default search action
CoRR, November 2010
- Rohit Aggarwal, Mohamad Assaad, Can Emre Koksal, Philip Schniter:
Optimal Joint Scheduling and Resource Allocation in OFDMA Downlink Systems with Imperfect Channel-State Information. - B. D. Johnson, James P. Crutchfield, Christopher J. Ellison, Carl S. McTague:
Enumerating Finitary Processes. - Byron Boots, Geoffrey J. Gordon:
Predictive State Temporal Difference Learning. - Rina Panigrahy:
A non-expert view on Turing machines, Proof Verifiers, and Mental reasoning. - Gabriel Ciobanu, Maciej Koutny:
Proceedings Fourth Workshop on Membrane Computing and Biologically Inspired Process Calculi, MeCBIC 2010, Jena, Germany, 23 August 2010. EPTCS 40, 2010 [contents] - Jean Cardinal, Marek Karpinski, Richard Schmied, Claus Viehmann:
Approximating Subdense Instances of Covering Problems. - M. Emre Celebi:
Fast Color Quantization Using Weighted Sort-Means Clustering. - Katya Scheinberg, Shiqian Ma, Donald Goldfarb:
Sparse Inverse Covariance Selection via Alternating Linearization Methods. - Till Mossakowski, Reinhard Moratz:
Qualitative Reasoning about Relative Direction on Adjustable Levels of Granularity. - Nir Ailon:
Query Efficient PTAS for Minimum Feedback Arc-Set in Tournaments. - Zhengping Fan, Guanrong Chen, Yunong Zhang:
Using topological characteristics to evaluate complex network models can be misleading. - Michel A. Reniers, Tim A. C. Willemse:
Folk Theorems on the Correspondence between State-Based and Event-Based Systems. - L. F. Johnson:
Golden and Alternating, fast simple O(lg n) algorithms for Fibonacci. - Varsha Dani, Cristopher Moore:
Independent sets in random graphs from the weighted second moment method. - Sahin Emrah Amrahov, Orhan A. Nooraden:
A Distributed AI Aided 3D Domino Game. - Sahin Emrah Amrahov, Fatih Aybar, Serhat Dogan:
Prunnig Algorithm of Generation a Minimal Set of Rule Reducts Based on Rough Set Theory. - Mark McLaughlin, Gerard Briscoe, Paul Malone:
Digital Identity in The Absence of Authorities: A New Socio-Technical Approach. - (Withdrawn) Network Diversity and Economic Development: a Comment.
- Stéphane Demri:
On Selective Unboundedness of VASS. 1-15 - Hanifa Boucheneb, Kamel Barkaoui:
On interleaving in {P,A}-Time Petri nets with strong semantics. 17-31 - Oded Maler, Kim G. Larsen, Bruce H. Krogh:
On Zone-Based Analysis of Duration Probabilistic Automata. 33-46 - Frédéric Peschanski, Hanna Klaudel, Raymond R. Devillers:
A Decidable Characterization of a Graphical Pi-calculus with Iterators. 47-61 - Bernard Boigelot, Julien Brusten, Jean-François Degbomont:
Implicit Real Vector Automata. 63-76 - Nathalie Bertrand, Christophe Morvan:
Probabilistic regular graphs. 77-90 - Étienne André:
IMITATOR II: A Tool for Solving the Good Parameters Problem in Timed Automata. 91-99 - Weiming Liu, Sanjiang Li:
Reasoning about Cardinal Directions between Extended Objects: The Hardness Result. - Sisir Koppaka, Dheevatsa Mudigere, Srihari Narasimhan, Babu Narayanan:
Fast Histograms using Adaptive CUDA Streams. - Sangeeta Soni, Yogendra Namjoshi:
Delineation of Raw Plethysmograph using Wavelets for Mobile based Pulse Oximeters. - Albert Xin Jiang, Kevin Leyton-Brown:
Polynomial-time Computation of Exact Correlated Equilibrium in Compact Games. - Chih-Hong Cheng, Harald Ruess, Alois C. Knoll, Christian Buckl:
A Game-theoretic Approach for Synthesizing Fault-Tolerant Embedded Systems. - Rosziati Ibrahim, Siow Yen yen:
Formalization of the data flow diagram rules for consistency check. - Majid Taghiloo, Mohammad Ali Agheli, Mohammad Reza Rezaeinezhad:
Mobile Based Secure Digital Wallet for Peer to Peer Payment System. - Rosziati Ibrahim:
From UML Specification into Implementation using Object Mapping. - Nayyar Mehmood, Imran Haider Qureshi:
Intuitionistic Fuzzy Ideal Extensions of Γ-Semigroups. - Siddharth Gupta, Narina Thakur:
Semantic Query Optimisation with Ontology Simulation. - Johannes Gütschow, Vincent Nesme, Reinhard F. Werner:
The fractal structure of cellular automata on Abelian groups. - Soumadip Ghosh, Sushanta Biswas, Debasree Sarkar, Partha Pratim Sarkar:
Mining Frequent Itemsets Using Genetic Algorithm. - (Withdrawn) Imitation learning of motor primitives and language bootstrapping in robots.
- Baris Baykant Alagöz:
Effects of Sequence Partitioning on Compression Rate. - Michael Sagraloff:
On the Complexity of Real Root Isolation. - Laszlo Juracz:
Developing courses with HoloRena, a framework for scenario- and game based e-learning environments. - Pooya Hatami, Raghav Kulkarni, Denis Pankratov:
Variations on the Sensitivity Conjecture. - Krishnan Kumar, J. Nafeesa Begum, V. Sumathy:
A Novel Approach Towards Cost Effective Region-Based Group Key Agreement Protocol for Peer - to - Peer Information Sharing in Mobile Ad Hoc Networks. - Marko A. Rodriguez, Peter Neubauer:
A Path Algebra for Multi-Relational Graphs. - Markus N. Rabe, Sven Schewe, Lijun Zhang:
Efficient Approximation of Optimal Control for Markov Games. - Sara Miner More, Pavel Naumov:
Functional Dependence of Secrets in a Collaboration Network. - Samir E. AbdelRahman, Basma Hassan, Reem Bahgat:
A New Email Retrieval Ranking Approach. - Jacob Bien, Ya Xu, Michael W. Mahoney:
CUR from a Sparse Optimization Viewpoint. - Alexei Lisitsa:
Finite Model Finding for Parameterized Verification. - Mihail N. Kolountzakis, Gary L. Miller, Richard Peng, Charalampos E. Tsourakakis:
Efficient Triangle Counting in Large Graphs via Degree-based Vertex Partitioning. - Xinhua Zhang, Ankan Saha, S. V. N. Vishwanathan:
Regularized Risk Minimization by Nesterov's Accelerated Gradient Methods: Algorithmic Extensions and Empirical Studies. - Mireille Sarkiss, Ghaya Rekaya-Ben Othman, Mohamed Oussama Damen, Jean-Claude Belfiore:
Construction of New Delay-Tolerant Space-Time Codes. - Andrew Phillips, Matthew R. Lakin, Loïc Paulevé:
Stochastic Simulation of Process Calculi for Biology. 1-5 - Giorgio Bacci, Marino Miculan:
Measurable Stochastics for Brane Calculus. 6-22 - Richard Banks, L. Jason Steggles:
An Abstraction Theory for Qualitative Models of Biological Systems. 23-38 - Yifei Bao, Adriana B. Compagnoni, Joseph Glavy, Tommy White:
Computational Modeling for the Activation Cycle of G-proteins by G-protein-coupled Receptors. 39-53 - Roberto Barbuti, Giulio Caravagna, Paolo Milazzo, Andrea Maggiolo-Schettini, Simone Tini:
Aspects of multiscale modelling in a process algebra for biological systems. 54-69 - Diletta Cacciagrano, Flavio Corradini, Emanuela Merelli, Luca Tesei:
Multiscale Bone Remodelling with Spatial P Systems. 70-84 - Giulio Caravagna, Jane Hillston:
Modeling biological systems with delays in Bio-PEPA. 85-101 - Mario Coppo, Ferruccio Damiani, Maurizio Drocco, Elena Grassi, Eva Sciacca, Salvatore Spinella, Angelo Troina:
Hybrid Calculus of Wrapped Compartments. 102-120 - Michael J. Dinneen, Yun-Bum Kim, Radu Nicolescu:
Edge- and Node-Disjoint Paths in P Systems. 121-141 - Jérôme Feret, Thomas A. Henzinger, Heinz Koeppl, Tatjana Petrov:
Lumpability Abstractions of Rule-based Systems. 142-161 - Jean-Louis Giavitto, Hanna Klaudel, Franck Pommereau:
Qualitative modelling and analysis of regulations in multi-cellular systems using Petri nets and topological collections. 162-177 - Samir E. AbdelRahman, Basma Hassan, Reem Bahgat:
A New Email Retrieval Ranking Approach. - Manoj Kumar, Sandeep Kumar Arya, Sujata Pandey:
Level Shifter Design for Low Power Applications. - Laurent Romary:
Stabilizing knowledge through standards - A perspective for the humanities. - A. Balu, Kuppusamy Krishnamoorthy:
Ciphertext Policy Attribute based Encryption with anonymous access policy. - Andrej Bogdanov, Fan Li:
A better tester for bipartiteness? - R. Kalaiarasi, Getsy S. Sara, S. Neelavathy Pari, D. Sridharan:
Performance Analysis of Contention Window Cheating Misbehaviors in Mobile Ad Hoc Networks. - Pierre Ganty, Rupak Majumdar:
Algorithmic Verification of Asynchronous Programs. - Hitesh Tahbildar, Bichitra Kalita:
Heuristic Approach of Automated Test Data Generation for Program having Array of Different Dimensions and Loops with Variable Number of Iteration. - Ayan Chaudhury, Abhishek Gupta, Sumita Manna, Subhadeep Mukherjee, Amlan Chakrabarti:
Multiple View Reconstruction of Calibrated Images using Singular Value Decomposition. - (Withdrawn) Parallelization of Weighted Sequence Comparison by using EBWT.
- Tim A. Majchrzak:
Improving the Technical Aspects of Software Testing in Enterprises. - Julie M. David, Kannan Balakrishnan:
Significance of Classification Techniques in Prediction of Learning Disabilities. - Mekkia Kouider:
Stability number and f-factors in graphs. - M. Emre Celebi, Hitoshi Iyatomi, Gerald Schaefer, William V. Stoecker:
Lesion Border Detection in Dermoscopy Images. - Ching-Lueh Chang:
On reversible cascades in scale-free and Erdős-Rényi random graphs. - Stéphane Ross, Geoffrey J. Gordon, J. Andrew Bagnell:
No-Regret Reductions for Imitation Learning and Structured Prediction. - Krishnendu Chatterjee, Thomas A. Henzinger, Vinayak S. Prabhu:
Timed Parity Games: Complexity and Robustness. - Zach Miller, Daniel C. Bradley, Todd Tannenbaum, Igor Sfiligoi:
Flexible Session Management in a Distributed Environment. - Nikolai Todorov Stoianov, Veselin Tsenov Tselkov:
E-Net Models of a Software System for Web Pages Security SECURITY. - Chong Han, Ido Nevat, Gareth W. Peters, Jinhong Yuan:
Gaussian Process Techniques for Wireless Communications. - Beatrice Cynthia Dhinakaran, Dhinaharan Nagamalai, Jae-Kwang Lee:
An Empirical Study of Spam and Spam Vulnerable email Accounts. - P. Bhargavi, S. Jyothi:
Soil Classification Using GATree. - Ziheng Lin, Hwee Tou Ng, Min-Yen Kan:
A PDTB-Styled End-to-End Discourse Parser. - Jianguo Ding:
Probabilistic Inferences in Bayesian Networks. - Priyankar Ghosh, Pallab Dasgupta:
Detecting Ontological Conflicts in Protocols between Semantic Web Services. - Manuel Cebrián, Manuel Alfonseca, Alfonso Ortega:
Overcoming Problems in the Measurement of Biological Complexity. - Olivier Togni:
On Packing Colorings of Distance Graphs. - Guillaume Chèze:
A recombination algorithm for the decomposition of multivariate rational functions. - Louise Pryor:
What's the point of documentation? - Dai Tri Man Le:
On Three Alternative Characterizations of Combined Traces. - Srimal Jayawardena, Marcus Hutter, Nathan Brewer:
Featureless 2D-3D Pose Estimation by Minimising an Illumination-Invariant Loss. - Angelo Brillout, Daniel Kroening, Philipp Rümmer, Thomas Wahl:
Beyond Quantifier-Free Interpolation in Extensions of Presburger Arithmetic (Extended Technical Report). - Mortuza Ali, Margreta Kuijper:
A parametric approach to list decoding of Reed-Solomon codes using interpolation. - Xin Liu, Tsuyoshi Murata:
Detecting Communities in Tripartite Hypergraphs. - Beatrice Cynthia Dhinakaran, Dhinaharan Nagamalai, Jae-Kwang Lee:
Characterizing Spam traffic and Spammers. - Ajesh Babu, Jaikumar Radhakrishnan:
An entropy based proof of the Moore bound for irregular graphs. - Shuqin Li, Jianwei Huang:
Revenue Maximization for Communication Networks with Usage-Based Pricing. - Oleg Chertov, Dan Tavrov:
Group Anonymity. - Oleg Chertov, Dan Tavrov:
Providing Group Anonymity Using Wavelet Transform. - Oleg Chertov, Dan Tavrov:
Group Anonymity: Problems and Solutions. - Oleg Chertov, Dan Tavrov:
Providing Data Group Anonymity Using Concentration Differences. - Oleg Chertov, Dan Tavrov:
Data Group Anonymity: General Approach. - Jian Liu, Dah Ming Chiu:
Reciprocating Preferences Stablize Matching: College Admissions Revisited. - Laurent Bulteau, Guillaume Fertin, Irena Rusu:
Sorting by Transpositions is Difficult. - Sudipto Guha, Kamesh Munagala, Martin Pal:
Iterated Allocations with Delayed Feedback. - Ola Svensson:
Santa Claus Schedules Jobs on Unrelated Machines. - Julian Gutierrez:
Logics and Games for True Concurrency. - Christian Walder:
Rank k Cholesky Up/Down-dating on the GPU: gpucholmodV0.2. - Abuzer Yakaryilmaz, Rusins Freivalds, A. C. Cem Say, Ruben Agadzanyan:
Quantum computation with devices whose contents are never read. - Alexandru Popa, Prudence W. H. Wong, Fencol C. C. Yung:
Hardness and Approximation of The Asynchronous Border Minimization Problem. - Fangfang Zhu, Xiaohu Shang, Biao Chen, H. Vincent Poor:
On the Capacity of Multiple-Access-Z-Interference Channels. - Yen-Wei Huang, Pierre Moulin:
On the Saddle-point Solution and the Large-Coalition Behavior of Fingerprinting Games. - Alexandr Andoni, Robert Krauthgamer, Krzysztof Onak:
Streaming Algorithms from Precision Sampling. - Thomas Holenstein, Robin Künzler, Stefano Tessaro:
Equivalence of the Random Oracle Model and the Ideal Cipher Model, Revisited. - Michele Castellana, Lenka Zdeborová:
Adversarial Satisfiability Problem. - Christos H. Papadimitriou, George Pierrakos:
On Optimal Single-Item Auctions. - Ulrich Faigle, Alexander Schönhuth:
Discrete Quantum Markov Chains. - Anupam Gupta, Moritz Hardt, Aaron Roth, Jonathan R. Ullman:
Privately Releasing Conjunctions and the Statistical Query Barrier. - Xiaoxiao Yang:
Probabilistic Model Checking for Propositional Projection Temporal Logic. - Dominique Duval:
Deduction as Reduction. - René David:
A short proof that adding some permutation rules to β preserves SN. - Peter Becker:
Optimal Binary Search Trees with Near Minimal Height. - Britta Dorn, Ildikó Schlotter:
Multivariate Analyis of Swap Bribery. - (Withdrawn) Probabilistic Sinr Constrained Robust Transmit Beamforming: A Bernstein-Type Inequality Based Conservative Approach.
- Peter Bürgisser, Christian Ikenmeyer:
Geometric Complexity Theory and Tensor Rank. - Trung Quang Duong, Chau Yuen, Hans-Jürgen Zepernick, Xianfu Lei:
Average Sum-Rate of Distributed Alamouti Space--Time Scheme in Two-Way Amplify-and-Forward Relay Networks. - A. A. Krizhanovsky:
Transformation of Wiktionary entry structure into tables and relations in a relational database schema. - Arpita Ghosh, Aaron Roth:
Selling Privacy at Auction. - Xuan Guang, Fang-Wei Fu, Zhen Zhang:
Construction of Network Error Correction Codes in Packet Networks. - Velimir M. Ilic, Dejan I. Mancev, Branimir Todorovic, Miomir S. Stankovic:
Gradient Computation In Linear-Chain Conditional Random Fields Using The Entropy Message Passing Algorithm. - Rajiv Soundararajan, Sriram Vishwanath:
Quantization using Compressive Sensing. - Sean Crowell, S. Lakshmivarahan:
Forecast Bias Correction: A Second Order Method. - Nagalingam Mahendran, G. Gurusamy:
Fuzzy Controller for Matrix Converter System to Improve its Quality of Output. - Jaydip Sen:
A Survey on Wireless Sensor Network Security. - Jaydip Sen:
An Agent-Based Intrusion Detection System for Local Area Networks. - Amin Sakzad, Mohammad-Reza Sadeghi, Daniel Panario, Nasim Eshghi:
Self-Inverse Interleavers for Turbo Codes. - Jichang Zhao, Junjie Wu, Guannan Liu, Ke Xu, Guoqing Chen:
Being Rational or Aggressive? A Revisit to Dunbar's Number in Online Social Networks. - Qingyue Zhang:
Multivariate vector sampling expansions in shift invariant subspaces. - Patrizio Pelliccione, Henry Muccini, Nicolas Guelfi, Alexander B. Romanovsky:
An Introduction to Software Engineering and Fault Tolerance. - Ines Di Loreto, Abdelkader Gouaïch:
Mixed Reality Serious Games: The Therapist Perspective. - Amod J. G. Anandkumar, Animashree Anandkumar, Sangarapillai Lambotharan, Jonathon A. Chambers:
Robust Rate-Maximization Game Under Bounded Channel Uncertainty. - Nikos Karampatziakis, John Langford:
Importance Weight Aware Gradient Updates. - Edoardo Carta-Gerardino:
The $z$-Transform and Automata-Recognizable Systems of Nonhomogeneous Linear Recurrence Equations over Semirings. - Nadeem Javaid, Ayesha Bibi, Karim Djouani:
Interference and Bandwidth Adjusted (ETX) in Wireless Multi-hop Networks. - Manu Jose, Rupak Majumdar:
Cause Clue Clauses: Error Localization using Maximum Satisfiability. - (Withdrawn) A Stable Explicit Scheme for Solving Non-Homogeneous Constant Coefficients Equation using Green's Function.
- Himanshu Asnani, Haim H. Permuter, Tsachy Weissman:
To Feed or Not to Feed Back. - Michele Basaldella, Kazushige Terui:
On the meaning of logical completeness. - Yinglin Li, Bican Xia, Zhihai Zhang:
Zero Decomposition with Multiplicity of Zero-Dimensional Polynomial Systems. - Anthony Desnos, Robert Erra, Eric Filiol:
Processor-Dependent Malware... and codes. - Hesam Sagha, Saeed Bagheri Shouraki, Seyed Hossein Khasteh, Ali Akbar Kiaei:
Reinforcement Learning Based on Active Learning Method. - Seyed Hossein Khasteh, Saeed Bagheri Shouraki, Ali Akbar Kiaei:
A New Sufficient Condition for 1-Coverage to Imply Connectivity. - Soummya Kar, José M. F. Moura:
Convergence Rate Analysis of Distributed Gossip (Linear Parameter) Estimation: Fundamental Limits and Tradeoffs. - Takayuki Nozaki, Kenta Kasai, Kohichi Sakaniwa:
Analytical Solution of Covariance Evolution for Irregular LDPC Codes. - Jesper Jansson, Kunihiko Sadakane, Wing-Kin Sung:
Compressed random access memory. - Anil N. Hirani, Kaushik Kalyanaraman, Seth Watts:
Least Squares Ranking on Graphs, Hodge Laplacians, Time Optimality, and Iterative Methods. - George Anderson, Tshilidzi Marwala, Fulufhelo V. Nelwamondo:
Use of Data Mining in Scheduler Optimization. - Harish Sheeranalli Venkatarama, Kandasamy Chandra Sekaran:
Regulating Response Time in an Autonomic Computing System: A Comparision of Proportional Control and Fuzzy Control Approaches. - P. Selvi, A. K. Bnerjee:
Automatic Short -Answer Grading System (ASAGS). - Benedikt Meurer:
OCamlJIT 2.0 - Faster Objective Caml. - B. R. Schlei:
Volume-Enclosing Surface Extraction. - Jaydip Sen, Kaustav Goswami:
An Algorithm for Detection of Selfish Nodes in Wireless Mesh Networks. - Martin Grohe, Ken-ichi Kawarabayashi, Dániel Marx, Paul Wollan:
Finding topological subgraphs is fixed-parameter tractable. - Shahar Dobzinski:
An Impossibility Result for Truthful Combinatorial Auctions with Submodular Valuations. - Oleg Pensky, Kirill Chernikov:
Fundamentals of Mathematical Theory of Emotional Robots. - Sergey P. Tarasov, Mikhail N. Vyalyi:
Orbits of linear maps and regular languages. - Benjamin Doerr, Mahmoud Fouz:
Asymptotically Optimal Randomized Rumor Spreading. - Davide Quatrini, Roberta De Angelis:
Reusing optical supports using a simple software. - Stevens Le Blond, Arnaud Legout, Walid Dabbous:
Pushing BitTorrent Locality to the Limit. - Zoran Sunic:
Normal art galleries: wall in - all in. - (Withdrawn) Shortened Hamming Codes Maximizing Double Error Detection.
- Jacob D. Abernethy, Peter L. Bartlett, Elad Hazan:
Blackwell Approachability and Low-Regret Learning are Equivalent. - Joseph W. Durham, Ruggero Carli, Paolo Frasca, Francesco Bullo:
Discrete Partitioning and Coverage Control for Gossiping Robots. - Jacob D. Abernethy, Yiling Chen, Jennifer Wortman Vaughan:
An Optimization-Based Framework for Automated Market-Making. - Jaydip Sen:
Mobility and Handoff Management in Wireless Networks. - (Withdrawn) Ubiquitous Computing: Potentials and Challenges.
- Rina Panigrahy:
Understanding the Cycle of Knowledge: Its rise, preservation and decay. - Weichao Xu, Yunhe Hou, Y. S. Hung, Yuexian Zou:
Comparison of Spearman's rho and Kendall's tau in Normal and Contaminated Normal Models. - Sergey Andreyev:
Excerpt from the book World of Movable Objects. - Jesper H. Sørensen, Petar Popovski, Jan Østergaard:
Design and Analysis of LT Codes with Decreasing Ripple Size. - Moslem Amiri:
Evaluation of Lifetime Bounds of Wireless Sensor Networks. - Dhruv Srivastava:
Towards Greener and Safer Mines. - Thomas Janssoone, Grégoire Chevreau, Lucile Vadcard, Pierre Mozer, Jocelyne Troccaz:
Biopsym : a learning environment for transrectal ultrasound guided prostate biopsies. - Zohaib Hassan Awan, Abdellatif Zaidi, Luc Vandendorpe:
On Secure Transmission over Parallel Relay Eavesdropper Channel. - Konstantinos Nikitopoulos, Gerd Ascheid:
Complexity Adjusted Soft-Output Sphere Decoding by Adaptive LLR Clipping. - Zohaib Hassan Awan, Abdellatif Zaidi, Luc Vandendorpe:
Secure Communication over Parallel Relay Channel. - Itai Ashlagi, Mark Braverman, Avinatan Hassidim:
Matching with Couples Revisited. - Isolde Adler, Philipp Klaus Krause:
A lower bound for the tree-width of planar graphs with vital linkages. - Pierre Fraigniaud, Amos Korman, David Peleg:
Local Distributed Decision. - Debayan Bose:
Component Based Development. - Marat V. Burnashev, Hirosuke Yamamoto:
On Reliability Function of BSC with Noisy Feedback. - Kyle Fox, Benjamin Moseley:
Online Scheduling on Identical Machines using SRPT. - Lei Ke, Zhengdao Wang:
Degrees of Freedom Regions of Two-User MIMO Z and Full Interference Channels: The Benefit of Reconfigurable Antennas. - Susan Khor:
Static and dynamic characteristics of protein contact networks. - Konstantinos I. Tsianos, Michael G. Rabbat:
Multiscale Gossip for Efficient Decentralized Averaging in Wireless Packet Networks. - Rogério Atem de Carvalho, Rodrigo Soares Manhães, Fernando Luis de Carvalho e Silva:
Introducing Business Language Driven Development. - Mohsen Jamali:
A Distributed Method for Trust-Aware Recommendation in Social Networks. - Sina Zahedpour, Mehdi Kalantari:
p-Norm Flow Optimization in a Network. - Ankur Moitra, Ryan O'Donnell:
Pareto Optimal Solutions for Smoothed Analysts. - Xingguo Shao, Qingguo Wang, Peter C. Y. Chen, Zhencai Zhu, Bin Zi:
Forward Kinematics Analysis and Tension Distribution of a Cable-Driven Sinking Winches Mechanism. - A. P. Reji, Tessamma Thomas:
Single Frame Image super Resolution using Learned Directionlets. - Samuel Nowakowski, Cédric Bernier, Anne Boyer:
Target tracking in the recommender space: Toward a new recommender system based on Kalman filtering. - A. A. Karawia:
A New Algorithm for Inverting General Cyclic Heptadiagonal Matrices Recursively. - Giulio Manzonetto:
What is a categorical model of the differential and the resource lambda-calculi? - Emmanuelle Anceaume, Xavier Défago, Maria Potop-Butucaru, Matthieu Roy:
A framework for proving the self-organization of dynamic systems. - Jun Wang, Paulo Urriza, Yuxing Han, Danijela Cabric:
Weighted Centroid Algorithm for Estimating Primary User Location: Theoretical Analysis and Distributed Implementation. - Mark Timmer, Mariëlle Stoelinga, Jaco van de Pol:
Confluence Reduction for Probabilistic Systems (extended version). - Oded Argon, Anat Bremler-Barr, Osnat Mokryn, Dvir Schirman, Yuval Shavitt, Udi Weinsberg:
On the Dynamics of IP Address Allocation and Availability of End-Hosts. - Pierluigi Frisco:
A network model with structured nodes. - Nihar B. Shah, K. V. Rashmi, P. Vijay Kumar, Kannan Ramchandran:
Distributed Storage Codes with Repair-by-Transfer and Non-achievability of Interior Points on the Storage-Bandwidth Tradeoff. - David Aumueller:
Usability Meets Instant Gratification on the Semantic Web. - Shahar Dobzinski, Hu Fu, Robert Kleinberg:
Optimal Auctions with Correlated Bidders are Easy. - Michael T. Goodrich:
Spin-the-bottle Sort and Annealing Sort: Oblivious Sorting via Round-robin Random Comparisons. - Ezio Bartocci, Diletta Romana Cacciagrano, Maria Rita Di Berardini, Emanuela Merelli, Luca Tesei:
Shape Calculus: Timed Operational Semantics and Well-formedness. - Graham Cormode:
Individual Privacy vs Population Privacy: Learning to Attack Anonymization. - Ali Akbar Kiaei, Saeed Bagheri Shouraki, Seyed Hossein Khasteh, Mahmoud Khademi:
Extended Active Learning Method. - Ankur Mani, Asuman E. Ozdaglar, Alex Pentland:
Existence of Stable Exclusive Bilateral Exchanges in Networks. - Hiroshi Abe:
A Stable Explicit Scheme for Solving Inhomogeneous Constant Coefficients Differential Equation using Green's Function. - Scott A. Carter, Laurent Denoue, John Adcock:
mVideoCast: Mobile, real time ROI detection and streaming. - Xin Li:
On the Problem of Local Randomness in Privacy Amplification with an Active Adversary. - Kaustuv Chaudhuri, Damien Doligez, Leslie Lamport, Stephan Merz:
Verifying Safety Properties With the TLA+ Proof System. - Vladimir Braverman, Rafail Ostrovsky:
Recursive Sketching For Frequency Moments. - Prasad Raghavendra, David Steurer, Madhur Tulsiani:
Reductions Between Expansion Problems. - Vladimir Braverman, Rafail Ostrovsky, Yuval Rabani:
Rademacher Chaos, Random Eulerian Graphs and The Sparse Johnson-Lindenstrauss Transform. - Anna Rimoldi, Massimiliano Sala, Enrico Bertolazzi:
Do AES encryptions act randomly? - Jorge Fox:
A Formal Model for Dynamically Adaptable Services. - Johannes Blümlein, Sebastian Klein, Carsten Schneider, Flavia Stan:
A Symbolic Summation Approach to Feynman Integral Calculus. - Nuno P. Lopes, Levent Aksoy, Vasco Manquinho, José Monteiro:
Optimally Solving the MCM Problem Using Pseudo-Boolean Satisfiability. - Ran Xu, Graeme Woodward, Kevin A. Morris, Taskin Koçak:
A Discrete Time Markov Chain Model for High Throughput Bidirectional Fano Decoders. - Pierre Fraigniaud, Andrzej Pelc:
Decidability Classes for Mobile Agents Computing. - (Withdrawn) P vs NP.
- Nam Yul Yu:
Deterministic Compressed Sensing Matrices from Multiplicative Character Sequences. - Ali Ayremlou, Mohammad Tofighi, Farokh Marvasti:
Compensating Interpolation Distortion by New Optimized Modular Method. - Andrew Schumann:
Towards Theory of Massive-Parallel Proofs. Cellular Automata Approach. - Salah A. Aly, Ahmed Ali-Eldin, H. Vincent Poor:
A Distributed Data Collection Algorithm for Wireless Sensor Networks with Persistent Storage Nodes. - Jijie Wang, Lei Lin, Ting Huang, Jingjing Wang, Zengyou He:
Efficient K-Nearest Neighbor Join Algorithms for High Dimensional Sparse Data. - Nick Letzepis, Alex J. Grant, Paul D. Alexander, David Haley:
Multipath Parameter Estimation from OFDM Signals in Mobile Channels. - Morgan Barbier:
New Set of Codes for the Maximum-Likelihood Decoding Problem. - Sreeram Kannan, Adnan Raja, Pramod Viswanath:
Approximately Optimal Wireless Broadcasting. - Shin-ichi Kuribayashi:
System Virtualization and Efficient ID Transmission Method for RFID Tag Infrastructure Network. - Giuseppe F. Italiano, Piotr Sankowski:
Improved Minimum Cuts and Maximum Flows in Undirected Planar Graphs. - Zhouyun Wu, Aiping Huang, Haojie Zhou, Cunqing Hua, Jun Qian:
Data Fusion Based Interference Matrix Generation for Cellular System Frequency Planning. - Patrick Seeling:
Web Conferencing Traffic - An Analysis using DimDim as Example. - Manuel Bodirsky, Michael Pinsker:
Schaefer's theorem for graphs. - Zining Cao:
Reducing Higher Order Pi-Calculus to Spatial Logics. - Olivier Bailleux:
Reified unit resolution and the failed literal rule. - Camille Leroux, Ido Tal, Alexander Vardy, Warren J. Gross:
Hardware architectures for Successive Cancellation Decoding of Polar Codes. - Carl Vogel, Jerom F. Janssen:
Emoticonsciousness. - Anshuman Sinha:
A Survey of System Security in Contactless Electronic Passports. - Thibault Bernard, Alain Bui, Laurence Pilard, Devan Sohier:
A Distributed Clustering Algorithm for Dynamic Networks. - Ian Pratt-Hartmann:
The Hamiltonian Syllogistic. - Shriprakash Sinha, Gert J. ter Horst:
Bounded Multivariate Surfaces On Monovariate Internal Functions. - Joan Bruna, Stéphane Mallat:
Classification with Scattering Operators. - Atish Das Sarma, Stephan Holzer, Liah Kor, Amos Korman, Danupon Nanongkai, Gopal Pandurangan, David Peleg, Roger Wattenhofer:
Distributed Verification and Hardness of Distributed Approximation. - Cihan Tepedelenlioglu, Sivaraman Dasarathan:
Distributed Detection over Gaussian Multiple Access Channels with Constant Modulus Signaling. - Hongtao Huang, Feng Xia, Jijie Wang, Siyu Lei, Guowei Wu:
Leakage-Aware Reallocation for Periodic Real-Time Tasks on Multicore Processors. - Ming Xu, Longhua Ma, Feng Xia, Tengkai Yuan, Jixin Qian, Meng Shao:
Design and Implementation of a Wireless Sensor Network for Smart Homes. - Weifeng Sun, Rong Cong, Feng Xia, Xiao Chen, Zhenquan Qin:
R-CA: A Routing-based Dynamic Channel Assignment Algorithm for Wireless Mesh Networks. - Guowei Wu, Jiankang Ren, Feng Xia, Lin Yao, Zichuan Xu:
Decentralized Inter-User Interference Suppression in Body Sensor Networks with Non-cooperative Game. - Longhua Ma, Tengkai Yuan, Feng Xia, Ming Xu, Jun Yao, Meng Shao:
A High-confidence Cyber-Physical Alarm System: Design and Implementation. - Yang Liu, Zhikui Chen, Feng Xia, Xiaoning Lv, Fanyu Bu:
A Trust Model Based on Service Classification in Mobile Services. - Tao Huang, Zhikui Chen, Feng Xia, Cheng Jin, Liang Li:
A Practical Localization Algorithm Based on Wireless Sensor Networks. - Lin Yao, Chi Lin, Xiangwei Kong, Feng Xia, Guowei Wu:
A Clustering-based Location Privacy Protection Scheme for Pervasive Computing. - Rui Cheng, Zhuo Yang, Feng Xia:
iZone: A Location-Based Mobile Social Networking System. - Irfan Syamsuddin, Junseok Hwang:
A New Fuzzy MCDM Framework to Evaluate E-Government Security Strategy. - Feng Xia, Xiangjie Kong, Zhenzhen Xu:
Cyber-Physical Control over Wireless Sensor and Actuator Networks with Packet Loss. - Guowei Wu, Jiankang Ren, Feng Xia, Zichuan Xu:
An Adaptive Fault-Tolerant Communication Scheme for Body Sensor Networks. - Loet Leydesdorff, Ismael Ràfols:
How Do Emerging Technologies Conquer the World? An Exploration of Patterns of Diffusion and Network Formation. - Nikolai Todorov Stoianov, Veselin Tsenov Tselkov:
E-net models for distribution, access and use of resources in security information systems. - Jamshid Abouei, J. David Brown, Konstantinos N. Plataniotis, Subbarayan Pasupathy:
On the Energy Efficiency of LT Codes in Proactive Wireless Sensor Networks. - James Aspnes:
Slightly smaller splitter networks. - Peihua Li:
Tensor-SIFT based Earth Mover's Distance for Contour Tracking. - Ricardo Gamelas Sousa, Jaime S. Cardoso:
The Data Replication Method for the Classification with Reject Option. - Tim Jacobs, Gopal Pandurangan:
Stochastic Analysis of a Churn-Tolerant Structured Peer-to-Peer Scheme. - Chamberlain Fong:
Warping Peirce Quincuncial Panoramas. - Shahar Dobzinski, Hu Fu, Robert Kleinberg:
Truthfulness via Proxies. - Nitin Saxena, C. Seshadhri:
Blackbox identity testing for bounded top fanin depth-3 circuits: the field doesn't matter. - Fionn Murtagh, Adam Ganz, Joe Reddington:
New Methods of Analysis of Narrative and Semantics in Support of Interactivity. - Zeeshan Ahmed, Saman Majeed:
Towards Increase in Quality by Preprocessed Source Code and Measurement Analysis of Software Applications. - Zeeshan Ahmed, Vasil Popov:
Integration of Flexible Web Based GUI in I-SOAS. - Zeeshan Ahmed, Ina Tacheva:
Integration of Agile Ontology Mapping towards NLP Search in I-SOAS. - Brendan Lucier, Renato Paes Leme:
Improved Social Welfare Bounds for GSP at Equilibrium. - Tian Peng Ren, Yong Liang Guan, Chau Yuen, Erry Gunawan, Er Yang Zhang:
Group-Decodable Space-Time Block Codes with Code Rate > 1. - Dhinaharan Nagamalai, Beatrice Cynthia Dhinakaran, Jae-Kwang Lee:
Bayesian Based Comment Spam Defending Tool. - Pedro R. D'Argenio, Pedro Sánchez Terraf, Nicolás Wolovick:
Bisimulations for Nondeterministic Labeled Markov Processes. - (Withdrawn) On the Noncoherent Capacity of Doubly Selective Rician-Fading Channels under Peak-Power Constraint.
- Md. Tanvir Al Amin:
Multi-core: Adding a New Dimension to Computing. - Sergey Tarasenko:
The Inverse Task of the Reflexive Game Theory: Theoretical Matters, Practical Applications and Relationship with Other Issues. - Guido de Caso, Diego Garbervetsky, Daniel Gorín:
Reducing the Number of Annotations in a Verification-oriented Imperative Language. - Brian Whitworth:
The emergence of the physical world from information processing. - Djamal Belazzougui:
Worst case efficient single and multiple string matching in the Word-RAM model. - Benjamin Doerr, Daniel Johannsen, Carola Winzen:
Non-Existence of Linear Universal Drift Functions. - Dirk Pattinson, Lutz Schröder:
Generic Modal Cut Elimination Applied to Conditional Logics. - Travis Gagie, Juha Kärkkäinen:
Counting Colours in Compressed Strings. - Srivathsa Acharya, Anurag Kumar, Vijay Dewangan, Navneet Sankara, Malati Hegde, S. V. R. Anand:
Distributed Construction of the Critical Geometric Graph in Dense Wireless Sensor Networks. - Travis Gagie, Kalle Karhu, Juha Kärkkäinen, Veli Mäkinen, Leena Salmela:
Pattern Kits. - Ho-Lin Chen, David Doty, Shinnosuke Seki, David Soloveichik:
Parallelism, Program Size, Time, and Temperature in Self-Assembly. - Yao Li, Emina Soljanin, Predrag Spasojevic:
Effects of the Generation Size and Overlap on Throughput and Complexity in Randomized Linear Network Coding. - Matt Challacombe, Nicolas Bock:
Fast Multiplication of Matrices with Decay. - Alejandro Díaz-Caro, Barbara Petit:
Sums in linear algebraic lambda-calculus. - Ahmed E. Kamal, Aditya Ramamoorthy, Long Long, Shizheng Li:
Overlay Protection Against Link Failures Using Network Coding. - Anon Plangprasopchok, Kristina Lerman, Lise Getoor:
A Probabilistic Approach for Learning Folksonomies from Structured Data. - Rumi Ghosh, Kristina Lerman:
A Framework for Quantitative Analysis of Cascades on Networks. - Yuanzhang Xiao, William R. Zame, Mihaela van der Schaar:
Technology Choices and Pricing Policies in Public and Private Wireless Networks. - Michael Bader, Hans-Joachim Bungartz, Dheevatsa Mudigere, Srihari Narasimhan, Babu Narayanan:
Fast GPGPU Data Rearrangement Kernels using CUDA. - I-Hsiang Wang:
Distributed Interference Cancellation in Multiple Access Channels. - Libin Jiang, Jean C. Walrand:
Approaching Throughput-optimality in Distributed CSMA Scheduling Algorithms with Collisions. - Joshua Shinavier:
Optimizing real-time RDF data streams. - Shlomi Dolev, Swan Dubois, Maria Potop-Butucaru, Sébastien Tixeuil:
Stabilizing data-link over non-FIFO channels with optimal fault-resilience. - Luca Roversi:
Linear lambda calculus with explicit substitutions as proof-search in Deep Inference. - Michael Dinitz, Robert Krauthgamer:
Directed Spanners via Flow-Based Linear Programs. - Stefano Bilotta, Filippo Disanto, Renzo Pinzani, Simone Rinaldi:
Catalan structures and Catalan pairs. - Romain Couillet, Jakob Hoydis, Mérouane Debbah:
A Deterministic Equivalent Approach to the Performance Analysis of Isometric Random Precoded Systems. - Wei Dai:
Commutative-like Encryption: A New Characterization of ElGamal. - A. A. Karawia:
On the Inverse Of General Cyclic Heptadiagonal and Anti-Heptadiagonal Matrices. - Curzio Basso, Matteo Santoro, Alessandro Verri, Silvia Villa:
PADDLE: Proximal Algorithm for Dual Dictionaries LEarning. - Amitav Mukherjee, S. Ali A. Fakoorian, Jing Huang, A. Lee Swindlehurst:
Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey. - Shirin Jalali, Andrea Montanari, Tsachy Weissman:
Lossy compression of discrete sources via Viterbi algorithm. - Jacob Ratkiewicz, Michael D. Conover, Mark R. Meiss, Bruno Gonçalves, Snehal Patil, Alessandro Flammini, Filippo Menczer:
Detecting and Tracking the Spread of Astroturf Memes in Microblog Streams. - Anand Bhalgat, Deeparnab Chakrabarty, Sanjeev Khanna:
Optimal Lower Bounds for Universal and Differentially Private Steiner Tree and TSP. - Dirk Helbing, Stefano Balietti:
How to Create an Innovation Accelerator. - Huarui Yin:
Comments on Degrees of freedom region for $K$-user interference channel with $M$ antennas. - Shiva Kintali:
Realizable Paths and the NL vs L Problem. - Ziyu Lv, Feng Xia, Guowei Wu, Lin Yao, Zhikui Chen:
iCare: A Mobile Health Monitoring System for the Elderly. - Emmanuel J. Candès, Yaniv Plan:
A probabilistic and RIPless theory of compressed sensing. - Wonjae Shin, Namyoon Lee, Jong Bu Lim, Changyong Shin, Kyunghun Jang:
Interference Alignment Through User Cooperation for Two-cell MIMO Interfering Broadcast Channels. - Sukwon Kim, Tracey Ho, Michelle Effros, Amir Salman Avestimehr:
Network error correction with unequal link capacities. - Minji Kim, Muriel Médard, João Barros:
Algebraic Watchdog: Mitigating Misbehavior in Wireless Network Coding. - Jiaming Qiu, Rui Zhang, Zhi-Quan Luo, Shuguang Cui:
Optimal Distributed Beamforming for MISO Interference Channels. - Heiko Hamann, Jürgen Stradner, Thomas Schmickl, Karl Crailsheim:
Artificial Hormone Reaction Networks: Towards Higher Evolvability in Evolutionary Multi-Modular Robotics. - Mathilde Noual:
Dynamics in parallel of double Boolean automata circuits. - V. F. Romanov:
Non-orthodox combinatorial models based on discordant structures. - Fernando Rosa-Velardo, David de Frutos-Escrig:
Decision Problems for Petri Nets with Names. - Dirk Helbing, Stefano Balietti:
From Social Simulation to Integrative System Design. - Mahmoud Ramezani Mayiami, Babak Seyfe, Hamid G. Bafghi:
Perfect Secrecy Using Compressed Sensing. - Yang Yu, Xin Yao, Zhi-Hua Zhou:
Evolutionary Algorithms as Guaranteed Approximation Optimizers. - Charles F. Cadieu, Kilian Koepsell:
Modeling Image Structure with Factorized Phase-Coupled Boltzmann Machines. - Lars Backstrom, Jure Leskovec:
Supervised Random Walks: Predicting and Recommending Links in Social Networks. - Praveen Kuruvada, Daniel Asamoah, Nikunj Dalal, Subhash C. Kak:
The Use of Rapid Digital Game Creation to Learn Computational Thinking. - Sachin Kadloor, Nandakishore Santhi:
Understanding Cascading Failures in Power Grids. - Andri Mirzal:
Clustering and Latent Semantic Indexing Aspects of the Singular Value Decomposition. - (Withdrawn) Design and simulation of a sigma delta ADC.
- Yunghsiang S. Han, Soji Omiwade, Rong Zheng:
Progressive Decoding for Data Availability and Reliability in Distributed Networked Storage. - Sergey Andreyev:
World of Movable Objects. Part 1. - Jonathan Marchand, Bruno Guillaume, Guy Perrier:
Motifs de graphe pour le calcul de dépendances syntaxiques complètes. - (Withdrawn) A full-custom ASIC design of a 8-bit, 25 MHz, Pipeline ADC using 0.35 um CMOS technology.
- Melanie E. Moses, Soumya Banerjee:
Biologically Inspired Design Principles for Scalable, Robust, Adaptive, Decentralized Search and Automated Response (RADAR). - Tomás Babiak, Mojmír Kretínský, Vojtech Rehák, Jan Strejcek:
A Short Story of a Subtle Error in LTL Formulas Reduction and Divine Incorrectness. - Hans L. Bodlaender, Bart M. P. Jansen, Stefan Kratsch:
Cross-Composition: A New Technique for Kernelization Lower Bounds. - Loïc Michel:
Variational and symplectic approach of the model-free control. - Chao Zhang, Huarui Yin, Pinyi Ren:
The Effects of Narrowband Interference on Finite-Resolution IR-UWB Digital Receiver. - M. H. Fazel Zarandi, Zahra S. Razaee:
A Fuzzy Clustering Model for Fuzzy Data with Outliers. - Victor M. Preciado, Ali Jadbabaie:
Analysis of Viral Spreading in Large-Scale Networks from Local Structural Information. - Andrea Montanari:
Graphical Models Concepts in Compressed Sensing. - Anton Salikhmetov:
Uniform Memory and Serialization for Lambda Calculus. - Bruno Scherrer:
Should one compute the Temporal Difference fix point or minimize the Bellman Residual? The unified oblique projection view. - Akram Hakiri:
QoS-enabled ANFIS Dead Reckoning Algorithm for Distributed Interactive Simulation. - Maël Le Treust, Hamidou Tembine, Samson Lasaulce, Mérouane Debbah:
Coverage games in small cells networks. - Mario Alviano, Wolfgang Faber:
Dynamic Magic Sets for Super-Consistent Answer Set Programs. - Arnon Avron, Ori Lahav:
On Constructive Connectives and Systems. - Manjish Pal:
Combinatorial Geometry of Graph Partitioning - I. - Yun Bao Huang:
Smooth infinite words over $n$-letter alphabets having same remainder when divided by $n$. - Gernot Veit Batz, Robert Geisberger, Dennis Luxen, Peter Sanders:
Compressed Transmission of Route Descriptions. - Travis Gagie, Gonzalo Navarro, Simon J. Puglisi:
New Algorithms on Wavelet Trees and Applications to Information Retrieval. - Hongda Xiao, Edmund M. Yeh:
Cascading Link Failure in the Power Grid: A Percolation-Based Analysis. - P. Venkata Subba Reddy, K. Viswanathan Iyer:
Algorithms for enumerating and counting D2CS of some graphs. - Gabriel Kerneis, Juliusz Chroboczek:
Continuation-Passing C, compiling threads to events through continuations. - A. A. Karawia:
A New Algorithm for General Cyclic Heptadiagonal Linear Systems Using Sherman-Morrison-Woodbury formula. - Elena Veronica Belmega, Samson Lasaulce:
Energy-Efficient Precoding for Multiple-Antenna Terminals. - Elena Veronica Belmega, Samson Lasaulce, Mérouane Debbah, Marc Jungers, Julien Dumont:
Power Allocation Games in Wireless Networks of Multi-antenna Terminals. - Elena Veronica Belmega, Brice Djeumou, Samson Lasaulce:
Gaussian Broadcast Channels with an Orthogonal and Bidirectional Cooperation Link. - Travis Gagie:
Bounds from a Card Trick. - Idan Ram, Michael Elad, Israel Cohen:
Generalized Tree-Based Wavelet Transform. - Samaneh Moghaddam, Fred Popowich:
Opinion Polarity Identification through Adjectives. - Christos Boutsidis, Anastasios Zouzias, Petros Drineas:
Random Projections for $k$-means Clustering. - Jaume Barceló, Boris Bellalta, Cristina Cano, Anna Sfairopoulou, Miquel Oliver, Kshitiz Verma:
Towards a Collision-Free WLAN: Dynamic Parameter Adjustment in CSMA/E2CA. - Jacques Demongeot, Sylvain Sené:
Nonlinear threshold Boolean automata networks and phase transitions. - Andrea Roli, Stefano Benedettini, Roberto Serra, Marco Villani:
Analysis of attractor distances in Random Boolean Networks. - Facundo Carreiro:
Characterization and definability in modal first-order fragments. - Roy Timo, Alex J. Grant, Gerhard Kramer:
Lossy Broadcasting in Two-Way Relay Networks with Common Reconstructions. - Florian Richoux:
Complexity of Homogeneous Co-Boolean Constraint Satisfaction Problems. - Manuel Bodirsky, Miki Hermann, Florian Richoux:
Complexity of Existential Positive First-Order Logic. - Seokhyun Yoon, Jun Heo:
Pair-wise Markov Random Fields Applied to the Design of Low Complexity MIMO Detectors. - Guangcan Liu, Ju Sun, Shuicheng Yan:
Closed-Form Solutions to A Category of Nuclear Norm Minimization Problems. - Pedro Cabalar:
A Logical Charaterisation of Ordered Disjunction. - Ash Mohammad Abbas:
Analysis of Generalized Impact Factor and Indices of Journals. - Dragana Bajovic, Bruno Sinopoli, João Manuel Freitas Xavier:
Sensor Selection for Event Detection in Wireless Sensor Networks. - Alexander A. Sherstov:
Strong direct product theorems for quantum communication and query complexity. - David Arthur, Steve Y. Oudot:
Reverse Nearest Neighbors Search in High Dimensions using Locality-Sensitive Hashing. - José Verschae, Andreas Wiese:
On the Configuration-LP for Scheduling on Unrelated Machines. - Ke Xu, Hongying Liu, Jiangchuan Liu, Meng Shen:
One More Weight is Enough: Toward the Optimal Traffic Engineering with OSPF. - Natarajan Meghanathan:
Performance Comparison of Link, Node and Zone Disjoint Multi-path Routing Strategies and Minimum Hop Single Path Routing for Mobile Ad Hoc Networks. - Sivan Sabato, Nathan Srebro, Naftali Tishby:
Tight Sample Complexity of Large-Margin Learning. - Umesh Bellur, Chetan S. Rao, S. D. Madhu Kumar:
Optimal Placement Algorithms for Virtual Machines. - Woohyuk Chang, Sae-Young Chung, Yong Hoon Lee:
Gaussian Relay Channel Capacity to Within a Fixed Number of Bits. - Muhammad Asim, Hala M. Mokhtar, Madjid Merabti:
A self-managing fault management mechanism for wireless sensor networks. - Jan Maluszynski, Andrzej Szalas:
Logical Foundations and Complexity of 4QL, a Query Language with Unrestricted Negation. - Amir Mahdi Khodaian, Babak Hossein Khalaj:
State-Based Random Access: A Cross-Layer Approach. - Amir Mahdi Khodaian, Babak Hossein Khalaj, Hamed Shah-Mansouri:
Optimal Utility-Energy tradeoff in Delay Constrained Random Access Networks. - Amir Mahdi Khodaian, Babak Hossein Khalaj:
Energy and Utility Optimization in Wireless Networks with Random Access. - Amir Mahdi Khodaian, Babak Hossein Khalaj, Mohammad Sadegh Talebi:
Utility Constrained Energy Minimization In Aloha Networks. - Amir Mahdi Khodaian, Babak Hossein Khalaj:
Delay Constrained Utility Maximization in Multihop Random Access Networks. - Emilio Ferrara, Giacomo Fiumara, Francesco Pagano:
Living City, a Collaborative Browser-based Massively Multiplayer Online Game. - Alex Papalexis:
A Coder-Decoder model for use in Lossless Data Compression. - Salvatore Catanese, Pasquale De Meo, Emilio Ferrara, Giacomo Fiumara:
Analyzing the Facebook Friendship Graph. - Yannis Haralambous, Elisa Lavagnino:
La réduction de termes complexes dans les langues de spécialité. - Mihai Patrascu, Mikkel Thorup:
The Power of Simple Tabulation Hashing. - Marijn Heule, Matti Järvisalo, Armin Biere:
Covered Clause Elimination. - Loet Leydesdorff, Kasper Welbers:
The semantic mapping of words and co-words in contexts. - Anne Broadbent, Stacey Jeffery, Alain Tapp:
Exact, Efficient and Information-Theoretically Secure Voting with an Arbitrary Number of Cheaters. - Piero Giacomelli:
Wheel Random Apollonian Graphs. - Amitav Mukherjee, A. Lee Swindlehurst:
Jamming Games in the MIMO Wiretap Channel With an Active Eavesdropper. - Derek Leong, Alexandros G. Dimakis, Tracey Ho:
Distributed Storage Allocations. - P. Venkata Subba Reddy, K. Viswanathan Iyer:
On conditional coloring of some graphs. - Karim M. El Defrawy, Srdjan Capkun, Gene Tsudik:
GDB: Group Distance Bounding Protocols. - Vikram Krishnamurthy:
Bayesian Quickest Detection with Phase-Distributed Change Time and Nonlinear Penalty -- A Lattice Programming Approach. - Thomas Bonald, Mathieu Feuillet:
On User-Level CSMA for Multi-Channel Wireless Networks. - Wen-Haw Chen, Sheng-Gwo Chen:
Computation of the shortest path between two curves on a parametric surface by geodesic-like method. - Sergey Andreyev:
World of Movable Objects. Part 2. - Getsy S. Sara, Kalaiarasi R, Neelavathy Pari S, D. Sridharan:
Energy Efficient Clustering and Routing in Mobile Wireless Sensor Network. - Jan Wielemaker, Tom Schrijvers, Markus Triska, Torbjörn Lager:
SWI-Prolog. - Hugo Hernández, Christian Blum:
Distributed Graph Coloring: An Approach Based on the Calling Behavior of Japanese Tree Frogs. - Fabrizio Caruso, Giovanni Giuffrida:
Optimizing On-Line Advertising. - M. Kamaraju, A. V. N. Tilak, K. Lal Kishore, K. Baburao:
VHDL Implementation and Verification of ARINC-429 Core. - Sahand Haji Ali Ahmad, Cem Tekin, Mingyan Liu, Richard Southwell, Jianwei Huang:
Spectrum Sharing as Spatial Congestion Games. - Roberto Barbuti, Giovanni A. Cignoni, Paolo Milazzo:
A Model for Configuration Management of Open Software Systems. - Paolo Boldi, Marco Rosa, Massimo Santini, Sebastiano Vigna:
Layered Label Propagation: A MultiResolution Coordinate-Free Ordering for Compressing Social Networks. - André Coelho, Hugo Ribeiro, Mário Silva, Rui José:
A system for coarse-grained location-based synchronisation. - Rastislav Lenhardt:
Proof of Concept: Fast Solutions to NP-problems by Using SAT and Integer Programming Solvers. - Sundaram Vanka, Martin Haenggi, Vijay Gupta:
Convergence Speed of the Consensus Algorithm with Interference and Sparse Long-Range Connectivity. - Hossein Hosseini, Neda Barzegar Marvasti, Farrokh Marvasti:
Image Inpainting Using Sparsity of the Transform Domain. - Anna Chmiel, Julian Sienkiewicz, Georgios Paltoglou, Kevan Buckley, Mike Thelwall, Janusz A. Holyst:
Negative emotions accelerating users activity in BBC Forum. - Hao Zhang, Minghua Chen, Abhay Parekh, Kannan Ramchandran:
An Adaptive Multi-channel P2P Video-on-Demand System using Plug-and-Play Helpers. - Fabian Kuhn, Thomas Moscibroda, Roger Wattenhofer:
Local Computation: Lower and Upper Bounds. - Gabriel Synnaeve, Pierre Bessière:
Bayesian Modeling of a Human MMORPG Player. - Zyed Bouzarkouna, Didier Yu Ding, Anne Auger:
Using Evolution Strategy with Meta-models for Well Placement Optimization. - Soheil Feizi-Khankandi, Muriel Médard:
On Network Functional Compression. - Brian Whitworth:
Simulating space and time. - (Withdrawn) GB-hash : Hash Functions Using Groebner Basis.
- Sachin Adlakha, Ramesh Johari, Gabriel Y. Weintraub:
Equilibria of Dynamic Games with Many Players: Existence, Approximation, and Market Structure. - Shang-Wei Zhao, Ruyong Feng, Xiao-Shan Gao:
On Functional Decomposition of Multivariate Polynomials with Differentiation and Homogenization. - Shay Mozes, Christian Sommer:
Exact Shortest Path Queries for Planar Graphs Using Linear Space. - Steven J. Gortler, Craig Gotsman, Ligang Liu, Dylan Thurston:
On affine rigidity. - Son Hoang Dau, Vitaly Skachek, Yeow Meng Chee:
Secure Index Coding with Side Information. - Amos Beimel, Eran Omri, Ilan Orlov:
Secure Multiparty Computation with Partial Fairness. - Eric Martin Heien, Derrick Kondo, David P. Anderson:
Correlated Resource Models of Internet End Hosts. - Paolo Boldi, Marco Rosa, Sebastiano Vigna:
HyperANF: Approximating the Neighbourhood Function of Very Large Graphs on a Budget. - Dan-Cristian Tomozei, Jean-Yves Le Boudec:
Satisfiability of Elastic Demand in the Smart Grid. - Panayotis Mertikopoulos, Elena Veronica Belmega, Aris L. Moustakas, Samson Lasaulce:
Dynamic Power Allocation Games in Parallel Multiple Access Channels. - Mats Carlsson, Per Mildner:
SICStus Prolog -- the first 25 years. - Andreas Tolk:
Using the C4ISR Architecture Framework as a Tool to Facilitate VV&A for Simulation Systems within the Military Application Domain. - Andreas Tolk, Dietmar Kunde:
Decision Support Systems - Technical Prerequisites and Military Requirements. - Daniel Dadush, Chris Peikert, Santosh S. Vempala:
Enumerative Algorithms for the Shortest and Closest Lattice Vector Problems in Any Norm via M-Ellipsoid Coverings. - Alexey Chernov:
On Theorem 2.3 in "Prediction, Learning, and Games" by Cesa-Bianchi and Lugosi. - Bo Ji, Changhee Joo, Ness B. Shroff:
Delay-Based Back-Pressure Scheduling in Multi-Hop Wireless Networks. - Sachin Adlakha, Ramesh Johari:
Mean Field Equilibrium in Dynamic Games with Complementarities. - Kaushik K. Tiwari:
Formulation Of A N-Degree Polynomial For Depth Estimation using a Single Image. - Dusko Pavlovic:
Quantifying and qualifying trust: Spectral decomposition of trust networks. - Erdem Koyuncu, Hamid Jafarkhani:
The Necessity of Relay Selection. - Brian Whitworth:
The Light of Existence. - (Withdrawn) Protocol Coding through Reordering of User Resources: Applications and Capacity Results.
- Tobias Marschall, Inke Herms, Hans-Michael Kaltenbach, Sven Rahmann:
Probabilistic Arithmetic Automata and their Applications. - Nuno M. Preguiça, Carlos Baquero, Paulo Sérgio Almeida, Victor Fonte, Ricardo Gonçalves:
Dotted Version Vectors: Logical Clocks for Optimistic Replication. - Sagarmoy Dutta, Piyush P. Kurur:
Quantum Cyclic Code of length dividing $p^{t}+1$. - Olivier Bailleux:
Evolving difficult SAT instances thanks to local search. - Cristina Feier, Stijn Heymans:
An Optimization for Reasoning with Forest Logic Programs. - Yaniv Altshuler, Alfred M. Bruckstein:
Static and Expanding Grid Coverage with Ant Robots : Complexity Results. - Yaniv Altshuler, Alfred M. Bruckstein:
On Short Cuts - or - Fencing in Rectangular Strips. - Meng Wang, Weiyu Xu, Ao Tang:
On the Performance of Sparse Recovery via L_p-minimization (0<=p <=1). - Emad Saad:
Reinforcement Learning in Partially Observable Markov Decision Processes using Hybrid Probabilistic Logic Programs. - Pantelis Bouboulis, Sergios Theodoridis:
Edge Preserving Image Denoising in Reproducing Kernel Hilbert Spaces. - Saeed Asaeedi, Farzad Didehvar:
Enumeration Order complexity Equivalency. - Morteza Mohammad Noori, Narges Ghareghani, Pouyeh Sharifani:
On z-factorization and c-factorization of standard episturmian words. - Shou-Pon Lin, Jhesyong Jiang, Wei-Ting Lin, Ping-Cheng Yeh, Hsuan-Jung Su:
Prediction-based Adaptation (PRADA) Algorithm for Modulation and Coding. - Sibylle B. Fröschle, Frank D. Valencia:
Proceedings 17th International Workshop on Expressiveness in Concurrency, EXPRESS'10, Paris, France, August 30th, 2010. EPTCS 41, 2010 [contents] - Di Li, Changchuan Yin, Changhai Chen:
A Selection Region Based Routing Protocol for Random Mobile ad hoc Networks with Directional Antennas. - Prabhanjan Vijendra Ananth, Ambedkar Dukkipati:
Border basis detection is NP-complete. - Gene I. Sher:
DXNN Platform: The Shedding of Biological Inefficiencies. - Thomas Legrand, Bernard Cousin, Nicolas Brochier:
Performance Evaluation of the Labelled OBS Architecture. - Shadi Jawhar, Bernard Cousin:
Optical Multicast Routing Under Light Splitter Constraints. - Hugues Cassé, Karine Heydemann, Haluk Ozaktas, Jonathan Ponroy, Christine Rochange, Olivier Zendra:
A framework to experiment optimizations for real-time and embedded software. - Lahatra Rakotondrainibe, Yvan Kokar, Gheorghe Zaharia, Guy Grunfelder, Ghaïs El Zein:
Single Carrier Architecture for High Data Rate Wireless PAN Communications System. - Lahatra Rakotondrainibe, Yvan Kokar, Gheorghe Zaharia, Guy Grunfelder, Ghaïs El Zein:
Performance Analysis of a 60 GHz Near Gigabit System for WPAN Applications. - Sebastian Nanz, Faraz Torshizi, Michela Pedroni, Bertrand Meyer:
A Comparative Study of the Usability of Two Object-oriented Concurrent Programming Languages. - Thomas Houit, Frank Nielsen:
Video Stippling. - Venkatesan N. Ekambaram, Kannan Ramchandran:
Distributed High Accuracy Peer-to-Peer Localization in Mobile Multipath Environments. - Piotr Berman, Arnab Bhattacharyya, Elena Grigorescu, Sofya Raskhodnikova, David P. Woodruff, Grigory Yaroslavtsev:
Steiner Transitive-Closure Spanners of d-Dimensional Posets. - Juho Park, Youngchul Sung, H. Vincent Poor:
On Beamformer Design for Multiuser MIMO Interference Channels. - Fabio Morbidi, Francesco Bullo, Domenico Prattichizzo:
Visibility maintenance via controlled invariance for leader-follower Dubins-like vehicles. - Sachin Agarwal:
Toward a Push-Scalable Global Internet. - Balasubramanian Sivan, Christopher A. Wilkens:
Single-Call Mechanisms. - Gaurav Bhatia, Vivek Kumar:
Adapting MAC 802.11 Adapting MAC 802.11 for Performance Optimization of MANET using Cross Layer Interaction. - Raphael Yuster:
Computing the diameter polynomially faster than APSP. - Jens M. Schmidt:
Contractions, Removals and How to Certify 3-Connectivity in Linear Time. - Chan Dai Truyen Thai, Petar Popovski, Megumi Kaneko, Elisabeth de Carvalho:
Coordinated Transmissions to Direct and Relayed Users in Wireless Cellular Systems. - K. Sasidhar, Vijaya L. Kakulapati, Ramakrishna Kolikipogu, K. KailasaRao:
Multimodal Biometric Systems - Study to Improve Accuracy and Performance. - Benedikt Meurer:
Just-In-Time compilation of OCaml byte-code. - Chitta Ranjan Singha:
A Proximity based Retransmission Scheme for Power Line Ad-hoc LAN. - Marek Cygan, Geevarghese Philip, Marcin Pilipczuk, Michal Pilipczuk, Jakub Onufry Wojtaszczyk:
Dominating Set is Fixed Parameter Tractable in Claw-free Graphs. - Pablo Jensen, Jean-Baptiste Rouquier, Nicolas Ovtracht, Céline Robardet:
Characterizing the speed and paths of shared bicycles in Lyon. - Igor Razgon:
Computing multiway cut within the given excess over the largest minimum isolating cut. - Matthew Hennessy:
A calculus for costed computations. - Raghu Meka:
Almost Optimal Explicit Johnson-Lindenstrauss Transformations. - Jos C. M. Baeten, Bas Luttik, Tim Muller, Paul van Tilburg:
Expressiveness modulo Bisimilarity of Regular Expressions with Parallel Composition (Extended Abstract). 1-15 - Federico Banti, Rosario Pugliese, Francesco Tiezzi:
A criterion for separating process calculi. 16-30 - Ugo Dal Lago, Simone Martini, Davide Sangiorgi:
Light Logics and Higher-Order Processes. 46-60 - Diego Figueira, Piotr Hofman, Slawomir Lasota:
Relating timed and register automata. 61-75 - Roberto Gorrieri, Cristian Versari:
A Process Calculus for Expressing Finite Place/Transition Petri Nets. 76-90 - Gavin Lowe:
Models for CSP with availability information. 91-105 - Peter D. Mosses, Mohammad Reza Mousavi, Michel A. Reniers:
Robustness of Equations Under Operational Extensions. 106-120 - Lasse Nielsen, Nobuko Yoshida, Kohei Honda:
Multiparty Symmetric Sum Types. 121-135 - Kirstin Peters, Uwe Nestmann:
Breaking Symmetries. 136-150 - Andrea Cerone, Matthew Hennessy:
Process Behaviour: Formulae vs. Tests (Extended Abstract). 31-45 - Tadashi Wadayama:
LP Decodable Permuation Codes. - Yoo Chung:
Precisely Analyzing Loss in Interface Adapter Chains. - Rajasekhar Inkulu, Sanjiv Kapoor, S. N. Maheshwari:
A near optimal algorithm for finding Euclidean shortest path in polygonal domain. - Howard Straubing, Pascal Weil:
An introduction to finite automata and their connection to logic. - Xiaohui Xu, Linpeng Huang, Dejun Wang, Jun-Qing Chen:
A Calculus of Consistent Component-based Software Updates. - Rajasekhar Inkulu, Sanjiv Kapoor:
Approximate Shortest Path through a Weighted Planar Subdivision. - Xiao-Shan Gao, Zhenyu Huang:
Efficient Characteristic Set Algorithms for Equation Solving in Finite Fields and Applications in Cryptanalysis. - Binod Kumar Pattanayak, Manoj Kumar Mishra, Alok Kumar Jagadev, Manojranjan Nayak:
Multi-Hop Bandwidth Management Protocol for Mobile Ad Hoc Networks. - Arwen Mullikin, Syed M. Rahman:
Ethical Dilemma of Governmental Wiretapping. - Bartosz Meglicki:
Generating functions partitioning algorithm for computing power indices in weighted voting games. - Axel Boldt:
Extending ArXiv.org to Achieve Open Peer Review and Publishing. - Dushyant Arora, Anja Feldmann, Gregor Schaffrath, Stefan Schmid:
On the Benefit of Virtualization: Strategies for Flexible Server Allocation. - Paulo Jesus, Carlos Baquero, Paulo Sérgio Almeida:
Dependability in Aggregation by Averaging. - Peter Bubenik:
Simplicial models for concurrency. - Min Li, Osvaldo Simeone, Aylin Yener:
Multiple Access Channels with States Causally Known at Transmitters. - Douglas Kim, Murat Torlak:
Interference Alignment via Improved Subspace Conditioning. - Ivana Tosic, Bruno A. Olshausen, Benjamin J. Culpepper:
Learning sparse representations of depth. - Andreas Tolk:
Functional Categories of Support to Operations in Military Information Systems. - Andreas Tolk:
Avoiding another Green Elephant - A Proposal for the Next Generation HLA based on the Model Driven Architecture. - Noson S. Yanofsky:
Galois Theory of Algorithms. - (Withdrawn) Ultimate crack and lack of any security in the statistical key exchange protocol with random signals and feedback.
- Stuart Weston, Timothy Natusch, Sergei Gulyaev:
Radio Astronomy and eVLBI using KAREN. - Jia Shao, Sergey V. Buldyrev, Shlomo Havlin, Harry Eugene Stanley:
Cascade of failures in coupled network systems with multiple support-dependent relations. - Menghui Li, Shuguang Guan, Choy Heng Lai:
Spontaneous Formation of Dynamical Groups in an Adaptive Networked System. - Michael S. Donders, Anant P. Godbole:
$t$-Covering Arrays Generated by a Tiling Probability Model. - Motohiro Makiguchi, Jun-ichi Inoue:
Optimization of artificial flockings by means of anisotropy measurements. - José Bento, Morteza Ibrahimi, Andrea Montanari:
Learning Networks of Stochastic Differential Equations. - Vassilis Kekatos, Georgios B. Giannakis:
From Sparse Signals to Sparse Residuals for Robust Sensing. - Vladimir Nikulin, Tian-Hsiang Huang, Shu-Kay Ng, Suren I. Rathnayake, Geoffrey J. McLachlan:
A Very Fast Algorithm for Matrix Factorization. - Jerome Le Ny, George J. Pappas:
Adaptive Algorithms for Coverage Control and Space Partitioning in Mobile Robotic Networks. - Manu Basavaraju, L. Sunil Chandran, Deepak Rajendraprasad, Arunselvan Ramaswamy:
Rainbow Connection Number and Radius. - Tamara Mihaljev, Lucilla de Arcangelis, Hans J. Herrmann:
Inter-arrival times of message propagation on directed networks. - Vicenç Gómez, Hilbert J. Kappen, Andreas Kaltenbrunner:
Modeling the structure and evolution of discussion cascades. - Devavrat Shah, Tauhid Zaman:
Community Detection in Networks: The Leader-Follower Algorithm. - Nell Sedransk, Lawrence H. Cox, Deborah Nolan, Keith Soper, Clifford H. Spiegelman, Linda J. Young, Katrina L. Kelner, Robert A. Moffitt, Ani Thakar, M. Jordan Raddick, Edward J. Ungvarsky, Richard W. Carlson, Rolf Apweiler:
Make Research Data Public?---Not Always so Simple: A Dialogue for Statisticians and Science Editors. - Blake Hunter, Thomas Strohmer:
Performance Analysis of Spectral Clustering on Compressed, Incomplete and Inaccurate Measurements. - Marco Tomassini, Enea Pestelacci:
Evolution of Coordination in Social Networks: A Numerical Study. - Jonathan D. Hauenstein, Frank Sottile:
alphaCertified: certifying solutions to polynomial systems. - Güven Demirel, Roshan Prizak, P. Nitish Reddy, Thilo Gross:
Opinion formation and cyclic dominance in adaptive networks. - Jose M. G. Vilar, Leonor Saiz:
CplexA: a Mathematica package to study macromolecular-assembly control of gene expression. - Jesús Gómez-Gardeñes, Miguel Romance, Regino Criado, Daniele Vilone, Ángel Sánchez:
Evolutionary Games defined at the Network Mesoscale: The Public Goods game. - Zuzana Masáková, Tomás Vávra:
Arithmetics in numeration systems with negative quadratic base. - Joep Evers, Adrian Muntean:
Modeling micro-macro pedestrian counterflow in heterogeneous domains. - Andrew M. Childs, Robin Kothari:
Quantum query complexity of minor-closed graph properties. - Daniel J. Hsu, Sham M. Kakade, Tong Zhang:
Robust Matrix Decomposition with Outliers. - Stasa Milojevic:
Power-law Distributions in Information Science - Making the Case for Logarithmic Binning. - Nicholas F. Travers, James P. Crutchfield:
Asymptotic Synchronization for Finite-State Sources. - Joel A. Tropp:
Improved analysis of the subsampled randomized Hadamard transform. - Velleda Baldoni, Nicole Berline, Jesús A. De Loera, Matthias Köppe, Michèle Vergne:
Computation of the highest coefficients of weighted Ehrhart quasi-polynomials of rational polyhedra. - Patrick O. Perry, Patrick J. Wolfe:
Point process modeling for directed interaction networks. - Jop Briët, Fernando Mário de Oliveira Filho, Frank Vallentin:
Grothendieck inequalities for semidefinite programs with rank constraint. - Wolfgang Steiner:
On the structure of beta-integers. - André Teixeira, György Dán, Henrik Sandberg, Karl Henrik Johansson:
A Cyber Security Study of a SCADA Energy Management System: Stealthy Deception Attacks on the State Estimator. - Jun-ichi Inoue, Yohei Saika, Masato Okada:
Statistical mechanics of digital halftoning. - Aaron F. McDaid, Neil J. Hurley:
Using Model-based Overlapping Seed Expansion to detect highly overlapping community structure. - Volker Diekert, Alexei G. Myasnikov:
Group extensions over infinite words. - Jia Xu, Yong Yao:
A complete algorithm for determining copositive matrices. - Heidi Gebauer:
Maker Can Construct a Sparse Graph on a Small Board. - Robert MacPherson, Benjamin Schweinhart:
Measuring Shape with Topology. - François Clément, Hend Ben Ameur, Guy Chavent, Pierre Weis:
Image Segmentation with Optimal Control Techniques. - Olivier Fercoq, Marianne Akian, Mustapha Bouhtou, Stéphane Gaubert:
Ergodic Control and Polyhedral approaches to PageRank Optimization. - Kentaro Katahira, Kenta Suzuki, Kazuo Okanoya, Masato Okada:
Complex sequencing rules of birdsong can be explained by simple hidden Markov processes. - (Withdrawn) Clustering using Unsupervised Binary Trees: CUBT.
- Anne-Ly Do, Thilo Gross:
Contact processes and moment closure on adaptive networks. - Gus Gutoski, Xiaodi Wu:
Short quantum games characterize PSPACE. - Andrea K. Barreiro, Julijana Gjorgjieva, Fred Rieke, Eric Shea-Brown:
When are feedforward microcircuits well-modeled by maximum entropy methods? - Hong Van Le:
A note on computational complexities of polynomial type. - Alexandre Gaudilliere, Benedetto Scoppola, Elisabetta Scoppola, Massimiliano Viale:
Phase transitions for the cavity approach to the clique problem on random graphs. - Sophie M. Fosson:
A Decoding Approach to Fault Tolerant Control of Linear Systems with Quantized Disturbance Input. - Alexander K. Hartmann:
Large-deviation properties of largest component for random graphs. - Roman Vershynin:
Introduction to the non-asymptotic analysis of random matrices. - Christian Borgs, Jennifer T. Chayes, Prasad Tetali:
Tight Bounds for Mixing of the Swendsen-Wang Algorithm at the Potts Transition Point. - Ankur Mani, Asuman E. Ozdaglar, Alex Pentland:
Generalized Stable Matching in Bipartite Networks. - Grey Ballard, James Demmel, Ioana Dumitriu:
Minimizing Communication for Eigenproblems and the Singular Value Decomposition. - Alexander Rakhlin, Karthik Sridharan, Ambuj Tewari:
Online Learning: Beyond Regret. - Timothy Sun, Chun Ye:
Rigidity of Graph Joins and Hendrickson's Conjecture. - Loet Leydesdorff:
"Meaning" as a sociological concept: A review of the modeling, mapping, and simulation of the communication of knowledge and meaning. - Scott Aaronson, Alex Arkhipov:
The Computational Complexity of Linear Optics. - Weihua Zhan, Zhongzhi Zhang, Jihong Guan, Shuigeng Zhou:
A evolutionary method for finding communities in bipartite networks. - Yusuke Osaki, Ken-Ichi Ishikawa:
Domain Decomposition method on GPU cluster. - Alexander A. Davydov, Giorgio Faina, Stefano Marcugini, Fernanda Pambianco:
On sizes of complete arcs in PG(2,q). - (Withdrawn) CAT-generation of ideals.
- Anthony B. Morton:
Prize insights in probability, and one goat of a recycled error: Jason Rosenhouse's The Monty Hall Problem. - Jason K. Johnson, Praneeth Netrapalli, Michael Chertkov:
Learning Planar Ising Models. - Neri Merhav:
A statistical-mechanical view on source coding: physical compression and data compression. - Jürgen Jost, Wei Li:
The tragedy of the commons in a multi-population complementarity game. - Jürgen Jost, Wei Li:
Learning, evolution and population dynamics. - James P. Gleeson, Sergey Melnik, Jonathan A. Ward, Mason A. Porter, Peter J. Mucha:
How Accurate is Mean-Field Theory for Dynamics on Real-World Networks? - Tomoyuki Obuchi, Kazutaka Takahashi, Koujin Takeda:
Statistical mechanical analysis of hierarchical random code ensemble in signal processing. - Carlos E. Laciana, Santiago L. Rovere:
Ising-like agent-based technology diffusion model: adoption patterns vs. seeding strategies. - Uri Levy:
Magnetic Towers of Hanoi and their Optimal Solutions. - Mark K. Goldberg, Malik Magdon-Ismail:
Embedding a Forest in a Graph. - Hans Adler, Isolde Adler:
Nowhere dense graph classes, stability, and the independence property. - Lucas Dixon, Aleks Kissinger:
Open Graphs and Monoidal Theories. - David J. Rosenbaum:
Quantum Algorithms for Tree Isomorphism and State Symmetrization. - Michele Tumminello, Salvatore Miccichè, Fabrizio Lillo, Jan Varho, Jyrki Piilo, Rosario N. Mantegna:
Community characterization of heterogeneous complex systems. - Benjamin A. Burton:
The Pachner graph and the simplification of 3-sphere triangulations. - Emmanuel Frénod, Eric Sonnendrücker:
Homogenization of the Vlasov Equation and of the Vlasov - Poisson System with a Strong External Magnetic Field. - Bernat Corominas-Murtra, Joaquín Goñi, Carlos Rodríguez-Caso, Ricard V. Solé:
Hierarchy and information in feedforward networks. - Taro Takaguchi, Naoki Masuda:
Voter model with non-Poissonian inter-event intervals. - David S. Choi, Patrick J. Wolfe, Edoardo M. Airoldi:
Stochastic blockmodels with growing number of classes. - Carlos Pedro Gonçalves:
Chaos in Binary Category Computation. - Yi Gai, Bhaskar Krishnamachari, Rahul Jain:
Combinatorial Network Optimization with Unknown Variables: Multi-Armed Bandits with Linear Rewards. - Wenhan Dai, Yi Gai, Bhaskar Krishnamachari, Qing Zhao:
The Non-Bayesian Restless Multi-Armed Bandit: a Case of Near-Logarithmic Regret. - Tamás Ladics:
Application of Operator Splitting to Solve Reaction Diffusion Equations. - Jukka-Pekka Onnela, Samuel Arbesman, Albert-László Barabási, Nicholas A. Christakis:
Geographic constraints on social network groups. - Haoyang Liu, Keqin Liu, Qing Zhao:
Learning in A Changing World: Non-Bayesian Restless Multi-Armed Bandit. - Shira Kritchman, Ran Raz:
The Surprise Examination Paradox and the Second Incompleteness Theorem. - Marcin Ostrowski:
Classical Information and Interpretation of Quantum Mechanics. - Andrij A. Rovenchak, Solomija N. Buk:
Application of a Quantum Ensemble Model to Linguistic Analysis. - Jean-Baptiste Rouquier, Damien Regnault, Eric Thierry:
Stochastic Minority on Graphs. - Luca Ferretti, Michele Cortelezzi:
Preferential attachment in growing spatial networks. - Gunnar E. Carlsson, Facundo Mémoli:
Classifying Clustering Schemes. - Daniel S. Katz, G. Bruce Berriman, Robert G. Mann:
Collaborative Astronomical Image Mosaics. - P. Kamphuis, P. C. van der Kruit:
Citations and impact of Dutch astronomy. - Man-Chung Yeung:
ML(n)BiCGStab: Reformulation, Analysis and Implementation. - Giovanna Miritello, Esteban Moro Egido, Rubén Lara:
The dynamical strength of social ties in information spreading. - Jean Berstel, Clelia de Felice, Dominique Perrin, Christophe Reutenauer, Giuseppina Rindone:
Bifix codes and Sturmian words. - Daniel Vainsencher, Shie Mannor, Alfred M. Bruckstein:
The Sample Complexity of Dictionary Learning. - Mark M. Wilde, Monireh Houshmand, Saied Hosseini-Khayat:
Examples of minimal-memory, non-catastrophic quantum convolutional encoders. - Ron T. L. Chan, Simon Hubbert:
A Numerical Study of Radial Basis Function Based Methods for Options Pricing under the One Dimension Jump-diffusion Model. - Andrey Kudinov:
Topological Modal Logics with Difference Modality. - Michel Habib, Juraj Stacho:
Unique perfect phylogeny is NP-hard. - Julien Lemoine, Simon Viennot:
Nimbers are inevitable. - Leon Danon, Ashley P. Ford, Thomas A. House, Chris P. Jewell, Matt J. Keeling, Gareth O. Roberts, Joshua V. Ross, Matthew C. Vernon:
Networks and the Epidemiology of Infectious Disease. - Velleda Baldoni, Nicole Berline, Matthias Köppe, Michèle Vergne:
Intermediate Sums on Polyhedra: Computation and Real Ehrhart Theory. - Daniel Plaumann, Bernd Sturmfels, Cynthia Vinzant:
Computing Linear Matrix Representations of Helton-Vinnikov Curves. - Marc Arnaudon, Frank Nielsen:
Medians and means in Finsler geometry. - Lucas Theis, Sebastian Gerwinn, Fabian H. Sinz, Matthias Bethge:
In All Likelihood, Deep Belief Is Not Enough. - Markward Britsch, Nikolai Gagunashvili, Michael Schmelling:
Classifying extremely imbalanced data sets. - Ayça Çesmelioglu, Gary McGuire, Wilfried Meidl:
A Construction of Weakly and Non-Weakly Regular Bent Functions. - Marija Mitrovic, Georgios Paltoglou, Bosiljka Tadic:
Quantitative Analysis of Bloggers Collective Behavior Powered by Emotions. - David A. Knowles, Zoubin Ghahramani:
Nonparametric Bayesian Sparse Factor Models with application to Gene Expression modelling. - Samet Oymak, Babak Hassibi:
New Null Space Results and Recovery Thresholds for Matrix Rank Minimization. - Matthew Woitaszek, Travis Metcalfe, Ian Shorrock:
AMP: A Science-driven Web-based Application for the TeraGrid. - Yue Ma, Lihong Zhi:
The Minimum-Rank Gram Matrix Completion via Fixed Point Continuation Method. - Leonidas S. Pitsoulis, Konstantinos Papalamprou:
Decomposition of Binary Signed-Graphic Matroids. - Raymond Hemmecke, Silvia Lindner, Milan Studený:
Learning restricted Bayesian network structures. - Gérard Henry Edmond Duchamp, Vincel Hoang Ngoc Minh, Allan I. Solomon, Silvia Goodenough:
An interface between physics and number theory. - Marcos Pita, Vladimir Privman, Mary A. Arugula, Dmitriy A. Melnikov, Vera Bocharova, Evgeny Katz:
Towards Biochemical Filter with Sigmoidal Response to pH Changes: Buffered Biocatalytic Signal Transduction. - Ryota Tomioka, Taiji Suzuki:
Regularization Strategies and Empirical Bayesian Learning for MKL. - Diogo A. Gomes, Joana Mohr, Rafael Rigão Souza:
Mean field limit of a continuous time finite state game. - Fernando G. S. L. Brandão, Matthias Christandl, Jon Yard:
A quasipolynomial-time algorithm for the quantum separability problem. - Florian Dörfler, Francesco Bullo:
On the Critical Coupling for Kuramoto Oscillators. - Jorn H. Baayen, Wubbo Johannes Ockels:
Tracking control with adaption of kites. - Sheelu Abraham, Ninan Sajeeth Philip, Ajit K. Kembhavi, Yogesh G. Wadadekar, Rita Sinha:
Photometric Catalogue of Quasars and Other Point Sources in the Sloan Digital Sky Survey. - Nicolas Dutil, Patrick M. Hayden:
Assisted Entanglement Distillation. - Nicolas Dutil, Patrick M. Hayden:
One-shot Multiparty State Merging. - Mehdi Saeedi, Mona Arabzadeh, Morteza Saheb Zamani, Mehdi Sedighi:
Block-based quantum-logic synthesis. - Bhaswar B. Bhattacharya, Sandip Das:
Holes or Empty Pseudo-Triangles in Planar Point Sets. - Kaitlyn Phillipson, J. Maurice Rojas:
Fewnomial Systems with Many Roots, and an Adelic Tau Conjecture. - Matthew P. Szudzik:
On the definability of functionals in Gödel's theory T.
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.