default search action
CoRR, September 2009
- Philip Olu Jegede:
Predictors Of Java Programming Self Efficacy Among Engineering Students In A Nigerian University. - Mohammad A. Mikki:
Energy Efficient Location Aided Routing Protocol for Wireless MANETs. - Rakesh Mohanty, N. S. Narayanaswamy:
Online Algorithms for Self-Organizing Sequential Search - A Survey. - Kamanashis Biswas, S. A. M. Harun:
Constraint Minimum Vertex Cover in K Partite Graph, Approximation Algorithm and Complexity Analysis. - Kamanashis Biswas, Md. Ashraful Islam:
Hardware Virtualization Support In INTEL, AMD And IBM Power Processors. - Zachary Chance, David James Love:
On Linear Processing for an AWGN Channel with Noisy Feedback. - Sébastien Briot, Anatoly Pashkevich, Damien Chablat:
On the optimal design of parallel robots taking into account their deformations and natural frequencies. - Sanjiang Li:
A Layered Graph Representation for Complex Regions. - R. Sivaraman, R. Prabakaran, S. Sujatha:
Dynamic Multimedia Content Retrieval System in Distributed Environment. - Sanjiang Li, Anthony G. Cohn:
Reasoning with Topological and Directional Spatial Information. - Xiaotong Zhang, Weiming Liu, Sanjiang Li, Mingsheng Ying:
Reasoning about Cardinal Directions between Extended Objects. - Mai Gehrke, Jacob Vosmaer:
Canonical extension and canonicity via DCPO presentations. - Robert Shour:
A theory of intelligence: networked problem solving in animal societies. - Stylianos Basagiannis, Panagiotis Katsaros, Andrew Pombortsis:
State Space Reduction with Message Inspection in Security Protocol Model Checking. - Somantika Datta, Stephen D. Howard, Douglas Cochran:
Geometry of the Welch Bounds. - Clément Dunand, Reynald Lercier:
Normal Elliptic Bases and Torus-Based Cryptography. - Vassilis Kostakos:
Is the crowd's wisdom biased? A quantitative asessment of three online communities. - Sourabh Rungta, Kshitij Verma, Neeta Tripathi, Anupam Shukla:
Enhanced Mode Selection Algorithm for H.264 encoder for Application in Low Computational power devices. - Abu Shamim Mohammad Arif, Asif Mahamud, Rashedul Islam:
An Enhanced Static Data Compression Scheme Of Bengali Short Message. - (Withdrawn) Channel Equalization in Digital Transmission.
- Tobias Harks, Max Klimm, Rolf H. Möhring:
Strong Nash Equilibria in Games with the Lexicographical Improvement Property. - Philippe Wenger, Damien Chablat:
Kinematic analysis of a class of analytic planar 3-RPR parallel manipulators. - Fionn Murtagh, Pedro Contreras, Jean-Luc Starck:
Scale-Based Gaussian Coverings: Combining Intra and Inter Mixture Models in Image Segmentation. - Chandra Chekuri, Kenneth L. Clarkson, Sariel Har-Peled:
On the Set Multi-Cover Problem in Geometric Settings. - Jie Luo, Anthony Ephremides:
A New Channel Coding Approach for Random Access with Bursty Traffic. - Boyu Li, Ender Ayanoglu:
A New Low Computational Complexity Sphere Decoding Algorithm. - Saad Ahmad Khan, Sheheryar Ali Arshad:
QoS Provisioning Using Hybrid FSO RF Based Hierarchical Model for Wireless Multimedia Sensor Networks. - Andri Mirzal, Masashi Furukawa:
A Method for Accelerating the HITS Algorithm. - Jalpa Bani, Syed Sajjad Rizvi:
Minimizing Cache Timing Attack Using Dynamic Cache Flushing (DCF) Algorithm. - G. Padmavathi, D. Shanmugapriya:
A Survey of Attacks, Security Mechanisms and Challenges in Wireless Sensor Networks. - Raheel Maqsood Hashmi, Arooj Mubashara Siddiqui, Memoona Jabeen, Khurram Saleem Alimgeer, Shahid A. Khan:
Computational Complexities and Breaches in Authentication Frameworks of Broadband Wireless Access. - José Ignacio Iglesias Curto, Uwe Helmke:
Receding horizon decoding of convolutional codes. - Md. Rabiul Islam, Md. Fayzur Rahman:
Codebook Design Method for Noise Robust Speaker Identification based on Genetic Algorithm. - Katsutoshi Yoshida, Atsushi Higeta, Shinichi Watanabe:
Effects of Mechanical Coupling on Dynamics of Balancing Tasks. - Amr Rizk, Markus Fidler:
Statistical End-to-end Performance Bounds for Networks under Long Memory FBM Cross Traffic. - Michel Verleysen, Fabrice Rossi, Damien François:
Advances in Feature Selection with Mutual Information. - Barbara Hammer, Alexander Hasenfuß, Fabrice Rossi:
Median topographic maps for biomedical data sets. - Oliver Johnson, Yaming Yu:
Monotonicity, thinning and discrete versions of the Entropy Power Inequality. - Shirin Sohrabi, Sheila A. McIlraith:
On Planning with Preferences in HTN. - Joel W. Branch, Chris Giannella, Boleslaw K. Szymanski, Ran Wolff, Hillol Kargupta:
In-Network Outlier Detection in Wireless Sensor Networks. - Ha Q. Nguyen, Lav R. Varshney, Vivek K. Goyal:
Concentric Permutation Source Codes. - Sariel Har-Peled, Micha Sharir:
Relative (p,epsilon)-Approximations in Geometry. - Shahid Hussain, Muhammad Zubair Asghar, Bashir Ahmad, Shakeel Ahmad:
A Step towards Software Corrective Maintenance Using RCM model. - Olivier Finkel, Dominique Lecomte:
Decision Problems For Turing Machines. - Antonio G. Marqués, Georgios B. Giannakis, Javier Ramos:
Optimizing Orthogonal Multiple Access based on Quantized Channel State Information. - Lei Ying, R. Srikant, Srinivas Shakkottai:
The Asymptotic Behavior of Minimum Buffer Size Requirements in Large P2P Streaming Networks. - Aihua Wu, Joey Paquet, Serguei A. Mokhov:
Object-Oriented Intensional Programming: Intensional Classes Using Java and Lucid. - Arian Maleki, David L. Donoho:
Optimally Tuned Iterative Reconstruction Algorithms for Compressed Sensing. - Joel Veness, Kee Siong Ng, Marcus Hutter, David Silver:
A Monte Carlo AIXI Approximation. - Binay K. Bhattacharya, Arijit Bishnu, Otfried Cheong, Sandip Das, Arindam Karmakar, Jack Snoeyink:
On Finding Non-dominated Points using Compact Voronoi Diagrams. - Francis R. Bach:
High-Dimensional Non-Linear Variable Selection through Hierarchical Kernel Learning. - Carlo A. Furia, Bertrand Meyer:
Inferring Loop Invariants using Postconditions. - Brendan Lucier, Allan Borodin:
Price of Anarchy for Greedy Auctions. - Eugen Staab, Martin Caminada:
Assessing the Impact of Informedness on a Consultant's Profit. - Michel X. Goemans, Nicholas J. A. Harvey, Kamal Jain, Mohit Singh:
A Randomized Rounding Algorithm for the Asymmetric Traveling Salesman Problem. - Ravi Teja Sukhavasi, Babak Hassibi:
The Kalman Like Particle Filter : Optimal Estimation With Quantized Innovations/Measurements. - Vaneet Aggarwal, Ashutosh Sabharwal:
Bits About the Channel: Multi-round Protocols for Two-way Fading Channels. - Pierrick Tranouez, Patrice Langlois, Éric Daudé:
A multiagent urban traffic simulation Part I: dealing with the ordinary. - Amir M. Ben-Amram:
The Euler Path to Static Level-Ancestors. - Michael T. Goodrich:
Randomized Shellsort: A Simple Oblivious Sorting Algorithm. - Alexei Barbosa de Aguiar, Plácido Rogério Pinheiro, Alvaro de Menezes S. Neto, Ruddy P. P. Cunha, Rebecca F. Pinheiro:
A Novel Model for Optimized GSM Network Design. - M. N. Doja, Dharmender Saini:
Electronic Authority Variation. - Gregory A. Kabatiansky, G. Oshanin:
Finding passwords by random walks: How long does it take? - Ankan Saha, S. V. N. Vishwanathan:
Efficient Approximation Algorithms for Minimum Enclosing Convex Shapes. - Edith Cohen, Michal Feldman, Amos Fiat, Haim Kaplan, Svetlana Olonetsky:
Envy-Free Makespan Approximation. - Stefan Göller, Markus Lohrey:
Branching-time model checking of one-counter processes. - Yan Zhu, Dongning Guo:
Capacity Region of Layered Erasure One-sided Interference Channels without CSIT. - Raymond Chi-Wing Wong, Ada Wai-Chee Fu, Ke Wang, Yabo Xu, Jian Pei, Philip S. Yu:
Anonymization with Worst-Case Distribution-Based Background Knowledge. - Richard V. Diamond:
User Experience, Software Interfaces, and The Unconscious. - Yi Yi Thaw, Ahmad Kamil Mahmood, P. Dhanapal Durai Dominic:
A Study on the Factors That Influence the Consumers Trust on Ecommerce Adoption. - Saurabh Kumar Garg, Chee Shin Yeo, Arun Anandasivam, Rajkumar Buyya:
Energy-Efficient Scheduling of HPC Applications in Cloud Computing Environments. - B Prabhulla Chandran Pillai:
Empowering OLAC Extension using Anusaaraka and Effective text processing using Double Byte coding. - Jean Sallantin, Antoine Seilles:
n-Opposition theory to structure debates. - Marco Aldinucci, Massimo Torquati, Massimiliano Meneghin:
FastFlow: Efficient Parallel Streaming Applications on Multi-core. - Dag Normann:
A rich hierarchy of functionals of finite types. - Oded Redlich, Doron Ezri, Dov Wulich:
SNR Estimation in Maximum Likelihood Decoded Spatial Multiplexing. - Virag Shah, Neelesh B. Mehta, Raymond Yim:
Optimal Timer Based Selection Schemes. - Jaap-Henk Hoepman, Rieks Joosten:
Practical Schemes For Privacy & Security Enhanced RFID. - Nataliya Sokolovska, Thomas Lavergne, Olivier Cappé, François Yvon:
Efficient Learning of Sparse Conditional Random Fields for Supervised Sequence Labelling. - Catalin Anghel:
Base Selection and Transmission Synchronization Algorithm in Quantum Cryptography. - Ankan Saha, Xinhua Zhang, S. V. N. Vishwanathan:
Lower Bounds for BMRM and Faster Rates for Training SVMs. - Keigo Hirakawa, Patrick J. Wolfe:
"Rewiring" Filterbanks for Local Fourier Analysis: Theory and Practice. - Hoon Huh, Haralabos C. Papadopoulos, Giuseppe Caire:
Multiuser MIMO Transmitter Optimization for Inter-Cell Interference Mitigation. - Daniel Lemire, Owen Kaser:
Reordering Columns for Smaller Indexes. - Dai Tri Man Le:
Statechart Verification with iState. - Wenguang Wang, Yongping Xu, Xin Chen, Qun Li, Weiping Wang:
High level architecture evolved modular federation object model. - Mohammed M. Kadhum, Suhaidi Hassan:
The Uniformization Process of the Fast Congestion Notification (FN). - Jean-Pierre Jung, Ibrahima Sakho:
On The Optimality Of All To All Broadcast In k ary n dimensional Tori. - Sayan Bhattacharya, Goutam Paul, Swagato Sanyal:
On Necessary and Sufficient Number of Cops in the Game of Cops and Robber in Multidimensional Grids. - Shengbao Wang:
On the Relations Between Diffie-Hellman and ID-Based Key Agreement from Pairings. - Dhananjoy Dey, Prasanna Raghaw Mishra, Indranath Sen Gupta:
HF-hash : Hash Functions Using Restricted HFE Challenge-1. - Iraj Ataollahi, Morteza Analoui:
Resource Matchmaking Algorithm using Dynamic Rough Set in Grid Environment. - V. Palanisamy, P. Annadurai:
Impact of Rushing attack on Multicast in Mobile Ad Hoc Network. - Mohsen Lashkargir, S. Amirhassan Monadjemi, Ahmad Baraani-Dastjerdi:
A Hybrid Multi Objective Particle Swarm Optimization Method to Discover Biclusters in Microarray Data. - Munendra Agrawal, Prashant Kushwah, Sunder Lal:
An Efficient and Publicly Verifiable Id-Based Multi-Signcryption Scheme. - Kunal Narayan Chaudhury:
L^p boundedness of the Hilbert transform. - Anatoly Pashkevich, Alexandr Klimchik, Damien Chablat, Philippe Wenger:
Accuracy Improvement for Stiffness Modeling of Parallel Manipulators. - Anatoly Pashkevich, Damien Chablat, Philippe Wenger:
Design optimization of parallel manipulators for high-speed precision machining applications. - Marco Aldinucci, Marco Danelutto, Peter Kilpatrick:
Autonomic management of multiple non-functional concerns in behavioural skeletons. - Jagadeesh Harshan, B. Sundar Rajan, Are Hjørungnes:
Training-Embedded, Single-Symbol ML-Decodable, Distributed STBCs for Relay Networks. - Adrian Dumitrescu, János Pach:
Minimum clique partition in unit disk graphs. - Hu Xiong, Matei Ripeanu, Zhiguang Qin:
Efficient and Spontaneous Privacy-Preserving Protocol for Secure Vehicular Communications. - Ha Q. Nguyen, Vivek K. Goyal, Lav R. Varshney:
Frame Permutation Quantization. - Guangliang Chen, Stefan Atev, Gilad Lerman:
Kernel Spectral Curvature Clustering (KSCC). - Guangliang Chen, Gilad Lerman:
Motion Segmentation by SCC on the Hopkins 155 Database. - Sudarshan Shinde:
Two channel paraunitary filter banks based on linear canonical transform. - Eleonora Guerrini, Emmanuela Orsini, Massimiliano Sala:
Computing the distance distribution of systematic non-linear codes. - Prasad Krishnan, B. Sundar Rajan:
Single-generation Network Coding for Networks with Delay. - Béla Genge, Piroska Haller:
Extending WS-Security to Implement Security Protocols for Web Services. - Attila Magyari, Béla Genge, Piroska Haller:
Certificate-based Single Sign-On Mechanism for Multi-Platform Distributed Systems. - Krishnendu Chatterjee, Laurent Doyen, Thomas A. Henzinger:
Qualitative Analysis of Partially-observable Markov Decision Processes. - Krishnendu Chatterjee, Laurent Doyen, Thomas A. Henzinger:
Probabilistic Weighted Automata. - Ching-an Hsiao:
How does certainty enter into the mind? - Nidhi Hegde, Fabien Mathieu, Diego Perino:
Size Does Matter (in P2P Live Streaming). - Nicolas Bruno:
Teaching an Old Elephant New Tricks. - William R. Marczak, David Zook, Wenchao Zhou, Molham Aref, Boon Thau Loo:
Declarative Reconfigurable Trust Management. - Xiaodan Wang, Randal C. Burns, Tanu Malik:
LifeRaft: Data-Driven, Batch Processing for the Exploration of Scientific Databases. - Ragib Hasan, Radu Sion, Marianne Winslett:
Remembrance: The Unbearable Sentience of Being Digital. - Uwe Röhm, José A. Blakeley:
Data Management for High-Throughput Genomics. - Arnab Nandi, H. V. Jagadish:
Qunits: queried units in database search. - Yi Zhang, Herodotos Herodotou, Jun Yang:
RIOT: I/O-Efficient Numerical Computing without SQL. - Willis Lang, Jignesh M. Patel:
Towards Eco-friendly Database Management Systems. - David B. Lomet, Alan D. Fekete, Gerhard Weikum, Michael J. Zwilling:
Unbundling Transaction Services in the Cloud. - Zachary G. Ives, Craig A. Knoblock, Steven Minton, Marie Jacob, Partha Pratim Talukdar, Rattapoom Tuchinda, José Luis Ambite, Maria Muslea, Cenk Gazen:
Interactive Data Integration through Smart Copy & Paste. - Benjamin Sowell, Alan J. Demers, Johannes Gehrke, Nitin Gupta, Haoyuan Li, Walker M. White:
From Declarative Languages to Declarative Processing in Computer Games. - Kenneth P. Smith, Michael Morse, Peter Mork, Maya Hao Li, Arnon Rosenthal, M. David Allen, Len Seligman, Chris Wolf:
The Role of Schema Matching in Large Enterprises. - Goetz Graefe, Harumi A. Kuno, Janet L. Wiener:
Visualizing the robustness of query execution. - Andrey Balmin, Latha S. Colby, Emiran Curtmola, Quanzhong Li, Fatma Özcan:
Search Driven Analysis of Heterogenous XML Data. - Georgia Koutrika, Benjamin Bercovitz, Robert Ikeda, Filip Kaliszan, Henry Liou, Zahra Mohammadi Zadeh, Hector Garcia-Molina:
Social Systems: Can we Do More Than Just Poke Friends? - Michael Armbrust, Armando Fox, David A. Patterson, Nick Lanham, Beth Trushkowsky, Jesse Trutna, Haruki Oh:
SCADS: Scale-Independent Storage for Social Computing Applications. - Laure Berti-Équille, Anish Das Sarma, Xin Dong, Amélie Marian, Divesh Srivastava:
Sailing the Information Ocean with Awareness of Currents: Discovery and Application of Source Dependence. - Yanlei Diao, Boduo Li, Anna Liu, Liping Peng, Charles Sutton, Thanh T. L. Tran, Michael Zink:
Capturing Data Uncertainty in High-Volume Stream Processing. - Nodira Khoussainova, Magdalena Balazinska, Wolfgang Gatterbauer, YongChul Kwon, Dan Suciu:
A Case for A Collaborative Query Management System. - Philippe Cudré-Mauroux, Eugene Wu, Samuel Madden:
The Case for RodentStore, an Adaptive, Declarative Storage System. - Luc Bouganim, Björn Þór Jónsson, Philippe Bonnet:
uFLIP: Understanding Flash IO Patterns. - Abhishek Mitra, Marcos R. Vieira, Petko Bakalov, Walid A. Najjar, Vassilis J. Tsotras:
Boosting XML Filtering with a Scalable FPGA-based Architecture. - Shel Finkelstein, Dean Jacobs, Rainer Brendle:
Principles for Inconsistency.