


default search action
CoRR, September 2010
- Dimitrios Panagopoulos:

A secret sharing scheme using groups. - Xin Liu, Xiaowei Yang, Yong Xia:

NetFence: Preventing Internet Denial of Service from Inside Out. - David Eppstein, Maarten Löffler, Elena Mumford, Martin Nöllenburg:

Optimal 3D Angular Resolution for Low-Degree Graphs. - Boyu Li, Ender Ayanoglu:

Golden Coded Multiple Beamforming. - Gokarna Sharma, Costas Busch:

A Competitive Analysis for Balanced Transactional Memory Workloads. - Wei Yang, Lihua Li, Gang Wu, Haifeng Wang, Ying Wang:

Joint Uplink and Downlink Relay Selection in Cooperative Cellular Networks. - Wei Yang, Lihua Li, Gang Wu, Haifeng Wang:

Joint Relay Selection and Link Adaptation for Distributed Beamforming in Regenerative Cooperative Networks. - (Withdrawn) Energy-Efficient Transmission Schemes in Cooperative Cellular Systems.

- Emanuel Diamant:

Not only a lack of right definitions: Arguments for a shift in information-processing paradigm. - Wei Yang, Lihua Li, Wanlu Sun:

Energy-Efficient Relay Selection and Optimal Relay Location in Cooperative Cellular Networks with Asymmetric Traffic. - Erin W. Chambers, David Eppstein, Michael T. Goodrich, Maarten Löffler:

Drawing Graphs in the Plane with a Prescribed Outer Face and Polynomial Area. - Arslan Shaukat, Ke Chen:

Emotional State Categorization from Speech: Machine vs. Human. - Arslan Shaukat, Ke Chen:

Exploring Language-Independent Emotional Acoustic Features via Feature Selection. - Telmo L. T. Menezes, Camille Roth, Jean-Philippe Cointet:

Precursors and Laggards: An Analysis of Semantic Temporal Relationships on a Blog Network. - Philippe Chassaing, Jean Mairesse:

A non-ergodic PCA with a unique invariant measure. - Amnon H. Eden, Epameinondas Gasparis:

Three Controlled Experiments in Software Engineering with the Two-Tier Programming Toolkit: Final Report. - Rémy Belmonte, Martin Vatshelle:

On graph classes with logarithmic boolean-width. - Wei Pan, Manuel Cebrián, Wen Dong, Taemie Kim, Alex Pentland:

Modeling Dynamical Influence in Human Interaction Patterns. - Ketan Mulmuley:

Explicit Proofs and The Flip. - Flavio Rizzolo, Iluju Kiringa, Rachel Pottinger, Kwok Wong:

The Conceptual Integration Modeling Framework: Abstracting from the Multidimensional Model. - Marián Boguñá, Fragkiskos Papadopoulos, Dmitri V. Krioukov:

Sustaining the Internet with Hyperbolic Mapping. - Christos Dimitrakakis, Aikaterini Mitrokotsa, Serge Vaudenay:

Expected loss analysis of thresholded authentication protocols in noisy conditions. - Maxim Raginsky:

Empirical processes, typical sequences and coordinated actions in standard Borel spaces. - Edith Elkind, Piotr Faliszewski, Arkadii M. Slinko:

Rationalizations of Condorcet-Consistent Rules via Distances of Hamming Type. - Yu-Chih Huang, Krishna R. Narayanan:

Joint Source-Channel Coding with Correlated Interference. - Sleiman Rabah, Jiang Li, Mingzhi Liu, Yuanwei Lai:

Comparative Studies of 10 Programming Languages within 10 Diverse Criteria -- a Team 7 COMP6411-S10 Term Report. - Jun Liu, Jieping Ye:

Fast Overlapping Group Lasso. - Xi Chen, Shang-Hua Teng:

A Complexity View of Markets with Social Influence. - Andreas Schutt, Thibaut Feydy, Peter J. Stuckey, Mark G. Wallace:

Solving the Resource Constrained Project Scheduling Problem with Generalized Precedences by Lazy Clause Generation. - Tomás Feder, Pavol Hell, David G. Schell, Juraj Stacho:

Dichotomy for tree-structured trigraph list homomorphism problems. - Sandeep Singh Rawat

, Lakshmi Rajamani:
Discovering potential user browsing behaviors using custom-built apriori algorithm. - V. I. Ilyevsky:

The concept of an order and its application for research of the deterministic chains of symbols. - Tansu Alpcan, Holger Boche, Siddharth Naik:

A Unified Mechanism Design Framework for Networked Systems. - Rahmat Widia Sembiring, Jasni Mohamad Zain, Abdullah Embong:

Clustering high dimensional data using subspace and projected clustering algorithms. - Hussein Al-Bahadili, Khalid Kaabneh:

Analyzing the performance of probabilistic algorithm in noisy manets. - Hussein Al-Bahadili, Rami Jaradat:

Performance Evaluation of an OMPR Algorithm for Route Discovery in Noisy MANETs. - Khalid Nawaz, Alejandro P. Buchmann:

Acdmcp: An adaptive and completely distributed multi-hop clustering protocol for wireless sensor networks. - Nazim Burak Karahanoglu, Hakan Erdogan:

A* Orthogonal Matching Pursuit: Best-First Search for Compressed Sensing Signal Recovery. - Wided Oueslati, Jalel Akaichi:

Mobile Information Collectors' Trajectory Data Warehouse Design. - Murat Kayri, Ozlem Cakir:

An Applied Study on Educational Use of Facebook as a Web 2.0 Tool: The Sample Lesson of Computer Networks and Communication. - Thanasis Balafoutis, Anastasia Paparrizou, Kostas Stergiou:

Experimental Evaluation of Branching Schemes for the CSP. - Yuan Liu, Meixia Tao, Bin Li, Hui Shen:

Optimization Framework and Graph-Based Approach for Relay-Assisted Bidirectional OFDMA Cellular Networks. - Dipa Dixit, Jayant Gadge:

Automatic Recommendation for Online Users Using Web Usage Mining. - Albert Sunny, Joy Kuri, Saurabh Aggarwal:

Delay Modelling for a Single-hop Wireless Mesh Network under Light Aggregate Traffic. - Fabien Tencé, Cédric Buche, Pierre De Loor, Olivier Marc:

The Challenge of Believability in Video Games: Definitions, Agents Models and Imitation Learning. - Yevgeny Seldin:

A PAC-Bayesian Analysis of Graph Clustering and Pairwise Clustering. - Fabien Tencé, Cédric Buche:

Automatable Evaluation Method Oriented toward Behaviour Believability for Video Games. - Jeffrey G. Andrews, François Baccelli, Radha Krishna Ganti:

A Tractable Approach to Coverage and Rate in Cellular Networks. - Omid David-Tabibi, Moshe Koppel, Nathan S. Netanyahu:

Optimizing Selective Search in Chess. - Rahul Srivastava, Can Emre Koksal:

Basic Tradeoffs for Energy Management in Rechargeable Sensor Networks. - Zhiheng Zhou, Liang Zhou, Xing Wang, Yuanquan Tan:

Encoded packet-Assisted Rescue Approach to Reliable Unicast in Wireless Networks. - Christian A. Duncan, David Eppstein, Michael T. Goodrich, Stephen G. Kobourov, Martin Nöllenburg:

Lombardi Drawings of Graphs. - Christian A. Duncan, David Eppstein, Michael T. Goodrich, Stephen G. Kobourov, Martin Nöllenburg:

Drawing Trees with Perfect Angular Resolution and Polynomial Area. - P. Samundiswary, D. Sathian, Perumal Dananjayan:

Secured Greedy Perimeter Stateless Routing for Wireless Sensor Networks. - Louis Dorard, John Shawe-Taylor:

Gaussian Process Bandits for Tree Search. - Alessandro Nordio, Carla-Fabiana Chiasserini:

Field Reconstruction in Sensor Networks with Coverage Holes and Packet Losses. - Sakthivel Subramaniam, R. Lakshmipathi:

Weighted Attribute Fusion Model for Face Recognition. - Kalpana Sharma, Anurag S. Rathor, S. R. Biradar, Mrinal Kanti Ghose:

Power-efficient Routing & Increased Yield Approach For WSNs. - Nikolai T. Stoianov, Veselina Aleksandrova:

The E-net model for the Risk Analysis and Assessment System for the Information Security of Communication and Information Systems ("Defining" Subsystem). - Marko A. Rodriguez, Jennifer H. Watkins:

Grammar-Based Geodesics in Semantic Networks. - Carsten Ihlemann, Viorica Sofronie-Stokkermans:

System Description: H-PILoT (Version 1.9). - Andreas Kendziorra, Stefan E. Schmidt:

Network coding with modular lattices. - Amir Daneshgar, Ramin Javadi:

On Complexity of Isoperimetric Problems on Trees. - Felix Krahmer, Rachel A. Ward:

New and improved Johnson-Lindenstrauss embeddings via the Restricted Isometry Property. - David Eppstein, Michael T. Goodrich, Darren Strash, Lowell Trott:

Extended h-Index Parameterized Data Structures for Computing Dynamic Subgraph Statistics. - Charlie C. L. Wang, Yong Chen:

Layered Depth-Normal Images: a Sparse Implicit Representation of Solid Models. - Gerard Briscoe, Paolo Dini:

Towards Autopoietic Computing. - Geevarghese Philip, Venkatesh Raman, Yngve Villanger:

A Quartic Kernel for Pathwidth-One Vertex Deletion. - Jan Olaf Blech, Anton Hattendorf, Jia Huang:

Towards a Property Preserving Transformation from IEC 61131-3 to BIP. - Hamed khataeimaragheh, Hassan Rashidi:

A Novel Watermarking Scheme for Detecting and Recovering Distortions in Database Tables. - Jin-Li Guo:

Empirical study and modeling of human behaviour dynamics of comments on Blog posts. - Sajal Kabiraj, Vinay Topkar, R. C. Walke:

Going Green: A Holistic Approach to Transform Business. - M. Emre Celebi, Hassan A. Kingravi, Fatih Celiker:

Fast Color Space Transformations Using Minimax Approximations. - Mugurel Ionut Andreica, Andrei Dragus, Ana-Delia Sambotin, Nicolae Tapus:

Brief Announcement: Decentralized Construction of Multicast Trees Embedded into P2P Overlay Networks based on Virtual Geometric Coordinates. - R. Srikant:

Online Advertisement, Optimization and Stochastic Networks. - Han Xiao Wen:

Knowledge Recognition Algorithm enables P = NP. - Yongbin Zheng, Chunhua Shen, Richard I. Hartley, Xinsheng Huang:

Effective Pedestrian Detection Using Center-symmetric Local Binary/Trinary Patterns. - Farnood Merrikh-Bayat, Saeed Bagheri Shouraki:

Memristor Crossbar-based Hardware Implementation of Fuzzy Membership Functions. - Zvika Ben-Haim, Yonina C. Eldar:

Near-Oracle Performance of Greedy Block-Sparse Estimation Techniques from Noisy Measurements. - Bonnie Kirkpatrick, Yakir Reshef, Hilary K. Finucane, Haitao Jiang, Binhai Zhu, Richard M. Karp:

Algorithms for Comparing Pedigree Graphs. - Lorentz Jäntschi, Sorana D. Bolboaca, Mugur C. Balan, Radu E. Sestras:

Results of Evolution Supervised by Genetic Algorithms. - B. K. Pradeepa, Joy Kuri:

Aggregate AP Throughputs for Long File Transfers in a WLAN controlled by Inhomogeneous TCP Connections. - Zhiheng Zhou, Liang Zhou, Yuanquan Tan, Xing Wang:

An Efficient Retransmission Based on Network Coding with Unicast Flows. - Ammar Adl, Amr Badr, Ibrahim Farag:

A Note on the Membrane Computer. - Hao-En Chueh:

Mining Target-Oriented Sequential Patterns with Time-Intervals. - M. Emre Celebi:

Distance Measures for Reduced Ordering Based Vector Filters. - M. Emre Celebi:

Real-Time Implementation of Order-Statistics Based Directional Filters. - M. Emre Celebi, Hassan A. Kingravi, Rastislav Lukac, Fatih Celiker:

Cost-Effective Implementation of Order-Statistics Based Vector Filters Using Minimax Approximations. - M. Emre Celebi, Hassan A. Kingravi, Bakhtiyar Uddin, Y. Alp Aslandogan:

A Fast Switching Filter for Impulsive Noise Removal from Color Images. - M. Emre Celebi, Hassan A. Kingravi, Y. Alp Aslandogan:

Nonlinear Vector Filtering for Impulsive Noise Removal from Color Images. - B. Kiran Kumar:

ETP-Mine: An Efficient Method for Mining Transitional Patterns. - M. Emre Celebi, Hitoshi Iyatomi, William V. Stoecker, Randy H. Moss, Harold S. Rabinovitz, Giuseppe Argenziano, H. Peter Soyer:

Automatic Detection of Blue-White Veil and Related Structures in Dermoscopy Images. - M. Emre Celebi, Gerald Schaefer, Hitoshi Iyatomi, William V. Stoecker, Joseph M. Malters, James M. Grichnik:

An Improved Objective Evaluation Measure for Border Detection in Dermoscopy Images. - Piotr Bania:

JIT Spraying and Mitigations. - Jérôme Leroux:

The General Vector Addition System Reachability Problem by Presburger Inductive Invariants. - José F. Fontanari:

Social interaction as a heuristic for combinatorial optimization problems. - Elsa Tolone, Stavroula Voyatzi, Christian Leclère:

Constructions définitoires des tables du Lexique-Grammaire. - Kamaljit I. Lakhtaria, Dhinaharan Nagamalai:

Analyzing Web 2.0 Integration with Next Generation Networks for Services Rendering. - Kamaljit I. Lakhtaria, Dhinaharan Nagamalai:

Design & Deploy Web 2.0 enable services over Next Generation Network Platform. - Yaniv Altshuler, Shlomi Dolev, Yuval Elovici:

Efficient Collaborative Application Monitoring Scheme for Mobile Networks. - Kenta Kasai, Tomoharu Awano, David Declercq, Charly Poulliat, Kohichi Sakaniwa:

Weight Distributions of Multi-Edge type LDPC Codes. - David I. Spivak:

Functorial Data Migration. - Saipunidzam Mahamad, Mohammad Noor Ibrahim, Shakirah Mohd Taib:

M-Learning: A New Paradigm of Learning Mathematics in Malaysia. - Toby Walsh:

Parameterized Complexity Results in Symmetry Breaking. - Peyman Razaghi, Giuseppe Caire:

Coarse Network Coding: A Simple Relay Strategy to Resolve Interference. - Kanojia Sindhuben Babulal, Rajiv Ranjan Tewari:

E2XLRADR (Energy Efficient Cross Layer Routing Algorithm with Dynamic Retransmission for Wireless Sensor Networks). - Elmar Böhler, Nadia Creignou, Matthias Galota, Steffen Reith, Henning Schnoor, Heribert Vollmer:

Boolean Circuits as a Data Structure for Boolean Functions: Efficient Algorithms and Hard Problems. - Dae San Kim:

A family of sequences with large size and good correlation property arising from $M$-ary Sidelnikov sequences of period $q^d-1$. - Marios Gatzianas, Leonidas Georgiadis, Leandros Tassiulas:

Multiuser broadcast erasure channel with feedback - capacity and algorithms. - Moshe Mishali, Yonina C. Eldar:

Wideband Spectrum Sensing at Sub-Nyquist Rates. - Jean-Guillaume Dumas

, Thierry Gautier, Clément Pernet, B. David Saunders:
LinBox founding scope allocation, parallel building blocks, and separate compilation. - Gabrielle Allen, Tom Goodale, Frank Löffler, David Rideout, Erik Schnetter, Eric L. Seidel:

Component Specification in the Cactus Framework: The Cactus Configuration Language. - Eric L. Seidel, Gabrielle Allen, Steven R. Brandt, Frank Löffler, Erik Schnetter:

Simplifying Complex Software Assembly: The Component Retrieval Language and Implementation. - László Toka, Matteo Dell'Amico, Pietro Michiardi:

On Scheduling and Redundancy for P2P Backup. - M. Emre Celebi, Hitoshi Iyatomi, Gerald Schaefer, William V. Stoecker:

Approximate Lesion Localization in Dermoscopy Images. - Akitoshi Kawamura:

Generalized Semimagic Squares for Digital Halftoning. - Serge Gaspers, Mathieu Liedloff:

A Branch-and-Reduce Algorithm for Finding a Minimum Independent Dominating Set. - Thomas Lemon, Ewen Ferguson:

A Practical Approach to Managing Spreadsheet Risk in a Global Business. - Sebastian Dewhurst:

Transforming Critical Spreadsheets into Web Applications at Zurich Financial. - Patrick O'Beirne:

Spreadsheet Refactoring. - Rahul Vaze, Kien T. Truong, Steven Weber, Robert W. Heath Jr.:

Two-Way Transmission Capacity of Wireless Ad-hoc Networks. - Alkim Almila Akdag Salah

, Loet Leydesdorff:
The Development of the Journal Environment of Leonardo. - A. Saradha Devi, S. Suja Priyadharsini, S. Athinarayanan:

A Block Based Scheme for Enhancing Low Luminated Images. - Christine Bachoc:

Applications of semidefinite programming to coding theory. - Onay Urfalioglu, Orhan Arikan:

Artificial Neural Networks, Symmetries and Differential Evolution. - Dhruv Srivastava, Priya Ranjan:

An Application-oriented Model for Wireless Sensor Networks integrated with Telecom Infra. - Kevin Rosenblum, Lihi Zelnik-Manor, Yonina C. Eldar:

Sensing Matrix Optimization for Block-Sparse Decoding. - Darakhshan J. Mir, S. Muthukrishnan, Aleksandar Nikolov, Rebecca N. Wright:

Pan-private Algorithms: When Memory Does Not Help. - Christopher Earl, Matthew Might, David Van Horn:

Stack-Summarizing Control-Flow Analysis of Higher-Order Programs. - Julien Ferté, Vincent Pilaud, Michel Pocchiola:

On the number of simple arrangements of five double pseudolines. - JeongGil Ko, Amitabh Mishra:

DynaChanAl: Dynamic Channel Allocation with Minimal End-to-end Delay for Wireless Sensor Networks. - Sabu M. Thampi, K. Chandra Sekaran:

Protocols for Bio-Inspired Resource Discovery and Erasure Coded Replication in P2P Networks. - Ajay Sridharan, Yong Gao, Kui Wu, James Nastos:

Statistical Behavior of Embeddedness and Communities of Overlapping Cliques in Online Social Networks. - Tran The Truyen, Dinh Q. Phung, Svetha Venkatesh:

Probabilistic Models over Ordered Partitions with Application in Learning to Rank. - Oleg Titov:

One method of storing information. - George C. Violaris, Constandinos X. Mavromoustakis:

On the Performance Evaluation and Analysis of the Hybridised Bittorrent Protocol with Partial Mobility Characteristics. - Constandinos X. Mavromoustakis:

On the Impact of Caching and a Model for Storage-Capacity Measurements for Energy Conservation in Asymmetrical Wireless Devices. - Girish Varma:

Conductance and Eigenvalue. - Demijan Klinc, Carmit Hazay, Ashish Jagmohan, Hugo Krawczyk, Tal Rabin:

On Compression of Data Encrypted with Block Ciphers. - M. Kamaraju, K. Lal Kishore, A. V. N. Tilak:

Power optimized programmable embedded controller. - William Lovas, Frank Pfenning:

Refinement Types for Logical Frameworks and Their Interpretation as Proof Irrelevance. - Mark de Berg, Krzysztof Onak, Anastasios Sidiropoulos:

Fat Polygonal Partitions with Applications to Visualization and Embeddings. - Oleg V. Michailovich, Yogesh Rathi, Sudipto Dolui:

Spatially regularized compressed sensing of diffusion MRI data. - David Eppstein, Michael T. Goodrich, Roberto Tamassia:

Privacy-Preserving Data-Oblivious Geometric Algorithms for Geographic Data. - Rafael Caballero, Mario Rodríguez-Artalejo, Carlos A. Romero-Díaz:

A Transformation-based Implementation for CLP with Qualification and Proximity. - Mario Rodríguez-Artalejo, Carlos A. Romero-Díaz:

Fixpoint & Proof-theoretic Semantics for CLP with Qualification and Proximity. - P. Geetha, Vasumathi Narayanan:

Evolutionary Computational Method of Facial Expression Analysis for Content-based Video Retrieval using 2-Dimensional Cellular Automata. - Michael Thomas, Heribert Vollmer:

Complexity of Non-Monotonic Logics. - Zeeshan Ahmed

:
Home Automation. - Zeeshan Ahmed

:
Aero Fighter - 2D Gaming. - Zeeshan Ahmed

:
AI 3D Cybug Gaming. - Alexandra Meliou, Wolfgang Gatterbauer, Katherine F. Moore, Dan Suciu:

The Complexity of Causality and Responsibility for Query Answers and non-Answers. - Hernan Haimovich, Julio H. Braslavsky:

Feedback stabilisation of switched systems via iterative approximate eigenvector assignment. - Vaishak Belle, Gerhard Lakemeyer:

Multi-Agent Only-Knowing Revisited. - Bo Yang, Jiming Liu:

Multiplex Structures: Patterns of Complexity in Real-World Networks. - Yang Yang, Yifu Zhang, Zixiang Xiong:

A new sufficient condition for sum-rate tightness in quadratic Gaussian multiterminal source coding. - Massimiliano Dal Mas:

Ontology Temporal Evolution for Multi-Entity Bayesian Networks under Exogenous and Endogenous Semantic Updating. - Evmorfia N. Argyriou, Michael A. Bekos, Antonios Symvonis:

Maximizing the Total Resolution of Graphs. - Sahand N. Negahban, Martin J. Wainwright:

Restricted strong convexity and weighted matrix completion: Optimal bounds with noise. - Tobias Christ, Dömötör Pálvölgyi, Milos Stojakovic:

Consistent digital line segments. - Mugurel Ionut Andreica, Eliana-Dina Tirsa:

Clustering, Encoding and Diameter Computation Algorithms for Multidimensional Data. - Lunjin Lu, John G. Cleary:

Simplifying Negative Goals Using Typed Existence Properties. - Karl Crary, Marino Miculan

:
Proceedings 5th International Workshop on Logical Frameworks and Meta-languages: Theory and Practice, LFMTP 2010, Edinburgh, UK, 14th July 2010. EPTCS 34, 2010 [contents] - Justin F. Brunelle, Irwin B. Levinstein, Chutima Boonthum:

MiBoard: Metacognitive Training Through Gaming in iSTART. - Justin F. Brunelle, Kyle B. Dempsey, G. Tanner Jackson, Chutima Boonthum, Irwin B. Levinstein, Danielle S. McNamara:

MiBoard: iSTART Metacognitive Training through Gaming. - Kyle B. Dempsey, Justin F. Brunelle, G. Tanner Jackson, Chutima Boonthum, Irwin B. Levinstein, Danielle S. McNamara:

MiBoard: Multiplayer Interactive Board Game. - Kyle B. Dempsey, G. Tanner Jackson, Justin F. Brunelle, Michael Rowe, Danielle S. McNamara:

MiBoard: A Digital Game from a Physical World. - Justin F. Brunelle, G. Tanner Jackson, Kyle B. Dempsey, Chutima Boonthum, Irwin B. Levinstein, Danielle S. McNamara:

Gamed-based iSTART Practice: From MiBoard to Self-Explanation Showdown. - Amol Aggarwal:

On Unit Distances in a Convex Polygon. - Amol Aggarwal:

On Isosceles Triangles and Related Problems in a Convex Polygon. - Zvika Ben-Haim, Tomer Michaeli, Yonina C. Eldar:

Performance Bounds and Design Criteria for Estimating Finite Rate of Innovation Signals. - Eitan Altman, Philippe Nain, Adam Shwartz, Yuedong Xu:

Predicting the Impact of Measures Against P2P Networks on the Transient Behaviors. - Masud Hasan, Mohammad Monoar Hossain, Alejandro López-Ortiz, Sabrina Nusrat, Saad Altaful Quader, Nabila Rahman:

Some New Equiprojective Polyhedra. - Andrew M. Mironov:

Theory of processes. - Luciano Caroprese, Miroslaw Truszczynski:

Active Integrity Constraints and Revision Programming. - Amitav Mukherjee, A. Lee Swindlehurst:

Robust Beamforming for Security in MIMO Wiretap Channels with Imperfect CSI. - Anh Le, Athina Markopoulou, Michalis Faloutsos:

PhishDef: URL Names Say It All. - Jun Luo:

SNAP: SNowbAll multi-tree Pushing for Peer-to-Peer Media Streaming. - Xiangqiong Shi, Dan Schonfeld, Daniela Tuninetti:

Message Error Analysis of Loopy Belief Propagation for the Sum-Product Algorithm. - Ajay Prasad, Sandeep Chaurasia, Arjun Singh, Deepak Gour:

Mapping Cloud Computing onto Useful e-Governance. - Joseph Wun-Tat Chan, Francis Y. L. Chin, Xin Han, Ka-Cheong Lam, Hing-Fung Ting, Yong Zhang:

Deterministic Online Call Control in Cellular Networks and Triangle-Free Cellular Networks. - Thore Husfeldt, Nina Taslaman:

The Exponential Time Complexity of Computing the Probability That a Graph is Connected. - Mostafa Zaman Chowdhury, Yeong Min Jang, Zygmunt J. Haas:

Network evolution and QOS provisioning for integrated femtocell/macrocell networks. - Iryna Andriyanova, Emina Soljanin:

Optimized IR-HARQ Schemes Based on Punctured LDPC Codes over the BEC. - (Withdrawn) Ensuring Cache Freshness in On-demand Routing Protocols for Mobile Ad Hoc Network: A Cross-layer Framework.

- Martín Abadi, Gordon D. Plotkin:

A Model of Cooperative Threads. - Przemyslaw Kukielka, Zbigniew Kotulski

:
Adaptation of the neural network-based IDS to new attacks detection. - Nikolai T. Stoianov:

A Protection Approach for Video Information transmitted in TCP/IP based networks. - Huang Huang, Vincent K. N. Lau:

Delay-Optimal User Scheduling and Inter-Cell Interference Management in Cellular Network via Distributive Stochastic Learning. - Deeparnab Chakrabarty, Chaitanya Swamy:

Facility Location with Client Latencies: Linear-Programming based Techniques for Minimum-Latency Problems. - Maksim Malkov:

Various virtual structures on single file system. - Nikolai T. Stoianov:

One software tool for testing square s-boxes. - Manuel Urueña, Petr Machnik, Maria Martinez, Marcin Niemiec, Nikolai T. Stoianov:

INDECT Advanced Security Requirements. - Danny Z. Chen, Haitao Wang:

An Improved Algorithm for Reconstructing a Simple Polygon from the Visibility Angles. - Pulkit Grover, Anant Sahai:

Is Witsenhausen's counterexample a relevant toy? - Sameer Pawar, Salim Y. El Rouayheb, Kannan Ramchandran:

Securing Dynamic Distributed Storage Systems against Eavesdropping and Adversarial Attacks. - Weiping Zhu:

Loss Rate Inference in Multi-Sources and Multicast-Based General Topology. - Punit Pandey, Deepshikha Pandey, Shishir Kumar:

Reinforcement Learning by Comparing Immediate Reward. - (Withdrawn) A New Route Maintenance in Dynamic Source Routing Protocol.

- (Withdrawn) On the Reduction of Broadcast Traffic in Mobile Ad Hoc Networks.

- (Withdrawn) A Simple Battery Aware Gossip Based Sleep Protocol for Densely Deployed Ad-hoc and Sensor Networks.

- M. Praveen:

Small Vertex Cover makes Petri Net Coverability and Boundedness Easier. - Telikepalli Kavitha, Meghana Nasre, Prajakta Nimbhorkar:

Popularity at Minimum Cost. - Hui Zhou, Pingyi Fan, Dongning Guo:

Joint Channel Probing and Proportional Fair Scheduling in Wireless Networks. - Anish Das Sarma, Sreenivas Gollapudi, Rina Panigrahy, Li Zhang:

Understanding Fashion Cycles as a Social Choice. - Anindya Das, Ifat Jahangir, Masud Hasan:

On the Design and Analysis of Quaternary Serial and Parallel Adders. - M. Abel, D. L. Shepelyansky:

Google matrix of business process management. - Qiyu Sun, Michael Unser:

Left-Inverses of Fractional Laplacian and Sparse Stochastic Processes. - Daron Acemoglu, Giacomo Como, Fabio Fagnani, Asuman E. Ozdaglar:

Opinion fluctuations and disagreement in social networks. - Artiom Alhazov, Sergey Verlan:

Minimization Strategies for Maximally Parallel Multiset Rewriting Systems. - Jan L. Cieslinski, Boguslaw Ratkiewicz:

Energy-preserving numerical schemes of high accuracy for one-dimensional Hamiltonian systems. - Karl Malbrain:

A Blink Tree latch method and protocol to support synchronous node deletion. - Ruth McKeever, Kevin McDaid:

How do Range Names Hinder Novice Spreadsheet Debugging Performance? - Ben G. Rittweger, Eoin Langan:

Spreadsheet Risk Management in Organisations. - Salvatore Aurigemma, Raymond R. Panko:

The Detection of Human Spreadsheet Errors by Humans versus Inspection (Auditing) Software. - Françoise Tort:

Teaching Spreadsheets: Curriculum Design Principles. - Andreas Abel, Brigitte Pientka:

Explicit Substitutions for Contextual Type Theory. 5-20 - John Tang Boyland

:
Generating Bijections between HOAS and the Natural Numbers. 21-35 - Maribel Fernández, Murdoch James Gabbay

:
Closed nominal rewriting and efficiently computable nominal algebra equality. 37-51 - Herman Geuvers, Robbert Krebbers, James McKinna, Freek Wiedijk:

Pure Type Systems without Explicit Contexts. 53-67 - Daniel R. Licata

, Robert Harper:
A Monadic Formalization of ML5. 69-83 - Florian Rabe

:
Representing Isabelle in LF. 85-99 - Anders Schack-Nielsen, Carsten Schürmann:

Pattern Unification for the Lambda Calculus with Linear and Affine Types. 101-116 - Dror Lederman:

Estimation of Infants' Cry Fundamental Frequency using a Modified SIFT algorithm. - Andrea Kohlhase, Michael Kohlhase:

What we understand is what we get: Assessment in Spreadsheets. - Dipti Kapoor Sarmah, Neha Bajpai:

Proposed System for data hiding using Cryptography and Steganography Proposed System for data hiding using Cryptography and Steganography. - K. R. Sahasranand, Nithin Nagaraj:

Sharing Graphs. - Mikolaj Bojanczyk, Luc Segoufin:

Tree Languages Defined in First-Order Logic with One Quantifier Alternation. - Katia Jaffrès-Runser, Jean-Marie Gorce, Cristina Comaniciu:

On the performance evaluation of wireless networks with broadcast and interference-limited channels. - Juha Kontinen

, Heribert Vollmer:
On Second-Order Monadic Monoidal and Groupoidal Quantifiers. - Hariolf Betz, Thom W. Frühwirth:

Linear-Logic Based Analysis of Constraint Handling Rules with Disjunction. - Jan A. Bergstra:

Informal Control code logic. - Na Yi, Yi Ma, Rahim Tafazolli:

Underlay Cognitive Radio with Full or Partial Channel Quality Information. - Sanat Sarangi, Subrat Kar:

Performance Analysis of an Improved Graded Precision Localization Algorithm for Wireless Sensor Networks. - Mustafa Cenk Gursoy:

Throughput Analysis of Buffer-Constrained Wireless Systems in the Finite Blocklength Regime. - George K. Atia, Venugopal V. Veeravalli, Jason A. Fuemmeler:

Sensor Scheduling for Energy-Efficient Target Tracking in Sensor Networks. - Prosenjit Bose, Jean-Lou De Carufel:

Minimum Enclosing Area Triangle with a Fixed Angle. - Maxime Taquet, Laurent Jacques, Christophe De Vleeschouwer, Benoît Macq:

Invariant Spectral Hashing of Image Saliency Graph. - Chan Wong Wong, Tan F. Wong, John M. Shea:

Secret Sharing LDPC Codes for the Constrained Gaussian Wiretap Channel. - Ashish Khisti, Suhas N. Diggavi, Gregory W. Wornell:

Secret-key Agreement with Channel State Information at the Transmitter. - Peng Wang, Chunhua Shen, Nick Barnes, Hong Zheng, Zhang Ren:

Asymmetric Totally-corrective Boosting for Real-time Object Detection. - Stefano Rini, Daniela Tuninetti, Natasha Devroye:

The Capacity of the Semi-Deterministic Cognitive Interference Channel and its Application to Constant Gap Results for the Gaussian Channel. - Byung-Gon Chun, Sunghwan Ihm, Petros Maniatis, Mayur Naik:

CloneCloud: Boosting Mobile Device Applications Through Cloud Clone Execution. - Raymond H. Y. Louie, Matthew R. McKay

, Iain B. Collings:
Open-Loop Spatial Multiplexing and Diversity Communications in Ad Hoc Networks. - A. C. Cem Say, Abuzer Yakaryilmaz:

Quantum function computation using sublogarithmic space (abstract & poster). - Arunkumar Subramanian, Andrew Thangaraj, Matthieu R. Bloch, Steven W. McLaughlin:

Strong Secrecy on the Binary Erasure Wiretap Channel Using Large-Girth LDPC Codes. - Gerth Stølting Brodal, Spyros Sioutas, Kostas Tsichlas, Christos D. Zaroliagis:

D2-Tree: A New Overlay with Deterministic Bounds. - Petros Boufounos:

Universal Rate-Efficient Scalar Quantization. - Jason A. Fuemmeler, George K. Atia, Venugopal V. Veeravalli:

Sensor Management for Tracking in Sensor Networks. - Stephen Chang, David Van Horn, Matthias Felleisen:

Evaluating Call-By-Need on the Control Stack. - Mahdi Cheraghchi, Ali Hormati, Amin Karbasi, Martin Vetterli:

Group Testing with Probabilistic Tests: Theory, Design and Application. - Mark Giesbrecht, Daniel S. Roche, Hrushikesh Tilak:

Computing sparse multiples of polynomials. - Paul S. Bonsma:

Shortest Path Reconfiguration is PSPACE-hard. - Arno Bastenhof:

Tableaux for the Lambek-Grishin calculus. - H. Brendan McMahan:

Follow-the-Regularized-Leader and Mirror Descent: Equivalence Theorems and Implicit Updates. - Deli Qiao, Mustafa Cenk Gursoy, Senem Velipasalar:

Transmission Strategies in Multiple Access Fading Channels with Statistical QoS Constraints. - Zhiying Wang, Alexandros G. Dimakis, Jehoshua Bruck:

Rebuilding for Array Codes in Distributed Storage Systems. - Gwen Salaün, Xiang Fu, Sylvain Hallé:

Proceedings Fourth International Workshop on Testing, Analysis and Verification of Web Software, TAV-WEB 2010, Antwerp, Belgium, 21 September 2010. EPTCS 35, 2010 [contents] - Eduardo G. Altmann, Janet B. Pierrehumbert, Adilson E. Motter:

Niche as a determinant of word fate in online groups. - Kaibin Huang, Rui Zhang:

Cooperative Feedback for MIMO Interference Channels. - Qinfeng Shi, Mark D. Reid, Tibério S. Caetano:

Conditional Random Fields and Support Vector Machines: A Hybrid Approach. - Alexander Onic, Mario Huemer:

Direct vs. Two-Step Approach for Unique Word Generation in UW-OFDM. - Jerome K. Vanclay:

An evaluation of the Australian Research Council's journal ranking. - Natarajan Lakshmi Prasad, B. Sundar Rajan:

Distributed STBCs with Partial Interference Cancellation Decoding. - Fernando Bobillo, Umberto Straccia:

Fuzzy Ontology Representation using OWL 2. - Hans Kurzweil, Mathis Seidl, Johannes B. Huber:

Collaborative Decoding of Interleaved Reed-Solomon Codes using Gaussian Elimination. - Caihong Kai, Soung Chang Liew:

Temporal Starvation in CSMA Wireless Networks. - Barbara Petit:

Semantics of Typed Lambda-Calculus with Constructors. - Kapil Netaji Vhatkar, Girish P. Bhole:

Internal Location Based System for Mobile Devices Using Passive RFID. - Carlo A. Furia, Alberto Leva, Martina Maggio, Paola Spoletini:

A control-theoretical methodology for the scheduling problem. - Felipe A. Cruz, Simon K. Layton, Lorena A. Barba:

How to obtain efficient GPU kernels: an illustration using FMM & FGT algorithms. - Amit Chakrabarti, Oded Regev:

An Optimal Lower Bound on the Communication Complexity of Gap-Hamming-Distance. - Manuel Mazzara, Anirban Bhattacharyya:

On Modelling and Analysis of Dynamic Reconfiguration of Dependable Real-Time Systems. - Albert Sunny, Joy Kuri, Saurabh Aggarwal:

Delay Modelling for Single Cell IEEE 802.11 WLANs Using a Random Polling System. - Erin W. Chambers, Alejandro Erickson, Sándor P. Fekete, Jonathan Lenchner, Jeff Sember, Srinivasan Venkatesh, Ulrike Stege, Svetlana Stolpner, Christophe Weibel, Sue Whitesides:

Connectivity graphs of uncertainty regions. - Meisam Razaviyayn, Maziar Sanjabi, Zhi-Quan Luo:

Linear Transceiver Design for Interference Alignment: Complexity and Computation. - Myunghwan Kim, Jure Leskovec:

Multiplicative Attribute Graph Model of Real-World Networks. - Krishnam Raju Jampani, Anna Lubiw:

Simultaneous Interval Graphs. - Boyu Li, Hong Ju Park, Ender Ayanoglu:

Reduced Complexity Decoding for Bit-Interleaved Coded Multiple Beamforming with Constellation Precoding. - (Withdrawn) Safe Feature Elimination in Sparse Supervised Learning.

- Boyu Li, Ender Ayanoglu:

Bit-Interleaved Coded Multiple Beamforming with Perfect Coding. - Han-Shin Jo, Ping Xia, Jeffrey G. Andrews:

Open, Closed, and Shared Access Femtocells in the Downlink. - M. Amin Khajehnejad, Weiyu Xu, Amir Salman Avestimehr, Babak Hassibi:

Analyzing Weighted ℓ1 Minimization for Sparse Recovery with Nonuniform Sparse Models. - Michael T. Goodrich, Darren Strash:

Priority Range Trees. - Fangying Xiao, Hanwu Chen:

Is A Quantum Stabilizer Code Degenerate or Nondegenerate for Pauli Channel? - Behrang Parhizkar, Abdulbasit Mohammad Abdulrahman Alazizi, Mohammad Nabil Sadegh Ali, Anand Ramachandran, Sujata Navaratnam:

PC 2 Phone Event Announcer. - Sungwook Moon, Ahmed Helmy:

Mobile Testbeds with an Attitude. - Frédéric Bastien, Yoshua Bengio, Arnaud Bergeron, Nicolas Boulanger-Lewandowski, Thomas M. Breuel, Youssouf Chherawala, Moustapha Cissé, Myriam Côté, Dumitru Erhan, Jeremy Eustache, Xavier Glorot, Xavier Muller, Sylvain Pannetier Lebeuf, Razvan Pascanu, Salah Rifai, François Savard, Guillaume Sicard:

Deep Self-Taught Learning for Handwritten Character Recognition. - Hamed Maleki, Syed Ali Jafar, Shlomo Shamai:

Retrospective Interference Alignment. - Pranjal Awasthi, Avrim Blum, Or Sheffet:

Center-based Clustering under Perturbation Stability. - Hugo Gouveia, Nelma Moreira

, Rogério Reis
:
Small NFAs from Regular Expressions: Some Experimental Results. - Fang Liu, Daiyuan Peng, Zhengchun Zhou, Xiaohu Tang:

Construction of Frequency Hopping Sequence Set Based upon Generalized Cyclotomy. - (Withdrawn) Geometric Decision Tree.

- Wei Gao, Zhi-Hua Zhou:

The kth, Median and Average Margin Bounds for AdaBoost. - Daniel Reichman:

Influence is a Matter of Degree: New Algorithms for Activation Problems. - (Withdrawn) A Survey on Low-cost RFID Authentication Protocols.

- Bo'az Klartag, Oded Regev:

Quantum One-Way Communication is Exponentially Stronger Than Classical Communication. - M. Zeeshan Shakir, Tariq S. Durrani:

MIMO Identical Eigenmode Transmission System (IETS) - A Channel Decomposition Perspective. - Christine Bachoc, Venkat Chandar, Gérard D. Cohen, Patrick Solé, Aslan Tchamkerten:

On Bounded Weight Codes. - Tanu Malik, Xiaodan Wang, Philip Little, Amitabh Chaudhary, Ani Thakar:

A Dynamic Data Middleware Cache for Rapidly-growing Scientific Repositories. - Aaron Grunthal:

Efficient Indexing of the BitTorrent Distributed Hash Table. - Richard Garner:

An abstract view on syntax with sharing. - Xiaowen Han, David Zhu, Cuifeng Zhou:

3-SAT Polynomial Solution of Knowledge Recognition Algorithm. - Zhihui Hao, Chunhua Shen, Nick Barnes, Bo Wang:

Totally Corrective Multiclass Boosting with Binary Weak Learners. - Jocelyn Simmonds, Shoham Ben-David, Marsha Chechik:

Optimizing Computation of Recovery Plans for BPEL Applications. 3-14 - Yi-Hsun Wang, Ching-Hao Mao, Hahn-Ming Lee:

Structural Learning of Attack Vectors for Generating Mutated XSS Attacks. 15-26 - Raymond Mui, Phyllis G. Frankl:

Preventing SQL Injection through Automatic Query Sanitization with ASSIST. 27-38 - Xiang Fu:

Relational Constraint Driven Test Case Synthesis for Web Applications. 39-50 - Benjamin Kersten, Michael Goedicke:

Browser-based Analysis of Web Framework Applications. 51-62 - Ben Rubinger, Tevfik Bultan:

Contracting the Facebook API. 63-74 - Gwen Salaün:

Analysis and Verification of Service Interaction Protocols - A Brief Survey. 75-86 - Prasad Krishnan, B. Sundar Rajan:

Network-Error Correcting Codes using Small Fields. - Georg Böcherer, Rudolf Mathar:

Matching Sources to Channels. - Peter Biener, François Degrave, Wim Vanhoof:

A Test Automation Framework for Mercury. - Petra Hofstedt:

Realizing evaluation strategies by hierarchical graph rewriting. - Nicos Angelopoulos, Paul Taylor:

An extensible web interface for databases and its application to storing biochemical data. - Paulo Moura

:
Towards a Study of Meta-Predicate Semantics. - Mostafa Zaman Chowdhury, Yeong Min Jang:

Handover Control for WCDMA Femtocell Networks. - Ali ParandehGheibi, Mohammad Ali Akhaee, Ali Ayremlou, Mohammad Amin Rahimian, Farokh Marvasti:

Improved Iterative Techniques to Compensate for Interpolation Distortions. - Jan Wielemaker, Vítor Santos Costa

:
Portability of Prolog programs: theory and case-studies. - Mohammad Amin Rahimian, Ali Ayremlou, Farokh Marvasti:

A General Analog Network Coding for Wireless Systems with Fading and Noisy Channels. - Dimitar Sht. Shterionov, Angelika Kimmig, Theofrastos Mantadelis, Gerda Janssens:

DNF Sampling for ProbLog Inference. - Vasco Pedro, Salvador Abreu

:
Distributed Work Stealing for Constraint Solving. - Yuzhao Ni, Ju Sun, Xiaotong Yuan, Shuicheng Yan, Loong Fah Cheong:

Robust Low-Rank Subspace Segmentation with Semidefinite Guarantees. - Paulo André, Salvador Abreu:

Casting of the WAM as an EAM. - (Withdrawn) One, Two, Three and N Dimensional String Search Algorithms.

- Md. Saiful Islam, Muhammad Mahbubur Rahman, Zerina Begum, Mohd. Zulfiquar Hafiz:

Fault Tolerant Variable Block Carry Skip Logic (VBCSL) using Parity Preserving Reversible Gates. - Sergio Giro:

An algorithmic approximation of the infimum reachability probability for Probabilistic Finite Automata. - Virgile Garcia, Jean-Marie Gorce, Nikolai Lebedev:

Outage Probability for Multi-Cell Processing under Rayleigh Fading. - Chang-Ching Chen, Chia-Shiang Tseng, Che Lin:

A General Proof of Convergence for Adaptive Distributed Beamforming Schemes. - Joffrey Villard, Pablo Piantanida:

Secure Lossy Source Coding with Side Information at the Decoders. - Nathan Srebro, Karthik Sridharan, Ambuj Tewari:

Smoothness, Low-Noise and Fast Rates. - Manuel Mazzara:

Deriving Specifications of Dependable Systems: toward a Method. - Sergey Loyka, George Levin:

Finite-SNR Diversity-Multiplexing Tradeoff via Asymptotic Analysis of Large MIMO Systems. - Ji Zhu, Mudhakar Srivatsa:

Quantifying Information Leakage in Finite Order Deterministic Programs. - Konrad Rawlik, Marc Toussaint, Sethu Vijayakumar:

Approximate Inference and Stochastic Optimal Control. - Wenzhuo Ouyang, Sugumar Murugesan, Atilla Eryilmaz, Ness B. Shroff:

Exploiting Channel Memory for Joint Estimation and Scheduling in Downlink Networks. - Marco Levorato, Daniel O'Neill, Andrea J. Goldsmith, Urbashi Mitra:

Optimization of ARQ Protocols in Interference Networks with QoS Constraints. - Peter Csaba Ölveczky:

Proceedings First International Workshop on Rewriting Techniques for Real-Time Systems, RTRTS 2010, Longyearbyen, Norway, April 6-9, 2010. EPTCS 36, 2010 [contents] - Hieu Dinh, Sanguthevar Rajasekaran:

A memory-efficient data structure representing exact-match overlap graphs with application for next generation DNA assembly. - Eric Filiol:

Malicious cryptography techniques for unreversable (malicious or not) binaries. - Frank Nielsen:

A family of statistical symmetric divergences based on Jensen's inequality. - Geoffroy Gueguen:

Van Wijngaarden grammars, metamorphism and K-ary malwares. - Hiroyasu Inoue:

An Analysis of Transaction and Joint-patent Application Networks. - Sandra González-Bailón, Rafael E. Banchs, Andreas Kaltenbrunner:

Emotional Reactions and the Pulse of Public Opinion: Measuring the Impact of Political Events on the Sentiment of Online Discussions. - Germán Vidal, Neng-Fa Zhou:

Proceedings of CICLOPS-WLPE 2010. - Lu Lu, Soung Chang Liew, Shengli Zhang:

Channel-coded Collision Resolution by Exploiting Symbol Misalignment. - Zeeshan Ahmed:

A Middleware road towards Web (Grid) Services. - Kashif Mahmood, Amr Rizk, Yuming Jiang:

On the Flow-Level Delay of a Spatial Multiplexing MIMO Wireless Channel. - Björn Andres, Jörg H. Kappes, Ullrich Köthe, Fred A. Hamprecht:

The Lazy Flipper: MAP Inference in Higher-Order Graphical Models by Depth-limited Exhaustive Search. - Siddhartan Govindasamy, Daniel W. Bliss, David H. Staelin:

Asymptotic Spectral Efficiency of Multi-antenna Links in Wireless Networks with Limited Tx CSI. - Saeed Alaei, Azarakhsh Malekian:

Maximizing Sequence-Submodular Functions and its Application to Online Advertising. - Gene S. Kopp, John D. Wiltshire-Gordon:

When can several people simulate a private random oracle for someone else? - Pramod Ganapathi, Rama B:

A Versatile Algorithm to Generate Various Combinatorial Structures. - Laurent El Ghaoui, Vivian Viallon, Tarek Rabbani:

Safe Feature Elimination in Sparse Supervised Learning. - Martin Wirsing, Sebastian S. Bauer, Andreas Schroeder:

Modeling and Analyzing Adaptive User-Centric Systems in Real-Time Maude. 1-25 - Musab AlTurki, José Meseguer:

Dist-Orc: A Rewriting-based Distributed Implementation of Orc with Formal Analysis. 26-45 - Kyungmin Bae, Peter Csaba Ölveczky:

Extending the Real-Time Maude Semantics of Ptolemy to Hierarchical DE Models. 46-66 - Joakim Bjørk, Einar Broch Johnsen, Olaf Owe

, Rudolf Schlatte:
Lightweight Time Modeling in Timed Creol. 67-81 - Muhammad Fadlisyah, Erika Ábrahám

, Daniela Lepri, Peter Csaba Ölveczky:
A Rewriting-Logic-Based Technique for Modeling Thermal Systems. 82-100 - Daniela Lepri, Peter Csaba Ölveczky, Erika Ábrahám

:
Model Checking Classes of Metric LTL Properties of Object-Oriented Real-Time Maude Specifications. 117-136 - Peter Csaba Ölveczky, José Meseguer:

Specification and Verification of Distributed Embedded Systems: A Traffic Intersection Product Family. 137-157 - Mu Sun, José Meseguer:

Distributed Real-Time Emulation of Formally-Defined Patterns for Safe Medical Device Control. 158-177 - (Withdrawn) Rank-Constrained Schur-Convex Optimization with Multiple Trace/Log-Det Constraints.

- I-Hsiang Wang:

Distributed Interference Cancellation in Multiple Access Channel with Transmitter Cooperation. - (Withdrawn) Tree-Structure Expectation Propagation for LDPC Decoding in Erasure Channels.

- Eddy Chiu, Vincent K. N. Lau, Huang Huang, Tao Wu, Sheng Liu:

Robust Transceiver Design for K-Pairs Quasi-Static MIMO Interference Channels via Semi-Definite Relaxation. - Mst. Farhana Rahman, S. M. Masud Karim, Kazi Shah Nawaz Ripon, Md. Iqbal Hossain Suvo:

Performance Analysis of Estimation of Distribution Algorithm and Genetic Algorithm in Zone Routing Protocol. - Byung-Hak Kim, Henry D. Pfister:

An Iterative Joint Linear-Programming Decoding of LDPC Codes and Finite-State Channels. - Ho-Leung Chan, Nicole Megow, Rob van Stee, René Sitters:

The Sorting Buffer Problem is NP-hard. - Arun S. Maiya, Tanya Y. Berger-Wolf:

Expansion and Search in Networks. - Minyu Fang, David Malone, Ken R. Duffy, Douglas J. Leith:

Decentralised Learning MACs for Collision-free Access in WLANs. - Olivier Laurent:

Game semantics for first-order logic. - Arseny M. Shur:

Numerical values of the growth rates of power-free languages. - Florent Becker, Martín Matamala, Nicolas Nisse, Ivan Rapaport, Karol Suchan

, Ioan Todinca:
Adding a referee to an interconnection network: What can(not) be computed in one round. - Subhash C. Kak:

Unary Coding for Neural Network Learning. - Arunabha Sen, Pavel Ghosh, Tiffany Silva, Nibedita Das, Anjan Kundu:

Architecture and Algorithms for an Airborne Network. - Davide Barbieri, Daniela Tuninetti:

On Repetition Protocols and Power Control for Multiple Access Block-Fading Channels. - Bernhard Haeupler, Krishnam Raju Jampani, Anna Lubiw:

Testing Simultaneous Planarity when the Common Graph is 2-Connected. - S. M. Kamruzzaman:

An Energy Efficient Multichannel MAC Protocol for Cognitive Radio Ad Hoc Networks. - S. M. Kamruzzaman:

CR-MAC: A multichannel MAC protocol for cognitive radio ad hoc networks. - Monica, Ajay K. Sharma:

Comparative Investigation for Energy Consumption of Different Chipsets Based on Scheduling for Wireless Sensor Networks. - Ulrich M. Schwarz:

A PTAS for Scheduling with Tree Assignment Restrictions. - Maxime Gautier, Alexandre Janot, Pierre-Olivier Vandanjon:

A new closed-loop output error method for parameter identification of robot dynamics. - S. Ayyasamy, S. N. Sivanandam:

A Cluster Based Replication Architecture for Load Balancing in Peer-to-Peer Content Distribution. - Abu Bakar Siddiquee, Md. Ehsanul Hoque Mazumder, S. M. Kamruzzaman:

A Constructive Algorithm for Feedforward Neural Networks for Medical Diagnostic Reasoning. - S. M. Kamruzzaman, Md. Monirul Islam:

An Algorithm to Extract Rules from Artificial Neural Networks for Medical Diagnosis Problems. - Saber Jafarizadeh, Abbas Jamalipour:

Fastest Distributed Consensus on Star-Mesh Hybrid Sensor Networks. - S. M. Kamruzzaman, Md. Monirul Islam:

Extraction of Symbolic Rules from Artificial Neural Networks. - S. M. Kamruzzaman, Ahmed Ryadh Hasan, Abu Bakar Siddiquee, Md. Ehsanul Hoque Mazumder:

Medical diagnosis using neural network. - S. M. Kamruzzaman, Farhana Haider:

A hybrid learning algorithm for text classification. - Mohammed El Hassouni, Driss Aboutajdine:

3D-Mesh denoising using an improved vertex based anisotropic diffusion. - Chowdhury Mofizur Rahman, Ferdous Ahmed Sohel, Parvez Naushad, S. M. Kamruzzaman:

Text Classification using the Concept of Association Rule of Data Mining. - Md. Hijbul Alam, Abdul Kadar Muhammad Masum, Mohammad Mahadi Hassan, S. M. Kamruzzaman:

Optimal Bangla Keyboard Layout using Association Rule of Data Mining. - Muhammad Abul Kalam Azad, Rezwana Sharmeen, Shabbir Ahmad, S. M. Kamruzzaman:

A Unique 10 Segment Display for Bengali Numerals. - Henrik Schulze:

Diversity Spectra of Spatial Multipath Fading Processes. - Pascal Giorgi:

On Polynomial Multiplication in Chebyshev Basis. - Michael Katelman, José Meseguer:

Using the PALS Architecture to Verify a Distributed Topology Control Protocol for Wireless Multi-Hop Networks in the Presence of Node Failures. 101-116 - Amelia Carolina Sparavigna:

Geoglyphs of Titicaca as an ancient example of graphic design. - Maria-Florina Balcan, Florin Constantin:

Sequential item pricing for unlimited supply. - Vishwambhar Rathi, Mattias Andersson, Ragnar Thobaben, Jörg Kliewer, Mikael Skoglund:

Performance Analysis and Design of Two Edge Type LDPC Codes for the BEC Wiretap Channel. - Alberto Calvi, Silvio Ranise, Luca Viganò:

Automated Validation of Security-sensitive Web Services specified in BPEL and RBAC (Extended Version). - Mohammad Noshad, Kambiz Jamshidi:

Novel Codes Family for Modified Spectral-Amplitude-Coding OCDMA Systems and Performance Analysis. - Constandinos X. Mavromoustakis, Helen D. Karatza:

A Gossip-based optimistic replication for efficient delay-sensitive streaming using an interactive middleware support system. - Tapas Kumar Patra, Joy Kuri:

Threshold Policy for Route Discovery Initiation in Mobile Ad hoc Networks. - Victor Boyarshinov, Malik Magdon-Ismail:

Efficient Computation of Optimal Trading Strategies. - Konstantin Biatov:

A Fast Audio Clustering Using Vector Quantization and Second Order Statistics. - Eitan Altman, Rachid El Azouzi, Daniel Sadoc Menasché, Yuedong Xu:

Forever Young: Aging Control In DTNs. - Romain Tavenard, Laurent Amsaleg

, Hervé Jégou:
Balancing clusters to reduce response time variability in large scale image search. - Vikram Dhillon:

Modeling Instantaneous Changes In Natural Scenes. - Jun Liu, Jieping Ye:

Efficient L1/Lq Norm Regularization. - Huyen Chi Bui, Jérôme Lacan, Marie-Laure Boucheret:

NCSA: A New Protocol for Random Multiple Access Based on Physical Layer Network Coding. - Yin Sun, Xiaofeng Zhong, Yunzhou Li, Shidong Zhou, Xibin Xu:

Spectrum Sharing between Cooperative Relay and Ad-hoc Networks: Dynamic Transmissions under Computation and Signaling Limitations. - Itamar Berger, Bosmat Eldar, Gal Zohar, Barak Raveh, Dan Halperin:

Improving the Quality of Non-Holonomic Motion by Hybridizing C-PRM Paths. - Masayuki Karasuyama, Naoyuki Harada, Masashi Sugiyama, Ichiro Takeuchi:

Multi-parametric Solution-path Algorithm for Instance-weighted Support Vector Machines. - Zoltán Ésik, Werner Kuich:

Free inductive K-semialgebras. - João Carreira, Adrian Ion, Cristian Sminchisescu:

Image Segmentation by Discounted Cumulative Ranking on Maximal Cliques. - B. K. Pradeepa, Joy Kuri:

TCP-controlled Long File Transfer Throughput in Multirate WLANs with Nonzero Round Trip Propagation Delays. - Slavcho Shtrakov, Jörg Koppitz:

Symmetric functions with non-trivial arity gap. - Timon Hertli, Robin A. Moser, Dominik Scheder:

Improving PPSZ for 3-SAT using Crtitical Variables. - Omer Khalid, Ivo Maljevic, Richard J. Anthony, Miltos Petridis, Kevin Parrott, Markus Schulz:

Dynamic scheduling of virtual machines running hpc workloads in scientific grids. - Omer Khalid, Ivo Maljevic, Richard J. Anthony, Miltos Petridis, Kevin Parrott, Markus Schulz:

Deadline aware virtual machine scheduler for scientific grids and cloud computing. - Tobias Baumgartner, Sándor P. Fekete, Tom Kamphans, Alexander Kroeller, Max Pagel:

Hallway Monitoring: Distributed Data Processing with Wireless Sensor Networks. - Andreas Steck, Christian Schlegel:

Towards Quality of Service and Resource Aware Robotic Systems through Model-Driven Software Development. - Gerald Paul:

An Efficient Implementation of the Robust Tabu Search Heuristic for Sparse Quadratic Assignment Problems. - Sanat Sarangi

, Subrat Kar:
Location Estimation with Reactive Routing in Resource Constrained Sensor Networks. - Dongyue Xue, Eylem Ekici:

Delay-Guaranteed Cross-Layer Scheduling in Multi-Hop Wireless Networks. - S. M. Kamruzzaman:

RGANN: An Efficient Algorithm to Extract Rules from ANNs. - S. M. Kamruzzaman:

Text Classification using Artificial Intelligence. - Yang Hu, Yimin Liu, Huadong Meng:

High Range Resolution Profiling for Stepped-Frequency Radar with Sparse Reconstruction. - Quan-Lin Li:

Doubly Exponential Solution for Randomized Load Balancing Models with Markovian Arrival Processes and PH Service Times. - Saber Jafarizadeh:

Fastest Distributed Consensus on Petal Networks. - S. M. Kamruzzaman, A. N. M. Rezaul Karim, Md. Saiful Islam, Md. Emdadul Haque:

Speaker Identification using MFCC-Domain Support Vector Machine. - S. M. Kamruzzaman, Md. Anisur Rahman:

Performance Analysis of Pulse Shaping Technique for OFDM PAPR Reduction. - S. M. Kamruzzaman, Firoz Ahmed Siddiqi, Md. Saiful Islam, Md. Emdadul Haque, Mohammad Shamsul Alam:

Rotation Invariant Face Detection Using Wavelet, PCA and Radial Basis Function Networks. - S. M. Kamruzzaman, Farhana Haider, Ahmed Ryadh Hasan:

Text Classification using Association Rule with a Hybrid Concept of Naive Bayes Classifier and Genetic Algorithm. - Muhammad Abul Kalam Azad, Rezwana Sharmeen, S. M. Kamruzzaman:

Universal Numeric Segmented Display. - S. M. Kamruzzaman:

Extracting Symbolic Rules for Medical Diagnosis Problem. - Muhammad Abul Kalam Azad, Rezwana Sharmeen, Shabbir Ahmad, S. M. Kamruzzaman:

Smart Bengali Cell Phone Keypad Layout. - Rezwana Sharmeen, Muhammad Abul Kalam Azad, Shabbir Ahmad, S. M. Kamruzzaman:

Completely Enhanced Cell Phone Keypad. - Muhammad Abul Kalam Azad, Rezwana Sharmeen, Shabbir Ahmad, S. M. Kamruzzaman:

An Efficient Technique for Text Compression. - S. M. Kamruzzaman, Md. Hijbul Alam, Abdul Kadar Muhammad Masum, Md. Mahadi Hassan:

Optimal Bangla Keyboard Layout using Data Mining Technique. - S. M. Kamruzzaman, Ahmed Ryadh Hasan:

Pattern Classification using Simplified Neural Networks. - S. M. Kamruzzaman, Ahmed Ryadh Hasan:

Rule Extraction using Artificial Neural Networks. - S. M. Kamruzzaman, Farhana Haider, Ahmed Ryadh Hasan:

Text Classification using Data Mining. - S. M. Kamruzzaman:

REx: An Efficient Rule Generator. - S. M. Kamruzzaman:

Web Page Categorization Using Artificial Neural Networks. - S. M. Anamul Haque, S. M. Kamruzzaman, Md. Ashraful Islam:

A System for Smart Home Control of Appliances based on Timer and Speech Interaction. - S. M. Kamruzzaman, Chowdhury Mofizur Rahman:

Text Categorization using Association Rule and Naive Bayes Classifier. - Philipp Schaer, Philipp Mayr, Peter Mutschke:

Demonstrating a Service-Enhanced Retrieval System. - Henrik Mühe, Andreas Angerer, Alwin Hoffmann, Wolfgang Reif:

On reverse-engineering the KUKA Robot Language. - B. K. Pradeepa, Joy Kuri:

Bulk File Download Throughput in a Single Station WLAN with Nonzero Propagation Delay. - Qi Ge, Daniel Stefankovic:

The Complexity of Counting Eulerian Tours in 4-Regular Graphs. - Samir Medina Perlaza, Hamidou Tembine, Samson Lasaulce, Victor Manuel Quintero Florez:

On the Fictitious Play and Channel Selection Games. - Sophie Toulouse, Roberto Wolfler Calvo:

On the complexity of the multiple stack TSP, kSTSP. - Sophie Toulouse:

Approximability of the Multiple Stack TSP. - Imen Harbaoui Dridi, Ryan Kammarti, Mekki Ksouri, Pierre Borne:

A Genetic Algorithm for the Multi-Pickup and Delivery Problem with time windows. - B. V. Ashwinkumar:

Buyback Problem - Approximate matroid intersection with cancellation costs. - Abdul Kadar Muhammad Masum, Mohammad Mahadi Hassan, S. M. Kamruzzaman:

The Most Advantageous Bangla Keyboard Layout Using Data Mining Technique. - Kamrul Hasan Talukder:

Bus Protocols: MSC-Based Specifications and Translation into Program of Verification Tool for Formal Verification. - Shamim Hasnat Ripon, Kamrul Hasan Talukder, M. Khademul Islam Molla:

Modelling Variability for System Families. - Avik Chakraborty:

Testing of Bridging Faults in AND-EXOR based Reversible Logic Circuits. - Daniil Musatov:

Theorems about space-bounded Kolmogorov complexity obtained by "naive" derandomization. - (Withdrawn) Opportunistic Interference Alignment for $K$-user Interference Networks.

- (Withdrawn) FAST: Kernelization based on Graph Modular Decomposition.

- Yonghui Li, Raymond H. Y. Louie, Branka Vucetic:

Relay Selection with Network Coding in Two-Way Relay Channels. - Ali Tajer, Narayan Prasad, Xiaodong Wang:

Robust Linear Precoder Design for Multi-cell Downlink Transmission. - Eya Ben Ahmed, Mohamed Salah Gouider:

Towards an incremental maintenance of cyclic association rules. - Ramachandran Rajesh, Vinod Sharma:

Information Capacity of Energy Harvesting Sensor Nodes. - Konstantin Voevodski, Maria-Florina Balcan, Heiko Röglin, Shang-Hua Teng, Yu Xia:

Efficient Clustering with Limited Distance Information. - Florian Reitz:

A Framework for an Ego-centered and Time-aware Visualization of Relations in Arbitrary Data Repositories. - Stéphane Demri, Alexander Rabinovich

:
The complexity of linear-time temporal logic over the class of ordinals. - Evmorfia N. Argyriou, Michael A. Bekos, Antonios Symvonis:

The Straight-Line RAC Drawing Problem is NP-Hard. - Nassib Nassar:

A Simple Abstraction for Data Modeling. - Xintao Liu, Bin Jiang:

Defining and Generating Axial Lines from Street Center Lines for better Understanding of Urban Morphologies. - Yong Fang:

Approximation of DAC Codeword Distribution for Equiprobable Binary Sources along Proper Decoding Paths. - Xin Liu, Ying Ding, Forrest Sheng Bao:

General Scaled Support Vector Machines. - Mladen Nikolic:

Measuring Similarity of Graphs and their Nodes by Neighbor Matching. - Albert Sunny, Joy Kuri, Saurabh Aggarwal:

Application Delay Modelling for Variable Length Packets in Single Cell IEEE 802.11 WLANs. - Somayeh Fatahi, Ali Reza Manashty, Zahra Forootan Jahromi:

Vast Educational Mobile Content Broadcasting using ARMrayan Multimedia Mobile CMS. - Mateus de Oliveira Oliveira:

Canonizable Partial Order Generators. - Murugesan Kuttikrishnan:

A Novel Approach for Cardiac Disease Prediction and Classification Using Intelligent Agents. - Ali Reza Manashty, Mohammad Reza Ahmadzadeh Raji, Zahra Forootan Jahromi, Amir Rajabzadeh:

ARMrayan Multimedia Mobile CMS: a Simplified Approach towards Content-Oriented Mobile Application Designing. - Philipp Mayr, Benjamin Zapilko, York Sure:

Establishing a Multi-Thesauri-Scenario based on SKOS and Cross-Concordances. - Tugkan Batu, Lance Fortnow, Ronitt Rubinfeld, Warren D. Smith, Patrick White:

Testing Closeness of Discrete Distributions. - Ali Reza Manashty, Amir Rajabzadeh, Zahra Forootan Jahromi:

A Scenario-Based Mobile Application for Robot-Assisted Smart Digital Homes. - Christina Aperjis, Bernardo A. Huberman:

Social Attention and the Provider's Dilemma. - Eric Brochu, Matthew W. Hoffman, Nando de Freitas:

Portfolio Allocation for Bayesian Optimization. - Serguei A. Mokhov, Joey Paquet, Mourad Debbabi:

The Need to Support of Data Flow Graph Visualization of Forensic Lucid Programs, Forensic Evidence, and their Evaluation by GIPSY. - Guohun Zhu:

Determining All Maximum Uniquely Restricted Matching in Bipartite Graphs. - Paul Merolla, Tristan Ursell, John V. Arthur:

The thermodynamic temperature of a rhythmic spiking network. - Sándor Soós, George Kampis:

Diversity and Polarization of Research Performance: Evidence from Hungary. - Amr Elmasry, Arash Farzan, John Iacono:

Priority Queues with Multiple Time Fingers. - Amir Rajabzadeh, Ali Reza Manashty, Zahra Forootan Jahromi:

A Mobile Application for Smart House Remote Control System. - Thomas Hugel, Yacine Boufkhad:

Second Moment Method on k-SAT: a General Framework. - Pierre Guillon, Pierre-Etienne Meunier, Guillaume Theyssier:

Clandestine Simulations in Cellular Automata. - Erik D. Demaine, Sándor P. Fekete, Günter Rote, Nils Schweer, Daria Schymura, Mariano Zelke:

Integer Point Sets Minimizing Average Pairwise L1-Distance: What is the Optimal Shape of a Town? - Tomás Brázdil, Václav Brozek, Kousha Etessami:

One-Counter Stochastic Games. - Simon R. Thorne:

Defending the future: An MSc module in End User Computing Risk Management. - Dermot Balson:

Changing User Attitudes to Reduce Spreadsheet Risk. - Angus Dunn:

Spreadsheets - the Good, the Bad and the Downright Ugly. - Roland Kays, Sameer Tilak, Bart Kranstauber, Patrick A. Jansen, Chris Carbone, Marcus J. Rowcliffe, Tony Fountain, Jay Eggert, Zhihai He:

Monitoring wild animal communities with arrays of motion sensitive camera traps. - Nishant Doshi:

A secure email login system using virtual password. - Deeparnab Chakrabarty, Chandra Chekuri, Sanjeev Khanna, Nitish Korula:

Approximability of Capacitated Network Design. - Sakrapee Paisitkriangkrai, Chunhua Shen, Jian Zhang:

Face Detection with Effective Feature Extraction. - Arseny M. Shur:

On ternary square-free circular words. - Shun Watanabe, Yasutada Oohama:

Secret Key Agreement from Vector Gaussian Sources by Rate Limited Public Communication. - Matthew D. Hoffman:

Approximate Maximum A Posteriori Inference with Entropic Priors. - Jiaji Wu, Yan Xing, Anand Paul, Yong Fang, Jechang Jeong, Licheng Jiao, Guangming Shi:

Morphological dilation image coding with context weights prediction. - Brian M. Kurkoski:

The E8 Lattice and Error Correction in Multi-Level Flash Memory. - Nicholas Mastronarde, Mihaela van der Schaar:

Fast Reinforcement Learning for Energy-Efficient Wireless Communications. - Martin R. Ehmsen, Jens S. Kohrt, Kim S. Larsen:

List Factoring and Relative Worst Order Analysis. - Yoram Bachrach, Ely Porat:

Fast Pseudo-Random Fingerprints. - Elena Dubrova:

Synthesis of Binary k-Stage Machines. - Yasutada Oohama, Shun Watanabe:

Capacity Results for Relay Channels with Confidential Messages. - Tobias Baumgartner, Sándor P. Fekete, Winfried Hellmann, Alexander Kroeller:

Simultaneous Event Execution in Heterogeneous Wireless Sensor Networks. - Jérémy Barbay, Johannes Fischer:

LRM-Trees: Compressed Indices, Adaptive Sorting, and Compressed Permutations. - Adrian Heissler:

Performance analysis of Xen virtual machines in real-world scenarios. - Leonid A. Levin:

Some Theorems on the Algorithmic Approach to Probability Theory and Information Theory. - Jiaming Xu, Jun Zhang, Jeffrey G. Andrews:

On the Accuracy of the Wyner Model in Cellular Networks. - J. M. Christian Bastien:

Usability testing: a review of some methodological and technical aspects of the method. - Mahdi Lotfinezhad, Peter Marbach:

Throughput-Optimal Random Access with Order-Optimal Delay. - Gam D. Nguyen:

Fast CRCs (Extended Version). - Xiugang Wu, Liang-Liang Xie:

On the Optimality of Successive Decoding in Compress-and-Forward Relay Schemes. - Raphael Pelossof, Zhiliang Ying:

The Attentive Perceptron. - Omur Ozel, Sennur Ulukus:

Information-Theoretic Analysis of an Energy Harvesting Communication System. - Jianshu Chen, Jian Wang, Xiuming Shan, Ning Ge, Xiang-Gen Xia:

Performance Analysis of the Matrix Pair Beamformer with Matrix Mismatch. - Reza Khosravi-Farsani, Farokh Marvasti:

Multiple Access Channels with Cooperative Encoders and Channel State Information. - Murat Kayri, Ismail Kayri:

A proposed "osi based" network troubles identification model. - Pavel Chebotarev:

Comments on "Consensus and Cooperation in Networked Multi-Agent Systems". - Sharmila Sankar, V. Sankaranarayanan:

A Low Overhead Reachability Guaranteed Dynamic Route Discovery Mechanism for Dense MANETs. - Jesus Selva:

Efficient Sampling of Band-limited Signals from Sine Wave Crossings. - Virag Shah, Bikash Kumar Dey, D. Manjunath:

Network Flows for Functions. - Jian Wang, Jianshu Chen, Jian Yuan, Ning Ge, Shuangqing Wei:

A Multi-Interference-Channel Matrix Pair Beamformer for CDMA Systems. - Prasun Chowdhury, Iti Saha Misra:

A Fair and Efficient Packet Scheduling Scheme for IEEE 802.16 Broadband Wireless Access Systems. - Novella Bartolini, Tiziana Calamoneri, Tom La Porta, Chiara Petrioli, Simone Silvestri:

Sensor Activation and Radius Adaptation (SARA) in Heterogeneous Sensor Networks. - M. A. Cerdà-Uguet, Michel P. Schellekens, Óscar Valero:

The Baire partial quasi-metric space: A mathematical tool for asymptotic complexity analysis in Computer Science. - Tobias Marschall, Sven Rahmann:

Exact Analysis of Pattern Matching Algorithms with Probabilistic Arithmetic Automata. - Clifton Phua, Vincent C. S. Lee, Kate Smith-Miles, Ross W. Gayler:

A Comprehensive Survey of Data Mining-based Fraud Detection Research. - Hong Jiang:

Efficient Knowledge Base Management in DCSP. - Indranil Hatai, Indrajit Chakrabarti:

Multi-standard programmable baseband modulator for next generation wireless communication. - Muhammad Shoaib Saleem, Éric Renault, Djamal Zeghlache:

NetInf Mobile Node Architecture and Mobility Management based on LISP Mobile Node. - Alwen Tiu, Alberto Momigliano:

Cut Elimination for a Logic with Induction and Co-induction. - Qing Chen, Mustafa Cenk Gursoy:

Goodput Maximization in Cooperative Networks with ARQ. - S. M. Thamarai, Kuppusamy Krishnamoorthy, T. Meyyappan:

Heuristic approach to optimize the number of test cases for simple circuits. - Junwei Zhang, Mustafa Cenk Gursoy:

Secure Relay Beamforming over Cognitive Radio Channels. - Junwei Zhang, Mustafa Cenk Gursoy:

Optimal Power Allocation for Secrecy Fading Channels Under Spectrum-Sharing Constraints. - Deli Qiao, Mustafa Cenk Gursoy, Senem Velipasalar:

Channel Coding over Multiple Coherence Blocks with Queueing Constraints. - Deli Qiao, Mustafa Cenk Gursoy, Senem Velipasalar:

On the Effective Capacity of Two-Hop Communication Systems. - Björn Andres, Ullrich Köthe, Thorben Kröger, Fred A. Hamprecht:

How to Extract the Geometry and Topology from Very Large 3D Segmentations. - H. G. Rangaraju, U. Venugopal, K. N. Muralidhara, K. B. Raja:

Low Power Reversible Parallel Binary Adder/Subtractor. - Keyvan Yahya, Jafar Biazar, Hossein Azari, Pouyan Rafiei Fard:

Variational Iteration Method for Image Restoration. - Jonathan Chappelon, Akihiro Matsuura:

On generalized Frame-Stewart numbers. - Xiao-Shan Gao, Wei Li, Chun-Ming Yuan:

Intersection Theory for Generic Differential Polynomials and Differential Chow Form. - Laurent Decreusefond, Philippe Martins, Than-Tung Vu:

An analytical model for evaluating outage and handover probability of cellular wireless networks. - Pablo Sánchez-Moreno, Daniel Manzano, Jesús Sánchez-Dehesa:

Direct spreading measures of Laguerre polynomials. - Matt DeVos, Stéphan Thomassé:

Edge Growth in Graph Cubes. - Kazuo Iwama, Harumichi Nishimura, Rudy Raymond, Junichi Teruyama:

Quantum Counterfeit Coin Problems. - Ricardo López-Ruiz, Juan R. Sánchez:

Complexity and Stochastic Synchronization in Coupled Map Lattices and Cellular Automata. - Attila Szolnoki, Zhen Wang, Jinlong Wang, Xiaodan Zhu:

Dynamically generated cyclic dominance in spatial prisoner's dilemma games. - Alexander Gutfraind, Aric A. Hagberg, David Izraelevitz, Feng Pan:

Interdiction of a Markovian Evader. - G. J. Peterson, Steve Pressé, Ken A. Dill:

Nonuniversal power law scaling in the probability distribution of scientific citations. - Kousuke Yakubo, Dean Korosak:

Scale-free networks embedded in fractal space. - Zhongzhi Zhang, Shuyang Gao, Wenlei Xie:

Impact of degree heterogeneity on the behavior of trapping in Koch networks. - Chris Dietz, Dinard van der Laan, Ad Ridder:

Approximate results for a generalized secretary problem. - T. S. Evans:

Clique Graphs and Overlapping Communities. - Houman Owhadi, Clint Scovel, Timothy John Sullivan, Mike McKerns, Michael Ortiz:

Optimal Uncertainty Quantification. - Songzi Du, Yair Livne:

Chaos and Unraveling in Matching Markets. - Mehryar Mohri, Ameet Talwalkar:

On the Estimation of Coherence. - Nicolas Gillis, François Glineur:

A Multilevel Approach For Nonnegative Matrix Factorization. - Pablo García-Risueño, Pablo Echenique:

Linearly scaling direct method for accurately inverting sparse banded matrices. - Shahar Hod:

Analytic treatment of the network synchronization problem with time delays. - Piotr Migdal

:
A mathematical model of the Mafia game. - João F. C. Mota, João M. F. Xavier, Pedro M. Q. Aguiar, Markus Püschel:

Distributed Basis Pursuit. - Balázs Keszegh, János Pach, Dömötör Pálvölgyi:

Drawing planar graphs of bounded degree with few slopes. - Joshua E. S. Socolar, Joan M. Taylor:

Forcing nonperiodicity with a single tile. - Aseem Brahma, Sanmay Das, Malik Magdon-Ismail:

Comparing Prediction Market Structures, With an Application to Market Making. - Ricardo López-Ruiz, Héctor Mancini, Xavier Calbet:

A Statistical Measure of Complexity. - Prabha Mandayam, Stephanie Wehner:

Achieving the physical limits of the bounded-storage model. - Vincent Pilaud:

Multitriangulations, pseudotriangulations and some problems of realization of polytopes. - Christopher R. Laumann

, R. Moessner, A. Scardicchio, S. L. Sondhi:
Statistical mechanics of classical and quantum computational complexity. - L. Tao, M. Ramakrishna:

Multi-scale turbulence modeling and maximum information principle. Part 1. - Dominik Janzing:

Is there a physically universal cellular automaton or Hamiltonian? - Matteo Barigozzi, Giorgio Fagiolo, Giuseppe Mangioni:

Identifying the Community Structure of the International-Trade Multi Network. - Esther Hänggi

, Renato Renner:
Device-Independent Quantum Key Distribution with Commuting Measurements. - Tran The Truyen, Dinh Q. Phung, Hung Hai Bui, Svetha Venkatesh:

Hierarchical Semi-Markov Conditional Random Fields for Recursive Sequential Data. - L. G. Meredith, David F. Snyder:

Knots as processes: a new kind of invariant. - Ezra Miller:

Affine stratifications from finite misère quotients. - Xiaodi Wu:

Parallelized Solution to Semidefinite Programmings in Quantum Complexity Theory. - Amelia Carolina Sparavigna:

Symbolic landforms created by ancient earthworks near Lake Titicaca. - Monireh Houshmand, Saied Hosseini-Khayat:

Minimal-memory realization of pearl-necklace encoders of general quantum convolutional codes. - Vladimir Privman, Jan Halamek, Mary A. Arugula, Dmitriy A. Melnikov, Vera Bocharova, Evgeny Katz:

Biochemical Filter with Sigmoidal Response: Increasing the Complexity of Biomolecular Logic. - Hao Huang, Choongbum Lee:

Quasi-randomness of graph balanced cut properties. - Boris Bukh:

Radon partitions in convexity spaces. - Harry Buhrman, Nishanth Chandran, Serge Fehr, Ran Gelles, Vipul Goyal, Rafail Ostrovsky, Christian Schaffner:

Position-Based Quantum Cryptography: Impossibility and Constructions. - Jürgen Schmidhuber:

Evolution of National Nobel Prize Shares in the 20th Century. - Myung Jin Choi, Vincent Y. F. Tan, Animashree Anandkumar, Alan S. Willsky:

Learning Latent Tree Graphical Models. - Mai Gehrke, Jacob Vosmaer:

A view of canonical extension. - Ezra Miller:

Theory and applications of lattice point methods for binomial ideals. - Guillaume Chèze:

Computation of Darboux polynomials and rational first integrals with bounded degree in polynomial time. - Hans Noel, Brendan Nyhan:

The "Unfriending" Problem: The Consequences of Homophily in Friendship Retention for Causal Estimates of Social Influence. - Sebastian Schmutzhard, Alexander Jung, Franz Hlawatsch, Zvika Ben-Haim, Yonina C. Eldar:

A Lower Bound on the Estimator Variance for the Sparse Linear Model. - Steve Kirkland, Simone Severini:

Spin systems dynamics and faults detection in threshold networks. - Sam van Gool:

Duality and canonical extensions for stably compact spaces. - Giuseppe Scollo:

An integration of Euler's pentagonal partition. - Peter G. Casazza, Andreas Heinecke, Felix Krahmer, Gitta Kutyniok:

Optimally Sparse Frames. - Siegfried Bethke:

Data Preservation in High Energy Physics - why, how and when? - Serdar Yüksel, Tamás Linder:

Optimization and Convergence of Observation Channels in Stochastic Control. - Tomasz Przedzinski:

Software for physics of tau lepton decay in LHC experiments. - Golnoosh Bizhani, Vishal Sood, Maya Paczuski, Peter Grassberger:

Random Sequential Renormalization of Networks I: Application to Critical Trees. - Cristopher Moore, Alexander Russell:

Regarding a Representation-Theoretic Conjecture of Wigderson. - Christian Trott, Lars Winterfeld:

General purpose Molecular Dynamics Simulations on GPUs: Issues of Pair Forces and Scaling to large Clusters. - Boaz Barak, Zeev Dvir, Avi Wigderson, Amir Yehudayoff:

Rank Bounds for Design Matrices with Applications to Combinatorial Geometry and Locally Correctable Codes. - Boris N. Oreshkin, Xuan Liu, Mark Coates:

Efficient delay-tolerant particle filtering. - Andrey Yu. Rumyantsev, Maxim Ushakov:

Forbidden substrings, Kolmogorov complexity and almost periodic sequences. - L. Sunil Chandran, Rogers Mathew, Naveen Sivadasan:

Boxicity of Line Graphs. - Franco Ruzzenenti, Diego Garlaschelli, Riccardo Basosi:

Complex Networks and Symmetry II: Reciprocity and Evolution of World Trade. - Yoshihiko Kayama:

Complex networks derived from cellular automata. - Dömötör Pálvölgyi:

Decomposition of Geometric Set Systems and Graphs. - Stephen L. Adler:

Parameterized Adaptive Multidimensional Integration Routines (PAMIR): Localization by Repeated 2^p Subdivision. - Raluca Mihaela Andrei, Marco Callieri, Maria Francesca Zini, Tiziana Loni, Giuseppe Maraziti, Mike Chen Pan, Monica Zoppè:

BioBlender: a Software for Intuitive Representation of Surface Properties of Biomolecules. - Ioana Dumitriu:

Smallest eigenvalue distributions for $\beta$-Jacobi ensembles. - Veit Elser, Stefan Eisebitt:

Uniqueness transition in noisy phase retrieval. - Adolfo Paolo Masucci, Víctor M. Eguíluz, Emilio Hernández-García, Alkiviadis Kalampokis:

Extracting directed information flow networks: an application to genetics and semantics. - Andrea Baronchelli:

Do you agree? Role of feedback and broadcasting in the Naming Game. - Eliseo Sarmiento, Maria Vaz Pinto, Rafael H. Villarreal:

The minimum distance of parameterized codes of complete intersection vanishing ideals over finite fields. - Shun Wang, Eric de Sturler

, Glaucio H. Paulino:
Dynamic Adaptive Mesh Refinement for Topology Optimization. - Andrey Yu. Rumyantsev:

Kolmogorov complexity, Lovasz local lemma and critical exponents. - Marius Buliga:

What is a space? Computations in emergent algebras and the front end visual system. - Scott Aaronson:

The Equivalence of Sampling and Searching. - Kevin H. Knuth:

Information Physics: The New Frontier. - Thomas Fernique, Nicolas Ollinger:

Combinatorial substitutions and sofic tilings. - Roy W. Keyes, Christian Romano, Dorian C. Arnold, Shuang Luan:

Radiation therapy calculations using an on-demand virtual cluster via cloud computing. - Ana L. Pastore y Piontti, Lidia A. Braunstein, Pablo A. Macri:

Jamming in complex networks with degree correlation. - Vincent Pilaud, Michel Pocchiola:

Multitriangulations, pseudotriangulations and primitive sorting networks. - Yukio Hayashi

:
An approximative calculation of the fractal structure in self-similar tilings. - Pu Gao, Nicholas C. Wormald:

Orientability thresholds for random hypergraphs. - Ian R. Manchester:

Input Design for System Identification via Convex Relaxation. - Anmer Daskin, Sabre Kais:

Decomposition of Unitary Matrices for Finding Quantum Circuits. - Jonathan McLaughlin:

The Realizable Extension Problem and the Weighted Graph $(K_{3,3},l)$. - Bartlomiej Blaszczyszyn, D. Yogeshwaran:

Connectivity in Sub-Poisson Networks. - Josue G. Martinez, Jianhua Z. Huang, Robert C. Burghardt, Rola Barhoumi, Raymond J. Carroll:

Use of multiple singular value decompositions to analyze complex intracellular calcium ion signals. - Vladimir Vasilich Tregub:

Productivity tools to study constrained motion: electrician's approach to mechanician's problem. - David R. Bickel:

Minimum description length methods of medium-scale simultaneous inference. - Madhav P. Desai:

On Cycles in Random Graphs. - David Pritchard, Thomas Rothvoß:

Edge-Colouring Hypergraphs Properly (Covering with Matchings) or Polychromatically (Packing Covers). - Cristopher Moore, Alexander Russell:

Approximate Representations and Approximate Homomorphisms. - Daniel Heldt, Kolja Knauer, Torsten Ueckerdt:

Edge-intersection graphs of grid paths: the bend-number. - Zhouchen Lin, Minming Chen, Yi Ma:

The Augmented Lagrange Multiplier Method for Exact Recovery of Corrupted Low-Rank Matrices. - Filippo Radicchi, José J. Ramasco, Santo Fortunato:

Information filtering in complex weighted networks. - Esther Hänggi, Jürg Wullschleger:

Tight bounds for classical and quantum coin flipping. - Erhan Bayraktar, Yu-Jui Huang:

On the Multi-Dimensional Controller and Stopper Games. - Alekh Agarwal, Peter L. Bartlett, Pradeep Ravikumar, Martin J. Wainwright:

Information-theoretic lower bounds on the oracle complexity of stochastic convex optimization. - Daoyi Dong, Ian R. Petersen:

Sliding Mode Control of Two-Level Quantum Systems.

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














