default search action
CoRR, December 2009
- Yunhui Fu, Robert T. Schweller:
Temperature 1 Self-Assembly: Deterministic Assembly in 3D and Probabilistic Assembly in 2D. - Gabriel Ciobanu:
Proceedings Third Workshop on Membrane Computing and Biologically Inspired Process Calculi, MeCBIC 2009, Bologna, Italy, 5th September 2009. EPTCS 11, 2009 [contents] - Anand D. Sarwate, Kamalika Chaudhuri, Claire Monteleoni:
Differentially Private Support Vector Machines. - Kamalika Chaudhuri, Sanjoy Dasgupta, Andrea Vattani:
Learning Mixtures of Gaussians using the k-means Algorithm. - Fadi Badra, Amélie Cordier, Jean Lieber:
Opportunistic Adaptation Knowledge Discovery. - Swan Dubois, Maria Gradinariu Potop-Butucaru, Mikhail Nesterenko, Sébastien Tixeuil:
Self-Stabilizing Byzantine Asynchronous Unison. - Nuno Pratas, Nicola Marchetti, Neeli Rashmi Prasad, António Rodrigues, Ramjee Prasad:
Robust Cooperative Spectrum Sensing for Disaster Relief Networks in Correlated Environments. - Bram Reps, Wim Vanroose, Hisham Bin Zubair:
On the indefinite Helmholtz equation: exterior complex scaled absorbing boundary layers, iterative analysis, and preconditioning. - Nicolas A. Barriga, Mauricio Araya-López:
A Multi-stage Probabilistic Algorithm for Dynamic Path-Planning. - Paul S. Bonsma:
Max-Leaves Spanning Tree is APX-hard for Cubic Graphs. - Charles Sauerbier:
Cantor's Problem. - Anna C. Gilbert, Yi Li, Ely Porat, Martin J. Strauss:
Approximate Sparse Recovery: Optimizing Time and Measurements. - Sebastiano Vigna:
Spectral Ranking. - Ryan O'Donnell, Yi Wu, Yuan Zhou:
Optimal lower bounds for locality sensitive hashing (except when q is tiny). - Marius Buibas, Diana Yu, Krystal Nizar, Gabriel A. Silva:
Mapping the spatiotemporal dynamics of calcium signaling in cellular neural networks using optical flow. - Nicolas A. Barriga, Mauricio Araya-López, Mauricio Solar:
Combining a Probabilistic Sampling Technique and Simple Heuristics to solve the Dynamic Path Planning Problem. - Nicolas A. Barriga:
Single-Agent On-line Path Planning in Continuous, Unpredictable and Highly Dynamic Environments. - Martin Dietzfelbinger, Andreas Goerdt, Michael Mitzenmacher, Andrea Montanari, Rasmus Pagh, Michael Rink:
Tight Thresholds for Cuckoo Hashing via XORSAT. - Cédric Chauve, Ján Manuch, Murray Patterson:
Hardness Results for the Gapped Consecutive-Ones Property. - Zhi-Han Gao, Fang-Wei Fu:
The minimal polynomial of sequence obtained from componentwise linear transformation of linear recurring sequence. - Shaddin Dughmi:
Submodular Functions: Extensions, Distributions, and Algorithms. A Survey. - Paola Bonizzoni, Gianluca Della Vedova, Riccardo Dondi, Yuri Pirola:
Variants of Constrained Longest Common Subsequence. - Roberto M. Amadio, Patrick Baillot, Antoine Madet:
An affine-intuitionistic system of types and effects: confluence and termination. - Arijit Laha:
On the issues of building Information Warehouses. - Matthieu Finiasz:
NP-completeness of Certain Sub-classes of the Syndrome Decoding Problem. - David Fernández-Amorós, Ruben Heradio, José Antonio Cerrada:
Inferring Information from Feature Diagrams to Product Line Economic Models. - David Eppstein, Elena Mumford:
Steinitz Theorems for Orthogonal Polyhedra. - Ralf-Michael Vetter, Werner Lennartz, Jörg-Volker Peetz:
Modular Workflow Engine for Distributed Services using Lightweight Java Clients. - Pawel Sobocinski:
A non-interleaving process calculus for multi-party synchronisation. 87-98 - Paul Beame, Trinh Huynh, Toniann Pitassi:
Hardness Amplification in Proof Complexity. - Mingyu Fan, Hong Qiao, Bo Zhang:
Isometric Multi-Manifolds Learning. - Fang Li, Maylor K. H. Leung, Cheng Shao Chian:
Making Palm Print Matching Mobile. - Mohammad Ghulam Ali:
A Multidatabase System as 4-Tiered Client-Server Distributed Heterogeneous Database System. - Yunho Lee, Soojin Lee:
A New Efficient Key Management Protocol for Wireless Sensor and Actor Networks. - Michael Huber:
Constructing Optimal Authentication Codes with Perfect Multi-fold Secrecy. - Sabah S. Al-Fedaghi, Alaa Alsaqa, Zahraa Fadel:
Conceptual Model for Communication. - Alireza Ghahari, Reza Aghaeizadeh Zoroofi:
Sequential Clustering based Facial Feature Extraction Method for Automatic Creation of Facial Models from Orthogonal Views. - G. Ramesh, S. Sundara Vadivelu:
A Reliable and Fault Tolerant Routing for Optical WDM Networks. - Mohammad Ghulam Ali:
Object Oriented Approach for Integration of Heterogeneous Databases in a Multidatabase System and Local Schemas Modifications Propagation. - C. Yaashuwanth, R. Ramesh:
A New Scheduling Algorithms For Real Time Tasks. - P. Meenakshi Devi, M. Venkatesan, K. Duraiswamy:
Reversible Image Authentication with Tamper Localization Based on Integer Wavelet Transform. - Sebastian Kaune, Rubén Cuevas Rumín, Gareth Tyson, Andreas Mauthe, Carmen Guerrero, Ralf Steinmetz:
Unraveling BitTorrent's File Unavailability: Measurements, Analysis and Solution Exploration. - Michael W. Mahoney, Lorenzo Orecchia, Nisheeth K. Vishnoi:
A Spectral Algorithm for Improving Graph Partitions. - Annabell Berger, Matthias Müller-Hannemann:
Uniform sampling of undirected and directed graphs with a fixed degree sequence. - Karol Gregor, Gregory Griffin:
Behavior and performance of the deep belief networks on image classification. - Turlough Neary:
A boundary between universality and non-universality in spiking neural P systems. - R. Mary Lourde, Anjali Kuppayil Saji:
A Digital Guitar Tuner. - Melissa Duarte, Ashutosh Sabharwal, Chris Dick, Raghu Mysore Rao:
Beamforming in MISO Systems: Empirical Results and EVM-based Analysis. - Sudipta Chattopadhyay, Salil Kumar Sanyal:
Comparison of Performance Metrics for QPSK and OQPSK Transmission Using Root Raised Cosine and Raised Cosine Pulse shaping Filters for Applications in Mobile Communication. - Filippo Bonchi, Davide Grohmann, Paola Spoletini, Emilio Tuosto:
Proceedings 2nd Interaction and Concurrency Experience: Structured Interactions, ICE 2009, Bologna, Italy, 31st August 2009. EPTCS 12, 2009 [contents] - Jamshid Abouei, J. David Brown, Konstantinos N. Plataniotis, Subbarayan Pasupathy:
On the Energy Efficiency of LT Codes in Proactive Wireless Sensor Networks. - Lorenzo Cappellari:
On Syndrome Decoding for Source Coding Based on Convolutional and Turbo Codes. - Mugurel Ionut Andreica, Nicolae Tapus:
New Algorithmic Approaches for Computing Optimal Network Paths with Several Types of QoS Constraints. - Mugurel Ionut Andreica, Nicolae Tapus:
Practical Algorithmic Techniques for Several String Processing Problems. - Filippo Petroni, Maurizio Serva:
Lexical evolution rates by automated stability measure. - Benjamin Nguyen, Antoine Vion, François-Xavier Dudouet, Loic Saint-Ghislain:
Applying an XML Warehouse to Social Network Analysis, Lessons from the WebStand Project. - Travis Gagie:
Grammar-Based Compression in a Streaming Model. - Urs Niesen:
Interference Alignment in Dense Wireless Networks. - Robert Brijder, Hendrik Jan Hoogeboom:
Nullity Invariance for Pivot and the Interlace Polynomial. - Filippo Petroni, Maurizio Serva:
Measures of lexical distance between languages. - A. D. Astuti, A. B. Mutiara:
Performance Analysis on Molecular Dynamics Simulation of Protein Using GROMACS. - Pablo Andres Diaz, François-Xavier Dudouet, Jean-Christophe Graz, Benjamin Nguyen, Antoine Vion:
Gouverner la standardisation par les changements d'arene. Le cas du XML. - Vincenza Carchiolo, Alessandro Longheu, Michele Malgeri, Giuseppe Mangioni:
Search for overlapped communities by parallel genetic algorithms. - Janardhan R. Iyengar, Bryan Ford:
Flow Splitting with Fate Sharing in a Next Generation Transport Services Architecture. - Amittai Aviram, Bryan Ford:
Deterministic Execution for Multicore and Cloud Computing. - Turlough Neary:
On the computational complexity of spiking neural P systems. - C. Kalyana Chakravarthy, P. V. G. D. Prasad Reddy:
Modified Opportunistic Deficit Round Robin Scheduling for improved QOS in IEEE 802.16 WBA networks. - Bart Jacobs:
Orthomodular lattices, Foulis Semigroups and Dagger Kernel Categories. - Yasser H. Elawady, Ahmad Said Tolba:
Educational Objectives Of Different Laboratory Types: A Comparative Study. - F. F. Paes, Haroldo Fraga de Campos Velho:
Neural-estimator for the surface emission rate of atmospheric gases. - Farnaz Towhidi, Maslin Masrom:
A Survey on Recognition Based Graphical User Authentication Algorithms. - Md. Zahid Hasan, Mohammad Reaz Hossain, Md. Ashraful Islam, Riaz Hossain:
Comparative Study of Different Guard Time Intervals to Improve the BER Performance of Wimax Systems to Minimize the Effects of ISI and ICI under Adaptive Modulation Techniques over SUI1 and AWGN Communication Channels. - Samir B. Patel, Shrikant N. Pradhan, Saumitra U. Ambegaokar:
A novel approach for implementing Steganography with computing power obtained by combining Cuda and Matlab. - B. N. Lavanya, K. B. Raja, K. R. Venugopal:
Fingerprint Verification based on Gabor Filter Enhancement. - Arash Habibi Lashkari, Samaneh Farmand, Omar Bin Zakaria, Rosli Saleh:
Shoulder Surfing attack in graphical password authentication. - Samir B. Patel, Shrikant N. Pradhan:
An approach to secure highly confidential documents of any size in the corporate or institutes having unsecured networks. - Nazmeen Bibi Boodoo, R. K. Subramanian:
Robust Multi biometric Recognition Using Face and Ear Images. - Rashid Sheikh, Beerendra Kumar, Durgesh Kumar Mishra:
Privacy Preserving k Secure Sum Protocol. - Ramya Bhagavatula, Robert W. Heath Jr.:
Adaptive Limited Feedback for Sum-Rate Maximizing Beamforming in Cooperative Multicell Systems. - (Withdrawn) Explicit Capacity-achieving Codes for Worst-Case Additive Errors.
- Victor Bushkov, Nina Yevtushenko, Tiziano Villa:
Discussion on Supervisory Control by Solving Automata Equation. - Julian J. McAuley, Tibério S. Caetano:
An expected-case sub-cubic solution to the all-pairs shortest path problem in R. - G. Singaravel, V. Palanisamy, A. Krishnan:
Ethics Understanding of Software Professional In Risk Reducing Reusability Coding Using Inclusion Set Theory. - Lena Khaled:
Architectural Design Activities for JAS. - A. Sabari, K. Duraiswamy:
Ant Based Adaptive Multicast Routing Protocol (AAMRP) for Mobile Ad Hoc Networks. - Ehsan Hosseini, Mohammad Ali Nematbakhsh:
A New Approach to Cold Start in Peer to Peer File Sharing Networks. - Mutasem Khalil Sari Alsmadi, Khairuddin Bin Omar, Shahrul Azman Noah, Ibrahim Almarashdah:
Fish recognition based on the combination between robust feature selection, image segmentation and geometrical parameter techniques using Artificial Neural Network and Decision Tree. - Shakeel Ahmad, Adli Mustafa, Bashir Ahmad, Arjamand Bano, Al-Sammarraie Hosam:
Comparative Study Of Congestion Control Techniques In High Speed Networks. - G. Padmavathi, P. Subashini, M. Muthu Kumar, Suresh Kumar Thakur:
Performance analysis of Non Linear Filtering Algorithms for underwater images. - Mehdi Salkhordeh Haghighi, Hadi Sadoghi Yazdi, Abedin Vahedian, Hamed Modaghegh:
Designing Kernel Scheme for Classifiers Fusion. - Rajni Ranjan Singh, Deepak Singh Tomar:
Approaches for user profile Investigation in Orkut Social Network. - V. K. Panchal, Parminder Singh, Navdeep Kaur, Harish Kundra:
Biogeography based Satellite Image Classification. - Mohd Shahizan Othman, Lizawati Mi Yusuf, Juhana Salim:
Web Document Analysis for Companies Listed in Bursa Malaysia. - R. Ashok Kumar, K. Ganesan:
A Reliable Replication Strategy for VoD System using Markov Chain. - P. Harini, O. B. V. Ramanaiah:
An Efficient Admission Control Algorithm for Load Balancing In Hierarchical Mobile IPv6 Networks. - Shailendra Singh, Sanjay Silakari:
An ensemble approach for feature selection of Cyber Attack Dataset. - J. P. Rothe, A. K. Wadhwani, S. Wadhwani:
Short Term Load Forecasting Using Multi Parameter Regression. - Ayeesha Dsousa, Shalini Bhatia:
Refactoring of a Database. - Ismail A. Ismail, Nabawia A. El Ramly, Mohammed A. Abd-ElWahid, Passent Mohammed El-Kafrawy, Mohammed M. Nasef:
Genetic Programming Framework for Fingerprint Matching. - B. Amutha, M. Ponnavaikko:
Location Update Accuracy in Human Tracking system using Zigbee modules. - Waqar Asif, Muhammad Bilal Qasim, Syed Musa Raza Tirmzi, Usman Muhammad Khan:
Performance Evaluation of WiMAX (802.16) Using Different Encoding Schemes. - Yu Zhang, Hanwen Luo, Wen Chen:
Efficient Relay Beamforming Design with SIC Detection for Dual-Hop MIMO Relay Networks. - Janusz A. Brzozowski, Galina Jirásková, Chenglong Zou:
Quotient Complexity of Closed Languages. - Anupam Gupta, Viswanath Nagarajan, R. Ravi:
Thresholded Covering Algorithms for Robust and Max-Min Optimization. - Michael R. Fellows, Panos Giannopoulos, Christian Knauer, Christophe Paul, Frances A. Rosamond, Sue Whitesides, Nathan Yu:
Abstract Milling with Turn Costs. - Yao Yu, Athina P. Petropulu, H. Vincent Poor:
Reduced Complexity Angle-Doppler-Range Estimation for MIMO Radar That Employs Compressive Sensing. - Amin Daneshmand Malayeri, Jalal Abdollahi:
Modern Symmetric Cryptography methodologies and its applications. - Serge Boucher, Boris Verhaegen, Esteban Zimányi:
XML Multidimensional Modelling and Querying. - Vladimir Rokhlin, Mark Tygert:
A fast randomized algorithm for orthogonal projection. - MohammadHossein Bateni, Mohammad Taghi Hajiaghayi:
Euclidean Prize-collecting Steiner Forest. - Adam Barth, Benjamin I. P. Rubinstein, Mukund Sundararajan, John C. Mitchell, Dawn Xiaodong Song, Peter L. Bartlett:
A Learning-Based Approach to Reactive Security. - Michel Fliess, Cédric Join, Mamadou Mboup:
Algebraic Change-Point Detection. - Vincent K. N. Lau, Ying Cui:
Delay-Optimal Power and Subcarrier Allocation for OFDMA Systems via Stochastic Approximation. - S. Shine, K. Murali Krishnan:
Extending Karger's randomized min-cut Algorithm for a Synchronous Distributed setting. - Christian Wulff-Nilsen:
Minimum Cycle Basis and All-Pairs Min Cut of a Planar Graph in Subquadratic Time. - Ying Cui, Vincent K. N. Lau, Rui Wang:
Distributive Subband Allocation, Power and Rate Control for Relay-Assisted OFDMA Cellular System with Imperfect System State Knowledge. - Loet Leydesdorff:
Clusters and Maps of Science Journals Based on Bi-connected Graphs in the Journal Citation Reports. - Loet Leydesdorff:
The university-industry knowledge relationship: Analyzing patents and the science base of technologies. - Loet Leydesdorff, Jin Bihui:
Mapping the Chinese Science Citation Database. - Loet Leydesdorff, Janelle Ward:
Communication of Science Shop Mediation: A Kaleidoscope of University-Society Relations. - Fionn Murtagh:
Open Access, Intellectual Property, and How Biotechnology Becomes a New Software Science. - Emmanuel Jeandel, Guillaume Theyssier:
Subshifts and Logic: Back and Forth. - Carlo Abi Chahine, Jean-Philippe Kotowicz, Nathalie Chaignaud, Jean-Pierre Pécuchet:
Conception d'un outil d'aide à l'indexation de ressources pédagogiques - Extraction automatique des the?matiques et des mots-clefs de documents UNIT. - Edward Rosten, Rohan Loveland, Mark D. Hickman:
Automatic creation of urban velocity fields from aerial video. - Samir Khuller, Jian Li, Barna Saha:
Energy Efficient Scheduling via Partial Shutdown. - Mehrdad Taki, Farshad Lahouti:
Spectral Efficiency Optimization for an Interfering Cognitive Radio with Adaptive Modulation and Coding. - Loet Leydesdorff:
The Construction and Globalization of the Knowledge Base in Inter-human Communication Systems. - Loet Leydesdorff, Andrea Scharnhorst:
Measuring the Knowledge Base: A Program of Innovation Studies. - Loet Leydesdorff:
The Mutual Information of University-Industry-Government Relations: An Indicator of the Triple Helix Dynamics. - Loet Leydesdorff:
'Interaction' versus 'action' in Luhmann's sociology of communication. - Caroline S. Wagner, Loet Leydesdorff:
A study of seismology as a dynamic, distributed area of scientific research. - Loet Leydesdorff:
Communication and Knowledge: How is the knowledge base of an economy constructed? - Amit Deshpande, Kasturi R. Varadarajan, Madhur Tulsiani, Nisheeth K. Vishnoi:
Algorithms and Hardness for Subspace Approximation. - Yilun Shang:
Topological Properties of an Exponential Random Geometric Graph Process. - Anatoly Pashkevich, Alexandr Klimchik, Damien Chablat:
Nonlinear Effects in Stiffness Modeling of Robotic Manipulators. - Carlo Abi Chahine, Nathalie Chaignaud, Jean-Philippe Kotowicz, Jean-Pierre Pécuchet:
Context and Keyword Extraction in Plain Text Using a Graph Representation.