default search action
CoRR, July 2008
- David Eppstein:
Finding Large Clique Minors is Hard. - Marko A. Rodriguez, Johan Bollen, Herbert Van de Sompel:
Automatic Metadata Generation using Associative Networks. - Youjian Liu:
A Simple Converse Proof and a Unified Capacity Formula for Channels with Input Constraints. - Yuri Arkhipkin:
Quantitative Paradigm of Software Reliability as Content Relevance. - S. V. N. Vishwanathan, Karsten M. Borgwardt, Imre Risi Kondor, Nicol N. Schraudolph:
Graph Kernels. - Ioannis Chatzigiannakis, Paul G. Spirakis:
The Dynamics of Probabilistic Population Protocols. - Arkadiy Khandjian:
Increase of Software Safety. - Thomas Unger, Nadya Markin:
Quadratic Forms and Space-Time Block Codes from Generalized Quaternion and Biquaternion Algebras. - R. N. Krishnakumar, Naveen Naveen, P. Vijay Kumar:
Diversity Multiplexing Tradeoff of Asynchronous Cooperative Relay Networks. - Sariel Har-Peled, S. Muthukrishnan:
Range Medians. - Jing Liu, Jian-Kang Zhang, Kon Max Wong:
Full Diversity Codes for MISO Systems Equipped with Linear or ML Detectors. - Dmytro V. Lande, V. V. Zhygalo:
About the creation of a parallel bilingual corpora of web-publications. - Jirí Matousek, Martin Tancer, Uli Wagner:
Hardness of embedding simplicial complexes in Rd. - Emanuel Diamant:
Unveiling the mystery of visual information processing in human brain. - Song Yean Cho, Cédric Adjih:
Wireless Broadcast with Network Coding in Mobile Ad-Hoc Networks: DRAGONCAST. - Chính T. Hoàng:
On the complexity of finding a sun in a graph. - Daowen Qiu:
Research report: State complexity of operations on two-way quantum finite automata. - Gabriel Nivasch:
Improved bounds and new techniques for Davenport-Schinzel sequences and their generalizations. - Miklós Antal, László Balogh:
Modeling belief systems with scale-free networks. - Greg Aloupis, Jean Cardinal, Sébastien Collette, Stefan Langerman, David Orden, Pedro Ramos:
Decomposition of Multiple Coverings into More Parts. - Mark F. Flanagan:
Linear-Programming Receivers. - Henk D. L. Hollmann:
Nonstandard linear recurring sequence subgroups in finite fields and automorphisms of cyclic codes. - João P. Vilela, Luísa Lima, João Barros:
Lightweight Security for Network Coding. - Christian Tanguy:
Asymptotic Mean Time To Failure and Higher Moments for Large, Recursive Networks. - Arnaud Martin:
Belief decision support and reject for textured images characterization. - Christian Tanguy:
Exact two-terminal reliability of some directed networks. - Christos Koufogiannakis, Neal E. Young:
Flooding Overcomes Small Covering Constraints. - Pierrick Burgain, Eric Feron, John-Paul Clarke:
Collaborative Virtual Queue: Fair Management of Congested Departure Operations and Benefit Analysis. - Mark Burgin:
Algorithmic Problem Complexity. - Marina Knyazhansky, Tatjana L. Plotkin:
Knowledge bases over algebraic models. Some notes about informational equivalence. - Flavio D'Alessandro, Benedetto Intrigila, Stefano Varricchio:
The Parikh functions of sparse context-free languages are quasi-polynomials. - Bhavana Kanukurthi, Leonid Reyzin:
An Improved Robust Fuzzy Extractor. - Mustaq Ahmed, Anna Lubiw:
Shortest Paths Avoiding Forbidden Subpaths. - Salim Y. El Rouayheb, Emina Soljanin:
On Wiretap Networks II. - Saeed Akhavan-Astaneh, Saeed Gazor, Hamid Behroozi:
On the Capacity of Pairwise Collaborative Networks. - Xenofontas A. Dimitropoulos, M. Ángeles Serrano, Dmitri V. Krioukov:
On Cycles in AS Relationships. - Fionn Murtagh:
The Correspondence Analysis Platform for Uncovering Deep Structure in Data and Information. - Denis Xavier Charles, Kumar Chellapilla:
Bloomier Filters: A second look. - Vinod M. Prabhakaran, Krishnan Eswaran, Kannan Ramchandran:
Secrecy via Sources and Channels -- A Secret Key - Secret Message Rate Trade-off Region. - Alexis Darrasse:
Random XML sampling the Boltzmann way. - Damien Hardy, Isabelle Puaut:
WCET analysis of multi-level set-associative instruction caches. - Rob Arthan, Ursula Martin, Erik Arne Mathiesen, Paulo Oliva:
A General Framework for Sound and Complete Floyd-Hoare Logics. - Nitish Korula, Martin Pal:
Algorithms for Secretary Problems on Graphs and Hypergraphs. - Wei-jen Hsu, Debojyoti Dutta, Ahmed Helmy:
CSI: A Paradigm for Behavior-oriented Delivery Services in Mobile Human Networks. - Abhay T. Subramanian, Andrew Thangaraj:
A Simple Algebraic Formulation for the Scalar Linear Network Coding Problem. - Charles Shen, Henning Schulzrinne, Erich M. Nahum:
Session Initiation Protocol (SIP) Server Overload Control: Design and Evaluation. - Charles Shen, Henning Schulzrinne:
Measurement and Evaluation of ENUM Server Performance. - Krishnendu Chatterjee, Thomas A. Henzinger, Vinayak S. Prabhu:
Timed Parity Games: Complexity and Robustness. - Charles Shen, Henning Schulzrinne:
A VoIP Privacy Mechanism and its Application in VoIP Peering for Voice Service Provider Topology and Identity Hiding. - Rohit Chadha, Mahesh Viswanathan:
A Counterexample Guided Abstraction-Refinement Framework for Markov Decision Processes. - James Cheney:
Flux: FunctionaL Updates for XML (extended report). - Haim Kaplan, Natan Rubin, Micha Sharir:
Line Transversals of Convex Polyhedra in R3. - Michele Garetto, Emilio Leonardi:
Restricted Mobility Improves Delay-Throughput Trade-offs in Mobile Ad-Hoc Networks. - Rahul Jain, Pranab Sen, Jaikumar Radhakrishnan:
Optimal Direct Sum and Privacy Trade-off Results for Quantum and Classical Communication Complexity. - David Gamarnik, David A. Goldberg:
Randomized greedy algorithms for independent sets and matchings in regular graphs: Exact results and finite girth corrections. - Dominik Scheder:
Satisfiability of Almost Disjoint CNF Formulas. - Gagan Aggarwal, S. Muthukrishnan, Dávid Pál, Martin Pál:
General Auction Mechanism for Search Advertising. - Yingda Chen, Shalinee Kishore:
On the Tradeoffs of Implementing Randomized Network Coding in Multicast Networks. - Danilo Silva, Frank R. Kschischang, Ralf Kötter:
Capacity of Random Network Coding under a Probabilistic Error Model. - Vikraman Arvind, Partha Mukhopadhyay:
Quantum Query Complexity of Multilinear Identity Testing. - Maziar M. Nekovee:
Simulations of Large-scale WiFi-based Wireless Networks: Interdisciplinary Challenges and Applications. - Matteo Gagliolo, Jürgen Schmidhuber:
Algorithm Selection as a Bandit Problem with Unbounded Losses. - Navin Goyal, Luis Rademacher, Santosh S. Vempala:
Expanders via Random Spanning Trees. - Philippe Dumas:
Mean asymptotic behaviour of radix-rational sequences and dilation equations (Extended version). - Yves Bertot, Ekaterina Komendantskaya:
Inductive and Coinductive Components of Corecursive Functions in Coq. - Xiaohu Shang, Biao Chen, Gerhard Kramer, H. Vincent Poor:
On the Capacity of MIMO Interference Channels. - Vahed Qazvinian, Dragomir R. Radev:
Scientific Paper Summarization Using Citation Summary Networks. - Matthieu Latapy, Clémence Magnien, Frédéric Ouédraogo:
A Radar for the Internet. - A. V. Toporensky:
Quasi-Mandelbrot sets for perturbed complex analytic maps: visual patterns. - Milad Niqui:
Coinductive Formal Reasoning in Exact Real Arithmetic. - Anne Benoit, Henri Casanova, Veronika Rehn-Sonigo, Yves Robert:
Resource Allocation Strategies for In-Network Stream Processing. - Daniel Lemire:
Faster Sequential Search with a Two-Pass Dynamic-Time-Warping Lower Bound. - Julien Clément, Xavier Défago, Maria Gradinariu Potop-Butucaru, Stéphane Messika:
The cost of probabilistic gathering in oblivious robot networks. - Renato J. O. Figueiredo, P. Oscar Boykin, José A. B. Fortes, Tao Li, Jie-Kwon Peir, David Wolinsky, Lizy Kurian John, David R. Kaeli, David J. Lilja, Sally A. McKee, Gokhan Memik, Alain Roy, Gary S. Tyson:
Archer: A Community Distributed Computing Infrastructure for Computer Architecture Research and Education. - Kaibin Huang, Jeffrey G. Andrews, Robert W. Heath Jr., Dongning Guo, Randall A. Berry:
Spatial Interference Cancellation for Multi-Antenna Mobile Ad Hoc Networks. - Benoît Libert, Damien Vergnaud:
Efficient Accountable Authority Identity-Based Encryption under Static Complexity Assumptions. - Chandra Chekuri, Benjamin Moseley:
Online Scheduling to Minimize the Maximum Delay Factor. - Florentin Smarandache:
Extension of Inagaki General Weighted Operators and A New Fusion Rule Class of Proportional Redistribution of Intersection Masses. - Zhi-Hua Zhou, Yu-Yin Sun, Yufeng Li:
Multi-Instance Learning by Treating Instances As Non-I.I.D. Samples. - Martin Hoefer, Alexander Skopalik:
Altruism in Congestion Games. - Hamed Haddadi, Damien Fay, Almerima Jamakovic, Olaf Maennel, Andrew W. Moore, Richard Mortier, Miguel Rio, Steve Uhlig:
Beyond Node Degree: Evaluating AS Topology Models. - Vincent D. Blondel, Julien M. Hendrickx, John N. Tsitsiklis:
On Krause's consensus formation model with state-dependent connectivity. - Aikaterini Mitrokotsa, Christos Dimitrakakis, Christos Douligeris:
Intrusion Detection Using Cost-Sensitive Classification. - Mahzad Kalantari, Franck Jung, Jean-Pierre Guédon, Nicolas Paparoditis:
The Five Points Pose Problem : A New and Accurate Solution Adapted to any Geometric Configuration. - Aikaterini Mitrokotsa, Manolis Tsagkaris, Christos Douligeris:
Intrusion Detection in Mobile Ad Hoc Networks Using Classification Algorithms. - Aikaterini Mitrokotsa, Nikos Komninos, Christos Douligeris:
Towards an Effective Intrusion Response Engine Combined with Intrusion Detection in Ad Hoc Networks. - K. B. Nakshatrala, Arun Prakash, K. D. Hjelmstad:
On dual Schur domain decomposition method for linear first-order transient problems. - Robin A. Moser:
Derandomizing the Lovasz Local Lemma more effectively. - Bernd Gärtner:
Ranking Unit Squares with Few Visibilities. - David Eppstein:
Isometric Diamond Subgraphs. - Ozgur Oyman, J. Nicholas Laneman:
Multihop Diversity in Wideband OFDM Systems: The Impact of Spatial Reuse and Frequency Selectivity. - Alexandre Goldsztejn, Claude Michel, Michel Rueher:
An Efficient Algorithm for a Sharp Approximation of Universally Quantified Inequalities. - Arfan Ghani, T. Martin McGinnity, Liam P. Maguire, Jim Harkin:
Hardware/Software Co-Design for Spike Based Recognition. - Shizheng Li, Aditya Ramamoorthy:
Rate and power allocation under the pairwise distributed source coding constraint. - Huiguang Liang, Ian Tay, Ming Feng Neo, Wei Tsang Ooi, Mehul Motani:
Avatar Mobility in Networked Virtual Environments: Measurements, Analysis, and Implications. - Tamara Mchedlidze, Antonios Symvonis:
Optimal Acyclic Hamiltonian Path Completion for Outerplanar Triangulated st-Digraphs (with Application to Upward Topological Book Embeddings). - Sándor P. Fekete, Christiane Schmidt:
Polygon Exploration with Discrete Vision. - Bruno Martin:
Analyse des suites aléatoires engendrées par des automates cellulaires et applications à la cryptographie. - Alexandre Goldsztejn, Yahia Lebbah, Claude Michel, Michel Rueher:
Revisiting the upper bounding process in a safe Branch and Bound algorithm. - Hélène Collavizza, Michel Rueher, Pascal Van Hentenryck:
CPBVP: A Constraint-Programming Framework for Bounded Program Verification. - Tuvi Etzion, Natalia Silberstein:
Construction of Error-Correcting Codes for Random Network Coding. - Enis Akay, Hong Ju Park, Ender Ayanoglu:
On "Bit-Interleaved Coded Multiple Beamforming". - Marko A. Rodriguez, Vadas Gintautas, Alberto Pepe:
A Grateful Dead Analysis: The Relationship Between Concert and Listening Behavior. - Luca Sanguinetti, Michele Morelli, H. Vincent Poor:
An ESPRIT-based approach for Initial Ranging in OFDMA systems. - Jirí Matousek, Anastasios Sidiropoulos:
Inapproximability for metric embeddings into R^d. - Man-On Pun, D. Richard Brown III, H. Vincent Poor:
Opportunistic Collaborative Beamforming with One-Bit Feedback. - Ashish Goel, Kamesh Munagala:
Hybrid Keyword Search Auctions. - Rafee Ebrahim Kamouna:
Two Fuzzy Logic Programming Paradoxes. - Jérôme Lard, Frédéric Landragin, Olivier Grisvard, David Faure:
Un cadre de conception pour réunir les modèles d'interaction et l'ingénierie des interfaces. - André Hirschowitz, Michel Hirschowitz, Tom Hirschowitz:
Topological Observations on Multiplicative Additive Linear Logic. - Ketan Savla, Emilio Frazzoli:
On Endogenous Reconfiguration in Mobile Robotic Networks. - Deniz Gündüz, Elza Erkip, Andrea J. Goldsmith, H. Vincent Poor:
Transmission of Correlated Sources Over Multi-user Channels. - Jayakrishnan Unnikrishnan, Venugopal V. Veeravalli:
Algorithms for Dynamic Spectrum Access with Learning for Cognitive Radio. - Philip M. Davis:
Eigenfactor : Does the Principle of Repeated Improvement Result in Better Journal Impact Estimates than Raw Citation Counts? - Yeow Meng Chee, Gennian Ge, Alan C. H. Ling:
Group Divisible Codes and Their Application in the Construction of Optimal Constant-Composition Codes of Weight Three. - Fei Li:
Online Algorithms for Scheduling Weighted Packets with Deadlines in Bounded Buffers. - Makoto Miwa, Tadashi Wadayama, Ichi Takumi:
A Cutting Plane Method based on Redundant Rows for Improving Fractional Distance. - Raphael Hunger, Michael Joham:
An Asymptotic Analysis of the MIMO BC under Linear Filtering. - Eran Fishler, Sinan Gezici, H. Vincent Poor:
Iterative ('Turbo') Multiuser Detectors For Impulse Radio Systems. - Sinan Gezici, H. Vincent Poor:
Position Estimation via Ultra-Wideband Signals. - Bernardo Sorj:
Information Societies and Digital Divides. - Thomas D. Hewer, Maziar M. Nekovee:
Congestion Reduction Using Ad hoc Message Dissemination in Vehicular Networks. - Olivier Champalle, Bertrand T. David, René Chalon, Guillaume Masserey:
Ordinateur porté support de réalité augmentée pour des activités de maintenance et de dépannage. - Abdulkareem Adinoyi, Yijia Fan, Halim Yanikomeroglu, H. Vincent Poor:
On the Performance of Selection Relaying. - Radha Krishna Ganti, Martin Haenggi:
The Transport Capacity of a Wireless Network is a Subadditive Euclidean Functional. - Guoshen Yu, Jean-Jacques E. Slotine:
Visual Grouping by Neural Oscillators. - Eric Goubault, Sylvie Putot:
Perturbed affine arithmetic for invariant computation in numerical program analysis. - Flavio Rizzolo:
DescribeX: A Framework for Exploring and Querying XML Web Collections. - François Denis, Amaury Habrard, Rémi Gilleron, Marc Tommasi, Édouard Gilbert:
On Probability Distributions for Trees: Representations, Inference and Learning. - Garry Cleere:
Establishing and Measuring Standard Spreadsheet Practices for End-Users. - Bill Bekenn, Ray Hooper:
Reducing Spreadsheet Risk with FormulaDataSleuth. - Enoch Peserico, Luca Pretto:
The rank convergence of HITS can be slow. - Ryan Williams:
Finding paths of length k in O*(2^k) time. - Haipeng Zheng, Sanjeev R. Kulkarni, H. Vincent Poor:
Dimensionally Distributed Learning: Models and Algorithm. - Shrinivas Kudekar, Nicolas Macris:
Sharp Bounds for Optimal Decoding of Low Density Parity Check Codes. - Stefano Buzzi, H. Vincent Poor, Daniela Saturnino:
Energy-Efficient Resource Allocation in Multiuser MIMO Systems: A Game-Theoretic Framework. - Stefano Buzzi, Valeria Massaro, H. Vincent Poor:
Energy-Efficient Power Control in Multipath CDMA Channels via Large System Analysis. - Andrej Muchnik, Alexey V. Chernov, Alexander Shen:
Algorithmic randomness and splitting of supermartingales. - John C. Nash, Neil Smith, Andy Adler:
Audit and Change Analysis of Spreadsheets. - Thomas A. Grossman:
Accuracy in Spreadsheet Modelling Systems. - Thomas A. Grossman, Özgür Özlük:
Research Strategy and Scoping Survey on Spreadsheet Practices. - John F. Raffensperger:
New Guidelines For Spreadsheets. - Louise Pryor:
When, why and how to test spreadsheets. - Cícero Carvalho, Ercilio da Silva:
On algebras admitting a complete set of near weights, evaluation codes and Goppa codes. - Axel Kohnert, Sascha Kurz:
Construction of Large Constant Dimension Codes With a Prescribed Minimum Distance. - Guy Bresler, David Tse:
The two-user Gaussian interference channel: a deterministic view. - (Withdrawn) The NAO humanoid: a combination of performance and affordability.
- (Withdrawn) Exploiting Bird Locomotion Kinematics Data for Robotics Modeling.
- Bruno Martin:
Another Co*cryption Method. - Mira Gonen, Yuval Shavitt:
An O(log n)-approximation for the Set Cover Problem with Set Ownership. - Juyul Lee, Nihar Jindal:
Energy-efficient Scheduling of Delay Constrained Traffic over Fading Channels. - An-Ping Li:
Recover plaintext attack to block ciphers. - Kamakshi Sivaramakrishnan, Tsachy Weissman:
Universal Denoising of Discrete-time Continuous-Amplitude Signals. - George Christodoulou, Elias Koutsoupias, Angelina Vidali:
A characterization of 2-player mechanisms for scheduling. - Étienne Payet, Frédéric Mesnard:
A Non-Termination Criterion for Binary Constraint Logic Programs. - Arnaud Martin:
Implementing general belief function framework with a practical codification for low complexity. - (Withdrawn) Mode Switching for MIMO Communication Based on Delay and Channel Quantization.
- Shashi Kiran Chilappagari, Dung Viet Nguyen, Bane Vasic, Michael W. Marcellin:
Error Correction Capability of Column-Weight-Three LDPC Codes: Part II. - Chandra Nair:
An outer bound for 2-receiver discrete memoryless broadcast channels. - Josep Díaz, Lefteris M. Kirousis, Dieter Mitsche, Xavier Pérez-Giménez:
A new upper bound for 3-SAT. - Laura Kallmeyer, Timm Lichte, Wolfgang Maier, Yannick Parmentier, Johannes Dellert, Kilian Evang:
TuLiPA: Towards a Multi-Formalism Parsing Environment for Grammar Engineering. - Alain Bui, Devan Sohier:
How to Compute Times of Random Walks based Distributed Algorithms. - Jan A. Bergstra, Alban Ponse:
Proposition Algebra with Projective Limits. - Jean Dezert, Florentin Smarandache:
A new probabilistic transformation of belief mass assignment. - Francisco Argüello:
Multiplication in Cyclotomic Rings and its Application to Finite Fields. - Alain Aubert, Nathalie Bochard, Virginie Fresse:
An adaptive embedded architecture for real-time Particle Image Velocimetry algorithms. - Martin Klein, Michael L. Nelson:
Approximating Document Frequency with Term Count Values. - Marshall Spight, Vadim Tropashko:
Relational Lattice Axioms. - Erdal Arikan, Emre Telatar:
On the Rate of Channel Polarization. - Stefano Crespi-Reghizzi:
Formal semantics of language and the Richard-Berry paradox. - Bruno Martin, Patrick Solé:
Pseudo-random Sequences Generated by Cellular Automata. - Alessandra Di Pierro, Chris Hankin, Herbert Wiklicky:
Quantifying Timing Leaks and Cost Optimisation. - Marko A. Rodriguez:
A Distributed Process Infrastructure for a Distributed Data Structure. - Lina Mroueh, Stéphanie Rouquette-Léveil, Ghaya Rekaya-Ben Othman, Jean-Claude Belfiore:
DMT of weighted Parallel Channels: Application to Broadcast Channel. - Erdal Arikan:
Channel polarization: A method for constructing capacity-achieving codes for symmetric binary-input memoryless channels. - Frederic Le Mouel, Noha Ibrahim, Stéphane Frénot:
Interface Matching and Combining Techniques for Services Integration. - Maurizio Gabbrielli, Maria Chiara Meo, Paolo Tacchella:
Unfolding in CHR. - D. Zinoviev:
Topology and Geometry of Online Social Networks. - Andreas Noack:
Modularity clustering is force-directed layout. - Jan J. M. M. Rutten:
Rational streams coalgebraically. - Smarajit Das, B. Sundar Rajan:
Low-delay, Low-PAPR, High-rate Non-square Complex Orthogonal Designs. - Smarajit Das, B. Sundar Rajan:
Square Complex Orthogonal Designs with Low PAPR and Signaling Complexity. - Carlo A. Furia, Dino Mandrioli, Angelo Morzenti, Matteo Rossi:
Modeling Time in Computing: A Taxonomy and a Comparative Survey. - Brian K. Vogel:
Positive factor networks: A graphical framework for modeling non-negative sequential data. - Edmund Kirwan:
Encapsulation theory fundamentals. - Adrien Richard:
Positive circuits and maximal number of fixed points in discrete dynamical systems. - Kyriaki Ioannidou, Stavros D. Nikolopoulos:
Linear Coloring and Linear Graphs. - Cristina Fernández-Córdoba, Jaume Pujol, Mercè Villanueva:
Z2Z4-linear codes: rank and kernel. - (Withdrawn) Phase Diagrams of Network Traffic.
- Praveen Sivadasan, P. Sojan Lal:
Array Based Java Source Code Obfuscation Using Classes with Restructured Arrays. - Eri Prasetyo, Wahyu K. R., Bumi Prabu Prabowo:
Avoider robot design to dim the fire with dt basic mini system. - Dimitrios P. Papamichail, Georgios P. Papamichail:
Improved Algorithms for Approximate String Matching (Extended Abstract). - Daniel Sonntag:
On Introspection, Metacognitive Control and Augmented Data Mining Live Cycles. - Carlos Miravet, Luis Pascual, Eloise Krouch, Juan Manuel del Cura:
An Image-Based Sensor System for Autonomous Rendez-Vous with Uncooperative Satellites. - Osvaldo Simeone, Deniz Gündüz, H. Vincent Poor, Andrea J. Goldsmith, Shlomo Shamai:
Compound Multiple Access Channels with Partial Cooperation. - Yi-Reun Kim, Kyu-Young Whang, Min-Soo Kim, Il-Yeol Song:
A Logical Model and Data Placement Strategies for MEMS Storage Devices. - Douglas E. Carroll, Ashish Goel:
Lower Bounds for Embedding into Distributions over Excluded Minor Graph Families. - A. B. Mutiara:
Analisis Kinerja Sistem Cluster Terhadapa Aplikasi Simulasi Dinamika Molekular NAMD Memanfaatkan Pustaka CHARM++. - Tobias Kuhn:
AceWiki: A Natural and Expressive Semantic Wiki. - Christoph Koch:
A Compositional Query Algebra for Second-Order Logic and Uncertain Databases. - Tobias Kuhn:
AceWiki: Collaborative Ontology Management in Controlled Natural Language. - Subhash Khot, Assaf Naor:
Approximate kernel clustering. - Ruifeng Zhang, Jean-Marie Gorce, Katia Jaffrès-Runser:
Energy-delay bounds analysis in wireless multi-hop networks with unreliable radio links. - Sergio Miguel Tomé:
Hacia una teoria de unificacion para los comportamientos cognitivos. - Amelia Carolina Sparavigna, Roberto Marazzato:
An image processing analysis of skin textures. - Shengli Zhang, Soung Chang Liew:
Joint Design of Physical-Layer Network Coding and Channel Coding. - Tuvi Etzion, Natalia Silberstein:
Error-Correcting Codes in Projective Spaces via Rank-Metric Codes and Ferrers Diagrams. - Mabruk Gheryani, Zhiyuan Wu, Yousef R. Shayan:
Capacity and Performance of Adaptive MIMO System Based on Beam-Nulling. - Holger M. Kienle, Hausi A. Müller:
Research Challenges in Management and Compliance of Policies on the Web. - Kwankyu Lee, Michael E. O'Sullivan:
Algebraic Soft-Decision Decoding of Hermitian Codes. - Sujay Sanghavi, Devavrat Shah, Alan S. Willsky:
Message-passing for Maximum Weight Independent Set. - Atish Das Sarma, Amit Deshpande, Ravi Kannan:
Finding Dense Subgraphs in G(n,1/2). - Stefan Dirnstorfer, Andreas J. Grau:
Accelerated Option Pricing in Multiple Scenarios. - Changyong Zhang:
A Novel Mathematical Model for the Unique Shortest Path Routing Problem. - Gabriel Cardona, Mercè Llabrés, Francesc Rosselló, Gabriel Valiente:
Path lengths in tree-child time consistent hybridization networks. - Damián H. Zanette:
Music, Complexity, Information. - Massimo Brescia, Stefano Cavuoti, Giovanni D'Angelo, Raffaele D'Abrusco, Ciro Donalek, Natalia Deniskina, Omar Laurino, Giuseppe Longo:
Astrophysics in S.Co.P.E. - Tim van Erven, Peter Grünwald, Steven de Rooij:
Catching Up Faster by Switching Sooner: A Prequential Solution to the AIC-BIC Dilemma. - R. Alexander Bentley:
Random drift versus selection in academic vocabulary: an evolutionary analysis of published keywords. - Dorje C. Brody, Mark H. A. Davis, Robyn L. Friedman, Lane P. Hughston:
Informed Traders. - Maziar M. Nekovee, Yamir Moreno, Ginestra Bianconi, Matteo Marsili:
Theory of Rumour Spreading in Complex Social Networks. - Jonathan Tapson, Craig T. Jin, André van Schaik, Ralph Etienne-Cummings:
A First-Order Non-Homogeneous Markov Model for the Response of Spiking Neurons Stimulated by Small Phase-Continuous Signals. - William B. Johnson, Assaf Naor:
The Johnson-Lindenstrauss lemma almost characterizes Hilbert space, but not quite. - Fei Wei, Huazhong Yang:
Virtual Transmission Method, A New Distributed Algorithm to Solve Sparse Linear Systems. - Lluis Masanes:
Universally-composable privacy amplification from causality constraints. - Michelangelo Bucci, Alessandro De Luca, Amy Glen, Luca Q. Zamboni:
A new characteristic property of rich words. - Evaggelos Kritsikis, Jean-Christophe Toussaint, Olivier Fruchart:
Fast computation of magnetostatic fields by Non-uniform Fast Fourier Transforms. - Joseph J. Mohr, Wayne Barkhouse, Cristina Beldica, Emmanuel Bertin, Y. Dora Cai, Luiz Nicolaci da Costa, J. Anthony Darnell, Gregory E. Daues, Michael Jarvis, Michelle Gower, Huan Lin, Leandro Martelli, Eric H. Neilsen, Chow-Choong Ngeow, Ricardo Ogando, Alex Parga, Erin Sheldon, Douglas Tucker, Nikolay Kuropatkin, Chris Stoughton:
The Dark Energy Survey Data Management System. - Jeffrey L. Solka:
Text Data Mining: Theory and Methods. - Johannes Wollbold, Reinhard Guthke, Bernhard Ganter:
Constructing a Knowledge Base for Gene Regulatory Dynamics by Formal Concept Analysis Methods. - Ted Hurley, Paul McEvoy, Jakub Wenus:
Algebraic constructions of LDPC codes with no short cycles. - Reginald D. Smith:
The Dynamics of Internet Traffic: Self-Similarity, Self-Organization, and Complex Phenomena. - Jeremy G. Sumner, Michael A. Charleston:
Phylogenetic estimation with partial likelihood tensors. - Pascal O. Vontobel:
Stabilizer Quantum Codes: A Unified View based on Forney-style Factor Graphs. - David L. Donoho, Jared Tanner:
Counting the Faces of Randomly-Projected Hypercubes and Orthants, with Applications. - Mark M. Wilde, Todd A. Brun:
Quantum Convolutional Coding with Shared Entanglement: General Structure. - Dae San Kim:
Codes Associated with Special Linear Groups and Power Moments of Multi-dimensional Kloosterman Sums. - Florent Cousseau, Kazushi Mimura, Toshiaki Omori, Masato Okada:
Statistical mechanics of lossy compression for non-monotonic multilayer perceptrons. - James F. Dynes, Zhiliang Yuan, Andrew W. Sharpe, Andrew J. Shields:
A High Speed, Post-Processing Free, Quantum Random Number Generator. - Ido Kanter, Ori Shental, Hadar Efraim, Nadav Yacov:
Carnot in the Information Age: Discrete Symmetric Channels. - Michael Krivelevich, Benny Sudakov, Dan Vilenchik:
On the random satisfiable process. - Paul M. Kominers, Scott Duke Kominers:
Candy-passing Games on General Graphs, I. - Yago Ascasibar:
FiEstAS sampling -- a Monte Carlo algorithm for multidimensional numerical integration. - Yonina C. Eldar, Moshe Mishali:
Robust Recovery of Signals From a Union of Subspaces. - Paul M. Kominers, Scott Duke Kominers:
Candy-passing Games on General Graphs, II. - Dae San Kim:
Codes Associated with O+(2n,2r) and Power Moments of Kloosterman Sums. - Nicola Perra, Vinko Zlatic, Alessandro Chessa, Claudio Conti, Debora Donato, Guido Caldarelli:
Schroedinger-like PageRank equation and localization in the WWW. - Giuseppina Guatteri:
Stochastic Maximum Principle for a PDEs with noise and control on the boundary. - A. J. Shaiju, Ian R. Petersen, Matthew R. James:
Guaranteed Cost LQG Control of Uncertain Linear Quantum Stochastic Systems. - Jason D. McEwen:
Fast, exact (but unstable) spin spherical harmonic transforms. - Paul B. Slater:
Discernment of Hubs and Clusters in Socioeconomic Networks. - Patrick M. Hayden, Andreas J. Winter:
Counterexamples to the maximal p-norm multiplicativity conjecture for all p > 1.
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.