


default search action
CoRR, January 2011
- Aditya Dua, Nicholas Bambos:

Packet Scheduling in Switches with Target Outflow Profiles. - Katarzyna E. Paluch:

Popular b-matchings. - Emilie Charlier, Narad Rampersad:

The growth function of S-recognizable sets. - Jagbeer Singh:

An Algorithm to Reduce the Time Complexity of Earliest Deadline First Scheduling Algorithm in Real-Time System. - Eric Filiol:

PERSEUS Technology: New Trends in Information and Communication Security. - Naoya Kishiue, Masaya Nakahara, Shirou Maruyama, Hiroshi Sakamoto:

A Searchable Compressed Edit-Sensitive Parsing. - Evgenii Vityaev, Boris Kovalerchuk, Leonid I. Perlovsky, Stanislav Smerdov:

Probabilistic Dynamic Logic of Phenomena and Cognition. - Rathinakumar Appuswamy, Massimo Franceschetti, Nikhil Karamchandani, Kenneth Zeger:

Network coding for computing: Linear codes. - Gerald Schubert, Georg Hager, Holger Fehske, Gerhard Wellein:

Parallel sparse matrix-vector multiplication as a test case for hybrid MPI+OpenMP programming. - Markus Wittmann, Georg Hager:

Optimizing ccNUMA locality for task-parallel execution under OpenMP and TBB on multicore-based systems. - Anjan K., Jibi Abraham, Mamatha Jadhav V.:

Design of Transport Layer Based Hybrid Covert Channel Detection Engine. - Sergio España, Arturo González, Oscar Pastor, Marcela Ruiz:

Integration of Communication Analysis and the OO Method: Manual derivation of the Conceptual Model. The SuperStationery Co. lab demo. - Kojiro Higuchi, Arno Pauly:

The degree structure of Weihrauch-reducibility. - Herbert Toth:

Behavioral subtyping through typed assertions. - Jakub Kallas, Manfred Kufleitner, Alexander Lauser:

First-order Fragments with Successor over Infinite Words. - K. V. Rashmi, Nihar B. Shah, P. Vijay Kumar:

Enabling Node Repair in Any Erasure Code for Distributed Storage. - Carlos Barron-Romero:

The Complexity of Euclidian 2 Dimension Travelling Salesman Problem versus General Assign Problem, NP is not P. - Sameh Oueslati, Adnane Cherif, Bassel Solaiman:

Maximizing Strength of Digital Watermarks using Fuzzy Logic. - S. K. Jayanthi, S. Sasikala:

Link Spam Detection based on DBSpamClust with Fuzzy C-means Clustering. - A. A. Nippun Kumaar, Kiran G., T. S. B. Sudarshan:

Intelligent Lighting System Using Wireless Sensor Networks. - Li Ping Qian, Ying Jun Zhang, Mung Chiang:

Globally Optimal Distributed Power Control for Nonconcave Utility Maximization. - V. Ramesh, P. Subbaiah, N. Koteswar Rao, N. Subhashini, Narayana D.:

Performance Comparison and Analysis of Preemptive-DSR and TORA. - Ruoyun Gao, Michael S. Lew, Ling Shao:

Dynamic Feature Description in Human Action Recognition. - Thomas Steenbergen, Michael S. Lew:

Analysis of Using Browser-native Technology to Build Rich Internet Applications for Image Manipulation. - Erik R. Gast, Michael S. Lew:

A Framework for Real-Time Face and Facial Feature Tracking using Optical Flow Pre-estimation and Template Tracking. - Jaydip Sen:

An Intrusion Detection Architecture for Clustered Wireless Ad Hoc Networks. - Xiaojing Chen, Michael S. Lew:

Binary and nonbinary description of hypointensity in human brain MR images. - Liang Wang, Nies Huijsmans, Michael S. Lew, Dan Tsymbala:

Across Browsers SVG Implementation. - Jaydip Sen:

A Robust and Efficient Node Authentication Protocol for Mobile Ad Hoc Networks. - Shubham Chakraborty:

Use of Python and Phoenix-M Interface in Robotics. - Jaydip Sen:

A Robust and Fault-Tolerant Distributed Intrusion Detection System. - Jaydip Sen:

An Adaptive and Multi-Service Routing Protocol for Wireless Sensor Networks. - Sugreev Kaur, Rajesh Mehra:

High Speed and Area Efficient 2D DWT Processor based Image Compression" Signal & Image Processing. - Eberhard H.-A. Gerbracht:

"On the engineers' new toolbox" or Analog Circuit Design, using Symbolic Analysis, Computer Algebra, and Elementary Network Transformations. - Yu Zhang, Jaeok Park, Mihaela van der Schaar:

Social Norms for Networked Communities. - Mehdi Torbatian, Hossein Najafi, Mohamed Oussama Damen:

Asynchronous Interference Channel: Degrees of Freedom and Interference Alignment. - Edwin Hammerich:

On the heat channel and its capacity. - Lei Zhang, Dongning Guo:

Wireless Peer-to-Peer Mutual Broadcast via Sparse Recovery. - Matthew Brand:

Specular holography. - Rami Atar, Tsachy Weissman:

Mutual Information, Relative Entropy, and Estimation in the Poisson Channel. - Chinmay S. Vaze, Mahesh K. Varanasi:

The Degrees of Freedom Region of the Two-User MIMO Broadcast Channel with Delayed CSI. - Edward Grefenstette, Mehrnoosh Sadrzadeh, Stephen Clark, Bob Coecke, Stephen Pulman:

Concrete Sentence Spaces for Compositional Distributional Models of Meaning. - Mehdi Seyfi, Sami Muhaidat, Jie Liang:

On the Performance of Selection Cooperation with Imperfect Channel Estimation. - Walid Abediseid, Mohamed Oussama Damen:

Lattice Sequential Decoder for Coded MIMO Channel: Performance and Complexity Analysis. - Tobias Kretz:

A Round-Robin Tournament of the Iterated Prisoner's Dilemma with Complete Memory-Size-Three Strategies. - Yuya Dan:

Diffusion of Confidential Information on Networks. - Andrew Pavlo, Ning Shi:

Graffiti Networks: A Subversive, Internet-Scale File Sharing Model. - Randall J. Sobie, Ashok Agarwal, M. Anderson, Patrick Armstrong, K. Fransham, Ian Gable, D. Harris, C. Leavett-Brown, Michael Paterson, Duncan Penfold-Brown, M. Vliet, Andre Charbonneau, Roger Impey, Wayne Podaima:

Data Intensive High Energy Physics Analysis in a Distributed Cloud. - Ashish Ranjan Hota, Ankit Pat:

An Adaptive Quantum-inspired Differential Evolution Algorithm for 0-1 Knapsack Problem. - Benyuan Liu, Olivier Dousse, Philippe Nain, Donald F. Towsley:

Dynamic Coverage of Mobile Sensor Networks. - Chelsia Amy Doukim, Jamal Ahmad Dargham, Ali Chekima, Sigeru Omatu:

Combining Neural Networks for Skin Detection. - M. Emre Celebi:

Improving the Performance of K-Means for Color Quantization. - Gergely Alpár, Jaap-Henk Hoepman, Johanneke Siljee:

The Identity Crisis. Security, Privacy and Usability Issues in Identity Management. - Michael Fairbank, Eduardo Alonso:

The Local Optimality of Reinforcement Learning by Value Gradients, and its Relationship to Policy Gradient Learning. - Ayatullah Faruk Mollah, Subhadip Basu, Mita Nasipuri:

Segmentation of Camera Captured Business Card Images for Mobile Devices. - Junting Chen, Vincent K. N. Lau, Yong Cheng:

Distributive Network Utility Maximization (NUM) over Time-Varying Fading Channels. - Lars Kai Hansen, Adam Arvidsson, Finn Årup Nielsen, Elanor Colleoni, Michael Etter:

Good Friends, Bad News - Affect and Virality in Twitter. - Hartmut Klauck:

On Arthur Merlin Games in Communication Complexity. - Mehrdad Valipour, Farshad Lahouti:

Channel Optimized Distributed Multiple Description Coding. - Maurice Margenstern:

Coordinates for a new triangular tiling of the hyperbolic plane. - Fabian van den Broek:

Eavesdropping on GSM: state-of-affairs. - Tianji Li, Douglas J. Leith, David Malone:

Buffer Sizing for 802.11 Based Networks. - Jean Cardinal, Matias Korman:

Coloring Planar Homothets and Three-Dimensional Hypergraphs. - Derek Groen, Simon Portegies Zwart, Tomoaki Ishiyama, Junichiro Makino:

High Performance Gravitational N-body Simulations on a Planet-wide Distributed Supercomputer. - Paul Logasa Bogen II, Frank M. Shipman III, Richard Furuta:

Distributed Collections of Web Pages in the Wild. - Chandra Nair:

A note on outer bounds for broadcast channel. - Mehdi Seyfi, Sami Muhaidat, Jie Liang:

On the Performance of Selection Cooperation with Outdated CSI and Channel Estimation Errors. - Avaré Stewart, Ricardo Lage, Ernesto Diaz-Aviles, Peter Dolog:

Personalized Event-Based Surveillance and Alerting Support for the Assessment of Risk. - Miao Song:

The Role of Computer Graphics in Documentary Film Production. - G. A. Tarnavsky, Evgenii V. Vorozhtsov:

Computer Simulation Center in Internet. - Gerhard de Koning Gans, Eric R. Verheul:

Best Effort and Practice Activation Codes. - Noam Presman, Ofer Shapira, Simon Litsyn:

Binary Polar Code Kernels from Code Decompositions. - Venkata Ravinder Paruchuri:

Information Retrieval of Jumbled Words. - Raphaël Clifford, Markus Jalsenius:

Lower Bounds for Online Integer Multiplication and Convolution in the Cell-Probe Model. - Benjamin Doerr, Daniel Johannsen, Carola Winzen:

Multiplicative Drift Analysis. - Thomas Schoenemann, Simon Masnou, Daniel Cremers:

On a linear programming approach to the discrete Willmore boundary value problem and generalizations. - Sergey Tarasenko:

Emotionally Colorful Reflexive Games. - Joseph O'Rourke:

Convex Polyhedra Realizing Given Face Areas. - Péricles Lopes Machado:

O Algoritmo usado no programa de criptografia PASME. - Bing Hui, Manar Mohaisen, KyungHi Chang:

Improved Achievable Rates for Regularized Tomlinson-Harashima Precoding in Multiuser MIMO Downlink. - Hongsun An, Manar Mohaisen, KyungHi Chang:

Lattice Reduction Aided Precoding for Multiuser MIMO using Seysen's Algorithm. - Paul N. Balister, Béla Bollobás, Animashree Anandkumar, Alan S. Willsky:

Energy-Latency Tradeoff for In-Network Function Computation in Random Networks. - Jun Luo, Ying He:

GeoQuorum: Load Balancing and Energy Efficient Data Access in Wireless Sensor Networks. - Jamshid Abouei, J. David Brown, Konstantinos N. Plataniotis, Subbarayan Pasupathy:

Energy Efficiency and Reliability in Wireless Biomedical Implant Systems. - Yota Otachi, Ryohei Suda:

Bandwidth and pathwidth of three-dimensional grids. - Cody Roux:

Refinement Types as Higher Order Dependency Pairs. - Tobias Koch, Amos Lapidoth:

Does Output Quantization Really Cause a Loss of 2dB? - Haris Aziz, Bart de Keijzer:

Complexity of coalition structure generation. - Benjamin Morandi, Sebastian Nanz, Bertrand Meyer:

A comprehensive operational semantics of the SCOOP programming model. - Ishay Haviv, Michael Langberg:

Beating the Gilbert-Varshamov Bound for Online Channels. - Joel A. Tropp:

From joint convexity of quantum relative entropy to a concavity theorem of Lieb. - Alexander Rand:

On the Non-Termination of Ruppert's Algorithm. - Serguei A. Mokhov, Marc-André Laverdière, Nader Hatami, Ali Benssam:

Cryptolysis v.0.0.1 - A Framework for Automated Cryptanalysis of Classical Ciphers. - Yael Amsterdamer, Daniel Deutch, Val Tannen:

Provenance for Aggregate Queries. - Giuliano Andrea Pagani, Marco Aiello:

Towards Decentralized Trading: A Topological Investigation of the Dutch Medium and Low Voltage Grids. - Steve Chien, Prahladh Harsha, Alistair Sinclair, Srikanth Srinivasan:

Almost Settling the Hardness of Noncommutative Determinant. - Rishin Haldar, Debajyoti Mukhopadhyay:

Levenshtein Distance Technique in Dictionary Lookup Methods: An Improved Approach. - Yashar Ghiassi-Farrokhfal, Jörg Liebeherr, Almut Burchard:

Statistical Analysis of Link Scheduling on Long Paths. - Mian Dong, Lin Zhong:

Chameleon: A Color-Adaptive Web Browser for Mobile OLED Displays. - Ranjeet Devarakonda, Giriprakash Palanisamy:

Scientific data searching, sharing and retrieval. - Johanne Cohen, Christoph Dürr, Kim Thang Nguyen:

Non-clairvoyant Scheduling Games. - Brijnesh J. Jain, Klaus Obermayer:

Extending Bron Kerbosch for Solving the Maximum Weight Clique Problem. - Hermann Gruber:

Bounding the Feedback Vertex Number of Digraphs in Terms of Vertex Degrees. - Mojtaba Rahmati, Tolga M. Duman:

Analytical Lower Bounds on the Capacity of Insertion and Deletion Channels. - Weiliang Zeng, Chengshan Xiao, Mingxi Wang, Jianhua Lu:

Linear Precoding for Relay Networks with Finite-Alphabet Constraints. - Dae-Sung Jang, Sun-Il Kwon:

Fast Approximation Algorithms for Art Gallery Problems in Simple Polygons. - Walid Abediseid, Mohamed Oussama Damen:

Time-Out Lattice Sequential Decoding for the MIMO ARQ Channel. - Xiaoxiao Yang:

A Probabilistic Variant of Projection Temporal Logic. - Stephen A. Cook, Lila Fontes:

Formal Theories for Linear Algebra. - Sudipta Das, Lawrence Jenkins, Debasis Sengupta:

Comparison of Loss ratios of different scheduling algorithms. - Lorne Applebaum, Waheed U. Bajwa, Marco F. Duarte, A. Robert Calderbank:

Asynchronous Code-Division Random Access Using Convex Optimization. - Kyle W. Burke, Olivia George:

A PSPACE-complete Graph Nim. - Chuan Huang, Jinhua Jiang, Shuguang Cui:

On the Achievable Rates of the Diamond Relay Channel with Conferencing Links. - Michaël Cadilhac, Alain Finkel, Pierre McKenzie:

Storming the Parikh Automaton. - Charles Dossal, Marie-Line Chabanol, Gabriel Peyré, Jalal Fadili:

Sharp Support Recovery from Noisy Random Measurements by L1 minimization. - Nor Amizam Jusoh, Jasni Mohamad Zain:

Application of Freeman Chain Codes: An Alternative Recognition Technique for Malaysian Car Plates. - Jasni Mohamad Zain, Malcolm Clarke:

Reversible Region of Non-Interest (RONI) Watermarking for Authentication of DICOM Images. - Jasni Mohamad Zain, Mengkar Tey, Yingsoon Goh:

Probing a Self-Developed Aesthetics Measurement Application (SDA) in Measuring Aesthetics of Mandarin Learning Web Page Interfaces. - Jasni Mohamad Zain, Mengkar Tey, Yingsoon Goh:

Does Aesthetics of Web Page Interface Matters to Mandarin Learning? - Dominic Meier, Yvonne-Anne Pignolet, Stefan Schmid, Roger Wattenhofer:

On the Windfall and Price of Friendship: Inoculation Strategies on Social Networks. - Philipp Mayr, Philipp Schaer, Peter Mutschke:

A Science Model Driven Retrieval Prototype. - Philipp Mayr, Peter Mutschke, Vivien Petras, Philipp Schaer, York Sure:

Applying Science Models for Search. - Natalie Schluter:

Restarting Automata with Auxiliary Symbols and Small Lookahead. - Shunqing Zhang, Vincent K. N. Lau:

Multi-Relay Selection Design and Analysis for Multi-Stream Cooperative Communications. - Emilie Charlier, Michael Domaratzki, Tero Harju, Jeffrey O. Shallit:

Finite Orbits of Language Operations. - Ted Herman:

Safe Register Token Transfer in a Ring. - Ladan Baghai-Ravary, Sergio Grau, Greg Kochanski:

Detecting gross alignment errors in the Spoken British National Corpus. - Mustafa El-Halabi, Tie Liu, Costas N. Georghiades:

Secret Writing on Dirty Paper: A Deterministic View. - Aditya Bhaskara, Moses Charikar, Rajsekar Manokaran, Aravindan Vijayaraghavan:

On Quadratic Programming with a Ratio Objective. - Rahul Urgaonkar, Michael J. Neely:

Network Capacity Region and Minimum Energy Function for a Delay-Tolerant Mobile Ad Hoc Network. - Jagbeer Singh:

Precise Schedulability Analysis for unfeasible to notify separately for comprehensive - EDF Scheduling of interrupted Hard Real-Time Tasks on the similar Multiprocessors. - Krishnendu Chatterjee, Nathanaël Fijalkow:

Finitary languages. - Julien Cristau:

Automata and temporal logic over arbitrary linear time. - José Joaquín Bernal, Juan Jacobo Simón:

Information sets from defining sets in abelian codes. - Suvansh Lal:

A Logic Programming Approach for Formal Verification of NetBill Security and Transactions Protocol. - Suvansh Lal, Mohit Jain, Vikrant Chaplot:

Approaches to Formal Verification of Security Protocols. - Hrishikesh Karmarkar, Supratik Chakraborty:

Determinization of $\omega$-automata unified. - Sami Hissoiny, Philippe Després, Benoît Ozell:

Using graphics processing units to generate random numbers. - Patrick Solé, Jean-Claude Belfiore:

Constructive spherical codes near the Shannon bound. - Michael T. Goodrich, Nodari Sitchinava, Qin Zhang:

Sorting, Searching, and Simulation in the MapReduce Framework. - Stefano Galli:

A Novel Approach to the Statistical Modeling of Wireline Channels. - Mojtaba Vaezi, Mai Vu:

Superposition Coding-Based Bounds and Capacity for the Cognitive Z-Interference Channels. - Washington Taylor, Jud Leonard, Lawrence C. Stewart:

Efficient tilings of de Bruijn and Kautz graphs. - Siva K. Gorantla, Baris Nakiboglu, Todd P. Coleman, Lizhong Zheng:

Multi-layer Bit-wise Unequal Error Protection for Variable Length Blockcodes with Feedback. - Howard J. Karloff, Flip Korn, Konstantin Makarychev, Yuval Rabani:

On Parsimonious Explanations for 2-D Tree- and Linearly-Ordered Data. - Mohammad Karimadini, Hai Lin:

Necessary and Sufficient Conditions for Task Automaton Decomposition. - Mohammad Karimadini, Hai Lin:

Task Decomposability Under Event Failures for Two Cooperative Agents. - Ruoheng Liu, Tie Liu, H. Vincent Poor, Shlomo Shamai:

New Results on Multiple-Input Multiple-Output Broadcast Channels with Confidential Messages. - Ruijia Liao:

The Complexity of 3SAT_N and the P versus NP Problem. - Guyslain Naves

, Vincent Jost:
The graphs with the max-Mader-flow-min-multiway-cut property. - Jyotirmoy Karjee, H. S. Jamadagni:

Data Accuracy Estimation for Cluster with Spatially Correlated Data in Wireless Sensor Networks. - Jyotirmoy Karjee, H. S. Jamadagni:

Data Accuracy Estimation for Spatially Correlated Data in Wireless Sensor Networks under Distributed Clustering. - Rafael Caballero, Mario Rodríguez-Artalejo, Carlos A. Romero-Díaz:

A Generic Scheme for Qualified Constraint Functional Logic Programming. - Ulrich Berger:

From coinductive proofs to exact real arithmetic: theory and applications. - David F. Gleich, Chen Greif, James M. Varah:

The power and Arnoldi methods in an algebra of circulants. - Urs Niesen, Phil Whiting:

The Degrees of Freedom of Compute-and-Forward. - Elena Veronica Belmega, Samson Lasaulce:

Power Allocation Games in Interference Relay Channels: Existence Analysis of Nash Equilibria. - Elizaveta Eidelman, Serguei A. Mokhov:

Alchymical Mirror: Real-time Interactive Sound- and Simple Motion-Tracking Set of Jitter/Max/MSP Patches. - Aripirala Manoj Kumar, G. Bharath Reddy, G. Krishna Chaitanya Reddy:

Modelling to study its non-linear effects on Communication System's performance with BER as performance measure. - Chenguang Lu:

Illustrating Color Evolution and Color Blindness by the Decoding Model of Color Vision. - Michael T. Goodrich, Michael Mitzenmacher:

Invertible Bloom Lookup Tables. - Manar Mohaisen, KyungHi Chang:

Fixed-complexity Sphere Encoder for Multi-user MIMO Systems. - Adriano Fagiolini, Hitoshi Arisumi, Antonio Bicchi:

Casting Robotic End-effectors To Reach Faraway Moving Objects. - Dario Marino, Adriano Fagiolini, Lucia Pallottino:

Distributed Collision-free Protocol for AGVs in Industrial Environments. - Adriano Fagiolini, Antonio Bicchi:

Logical Consensus for Distributed and Robust Intrusion Detection. - Adriano Fagiolini, Gianluca Dini, Antonio Bicchi:

Distributed Intrusion Detection for the Security of Societies of Robots. - Adriano Fagiolini, Nevio Dubbini, Antonio Bicchi:

Distributed Consensus on Set-valued Information. - Tuan Anh Nguyen, Minh Binh Do, Alfonso Gerevini, Ivan Serina, Biplav Srivastava, Subbarao Kambhampati:

Planning with Partial Preference Models. - Feng Liu, Chung Chan, Ying Jun Zhang:

On the Degree of Freedom for Multi-Source Multi-Destination Wireless Network with Multi-layer Relays. - Arash Mehrmand, Robert Feldt:

A Factorial Experiment on Scalability of Search Based Software Testing. - Jan Urban:

Automatic segmentation of HeLa cell images. - Makoto Tanahashi, Hideki Ochiai:

A Generalized MMSE Detection with Reduced Complexity for Spatially Multiplexed MIMO Signals. - Lluís A. Belanche Muñoz, Félix Fernando González-Navarro:

Review and Evaluation of Feature Selection Algorithms in Synthetic Problems. - Sándor P. Fekete, Joseph S. B. Mitchell, Christiane Schmidt:

Minimum Covering with Travel Cost. - Joachim Selke, Wolf-Tilo Balke:

Extracting Features from Ratings: The Role of Factor Models. - Uria Basher, Avihay Shirazi, Haim H. Permuter:

Capacity Region of Finite State Multiple-Access Channel with Delayed State Information at the Transmitters. - Petr N. Vabishchevich:

Domain decomposition schemes for evolutionary equations of first order with not self-adjoint operators. - Lilin Dan, Yue Xiao, Wei Ni, Shaoqian Li:

Improved Peak Cancellation for PAPR Reduction in OFDM Systems. - Eduardo Valle, Sandra Eliza Fontes de Avila, Antonio da Luz Jr., Fillipe Dias Moreira de Souza, Marcelo de Miranda Coelho, Arnaldo de Albuquerque Araújo:

Content-Based Filtering for Video Sharing Social Networks. - (Withdrawn) On Achievability of Gaussian Interference Channel Capacity to within One Bit.

- Vikas J. Dongre, Vijay H. Mankar:

A Review of Research on Devnagari Character Recognition. - Sanjay Karmakar, K. Pavan Srinath, B. Sundar Rajan:

Maximum Rate of Unitary-Weight, Single-Symbol Decodable STBCs. - K. Pavan Srinath, B. Sundar Rajan:

Generalized Silver Codes. - K. Pavan Srinath, B. Sundar Rajan:

A Low ML-decoding Complexity, Full-diversity, Full-rate MIMO Precoder. - Koen Simoens, Julien Bringer, Hervé Chabanne, Stefaan Seys:

Analysis of Biometric Authentication Protocols in the Blackbox Model. - Sanjay Bansal, Nirved Pandey:

An Overview of Portable Distributed Techniques. - Erik Agrell:

Errata list for "Error Control Coding" by Lin and Costello. - D. Prabhu, M. Adimoolam

:
Bi-serial DNA Encryption Algorithm(BDEA). - Ninghui Li, Wahbeh H. Qardaji, Dong Su:

Provably Private Data Anonymization: Or, k-Anonymity Meets Differential Privacy. - Thomas Bernecker, Tobias Emrich, Hans-Peter Kriegel, Nikos Mamoulis, Matthias Renz, Andreas Züfle:

A Novel Probabilistic Pruning Approach to Speed Up Similarity Queries in Uncertain Databases. - Samir Datta, Gautam Prakriya:

Planarity Testing Revisited. - José M. Cecilia, José M. García, Manuel Ujaldon, Andy Nisbet, Martyn Amos:

Parallelization Strategies for Ant Colony Optimisation on GPUs. - Dustin Wehr:

Lower bound for deterministic semantic-incremental branching programs solving GEN. - Mauricio Romero-Torres

, Maria Alejandra Tejada, Alberto Acosta:
A Proposal to Classify Latinamerican Scientific Journals using Citation Indicators: Case Study in Colombia. - Armin Eftekhari, Justin K. Romberg, Michael B. Wakin:

Matched Filtering from Limited Frequency Samples. - Jaydip Sen:

A Novel Mechanism for Detection of Distributed Denial of Service Attacks. - Sourjya Bhaumik, David Chuck, Girija J. Narlikar, Gordon T. Wilfong:

Energy-Efficient Design and Optimization of Wireline Access Networks. - Yao Yu, Athina P. Petropulu, H. Vincent Poor:

CSSF MIMO RADAR: Low-Complexity Compressive Sensing Based MIMO Radar That Uses Step Frequency. - Randa Zakhour, David Gesbert:

Optimized data sharing in multicell MIMO with finite backhaul capacity. - Son Hoang Dau, Vitaly Skachek, Yeow Meng Chee:

Index Coding and Error Correction. - Jaydip Sen:

An Efficient and User Privacy-Preserving Routing Protocol for Wireless Mesh Networks. - Jaydip Sen:

Routing Security Issues in Wireless Sensor Networks: Attacks and Defenses. - Apostolos Bessas, Spyros C. Kontogiannis, Christos D. Zaroliagis:

Robust Line Planning in case of Multiple Pools and Disruptions. - Sergey Goncharov, Lutz Schröder:

Powermonads and Tensors of Unranked Effects. - Keck Voon Ling, Jan M. Maciejowski, Arthur G. Richards, Bing Fang Wu:

Multiplexed Model Predictive Control. - Mohammed Abubakr:

On Logical Extension of Algebraic Division. - Manuel Kauers, Carsten Schneider:

A Refined Denominator Bounding Algorithm for Multivariate Linear Difference Equations. - Thomas Martin Gawlitza, David Monniaux

:
Improving Strategies via SMT Solving. - Michael Carl Tschantz, Dilsun Kirli Kaynar, Anupam Datta:

Formal Verification of Differential Privacy for Interactive Systems. - Fabrizio Caruso, Giovanni Giuffrida, Calogero G. Zarba:

Subjective Collaborative Filtering. - Nicole Immorlica, Adam Tauman Kalai, Brendan Lucier, Ankur Moitra, Andrew Postlewaite, Moshe Tennenholtz:

Dueling Algorithms. - Punyashloka Biswal:

Hypercontractivity and its applications. - S. M. Sadegh Tabatabaei Yazdi, Serap A. Savari:

A Deterministic Polynomial--Time Algorithm for Constructing a Multicast Coding Scheme for Linear Deterministic Relay Networks. - Ariel Kulik, Hadas Shachnai, Tami Tamir:

Approximations for Monotone and Non-monotone Submodular Maximization with Knapsack Constraints. - Zoltán Kása, Leoan Tâmbulea:

Binary trees and number of states in buddy systems. - Salman Fadaei, MohammadAli Safari, MohammadAmin Fazli:

Maximizing Submodular Set Functions Subject to Different Constraints: Combined Algorithms. - Ash Mohammad Abbas:

Resequencing: A Method for Conforming to Conventions for Sharing Credits Among Multiple Authors. - Mahesh Pal:

Support vector machines/relevance vector machine for remote sensing classification: A review. - Basil K. Papadopoulos, Apostolos Syropoulos:

Generalizing Topology via Chu Spaces. - Omid Ghahabi, Mohammad Hasan Savoji:

Adaptive Variable Degree-k Zero-Trees for Re-Encoding of Perceptually Quantized Wavelet-Packet Transformed Audio and High Quality Speech. - Jaeok Park, Mihaela van der Schaar:

The Theory of Intervention Games for Resource Sharing in Wireless Communications. - Tobias Baumgartner, Ioannis Chatzigiannakis, Sándor P. Fekete, Christos Koninis, Alexander Kröller, Apostolos Pyrgelis:

Wiselib: A Generic Algorithm Library for Heterogeneous Sensor Networks. - Lei Ke, Aditya Ramamoorthy, Zhengdao Wang, Huarui Yin:

Degrees of Freedom Region for an Interference Network with General Message Demands. - Jaydip Sen:

A Robust and Secure Aggregation Protocol for Wireless Sensor Networks. - Walter Quattrociocchi, Rosaria Conte, Elena Lodi:

Simulating Opinion Dynamics in Heterogeneous Communication. - Dustin Maas, Neal Patwari, Daryl Leon Wasden, Sneha Kumar Kasera, Michael A. Jensen:

Experimental Performance Evaluation of Location Distinction for MIMO Channels. - Xinyu Xing, Yu-Li Liang, Hanqiang Cheng, Jianxun Dang, Sui Huang, Richard Han, Xue Liu, Qin Lv, Shivakant Mishra:

SafeVchat: Detecting Obscene Content and Misbehaving Users in Online Video Chat Services. - Chris Regenboog:

Reactive Valuations. - Angelos Mantzaflaris, Bernard Mourrain:

Deflation and Certified Isolation of Singular Zeros of Polynomial Systems. - Eloisa Bentivegna, Gabrielle Allen, Oleg Korobkin, Erik Schnetter

:
Ensuring Correctness at the Application Level: a Software Framework Approach. - Petr Hlinený, Ondrej Moris:

Multi-Stage Improved Route Planning Approach: theoretical foundations. - Vahan V. Mkrtchyan, Petros A. Petrosyan:

A note on triangle-free graphs. - Manuel S. Stein:

Towards Optimal Schemes for the Half-Duplex Two-Way Relay Channel. - Giovanni Sabato, Mehdi Molkaraie:

Generalized Belief Propagation for the Noiseless Capacity and Information Rates of Run-Length Limited Constraints. - Walid Belkhir, Alain Giorgetti, Michel Lenczner:

Rewriting and Symbolic Transformations for Multiscale Methods. - Andreas Schenk, Robert F. H. Fischer:

Decision-Feedback Differential Detection in Impulse-Radio Ultra-Wideband Systems. - Jesper Bengtson, Magnus Johansson, Joachim Parrow, Björn Victor:

Psi-calculi: a framework for mobile processes with nominal data and logic. - Shurui Huang, Aditya Ramamoorthy:

A note on the multiple unicast capacity of directed acyclic networks. - Smriti Bhagat, Graham Cormode, S. Muthukrishnan:

Node Classification in Social Networks. - James King:

Fast Vertex Guarding for Polygons. - Alessandro Basso, Marco Milanesio, André Panisson, Giancarlo Ruffo:

Collaborative Filtering without Explicit Feedbacks for Digital Recorders. - Wei Dai, Olgica Milenkovic, Hoa Vinh Pham:

Structured sublinear compressive sensing via dense belief propagation. - Stephen O'Hara, Bruce A. Draper:

Introduction to the Bag of Features Paradigm for Image Classification and Retrieval. - Alexander V. Shafarenko, Raimund Kirner:

CAL: A Language for Aggregating Functional and Extrafunctional Constraints in Streaming Networks. - Facundo Bromberg, Federico Schlüter:

Efficient Independence-Based MAP Approach for Robust Markov Networks Structure Discovery. - Yao Sun, Dingkang Wang:

A Generalized Criterion for Signature Related Gröbner Basis Algorithms. - Thorsten Riess, Christian Dietz, Martin Tomas, Elisa Ferrando-May, Dorit Merhof:

Automated Image Processing for the Analysis of DNA Repair Dynamics. - Imen Harbaoui Dridi, Ryan Kammarti, Pierre Borne, Mekki Ksouri:

Multi-objective Optimization For The Dynamic Multi-Pickup and Delivery Problem with Time Windows. - Wenping Ma:

New Quadriphase Sequences families with Larger Linear Span and Size. - Fabrizio Caruso, Giovanni Giuffrida, Calogero G. Zarba:

Behavioral On-Line Advertising. - Dominique Duval, Rachid Echahed, Frédéric Prost:

Categorical Abstract Rewriting Systems and Functoriality of Graph Transformation. - Olivier Finkel:

Borel Hierarchy and Omega Context Free Languages. - Can Emre Koksal, Özgür Erçetin, Yunus Sarikaya:

Control of Wireless Networks with Secrecy. - Johannes Fischer:

Inducing the LCP-Array. - Pasquale Malacaria:

Algebraic Foundations for Information Theoretical, Probabilistic and Guessability measures of Information Flow. - Félix Balado:

Capacity of DNA Data Embedding Under Substitution Mutations. - Emanuel Gluskin:

The "psychological map of the brain", as a personal information card (file), - a project for the student of the 21st century. - Yajuan Sun, Hai Lin, Fuchun Liu:

Computation for Supremal Simulation-Based Controllable and Strong Observable Subautomata. - Guanfeng Liang, Nitin H. Vaidya:

Error-Free Multi-Valued Consensus with Byzantine Failures. - Xi Liu, Elza Erkip:

A Game-Theoretic View of the Interference Channel: Impact of Coordination and Bargaining. - Jin-San Cheng, Xiao-Shan Gao:

Multiplicity Preserving Triangular Set Decomposition of Two Polynomials. - Konstantin Voevodski, Maria-Florina Balcan, Heiko Röglin, Shang-Hua Teng, Yu Xia:

Clustering Protein Sequences Given the Approximation Stability of the Min-Sum Objective Function. - Mark Giesbrecht, Daniel S. Roche:

Diversification improves interpolation. - Sándor Soós, George Kampis:

Bio-inspired Methods for Dynamic Network Analysis in Science Mapping. - Taolue Chen

, Tingting Han, Joost-Pieter Katoen
, Alexandru Mereacre:
Model Checking of Continuous-Time Markov Chains Against Timed Automata Specifications. - Ni-Chun Wang, Ezio Biglieri, Kung Yao:

Systolic Arrays for Lattice-Reduction-Aided MIMO Detection. - B. T. Swapna, Atilla Eryilmaz, Ness B. Shroff:

Throughput-Delay Analysis of Random Linear Network Coding for Wireless Broadcasting. - Shriprakash Sinha:

An Unsupervised Conformal Learning Algorithm For Image Segmentation. - Luca Maria Aiello, Marco Milanesio, Giancarlo Ruffo, Rossano Schifanella:

Tagging with DHARMA, a DHT-based Approach for Resource Mapping through Approximation. - Valery I. Korzhik, Viktor Yakovlev, Guillermo Morales-Luna, Yuri Kovajkin:

Secret Key Agreement Over Multipath Channels Exploiting a Variable-Directional Antenna. - Abhimanyu Das, David Kempe:

Estimating the Average of a Lipschitz-Continuous Function from One Sample. - Radha Krishna Ganti, François Baccelli, Jeffrey G. Andrews:

Series Expansion for Interference in Wireless Networks. - Kolar Purushothama Naveen, Anurag Kumar:

Relay Selection with Partial Information in Wireless Sensor Networks. - Monica Vladoiu, Zoran Constantinescu:

U-Learning Within A Context-Aware Multiagent Environment. - Abuzer Yakaryilmaz:

Exact quantum algorithms for promise problems in automata theory. - Alexander Jung, Sebastian Schmutzhard, Franz Hlawatsch, Alfred O. Hero III:

Performance Bounds for Sparse Parametric Covariance Estimation in Gaussian Models. - Mohammed H. Sqalli, Sadiq M. Sait, Syed Asadullah:

OSPF Weight Setting Optimization for Single Link Failures. - Loet Leydesdorff, Lutz Bornmann, Rüdiger Mutz, Tobias Opthof:

Normalizing the measurement of citation performance: Principles for comparing sets of documents. - Edson Agustini, Sueli I. Rodrigues Costa:

An Upper Bound for Signal Transmission Error Probability in Hyperbolic Spaces. - Patricia Marcu, Wolfgang Hommel:

Inter-organizational fault management: Functional and organizational core aspects of management architectures. - Patricia Marcu, David Schmitz, Wolfgang Fritz, Mark Yampolskiy, Wolfgang Hommel:

Integrated monitoring of multi-domain backbone connections -- Operational experience in the LHC optical private network. - Heide Gluesing-Luerssen, Elizabeth A. Weaver:

Characteristic Generators and Dualization for Tail-Biting Trellises. - Greg N. Frederickson, Barry Wittman:

Two Multivehicle Routing Problems with Unit-Time Windows. - Greg N. Frederickson, Barry Wittman:

Speedup in the Traveling Repairman Problem with Constrained Time Windows. - Sebastian Müller, Iddo Tzameret:

Average-Case Separation in Proof Complexity: Short Propositional Refutations for Random 3CNF Formulas. - Nicolae Cleju, Nikolaos Thomos, Pascal Frossard:

Selection of network coding nodes for minimal playback delay in streaming overlays. - Matilde Santos, José Antonio Martín H., Victoria López:

Dyna-H: a heuristic planning reinforcement learning algorithm applied to role-playing-game strategy decision systems. - Heni Kaaniche, Fatma Louati, Mounir Frikha, Farouk Kamoun:

A QoS Routing Protocol based on Available Bandwidth Estimation for Wireless Ad Hoc Networks. - Ryutaroh Matsumoto, Masahito Hayashi:

Secure Multiplex Coding with a Common Message. - Hongda Xiao, Edmund M. Yeh:

The Impact of Incomplete Information on Games in Parallel Relay Networks. - Sebastian Kreft, Gonzalo Navarro:

Self-Index Based on LZ77. - Stephane Durocher, Jason Morrison:

Linear-Space Data Structures for Range Mode Query in Arrays. - Pang-Chang Lan, Chih-Yao Wu, Chia-han Lee, Ping-Cheng Yeh, Chen-Mou Cheng:

PMI-based MIMO OFDM PHY Integrated Key Exchange (P-MOPI) Scheme. - Michael A. Lexa, Mike E. Davies, John S. Thompson:

Reconciling Compressive Sampling Systems for Spectrally-sparse Continuous-time Signals. - Bruno Antunes, Francisco Correia, Paulo Gomes:

Context Capture in Software Development. - Elaine Pimentel, Betti Venneri, Joe B. Wells:

Proceedings Fifth Workshop on Intersection Types and Related Systems, ITRS 2010, Edinburgh, U.K., 9th July 2010. EPTCS 45, 2010 [contents] - Peter Z. Kunszt, Sergio Maffioletti, Riccardo Murri, Valery Tschopp:

GridCertLib: Use Shibboleth to Access the Grid from Web Portals. - Manfred Kufleitner, Alexander Lauser:

Languages of Dot-depth One over Infinite Words. - Victorin Martin, Jean-Marc Lasgouttes, Cyril Furtlehner:

The Role of Normalization in the Belief Propagation Algorithm. - Franck Butelle, Camille Coti:

A Model for Coherent Distributed Memory For Race Condition Detection. - Tomás Brázdil, Jan Krcál, Jan Kretínský, Antonín Kucera, Vojtech Rehák:

Measuring Performance of Continuous-Time Stochastic Processes using Timed Automata. - Saeed Abdallah, Ioannis N. Psaromiligkos:

Blind Channel Estimation for Amplify-and-Forward Two-Way Relay Networks Employing M-PSK Modulation. - Bo Ji, Changhee Joo, Ness B. Shroff:

Scheduling with Per-link Queues and No Per-flow information in Multi-hop Wireless Networks. - Himanshu Thapliyal, Nagarajan Ranganathan:

Reversible Logic Based Concurrent Error Detection Methodology For Emerging Nanocircuits. - Sam Staton:

Relating coalgebraic notions of bisimulation. - Yashwanth Kothapalli:

Indexing Properties of Primitive Pythagorean Triples for Cryptography Applications. - Nashid Shahriar, Mahfuza Sharmin, Reaz Ahmed, Raouf Boutaba:

Diurnal Availability for Peer-to-Peer Systems. - Tamás Horváth, Laszlo B. Kish, Jacob Scheuer:

Effective Privacy Amplification for Secure Classical Communications. - Axel Legay, Benoît Caillaud:

Proceedings Foundations for Interface Technologies, FIT 2010, Paris, France, 30th August 2010. EPTCS 46, 2010 [contents] - Rahmat Widia Sembiring, Jasni Mohamad Zain, Abdullah Embong:

A Comparative Agglomerative Hierarchical Clustering Method to Cluster Implemented Course. - Lei Bu, Xin Chen, Linzhang Wang, Xuandong Li:

Online Verification of Control Parameter Calculations in Communication Based Train Control System. - Pritam Som, Tanumay Datta, N. Srinidhi, Ananthanarayanan Chockalingam, B. Sundar Rajan:

Low-Complexity Detection/Equalization in Large-Dimension MIMO-ISI Channels Using Graphical Models. - Manuel Sorge:

On Making Directed Graphs Eulerian. - Lianming Zhang, Xiaoheng Deng, Jianping Yu, Xiangsheng Wu:

The degree and connectivity of Internet's scale-free topology. - Artiom Kovnatsky, Michael M. Bronstein, Alexander M. Bronstein, Ron Kimmel:

Diffusion framework for geometric and photometric data fusion in non-rigid shape analysis. - Quan-Lin Li, John C. S. Lui, Yang Wang:

A Matrix-Analytic Solution for Randomized Load Balancing Models with Phase-Type Service Times. - Pierre-François Marteau:

Discrete Time Elastic Vector Spaces. - Ebrahim B. Al-Safadi, Tareq Y. Al-Naffouri

:
Peak Reduction and Clipping Mitigation by Compressive Sensing. - Yan Chen, Shunqing Zhang, Shugong Xu, Geoffrey Ye Li:

Fundamental Tradeoffs on Green Wireless Networks. - Jacques M. Bahi, Christophe Guyeux, Michel Salomon:

Building a Chaotic Proved Neural Network. - Elisa Burato, Matteo Cristani, Luca Viganò:

Meaning Negotiation as Inference. - Alexandre Miquel:

Existential witness extraction in classical realizability and via a negative translation. - Adam W. Strzebonski, Elias P. Tsigaridas:

Univariate real root isolation in an extension field. - Chen Avin, Michael Borokhovich, Keren Censor-Hillel, Zvi Lotker:

Order Optimal Information Spreading Using Algebraic Gossip. - Orit Arzi, Yonatan Aumann, Yair Dombb:

Throw One's Cake --- and Have It Too. - Razvan Deaconescu, Marius Sandu-Popa, Adriana Draghici, Nicolae Tapus:

BitTorrent Swarm Analysis through Automation and Enhanced Logging. - Adriana B. Compagnoni, Healfdene Goguen:

Relating Church-Style and Curry-Style Subtyping. 1-15 - Simona Ronchi Della Rocca, Alexis Saurin, Yiorgos Stavrinos, Anastasia Veneti:

Intersection Logic in sequent calculus style. 16-30 - Steffen van Bakel

:
Sound and Complete Typing for lambda-mu. 31-44 - Mariangiola Dezani-Ciancaglini

, Paola Giannini, Elena Zucca:
Intersection types for unbind and rebind. 45-58 - Jana Dunfield:

Untangling Typechecking of Intersections and Unions. 59-70 - Luca Padovani:

Session Types = Intersection Types + Union Types. 71-89 - Vilhelm Sjöberg, Aaron Stump:

Equality, Quasi-Implicit Products, and Large Eliminations. 90-100 - Huang Huang, Changbin Yu:

Parameter Optimization of Multi-Agent Formations based on LQR Design. - S. Ali A. Fakoorian, A. Lee Swindlehurst:

Solutions for the MIMO Gaussian Wiretap Channel with a Cooperative Jammer. - Santosh Kumar Singh, Gajendra Singh, Vibhakar Pathak, Krishna Chandra Roy:

Spectrum Management for Cognitive Radio based on Genetics Algorithm. - Andrew Drucker:

High-Confidence Predictions under Adversarial Uncertainty. - Daniel Golovin, Andreas Krause:

Adaptive Submodular Optimization under Matroid Constraints. - (Withdrawn) Remarks on the Restricted Isometry Property in Orthogonal Matching Pursuit algorithm.

- Antonio Bucciarelli:

Extensional Collapse Situations I: non-termination and unrecoverable errors. - Cristina Serban, Carmen Maftei:

Thermal Analysis of Climate Regions using Remote Sensing and Grid Computing. - Benedikt Bollig:

An automaton over data words that captures EMSO logic. - Salam Akoum, Marios Kountouris, Robert W. Heath Jr.:

Limited Feedback Over Temporally Correlated Channels for the Downlink of a Femtocell Network. - Daoud Clarke:

A Context-theoretic Framework for Compositionality in Distributional Semantics. - (Withdrawn) High-rate Space-Time-Frequency Codes Achieving Full-Diversity with Partial Interference Cancellation Group Decoding.

- Christophe Paul, Anthony Perez, Stéphan Thomassé:

Conflict Packing yields linear vertex-kernels for Rooted Triplet Inconsistency and other problems. - Mathieu Feuillet, Matthieu Jonckheere, Balakrishna J. Prabhu:

Responding to traffic surges: Stochastic networks under time-space-priority scalings. - Francesco Ricca, Giovanni Grasso, Mario Alviano, Marco Manna, Vincenzino Lio, Salvatore Iiritano, Nicola Leone:

Team-building with Answer Set Programming in the Gioia-Tauro Seaport. - Ming Lam Leung, Yang Li, Shengyu Zhang:

Tight bounds on the randomized communication complexity of symmetric XOR functions in one-way and SMP models. - Vadim E. Levit, Eugen Mandrescu:

A Set and Collection Lemma. - Alain Couvreur, Iwan M. Duursma:

Evaluation Codes from smooth Quadric Surfaces and Twisted Segre Varieties. - Alberto Pettarin, Andrea Pietracaprina, Geppino Pucci, Eli Upfal:

Tight Bounds on Information Dissemination in Sparse Mobile Networks. - Cihan Tepedelenlioglu, Adithya Rajan, Yuan Zhang:

Applications of Stochastic Ordering to Wireless Communications. - Serguei A. Mokhov, Marc-André Laverdière, Ali Benssam, Djamel Benredjem:

A Secure Web-Based File Exchange Server: Software Requirements Specification Document. - Serguei A. Mokhov, Marc-André Laverdière, Ali Benssam, Djamel Benredjem:

Design and Implementation of a Secure Web-Based File Exchange Server: Specification Design Document. - Adrian Dumitrescu, Minghui Jiang:

Sweeping an oval to a vanishing point. - Zizhuo Wang, Shiming Deng, Yinyu Ye:

Close the Gaps: A Learning-while-Doing Algorithm for a Class of Single-Product Revenue Management Problems. - Ken-ichi Kawarabayashi, Mikkel Thorup:

Minimum k-way cut of bounded size is fixed-parameter tractable. - Alastair A. Abbott, Cristian S. Calude:

Von Neumann Normalisation of a Quantum Random Number Generator. - Marc Arnaudon, Frank Nielsen:

On Approximating the Riemannian 1-Center. - Philip Schniter:

A Message-Passing Receiver for BICM-OFDM over Unknown Clustered-Sparse Channels. - Sebastian S. Bauer, Rolf Hennicker, Stephan Janisch:

Interface Theories for (A)synchronously Communicating Modal I/O-Transition Systems. 1-8 - Maria Grazia Buscemi, Hernán C. Melgratti:

Contracts for Abstract Processes in Service Composition. 9-27 - Michael Mendler:

An Algebra of Synchronous Scheduling Interfaces. 28-48 - Axel Legay, Andrzej Wasowski:

A Few Considerations on Structural and Logical Composition in Specification Theories. 49-54 - Osman Gunay, B. Ugur Töreyin, Kivanç Köse, A. Enis Çetin:

Online Adaptive Decision Fusion Framework Based on Entropic Projections onto Convex Sets with Application to Wildfire Detection in Video. - Ping Zhou, Loet Leydesdorff:

Fractional counting of citations in research evaluation: A cross- and interdisciplinary assessment of the Tsinghua University in Beijing. - Matus Telgarsky:

The Convergence Rate of AdaBoost and Friends. - Beom Hee Lee, Seong-Lyun Kim:

Mobility Control for Machine-to-Machine LTE Systems. - Wojciech Fraczek, Wojciech Mazurczyk, Krzysztof Szczypiorski:

Multi-Level Steganography: Improving Hidden Communication in Networks. - Jean-Paul Delahaye, Hector Zenil:

Numerical Evaluation of Algorithmic Complexity for Short Strings: A Glance into the Innermost Structure of Randomness. - Samuel Mimram:

The Structure of First-Order Causality (extended version). - Minhua Ding, Q. T. Zhang:

Source Optimization in MISO Relaying with Channel Mean Feedback: A Stochastic Ordering Approach. - Volker Diekert, Steffen Kopecki:

It Is NL-complete to Decide Whether a Hairpin Completion of Regular Languages Is Regular. - Philippe Moser:

A zero-one SUBEXP-dimension law for BPP. - Ridwan Al Iqbal:

Using Feature Weights to Improve Performance of Neural Networks. - Ridwan Al Iqbal:

A Generalized Method for Integrating Rule-based Knowledge into Inductive Methods Through Virtual Sample Creation. - Jirí Adámek, Stefan Milius, Jirí Velebil:

Semantics of Higher-Order Recursion Schemes. - Erwan Salaün, Maxime Gariel, Adan Vela, Eric Feron:

Aircraft Proximity Maps Based on Data-Driven Flow Modeling. - Rui Wang, Vincent K. N. Lau, Huang Huang:

Opportunistic Buffered Decode-Wait-and-Forward (OBDWF) Protocol for Mobile Wireless Relay Networks. - Olav Geil, Casper Thomsen:

List decoding of a class of affine variety codes. - Klaus Wehmuth, Artur Ziviani:

Distributed Algorithm to Locate Critical Nodes to Network Robustness based on Spectral Analysis. - Saif E. A. Alnawayseh, Pavel Loskot:

Order Statistics Based List Decoding Techniques for Linear Binary Block Codes. - Mohammadreza Abolghasemi-Dahaghani, Farzad Didehvar, Alireza Nowroozi:

A Novel Template-Based Learning Model. - Géraud Sénizergues:

Jancar's formal system for deciding bisimulation of first-order grammars and its non-soundness. - Peter beim Graben, Sabrina Gerth:

Geometric representations for minimalist grammars. - Kivanç Köse, Osman Gunay, A. Enis Çetin:

Compressive Sensing Using the Entropy Functional. - Yi-Ting Chen, Constantine Caramanis, Sanjay Shakkottai:

On Sharing Viral Video over an Ad Hoc Wireless Network. - Morten Mørup, Mikkel N. Schmidt, Lars Kai Hansen:

Infinite Multiple Membership Relational Modeling for Complex Networks. - Christopher J. Quinn, Todd P. Coleman, Negar Kiyavash:

Causal Dependence Tree Approximations of Joint Distributions for Multiple Random Processes. - J. Anitha, S. Immanuel Alex Pandian:

A Color Image Digital Watermarking Scheme Based on SOFM. - Thomas David Novlan, Radha Krishna Ganti, Arunabha Ghosh, Jeffrey G. Andrews:

Analytical Evaluation of Fractional Frequency Reuse for OFDMA Cellular Networks. - Matthew J. Patitz:

Simulation of Self-Assembly in the Abstract Tile Assembly Model with ISU TAS. - Jasni Mohamad Zain:

Strict Authentication Watermarking with JPEG Compression (SAW-JPEG) for Medical Images. - Steffen van Bakel, Stefano Berardi, Ulrich Berger:

Proceedings Third International Workshop on Classical Logic and Computation, CL&C 2010, Brno, Czech Republic, 21-22 August 2010. EPTCS 47, 2010 [contents] - Vinod M. Prabhakaran, Rohit Puri, Kannan Ramchandran:

Hybrid Digital-Analog Codes for Source-Channel Broadcast of Gaussian Sources over Gaussian Channels. - Guy Even, Moti Medina, Gregor Schaffrath, Stefan Schmid:

Competitive and Deterministic Embeddings of Virtual Networks. - Abuzer Yakaryilmaz, A. C. Cem Say:

NP has log-space verifiers with fixed-size public quantum registers. - Kenneth W. Shum:

Cooperative Regenerating Codes for Distributed Storage Systems. - Suenje Dallmeier-Tiessen, Robert Darby, Bettina Goerner, Jenni Hyppoelae, Peter Igo-Kemenes, Deborah Kahn, Simon C. Lambert, Anja Lengenfelder, Chris Leonard, Salvatore Mele, Malgorzata Nowicka, Panayiota Polydoratou

, David Ross, Sergio Ruiz-Perez, Ralf Schimmer, Mark Swaisland, Wim van der Stelt:
Highlights from the SOAP project survey. What Scientists Think about Open Access Publishing. - Andrea Clementi, Riccardo Silvestri:

Parsimonious Flooding in Geometric Random-Walks. - Grenville J. Croll

:
A Chronology of Torah Cryptography. - Ferkan Yilmaz, Mohamed-Slim Alouini

:
A Novel Unified Expression for the Capacity and Bit Error Probability of Wireless Communication Systems over Generalized Fading Channels. - Laurent Jacques, Laurent Duval, Caroline Chaux, Gabriel Peyré:

A Panorama on Multiscale Geometric Representations, Intertwining Spatial, Directional and Frequency Selectivity. - Yi-Ling Hwong, Vincent J. J. Kusters, Tim A. C. Willemse:

Analysing the Control Software of the Compact Muon Solenoid Experiment at the Large Hadron Collider. - Ravi Gummadi, Anupam Khulbe, Aravind Kalavagattu, Sanil Salvi, Subbarao Kambhampati:

SmartInt: Using Mined Attribute Dependencies to Integrate Fragmented Web Databases. - Kamel Tourki, Hong-Chuan Yang, Mohamed-Slim Alouini

:
Accurate Performance Analysis of Opportunistic Decode-and-Forward Relaying. - Sergio España, Arturo González, Oscar Pastor, Marcela Ruiz:

Message Structures: a modelling technique for information systems analysis and design. - Dana Ron, Ronitt Rubinfeld, Muli Safra, Omri Weinstein:

Approximating the Influence of a monotone Boolean function in O(\sqrt{n}) query complexity. - Farhat Masood:

RISC and CISC. - Chris Thachuk:

Succincter Text Indexing with Wildcards. - Michael A. Bender, Sándor P. Fekete, Tom Kamphans, Nils Schweer:

Maintaining Arrays of Contiguous Objects. - Panteleimon Rodis:

Connection errors in networks of linear features and the application of geometrical reduction in spatial data algorithms. - Luis Javier García-Villalba, José René Fuentes Cortez, Ana Lucila Sandoval Orozco, Mario Blaum:

Efficient Algorithms for Searching Optimal Shortened Cyclic Single-Burst-Correcting Codes. - Gerard Briscoe, Philippe De Wilde:

The Computing of Digital Ecosystems. - Federico Aschieri:

Interactive Learning Based Realizability and 1-Backtracking Games. 6-20 - Gilda Ferreira

, Paulo Oliva:
On Various Negative Translations. 21-33 - Clément Houtmann:

Superdeduction in Lambda-Bar-Mu-Mu-Tilde. 34-43 - Reinhard Kahle

, Isabel Oitavem
:
An applicative theory for FPH. 44-56 - Luís Pinto

, Tarmo Uustalu
:
Relating Sequent Calculi for Bi-intuitionistic Propositional Logic. 57-72 - Trifon Trifonov

:
Dialectica Interpretation with Marked Counterexamples. 73-84 - Kun Peng:

Failure of A Mix Network. - Jack H. Lutz:

Resource Bounded Measure. - Nasser Ghadiri, Ahmad Baraani-Dastjerdi, Nasser Ghasem-Aghaee, Mohammad Ali Nematbakhsh:

A Human-Centric Approach to Group-Based Context-Awareness. - Maciej Kurant, Minas Gjoka, Carter T. Butts, Athina Markopoulou:

Walking on a Graph with a Magnifying Glass. - Tom Cuypers, Se Baek Oh, Tom Haber, Philippe Bekaert, Ramesh Raskar:

Ray-Based Reflectance Model for Diffraction. - Mourad Gridach, Nouredine Chenfour:

Developing a New Approach for Arabic Morphological Analysis and Generation. - Nieves R. Brisaboa, Rodrigo Cánovas, Miguel A. Martínez-Prieto, Gonzalo Navarro:

Compressed String Dictionaries. - Fabio Ricciato, Martin Burkhart:

Reduce to the Max: A Simple Approach for Massive-Scale Privacy-Preserving Collaborative Network Measurements (Extended Version). - Kitty Meeks, Alexander Scott:

The complexity of Free-Flood-It on 2xn boards. - Piotr J. Puczynski:

T2Script Programming Language. - Daniele Perito, Claude Castelluccia, Mohamed Ali Kâafar, Pere Manils:

How Unique and Traceable are Usernames? - Nishita Aggarwal, Naveen Garg, Swati Gupta:

A 4/3-approximation for TSP on cubic 3-edge-connected graphs. - Anthony Bisong, Syed M. Rahman:

An Overview of the Security Concerns in Enterprise Cloud Computing. - Ozan Candogan, Kostas Bimpikis, Asuman E. Ozdaglar:

Optimal Pricing in Networks with Externalities. - Kian Hsiang Low, John M. Dolan, Pradeep K. Khosla:

Active Markov Information-Theoretic Path Planning for Robotic Environmental Sensing. - L. K. Joshila Grace, V. Maheswari, Dhinaharan Nagamalai:

Analysis of Web Logs and Web User in Web Mining. - Quan Geng, Huan Wang, John Wright:

On the Local Correctness of L^1 Minimization for Dictionary Learning. - Imdadullah Khan:

Perfect Matchings in 4-uniform hypergraphs. - Qin Li, Chengqing Li, Dongyang Long, Wai Hong Chan, Chun-Hui Wu:

On the impossibility of non-static quantum bit commitment between two parties. - Jonathan Pokrass, Alexander M. Bronstein, Michael M. Bronstein:

A correspondence-less approach to matching of deformable shapes. - Pål Anders Floor, Anna N. Kim, Niklas Wernersson, Tor A. Ramstad, Mikael Skoglund, Ilangko Balasingham:

On Transmission of Two Correlated Gaussian Memoryless Sources over a Gaussian MAC using Delay-Free Mappings. - Daniel W. Bliss, Siddhartan Govindasamy:

Minimizing Hidden-Node Network Interference by Optimizing SISO and MIMO Spectral Efficiency. - Michael Dinitz, Robert Krauthgamer:

Fault-Tolerant Spanners: Better and Simpler. - Yong Fang:

Sparse Matrix Recovery from Random Samples via 2D Orthogonal Matching Pursuit. - Arno Bastenhof:

Polarized Montagovian Semantics for the Lambek-Grishin calculus. - Debajyoti Mukhopadhyay, Chandrima Chakrabarti, Sounak Chakravorty:

A New Semantic Web Approach for Constructing, Searching and Modifying Ontology Dynamically. - Joan Bruna, Stéphane Mallat:

Geometric Models with Co-occurrence Groups. - Jason Cloud, Linda Zeger, Muriel Médard:

Co-Designing Multi-Packet Reception, Network Coding, and MAC Using a Simple Predictive Model. - Guoshen Yu, Guillermo Sapiro:

Statistical Compressed Sensing of Gaussian Mixture Models. - Béla Genge, Piroska Haller:

Using Planetlab to Implement Multicast at the Application Level. - Urtzi Ayesta, Martin Erausquin, Matthieu Jonckheere, Ina Maria Verloop:

Scheduling in a random environment: stability and asymptotic optimality. - Matteo Riondato, Mert Akdere, Ugur Çetintemel, Stanley B. Zdonik, Eli Upfal:

The VC-Dimension of Queries and Selectivity Estimation Through Sampling. - Chinmay S. Vaze, Mahesh K. Varanasi:

The Degrees of Freedom Region and Interference Alignment for the MIMO Interference Channel with Delayed CSI. - Imdadullah Khan:

Perfect matching in 3 uniform hypergraphs with large vertex degree. - Katy Daiger:

The Documents and Assets Created During the Video Game Production Process. - Krishnendu Chatterjee, Vinayak S. Prabhu:

Synthesis of Memory-Efficient Real-Time Controllers for Safety Objectives (Full Version). - Masato Tajima, Koji Okino, Takashi Miyagoshi:

Simultaneous Code/Error-Trellis Reduction for Convolutional Codes Using Shifted Code/Error-Subsequences. - Kitty Meeks, Alexander Scott:

The complexity of flood-filling games on graphs. - Sara Brunetti, Elena Lodi, Walter Quattrociocchi:

Dynamic Monopolies in Colored Tori. - Vojtech Prehnal:

Dialog interface for dynamic data models. - Kévin Perrot, Eric Rémila:

Avalanche Structure in the Kadanoff Sand Pile Model. - (Withdrawn) Random Walk on Directed Dynamic Graphs.

- Bojin Zheng, Deyi Li, Guisheng Chen, Jianmin Wang:

A Kind of Representation of Common Knowledge and its Application in Requirements Analysis. - Eirik Rosnes, Alexandre Graell i Amat:

On the Analysis of Weighted Nonbinary Repeat Multiple-Accumulate Codes. - Bojin Zheng, Jianmin Wang, Guisheng Chen, Jian Jiang, Xianjun Shen:

Hidden Tree Structure is a Key to the Emergence of Scaling in the World Wide Web. - Md Saifur Rahman, Aaron B. Wagner:

Optimality of Binning for Distributed Hypothesis Testing. - H. V. Beltrão Neto, Werner Henkel, Valdemar Cardoso da Rocha Jr.:

Multi-Edge type Unequal Error Protection LDPC codes. - Bojin Zheng, Yuanxiang Li:

New Model for Multi-Objective Evolutionary Algorithms. - Andrea Roli, Mattia Manfroni, Carlo Pinciroli, Mauro Birattari:

Boolean network robotics: a proof of concept. - Andrea Roli, Michela Milano:

Solving the Satisfiability Problem Through Boolean Networks. - Stefano Iellamo, Lin Chen, Marceau Coupechoux:

Let Cognitive Radios Imitate: Imitation-based Spectrum Access for Cognitive Radio Networks. - Andrea Roli, Cristian Arcaroli, Marco Lazzarini, Stefano Benedettini:

Boolean Networks Design by Genetic Algorithms. - Ricardo Lopes, Vítor Santos Costa, Fernando M. A. Silva:

A Design and Implementation of the Extended Andorra Model. - Sourabh Bhattacharya, Ali Khanafer, Tamer Basar:

Power Allocation in Team Jamming Games in Wireless Ad Hoc Networks. - François Rodier:

Some More Functions That Are Not APN Infinitely Often. The Case of Kasami exponents. - Jose Antonio Martin H.:

A polynomial 3-colorability algorithm with automatic generation of NO 3-colorability (i.e. Co-NP) short proofs. - Jiapu Zhang:

A Brief Review on Results and Computational Algorithms for Minimizing the Lennard-Jones Potential. - Toyohiro Tsurumaru, Masahito Hayashi:

Dual universality of hash functions and its applications to classical and quantum cryptography. - Shekhar Chandra, Imants D. Svalbe, Jean-Pierre V. Guédon, Andrew Kingston, Nicolas Normand:

Recovering Missing Slices of the Discrete Fourier Transform using Ghosts. - Jason Morton:

Pfaffian Circuits. - Madhur Srivastava, Prateek Katiyar, Yashwant Yashu, Satish Kumar Singh, Prasanta K. Panigrahi:

A Fast Statistical Method for Multilevel Thresholding in Wavelet Domain. - Sarika Jalan, Baowen Li:

Spectral Properties of Directed Random Networks with Modular Structure. - Reza Hosseini:

Conditional information and definition of neighbor in categorical random fields. - David R. Bickel:

Hypothesis support measured by likelihood in the presence of nuisance parameters, multiple studies, and multiple comparisons. - Hang-Hyun Jo, Márton Karsai, János Kertész, Kimmo Kaski:

Circadian pattern and burstiness in human communication activity. - Massimo Ostilli, A. L. Ferreira, José F. F. Mendes:

Critical behavior and correlations on scale-free small-world networks. Application to network design. - Mazen Al Borno:

Reduction in Solving Some Integer Least Squares Problems. - Scott Aaronson:

Impossibility of Succinct Quantum Proofs for Collision-Freeness. - Xiu-Lian Xu, Yan-Qin Qu, Shan Guan, Yu-Mei Jiang, Da-Ren He:

Interconnecting bilayer networks. - J. A. M. Vermaseren:

FORM development. - Gaetan Bisson

, Andrew V. Sutherland:
A low-memory algorithm for finding short product representations in finite groups. - Jun Zhang, Xianbin Cao, Wenbo Du, Kaiquan Cai:

Evolution of Chinese airport network. - Alain Coulais

, M. Schellens, J. Gales, S. Arabas, M. Boquien
, P. Chanial, P. Messmer, D. Fillmore, O. Poplawski, S. Maret, G. Marchal, N. Galmiche, T. Mermet:
Status of GDL - GNU Data Language. - Andrew C. Thomas, Joseph K. Blitzstein:

Valued Ties Tell Fewer Lies: Why Not To Dichotomize Network Edges With Thresholds. - Vasco Brattka, Guido Gherardi, Alberto Marcone:

The Bolzano-Weierstrass Theorem is the Jump of Weak König's Lemma. - Stefano Galatolo, Mathieu Hoyrup, Cristobal Rojas:

Dynamical systems, simulation, abstract computation. - Tengyu Ma, Xiaoming Sun, Huacheng Yu:

A New Variation of Hat Guessing Games. - K. D. Prathapasinghe Dharmawansa, Matthew R. McKay

:
Extreme Eigenvalue Distributions of Some Complex Correlated Non-Central Wishart and Gamma-Wishart Random Matrices. - Luc Habert, Michel Pocchiola:

Arrangements of double pseudolines. - Lingfei Wu, Jiang Zhang, Jonathan J. H. Zhu, Kai Lei, Qian Mo:

Diversity Leads to Accelerating Growth in Online Social Systems. - Paul Goulart, Sergei I. Chernyshenko:

Global Stability Analysis of Fluid Flows using Sum-of-Squares. - Suhan Ree:

Opinion dynamics of random-walking agents on a lattice. - Silvio C. Ferreira

, Marcelo M. Martins:
Critical behavior of the contact process in a multiscale network. - Simon R. Blackburn:

The existence of k-radius sequences. - Lev B. Levitin, Tommaso Toffoli:

Work recoverable from two-particle information. - Bernd Sturmfels, Volkmar Welker:

Commutative Algebra of Statistical Ranking. - Jin-Li Guo, Chao Fan, Ya-Li Ji:

The Universality of the Attractiveness Model to Weighted Networks. - Yang Wang, Zengru Di, Ying Fan:

Detecting Important Nodes to Community Structure Using the Spectrum of the Graph. - José M. Peña:

A Correction of "Deriving a Minimal I-Map of a Belief Network Relative to a Target Ordering of its Nodes". - Valérie Berthé, Timo Jolivet, Anne Siegel:

Connectedness of fractals associated with Arnoux-Rauzy substitutions. - Rodney Coleman:

On Krawtchouk polynomials. - A. Yazdani, Vahid Nassehi:

Finite element solution of multi-scale transport problems using the least squares based bubble function enrichment. - Stefan Ragnarsson, Charles F. Van Loan:

Block Tensor Unfoldings. - Amir Bashan, Roni Parshani, Shlomo Havlin:

Percolation in networks composed of connectivity and dependency links. - Sándor P. Fekete, Alexander Kroeller, Martin Lorek, Marc E. Pfetsch:

Disruption Management with Rescheduling of Trips and Vehicle Circulations. - Krzysztof Malarz, Krzysztof Kulakowski:

Bounded confidence model: addressed information maintain diversity of opinions. - Maria Luisa Bonet, Simone Linz, Katherine St. John:

The Complexity of Finding Multiple Solutions to Betweenness and Quartet Compatibility. - Lloyd Wood, Charles Smith, Wesley M. Eddy, William D. Ivancic, Chris Jackson:

Taking Saratoga from Space-Based Ground Sensors to Ground-Based Space Sensors. - R. C. Venkatesan, Angel Plastino:

Scaled Bregman divergences in a Tsallis scenario. - Giacomo Como, Ketan Savla, Daron Acemoglu, Munther A. Dahleh, Emilio Frazzoli:

Stability Analysis of Transportation Networks with Multiscale Driver Decisions. - Andrew C. Thomas, Joseph K. Blitzstein:

Valued Ties Tell Fewer Lies, II: Why Not To Dichotomize Network Edges With Bounded Outdegrees. - Susan Khor:

Why aren't the small worlds of protein contact networks smaller. - Stéphane Mallat:

Group Invariant Scattering. - Katharina Fischer:

ε-Equilibria in Quitting Games - Basics. - Mohamed-Ali Belabbas:

Decentralized Formation Control Part I: Geometric Aspects. - Mohamed-Ali Belabbas:

Decentralized Formation Control Part II: Algebraic aspects of information flow and singularities. - Federico Ardila, Megan Owen, Seth Sullivant:

Geodesics in CAT(0) Cubical Complexes. - Vinko Zlatic, Diego Garlaschelli, Guido Caldarelli:

Complex networks with arbitrary edge multiplicities. - Chih-Ping Li, Michael J. Neely:

Delay and Power-Optimal Control in Multi-Class Queueing Systems. - László Gulyás, Gábor Horváth, Tamás Cséri, George Kampis:

An Estimation of the Shortest and Largest Average Path Length in Graphs of Given Density. - Gaston Heimeriks, Loet Leydesdorff:

Emerging Search Regimes: Measuring Co-evolutions among Research, Science, and Society. - Mark Walters:

Small components in k-nearest neighbour graphs. - Animesh Mukherjee, Francesca Tria, Andrea Baronchelli, Andrea Puglisi, Vittorio Loreto:

Aging in language dynamics. - (Withdrawn) Convergence to consensus in multiagent systems and the lengths of inter-communication intervals.

- Marcin Ostrowski:

Information and the arrow of time. - Benjamin A. Burton:

Detecting genus in vertex links for the fast enumeration of 3-manifold triangulations. - Sonny Ben-Shimon, Michael Krivelevich, Benny Sudakov:

On the resilience of Hamiltonicity and optimal packing of Hamilton cycles in random graphs. - Masato Hisakado, Shintaro Mori:

Digital herders and phase transition in a voting model. - Lily Chen, Xueliang Li, Yongtang Shi:

The complexity of determining the rainbow vertex-connection of graphs. - Ming Zhao, Changsong Zhou, Jinhu Lü, Choy Heng Lai:

Competition between Intra-community and Inter-community Synchronization. - David M. South:

Data Preservation in High Energy Physics. - K. V. Karelsky, A. S. Petrosyan, A. G. Slavin:

Quasi-two-layer finite-volume scheme for modeling shallow water flows with the presence of external forces. - Raymond Hemmecke, Shmuel Onn, Lyubov Romanchuk:

N-fold integer programming in cubic time. - Sergey G. Bobkov, Mokshay M. Madiman:

Dimensional behaviour of entropy and information. - Yukio Hayashi

, Yasumasa Ono:
Traffic properties for stochastic routings on scale-free networks. - Amit Hagar, Giuseppe Sergioli:

Counting Steps: A New Approach to Objective Probability in Physics. - (Withdrawn) Infinity in computable probability.

- Christian Eder, John Edward Perry:

Signature-based algorithms to compute Groebner bases. - Donghui Yan, Peng Gong, Aiyou Chen, Liheng Zhong:

Classification under Data Contamination with Application to Remote Sensing Image Mis-registration. - Gitta Kutyniok:

Sparsity Equivalence of Anisotropic Decompositions. - Daniele Veneziano, Marta C. González:

Trip Length Distribution Under Multiplicative Spatial Models of Supply and Demand: Theory and Sensitivity Analysis. - David Lusseau, Louise Barrett, S. Peter Henzi:

Formalising the multidimensional nature of social networks. - Balázs Keszegh, Dömötör Pálvölgyi:

Octants are Cover Decomposable. - Sevag Gharibian, Julia Kempe:

Approximation algorithms for QMA-complete problems. - Fabio Pasqualetti, Antonio Franchi, Francesco Bullo:

On cooperative patrolling: optimal trajectories, complexity analysis, and approximation algorithms. - James M. Whitacre, Philipp Rohlfshagen, Axel Bender, Xin Yao:

Evolutionary Mechanics: new engineering principles for the emergence of flexibility in a dynamic and uncertain world. - Aram Galstyan, Greg Ver Steeg, Armen E. Allahverdyan:

Statistical Mechanics of Semi-Supervised Clustering in Sparse Graphs. - Zdenek Dvorák:

3-choosability of planar graphs with (<=4)-cycles far apart. - Ugo V. Boscain, Marco Caponigro, Thomas Chambrion, Mario Sigalotti:

A weak spectral condition for the controllability of the bilinear Schrödinger equation with application to the control of a rotating planar molecule. - Nithin Nagaraj, Mathew Shaji Kavalekalam, Arjun Venugopal T., Nithin Krishnan:

Lossless Compression and Complexity of Chaotic Sequences. - Oleg I. Mokhov:

On initial data in the problem of consistency on cubic lattices for 3 x 3 determinants. - Tobias Galla:

Cycles of cooperation and defection in imperfect learning. - Guohui Song, Haizhang Zhang, Fred J. Hickernell:

Reproducing Kernel Banach Spaces with the l1 Norm. - Wesley Pegden:

A finite goal set in the plane which is not a Winner. - Guohui Song, Haizhang Zhang:

Reproducing Kernel Banach Spaces with the l1 Norm II: Error Analysis for Regularized Least Square Regression. - Matthieu Deneufchâtel, Gérard Henry Edmond Duchamp, Vincel Hoang Ngoc Minh, Allan I. Solomon:

Independence of hyperlogarithms over function fields via algebraic combinatorics. - Francesco Calabrese, Zbigniew Smoreda, Vincent D. Blondel, Carlo Ratti:

The interplay between telecommunications and face-to-face interactions - an initial study using mobile phone data. - Marc Bailly-Bechet, Christian Borgs, Alfredo Braunstein, Jennifer T. Chayes, A. Dagkessamanskaia, J.-M. François, Riccardo Zecchina:

Finding undetected protein associations in cell signaling by belief propagation. - Tobias Heindel, Pawel Sobocinski

:
Being Van Kampen is a universal property. - M. Kamrul Hassan, M. Zahedul Hassan, Neeaj I. Pavel:

Dynamic scaling, data-collapse and self-similarity in Barabási and Albert networks. - Francesca P. Carli, Augusto Ferrante, Michele Pavon, Giorgio Picci:

A Maximum Entropy solution of the Covariance Extension Problem for Reciprocal Processes. - Brittany D. Froese:

A numerical method for the elliptic Monge-Ampère equation with transport boundary conditions. - Sandro Bosio, Di Yuan:

Modeling and Solving AP Location and Frequency Assignment for Maximizing Access Efficiency in Wi-Fi Networks. - Atieh Mirshahvalad, Martin Rosvall:

Reinforced communication and social navigation: remember your friends and remember yourself. - Luo-Luo Jiang, Matjaz Perc, Wen-Xu Wang, Ying-Cheng Lai, Bing-Hong Wang:

Impact of link deletions on public cooperation in scale-free networks. - Peter Sheridan Dodds, Kameron Decker Harris, Isabel M. Kloumann, Catherine A. Bliss, Christopher M. Danforth:

Temporal patterns of happiness and information in a global social network: Hedonometrics and Twitter. - Francisco Aparecido Rodrigues, Guilherme Ferraz de Arruda, Luciano da Fontoura Costa:

A Complex Networks Approach for Data Clustering. - Chris Dowden:

A new axiomatic approach to diversity. - Fabrizio de Vico Fallani, Vincenzo Nicosia, Roberta Sinatra, Laura Astolfi, Febo Cincotti, Donatella Mattia, Christopher T. Wilke, A. Doud, Vito Latora, Bin He, Fabio Babiloni:

Defecting or not defecting: how to "read" human behavior during cooperative games by EEG measurements. - Olof Heden, Papa Amar Sissokho:

On the existence of a (2,3)-spread in V(7,2). - Scott Aaronson, Andrew Drucker:

Advice Coins for Classical and Quantum Computation. - Matheus P. Viana, João L. B. Batista, Luciano da F. Costa:

How Many Nodes are Effectively Accessed in Complex Networks? - August Lau, Chuan Yin:

Solvability by semigroup : Application to seismic imaging with complex decomposition of wave equations and migration operators with idempotents. - Peter Sheridan Dodds, Kameron Decker Harris, Joshua L. Payne:

Physical, transparent derivation of the contagion condition for spreading processes on generalized random networks. - Ivo Hedtke:

A Note on the Group-theoretic Approach to Fast Matrix Multiplication. - Tal Orenshtein, Igor Shinkar:

Greedy random walk. - Xueliang Li, Yuefang Sun:

Rainbow Connection of Graphs -- A Survey. - Gabriel Acosta, Inés Caridi, Sebastián Guala, Javier Marenco:

The Full Strategy Minority Game. - Ryohei Hisano, Didier Sornette, Takayuki Mizuno:

Predicted and verified evolution of power-law exponent in product market. - Raj Kumar Pan, Jari Saramäki:

Path lengths, correlations, and centrality in temporal networks. - Éric Colin de Verdière, Grégory Ginot, Xavier Goaoc

:
Helly numbers of acyclic families. - E. S. Roberts, Anthony C. C. Coolen, Thomas Schlitt:

Tailored graph ensembles as proxies or null models for real networks II: results on directed graphs. - Stephan Weis:

Quantum Convex Support. - Benoîte de Saporta, François Dufour, Huilong Zhang, Charles Elegbede:

Optimal stopping for the predictive maintenance of a structure subject to corrosion. - Filippo Radicchi:

Who is the best player ever? A complex network analysis of the history of professional tennis. - Saikat Guha:

Structured optical receivers to attain superadditive capacity and the Holevo limit. - Adrian Kent:

Unconditionally Secure Bit Commitment with Flying Qudits. - Jan L. Cieslinski:

Locally exact modifications of numerical integrators. - Klaus Frick, Philipp Marnitz, Axel Munk:

Statistical Multiresolution Dantzig Estimation in Imaging: Fundamental Concepts and Algorithmic Framework. - Sébastien Gerchinovitz:

Sparsity regret bounds for individual sequences in online linear regression. - Osbert Bastani, Christopher J. Hillar, Dimitar Popov, J. Maurice Rojas:

Randomization, Sums of Squares, and Faster Real Root Counting for Tetranomials and Beyond. - Benno van den Berg, Chris Heunen:

No-go theorems for functorial localic spectra of noncommutative rings. 21-25

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














