U. Qasim, Zahoor Ali Khan:
Optimal Number of Cluster Head Selection for Efficient Distribution of Sources in WSNs. - M. S. Fareed, Nadeem Javaid, S. Ahmed, Saniah Rehman, U. Qasim, Zahoor Ali Khan:
Analyzing Energy-efficiency and Route-selection of Multi-level Hierarchal Routing Protocols in WSNs. - T. N. Qureshi, Nadeem Javaid, M. Malik, U. Qasim, Zahoor Ali Khan:
On Performance Evaluation of Variants of DEEC in WSNs. - Zeeshan Abbas, Nadeem Javaid, Mahmood Ashraf Khan, S. Ahmed, U. Qasim, Zahoor Ali Khan:
Simulation Analysis of IEEE 802.15.4 Non-beacon Mode at Varying Data Rates. - Danish Mahmood, Nadeem Javaid, U. Qasim, Zahoor Ali Khan:
Routing Load of Route Discovery and Route Maintenance in Wireless Reactive Routing Protocols. - I. Israr, M. M. Yaqoob, Nadeem Javaid, U. Qasim, Zahoor Ali Khan:
Simulation Analysis of Medium Access Techniques. - M. M. Yaqoob, I. Israr, Nadeem Javaid, Mahmood Ashraf Khan, U. Qasim, Zahoor Ali Khan:
Transmission Delay of Multi-hop Heterogeneous Networks for Medical Applications. - Sebastian Szkoda, Zbigniew Koza, Mateusz Tykierko:
Accelerating cellular automata simulations using AVX and CUDA. - Sergio Grammatico, Gabriele Pannocchia:
Linear model predictive control based on polyhedral control Lyapunov functions: theory and applications. - Mauro Castelli, Luca Manzoni, Leonardo Vanneschi:
An Efficient Genetic Programming System with Geometric Semantic Operators and its Application to Human Oral Bioavailability Prediction. - Bas Luttik, Michel A. Reniers:
Proceedings Combined 19th International Workshop on Expressiveness in Concurrency and 9th Workshop on Structured Operational Semantics, EXPRESS/SOS 2012, Newcastle upon Tyne, UK, September 3, 2012. EPTCS 89, 2012 [contents] - Rishi Gupta, Piotr Indyk, Eric Price, Yaron Rachlin:
Compressive Sensing with Local Geometric Features. - (Withdrawn) Breaking Out The XML MisMatch Trap.
- Amal Khabou, James Demmel, Laura Grigori, Ming Gu:
LU factorization with panel rank revealing pivoting and its communication avoiding version. - Apostolos Syropoulos:
On Generalized Fuzzy Multisets and their Use in Computation. - Jan A. Bergstra:
Decision Taking for Selling Thread Startup. - Maria Luisa Bonet, Sam Buss, Jan Johannsen:
Improved Separations of Regular Resolution from Clause Learning Proof Systems. - Sreenivas Gollapudi, Samuel Ieong, Anitha Kannan:
Structured Query Reformulations in Commerce Search. - Nitish Upreti:
'CodeAliker' - Plagiarism Detection on the Cloud. - Bo Zhou, Qiankun Song:
Period Distribution of Inversive Pseudorandom Number Generators Over Galois Rings. - Enrico Formenti:
Proceedings 18th international workshop on Cellular Automata and Discrete Complex Systems and 3rd international symposium Journées Automates Cellulaires, AUTOMATA & JAC 2012, La Marana, Corsica, September 19-21, 2012. EPTCS 90, 2012 [contents] - Jianshu Chen, Ali H. Sayed:
Distributed Pareto Optimization via Diffusion Strategies. - S. Bogana, M. Helali, K. Paykan:
Error Probability of OSTB Codes and Capacity Analysis with Antenna Selection over Single-Antenna AF Relay Channels. - Eliahu Baransky, Gal Itzhak, Idan Shmuel, Noam Wagner, Eli Shoshan, Yonina C. Eldar:
A Sub-Nyquist Radar Prototype: Hardware and Algorithms. - Lovro Subelj, Marko Bajec:
Software systems through complex networks science: Review, analysis and applications. - Konrad Rawlik, Marc Toussaint, Sethu Vijayakumar:
Path Integral Control by Reproducing Kernel Hilbert Space Embedding. - Pedro C. Pinto, Patrick Thiran, Martin Vetterli:
Locating the Source of Diffusion in Large-Scale Networks. - Dennis Luxen, Dennis Schieferdecker:
Doing More for Less -- Cache-Aware Parallel Contraction Hierarchies Preprocessing. - Yanxiang Wang, Hari Sundaram, Lexing Xie:
Social Event Detection with Interaction Graph Modeling. - Marcel Wild:
Revisitin the enumeration of all models of a Boolean 2-CNF. - Patrick Traxler:
The Relative Exponential Time Complexity of Approximate Counting Satisfying Assignments. - Jan Olaf Blech:
Towards a Formalization of the OSGi Component Framework. - Christer Bäckström, Yue Chen, Peter Jonsson, Sebastian Ordyniak, Stefan Szeider:
The Complexity of Planning Revisited - A Parameterized Analysis. - Nachum Dershowitz:
The Generic Model of Computation. 59-71 - Patrick Jaillet, Xin Lu:
Near-Optimal Online Algorithms for Dynamic Resource Allocation Problems. - Muhammad Anshari, Mohammad Nabil Almunawar:
Empowered Customers in E-Health Business Process. - Tereza Klimosová, Daniel Král:
Hereditary properties of permutations are strongly testable. - Alex Citkin:
Characteristic formulas over intermediate logics. - Daniel S. Katz, Shantenu Jha, Manish Parashar, Omer F. Rana, Jon B. Weissman:
Survey and Analysis of Production Distributed Computing Infrastructures. - Jacek Sroka, Jan Hidders:
On Generating *-Sound Nets with Substitution. - Mikhail V. Kharinov:
Stable Segmentation of Digital Image. - Gerald Paul:
A GPU implementation of the Simulated Annealing Heuristic for the Quadratic Assignment Problem. - Xianwen Wang, Shenmeng Xu, Lian Peng, Zhi Wang, Chuanli Wang, Chunbo Zhang, Xianbing Wang:
Exploring scientists' working timetable: Do scientists often work overtime? - Vincent Labatut, Atay Ozgovde:
Topological measures for the analysis of wireless sensor networks. - Ahmet Faruk Coskun, Oguz Kucur:
Unified Analysis of Transmit Antenna Selection/Space-Time Block Coding with Receive Selection and Combining over Nakagami-m Fading Channels in the Presence of Feedback Errors. - Stephen A. Cook, Yuval Filmus, Dai Tri Man Le:
The Complexity of the Comparator Circuit Value Problem. - Monik Khare, Neal E. Young:
Caching with rental cost and nuking. - Robert R. Tucci:
Shannon Information Theory Without Shedding Tears Over Delta \& Epsilon Proofs or Typical Sequences. - Marcello M. Bonsangue
, Stefan Milius, Jurriaan Rot:
On the specification of operations on the rational behaviour of systems. 3-18 - Wojciech Czerwinski, Slawomir Lasota
:
Partially-commutative context-free languages. 35-48 - Maciej Gazda, Tim A. C. Willemse
:
Expressiveness and Completeness in Abstraction. 49-64 - Marco Giunti
, Catuscia Palamidessi
, Frank D. Valencia:
Hide and New in the Pi-Calculus. 65-79 - Rob J. van Glabbeek:
Musings on Encodings and Expressiveness. 81-98 - Piotr Hofman
, Patrick Totzke
:
Approximating Weak Bisimilarity of Basic Parallel Processes. 99-113 - Matias David Lee, Daniel Gebler, Pedro R. D'Argenio
:
Tree rules in probabilistic transition system specifications with negative and quantitative premises. 115-130 - Stephan Mennicke
:
An Operational Petri Net Semantics for the Join-Calculus. 131-147 - Maxim Strygin, Hayo Thielecke:
Operational semantics for signal handling. 149-163 - Giovanni Pighizzini:
Two-Way Finite Automata: Old and Recent Results. 3-20 - Ville Salo, Ilkka Törmä:
On Derivatives and Subpattern Orders of Countable Subshifts. 23-36 - Benjamin Hellouin de Menibus, Mathieu Sablik:
Entry times in automata with simple defect dynamics. 97-109 - Heather Betel, Pedro Paulo Balbi de Oliveira
, Paola Flocchini:
On the Parity Problem in One-Dimensional Cellular Automata. 110-126 - Thomas Fernique, Mathieu Sablik:
Local Rules for Computable Planar Tilings. 133-141 - Kenichi Morita
:
Universality of One-Dimensional Reversible and Number-Conserving Cellular Automata. 142-150 - Hiroshi Umeo, Kinuo Nishide, Keisuke Kubo:
A Simple Optimum-Time FSSP Algorithm for Multi-Dimensional Cellular Automata. 151-165 - Michael Vielhaber:
Computing by Temporal Order: Asynchronous Cellular Automata. 166-176 - Pablo Arrighi, Nicolas Schabanel, Guillaume Theyssier:
Intrinsic Simulations between Stochastic Cellular Automata. 208-224 - Anaël Grandjean, Gaétan Richard, Véronique Terrier:
Linear functional classes over cellular automata. 177-193 - Simon Wacker, Thomas Worsch:
Phase Space Invertible Asynchronous Cellular Automata. 236-254 - Gabriele Fici
, Francesca Fiorenzi:
Topological properties of cellular automata on trees. 255-266 - Mathilde Noual, Damien Regnault, Sylvain Sené:
Boolean networks synchronism sensitivity and XOR circulant networks convergence time. 37-52 - Martin Kutrib
, Andreas Malcher
:
Transductions Computed by One-Dimensional Cellular Automata. 194-207 - Emmanuel Jeandel, Nicolas Rolin:
Fixed Parameter Undecidability for Wang Tilesets. 69-85 - Alberto Dennunzio, Pietro di Lena
, Luciano Margara
:
Strictly Temporally Periodic Points in Cellular Automata. 225-235 - Katsunobu Imai, Takahiro Hatsuda, Victor Poupet, Kota Sato:
A Universal Semi-totalistic Cellular Automaton on Kite and Dart Penrose Tilings. 267-278 - Luca Bonomi, Li Xiong, Rui Chen, Benjamin C. M. Fung:
Privacy Preserving Record Linkage via grams Projections. - Hyonil Kim, Choe Changil:
A Method for Selecting Noun Sense using Co-occurrence Relation in English-Korean Translation. - K. S. Kuppusamy, Gnanasekaran Aghila:
Multidimensional Web Page Evaluation Model Using Segmentation And Annotations. - Pradeesha Ashok, Umair Azmi, Sathish Govindarajan:
Small Strong Epsilon Nets. - Marat V. Burnashev, Hirosuke Yamamoto:
On Reliability Function of Gaussian Channel with Noisy Feedback: Zero Transmission Rate. - Yuchong Hu, Patrick P. C. Lee, Kenneth W. Shum:
Analysis and Construction of Functional Regenerating Codes with Uncoded Repair for Distributed Storage Systems. - Sudarshan Nandy
, Partha Pratim Sarkar, Achintya Das:
Analysis of a Statistical Hypothesis Based Learning Mechanism for Faster crawling. - (Withdrawn) Adaptive Energy Efficient Communications for Hybrid Aerial-Terrestrial Systems.
- Sergey V. Yakhontov:
Time- and space-efficient evaluation of the complex exponential function using series expansion. - Joshua Brody, Kasper Green Larsen:
Adapt or Die: Polynomial Lower Bounds for Non-Adaptive Dynamic Data Structures. - Venkatesan T. Chakaravarthy, Naga Praveen Kumar Katta, Monu Kedia, Ramakrishnan Rajamony, Aruna Ramanan, Yogish Sabharwal:
Mapping Strategies for the PERCS Architecture. - (Withdrawn) Ordered {AND, OR}-Decomposition and Binary-Decision Diagram.
- (Withdrawn) Energy Aware Routing in Heterogeneous Multi-Hop Wireless Networks.
- Wojciech Mazurczyk, Krzysztof Szczypiorski, Bartosz Jankowski:
Towards Steganography Detection Through Network Traffic Visualisation. - Amr Rizk, Zdravko Bozakov, Markus Fidler:
H-Probe: Estimating Traffic Correlations from Sampling and Active Network Probing. - Vasileios Lampos
:
Detecting Events and Patterns in Large-Scale User Generated Textual Streams with Statistical Learning Methods. - Gérard Wagener, Alexandre Dulaunoy, Radu State:
Torinj : Automated Exploitation Malware Targeting Tor Users. - Matthew Battey, Abhishek Parakh:
Efficient Quasigroup Block Cipher for Sensor Networks. - Lu Yang, Wei Zhang:
On Achievable Degrees of Freedom for MIMO X Channels. - Georg Hager, Jan Treibig, Johannes Habich, Gerhard Wellein:
Exploring performance and power properties of modern multicore chips via simple machine models. - Daniel N. Osherson, Scott Weinstein:
Quantified preference logic. - Alvin Cheung, Armando Solar-Lezama, Samuel Madden:
Using Program Synthesis for Social Recommendations. - Vincent Gripon, Vitaly Skachek, Michael G. Rabbat:
Forwarding Without Repeating: Efficient Rumor Spreading in Bounded-Degree Graphs. - Fulvio Forni, Rodolphe Sepulchre:
A differential Lyapunov framework for contraction analysis. - Leonid A. Levin:
Enumerable Distributions, Randomness, Dependence. - Andrea Campagna, Alan Guo, Ronitt Rubinfeld:
Local reconstructors and tolerant testers for connectivity and diameter. - Martin Kasparick, Gerhard Wunder:
Wireless Network Design Under Service Constraints. - Zhili Chen, Liusheng Huang, Wei Yang, Peng Meng, Haibo Miao:
More than Word Frequencies: Authorship Attribution via Natural Frequency Zoned Word Distribution Analysis. - Andreas Schutt, Thibaut Feydy, Peter J. Stuckey:
Explaining Time-Table-Edge-Finding Propagation for the Cumulative Resource Constraint. - Shun Watanabe:
Expurgation Exponent of Leaked Information in Privacy Amplification for Binary Sources. - Ehsan Saboori, Majid Rafigh, Alireza Nooriyan:
Analyzing the Dual-Path Peer-to-Peer Anonymous Approach. - Lei Zhou, Wei Yu:
Uplink Multicell Processing with Limited Backhaul via Successive Interference Cancellation. - Huasen Wu, Chenxi Zhu, Richard J. La, Xin Liu, Youguang Zhang:
Fast Adaptive S-ALOHA Scheme for Event-driven M2M Communications (Journal version). - Arif Nurwidyantoro, Edi Winarko:
Parallelization of Maximum Entropy POS Tagging for Bahasa Indonesia with MapReduce. - Marek Cygan, MohammadTaghi Hajiaghayi, Samir Khuller:
LP Rounding for k-Centers with Non-uniform Hard Capacities. - Saygun Onay:
Polar Codes for Nonasymmetric Slepian-Wolf Coding. - Atish Das Sarma, Anisur Rahaman Molla, Gopal Pandurangan, Eli Upfal:
Fast Distributed PageRank Computation. - Trshant Bhat, Sanjay Singh:
Variance based Scheduling to Improve the QoS Performance at the Cell Edge. - Bin Li, Hui Shen, David Tse:
An Adaptive Successive Cancellation List Decoder for Polar Codes with Cyclic Redundancy Check. - Francisco G. Serpa, Adam M. Graves, Artjay Javier:
Statistical Common Author Networks (SCAN). - Hisham A. H. Al-Khazali, Mohamad R. Askari:
Defect Diagnosis in Rotors Systems by Vibrations Data Collectors Using Trending Software. - Daniel Reem:
On the computation of zone and double zone diagrams. - Walaa M. Abd-Elhafiez, Wajeb Gharibi:
Color Image Compression Algorithm Based on the DCT Blocks. - Ashokkumar Ramalingam, Prabhu Dorairaj, Saranya Ramamoorthy:
Personal Safety Triggering System on Android Mobile Platform. - Christian Meilicke, Ondrej Sváb-Zamazal, Cássia Trojahn dos Santos, Ernesto Jiménez-Ruiz, José-Luis Aguirre, Heiner Stuckenschmidt, Bernardo Cuenca Grau:
Evaluating Ontology Matching Systems on Large, Multilingual and Real-world Test Cases. - Fatma Kalbat, Arafat Al-Dweik:
Low Complexity Space-Frequency MIMO OFDM System for Double-Selective Fading Channels. - Ezio Bartocci
, Luca Bortolussi:
Proceedings First International Workshop on Hybrid Systems and Biology, HSB 2012, Newcastle Upon Tyne, UK, 3rd September 2012. EPTCS 92, 2012 [contents] - Jakob L. Andersen, Christoph Flamm, Daniel Merkle, Peter F. Stadler:
Inferring Chemical Reaction Patterns Using Rule Composition in Graph Grammars. - Erick Chastain, Adi Livnat, Christos H. Papadimitriou, Umesh V. Vazirani:
Multiplicative Updates in Coordination Games and the Theory of Evolution. - Ehsan Saboori, Shahriar Mohammadi:
Anonymous Communication in Peer-to-Peer Networks for providing more Privacy and Security. - Manas Gaur:
Software Security analysis, static and dynamic testing in java and C environment, a comparative study. - Minji Kim, Thierry Klein, Emina Soljanin, João Barros, Muriel Médard:
Modeling Network Coded TCP: Analysis of Throughput and Energy Cost. - Razvi Doomun, Jayramsingh Doma, Sundeep Tengur:
AES-CBC Software Execution Optimization. - Santhosh Kumar, Jean-François Chamberland, Henry D. Pfister:
First-Passage Time and Large-Deviation Analysis for Erasure Channels with Memory. - Matthew S. Nokleby, Waheed U. Bajwa, A. Robert Calderbank, Behnaam Aazhang:
Toward Resource-Optimal Consensus over the Wireless Medium. - Chin Keong Ho, Patrick Ho Wang Fung, Sumei Sun:
Carrier Frequency Offset Estimation for Two-Way Relaying: Optimal Preamble and Estimator Design. - Preetha Theresa Joy, K. Poulose Jacob:
Cache Replacement Policies for Cooperative Caching in Mobile Ad hoc Networks. - Grigoriev Evgeny:
Impedance mismatch is not an "Objects vs. Relations" problem. - Maxime Crochemore, Costas S. Iliopoulos, Tomasz Kociumaka, Marcin Kubica, Jakub Pachocki, Jakub Radoszewski, Wojciech Rytter, Wojciech Tyczynski, Tomasz Walen:
A Note on Efficient Computation of All Abelian Periods in a String. - Pietro Murano, Tanvi Sethi:
Anthropomorphic User Interface Feedback in a Sewing Context and Affordances. - Alexei Yu. Uteshev:
Analytical Solution for the Generalized Fermat-Torricelli Problem. - Nadia Polikarpova, Carlo A. Furia, Yu Pei, Yi Wei, Bertrand Meyer:
What Good Are Strong Specifications? - Bob Diertens:
Concurrent Models for Object Execution. - Pankaj K. Agarwal, Jirí Matousek, Micha Sharir:
On Range Searching with Semialgebraic Sets II. - Chengwen Xing, Zesong Fei, Shaodan Ma, Jingming Kuang, Yik-Chung Wu:
A Unified Linear MSE Minimization MIMO Beamforming Design Based on Quadratic Matrix Programming. - Margareta Ackerman, Simina Brânzei:
Research Quality, Fairness, and Authorship Order. - Seungahn Nah, Gregory D. Saxton:
Modeling the adoption and use of social media by nonprofit organizations. - Guodong Shi, Mikael Johansson, Karl Henrik Johansson:
How Agreement and Disagreement Evolve over Random Dynamic Networks. - Paul B. Slater:
Comparative Bi-stochastizations and Clusterings/Regionalizations of the 1995-2000 U. S. Intercounty Migration Network. - Mahsa Badami, Ali Hamzeh, Sattar Hashemi:
A Novel Strategy Selection Method for Multi-Objective Clustering Algorithms Using Game Theory. - Vivek Vishal, Sagar Gugwad, Sanjay Singh:
Modeling and Verification of Agent based Adaptive Traffic Signal using Symbolic Model Verifier. - V. Venkata Ramana, A. Rama Mohan Reddy, K. Chandra Sekaran:
Bio Inspired Approach to Secure Routing in MANETs. - Toshiro Kubota:
Contour Completion Around a Fixation Point. - Haimonti Dutta, William Chan, Deepak Shankargouda, Manoj Pooleery, Axinia Radeva, Kyle Rego, Boyi Xie, Rebecca J. Passonneau, Austin Lee, Barbara Taranto:
Leveraging Subjective Human Annotation for Clustering Historic Newspaper Articles. - Marina Drosou, Evaggelia Pitoura:
DisC Diversity: Result Diversification based on Dissimilarity and Coverage. - Marko Seslija, Jacquelien M. A. Scherpen, Arjan van der Schaft:
Explicit Simplicial Discretization of Distributed-Parameter Port-Hamiltonian Systems. - Brij B. Gupta, Ramesh Chandra Joshi, Manoj Misra:
Distributed Denial of Service Prevention Techniques. - Alon Gonen, Sivan Sabato, Shai Shalev-Shwartz:
Efficient Pool-Based Active Learning of Halfspaces. - Zadia Codabux-Rossan, M. Razvi Doomun:
AES CCMP Algorithm with N-Way Interleaved Cipher Block Chaining. - Lars Birkedal, Rasmus Ejlers Møgelberg, Jan Schwinghammer, Kristian Støvring:
First steps in synthetic guarded domain theory: step-indexing in the topos of trees. - Kai Chen, Kai Niu, Jiaru Lin:
Improved Successive Cancellation Decoding of Polar Codes. - Piyush Shrivastava:
Modeling and Control of CSTR using Model based Neural Network Predictive Control. - Muhammad Rafi, Sundus Hassan, Mohammad Shahid Shaikh:
Content-based Text Categorization using Wikitology. - Marc Lelarge, Hang Zhou:
Constant-Time Algorithms for Monomer-Dimer Systems on Bounded Degree Graphs. - Alexandre Benoît, Alin Bostan, Joris van der Hoeven:
Quasi-optimal multiplication of linear differential operators. - Tommy Nguyen, Boleslaw K. Szymanski:
Using Location-Based Social Networks to Validate Human Mobility and Relationships Models. - Luis Barba, Matias Korman, Stefan Langerman, Kunihiko Sadakane, Rodrigo I. Silveira:
Space-Time Trade-offs for Stack-Based Algorithms. - Vincent Christlein, Christian Riess, Johannes Jordan, Corinna Riess, Elli Angelopoulou:
An Evaluation of Popular Copy-Move Forgery Detection Approaches. - Minas Gjoka, Maciej Kurant, Athina Markopoulou:
2.5K-Graphs: from Sampling to Generation. - Qiong Liu:
A Survey of Recent View-based 3D Model Retrieval Methods. - Hisham A. H. Al-Khazali, Mohamad R. Askari:
Calculations of Frequency Response Functions (FRF) Using Computer Smart Office Software and Nyquist Plot under Gyroscopic Effect Rotation. - Qiang Qiu, Vishal M. Patel, Rama Chellappa:
Information-theoretic Dictionary Learning for Image Classification. - Bouaguel Waad, Ghazi Bel Mufti:
An improvement direction for filter selection techniques using information theory measures and quadratic optimization. - Mohammadreza Doostmohammadian, Usman A. Khan:
On the genericity properties in networked estimation: Topology design and sensor placement. - Liliana Borcea, Thomas Callaghan, George Papanicolaou:
Synthetic Aperture Radar Imaging and Motion Estimation via Robust Principle Component Analysis. - Jian Zhang, Shaohui Liu, Debin Zhao:
Improved Total Variation based Image Compressive Sensing Recovery by Nonlocal Regularization. - Jian Zhang, Ruiqin Xiong, Chen Zhao, Siwei Ma, Debin Zhao:
Exploiting Image Local And Nonlocal Consistency For Mixed Gaussian-Impulse Noise Removal. - Chris Thornton, Frank Hutter, Holger H. Hoos, Kevin Leyton-Brown:
Auto-WEKA: Automated Selection and Hyper-Parameter Optimization of Classification Algorithms. - Jian Zhang, Chen Zhao, Ruiqin Xiong, Siwei Ma, Debin Zhao:
Image Super-Resolution via Dual-Dictionary Learning And Sparse Representation. - Sergio Castillo-Perez, Joaquín García-Alfaro:
On the Use of Latency Graphs for the Construction of Tor Circuits. - Steven Meyer:
Adding Methodological Testing to Naur's Anti-formalism. - Pavlos S. Efraimidis, Remous-Aris Koutsiamanis:
On Money as a Means of Coordination between Network Packets. - Xavier Molinero, Fabián Riquelme, Maria J. Serna:
Social Influence as a Voting System: a Complexity Analysis of Parameters and Properties. - A. F. M. Sultanul Kabir, Razib Hayat Khan, Abul Ahsan Md. Mahmudul Haque, Mohammad Saiful Islam Mamun:
WiMAX or Wi-Fi: The Best Suited Candidate Technology for Building Wireless Access Infrastructure. - Sumanta Saha, Md. Safiqul Islam, Md. Sakhawat Hossen, Mohammad Saiful Islam Mamun:
A Novel Overlay IDS For Wireless Sensor Networks. - Mohammad Saiful Islam Mamun, A. F. M. Sultanul Kabir:
Hierarchical Design Based Intrusion Detection System For Wireless Ad hoc Network. - Francisco Heron de Carvalho Junior, Rafael Dueire Lins:
Haskell_#: Coordinating Functional Processes. - A. F. M. Sultanul Kabir, Mohammad Saiful Islam Mamun:
Graphical Query Builder in Opportunistic Sensor Networks to discover Sensor Information. - Jingyan Wang:
MultiG-Rank: Multiple graph regularized protein ranking. - Tzu-Han Chou, Stark C. Draper, Akbar M. Sayeed:
Secret Key Generation from Sparse Wireless Channels: Ergodic Capacity and Secrecy Outage. - Qi Chen, Hartmut Prautzsch:
General Midpoint Subdivision. - Tsvi Kopelowitz:
On-line Indexing for General Alphabets via Predecessor Queries on Subsets of an Ordered List. - Archana Vashisth, Iti Mathur, Nisheeth Joshi:
OntoAna: Domain Ontology for Human Anatomy. - Amy Fu, Parastoo Sadeghi, Muriel Médard:
Dynamic Rate Adaptation for Improved Throughput and Delay in Wireless Network Coded Broadcast. - Nima Taghipour, Daan Fierens, Guy Van den Broeck
, Jesse Davis, Hendrik Blockeel:
Lifted Variable Elimination: A Novel Operator and Completeness Results. - Igor G. Vladimirov, Ian R. Petersen:
State distributions and minimum relative entropy noise sequences in uncertain stochastic systems: the discrete time case. - Pritam Chanda, Aidong Zhang, Murali Ramanathan:
Algorithms for Efficient Mining of Statistically Significant Attribute Association Information. - Igor G. Vladimirov
, Ian R. Petersen:
Hardy-Schatten Norms of Systems, Output Energy Cumulants and Linear Quadro-Quartic Gaussian Control. - (Withdrawn) Joint-ViVo: Selecting and Weighting Visual Words Jointly for Bag-of-Features based Tissue Classification in Medical Images.
- Guanglei He, Zhihui Qin:
A New Algorithm for the Subtraction Games. - Kewen Liao, Hong Shen, Longkun Guo:
Constrained Fault-Tolerant Resource Allocation. - Vishnuvardhan Mannava, T. Ramesh:
Composite Design Pattern for Feature Oriented Service Injection and Composition of Web Services for Distributed Computing Systems with Service Oriented Architecture. - (Withdrawn) Discriminative Sparse Coding on Multi-Manifold for Data Representation and Classification.
- M. D. Sirajul Huque, C. Surekha, A. Kishore Kumar, Sri Latha:
Modelling Dead Rocking In Online Multiplayer Games. - (Withdrawn) Adaptive Graph via Multiple Kernel Learning for Nonnegative Matrix Factorization.
- Doug Bruce, Pras Pathmanathan, Jonathan P. Whiteley:
Modelling the effect of gap junctions on tissue-level cardiac electrophysiology. 1-15 - Romain Testylier, Thao Dang:
Analysis of parametric biological models with non-linear dynamics. 16-29 - Anastasis Georgoulas
, Allan Clark, Andrea Ocone, Stephen Gilmore, Guido Sanguinetti
:
A subsystems approach for parameter estimation of ODE models of hybrid systems. 30-41 - Nicolas Mobilia, Alexandre Donzé, Jean Marc Moulis
, Eric Fanchon:
A Model of the Cellular Iron Homeostasis Network Using Semi-Formal Methods for Parameter Space Exploration. 42-57 - Alberto Casagrande, Tommaso Dreossi, Carla Piazza
:
Hybrid Automata and ε-Analysis on a Neural Oscillator. 58-72 - Petr Dluhos
, Lubos Brim, David Safránek
:
On Expressing and Monitoring Oscillatory Dynamics. 73-87 - Vincent Noel
, Dima Grigoriev, Sergei Vakulenko, Ovidiu Radulescu
:
Hybrid models of the cell cycle molecular machinery. 88-105 - Giulio Caravagna
, Alex Graudenzi
, Marco Antoniotti, Giancarlo Mauri
, Alberto d'Onofrio
:
Effects of delayed immune-response in tumor immune-system interplay. 106-121 - Alexandre David, Dehui Du, Kim G. Larsen
, Axel Legay, Marius Mikucionis
, Danny Bøgsted Poulsen
, Sean Sedwards:
Statistical Model Checking for Stochastic Hybrid Systems. 122-136 - Loes Olde Loohuis, Andreas Witzel, Bud Mishra:
Towards Cancer Hybrid Automata. 137-151 - Pietro Liò
, Emanuela Merelli, Nicola Paoletti
:
Disease processes as hybrid dynamical systems. 152-166 - Vishal Vadgama, Bhavin Tanti, Chirag Modi, Nishant Doshi:
A novel approach for e-payment using virtual password system. - Ali Marandi, Mahdi Faghi Imani, Kavé Salamatian:
Optimization of Bloom Filter Parameters for Practical Bloom Filter Based Epidemic Forwarding in DTNs. - Igor S. Sergeev:
Upper bounds for the formula size of the majority function. - Saravanan Thirumuruganathan, Nan Zhang, Gautam Das:
Digging Deeper into Deep Web Databases by Breaking Through the Top-k Barrier. - Francisco Heron de Carvalho Junior, Rafael Dueire Lins:
Coordination Level Modeling and Analysis of Parallel Programs using Petri Nets. - Steve Kruba, Steven Baynes, Robert Hyer:
BPM, Agile, and Virtualization Combine to Create Effective Solutions. - Steve Kruba:
Significance of Rapid Solutions Development to Business Process Management. - (Withdrawn) Trace transform based method for color image domain identification.
- Nouredine Melab, Imen Chakroun, Mohand-Said Mezmaz, Daniel Tuyttens:
A GPU-accelerated Branch-and-Bound Algorithm for the Flow-Shop Scheduling Problem. - Amos Fiat, Anna R. Karlin, Elias Koutsoupias, Angelina Vidali:
Approaching Utopia: Strong Truthfulness and Externality-Resistant Mechanisms. - Manfred Droste, Heiko Vogler:
The Chomsky-Schützenberger Theorem for Quantitative Context-Free Languages. - Jay Gholap:
Performance Tuning Of J48 Algorithm For Prediction Of Soil Fertility. - Philipp Schaer, Daniel Hienert, Frank Sawitzki, Andias Wira-Alam, Thomas Lüke:
Dealing with Sparse Document and Topic Representations: Lab Report for CHiC 2012. - Zhifang Zhang:
Network Coding Based on Chinese Remainder Theorem. - Michael J. Gagen:
Using strong isomorphisms to construct game strategy spaces. - Stefano Rini, Carolin Huppert:
On the Capacity of the Cognitive Interference Channel with a Common Cognitive Message. - Marc Lelarge:
Coordination in Network Security Games: a Monotone Comparative Statics Approach. - Behrooz Kamary Aliabadi, Claude Berrou, Vincent Gripon, Xiaoran Jiang:
Learning sparse messages in networks of neural cliques. - Gowri Shankar Ramaswamy, F. Sagayaraj Francis:
Concept driven framework for Latent Table Discovery. - Denis Barthou
, Gilbert Grosdidier, Michael Kruse
, Olivier Pène, Claude Tadonki:
QIRAL: A High Level Language for Lattice QCD Code Generation. - Amir M. Ben-Amram, Samir Genaim:
On the Linear Ranking Problem for Integer Linear-Constraint Loops. - Morteza Mardani, Gonzalo Mateos, Georgios B. Giannakis:
Dynamic Anomalography: Tracking Network Anomalies via Sparsity and Low Rank. - Zhengzheng Xiang, Meixia Tao, Jianhua Mo, Xiaodong Wang:
Degrees of Freedom for MIMO Two-Way X Relay Channel. - Nishal Pradeepkumar Shah:
Recent Technological Advances in Natural Language Processing and Artificial Intelligence. - Arvind Yedla, Yung-Yih Jian, Phong S. Nguyen, Henry D. Pfister:
A Simple Proof of Threshold Saturation for Coupled Vector Recursions. - Eugene A. Maximov, Alexander P. Kurdyukov, Igor G. Vladimirov:
Anisotropic Norm Bounded Real Lemma for Linear Discrete Time Varying Systems. - Iztok Fister Jr., Tomaz Kosar, Marjan Mernik, Iztok Fister:
Upgrading EasyTime: from a textual to a visual language. - Ashraf Mohammed Iqbal, Abidalrahman Moh'd, Zahoor Ali Khan:
Semi-supervised Clustering Ensemble by Voting. - Paolo Boldi, Francesco Bonchi, Aristides Gionis, Tamir Tassa:
Injecting Uncertainty in Graphs for Identity Obfuscation. - Yingzhen Li, Ye Zhang:
Generating ordered list of Recommended Items: a Hybrid Recommender System of Microblog. - Xiaojing Shen, Pramod K. Varshney, Yunmin Zhu:
Robust Distributed Maximum Likelihood Estimation with Quantized Data. - Joseph M. Hellerstein, Christopher Ré, Florian Schoppmann, Daisy Zhe Wang, Eugene Fratkin, Aleksander Gorajek, Kee Siong Ng, Caleb Welton, Xixuan Feng, Kun Li, Arun Kumar:
The MADlib Analytics Library or MAD Skills, the SQL. - Avrilia Floratou, Nikhil Teletia, David J. DeWitt, Jignesh M. Patel, Donghui Zhang:
Can the Elephants Handle the NoSQL Onslaught? - Tilmann Rabl, Mohammad Sadoghi, Hans-Arno Jacobsen, Sergio Gómez-Villamor, Victor Muntés-Mulero, Serge Mankowskii:
Solving Big Data Challenges for Enterprise Application Performance Management. - Avraham Shinnar, David Cunningham, Benjamin Herta, Vijay A. Saraswat:
M3R: Increased performance for in-memory Hadoop jobs. - Philipp Rösch, Lars Dannecker, Gregor Hackenbroich, Franz Faerber:
A Storage Advisor for Hybrid-Store Databases. - Michal Switakowski, Peter A. Boncz, Marcin Zukowski:
From Cooperative Scans to Predictive Buffer Management. - George Lee, Jimmy Lin, Chuang Liu, Andrew Lorek, Dmitriy V. Ryaboy:
The Unified Logging Infrastructure for Data Analytics at Twitter. - Tomas Talius, Robin Dhamankar, Andrei Dumitrache, Hanuma Kodavalla:
Transaction Log Based Application Error Recovery and Point In-Time Query. - Andrew Lamb, Matt Fuller, Ramakrishna Varadarajan, Nga Tran, Ben Vandiver, Lyric Doshi, Chuck Bear:
The Vertica Analytic Database: C-Store 7 Years Later. - Yanpei Chen, Sara Alspaugh, Randy H. Katz:
Interactive Analytical Processing in Big Data Systems: A Cross-Industry Study of MapReduce Workloads. - Wang Lam, Lu Liu, STS Prasad, Anand Rajaraman, Zoheb Vacheri, AnHai Doan:
Muppet: MapReduce-Style Processing of Fast Data. - Gabriela Jacques-Silva, Bugra Gedik, Rohit Wagle, Kun-Lung Wu, Vibhore Kumar:
Building User-defined Runtime Adaptation Routines for Stream Processing Applications. - Junchen Jiang, Hongji Bao, Edward Y. Chang, Yuqian Li:
MOIST: A Scalable and Parallel Moving Object Indexer with School Tracking. - Dan R. K. Ports, Kevin Grittner:
Serializable Snapshot Isolation in PostgreSQL. - K. G. Preetha, A. Unnikrishnan, K. Poulose Jacob:
Performance improvement of multiple Connections in AODV with the concern of Node bandwidth. - Jesper Nederlof, Erik Jan van Leeuwen, Ruben van der Zwaan:
Reducing a Target Interval to a Few Exact Queries. - Enrico Siragusa, David Weese, Knut Reinert:
Fast and sensitive read mapping with approximate seeds and multiple backtracking. - Brian Macdonald
, Paulo Shakarian, Nicholas Howard, Geoffrey Moores:
Spreaders in the Network SIR Model: An Empirical Study. - Kyu-Young Whang, Tae-Seob Yun, Yeon-Mi Yeo, Il-Yeol Song, Hyuk-Yoon Kwon, In-Joong Kim:
ODYS: A Massively-Parallel Search Engine Using a DB-IR Tightly-Integrated Parallel DBMS. - Marcelo Serrano Zanetti, Emre Sarigöl, Ingo Scholtes, Claudio Juan Tessone, Frank Schweitzer:
A Quantitative Study of Social Organization in Open Source Software Communities. - Pol Blasco, Deniz Gündüz, Mischa Dohler:
A Learning Theoretic Approach to Energy Harvesting Communication System Optimization. - Ulrike Golas
, Thomas Soboll:
Proceedings Seventh ACCAT Workshop on Applied and Computational Category Theory, ACCAT 2012, Tallinn, Estonia, 1 April 2012. EPTCS 93, 2012 [contents] - M. Sreeraj, Sumam Mary Idicula:
An Online Character Recognition System to Convert Grantha Script to Malayalam. - Swaraj Bhat, Pradeep B. H., Keerthi S. Shetty, Sanjay Singh:
Formal Verification of Safety Properties for Ownership Authentication Transfer Protocol. - Aditi Gupta, Ponnurangam Kumaraguru, Ashish Sureka:
Characterizing Pedophile Conversations on the Internet using Online Grooming. - Natallia Kokash, António Ravara:
Proceedings 11th International Workshop on Foundations of Coordination Languages and Self Adaptation, FOCLASA 2012, Newcastle, U.K., September 8, 2012. EPTCS 91, 2012 [contents] - Kamesh Namuduri, Li Li, Mahadevan Gomathisankaran, Murali R. Varanasi:
The Chief Security Officer Problem. - Joshua C. Chang, Tom Chou:
Iterative graph cuts for image segmentation with a nonlinear statistical shape prior. - Li Li, Kamesh Namuduri, Shengli Fu:
Cooperative Communication Based on Random Beamforming Strategy in Wireless Sensor Networks. - Wentao Huang, Tracey Ho, Michael Langberg, Jörg Kliewer:
On secure network coding with uniform wiretap sets. - Yanchao Yang, Ganesh Sundaramoorthi:
Modeling Shape, Appearance and Self-Occlusions for Articulated Object Tracking. - Hamed Saghaei:
A Novel Architecture for Antenna Arrangement in Wireless Cellular CDMA Systems. - Qiang Qiu, Rama Chellappa:
A Unified Approach for Modeling and Recognition of Individual Actions and Group Activities. - Alexander Fish, Shamgar Gurevich, Ronny Hadani, Akbar M. Sayeed, Oded Schwartz:
Delay-Doppler Channel Estimation with Almost Linear Complexity. - Paul Cuff:
Distributed Channel Synthesis. - Feng Jiang, Jie Chen, A. Lee Swindlehurst:
Estimation in Phase-Shift and Forward Wireless Sensor Networks. - Roman Vetter, Norbert Stoop, Thomas Jenni, Falk K. Wittel, Hans J. Herrmann:
Subdivision Shell Elements with Anisotropic Growth. - Gabriel Keeble-Gagnère, Johan Nyström-Persson, Matthew I. Bellgard, Kenji Mizuguchi:
An Open Framework for Extensible Multi-Stage Bioinformatics Software. - Adamu Murtala Zungeru, Li-Minn Ang, S. R. S. Prabaharan, Kah Phooi Seng:
Radio Frequency Energy Harvesting and Management for Wireless Sensor Networks. - Marcin Pilipczuk, Michal Pilipczuk:
Finding a maximum induced degenerate subgraph faster than 2^n. - Hamid G. Bafghi, Babak Seyfe:
On The Secrecy of the Cognitive Interference Channel with Channel State. - Greg Ver Steeg, Aram Galstyan:
Inferring Predictive Links in Social Media Using Content Transfer. - Sruti Gan Chaudhuri, Krishnendu Mukhopadhyaya:
Leader Election and Gathering for Asynchronous Transparent Fat Robots without Chirality. - Wojciech M. Zabolotny:
Efficient transmission of measurement data from FPGA to embedded system via Ethernet link. - Srinivasan Krishnaswamy, Harish K. Pillai:
On Multisequences and their extensions. - Hicham Gueddah:
Introduction of the weight edition errors in the Levenshtein distance. - Mohammad Golbabaee, Simon Arberet, Pierre Vandergheynst:
Compressive Source Separation: Theory and Methods for Hyperspectral Imaging. - Ahmed El Shafie:
Optimal Spectrum Access for Cognitive Radios. - (Withdrawn) Optimal Planar Range Skyline Reporting with Linear Space in External Memory.
- Yufei Tao:
On Top-k Search and Range Reporting. - Elsayed Mohamed Elsayed Ahmed, M. I. Shehata, Hala A. A. El-Saka:
On Dynamical Cournot Game on a Graph. - Alexandre Bartel, Jacques Klein, Martin Monperrus, Kevin Allix, Yves Le Traon:
Improving Privacy on Android Smartphones Through In-Vivo Bytecode Instrumentation. - Alain Finkel, Jean Goubault-Larrecq:
Forward Analysis for WSTS, Part II: Complete WSTS. - Matús Medo:
Network-based information filtering algorithms: ranking and recommendation. - Loet Leydesdorff, Stasa Milojevic:
Scientometrics. - J. Slobbe, S. L. C. Verberkt:
Hacktivists: Cyberterrorists or Online Activists? - Michail N. Giannakos, Patrick Mikalef:
In the Face (book) of Social Learning. - Raphael Poss:
SL: a "quick and dirty" but working intermediate language for SVP systems. - Norbert Fogarasi, Kalman Tornai, János Levendovszky:
A novel Hopfield neural network approach for minimizing total weighted tardiness of jobs scheduled on identical machines. - Jeremiah Blocki, Avrim Blum, Anupam Datta, Or Sheffet:
Differentially Private Data Analysis of Social Networks via Restricted Sensitivity. - Tichakorn Wongpiromsarn, Nan Xiao, Keyou You, Kai Sim, Lihua Xie, Emilio Frazzoli, Daniela Rus:
Road Pricing for Spreading Peak Travel: Modeling and Design. - Joakim Bjørk, Dave Clarke, Einar Broch Johnsen, Olaf Owe
:
A Type-Safe Model of Adaptive Object Groups. 1-15 - Minas Charalambides
, Peter Dinges, Gul Agha:
Parameterized Concurrent Multi-Party Session Types. 16-30 - Gabriel Ciobanu
, Ross Horne
:
A Provenance Tracking Model for Data Updates. 31-44 - M. Usman Iftikhar, Danny Weyns
:
A Case Study on Formal Verification of Self-Adaptive Behaviors in a Decentralized System. 45-62 - Janusz A. Brzozowski, Baiyu Li:
Syntactic Complexity of R- and J-Trivial Regular Languages. - Oner Orhan, Deniz Gündüz, Elza Erkip:
Throughput Maximization for an Energy Harvesting Communication System with Processing Cost. - Yin Sun, Can Emre Koksal, Ness B. Shroff:
Capacity of Compound MIMO Channels with Additive Uncertainty. - Shalini Gupta, Avdhesh Gupta, Meena Sachdeva:
SOA Framework for Integrated Business Value Chain Actions. - Francis Maes, David Lupien St-Pierre, Damien Ernst:
Monte Carlo Search Algorithm Discovery for One Player Games. - Yoshiyuki Kabashima, Mikko Vehkaperä, Saikat Chatterjee:
Typical l1-recovery limit of sparse vectors represented by concatenations of random orthogonal matrices. - Willi-Hans Steeb, Yorick Hardy:
Hamilton Operators, Discrete Symmetries, Brute Force and SymbolicC++. - Charles Morisset:
Implementing Access Control Markov Decision Processes with GLPK/GMPL. - (Withdrawn) Optimal Charging of Electric Vehicles in Smart Grid: Characterization and Valley-Filling Algorithms.
- Surat Teerapittayanon, Kerim Fouli, Muriel Médard, Marie-José Montpetit, Xiaomeng Shi, Ivan Seskar, Abhimanyu Gosain:
Network Coding as a WiMAX Link Reliability Mechanism. - Tobias Jung, Louis Wehenkel, Damien Ernst, Francis Maes:
Optimized Look-Ahead Tree Policies: A Bridge Between Look-Ahead Tree Policies and Direct Policy Search. - Sibi Raj B. Pillai, Bikash Kumar Dey, Yash Deshpande, Krishnamoorthy Iyer:
Power Controlled Adaptive Sum-Capacity of Fading MACs with Distributed CSI. - Jae Won Yoo, Tie Liu, Shlomo Shamai, Chao Tian:
Worst-Case Expected-Capacity Loss of Slow-Fading Channels. - Husnabad Venkateswara Reddy, S. Viswanadha Raju, B. Ramasubba Reddy:
Comparing N-Node Set Importance Representative results with Node Importance Representative results for Categorical Clustering: An exploratory study. - Firouz Abdullah Al-Wassai, N. V. Kalyankar:
The Segmentation Fusion Method On10 Multi-Sensors. - Lewis Tseng, Nitin H. Vaidya:
Parameter-independent Iterative Approximate Byzantine Consensus. - Piotr J. Flatau:
User Manual for the Complex Conjugate Gradient Methods Library CCGPAK 2.0. - Sonia Jahid, Nikita Borisov:
PIRATTE: Proxy-based Immediate Revocation of ATTribute-based Encryption. - Shaochuan Wu, Michael G. Rabbat:
Broadcast Gossip Algorithms for Consensus on Strongly Connected Digraphs. - Dushyantha A. Basnayaka, Peter J. Smith
, Philippa A. Martin:
The Effect of Macrodiversity on the Performance of Maximal Ratio Combining in Flat Rayleigh Fading. - Dushyantha A. Basnayaka, Peter J. Smith
, Philippa A. Martin:
Performance Analysis of Dual-User Macrodiversity MIMO Systems with Linear Receivers in Flat Rayleigh Fading. - Shlomi Dolev, Juan A. Garay, Niv Gilboa, Vladimir Kolesnikov, Yelena Yuditsky:
Efficient Private Distributed Computation on Unbounded Input Streams. - Camelia-Mihaela Pintea:
A Unifying Survey of Reinforced, Sensitive and Stigmergic Agent-Based Approaches for E-GTSP. - Camelia-Mihaela Pintea, Gloria Cerasela Crisan, Mihai Manea:
Parallel ACO with a Ring Neighborhood for Dynamic TSP. - Leslie Ann Goldberg, Mark Jerrum, Colin McQuillan:
Approximating the partition function of planar two-state spin systems. - Paul Hunter, Joël Ouaknine, James Worrell:
Expressive Completeness of Metric Temporal Logic. - Tomás Masopust:
A Note on Limited Pushdown Alphabets in Stateless Deterministic Pushdown Automata. - (Withdrawn) Identification of Probabilities of Languages.
- Abdelwaheb Marzouki, Xin Jin:
Precoder Design for Orthogonal Space-Time Block Coding based Cognitive Radio with Polarized Antennas. - Ender Konukoglu, Ben Glocker, Antonio Criminisi, Kilian M. Pohl:
WESD - Weighted Spectral Distance for Measuring Shape Dissimilarity. - Tamal K. Dey, Fengtao Fan, Yusu Wang:
Computing Topological Persistence for Simplicial Maps. - An H. Do, Po T. Wang, Christine E. King, Sophia N. Chun, Zoran Nenadic:
Brain-Computer Interface Controlled Robotic Gait Orthosis: A Case Report. - Masoud Bekravi
, Shahram Jamali, Gholam Shaker:
Defense against SYN-Flood Denial of Service Attacks Based on Learning Automata. - Daniel Reem:
On the existence of a neutral region. - Ravi Tandon, Syed Ali Jafar, Shlomo Shamai, H. Vincent Poor:
On the Synergistic Benefits of Alternating CSIT for the MISO BC. - Lewis Tseng, Nitin H. Vaidya:
Exact Byzantine Consensus in Directed Graphs. - Javad Ghaderi, R. Srikant:
Opinion Dynamics in Social Networks: A Local Interaction Game with Stubborn Agents. - Ian Post, Yinyu Ye:
The simplex method is strongly polynomial for deterministic Markov decision processes. - Wei Zhang
, Xiaogang Wang, Deli Zhao, Xiaoou Tang:
Graph Degree Linkage: Agglomerative Clustering on a Directed Graph. - Mohammad Saiful Islam Mamun, Atsuko Miyaji:
An Optimized Signature Verification System for Vehicle Ad hoc NETwork. - Do Van Tuan, Tran Dang Hien, Pham Van At:
A Novel Data Hiding Scheme for Binary Images. - Mikolaj Bojanczyk, Luc Segoufin, Howard Straubing:
Piecewise testable tree languages. - David A. McAllester, Petri Myllymäki:
Proceedings of the Twenty-Fourth Conference on Uncertainty in Artificial Intelligence (2008). - Ronald Parr, Linda C. van der Gaag:
Proceedings of the Twenty-Third Conference on Uncertainty in Artificial Intelligence (2007). - Fahiem Bacchus, Tommi S. Jaakkola:
Proceedings of the Twenty-First Conference on Uncertainty in Artificial Intelligence (2005). - Rina Dechter, Thomas S. Richardson:
Proceedings of the Twenty-Second Conference on Uncertainty in Artificial Intelligence (2006). - Max Chickering, Joseph Y. Halpern:
Proceedings of the Twentieth Conference on Uncertainty in Artificial Intelligence (2004). - Katherine Edwards, Andrew D. King:
A superlocal version of Reed's Conjecture. - Yeow Meng Chee, Huaxiong Wang, Liang Feng Zhang:
On Bringer-Chabanne EPIR Protocol for Polynomial Evaluation. - Liang Feng Zhang:
On the Eigenvalues of Certain Matrices Over $\mathbb{Z}_m$. - Muhammad Javed, Bashir Ahmad, Zafar Abbas, Allah Nawaz, Muhammad Ali Abid, Ihsan Ullah:
Decreasing defect rate of test cases by designing and analysis for recursive modules of a program structure: Improvement in test cases. - Dusko Pavlovic:
Monoidal computer I: Basic computability by string diagrams. - Yuichiro Fujiwara, Vladimir D. Tonchev:
High-rate self-synchronizing codes. - Jaan Ubi:
General Managers Role in Balancing Subsidiary Between Internal Competition and Knowledge Sharing. - Tsvi Kopelowitz, Robert Krauthgamer:
Faster Clustering via Preprocessing. - Chao Li, Daniel Yang Li, Gerome Miklau, Dan Suciu:
A Theory of Pricing Private Data. - Erich Grädel, Jouko A. Väänänen:
Dependence and Independence. - Antonia M. Tulino, Giuseppe Caire, Sergio Verdú, Shlomo Shamai:
Support Recovery with Sparsely Sampled Free Random Matrices. - Peter J. Smith
, Pawel A. Dmochowski, Himal A. Suraweera, Mansoor Shafi:
The Effects of Limited Channel Knowledge on Cognitive Radio System Capacity. - Shrinivas Kudekar, Tom Richardson, Rüdiger L. Urbanke:
Wave-Like Solutions of General One-Dimensional Spatially Coupled Systems. - Holger Boche, Brendan Farrell:
On the Peak-to-Average Power Ratio Reduction Problem for Orthogonal Transmission Schemes. - Holger Boche, Brendan Farrell, Michel Ledoux, Moritz Wiese:
Expected Supremum of a Random Linear Combination of Shifted Kernels. - Paolo Magrassi:
How Non-linearity will Transform Information Systems. - Zoltán Fülöp, Heiko Vogler:
Characterizing Weighted MSO for Trees by Branching Transitive Closure Logics. - Zoltán Fülöp, Heiko Vogler:
Forward and Backward Application of Symbolic Tree Transducers. - (Withdrawn) A hybrid ACO approach to the Matrix Bandwidth Minimization Problem.
- Camelia-Mihaela Pintea, Camelia Chira, D. Dumitrescu:
New results of ant algorithms for the Linear Ordering Problem. - Camelia-Mihaela Pintea, Camelia Chira, D. Dumitrescu, Petrica C. Pop:
Sensitive Ants in Solving the Generalized Vehicle Routing Problem. - Petr A. Golovach, Pinar Heggernes, Dieter Kratsch, Yngve Villanger:
Generating All Minimal Edge Dominating Sets with Incremental-Polynomial Delay. - Salah A. Aly:
A Missing and Found Recognition System for Hajj and Umrah. - Camelia-Mihaela Pintea, D. Dumitrescu:
Distributed Pharaoh System for Network Routing. - Yen-Cheng Liu, Ching-Wei Chen, Yu T. Su:
New Constructions of Zero-Correlation Zone Sequences. - Amy Poh Ai Ling, Kokichi Sugihara, Masao Mukaidono:
The Japanese Smart Grid Initiatives, Investments, and Collaborations. - Victor Marsault
, Jacques Sakarovitch:
On sets of numbers rationally represented in a rational base number system. - Alan Guo, Madhu Sudan:
New affine-invariant codes from lifting. - Hajime Matsui:
Fast Erasure-and-Error Decoding and Systematic Encoding of a Class of Affine Variety Codes. - Jaan Ubi, Innar Liiv, Evald Ubi, Leo Vohandu:
Data mining the MNC like internal co-opetition duality in a university context. - Bing-Rong Lin, Daniel Kifer:
A Framework for Extracting Semantic Guarantees from Privacy. - Zhongwei Tang, Alexey Castrodad, Mariano Tepper, Guillermo Sapiro:
Are You Imitating Me? Unsupervised Sparse Modeling for Group Activity Analysis from a Single Video. - Antonis Sidiropoulos:
Finding Communities in Site Web-Graphs and Citation Graphs. - Serhat Nazim Avci, Ender Ayanoglu:
Coded Path Protection Part 1: Efficient Conversion of Sharing to Coding. - Serhat Nazim Avci, Ender Ayanoglu:
Coded Path Protection Part 2: Design, Implementation, and Performance. - Emmanuel Boidot, Eric Feron:
Planning Random path distributions for ambush games in unstructured environments. - Huiwei Lv, Guangming Tan, Mingyu Chen, Ninghui Sun:
Compression and Sieve: Reducing Communication in Parallel Breadth First Search on Distributed Memory Systems. - Gabriela Czibula, Gloria Cerasela Crisan, Camelia-Mihaela Pintea, István Gergely Czibula:
Soft Computing approaches on the Bandwidth Problem. - Alireza Nemaney Pour, Raheleh Kholghi, Soheil Behnam Roudsari:
Minimizing the Time of Spam Mail Detection by Relocating Filtering System to the Sender Mail Server. - Elina Eidkhani, Melisa Hajyvahabzadeh, S. Anahita Mortazavi, Alireza Nemaney Pour:
CRAW: Combination of Re-Keying and Authentication in Wireless Networks for Secure Multicast Increasing Efficiency of Member Join/Leave and Movement. - Melisa Hajyvahabzadeh, Elina Eidkhani, S. Anahita Mortazavi, Alireza Nemaney Pour:
An Efficient Group Key Management Using Code for Key Calculation for Simultaneous Join/Leave: CKCS. - M. Razvi Doomun, K. M. Sunjiv Soyjaudah:
Route Extrapolation for Source and Destination Camouflage in Wireless Ad Hoc Networks. - M. Razvi Doomun, K. M. Sunjiv Soyjaudah:
Modified Temporal Key Integrity Protocol For Efficient Wireless Network Security. - Sebastian Eggert, Henning Schnoor, Thomas Wilke:
Dynamic Noninterference: Consistent Policies, Characterizations and Verification. - Jean Cardinal, Gwenaël Joret:
Hitting all Maximal Independent Sets of a Bipartite Graph. - Ahmed El Shafie, Ahmed K. Sultan:
Cooperative Cognitive Relaying with Ordered Cognitive Multiple Access. - Shlomi Dolev, Omri Liba, Elad Michael Schiller:
Self-Stabilizing Byzantine Resilient Topology Discovery and Message Delivery. - Christos Dimitrakakis, Aikaterini Mitrokotsa:
Near-Optimal Node Blacklisting in Adversarial Networks. - Alexander G. Churbanov, Petr N. Vabishchevich:
Numerical Methods for Solving Convection-Diffusion Problems. - Christopher M. De Vries, Shlomo Geva, Andrew Trotman:
Document Clustering Evaluation: Divergence from a Random Baseline. - Ahmed El Shafie, Ahmed K. Sultan:
Optimal Random Access and Random Spectrum Sensing for an Energy Harvesting Cognitive Radio. - Qingsi Wang, Mingyan Liu, Rahul Jain:
Dynamic Pricing of Power in Smart-Grid Networks. - Sandeep Hosangadi:
Distance Measures for Sequences. - XiaoHua Xu, Xiang-Yang Li:
Efficient Construction of Dominating Set in Wireless Networks. - J. K. M. Sadique Uz Zaman, Ranjan Ghosh:
A Review Study of NIST Statistical Test Suite: Development of an indigenous Computer Package. - Rohit Raghunathan, Sushovan De, Subbarao Kambhampati:
Bayes Networks for Supporting Query Processing Over Incomplete Autonomous Databases. - Vaignana Spoorthy Ella:
Sequence Randomization Using Convolutional Codes and Probability Functions. - Nivan Ferreira, James T. Klosowski, Carlos Eduardo Scheidegger, Cláudio T. Silva:
Vector Field k-Means: Clustering Trajectories by Fitting Multiple Vector Fields. - Shirin Jalali, Arian Maleki, Richard G. Baraniuk:
Minimum Complexity Pursuit for Universal Compressed Sensing. - Kieran G. Larkin
, Peter A. Fletcher, Stephen J. Hardy:
Tenacious Image Tagging with Hyperbolic Chirps. - (Withdrawn) Updating attribute in CP-ABE: A New Approach.
- María Svorenová, Jana Tumova, Jiri Barnat, Ivana Cerna:
Attraction-Based Receding Horizon Path Planning with Temporal Logic Constraints. - Shaunak Joshi, Przemyslaw Pawelczak, Danijela Cabric, John D. Villasenor:
When Channel Bonding is Beneficial for Opportunistic Spectrum Access Networks. - Priyanka Rahi:
Business Intelligence: A Rapidly Growing Option through Web Mining. - (Withdrawn) Resonant Clocking Circuits for Reversible Computation.
- Jacob Thamsborg, Lars Birkedal, Hongseok Yang:
Two for the Price of One: Lifting Separation Logic Assertions. - (Withdrawn) Choose Outsiders First: a mean 2-approximation random algorithm for covering problems.
- Pawel Parys, Igor Walukiewicz:
Weak Alternating Timed Automata. - Gérard Boudol, Gustavo Petri, Bernard P. Serpette:
Relaxed Operational Semantics of Concurrent Programming Languages. 19-33 - Bernard Mulgrew:
The Stationary Phase Approximation, Time-Frequency Decomposition and Auditory Processing. - Denis Cousineau, Damien Doligez, Leslie Lamport, Stephan Merz, Daniel Ricketts, Hernán Vanzetto:
TLA+ Proofs. - Siu On Chan, Elchanan Mossel, Joe Neeman:
On extracting common random bits from correlated sources on large alphabets. - Loris D'Antoni:
In the Maze of Data Languages. - (Withdrawn) Constant Ciphertext Length in CP-ABE.
- Heba Ezzat Ibrahim, Sherif M. Badr, Mohamed A. Shaheen:
Phases vs. Levels using Decision Trees for Intrusion Detection Systems. - Md. Tarek Habib, Rahat Hossain Faisal, M. Rokonuzzaman:
Feasibility of Genetic Algorithm for Textile Defect Classification Using Neural Network. - Sadik Ulker:
Design of Low Noise Amplifiers Using Particle Swarm Optimization. - Sara Shaker Abed El-Hamied
, Ahmed Abou El-Fotouh Saleh, Aziza Asem:
Survey on Using GIS in Evacuation Planning. - Bernhard Haeupler, Fabian Kuhn:
Lower Bounds on Information Dissemination in Dynamic Networks. - Po T. Wang, Christine E. King, Luis A. Chui, An H. Do, Zoran Nenadic:
Self-paced brain-computer interface control of ambulation in a virtual reality environment. - Anurag Singh, Yatindra Nath Singh:
Nonlinear spread of rumor and inoculation strategies in the nodes with degree dependent tie strength in complex networks. - Obaid Ur Rehman, Ian R. Petersen, Baris Fidan:
Minimax Linear Quadratic Gaussian Control of Nonlinear MIMO System with Time Varying Uncertainties. - Shervin Javdani, Matthew Klingensmith, Drew Bagnell, Nancy S. Pollard, Siddhartha S. Srinivasa:
Efficient Touch Based Localization through Submodularity. - Hamid Khodakarami, Farshad Lahouti:
Link Adaptation with Untrusted Relay Assignment: Design and Performance Analysis. - Jiadong Wang, Lara Dolecek, Zhengya Zhang, Richard D. Wesel:
The Cycle Consistency Matrix Approach to LDPC Absorbing Sets in Separable Circulant-Based Codes. - Nadeem Javaid:
M-ATTEMPT: A New Energy-Efficient Routing Protocol in Wireless Body Area Sensor Networks. - Musard Balliu, Mads Dam, Gurvan Le Guernic:
Epistemic Temporal Logic for Information Flow Security. - Vladimir V. Bochkarev, Anna V. Shevlyakova, Valery D. Solovyev:
Average word length dynamics as indicator of cultural changes in society. - Xiaoxian Tang, Zhenghong Chen, Bican Xia:
Generic Regular Decompositions for Generic Zero-Dimensional Systems. - Ludo Waltman, Nees Jan van Eck:
Source normalized indicators of citation impact: An overview of different approaches and an empirical comparison. - Keren Censor-Hillel, Bernhard Haeupler, Nancy A. Lynch, Muriel Médard:
Bounded-Contention Coding for Wireless Networks in the High SNR Regime. - Zhihui Qin, Guanglei He:
The Period of the subtraction games. - Deepak Kumar, M. N. Anil Prasad, A. G. Ramakrishnan:
Benchmarking recognition results on word image datasets. - Nadezhda Afanasyeva, Petr N. Vabishchevich, Maria V. Vasileva:
Unconditionally stable schemes for non-stationary convection-diffusion equations. - Ahmed Bouajjani, Egor Derevenetc, Roland Meyer:
Robustness Checking against TSO: Attacks and Defence. - Mikolaj Bojanczyk, Howard Straubing, Igor Walukiewicz:
Wreath Products of Forest Algebras, with Applications to Tree Logics. - Dara O. Shayda:
G2 Matrix Manifold: A Software Construct. - Prateek Mittal, Charalampos Papamanthou, Dawn Song:
Preserving Link Privacy in Social Network Based Systems. - Sayonnha Mandal, Gregory Macdonald, Mayssaa El Rifai, Nikhil Punekar, Farnaz Zamani, Yuhua Chen, Subhash C. Kak, Pramode K. Verma, Robert C. Huck, James J. Sluss Jr.:
Implementation of Secure Quantum Protocol using Multiple Photons for Communication. - Beyza Ermis, Evrim Acar
, A. Taylan Cemgil:
Link Prediction via Generalized Coupled Tensor Factorisation. - Emmanuel J. Candès, Xiaodong Li:
Solving Quadratic Equations via PhaseLift when There Are About As Many Equations As Unknowns. - Vladimir Prus:
The Boost.Build System. - Tanmoy Chakraborty:
Authorship Identification Using Stylometry Analysis in Bengali Literature. - Hadi Katebi, Karem A. Sakallah, Igor L. Markov:
Conflict Anticipation in the Search for Graph Automorphisms. - Hadi Katebi, Karem A. Sakallah, Igor L. Markov:
Graph Symmetry Detection and Canonical Labeling: Differences and Synergies. - Kaya Tutuncuoglu, Aylin Yener:
Communicating Using an Energy Harvesting Transmitter: Optimum Policies Under Energy Storage Losses. - Albert Ai, Alex Lapanowski, Yaniv Plan, Roman Vershynin:
One-bit compressed sensing with non-Gaussian measurements. - (Withdrawn) Distributed Cross-Layer Optimization in Wireless Networks: A Second-Order Approach.
- Irina Topalova:
Automated Marble Plate Classification System Based On Different Neural Network Input Training Sets and PLC Implementation. - Dmitriy Kuptsov, Boris Nechaev, Andrey Lukyanenko, Andrei V. Gurtov:
How Penalty Leads to Improvement: a Measurement Study of Wireless Backoff. - Ines Klimann:
The finiteness of a group generated by a 2-letter invertible-reversible Mealy automaton is decidable. - Prateek Mittal, Matthew K. Wright, Nikita Borisov:
Pisces: Anonymous Communication Using Social Networks. - Aman Chadha, Sushmit Mallik, Ravdeep Johar:
Comparative Study and Optimization of Feature-Extraction Techniques for Content based Image Retrieval. - Sumio Watanabe:
A Widely Applicable Bayesian Information Criterion. - Dominic J. D. Hughes:
Is Wolfram and Cook's (2,5) Turing machine really universal? - Meisam Razaviyayn, Mingyi Hong, Zhi-Quan Luo:
Linear Transceiver Design for a MIMO Interfering Broadcast Channel Achieving Max-Min Fairness. - Qian Zhang, Chenyang Yang:
Transmission Mode Selection for Downlink Coordinated Multi-Point Systems. - Lev Kazakovtsev:
Access Points Placement as a Discrete Optimization Problem. - Fabien Durand
, Julien Leroy, Gwénaël Richomme:
Towards a statement of the S-adic conjecture through examples. - Jean-Alexandre Long, Nikolai Hungr, Michael Baumann, Jean-Luc Descotes, Michel Bolla, Jean-Yves Giraud, Jean-Jacques Rambeaud, Jocelyne Troccaz:
Development of a Novel Robot for Transperineal Needle Based Interventions: Focal Therapy, Brachytherapy and Prostate Biopsies. - Jean-Alexandre Long, Jacques Tostain, Cecilia Lanchon, Sandrine Voros
, Maud Medici, Jean-Luc Descotes, Jocelyne Troccaz, Philippe Cinquin, Jean-Jacques Rambeaud, Alexandre Moreau-Gaudry:
First Clinical Experience in Urologic Surgery with a Novel Robotic Lightweight Laparoscope Holder. - Yahia Benmoussa, Jalil Boukhobza, Yassine Hadjadj Aoul, Loïc Lagadec, Djamel Benazzouz:
Behavioral Systel Level Power Consumption Modeling of Mobile Video Streaming applications. - Pierre Olivier, Jalil Boukhobza
, Eric Senn:
Performance Evaluation of Flash File Systems. - Pierre Olivier, Jalil Boukhobza
, Eric Senn:
On Benchmarking Embedded Linux Flash File Systems. - Piyus Kedia, Sorav Bansal, Deepak Deshpande, Sreekanth Iyer:
Building Resilient Cloud Over Unreliable Commodity Infrastructure. - (Withdrawn) Java Source-code Clustering: Unifying Syntactic and Semantic Features.
- Kee-Hoon Kim, Hyun-Seung Joo, Jong-Seon No, Dong-Joon Shin:
Adaptive Generation Method of OFDM Signals in SLM Schemes for Low-complexity. - Samson Abramsky:
Relational Databases and Bell's Theorem. - Muneendra Ojha:
A Novel Service Oriented Model for Query Identification and Solution Development using Semantic Web and Multi Agent System. - Pierre Olivier, Jalil Boukhobza
:
A Hardware Time Manager Implementation for the Xenomai Real-Time Kernel of Embedded Linux. - Derek Groen, Stefan J. Zasada, Peter V. Coveney:
Survey of Multiscale and Multiphysics Applications and Communities. - Srinivasan Venkatramanan, Anurag Kumar:
Spread of Influence and Content in Mobile Opportunistic Networks. - Zai Yang, Lihua Xie, Cishen Zhang:
Bayesian compressed sensing with new sparsity-inducing prior. - Lev Kazakovtsev:
Parallel Random Search Algorithm of Constrained Pseudo-Boolean Optimization for Some Distinctive Large-Scale Problems. - Pierre-Malo Deniélou, Nobuko Yoshida
, Andi Bejleri, Raymond Hu
:
Parameterised Multiparty Session Types. - Mingyu Guo, Vincent Conitzer:
False-name-proofness with Bid Withdrawal. - Joseph Salmon, Rebecca Willett, Ery Arias-Castro:
A two-stage denoising filter: the preprocessed Yaroslavsky filter. - Jan Reininghaus, David Günther, Ingrid Hotz, Tino Weinkauf, Hans-Peter Seidel:
Combinatorial Gradient Fields for 2D Images with Empirically Convergent Separatrices. - Kristan Temme, Pawel Wocjan:
Efficient Computation of the Permanent of Block Factorizable Matrices. - Micha Sharir, Adam Sheffer, Joshua Zahl:
Incidences between points and non-coplanar circles. - M. J. Krawczyk, Antoni Dydejczyk, Krzysztof Kulakowski:
The Simmel effect and babies names. - Alekh Agarwal, Peter L. Bartlett, John C. Duchi:
Oracle inequalities for computationally adaptive model selection. - Sergey Aganezov Jr., Max A. Alekseyev:
On pairwise distances and median score of three genomes under DCJ. - Juha Kontinen, Jouko A. Väänänen:
Axiomatizing first order consequences in dependence logic. - Ricardo López-Ruiz, Daniele Fournier-Prunaret:
The bistable brain: a neuronal model with symbiotic interactions. - Xiaojun Zhou, Chunhua Yang, Weihua Gui:
Initial version of State Transition Algorithm. - Mária Ercsey-Ravasz, Zoltán Toroczkai:
The Chaos Within Sudoku. - Ramakrishna Kakarala, Philip Ogunbona
:
A phase-sensitive method for filtering on the sphere. - Neil I. Gillespie, Michael Giudici, Cheryl E. Praeger:
Classification of a family of completely transitive codes. - Marianne Akian, Jean Cochet-Terrasson, Sylvie Detournay, Stéphane Gaubert:
Policy iteration algorithm for zero-sum multichain stochastic games with mean payoff and perfect information. - Ismael Martinez-Martinez, Ricardo López-Ruiz:
Directed Random Markets: Connectivity determines Money. - B. Wang, X. Chen, L. Wang:
Probabilistic interconnection between interdependent networks promotes cooperation in the public goods game. - Simon T. Powers, Alexandra S. Penn, Richard A. Watson:
The concurrent evolution of cooperation and the population structures that support it. - Gunnar Brinkmann, Jan Goedgebeur, Jan-Christoph Schlage-Puchta:
Ramsey numbers R(K3,G) for graphs of order 10. - Jop Briët, Assaf Naor, Oded Regev:
Locally decodable codes and the failure of cotype for projective tensor products. - Longbo Huang, Jean C. Walrand:
A Benes Packet Network. - Subhrajit Bhattacharya, David Lipsky, Robert Ghrist, Vijay Kumar:
Invariants for Homology Classes with Application to Optimal Search and Planning Problem in Robotics. - René Pfitzner, Ingo Scholtes, Antonios Garas, Claudio J. Tessone
, Frank Schweitzer:
Betweenness Preference: Quantifying Correlations in the Topological Dynamics of Temporal Networks. - Muhammad Salman Asif, Justin K. Romberg:
Fast and Accurate Algorithms for Re-Weighted L1-Norm Minimization. - Laszlo Gyongyosi, Sándor Imre:
Private Quantum Coding for Quantum Relay Networks. - Adrian Kent, Serge Massar, Jonathan Silman:
Secure and Robust Transmission and Veri?cation of Unknown Quantum States in Minkowski Space. - Shang Shang, Paul W. Cuff, Pan Hui, Sanjeev R. Kulkarni:
An Upper Bound on the Convergence Time for Quantized Consensus. - Vladimir Vovk:
Cross-conformal predictors. - Yehuda Afek, Yakov Babichenko, Uriel Feige, Eli Gafni, Nati Linial, Benny Sudakov:
Musical chairs. - Grigori Mints:
Intuitionistic Existential Instantiation and Epsilon Symbol. - Anil Aswani, Humberto González, S. Shankar Sastry, Claire J. Tomlin:
Statistical Results on Filtering and Epi-convergence for Learning-Based Model Predictive Control. - Manoj Gopalkrishnan, Ezra Miller, Anne Shiu:
A projection argument for differential inclusions, with applications to persistence of mass-action kinetics. - Jonathan D. Beezley, Mavin Martin, Paul Rosen, Jan Mandel, Adam K. Kochanski:
Data management and analysis with WRF and SFIRE. - Saleh Dindar, Eric B. Ford, Mario Juric, Young In Yeo, Jianwei Gao, Aaron C. Boley, Benjamin Nelson, Jörg Peters:
Swarm-NG: a CUDA Library for Parallel n-body Integrations with focus on Simulations of Planetary Systems. - Gabor T. Herman, Edgar Garduño, Ran Davidi, Yair Censor:
Superiorization: An optimization heuristic for medical physics. - Nicolas Gillis, Stephen A. Vavasis:
Fast and Robust Recursive Algorithms for Separable Nonnegative Matrix Factorization. - Laszlo Gyongyosi, Sándor Imre:
Properties of the Quantum Channel. - Junhua Zhao, Lifeng Wang, Jin-Wu Jiang, Zhengzhong Wang, Wanlin Guo, Timon Rabczuk:
A comparative study of two molecular mechanics models based on harmonic potentials. - Ke Li:
Second Order Asymptotics for Quantum Hypothesis Testing. - Jelena Smiljanic, Igor Stankovic:
Study of dynamic and static routing for improvement of the transportation efficiency on small complex networks. - Sarah Croke, Adrian Kent:
Security Details for Bit Commitment by Transmitting Measurement Outcomes. - Daniel Denton:
Methods of computing deque sortable permutations given complete and incomplete information. - James Martin:
Berlekamp's Switching Game on Finite Projective and Affine Planes. - Simon Kramer:
Logic of Non-Monotonic Interactive Proofs (Formal Theory of Temporary Knowledge Transfer). - János Körner, Irene Muzi:
Degree-doubling graph families. - Divyanshu Vats:
Parameter-Free High-Dimensional Screening Using Multiple Grouping of Variables. - Karl Mosler, Pavel Bazovkin:
Stochastic linear programming with a distortion risk constraint. - Javier G. Gonzalez:
The Offline Software of the Pierre Auger Observatory: Lessons Learned. - Shravas Rao:
Finding hitting times in various graphs. - Farhad Farokhi
, Karl Henrik Johansson:
Optimal Control Design under Structured Model Information Limitation Using Adaptive Algorithms. - Antonia W. Bluher:
On existence of Budaghyan-Carlet APN hexanomials. - Peter Wittek, Fernando M. Cucchietti:
A Second-Order Distributed Trotter-Suzuki Solver with a Hybrid Kernel. - Assaf Hallak, Shie Mannor:
How to sample if you must: on optimal functional sampling. - Fraser Stewart:
Pirates and Treasure. - Amir Noori:
Distributed Multi-objective Multidisciplinary Design Optimization Algorithms. - Genaro Juárez Martínez, Juan Carlos Seck Tuoh Mora, Hector Zenil:
Wolfram's Classification and Computation in Cellular Automata Classes III and IV. - Benjamin A. Burton:
Computational topology with Regina: Algorithms, heuristics and implementations. - L'ubomíra Balková, Edita Pelantová, Stepán Starosta:
Proof of Brlek-Reutenauer conjecture. - Lorenzo Rosasco, Silvia Villa, Sofia Mosci, Matteo Santoro, Alessandro Verri:
Nonparametric sparsity and regularization. - Carl Veller, Vinesh Rajpaul:
Purely competitive evolutionary dynamics for games. - Alexsandro M. Carvalho, Sebastian Goncalves:
Epidemics scenarios in the "Romantic network". - Adrian Carro, Raúl Toral, Maxi San Miguel:
The role of noise and initial conditions in the asymptotic solution of a bounded confidence, continuous-opinion model. - Anne-Laure Boulesteix, Manuel J. A. Eugster:
A Plea for Neutral Comparison Studies in Computational Sciences. - Stefan Canzar, Sandro Andreotti:
A Branch-and-Cut Algorithm for the 2-Species Duplication-Loss Phylogeny Problem. - Ville Salo, Ilkka Törmä:
Topology Inspired Problems for Cellular Automata, and a Counterexample in Topology. 53-68 - Josef Cibulka:
Maximum size of reverse-free sets of permutations. - Blake Madill, Narad Rampersad:
The abelian complexity of the paperfolding word. - Mirjam Friesen, Dirk Oliver Theis:
Fooling sets (a.k.a. cross-free matchings) and rank in non-zero characteristic. - Daniel Yasumasa Takahashi, João Ricardo Sato, Carlos Eduardo Ferreira, André Fujita:
Discriminating different classes of biological networks by analyzing the graphs spectra distribution. - Wei Bian, Dacheng Tao:
Asymptotic Generalization Bound of Fisher's Linear Discriminant Analysis. - Stijn van Dongen, Anton J. Enright:
Metric distances derived from cosine similarity and Pearson and Spearman correlations. - Ramon van Handel:
Ergodicity, Decisions, and Partial Information. - Vladimir S. Lerner:
Hidden information and regularities of information dynamics III. - Babak Fotouhi, Michael G. Rabbat:
The Effect of Exogenous Inputs and Defiant Agents on Opinion Dynamics with Local and Global Interactions. - Guangyue Han, Brian H. Marcus:
Analyticity of Entropy Rate of Continuous-State Hidden Markov Chains. - David J. Weiss, Benjamin Sapp, Ben Taskar:
Structured Prediction Cascades. - André C. R. Martins, Serge Galam:
The building up of individual inflexibility in opinion dynamics. - Vikram Krishnamurthy:
When to look at a noisy Markov chain in sequential decision making if measurements are costly? - James D. Whitfield, Peter J. Love, Alán Aspuru-Guzik:
Computational Complexity in Electronic Structure. - Zhixiang Eddie Xu, Kilian Q. Weinberger, Olivier Chapelle:
Distance Metric Learning for Kernel Machines. - Nicolas Bedaride, Thomas Fernique:
The Ammann-Beenker tilings revisited. - Ziqiang Shi, Tieran Zheng, Jiqing Han:
Identifiability of multivariate logistic mixture models. - Asaf Shapira, Benny Sudakov:
Small Complete Minors Above the Extremal Edge Density. - Tin Chi Nguyen, Nan Deng, Dongxiao Zhu:
SASeq: A Selective and Adaptive Shrinkage Approach to Detect and Quantify Active Transcripts using RNA-Seq. - Oliver Pabst, Torsten Schmidt:
Sinusoidal analysis of memristor bridge circuit-rectifier for low frequencies. - Alexander Rakhlin, Karthik Sridharan:
Online Learning with Predictable Sequences. - Bhaskar DasGupta, Lakshmi Kaligounder:
Global Stability of Financial Networks Against Contagion: Measure, Evaluation and Implications. - Deanna Needell, Joel A. Tropp:
Paved with Good Intentions: Analysis of a Randomized Block Kaczmarz Method. - Fajin Wei, Andrea Lecchini-Visintini:
On the Stability of Receding Horizon Control for Continuous-Time Stochastic Systems. - Jaydeep P. Bardhan, Matthew G. Knepley, Peter R. Brune:
Analytical Nonlocal Electrostatics Using Eigenfunction Expansions of Boundary-Integral Operators. - J. A. Miszczak:
Employing online quantum random number generators for generating truly random quantum states in Mathematica. - Igor G. Vladimirov, Ian R. Petersen:
Minimum Relative Entropy State Transitions in Linear Stochastic Systems: the Continuous Time Case. - Edgardo Brigatti:
Viability of an elementary syntactic structure in a population playing Naming Games. - Hao Liao, Giulio Cimini, Matús Medo:
Measuring quality, reputation and trust in online communities. - Ran Xu, Bin Liu, Yuan Dong:
Scalable hierarchical parallel algorithm for the solution of super large-scale sparse linear equations. - Stephen R. Chestnut, Donniell E. Fishkind:
Counting Spanning Trees of Threshold Graphs. - Ivan Savov:
Network information theory for classical-quantum channels. - Tiziano Squartini, Francesco Picciolo, Franco Ruzzenenti, Diego Garlaschelli:
Reciprocity of weighted networks. - Chunsheng Feng, Shi Shu, Jinchao Xu, Chen-Song Zhang:
Numerical Study of Geometric Multigrid Methods on CPU--GPU Heterogeneous Computers. - S. Yusef Shafi:
Guaranteeing Spatial Uniformity in Diffusively-Coupled Systems. - Terry L. Friesz, Changhyun Kwon, Tae Il Kim, Lifan Fan, Tao Yao:
Competitive Robust Dynamic Pricing in Continuous Time with Fixed Inventories. - Yérali Gandica, Ernesto Medina, Ismardo Bonalde:
A thermodynamic counterpart of the Axelrod model of social influence. - Paul Cuff, Thomas M. Cover, Gowtham Kumar, Lei Zhao:
A Lattice of Gambles. - Evan Hurwitz, Tshilidzi Marwala:
Common Mistakes when Applying Computational Intelligence and Machine Learning to Stock Market modelling. - Daniel R. Hawtin, Neil I. Gillespie, Cheryl E. Praeger:
Elusive Codes in Hamming Graphs. - Laurent Demaret, Peter Massopust, Martin Storath:
Signal Analysis based on Complex Wavelet Signs. - Robert J. Betts:
A nonconstructive Proof to show the Convergence of the $n^{th}$ root of diagonal Ramsey Number $r(n, n)$. - Dandan Hu, Pinaki Sarder, Peter Ronhovde, Sharon Bloch, Samuel Achilefu, Zohar Nussinov:
Segmenting Intracellular Distribution Images Derived by Fluorescent Dyes Using a Potts Model Hamiltonian. - Lauri Hella, Jouko A. Väänänen:
The size of a formula as a measure of complexity. - Antti Kuusisto, Jeremy Meyers, Jonni Virtema:
Undecidable First-Order Theories of Affine Geometries. - Peter Ronhovde, Zohar Nussinov:
Local multiresolution order in community detection. - Yao Xie, Jiaji Huang, Rebecca Willett:
Changepoint detection for high-dimensional time series with missing data. - Zeev Dvir:
Incidence Theorems and Their Applications. - Taha Yasseri, János Kertész:
Value production in a collaborative environment. - Serge Lawrencenko:
On the minimum order of a quadrangulation on a given closed 2-manifold. - Dan Garber, Elad Hazan:
Almost Optimal Sublinear Time Algorithm for Semidefinite Programming. - Michael S. Payne, David R. Wood:
On the general position subset selection problem. - Andrew V. Sutherland:
Isogeny volcanoes. - Ebru Aydin Gol, Xu Chu Ding, Mircea Lazar, Calin Belta:
Finite Bisimulations for Switched Linear Systems. - Francesco Smarra, Alessandro D'Innocenzo, Maria Domenica Di Benedetto:
Optimal co-design of control, scheduling and routing in multi-hop control networks. - Shmuel Onn, Michal Rozenblit:
Convex Integer Optimization by Constantly Many Linear Counterparts. - Enrique Mallada, Xiaoqiao Meng, Michel Hack, Li Zhang, Ao Tang:
Skewless Network Clock Synchronization. - Carolyn L. Phillips, Joshua A. Anderson, Elizabeth R. Chen, Sharon C. Glotzer:
Optimal Fillings - A new spatial subdivision problem related to packing and covering. - Stefania Petra, Christoph Schnörr:
Average Case Recovery Analysis of Tomographic Compressive Sensing. - Simon Kramer:
Logic of Negation-Complete Interactive Proofs (Formal Theory of Epistemic Deciders). - Vaughan R. Pratt:
A combinatorial analysis of the average time for open-address hash coding insertion. - Ben Adcock, Anders C. Hansen, Clarice Poon:
On optimal wavelet reconstructions from Fourier samples: linearity and universality of the stable sampling rate. - Daniel Aalto, Antti Huhtala, Atle Kivelä, Jarmo Malinen, Pertti Palo, Jani Saunavaara, Martti Vainio
:
How far are vowel formants from computed vocal tract resonances? - Ian R. Petersen, Valery A. Ugrinovskii, Matthew R. James:
Robust Stability of Quantum Systems with a Nonlinear Coupling Operator. - Tomoyuki Yamakami:
One-Way Reversible and Quantum Finite Automata with Advice. - Fuguo Zhang, An Zeng:
Improving information filtering via network manipulation. - Atieh Mirshahvalad, Olivier H. Beauchesne, Éric Archambault
, Martin Rosvall:
Effect of resampling schemes on significance analysis of clustering and ranking. - Aki-Hiro Sato, Ken Umeno:
Correlational properties of two-dimensional solvable chaos on the unit circle. - Enys Mones:
Hierarchy in directed random networks: analytical and numerical results. - Jeffrey Aguilar, Alex Lesov, Kurt Wiesenfeld, Daniel I. Goldman:
Lift-off dynamics in a simple jumping robot. - Christina Büsing, Fabio D'Andreagiovanni:
New results about multi-band uncertainty in Robust Optimization. - (Withdrawn) Shannon's sampling theorem in a distributional setting.
- Mona Arabzadeh, Morteza Saheb Zamani, Mehdi Sedighi, Mehdi Saeedi:
Depth-Optimized Reversible Circuit Synthesis. - Xinjia Chen:
Sequential Estimation Methods from Inclusion Principle.

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.