


default search action
CoRR, June 2010
- Marco Gaboardi, Jean-Yves Marion, Simona Ronchi Della Rocca:
An Implicit Characterization of PSPACE. - Hector Zenil, Jean-Paul Delahaye, Cédric Gaucherel:
Image information content characterization and classification by physical complexity. - Yipeng Liu, Qun Wan:
Anti-Measurement Matrix Uncertainty for Robust Sparse Signal Recovery with The Mixed l2 and l1 Norms Constraint. - Ruiming Yang, Qun Wan, Yipeng Liu, Wan-Lin Yang:
Inter-atom Interference Mitigation for Sparse Signal Reconstruction Using Semi-blindly Weighted Minimum Variance Distortionless Response. - Iliya Bouyukliev, Erik Jakobsson:
Results on Binary Linear Codes With Minimum Distance 8 and 10. - Solomiya Buk:
Ivan Franko's novel Dlja domashnjoho ohnyshcha (For the Hearth) in the light of the frequency dictionary. - Oleg S. Pianykh:
Perfusion Linearity and Its Applications. - Sabine Kampf, Martin Bossert:
A Fast Generalized Minimum Distance Decoder for Reed-Solomon Codes Based on the Extended Euclidean Algorithm. - Johanna Becker, Zsolt Csizmadia, Alexandre Laugier, Jácint Szabó, László Szegö:
Balancing congestion for unsplittable routing on a bidirected ring. - Christoph Koutschan
, Doron Zeilberger:
The 1958 Pekeris-Accad-WEIZAC Ground-Breaking Collaboration that computed Ground States of Two-Electron Atoms (and its 2010 Redux). - Nadia Creignou, Arne Meier, Michael Thomas, Heribert Vollmer:
The Complexity of Reasoning for Fragments of Autoepistemic Logic. - Manuel Gomez-Rodriguez, Jure Leskovec, Andreas Krause:
Inferring Networks of Diffusion and Influence. - Pengkai Zhao:
Impact of Parameter Variations on the Performance of a Concurrent SDMA MIMO-MAC. - Shizheng Li, Aditya Ramamoorthy:
Improved compression of network coding vectors using erasure decoding and list decoding. - Wojciech Fraczek, Wojciech Mazurczyk, Krzysztof Szczypiorski:
Stream Control Transmission Protocol Steganography. - Mathieu Cluzeau, Matthieu Finiasz, Jean-Pierre Tillich:
Methods for the Reconstruction of Parallel Turbo Codes. - Nan Li, William Cushing, Subbarao Kambhampati, Sung Wook Yoon:
Learning Probabilistic Hierarchical Task Networks to Capture User Preferences. - Meng Wang, Weiyu Xu, Ao Tang:
The Limits of Error Correction with lp Decoding. - Takahiro Ota, Hiroyoshi Morita:
Asymptotic Optimality of Antidictionary Codes. - Carlos M. Lorenzetti, Rocío L. Cecchini, Ana Gabriela Maguitman, András A. Benczúr:
Métodos para la Selección y el Ajuste de Características en el Problema de la Detección de Spam. - Prosenjit Bose, Luc Devroye, Maarten Löffler, Jack Snoeyink, Vishal Verma:
The dilation of the Delaunay triangulation is greater than π/2. - Massoud Babaie-Zadeh, Christian Jutten:
On the stable recovery of the sparsest overcomplete representations in presence of noise. - Rajkumar Buyya, Anton Beloglazov, Jemal H. Abawajy:
Energy-Efficient Management of Data Center Resources for Cloud Computing: A Vision, Architectural Elements, and Open Challenges. - Siu-Wai Ho:
Markov Lemma for Countable Alphabets. - Andreas Schenk, Robert F. H. Fischer:
Soft-Output Sphere Decoder for Multiple-Symbol Differential Detection of Impulse-Radio Ultra-Wideband. - Rui A. Costa, Michael Langberg, João Barros:
One-Shot Capacity of Discrete Channels. - Manas K. Patra, Samuel L. Braunstein:
An algebraic approach to information theory. - Joachim M. Buhmann:
Information theoretic model validation for clustering. - J. David Brown, Jamshid Abouei, Konstantinos N. Plataniotis, Subbarayan Pasupathy:
Adaptive Demodulation in Differentially Coherent Phase Systems: Design and Performance Analysis. - Paul J. Werbos:
Brain-Like Stochastic Search: A Research Challenge and Funding Opportunity. - Haitham Rashwan, Ernst M. Gabidulin, Bahram Honary:
A Smart Approach for GPT Cryptosystem Based on Rank Codes. - Stefano Galatolo, Mathieu Hoyrup, Cristobal Rojas
:
Computing the speed of convergence of ergodic averages and pseudorandom points in computable dynamical systems. 7-18 - Ingo Battenfeld:
A domain-theoretic investigation of posets of sub-sigma-algebras (extended abstract). 19-28 - Matthew S. Bauer, Xizhong Zheng:
On the Weak Computability of Continuous Real Functions. 29-40 - Vasco Brattka
, Arno Pauly:
Computation with Advice. 41-55 - Wesley Calvert
, Ken Kramer, Russell G. Miller:
The Cardinality of an Oracle in Blum-Shub-Smale Computation. 56-66 - Douglas Cenzer, Paul Brodhead:
Effective Capacity and Randomness of Closed Sets. 67-76 - Tobias Gärtner, Martin Ziegler:
Real Analytic Machines and Degrees. 77-91 - Vassilios Gregoriades:
The descriptive set-theoretic complexity of the set of points of continuity of a multi-valued function (Extended Abstract). 92-100 - Dianchen Lu
, Qingyan Wang, Rui Zheng:
Computing the Solutions of the Combined Korteweg-de Vries Equation by Turing Machines. 101-105 - Norbert Th. Müller, Margarita V. Korovina:
Making big steps in trajectories. 106-119 - Robert Rettinger:
A Local to Global Principle for the Complexity of Riemann Mappings (Extended Abstract). 120-129 - Yuping Shen, Xishun Zhao:
NP-Logic Systems and Model-Equivalence Reductions. 130-138 - Christoph Spandl:
Computational Complexity of Iterated Maps on the Interval (Extended Abstract). 139-150 - Thomas Steinke, Raazesh Sainudiin:
A Rigorous Extension of the Schönhage-Strassen Integer Multiplication Algorithm Using Complex Interval Arithmetic. 151-159 - Yongcheng Wu:
Complete Multi-Representations of Sets in a Computable Measure Space. 160-166 - Petros Drineas, Anastasios Zouzias:
A Note on Element-wise Matrix Sparsification via Matrix-valued Chernoff Bounds. - Alain Denise, Yann Ponty, Michel Termier:
Controlled non uniform random generation of decomposable structures. - Karol Gregor, Yann LeCun:
Emergence of Complex-Like Cells in a Temporal Product Network with Local Receptive Fields. - Alexey V. Chernov, Vladimir Vovk:
Prediction with Advice of Unknown Number of Experts. - Krzysztof Szczypiorski, Wojciech Mazurczyk:
Hiding Data in OFDM Symbols of IEEE 802.11 Networks. - Sanjay Karmakar, Mahesh K. Varanasi:
The diversity-multiplexing tradeoff of the MIMO Z interference channel. - Kristina Lerman, Rumi Ghosh, Jeon-Hyung Kang:
Centrality Metric for Dynamic Networks. - Chun-Hung Liu, Jeffrey G. Andrews:
Multicast Capacity Scaling of Wireless Networks with Multicast Outage. - Jun-Pyo Hong, Wan Choi:
Capacity scaling law by multiuser diversity in cognitive radio systems. - Xizhong Zheng, Ning Zhong:
Proceedings Seventh International Conference on Computability and Complexity in Analysis, CCA 2010, Zhenjiang, China, 21-25th June 2010. EPTCS 24, 2010 [contents] - Bogdan Butnaru, Benjamin Nguyen, Georges Gardarin, Laurent Yeh:
XQ2P: Efficient XQuery P2P Time Series Processing. - Georges Gardarin, Benjamin Nguyen, Laurent Yeh, Karine Zeitouni
, Bogdan Butnaru, Iulian Sandu Popa:
Gestion efficace de séries temporelles en P2P: Application à l'analyse technique et l'étude des objets mobiles. - YuanYuan He, Subhrakanti Dey:
Spectrum Sharing in Cognitive Radio with Quantized Channel Information. - Chao Tian, Suhas N. Diggavi, Shlomo Shamai:
The Achievable Distortion Region of Bivariate Gaussian Source on Gaussian Broadcast Channel. - Ghassan M. Kraidy, Joseph Jean Boutros, Albert Guillen i Fabregas:
Irregular Turbo Codes in Block-Fading Channels. - Jossy Sayir:
EXIT Chart Approximations using the Role Model Approach. - Krishnendu Chatterjee, Laurent Doyen, Hugo Gimbert, Thomas A. Henzinger:
Randomness for Free. - Marius Zimand:
Impossibility of independence amplification in Kolmogorov complexity theory. - Luis Barguñó, Guillem Godoy, Eduard Huntingford, Ashish Tiwari:
Termination of Rewriting with Right-Flat Rules Modulo Permutative Theories. - Pavel Yu. Chebotarev, Anton K. Loginov, Yana Yu. Tsodikova, Zoya M. Lezina, V. I. Borzenko:
Analysis of Collectivism and Egoism Phenomena within the Context of Social Welfare. - David Chin-Lung Fong, Michael A. Saunders:
LSMR: An iterative algorithm for sparse least-squares problems. - Mubarak Jibril, Martin Tomlinson, Mohammed Zaki Ahmed, Cen Tjhai:
Good Codes From Generalised Algebraic Geometry Codes. - Aly El Gamal, Onur Ozan Koyluoglu, Moustafa Youssef, Hesham El Gamal:
The Two Way Wiretap Channel: Theory and Practice. - Luis Salamanca, Juan José Murillo-Fuentes, Fernando Pérez-Cruz:
Channel Decoding with a Bayesian Equalizer. - Marco Fiore, Claudio Casetti, Carla-Fabiana Chiasserini, Panagiotis Papadimitratos:
Secure Neighbor Position Discovery in VANETs. - Szymon Grabowski, Wojciech Bieniecki:
Tight and simple Web graph compression. - Jan A. Bergstra, Cornelis A. Middelburg:
On the definition of a theoretical concept of an operating system. - Mahmoud I. A. Abdalla:
Treatment the Effects of Studio Wall Resonance and Coincidence Phenomena for Recording Noisy Speech Via FPGA Digital Filter. - Lydia Sari, Gunawan Wibisono, Dadang Gunawan:
Performance of RCPC-Encoded V-BLAST MIMO In Nakagami-m Fading Channel. - Harsh Kumar, Shweta Srivastava:
Rectangular and Circular Antenna Design on Thick Substrate. - Shahram Mohanna, Ali Farahbakhsh, Saeed Tavakoli:
Mutual Coupling Reduction in Two-Dimensional Array of Microstrip Antennas Using Concave Rectangular Patches. - Usama S. Mohammed, H. A. Hamada:
Image transmission over OFDM channel with rate allocation scheme and minimum peak-toaverage power ratio. - Ahmed Galib Reza, Tan Saw Chin, Fouad M. Abbou:
Performance Evaluation of Two-Stage Shared FDL Optical Packet Switch using Contention Resolution Scheme with Packet Releasing Priority. - Nirmalendu Bikas Sinha, Prosenjit kumar, Monojit Mitra:
Capacity Optimized For Multicarrier OFDM-MIMO Antenna Systems. - Javier Garcia, Chi Zhou:
Improving GPS Precision and Processing Time using Parallel and Reduced-Length Wiener Filters. - Hamza Dahmouni, Hassan El Ghazi, David Bonacci, Brunilde Sansò, André Girard:
Imprvoing QoS of all-IP Generation of Pre-WiMax Networks Using Delay-Jitter Model. - Ahmed Elmorshidy:
Holographic Projection Technology: The World is Changing. - A. S. Kang, Vishal Sharma:
Analysis of Beaulieu Pulse Shaping Family Based FIR Filter for WCDMA. - Nick Fyson, Tijl De Bie, Nello Cristianini:
Reconstruction of Causal Networks by Set Covering. - Hardeep Singh, Jasvir Singh, M. Mian:
Simulink based VoIP Analysis. - Mahdi Ali, Abdennacer Kachouri, Mounir Samet:
Novel method for planar microstrip antenna matching impedance. - Mohammad Khalaj-Amirhosseini, S. A. Akbarzadeh-Jahromi:
To Optimally Design Microstrip Nonuniform Transmission Lines as Lowpass Filters. - N. S. V. Shet, K. Chandrasekaran, K. C. Shet:
Implementation of Handoff through wireless access point Techniques. - Sonal Chawla, R. K. Singla:
Mechanism for Learning Object retrieval supporting adaptivity. - Shing-Kwei Tzeng, Chih-Fang Huang:
A Study on the Interactive "HOPSCOTCH" Game for the Children Using Computer Music Techniques. - Hao Shi:
An Interactive Zoo Guide: A Case Study of Collaborative Learning. - Tobias Lutz, Gerhard Kramer, Christoph Hausl:
Capacity for Half-Duplex Line Networks with Two Sources. - Mohamed Salah Gouider, Amine Farhat:
Building a Data Warehouse for National Social Security Fund of the Republic of Tunisia. - Hao Shi:
Developing E-Learning Materials for Software Development Course. - Jinwei Hu:
Expressiveness of a Provenance-Enabled Authorization Logic. - Yuan Shen, Moe Z. Win:
Fundamental Limits of Wideband Localization - Part I: A General Framework. - Yuan Shen, Henk Wymeersch, Moe Z. Win:
Fundamental Limits of Wideband Localization - Part II: Cooperative Networks. - Alexandru I. Tomescu:
On cycles through two arcs in strong multipartite tournaments. - Debdeep Chatterjee, Tan F. Wong, Ozgur Oyman:
On Achievable Rate Regions for Half-Duplex Causal Cognitive Radio Channels. - Georges Harik, Noam Shazeer:
Variational Program Inference. - Sabu M. Thampi, K. Chandra Sekaran:
An Enhanced Search Technique for Managing Partial Coverage and Free Riding in P2P Networks. - Sabu M. Thampi, K. Chandra Sekaran:
'Q-Feed' - An Effective Solution for the Free-riding Problem in Unstructured P2P Networks. - Jian Liu, Dah Ming Chiu:
Mathematical Modeling of Competition in Sponsored Search Market. - Xuepeng Wang, Baoming Bai, Xiao Ma:
A Low-Complexity Joint Detection-Decoding Algorithm for Nonbinary LDPC-Coded Modulation Systems. - Andrej Kastrin, Borut Peterlin, Dimitar Hristovski:
Chi-square-based scoring function for categorization of MEDLINE citations. - Andrej Kastrin, Borut Peterlin:
Rasch-based high-dimensionality data reduction and class prediction with applications to microarray gene expression data. - Thibaut Lust, Jacques Teghem:
Multiobjective decomposition of integer matrices: application to radiotherapy. - Ludo Waltman, Nees Jan van Eck, Ed C. M. Noyons:
A unified approach to mapping and clustering of bibliometric networks. - Gideon Samid:
Shannon Revisited: Considering a More Tractable Expression to Measure and Manage Intractability, Uncertainty, Risk, Ignorance, and Entropy. - Ernst M. Gabidulin, Haitham Rashwan, Bahram Honary:
On improving security of GPT cryptosystems. - M. Monnerville, G. Sémah:
Youpi, a Web-based Astronomical Image Processing Pipeline. - Marko A. Rodriguez, Alberto Pepe, Joshua Shinavier:
The Dilated Triple. - Jacqueline E. Rice, Kenneth B. Kent:
Systolic Array Technique for Determining Common Approximate Substrings. - Hagai Cohen, Ely Porat:
On the hardness of distance oracle for sparse graph. - Kirk Haller, Audrey Lee-St. John, Meera Sitharam, Ileana Streinu, Neil White:
Body-and-cad Geometric Constraint Systems. - Vladimir Pestov:
Predictive PAC learnability: a paradigm for learning from exchangeable input data. - Alexander Rakhlin, Karthik Sridharan, Ambuj Tewari:
Online Learning: Random Averages, Combinatorial Parameters, and Learnability. - Sanjay Karmakar, Mahesh K. Varanasi:
The diversity-multiplexing tradeoff of the symmetric MIMO 2-user interference channel. - Khoa D. Nguyen, Lars K. Rasmussen, Albert Guillen i Fabregas, Nick Letzepis:
MIMO ARQ with Multi-bit Feedback: Outage Analysis. - Fabio Soldo, Katerina J. Argyraki, Athina Markopoulou:
Optimal Source-Based Filtering of Malicious Traffic. - Ali Talari, Nazanin Rahnavard:
Distributed Rateless Codes with UEP Property. - Srirangam V. Addepallil, Per Andersen, George L. Barnes:
Efficient Resource Matching in Heterogeneous Grid Using Resource Vector. - Chao Chen, Carlos A. Pomalaza-Raez:
Implementing and Evaluating a Wireless Body Sensor System for Automated Physiological Data Acquisition at Home. - C. N. Marimuthu, P. Thangaraj, Aswathy Ramesan:
Low Power Shift and Add Multiplier Design. - K. M. Azharul Hasan, Mohammad Sabbir Hasan:
A Parsing Scheme for Finding the Design Pattern and Reducing the Development Cost of Reusable Object Oriented Software. - Koushik Majumder, Subir Kumar Sarkar:
Hybrid Scenario Based Performance Analysis of DSDV and DSR. - Natarajan Meghanathan, Nataliya Kostyuk, Raphael D. Isokpehi, Hari Cohly:
An Algorithm to Self-Extract Secondary Keywords and Their Combinations Based on Abstracts Collected using Primary Keywords from Online Digital Libraries. - Amitava Nag, Sushanta Biswas, Debasree Sarkar, Partha Pratim Sarkar:
A novel technique for image steganography based on Block-DCT and Huffman Encoding. - S. V. Sheela, K. R. Radhika:
Biometric Authentication using Nonparametric Methods. - Spits Warnars H. L. H:
Game Information System. - Yaser Miaji, Osman Gazali, Suhaidi Hassan:
Survey on the Event Orderings Semantics Used for Distributed System. - Ruchira Naskar, Indranil Sengupta:
Secret Sharing and Proactive Renewal of Shares in Hierarchical Groups. - P. Raja Rajeswari, Allam Apparo, V. K. Kumar:
Genbit Compress Tool(GBC): A Java-Based Tool to Compress DNA Sequences and Compute Compression Ratio(bits/base) of Genomes. - Md. Headayetullah, G. K. Pradhan:
Interoperability, Trust Based Information Sharing Protocol and Security: Digital Government Key Issues.