default search action
CoRR, April 2011
- Denis S. Krotov:
On the binary codes with parameters of triply-shortened 1-perfect codes. - Guanfeng Liang, Nitin H. Vaidya:
Capacity of Byzantine Consensus with Capacity-Limited Point-to-Point Links. - Elizabeth Bodine-Baron, Christina Lee, Anthony Chong, Babak Hassibi, Adam Wierman:
Peer Effects and Stability in Matching Markets. - Yoo Chung:
Distributed Denial of Service is a Scalability Problem. - Shuo-Tsung Chen, Huang-Nan Huang, Chur-Jen Chen:
Adaptive Audio Watermarking via the Optimization Point of View on the Wavelet-Based Entropy. - Shuo-Tsung Chen, Huang-Nan Huang, Shu-Yi Tu:
Quantization Audio Watermarking with Optimal Scaling on Wavelet Coefficients. - Yi Gai, Bhaskar Krishnamachari:
Decentralized Online Learning Algorithms for Opportunistic Spectrum Access. - George C. Alexandropoulos, Agisilaos Papadogiannis, Paschalis C. Sofotasios:
A Comparative Study of Relaying Schemes with Decode-and-Forward over Nakagami-m Fading Channels. - Tobias Christ, Andrea Francke, Heidi Gebauer, Jirí Matousek, Takeaki Uno:
A Doubly Exponentially Crumbled Cake. - Fabian Abel, Ilknur Celik, Claudia Hauff, Laura Hollink, Geert-Jan Houben:
U-Sem: Semantic Enrichment, User Modeling and Mining of Usage Data on the Social Web. - Krishnendu Chatterjee, Thomas A. Henzinger, Mathieu Tracol:
The Decidability Frontier for Probabilistic Automata on Infinite Words. - Vera Hollink, Arjen P. de Vries:
Towards an automated query modification assistant. - Jörg Bühler, Gerhard Wunder:
On Interference Alignment and the Deterministic Capacity for Cellular Channels with Weak Symmetric Cross Links. - Sumit Kumar, Deepti Singhal, Garimella Rama Murthy:
Doubly Cognitive Architecture Based Cognitive Wireless Sensor Network. - Michael Chertkov, Mikhail G. Stepanov, Feng Pan, Ross Baldick:
Exact and Efficient Algorithm to Discover Extreme Stochastic Events in Wind Generation over Transmission Power Grids. - Martin Grohe, Marc Thurley:
Counting Homomorphisms and Partition Functions. - Ugo Dal Lago, Marco Gaboardi:
Linear Dependent Types and Relative Completeness. - Ugo Dal Lago, Margherita Zorzi:
Probabilistic Operational Semantics for the Lambda Calculus. - Boris D. Lubachevsky:
Why The Results of Parallel and Serial Monte Carlo Simulations May Differ. - Kristian B. Ølgaard, Garth N. Wells:
Optimisations for quadrature representations of finite element tensors through automated code generation. - Loïc Michel:
Introduction to the model-free control of microgrids. - Roman Kontchakov, Yavor Nenov, Ian Pratt-Hartmann, Michael Zakharyaschev:
On the Decidability of Connectedness Constraints in 2D and 3D Euclidean Spaces. - Yaser Eftekhari, Anoosheh Heidarzadeh, Amir H. Banihashemi, Ioannis Lambadaris:
Density Evolution Analysis of Node-Based Verification-Based Algorithms in Compressive Sensing. - Yang Gao, Ertem Tuncel:
Separate Source-Channel Coding for Broadcasting Correlated Gaussians. - Ido Ginodi, Amir Globerson:
Gaussian Robust Classification. - Peter R. Brune, Matthew G. Knepley, L. Ridgway Scott:
Unstructured Geometric Multigrid in Two and Three Dimensions on Complex and Graded Meshes. - Mike Stimpson:
Evolving a New Feature for a Working Program. - Serge Haddad, Jean Mairesse, Hoang-Thach Nguyen:
Synthesis and Analysis of Product-form Petri Nets. - Ashkan Khatir, Shaghayegh Abdolahzadegan, Iman Mahmoudi:
High Speed Multiple Valued Logic Full Adder Using Carbon Nano Tube Field Effect Transistor. - Joseph J. Pfeiffer III, Jennifer Neville:
Methods to Determine Node Centrality and Clustering in Graphs with Uncertain Structure. - Yudong Chen, Ali Jalali, Sujay Sanghavi, Constantine Caramanis:
Low-rank Matrix Recovery from Errors and Erasures. - Ehsan Heidari, Ali Movaghar:
An Efficient Method Based on Genetic Algorithms to Solve Sensor Network Optimization Problem. - (Withdrawn) Proof-Theoretic Soundness and Completeness.
- Neri Merhav:
Relations between redundancy patterns of the Shannon code and wave diffraction patterns of partially disordered media. - Vladimir V. Gusev, Elena V. Pribavkina:
On Non-Complete Sets and Restivo's Conjecture. - Linh Anh Nguyen:
A Cut-Free ExpTime Tableau Decision Procedure for the Logic Extending Converse-PDL with Regular Inclusion Axioms. - Daejung Yoon, Jaekyun Moon:
Soft-Decision-Driven Channel Estimation for Pipelined Turbo Receivers. - Bartosz Jankowski, Wojciech Mazurczyk, Krzysztof Szczypiorski:
PadSteg: Introducing Inter-Protocol Steganography. - Peyman Razaghi, Song-Nam Hong, Lei Zhou, Wei Yu, Giuseppe Caire:
Two Birds and One Stone: Gaussian Interference Channel with a Shared Out-of-Band Relay. - Yu Mao:
Reconstruction of Binary Functions and Shapes from Incomplete Frequency Information. - Jeong-woo Cho, Yung Yi:
On the Payoff Mechanisms in Peer-Assisted Services with Multiple Content Providers: Rationality and Fairness. - Yaping Li, Minghua Chen, Qiwei Li, Wei Zhang:
Enabling Multi-level Trust in Privacy Preserving Data Mining. - Christophe Chabot, Jean-Guillaume Dumas, Laurent Fousse, Pascal Giorgi:
Recursive double-size fixed precision arithmetic. - Michele Basaldella, Claudia Faggian:
Ludics with repetitions (Exponentials, Interactive types and Completeness). - Wenyi Zhang, Satish Vedantam, Urbashi Mitra:
Joint Transmission and State Estimation: A Constrained Channel Coding Approach. - Michael Benedikt, Georg Gottlob, Pierre Senellart:
Determining Relevance of Accesses at Runtime (Extended Version). - Christian Senger, Vladimir Sidorenko, Steffen Schober, Martin Bossert, Victor V. Zyablov:
Adaptive Single-Trial Error/Erasure Decoding of Reed-Solomon Codes. - Ye Ji:
Image Retrieval Method Using Top-surf Descriptor. - Ran Tao:
Visual Concept Detection and Real Time Object Detection. - Ranjan Pal, Pan Hui:
Modeling Internet Security Investments: The Case of Dealing with Information Uncertainty. - Seyed Hamed Hassani, Nicolas Macris, Ryuhei Mori:
Near concavity of the growth rate for coupled LDPC chains. - Peter Lohmann, Heribert Vollmer:
Complexity Results for Modal Dependence Logic. - Parosh Aziz Abdulla, Richard Mayr:
Computing Optimal Coverability Costs in Priced Timed Petri Nets. - Pankaj K. Agarwal, Jie Gao, Leonidas J. Guibas, Haim Kaplan, Vladlen Koltun, Natan Rubin, Micha Sharir:
Kinetic Stable Delaunay Graphs. - Kristian B. Ølgaard, Anders Logg, Garth N. Wells:
Automated code generation for discontinuous Galerkin methods. - Lakshmi Prasad Natarajan, K. Pavan Srinath, B. Sundar Rajan:
On the Sphere Decoding Complexity of STBCs for Asymmetric MIMO Systems. - Mohamed A. El-Zawawy:
Program Optimization Based Pointer Analysis and Live Stack-Heap Analysis. - Ioannis Broustis, Georgios S. Paschos, Dimitris Syrivelis, Leonidas Georgiadis, Leandros Tassiulas:
NCRAWL: Network Coding for Rate Adaptive Wireless Links. - Mariano Tepper, Pablo Musé, Andrés Almansa:
Meaningful Clustered Forest: an Automatic and Robust Clustering Algorithm. - Changbo Chen, Marc Moreno Maza:
Algorithms for Computing Triangular Decompositions of Polynomial Systems. - Afshin Rostamizadeh, Alekh Agarwal, Peter L. Bartlett:
Online and Batch Learning Algorithms for Data with Missing Features. - Wei Ren, Qing Zhao:
A Note on: 'Algorithms for Connected Set Cover Problem and Fault-Tolerant Connected Set Cover Problem'. - Vijayvaradharaj T. Muralidharan, B. Sundar Rajan:
A Non-Orthogonal DF Scheme for the Single Relay Channel and the Effect of Labelling. - Ran Gelles, Amit Sahai:
Potent Tree Codes and their applications: Coding for Interactive Communication, revisited. - Sicun Gao, André Platzer, Edmund M. Clarke:
Quantifier Elimination over Finite Fields Using Gröbner Bases. - Yoo Chung:
Modeling network technology deployment rates with different network models. - José Miguel Díaz-Báñez, Matias Korman, Pablo Pérez-Lantero, Inmaculada Ventura:
Locating a service facility and a rapid transit line. - Anatoly Pashkevich, Alexandr Klimchik, Damien Chablat:
Enhanced stiffness modeling of manipulators with passive joints. - Markus Wagner, Jareth Day, Claire Diora Jordan, Trent Kroeger, Frank Neumann:
Evolving Pacing Strategies for Team Pursuit Track Cycling. - Guy Even, Yaniv Fais, Moti Medina, Shimon Shahar, Alexander Zadorojniy:
Real-Time Video Streaming in Multi-hop Wireless Static Ad Hoc Networks. - Patrick Chedmail, Damien Chablat, Christophe Le Roy:
A distributed Approach for Access and Visibility Task with a Manikin and a Robot in a Virtual Reality Environment. - Jolly Shah, Vikas Saxena:
Video Encryption: A Survey. - Lutz Bornmann, Werner Marx:
The Anna Karenina principle: A mechanism for the explanation of success in science. - B. G. Kodge, P. S. Hiremath:
SLDs for Visualizing Multicolor Elevation Contour Lines in Geo-Spatial Web Applications. - Deepesh Ranka, Ashwani K. Rana, Rakesh Kumar Yadav, Kamalesh Yadav, Devendra Giri:
Performance evaluation of FD-SOI Mosfets for different metal gate work function. - Damien Chablat, Fouad Bennis, Bernard Hoessler, Matthieu Guilbert:
Haptic devices and objects, robots and mannequin simulation in a CAD-CAM software: eM-Virtual Desktop. - Ruina Ma, Damien Chablat, Fouad Bennis, Liang Ma:
A framework of motion capture system based human behaviours simulation for ergonomic analysis. - Damien Chablat, Guillaume Moroz, Philippe Wenger:
Uniqueness domains and non singular assembly mode changing trajectories. - Jian Gao, Minghao Yin, Ke Xu:
Phase Transitions in Knowledge Compilation: an Experimental Study. - Ajesh Babu, Nutan Limaye, Jaikumar Radhakrishnan, Girish Varma:
Streaming algorithms for language recognition problems. - Charalambos D. Charalambous, Photios A. Stavrou, Christos K. Kourtellaris:
Causal Rate Distortion Function and Relations to Filtering Theory. - Dan Olteanu, Jakub Zavodny:
Factorised Representations of Query Results. - Joost Van Honschoten, Henri de Jong, Wabe W. Koelmans, Thomas P. Parnell, Oleg V. Zaboronski:
Information Storage and Retrieval for Probe Storage using Optical Diffraction Patterns. - Marius Zimand:
Possibilities and impossibilities in Kolmogorov complexity extraction. - Gopal Pandurangan, Amitabh Trehan:
Xheal: Localized Self-healing using Expanders. - Guy Bresler, Dustin Cartwright, David Tse:
Settling the feasibility of interference alignment for the MIMO interference channel: the symmetric square case. - Yuan Zhang, Cihan Tepedelenlioglu:
Applications of Tauberian Theorem for High-SNR Analysis of Performance over Fading Channels. - Benjamin A. Burton, Mathias Hiron:
Locating regions in a sequence under density constraints. - Alexander Yu. Vlasov:
ReveR: Software Simulator of Reversible Processor with Stack. - Stephen Guo, Mengqiu Wang, Jure Leskovec:
The Role of Social Networks in Online Shopping: Information Passing, Price of Trust, and Consumer Choice. - Chenwei Wang, Tiangao Gou, Syed Ali Jafar:
Multiple Unicast Capacity of 2-Source 2-Sink Networks. - Lionel Levine, Katherine E. Stange:
How to make the most of a shared meal: plan the last bite first. - Dae San Kim, Dong Chan Kim, Jong Yoon Hyun:
Simple proofs for duality of generalized minimum poset weights and weight distributions of (Near-)MDS poset codes. - (Withdrawn) An Efficient Algorithm for Detection of Selfish Packet Dropping Nodes in Wireless Mesh Networks.
- Meisam Razaviyayn, Gennady Lyubeznik, Zhi-Quan Luo:
On the Degrees of Freedom Achievable Through Interference Alignment in a MIMO Interference Channel. - Y. Ming Tsang, Ada S. Y. Poon, Sateesh Addepalli:
Coding the Beams: Improving Beamforming Training in mmWave Communication System. - Aleksey A. Galtsev, Andrei M. Sukhov:
Network attack detection at flow level. - Shafi Bashar, Zhi Ding, Chengshan Xiao:
On Secrecy Rate Analysis of MIMO Wiretap Channels Driven by Finite-Alphabet Input. - Saeed Rasouli Heikalabad, Hossein Rasouli, Farhad Nematy, Naeim Rahmani:
QEMPAR: QoS and Energy Aware Multi-Path Routing Algorithm for Real-Time Applications in Wireless Sensor Networks. - Johannes Ebbing, Peter Lohmann:
Complexity of Model Checking for Modal Dependence Logic. - Xiaodong Li:
Compressed Sensing and Matrix Completion with Constant Proportion of Corruptions. - Ming Lam Leung:
Fixed Parameter Tractable Algorithm for Firefighting Problem. - Manuel Bodirsky, Martin Hils, Alex Krimkevitch:
Tractable Set Constraints. - Abdellatif Zaidi, Shlomo Shamai, Pablo Piantanida, Luc Vandendorpe:
Bounds on the Capacity of the Relay Channel with Noncausal State at Source. - Babak Bashari Rad, Maslin Masrom, Suhaimi Ibrahim:
Evolution of Computer Virus Concealment and Anti-Virus Techniques: A Short Survey. - Jun Wang, Gang Li, Hao Zhang, Xiqin Wang:
Analysis of Block OMP using Block RIP. - Jun Wang, Gang Li, Hao Zhang, Xiqin Wang:
SAR Imaging of Moving Targets via Compressive Sensing. - Rahul Vaze:
Super Critical and Sub Critical Regimes of Percolation with Secure Communication. - Samuel Fiorini, Gwenaël Joret:
Approximating the Balanced Minimum Evolution Problem. - Kaoutar Elhari, Bouchaib Bounabat:
Platform for Assessing Strategic Alignment Using Enterprise Architecture: Application to E-Government Process Assessment. - Robert Crowston, Gregory Z. Gutin, Mark Jones, Anders Yeo:
Lower Bound for Max-$r$-Lin2 and its Applications in Algorithmics and Graph Theory. - Saif K. Mohammed, Emanuele Viterbo, Yi Hong, Ananthanarayanan Chockalingam:
Modulation Diversity in Fading Channels with Quantized Receiver. - Maamar Sedrati, Azeddine Bilami, Mohamed Benmohamed:
M-AODV : AODV variant to improve quality of service in MANETs. - Liang Ma, Damien Chablat, Fouad Bennis, Wei Zhang, Bo Hu, François Guillaume:
A novel approach for determining fatigue resistances of different muscle groups in static cases. - Bo Hu, Liang Ma, Wei Zhang, Gaverial Salvendy, Damien Chablat, Fouad Bennis:
Can virtual reality predict body part discomfort and performance of people in realistic world for assembling tasks? - Daniel M. Kane:
A Small PRG for Polynomial Threshold Functions of Gaussians. - Emrah Akyol, Kumar Viswanatha, Kenneth Rose:
On Conditions for Linearity of Optimal Estimation. - Yuanzhang Xiao, Jaeok Park, Mihaela van der Schaar:
Intervention in Power Control Games With Selfish Users. - Soumen Bag, Soumen Barik, Prithwiraj Sen, Gautam Sanyal:
A Statistical Nonparametric Approach of Face Recognition: Combination of Eigenface & Modified k-Means Clustering. - Damien Chablat, Jorge Angeles:
The Design of a Novel Prismatic Drive for a Three-DOF Parallel-Kinematics Machine. - Alessandro Borri, Shaunak Dattaprasad Bopardikar, João Pedro Hespanha, Maria Domenica Di Benedetto:
Hide-and-Seek with Directional Sensing. - Ashok V. Sutagundar, Sunilkumar S. Manvi:
Context Aware Multisensor Image Fusion for Military Sensor Networks using Multi Agent System. - Radoslav Fulek, Daniel Neuwirth:
On Sets of Lines Not-Supporting Trees. - Konstantinos Panagiotou, Reto Spöhel, Angelika Steger, Henning Thomas:
Explosive Percolation in Erdös-Rényi-Like Random Graph Processes. - Gowri Shankar Ramaswamy, F. Sagayaraj Francis:
Latent table discovery by semantic relationship extraction between unrelated sets of entity sets of structured data sources. - Guy Even, Yakov Matsri, Moti Medina:
Multi-Hop Routing and Scheduling in Wireless Networks in the SINR model. - Guido Salvaneschi, Carlo Ghezzi, Matteo Pradella:
JavaCtx: Seamless Toolchain Integration for Context-Oriented Programming. - Michael Kerber, Michael Sagraloff:
Root Refinement for Real Polynomials. - David Greenwood, Ian Sommerville:
Expectations and Reality: Why an enterprise software system didn't work as planned. - Ronitt Rubinfeld, Gil Tamir, Shai Vardi, Ning Xie:
Fast Local Computation Algorithms. - Wai Han Fong:
Coding Bounds for Multiple Phased-Burst Correction and Single Burst Correction Codes. - Andreas Argyriou, Charles A. Micchelli, Massimiliano Pontil, Lixin Shen, Yuesheng Xu:
Efficient First Order Methods for Linear Composite Regularizers. - Dmitry Chizhik, Gerard J. Foschini, Reinaldo A. Valenzuela:
A Basic Unified Context for Evaluating the Beam Forming and MIMO Options in a Wireless Link. - Damián A. Morero, Graciela Corral-Briones, Carmen E. Rodríguez, Mario Rafael Hueda:
High-Rate Short-Block LDPC Codes for Iterative Decoding with Applications to High-Density Magnetic Recording Channels. - Mark Burgin, Kees de Vey Mestdagh:
Logical Varieties in Normative Reasoning. - Xiao Ma, Jia Liu,