


default search action
CoRR, October 2009
- Mikolás Janota, João Marques-Silva, Radu Grigore:

Algorithms for finding dispensable variables. - Bruno Grenet:

Acceptable Complexity Measures of Theorems. - Patrick Briest, Sanjeev Khanna:

Improved Hardness of Approximation for Stackelberg Shortest-Path Pricing. - Andrea Campagna, Rasmus Pagh:

Finding Associations and Computing Similarity via Biased Pair Sampling. - Richard G. Clegg, Raul Landa, Miguel Rio:

Criticisms of modelling packet traffic using long-range dependence. - Omar Said, S. Bahgat, M. Ghoniemy, Y. Elawdy:

Analysis, Design and Simulation of a New System for Internet Multimedia Transmission Guarantee. - Ivan Voras, Mario Zagar:

Web-enabling Cache Daemon for Complex Data. - Renuka A., K. C. Shet:

Hierarchical Approach for Key Management in Mobile Ad hoc Networks. - Venkatesh Saligrama, Manqi Zhao:

Compressed Blind De-convolution. - Deeparnab Chakrabarty, Jochen Könemann, David Pritchard:

Hypergraphic LP Relaxations for Steiner Trees. - Randall Dougherty, Christopher F. Freiling, Kenneth Zeger:

Linear rank inequalities on five or more variables. - George B. Purdy, Justin W. Smith:

On Finding Ordinary or Monochromatic Intersection Points. - P. Ganeshkumar, K. Thyagarajah:

An Analysis of Energy Consumption on ACK plus Rate Packet in Rate Based Transport Protocol. - Abbas Karimi, Faraneh Zarafshan, Adznan Bin Jantan, Abdul Rahman Ramli, M. Iqbal Saripan:

A New Fuzzy Approach for Dynamic Load Balancing Algorithm. - Jialing Liu, Nicola Elia:

Convergence of Fundamental Limitations in Feedback Communication, Estimation, and Feedback Control over Gaussian Channels. - Claudia Marinica, Fabrice Guillet, Henri Briand:

Post-Processing of Discovered Association Rules Using Ontologies. - Daniel Cederman, Philippas Tsigas:

Supporting Lock-Free Composition of Concurrent Data Objects. - Benjamin Steinberg:

The averaging trick and the Cerny conjecture. - Emmanuel J. Candès, Yaniv Plan:

Accurate low-rank matrix recovery from a small number of linear measurements. - Parinya Chalermsook, Bundit Laekhanukit, Danupon Nanongkai:

Stackelberg Pricing is Hard to Approximate within 2-ε. - Kamiar Rahnama Rad:

Sharp Sufficient Conditions on Exact Sparsity Pattern Recovery. - Andreas Björklund:

Exact Covers via Determinants. - Antonio Bucchiarone, Davide Di Ruscio, Henry Muccini, Patrizio Pelliccione:

From Requirements to code: an Architecture-centric Approach for producing Quality Systems. - José A. Soto:

Improved Analysis of a Max Cut Algorithm Based on Spectral Partitioning. - Imran S. Haque, Vijay S. Pande:

Hard Data on Soft Errors: A Large-Scale Assessment of Real-World Error Rates in GPGPU. - Ye Du:

Ranking via Arrow-Debreu Equilibrium. - Victor Gluzberg:

A Note On Higher Order Grammar. - Om Prasad Patri, Amit Kumar Mishra:

Pre-processing in AI based Prediction of QSARs. - Michel X. Goemans:

Combining Approximation Algorithms for the Prize-Collecting TSP. - Syed Ali Jafar:

Exploiting Channel Correlations - Simple Interference Alignment Schemes with no CSIT. - Michael Lampis:

Algorithmic Meta-Theorems for Graphs of Bounded Vertex Cover. - Sham M. Kakade, Shai Shalev-Shwartz, Ambuj Tewari:

Applications of strong convexity--strong smoothness duality to learning with matrices. - Alexandru Costan, Corina Stratan, Eliana-Dina Tirsa, Mugurel Ionut Andreica, Valentin Cristea:

Towards a Grid Platform for Scientific Workflows Management. - Gerard Briscoe, Suzanne Sadedin:

Digital Business Ecosystems: Natural Science Paradigms. - (Withdrawn) Capacity Region of a State Dependent Degraded Broadcast Channel with Noncausal Transmitter CSI.

- Benjamin Recht:

A Simpler Approach to Matrix Completion. - Himanshu Tyagi, Prakash Narayan:

The Gelfand-Pinsker Channel: Strong Converse and Upper Bound for the Reliability Function. - Fei Wei, Huazhong Yang:

From devil to angel, transmission lines boost parallel computing of linear resistor networks. - Yuan (Alan) Qi, Ahmed H. Abdel-Gawad, Thomas P. Minka:

Variable sigma Gaussian processes: An expectation propagation perspective. - Gerard Briscoe, Philippe De Wilde:

Computing of Applied Digital Ecosystems. - Laurent Poinsot, Gérard Henry Edmond Duchamp, Silvia Goodenough, Karol A. Penson:

Statistics on Graphs, Exponential Formula and Combinatorial Physics. - Dmytro V. Lande, A. A. Snarskii:

Self-similarity properties in a queuing network model. - Ciprian Mihai Dobre, Florin Pop, Alexandru Costan, Mugurel Ionut Andreica, Valentin Cristea:

Robust Failure Detection Architecture for Large Scale Distributed Systems. - Manar Mohaisen, KyungHi Chang:

Co-Channel Interference Cancellation in OFDM Networks using Coordinated Symbol Repetition and Soft Decision MLE CCI Canceler. - Erika De Francesco, Salvatore Iiritano, Antonino Spagnolo, Marco Iannelli:

A methodology for semi-automatic classification schema building. - Andrew Gacek:

A Framework for Specifying, Prototyping, and Reasoning about Computational Systems. - Adrien Richard:

Local negative circuits and fixed points in Boolean networks. - Glencora Borradaile, Brent Heeringa, Gordon T. Wilfong:

Approximation Algorithms for Constrained Knapsack Problems. - D. Shanmugapriya, G. Padmavathi:

A Survey of Biometric keystroke Dynamics: Approaches, Security and Challenges. - Md. Ashraful Islam, Riaz Uddin Mondal, Md. Zahid Hasan:

Performance Evaluation of Wimax Physical Layer under Adaptive Modulation Techniques and Communication Channels. - Adhistya Erna Permanasari, Dayang Rohaya Awang Rambli, P. Dhanapal Durai Dominic:

Prediction of Zoonosis Incidence in Human using Seasonal Auto Regressive Integrated Moving Average (SARIMA). - Anissa Lamani, Maria Potop-Butucaru, Sébastien Tixeuil:

Optimal deterministic ring exploration with oblivious asynchronous robots. - Harsh Beohar, Pieter J. L. Cuijpers, Jos C. M. Baeten:

Design of asynchronous supervisors. - Arpita Ghosh, Randolph Preston McAfee, Kishore Papineni, Sergei Vassilvitskii:

Bidding for Representative Allocations for Display Advertising. - Guanfeng Liang, Nitin H. Vaidya:

When Watchdog Meets Coding. - Sagar Shah, Yao Yu, Athina P. Petropulu:

Step-Frequency Radar with Compressive Sampling (SFR-CS). - Jamshid Abouei, Konstantinos N. Plataniotis, Subbarayan Pasupathy:

Green Modulation in Proactive Wireless Sensor Networks. - Yi Cao, Biao Chen:

Interference Channels with One Cognitive Transmitter. - Sajid M. Siddiqi, Byron Boots, Geoffrey J. Gordon:

Reduced-Rank Hidden Markov Models. - Tom Leinster:

A maximum entropy theorem with applications to the measurement of biodiversity. - Esteban Arcaute, Sergei Vassilvitskii:

Social Networks and Stable Matchings in the Job Market. - Soummya Kar

, Bruno Sinopoli, José M. F. Moura:
A Random Dynamical Systems Approach to Filtering in Large-scale Networks. - Raghunandan H. Keshavan, Andrea Montanari, Sewoong Oh:

Low-rank Matrix Completion with Noisy Observations: a Quantitative Comparison. - Jiri Barnat, Lubos Brim, Ivana Cerná, Sven Drazan, Jana Fabriková, Jan Láník, David Safránek

, Hongwu Ma:
BioDiVinE: A Framework for Parallel Analysis of Biological Models. 31-45 - Tomás Skopal, Jakub Lokoc:

On Metric Skyline Processing by PM-tree. - Ernie Cohen:

Pessimistic Testing. - Pierrick Tranouez

, Antoine Dutot:
Building upon Fast Multipole Methods to Detect and Model Organizations. - Tristan Crolard, Emmanuel Polonowski:

A Formally Specified Type System and Operational Semantics for Higher-Order Procedural Variables. - Éric Daudé

, Pierrick Tranouez
, Patrice Langlois:
A multiagent urban traffic simulation. Part II: dealing with the extraordinary. - Ernie Cohen:

Weak Kleene Algebra is Sound and (Possibly) Complete for Simulation. - Nicolas Catusse, Victor Chepoi

, Yann Vaxès:
Embedding into the rectilinear plane in optimal O*(n^2). - Alexandros G. Dimakis, Pascal O. Vontobel:

LP Decoding meets LP Decoding: A Connection between Channel Coding and Compressed Sensing. - Arvind Yedla, Henry D. Pfister, Krishna R. Narayanan:

Can Iterative Decoding for Erasure Correlated Sources be Universal? - Jun Li, Marwan Hadri Azmi, Robert A. Malaney, Jinhong Yuan:

Design of network-coding based multi-edge type LDPC codes for multi-source relaying systems. - Rahul Urgaonkar, Michael J. Neely:

Delay-Limited Cooperative Communication with Reliability Constraints in Wireless Networks. - Mark Braverman, Elchanan Mossel:

Sorting from Noisy Information. - Bogdan Aman

, Gabriel Ciobanu
:
Mutual Mobile Membranes with Timers. 1-15 - Pham Quang Dung, Yves Deville, Pascal Van Hentenryck:

A Local Search Modeling for Constrained Optimum Paths Problems (Extended Abstract). 5-11 - Farshid Hassani Bijarbooneh, Pierre Flener, Justin Pearson:

Dynamic Demand-Capacity Balancing for Air Traffic Management Using Constraint-Based Local Search: First Results. 27-40 - David Pereira, Inês Lynce, Steven D. Prestwich:

On Improving Local Search for Unsatisfiability. 41-53 - Gilles Audemard, Jean-Marie Lagniez, Bertrand Mazure, Lakhdar Sais:

Integrating Conflict Driven Clause Learning to Local Search. 55-68 - Fang He, Rong Qu:

A Constraint-directed Local Search Approach to Nurse Rostering Problems. 69-80 - Marie Pelleau, Pascal Van Hentenryck, Charlotte Truchet:

Sonet Network Design Problems. 81-95 - Salvador Abreu

, Daniel Diaz
, Philippe Codognet:
Parallel local search for solving Constraint Problems on the Cell Broadband Engine (Preliminary Results). 97-111 - Jun He, Pierre Flener

, Justin Pearson:
Toward an automaton Constraint for Local Search. 13-25 - Olivier Finkel:

The Complexity of Infinite Computations In Models of Set Theory. - Taoufik Bdiri, Fabien Moutarde, Nicolas Bourdis, Bruno Steux:

Adaboost with "Keypoint Presence Features" for Real-Time Vehicle Visual Detection. - Bogdan Stanciulescu, Amaury Breheret, Fabien Moutarde:

Introducing New AdaBoost Features for Real-Time Vehicle Detection. - Taoufik Bdiri, Fabien Moutarde, Bruno Steux:

Visual object categorization with new keypoint-based adaBoost features. - Fabien Moutarde, Alexandre Bargeton, Anne Herbin, Lowik Chanussot:

Modular Traffic Sign Recognition applied to on-vehicle real-time visual detection of American and European speed limit signs. - Mehdi Torbatian, Mohamed Oussama Damen:

On the Outage Behavior of Asynchronous OFDM DF and AF Cooperative Networks. - Wei Mao, Babak Hassibi:

Violating the Ingleton Inequality with Finite Groups. - Tobias Jacobs:

Resistant Algorithms: Obtaining Simpler Proofs by Excluding Corner Cases. - Wei-Mei Chen, Hsien-Kuei Hwang, Tsung-Hsi Tsai:

Simple, efficient maxima-finding algorithms for multidimensional samples. - Ping Li:

On the Sample Complexity of Compressed Counting. - Yves Deville, Christine Solnon:

Proceedings 6th International Workshop on Local Search Techniques in Constraint Satisfaction, LSCS 2009, Lisbon, Portugal, 20 September 2009. EPTCS 5, 2009 [contents] - Luca Bortolussi

, Alberto Policriti
:
Hybrid Semantics of Stochastic Programs with Dynamic Reconfiguration. 63-76 - Yeow-Khiang Chia, Abbas El Gamal:

3-Receiver Broadcast Channels with Common and Confidential Messages. - Laurence Loewe, Stuart L. Moodie, Jane Hillston:

Quantifying the implicit process flow abstraction in SBGN-PD diagrams with Bio-PEPA. 93-107 - Heike Siebert:

Dynamical and Structural Modularity of Discrete Regulatory Networks. 109-124 - Sarif Sk. Hassan, Pabitra Pal Choudhury, Amita Pal, R. L. Brahmachary, Arunava Goswami:

Smelling Lilly of the Valley: Nature inspired or A Mathematical construct? - Maurice J. Jansen, Jayalal Sarma:

Balancing Bounded Treewidth Circuits. - Albena Tchamova, Jean Dezert, Florentin Smarandache

:
Tracking object's type changes with fuzzy based fusion rule. - Maurice J. Jansen:

Weakening Assumptions for Deterministic Subexponential Time Non-Singular Matrix Completion. - Morten Hansen, Babak Hassibi, Alexandros G. Dimakis, Weiyu Xu:

Near-Optimal Detection in MIMO Systems using Gibbs Sampling. - P. Jayarekha, T. R. Gopalakrishnan Nair:

Prefetching of VoD Programs Based On ART1 Requesting Clustering. - M. Dakshayini, T. R. Gopalakrishnan Nair:

Prefix based Chaining Scheme for Streaming Popular Videos using Proxy servers in VoD. - Annapurna P. Patil, Narmada Sambaturu

, Krittaya Chunhaviriyakul:
Convergence Time Evaluation of Algorithms in MANETs. - Alain Lecomte, Myriam Quatrini:

Ludics and its Applications to natural Language Semantics. - Apostolos Syropoulos:

Some Thoughts on Hypercomputation. - Ping Li:

Estimating Entropy of Data Streams Using Compressed Counting. - Xiang He, Aylin Yener:

Cooperation with an Untrusted Relay: A Secrecy Perspective. - Thomas Ang, Jeffrey O. Shallit:

Length of the Shortest Word in the Intersection of Regular Languages. - Yi Cao, Biao Chen:

Capacity Bounds for Two-Hop Interference Networks. - Manas K. Patra, Samuel L. Braunstein:

An algebraic framework for information theory: Classical Information. - Aaron D. Jaggard, Michael Schapira, Rebecca N. Wright:

Towards a Unified Approach to (In)Decision: Routing, Games, Circuits, Consensus, and Beyond. - Ralph-Johan Back, Ion Petre

, Erik P. de Vink:
Proceedings Second International Workshop on Computational Models for Cell Processes, COMPMOD 2009, Eindhoven, the Netherlands, November 3, 2009. EPTCS 6, 2009 [contents] - Wei Lu, Namrata Vaswani:

Modified Basis Pursuit Denoising(MODIFIED-BPDN) for Noisy Compressive Sensing with Partially Known Support. - Goochul Chung, Sriram Vishwanath, Chan-Soo Hwang:

On the Fundamental Limits of Interweaved Cognitive Radios. - Hee-Kap Ahn, Sang Won Bae, Erik D. Demaine, Martin L. Demaine, Sang-Sub Kim, Matias Korman, Iris Reinbacher, Wanbin Son:

Covering Points by Disjoint Boxes with Outliers. - Dingyin Xia, Fei Wu, Xuqing Zhang, Yueting Zhuang:

Local and global approaches of affinity propagation clustering for large scale data. - Zuleita Ka Ming Ho, David Gesbert:

Balancing Egoism and Altruism on MIMO Interference Channel. - J. Christian Attiogbé

:
Tool-Assisted Multi-Facet Analysis of Formal Specifications (Using Alelier-B and ProB). - Dominik Janzing, Bastian Steudel:

Justifying additive-noise-model based causal discovery via algorithmic information theory. - Federico Calzolari:

High availability using virtualization. - Laurent Tapie

, Kwamiwi Mawussi:
Decomposition of forging die for high speed machining. - Laurent Tapie, Kwamiwi Mawussi, Bernard Anselmetti:

Circular tests for HSM machine tools: Bore machining application. - Laurent Tapie

, Kwamiwi Mawussi, Bernard Anselmetti:
Machining strategy choice: performance VIEWER. - Laurent Tapie

, Kwamiwi Mawussi, Bernard Anselmetti:
Decomposition of forging dies for machining planning. - Kwamiwi Mawussi, Laurent Tapie

:
Définition d'une pièce test pour la caractérisation d'une machine UGV. - Eric Goubault, Sylvie Putot:

A zonotopic framework for functional abstractions. - Jaeweon Kim, Jeffrey G. Andrews:

Spectrum Sensing with Spectral Covariance for Cognitive Radio. - Cyril Furtlehner, Michèle Sebag, Xiangliang Zhang:

Scaling Analysis of Affinity Propagation. - Elaine M. Eschen, Chính T. Hoàng, Jeremy P. Spinrad, R. Sritharan:

Finding a sun in building-free graphs. - Manoj Kumar Singh:

Password Based a Generalize Robust Security System Design Using Neural Network. - Pascal Fallavollita:

3D/2D Registration of Mapping Catheter Images for Arrhythmia Interventional Assistance. - Mandhapati P. Raju:

Parallel Computation of Finite Element Navier-Stokes codes using MUMPS Solver. - Sanjay Silakari, Mahesh Motwani, Manish Maheshwari:

Color Image Clustering using Block Truncation Algorithm. - Mohammad Ali Jabraeil Jamali, Ahmad Khademzadeh:

DAMQ-Based Schemes for Efficiently Using the Buffer Spaces of a NoC Router. - Ahmad Shukri Mohd Noor, Md. Yazid Bin Mohd. Saman:

Distributed Object Medical Imaging Model. - Alexander A. Sherstov:

The intersection of two halfspaces has high threshold degree. - Ender Ayanoglu, Erik G. Larsson, Eleftherios Karipidis:

Computational Complexity of Decoding Orthogonal Space-Time Block Codes. - Yee Ming Chen, Bo-Yuan Wang:

Towards Participatory Design of Multi-agent Approach to Transport Demands. - Vishal Goyal, Gurpreet Singh Lehal:

Evaluation of Hindi to Punjabi Machine Translation System. - (Withdrawn) Management Of Volatile Information In Incremental Web Crawler.

- Mustafa Cenk Gursoy:

MIMO Wireless Communications under Statistical Queueing Constraints. - David Gross:

Recovering low-rank matrices from few coefficients in any basis. - J. Christian Attiogbé

:
Can Component/Service-Based Systems Be Proved Correct? - Valentin Savin:

Binary Linear-Time Erasure Decoding for Non-Binary LDPC codes. - David Bremner, Dan Chen:

A Branch and Cut Algorithm for the Halfspace Depth Problem. - David Harvey:

Faster algorithms for the square root and reciprocal of power series. - Patricio Galeas, Ralph Kretschmer, Bernd Freisleben:

Information Retrieval via Truncated Hilbert-Space Expansions. - A. Robert Calderbank, Stephen D. Howard, Sina Jafarpour:

Construction of a Large Class of Deterministic Sensing Matrices that Satisfy a Statistical Isometry Property. - Sahand Haji Ali Ahmad, Mingyan Liu:

Multi-channel Opportunistic Access: A Case of Restless Bandits with Multiple Plays. - Ajinkya Kale, Shaunak Vaidya, Ashish Joglekar:

A Generalized Recursive Algorithm for Binary Multiplication based on Vedic Mathematics. - Rajkumar Buyya, Suraj Pandey, Christian Vecchiola:

Cloudbus Toolkit for Market-Oriented Cloud Computing. - Christian Vecchiola, Suraj Pandey, Rajkumar Buyya:

High-Performance Cloud Computing: A View of Scientific Applications. - Manuel Holtgrewe, Peter Sanders, Christian Schulz:

Engineering a Scalable High Quality Graph Partitioner. - Fan Zhang, Henry D. Pfister:

Modulation Codes for Flash Memory Based on Load-Balancing Theory. - Shengli Zhang, Soung Chang Liew, Lu Lu, Hui Wang:

Interference with Symbol-misalignment. - Jeff Cheeger, Bruce Kleiner, Assaf Naor:

A $(\log n)^{\Omega(1)}$ integrality gap for the Sparsest Cut SDP. - Shahram Jamali, Morteza Analoui:

Congestion Control in the Internet by Employing a Ratio dependent Plant Herbivore Carnivorous Model. - Roya Asadi, Norwati Mustapha, Md Nasir Sulaiman:

A Framework For Intelligent Multi Agent System Based Neural Network Classification Model. - Keyan Zahedi, Nihat Ay, Ralf Der:

Higher coordination with less control - A result of information maximisation in the sensori-motor loop. - Raymond J. Butler:

The Role of Spreadsheets in the Allied Irish Bank / Allfirst Currency Trading Fraud. - Philip B. Alipour:

A Lossless Fuzzy Binary AND/OR Compressor. - Thomas Britz

, Bård Heiseldel, Trygve Johnsen, Dillon Mayhew, Keisuke Shiromoto:
Generalizations of Wei's Duality Theorem. - Guoqiang Zhang:

On cost-effective communication network designing. - Abhimanu Kumar, Sanjib Kumar Das:

A real world network pricing game with less severe Braess' Paradox. - Pedro Peris-Lopez, Julio C. Hernandez-Castro, Juan M. Estévez-Tapiador, Jan C. A. van der Lubbe:

Security Flaws in a Recent Ultralightweight RFID Protocol. - Richard G. Clegg, Carla Di Cairano-Gilfedder, Shi Zhou:

A critical look at power law modelling of the Internet. - Marine Minier, Benjamin Pousse:

Improving Integral Cryptanalysis against Rijndael with Large Blocks. - Jerome Tonetti, Lucile Vadcard, P. Girard, Michel Dubois, Philippe Merloz, Jocelyne Troccaz:

Assessment of a percutaneous iliosacral screw insertion simulator. - Han-Shin Jo, Cheol Mun, June Moon, Jong-Gwan Yook:

Self-optimized Coverage Coordination and Coverage Analysis in Femtocell Networks. - Roua Youssef, Alexandre Graell i Amat:

Distributed Turbo-Like Codes for Multi-User Cooperative Relay Networks. - Linda Mthembu, Tshilidzi Marwala, Michael I. Friswell, Sondipon Adhikari:

Finite element model selection using Particle Swarm Optimization. - Han-Shin Jo, Cheol Mun, June Moon, Jong-Gwan Yook:

Interference Mitigation Using Uplink Power Control for Two-Tier Femtocell Networks. - Zhu Han, Rong Zheng, H. Vincent Poor:

Repeated Auctions with Learning for Spectrum Access in Cognitive Radio Networks. - Daniel Cullina, Alexandros G. Dimakis, Tracey Ho:

Searching for Minimum Storage Regenerating Codes. - Shurui Huang, Aditya Ramamoorthy, Muriel Médard:

Minimum cost content distribution using network coding: Replication vs. coding at the source nodes. - Venkatesan Guruswami, Ali Kemal Sinop:

Improved Inapproximability Results for Maximum k-Colorable Subgraph. - Evan Hurwitz, Tshilidzi Marwala:

State of the Art Review for Applying Computational Intelligence and Machine Learning Techniques to Portfolio Optimisation. - Chunhua Shen, Junae Kim, Lei Wang, Anton van den Hengel:

Positive Semidefinite Metric Learning with Boosting. - Guoqing Zhang, Shi Zhou, Di Wang, Gang Yan, Guoqiang Zhang:

Enhancing network transmission capacity by efficiently allocating node capability. - Rui Zhang:

Cooperative Multi-Cell Block Diagonalization with Per-Base-Station Power Constraints. - Kazuhiro Inaba, Sebastian Maneth:

The Complexity of Translation Membership for Macro Tree Transducers. - Andreas W. M. Dress, Katharina T. Huber, Jacobus H. Koolen, Vincent Moulton, Andreas Spillner:

An algorithm for computing cutpoints in finite metric spaces. - Raymes Khoury, Bernd Burgstaller, Bernhard Scholz:

Accelerating the Execution of Matrix Languages on the Cell Broadband Engine Architecture. - Vikraman Arvind, Srikanth Srinivasan:

On the hardness of the noncommutative determinant. - Amelia Carolina Sparavigna:

Fractional differentiation based image processing. - Maya Ramanath, Kondreddi Sarath Kumar, Georgiana Ifrim:

Generating Concise and Readable Summaries of XML Documents. - Bruno Durand, Andrei E. Romashchenko, Alexander Shen:

Fixed-point tile sets and their applications. - Yanbin Lu, Gene Tsudik:

Towards Plugging Privacy Leaks in Domain Name System. - Yunnan Wu:

A Construction of Systematic MDS Codes with Minimum Repair Bandwidth. - Xiang He, Aylin Yener:

Interference Channels with Strong Secrecy. - Amitav Mukherjee, A. Lee Swindlehurst:

Utility of Beamforming Strategies for Secrecy in Multiuser MIMO Wiretap Channels. - Sung Ho Chae, Sang Won Choi, Sae-Young Chung:

Optimal Multiplexing Gain of K-user Line-of-Sight Interference Channels with Polarization. - M. Tariq Banday, Tariq R. Jan:

Effectiveness and Limitations of Statistical Spam Filters. - Mirko Rahn, Peter Sanders, Johannes Singler:

Scalable Distributed-Memory External Sorting. - Jingpeng Li, Uwe Aickelin, Edmund K. Burke:

A Component Based Heuristic Search Method with Evolutionary Eliminations. - Shengli Zhang, Soung Chang Liew:

PNC with multiple antennas. - Shengli Zhang, Soung Chang Liew:

Applying physical layer network coding in wireless networks. - Arijit Laha:

On challenges and opportunities of designing integrated IT platforms for supporting knowledge works in organizations. - Laurent Romary:

Communication scientifique : Pour le meilleur et pour le PEER. - Arijit Laha:

On building Information Warehouses. - Chinmay Karande:

Polynomially Correlated Knapsack is NP-complete. - Wonseok Chae:

Type Safe Extensible Programming. - Deeparnab Chakrabarty, Chinmay Karande, Ashish Sangwan:

The Effect of Malice on the Social Optimum in Linear Load Balancing Games. - Xiang He, Aylin Yener:

Two-hop Secure Communication Using an Untrusted Relay. - Usman A. Khan, Soummya Kar

, José M. F. Moura:
DILAND: An Algorithm for Distributed Sensor Localization with Noisy Distance Measurements. - Rui Zhang, Shuguang Cui:

Cooperative Interference Management in Multi-Cell Downlink Beamforming. - R. Venkatachalam, A. Krishnan:

Multiple Cross-Layer Design Based Complete Architecture for Mobile Adhoc Networks. - Matteo Pradella, Alessandra Cherubini, Stefano Crespi-Reghizzi:

A unifying approach to picture grammars. - Justin Dauwels, Andrew W. Eckford, Sascha Korl, Hans-Andrea Loeliger:

Expectation Maximization as Message Passing - Part I: Principles and Gaussian Messages. - Marija Mitrovic, Bosiljka Tadic:

Bloggers Behavior and Emergent Communities in Blog Space. - Nao Hirokawa, Aart Middeldorp:

Decreasing Diagrams and Relative Termination. - Apostolos Syropoulos:

Can we debug the Universe? - Feng Gu, Uwe Aickelin, Julie Greensmith:

An Agent Based Classification Model. - Marcin Jurdzinski, Ashutosh Trivedi:

Average-Time Games on Timed Automata. - Pierre-Marc Jodoin, Venkatesh Saligrama, Janusz Konrad:

Behavior Subtraction. - Florin Pop, Ciprian Mihai Dobre, Alexandru Costan, Mugurel Ionut Andreica, Eliana-Dina Tirsa, Corina Stratan, Valentin Cristea:

Critical Analysis of Middleware Architectures for Large Scale Distributed Systems. - Yan Zhu, Dongning Guo:

Isotropic MIMO Interference Channels without CSIT: The Loss of Degrees of Freedom. - Mohab Safey El Din, Lihong Zhi:

Computing rational points in convex semi-algebraic sets and SOS decompositions. - Stefano Rini, Daniela Tuninetti, Natasha Devroye:

State of the cognitive interference channel: a new unified inner bound, and capacity to within 1.87 bits. - Ersen Ekrem, Sennur Ulukus:

Degraded Compound Multi-receiver Wiretap Channels. - Uwe Aickelin, Jingpeng Li, Edmund K. Burke:

An Evolutionary Squeaky Wheel Optimisation Approach to Personnel Scheduling. - Joaquim Borges, Steven T. Dougherty, Cristina Fernández-Córdoba:

Self-Dual Codes over Z_2xZ_4. - Achim Blumensath:

Guarded Second-Order Logic, Spanning Trees, and Network Flows. - Amanda M. Whitbrook, Uwe Aickelin, Jonathan M. Garibaldi:

An Idiotypic Immune Network as a Short Term Learning Architecture for Mobile Robots. - Jamie Twycross, Uwe Aickelin:

An Immune Inspired Approach to Anomaly Detection. - Alexandre Soro, Jérôme Lacan:

FFT-based Network Coding For Peer-To-Peer Content Delivery. - Johannes Fischer:

Wee LCP. - Gianni Tedesco, Uwe Aickelin:

An Immune Inspired Network Intrusion Detection System Utilising Correlation Context. - Jakob Nordström, Alexander A. Razborov:

On Minimal Unsatisfiability and Time-Space Trade-offs for k-DNF Resolution. - Paola Bonizzoni, Gianluca Della Vedova, Riccardo Dondi, Yuri Pirola:

Parameterized Complexity of the k-anonymity Problem. - Robert E. McGrath, Jason Kastner, Alejandro Rodríguez, Jim Myers:

Towards a Semantic Preservation System. - Krzysztof Onak:

Testing Distribution Identity Efficiently. - Sang-Woon Jeon, Sae-Young Chung, Syed Ali Jafar:

Degrees of Freedom of Multi-Source Relay Networks. - Andrew Chi-Chih Yao, Moti Yung, Yunlei Zhao:

Adaptive Concurrent Non-Malleability with Bare Public-Keys. - Jesun Sahariar Firoz, Masud Hasan, Ashik Zinnat Khan, M. Sohel Rahman:

The 1.375 Approximation Algorithm for Sorting by Transpositions Can Run in $O(n\log n)$ Time. - Julian J. McAuley, Tibério S. Caetano:

Exact Inference in Graphical Models: is There More to it? - Ian Mackie, Jorge Sousa Pinto

, Miguel Vilaça:
Iterators, Recursors and Interaction Nets. - Harris V. Georgiou:

Algorithms for Image Analysis and Combination of Pattern Classifiers with Application to Medical Diagnosis. - Ping Li, Arnd Christian König:

b-Bit Minwise Hashing. - Marcelo Arenas, Jorge Pérez, Juan L. Reutter, Cristian Riveros:

Composition and Inversion of Schema Mappings. - David Baelde:

Least and greatest fixed points in linear logic. - Ernst Martin Witte, Filippo Borlenghi, Gerd Ascheid, Rainer Leupers, Heinrich Meyr:

A Scalable VLSI Architecture for Soft-Input Soft-Output Depth-First Sphere Decoding. - Yongzhi Cao, Guoqing Chen:

A Fuzzy Petri Nets Model for Computing With Words. - Matús Medo, Yi-Cheng Zhang, Tao Zhou:

Adaptive model for recommendation of news. - Vaneet Aggarwal, Youjian Liu, Ashutosh Sabharwal:

Sum-capacity of Interference Channels with a Local View: Impact of Distributed Decisions. - Benjamin A. Burton:

Searching a bitstream in linear time for the longest substring of any given density. - Mohammad Hossein Yassaee, Mohammad Reza Aref:

Slepian-Wolf Coding Over Cooperative Relay Networks. - Amir Herzberg, Haya Schulmann:

Stealth-MITM DoS Attacks on Secure Channels. - Felix Brandt, Paul Harrenstein:

Set-Rationalizable Choice and Self-Stability. - Ghadamali Bagherikaram, Abolfazl S. Motahari, Amir K. Khandani:

Secrecy Rate Region of the Broadcast Channel with an Eavesdropper. - Ilias Diakonikolas, Rocco A. Servedio:

Improved Approximation of Linear Threshold Functions. - Bingbing Xia, Fei Qiao, Huazhong Yang, Hui Wang:

A Fault-tolerant Structure for Reliable Multi-core Systems Based on Hardware-Software Co-design. - Béla Genge, Piroska Haller:

Performance Evaluation of Security Protocols. - Andreas Gaiser, Stefan Schwoon:

Comparison of Algorithms for Checking Emptiness on Buechi Automata. - Anas Chaaban, Aydin Sezgin:

On the transmit strategy for the interference MIMO relay channel in the low power regime. - Damien Chablat

, Philippe Wenger, Stefan Staicu:
Dynamics of the Orthoglide parallel robot. - Vaneet Aggarwal, Amir Salman Avestimehr, Ashutosh Sabharwal:

Distributed Universally Optimal Strategies for Interference Channels with Partial Message Passing. - Martin Mann, Rolf Backofen, Sebastian Will:

Equivalence Classes of Optimal Structures in HP Protein Models Including Side Chains. - Martin Mann, Mohamed Abou Hamra, Kathleen Steinhöfel, Rolf Backofen:

Constraint-based Local Move Definitions for Lattice Protein Models Including Side Chains. - Victor M. Preciado, Alireza Tahbaz-Salehi, Ali Jadbabaie:

Variance Analysis of Randomized Consensus in Switching Directed Networks. - Mikolás Janota, Goetz Botterweck, Radu Grigore, João Marques-Silva:

How to Complete an Interactive Configuration Process? - Dimitrios Katselis, Eleftherios Kofidis, Athanasios A. Rontogiannis, Sergios Theodoridis:

Preamble-Based Channel Estimation for CP-OFDM and OFDM/OQAM Systems: A Comparative Study. - Jamshid Abouei, Alireza Bayesteh, Amir K. Khandani:

On the Delay-Throughput Tradeoff in Distributed Wireless Networks. - Theodoros K. Dikaliotis, Alexandros G. Dimakis, Tracey Ho, Michelle Effros:

On the Delay of Network Coding over Line Networks. - Chi Sing Chum, Xiaowen Zhang:

Improved Latin Square based Secret Sharing Scheme. - Raza Ur-Rehman, Stéphane Caro

, Damien Chablat
, Philippe Wenger:
Path placement optimization of manipulators based on energy consumption: application to the orthoglide 3-axis. - Daniel Kanaan, Philippe Wenger, Stéphane Caro, Damien Chablat

:
Singularity Analysis of Lower-Mobility Parallel Manipulators Using Grassmann-Cayley Algebra. - Florian Huc, Aubin Jarry:

VRAC: Simulation Results #1. - Han Chen, Pasquale Malacaria:

Studying Maximum Information Leakage Using Karush-Kuhn-Tucker Conditions. 1-15 - Hector Zenil:

Compression-based investigation of the dynamical properties of cellular automata and other systems. - Jun Pang, Chenyi Zhang

:
How to Work with Honest but Curious Judges? (Preliminary Report). 31-45 - Nizami Gasilov, Sahin Emrah Amrahov, Afet Golayoglu Fatullayev, Halil Ibrahim Karakas, Ömer Akin:

A Geometric Approach to Solve Fuzzy Linear Systems. - Andrei I. Yafimau:

Virtual-Threading: Advanced General Purpose Processors Architecture. - Qurat ul Ain Nizamani, Emilio Tuosto

:
Heuristic Methods for Security Protocols. 61-75 - Filippo Del Tedesco, David Sands:

A User Model for Information Erasure. 16-30 - Jeroen Ketema, Jakob Grue Simonsen:

Infinitary Combinatory Reduction Systems: Confluence. - Chandrajit L. Bajaj, Andrew Gillette, Samrat Goswami, Bong June Kwon, Jose Rivera:

Complementary Space for Enhanced Uncertainty and Dynamics Visualization. - Sabu M. Thampi:

Swarm Intelligence. - Raghu Meka, David Zuckerman:

Pseudorandom Generators for Polynomial Threshold Functions. - Mustafa Cenk Gursoy:

Secure Communication in the Low-SNR Regime. - Deli Qiao, Mustafa Cenk Gursoy, Senem Velipasalar:

On the Achievable Throughput Region of Multiple-Access Fading Channels with QoS Constraints. - Junwei Zhang, Mustafa Cenk Gursoy:

Collaborative Relay Beamforming for Secrecy. - Li Chen, Soma Biswas:

Digital Curvatures Applied to 3D Object Analysis and Recognition: A Case Study. - Adrian Dumitrescu, Minghui Jiang:

Piercing translates and homothets of a convex body. - Sounak Gupta, Goutam Paul:

Revisiting Fermat's Factorization for the RSA Modulus. - Hsien-Po Shiang, Mihaela van der Schaar:

Media-TCP: A Quality-Centric TCP-Friendly Congestion Control for Multimedia Transmission. - Sahand Haji Ali Ahmad, Mingyan Liu, Yunnan Wu:

Congestion games with resource reuse and applications in spectrum sharing. - Alexander A. Sherstov:

Optimal bounds for sign-representing the intersection of two halfspaces by polynomials. - Rahul Jain, Hartmut Klauck:

The Partition Bound for Classical Communication Complexity and Query Complexity. - Vassilis Kostakos:

An empirical study of spatial and transpatial social networks using Bluetooth and Facebook. - Nizami Gasilov, Sahin Emrah Amrahov, Afet Golayoglu Fatullayev:

A Geometric Approach to Solve Fuzzy Linear Systems of Differential Equations. - Simon R. Blackburn, Maura B. Paterson, Douglas R. Stinson:

Putting Dots in Triangles. - G. David Forney Jr.:

Minimal realizations of linear systems: The "shortest basis" approach. - Joshua D. Guttman

:
Fair Exchange in Strand Spaces. 46-60 - Sebastiaan Terwijn, Leen Torenvliet, Paul M. B. Vitányi:

Nonapproximablity of the Normalized Information Distance. - Michele Boreale

, Steve Kremer
:
Proceedings 7th International Workshop on Security Issues in Concurrency, SECCO 2009, Bologna, Italy, 5th September 2009. EPTCS 7, 2009 [contents] - K. Viswanathan Iyer, K. R. Uday Kumar Reddy:

Wiener index of binomial trees and Fibonacci trees. - Rémi Diana, Emmanuel Lochin:

ECN verbose mode: a statistical method for network path congestion estimation. - Andrea Masini, Luca Viganò, Marco Volpe:

A History of Until. - Samuel C. Skipsey, David Ambrose-Griffith, Greig Cowan, Mike Kenyon, Orlando Richards, Phil Roffe, Graeme Robert Stewart:

ScotGrid: Providing an Effective Distributed Tier-2 in the LHC Era. - Samuel C. Skipsey, Greig Cowan, Mike Kenyon, Stuart Purdie, Graeme Robert Stewart:

Optimised access to user analysis data using the gLite DPM. - Stefan Kratsch, Magnus Wahlström:

Preprocessing of Min Ones Problems: A Dichotomy. - Thomas Ang, Giovanni Pighizzini, Narad Rampersad, Jeffrey O. Shallit:

Automata and Reduced Words in the Free Group. - (Withdrawn) Classification with Tarskian system executions (Bakery Algorithms as an example).

- Ilango Sriram:

SPECI, a simulation tool exploring cloud-scale data centres. - Paul Bunn, Rafail Ostrovsky:

Throughput in Asynchronous Networks. - Ruoheng Liu, Yingbin Liang, H. Vincent Poor:

Fading Cognitive Multiple-Access Channels With Confidential Messages. - Jaeok Park, Mihaela van der Schaar:

A Game Theoretic Analysis of Incentives in Content Production and Sharing over Peer-to-Peer Networks. - Øyvind Ryan, Mérouane Debbah:

Convolution operations arising from Vandermonde matrices. - Francis R. Bach:

Self-concordant analysis for logistic regression. - Meicheng Liu, Dongdai Lin:

Fast Algebraic Attacks and Decomposition of Symmetric Boolean Functions. - Adam B. Yedidia:

Counting Independent Sets and Kernels of Regular Graphs. - Fatih Kocak, Hasari Celebi, Sinan Gezici, Khalid A. Qaraqe, Hüseyin Arslan, H. Vincent Poor:

Time Delay Estimation in Cognitive Radio Systems. - Jean-Charles Faugère, David Lubicz, Damien Robert:

Computing modular correspondences for abelian varieties. - Fedor Zhdanov, Vladimir Vovk:

Competing with Gaussian linear experts. - Olympia Hadjiliadis, Tobias Schaefer, H. Vincent Poor:

Quickest detection in coupled systems. - Noga Alon, Felix A. Fischer, Ariel D. Procaccia, Moshe Tennenholtz:

Sum of Us: Strategyproof Selection from the Selectors. - Jihoon Park, Przemyslaw Pawelczak, Danijela Cabric:

Performance of Joint Spectrum Sensing and MAC Algorithms for Multichannel Opportunistic Spectrum Access Ad Hoc Networks. - Rajashekar Annaji, Shrisha Rao:

Parallelization of the LBG Vector Quantization Algorithm for Shared Memory Systems. - Roberto Giacobazzi, Francesco Ranzato:

Abstraction-Guided Abstraction Simplification. - Azza Harbaoui, Malek Ghenima, Sahbi Sidhom:

Enrichissement des contenus par la réindexation des usagers : un état de l'art sur la problématique. - Gerald Schubert, Georg Hager, Holger Fehske:

Performance limitations for sparse matrix-vector multiplications on current multicore environments. - Patrick Erik Bradley:

A p-adic RanSaC algorithm for stereo vision using Hensel lifting. - Serguei A. Mokhov, Yingying She:

Yet Another Pacman 3D Adventures. - Jan Treibig, Georg Hager, Gerhard Wellein:

Multi-core architectures: Complexities of performance prediction and the impact of cache topology. - Lalitha Sankar, Jan Vondrák, H. Vincent Poor:

K-User Fading Interference Channels: The Ergodic Very Strong Case. - Uwe Aickelin, Dipankar Dasgupta:

Artificial Immune Systems. - Deniz Gündüz, Andrea J. Goldsmith, H. Vincent Poor:

Distortion Exponent in MIMO Channels with Feedback. - Julie Greensmith, Uwe Aickelin, Jamie Twycross:

Articulation and Clarification of the Dendritic Cell Algorithm. - Anthony Widjaja To, Leonid Libkin:

Algorithmic metatheorems for decidable LTL model checking over infinite systems. - Ashutosh Nayyar, Demosthenis Teneketzis:

On the Structure of Real-Time Encoders and Decoders in a Multi-Terminal Communication System. - Gordana Dodig-Crnkovic, Vincent C. Müller:

A Dialogue Concerning Two World Systems: Info-Computational vs. Mechanistic. - Oleg V. Michailovich:

An Iterative Shrinkage Approach to Total-Variation Image Restoration. - Chunxuan Ye, Suhas Mathur, Alex Reznik, Yogendra Shah, Wade Trappe, Narayan B. Mandayam:

Information-theoretically Secret Key Generation for Fading Wireless Channels. - Li Chen, Yong Liu, Feng Luo:

A Note on Gradually Varied Functions and Harmonic Functions. - Ana Maria Visan, Artem Y. Polyakov, Praveen S. Solanki, Kapil Arya, Tyler Denniston, Gene Cooperman:

Temporal Debugging using URDB. - Kenneth W. Shum, Wing Shing Wong, Chung Shue Chen:

A General Upper Bound on the Size of Constant-Weight Conflict-Avoiding Codes. - Hayato Takahashi:

Algorithmic randomness and monotone complexity on product space. - Yannick Chevalier, Michaël Rusinowitch:

Compiling and securing cryptographic protocols. - Arno Pauly:

The Complexity of Iterated Strategy Elimination. - Yuri I. Manin, Matilde Marcolli:

Error-correcting codes and phase transitions. - Maxim Raginsky, Zachary T. Harmany, Roummel F. Marcia, Rebecca Willett:

Compressed sensing performance bounds under Poisson noise. - Nikolaos Fountoulakis, Konstantinos Panagiotou:

Sharp Load Thresholds for Cuckoo Hashing. - Shuai Fan, Lin Zhang, Yong Ren:

Approximation Algorithms for Link Scheduling with Physical Interference Model in Wireless Multi-hop Networks. - Raghunandan H. Keshavan, Sewoong Oh:

A Gradient Descent Algorithm on the Grassman Manifold for Matrix Completion. - Onur Özyesil, Mehmet Kivanç Mihçak, Yucel Altug:

On Detection With Partial Information In The Gaussian Setup. - Abhinav Kumar, Satyanarayana V. Lokam, Vijay M. Patankar, Jayalal Sarma:

Using Elimination Theory to construct Rigid Matrices. - Yunus Sarikaya, Özgür Erçetin:

On Physically Secure and Stable Slotted ALOHA System. - Daniel Shumow:

Isogenies of Elliptic Curves: A Computational Approach. - Arijit Laha:

A theoretical foundation for building Knowledge-work Support Systems. - Guy McCusker:

A Graph Model for Imperative Computation. - Jan Feyereisl, Uwe Aickelin:

Artificial Immune Tissue using Self-Orgamizing Networks. - David Fernández-Amorós

, Julio Gonzalo, Felisa Verdejo:
The Uned systems at Senseval-2. - David Fernández-Amorós:

Word Sense Disambiguation Based on Mutual Information and Syntactic Patterns. - Alonso Silva, Eitan Altman, Pierre Bernhard, Mérouane Debbah:

Continuum Equilibria and Global Optimization for Routing in Dense Static Ad Hoc Networks. - Matthias Petschow, Edoardo Di Napoli, Paolo Bientinesi:

An Example of Symmetry Exploitation for Energy-related Eigencomputations. - Mark Tygert:

Fast algorithms for spherical harmonic expansions, III. - Patrick C. McGuire, Christoph Gross, Lorenz Wendt, A. Bonnici, V. Souza-Egipsy, Jens Ormö, Enrique Díaz Martínez, B. H. Foing, R. Bose, Sebastian Walter, Markus Oesker, Jörg Ontrup, Robert Haschke

, Helge J. Ritter:
The Cyborg Astrobiologist: Testing a Novelty-Detection Algorithm on Two Mobile Exploration Systems at Rivas Vaciamadrid in Spain and at the Mars Desert Research Station in Utah. - Manqi Zhao, Venkatesh Saligrama:

Anomaly Detection with Score functions based on Nearest Neighbor Graphs. - Alan M. Frieze, Páll Melsted:

Maximum Matchings in Random Bipartite Graphs and the Space Utilization of Cuckoo Hashtables. - Hana Godrich, Alexander M. Haimovich, H. Vincent Poor:

An Analysis of Phase Synchronization Mismatch Sensitivity for Coherent MIMO Radar Systems. - Alexander V. Spirov, Alexander B. Kazansky, Leonid Zamdborg, Juan Julián Merelo Guervós, Vladimir F. Levchenko:

Forced Evolution in Silico by Artificial Transposons and their Genetic Operators: The John Muir Ant Problem. - Damien Chablat

, Philippe Wenger:
On the characterization of the regions of feasible trajectories in the workspace of parallel manipulators. - Jan A. Bergstra, Cornelis A. Middelburg:

Instruction sequence processing operators. - Ilkka Norros, Hannu Reittu, Timo Eirola:

On the stability of two-chunk file-sharing systems. - Shohreh Sharif Mansouri, Elena Dubrova:

An Improved Implementation of Grain. - Boaz Patt-Shamir, Dror Rawitz:

Vector Bin Packing with Multiple-Choice. - Alonso Silva, Eitan Altman, Mérouane Debbah, Giuseppa Alfano:

Magnetworks: how mobility impacts the design of Mobile Networks. - David Fernández-Amorós:

Word Sense Disambiguation Using English-Spanish Aligned Phrases over Comparable Corpora. - Eitan Yaakobi, Tuvi Etzion:

High Dimensional Error-Correcting Codes. - Joan Feigenbaum, Aaron D. Jaggard, Michael Schapira:

Approximate Privacy: Foundations and Quantification. - A. Vaniachine:

Scalable Database Access Technologies for ATLAS Distributed Computing. - Gianluca Argentini:

Searching the (really) real general solution of 2D Laplace differential equation. - Lyubov N. Positselskaya:

Noisy fighter-bomber duel. - Arnab Bhattacharyya, Swastik Kopparty, Grant Schoenebeck, Madhu Sudan, David Zuckerman:

Optimal Testing of Reed-Muller Codes. - Lazar L. Kish, Bruce Zhang, Laszlo B. Kish:

Cracking the Liu key exchange protocol in its most secure state with Lorentzian spectra. - Marc Bailly-Bechet, S. Bradde, Alfredo Braunstein, Abraham D. Flaxman, L. Foini, Riccardo Zecchina:

Clustering with shallow trees. - Pascal Bianchi, Mérouane Debbah, Mylène Maïda, Jamal Najim

:
Performance of Statistical Tests for Source Detection using Random Matrix Theory. - Roberto Barbuti, Giulio Caravagna

, Paolo Milazzo, Andrea Maggiolo-Schettini:
On the Interpretation of Delays in Delay Stochastic Simulation of Biological Systems. 17-29 - James R. Lee, Anastasios Sidiropoulos:

Pathwidth, trees, and random embeddings. - Daniela Besozzi, Paolo Cazzaniga, Matteo Dugo

, Dario Pescini
, Giancarlo Mauri
:
A study on the combined interplay between stochastic fluctuations and the number of flagella in bacterial chemotaxis. 47-62 - R. Piasecki:

Unbiased hybrid structural pattern-reconstruction using entropic descriptors. - Jeff Cheeger, Bruce Kleiner, Assaf Naor:

Compression bounds for Lipschitz maps from the Heisenberg group to L1. - Hugo Zanghi, Franck Picard

, Vincent Miele, Christophe Ambroise:
Strategies for Online Inference of Model-Based Clustering in large Networks. - Oleg I. Mokhov:

Consistency on cubic lattices for determinants of arbitrary orders. - Christopher R. Laumann, Andreas M. Läuchli, R. Moessner, A. Scardicchio, S. L. Sondhi:

On product, generic and random generic quantum satisfiability. - Keqin Liu, Qing Zhao:

Decentralized Multi-Armed Bandit with Multiple Distributed Players. - Samson Abramsky:

Big Toy Models: Representing Physical Systems As Chu Spaces. - J. M. Landsberg:

P versus NP and geometry. - Samson Abramsky:

Abstract Scalars, Loops, and Free Traced and Strongly Compact Closed Categories. - Samson Abramsky, Bob Coecke:

Abstract Physical Traces. - Andrew Drucker, Ronald de Wolf:

Quantum Proofs for Classical Theorems. - Robert Adler, John Ewing, Peter Taylor:

Citation Statistics. - Bernard W. Silverman:

Comment: Bibliometrics in the Context of the UK Research Assessment Exercise. - Sune Lehmann, Benny Lautrup, Andrew D. Jackson:

Comment: Citation Statistics. - David J. Spiegelhalter, Harvey Goldstein:

Comment: Citation Statistics. - Peter Gavin Hall:

Comment: Citation Statistics. - Robert Adler, John Ewing, Peter Taylor:

Rejoinder: Citation Statistics. - Pavel Chigansky, Ramon van Handel:

A complete solution to Blackwell's unique ergodicity problem for hidden Markov chains. - Brendan Juba:

On Learning Finite-State Quantum Sources. - Samson Abramsky:

Coalgebras, Chu Spaces, and Representations of Physical Systems. - Robert D. Nowak:

The Geometry of Generalized Binary Search. - Soummya Kar

, José M. F. Moura:
Kalman Filtering with Intermittent Observations: Weak Convergence and Moderate Deviations. - Scott Aaronson:

BQP and the Polynomial Hierarchy. - Ashutosh Nayyar, Demosthenis Teneketzis:

A Sequential Problem in Decentralized Detection with Communication. - Lucie Galand, Olivier Spanjaard:

Exact algorithms for OWA-optimization in multiobjective spanning tree problems. - Dusko Pavlovic, Catherine Meadows:

Quantifying pervasive authentication: the case of the Hancke-Kuhn protocol. - Ravi Tandon, Sennur Ulukus, Kannan Ramchandran:

Secure Source Coding with a Helper. - Anatoly Pashkevich, Damien Chablat

, Philippe Wenger, Roman Gomolitsky:
Calibration of 3-d.o.f. Translational Parallel Manipulators Using Leg Observations. - Giuseppe Notarstefano, Francesco Bullo:

Distributed Abstract Optimization via Constraints Consensus: Theory and Applications. - Slawomir Lasota, Marcin Poturalski:

Undecidability of performance equivalence of Petri nets. - Jean-Loup Carre, Charles Hymans:

From Single-thread to Multithreaded: An Efficient Static Analysis Algorithm. - Tony Tan:

On Pebble Automata for Data Languages with Decidable Emptiness Problem. - David O'Callaghan, Louise Doran, Brian A. Coghlan:

Evaluating Trust in Grid Certificates. - Prateek Jain, Brian Kulis, Jason V. Davis, Inderjit S. Dhillon:

Metric and Kernel Learning using a Linear Transformation. - Jennifer Kloke, Gunnar Carlsson:

Topological De-Noising: Strengthening the Topological Signal. - Mahmoud Taherzadeh, H. Vincent Poor:

Limits on the Robustness of MIMO Joint Source-Channel Codes. - Bernhard G. Bodmann, Peter G. Casazza, Gitta Kutyniok:

A quantitative notion of redundancy for finite frames. - Jop Briët, Fernando Mário de Oliveira Filho, Frank Vallentin:

The positive semidefinite Grothendieck problem with rank constraint. - José Bento, Andrea Montanari:

Which graphical models are difficult to learn? - Christos Dimitrakakis, Aikaterini Mitrokotsa:

Statistical Decision Making for Authentication and Intrusion Detection. - Rafig Agaev, Pavel Chebotarev:

Which Digraphs with Ring Structure are Essentially Cyclic? - James M. Whitacre, Axel Bender:

Degeneracy: a link between evolvability, robustness and complexity in biological systems. - Garvesh Raskutti, Martin J. Wainwright, Bin Yu:

Minimax rates of estimation for high-dimensional linear regression over $\ell_q$-balls. - Gabriel H. Tucci, Maria V. Vega:

A Note on Functional Averages over Gaussian Ensembles. - Steve Gregory:

Finding overlapping communities in networks by label propagation. - Daoyi Dong, Ian R. Petersen:

Quantum control theory and applications: A survey. - Gunther Reißig:

Computing abstractions of nonlinear systems. - Luigi Cimmino:

Shor's Algorithm from the Mindset of Quantum Oracles. - Florian Dörfler, Francesco Bullo:

Synchronization and Transient Stability in Power Networks and Non-Uniform Kuramoto Oscillators. - Alexander K. Kelmans:

Packing 3-vertex paths in claw-free graphs and related topics. - L. Sunil Chandran, Rajesh Chitnis, Ramanjit Kumar:

On the SIG dimension of trees under $L_{\infty}$ metric. - Federico Ramponi, Debasish Chatterjee, Sean Summers, John Lygeros:

On the connections between PCTL and Dynamic Programming. - Dominique Unruh:

Universally Composable Quantum Multi-Party Computation.

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














