default search action
CoRR, May 2009
- Xiaoying Gan, Da Shan, Yuan Zhou, Wei Zhang, Liang Qian:
Theoretical Analysis of Cyclic Frequency Domain Noise and Feature Detection for Cognitive Radio Systems. - Onur Ozan Koyluoglu, Hesham El Gamal:
On the Secrecy Rate Region for the Interference Channel. - Thorsten Hehn, Johannes B. Huber, Olgica Milenkovic, Stefan Laendner:
Multiple-Bases Belief-Propagation Decoding of High-Density Cyclic Codes. - Gilles Champenois:
Fuzzy Mnesors. - Victor W. Marek, Jeffrey B. Remmel:
An Application of Proof-Theory in answer Set Programming. - Paul M. Aoki, R. J. Honicky, Alan M. Mainwaring, Chris Myers, Eric Paulos, Sushmita Subramanian, Allison Woodruff:
A Vehicle for Research: Using Street Sweepers to Explore the Landscape of Environmental Community Action. - Rowena Luk, Matei Zaharia, Melissa R. Ho, Brian Levine, Paul M. Aoki:
ICTD for Healthcare in Ghana: Two Parallel Case Studies. - (Withdrawn) Robust Principal Component Analysis: Exact Recovery of Corrupted Low-Rank Matrices.
- Erik Aurell, René Pfitzner:
Gaussian Belief with dynamic data and in dynamic network. - David Eppstein, Kevin A. Wortman:
Optimal Embedding Into Star Metrics. - Lahatra Rakotondrainibe, Yvan Kokar, Gheorghe Zaharia, Ghaïs El Zein:
Millimeter-Wave System for High Data Rate Indoor Communications. - Lahatra Rakotondrainibe, Isabelle Siaud, Yvan Kokar, Gheorghe Zaharia, François Brunet, Eric Tanguy, Ghaïs El Zein:
A low Complexity Wireless Gigabit Ethernet IFoF 60 GHz H/W Platform and Issues. - Lahatra Rakotondrainibe, Yvan Kokar, Gheorghe Zaharia, Ghaïs El Zein:
60 GHz High Data Rate Wireless Communication System. - Wojciech Mazurczyk, Milosz Smolarczyk, Krzysztof Szczypiorski:
Hiding Information in Retransmissions. - Jatin Thukral, Helmut Bölcskei:
Interference Alignment with Limited Feedback. - Adnan Raja, Pramod Viswanath:
Diversity-Multiplexing tradeoff of the Two-User Interference Channel. - Nirmal B. Chakrabarti:
A representation of non-uniformly sampled deterministic and random signals and their reconstruction using sample values and derivatives. - N. Prasanth Anthapadmanabhan, Alexander Barg:
Two-Level Fingerprinting Codes. - Willie K. Harrison, Steven W. McLaughlin:
Tandem Coding and Cryptography on Wiretap Channels: EXIT Chart Analysis. - Haim Kaplan, Yahav Nussbaum:
Maximum Flow in Directed Planar Graphs with Vertex Capacities. - Anton Zinoviev:
Extended Bulgarian keyboard layouts. - Teng Li, Oliver M. Collins:
Design and Analysis of Successive Decoding with Finite Levels for the Markov Channel. - Diomidis S. Michalopoulos, Athanasios S. Lioumpas, George K. Karagiannidis, Robert Schober:
Selective Cooperative Relaying over Time-Varying Channels. - Serge Gaspers, Matthias Mnich:
On Feedback Vertex Sets in Tournaments. - Mohamed Ibrahim Abouelhoda, Hisham Mohamed:
WinBioinfTools: Bioinformatics Tools for Windows High Performance Computing Server 2008. - Michael Elberfeld:
Perfect Phylogeny Haplotyping is Complete for Logspace. - Clemens Novak, Peter Fertl, Gerald Matz:
Quantization for Soft-Output Demodulators in Bit-Interleaved Coded Modulation Systems. - Giuseppe Durisi, Veniamin I. Morgenshtern, Helmut Bölcskei:
On the Sensitivity of Noncoherent Capacity to the Channel Model. - Ivan Tyukin, Danil V. Prokhorov:
Feasibility of random basis function approximators for modeling and control. - Cemal Akçaba, Helmut Bölcskei:
Diversity-Multiplexing Tradeoff in Fading Interference Channels. - Ignacio Vega-Paez, Jose Angel Ortega, Georgina G. Pulido:
REC language is a live on IBM1130 simulator, EL lenguaje REC esta vivo en el simulador de la IBM 1130. - Gerardo Cisneros:
A FORTRAN coded regular expression Compiler for IBM 1130 Computing System. - Hongkun Yang, Bin Liu:
Optimization of Energy Efficient Transmission in Underwater Sensor Networks. - Yoann Dieudonné, Franck Petit:
Self-stabilizing Determinsitic Gathering. - Xavier Broquère, Daniel Sidobre, Ignacio Herrera-Aguilar:
Soft Motion Trajectory Planner for Service Manipulator Robot. - Kunihiko Sadakane, Gonzalo Navarro:
Fully-Functional Static and Dynamic Succinct Trees. - Jan Treibig, Georg Hager:
Introducing a Performance Model for Bandwidth-Limited Loop Kernels. - Weiguo Zhang, Guozhen Xiao:
Constructions of Almost Optimal Resilient Boolean Functions on Large Even Number of Variables. - Nihar Jindal, Angel E. Lozano, Thomas L. Marzetta:
What is the Value of Joint Processing of Pilots and Data in Block-Fading Channels? - Sylvain Boussier, Michel Vasquez, Yannick Vimont, Saïd Hanafi, Philippe Michelon:
Solving the 0-1 Multidimensional Knapsack Problem with Resolution Search. - Andreas Malcher, Giovanni Pighizzini:
Descriptional complexity of bounded context-free languages. - Matt Gibson, Kasturi R. Varadarajan:
Decomposing Coverings and the Planar Sensor Cover Problem. - Bogdan Nicolae, Gabriel Antoniu, Luc Bougé:
BlobSeer: How to Enable Efficient Versioning for Large Object Storage under Heavy Access Concurrency. - Florian Boudin, Patricia Velázquez-Morales, Juan-Manuel Torres-Moreno:
Statistical Automatic Summarization in Organic Chemistry. - Pedro Pablo Pérez Velasco:
Matrix Graph Grammars as a Model of Computation. - Dominik Seethaler, Joakim Jaldén, Christoph Studer, Helmut Bölcskei:
Tail Behavior of Sphere-Decoding Complexity in Random Lattices. - Serguei A. Mokhov, Stephen Sinclair, Ian Clément, Dimitrios Nicolacopoulos:
The Modular Audio Recognition Framework (MARF) and its Applications: Scientific and Software Engineering Notes. - Giovanni Pighizzini:
Deterministic pushdown automata and unary languages. - Giovanni Pighizzini:
Nondeterministic one-tape off-line Turing machines and their time complexity. - Rahul Jain, Sarvagya Upadhyay, John Watrous:
Two-message quantum interactive proofs are in PSPACE. - Nestor D. Chatzidiamantis, George K. Karagiannidis:
On the Distribution of the Sum of Gamma-Gamma Variates and Applications in RF and Optical Wireless Communications. - Michael T. Goodrich, Roberto Tamassia, Jasminka Hasic:
An Efficient Dynamic and Distributed RSA Accumulator. - Stere Preda, Nora Cuppens-Boulahia, Frédéric Cuppens, Joaquín García-Alfaro, Laurent Toutain:
Reliable Process for Security Policy Deployment. - Yen-Wei Huang, Pierre Moulin:
Saddle-point Solution of the Fingerprinting Capacity Game Under the Marking Assumption. - Vit Niennattrakul, Chotirat (Ann) Ratanamahatana:
Making Hand Geometry Verification System More Accurate Using Time Series Representation with R-K Band Learning. - Pedro Coronel, Markus E. Gärtner, Helmut Bölcskei:
Selective-Fading Multiple-Access MIMO Channels: Diversity-Multiplexing Tradeoff and Dominant Outage Event Regions. - Sergei O. Kuznetsov, Dmitry I. Ignatov:
Concept Stability for Constructing Taxonomies of Web-site Users. - Feifei Gao, Rui Zhang, Ying-Chang Liang, Xiaodong Wang:
Design of Learning Based MIMO Cognitive Radio Systems. - Hessam Mahdavifar, Paul H. Siegel, Alexander Vardy, Jack K. Wolf, Eitan Yaakobi:
A Nearly Optimal Construction of Flash Codes. - Sang Won Choi, Sae-Young Chung:
On the Separability of Parallel Gaussian Interference Channels. - Sang-Woon Jeon, Sae-Young Chung:
Sum capacity of multi-source linear finite-field relay networks with fading. - Zhisu Zhu, Anthony Man-Cho So, Yinyu Ye:
Fast and Near-Optimal Matrix Completion via Randomized Basis Pursuit. - György Elekes, Haim Kaplan, Micha Sharir:
On Lines, Joints, and Incidences in Three Dimensions. - Dominik Scheder:
Unsatisfiable Linear CNF Formulas Are Large, and Difficult to Construct Explicitely. - Marko A. Rodriguez, David W. Allen, Joshua Shinavier, Gary Ebersole:
A Recommender System to Support the Scholarly Communication Process. - Nabil Hathout:
Acquisition of morphological families and derivational series from a machine readable dictionary. - Jurek Czyzowicz, Stefan Dobrev, Leszek Gasieniec, David Ilcinkas, Jesper Jansson, Ralf Klasing, Yannis Lignos, Russell A. Martin, Kunihiko Sadakane, Wing-Kin Sung:
More efficient periodic traversal in anonymous undirected graphs. - Fang Wu, Dennis M. Wilkinson, Bernardo A. Huberman:
Feedback loops of attention in peer production. - Fahad Saeed, Ashfaq A. Khokhar:
A Domain Decomposition Strategy for Alignment of Multiple Biological Sequences on Multiprocessor Platforms. - Tiangao Gou, Syed Ali Jafar:
Capacity of a Class of Symmetric SIMO Gaussian Interference Channels within O(1). - Chao-Yang Pang, Chong-Bao Wang, Ben-Qiong Hu:
Experiment Study of Entropy Convergence of Ant Colony Optimization. - Raymond Chi-Wing Wong, Ada Wai-Chee Fu, Ke Wang, Yabo Xu, Philip S. Yu:
Can the Utility of Anonymized Data be used for Privacy Breaches? - Pabitra Pal Choudhury, Sudhakar Sahoo, Sarif Sk. Hassan, Satrajit Basu, Dibyendu Ghosh, Debarun Kar, Abhishek Ghosh, Avijit Ghosh, Amal K. Ghosh:
Classification of Cellular Automata Rules Based on Their Properties. - Salah A. Aly, Ahmed E. Kamal:
Encoding of Network Protection Codes Against Link and Node Failures Over Finite Fields. - Tiziana Calamoneri:
The L(2, 1)-Labeling Problem on Oriented Regular Grids. - Alain Cournier, Swan Dubois, Vincent Villain:
Une CNS pour l'acheminement de messages instantanément stabilisant. - Velleda Baldoni, Nicole Berline, Michèle Vergne:
Summing a polynomial function over integral points of a polygon. User's guide. - Paul Cuff, Han-I Su, Abbas El Gamal:
Cascade multiterminal source coding. - Michael T. Goodrich, Daniel S. Hirschberg:
Improved Adaptive Group Testing Algorithms with Applications to Multiple Access Channels and Dead Sensor Diagnosis. - Rony El Haddad, Brian Smith, Sriram Vishwanath:
On Models of Multi-user Gaussian Channels with Fading. - Halyun Jeong, Young-Han Kim:
Sparse Linear Representation. - Nicolas Bourgeois, Bruno Escoffier, Vangelis Th. Paschos:
Fast algorithms for min independent dominating set. - Elchanan Mossel, Christos H. Papadimitriou, Michael Schapira, Yaron Singer:
VC v. VCG: Inapproximability of Combinatorial Auctions via Generalizations of the VC Dimension. - Yi-Dong Shen, Danny De Schreye, Dean Voets:
Termination Prediction for General Logic Programs. - Weng-Long Chang, Ting-Ting Ren, Mang Feng, Jun Luo, Kawuu Weicheng Lin, Minyi Guo, Lai Chin Lu:
Quantum Algorithms of Bio-molecular Solutions for the Clique Problem on a Quantum Computer. - Rahul Vaze, Robert W. Heath Jr.:
End-to-End Joint Antenna Selection Strategy and Distributed Compress and Forward Strategy for Relay Channels. - Ilya Volnyansky:
Curse of Dimensionality in the Application of Pivot-based Indexes to the Similarity Search Problem. - Emiliano De Cristofaro, Xuhua Ding, Gene Tsudik:
Privacy-Preserving Querying in Sensor Networks. - Shweta Agrawal, Sriram Vishwanath:
On the Secrecy Rate of Interference Networks using structured codes. - Andreas Enge, Pierrick Gaudry, Emmanuel Thomé:
An $L (1/3)$ Discrete Logarithm Algorithm for Low Degree Curves. - Krishnendu Chatterjee, Laurent Doyen, Thomas A. Henzinger:
Expressiveness and Closure Properties for Quantitative Languages. - Yong Cao, Debprakash Patnaik, Sean P. Ponce, Jeremy S. Archuleta, Patrick Butler, Wu-chun Feng, Naren Ramakrishnan:
Towards Chip-on-Chip Neuroscience: Fast Mining of Frequent Episodes Using Graphics Processors. - Debprakash Patnaik, Sean P. Ponce, Yong Cao, Naren Ramakrishnan:
Accelerator-Oriented Algorithm Transformation for Temporal Data Mining. - (Withdrawn) Outlining an elegant solver for 3-SAT.
- Michael T. Goodrich, Michael J. Nelson, Jonathan Z. Sun:
The Rainbow Skip Graph: A Fault-Tolerant Constant-Degree P2P Relay Structure. - Jichang Zhao, Ke Xu:
Enhancing the robustness of scale-free networks. - Bo Xiao, Lian-dong Liu, Xiao-chen Guo, Ke Xu:
Modeling the IPv6 Internet AS-level Topology. - Shizheng Li, Aditya Ramamoorthy:
Protection against link errors and failures using network coding in overlay networks. - Joseph O'Rourke:
Some Properties of Yao Y4 Subgraphs. - Jan A. Bergstra, Cornelis A. Middelburg:
A protocol for instruction stream processing. - Lélia Blin, Maria Gradinariu Potop-Butucaru, Stephane Rovedakis, Sébastien Tixeuil:
A New Self-Stabilizing Minimum Spanning Tree Construction with Loop-free Property. - Hongyu Zhang, Hee Beng Kuan Tan, Michele Marchesi:
The Distribution of Program Sizes and Its Implications: An Eclipse Case Study. - Ramachandran Rajesh, Vinod Sharma:
On Optimal Distributed Joint Source-Channel Coding for Correlated Gaussian Sources over Gaussian Channels. - Juan-Manuel Torres-Moreno, Laurent Bougrain, Frédéric Alexandre:
Combining Supervised and Unsupervised Learning for GIS Classification. - Zhe Chen, Gilles Motet:
Modeling System Safety Requirements Using Input/Output Constraint Meta-Automata. - Zhe Chen, Gilles Motet:
Formalizing Safety Requirements Using Controlling Automata. - Zhe Chen, Gilles Motet:
A Language-theoretic View on Guidelines and Consistency Rules of UML. - S. Charles Brubaker, Santosh S. Vempala:
Random Tensors and Planted Cliques. - Joel Ratsaby:
Combinatorial information distance. - Achaleshwar Sahai, Vaneet Aggarwal, Melda Yuksel, Ashutosh Sabharwal:
On Channel Output Feedback in Deterministic Interference Channels. - Meng Zeng, Rui Zhang, Shuguang Cui:
Outage Capacity and Optimal Transmission for Dying Channels. - Leonidas Akritidis, Dimitrios Katsaros, Panayiotis Bozanis:
Identifying Influential Bloggers: Time Does Matter. - Vahid Pourahmadi, Alireza Bayesteh, Amir K. Khandani:
Multilevel Coding over Two-Hop Single-User Networks. - Kfir Gedalyahu, Yonina C. Eldar:
Low Rate Sampling Schemes for Time Delay Estimation. - Christoph Benzmüller, Lawrence C. Paulson:
Quantified Multimodal Logics in Simple Type Theory. - Aydin Sezgin, Syed Ali Jafar, Hamid Jafarkhani:
The Diversity Multiplexing Tradeoff for Interference Networks. - Serguei A. Mokhov:
The Role of Self-Forensics in Vehicle Crash Investigations and Event Reconstruction. - Serguei A. Mokhov:
On Design and Implementation of the Distributed Modular Audio Recognition Framework: Requirements and Specification Design Document. - Chunhua Shen, Junae Kim, Hanzi Wang:
Generalized Kernel-based Visual Tracking. - Keki M. Burjorjee:
On the Workings of Genetic Algorithms: The Genoclique Fixing Hypothesis. - Grey Ballard, James Demmel, Olga Holtz, Oded Schwartz:
Minimizing Communication in Linear Algebra. - Daniel Sonntag, Roman R. Zapatrin:
Macrodynamics of users' behavior in Information Retrieval. - Angelo Di Iorio, Fabio Vitali, Davide Rossi, Stefano Zacchiroli:
Where are your Manners? Sharing Best Community Practices in the Web 2.0. - Delia Kesner:
A Theory of Explicit Substitutions with Safe and Full Composition. - Alain Cournier, Swan Dubois, Vincent Villain:
Two snap-stabilizing point-to-point communication protocols in message-switched networks. - Jie Gao, Dengpan Zhou:
The Emergence of Sparse Spanners and Greedy Well-Separated Pair Decomposition. - Andriy Myronenko, Xubo B. Song:
Point-Set Registration: Coherent Point Drift. - Xiaolin Shi, Belle L. Tseng, Lada A. Adamic:
Information Diffusion in Computer Science Citation Networks. - Felipe A. Cruz, Matthew G. Knepley, Lorena A. Barba:
PetFMM--A dynamically load-balancing parallel fast multipole library. - Xiang He, Aylin Yener:
Secure Degrees of Freedom for Gaussian Channels with Interference: Structured Codes Outperform Gaussian Signaling. - Narayana P. Santhanam, Martin J. Wainwright:
Information-theoretic limits of selecting binary graphical models in high dimensions. - Xiang He, Aylin Yener:
The Gaussian Many-to-One Interference Channel with Confidential Messages. - Xiang He, Aylin Yener:
K-user Interference Channels: Achievable Secrecy Rate and Degrees of Freedom. - Xiang He, Aylin Yener:
Providing Secrecy with Lattice Codes. - Soumya Banerjee:
An Immune System Inspired Approach to Automated Program Verification. - Kamel Aouiche, Daniel Lemire, Robert Godin:
Web 2.0 OLAP: From Data Cubes to Tag Clouds. - Walid Saad, Zhu Han, Mérouane Debbah, Are Hjørungnes, Tamer Basar:
Coalitional Games for Distributed Collaborative Spectrum Sensing in Cognitive Radio Networks.