default search action
CoRR, January 2014
- Nils Bertschinger, David H. Wolpert, Eckehard Olbrich, Jürgen Jost:
Information geometry of influence diagrams and noncooperative games. - Atta ur Rehman Khan, Mazliza Othman, Abdul Nasir Khan:
A Novel Application Licensing Framework for Mobile Cloud Environment. - Alexandr Andoni, Aleksandar Nikolov, Krzysztof Onak, Grigory Yaroslavtsev:
Parallel Algorithms for Geometric Graph Problems. - Adrian Weller, Tony Jebara:
Approximating the Bethe partition function. - (Withdrawn) Bounds on the rate of superimposed codes.
- Bernhard Firner, Shridatt Sugrim, Yulong Yang, Janne Lindqvist:
Elastic Pathing: Your Speed is Enough to Track You. - Davide Martinenghi:
Determining Relevant Relations for Datalog Queries under Access Limitations is Undecidable. - Sanket Kamthe, Jan Peters, Marc Peter Deisenroth:
Multi-modal filtering for non-linear estimation. - Yin Tat Lee:
Probabilistic Spectral Sparsification In Sublinear Time. - Shraddha S. Shinde, Anagha P. Khedkar:
A Novel Approach For Generating Face Template Using Bda. - Mahdi Zamani, Mahnush Movahedi, Mohammad Mehdi Ebadzadeh, Hossein Pedram:
A Danger-Based Approach to Intrusion Detection. - Yukun Bao, Tao Xiong, Zhongyi Hu:
PSO-MISMO Modeling Strategy for Multi-Step-Ahead Time Series Prediction. - (Withdrawn) On Packing Almost Half of a Square with Anchored Rectangles: A Constructive Approach.
- Shaofan Wang, Dehui Kong, Juan Xue, Weijia Zhu, Min Xu, Baocai Yin, Hubert Roth:
Connectivity-preserving Geometry Images. - Nicola Blefari-Melazzi, Andrea Detti, Mayutan Arumaithurai, K. K. Ramakrishnan:
Internames: a name-to-name principle for the future Internet. - Dinesh Govindaraj, Raman Sankaran, Sreedal Menon, Chiranjib Bhattacharyya:
Controlled Sparsity Kernel Learning. - Oshri Naparstek, Amir Leshem:
Expected time complexity of the auction algorithm and the push relabel algorithm for maximal bipartite matching on random graphs. - Cunjing Ge, Feifei Ma, Jian Zhang:
A Fast and Practical Method to Estimate Volumes of Convex Polytopes. - Avinash N. Bhute, B. B. Meshram:
System Analysis And Design For Multimedia Retrieval Systems. - Uttam Bhattacharya, Amit Kumar Rahut, Sujoy De:
Audit Maturity Model. - Janusz A. Brzozowski, Marek Szykula:
Large Aperiodic Semigroups. - Michael Zibulevsky:
Speeding-Up Convergence via Sequential Subspace Optimization: Current State and Future Directions. - Tomasz Kociumaka, Jakub Radoszewski, Wojciech Rytter, Solon P. Pissis, Tomasz Walen:
Fast Algorithm for Partial Covers in Words. - Alex Pappachen James, Belur V. Dasarathy:
Medical Image Fusion: A survey of the state of the art. - Vijay V. S. P. Bhattiprolu, Sariel Har-Peled:
Separating a Voronoi Diagram. - Steve N'Guyen, Clément Moulin-Frier, Jacques Droulez:
Decision Making under Uncertainty: A Quasimetric Approach. - Suryajith Chillara, Partha Mukhopadhyay:
On the Limits of Depth Reduction at Depth 3 Over Small Finite Fields. - Adimurthi, G. D. Veerappa Gowda, Jérôme Jaffré:
The DFLU flux for systems of conservation laws. - Benoit Cornu, Lionel Seinturier, Martin Monperrus:
Reasoning and Improving on Software Resilience against Unanticipated Exceptions. - Peter Knabner, Jean Roberts:
Mathematical analysis of a discrete fracture model coupling Darcy flow in the matrix with Darcy-Forchheimer flow in the fracture. - Nabajyoti Medhi, Manjish Pal:
Devilsoid: A new paradigm for k-coverage in 3D Wireless Sensor Networks. - Chang Liu, Ramesh K. Sitaraman, Don Towsley:
Go-With-The-Winner: Client-Side Server Selection for Content Delivery. - Ahmed El Shafie, Ahmed K. Sultan, Tamer Khattab:
Band Allocation for Cognitive Radios with Buffered Primary and Secondary Users. - Amanda Redlich:
Unbalanced Allocations. - Nathan Lindzey, Ross M. McConnell:
Linear-Time Algorithms for Finding Tucker Submatrices and Lekkerkerker-Boland Subgraphs. - S. J. Gath, R. V. Kulkarni:
A Review: Expert System for Diagnosis of Myocardial Infarction. - Maria-Florina Balcan, Yingyu Liang, Pramod Gupta:
Robust Hierarchical Clustering. - Evgeny Latkin:
Twofold fast summation. - Dinesh Govindaraj, Tao Wang, S. V. N. Vishwanathan:
Modeling Attractiveness and Multiple Clicks in Sponsored Search Results. - Pedro Henrique Juliano Nardelli, Murilo S. Baptista, Carlos A. Pomalaza-Raez, Paulo Cardieri, Matti Latva-aho:
Network models for the structures of modern electric power grids. - Darko Dimitrov:
On structural properties of trees with minimal atom-bond connectivity index. - Reza Nourjou, Michinori Hatayama, Stephen F. Smith, Atabak Sadeghi, Pedro A. Szekely:
Design of a GIS-based Assistant Software Agent for the Incident Commander to Coordinate Emergency Response Operations. - Vadim E. Levit, David Tankus:
Complexity results on w-well-covered graphs. - Shahar Mendelson:
Learning without Concentration. - Tian Wang, Hamid Krim, Yannis Viniotis:
Analysis and Control of Beliefs in Social Networks. - Rachel Cummings, Federico Echenique, Adam Wierman:
The Empirical Implications of Privacy-Aware Choice. - Ahmed El Shafie:
Optimal Random Access and Random Spectrum Sensing for an Energy Harvesting Cognitive Radio with and without Primary Feedback Leveraging. - Peng Li, Rodrigo C. de Lamare:
Distributed Iterative Detection Based on Reduced Message Passing for Networked MIMO Cellular Systems. - Henry Cohn, Shafi Goldwasser, Yael Tauman Kalai:
The impossibility of obfuscation with a universal simulator. - Liya Fan, Bo Gao, Xi Sun, Fa Zhang, Zhiyong Liu:
Improving the Load Balance of MapReduce Operations based on the Key Distribution of Pairs. - Andrew Winslow:
Active self-assembly using an insertion primitive and context-free grammars have equal expressive power. - Hao Peng, Yuan Qi:
EigenGP: Gaussian process models with adaptive eigenfunctions. - Vaisagh Viswanathan T., Chong Eu Lee, Michael Harold Lees, Siew Ann Cheong, Peter M. A. Sloot:
Quantitative Comparison Between Crowd Models for Evacuation Planning and Evaluation. - Chao Zhang, Lei Zhang, Wei Fan, Jieping Ye:
Generalization Bounds for Representative Domain Adaptation. - Katarzyna Grygiel, Pierre Lescanne:
Counting Terms in the Binary Lambda Calculus. - Trupti M. Kodinariya:
Hybrid Approach to Face Recognition System using Principle component and Independent component with score based fusion process. - Marek Piotrów:
Faster 3-Periodic Merging Networks. - Gabriel Renault, Simon Schmidt:
On the Complexity of the Misère Version of Three Games Played on Graphs. - Christos Boutsidis, Malik Magdon-Ismail:
Faster SVD-Truncated Least-Squares Regression. - Constantin Siriteanu, Akimichi Takemura, Satoshi Kuriki, Donald St. P. Richards, Hyundong Shin:
Distribution of Schur Complement in Noncentral Wishart Matrix with Application to MIMO Zero-Forcing for Rician Fading. - N. S. Narayanaswamy, G. Ramakrishna:
On Minimum Average Stretch Spanning Trees in Polygonal 2-trees. - Omer Melih Gul, Elif Uysal-Biyikoglu:
UROP: A Simple, Near-Optimal Scheduling Policy for Energy Harvesting Sensors. - Pradeesha Ashok, Ninad Rajgopal, Sathish Govindarajan:
Selection Lemmas for various geometric objects. - Siva Anantharaman, Christopher Bouchard, Paliath Narendran, Michaël Rusinowitch:
Unification modulo a 2-sorted Equational theory for Cipher-Decipher Block Chaining. - David F. Nettleton, Vicenç Torra, Anton Dries:
The effect of constraints on information loss and risk for clustering and modification based graph anonymization methods. - Rodrigo C. de Lamare, Raimundo Sampaio Neto:
Sparsity-Aware Adaptive Algorithms Based on Alternating Optimization with Shrinkage. - Mabel Iglesias Ham, Michael Kerber, Caroline Uhler:
Sphere Packing with Limited Overlap. - Denzil Correa, Ashish Sureka:
Chaff from the Wheat : Characterization and Modeling of Deleted Questions on Stack Overflow. - Najiba Tagougui, Houcine Boubaker, Monji Kherallah, Adel M. Alimi:
A Hybrid NN/HMM Modeling Technique for Online Arabic Handwriting Recognition. - Ines Benali-Sougui, Minyar Sassi Hidri, Amel Grissa Touzi:
Flexible SQLf query based on fuzzy linguistic summaries. - Zádor Dániel Kelemen:
Process Based Unification for Multi-Model Software Process Improvement. - Chien Huynh, Phuong Huynh:
Student-based Collaborative Network for Delivering Information of Natural Disasters and Climate Adaptation. - Yann N. Dauphin, Gökhan Tür, Dilek Hakkani-Tür, Larry P. Heck:
Zero-Shot Learning and Clustering for Semantic Utterance Classification. - Chris J. Maddison, Daniel Tarlow:
Structured Generative Models of Natural Source Code. - Khalid Jebari, Mohammed Madiafi, Abdelaziz El Moujahid:
Solving Poisson Equation by Genetic Algorithms. - Mounire Benhima, John P. Reilly, Zaineb Naamane, Meriam Kharbat, Mohammed Issam Kabbaj, Oussama Esqalli:
Design and implementation of the Customer Experience Data Mart in the Telecommunication Industry: Application Order-To-Payment end to end process. - Amy Fu, Parastoo Sadeghi, Muriel Médard:
Beyond the Min-Cut Bound: Deterministic Network Coding for Asynchronous Multirate Broadcast. - Muhammad S. Sohail, Muhammad Omer Bin Saeed, Syed Zeeshan Rizvi, Mobien Shoaib, Asrar U. H. Sheikh:
Low-Complexity Particle Swarm Optimization for Time-Critical Applications. - Michael Sherman, Gradeigh Clark, Yulong Yang, Shridatt Sugrim, Arttu Modig, Janne Lindqvist, Antti Oulasvirta, Teemu Roos:
User-Generated Free-Form Gestures for Authentication: Security and Memorability. - Nazareno Aguirre, Leila Ribeiro:
Proceedings First Latin American Workshop on Formal Methods, LAFM 2013, Buenos Aires, Argentina, August 26th 2013. - Son Doan, Mike Conway, Tu Minh Phuong, Lucila Ohno-Machado:
Natural Language Processing in Biomedicine: A Unified System Architecture Overview. - Ling-Hua Chang, Jwo-Yuh Wu:
An Improved RIP-Based Performance Guarantee for Sparse Signal Recovery via Orthogonal Matching Pursuit. - Sanjeev Arora, Aditya Bhaskara, Rong Ge, Tengyu Ma:
More Algorithms for Provable Dictionary Learning. - Garrett A. Warnell, Sourabh Bhattacharya, Rama Chellappa, Tamer Basar:
Adaptive-Rate Compressive Sensing Using Side Information. - Thomas Sandholm, Dongman Lee, Bjorn Tegelund, Seon-Yeong Han, Byoungheon Shin, Byoungoh Kim:
CloudFridge: A Testbed for Smart Fridge Interactions. - Puneet Kumar, Dharminder Kumar, Narendra Kumar:
ICT in Local Self Governance: A Study of Rural India. - Wu Wu, Jiulin Hu, Xiaofang Huang, Huijie Chen, Bo Sun:
Flight trajectory recreation and playback system of aerial mission based on ossimplanet. - Ali Sheharyar, Othmane Bouhali:
A Framework for Creating a Distributed Rendering Environment on the Compute Clusters. - Anna-Lena Trautmann:
Message Encoding for Spread and Orbit Codes. - Moshe Lewenstein, Yakov Nekrich, Jeffrey Scott Vitter:
Space-Efficient String Indexing for Wildcard Pattern Matching. - Stephan Doerfel, Daniel Zoller, Philipp Singer, Thomas Niebler, Andreas Hotho, Markus Strohmaier:
Of course we share! Testing Assumptions about Social Tagging Systems. - Fatma El-Ghannam, Tarek El-Shishtawy:
Multi-Topic Multi-Document Summarizer. - Russell J. Bradford, James H. Davenport, Matthew England, Scott McCallum, David J. Wilson:
Truth Table Invariant Cylindrical Algebraic Decomposition. - David J. Wilson, Russell J. Bradford, James H. Davenport, Matthew England:
Cylindrical Algebraic Sub-Decompositions. - Owen Sims, Robert P. Gilles:
Critical Nodes In Directed Networks. - Bruno Mery, Richard Moot, Christian Retoré:
Plurals: individuals and sets in a richly typed semantics. - Zhe Wang, Qinwei Zhang, Jing Yuan, Xiaogang Wang:
MRF denoising with compressed sensing and adaptive filtering. - Michael A. Bekos, Martin Gronemann, Chrysanthi N. Raftopoulou:
Two-Page Book Embeddings of 4-Planar Graphs. - (Withdrawn) Machine Assisted Authentication of Paper Currency: an Experiment on Indian Banknotes.
- Bartlomiej Placzek, Marcin Bernas:
Uncertainty-based information extraction in wireless sensor networks for control applications. - Konstantin Makarychev, Yury Makarychev:
Nonuniform Graph Partitioning with Unrelated Weights. - Massimo Cafaro, Piergiulio Tempesta, Marco Pulimeno:
Mergeable Summaries With Low Total Error. - Timo Jolivet, Jarkko Kari:
Undecidable properties of self-affine sets and multi-tape automata. - Taraka Rama, Sudheer Kolachina, Lakshmi Bai B:
Quantitative methods for Phylogenetic Inference in Historical Linguistics: An experimental case study of South Central Dravidian. - Ishanu Chattopadhyay, Hod Lipson:
Computing Entropy Rate Of Symbol Sources & A Distribution-free Limit Theorem. - Ahmet Iscen, Anil Armagan, Pinar Duygulu:
What is usual in unusual videos? Trajectory snippet histograms for discovering unusualness. - Ahmet Iscen, Eren Golge, Pinar Duygulu:
ConceptVision: A Flexible Scene Classification Framework. - Megasthenis Asteris, Alexandros G. Dimakis:
Repairable Fountain Codes. - Ishanu Chattopadhyay, Hod Lipson:
Data Smashing. - Junjian Qi, Kai Sun, Shengwei Mei:
An Interaction Model for Simulation and Mitigation of Cascading Failures. - Aaron Snook, Grant Schoenebeck, Paolo Codenotti:
Graph Isomorphism and the Lasserre Hierarchy. - Sparsh Mittal:
A Study of Successive Over-relaxation Method Parallelization Over Modern HPC Languages. - Xi Li, Weiming Hu, Chunhua Shen, Anthony R. Dick, Zhongfei Zhang:
Context-Aware Hypergraph Construction for Robust Spectral Clustering. - Sparsh Mittal:
A Survey of Techniques For Improving Energy Efficiency in Embedded Computing Systems. - Chunhua Shen, Fayao Liu:
From Kernel Machines to Ensemble Learning. - Hua-Wei Shen, Dashun Wang, Chaoming Song, Albert-László Barabási:
Modeling and Predicting Popularity Dynamics via Reinforced Poisson Processes. - Zizhan Zheng, Zhixue Lu, Prasun Sinha, Santosh Kumar:
Ensuring Predictable Contact Opportunity for Scalable Vehicular Internet Access On the Go. - Taraka Rama, Lars Borin:
Properties of phoneme N -grams across the world's language families. - Petr N. Vabishchevich, Petr E. Zakharov:
Domain decomposition methods with overlapping subdomains for time-dependent problems. - Michael Gr. Voskoglou:
A stochastic model for Case-Based Reasoning. - Qiang Huo, Tianxi Liu, Shaohui Sun, Lingyang Song, Bingli Jiao:
Selective Combining for Hybrid Cooperative Networks. - Rajkumar Pradhan, Madhumangal Pal:
Intuitionistic Fuzzy Linear Transformations. - Hossein Rashmanlou, Madhumangal Pal:
Antipodal Interval-Valued Fuzzy Graphs. - Kamel Ibn Aziz Derouiche:
Interaction entre mathématique et informatique Libre/Open Source par le logiciel mathématique. - Jie Xu, Yiannis Andreopoulos, Yuanzhang Xiao, Mihaela van der Schaar:
Non-stationary Resource Allocation Policies for Delay-constrained Video Streaming: Application to Video over Internet-of-Things-enabled Networks. - Videh Seksaria:
Multimodal Optimization by Sparkling Squid Populations. - Mingming Fan, Maryam Khademi:
Predicting a Business Star in Yelp from Its Reviews Text Alone. - I. Laurence Aroquiaraj, K. Thangavel:
Pectoral Muscles Suppression in Digital Mammograms using Hybridization of Soft Computing Methods. - Justin Ziniel, Philip Schniter:
Binary Linear Classification and Feature Selection via Generalized Approximate Message Passing. - Anoop J. Sahoo, Mohammad Amir Khusru Akhtar:
Determining the Possibilities and Certainties in Network Participation for MANETS. - Unnikrishnan Kunnath Ganesan, B. Sundar Rajan:
Space-Time Coded Spatial Modulated Physical Layer Network Coding for Two-Way Relaying. - Ning Chen, Nick Gravin, Pinyan Lu:
Optimal Competitive Auctions. - Stefano Berardi, Ugo de'Liguoro:
Knowledge Spaces and the Completeness of Learning Strategies. - Najashi Gafai Bara'u, Feng Wenjiang, Mohammed Dikko Almustapha:
Spectrum Hole Prediction Based On Historical Data: A Neural Network Approach. - Dorina Thanou, David I. Shuman, Pascal Frossard:
Learning parametric dictionaries for graph signals. - Yue Guo, Xuelian Shen, Zhanfeng Zhu:
Research on the mobile robots intelligent path planning based on ant colony algorithm application in manufacturing logistics. - Nir Weinberger, Neri Merhav:
Large Deviations Analysis of Variable-Rate Slepian-Wolf Coding. - Singh Vijendra, Shivani Pathak:
Feature Selection Using Classifier in High Dimensional Data. - P. Clarke:
A Search Procedure for Cyclic Subsets. - Jochen Burghardt:
Maintaining partial sums in logarithmic time. - Azam Majooni, Mona Masood, Amir Akhavan:
A survey on the importance of visualization and social collaboration in academic digital libraries. - Shinkyu Park, Nuno C. Martins:
A Class of LTI Distributed Observers for LTI Plants: Necessary and Sufficient Conditions for Stabilizability. - Djamal Belazzougui:
Linear time construction of compressed text indices in compact space. - Adeyinka K. Akanbi:
LB2CO: A Semantic Ontology Framework for B2C eCommerce Transaction on the Internet. - Rodrigo Castaño, Juan Pablo Galeotti, Diego Garbervetsky, Jonathan Tapicer, Edgardo Zoppi:
On Verifying Resource Contracts using Code Contracts. 1-15 - Pablo F. Castro, T. S. E. Maibaum:
Automated Reasoning over Deontic Action Logics with Finite Vocabularies. 16-30 - Valentin Cassano, T. S. E. Maibaum:
Actions and Events in Concurrent Systems Design. 31-45 - Germán Regis, Fernando Villar, Nicolás Ricci:
Fluent Logic Workflow Analyser: A Tool for The Verification of Workflow Properties. 46-51 - Valério Medeiros Júnior, David Déharbe:
BEval: A Plug-in to Extend Atelier B with Current Verification Technologies. 53-58 - Pablo Bendersky, Juan Pablo Galeotti, Diego Garbervetsky:
The DynAlloy Visualizer. 59-64 - Manuel Giménez, Mariano M. Moscato, Carlos Gustavo López Pombo, Marcelo F. Frias:
HeteroGenius: A Framework for Hybrid Analysis of Heterogeneous Software Specifications. 65-70 - Gastón Scilingo, María Marta Novaira, Renzo Degiovanni:
Analyzing Behavioural Scenarios over Tabular Specifications Using Model Checking. 71-76 - Nitin Saxena:
Progress on Polynomial Identity Testing - II. - Virgil Griffith:
A Principled Infotheoretic φ-like Measure. - Chi Jin, Ziteng Wang, Junliang Huang, Yiqiao Zhong, Liwei Wang:
Differentially Private Data Releasing for Smooth Queries with Synthetic Database Output. - Chunxiao Cai, Yueming Cai, Xiangyun Zhou, Weiwei Yang, Wendong Yang:
When Does Relay Transmission Give a More Secure Connection in Wireless Ad Hoc Networks? - Malisa Vucinic, Bernard Tourancheau, Andrzej Duda:
Performance Comparison of the RPL and LOADng Routing Protocols in a Home Automation Scenario. - Lisa Allali, Olivier Hermant:
Semantic A-translation and Super-consistency entail Classical Cut Elimination. - Nanditha P. Rao, Shahbaz Sarik, Madhav P. Desai:
On the likelihood of multiple bit upsets in logic circuits. - Guangxu Zhu, Caijun Zhong, Himal A. Suraweera, Zhaoyang Zhang, Chau Yuen:
Outage Probability of Dual-Hop Multiple Antenna AF Systems with Linear Processing in the Presence of Co-Channel Interference. - Pinar Sen, Ali Özgür Yilmaz:
Factor Graph Based LMMSE Filtering for Colored Gaussian Processes. - Holger H. Hoos, Roland Kaminski, Marius Lindauer, Torsten Schaub:
Solver Scheduling via Answer Set Programming. - Noreen Jamil:
Constraint Solvers for User Interface Layout. - A. Ibrahim, Shivakumar Sastry, P. S. Sastry:
Discovering Compressing Serial Episodes from Event Sequences. - Benedikt Ahrens, Régis Spadotti:
Coinitial semantics for redecoration of triangular matrices. - Pulkit Grover:
"Information-Friction" and its implications on minimum energy required for communication. - Sicco Verwer, Yingqian Zhang, Qing Chuan Ye:
Learning optimization models in the presence of unknown relations. - Sander P. A. Alewijnse, Quirijn W. Bouts, Alex P. ten Brink, Kevin Buchin:
Distribution-Sensitive Construction of the Greedy Spanner. - Paulo Shakarian, Hansheng Lei, Roy Lindelauf:
Power Grid Defense Against Malicious Cascading Failure. - Klaus Jaffe, Astrid Florez, Cristina M. Gomes, Daniel Rodríguez, Carla Achury:
On the biological and cultural evolution of shame: Using internet search tools to weight values in many cultures. - Felix Krahmer, Holger Rauhut:
Structured random measurements in signal processing. - Manuj Mukherjee, Navin Kashyap:
On the Communication Complexity of Secret Key Generation in the Multiterminal Source Model. - Nicolas Galichet, Michèle Sebag, Olivier Teytaud:
Exploration vs Exploitation vs Safety: Risk-averse Multi-Armed Bandits. - Yu Chen, Weicheng Xie, Xiufen Zou:
A binary differential evolution algorithm learning from explored solutions. - Matthew Anderson, Anuj Dawar:
On Symmetric Circuits and Fixed-Point Logics. - Adrian Ispas, Christian Schneider, Gerd Ascheid, Reiner S. Thomä:
Analysis of the Local Quasi-Stationarity of Measured Dual-Polarized MIMO Channels. - Andrew Polonsky:
Extensionality of lambda-. - Axel Bacher, Olivier Bodini, Alice Jacquot:
Efficient random sampling of binary and unary-binary trees via holonomic equations. - Andrew Polonsky:
Internalization of extensional equality. - Michal Benes, Radek Stefan:
Hygro-thermo-mechanical analysis of spalling in concrete walls at high temperatures as a moving boundary problem. - Benjamin Roth, Tassilo Barth, Michael Wiegand, Mittul Singh, Dietrich Klakow:
Effective Slot Filling Based on Shallow Distant Supervision Methods. - Emmanuel Baccelli, Felix Juraschek, Oliver Hahm, Thomas C. Schmidt, Heiko Will, Matthias Wählisch:
Proceedings of the 3rd MANIAC Challenge, Berlin, Germany, July 27 - 28, 2013. - Zhenhua Yu, Arthur J. Redfern, G. Tong Zhou:
Using Delta-Sigma Modulators in Visible Light OFDM Systems. - Hessam Zakerzadeh, Charu C. Aggarwal, Ken Barker:
Towards Breaking the Curse of Dimensionality for High-Dimensional Privacy: An Extended Version. - Souvik Bhowmick, Purnendu Banerjee:
Bangla Text Recognition from Video Sequence: A New Focus. - Zichong Chen, Juri Ranieri, Runwei Zhang, Martin Vetterli:
DASS: Distributed Adaptive Sparse Sensing. - Zhiyang Liu, Lin Dai:
A Comparative Study of Downlink MIMO Cellular Networks with Co-located and Distributed Base-Station Antennas. - Ming Liu, Maryline Hélard, Jean-François Hélard, Matthieu Crussière:
A Fast Decodable Full-Rate STBC with High Coding Gain for 4x2 MIMO Systems. - Yeray Cachon Santana:
A Cryptographic Scheme Of Mellin Transform. - Behzad Asadi, Lawrence Ong, Sarah J. Johnson:
The Capacity of Three-Receiver AWGN Broadcast Channels with Receiver Message Side Information. - Mathias Niepert, Guy Van den Broeck:
Tractability through Exchangeability: A New Perspective on Efficient Probabilistic Inference. - Karim Habak, Khaled A. Harras, Moustafa Youssef:
OSCAR: A Collaborative Bandwidth Aggregation System. - Jens Heidrich, Jürgen Münch:
Implementing Software Project Control Centers: An Architectural View. - Garry Pantelis:
Program Verification of Numerical Computation. - Hossein Shokri Ghadikolaei, Carlo Fischione:
Analysis and Optimization of Distributed Random Sensing Order in Cognitive Radio Networks. - Senjuti Basu Roy, Ioanna Lykourentzou, Saravanan Thirumuruganathan, Sihem Amer-Yahia, Gautam Das:
Optimization in Knowledge-Intensive Crowdsourcing. - Jiping Xiong, Qinghua Tang, Jian Zhao:
1-bit Compressive Data Gathering for Wireless Sensor Networks. - Tobias Kretz, Karsten Lehmann, Ingmar Hofsäß, Axel Leonhardt:
Dynamic Assignment in Microsimulations of Pedestrians. - Sayan Mitra:
Proving Abstractions of Dynamical Systems through Numerical Simulations. - Chandra Sekhar Vorugunti, Mrudula Sarvabhatla:
A Robust Biometric-Based Three-factor Remote User Authentication Scheme. - Michael Kläs, Frank Elberzhager, Jürgen Münch, Klaus Hartjes, Olaf von Graevemeyer:
Transparent Combination of Expert and Measurement Data for Defect Prediction: An Industrial Case Study. - Bogdan Oancea, Stefan Cristian Ciucu:
Time series forecasting using neural networks. - Feng Xi, Shengyao Chen, Zhong Liu:
Quadrature Compressive Sampling for Radar Signals. - Cristian Chilipirea, Andreea-Cristina Petre, Ciprian Dobre:
MANIAC Challenge: The Wolf-pack strategy. - Isaac Supeene, Asanga Udugama, René Steinrücken:
Selfishness as a Virtue in Mobile Ad Hoc Networks. - Thomas Buchmann, Johannes Baumgartl, Dominik Henrich, Bernhard Westfechtel:
Towards A Domain-specific Language For Pick-And-Place Applications. - Ming Liu, Jean-François Hélard, Matthieu Crussière, Maryline Hélard:
Reduced-complexity maximum-likelihood decoding for 3D MIMO code. - Zdenek Dvorák, Robin Thomas:
List-coloring apex-minor-free graphs. - Lei Wang, Jianfeng Zhan, Chunjie Luo, Yuqing Zhu, Qiang Yang, Yongqiang He, Wanling Gao, Zhen Jia, Yingjie Shi, Shujie Zhang, Chen Zheng, Gang Lu, Kent Zhan, Xiaona Li, Bizhu Qiu:
BigDataBench: a Big Data Benchmark Suite from Internet Services. - Gabriel B. T. Kalejaiye, João A. S. R. Rondina, Leonardo V. V. L. Albuquerque, Taís L. Pereira, Luiz F. O. Campos, Raphael A. S. Melo, Daniel S. Mascarenhas, Marcelo M. Carvalho:
Mobile Offloading in Wireless Ad Hoc Networks. - Alan Ferrari, Dario Gallucci:
B-Maniac. - Stefan König:
Computational Aspects of the Hausdorff Distance in Unbounded Dimension. - Denis Kuperberg:
Linear Temporal Logic for Regular Cost Functions. - Diego Fernando C. Carrión L:
A Recursive Algorithmic Approach to the Finding of Permutations for the Combination of Any Two Sets. - Kalpana Kandpal, Anjali Singhal:
Smart Grid Demand Monitoring Model. - Margarita Karkali, François Rousseau, Alexandros Ntoulas, Michalis Vazirgiannis:
Using temporal IDF for efficient novelty detection in text streams. - Young-Ho Eom, Hang-Hyun Jo:
Generalized friendship paradox in complex networks. - Clemens Grabmayer, Jan Rochel:
Maximal Sharing in the Lambda Calculus with letrec. - David Balduzzi:
Cortical prediction markets. - Mikhail Andreev, Akim Kumok:
The sum 2KA(x)-KP(x) over all prefixes x of some binary sequence can be infinite. - Sariel Har-Peled, Nirman Kumar:
Robust Proximity Search for Balls using Sublinear Space. - Paulo Shakarian, Gerardo I. Simari, Marcelo A. Falappa:
Belief Revision in Structured Probabilistic Argumentation. - Sariel Har-Peled, Benjamin Raichel:
On the Complexity of Randomly Weighted Voronoi Diagrams. - Andrey Garnaev, Yezekael Hayel, Eitan Altman:
Multilevel Pricing Schemes in a Deregulated Wireless Network Market. - Yair Carmon, Shlomo Shamai:
Lower Bounds and Approximations for the Information Rate of the ISI Channel. - Imdad Ali Ismaili, Zeeshan Bhatti, Azhar Ali Shah:
Design & Development of the Graphical User Interface for Sindhi Language. - Zeeshan Bhatti, Asadullah Shah, Farruh Shahidi, Mostafa Karbasi:
Forward and Inverse Kinematics Seamless Matching Using Jacobian. - Karim G. Seddik:
On the Stability of Random Multiple Access with Feedback Exploitation and Queue Priority. - Colleen Swanson, Douglas R. Stinson:
Additional Constructions to Solve the Generalized Russian Cards Problem using Combinatorial Designs. - Devis Pantano:
Proposta di nuovi strumenti per comprendere come funziona la cognizione (Novel tools to understand how cognition works). - Lorna Stewart, Richard Anthony Valenzano:
On polygon numbers of circle graphs and distance hereditary graphs. - Zheng Wen, Daniel O'Neill, Hamid Reza Maei:
Optimal Demand Response Using Device Based Reinforcement Learning. - Alessandro Checco, Carlo Lancia, Douglas J. Leith:
Using Crowd sourcing for Local Topology Discovery in Wireless Networks. - Moshe Babaioff, Noam Nisan, Renato Paes Leme:
Price Competition in Online Combinatorial Markets. - Tao Xiong, Yukun Bao, Zhongyi Hu:
Beyond One-Step-Ahead Forecasting: Evaluation of Alternative Multi-Step-Ahead Forecasting Models for Crude Oil Prices. - Xuegong Deng:
The security deposit for finitely repeated Prisoner's dilemma. - Quan Quan, Lu Jiang, Kai-Yuan Cai:
Discrete-Time Output-Feedback Robust Repetitive Control for a Class of Nonlinear Systems by Additive State Decomposition. - Quan Quan, Kai-Yuan Cai:
A New Causal Ideal Internal Dynamics Generator. - James Hensman, Magnus Rattray, Neil D. Lawrence:
Fast variational inference for nonparametric clustering of structured time-series. - Enrico Paolini, Gianluigi Liva, Marco Chiani:
Coded Slotted ALOHA: A Graph-Based Method for Uncoordinated Multiple Access. - Eduardo Vega-Fuentes, Sonia Leon-del Rosario, Juan Manuel Cerezo-Sanchez, Aurelio Vega-Martinez:
Fuzzy Inference System for VOLT/VAR control in distribution substations in isolated power systems. - J. Gerard Wolff:
Smart machines and the SP theory of intelligence. - Oshri Naparstek, Amir Leshem, Eduard A. Jorswieck:
Distributed medium access control for energy efficient transmission in cognitive radios. - Tobias Kretz, Karsten Lehmann, Ingmar Hofsäß:
Pedestrian Route Choice by Iterated Equilibrium Search. - Sergey Andreyev:
Tendencies, Dead-ends, and Promising Ways. From Interface Ideas to New Programs. - Martin Hofmann, Harald Ruess:
Certification for mu-calculus with winning strategies. - Ritesh Kolte, Urs Niesen, Piyush Gupta:
Energy-Efficient Communication over the Unsynchronized Gaussian Diamond Network. - Cedomir Stefanovic, Miyu Momoda, Petar Popovski:
Exploiting Capture Effect in Frameless ALOHA for Massive Wireless Random Access. - Helga Gudmundsdottir, Eyjólfur Ingi Ásgeirsson, Marijke H. L. Bodlaender, Joseph T. Foley, Magnús M. Halldórsson, Geir M. Järvelä, Henning Úlfarsson, Ymir Vigfusson:
Measurement Based Interference Models for Wireless Scheduling Algorithms. - Alessandro Sordoni, Jian-Yun Nie:
Looking at Vector Space and Language Models for IR using Density Matrices. - Avinash N. Bhute, B. B. Meshram:
Content Based Image Indexing and Retrieval. - Noreen Jamil, Johannes Müller, Christof Lutteroth, Gerald Weber:
Speeding up SOR Solvers for Constraint-based GUIs with a Warm-Start Strategy. - (Withdrawn) A Solution of Degree Constrained Spanning Tree Using Hybrid GA.
- Abhinav Sinha, Achilleas Anastasopoulos:
Generalized Proportional Allocation Mechanism Design for Unicast Service on the Internet. - Vladimir Braverman, Jonathan Katzman, Charles Seidell, Gregory Vorsanger:
Approximating Large Frequency Moments with O(n1-2/k) Bits. - (Withdrawn) Query Expansion with Biomedical Ontology Graph for Effective MEDLINE Document Retrieval.
- Mathieu Leconte, Marc Lelarge, Laurent Massoulié:
Adaptive Replication in Distributed Content Delivery Networks. - Yang Xiang:
Simple linear algorithms for mining graph cores. - Vignesh Jagadeesh, Robinson Piramuthu, Anurag Bhardwaj, Wei Di, Neel Sundaresan:
Large Scale Visual Recommendations From Street Fashion Images. - Arunabha Sen, Anisha Mazumder, Joydeep Banerjee, Arun Das, Randy Compton:
Identification of K Most Vulnerable Nodes in Multi-layered Network Using a New Model of Interdependency. - Stanislas Lauly, Alex Boulanger, Hugo Larochelle:
Learning Multilingual Word Representations using a Bag-of-Words Autoencoder. - Matthew S. Bauer:
The Computational Complexity of Propositional Cirquent Calculus. - Peter T. Breuer, Jonathan P. Bowen:
Empirical Patterns in Google Scholar Citation Counts. - Paul Beame, Paraschos Koutris, Dan Suciu:
Skew in Parallel Query Processing. - Subhonmesh Bose, Steven H. Low, Thanchanok Teeraratkul, Babak Hassibi:
Equivalent relaxations of optimal power flow. - Elad Liebman, Peter Stone:
DJ-MC: A Reinforcement-Learning Agent for Music Playlist Recommendation. - Yuli Sun, Jinxu Tao:
Image reconstruction from few views by L0-norm optimization. - Shuxing Li, Tao Feng, Gennian Ge:
On the Weight Distribution of Cyclic Codes with Niho Exponents. - Mahdi Shahbaba, Soosan Beheshti:
Efficient unimodality test in clustering by signature testing. - Young-Chul Shim:
Distributed Cloud Computing Environment Enhanced with Capabilities for Wide-Area Migration and Replication of Virtual Machines. - Dogan Corus, Per Kristian Lehre, Frank Neumann, Mojgan Pourhassan:
A Parameterized Complexity Analysis of Bi-level Optimisation with Evolutionary Algorithms. - Peter Liggesmeyer, Jens Heidrich, Jürgen Münch, Robert Kalcklösch, Henning Barthel, Dirk Zeckzer:
Visualization of Software and Systems as Support Mechanism for Integrated Software Project Control. - Md. Ibrahim Chowdhury, Mohammad Iqbal, Naznin Sultana, Faisal Rahman:
Analyzing an Analytical Solution Model for Simultaneous Mobility. - Martin Kowalczyk, Jürgen Münch, Masafumi Katahira, Tatsuya Kaneko, Yuko Miyamoto, Yumi Koishi:
Aligning Software-related Strategies in Multi-Organizational Settings. - Adam Trendowicz, Michael Kläs, Constanza Lampasona, Jürgen Münch, Christian Körner, Matthias Saft:
Model-based Product Quality Evaluation with Multi-Criteria Decision Analysis. - Tao Xiong, Yukun Bao, Zhongyi Hu:
Multiple-output support vector regression with a firefly algorithm for interval-valued stock price index forecasting. - Jose Dario Luis Delgado, Jesus Maximo Ramirez Santiago:
Key Performance Indicators for QOS Assessment in TETRA Networks. - Silu Huang, James Cheng, Huanhuan Wu:
Temporal Graph Traversals: Definitions, Algorithms, and Applications. - Yukun Bao, Zhongyi Hu, Tao Xiong:
A PSO and Pattern Search based Memetic Algorithm for SVMs Parameters Optimization. - Ankur Sinha, Pekka Malo, Kalyanmoy Deb:
Test Problem Construction for Single-Objective Bilevel Optimization. - Rania Morsi, Diomidis S. Michalopoulos, Robert Schober:
Multi-user Scheduling Schemes for Simultaneous Wireless Information and Power Transfer Over Heterogeneous Fading Channels. - Stelios Stefanatos, Angeliki Alexiou:
Exploiting Frequency and Spatial Dimensions in Small Cell Wireless Networks. - Vu Nguyen, Dinh Q. Phung, XuanLong Nguyen, Svetha Venkatesh, Hung Hai Bui:
Bayesian Nonparametric Multilevel Clustering with Group-Level Contexts. - Bernardetta Addis, Giuliana Carello, Antonio Capone, Luca Giovanni Gianoli, Brunilde Sansò:
Robust Energy Management for Green and Survivable IP Networks. - Yassine Maleh, Abdellah Ezzati:
A review of security attacks and Intrusion Detection Schemes in Wireless Sensor Networks. - Raphael Felipe de Carvalho Prates, Guillermo Cámara Chávez, William Robson Schwartz, David Menotti:
Brazilian License Plate Detection Using Histogram of Oriented Gradients and Sliding Windows. - Michele Dolfi, Jan Gukelberger, Andreas Hehn, J. Imriska, K. Pakrouski, Troels F. Rønnow, Matthias Troyer, I. N. Zintchenko, Fernando Seabra Chirigati, Juliana Freire, Dennis E. Shasha:
A model project for reproducible papers: critical temperature for the Ising model on a square lattice. - R. V. Mayer:
A study of Monte-Carlo method in a teachers' training institute. - C. Jeyabharathi, A. Pethalakshmi:
New Approaches with Chord in Efficient P2P Grid Resource Discovery. - Samuele Giraudo, Jean-Gabriel Luque, Ludovic Mignot, Florent Nicart:
Operads, quasiorders and regular languages. - Joseph Y. Halpern, Willemien Kets:
A logic for reasoning about ambiguity. - Shoubin Kong, Qiaozhu Mei, Ling Feng, Zhe Zhao, Fei Ye:
On the Real-time Prediction Problems of Bursting Hashtags in Twitter. - Olusanya Y. Agunbiade, Tranos Zuva, Awosejo O. Johnson, Keneilwe Zuva:
Enhancement performance of road recognition system of autonomous robots in shadow scenario. - Vanaja Ramaswamy, Abinaya Sivarasu, Bharghavi Sridharan, Hamsalekha Venkatesh:
A Bi-Scheduler Algorithm for Frame Aggregation in IEEE 802.11n. - Rachit Puri:
Gesture recognition based mouse events. - Danny Hermelin, Gad M. Landau, Yuri Rabinovich, Oren Weimann:
Binary Jumbled Pattern Matching via All-Pairs Shortest Paths. - Stefan Hougardy, Mirko Wilde:
On the Nearest Neighbor Rule for the Metric Traveling Salesman Problem. - H. L. Prasad, Prashanth L. A., Shalabh Bhatnagar:
Algorithms for Nash Equilibria in General-Sum Stochastic Games. - Massimo Carro:
NoSQL Databases. - Dragan Vidakovic, Dusko Parezanovic, Zoran Vucetic:
Minimizing the Time of Detection of Large (Probably) Prime Numbers. - Rohit Negi, Vinay Uday Prabhu, Miguel R. D. Rodrigues:
Latent Sentiment Detection in Online Social Networks: A Communications-oriented View. - Alexey A. Frolov, Pavel S. Rybin, Victor V. Zyablov:
On the Capacity of the Multiuser Vector Adder Channel. - Ahmed El Shafie, Tamer Khattab:
Maximum Throughput for a Cognitive Radio Multi-Antenna User with Multiple Primary Users. - Alexey A. Frolov, Pavel S. Rybin:
Upper Bounds on the Minimum Distance of Quasi-Cyclic LDPC codes Revisited. - Carlos Pedro Gonçalves:
Emotional Responses in Artificial Agent-Based Systems: Reflexivity and Adaptation in Artificial Life. - Paul Tranquilli, Adrian Sandu:
Lightly Implicit Krylov-Exponential (LIKE) Methods. - Prosenjit Bose, André van Renssen:
Upper Bounds on the Spanning Ratio of Constrained Theta-Graphs. - Alyssa Goodman, Alberto Pepe, Alexander W. Blocker, Christine L. Borgman, Kyle Cranmer, Mercè Crosas, Rosanne Di Stefano, Yolanda Gil, Paul Groth, Margaret L. Hedstrom, David W. Hogg, Vinay Kashyap, Ashish Mahabal, Aneta Siemiginowska, Aleksandra B. Slavkovic:
10 Simple Rules for the Care and Feeding of Scientific Data. - (Withdrawn) Ontology - Based Dynamic Business Process Customization.
- Stefanie Roos, Thorsten Strufe:
NextBestOnce: Achieving Polylog Routing despite Non-greedy Embeddings. - Mina Karzand, Lizhong Zheng:
Achievability of Nonlinear Degrees of Freedom in Correlatively Changing Fading Channels. - Graham Cormode, Hossein Jowhari:
A Second Look at Counting Triangles in Graph Streams. - Cai Gao, Chao Yan, Daijun Wei, Yong Hu, Sankaran Mahadevan, Yong Deng:
A biologically inspired model for transshipment problem. - Laurent Moalic, Alexandre Gondran:
Variations on Memetic Algorithms for Graph Coloring Problems. - Yuanzhang Xiao, Mihaela van der Schaar:
Foresighted Demand Side Management. - Ching-Lueh Chang:
A lower bound for metric 1-median selection. - Ashkan Paya, Dan C. Marinescu:
Energy-aware Load Balancing Policies for the Cloud Ecosystem. - Sergio Grammatico, Xiaojing Zhang, Kostas Margellos, Paul Goulart, John Lygeros:
A scenario approach for non-convex control design. - Te-Yuan Huang, Ramesh Johari, Nick McKeown, Matthew Trunnell, Mark Watson:
Using the Buffer to Avoid Rebuffers: Evidence from a Large Video Streaming Service. - Georges Kaddoum, Pascal Giard:
Analog Network Coding for Multi-User Spread-Spectrum Communication Systems. - Alireza Goudarzi, Peter Banda, Matthew R. Lakin, Christof Teuscher, Darko Stefanovic:
A Comparative Study of Reservoir Computing for Temporal Signal Processing. - Yu-Chih Huang, Krishna R. Narayanan, Nihat Engin Tunali:
Multistage Compute-and-Forward with Multilevel Lattice Codes Based on Product Constructions. - R. Jensi, G. Wiselin Jiji:
A Survey on optimization approaches to text document clustering. - P. P. Bhattacharya, Ananya Sarkar, Indranil Sarkar, Subhajit Chatterjee:
An ANN Based Call Handoff Management Scheme for Mobile Cellular Network. - Sitthichai Laisema, Panita Wannapiroon:
Collaborative learning model with virtual team in ubiquitous learning environment using creative problem solving process. - Noppadon Phumeechanya, Panita Wannapiroon:
Ubiquitous Scaffold Learning Environment Using Problem-based Learning to Enhance Problem-solving Skills and Context Awareness. - Yorick Hardy, Willi-Hans Steeb:
Boolean Functions, Quantum Gates and Computer Algebra. - Md. Palash Uddin, Ashfaque Ahmed, Md. Delowar Hossain, Masud Ibn Afjal, Shah Md. Tanvir Siddiquee:
High speed data retrieval from national data center (ndc) reducing time and ignoring spelling error in search key based on double metaphone algorithm. - Benjamin Roth:
Assessing Wikipedia-Based Cross-Language Retrieval Models. - Hemant Kumar Aggarwal, Angshul Majumdar:
Extension of Sparse Randomized Kaczmarz Algorithm for Multiple Measurement Vectors. - Kamran Najeebullah, Kifayat-Ullah Khan, Waqas Nawaz, Young-Koo Lee:
BPP: Large Graph Storage for Efficient Disk Based Processing. - Loet Leydesdorff, Han Woo Park:
Can Synergy in Triple-Helix Relations be Quantified? A Review of the Development of the Triple-Helix Indicator. - Abdoulaye Tall, Zwi Altman, Eitan Altman:
Self Organizing strategies for enhanced ICIC (eICIC). - Zhe Wang, Vaneet Aggarwal, Xiaodong Wang:
Iterative Dynamic Water-filling for Fading Multiple-Access Channels with Energy Harvesting. - Chiranjeev Kumar:
Approximation Algorithm Project. - Marco Dalai:
An Elias Bound on the Bhattacharyya Distance of Codes for Channels with a Zero-Error Capacity. - Ghassan Samara, Tareq Alhmiedat, Amer O. Abu Salem:
Dynamic Safety Message Power Control in VANET Using PSO. - Zhe Wang, Vaneet Aggarwal, Xiaodong Wang:
Power Allocation for Energy Harvesting Transmitter with Causal Information. - L. Thorne McCarty:
Clustering, Coding, and the Concept of Similarity. - Lucas Assirati, Alexandre Souto Martinez, Odemir Martinez Bruno:
Satellite image classification and segmentation using non-additive entropy. - Frederik Armknecht, Tommaso Gagliardoni, Stefan Katzenbeisser, Andreas Peter:
General Impossibility of Group Homomorphic Encryption in the Quantum World. - N. Prakash, V. Lalitha, P. Vijay Kumar:
Codes with Locality for Two Erasures. - Ryan O'Donnell, John Wright, Chenggang Wu, Yuan Zhou:
Hardness of robust graph isomorphism, Lasserre gaps, and asymmetry of random graphs. - Werner Mach, Benedikt Pittl, Erich Schikuta:
A Prediction Model for the Probability of SLA Matching in Consumer Provider Contracting of Web Services. - Ryan Williams:
New algorithms and lower bounds for circuits with linear threshold gates. - Michael B. Cohen, Gary L. Miller, Jakub W. Pachocki, Richard Peng, Shen Chen Xu:
Stretching Stretch. - Erich Schikuta, Erwin Mann:
N2Sky - Neural Networks as Services in the Clouds. - Barry Hurley, Serdar Kadioglu, Yuri Malitsky, Barry O'Sullivan:
Transformation-based Feature Computation for Algorithm Portfolios. - Marko Horvat, Nikola Bogunovic, Kresimir Cosic:
STIMONT: A core ontology for multimedia stimuli description. - Andino Maseleno, Md. Mahmud Hasan:
Dempster-Shafer Theory for Move Prediction in Start Kicking of The Bicycle Kick of Sepak Takraw Game. - Hatm Alkadeki, Xingang Wang, Michael O. Odetayo:
Estimation of Medium Access Control Layer Packet Delay Distribution for IEEE 802.11. - Sinan Yildirim, A. Taylan Cemgil, Sumeetpal S. Singh:
An Online Expectation-Maximisation Algorithm for Nonnegative Matrix Factorisation Models. - Anthony Mendes, Kent E. Morrison:
Guessing games. - Masato Tajima, Koji Okino, Tatsuto Murayama:
Reduction of Error-Trellises for Tail-Biting Convolutional Codes Using Shifted Error-Subsequences. - Tao Xiong, Yukun Bao, Zhongyi Hu:
Does Restraining End Effect Matter in EMD-Based Modeling Framework for Time Series Prediction? Some Experimental Evidences. - Yukun Bao, Tao Xiong, Zhongyi Hu:
Multi-Step-Ahead Time Series Prediction using Multiple-Output Support Vector Regression. - Randall Dougherty, Eric Freiling, Kenneth Zeger:
Characteristic-Dependent Linear Rank Inequalities with Applications to Network Coding. - Abhijit Bhattacharya, Akhila Rao, Kolar Purushothama Naveen, P. P. Nishanth, S. V. R. Anand, Anurag Kumar:
QoS Constrained Optimal Sink and Relay Placement in Planned Wireless Sensor Networks. - Stefano Berardi:
An intuitionistic version of Ramsey Theorem (italian version). - Trisiladevi C. Nagavi, Nagappa U. Bhajantri:
Progressive Filtering Using Multiresolution Histograms for Query by Humming System. - Andrea Ballatore, Michela Bertolotto, David C. Wilson:
The semantic similarity ensemble. - Pooja Vyavahare, Nutan Limaye, D. Manjunath:
Efficient Embedding of Functions in Weighted Communication Networks. - Elif Vural, Pascal Frossard:
Analysis of Image Registration with Tangent Distance. - Tongjiang Yan, Zhixiong Chen, Bao Li:
A General Construction of Binary Sequences with Optimal Autocorrelation. - Jiong Guo, Yash Raj Shrestha:
Parameterized Complexity of Edge Interdiction Problems. - Hsueh-I Lu:
Linear-Time Compression of Bounded-Genus Graphs into Information-Theoretically Optimal Number of Bits. - Deepali Virmani, Ankita Soni, Nikhil Batra:
Reliability Analysis to overcome Black Hole Attack in Wireless Sensor Network. - Deepali Virmani, Manas Hemrajani, Shringarica Chandel:
Exponential Trust Based Mechanism to Detect Black Hole attack in Wireless Sensor Network. - Jamil Hamodi, Ravindra C. Thool, Khaled Salah, Anwar Alsagaf, Yousef Holba:
Performance Study of Mobile TV over Mobile WiMAX Considering Different Modulation and Coding Techniques. - Vikram Kumar Santhalia, Sanjay Singh:
Design and Development of a User Specific Dynamic E-Magazine. - Mikhail V. Berlinkov:
Testing for Synchronization. - Sundeep Rangan, Theodore S. Rappaport, Elza Erkip:
Millimeter Wave Cellular Wireless Networks: Potentials and Challenges. - Danko Ilik:
Axioms and Decidability for Type Isomorphism in the Presence of Sums. - Pål Anders Floor, Anna N. Kim, Tor A. Ramstad, Ilangko Balasingham, Niklas Wernersson, Mikael Skoglund:
Zero-Delay Joint Source-Channel Coding for a Multivariate Gaussian on a Gaussian MAC. - Saeid Haghighatshoar:
Multi Terminal Probabilistic Compressed Sensing. - Mahmood A. Rashid, Md. Tamjidul Hoque, Abdul Sattar:
Association Rules Mining Based Clinical Observations. - Alexander Rabinovich:
A Proof of Kamp's theorem. - Chunhua Geng, Hua Sun, Syed Ali Jafar:
On the Optimality of Treating Interference as Noise: General Message Sets. - Zhenqi Huang, Sayan Mitra, Nitin H. Vaidya:
Differentially Private Distributed Optimization. - Anyu Wang, Zhifang Zhang:
Repair Locality From a Combinatorial Perspective. - Andrea Ballatore, David C. Wilson, Michela Bertolotto:
A Survey of Volunteered Open Geo-Knowledge Bases in the Semantic Web. - Moshe Schwartz, Tom Meyerovitch, Ohad Elishco:
Semi-constrained Systems. - Robert V. Mayer:
Computer model of teaching with the varied coefficient of forgetting. - Deepali Virmani, Vikrant Malhotra, Ridhi Tyagi:
Sentiment Analysis Using Collaborated Opinion Mining. - Noah E. Friedkin:
Scale-free interpersonal influences on opinions in complex systems. - Imdad Ali Ismaili, Zeeshan Bhatti, Azhar Ali Shah:
Towards a Generic Framework for the Development of Unicode Based Digital Sindhi Dictionaries. - David White:
An Overview of Schema Theory. - Hong Sun, Vincenzo De Florio, Ning Gui, Chris Blondia:
The Missing Ones: Key Ingredients Towards Effective Ambient Assisted Living Systems. - Cem Rifki Aydin, Ali Erkan, Tunga Güngör, Hidayet Takçi:
Dictionary-Based Concept Mining: An Application for Turkish. - Arya Mazumdar:
On a Duality Between Recoverable Distributed Storage and Index Coding. - Pokkuluri Kiran Sree, Inampudi Ramesh Babu:
Improving Quality of Clustering using Cellular Automata for Information retrieval. - Jérôme Gilles, Kathryn Heal:
A parameterless scale-space approach to find meaningful modes in histograms - Application to image and spectrum segmentation. - Pokkuluri Kiran Sree, Inampudi Ramesh Babu, N. S. S. S. N. Usha Devi:
PSMACA: An Automated Protein Structure Prediction Using MACA (Multiple Attractor Cellular Automata). - Shuai Ma, Kaiyu Feng, Haixun Wang, Jianxin Li, Jinpeng Huai:
Distance Landmarks Revisited for Road Graphs. - Hua Sun, Syed Ali Jafar:
On the Optimality of Treating Interference as Noise for K user Parallel Gaussian Interference Networks. - Yang Ding:
On List-decodability of Random Rank Metric Codes. - Michal Feldman, Brendan Lucier:
Clearing Markets via Bundles. - Paritosh K. Pandya, Simoni S. Shah:
Deterministic Logics for UL. - Yang Ding, Lingfei Jin, Chaoping Xing:
Erasure List-Decodable Codes from Random and Algebraic Geometry Codes. - Vedran Novakovic:
A hierarchically blocked Jacobi SVD algorithm for single and multiple graphics processing units. - Fabio Bella, Jürgen Münch, Alexis Ocampo:
Capturing Evidence From Wireless Internet Services Development. - Rourab Paul, Amlan Chakrabarti, Ranjan Ghosh:
Hardware Implementation of four byte per clock RC4 algorithm. - Ansgar Lamersdorf, Jürgen Münch, Alicia Fernández del Viso Torre, Carlos Rebate Sánchez, H. Dieter Rombach:
Estimating the Effort Overhead in Global Software Development. - Ansgar Lamersdorf, Jürgen Münch, Alicia Fernández del Viso Torre, Carlos Rebate Sánchez, Markus Heinz, H. Dieter Rombach:
A Rule-based Model for Customized Risk Identification in Distributed Software Development Projects. - Rourab Paul, Amlan Chakrabarti, Ranjan Ghosh:
Fault Detection for RC4 Algorithm and its Implementation on FPGA Platform. - Dominique Duval, Rachid Echahed, Frédéric Prost, Leila Ribeiro:
Transformation of Attributed Structures with Cloning (Long Version). - Michael Kläs, Haruka Nakao, Frank Elberzhager, Jürgen Münch:
Predicting Defect Content and Quality Assurance Effectiveness by Combining Expert Judgment and Defect Data - A Case Study. - M. C. Hanumantharaju, M. T. Gopala Krishna:
Design of novel architectures and field programmable gate arrays implementation of two dimensional gaussian surround function. - Majid Gerami, Ming Xiao:
Exact Optimized-cost Repair in Multi-hop Distributed Storage Networks. - Loet Leydesdorff, Floortje Alkemade, Gaston Heimeriks, Rinke Hoekstra:
Geographic and Technological Perspectives on "Photovoltaic Cells: " Patents as Instruments for Exploring Innovation Dynamics. - Hong Sun, Vincenzo De Florio, Ning Gui, Chris Blondia:
Participant: A New Concept for Optimally Assisting the Elder People. - Yunjin Chen, René Ranftl, Thomas Pock:
Insights into analysis operator learning: From patch-based sparse models to higher-order MRFs. - Alan Brunton, Timo Bolkart, Stefanie Wuhrer:
Multilinear Wavelets: A Statistical Shape Space for Human Faces. - Edward Meeds, Max Welling:
GPS-ABC: Gaussian Process Surrogate Approximate Bayesian Computation. - Yakiv O. Kalinovsky, Dmitry V. Lande, Yuliya E. Boyarinova, Iana V. Khitsko:
Inifnite hypercomplex number system factorization methods. - Md. Naseef-Ur-Rahman Chowdhury, Suvankar Paul, Kazi Zakia Sultana:
Statistical Analysis based Hypothesis Testing Method in Biological Knowledge Discovery. - Chayan Sarkar, Vijay S. Rao, R. Venkatesha Prasad:
Sleep-Route: Routing through Sleeping Sensors. - David Baelde, Stéphanie Delaune, Lucca Hirschi:
A reduced semantics for deciding trace equivalence using constraint systems. - Akitoshi Kawamura, Arno Pauly:
On function spaces and polynomial-time computability. - Lutz Bornmann, Moritz Stefaner, Félix de Moya-Anegón, Rüdiger Mutz:
What is the effect of country-specific characteristics on the research performance of scientific institutions? Using multi-level statistical models to rank and map universities and research-focused institutions worldwide. - Lefei Zhang:
Tensor Representation and Manifold Learning Methods for Remote Sensing Images. - Tomasz Kociumaka, Marek Cygan:
Constant Factor Approximation for Capacitated k-Center with Outliers. - A. Malamou, C. Pandis, Panagiotis Frangos, Petros S. Stefaneas, A. Karakasiliotis, D. Kodokostas:
Application of the Modified Fractal Signature Method for Terrain Classification from Synthetic Aperture Radar Images. - Sukanta Sinha, Rana Dattagupta, Debajyoti Mukhopadhyay:
An Alternate Approach for Designing a Domain Specific Image Search Prototype Using Histogram. - Raju Dara, Ch. Satyanarayana, A. Govardhan:
Front End Data Cleaning And Transformation In Standard Printed Form Using Neural Models. - Anup Bhattacharya, Ragesh Jaiswal, Nir Ailon:
A tight lower bound instance for k-means++ in constant dimension. - Vincenzo De Florio, Geert Deconinck, Rudy Lauwereins:
The EFTOS Voting Farm: A Software Tool for Fault Masking in Message Passing Parallel Environments. - Alexander L. Fradkov, Dmitry S. Shalymov:
Information Entropy Dynamics and Maximum Entropy Production Principle. - Ralf Steinberger:
A survey of methods to ease the development of highly multilingual text mining applications. - Marco Turchi, Martin Atkinson, Alastair Wilcox, Brett Crawley, Stefano Bucci, Ralf Steinberger, Erik Van der Goot:
ONTS: "Optima" News Translation System. - Larry Bull:
Exploiting generalisation symmetries in accuracy-based learning classifier systems: An initial study. - Dawei Ying, Frederick W. Vook, Timothy A. Thomas, David J. Love, Amitava Ghosh:
Kronecker Product Correlation Model and Limited Feedback Codebook Design in a 3D Channel Model. - Brendan P. W. Ames, Andrew Beveridge, Rosalie Carlson, Claire Djang, Volkan Isler, Stephen Ragain, Maxray Savage:
A Leapfrog Strategy for Pursuit-Evasion in a Polygonal Environment. - Vincenzo De Florio, Geert Deconinck, Mario Truyens, Wim Rosseel, Rudy Lauwereins:
A Hypermedia Distributed Application for Monitoring and Fault-Injection in Embedded Fault-tolerant Parallel Programs. - Vincenzo De Florio, Geert Deconinck, Rudy Lauwereins:
Software Tool Combining Fault Masking with User-Defined Recovery Strategies. - James Elliott, Mark Hoemmen, Frank Mueller:
Resilience in Numerical Methods: A Position on Fault Models and Methodologies. - Richard A. Formato:
Pi Fractions for Generating Uniformly Distributed Sampling Points in Global Search and Optimization Algorithms. - Maxime Chevalier-Boisvert, Marc Feeley:
Removing Dynamic Type Tests with Context-Driven Basic Block Versioning. - Pokkuluri Kiran Sree, Inampudi Ramesh Babu:
Investigating Cellular Automata Based Network Intrusion Detection System For Fixed Networks (NIDWCA). - Xiaoming Chen, Lei Lei, Huazi Zhang, Chau Yuen:
On the Secrecy Outage Capacity of Physical Layer Security in Large-Scale MIMO Relaying Systems with Imperfect CSI. - Yujian Pan, Xiang Li:
Power of individuals - Controlling centrality of temporal networks. - Jack H. Lutz, Neil Lutz:
Lines Missing Every Random Point. - Shashank Mouli Satapathy, Santanu Kumar Rath:
Use Case Point Approach Based Software Effort Estimation using Various Support Vector Regression Kernel Methods. - (Withdrawn) A Framework of Performance Analysis for Distributed Antenna Systems Based on Random Matrix Theory.
- Qifu Sun, Xunrui Yin, Zongpeng Li, Keping Long:
Multicast Network Coding and Field Sizes. - Stefano Tomasin, Nicola Laurenti:
Secret Message Transmission by HARQ with Multiple Encoding. - Bin Guo, Zhiwen Yu, Daqing Zhang, Xingshe Zhou:
From Participatory Sensing to Mobile Crowd Sensing. - Farzad Farnoud, Moshe Schwartz, Jehoshua Bruck:
Rate-Distortion for Ranking with Incomplete Information. - Per Zetterberg:
Interference Alignment (IA) and Coordinated Multi-Point (CoMP) overheads and RF impairments: testbed results. - Ming Liu, Matthieu Crussière, Maryline Hélard, Jean-François Hélard:
Achieving Low-Complexity Maximum-Likelihood Detection for the 3D MIMO Code. - Matteo Zignani, Christian Quadri, Sabrina Gaito, Gian Paolo Rossi:
Exploiting all phone media? A multidimensional network analysis of phone users' sociality. - Marco Mondelli, Seyed Hamed Hassani, Rüdiger L. Urbanke:
From Polar to Reed-Muller Codes: a Technique to Improve the Finite-Length Performance. - Lauri Anttila, Dani Korpi, Ville Syrjälä, Mikko Valkama:
Cancellation of Power Amplifier Induced Nonlinear Self-Interference in Full-Duplex Transceivers. - Nils Bertschinger, Johannes Rauh:
The Blackwell relation defines no lattice. - Songcen Xu, Rodrigo Caiado de Lamare, Harold Vincent Poor:
Dynamic Topology Adaptation and Distributed Estimation for Smart Grids. - Ahmed El Shafie, Ahmed K. Sultan, Tamer Khattab:
Relay-Assisted Primary and Secondary Transmissions. - Kun He, Pengli Ji, Chumin Li:
An iterative merging placement algorithm for the fixed-outline floorplanning. - Mohamad Noureddine, Fadi A. Zaraket, Ali S. Elzein:
Synthesis of Sequential Extended Regular Expressions for Verification. - Ahmed El Shafie, Ahmed K. Sultan:
Comments on "Optimal Utilization of a Cognitive Shared Channel with a Rechargeable Primary Source Node". - Jingge Zhu, Michael Gastpar:
Asymmetric Compute-and-Forward with CSIT. - Chong-Jing Sun, Philip S. Yu, Xiangnan Kong, Yan Fu:
Privacy Preserving Social Network Publication Against Mutual Friend Attacks. - Giuseppe Durisi, Alberto Tarable, Christian Camarda, Rahul Devassy, Guido Montorsi:
Capacity bounds for MIMO microwave backhaul links affected by phase noise. - Michal Skrzypczak:
Separation Property for wB- and wS-regular Languages. - Jihao Fan, Hanwu Chen:
Constructions of Pure Asymmetric Quantum Alternant Codes Based on Subclasses of Alternant Codes. - Alexander V. Mantzaris:
Uncovering nodes that spread information between communities in social networks. - Henning Maier, Rudolf Mathar:
Cyclic Interference Alignment and Cancellation in 3-User X-Networks with Minimal Backhaul. - K. Paramesha, K. C. Ravishankar:
Optimization Of Cross Domain Sentiment Analysis Using Sentiwordnet. - Ming Lei, Mohammad Reza Soleymani:
Half-Duplex Relaying for the Multiuser Channel. - Rajmonda Caceres, Kevin Carter, Jeremy Kun:
A Boosting Approach to Learning Graph Representations. - Deepjyoti Deka, Ross Baldick, Sriram Vishwanath:
Hidden Attacks on Power Grid: Optimal Attack Strategies and Mitigation. - Diego Valsesia, Enrico Magli:
A Novel Rate Control Algorithm for Onboard Predictive Coding of Multispectral and Hyperspectral Images. - Krzysztof Bar, Jamie Vicary:
Groupoid Semantics for Thermal Computing. - Krishnendu Chatterjee, Laurent Doyen, Sumit Nain, Moshe Y. Vardi:
The Complexity of Partial-observation Stochastic Parity Games With Finite-memory Strategies. - François Cuvelier, Caroline Japhet, Gilles Scarella:
An efficient way to perform the assembly of finite element matrices in vector languages. - Yongge Wang:
On the Design of LIL Tests for (Pseudo) Random Generators and Some Experimental Results. - Pascal Ochem, Alexandre Pinlou, Sagnik Sen:
Homomorphisms of signed planar graphs. - Jibran Yousafzai, Zoran Cvetkovic, Peter Sollich, Matthew Ager:
A Subband-Based SVM Front-End for Robust ASR. - Jason D. Heebl, Erin M. Thomas, Robert P. Penno, Anthony Grbic:
Comprehensive Analysis and Measurement of Frequency-Tuned and Impedance-Tuned Wireless Non-Radiative Power Transfer Systems. - Stéphane Le Roux, Arno Pauly:
Infinite sequential games with real-valued payoffs. - Dani Korpi, Sathya Venkatasubramanian, Taneli Riihonen, Lauri Anttila, Strasdosky Otewa, Clemens Icheln, Katsuyuki Haneda, Sergei A. Tretyakov, Mikko Valkama, Risto Wichman:
Advanced Self-interference Cancellation and Multiantenna Techniques for Full-Duplex Radios. - Jean Gregoire, Emilio Frazzoli, Arnaud de La Fortelle, Tichakorn Wongpiromsarn:
Back-pressure traffic signal control with unknown routing rates. - Ji Li, Thomas J. Peters, Kirk E. Jordan:
Computational Topology for Approximations of Knots. - Linas Vepstas, Ben Goertzel:
Learning Language from a Large (Unannotated) Corpus. - Ashraf Al Daoud, George Kesidis, Jörg Liebeherr:
An Iterated Game of Uncoordinated Sharing of Licensed Spectrum Using Zero-Determinant Strategies. - Aly El Gamal, Venugopal V. Veeravalli:
Flexible Backhaul Design and Degrees of Freedom for Linear Interference Networks. - Guohua Wu:
Multi-agent across-neighbourhood search: a simple and efficient method for numerical optimization. - Jan A. Bergstra, Mark Burgess:
Promises, Impositions, and other Directionals. - Antonio Elias Fabris, Valério Ramos Batista:
A programme to determine the exact interior of any connected digital picture. - Ahmed El Shafie, Tamer Khattab:
Cooperative Cognitive Relaying Protocol for an Energy Harvesting Cognitive Radio User. - Xiaowei Zhou, Can Yang, Hongyu Zhao, Weichuan Yu:
Low-Rank Modeling and Its Applications in Image Analysis. - H. Birkan Yilmaz, Na-Rae Kim, Chan-Byoung Chae:
Effect of ISI Mitigation on Modulation Techniques in Communication via Diffusion. - Avneesh Saluja, Mahdi Pakdaman, Dongzhen Piao, Ankur P. Parikh:
Infinite Mixed Membership Matrix Factorization. - Christoph Studer, Tom Goldstein, Wotao Yin, Richard G. Baraniuk:
Democratic Representations. - Sruti Agarwal, Sangeet Saha, Rourab Paul, Amlan Chakrabarti:
Performance Evaluation of ECC in Single and Multi Processor Architectures on FPGA Based Embedded System. - Ya'akov Gal, Avi Pfeffer:
Networks of Influence Diagrams: A Formalism for Representing Agents' Beliefs and Decision-Making Processes. - Laurent Miclet, Sabri Bayoudh, Arnaud Delhay:
Analogical Dissimilarity: Definition, Algorithms and Two Experiments in Machine Learning. - Nicolas Meuleau, Emmanuel Benazera, Ronen I. Brafman, Eric A. Hansen, Mausam:
A Heuristic Search Approach to Planning with Continuous Resources in Stochastic Domains. - Yi Wang, Nevin Lianwen Zhang, Tao Chen:
Latent Tree Models and Approximate Inference in Bayesian Networks. - Lucas Bordeaux, Marco Cadoli, Toni Mancini:
A Unifying Framework for Structural Properties of CSPs: Definitions, Complexity, Tractability. - James P. Delgrande, Yi Jin, Francis Jeffry Pelletier:
Compositional Belief Update. - Tinne De Laet, Joris De Schutter, Herman Bruyninckx:
A Rigorously Bayesian Beam Model and an Adaptive Full Scan Model for Range Finders in Dynamic Environments. - Enrico H. Gerding, Rajdeep K. Dash, Andrew Byde, Nicholas R. Jennings:
Optimal Strategies for Simultaneous Vickrey Auctions with Perfect Substitutes. - Balázs Csanád Csáji, László Monostori:
Adaptive Stochastic Resource Control: A Machine Learning Approach. - Stéphane Ross, Joelle Pineau, Sébastien Paquet, Brahim Chaib-draa:
Online Planning Algorithms for POMDPs. - Eyal Amir, Allen Chang:
Learning Partially Observable Deterministic Action Models. - Neil C. A. Moore, Patrick Prosser:
The Ultrametric Constraint and its Application to Phylogenetics. - Sonia Chernova, Manuela M. Veloso:
Interactive Policy Learning through Confidence-Based Autonomy. - Ran El-Yaniv, Dmitry Pechyony:
Transductive Rademacher Complexity and its Applications. - Amir Gershman, Amnon Meisels, Roie Zivan:
Asynchronous Forward Bounding for Distributed COPs. - Antonis C. Kakas, Paolo Mancarella, Fariba Sadri, Kostas Stathis, Francesca Toni:
Computational Logic Foundations of KGP Agents. - Didier Dubois, Hélène Fargier, Jean-François Bonnefon:
On the Qualitative Comparison of Decisions Having Positive and Negative Features. - Md. Shiplu Hawlader, Saifuddin Md. Tareeq:
Amino Acid Interaction Network Prediction using Multi-objective Optimization. - Saher Esmeir, Shaul Markovitch:
Anytime Induction of Low-cost, Low-error Classifiers: a Sampling-based Approach. - Robert Mateescu, Rina Dechter, Radu Marinescu:
AND/OR Multi-Valued Decision Diagrams (AOMDDs) for Graphical Models. - Vincent Conitzer:
Eliciting Single-Peaked Preferences Using Comparison Queries. - Tal Grinshpoun, Amnon Meisels:
Completeness and Performance Of The APO Algorithm. - Radu Jurca, Boi Faltings:
Mechanisms for Making Crowds Truthful. - Judy Goldsmith, Jérôme Lang, Miroslaw Truszczynski, Nic Wilson:
The Computational Complexity of Dominance and Consistency in CP-Nets. - Sherief Abdallah, Victor R. Lesser:
A Multiagent Reinforcement Learning Algorithm with Non-linear Dynamics. - Prashant Doshi, Piotr J. Gmytrasiewicz:
Monte Carlo Sampling Methods for Approximating Interactive POMDPs. - Fahiem Bacchus, Shannon Dalmao, Toniann Pitassi:
Solving #SAT and Bayesian Inference with Backtracking Search. - Maxim Binshtok, Ronen I. Brafman, Carmel Domshlak, Solomon Eyal Shimony:
Generic Preferences over Subsets of Structured Objects. - Daniel S. Bernstein, Christopher Amato, Eric A. Hansen, Shlomo Zilberstein:
Policy Iteration for Decentralized Control of Markov Decision Processes. - Marek Petrik, Shlomo Zilberstein:
A Bilinear Programming Approach for Multiagent Planning. - Amarjeet Singh, Andreas Krause, Carlos Guestrin, William J. Kaiser:
Efficient Informative Sensing using Multiple Robots. - Roberto Sebastiani, Michele Vescovi:
Automated Reasoning in Modal and Description Logics via SAT Encoding: the Case Study of K(m)/ALC-Satisfiability. - Rónán Daly, Qiang Shen:
Learning Bayesian Network Equivalence Classes with Ant Colony Optimization. - Steven de Jong, Simon Uyttendaele, Karl Tuyls:
Learning to Reach Agreement in a Continuous Ultimatum Game. - Talal Rahwan, Sarvapali Dyanand Ramchurn, Nicholas R. Jennings, Andrea Giovannucci:
An Anytime Algorithm for Optimal Coalition Structure Generation. - Omer Giménez, Anders Jonsson:
Planning over Chain Causal Graphs for Variables with Domains of Size 5 Is NP-Hard. - Héctor Palacios, Hector Geffner:
Compiling Uncertainty Away in Conformant Planning Problems with Bounded Width. - Vicente Ruiz de Angulo, Carme Torras:
Exploiting Single-Cycle Symmetries in Continuous Constraint Problems. - Jörg Hoffmann, Piergiorgio Bertoli, Malte Helmert, Marco Pistore:
Message-Based Web Service Composition, Integrity Constraints, and Planning under Uncertainty: A New Connection. - Marco Zaffalon, Enrique Miranda:
Conservative Inference Rule for Uncertain Reasoning under Incompleteness. - Kaile Su, Abdul Sattar, Guanfeng Lv, Yan Zhang:
Variable Forgetting in Reasoning about Knowledge. - Sarvapali Dyanand Ramchurn, Claudio Mezzetti, Andrea Giovannucci, Juan A. Rodríguez-Aguilar, Rajdeep K. Dash, Nicholas R. Jennings:
Trust-Based Mechanisms for Robust and Efficient Task Allocation in the Presence of Execution Uncertainty. - Andreas Krause, Carlos Guestrin:
Optimal Value of Information in Graphical Models. - Meghyn Bienvenu:
Prime Implicates and Prime Implicants: From Propositional to Modal Logic. - Piero A. Bonatti, Carsten Lutz, Frank Wolter:
The Complexity of Circumscription in DLs. - José Enrique Gallardo, Carlos Cotta, Antonio J. Fernández:
Solving Weighted Constraint Satisfaction Problems with Memetic/Exact Hybrid Algorithms. - Facundo Bromberg, Dimitris Margaritis, Vasant G. Honavar:
Efficient Markov Network Structure Discovery Using Independence Tests. - Yllias Chali, Shafiq Rayhan Joty, Sadid A. Hasan:
Complex Question Answering: Unsupervised Learning Approaches and Experiments. - Matthias Zytnicki, Christine Gaspin, Simon de Givry, Thomas Schiex:
Bounds Arc Consistency for Weighted CSPs. - Estela Saquete, José Luis Vicedo González, Patricio Martínez-Barco, Rafael Muñoz, Hector Llorens:
Enhancing QA Systems with Complex Temporal Question Processing Capabilities. - Hai Leong Chieu, Wee Sun Lee:
Relaxed Survey Propagation for The Weighted Maximum Satisfiability Problem. - Tomi Janhunen, Emilia Oikarinen, Hans Tompits, Stefan Woltran:
Modularity Aspects of Disjunctive Stable Models. - Boris Motik, Robert D. C. Shearer, Ian Horrocks:
Hypertableau Reasoning for Description Logics. - Anders Jonsson:
The Role of Macros in Tractable Planning. - Alessandro Artale, Diego Calvanese, Roman Kontchakov, Michael Zakharyaschev:
The DL-Lite Family and Relations. - Harr Chen, S. R. K. Branavan, Regina Barzilay, David R. Karger:
Content Modeling Using Latent Permutations. - Robert Mateescu, Kalev Kask, Vibhav Gogate, Rina Dechter:
Join-Graph Propagation Algorithms. - William Yeoh, Ariel Felner, Sven Koenig:
BnB-ADOPT: An Asynchronous Branch-and-Bound DCOP Algorithm. - Emil Keyder, Hector Geffner:
Soft Goals Can Be Compiled Away. - Frank Hutter, Thomas Stützle, Kevin Leyton-Brown, Holger H. Hoos:
ParamILS: An Automatic Algorithm Configuration Framework. - Uzi Zahavi, Ariel Felner, Neil Burch, Robert C. Holte:
Predicting the Performance of IDA* using Conditional Distributions. - Michal Feldman, Tami Tamir:
Approximate Strong Equilibrium in Job Scheduling Games. - Xiao Lu, Ping Wang, Dusit Niyato, Ekram Hossain:
Dynamic Spectrum Access in Cognitive Radio Networks with RF Energy Harvesting. - Xiao Lu, Ping Wang, Dusit Niyato:
A Layered Coalitional Game Framework of Wireless Relay Network. - Saurabh Varshney, Jyoti Bajpai:
Improving Performance Of English-Hindi Cross Language Information Retrieval Using Transliteration Of Query Terms. - Hongxing Li, Nitin H. Vaidya:
Optimal CSMA-based Wireless Communication with Worst-case Delay and Non-uniform Sizes. - Tanja Hartmann, Andrea Kappes, Dorothea Wagner:
Clustering Evolving Networks. - Kamlesh Sharma, T. V. Prasad:
Swar The Voice Operated PC. - Vahid Jamali, Nikola Zlatanov, Robert Schober:
Adaptive Mode Selection for Bidirectional Relay Networks - Fixed Rate Transmission. - Ville Syrjälä, Mikko Valkama, Lauri Anttila, Taneli Riihonen, Dani Korpi:
Analysis of Oscillator Phase-Noise Effects on Self-Interference Cancellation in Full-Duplex OFDM Radio Transceivers. - Guangyue Han, Jian Song:
Extensions of the I-MMSE Relation. - Xianming Liu, Guangyue Han:
Recent Results in Continuous-Time Network Information Theory. - Ben D. Fulcher, Nick S. Jones:
Highly comparative, feature-based time-series classification. - Dani Korpi, Taneli Riihonen, Ville Syrjälä, Lauri Anttila, Mikko Valkama, Risto Wichman:
Full-Duplex Transceiver System Calculations: Analysis of ADC and Linearity Challenges. - Habib B. A. Sidi, Zwi Altman, Abdoulaye Tall:
Self-Optimizing Mechanisms for EMF Reduction in Heterogeneous Networks. - Abhishek Jain, Piyush Kumar Gupta, Hima Gupta, Sachish Dhar:
Accelerating SystemVerilog UVM Based VIP to Improve Methodology for Verification of Image Signal Processing Designs Using HW Emulator. - Alex E. Geyer, Reza Nikjah, Sergiy A. Vorobyov, Norman C. Beaulieu:
Equivalent Codes, Optimality, and Performance Analysis of OSTBC: Textbook Study. - Omid Taheri, Sergiy A. Vorobyov:
Reweighted l1-norm Penalized LMS for Sparse Channel Estimation and Its Analysis. - Youssef Khmou, Said Safi:
2D Direction Of Arrival Estimation with Modified Propagator. - Jie Gao, Sergiy A. Vorobyov, Hai Jiang:
Efficient Strategies for Single/Multi-Target Jamming on MIMO Gaussian Channels. - (Withdrawn) A Supervised Goal Directed Algorithm in Economical Choice Behaviour: An Actor-Critic Approach.
- Mehrnaz Tavan, Roy D. Yates, Waheed U. Bajwa:
Bits Through Bufferless Queues. - Xiaomin Bao:
The equivalent identities of the MacWilliams identity for linear codes. - Abdul Kadir, Lukito Edi Nugroho, Adhi Susanto, Paulus Insap Santosa:
Experiments of Distance Measurements in a Foliage Plant Retrieval System. - Swen Jacobs, Roderick Bloem:
Parameterized Synthesis. - (Withdrawn) An Enhanced Method For Evaluating Automatic Video Summaries.
- Ayman M. Bahaa Eldin:
Intelligent Systems for Information Security. - Larry Bull:
A Brief History of Learning Classifier Systems: From CS-1 to XCS. - Hector Zenil:
Turing Minimalism and Complexity. - Vincenzo De Florio, Chris Blondia:
Reflective and Refractive Variables: A Model for Effective and Maintainable Adaptive-and-Dependable Software. - Johannes Hofmann, Jan Treibig, Georg Hager, Gerhard Wellein:
Performance Engineering for a Medical Imaging Application on the Intel Xeon Phi Accelerator. - Sanjay Vishwakarma, A. Chockalingam:
Power Allocation in MIMO Wiretap Channel with Statistical CSI and Finite-Alphabet Input. - Vincenzo De Florio, Chris Blondia:
Service-oriented Communities: Visions and Contributions towards Social Organizations. - Ankit Mundra, Geetanjali Rathee, Meenu Chawla, Nitin Rakesh, Ashsutosh Soni:
Transport Information System using Query Centric Cyber Physical Systems (QCPS). - Diederik Aerts, Sandro Sozzo:
Modeling Concept Combinations in a Quantum-theoretic Framework. - Ning Gui, Vincenzo De Florio, Hong Sun, Chris Blondia:
A Service-oriented Infrastructure Approach for Mutual Assistance Communities. - Ernesto G. Birgin, Paulo Feofiloff, Cristina G. Fernandes, Everton L. de Melo, Marcio T. I. Oshiro, Débora P. Ronconi:
A MILP model for an extended version of the Flexible Job Shop Problem. - Hadi Ahmadi, Reihaneh Safavi-Naini:
Multipath Private Communication: An Information Theoretic Approach. - Andrea Munari, Michael Heindlmaier, Gianluigi Liva, Matteo Berioli:
The Throughput of Slotted Aloha with Diversity. - Tongxin Li, Chun Lam Chan, Wenhao Huang, Tarik Kaced, Sidharth Jaggi:
Group Testing with Prior Statistics. - Doina Tãtar, Mihaiela Lupea, Epaminondas Kapetanios:
Hrebs and Cohesion Chains as similar tools for semantic text properties research. - Katarzyna E. Paluch:
Better Approximation Algorithms for Maximum Asymmetric Traveling Salesman and Shortest Superstring. - Zhili Guo, Yao Wang, Elza Erkip, Shivendra S. Panwar:
Wireless Video Multicast with Cooperative and Incremental Transmission of Parity Packets. - Timo Mennle, Sven Seuken:
An Axiomatic Approach to Characterizing and Relaxing Strategyproofness of One-sided Matching Mechanisms. - Na Deng, Wuyang Zhou, Martin Haenggi:
The Ginibre Point Process as a Model for Wireless Networks with Repulsion. - Holger Boche, Minglai Cai, Christian Deppe:
Broadcast Classical-Quantum Capacity Region of Two-Phase Bidirectional Relaying Channel. - Vincenzo De Florio, Geert Deconinck:
$\mathcal R\!\raise2pt\hbox{$\varepsilon$}\!\hbox{$\mathcal L$}$: A Fault Tolerance Linguistic Structure for Distributed Applications. - Ragesh Jaiswal, Mehul Kumar, Pulkit Yadav:
Improved analysis of D2-sampling based PTAS for k-means and other Clustering problems. - Kyle G. Burke:
$2^3$ Quantified Boolean Formula Games and Their Complexities. - Matanya B. Horowitz, Nikolai Matni, Joel W. Burdick:
Convex Relaxations of SE(2) and SE(3) for Visual Pose Estimation. - Zeev Dvir, Rafael Oliveira, Amir Shpilka:
Testing Equivalence of Polynomials under Shifts. - Igor G. Vladimirov, Ian R. Petersen:
Physical Realizability and Mean Square Performance of Translation Invariant Networks of Interacting Linear Quantum Stochastic Systems. - Ed Bennett, Luigi Del Debbio, Kirk E. Jordan, Biagio Lucini, Agostino Patella, Claudio Pica, Antonio Rago:
BSMBench: a flexible and scalable supercomputer benchmark from computational particle physics. - Alexios Balatsoukas-Stimming, Mani Bastani Parizi, Andreas Burg:
LLR-based Successive Cancellation List Decoding of Polar Codes. - Xiao Yang, Andrew R. Barron:
Large Alphabet Compression and Predictive Distributions through Poissonization and Tilting. - Patrick Healy, Andrew Ju:
An Experimental Evaluation of List Coloring Algorithms. - Raphaëlle Crubillé, Ugo Dal Lago:
On Probabilistic Applicative Bisimulation and Call-by-Value λ-Calculi (Long Version). - Bharath K. Samanthula, Wei Jiang, Elisa Bertino:
Lightweight and Secure Two-Party Range Queries over Outsourced Encrypted Databases. - Songcen Xu, Rodrigo C. de Lamare, H. Vincent Poor:
Adaptive Link Selection Strategies for Distributed Estimation in Wireless Sensor Networks. - Thibaut Vidal, Nelson Maculan, Puca Huachi Vaz Penna, Luiz Satoru Ochi:
Large neighborhoods with implicit customer selection for vehicle routing problems with profits. - Son Hoang Dau, Wentu Song, Chau Yuen:
On the Existence of MDS Codes Over Small Fields With Constrained Generator Matrices. - Shigeaki Kuzuoka, Shun Watanabe:
An Information-Spectrum Approach to Weak Variable-Length Source Coding with Side-Information. - Ning Cai, M. Junaid Khan:
On Swarm Stability of Linear Time-Invariant Descriptor Compartmental Networks. - Xiaoxia Sun, Qing Qu, Nasser M. Nasrabadi, Trac D. Tran:
Structured Priors for Sparse-Representation-Based Hyperspectral Image Classification. - Xiaohan Wei, Michael J. Neely:
Power Aware Wireless File Downloading: A Constrained Restless Bandit Approach. - Wiebe van der Hoek, Dirk Walther, Michael J. Wooldridge:
Reasoning About the Transfer of Control. - Ruijie He, Emma Brunskill, Nicholas Roy:
Efficient Planning under Uncertainty with Macro-actions. - Amy Greenwald, Seong Jae Lee, Victor Naroditskiy:
RoxyBot-06: Stochastic Prediction and Optimization in TAC Travel. - Henrik Reif Andersen, Tarik Hadzic, David Pisinger:
Interactive Cost Configuration Over Decision Diagrams. - Raghav Aras, Alain Dutech:
An Investigation into Mathematical Programming for Finite Horizon Decentralized POMDPs. - Matthew Michelson, Craig A. Knoblock:
Constructing Reference Sets from Unstructured, Ungrammatical Text. - Bozhena Bidyuk, Rina Dechter, Emma Rollon:
Active Tuples-based Scheme for Bounding Posterior Beliefs. - Shahar Dobzinski, Noam Nisan:
Mechanisms for Multi-Unit Auctions. - Ivan José Varzinczak:
On Action Theory Change. - Liyue Zhao, Yu Zhang, Gita Sukthankar:
An Active Learning Approach for Jointly Estimating Worker Performance and Annotation Reliability with Crowdsourced Data. - Moshe Babaioff, Michal Feldman, Noam Nisan:
Mixed Strategies in Combinatorial Agency. - Claudette Cayrol, Florence Dupin de Saint-Cyr, Marie-Christine Lagasquie-Schiex:
Change in Abstract Argumentation Frameworks: Adding an Argument. - Silvia Richter, Matthias Westphal:
The LAMA Planner: Guiding Cost-Based Anytime Planning with Landmarks. - Johan Wittocx, Maarten Mariën, Marc Denecker:
Grounding FO and FO(ID) with Bounds. - Mark Owen Riedl, Robert Michael Young:
Narrative Planning: Balancing Plot and Character. - David Lesaint, Deepak Mehta, Barry O'Sullivan, Luis Quesada, Nic Wilson:
Developing Approaches for Solving a Telecommunications Feature Subscription Problem. - Kenny Daniel, Alex Nash, Sven Koenig, Ariel Felner:
Theta*: Any-Angle Path Planning on Grids. - Yagil Engel, Michael P. Wellman:
Multiattribute Auctions Based on Generalized Additive Independence. - Jianhui Wu, Edmund H. Durfee:
Resource-Driven Mission-Phasing Techniques for Constrained Agents in Stochastic Environments. - Graeme Gange, Peter James Stuckey, Vitaly Lagoon:
Fast Set Bounds Propagation Using a BDD-SAT Hybrid. - Jia-Hong Wu, Robert Givan:
Automatic Induction of Bellman-Error Features for Probabilistic Planning. - Alexander Feldman, Gregory M. Provan, Arjan J. C. van Gemund:
Approximate Model-Based Diagnosis Using Greedy Stochastic Search. - Sebastian Rudolph, Birte Glimm:
Nominals, Inverses, Counting, and Conjunctive Queries or: Why Infinity is your Friend! - Alexander Feldman, Gregory M. Provan, Arjan J. C. van Gemund:
A Model-Based Active Testing Approach to Sequential Diagnosis. - Jing Xu, Christian R. Shelton:
Intrusion Detection using Continuous Time Bayesian Networks. - Gianluigi Greco, Enrico Malizia, Luigi Palopoli, Francesco Scarcello:
Non-Transferable Utility Coalitional Games via Mixed-Integer Linear Constraints. - Michael Katz, Carmel Domshlak:
Implicit Abstraction Heuristics. - Bonny Banerjee, B. Chandrasekaran:
A Constraint Satisfaction Framework for Executing Perceptions and Actions in Diagrammatic Reasoning. - Michael Benisch, George B. Davis, Tuomas Sandholm:
Algorithms for Closed Under Rational Behavior (CURB) Sets. - Georgios Chalkiadakis, Edith Elkind, Evangelos Markakis, Maria Polukarov, Nicholas R. Jennings:
Cooperative Games with Overlapping Coalitions. - Vadim Bulitko, Yngvi Björnsson, Ramon Lawrence:
Case-Based Subgoaling in Real-Time Heuristic Search for Video Game Pathfinding. - Jos de Bruijn, Stijn Heymans:
Logical Foundations of RDF(S) with Datatypes. - Andreas Krause, Eric Horvitz:
A Utility-Theoretic Approach to Privacy in Online Services. - Tobias Lang, Marc Toussaint:
Planning with Noisy Probabilistic Relational Rules. - Ethan Burns, Sofia Lemons, Wheeler Ruml, Rong Zhou:
Best-First Heuristic Search for Multicore Machines. - Yonghong Wang, Chung-Wei Hang, Munindar P. Singh:
A Probabilistic Approach for Maintaining Trust Based on Evidence. - Yi Zhou, Yan Zhang:
A Logical Study of Partial Entailment. - Xavier Tannier, Philippe Muller:
Evaluating Temporal Graphs Built from Texts via Transitive Reduction. - Christian Geist, Ulle Endriss:
Automated Search for Impossibility Theorems in Social Choice Theory: Ranking Sets of Objects. - Aaron Hunter, James P. Delgrande:
Iterated Belief Change Due to Actions and Observations. - Albert Atserias, Johannes Klaus Fichte, Marc Thurley:
Clause-Learning Algorithms with Many Restarts and Bounded-Width Resolution. - Haris Aziz, Yoram Bachrach, Edith Elkind, Mike Paterson:
False-Name Manipulations in Weighted Voting Games. - Erik Talvitie, Satinder Singh:
Learning to Make Predictions In Partially Observable Environments Without a Generative Model. - Mahdi Milani Fard, Joelle Pineau:
Non-Deterministic Policies in Markovian Decision Processes. - Christophe Lecoutre, Stéphane Cardon, Julien Vion:
Second-Order Consistencies. - Fei Wu, Jayant Madhavan, Alon Y. Halevy:
Identifying Aspects for Web-Search Queries. - Wheeler Ruml, Minh Binh Do, Rong Zhou, Markus P. J. Fromherz:
On-line Planning and Scheduling: An Application to Controlling Modular Printers. - Lirong Xia, Vincent Conitzer:
Determining Possible and Necessary Winners Given Partial Orders. - Botond Cseke, Tom Heskes:
Properties of Bethe Free Energies and Message Passing in Gaussian Models. - Alessandro Cimatti, Alberto Griggio, Roberto Sebastiani:
Computing Small Unsatisfiable Cores in Satisfiability Modulo Theories. - Emmanuel Hebrard, Dániel Marx, Barry O'Sullivan, Igor Razgon:
Soft Constraints of Difference and Equality. - Harris Papadopoulos, Vladimir Vovk, Alex Gammerman:
Regression Conformal Prediction with Nearest Neighbours. - Mustafa Bilgic, Lise Getoor:
Value of Information Lattice: Exploiting Probabilistic Independence for Effective Feature Subset Acquisition. - Saket Joshi, Roni Khardon:
Probabilistic Relational Planning with First Order Decision Diagrams. - Anna Khudyak Kozorovitzky, Oren Kurland:
From "Identical" to "Similar": Fusing Retrieved Lists Based on Inter-Document Similarities. - Sujit Gujar, Yadati Narahari:
Redistribution Mechanisms for Assignment of Heterogeneous Objects. - Tomás de la Rosa, Sergio Jiménez Celorrio, Raquel Fuentetaja, Daniel Borrajo:
Scaling up Heuristic Planning with Relational Decision Trees. - Wei Li, Pascal Poupart, Peter van Beek:
Exploiting Structure in Weighted Model Counting Approaches to Probabilistic Inference. - Lucas Bordeaux, George Katsirelos, Nina Narodytska, Moshe Y. Vardi:
The Complexity of Integer Bound Propagation. - Dmytro Korzhyk, Zhengyu Yin, Christopher Kiekintveld, Vincent Conitzer, Milind Tambe:
Stackelberg vs. Nash in Security Games: An Extended Investigation of Interchangeability, Equivalence, and Uniqueness. - Jörg Hoffmann:
Analyzing Search Topology Without Running Any Search: On the Connection Between Causal Graphs and h+. - Sajjad Ahmed Siddiqi, Jinbo Huang:
Sequential Diagnosis by Abstraction. - Changhe Yuan, Heejin Lim, Tsai-Ching Lu:
Most Relevant Explanation in Bayesian Networks. - András György, Levente Kocsis:
Efficient Multi-Start Strategies for Local Search Algorithms. - Wolfgang Dvorák, Stefan Woltran:
On the Intertranslatability of Argumentation Semantics. - Oren Kurland, Eyal Krikon:
The Opposite of Smoothing: A Language Model Approach to Ranking Query-Specific Document Clusters. - Dov M. Gabbay, David Pearce, Agustín Valverde:
Interpolable Formulas in Equilibrium Logic and Answer Set Programming. - Joohyung Lee, Yunsong Meng:
First-Order Stable Model Semantics and First-Order Loop Formulas. - Ganesh Ram Santhanam, Samik Basu, Vasant G. Honavar:
Representing and Reasoning with Qualitative Preferences for Compositional Systems. - Vincent Aravantinos, Ricardo Caferra, Nicolas Peltier:
Decidability and Undecidability Results for Propositional Schemata. - Piero A. Bonatti, Marco Faella, Luigi Sauro:
Defeasible Inclusions in Low-Complexity DLs. - Richard Booth, Thomas Meyer, Ivan Varzinczak, Renata Wassermann:
On the Link between Partial Meet, Kernel, and Infra Contraction and its Application to Horn Logic. - Noa Agmon, Gal A. Kaminka, Sarit Kraus:
Multi-Robot Adversarial Patrolling: Facing a Full-Knowledge Opponent. - Ko-Hsin Cindy Wang, Adi Botea:
MAPP: a Scalable Multi-Agent Path Planning Algorithm with Tractability and Completeness Guarantees. - Peter D. Grünwald, Joseph Y. Halpern:
Making Decisions Using Sets of Probabilities: Updating, Time Consistency, and Calibration. - Xiaosong Lu, Howard M. Schwartz, Sidney Nascimento Givigi:
Policy Invariance under Reward Transformations for General-Sum Stochastic Games. - Ricardo Ribeiro, David Martins de Matos:
Centrality-as-Relevance: Support Sets and Similarity as Geometric Proximity. - Richard Hoshino, Ken-ichi Kawarabayashi:
Scheduling Bipartite Tournaments to Minimize Total Travel Distance. - Peng Dai, Mausam, Daniel Sabby Weld, Judy Goldsmith:
Topological Value Iteration Algorithms. - Ni Ding, Parastoo Sadeghi, Rodney A. Kennedy:
Discrete Stochastic Approximation for Cross-layer Transmission Control in Wireless Communications. - Yeow Meng Chee, Zouha Cherif, Jean-Luc Danger, Sylvain Guilley, Han Mao Kiah, Jon-Lark Kim, Patrick Solé, Xiande Zhang:
Multiply Constant-Weight Codes and the Reliability of Loop Physically Unclonable Functions. - Adnan Anwar, Abdun Naser Mahmood:
Cyber Security of Smart Grid Infrastructure. - Subodh Pudasaini, Seokjoo Shin, Kyung Sup Kwak:
Robust Modulation Technique for Diffusion-based Molecular Communication in Nanonetworks. - Wentu Song, Chau Yuen, Kai Cai, Rongquan Feng:
Network Coding for $3$s$/n$t Sum-Networks. - Adel Zahedi, Jan Østergaard, Søren Holdt Jensen, Patrick A. Naylor, Soren Bech:
Distributed Remote Vector Gaussian Source Coding for Wireless Acoustic Sensor Networks. - Udi Boker, Thomas A. Henzinger:
Exact and Approximate Determinization of Discounted-Sum Automata. - Joan Serrà, Josep Lluís Arcos:
An Empirical Evaluation of Similarity Measures for Time Series Classification. - Md. Abdullah Al Mamun, Christian Berger, Jörgen Hansson:
Engineering the Hardware/Software Interface for Robotic Platforms - A Comparison of Applied Model Checking with Prolog and Alloy. - Henning Maier, Anas Chaaban, Rudolf Mathar:
$Y$-$Δ$ Product in 3-Way $Δ$ and Y-Channels for Cyclic Interference and Signal Alignment. - Hugo Méric, José Miguel Piquer:
Performance Evaluation of Bit Division Multiplexing combined with Non-Uniform QAM. - Bartlomiej Blaszczyszyn, Holger Paul Keeler:
Studying the SINR process of the typical user in Poisson networks by using its factorial moment measures. - Pokkuluri Kiran Sree, Inampudi Ramesh Babu:
Towards a Cellular Automata Based Network Intrusion Detection System with Power Level Metric in Wireless Adhoc Networks (IDFADNWCA). - Tong Zhou:
Robust Recursive State Estimation with Random Measurements Droppings. - Tong Zhou:
Asymptotic Behavior of the Pseudo-Covariance Matrix of a Robust State Estimator with Intermittent Measurements. - Henryk Michalewski, Michal Skrzypczak:
Unambiguous Buchi is weak. - Jakub Katarzynski, Maciej Cytowski:
Towards Autotuning of OpenMP Applications on Multicore Architectures. - Patricia Wollstadt, Mario Martínez-Zarzuela, Raul Vicente, Francisco Javier Díaz Pernas, Michael Wibral:
Efficient transfer entropy analysis of non-stationary neural time series. - Kobbi Nissim, Salil P. Vadhan, David Xiao:
Redrawing the Boundaries on Purchasing Data from Privacy-Sensitive Individuals. - Yunjin Chen, Thomas Pock, Horst Bischof:
Learning ℓ1-based analysis and synthesis sparsity priors using bi-level optimization. - Yunjin Chen, Thomas Pock, René Ranftl, Horst Bischof:
Revisiting loss-specific training of filter-based MRFs for image restoration. - Yunjin Chen, René Ranftl, Thomas Pock:
A bi-level view of inpainting - based image compression. - Emanuel Diamant:
Cognitive Robotics: for never was a story of more owe than this. - Charles-Henri Cappelaere, Rémi Dubois, Pierre Roussel, Gérard Dreyfus:
Towards the selection of patients requiring ICD implantation by automatic classification from Holter monitoring indices. - Rémi Bonnet, Stefan Kiefer, Anthony Widjaja Lin:
Analysis of Probabilistic Basic Parallel Processes. - Sunho Park, TaeHyun Hwang, Seungjin Choi:
Convex Optimization for Binary Classifier Aggregation in Multiclass Problems. - Philippe Besnard, Marie-Odile Cordier, Yves Moinard:
Arguments using ontological and causal knowledge. - Mohammed F. A. Ahmed, Sergiy A. Vorobyov:
Simple Semi-Distributed Lifetime Maximizing Strategy via Power Allocation in Collaborative Beamforming for Wireless Sensor Networks. - Chris Culnane, Steve A. Schneider:
A Peered Bulletin Board for Robust Use in Verifiable Voting Systems. - Jinfeng Du, Muriel Médard, Ming Xiao, Mikael Skoglund:
Scalable Capacity Bounding Models for Wireless Networks. - Maria Kalimeri, Vassilios Constantoudis, Constantinos Papadimitriou, Konstantinos Karamanos, Fotis K. Diakonos, Harris Papageorgiou:
Entropy analysis of word-length series of natural language texts: Effects of text language and genre. - John Cannarella, Joshua A. Spechler:
Epidemiological modeling of online social network dynamics. - Yuan Xie, Wensheng Zhang, Dacheng Tao, Wenrui Hu, Yanyun Qu, Hanzi Wang:
Distortion-driven Turbulence Effect Removal using Variational Model. - Mohammad Rasouli, Demosthenis Teneketzis:
Electricity Pooling Markets with Strategic Producers Possessing Asymmetric Information I: Elastic Demand. - Xiang Zuo, Jeremy Blackburn, Nicolas Kourtellis, John Skvoretz, Adriana Iamnitchi:
The power of indirect social ties. - Stefano Rini, Shlomo Shamai:
The Impact of Phase Fading on the Dirty Paper Channel. - Saeed Bagheri, Anna Scaglione:
The Cognitive Compressive Sensing Problem. - Ekta Gupta, Kalyani, Nitin:
Preserving the Basic Property of Stable Matching by Deleting a pair. - Dae-Sung Jang, Han-Lim Choi:
Complexity Analysis of Heuristic Pulse Interleaving Algorithms for Multi-Target Tracking with Multiple Simultaneous Receive Beams. - Tadashi Wadayama, Taisuke Izumi:
Bitwise MAP Algorithm for Group Testing based on Holographic Transformation. - Jürgen Münch:
Goal-oriented Composition of Software Process Patterns. - Jens Heidrich, Adam Trendowicz, Jürgen Münch, Yasushi Ishigai, Kenji Yokoyama, Nahomi Kikuchi, Takashi Kawaguchi:
Lessons Learned and Results from Applying Data-Driven Cost Estimation to Industrial Data Sets. - Koji Oishi, Manuel Cebrián, Andrés Abeliuk, Naoki Masuda:
Iterated crowdsourcing dilemma game. - Sheng Cai, Mayank Bakshi, Sidharth Jaggi, Minghua Chen:
SUPER: Sparse signals with Unknown Phases Efficiently Recovered. - Michel Verhaegen, Anders Hansson:
Nuclear Norm Subspace Identification (N2SID) for short data batches. - Xiaohui Wang, Jia Jia, Lianhong Cai, Jie Tang:
Modeling Emotion Influence from Images in Social Networks. - Martín Soto, Alexis Ocampo, Jürgen Münch:
The Secret Life of a Process Description: A Look into the Evolution of a Large Process Model. - Khalid Belhajjame, Jun Zhao, Daniel Garijo, Kristina M. Hettne, Raúl Palma, Óscar Corcho, José Manuél Gómez-Pérez, Sean Bechhofer, Graham Klyne, Carole A. Goble:
The Research Object Suite of Ontologies: Sharing and Exchanging Research Data and Methods on the Open Web. - Jun Fang, Jing Li, Yanning Shen, Hongbin Li, Shaoqian Li:
Super-Resolution Compressed Sensing: An Iterative Reweighted Algorithm for Joint Parameter Learning and Sparse Signal Recovery. - Wenjie Li, Francesca Bassi, Michel Kieffer:
Robust Bayesian compressed sensing over finite fields: asymptotic performance analysis. - Rodrigo Costas, Zohreh Zahedi, Paul Wouters:
Do altmetrics correlate with citations? Extensive comparison of altmetric indicators with citations from a multidisciplinary perspective. - Stefan Hetzl, Alexander Leitsch, Giselle Reis, Daniel Weller:
Algorithmic Introduction of Quantified Cuts. - Tong Zhou:
On the Controllability and Observability of Networked Dynamic Systems. - Vahid Jamali, Yasser Karimian, Johannes Huber, Mahmoud Ahmadian:
On the Design of Fast Convergent LDPC Codes: An Optimization Approach. - Abhishek Bichhawat, Vineet Rajani, Deepak Garg, Christian Hammer:
Information Flow Control in WebKit's JavaScript Bytecode. - Facundo Carreiro, Alessandro Facchini, Yde Venema, Fabio Zanasi:
Weak MSO: Automata and Expressiveness Modulo Bisimilarity. - Khaled M. Khalil, M. Abdel-Aziz, Taymour T. Nazmy, Abdel-Badeeh M. Salem:
Intelligent Techniques for Resolving Conflicts of Knowledge in Multi-Agent Decision Support Systems. - Andrew Adamatzky:
Towards plant wires. - Stanislav Kikot, Roman Kontchakov, Vladimir V. Podolskii, Michael Zakharyaschev:
On the Succinctness of Query Rewriting over OWL 2 QL Ontologies with Shallow Chases. - Muhammad Arshad Ul Abedin, Vincent Ng, Latifur Khan:
Cause Identification from Aviation Safety Incident Reports via Weakly Supervised Semantic Lexicon Construction. - Christoph Niethammer, Colin W. Glass, José Gracia:
Avoiding Serialization Effects in Data-Dependency aware Task Parallel Algorithms for Spatial Decomposition. - Nusrat Fatema, Remus Brad:
Attacks And Counterattacks On Wireless Sensor Networks. - Cosmin Basca, Mihai Talos, Remus Brad:
Humanoid Robot With Vision Recognition Control System. - Abdul Kadir, Lukito Edi Nugroho, Adhi Susanto, Paulus Insap Santosa:
Leaf Classification Using Shape, Color, and Texture Features. - Abbas Bradai, Ubaid Abbasi, Raul Landa, Toufik Ahmed:
An efficient playout smoothing mechanism for layered streaming in P2P networks. - Swanand Kadhe, Sidharth Jaggi, Mayank Bakshi, Alex Sprintson:
Reliable, Deniable, and Hidable Communication over Multipath Networks. - Rushed Kanawati:
YASCA: A collective intelligence approach for community detection in complex networks. - Sarit Buzaglo, Eitan Yaakobi:
Constrained Codes for Rank Modulation. - Devansh Arpit, Gaurav Srivastava, Venu Govindaraju:
Randomized Subspace Learning Algorithms with Subspace Structure Preservation Guarantees. - Michael R. Clarkson, Bernd Finkbeiner, Masoud Koleini, Kristopher K. Micinski, Markus N. Rabe, César Sánchez:
Temporal Logics for Hyperproperties. - Federico Echenique:
Testing for separability is hard. - Jiyang Yu, Michael Carosino, Krishnamoorthy Sivakumar, Benjamin Belzer, Yiming Chen:
Detection and Decoding for 2D Magnetic Recording Channels with 2D Intersymbol Interference. - Imad Ahmad, Chih-Chun Wang:
When and By How Much Can Helper Node Selection Improve Regenerating Codes. - Rahul Jain, Troy Lee, Nisheeth K. Vishnoi:
A quadratically tight partition bound for classical communication complexity and query complexity. - Yanqing Wang, Yu Jiang, Xiaolei Wang, Siyu Zhang, Yaowen Liang:
Solving reviewer assignment problem in software peer review: An approach based on preference matrix and asymmetric TSP model. - Di Li, Asya Mitseva:
Mobile Adhoc Offloading. - Balázs Hidasi, Domonkos Tikk:
General factorization framework for context-aware recommendations. - Yanfei Yan, Ling Liu, Cong Ling:
Polar Lattices for Strong Secrecy Over the Mod-$Λ$ Gaussian Wiretap Channel. - Agnes Mainka, Sarah Hartmann, Wolfgang G. Stock, Isabella Peters:
Government and Social Media: A Case Study of 31 Informational World Cities. - Jules Hedges:
Dialectica models of additive-free linear logic. - S. M. Ferdous, M. Sohel Rahman:
A MAX-MIN Ant Colony System for Minimum Common String Partition Problem. - Meriem Ben-Salah Akin:
On the Potential of Twitter for Understanding the Tunisia of the Post-Arab Spring. - Mehrdad Mahdavi, Rong Jin:
Excess Risk Bounds for Exponentially Concave Losses. - Jean-Guillaume Dumas, Erich L. Kaltofen:
Essentially optimal interactive certificates in linear algebra. - Julien Bensmail, Ararat Harutyunyan, Hervé Hocquard, Petru Valicov:
Strong edge-colouring of sparse planar graphs. - Tobias Lutz:
Various Views on the Trapdoor Channel and an Upper Bound on its Capacity. - Saverio Caminiti, Claudio Cicali, Pietro Gravino, Vittorio Loreto, Vito Domenico Pietro Servedio, Alina Sîrbu, Francesca Tria:
XTribe: a web-based social computation platform. - David Birch, Helen Liang, Paul H. J. Kelly, Glen Mullineux, Tony Field, Joan Ko, Alvise Simondetti:
Multidisciplinary Engineering Models: Methodology and Case Study in Spreadsheet Analytics. - Rania Ibrahim, Noha A. Yousri, Mohamed A. Ismail, Nagwa M. El-Makky:
miRNA and Gene Expression based Cancer Classification using Self- Learning and Co-Training Approaches. - Enrique Amigó, Julio Gonzalo, Javier Artiles, Felisa Verdejo:
Combining Evaluation Metrics via the Unanimous Improvement Ratio and its Application to Clustering Tasks. - Marc J. V. Ponsen, Steven de Jong, Marc Lanctot:
Computing Approximate Nash Equilibria and Robust Best-Responses Using Sampling. - Jiri Baum, Ann E. Nicholson, Trevor I. Dix:
Proximity-Based Non-uniform Abstractions for Approximate Planning. - Adam Sadilek, Henry A. Kautz:
Location-Based Reasoning about Complex Multi-Agent Behavior. - Na Fu, Hoong Chuin Lau, Pradeep Varakantham, Fei Xiao:
Robust Local Search for Solving RCPSP/max with Durational Uncertainty. - Mario Alviano, Francesco Calimeri, Wolfgang Faber, Nicola Leone, Simona Perri:
Unfounded Sets and Well-Founded Semantics of Answer Set Programs with Aggregates. - Matthew L. Ginsberg:
Dr.Fill: Crosswords and an Implemented Solver for Singly Weighted CSPs. - Ruoyun Huang, Yixin Chen, Weixiong Zhang:
SAS+ Planning as Satisfiability. - Freek Stulp, Andreas Fedrizzi, Lorenz Mösenlechner, Michael Beetz:
Learning and Reasoning with Action-Related Places for Robust Mobile Manipulation. - Yifeng Zeng, Prashant Doshi:
Exploiting Model Equivalences for Solving Interactive Dynamic Influence Diagrams. - Gilles Pesant, Claude-Guy Quimper, Alessandro Zanarini:
Counting-Based Search: Branching Heuristics for Constraint Satisfaction Problems. - Edith Elkind, Piotr Faliszewski, Arkadii Slinko:
Cloning in Elections: Finding the Possible Winners. - Esperanza Albacete, Francisco Javier Calle-Gómez, Elena Castro, Dolores Cuadra:
Semantic Similarity Measures Applied to an Ontology for Human-Like Interaction. - Bernardo Cuenca Grau, Boris Motik, Giorgos Stoilos, Ian Horrocks:
Completeness Guarantees for Incomplete Ontology Reasoners: Theory and Practice. - J. H. M. Lee, Ka Lun Leung:
Consistency Techniques for Flow-Based Projection-Safe Global Cost Functions in Weighted Constraint Satisfaction. - Patrick R. Conrad, Brian Charles Williams:
Drake: An Efficient Executive for Temporal Plans with Choice. - Joohyung Lee, Ravi Palla:
Reformulating the Situation Calculus and the Event Calculus in the General Theory of Stable Models and in Answer Set Programming. - Léon Planken, Mathijs Michiel de Weerdt, Roman van der Krogt:
Computing All-Pairs Shortest Paths by Leveraging Low Treewidth. - Javier Vélez, Garrett Hemann, Albert S. Huang, Ingmar Posner, Nicholas Roy:
Modelling Observation Correlations for Active Exploration and Robust Object Detection. - Peter Jeavons, Justyna Petke:
Local Consistency and SAT-Solvers. - Moustafa Mohamed, Zheng Li, Xi Chen, Alan Rolf Mickelson:
HERMES: A Hierarchical Broadcast-Based Silicon Photonic Interconnect for Scalable Many-Core Systems. - Pengwei Wang, Reihaneh Safavi-Naini:
Efficient Codes for Adversarial Wiretap Channels. - Farzad Farnoud, Moshe Schwartz, Jehoshua Bruck:
The Capacity of String-Replication Systems. - Arya Mazumdar:
On the Capacity of Memoryless Adversary. - Cyril Voyant, Pierrick Haurant, Marc Muselli, Christophe Paoli, Marie-Laure Nivet:
Time series modeling and large scale global solar radiation forecasting from geostationary satellites data. - J. Rafid Siddiqui, Siamak Khatibi:
Visual Tracking using Particle Swarm Optimization. - Antonio Bernini, Stefano Bilotta, Renzo Pinzani, Vincent Vajnovszki:
A Gray Code for cross-bifix-free sets. - Karel De Vogeleer, Gérard Memmi, Pierre Jouvelot, Fabien Coelho:
The Energy/Frequency Convexity Rule: Modeling and Experimental Validation on Mobile Devices. - Suman Kumar, Krishnamurthy Giridhar:
Power Control Factor Selection in Uplink OFDMA Cellular Networks. - Yongming Li, Yali Li, Zhanyou Ma:
Computation Tree Logic Model Checking Based on Possibility Measures. - (Withdrawn) On the Resilience of an Ant-based System in Fuzzy Environments. An Empirical Study.
- Suman Kumar, Sheetal Kalyani, Krishnamurthy Giridhar:
Optimal Thresholds for Coverage and Rate in FFR Schemes for Planned Cellular Networks. - Suman Kumar, Sheetal Kalyani:
Analysis and Comparison of Coverage Probability in the Presence of Correlated Nakagami-m Interferers and Non-identical Independent Nakagami-m Interferers. - Shaoshi Chen, Ruyong Feng, Ziming Li, Michael F. Singer:
Parallel Telescoping and Parameterized Picard-Vessiot Theory. - Ronald Hochreiter, Christoph Waldhauser:
Evolving Accuracy: A Genetic Algorithm to Improve Election Night Forecasts. - Stefan Hochrainer, Ronald Hochreiter, Georg Ch. Pflug:
An algorithm for calculating steady state probabilities of $M|E_r|c|K$ queueing systems. - Ronald Hochreiter:
Evolutionary Optimization for Decision Making under Uncertainty. - Tong Peng, Rodrigo C. de Lamare, Anke Schmeink:
Adaptive Power Allocation Strategies using DSTC in Cooperative MIMO Networks. - Olivier Bodini, Julien David, Philippe Marchal:
Random-bit optimal uniform sampling for rooted planar trees with given sequence of degrees and Applications. - Ronald Hochreiter, Christoph Waldhauser:
Revolutionary Algorithms. - Mario Blaum, James S. Plank, Moshe Schwartz, Eitan Yaakobi:
Construction of Partial MDS (PMDS) and Sector-Disk (SD) Codes with Two Global Parity Symbols. - Yunlong He, Jun Huang, Qiang Duan, Zi Xiong, Juan Lv, Yanbing Liu:
A Novel Admission Control Model in Cloud Computing. - Bruno Grenet:
Computing low-degree factors of lacunary polynomials: a Newton-Puiseux approach. - Sugata Sanyal:
Energy Harvesting in M2M and WSN Space. - Rainer Hoerbe:
A Model for Privacy-enhanced Federated Identity Management. - Masoud Koleini, Eike Ritter, Mark Ryan:
Verification of agent knowledge in dynamic access control policies. - Natalia Silberstein, Tuvi Etzion:
Optimal Fractional Repetition Codes. - Samson Abramsky:
Axioms for Definability and Full Completeness. - Ján Manuch, Arash Rafiey:
Finding minimum Tucker submatrices. - Noah E. Friedkin:
Generalization of the PageRank Model. - Andrew Arnold, Mark Giesbrecht, Daniel S. Roche:
Faster sparse polynomial interpolation of straight-line programs over finite fields. - Yaoqing Yang, Bo Bai, Wei Chen:
How Much Frequency Can Be Reused in 5G Cellular Networks - A Matrix Graph Model. - Keke Zu, Rodrigo C. de Lamare, Martin Haardt:
Multi-Branch Tomlinson-Harashima Precoding for MU-MIMO Systems: Theory and Algorithms. - Abhishek Gupta, Ashutosh Nayyar, Cedric Langbort, Tamer Basar:
Common Information based Markov Perfect Equilibria for Linear-Gaussian Games with Asymmetric Information. - Frank Nielsen:
Generalized Bhattacharyya and Chernoff upper bounds on Bayes error using quasi-arithmetic means. - Dheerendra Mishra:
Cryptanalysis of Multi-Server Authenticated Key Agreement Scheme Based on Trust Computing Using Smart Cards and Biometrics. - Wai-Shun Cheung, Tuen-Wai Ng:
A Three-Dimensional Voting System in Hong Kong. - Rami Cohen, Yuval Cassuto:
LDPC Codes for Partial-Erasure Channels in Multi-Level Memories. - Alexis Ocampo, Jürgen Münch:
Process Evolution Supported by Rationale: An Empirical Investigation of Process Changes. - Martín Soto, Jürgen Münch:
Maintaining a Large Process Model Aligned with a Process Standard: An Industrial Example. - Martín Soto, Jürgen Münch:
Process Model Difference Analysis for Supporting Process Evolution. - Yi-Kai Wang, Yitong Yin, Sheng Zhong:
Approximate Capacities of Two-Dimensional Codes by Spatial Mixing. - Amr Ismail, Mohamed-Slim Alouini:
On Low-Complexity Full-diversity Detection In Multi-User MIMO Multiple-Access Channels. - Tomasz Gogacz, Jerzy Marcinkowski:
Termination of oblivious chase is undecidable. - Ashish Kumar Mourya, Niraj Singhal:
Managing Congestion Control in Mobile AD-HOC Network Using Mobile Agents. - Ronald Hochreiter, Christoph Waldhauser:
An Evolutionary Approach towards Clustering Airborne Laser Scanning Data. - Ronald Hochreiter, Christoph Waldhauser:
A Genetic Algorithm to Optimize a Tweet for Retweetability. - Vincenzo De Florio:
Antifragility = Elasticity + Resilience + Machine Learning: Models and Algorithms for Open System Fidelity. - Taraka Rama, Karthik Gali, P. V. S. Avinesh:
Does Syntactic Knowledge help English-Hindi SMT? - Hany Nashat Gabra, Ayman M. Bahaa Eldin, Huda Korashy:
Classification of IDS Alerts with Data Mining Techniques. - Ngo Tan Vu Khanh:
The critical factors affecting E-Government adoption: A Conceptual Framework in Vietnam. - Marcello Mamino:
On the Computing Power of +, -, and ˟. - Ahmed Ben Achballah, Slim Ben Saoud:
The Design of a Network-On-Chip Architecture Based On An Avionic Protocol. - Saif Khan Mohammed:
Impact of Transceiver Power Consumption on the Energy Efficiency Spectral Efficiency Tradeoff of Zero-Forcing Detector in Massive MIMO Systems. - Philipp Winter, Stefan Lindskog:
Spoiled Onions: Exposing Malicious Tor Exit Relays. - Daniela Kühn, Deryk Osthus, Viresh Patel:
A domination algorithm for $\{0, 1\}$-instances of the travelling salesman problem. - Egor Ianovski:
The existential fragment of S1S over element and successor is the co-Buchi languages. - Chithrupa Ramesh, Henrik Sandberg, Karl Henrik Johansson:
Performance Analysis of a Network of Event-based Systems. - Peng Li, Rodrigo Caiado de Lamare:
Low-Complexity Robust Data-Adaptive Dimensionality Reduction Based on Joint Iterative Optimization of Parameters. - Gordana Dodig-Crnkovic:
Info-computational constructivism in modelling of life as cognition. - Thibault Deleu, Mathieu Dervin, Kenta Kasai, François Horlin:
Iterative pre-distortion of the non-linear satellite channel. - Matthias Petschow:
MRRR-based Eigensolvers for Multi-core Processors and Supercomputers. - Washington A. Oliveira, Luiz Leduíno de Salles Neto, Antônio Carlos Moretti, Ednei F. Reis:
Nonidentical circle packing problem: multiple disks installed in a rotating circular container. - Jingjun Han, Liyun Dai, Bican Xia:
Constructing Fewer Open Cells by GCD Computation in CAD Projection. - Marc Hellmuth, Tilen Marc:
On the Cartesian Skeleton and the Factorization of the Strong Product of Digraphs. - Lélia Blin, Sébastien Tixeuil:
Compact Deterministic Self-Stabilizing Leader Election: The Exponential Advantage of Being Talkative. - Samson Abramsky:
What are the fundamental structures of concurrency? We still don't know! - Nikolaos Mavridis:
A Review of Verbal and Non-Verbal Human-Robot Interactive Communication. - Chithrupa Ramesh, Henrik Sandberg, Karl Henrik Johansson:
Stability Analysis and Design of a Network of Event-based Systems. - Lee-Ad Gottlieb, Shay Solomon:
Light spanners for snowflake metrics. - Naznin Fauzia, Venmugil Elango, Mahesh Ravishankar, J. Ramanujam, Fabrice Rastello, Atanas Rountev, Louis-Noël Pouchet, P. Sadayappan:
Beyond Reuse Distance Analysis: Dynamic Analysis for Characterization of Data Locality Potential. - Joseph D. Ramsey:
A Scalable Conditional Independence Test for Nonlinear, Non-Gaussian Data. - Manuj Mukherjee, Navin Kashyap, Yogesh Sankarasubramaniam:
Achieving SK Capacity in the Source Model: When Must All Terminals Talk? - Katherine Rose Driggs-Campbell, Guillaume Bellegarda, Victor Shia, S. Shankar Sastry, Ruzena Bajcsy:
Experimental Design for Human-in-the-Loop Driving Simulations. - Olivier Curé, Guillaume Blin, Dominique Revuz, David C. Faye:
WaterFowl, a Compact, Self-indexed RDF Store with Inference-enabled Dictionaries. - José Alberto García Gutiérrez, Alejandro Mateo Hernández-Díaz:
Análisis e implementación de algoritmos evolutivos para la optimización de simulaciones en ingeniería civil. (draft). - Olivier Ruatta, Mark Sciabica, Ágnes Szántó:
Over-constrained Weierstrass iteration and the nearest consistent system. - Quan Geng, Tie Liu:
Symmetric Two-User Gaussian Interference Channel with Common Messages. - Travis Martin, Xiao Zhang, M. E. J. Newman:
Localization and centrality in networks. - Olle Fredriksson:
Distributed call-by-value machines. - Mohamed A. El-Sayed, Sayed Abdel-Khalek, Eman Abdel-Aziz:
Study of Efficient Technique Based On 2D Tsallis Entropy For Image Thresholding. - Cédric Westphal:
A Stable Fountain Code Mechanism for Peer-to-Peer Content Distribution. - Felipe Gómez-Cuba, Francisco J. González-Castaño:
Improving Third-Party Relaying for LTE-A: A Realistic Simulation Approach. - Martin Hofmann, Wei Chen:
Büchi Types for Infinite Traces and Liveness. - Mohamed A. El-Sayed, Mohamed A. Khafagy:
An Identification System Using Eye Detection Based On Wavelets And Neural Networks. - Dave R. Stikkolorum, Michel R. V. Chaudron, Oswald de Bruin:
The Art of Software Design, a Video Game for Learning Software Design Principles. - Samson Abramsky:
Retracing some paths in Process Algebra. - Victoria Kostina, Sergio Verdú:
Channels with cost constraints: strong converse and dispersion. - Victoria Kostina, Sergio Verdú:
Nonasymptotic noisy lossy source coding. - Cong Li, Michael Georgiopoulos, Georgios C. Anagnostopoulos:
A Unifying Framework for Typical Multi-Task Multiple Kernel Learning Problems. - Shirou Maruyama, Yasuo Tabei:
Fully Online Grammar Compression in Constant Space. - Bahman Kalantari:
Solving Cubic Equations By the Quadratic Formula. - Yoshiyuki Kabashima, Mikko Vehkaperä:
Signal recovery using expectation consistent approximation for linear observations. - Jafar Shayan, Ahmad Azarnik, Suriayati Chuprat, Sasan Karamizadeh, Mojtaba Alizadeh:
Identifying Benefits and risks associated with utilizing cloud computing. - Juliana Wahid, Naimah Mohd Hussin:
Harmony Search Algorithm for Curriculum-Based Course Timetabling Problem. - Toshiyuki Maeda, Masanori Fujii, Isao Hayashi:
Skill Analysis with Time Series Image Data. - Nalika Ulapane, Sunil G. Abeyratne, Prabath J. Binduhewa, Chamari Dhanapala, Shyama Wickramasinghe, Nimal Rathnayake:
A Simple Software Application for Simulating Commercially Available Solar Panels. - Alexandre M. Melo Silva, Christiano C. Maciel, Suelene do Carmo Correa:
Multi-hop Energy-efficient Control for Heterogeneous Wireless Sensor Networks Using Fuzzy Logic. - Yeresime Suresh, Santanu Ku. Rath:
A Genetic Algorithm based Approach for Test Data Generation in Basis Path Testing. - Jiyong Lu, Xuan Guang, Fang-Wei Fu:
Distributed Storage Schemes over Unidirectional Ring Networks. - Zhi Li, Ali C. Begen, Joshua Gahm, Yufeng Shan, Bruce Osler, David Oran:
Streaming Video over HTTP with Consistent Quality. - Tanmay Sinha:
Supporting MOOC Instruction with Social Network Analysis. - Umer Asgher, Fahad Moazzam Dar, Ali Hamza, Abdul Moeed Paracha:
Analysis of Increasing Malwares and Cyber Crimes Using Economic Approach. - Fahad Moazzam Dar, Umer Asgher, Daniyal Malik, Emmad Adil, Hassan Shahzad, Anees Ali:
Automation of Prosthetic Upper Limbs for Transhumeral Amputees Using Switch-controlled Motors. - Hamdi A. Al-Jamimi, Moataz A. Ahmed:
Transition from Analysis to Software Design: A Review and New Perspective. - Asaf Weinstein, Ehud Weinstein:
Inequalities for the Bayes Risk. - Jens Heidrich, Jürgen Münch:
Goal-Oriented Setup and Usage of Custom-Tailored Software Cockpits. - Shenghao Wang, Kai Zhang, Zhili Wang, Kun Gao, Zhao Wu, Peiping Zhu, Ziyu Wu:
A LabVIEW based user-friendly nano-CT image alignment and 3D reconstruction platform. - Kushal Ahmed, Toby Myers, Lian Wen, Abdul Sattar:
Detecting Requirements Defects Utilizing A Mathematical Framework for Behavior Engineering. - Houssam Abbas, Bardh Hoxha, Georgios Fainekos, Jyotirmoy V. Deshmukh, James Kapinski, Koichi Ueda:
Conformance Testing as Falsification for Cyber-Physical Systems. - Chen Guo, Cenzhe Zhu, Teng Tiow Tay:
ShAppliT: A Novel Broker-mediated Solution to Generic Application Sharing in a Cluster of Closed Operating Systems. - Pablo Cristian Tissera, Alicia Castro, A. Marcela Printista, Emilio Luque:
Simulating Behaviours to face up an Emergency Evacuation. - (Withdrawn) Multi-GPU parallel memetic algorithm for capacitated vehicle routing problem.
- Hadi Kasiri, Hamid Reza Momeni, Atiyeh Kasiri:
Optimal Intelligent Control for Wind Turbulence Rejection in WECS Using ANNs and Genetic Fuzzy Approach. - Nicola Ivan Giannoccaro, Giovanni Indiveri, Luigi Spedicato:
Least Entropy-Like Approach for Reconstructing L-Shaped Surfaces Using a Rotating Array of Ultrasonic Sensors. - Konstantinos Dermitzakis, Juan Pablo Carbajal:
Bio-inspired friction switches: adaptive pulley systems. - Elodie Leducq:
On the third weight of generalized Reed-Muller codes. - Semseddin Gunduz, Aysen Namlu:
The Effect Of Online Cooperative Homework On Students' Academic Success. - Ayman M. Bahaa Eldin, Abdel-Moneim A. Wahdan, Hani M. K. Mahdi:
Edge detection of binary images using the method of masks. - Ayman M. Bahaa Eldin, Abdel-Moneim A. Wahdan, Hani M. K. Mahdi:
Genetic Algorithms and its use with back-propagation network. - Pietro Codara, Ottavio M. D'Antona, Vincenzo Marra:
Valuations in Gödel Logic, and the Euler Characteristic. - Farrukh Arslan:
Service Oriented Paradigm for Massive Multiplayer Online Games. - Pietro Codara, Ottavio M. D'Antona, Vincenzo Marra:
An Analysis of Ruspini Partitions in Gödel Logic. - Adam Trendowicz, Michael Ochs, Axel Wickenkamp, Jürgen Münch, Yasushi Ishigai, Takashi Kawaguchi:
An Integrated Approach for Identifying Relevant Factors Influencing Software Development Productivity. - Christoph Haase:
Subclasses of Presburger Arithmetic and the Weak EXP Hierarchy. - Stephan Mertens:
Stable Roommates Problem with Random Preferences. - Ramji Venkataramanan, Sekhar Tatikonda:
The Gaussian Rate-Distortion Function of Sparse Regression Codes with Optimal Encoding. - Sergey Goncharov, Stefan Milius, Alexandra Silva:
Towards a Coalgebraic Chomsky Hierarchy. - Antonios Kalampakas:
k-Colorability is Graph Automaton Recognizable. - Stanislav Simeonov, Neli Simeonova:
Graphical Interface for Visually Impaired People Based on Bi-stable Solenoids. - Étienne Payet, Fred Mesnard, Fausto Spoto:
Non-Termination Analysis of Java Bytecode. - Gergely Biczók, Santiago Diez Martinez, Thomas Jelle, John Krogstie:
Navigating MazeMap: indoor human mobility, spatio-logical ties and future potential. - Yanqing Wang, Chong Wang, Minghui Chen, Sijing Yun, Minjing Song:
How are identifiers named in open source software? About popularity and consistency. - Qiutao Zhuang, Xiao Ma, Aleksandar Kavcic:
Bounds on the ML Decoding Error Probability of RS-Coded Modulation over AWGN Channels. - Anthony Marcus, Ionut Cardei, Borko Furht, Osman Salem, Ahmed Mehaoua:
A Mobile Device Prototype Application for the Detection and Prediction of Node Faults in Wireless Sensor Networks. - Changxing Ding, Jonghyun Choi, Dacheng Tao, Larry S. Davis:
Multi-Directional Multi-Level Dual-Cross Patterns for Robust Face Recognition. - Hsin-Hao Su:
A Distributed Minimum Cut Approximation Scheme. - Wook Jung, Shih-Chun Chang:
An Integer Programming Approach to UEP Coding for Multiuser Broadcast Channels. - Samson Abramsky, Radha Jagadeesan:
Game Semantics for Access Control. - Dimitri Kartsaklis:
Compositional Operators in Distributional Semantics. - Mohamed A. El-Sayed, Sayed Abdel-Khalek, Hanan H. Amin:
Study of Neural Network Algorithm for Straight-Line Drawings of Planar Graphs. - Laurent Michel, Pascal Van Hentenryck:
A Microkernel Architecture for Constraint Programming. - Jan Leike, Matthias Heizmann:
Ranking Templates for Linear Loops. - Pascal Van Hentenryck, Laurent Michel:
Domain Views for Constraint Programming. - Malcolm McRoberts:
Software Licensing in the Cloud Age. - Matthias Heizmann, Jochen Hoenicke, Jan Leike, Andreas Podelski:
Linear Ranking for Linear Lasso Programs. - Jan Leike:
Ranking Function Synthesis for Linear Lasso Programs. - Blake Barker:
STABLAB Documentation for KdV : Numerical proof of stability of roll waves in the small-amplitude limit for inclined thin film flow. - Pokkuluri Kiran Sree, Inampudi Ramesh Babu, N. S. S. S. N. Usha Devi:
HMACA: Towards Proposing a Cellular Automata Based Tool for Protein Coding, Promoter Region Identification and Protein Structure Prediction. - Roberto E. Lopez-Herrejon, Javier Ferrer, Francisco Chicano, Evelyn Nicole Haslinger, Alexander Egyed, Enrique Alba:
Towards a Benchmark and a Comparison Framework for Combinatorial Interaction Testing of Software Product Lines. - M. Tharun Prasath:
Continuous Speech Recognition Based on Deterministic Finite Automata Machine using Utterance and Pitch Verification. - Sajib Dasgupta, Vincent Ng:
Which Clustering Do You Want? Inducing Your Ideal Clustering with Minimal Feedback. - Dominic A. Orchard, Tomas Petricek, Alan Mycroft:
The semantic marriage of monads and effects. - Sven Schewe, Thomas Varghese:
Determinising Parity Automata. - Yongpeng Wu, Chao-Kai Wen, Chengshan Xiao, Xiqi Gao, Robert Schober:
Linear MIMO Precoding in Jointly-Correlated Fading Multiple Access Channels with Finite Alphabet Signaling. - Jian Xu, Thanuka L. Wickramarathne, Erin K. Grey, Karsten Steinhaeuser, Reuben P. Keller, John M. Drake, Nitesh V. Chawla, David M. Lodge:
Patterns of Ship-borne Species Spread: A Clustering Approach for Risk Assessment and Management of Non-indigenous Species Spread. - Roy Hayes, Peter A. Beling, William T. Scherer:
Real Time Strategy Language. - Fatima Boumahdi, Rachid Chalal:
SoaDssPm: A new Service-Oriented Architecture of the decision support system for the Project Management. - Ray Maleh, Frank A. Boyle:
Exploiting Spectral Leakage for Spectrogram Frequency Super-resolution. - Zijian Ming, Chunjie Luo, Wanling Gao, Rui Han, Qiang Yang, Lei Wang, Jianfeng Zhan:
BDGS: A Scalable Big Data Generator Suite in Big Data Benchmarking. - Abdelhak Boulaalam, El Habib Nfaoui, Omar El Beqqali:
Intelligent Product: Mobile Agent Architecture Integrating the End of Life Cycle (EOL) For minimizing the lunch phase PLM. - Russell Impagliazzo, Shachar Lovett, Ramamohan Paturi, Stefan Schneider:
0-1 Integer Linear Programming with a Linear Number of Constraints. - Bharat Shrestha, Ekram Hossain, Kae Won Choi:
Distributed and Centralized Hybrid CSMA/CA-TDMA Schemes for Single-Hop Wireless Networks. - Ekram Hossain, Mehdi Rasti, Hina Tabassum, Amr Abdelnasser:
Evolution Towards 5G Multi-tier Cellular Wireless Networks: An Interference Management Perspective. - Shu Kong, Zhuolin Jiang, Qiang Yang:
Learning Mid-Level Features and Modeling Neuron Selectivity for Image Classification. - Alex Dytso, Daniela Tuninetti, Natasha Devroye:
On Discrete Alphabets for the Two-user Gaussian Interference Channel with One Receiver Lacking Knowledge of the Interfering Codebook. - Chen Li:
GreenMail: Reducing Email Service's Carbon Emission with Minimum Cost. - Hajir Roozbehani, Yury Polyanskiy:
Algebraic Methods of Classifying Directed Graphical Models. - Dmitry Zinoviev:
Peer Ratings in Massive Online Social Networks. - (Withdrawn) Interference Statistics and Capacity Analysis for Uplink Transmission in Two-Tier Small Cell Networks: A Geometric Probability Approach.
- Nuzulha Khilwani Ibrahim, Emaliana Kasmuri, Norazira A. Jalil, Mohd Adili Norasikin, Sazilah Salam, Mohamad Riduwan Md Nawawi:
License Plate Recognition (LPR): A Review with Experiments for Malaysia Case Study. - C. P. Sumathi, T. Santhanam, G. Umamaheswari:
A Study of Various Steganographic Techniques Used for Information Hiding. - Lin Tie:
On Controllability and Near-controllability of Multi-input Discrete-time Bilinear Systems in Dimension Two. - Mihály Bárász, Paul F. Christiano, Benja Fallenstein, Marcello Herreshoff, Patrick LaVictoire, Eliezer Yudkowsky:
Robust Cooperation in the Prisoner's Dilemma: Program Equilibrium via Provability Logic. - Chenwei Wang:
Beyond One-Way Communication: Degrees of Freedom of Multi-Way Relay MIMO Interference Networks. - Brian Brubach:
Improved Online Square-into-Square Packing. - Fabio Dias, Jean Cousty, Laurent Najman:
Dimensional operators for mathematical morphology on simplicial complexes. - Vincenzo De Florio:
Quality Indicators for Collective Systems Resilience. - Aymen Louati, Chadlia Jerad, Kamel Barkaoui:
Formalization and Verification of Hierarchical Use of Interaction Overview Diagrams Using Timing Diagrams. - Manoj Krishnaswamy, G. Hemantha Kumar:
Enhancing Template Security of Face Biometrics by Using Edge Detection and Hashing. - Youcef Dahmani, Maâmar El-Amine Hamri:
Specification of the State Lifetime in the DEVS Formalism by Fuzzy Controller. - Issam Sahmoudi, Hanane Froud, Abdelmonaime Lachkar:
A new keyphrases extraction method based on suffix tree data structure for arabic documents clustering. - Marek Kurdej, Julien Moras, Véronique Cherfaoui, Philippe Bonnifait:
Enhancing Mobile Object Classification Using Geo-referenced Maps and Evidential Grids. - Felipe Sánchez-Martínez, Rafael C. Carrasco, Miguel A. Martínez-Prieto, Joaquín Adiego:
Generalized Biwords for Bitext Compression and Translation Spotting. - Sándor Soós:
How science maps reveal knowledge transfer: new measurement for a historical case. - Borzoo Rassouli, Chenxi Hao, Bruno Clerckx:
A Novel Proof for the DoF Region of the MIMO Broadcast Channel with No CSIT. - Jianwen Li, Geguang Pu, Lijun Zhang, Moshe Y. Vardi, Jifeng He:
Fast LTL Satisfiability Checking by SAT Solvers. - Ayman M. Bahaa Eldin, Hoda K. Mohamed, Sally S. Deraz:
Increasing Server Availability for Overall System Security: A Preventive Maintenance Approach Based on Failure Prediction. - Thijs Laarhoven:
Capacities and Capacity-Achieving Decoders for Various Fingerprinting Games. - Alexander Kobel, Michael Sagraloff:
Improved Complexity Bounds for Computing with Planar Algebraic Curves. - Trevor Anthony Cohn, Mirella Lapata:
Sentence Compression as Tree Transduction. - Sebastian Padó, Mirella Lapata:
Cross-lingual Annotation Projection for Semantic Roles. - Tahira Naseem, Benjamin Snyder, Jacob Eisenstein, Regina Barzilay:
Multilingual Part-of-Speech Tagging: Two Unsupervised Approaches. - Alexander Yates, Oren Etzioni:
Unsupervised Methods for Determining Object and Relation Synonyms on the Web. - Evgeniy Gabrilovich, Shaul Markovitch:
Wikipedia-based Semantic Interpretation for Natural Language Processing. - Yifan Li, Petr Musílek, Marek Z. Reformat, Loren Wyard-Scott:
Identification of Pleonastic It Using the Web. - George Tsatsaronis, Iraklis Varlamis, Michalis Vazirgiannis:
Text Relatedness Based on a Word Thesaurus. - Felipe Sánchez-Martínez, Mikel L. Forcada:
Inferring Shallow-Transfer Machine Translation Rules from Small Parallel Corpora. - Nafiseh Shariati, Emil Björnson, Mats Bengtsson, Mérouane Debbah:
Low-Complexity Polynomial Channel Estimation in Large-Scale MIMO with Arbitrary Statistics. - Ran Ben-Basat, Ariel Gabizon:
Relations between automata and the simple k-path problem. - Peng Xia, Kun Tu, Bruno F. Ribeiro, Hua Jiang, Xiaodong Wang, Cindy X. Chen, Benyuan Liu, Don Towsley:
Who is Dating Whom: Characterizing User Behaviors of a Large Online Dating Site. - Akira Suzuki, Amer E. Mouawad, Naomi Nishimura:
Reconfiguration of Dominating Sets. - Ronald Hochreiter, Christoph Waldhauser:
Data Mining Cultural Aspects of Social Media Marketing. - Javier Parra-Arnau, Félix Gómez Mármol, David Rebollo-Monedero, Jordi Forné:
Smart Deferral of Messages for Privacy Protection in Online Social Networks. - Gergely Tibély, Péter Pollner, Tamás Vicsek, Gergely Palla:
Extracting tag hierarchies. - Paolo Braca, Stefano Maranò, Vincenzo Matta, Ali H. Sayed:
Asymptotic Performance of Adaptive Distributed Detection over Networks. - Alexander Amini, Kevin S. Kung, Chaogui Kang, Stanislav Sobolevsky, Carlo Ratti:
The Impact of Social Segregation on Human Mobility in Developing and Urbanized Regions. - S. Shervin Ostadzadeh, Fereidoon Shams:
Towards a Software Architecture Maturity Model for Improving Ultra-Large-Scale Systems Interoperability. - Michael Zargham, Victor M. Preciado:
Worst-Case Scenarios for Greedy, Centrality-Based Network Protection Strategies. - Ligong Wang, Gregory W. Wornell:
A refined analysis of the Poisson channel in the high-photon-efficiency regime. - Tobias Kuhn, Michel Dumontier:
Hash-URIs for Verifiable, Immutable, and Permanent Digital Artifacts. - Dmitry Gavinsky, Pavel Pudlák:
Partition Expanders. - Yeray Cachon Santana:
Orthogonal Matrix in Cryptography. - Jerzy Tchórzewski, Emil Chyzy:
Reaserchnig the Development of the Electrical Power System Using Systemically Evolutionary Algorithm. - Debadatta Dash:
Advanced Signal Processing Techniqes to Study Normal and Epileptic EEG. - Zahra Pourbahman, Ali Hamzeh:
Reducing the Computational Cost in Multi-objective Evolutionary Algorithms by Filtering Worthless Individuals. - Adrian Lancucki:
GGP with Advanced Reasoning and Board Knowledge Discovery. - Johannes Schneider, Michail Vlachos:
On Randomly Projected Hierarchical Clustering with Guarantees. - David R. Morrison, Edward C. Sewell, Sheldon H. Jacobson:
Solving the Pricing Problem in a Generic Branch-and-Price Algorithm using Zero-Suppressed Binary Decision Diagrams. - Tuan Ta, John S. Baras, Chenxi Zhu:
Improving Smartphone Battery Life Utilizing Device-to-device Cooperative Relays Underlaying LTE Networks. - Photios A. Stavrou, Christos K. Kourtellaris, Charalambos D. Charalambous:
Applications of Information Nonanticipative Rate Distortion Function. - Muhammad Dhiauddin Mohamed Suffian, Suhaimi Ibrahim:
A Prediction Model for System Testing Defects using Regression Analysis. - Moritz Sinn, Florian Zuleger, Helmut Veith:
A Simple and Scalable Static Analysis for Bound Analysis and Amortized Complexity Analysis. - Antonis Achilleos:
Modal Logics with Hard Diamond-free Fragments. - Christer Bäckström, Peter Jonsson:
Algorithms and Limits for Compact Plan Representations. - Francesco Belardinelli, Alessio Lomuscio:
Interactions between Knowledge and Time in a First-Order Logic for Multi-Agent Systems: Completeness Results. - Boris Konev, Michel Ludwig, Dirk Walther, Frank Wolter:
The Logical Difference for the Lightweight Description Logic EL. - Matteo Vasirani, Sascha Ossowski:
A Market-Inspired Approach for Intersection Management in Urban Road Traffic Networks. - Priyankar Ghosh, Amit Sharma, P. P. Chakrabarti, Pallab Dasgupta:
Algorithms for Generating Ordered Solutions for Explicit AND/OR Structures. - Bernardo Cuenca Grau, Boris Motik:
Reasoning over Ontologies with Hidden Content: The Import-by-Query Approach. - Carlos Hernández, Jorge A. Baier:
Avoiding and Escaping Depressions in Real-Time Heuristic Search. - Martin C. Cooper, Stanislav Zivný:
Tractable Triangles and Cross-Free Convexity in Discrete Optimisation. - Patrik Haslum:
Narrative Planning: Compilations to Classical Planning. - Amanda Jane Coles, Andrew Coles, Maria Fox, Derek Long:
COLIN: Planning with Continuous Linear Numeric Change. - Jörg Hoffmann, Ingo Weber, Frank Michael Kraft:
SAP Speaks PDDL: Exploiting a Software-Engineering Model for Planning in Business Process Management. - Maria Fox, Derek Long, Daniele Magazzeni:
Plan-based Policies for Efficient Multiple Battery Load Management. - Ignasi Abío, Robert Nieuwenhuis, Albert Oliveras, Enric Rodríguez-Carbonell, Valentin Mayer-Eichberger:
A New Look at BDDs for Pseudo-Boolean Constraints. - Carmel Domshlak, Erez Karpas, Shaul Markovitch:
Online Speedup Learning for Optimal Planning. - Ulle Endriss, Umberto Grandi, Daniele Porello:
Complexity of Judgment Aggregation. - Zizhen Zhang, Hu Qin, Xiaocong Liang, Andrew Lim:
An Enhanced Branch-and-bound Algorithm for the Talent Scheduling Problem. - Pramod Verma:
Serefind: A Social Networking Website for Classifieds. - Yupeng Jiang, Dongdai Lin:
Distribution properties of compressing sequences derived from primitive sequences modulo odd prime powers. - Adam Trendowicz, Jürgen Münch, Ross Jeffery:
State of the Practice in Software Effort Estimation: A Survey and Literature Review. - Changxing Shang, Shengzhong Feng, Zhongying Zhao, Jianping Fan:
Efficient Detecting Overlapping Communities by Seeding and Semi-Supervised Learning. - Mikhail V. Kharinov:
Hierarchical pixel clustering for image segmentation. - Yohei Watanabe, Junji Shikata:
Timed-Release Secret Sharing Scheme with Information Theoretic Security. - Mitsugu Iwamoto, Junji Shikata:
Secret Sharing Schemes Based on Min-Entropies. - Keigo Takeuchi:
A Generalization of Threshold Saturation: Application to Spatially Coupled BICM-ID. - Nan Wang, Jan Melchior, Laurenz Wiskott:
Gaussian-binary Restricted Boltzmann Machines on Modeling Natural Image Statistics. - Jesús Aransay, Jose Divasón:
Applications of the Gauss-Jordan algorithm, done right. - H. Gopalkrishna Gadiyar, R. Padma:
Hamming's Original Paper Rewritten in Symbolic Form: A Preamble to Coding Theory. - Ciaran McCreesh, Patrick Prosser:
The Shape of the Search Tree for the Maximum Clique Problem, and the Implications for Parallel Branch and Bound. - Muhammad Adnan Khan, Muhammad Umair, Muhammad Aamer Saleem Choudry:
Accelerated Assistant to SubOptimum Receiver for Multi Carrier Code Division Multiple Access System. - Ludovic Mignot, Nadia Ouali Sebti, Djelloul Ziadi:
An Efficient Algorithm for the Equation Tree Automaton via the $k$-C-Continuations. - Abhisekh Sankaran, Bharat Adsul, Supratik Chakraborty:
A Generalization of the Łoś-Tarski Preservation Theorem over Classes of Finite Structures. - Hossein Hosseini, Ali Goli, Neda Barzegar Marvasti, Masoume Azghani, Farokh Marvasti:
On Image Block Loss Restoration Using the Sparsity Pattern as Side Information. - Dimitri Kartsaklis, Mehrnoosh Sadrzadeh, Stephen Pulman, Bob Coecke:
Reasoning about Meaning in Natural Language with Compact Closed Categories and Frobenius Algebras. - Lutz Bornmann:
How are excellent (highly cited) papers defined in bibliometrics? A quantitative analysis of the literature. - Jose Teixeira, Tingting Lin:
Collaboration in the open-source arena: The WebKit case. - Raed Jaberi:
On computing the $2$-vertex-connected components of directed graphs. - Michael Sagraloff:
A Near-Optimal Algorithm for Computing Real Roots of Sparse Polynomials. - Linhao Li, Ping Wang, Qinghua Hu, Sijia Cai:
A Sparse Outliers Iterative Removal Algorithm to Model the Background in the Video Sequences. - Parisa Jalili Marandi, Marco Primi, Nicolas Schiper, Fernando Pedone:
Ring Paxos: High-Throughput Atomic Broadcast. - Ghassem Tofighi, Kaamran Raahemifar, Anastasios N. Venetsanopoulos:
A Brief Review on Models for Performance Evaluation in DSS Architecture. - Xiang Cai, Rishab Nithyanand, Rob Johnson:
New Approaches to Website Fingerprinting Defenses. - Si-Hyeon Lee, Sae-Young Chung:
A Unified Achievability Theorem. - Alain Couvreur, Irene Marquez Corbella, Ruud Pellikaan:
A Polynomial Time Attack against Algebraic Geometry Code Based Public Key Cryptosystems. - Sergey Sysoev:
The Effective Solving of the Tasks from NP by a Quantum Computer. - Marco Dalai:
Constant Compositions in the Sphere Packing Bound for Classical-Quantum Channels. - Ronen I. Brafman, Guy Shani:
Replanning in Domains with Partial Information and Sensing Actions. - Richard Hoshino, Ken-ichi Kawarabayashi:
Generating Approximate Solutions to the TTP using a Linear Distance Relaxation. - Hai Zhao, Xiaotian Zhang, Chunyu Kit:
Integrative Semantic Dependency Parsing via Efficient Large-scale Feature Selection. - Ebrahim Nasrabadi, Ronald Koch:
Flows over time in time-varying networks. - Max A. Alekseyev:
Computing the (number of) inverses of Euler's totient and other multiplicative functions. - James R. A. Davenport, Robert DeLine:
The Readability of Tweets and their Geographic Correlation with Education. - Marco Mondelli, Seyed Hamed Hassani, Igal Sason, Rüdiger L. Urbanke:
Achieving the Superposition and Binning Regions for Broadcast Channels Using Polar Codes. - Luca Barletta, Gerhard Kramer:
On Continuous-Time White Phase Noise Channels. - Adrian Dumitrescu, Anirban Ghosh, Csaba D. Tóth:
On Fence Patrolling by Mobile Agents. - Afsana Nadia, Arifur Rahim Chowdhury, Md. Shoayeb Hossain, Md. Imdadul Islam, M. Ruhul Amin:
Performance Evaluation of Two-Hop Wireless Link under Nakagami-m Fading. - Kent Tsz Kan Cheung, Shaoshi Yang, Lajos Hanzo:
Maximizing Energy-Efficiency in Multi-Relay OFDMA Cellular Networks. - Prerana Sharma:
Efficient Image Encryption and Decryption Using Discrete Wavelet Transform and Fractional Fourier Transform. - Christopher Engström, Sergei Silvestrov:
PageRank for evolving link structures. - Mine Alsan, Emre Telatar:
Polarization as a novel architecture to boost the classical mismatched capacity of B-DMCs. - Guohua Wu, Huilin Wang, Haifeng Li, Witold Pedrycz, Dishan Qiu, Manhao Ma, Jin Liu:
An adaptive Simulated Annealing-based satellite observation scheduling method combined with a dynamic task clustering strategy. - K. Eric Harper, Thijmen de Gooijer:
Performance Impact of Lock-Free Algorithms on Multicore Communication APIs. - Fernando Almeida, José D. Santos, José A. Monteiro:
e-commerce business models in the context of web3.0 paradigm. - Cheng-Jun Wang:
Bringing Reference Groups Back: Agent-based Modeling of the Spiral of Silence. - Karthikeyan V. Manjupriya, C. K. Chithra, M. Divya:
Face Verification Using Kernel Principle Component Analysis. - V. Karthikeyan, M. Divya, C. K. Chithra, K. Manju Priya:
Face Verification System based on Integral Normalized Gradient Image(INGI). - Yanqing Wang, Yaowen Liang, Luning Liu, Ying Liu:
A Motivation Model of Peer Assessment in Programming Language Learning. - Smita Nirkhi, Rajiv V. Dharaskar:
Comparative study of Authorship Identification Techniques for Cyber Forensics Analysis. - Guillaume Bonfante, Jean-Yves Marion, Fabrice Sabatier, Aurélien Thierry:
Analysis and Diversion of Duqu's Driver. - Chandra Sekhar Vorugunti, Mrudula Sarvabhatla:
A Robust Password-Based Multi-Server Authentication Scheme. - Tanmoy Chakraborty, Dipankar Das, Sivaji Bandyopadhyay:
Identifying Bengali Multiword Expressions using Semantic Clustering. - Jinxiao Zhu, Yin Chen, Yulong Shen, Osamu Takahashi, Xiaohong Jiang, Norio Shiratori:
Secrecy Transmission Capacity in Noisy Wireless Ad Hoc Networks. - Fabrício Olivetti de França:
Iterative Universal Hash Function Generator for Minhashing. - HyungTae Kim, HaeJeong Yang:
Software Architecture and Subclassing Technique for Semiconductor Manufacturing Machines. - Andrew H. Gleibman:
Delegating Custom Object Detection Tasks to a Universal Classification System. - Narkhede Sachin G., Vaishali D. Khairnar:
Brain Tumor Detection Based On Symmetry Information. - S. M. Mukane, Y. S. Ghodake, P. S. Khandagle:
Image enhancement using fusion by wavelet transform and laplacian pyramid. - MuthuKalyani K., VeeraMuthu A.:
smart application for AMS using Face Recognition. - João Graça, Kuzman Ganchev, Luísa Coheur, Fernando Pereira, Ben Taskar:
Controlling Complexity in Part-of-Speech Induction. - Abbas Bradai, Toufik Ahmed:
Differenciated Bandwidth Allocation in P2P Layered Streaming. - Yasin Yilmaz, Ziyu Guo, Xiaodong Wang:
Sequential Joint Spectrum Sensing and Channel Estimation for Dynamic Spectrum Access. - Shirin Saeedi Bidokhti, Gerhard Kramer:
Capacity Bounds for a Class of Diamond Networks. - Adel Zahedi, Jan Østergaard, Søren Holdt Jensen, Patrick A. Naylor, Soren Bech:
Distributed Remote Vector Gaussian Source Coding with Covariance Distortion Constraints. - Hesham ElSawy, Ekram Hossain:
On Stochastic Geometry Modeling of Cellular Uplink Transmission with Truncated Channel Inversion Power Control. - Christian Schulz, Amin Mazloumian, Alexander M. Petersen, Orion Penner, Dirk Helbing:
Exploiting citation networks for large-scale author name disambiguation. - Hossein Soleimani, David J. Miller:
Parsimonious Topic Models with Salient Word Discovery. - Joni Salminen, Jose Teixeira:
Fools gold? Developer dilemmas in a closed mobile application market platform. - Jean Bourgain, Zeev Dvir, Ethan Leeman:
Affine extractors over large fields with exponential error. - Georg Böcherer:
Probabilistic Signal Shaping for Bit-Interleaved Coded Modulation. - Quan Zhou, Oleg V. Michailovich, Yogesh Rathi:
Spatially regularized reconstruction of fibre orientation distributions in the presence of isotropic diffusion. - Youlong Wu, Michèle A. Wigger:
Coding Schemes for Discrete Memoryless Broadcast Channels with Rate-Limited Feedback. - Abdul Basit Memon, Erik I. Verriest:
Maximally persistent connections for the periodic type. - Maria Kalimeri, Vassilios Constantoudis, Constantinos Papadimitriou, Konstantinos Karamanos, Fotis K. Diakonos, Harris Papageorgiou:
Word-length entropies and correlations of natural language written texts. - Adetunji B. Adebiyi, Chris Imafidon:
Using Neural Network to Propose Solutions to Threats in Attack Patterns. - Niki Vazou, Eric L. Seidel, Ranjit Jhala:
From Safety To Termination And Back: SMT-Based Verification For Lazy Languages. - Evgeny Latkin:
Twofold arithmetic. - Michael B. Cohen, Rasmus Kyng, Jakub W. Pachocki, Richard Peng, Anup B. Rao:
Preconditioning in Expectation. - Shaobo Lin, Xia Liu, Jian Fang, Zongben Xu:
Is Extreme Learning Machine Feasible? A Theoretical Assessment (Part II). - Yanqing Wang, Hong Ge, Xiaojing Feng, Jie Yu:
On measuring team stability in cooperative learning: An example of consecutive course projects on software engineering. - Yangjia Li, Mingsheng Ying:
(Un)decidable Problems about Reachability of Quantum Systems. - Yinfei Xu, Qiao Wang:
Vector Gaussian CEO Problem Under Sum Distortion. - Yijin Zhang, Yuan-Hsun Lo, Feng Shu, Wing Shing Wong:
Protocol Sequences for Multiple-Packet Reception. - Reevana Balmahoon, Ling Cheng:
Information Leakage of Correlated Source Coded Sequences over Wiretap Channel. - Harun Rasit Er, Nadia Erdogan:
Parallel Genetic Algorithm to Solve Traveling Salesman Problem on MapReduce Framework using Hadoop Cluster. - Hongyi Zeng, Wei Chen:
Delay-Energy lower bound on Two-Way Relay Wireless Network Coding. - Ghazal Riahi:
A Security Plan for Smart Grid Systems Based On AGC4ISR. - Badong Chen, Guangmin Wang, Nanning Zheng, José C. Príncipe:
An Extended Result on the Optimal Estimation under Minimum Error Entropy Criterion. - Florent Capelli, Arnaud Durand, Stefan Mengel:
Hypergraph Acyclicity and Propositional Model Counting. - Russell J. Bradford, Changbo Chen, James H. Davenport, Matthew England, Marc Moreno Maza, David J. Wilson:
Truth Table Invariant Cylindrical Algebraic Decomposition by Regular Chains. - Broes De Cat, Bart Bogaerts, Maurice Bruynooghe, Marc Denecker:
Predicate Logic as a Modelling Language: The IDP System. - (Withdrawn) DDoS Attack and Defense: Review of Some Traditional and Current Techniques.
- Jonathan Kochems, C.-H. Luke Ong:
Safety verification of asynchronous pushdown systems with shaped stacks. - Li Dong, Furu Wei, Shujie Liu, Ming Zhou, Ke Xu:
A Statistical Parsing Framework for Sentiment Classification. - Yang Yu, Hong Qian:
The Sampling-and-Learning Framework: A Statistical View of Evolutionary Algorithms. - Jean-Marc Kelif, Stéphane Sénécal, Constant Bridon, Marceau Coupechoux:
A Fluid Approach for Poisson Wireless Networks. - Christoph Bunte, Amos Lapidoth:
Encoding Tasks and Rényi Entropy. - Peter Burcsi, Gabriele Fici, Zsuzsanna Lipták, Frank Ruskey, Joe Sawada:
On Combinatorial Generation of Prefix Normal Words. - Rana Atif Ali Khan, Oumair Naseer:
Fuzzy Logic Based Multi User Adaptive Test System. - Karin Schnass:
Local Identification of Overcomplete Dictionaries. - Daniel Gorín, Lutz Schröder:
Subsumption Checking in Conjunctive Coalgebraic Fixpoint Logics. - Niv Dayan, Martin Kjær Svendsen, Matias Bjørling, Philippe Bonnet, Luc Bouganim:
EagleTree: Exploring the Design Space of SSD-Based Algorithms. - Nesrine Changuel, Bessem Sayadi, Michel Kieffer:
Control of Multiple Remote Servers for Quality-Fair Delivery of Multimedia Contents. - Shengli Zhang, Soung Chang Liew:
Capacity of Known Interference Channel. - Behnam Faghih, Mohammad Reza Azadehfar, S. D. Katebi:
User Interface Design for E-Learning Software. - Haipeng Zhang, Lingjun Kong, Xiuju Huang, Mengmeng Cao:
Design of a High Speed XAUI Based on Dynamic Reconfigurable Transceiver IP Core. - Yixin Liu, Haipeng Zhang, Tao Feng:
Design of an Encryption-Decryption Module Oriented for Internet Information Security SOC Design. - Jie Chen, José Carlos M. Bermudez, Cédric Richard:
Steady-state performance of non-negative least-mean-square algorithm and its variants. - Nyagudi Musandu Nyagudi:
Post-Westgate SWAT : C4ISTAR Architectural Framework for Autonomous Network Integrated Multifaceted Warfighting Solutions Version 1.0 : A Peer-Reviewed Monograph. - Francesco Caltagirone, Lenka Zdeborová:
Properties of spatial coupling in compressed sensing. - Francesco Caltagirone, Florent Krzakala, Lenka Zdeborová:
On Convergence of Approximate Message Passing. - Songjian Lu, Xinghua Lu:
An exact algorithm for the weighed mutually exclusive maximum set cover problem. - Miles E. Hansard, Radu Horaud, Michel Amat, Georgios D. Evangelidis:
Automatic Detection of Calibration Grids in Time-of-Flight Images. - Daniel Lemire, Leonid Boytsov, Nathan Kurz:
SIMD Compression and the Intersection of Sorted Integers. - Ankit Sharma, Jaideep Srivastava, Abhishek Chandra:
Predicting Multi-actor collaborations using Hypergraphs. - Christian Steinruecken:
Compressing Sets and Multisets of Sequences. - N. Denizcan Vanli, Muhammed O. Sayin, Suleyman Serdar Kozat:
Online Piecewise Linear Regression via Infinite Depth Context Trees. - Ronald Hochreiter, Christoph Waldhauser:
Zombie Politics: Evolutionary Algorithms to Counteract the Spread of Negative Opinions. - Jonathan Huang, Ashish Kapoor, Carlos Guestrin:
Riffled Independence for Efficient Inference with Partial Rankings. - Christina Sauper, Regina Barzilay:
Automatic Aggregation by Joint Modeling of Aspects and Values. - (Withdrawn) A Algorithm for the Hamilton Circuit Problem.
- Nico Görnitz, Marius Kloft, Konrad Rieck, Ulf Brefeld:
Toward Supervised Anomaly Detection. - Seyed Abolghasem Mirroshandel, Gholamreza Ghassem-Sani:
Towards Unsupervised Learning of Temporal Relations between Events. - Thomas Voice, Maria Polukarov, Nicholas R. Jennings:
Coalition Structure Generation over Graphs. - Nir Elkayam, Meir Feder:
A Universal Decoder relative to a given Family of Metrics. - Elsayed Ahmed, Ahmed M. Eltawil:
On Phase Noise Suppression in Full-Duplex Systems. - Karl-Johan Karlsson, William Bradley Glisson:
Android Anti-forensics: Modifying CyanogenMod. - Lingjie Duan, Takeshi Kubo, Kohei Sugiyama, Jianwei Huang, Teruyuki Hasegawa, Jean C. Walrand:
Motivating Smartphone Collaboration in Data Acquisition and Distributed Computing. - Dilip Bethanabhotla, Giuseppe Caire, Michael J. Neely:
Adaptive Video Streaming in MU-MIMO Networks. - Aria Ghasemian Sahebi, S. Sandeep Pradhan:
Nested Polar Codes Achieve the Shannon Rate-Distortion Function and the Shannon Capacity. - Zhixing Luo, Hu Qin, Wenbin Zhu, Andrew Lim:
Branch-and-price-and-cut for the Split-collection Vehicle Routing Problem with Time Windows and Linear Weight-related Cost. - Pokkuluri Kiran Sree, Inampudi Ramesh Babu:
Identification of Protein Coding Regions in Genomic DNA Using Unsupervised FMACA Based Pattern Classifier. - Dusko Pavlovic:
Chasing diagrams in cryptography. - Wei Jeng, Daqing He, Jiepu Jiang:
User Participation in an Academic Social Networking Service: A Survey of Open Group Users on Mendeley. - Arman Fazeli, Alexander Vardy, Eitan Yaakobi:
Generalized Sphere Packing Bound. - Qibin Zhao, Liqing Zhang, Andrzej Cichocki:
Bayesian CP Factorization of Incomplete Tensors with Automatic Rank Determination. - Parham Noorzad, Michelle Effros, Michael Langberg, Tracey Ho:
On the Power of Cooperation: Can a Little Help a Lot? (Extended Version). - Sanjay Vishwakarma, A. Chockalingam:
Transmitter Optimization in MISO Broadcast Channel with Common and Secret Messages. - Ryuhei Mori:
Holographic Transformation for Quantum Factor Graphs. - Yehia El-khatib, Gareth Tyson, Michael Welzl:
The Effect of Network and Infrastructural Variables on SPDY's Performance. - Mina Karzand, Lizhong Zheng:
Achievable Degrees of Freedom in MIMO Correlatively Changing Fading Channels. - Jiangcheng Chen, Xiaodong Zhang, Lei Zhu:
Kinematics analysis and three-dimensional simulation of the rehabilitation lower extremity exoskeleton robot. - Peng Cui:
Approximation Resistance under Imbalance and Bias. - Haris Aziz, Serge Gaspers, Nicholas Mattei, Nina Narodytska, Toby Walsh:
Strategic aspects of the probabilistic serial rule for the allocation of goods. - Emmanuel Abbe, Noga Alon, Afonso S. Bandeira:
Linear Boolean classification, coding and "the critical problem". - Kezhi Li, Shuang Cong:
A Robust Compressive Quantum State Tomography Algorithm Using ADMM. - Mike Müller, Svetlana Puzynina, Michaël Rao:
Infinite square-free self-shuffling words. - Tao Yang, Ziyang Meng, Guodong Shi, Yiguang Hong, Karl Henrik Johansson:
Synchronization for Multi-agent Systems under Directed Switching Topologies. - T. Lakshmi Narasimhan, Yalagala Naresh, Tanumay Datta, A. Chockalingam:
Pseudo-random Phase Precoded Spatial Modulation. - Vivekananda Gayen, Kamal Sarkar:
A Machine Learning Approach for the Identification of Bengali Noun-Noun Compound Multiword Expressions. - Shibamouli Lahiri, Sagnik Ray Choudhury, Cornelia Caragea:
Keyword and Keyphrase Extraction Using Centrality Measures on Collocation Networks. - Livy-Maria Real-Coelho, Christian Retoré:
Deverbal semantics and the Montagovian generative lexicon. - Hugo Gimbert, Edon Kelmendi:
Two-Player Perfect-Information Shift-Invariant Submixing Stochastic Games Are Half-Positional. - Luc Dartois, Charles Paperman:
Adding modular predicates. - Maha Alodeh, Symeon Chatzinotas, Björn E. Ottersten:
A Multicast Approach for Constructive Interference Precoding in MISO Downlink Channel. - Sadi Evren Seker, Oguz Altun, Ugur Ayan, Cihan Mert:
A Novel String Distance Function based on Most Frequent K Characters. - Alberto Ochoa-Zezzatti, Luana Hatsukimi, Hitomi Karuda, Julio Arreola, Sandra Bustillos:
Never forget, whom was my ancestors: A cross-cultural analysis from Yonsei (fourth-generation Nikkei) in four societies using Data Mining. - Baofeng Wu, Qingfang Jin, Zhuojun Liu, Dongdai Lin:
Constructing Boolean Functions With Potential Optimal Algebraic Immunity Based on Additive Decompositions of Finite Fields. - Giuseppe Lisanti, Iacopo Masi, Federico Pernici, Alberto Del Bimbo:
Continuous Localization and Mapping of a Pan Tilt Zoom Camera for Wide Area Tracking. - Lewis Tseng, Nitin H. Vaidya:
Iterative Approximate Consensus in the presence of Byzantine Link Failures. - Zwi Altman, Soumaya Sallem, Ridha Nasri, Berna Sayraç, Maurice Clerc:
Particle Swarm Optimization for Mobility Load Balancing SON in LTE Networks. - Ahmed Douik, Sameh Sorour, Mohamed-Slim Alouini, Tareq Y. Al-Naffouri:
Completion Time Reduction in Instantly Decodable Network Coding Through Decoding Delay Control. - Yuqing Zhu, Jianfeng Zhan, Chuliang Weng, Raghunath Nambiar, Jinchao Zhang, Xingzhen Chen, Lei Wang:
BigOP: Generating Comprehensive Big Data Workloads as a Benchmarking Framework. - Xiao Lu, Ping Wang, Dusit Niyato:
Payoff Allocation of Service Coalition in Wireless Mesh Network: A Cooperative Game Perspective. - Noa Avigdor-Elgrabli, Yuval Rabani:
Convergence of Tâtonnement in Fisher Markets. - Tong Wu, Gungor Polatkan, David Steel, William P. Brown, Ingrid Daubechies, A. Robert Calderbank:
Painting Analysis Using Wavelets and Probabilistic Topic Models. - Siavash Ghavami, Farshad Lahouti, Vahid Rahmati, Lars Schwabe:
Synchrony in Neuronal Communications: An Energy Efficient Scheme. - Lin Tie:
On Near-controllability, Nearly-controllable Subspaces, and Near-controllability Index of a Class of Discrete-time Bilinear Systems: A Root Locus Approach. - Péter Babarczi, János Tapolcai, Lajos Rónyai, Muriel Médard:
Resilient Flow Decomposition of Unicast Connections with Network Coding. - Filippo Bonchi, Daniela Petrisan, Damien Pous, Jurriaan Rot:
Coinduction up to in a fibrational setting. - Robert Jeansoulin, Nic Wilson:
Quality of Geographic Information: Ontological approach and Artificial Intelligence Tools. - Uriel Feige, Jonathan Hermon, Daniel Reichman:
On giant components and treewidth in the layers model. - Monowar Hasan, Ekram Hossain, Dong In Kim:
Resource Allocation Under Channel Uncertainties for Relay-Aided Device-to-Device Communication Underlaying LTE-A Cellular Networks. - Siamak Ravanbakhsh, Russell Greiner:
Perturbed Message Passing for Constraint Satisfaction Problems. - Maha Alodeh, Symeon Chatzinotas, Björn E. Ottersten:
Spatial DCT-Based Channel Estimation in Multi-Antenna Multi-Cell Interference Channels. - Andrew Arnold, Daniel S. Roche:
Multivariate sparse interpolation using randomized Kronecker substitutions. - Allan Borodin, Dai Le, Yuli Ye:
Weakly Submodular Functions. - Kundan Kandhway, Joy Kuri:
How to Run a Campaign: Optimal Control of SIS and SIR Information Epidemics. - Charith Perera, Arkady B. Zaslavsky:
Improve the Sustainability of Internet of Things Through Trading-based Value Creation. - Earlence Fernandes, Alexander Crowell, Ajit Aluri, Atul Prakash:
Anception: Application Virtualization For Android. - Junekey Jeon:
A Generalized Typicality for Abstract Alphabets. - Navid Tadayon, Sonia Aïssa:
Multi-Channel Cognitive Radio Networks: Modeling, Analysis and Synthesis. - Hyeji Kim, Abbas El Gamal:
Capacity Region of the Broadcast Channel with Two Deterministic Channel State Components. - Elad Hazan, Tomer Koren:
A Linear-Time Algorithm for Trust Region Problems. - Nadia Otmani Benmehidi, Meriem Arar, Imene Chine:
Modeling the behavior of reinforced concrete walls under fire, considering the impact of the span on firewalls. - Hassane Abouaissa, Yoann Kubera, Gildas Morvan:
Dynamic Hybrid Traffic Flow Modeling. - Ranko Lazic, Sylvain Schmitz:
Non-Elementary Complexities for Branching VASS, MELL, and Extensions. - Tobias Koch:
On the Dither-Quantized Gaussian Channel at Low SNR. - Arsenia Chorti, Katerina Papadaki, H. Vincent Poor:
Optimal Power Allocation in Block Fading Gaussian Channels with Causal CSI and Secrecy Constraints. - Dragana Bajovic, Dusan Jakovetic, Dejan Vukobratovic, Vladimir S. Crnojevic:
Slotted Aloha for Networked Base Stations. - Cristina Cano, David Malone:
On Efficiency and Validity of Previous Homeplug MAC Performance Analysis. - Dusan Jakovetic, Dragana Bajovic, Dejan Vukobratovic, Vladimir S. Crnojevic:
Slotted Aloha for Networked Base Stations with Spatial and Temporal Diversity. - Olivier Finkel, Michal Skrzypczak:
On the Topological Complexity of omega-Languages of Non-Deterministic Petri Nets. - Tomás Brázdil, Stefan Kiefer, Antonín Kucera, Petr Novotný, Joost-Pieter Katoen:
Zero-Reachability in Probabilistic Multi-Counter Automata. - Petar Popovski:
Delayed Channel State Information: Incremental Redundancy with Backtrack Retransmission. - Scott Aaronson, Russell Impagliazzo, Dana Moshkovitz:
AM with Multiple Merlins. - Christian Bauckhage:
Computing the Kullback-Leibler Divergence between two Generalized Gamma Distributions. - Shaolin Qu, Joyce Y. Chai:
Context-based Word Acquisition for Situated Dialogue in a Virtual World. - Preslav Ivanov Nakov, Hwee Tou Ng:
Improving Statistical Machine Translation for a Resource-Poor Language Using Related Resource-Rich Languages. - Riad Abdmeziem, Djamel Tandjaoui:
Internet of Things: Concept, Building blocks, Applications and Challenges. - Kifayat-Ullah Khan, Kamran Najeebullah, Waqas Nawaz, Young-Koo Lee:
OLAP on Structurally Significant Data in Graphs. - Gabriela Csurka, Julien Ah-Pine, Stéphane Clinchant:
Unsupervised Visual and Textual Information Fusion in Multimedia Retrieval - A Graph-based Point of View. - Hanlei Wang:
Adaptive Visual Tracking for Robotic Systems Without Visual Velocity Measurement. - Xi Ge, David C. Shepherd, Kostadin Damevski, Emerson R. Murphy-Hill:
How the Sando Search Tool Recommends Queries. - Matt Challacombe, Nicolas Bock:
An N-Body Solution to the Problem of Fock Exchange. - Hugo Reboredo, Francesco Renna, A. Robert Calderbank, Miguel R. D. Rodrigues:
Compressive Classification of a Mixture of Gaussians: Analysis, Designs and Geometrical Interpretation. - Fern Y. Hunt:
Optimal Spread in Network Consensus Models. - Dmitry Zinoviev, Sarah Llewelyn:
Co-Evolution of Friendship and Publishing in Online Blogging Social Networks. - Anastasios Kyrillidis, George N. Karystinos:
Fixed-rank Rayleigh Quotient Maximization by an $M$PSK Sequence. - Tangudu Bharat Kumar, Bhaskar Awadhiya, E. MeherAbhinav, Bahniman Ghosh, Bhupesh Bishnoi:
Performance Analysis of Spin Transfer Torque Random Access Memory with cross shaped free layer using Heusler Alloys by using micromagnetic studies. - Nicolas Delfosse, Jean-Pierre Tillich:
A decoding algorithm for CSS codes using the X/Z correlations. - Nicolas Kourtellis, Gianmarco De Francisci Morales, Francesco Bonchi:
Scalable Online Betweenness Centrality in Evolving Graphs. - Yajie Miao:
Kaldi+PDNN: Building DNN-based ASR Systems with Kaldi and PDNN. - Marcos Portnoi:
Criptografia com Curvas Elípticas. - Nabila Rahman, Matthew K. Wright, Donggang Liu:
Fast and energy-efficient technique for jammed region mapping in wireless sensor networks. - Aria Ghasemian Sahebi, S. Sandeep Pradhan:
Polar Codes for Multi-terminal Communications. - Marcos Portnoi, Joberto S. B. Martins:
TARVOS - an Event-Based Simulator for Performance Analysis, Supporting MPLS, RSVP-TE, and Fast Recovery. - Sariel Har-Peled, Amir Nayyeri, Mohammad R. Salavatipour, Anastasios Sidiropoulos:
How to Walk Your Dog in the Mountains with No Magic Leash. - Andrew Mastin, Patrick Jaillet, Sang Chin:
Randomized Minmax Regret for Combinatorial Optimization Under Uncertainty. - Amin Sakzad, Emanuele Viterbo, Joseph Jean Boutros, Yi Hong:
Phase Precoded Compute-and-Forward with Partial Feedback. - Dmitry Berdinsky, Tae-wan Kim, Durkbin Cho, Cesare Bracco, Sutipong Kiatpanichgij:
Bases of T-meshes and the refinement of hierarchical B-splines. - Gerardo L. Febres, Klaus Jaffe:
Quantifying literature quality using complexity criteria. - Wentao Huang, Tracey Ho, Michael Langberg, Jörg Kliewer:
Reverse Edge Cut-Set Bounds for Secure Network Coding. - Hina Tabassum, Uzma Siddique, Ekram Hossain, Md. Jahangir Hossain:
Cellular Downlink Performance with Base Station Sleeping, User Association, and Scheduling. - Reza Zolfaghari, Nicolas Epain, Craig T. Jin, Joan Alexis Glaunès, Anthony I. Tew:
Large Deformation Diffeomorphic Metric Mapping And Fast-Multipole Boundary Element Method Provide New Insights For Binaural Acoustics. - Olga Jaufman, Jürgen Münch:
Acquisition of a Project-Specific Process. - Zhengjun Cao, Lihua Liu:
A Fast String Matching Algorithm Based on Lowlight Characters in the Pattern. - Junyoung Nam:
Fundamental Limits in Correlated Fading MIMO Broadcast Channels: Benefits of Transmit Correlation Diversity. - Andrew R. Barron, Teemu Roos, Kazuho Watanabe:
Bayesian Properties of Normalized Maximum Likelihood and its Fast Computation. - Garimella Rama Murthy:
Towards a Resolution of P = NP Conjecture. - Kasper Fløe Trillingsgaard, Petar Popovski:
Block-Fading Channels with Delayed CSIT at Finite Blocklength. - Dusit Niyato, Xiao Lu, Ping Wang:
Adaptive Power Management for Wireless Base Station in Smart Grid Environment. - Xiao Lu, Ke Zhang, Chuan Heng Foh, Cheng Peng Fu:
SSthreshless Start: A Sender-Side TCP Intelligence for Long Fat Network. - Anghel Drugarin, Cornelia Victoria:
A Software Design through Electrical System for a Building. - Hwanchol Jang, Saeid Nooshabadi, Kiseon Kim, Heung-No Lee:
Complex Valued Sphere Decoding with Element-wise Selective Prescreening for General Two-dimensional Signal Constellations. - Tomaso Erseghe:
On the Evaluation of the Polyanskiy-Poor-Verdu Converse Bound for Finite Blocklength Coding in AWGN. - Joost-Pieter Katoen, Lei Song, Lijun Zhang:
Probably Safe or Live. - Orestis Georgiou, Carl P. Dettmann, Justin P. Coon:
Network Connectivity: Stochastic vs. Deterministic Wireless Channels. - Gordana Dodig-Crnkovic:
Modeling Life as Cognitive Info-Computation. - Antony W. Iorio, Hussein A. Abbass, Svetoslav Gaidow, Axel Bender:
Visualizing Cognitive Moves for Assessing Information Perception Biases in Decision Making. - Felip Riera-Palou:
Reconfigurable Structures for Direct Equalisation in Mobile Receivers. - Rui Wang, Xiaojun Yuan:
MIMO Multiway Relaying with Pairwise Data Exchange: A Degrees of Freedom Perspective. - Arkadiusz Stopczynski, Vedran Sekara, Piotr Sapiezynski, Andrea Cuttone, Jakob Eg Larsen, Sune Lehmann:
Measuring large-scale social networks with high resolution. WORKING PAPER. - Bruno Teheux:
Propositional dynamic logic for searching games with errors. - Laura Sheble, Annie T. Chen:
Contexts of diffusion: Adoption of research synthesis in Social Work and Women's Studies. - Atif Ali Khan, Oumair Naseer, Daciana Iliescu, Evor L. Hines:
Fuzzy Controller Design for Assisted Omni-Directional Treadmill Therapy. - Mohammad Kazemi, Sahar Hashemgeloogerdi:
On the Cooperative Communication over Cognitive Interference Channel. - Marwa El Hefnawy, Gerhard Kramer:
Impact of Spectrum Sharing on the Efficiency of Faster-Than-Nyquist Signaling. - William F. Bradley:
Superconcentration on a Pair of Butterflies. - Jaewon Yang, Julian J. McAuley, Jure Leskovec:
Community Detection in Networks with Node Attributes. - Ali Al-Bashabsheh, Yongyi Mao:
On Stochastic Estimation of Partition Function. - Nikhil Bansal, Janardhan Kulkarni:
Minimizing Flow-Time on Unrelated Machines. - Kosuke Sakata, Kenta Kasai, Kohichi Sakaniwa:
Spatially-Coupled Precoded Rateless Codes with Bounded Degree Achieve the Capacity of BEC under BP decoding. - Takuya Okazaki, Kenta Kasai:
Spatially-Coupled MacKay-Neal Codes with No Bit Nodes of Degree Two Achieve the Capacity of BEC. - Koji Tazoe, Kenta Kasai, Kohichi Sakaniwa:
Non-Binary LDPC Codes with Large Alphabet Size. - Lele Wang, Eren Sasoglu:
Polar coding for interference networks. - Rishab Nithyanand, Jonathan Toohill, Rob Johnson:
How Best to Handle a Dicey Situation. - Sixia Chen, Alexander Russell, Abhishek Samanta, Ravi Sundaram:
Deterministic Blind Rendezvous in Cognitive Radio Networks. - Eun Jee Lee, Emmanuel Abbe:
A Shannon Approach to Secure Multi-party Computations. - Lawrence Ong:
Linear Codes are Optimal for Index-Coding Instances with Five or Fewer Receivers. - Zhiyi Zhou, Dongning Guo, Michael L. Honig:
A Message-Passing Approach to Combating Hidden Terminals in Wireless Networks. - Jaewon Yang, Julian J. McAuley, Jure Leskovec:
Detecting Cohesive and 2-mode Communities in Directed and Undirected Networks. - Rajeev C. Nongpiur:
Improved Robust Node Position Estimation in Wireless Sensor Networks. - J. Hyam Rubinstein, Benjamin I. P. Rubinstein, Peter L. Bartlett:
Bounding Embeddings of VC Classes into Maximum Classes. - Behzad Asadi, Lawrence Ong, Sarah J. Johnson:
On Index Coding in Noisy Broadcast Channels with Receiver Message Side Information. - Jeffrey Tsang:
The parametrized probabilistic finite-state transducer probe game player fingerprint model. - Subrata Ghosh, Krishna Aswani, Surabhi Singh, Satyajit Sahu, Daisuke Fujita, Anirban Bandyopadhyay:
Design and Construction of a Brain-Like Computer: A New Class of Frequency-Fractal Computing Using Wireless Communication in a Supramolecular Organic, Inorganic System. - Can-Yi Lu, Zhouchen Lin, Shuicheng Yan:
Smoothed Low Rank and Sparse Matrix Recovery by Iteratively Reweighted Least Squares Minimization. - P. Pandiselvam, T. Marimuthu, R. Lawrance:
A Comparative Study on String Matching Algorithm of Biological Sequences. - Orit E. Raz, Micha Sharir, József Solymosi:
Polynomials vanishing on grids: The Elekes-Rónyai problem revisited. - Imre Varga, András Németh, Gergely Kocsis:
A novel method of generating tunable underlying network topologies for social simulation. - Ahmed Alkhateeb, Omar El Ayach, Geert Leus, Robert W. Heath Jr.:
Channel Estimation and Hybrid Precoding for Millimeter Wave Cellular Systems. - Naod Duga Jebessa, Henok Getachew Alemayehu:
Mobile Services and ICT4D, To the Network Economy - Bridging the Digital Divide, Ethiopia's Case. - Rahim Rahmani, Hasibur Rahman, Theo Kanter:
On Performance of Logical-Clustering Of Flow-Sensors. - Theo Kanter, Rahim Rahmani, Arif Mahmud:
Conceptual Framework for Internet of Things' Virtualization via OpenFlow in Context-aware Networks. - Yossi Gilad, Amir Herzberg, Ari Trachtenberg:
Securing Smartphones: A Micro-TCB Approach. - Pierre Flener, Justin Pearson:
Propagators and Violation Functions for Geometric and Workload Constraints Arising in Airspace Sectorisation. - Massimo Cafaro, Piergiuseppe Pellè:
Space-Efficient Non-Interactive Verification Enhancing Arbitrary Secret Sharing Schemes By Adding Cheater Detection Capabilities. - (Withdrawn) NP is contained in DTIME(n^O(log^{gamma})).
- Pawel Krawczyk:
Secure SAML validation to prevent XML signature wrapping attacks. - Arkadii G. D'yachkov, Vyacheslav V. Rykov, Christian Deppe, Vladimir S. Lebedev:
Superimposed Codes and Threshold Group Testing. - Payam Porkar Rezaeiye, Mehrnoosh Bazrafkan, Ali Akbar Movassagh, Mojtaba Sedigh Fazli, Gholam Hossein Bazyari:
Use HMM and KNN for classifying corneal data. - A. Dyachkov:
Lectures on DNA Codes. - Johannes Hofmann, Jan Treibig, Georg Hager, Gerhard Wellein:
Comparing the Performance of Different x86 SIMD Instruction Sets for a Medical Imaging Application on Modern Multi- and Manycore Chips. - Manaf Sharifzadeh, Saeid Aragy, Kaveh Bashash, Shahram Bashokian, Mehdi Gheisari:
A Comparison with two semantic sensor data storages in total data transmission. - Arkadii G. D'yachkov:
Lectures on Designing Screening Experiments. - Arkadii G. D'yachkov, Anthony J. Macula, David C. Torney, Pavel A. Vilenkin:
Two Models of Nonadaptive Group Testing for Designing Screening Experiments. - Mikhail V. Kharinov:
Information quantity in a pixel of digital image. - Reza Farrahi Moghaddam, Vahid Asghari, Fereydoun Farrahi Moghaddam, Mohamed Cheriet:
Failure-based Lifespan Performance Analysis of Network Fabric in Modular Data Centers: Toward Deployment in Canada's North. - Cédric Herzet, Charles Soussen:
Relaxed Recovery Conditions for OMP/OLS by Exploiting both Coherence and Decay. - Derek O'Callaghan, Nico Prucha, Derek Greene, Maura Conway, Joe Carthy, Pádraig Cunningham:
Online Social Media in the Syria Conflict: Encompassing the Extremes and the In-Betweens. - Cédric Herzet, Angélique Dremeau:
Bayesian Pursuit Algorithms. - Mojeeb Al-Rhman Al-Khiaty, Moataz A. Ahmed:
Automatic Reference Models Development: A Framework. - Felix Reidl, Peter Rossmanith, Fernando Sánchez Villaamil, Somnath Sikdar:
A Faster Parameterized Algorithm for Treedepth. - Mehmet Lutfi Arslan, Sadi Evren Seker:
Web Based Reputation Index of Turkish Universities. - Jie Sun, Dane Taylor, Erik M. Bollt:
Causal Network Inference by Optimal Causation Entropy. - Daniel Kulesz, Jan-Peter Ostberg:
Practical Challenges with Spreadsheet Auditing Tools. - Michael Kohlhase, Corneliu-Claudiu Prodescu, Christian Liguda:
XLSearch: A Search Engine for Spreadsheets. - Patrick O'Beirne:
Excel 2013 Spreadsheet Inquire. - Camil Demetrescu, Irene Finocchi, Giuseppe F. Italiano, Luigi Laura:
Experimental Evaluation of Algorithms for the Food-Selection Problem. - Ching-Chi Lin, Hai-Lun Tu:
Linear-Time Algorithms for the Paired-Domination Problem in Interval Graphs and Circular-Arc Graphs. - Jake P. Taylor-King, Benjamin Franz, Christian A. Yates, Radek Erban:
Mathematical Modelling of Turning Delays in Swarm Robotics. - Michael Mitzenmacher:
A New Approach to Analyzing Robin Hood Hashing. - Yonathan Aflalo, Alexander M. Bronstein, Ron Kimmel:
Graph matching: relax or not? - Aryan Mokhtari, Alejandro Ribeiro:
RES: Regularized Stochastic BFGS Algorithm. - Natalia B. Melnikova, David Jordan, Valeria V. Krzhizhanovskaya, Peter M. A. Sloot:
Slope Instability of the Earthen Levee in Boston, UK: Numerical Simulation and Sensor Data Analysis. - Benoit Baudry, Simon Allier, Martin Monperrus:
Tailored Source Code Transformations to Synthesize Computationally Diverse Program Variants. - Volkan Yazici, M. Oguz Sunay, Ali Ozer Ercan:
Controlling a Software-Defined Network via Distributed Controllers. - Haris Aziz:
Random assignment with multi-unit demands. - Benjamin A. Miller, Nadya T. Bliss, Patrick J. Wolfe, Michelle S. Beard:
A Spectral Framework for Anomalous Subgraph Detection. - Deepayan Chakrabarti, Stanislav Funiak, Jonathan Chang, Sofus A. Macskassy:
Joint Inference of Multiple Label Types in Large Networks. - Lingqiao Liu, Lei Wang, Chunhua Shen:
A Generalized Probabilistic Framework for Compact Codebook Creation. - François Le Gall:
Powers of Tensors and Fast Matrix Multiplication. - Jianing Shi, Wotao Yin, Aswin C. Sankaranarayanan, Richard G. Baraniuk:
Video Compressive Sensing for Dynamic MRI. - Hatem Abou-zeid, Hossam S. Hassanein:
Predictive Green Wireless Access: Exploiting Mobility and Application Information. - Battista Biggio, Igino Corona, Blaine Nelson, Benjamin I. P. Rubinstein, Davide Maiorca, Giorgio Fumera, Giorgio Giacinto, Fabio Roli:
Security Evaluation of Support Vector Machines in Adversarial Environments. - C. Sunil Kumar, J. Seetha, S. R. Vinotha:
Security Implications of Distributed Database Management System Models. - Anuj Tewari, Nitesh Goyal, Matthew K. Chan, Tina Yau, John F. Canny, Ulrik Schroeder:
SPRING: speech and pronunciation improvement through games, for Hispanic children. - Mevlut Bulut:
ReducedCBT and SuperCBT, Two New and Improved Complete Binary Tree Structures. - T. Balaji, M. Sumathi:
Effective Features of Remote Sensing Image Classification Using Interactive Adaptive Thresholding Method. - Ian R. Petersen, Alexander Lanzon:
Feedback Control of Negative-Imaginary Systems: Large Flexible structures with colocated actuators and sensors. - Frank Elberzhager, Stephan Kremer, Jürgen Münch, Danilo Assmann:
Focusing Testing by Using Inspection and Product Metrics. - Ahmed M. Alaa, Mahmoud H. Ismail, Hazim Tawfik:
Spectrum Sensing Via Reconfigurable Antennas: Is Cooperation of Secondary Users Indispensable? - Ted Hawkins, Andrew Lemon, Alec Gibson:
Introducing Morphit, a new type of spreadsheet technology. - Andrew M. Pitts:
An Equivalent Presentation of the Bezem-Coquand-Huber Category of Cubical Sets. - Henk Vlootman, Felienne Hermans:
A Maintainability Checklist for Spreadsheets. - Stephen Allen:
Spatial Modelling Techniques in Microsoft Excel. - Ali Mansouri, Mohamed Salim Bouhlel:
The result for the grundy number on p4 classes. - Cristina Flaut:
Codes over a subset of Octonion Integers. - George A. Ropokis, David Gesbert, Kostas Berberidis:
Optimal power control in Cognitive MIMO systems with limited feedback. - Xiangju Qin, Michael Salter-Townshend, Pádraig Cunningham:
Exploring the Relationship between Membership Turnover and Productivity in Online Communities. - Aryeh Kontorovich, Roi Weiss:
Maximum Margin Multiclass Nearest Neighbors. - Fred Morstatter, Jürgen Pfeffer, Huan Liu:
When is it Biased? Assessing the Representativeness of Twitter's Streaming API. - Marc Lelarge:
Loopy annealing belief propagation for vertex cover and matching: convergence, LP relaxation, correctness and Bethe approximation. - Stefano V. Albrecht, Subramanian Ramamoorthy:
Exploiting Causality for Efficient Monitoring in POMDPs. - Constantinos Psomas, Fragkiskos Papadopoulos:
Performance Rescaling of Complex Networks. - Anghel Drugarin, Cornelia Victoria:
Numerical application and Turbo C program using the Gauss-Jordan Method. - Erik D. Demaine, MohammadTaghi Hajiaghayi, Hamid Mahini, David L. Malec, S. Raghavan, Anshul Sawant, Morteza Zadimoghaddam:
How to Influence People with Partial Incentives. - Lili Su, Olgica Milenkovic:
Synchronizing Rankings via Interactive Communication. - Bradley Baetz, David R. Wood:
Brooks' Vertex-Colouring Theorem in Linear Time. - Asif Haque:
Transit Fare Arbitrage: Case Study of San Francisco Bay Area Rapid Transit (BART) System. - Sergei Chichin, Quoc Bao Vo, Ryszard Kowalczyk:
Truthful Market-based Trading of Cloud Resources with Reservation Price. - Kun Tu, Bruno F. Ribeiro, Hua Jiang, Xiaodong Wang, David D. Jensen, Benyuan Liu, Don Towsley:
Online Dating Recommendations: Matching Markets and Learning Preferences. - Kevin Carlberg, Ray Tuminaro, Paul T. Boggs:
Preserving Lagrangian structure in nonlinear model reduction with application to structural dynamics. - Nerio Borges, Blai Bonet:
Universal First-Order Logic is Superfluous for NL, P, NP and coNP. - Ognjen Arandjelovic:
Hallucinating optimal high-dimensional subspaces. - Ben Niu, Tanran Zhang, Xiaoyan Zhu, Hui Li, Zongqing Lu:
Priority-Aware Private Matching Schemes for Proximity-Based Mobile Social Networks. - N. Rashmi, V. Suma:
Defect Detection Efficiency A Combined Approach. - Ove Armbrust, Masafumi Katahira, Yuko Miyamoto, Jürgen Münch, Haruka Nakao, Alexis Ocampo:
Scoping Software Process Models - Initial Concepts and Experience from Defining Space Standards. - Erik Zawadzki, Asher Lipson, Kevin Leyton-Brown:
Empirically Evaluating Multiagent Learning Algorithms. - Armen S. Asratian, Raffi R. Kamalian:
Interval colorings of edges of a multigraph. - Markus Stinner, Pablo M. Olmos:
Analyzing Finite-length Protograph-based Spatially Coupled LDPC Codes. - Miles E. Hansard, Georgios D. Evangelidis, Radu Horaud:
Cross-calibration of Time-of-flight and Colour Cameras. - Suprita Das, Rajesh Duvvuru, Sonal Raj:
Novel Integrated Approach of Software Development and Design Pattern with X-CM. - Mehrtash Tafazzoli Harandi, Richard I. Hartley, Chunhua Shen, Brian C. Lovell, Conrad Sanderson:
Extrinsic Methods for Coding and Dictionary Learning on Grassmann Manifolds. - Bhagvan K. Gupta, Ankit Mundra, Nitin Rakesh:
Failure Detection and Recovery in Hierarchical Network Using FTN Approach. - Stefania Bandini, Luca Crociani, Giuseppe Vizzari:
Heterogeneous Speed Profiles in Discrete Models for Pedestrian Simulation. - Sascha Kurz:
Competitive learning of monotone Boolean functions. - Ivan Arakistain, Jose Miguel Abascal, Oriol Munne:
ICT technologies for the refurbishment of wooden structure buildings. - David Rosales:
Cooperative Product Games. - Andreas Darmann, Edith Elkind, Sascha Kurz, Jérôme Lang, Joachim Schauer, Gerhard J. Woeginger:
Group Activity Selection Problem. - Dibakar Saha, Nabanita Das:
Distributed Area Coverage by Connected Set Cover Partitioning in Wireless Sensor Networks. - Alessandro Tomasoni, Sandro Bellini, Marco Ferrari:
Thresholds of absorbing sets in Low-Density-Parity-Check codes. - Pablo Rauzy, Sylvain Guilley:
A Formal Proof of Countermeasures against Fault Injection Attacks on CRT-RSA. - Pablo Rauzy, Sylvain Guilley:
Formal Analysis of CRT-RSA Vigilant's Countermeasure Against the BellCoRe Attack: A Pledge for Formal Methods in the Field of Implementation Security. - Daniel Zaragoza:
Modeling TCP Throughput with Random Packet Drops. - Toshio Suzuki, Yoshinao Niida:
Equilibrium Points of an AND-OR Tree: under Constraints on Probability. - Michal Klos, Karol Wawrzyniak, Marcin Jakubek, Grzegorz Orynczak, Anna Kadlubowska:
The Scheme of a Novel Methodology for Zonal Division Based on Power Transfer Distribution Factors. - Sören Georg, Matthias Müller, Horst Schulte:
Wind Turbine Model and Observer in Takagi-Sugeno Model Structure. - George H. L. Fletcher, Marc Gyssens, Dirk Leinders, Dimitri Surinx, Jan Van den Bussche, Dirk Van Gucht, Stijn Vansummeren, Yuqing Wu:
Relative Expressive Power of Navigational Querying on Graphs. - Sanjay Vishwakarma, A. Chockalingam:
Decode-and-Forward Relay Beamforming with Secret and Non-Secret Messages. - Edward Hermann Haeusler:
Propositional Logics Complexity and the Sub-Formula Property. 1-16 - Amin Rasekh, Chien-An Chen, Yan Lu:
Human Activity Recognition using Smartphone. - Konrad Kulakowski:
On the Properties of the Priority Deriving Procedure in the Pairwise Comparisons Method. - Prasanth Karunakaran, Thomas Wagner, Ansgar Scherb, Wolfgang H. Gerstacker:
Sensing for Spectrum Sharing in Cognitive LTE-A Cellular Networks. - Vadim Demchik, Alexey Gulov:
Increasing precision of uniform pseudorandom number generators. - Daniel P. Hirsch, Meredith L. Patterson, Anders Sandberg, Mikael Vejdemo-Johansson:
More ties than we thought. - Chun Meng, Minghua Chen, Athina Markopoulou:
On Routing-Optimal Network for Multiple Unicasts. - Abdessamad Mouzoune, Saoudi Taibi:
Introducing E-maintenance 2.0. - Kevin M. Carter, Hamed Okhravi, James Riordan:
Quantitative Analysis of Active Cyber Defenses Based on Temporal Platform Diversity. - Claudio Gentile, Shuai Li, Giovanni Zappella:
Online Clustering of Bandits. - Reza Shoja Ghiass, Ognjen Arandjelovic, Hakim Bendada, Xavier Maldague:
Infrared face recognition: a comprehensive review of methodologies and databases. - Soheyl Gherekhloo, Chen Di, Anas Chaaban, Aydin Sezgin:
Sub-optimality of Treating Interference as Noise in the Cellular Uplink with Weak Interference. - Peter D. Turney, Saif M. Mohammad:
Experiments with Three Approaches to Recognizing Lexical Entailment. - Changtao Yu:
On dually flat general (α, β)-metrics. - Jesse Geneson:
Improved bounds on maximum sets of letters in sequences with forbidden alternations. - Rajesh Ranganath, Sean Gerrish, David M. Blei:
Black Box Variational Inference. - Ping Li, Cun-Hui Zhang, Tong Zhang:
Sparse Recovery with Very Sparse Compressed Counting. - Andrew G. Lamperski, Noah J. Cowan:
Optimal Control with Noisy Time. - Galen J. Wilkerson, Ramin Khalili, Stefan Schmid:
Urban Mobility Scaling: Lessons from 'Little Data'. - Fei Tan, Jiajing Wu, Yongxiang Xia, Chi Kong Tse:
Traffic congestion in interconnected complex networks. - Renaud Lambiotte, Vsevolod Salnikov, Martin Rosvall:
Effect of Memory on the Dynamics of Random Walks on Networks. - Iasson Karafyllis, Markos Papageorgiou:
Global Stability Results for Traffic Networks. - Carl Mummert, Alaeddine Saadaoui, Sean Sovine:
The modal logic of Reverse Mathematics. - Valérie Berthé, Jérémie Bourdon, Timo Jolivet, Anne Siegel:
A combinatorial approach to products of Pisot substitutions. - Tobias Kretz, Karsten Lehmann, Ingmar Hofsäß:
User Equilibrium Route Assignment for Microscopic Pedestrian Simulation. - Petros A. Petrosyan:
Sequential edge-coloring on the subset of vertices of almost regular graphs. - Marco Alberto Javarone:
Social Influences in the Voter Model: the Role of Conformity. - Warren R. Scott, Warren B. Powell, Somayeh Moazehi:
Least Squares Policy Iteration with Instrumental Variables vs. Direct Policy Search: Comparison Against Optimal Benchmarks Using Energy Storage. - Bryon Aragam, Qing Zhou:
Concave Penalized Estimation of Sparse Bayesian Networks. - (Withdrawn) Iterative Reweighted Singular Value Minimization Methods for $l_p$ Regularized Unconstrained Matrix Minimization.
- Jesse Alama:
Exploring Steinitz-Rademacher polyhedra: A challenge for automated reasoning tools. - Urmila Mahadev, Ronald de Wolf:
Rational approximations and quantum algorithms with postselection. - Katarzyna Sznajd-Weron, Karol Michal Suszczynski:
Nonlinear q-voter model with deadlocks on the Watts-Strogatz graph. - Mehdi Moussaïd:
Opinion Formation and the Collective Dynamics of Risk Perception. - Meghdad Ghari:
Labeled Sequent Calculus and Countermodel Construction for Justification Logics. - Francois Caron, Emily B. Fox:
Bayesian nonparametric models of sparse and exchangeable random graphs. - Franco Ferrari, Yani Zhao:
Monte Carlo Computation of the Vassiliev knot invariant of degree 2 in the integral representation. - Bartlomiej Bosek, Stefan Felsner, Kolja B. Knauer, Grzegorz Matecki:
On the Duality of Semiantichains and Unichain Coverings. - Sergio Gómez, Alberto Fernández, Clara Granell, Alex Arenas:
Structural patterns in complex systems using multidendrograms. - Azadeh Nematzadeh, Emilio Ferrara, Alessandro Flammini, Yong-Yeol Ahn:
Optimal network clustering for information diffusion. - Liang Gao, Chaoming Song, Ziyou Gao, Albert-László Barabási, James P. Bagrow, Dashun Wang:
Quantifying Information Flow During Emergencies. - Sascha Kurz, Nikolas Tautenhahn:
Classes of Complete Simple Games that are All Weighted. - Oscar García Morchon, Ronald Rietman, Igor E. Shparlinski, Ludo Tolhuizen:
Interpolation and Approximation of Polynomials in Finite Fields over a Short Interval from Noisy Values. - John Komar, Romain Hérault, Ludovic Seifert:
Key point selection and clustering of swimmer coordination through Sparse Fisher-EM. - Valery A. Ugrinovskii, Emilia Fridman:
A Round-Robin Protocol for Distributed Estimation with H∞ Consensus. - Zhitao Fan, Feng Guan, Chunlin Wu, Ming Yan:
The Continuity of Images by Transmission Imaging Revisited. - Mark Tucker, J. Mark Bull:
An efficient algorithm for the calculation of non-unit linked reserves. - Mustafa Elsheikh, Mark Giesbrecht:
Relating $p$-Adic eigenvalues and the local Smith normal form. - Jason Gejie Liu, Shuchin Aeron:
Robust Large Scale Non-negative Matrix Factorization using Proximal Point Algorithm. - Sirani M. Perera, Grigory Bonik, Vadim Olshevsky:
A Fast Algorithm for the Inversion of Quasiseparable Vandermonde-like Matrices. - Li-Xin Wang:
Dynamical Models of Stock Prices Based on Technical Trading Rules Part I: The Models. - Li-Xin Wang:
Dynamical Models of Stock Prices Based on Technical Trading Rules Part II: Analysis of the Models. - Li-Xin Wang:
Dynamical Models of Stock Prices Based on Technical Trading Rules Part III: Application to Hong Kong Stocks. - Oliver Arold, Svenja Ettl, Florian Willomitzer, Gerd Häusler:
Hand-guided 3D surface acquisition by combining simple light sectioning with real-time algorithms. - Simone Righi, Károly Takács:
Emotional Strategies as Catalysts of Cooperation in Signed Networks. - Johanna Bamberger, Anna-Lena Geßler, Peter Heitzelmann, Sara Korn, Rene Kahlmeyer, Xuehao Lu, Qihao Sang, Zhijie Wang, Guanzong Yuan, Michael Gauß, Tobias Kretz:
Crowd Research at School: Crossing Flows. - Denis Barthou, Olivier Brand-Foissac, Romain Dolbeau, Gilbert Grosdidier, Christine Eisenbeis, Michael Kruse, Olivier Pène, Konstantin Petrov, Claude Tadonki:
Automated Code Generation for Lattice Quantum Chromodynamics and beyond. - Martín Gómez Ravetti, Laura C. Carpi, Bruna Amin Gonçalves, Alejandro César Frery, Osvaldo Anibal Rosso:
Distinguishing noise from chaos: objective versus subjective criteria using Horizontal Visibility Graph. - James T. Long, Lee J. Stanley:
A Busy Beaver Problem for Infinite-Time Turing Machines. - Quentin Berthet:
Optimal Testing for Planted Satisfiability Problems. - Richard Williams, Lutz Bornmann:
Sampling Issues in Bibliometric Analysis. - Anna Gundert, May Szedlák:
Higher Dimensional Discrete Cheeger Inequalities. - Ilkka Törmä:
Quantifier Extensions of Multidimensional Sofic Shifts. - Stefan Hummelsheim:
Lasso and equivalent quadratic penalized models. - Pawel Fiedor:
Mutual Information Rate-Based Networks in Financial Markets. - Hayk M. Melikyan, Pasha Zusmanovich:
Melikyan algebra is a deformation of a Poisson algebra. - You-Qi Nie, Hong-Fei Zhang, Zhen Zhang, Jian Wang, Xiongfeng Ma, Jun Zhang, Jian-Wei Pan:
Practical and fast quantum random number generation based on photon arrival time relative to external reference. - Shiva Kintali:
Directed Width Parameters and Circumference of Digraphs. - Jianzhu Ma, Sheng Wang, Zhiyong Wang, Jinbo Xu:
MRFalign: Protein Homology Detection through Alignment of Markov Random Fields. - Marc Harper:
Entropy Rates of the Multidimensional Moran Processes and Generalizations. - Peilin Zhao, Tong Zhang:
Stochastic Optimization with Importance Sampling. - Natalia Dück, Karl-Heinz Zimmermann:
On Binomial Ideals associated to Linear Codes. - Lijun Sun, Kay W. Axhausen, Der-Horng Lee, Manuel Cebrián:
Efficient detection of contagious outbreaks in massive metropolitan encounter networks. - Oliver Knill:
A notion of graph homeomorphism. - Nuno Crokidakis, Victor H. Blanco, Celia Anteneodo:
Impact of contrarians and intransigents in a kinetic model of opinion dynamics. - Harumichi Nishimura, Tomoyuki Yamakami:
Interactive Proofs with Quantum Finite Automata. - Mahdi Pakdaman Naeini, Gregory F. Cooper, Milos Hauskrecht:
Binary Classifier Calibration: Bayesian Non-Parametric Approach. - Rajneesh Hegde, Robin Thomas:
Non-Embeddable Extensions of Embedded Minors. - Stefano Nasini, Jordi Castro, Pau Fonseca i Casas:
Bartering integer commodities with exogenous prices. - Peng Guan, Maxim Raginsky, Rebecca Willett:
Online Markov decision processes with Kullback-Leibler control cost. - Miika Hannula, Juha Kontinen:
Hierarchies in independence and inclusion logic with strict semantics. - Miika Hannula:
Hierarchies in inclusion logic with lax semantics. - Nicholas J. Horton, Benjamin S. Baumer, Hadley Wickham:
Teaching precursors to data science in introductory and second courses in statistics. - Spencer Backman:
Riemann-Roch Theory for Graph Orientations. - Mahdi Pakdaman Naeini, Gregory F. Cooper, Milos Hauskrecht:
Binary Classifier Calibration: Non-parametric approach. - Bertrand M. Roehner:
Is the month of Ramadan marked by a reduction in the number of suicides? - Rajarshi Guhaniyogi, Shaan Qamar, David B. Dunson:
Bayesian Conditional Density Filtering for Big Data. - Chris Berg, Viviane Pons, Travis Scrimshaw, Jessica Striker, Christian Stump:
FindStat - the combinatorial statistics database. - Tobias Glasmachers, Ürün Dogan:
Coordinate Descent with Online Adaptation of Coordinate Frequencies. - Lukás Vokrínek:
Decidability of the extension problem for maps into odd-dimensional spheres. - Wataru Kumagai, Masahito Hayashi:
Random Number Conversion and LOCC Conversion via Restricted Storage. - Shun Watanabe, Masahito Hayashi:
Finite-length Analysis on Tail probability and Simple Hypothesis Testing for Markov Chain. - Masahito Hayashi, Shun Watanabe:
Information Geometry Approach to Parameter Estimation in Markov Chains. - Sharmodeep Bhattacharyya, Peter J. Bickel:
Community Detection in Networks using Graph Distance. - Sevag Gharibian, Yichen Huang, Zeph Landau:
Quantum Hamiltonian Complexity. - Xiao Liang, Jichang Zhao, Ke Xu:
A universal law in human mobility. - Daniyar S. Shamkanov:
Circular Proofs for Gödel-Löb Logic. - Marcel Ausloos:
Binary Scientific Star Coauthors Core Size. - Danilo Jimenez Rezende, Shakir Mohamed, Daan Wierstra:
Stochastic Back-propagation and Variational Inference in Deep Latent Gaussian Models. - Alberto Montina, Stefan Wolf:
Lower bounds on the communication complexity of two-party (quantum) processes. - Diogo Pratas, Armando J. Pinho:
A conditional compression distance that unveils insights of the genomic evolution. - Joachim Mathiesen, Luiza Angheluta, Mogens H. Jensen:
Statistics of co-occurring keywords on Twitter. - Tom Froese, Hiroyuki Iizuka, Takashi Ikegami:
Embodied social interaction constitutes social cognition in pairs of humans: A minimalist virtual reality experiment. - Bhaskar Roy Bardhan, Raúl García-Patrón, Mark M. Wilde, Andreas J. Winter:
Strong converse for the classical capacity of all phase-insensitive bosonic Gaussian channels. - Giuseppe Toscani:
Rényi entropies and nonlinear diffusion equations. - Sascha Kurz, Jörg Rambau:
On the Hegselmann-Krause conjecture in opinion dynamics. - Fausto Bonacina, Marco D'Errico, Enrico Moretto, Silvana Stefani, Anna Torriero:
A Multiple Network Approach to Corporate Governance. - Anna C. Gilbert, Jeremy G. Hoskins, John C. Schotland:
Diffuse Scattering on Graphs. - Yakup Koç, Martijn Warnier, Piet Van Mieghem, Robert E. Kooij, Frances M. T. Brazier:
The Impact of the Topology on Cascading Failures in Electric Power Grids. - Nicolas Crouseilles, Lukas Einkemmer, Erwan Faou:
A Hamiltonian splitting for the Vlasov-Maxwell system. - Piet Van Mieghem:
Graph eigenvectors, fundamental weights and centrality metrics for nodes in networks. - Simone Righi, Károly Takács:
Parallel versus Sequential Update and the Evolution of Cooperation with the Assistance of Emotional Strategies. - Enys Mones, Péter Pollner, Tamás Vicsek:
Universal hierarchical behavior of citation networks. - Chong Wu, Shenggong Ji, Rui Zhang, Liujun Chen, Jiawei Chen, Xiaobin Li, Yanqing Hu:
Bootstrap Percolation on Complex Networks with Community Structure. - Marcelo P. Fiore, Ola Mahmoud:
Functorial Semantics of Second-Order Algebraic Theories. - Armando J. Pinho, Diogo Pratas, Paulo Jorge S. G. Ferreira:
Information profiles for DNA pattern discovery. - Elchanan Mossel, Omer Tamuz:
Opinion Exchange Dynamics. - Ji Liu, Stephen J. Wright, Srikrishna Sridhar:
An Asynchronous Parallel Randomized Kaczmarz Algorithm. - Sébastien Bubeck, Elchanan Mossel, Miklós Z. Rácz:
On the influence of the seed graph in the preferential attachment model. - Mehdi Molkaraie:
An Importance Sampling Scheme on Dual Factor Graphs. I. Models in a Strong External Field. - Merlijn Sevenster:
Linear Programming Tools for Analyzing Strategic Games of Independence-Friendly Logic and Applications. - Qing Ke, Yong-Yeol Ahn:
Tie Strength Distribution in Scientific Collaboration Networks. - Marco Tomamichel, Jesús Martínez-Mateo, Christoph Pacher, David Elkouss:
Fundamental Finite Key Limits for Information Reconciliation in Quantum Key Distribution. - Nicolas Gillis:
The Why and How of Nonnegative Matrix Factorization. - Massimiliano Zanin, Pedro A. C. Sousa, Ernestina Menasalvas Ruiz:
Information content: beyond modularity in complex networks. - Noah E. Friedkin:
Complex Objects in the Polytopes of the Linear State-Space Process. - Andrei Asinowski, Balázs Keszegh, Tillmann Miltzow:
Counting One-sided Exchange Stable Matchings. - Holger Boche, Janis Nötzel:
Positivity, Discontinuity, Finite Resources and Nonzero Error for Arbitrarily Varying Quantum Channels. - Rayan Chikhi, Antoine Limasset, Shaun Jackman, Jared T. Simpson, Paul Medvedev:
On the representation of de Bruijn graphs. - Mathieu Faverge, Julien Herrmann, Julien Langou, Bradley R. Lowery, Yves Robert, Jack J. Dongarra:
Designing LU-QR hybrid solvers for performance and stability. - Jun Yang, Fady Alajaji, Glen Takahara:
Lower Bounds on the Probability of a Finite Union of Events. - Jugalkishore K. Banoth, Pradip Sircar:
Polynomial Transformation Method for Non-Gaussian Noise Environment. - Stephen G. Odaibo:
The Gabor-Einstein Wavelet: A Model for the Receptive Fields of V1 to MT Neurons. - Takanori Inazumi, Takashi Washio, Shohei Shimizu, Joe Suzuki, Akihiro Yamamoto, Yoshinobu Kawahara:
Causal Discovery in a Binary Exclusive-or Skew Acyclic Model: BExSAM. - Luis Enrique Correa da Rocha, Naoki Masuda:
Random walk centrality for temporal networks. - Seth Pettie:
Three Generalizations of Davenport-Schinzel Sequences. - Hamidreza Tavafoghi, Demosthenis Teneketzis:
Optimal Energy Procurement from a Strategic Seller with Private Renewable and Conventional Generation. - Vedran Sekara, Sune Lehmann:
Application of network properties and signal strength to identify face-to-face links in an electronic dataset. - Badong Chen, Junli Liang, Nanning Zheng, José C. Príncipe:
Kernel Least Mean Square with Adaptive Kernel Size. - Markus Lange-Hegermann:
The Differential Dimension Polynomial for Characterizable Differential Ideals. - Cyril Voyant, Gilles Notton, Christophe Paoli, Marie-Laure Nivet, Marc Muselli, Kahina Dahmani:
Numerical weather prediction or stochastic modeling: an objective criterion of choice for the global radiation forecasting. - Martin Slawski, Matthias Hein, Pavlo Lutsik:
Matrix factorization with Binary Components. - Martino Borello, Gabriele Nebe:
On the dual distance of semi self-dual codes. - Elisabetta Alfonsetti, Pradeep Chathuranga Weeraddana, Carlo Fischione:
A Semi Distributed Approach for Min-Max Fair Car-Parking Slot Assignment Problem. - Masaaki Harada:
On the residue codes of self-dual Z4-codes with large minimum Lee weights. - Masaaki Harada:
On a 5-design related to a putative extremal doubly even self-dual code of length a multiple of 24. - Natalia Dück, Karl-Heinz Zimmermann:
Graver Bases and Universal Gröbner Bases for Linear Codes. - Maxim Mayzel, Krzysztof Kazimierczuk, Vladislav Orekhov:
Causality principle in reconstruction of sparse NMR spectra. - Klas Markström:
The general graph homomorphism polynomial: Its relationship with other graph polynomials and partition functions. - Majid Zamani, Manuel Mazo Jr., Alessandro Abate:
Symbolic Models for Networked Control Systems. - Stéphan Clémençon, Héctor de Arazoza, Fabrice Rossi, Viet-Chi Tran:
A statistical network analysis of the HIV/AIDS epidemics in Cuba. - Neil Robertson, Daniel P. Sanders, Paul D. Seymour, Robin Thomas:
Reducibility in the Four-Color Theorem. - Neil Robertson, Daniel P. Sanders, Paul D. Seymour, Robin Thomas:
Discharging cartwheels. - Jean Gillibert, Christian Retoré:
Category theory, logic and formal linguistics: some connections, old and new. - Christos Thrampoulidis, Samet Oymak, Babak Hassibi:
Simple Error Bounds for Regularized Noisy Linear Inverse Problems. - Maciej Balajewicz, Charbel Farhat:
Reduction of Nonlinear Embedded Boundary Models for Problems with Evolving Interfaces. - Sadi Evren Seker, Yavuz Unal, Z. Erdem, Hasan Erdinc Kocer:
Ensembled Correlation Between Liver Analysis Outputs. - Somphong Jitman, San Ling, Ekkasit Sangwisut:
Hermitian Self-Dual Cyclic Codes of Length $p^a$ over $GR(p^2, s)$. - Mustafa Elsheikh, Andy Novocin, Mark Giesbrecht:
Ranks of Quotients, Remainders and $p$-Adic Digits of Matrices. - Laszlo Gyongyosi:
Information Processing Structure of Quantum Gravity. - Ian D. Beatty:
Gaming the System: Video Games as a Theoretical Framework for Instructional Design. - David Mehrle, Amy Strosser, Anthony Harkin:
Walk modularity and community structure in networks. - David Conlon, Jacob Fox, William I. Gasarch, David G. Harris, Douglas Ulrich, Sam Zbarsky:
Distinct volume subsets. - Michael Hoy:
Methods for Collision-Free Navigation of Multiple Mobile Robots in Unknown Cluttered Environments. - Wojciech Wislicki, Tomasz Bednarski, Piotr Bialas, Eryk Czerwinski, Lukasz Kaplon, Andrzej Kochanowski, Grzegorz Korcyl, Jakub Kowal, Pawel Kowalski, Tomasz Kozik, Wojciech Krzemien, Marcin Molenda, Pawel Moskal, Szymon Niedzwiecki, Marek Palka, Monika Pawlik, Lech Raczynski, Zbigniew Rudy, Piotr Salabura, Neha Gupta-Sharma, Michal Silarski, Artur Slomski, Jerzy Smyrski, Adam Strzelecki, Anna Wieczorek, Marcin Zielinski, Natalia Zon:
Computing support for advanced medical data analysis and imaging. - Asim Ghosh, Nachiketa Chattopadhyay, Bikas K. Chakrabarti:
Inequality in Societies, Academic Institutions and Science Journals: Gini and k-indices. - Joon Kwon, Panayotis Mertikopoulos:
A continuous-time approach to online optimization. - Richard H. Byrd, S. L. Hansen, Jorge Nocedal, Yoram Singer:
A Stochastic Quasi-Newton Method for Large-Scale Optimization. - Dan Marsden:
Category Theory Using String Diagrams. - Haran Jackson, Michele Taroni, David Ponting:
A Two-Level Variant of Additive Schwarz Preconditioning for Use in Reservoir Simulation. - Dmitry Kolomenskiy, Jean-Christophe Nave, Kai Schneider:
Adaptive gradient-augmented level set method with multiresolution error estimation. - Brian P. Hanley:
Release of the Kraken: A Novel Money Multiplier Equation's Debut in 21st Century Banking. - Dirk Eddelbuettel, Murray Stokely, Jeroen Ooms:
RProtoBuf: Efficient Cross-Language Data Serialization in R. - Chi-Man Liu, Ruibang Luo, Tak Wah Lam:
GPU-Accelerated BWT Construction for Large Collection of Short Reads. - Geoffroy Berthelot:
The phenotypic expansion and its boundaries. - Aleksi Saarela:
Systems of word equations, polynomials and linear algebra: A new approach. - Oscar García Morchon, Ronald Rietman, Ludo Tolhuizen, Domingo Gómez, Jaime Gutierrez:
The MMO problem. - Francisco J. R. Ruiz, Isabel Valera, Carlos Blanco, Fernando Pérez-Cruz:
Bayesian nonparametric comorbidity analysis of psychiatric disorders. - Jason Gross, Adam Chlipala, David I. Spivak:
Experience Implementing a Performant Category-Theory Library in Coq. - Alexander Lanzon, Ian R. Petersen:
Stability robustness of a feedback interconnection of systems with negative imaginary frequency response. - Isabella von Sivers, Gerta Köster:
How Stride Adaptation in Pedestrian Models Improves Navigation. - Jerome Bonelle, Alexandre Ern:
Analysis of Compatible Discrete Operator Schemes for the Stokes Equations on Polyhedral Meshes. - Gaiane Panina, Dirk Siersma:
Motion planning and control of a planar polygonal linkage. - Toby Dylan Hocking, Supaporn Spanurattana, Masashi Sugiyama:
Support vector comparison machines. - Miriam Kießling, Sascha Kurz, Jörg Rambau:
An exact column-generation approach for the lot-type design problem - extended abstract. - Caterina De Bacco, Silvio Franz, David Saad, Chi Ho Yeung:
Shortest node-disjoint paths on random graphs. - Pol Colomer-de-Simon, Marián Boguñá:
Double percolation phase transition in clustered complex networks. - Attila Szolnoki, Matjaz Perc:
Evolution of extortion in structured populations. - Holger Boche, Gisbert Janßen:
Resource Cost Results for One-Way Entanglement Distillation and State Merging of Compound and Arbitrarily Varying Quantum Sources. - Gerold Jäger, Weixiong Zhang:
An Effective Algorithm for and Phase Transitions of the Directed Hamiltonian Cycle Problem. - Hideki Tsuiki, Yasuyuki Tsukamoyo:
Domain Representations Induced by Dyadic Subbases. - Giulio Cimini, Angel Sánchez:
Learning dynamics explains human behavior in Prisoner's Dilemma on networks. - Charles Radin, Kui Ren, Lorenzo Sadun:
The Asymptotics of Large Constrained Graphs.
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.