


default search action
CoRR, February 2012
- Sangwoo Park, Erchin Serpedin, Khalid A. Qaraqe:

On the equivalence between Stein and de Bruijn identities. - Houari Mahfoud, Abdessamad Imine:

A General Approach for Securely Querying and Updating XML Data. - Aitzaz Ahmad, Davide Zennaro, Erchin Serpedin, Lorenzo Vangelista:

Time-varying Clock Offset Estimation in Two-way Timing Message Exchange in Wireless Sensor Networks Using Factor Graphs. - Tad Hogg, Kristina Lerman:

Social Dynamics of Digg. - Harold S. Connamacher, Michael Molloy:

The Satisfiability Threshold for a Seemingly Intractable Random Constraint Satisfaction Problem. - Aboulnasr Hassanien, Sergiy A. Vorobyov, Alex B. Gershman:

Moving Target Parameters Estimation in Non-Coherent MIMO Radar Systems. - Jianhang Gao, Qing Zhao, Wei Ren, Ananthram Swami, Ram Ramanathan, Amotz Bar-Noy:

Dynamic Shortest Path Algorithms for Hypergraphs. - Yanlin Geng, Chandra Nair:

The capacity region of the two-receiver vector Gaussian broadcast channel with private and common messages. - Christine Fricker, Philippe Robert, James Roberts, Nada Sbihi:

Impact of traffic mix on caching performance in a content-centric network. - Yuriy Ostapov:

Inference and Plausible Reasoning in a Natural Language Understanding System Based on Object-Oriented Semantics. - Dor-Joseph Kampeas, Asaf Cohen, Omer Gurewitz:

Opportunistic Scheduling in Heterogeneous Networks: Distributed Algorithms and System Capacity. - Rohit Aggarwal, Can Emre Koksal, Philip Schniter:

On the Design of Large Scale Wireless Systems. - Themistoklis Charalambous, Charalambos D. Charalambous, Sergey Loyka:

Lossless Source Codes for a Class Described by Variational Distance and Optimal Merging Algorithm. - Yair Noam, Andrea Goldsmith:

Spatial MAC in MIMO Communications and its Application to Underlay Cognitive Radio. - Wei Yang, Giuseppe Durisi, Erwin Riegler:

On the Capacity of Large-MIMO Block-Fading Channels. - Jean-Charles Faugère, Mohab Safey El Din, Pierre-Jean Spaenlehauer:

Critical Points and Gröbner Bases: the Unmixed Case. - Oscar Gonzalez, Carlos Beltrán, Ignacio Santamaría:

On the Feasibility of Interference Alignment for the K-User MIMO Channel with Constant Coefficients. - Sindhu Chitikela, Subhash C. Kak:

Increasing Randomness Using Permutations on Blocks. - Mahtab Mirmohseni, Bahareh Akhbari, Mohammad Reza Aref:

On the Capacity of Interference Channel with Causal and Non-causal Generalized Feedback at the Cognitive Transmitter. - Chun Lam Chan, Sidharth Jaggi, Venkatesh Saligrama, Samar Agnihotri:

Non-adaptive Group Testing: Explicit bounds and novel algorithms. - Ömer Bulakci:

Multi-hop Moving Relays for IMT-Advanced and Beyond. - Ömer Bulakci:

On Backhauling of Relay Enhanced Networks in LTE-Advanced. - Fernand Meyer:

The watershed concept and its use in segmentation : a brief history. - V. Spoorthy Ella:

Randomization Using Quasigroups, Hadamard and Number Theoretic Transforms. - Fabian Lim, Manabu Hagiwara:

Linear Programming Upper Bounds on Permutation Code Sizes From Coherent Configurations Related to the Kendall Tau Distance Metric. - Daniel Zinn:

Weak Forms of Monotonicity and Coordination-Freeness. - Sertac Karaman, Emilio Frazzoli:

High-speed Flight in an Ergodic Forest. - Koralia N. Pappi, Nestor D. Chatzidiamantis, Theodore N. Chronis, George K. Karagiannidis:

Error Performance of Multidimensional Lattice Constellations-Part I: A Parallelotope Geometry Based Approach for the AWGN Channel. - Koralia N. Pappi, Nestor D. Chatzidiamantis, Theodore N. Chronis, George K. Karagiannidis:

Error Performance of Multidimensional Lattice Constellations-Part II: Evaluation over Fading Channels. - Barnabás Póczos, Liang Xiong, Danica J. Sutherland

, Jeff G. Schneider:
Support Distribution Machines. - Ronen Dar, Meir Feder, Mark Shtaif:

The Jacobi MIMO Channel. - Petar Popovski, Zoran Utkovski:

Protocol Coding through Reordering of User Resources, Part I: Capacity Results. - Petar Popovski, Zoran Utkovski, Kasper F. Trillingsgaard:

Protocol Coding through Reordering of User Resources, Part II: Practical Coding Strategies. - Leslie Ann Goldberg, Mark Jerrum:

The Complexity of Computing the Sign of the Tutte Polynomial (and consequent #P-hardness of Approximation). - Sergio Cabello, Erin W. Chambers, Jeff Erickson:

Multiple-Source Shortest Paths in Embedded Graphs. - Giorgio Ausiello, Donatella Firmani, Luigi Laura:

Real-Time Monitoring of Undirected Networks: Articulation Points, Bridges, and Connected and Biconnected Components. - Louis Lei Yu, Sitaram Asur, Bernardo A. Huberman:

Artificial Inflation: The True Story of Trends in Sina Weibo. - Emilio Ferrara, Giacomo Fiumara:

Topological Features of Online Social Networks. - Roja Bandari, Sitaram Asur, Bernardo A. Huberman:

The Pulse of News in Social Media: Forecasting Popularity. - Hessam Mahdavifar, Alexander Vardy:

Algebraic List-decoding of Subspace Codes. - Anoosheh Heidarzadeh, Amir H. Banihashemi:

How Fast Can Dense Codes Achieve the Min-Cut Capacity of Line Networks? - Alexander M. Romanov:

On the admissible families of components of Hamming codes. - Yixuan Xie, Jun Li, Robert A. Malaney, Jinhong Yuan:

Channel Identification and its Impact on Quantum LDPC Code Performance. - Vijay Ganesh, Michael Carbin, Martin C. Rinard:

Cryptographic Path Hardening: Hiding Vulnerabilities in Software through Cryptography. - Ton Kloks:

A note on probe cographs. - Yair Noam, Andrea Goldsmith:

Blind Null-Space Learning for MIMO Underlay Cognitive Radio Networks. - Samar Agnihotri, Sidharth Jaggi, Minghua Chen:

Analog Network Coding in General SNR Regime. - Ihab Sbeity, Leonardo Brenner, Mohamed Dbouk:

Generating a Performance Stochastic Model from UML Specifications. - Yuval Lomnitz, Meir Feder:

Universal communication over unknown vector channels. - Josep Díaz, Leslie Ann Goldberg, George B. Mertzios, David Richerby, Maria J. Serna, Paul G. Spirakis:

Can Fixation be Guaranteed in the Generalized Moran Process? - Matej Hoffmann, Rolf Pfeifer:

The implications of embodiment for behavior and cognition: animal and robotic case studies. - Yang Zhu, Mai Vu:

Iterative Mode-Dropping for the Sum Capacity of MIMO-MAC with Per-Antenna Power Constraint. - Walid Saad, Zhu Han, H. Vincent Poor, Tamer Basar:

Game Theoretic Methods for the Smart Grid. - Hernan Haimovich, María M. Seron:

Bounds and Invariant Sets for a Class of Switching Systems with Delayed-state-dependent Perturbations. - Nicolas Le Scouarnec:

Exact Scalar Minimum Storage Coordinated Regenerating Codes. - Walid Saad, Zhu Han, H. Vincent Poor, Tamer Basar, Ju Bin Song:

A Cooperative Bayesian Nonparametric Framework for Primary User Activity Monitoring in Cognitive Radio Network. - Walid Saad, Zhu Han, Tamer Basar, Mérouane Debbah, Are Hjørungnes:

Network Formation Games Among Relay Stations in Next Generation Wireless Networks. - Walid Saad, Zhu Han, Rong Zheng, Are Hjørungnes, Tamer Basar, H. Vincent Poor:

Coalitional Games in Partition Form for Joint Spectrum Sensing and Access in Cognitive Radio Networks. - Philip Kelly, M. H. van Emden:

Relational Semantics for Databases and Predicate Calculus. - Kehao Wang, Lin Chen, Quan Liu, Khaldoun Al Agha:

On Optimality of Myopic Sensing Policy with Imperfect Sensing in Multi-channel Opportunistic Access. - Peter Abeles:

Resolving Implementation Ambiguity and Improving SURF. - Saikat Guha, Mark M. Wilde:

Polar coding to achieve the Holevo capacity of a pure-loss optical channel. - G. David Forney Jr., Heide Gluesing-Luerssen:

Observability, Controllability and Local Reducibility of Linear Codes on Graphs. - Venkatesan Guruswami, Srivatsan Narayanan, Carol Wang:

List decoding subspace codes from insertions and deletions. - Ersen Ekrem, Sennur Ulukus:

An Outer Bound for the Vector Gaussian CEO Problem. - Gautam S. Thakur, Mohsen Ali, Pan Hui, Ahmed Helmy:

Comparing Background Subtraction Algorithms and Method of Car Counting. - Steven A. Kieffer:

ProofFlow: Flow Diagrams for Proofs. - Tad Hogg, Robert A. Freitas Jr.:

Acoustic Communication for Medical Nanorobots. - (Withdrawn) A Constructive Proof of the Cycle Double Cover Conjecture.

- Ghazale Hosseinabadi, Nitin H. Vaidya:

Token-DCF: An Opportunistic MAC protocol for Wireless Networks. - Randa Zakhour, Stephen V. Hanly:

Min-max fair coordinated beamforming in cellular systems via large systems analysis. - Xiao Ma, Jia Liu, Baoming Bai:

On Parameterized Gallager's First Bounds for Binary Linear Codes over AWGN Channels. - Dorian Goldfeld, Paul E. Gunnells:

Defeating the Kalka--Teicher--Tsaban linear algebra attack on the Algebraic Eraser. - Chuan Huang, Shuguang Cui:

On the Alternative Relaying Diamond Channel with Conferencing Links. - Roberto Henry Herrera, Rubén Orozco, Manuel Rodríguez:

Wavelet-based deconvolution of ultrasonic signals in nondestructive evaluation. - Ravi Rastogi, Nitin, Durg Singh Chauhan, Mahesh Chandra Govil:

Disjoint Paths Multi-stage Interconnection Networks Stability Problem. - Shaily Mittal, Nitin:

A Resolution for Shared Memory Conflict in Multiprocessor System-on-a-Chip. - Ravi Rastogi, Amit Singh, Nikhil Singhal, Nitin, Durg Singh Chauhan:

Case Tool: Fast Interconnections with New 3-Disjoint Paths MIN Simulation Module. - Nitin, Ankush Bansal, Siddhartha Mahadev Sharma, Kapil Kumar, Anuj Aggarwal, Sheenu Goyal, Kanika Choudhary, Kunal Chawla, Kunal Jain, Manav Bhasin:

Classification of Flames in Computer Mediated Communications. - Xiao Ma, Jia Liu, Qiutao Zhuang:

New Geometrical Spectra of Linear Codes with Applications to Performance Analysis. - Hamish Cunningham:

Agile Research. - Ryuhei Mori, Toshiyuki Tanaka:

Central Approximation in Statistical Physics and Information Theory. - Urban Larsson, Johan Wästlund:

From heaps of matches to the limits of computability. - Matteo De Felice, Sandro Meloni, Stefano Panzieri:

Influence of Topological Features on Spatially-Structured Evolutionary Algorithms Dynamics. - F. Mehmet Ozcelik, Goksel Uctu, Elif Uysal-Biyikoglu:

Optimal Packet Scheduling on an Energy Harvesting Fading Channel. - Ivan Gazeau, Dale Miller

, Catuscia Palamidessi
:
A non-local method for robustness analysis of floating point programs. 63-76 - Glenn C. Rhoads, Laurent Bartholdi:

The Game of Pure Strategy is solved! - Qin Huang, Keke Liu, Zulin Wang:

Low-Density Arrays of Circulant Matrices: Rank and Row-Redundancy Analysis, and Quasi-Cyclic LDPC Codes. - Carlos Granell, Laura Díaz, Alain Tamayo, Joaquín Huerta:

Assessment of OGC Web Processing Services for REST principles. - Easton Li Xu, Weiping Shang, Guangyue Han:

A Graph Theoretical Approach to Network Encoding Complexity. - Lu Wei, Olav Tirkkonen, K. D. Prathapasinghe Dharmawansa, Matthew R. McKay

:
On the Exact Distribution of the Scaled Largest Eigenvalue. - Weifei Zeng, Chris T. K. Ng, Muriel Médard:

Joint Coding and Scheduling Optimization in Wireless Systems with Varying Delay Sensitivities. - Jan Obdrzálek, Jiri Slaby, Marek Trtík:

STANSE: Bug-finding Framework for C Programs. - (Withdrawn) Protection from Unresponsive Flows with Geometric CHOKe.

- Tomás Brázdil, Krishnendu Chatterjee, Antonín Kucera, Petr Novotný:

Efficient Controller Synthesis for Consumption Games with Multiple Resource Types. - Xudong Ma:

On Coding Efficiency for Flash Memories. - Natalia Silberstein, Ankit Singh Rawat, Sriram Vishwanath:

Adversarial Error Resilience in Distributed Storage Using MRD Codes and MDS Array Codes. - Fatemeh Hamidi-Sepehr, Jean-François Chamberland, Henry D. Pfister:

On The Performance of Random Block Codes over Finite-State Fading Channels. - Mohit Thakur, Nadia Fawaz, Muriel Médard:

Reducibility of joint relay positioning and flow optimization problem. - Javier Insa-Cabrera, Jose-Luis Benacloch-Ayuso, José Hernández-Orallo:

On the influence of intelligence in (social) intelligence testing environments. - Ramji Venkataramanan, Antony Joseph, Sekhar Tatikonda:

Gaussian Rate-Distortion via Sparse Regression over Compact Dictionaries. - Josef Cibulka, Jan Kyncl, Viola Mészáros, Rudolf Stolar, Pavel Valtr:

Graph sharing games: complexity and connectivity. - Song-Nam Hong, Giuseppe Caire:

Reverse Compute and Forward: A Low-Complexity Architecture for Downlink Distributed Antenna Systems. - Buyue Qian, Xiang Wang, Ian Davidson:

A Reconstruction Error Formulation for Semi-Supervised Multi-task and Multi-view Learning. - Fan Cheng, Raymond W. Yeung, Kenneth W. Shum:

Imperfect Secrecy in Wiretap Channel II. - Aria Ghasemian Sahebi, S. Sandeep Pradhan:

Asymptotically Good Codes Over Non-Abelian Groups. - Aria Ghasemian Sahebi, S. Sandeep Pradhan:

Nested Lattice Codes for Arbitrary Continuous Sources and Channels. - Nan Ma, Kannan Ramchandran, David Tse:

A Compression Algorithm Using Mis-aligned Side-information. - Hessam Mahdavifar, Alexander Vardy:

List-decoding of Subspace Codes and Rank-Metric Codes up to Singleton Bound. - Guillermo D. Cañas:

Practical Conditions for Well-behaved-ness of Anisotropic Voronoi Diagrams. - Yuxin Chen, Yonina C. Eldar, Andrea J. Goldsmith:

Channel Capacity under General Nonuniform Sampling. - Tadashi Wadayama, Yuki Fujii:

A Coding Theoretic Approach for Evaluating Accumulate Distribution on Minimum Cut Capacity of Weighted Random Graphs. - Ranjan Pal:

Cyber-Insurance in Internet Security: A Dig into the Information Asymmetry Problem. - Ranjan Pal, Pan Hui:

The Impact of Secure OSs on Internet Security: What Cyber-Insurers Need to Know. - Photios A. Stavrou, Charalambos D. Charalambous, Christos K. Kourtellaris:

Causal Rate Distortion Function on Abstract Alphabets: Optimal Reconstruction and Properties. - Amin Aminzadeh Gohari, Chandra Nair, Venkat Anantharam:

On Marton's inner bound for broadcast channels. - Murdoch Gabbay, Aleksandar Nanevski:

Denotation of syntax and metaprogramming in contextual modal type theory (CMTT). - Daniel Gonçalves

, Benjamin Lévêque:
Toroidal maps : Schnyder woods, orthogonal surfaces and straight-line representations. - Sebastian Rudolph

, Markus Krötzsch
, Pascal Hitzler:
Type-elimination-based reasoning for the description logic SHIQbs using decision diagrams and disjunctive datalog. - Wenbing Dang, Ali Pezeshki, Stephen D. Howard, William Moran, A. Robert Calderbank:

Coordinating Complementary Waveforms for Sidelobe Suppression. - Jérémie Du Boisberranger, Danièle Gardy, Yann Ponty:

The weighted words collector. - Ittai Abraham, Shiri Chechik, David Kempe, Aleksandrs Slivkins:

Low-distortion Inference of Latent Similarities from a Multiplex Social Network. - Farzad Farnoud, Narayana P. Santhanam, Olgica Milenkovic:

Alternating Markov Chains for Distribution Estimation in the Presence of Errors. - Farzad Farnoud, Vitaly Skachek, Olgica Milenkovic:

Rank Modulation for Translocation Error Correction. - Chiranjib Choudhuri, Urbashi Mitra:

Action Dependent Strictly Causal State Communication. - Abhishek Ghosh, Sudhakar Pamarti:

Dithered quantizers with negligible in-band dither power. - Mark A. Davenport, Ery Arias-Castro:

Compressive binary search. - Alex Pappachen James, Akshay Kumar Maan:

Improving feature selection algorithms using normalised feature histograms. - Charalambos D. Charalambous, Photios A. Stavrou:

Directed Information on Abstract spaces: Properties and Extremum Problems. - Stefano Rini:

A New Random Coding Technique that Generalizes Superposition Coding and Binning. - Stefano Rini:

On the Capacity of a General Multiple-Access Channel and of a Cognitive Network in the Very Strong Interference Regime. - Elchanan Mossel, Omer Tamuz:

Bundling Customers: How to Exploit Trust Among Customers to Maximize Seller Profit. - Josef Spillner, Alexander Schill:

π-Control: A Personal Cloud Control Centre. - Stefano Rini, Carolin Huppert:

The Capacity of the Semi-Deterministic Cognitive Interference Channel with a Common Cognitive Message and Approximate Capacity for the Gaussian Case. - Kenta Kasai, Takayuki Nozaki, Kohichi Sakaniwa:

Spatially-Coupled Binary MacKay-Neal Codes for Channels with Non-Binary Inputs and Affine Subspace Outputs. - Birte Glimm, Aidan Hogan, Markus Krötzsch, Axel Polleres:

OWL: Yet to arrive on the Web of Data? - Massimo Di Pierro:

Improving non-linear fits. - Sunghyu Han, Jon-Lark Kim:

Computational Results of Duadic Double Circulant Codes. - Ton Kloks:

Packing interval graphs with vertex-disjoint triangles. - K. V. Rashmi, Nihar B. Shah, Kannan Ramchandran, P. Vijay Kumar:

Regenerating Codes for Errors and Erasures in Distributed Storage. - Alex Rudnick:

Considering a resource-light approach to learning verb valencies. - Mike McKerns, Houman Owhadi, Clint Scovel, Timothy John Sullivan, Michael Ortiz:

The Optimal Uncertainty Algorithm in the Mystic Framework. - Michael M. McKerns, Leif Strand, Tim Sullivan, Alta Fang, Michael A. G. Aivazis:

Building a Framework for Predictive Science. - Yen-Cheng Hsu, Tofar Chih-Yuan Chang, Yu T. Su, Jian-Jia Weng:

A Non-Disjoint Group Shuffled Decoding for LDPC Codes. - Ravi Rastogi, Nitin, Durg Singh Chauhan, Mahesh Chandra Govil:

On Stability Problems of Omega and 3-Disjoint Paths Omega Multi-stage Interconnection Networks. - Dejan E. Lazich, Christian Senger, Martin Bossert:

Some Comments on the Strong Simplex Conjecture. - Moez Draief, Milan Vojnovic:

Bargaining Dynamics in Exchange Networks. - Sandeep Sen, V. N. Muralidhara:

The covert set-cover problem with application to Network Discovery. - Ömer Bulakci:

Towards 100 Gbps Ethernet: Development of Ethernet / Physical Layer Aspects. - Pablo Arrighi, Gilles Dowek:

Causal graph dynamics. - Ömer Bulakci:

Wavelets for Single Carrier Communications. - Po-Shen Loh, Rasmus Pagh:

Thresholds for Extreme Orientability. - Ranjitha Prasad, Chandra R. Murthy:

Cramer Rao-Type Bounds for Sparse Bayesian Learning. - Arash Gholami Davoodi, Mohammad Javad Emadi, Mohammad Reza Aref:

Optimum Power Allocations for Fading Decode-and-Forward Relay Channel. - Miron B. Kursa:

Random ferns method implementation for the general-purpose machine learning. - Ling-Hua Chang, Jwo-Yuh Wu:

Achievable Angles Between two Compressed Sparse Vectors Under Norm/Distance Constraints Imposed by the Restricted Isometry Property: A Plane Geometry Approach. - Volker Diekert, Manfred Kufleitner, Klaus Reinhardt, Tobias Walter:

Regular Languages are Church-Rosser Congruential. - Son Hoang Dau, Vitaly Skachek, Yeow Meng Chee:

Optimal Index Codes with Near-Extreme Rates. - Emmanuel Pollakis, Renato L. G. Cavalcante, Slawomir Stanczak:

Base station selection for energy efficient network operation with the majorization-minimization algorithm. - Yunus Sarikaya, Özgür Erçetin, Can Emre Koksal:

Wireless Network Control with Privacy Using Hybrid ARQ. - Yuval Emek, Jasmin Smula, Roger Wattenhofer:

Stone Age Distributed Computing. - Koji Kobayashi:

Topological approach to solve P versus NP. - Abdellatif Zaidi, Pablo Piantanida, Shlomo Shamai:

Wyner-Ziv Type Versus Noisy Network Coding For a State-Dependent MAC. - Yaniv Plan, Roman Vershynin:

Robust 1-bit compressed sensing and sparse logistic regression: A convex programming approach. - Christopher Portmann:

Key recycling in authentication. - (Withdrawn) In Defense of Bureaucracy in the Metric Facility Location Problem.

- Fernando Hernando, Michael E. O'Sullivan, Diego Ruano:

List decoding of repeated codes. - (Withdrawn) Optimal Sum-Rate of the Vector Gaussian CEO Problem.

- Alphan Ulusoy, Stephen L. Smith, Xu Chu Ding, Calin Belta:

Robust Multi-Robot Optimal Path Planning with Temporal Logic Constraints. - Fabio Mogavero, Aniello Murano, Giuseppe Perelli, Moshe Y. Vardi:

A Decidable Fragment of Strategy Logic. - Jiadong Wang, Guiqiang Dong, Tong Zhang, Richard D. Wesel:

Mutual-Information Optimized Quantization for LDPC Decoding of Accurately Modeled Flash Data. - Kyle Treleaven, Marco Pavone, Emilio Frazzoli:

Asymptotically Optimal Algorithms for Pickup and Delivery Problems with Application to Large-Scale Transportation Systems. - Masahito Hayashi, Ryutaroh Matsumoto:

Secure Multiplex Coding with Dependent and Non-Uniform Multiple Messages. - Alekh Agarwal, Miroslav Dudík, Satyen Kale, John Langford, Robert E. Schapire:

Contextual Bandit Learning with Predictable Rewards. - Heide Gluesing-Luerssen, G. David Forney Jr.:

Reducing complexity of tail-biting trellises. - Shiva Kumar Planjery, Bane Vasic, David Declercq:

Enhancing the Error Correction of Finite Alphabet Iterative Decoders via Adaptive Decimation. - Yi Huang, Jie Xu, Ling Qiu:

An Energy Efficient Semi-static Power Control and Link Adaptation Scheme in UMTS HSDPA. - Dung Viet Nguyen, Bane Vasic, Michael W. Marcellin:

Selecting Two-Bit Bit Flipping Algorithms for Collective Error Correction. - Justin Thaler, Mike Roberts, Michael Mitzenmacher, Hanspeter Pfister:

Verifiable Computation with Massively Parallel Interactive Proofs. - (Withdrawn) Error Probability Bounds for M-ary Relay Trees.

- Nidhi Bansal:

Investigation to implicate data on clouds. - Karissa McKelvey, Alex Rudnick, Michael D. Conover, Filippo Menczer:

Visualizing Communication on Social Media: Making Big Data Accessible. - Giordano Pola, Maria Domenica Di Benedetto:

Symbolic Models and Control of Discrete-Time Piecewise Affine Systems: An Approximate Simulation Approach. - (Withdrawn) Successive Secret Key Agreement over Generalized Multiple Access and Broadcast Channels.

- Majid Yousefikhoshbakht, Farzad Didehvar, Farhad Rahmati:

Modification of the Elite Ant System in Order to Avoid Local Optimum Points in the Traveling Salesman Problem. - Mario Huemer, Alexander Onic, Christian Hofbauer:

Classical and Bayesian Linear Data Estimators for Unique Word OFDM. - Roberto Sebastiani, Silvia Tomasi:

Optimization in SMT with LA(Q) Cost Functions. - Li Wei, Wangdong Qi:

Optimization in Multi-Frequency Interferometry Ranging: Theory and Experiment. - Augusto Salazar, Stefanie Wuhrer, Chang Shu, Flavio Prieto:

Fully Automatic Expression-Invariant Face Correspondence. - Ansuman Adhikary, Giuseppe Caire:

On the Coexistence of Macrocell Spatial Multiplexing and Cognitive Femtocells. - Addisu Eshete, Yuming Jiang:

On the Transient Behavior of CHOKe. - Adam R. Williamson, Tsung-Yi Chen, Richard D. Wesel:

A Rate-Compatible Sphere-Packing Analysis of Feedback Coding with Limited Retransmissions. - Benjamin Frank, Ingmar Poese, Georgios Smaragdakis, Steve Uhlig, Anja Feldmann:

Content-aware Traffic Engineering. - Mihai-Alin Badiu, Gunvor Elisabeth Kirkelund, Carles Navarro i Manchon, Erwin Riegler, Bernard H. Fleury:

Message-Passing Algorithms for Channel Estimation and Decoding Using Approximate Inference. - Peter Bro Miltersen, Or Sheffet:

Send Mixed Signals -- Earn More, Work Less. - Kittipong Kittichokechai, Tobias J. Oechtering, Mikael Skoglund:

Coding With Action-dependent Side Information and Additional Reconstruction Requirements. - Aravindh Krishnamoorthy, Kenan Kocagoez:

Singular Values using Cholesky Decomposition. - Zhao Yi, Stefano Soatto, Maneesh Dewan, Yiqiang Zhan:

Information Forests. - Penélope Hernández, Bernhard von Stengel:

Nash Codes for Noisy Channels. - Aida Boussaada Zaier, Ridha Bouallegue:

Channel Estimation Study for Block - Pilot Insertion in OFDM Systems under Slowly Time Varying Conditions. - Héctor Ratia, Luis Montesano, Ruben Martinez-Cantin:

On the Performance of Maximum Likelihood Inverse Reinforcement Learning. - Robert Nix, Murat Kantarcioglu:

Efficient Query Verification on Outsourced Data: A Game-Theoretic Approach. - Seungyeon Kim, Fuxin Li, Guy Lebanon, Irfan A. Essa:

Beyond Sentiment: The Manifold of Human Emotions. - Onur Ozan Koyluoglu, Kumar Appaiah, Hongbo Si, Sriram Vishwanath:

Expansion coding: Achieving the capacity of an AEN channel. - Dayu Huang, Sean P. Meyn:

Classification with High-Dimensional Sparse Samples. - Kai Han, Liu Xiang, Jun Luo, Yang Liu:

MEGCOM: Min-Energy Group COMmunication in Multi-hop Wireless Networks. - K. Karteeka Pavan, Allam Appa Rao, A. V. Dattatreya Rao, G. R. Sridhar:

Robust seed selection algorithm for k-means type algorithms. - K. Karteeka Pavan, Allam Appa Rao, A. V. Dattatreya Rao:

Automatic Clustering with Single Optimal Solution. - Yuval Emek, Michal Feldman, Iftah Gamzu, Renato Paes Leme, Moshe Tennenholtz:

Signaling Schemes for Revenue Maximization. - Chinmay Hegde, Richard G. Baraniuk:

Signal Recovery on Incoherent Manifolds. - Vasileios Ntranos, Giuseppe Caire, Alexandros G. Dimakis:

Allocations for Heterogenous Distributed Storage. - Nebojsa Milosavljevic, Sameer Pawar, Salim Y. El Rouayheb, Michael Gastpar, Kannan Ramchandran:

Data Exchange Problem with Helpers. - Nino Antulov-Fantulin, Alen Lancic, Hrvoje Stefancic, Mile Sikic:

FastSIR Algorithm: A Fast Algorithm for simulation of epidemic spread in large networks by using SIR compartment model. - Beniamino Accattoli, Ugo Dal Lago:

On the Invariance of the Unitary Cost Model for Head Reduction (Long Version). - Yuvalal Liron, Michael Langberg:

A characterization of the number of subsequences obtained via the deletion channel. - Holger M. Kienle:

Open Data: Reverse Engineering and Maintenance Perspective. - Laura Savu:

Signcryption scheme based on schnorr digital signature. - Sridhar Subramanian, Baskaran Ramachandran:

Trust Based Scheme for QoS Assurance in Mobile Ad-Hoc Networks. - Abdallah Rhattoy, Abdelkarim Zatni:

The impact of propagation environment and traffic load on the performance of routing protocols in ad hoc networks. - D. D. Kadam Patil, R. K. Shastri:

Design of wireless electronic stethoscope based on zigbee. - Emi Mathews, Ciby Mathew:

Deployment of mobile routers ensuring coverage and connectivity. - Valentina Emilia Balas, Iulia M. Motoc, Alina Barbulescu:

Combined Haar-Hilbert and Log-Gabor Based Iris Encoders. - J. Hannah Monisha, V. Rhymend Uthariaraj:

User profile based proportional share scheduling and mac protocol for manets. - Antonia Wachter-Zeh, Markus Stinner, Martin Bossert:

Efficient Decoding of Partial Unit Memory Codes of Arbitrary Rate. - Yun Jiang, Marcus Lim, Changxi Zheng, Ashutosh Saxena:

Learning to Place New Objects in a Scene. - Boris Mitavskiy, Jun He:

A Polynomial Time Approximation Scheme for a Single Machine Scheduling Problem Using a Hybrid Evolutionary Algorithm. - Maurice Margenstern:

A family of weakly universal cellular automata in the hyperbolic plane with two states. - Lance Fortnow, Rahul Sami:

Multi-outcome and Multidimensional Market Scoring Rules. - Ravi S. Iyer

:
Improve the Practice of Software Development by Having a Software Development Career Track in CS & IT Academia. - Murtaza Hussain Shaikh:

Collaboration for enhancing the system development process in open source diligence. - Ahmed Harbouche, Mohammed Erradi, Aïcha Mokhtari:

A transformation approach for collaboration based requirement models. - Manish Sharma, Gurpadam Singh:

Performance evaluation aodv, dymo, olsr and zrpad hoc routing protocol for ieee 802.11 mac and 802.11 dcf in vanet using qualnet. - Abdoul Aziz Issaka Hassane, Renfa Li, Fanzi Zeng:

Handover Necessity Estimation for 4G Heterogeneous Networks. - Frederic Knabe, Omar Mohamed, Carolin Huppert:

Superiority of TDMA in a Class of Gaussian Multiple-Access Channels with a MIMO-AF-Relay. - Mohamed S. Nafea, Doha Hamza, Karim G. Seddik, Mohammed Nafie, Hesham El Gamal:

A Diversity-Multiplexing-Delay Tradeoff of ARQ Protocols in The Z-interference Channel. - Ahmed Rhif:

Stabilizing sliding mode control design and application for a dc motor: Speed control. - Mehdi Ebady Manaa

, Angela Amphawan:
Review of syn-flooding attack detection mechanism. - Praneeth Netrapalli, Sujay Sanghavi:

Finding the Graph of Epidemic Cascades. - Weisheng Zhao, Sumanta Chaudhuri, Celso Accoto, Jacques-Olivier Klein, Claude Chappert, Pascale Mazoyer:

Cross-point architecture for spin transfer torque magnetic random access memory. - Bernhard Haeupler, Asaf Cohen, Chen Avin, Muriel Médard:

Network Coded Gossip with Correlated Data. - Kurien Zacharia, Eldo P. Elias, Surekha Mariam Varghese:

Personalised product design using virtual interactive techniques. - Mehdi Naghavi, Mohsen Sharifi:

A Proposed Architecture for Continuous Web Monitoring Through Online Crawling of Blogs. - Ferihane Kboubi, Anja Habacha Chaïbi, Mohamed Ben Ahmed:

Semantic Visualization and Navigation in Textual Corpus. - Ning Ruan, Ruoming Jin, Crown Guan Wang, Kun Huang:

Network Backbone Discovery Using Edge Clustering. - Kazuya Odagiri, Shogo Shimizu, Naohiro Ishii, Makoto Takizawa:

Principle of Virtual Use Method in Common Gateway Interface Program on the DACS Scheme. - Md. Tariq Aziz, Mohammad Saiful Islam, Md. Nazmul Islam Khan, Adrian Popescu:

Effect of Packet Delay Variation on Video-Voice over DiffServ-MPLS in IPv4-IPv6 Networks. - K. S. Kuppusamy, Gnanasekaran Aghila:

A personalized web page content filtering model based on segmentation. - N. Ugtakhbayar, D. Battulga, Shirmen Sodbileg:

Classification of artificial intelligence ids for smurf attack. - Fang Yuan, Chenyang Yang:

Equivalence of SLNR Precoder and RZF Precoder in Downlink MU-MIMO Systems. - Ei Shwe Sin, Nang Saing Moon Kham:

Hyper heuristic based on great deluge and its variants for exam timetabling problem. - R. Rathna, A. Sivasubramanian:

Improving energy efficiency in wireless sensor networks through scheduling and routing. - D. Sravana Kumar, Ch. Suneetha, A. Chandrasekhar:

Encryption of Data using Elliptic Curve over Finite fields. - (Withdrawn) The black-and-white coloring problem on circle graphs.

- D. Sravana Kumar, Ch. Suneetha, A. Chandrasekhar:

A Block Cipher using Rotation and Logical XOR Operations. - Mari Kobayashi, Sheng Yang, David Gesbert, Xinping Yi:

On the Degrees of Freedom of time correlated MISO broadcast channel with delayed CSIT. - Loet Leydesdorff, Stephen Carley, Ismael Ràfols:

Global Maps of Science based on the new Web-of-Science Categories. - Md. Golam Rabiul Alam, Chayan Biswas, Naushin Nower, Mohammed Shafiul Alam Khan:

A Reliable Semi-Distributed Load Balancing Architecture of Heterogeneous Wireless Networks. - Danny Dolev, Matthias Függer, Christoph Lenzen, Markus Posch, Ulrich Schmid, Andreas Steininger:

FATAL+: A Self-Stabilizing Byzantine Fault-tolerant Clocking Scheme for SoCs. - Markus Bläser, Bodo Manthey:

Smoothed Complexity Theory. - A. K. Sharma, Atul Mishra, Vijay Singh:

An Intelligent Mobile-Agent Based Scalable Network Management Architecture for Large-Scale Enterprise System. - Srimal Jayawardena, Di Yang, Marcus Hutter:

3D Model Assisted Image Segmentation. - R. Jayabrabu, V. Saravanan, K. Vivekanandan:

A framework: Cluster detection and multidimensional visualization of automated data mining using intelligent agents. - Murtaza Hussain Shaikh:

Arduino Tool: For Interactive Artwork Installations. - Hoda Jannati, Abolfazl Falahati:

Cryptanalysis and enhancement of two low cost rfid authentication protocols. - Alexander Kartzow:

First-Order Logic on Higher-Order Nested Pushdown Trees. - Leonid Barenboim, Michael Elkin, Seth Pettie, Johannes Schneider:

Fast Distributed Algorithms for Maximal Matching and Maximal Independent Set. - Upendra Kumar, Tapobrata Lahiri, Manoj Kumar Pal:

Non-parametric convolution based image-segmentation of ill-posed objects applying context window approach. - Mehdi M. Molu, Norbert Goertz:

A Comparison of Soft and Hard Coded Relaying. - Fabio F. G. Buono:

A New Type of Cipher. - P. Karunakaran, C. Venkatesh:

Traffic and Security using Randomized Dispersive Routes in Heterogeneous Sensor Network. - K. Saravanan, S. Karthik:

Packet Score based network security and Traffic Optimization. - Akira Saitoh, Robabeh Rahimi, Mikio Nakahara:

Semiclassical genetic algorithm with quantum crossover and mutation operations. - Lianlin Li:

Note on RIP-based Co-sparse Analysis. - Nicolas Sturmel, Laurent Daudet:

Informed Source Separation using Iterative Reconstruction. - Helmi Chaouech, Ridha Bouallegue:

Multiuser Detection and Channel Estimation for Multibeam Satellite Communications. - Viviana Bono

, Luca Padovani
:
Typing Copyless Message Passing. - Mira Gonen, Michael Langberg:

Coded Cooperative Data Exchange Problem for General Topologies. - Jiaming Xu, Bruce E. Hajek:

The Supermarket Game. - Bernhard Haeupler, Gopal Pandurangan, David Peleg, Rajmohan Rajaraman, Zhifeng Sun:

Discovery through Gossip. - Allan Borodin, Mark Braverman, Brendan Lucier, Joel Oren:

Truthful Mechanisms for Competing Submodular Processes. - Antonio C. de A. Campello Jr., Cristiano Torezzan, Sueli I. R. Costa:

Curves on torus layers and coding for continuous alphabet sources. - Debadeepta Dey, Tian Yu Liu, Martial Hebert, J. Andrew Bagnell:

Predicting Contextual Sequences via Submodular Function Maximization. - Huang Huang, Vincent K. N. Lau:

Decentralized Delay Optimal Control for Interference Networks with Limited Renewable Energy Storage. - Brian Michalski, Mukkai Krishnamoorthy, Tsz-Yam Lau:

Temporal Analysis of Literary and Programming Prose. - Everthon Valadao, Dorgival O. Guedes, Ricardo Duarte:

Caracterização de tempos de ida-e-volta na Internet. - Páidí Creed, Mary Cryan:

The number of Euler tours of a random directed graph. - Javad Azimi, Ruofei Zhang, Yang Zhou, Vidhya Navalpakkam, Jianchang Mao, Xiaoli Z. Fern:

The Impact of Visual Appearance on User Response in Online Display Advertising. - Clément Farabet, Camille Couprie, Laurent Najman

, Yann LeCun:
Scene Parsing with Multiscale Feature Learning, Purity Trees, and Optimal Covers. - Eray Özkural:

Abstract Representations and Frequent Pattern Discovery. - Daniel J. Dougherty, Joshua D. Guttman:

Symbolic Protocol Analysis for Diffie-Hellman. - Raghav V. Sampangi, Saurabh Dey, Shalini R. Urs, Srinivas Sampalli:

A security suite for wireless body area networks. - Huazi Zhang, Huaiyu Dai, Zhaoyang Zhang:

On the Capacity Region for Cognitive Multiple Access over White Space Channels. - Xu Chu Ding, Jing Wang, Morteza Lahijanian, Ioannis Ch. Paschalidis, Calin Belta:

Temporal Logic Motion Control using Actor-Critic Methods. - K. S. Kuppusamy, Gnanasekaran Aghila:

Museum: Multidimensional web page segment evaluation model. - Sunil Simon, Krzysztof R. Apt:

Choosing Products in Social Networks. - Dmitry Ageyev, Alexander Pereverzev:

Wavelength Assignment in Design DWDM Transport Network Using Algorithm BCO-RWA. - S. Rajyalakshmi, Amitabha Bagchi, Soham Das, Rudra M. Tripathy:

Topic Diffusion and Emergence of Virality in Social Networks. - Yulong Liu, Shidong Li, Tiebin Mi:

Performance Analysis of ℓ1-synthesis with Coherent Frames. - Liang Liu, Rui Zhang, Kee-Chaing Chua:

Achieving Global Optimality for Weighted Sum-Rate Maximization in the K-User Gaussian Interference Channel with Multiple Antennas. - Ioana Sporea, André Grüning:

Supervised Learning in Multilayer Spiking Neural Networks. - Nissim Halabi, Guy Even:

Hierarchies of Local-Optimality Characterizations in Decoding Tanner Codes. - Jonathan Rogge, Dirk Aeyels:

Multi-robot coverage to locate fixed targets using formation structures. - Drazen Lucanin, Ivan Fabek:

A visual programming language for drawing and executing flowcharts. - Jean Goubault-Larrecq:

QRB-Domains and the Probabilistic Powerdomain. - Karl Bringmann, Kurt Mehlhorn, Adrian Neumann:

Remarks on Category-Based Routing in Social Networks. - Maria Luisa Bonet, Samuel R. Buss:

An Improved Separation of Regular Resolution from Pool Resolution and Clause Learning. - (Withdrawn) Detection Performance of M-ary Relay Trees with Non-binary Message Alphabets.

- Beth Trushkowsky, Tim Kraska, Michael J. Franklin, Purnamrita Sarkar:

Getting It All from the Crowd. - Christian Wulff-Nilsen:

Approximate Distance Oracles with Improved Query Time. - Khaled Masmoudi, Marc Antonini, Pierre Kornprobst:

Streaming an image through the eye: The retina seen as a dithered scalable image coder. - Sarah Y. Tang, Afzal Godil:

An evaluation of local shape descriptors for 3D shape retrieval. - John W. Byers, Michael Mitzenmacher, Georgios Zervas:

The Groupon Effect on Yelp Ratings: A Root Cause Analysis. - Dohy Hong:

Statistical reliability and path diversity based PageRank algorithm improvements. - James Chapman

, Paul Blain Levy:
Proceedings Fourth Workshop on Mathematically Structured Functional Programming, MSFP@ETAPS 2012, Tallinn, Estonia, 25 March 2012. EPTCS 76, 2012 [contents] - Arash Khabbazibasmenj, Florian Roemer, Sergiy A. Vorobyov, Martin Haardt:

Sum-Rate Maximization in Two-Way AF MIMO Relaying: Polynomial Time Solutions to a Class of DC Programming Problems. - N. Prakash, Govinda M. Kamath, V. Lalitha, P. Vijay Kumar:

Optimal Linear Codes with a Local-Error-Correction Property. - Ahmed Rhif:

A High Order Sliding Mode Control with PID Sliding Surface: Simulation on a Torpedo. - Wajeb Gharibi, Maha Shaabi:

Cyber threats in social networking websites. - M. Rizwan Jameel Qureshi, Shaukat Ali Hayat:

The artifacts of component-based development. - Youssef Bassil, Mohammad Alwani:

Autonomic html interface generator for web applications. - Youssef Bassil:

Building sustainable ecosystem-oriented architectures. - Moataz M. Abdelwahab, Salah A. Aly, Islam Yousry:

Efficient Web-based Facial Recognition System Employing 2DHOG. - Xin Shuai, Alberto Pepe, Johan Bollen:

How the Scientific Community Reacts to Newly Submitted Preprints: Article Downloads, Twitter Mentions, and Citations. - Jierui Xie, Boleslaw K. Szymanski:

Towards Linear Time Overlapping Community Detection in Social Networks. - Amitabh Trehan:

Self-healing using virtual structures. - Neal Glew:

Subtyping for F-Bounded Quantifiers and Equirecursive Types (Extended Version). - M. Rizwan Jameel Qureshi, M. E. Sandhu:

Survey-Based Analysis of the Proposed Component-Based Development Process. - M. Rizwan Jameel Qureshi:

Evaluation of the Improved XP Software Development Model. - M. Rizwan Jameel Qureshi, S. A. Hussain:

An Improved XP Software Development Model. - Manuel Cebrián, Ramamohan Paturi, Daniel Ricketts:

Experimental study of the impact of historical information in human coordination. - M. R. J. Qureshi, Muhammad Kashif:

Seamless Long Term Learning in Agile Teams for Sustainable Leadership. - Nayyar Iqbal, M. Rizwan Jameel Qureshi:

Improvement of Key Problems of Software Testing in Quality Assurance. - M. Rizwan Jameel Qureshi, M. E. Sandhu:

A Validation of the Proposed Component-Based Development Process. - Nicolò Maria Calcavecchia, Bogdan Alexandru Caprarescu, Elisabetta Di Nitto, Daniel J. Dubois, Dana Petcu:

DEPAS: A Decentralized Probabilistic Algorithm for Auto-Scaling. - M. Rizwan Jameel Qureshi, Muhammad Rafiq Asim, Muhammad Nadeem, Asif Mehmood:

A New Teaching Model For The Subject Of Software Project Management. - Nadeem Ahmed, Muhammad Rafiq Asim, M. Rizwan Jameel Qureshi:

A Step Forward To Component-based Software Cost Estimation in Object-oriented Environment. - M. Rizwan Jameel Qureshi:

Empirical Evaluation of the Proposed eXScrum Model: Results of a Case Study. - Asif Irshad Khan

, M. Rizwan Jameel Qureshi, Usman Ali Khan:
A Comprehensive Study of Commonly Practiced Heavy & Light Weight Software Methodologies. - Ahmed Barnawi, M. Rizwan Jameel Qureshi, Asif Irshad Khan

:
A Framework for Next Generation Mobile and Wireless Networks Application Development using Hybrid Component Based Development Model. - Ahmed Barnawi, Abdurrahman H. Al-Talhi, M. Rizwan Jameel Qureshi, Asif Irshad Khan

:
Novel Component Based Development Model For Sip-Based Mobile Application. - José A. García Gutiérrez, Carlos Cotta, Antonio José Fernández Leiva:

Evolutionary Computation in Astronomy and Astrophysics: A Review. - Adel Javanmard, Andrea Montanari:

Subsampling at Information Theoretically Optimal Rates. - Kevin Mader, Gil Reese:

Using Covariance Matrices as Feature Descriptors for Vehicle Detection from a Fixed Camera. - Pan Zhang, Abolfazl Ramezanpour, Lenka Zdeborová, Riccardo Zecchina:

Message passing for quantified Boolean formulas. - Ciprian Dobre, Florin Pop, Valentin Cristea:

A Simulation Model for Evaluating Distributed Systems Dependability. - Mohamed S. Nafea, Karim G. Seddik, Mohammed Nafie, Hesham El Gamal:

On the Diversity Gain Region of the Z-interference Channels. - Radu-Ioan Ciobanu, Ciprian Dobre:

Data Dissemination in Opportunistic Networks. - (Withdrawn) A Formal Approach for the Development of Service-Oriented Applications.

- Ciprian Dobre, George Cristian Tudor:

Mobile Advertisement in Vehicular Ad-Hoc Networks. - Imran Shafique Ansari

, Ferkan Yilmaz, Mohamed-Slim Alouini
, Oguz Kucur:
New Results on the Sum of Gamma Random Variates With Application to the Performance of Wireless Communication Systems over Nakagami-m Fading Channels. - Huazi Zhang, Zhaoyang Zhang, Huaiyu Dai:

Gossip-based Information Spreading in Mobile Networks. - Oliver Kullmann, Xishun Zhao:

On Davis-Putnam reductions for minimally unsatisfiable clause-sets. - K. S. Kuppusamy, Gnanasekaran Aghila:

Semantic snippet construction for search engine results based on segment evaluation. - K. S. Kuppusamy, Gnanasekaran Aghila:

Live-marker: A personalized web page content marking tool. - K. S. Kuppusamy, Gnanasekaran Aghila:

Segmentation Based Approach to Dynamic Page Construction from Search Engine Results. - K. S. Kuppusamy, Gnanasekaran Aghila:

We.I.Pe: Web Identification of People using e-mail ID. - K. S. Kuppusamy, Gnanasekaran Aghila:

A Model for Web Page Usage Mining Based on Segmentation. - M. Sreerama Murty, A. Veeraiah, Srinivas Rao:

"Performance Evaluation of Wi-Fi comparison with WiMAX Networks". - Graham Cormode, S. Muthukrishnan, Jinyun Yun:

Scienceography: the study of how science is written. - M. Puck Rombach, Mason A. Porter, James H. Fowler, Peter J. Mucha:

Core-Periphery Structure in Networks. - Ilan Shomorony, Amir Salman Avestimehr:

Worst-Case Additive Noise in Wireless Networks. - Maxime Berar, Françoise Tilotta, Joan Alexis Glaunès, Yves Rozenholc:

Craniofacial reconstruction as a prediction problem using a Latent Root Regression model. - Rashmi Gupta, Shalini Raghav:

Risk Assessment Techniques and Survey Method for COTS Components. - André Gaul:

Function call overhead benchmarks with MATLAB, Octave, Python, Cython and C. - Dan C. Ciresan, Ueli Meier, Jürgen Schmidhuber:

Multi-column Deep Neural Networks for Image Classification. - Sundeep Rangan, Alyson K. Fletcher:

Iterative Estimation of Constrained Rank-One Matrices in Noise. - Amir Hesam Salavati, Amin Karbasi:

Multi-Level Error-Resilient Neural Networks with Learning. - Christian Borgs, Michael Brautbar, Jennifer T. Chayes, Shang-Hua Teng:

Sublinear Time Algorithm for PageRank Computations and Related Applications. - Antonín Komenda, Peter Novák, Michal Pechoucek:

Decentralized Multi-agent Plan Repair in Dynamic Environments. - Nicolas Macris, Marc Vuffray:

Beyond the Bethe Free Energy of LDPC Codes via Polymer Expansions. - Nicolas Macris, Marc Vuffray:

Polymer Expansions for Cycle LDPC Codes. - Shahar Dobzinski, Jan Vondrák:

The Computational Complexity of Truthfulness in Combinatorial Auctions. - Shahar Dobzinski, Jan Vondrák:

On the Hardness of Welfare Maximization in Combinatorial Auctions with Submodular Valuations. - Vinay A. Vaishampayan:

Query Matrices for Retrieving Binary Vectors Based on the Hamming Distance Oracle. - Behrouz Maham, Aydin Behnad, Mérouane Debbah:

Efficient Relay Selection Scheme for Delay-Limited Non-Orthogonal Hybrid-ARQ Relay Channels. - Christina Boucher, Gad M. Landau, Avivit Levy, David Pritchard, Oren Weimann:

On Approximating String Selection Problems with Outliers. - Brian K. Butler, Paul H. Siegel:

Error Floor Approximation for LDPC Codes in the AWGN Channel. - Parinya Chalermsook, Khaled M. Elbassioni, Danupon Nanongkai, He Sun:

Multi-Attribute Profit-Maximizing Pricing (Extended Abstract). - Drazen Lucanin:

Visual definition of procedures for automatic virtual scene generation. - Hien Quoc Ngo, Michail Matthaiou, Trung Quang Duong, Erik G. Larsson:

Uplink Performance Analysis of Multicell MU-MIMO Systems with ZF Receivers. - George Christodoulou, Kurt Mehlhorn, Evangelia Pyrga:

Improving the Price of Anarchy for Selfish Routing via Coordination Mechanisms. - William Webber:

Approximate Recall Confidence Intervals. - Amin Emad, Olgica Milenkovic:

Semi-Quantitative Group Testing. - Shreyas Sekar, Patrick Maillé:

Exploiting the 'Web of Trust' to improve efficiency in collaborative networks. - Dmitry I. Ignatov, Jonas Poelmans, Vasily Zaharchuk:

Recommender System Based on Algorithm of Bicluster Analysis RecBi. - Jonas Poelmans, Paul Elzinga, Alexey Neznanov, Stijn Viaene, Sergei O. Kuznetsov, Dmitry I. Ignatov, Guido Dedene:

Concept Relation Discovery and Innovation Enabling Technology (CORDIET). - (Withdrawn) The weight Enumerator of some irreducible cyclic codes.

- Jane Butterfield, Daniel W. Cranston, Gregory J. Puleo, Douglas B. West, Reza Zamani:

Revolutionaries and spies: Spy-good and spy-bad graphs. - Yue Wang:

On Effectiveness of Backlog Bounds Using Stochastic Network Calculus in 802.11. - Patrick Bahr

, Tom Hvitved:
Parametric Compositional Data Types. 3-24 - Chris Casinghino, Vilhelm Sjöberg, Stephanie Weirich

:
Step-Indexed Normalization for a Language with General Recursion. 25-39 - Mauro Jaskelioff, Ondrej Rypacek:

An Investigation of the Laws of Traversals. 40-49 - José Pedro Magalhães

, Andres Löh
:
A Formal Comparison of Approaches to Datatype-Generic Programming. 50-67 - Tomas Petricek

:
Evaluation strategies for monadic computations. 68-89 - Maciej Piróg

, Jeremy Gibbons:
Tracing monadic computations and representing effects. 90-111 - Vilhelm Sjöberg, Chris Casinghino, Ki Yung Ahn, Nathan Collins, Harley D. Eades III, Peng Fu, Garrin Kimmell, Tim Sheard, Aaron Stump, Stephanie Weirich

:
Irrelevance, Heterogeneous Equality, and Call-by-value Dependent Type Systems. 112-162 - Wouter Swierstra:

From Mathematics to Abstract Machine: A formal derivation of an executable Krivine machine. 163-177 - Anjana Kakoti Mahanta, Mala Dutta:

Detection of Calendar-Based Periodicities of Interval-Based Temporal Patterns. - Sharon Goldberg, Zhenming Liu:

Technology Diffusion in Communication Networks. - Dieter Duyck, Michael Heindlmaier, Daniele Capirone, Marc Moeneclaey:

Diversity Analysis, Code Design and Tight Error Rate Lower Bound for Binary Joint Network-Channel Coding. - Jin-Yi Zhou, Shu-Tao Xia, Yong Jiang, Hai-Tao Zheng:

Maximum Multiflow in Wireless Network Coding. - Bogdan Alexandru Caprarescu, Eva Kaslik, Dana Petcu:

Theoretical Analysis and Tuning of Decentralized Probabilistic Auto-Scaling. - Huasen Wu, Chenxi Zhu, Richard J. La, Xin Liu, Youguang Zhang:

Fast Adaptive S-ALOHA Scheme for Event-driven Machine-to-Machine Communications. - Brage Ellingsæter, Hemdan Bezabih, Josef Noll, Torleiv Maseng:

Using TV Receiver Information to Increase Cognitive White Space Spectrum. - Salvador Gabarda, Gabriel Cristóbal:

No-reference image quality assessment through the von Mises distribution. - Subhadip Basu, Chitrita Chaudhuri, Mahantapas Kundu, Mita Nasipuri, Dipak Kumar Basu:

Segmentation of Offline Handwritten Bengali Script. - Ritesh Ray Chaudhuri, Joydeep Basu, Tarun Kanti Bhattacharyya:

Design and Fabrication of Micromachined Resonators. - Jesper Buus Nielsen, Peter Sebastian Nordholt, Claudio Orlandi, Sai Sheshank Burra:

A New Approach to Practical Active-Secure Two-Party Computation. - Sébastien Bubeck, Nicolò Cesa-Bianchi, Sham M. Kakade:

Towards minimax policies for online linear optimization with bandit feedback. - Sébastien Gambs, Rachid Guerraoui, Florian Huc, Anne-Marie Kermarrec:

On Dynamic Distributed Computing. - Friedrich Slivovsky, Stefan Szeider:

Computing Resolution-Path Dependencies in Linear Time. - Dohy Hong:

D-iteration based asynchronous distributed computation. - Emilio Ferrara, Alfonso E. Romero:

V-index: a novel metric to measure virtuosity of academics. - Kristina Lerman, Rumi Ghosh, Tawan Surachawala:

Social Contagion: An Empirical Study of Information Spread on Digg and Twitter Follower Graphs. - Grey Ballard, James Demmel, Olga Holtz, Benjamin Lipshitz, Oded Schwartz:

Communication-Optimal Parallel Algorithm for Strassen's Matrix Multiplication. - Dale Miller

, Zoltán Ésik:
Proceedings 8th Workshop on Fixed Points in Computer Science, FICS 2012, Tallinn, Estonia, 24th March 2012. EPTCS 77, 2012 [contents] - Grey Ballard, James Demmel, Olga Holtz, Benjamin Lipshitz, Oded Schwartz:

Strong Scaling of Matrix Multiplication Algorithms and Memory-Independent Communication Lower Bounds. - Ke Wang, Chao Han, Ada Wai-Chee Fu:

Randomization Resilient To Sensitive Reconstruction. - Xin Shuai, Xiaozhong Liu, Johan Bollen:

Improving News Ranking by Community Tweets. - Guy E. Blelloch, Jeremy T. Fineman, Julian Shun:

Greedy Sequential Maximal Independent Set and Matching are Parallel on Average. - Travis Gagie, Pawel Gawrychowski:

Linear-Space Substring Range Counting over Polylogarithmic Alphabets. - J. Malar Vizhi, T. Bhuvaneswari:

Data quality measurement on categorical data using genetic algorithm. - Gabriel Kerneis, Juliusz Chroboczek:

Lambda-lifting and CPS conversion in an imperative language. - Ada Wai-Chee Fu, Jia Wang, Ke Wang, Raymond Chi-Wing Wong:

Small Count Privacy and Large Count Utility in Data Publishing. - Xiumin Wang, Jianping Wang, Zeyu Zheng, Yinlong Xu, Mei Yang:

Service Composition in Service-Oriented Wireless Sensor Networks with Persistent Queries. - Toni Stojanovski, Ivan Velinov, Marko Vuckovic:

Scalability of Data Binding in ASP.NET Web Applications. - Alexandr Klimchik, Anatoly Pashkevich, Stéphane Caro

, Damien Chablat:
Stiffness matrix of manipulators with passive joints: computational aspects. - Konstantin Avrachenkov, Nelly Litvak, Marina Sokol, Don Towsley:

Quick Detection of Nodes with Large Degrees. - Yde Venema, Steve Vickers, Jacob Vosmaer:

Generalized powerlocales via relation lifting. - Keisuke Goto, Hideo Bannai, Shunsuke Inenaga, Masayuki Takeda:

Speeding-up $q$-gram mining on grammar-based compressed texts. - Ugo Dal Lago, Paolo Parisen Toldin:

An Higher-Order Characterization of Probabilistic Polynomial Time (Long Version). - Chunsheng Gu:

Attack on Fully Homomorphic Encryption over the Integers. - Nicolò Cesa-Bianchi, Pierre Gaillard, Gábor Lugosi, Gilles Stoltz:

A new look at shifting regret. - Sarge Rogatch:

An efficient high-quality hierarchical clustering algorithm for automatic inference of software architecture from the source code of a software system. - Manfred Kufleitner, Alexander Lauser:

Lattices of Logical Fragments over Words. - Jonathan A. Kelner, Gary L. Miller, Richard Peng:

Faster Approximate Multicommodity Flow Using Quadratically Coupled Flows. - S. Padma, Ananthi Seshasaayee:

Towards Maximum Spanning Tree Model in Web 3.0 Design and Development for Students using Discriminant Analysis. - Chao Li, Gerome Miklau:

Measuring the achievable error of query sets under differential privacy. - Chun Meng, Abinesh Ramakrishnan, Athina Markopoulou, Syed Ali Jafar:

On the Feasibility of Precoding-Based Network Alignment for Three Unicast Sessions. - Fionn Murtagh, Pedro Contreras:

The Future of Search and Discovery in Big Data Analytics: Ultrametric Information Spaces. - Liyue Fan, Li Xiong:

Adaptively Sharing Time-Series with Differential Privacy. - Saeed Abdallah, Ioannis N. Psaromiligkos:

Partially-blind Estimation of Reciprocal Channels for AF Two-Way Relay Networks Employing M-PSK Modulation. - Raphaël Clifford, Markus Jalsenius, Ely Porat, Benjamin Sach:

Pattern Matching in Multiple Streams. - Jaideep Ray, Ali Pinar, C. Seshadhri:

Are we there yet? When to stop a Markov chain while generating random graphs. - (Withdrawn) Lower Bounds on Testing Functions of Low Fourier Degree.

- Arpita Ghosh, Patrick Hummel:

Implementing Optimal Outcomes in Social Computing: A Game-Theoretic Approach. - Yuan Feng, Yuxin Deng, Mingsheng Ying:

Symbolic bisimulation for quantum processes. - Mikhail V. Simkin, Vwani P. Roychowdhury:

Why does attention to web articles fall with time? - Andreas Abel:

Type-Based Termination, Inflationary Fixed-Points, and Mixed Inductive-Coinductive Types. 1-11 - Luca Aceto, Anna Ingólfsdóttir:

Characteristic Formulae for Relations with Nested Fixed Points. 15-22 - Axel Haddad:

IO vs OI in Higher-Order Recursion Schemes. 23-30 - André Hirschowitz, Marco Maggesi

:
Initial Semantics for Strengthened Signatures. 31-38 - Martin Lange, Étienne Lozes:

Model-Checking the Higher-Dimensional Modal mu-Calculus. 39-46 - Grigori Mints, Thomas Studer

:
Cut-elimination for the mu-calculus with one variable. 47-54 - Tarmo Uustalu

:
Structured general corecursion and coinductive graphs [extended abstract]. 55-61 - Kazem Jahanbakhsh, Valerie King, Gholamali C. Shoja:

They Know Where You Live! - Christos Boutsidis, Petros Drineas, Malik Magdon-Ismail:

Rich Coresets For Constrained Linear Regression. - Jie Xu, Ling Qiu:

Energy Efficiency Optimization for MIMO Broadcasting Channels. - Baocheng Wang, Chunming Tang, Yanfeng Qi, Yixian Yang, Maozhi Xu:

A Note on Weight Distributions of Irreducible Cyclic Codes. - Samet Oymak, Babak Hassibi:

Recovering Jointly Sparse Signals via Joint Basis Pursuit. - Laura Bozzelli, Hans van Ditmarsch, Tim French, James Hales, Sophie Pinchinat:

Refinement Modal Logic. - Pierre Aboulker:

Excluding 4-wheels. - Patrick Bas, Teddy Furon:

The Effective Key Length of Watermarking Schemes. - Yue Wang, On-Ching Yue:

A Tutorial of 802.11 Implementation in NS-2. - Robert Hoehndorf, Michel Dumontier, Georgios V. Gkoutos:

Towards quantitative measures in applied ontology. - (Withdrawn) From Linear Codes to Hyperplane Arrangements via Thomas Decomposition.

- Karthekeyan Chandrasekaran, Richard M. Karp:

Finding the most biased coin with fewest flips. - Michael Erhard, Hans Strauch:

Control of Towing Kites for Seagoing Vessels. - Mansoor I. Yousefi, Frank R. Kschischang:

Information Transmission using the Nonlinear Fourier Transform, Part I: Mathematical Tools. - Juan F. Sequeda, Marcelo Arenas, Daniel P. Miranker:

On Directly Mapping Relational Databases to RDF and OWL (Extended Version). - Samer Al-Kiswany, Abdullah Gharaibeh, Matei Ripeanu:

GPUs as Storage System Accelerators. - Debojyoti Dutta, Michael Kapralov, Ian Post, Rajendra Shinde:

Optimal bandwidth-aware VM allocation for Infrastructure-as-a-Service. - Marius Leordeanu, Rahul Sukthankar, Cristian Sminchisescu:

Generalized Boundaries from Multiple Image Interpretations. - Ke Wang, Peng Wang, Ada Wai-Chee Fu, Raymond Chi-Wing Wong:

Inferential or Differential: Privacy Laws Dictate. - Udi Apsel, Ronen I. Brafman:

Extended Lifted Inference with Joint Formulas. - John Asmuth, Michael L. Littman:

Learning is planning: near Bayes-optimal reinforcement learning via Monte-Carlo tree search. - Yoram Bachrach, Reshef Meir, Michal Feldman, Moshe Tennenholtz:

Solving Cooperative Reliability Games. - Gowtham Bellala, Jason Stanley, Clayton Scott, Suresh K. Bhavnani:

Active Diagnosis via AUC Maximization: An Efficient Approach for Multiple Fault Identification in Large Scale, Noisy Networks. - Avleen Singh Bijral, Nathan D. Ratliff, Nathan Srebro:

Semi-supervised Learning with Density Based Distances. - E. Busra Celikkaya, Christian R. Shelton, William Lam:

Factored Filtering of Continuous-Time Systems. - Mithun Chakraborty, Sanmay Das, Malik Magdon-Ismail:

Near-Optimal Target Learning With Stochastic Binary Signals. - Archie C. Chapman, Simon Andrew Williamson, Nicholas R. Jennings:

Filtered Fictitious Play for Perturbed Observation Potential Games and Decentralised POMDPs. - Laurent Charlin, Richard S. Zemel, Craig Boutilier:

A Framework for Optimizing Paper Matching. - Shaunak Chatterjee, Stuart Russell:

A temporally abstracted Viterbi algorithm. - Xi Chen, Qihang Lin, Seyoung Kim, Jaime G. Carbonell, Eric P. Xing:

Smoothing Proximal Gradient Method for General Structured Sparse Learning. - Arthur Choi, Khaled S. Refaat, Adnan Darwiche:

EDML: A Method for Learning Parameters in Bayesian Networks. - SangIn Chun, Ross D. Shachter:

Strictly Proper Mechanisms with Cooperating Players. - Tom Claassen, Tom Heskes:

A Logical Characterization of Constraint-Based Causal Discovery. - Corinna Cortes, Mehryar Mohri, Afshin Rostamizadeh:

Ensembles of Kernel Predictors. - James Cussens:

Bayesian network learning with cutting planes. - Kun Deng, Joelle Pineau, Susan A. Murphy:

Active Learning for Developing Personalized Treatment. - Krishnamurthy Dvijotham, Emanuel Todorov:

A Unifying Framework for Linearly Solvable Control. - Narayanan Unny Edakunni, Gary Brown, Tim Kovacs:

Boosting as a Product of Experts. - Mahdi Milani Fard, Joelle Pineau, Csaba Szepesvári:

PAC-Bayesian Policy Evaluation for Reinforcement Learning. - Hélène Fargier, Nahla Ben Amor, Wided Guezguez:

On the Complexity of Decision Making in Possibilistic Decision Trees. - Daan Fierens, Guy Van den Broeck, Ingo Thon, Bernd Gutmann, Luc De Raedt:

Inference in Probabilistic Logic Programs using Weighted CNF's. - Thomas Furmston, David Barber:

Efficient Inference in Markov Control Problems. - Phan Hong Giang:

Dynamic consistency and decision making under vacuous belief. - Inmar E. Givoni, Clement Chung, Brendan J. Frey:

Hierarchical Affinity Propagation. - Vibhav Gogate, Pedro M. Domingos:

Approximation by Quantization. - Vibhav Gogate, Pedro M. Domingos:

Probabilistic Theorem Proving. - Quanquan Gu, Zhenhui Li, Jiawei Han:

Generalized Fisher Score for Feature Selection. - Andrew Guillory, Jeff A. Bilmes:

Active Semi-Supervised Learning using Submodular Functions. - Michael Gutmann, Junichiro Hirayama:

Bregman divergence as general framework to estimate unnormalized statistical models. - Hannaneh Hajishirzi, Julia Hockenmaier, Erik T. Mueller, Eyal Amir:

Reasoning about RoboCup Soccer Narratives. - Eric A. Hansen:

Suboptimality Bounds for Stochastic Shortest Path Problems. - Jouni Hartikainen, Simo Särkkä:

Sequential Inference for Latent Force Models. - Uri Heinemann, Amir Globerson:

What Cannot be Learned with Bethe Approximations. - Hoifung Poon, Pedro M. Domingos:

Sum-Product Networks: A New Deep Architecture. - Jean Honorio:

Lipschitz Parametrization of Probabilistic Graphical Models. - Jonathan Huang, Ashish Kapoor, Carlos Guestrin:

Efficient Probabilistic Inference with Partial Ranking Queries. - Antti Hyttinen, Frederick Eberhardt, Patrik O. Hoyer:

Noisy-OR Models with Latent Confounding. - Takanori Inazumi, Takashi Washio, Shohei Shimizu, Joe Suzuki, Akihiro Yamamoto, Yoshinobu Kawahara:

Discovering causal structures in binary exclusive-or skew acyclic models. - Dominik Janzing, Eleni Sgouritsa, Oliver Stegle, Jonas Peters, Bernhard Schölkopf:

Detecting low-complexity unobserved causes. - Alex Kulesza, Ben Taskar:

Learning Determinantal Point Processes. - Akshat Kumar, Shlomo Zilberstein:

Message-Passing Algorithms for Quadratic Programming Formulations of MAP Estimation. - Minyi Li, Quoc Bao Vo, Ryszard Kowalczyk:

An Efficient Protocol for Negotiation over Combinatorial Domains with Incomplete Information. - Shiau Hong Lim, Peter Auer:

Noisy Search with Comparative Feedback. - Qiang Liu, Alexander Ihler:

Variational Algorithms for Marginal MAP. - Jianbing Ma, Weiru Liu, Paul Miller:

Belief change with noisy sensing in the situation calculus. - Brandon M. Malone, Changhe Yuan, Eric A. Hansen, Susan Bridges:

Improving the Scalability of Optimal Bayesian Network Learning with External-Memory Frontier Breadth-First Branch and Bound Search. - Radu Marinescu, Nic Wilson:

Order-of-Magnitude Influence Diagrams. - Benjamin M. Marlin, Nando de Freitas:

Asymptotic Efficiency of Deterministic Estimators for Discrete Energy-Based Models: Ratio Matching and Pseudolikelihood. - David M. Mimno:

Reconstructing Pompeian Households. - Volodymyr Mnih, Hugo Larochelle, Geoffrey E. Hinton:

Conditional Restricted Boltzmann Machines for Structured Output Prediction. - Hala Mostafa, Victor R. Lesser:

Compact Mathematical Programs For DEC-MDPs With Structured Agent Interactions. - Ananda Narayanan B., Balaraman Ravindran:

Fractional Moments on Bandit Problems. - Swaprava Nath

, Onno Zoeter, Yadati Narahari, Christopher R. Dance:
Dynamic Mechanism Design for Markets with Strategic Resources. - Nebojsa Jojic, Alessandro Perina:

Multidimensional counting grids: Inferring word order from disordered bags of words. - Teppo Niinimaki, Pekka Parviainen, Mikko Koivisto:

Partial Order MCMC for Structure Discovery in Bayesian Networks. - Eunsoo Oh, Kee-Eung Kim:

A Geometric Traversal Algorithm for Reward-Uncertain MDPs. - Takayuki Osogami:

Iterated risk measures for risk-sensitive Markov decision processes with discounted cost. - David M. Pennock, Lirong Xia:

Price Updating in Combinatorial Prediction Markets with Bayesian Networks. - Jonas Peters, Joris M. Mooij, Dominik Janzing, Bernhard Schölkopf:

Identifiability of Causal Graphs using Functional Models. - Barnabás Póczos, Liang Xiong, Jeff G. Schneider:

Nonparametric Divergence Estimation with Applications to Machine Learning on Distributions. - Gungor Polatkan, Oncel Tuzel:

Compressed Inference for Probabilistic Sequential Models. - Nima Reyhani, Hideitsu Hino, Ricardo Vigário:

New Probabilistic Bounds on Eigenvalues and Eigenvectors of Random Kernel Matrices. - Scott Sanner, Karina Valdivia Delgado, Leliane Nunes de Barros:

Symbolic Dynamic Programming for Discrete and Continuous State MDPs. - Ilya Shpitser, Thomas S. Richardson, James M. Robins:

An Efficient Algorithm for Computing Interventional Distributions in Latent Variable Causal Models. - Johannes Textor, Maciej Liskiewicz:

Adjustment Criteria in Causal Diagrams: An Algorithmic Perspective. - Maomi Ueno:

Robust learning Bayesian networks for prior belief. - Joop van de Ven, Fabio Ramos:

Distributed Anytime MAP Inference. - Michael P. Wellman, Lu Hong, Scott E. Page:

The Structure of Signals: Causal Interdependence Models for Games of Incomplete Information. - Feng Yan, Zenglin Xu, Yuan (Alan) Qi:

Sparse matrix-variate Gaussian process blockmodels for network modeling. - Jian-Bo Yang, Ivor W. Tsang:

Hierarchical Maximum Margin Learning for Multi-Class Classification. - Julian Yarkony, Ragib Morshed, Alexander T. Ihler, Charless C. Fowlkes:

Tightening MRF Relaxations with Planar Subproblems. - Yaoliang Yu, Dale Schuurmans:

Rank/Norm Regularization with Closed-Form Solutions: Application to Subspace Clustering. - Haohai Yu, Robert A. van Engelen:

Measuring the Hardness of Stochastic Sampling on Bayesian Networks with Deterministic Causalities: the k-Test. - Kun Zhang, Jonas Peters, Dominik Janzing, Bernhard Schölkopf:

Kernel-based Conditional Independence Test and Application in Causal Discovery. - Xinhua Zhang, Ankan Saha, S. V. N. Vishwanathan:

Smoothing Multivariate Performance Measures. - Lu Zheng, Ole J. Mengshoel, Jike Chong:

Belief Propagation by Message Passing in Junction Trees: Computing Each Message Faster Using GPU Parallelization. - Jun Zhu, Eric P. Xing:

Sparse Topical Coding. - Jakob Zscheischler, Dominik Janzing, Kun Zhang:

Testing whether linear equations are causal: A free probability theory approach. - Kareem Amin, Michael J. Kearns, Umar Syed:

Graphical Models for Bandit Problems. - Chao Li, Gerome Miklau:

An Adaptive Mechanism for Accurate Query Answering under Differential Privacy. - Rongqing Zhang, Lingyang Song, Zhu Han, Bingli Jiao:

Physical Layer Security for Two-Way Untrusted Relaying with Friendly Jammers. - Paul Potgieter:

The rapid points of a complex oscillation. - Kadir Akbudak, Enver Kayaaslan, Cevdet Aykanat:

Technical Report on Hypergraph-Partitioning-Based Models and Methods for Exploiting Cache Locality in Sparse-Matrix Vector Multiplication. - Thomas Pietrzak, Andrew Crossan, Stephen A. Brewster, Benoît Martin, Isabelle Pecci

:
Creating Usable Pin Array Tactons for Non-Visual Information. - Dinesh Dileep Gaurav, Renu Ramesh:

A feature extraction technique based on character geometry for character recognition. - Paraskevas V. Lekeas, Giorgos Stamatopoulos:

Cooperative oligopoly games with boundedly rational firms. - Hamid Salimi, Davar Giveki, Mohammad Ali Soltanshahi, Javad Hatami:

Extended Mixture of MLP Experts by Hybrid of Conjugate Gradient Method and Modified Cuckoo Search. - Tor Lattimore, Marcus Hutter:

PAC Bounds for Discounted MDPs. - Kristoffer Arnsfelt Hansen, Michal Koucký, Niels Lauritzen, Peter Bro Miltersen, Elias P. Tsigaridas:

Exact Algorithms for Solving Stochastic Games. - Ferkan Yilmaz, Fahd Ahmed Khan, Mohamed-Slim Alouini

:
Performance of Amplify-and-Forward Multihop Transmission over Relay Clusters with Different Routing Strategies. - Entao Liu, Edwin K. P. Chong:

On Greedy Adaptive Measurements. - Luca Barletta, Flaminio Borgonovo, Matteo Cesana:

A formal proof of the optimal frame setting for Dynamic-Frame Aloha with known population size. - Sylvain Malacria, Thomas Pietrzak, Aurélien Tabard

, Eric Lecolinet:
U-Note: Capture the Class and Access it Everywhere. - Thomas Pietrzak, Andrew Crossan, Stephen A. Brewster, Benoît Martin, Isabelle Pecci

:
Exploring Geometric Shapes with Touch. - Ludo Waltman, Clara Calero-Medina, Joost Kosten, Ed C. M. Noyons, Robert J. W. Tijssen, Nees Jan van Eck, Thed N. van Leeuwen, Anthony F. J. van Raan, Martijn S. Visser, Paul Wouters:

The Leiden Ranking 2011/2012: Data collection, indicators, and interpretation. - Daniel S. Katz, Timothy G. Armstrong, Zhao Zhang, Michael Wilde, Justin M. Wozniak:

Many-Task Computing and Blue Waters. - Niel de Beaudrap:

On the complexity of solving linear congruences and computing nullspaces modulo a constant. - Diego Figueira

:
Alternating register automata on finite words and trees. - Christine Fricker, Philippe Robert, James Roberts:

A versatile and accurate approximation for LRU cache performance. - Benjamin Edwards, Tyler Moore, George Stelle, Steven A. Hofmeyr, Stephanie Forrest:

Beyond the Blacklist: Modeling Malware Spread and the Effect of Interventions. - Benjamin Edwards, Steven A. Hofmeyr, George Stelle, Stephanie Forrest:

Internet Topology over Time. - René Vidal, Yi Ma, Shankar Sastry:

Generalized Principal Component Analysis (GPCA). - Steven A. Hofmeyr, Tyler Moore, Stephanie Forrest, Benjamin Edwards, George Stelle:

Modeling Internet-Scale Policies for Cleaning up Malware. - Shashi Shekhar, Michael Dietz, Dan S. Wallach:

AdSplit: Separating smartphone advertising from applications. - Arun Sridharan, Can Emre Koksal:

Energy Efficient Greedy Link Scheduling and Power Control in wireless networks. - Christoph Studer, Erik G. Larsson:

PAR-Aware Large-Scale Multi-User MIMO-OFDM Downlink. - Jung Hyun Bae, Jungwon Lee, Inyup Kang:

Simple transmission strategies for interference channel. - Gilad Lerman, Michael B. McCoy, Joel A. Tropp, Teng Zhang:

Robust computation of linear models, or How to find a needle in a haystack. - Nishant A. Mehta, Alexander G. Gray:

On the Sample Complexity of Predictive Sparse Coding. - (Withdrawn) Secret sharing with a class of minimal linear codes.

- Sundus Hassan, Muhammad Rafi, Mohammad Shahid Shaikh:

Comparing SVM and Naive Bayes classifiers for text categorization with Wikitology as knowledge enrichment. - Leah Epstein, Asaf Levin:

An efficient polynomial time approximation scheme for load balancing on uniformly related machines. - Gregory Kucherov, Yakov Nekrich, Tatiana Starikovskaya:

Cross-Document Pattern Matching. - György Dósa, Leah Epstein:

Generalized selfish bin packing. - Xi Liu, Osvaldo Simeone, Elza Erkip:

Energy-Efficient Sensing and Communication of Parallel Gaussian Sources. - Fatima-Zahra Belouadha, Hajar Omrana, Ounsa Roudiès:

Web Services-Enhanced Agile Modeling and Integrating Business Processes. - Scott A. Hale:

Unsupervised Threshold for Automatic Extraction of Dolphin Dorsal Fin Outlines from Digital Photographs in DARWIN (Digital Analysis and Recognition of Whale Images on a Network). - Lei Song, Lijun Zhang, Jens Chr. Godskesen:

Late Weak Bisimulation for Markov Automata. - Nadeem Javaid, Ayesha Bibi, Zahoor Ali Khan, Umar Khan, Karim Djouani:

Evaluating Wireless Proactive Routing Protocols under Scalability and Traffic Constraints. - Loet Leydesdorff:

McCall's Area Transformation versus the Integrated Impact Indicator (I3). - Vahab S. Mirrokni, Nithum Thain, Adrian Vetta:

On the Implications of Lookahead Search in Game Playing. - Syed Hassan Ahmed, Safdar Hussain Bouk, Amjad Mehmood, Nadeem Javaid, Iwao Sasase:

Effect of Fast Moving Object on RSSI in WSN: An Experimental Approach. - Krishnendu Chatterjee, Martin Chmelik, Rupak Majumdar:

Equivalence of Games with Probabilistic Uncertainty and Partial-observation Games. - Adolfo Neto, Celso A. A. Kaestner, Marcelo Finger:

Towards an efficient prover for the C1 paraconsistent logic. - A. Karim Abu-Affash, Paz Carmi, Matthew J. Katz, Yohai Trabelsi:

Bottleneck Non-Crossing Matching in the Plane. - WenQi Huang, Liang Yu:

Serial Symmetrical Relocation Algorithm for the Equal Sphere Packing Problem. - Frank Gurski, Patrick Gwydion Poullie:

Interval Routing Schemes for Circular-Arc Graphs. - S. V. Kozyrev:

Classification by Ensembles of Neural Networks. - Krishnendu Chatterjee, Manas Joglekar, Nisarg Shah:

Average Case Analysis of the Classical Algorithm for Markov Decision Processes with Büchi Objectives. - M. Heidari Khoozani, Farokh Marvasti, E. Azghani, Mona Ghassemian:

On Finding Sub-optimum Signature Matrices for Overloaded CDMA Systems. - Charles L. Cartledge, Michael L. Nelson:

When Should I Make Preservation Copies of Myself? - Feng Lin, Robert C. Qiu, Zhen Hu, Shujie Hou, James P. Browning, Michael C. Wicks:

Generalized FMD Detection for Spectrum Sensing Under Low Signal-to-Noise Ratio. - Stanislav Kikot, Roman Kontchakov, Vladimir V. Podolskii, Michael Zakharyaschev:

Exponential Lower Bounds and Separation for Query Rewriting. - Meng Yang, Lei Zhang, Jian Yang, David Zhang:

Regularized Robust Coding for Face Recognition. - Daniel Shawcross Wilkerson:

Harmony Explained: Progress Towards A Scientific Theory of Music. - Johannes Reich, Bernd Finkbeiner:

Proceedings Second International Workshop on Interactions, Games and Protocols, IWIGP 2012, Tallinn, Estonia, 25th March 2012. EPTCS 78, 2012 [contents] - Chung-Chieh Fang:

Unified model of voltage/current mode control to predict subharmonic oscillation. - Qiyang Zhao:

A Simple Unsupervised Color Image Segmentation Method based on MRF-MAP. - Michalis Vafopoulos, Petros S. Stefaneas, Ioannis Anagnostopoulos, Kieron O'Hara:

A methodology for internal Web ethics. - J. K. Mandal:

A Frequency Domain Steganography using Z Transform (FDSZT). - Ali Raza, Benito R. Fernández:

Immuno-inspired robotic applications: a review. - Henning Thielemann:

Live-Musikprogrammierung in Haskell. - Amir M. Ben-Amram, Michael Vainer:

Bounded Termination of Monotonicity-Constraint Transition Systems. - Johannes Mittmann, Nitin Saxena, Peter Scheiblechner:

Algebraic Independence in Positive Characteristic -- A p-Adic Calculus. - Johanne Cohen, Christoph Dürr, Kim Thang Nguyen:

Smooth Inequalities and Equilibrium Inefficiency in Scheduling Games. - Paraskevas V. Lekeas:

Should I quit using my resource? Modeling Resource Usage through Game Theory. - Paraskevas V. Lekeas:

Coalitional Beliefs of Cournot Network Agents. - Yuval Emek, Magnús M. Halldórsson, Adi Rosén:

Space-Constrained Interval Selection. - Serge Gaspers, Stefan Szeider:

Strong Backdoors to Nested Satisfiability. - Jayshree Ghorpade, Jitendra Parande, Madhura Kulkarni, Amit Bawaskar:

GPGPU Processing in CUDA Architecture. - George B. Purdy:

The Secure Generation of RSA Moduli Using Poor RNG. - Jose Gaite, German Fernandez-Rico

:
Linear approach to the orbiting spacecraft thermal problem. - Salman Malik, Philippe Jacquet:

An Overview of Local Capacity in Wireless Networks. - Johannes Köbler, Sebastian Kuhnert, Oleg Verbitsky:

Solving the Canonical Representation and Star System Problems for Proper Circular-Arc Graphs in Log-Space. - Olivier Bournez, Daniel Silva Graça, Amaury Pouly:

On the complexity of solving initial value problems. - Petr A. Golovach, Daniël Paulusma, Erik Jan van Leeuwen:

Induced Disjoint Paths in Claw-Free Graphs. - Sarah Edge Mann, Michael Anderson, Marek Rychlik:

On the Reliability of RAID Systems: An Argument for More Check Drives. - Kagan Bakanoglu, Elza Erkip, Osvaldo Simeone, Shlomo Shamai:

Relay Channel with Orthogonal Components and Structured Interference Known at the Source. - Behzad Ahmadi, Osvaldo Simeone:

On Channels with Action-Dependent States. - Anit Kumar Sahu, Mrityunjoy Chakraborty:

Fast and Accurate Frequency Estimation Using Sliding DFT. - Michael J. Neely:

Wireless Peer-to-Peer Scheduling in Mobile Networks. - Jason Yosinski, Cooper Bills:

MAV Stabilization using Machine Learning and Onboard Sensors. - Sébastien Bubeck, Aleksandrs Slivkins:

The best of both worlds: stochastic and adversarial bandits. - Elad Hazan, Sham M. Kakade:

(weak) Calibration is Computationally Hard. - Yoann Dieudonné, Florence Levé, Franck Petit, Vincent Villain:

Deterministic Leader Election Among Disoriented Anonymous Sensors. - Vincent Canals, Antoni Morro, José Luis Rosselló:

Stochastic-Based Pattern Recognition Analysis. - Arvind Narayanan, Vincent Toubiana, Solon Barocas, Helen Nissenbaum, Dan Boneh:

A Critical Look at Decentralized Personal Data Architectures. - Noa Avigdor-Elgrabli, Yuval Rabani:

A Constant Factor Approximation Algorithm for Reordering Buffer Management. - Peter E. Bulychev, Alexandre David, Kim G. Larsen

, Axel Legay, Marius Mikucionis
:
Computing Nash Equilibrium in Wireless Ad Hoc Networks: A Simulation-Based Approach. 1-14 - Yoshifumi Manabe, Tatsuaki Okamoto:

A Cryptographic Moving-Knife Cake-Cutting Protocol. 15-23 - Johannes Reich:

Processes, Roles and Their Interactions. 24-38 - Simon Busard, Charles Pecheur:

Rich Counter-Examples for Temporal-Epistemic Logic Model Checking. 39-53 - A. Isabella, Emi Retna:

Study Paper on Test Case generation for GUI Based Testing. - K. Munivara Prasad, A. Rama Mohan Reddy, V. Jyothsna:

IP Traceback for Flooding attacks on Internet Threat Monitors (ITM) Using Honeypots. - Anirban Sarkar:

Conceptual Level Design of Semi-structured Database System: Graph-semantic Based Approach. - Chung-Chieh Fang:

Unified model of voltage/current mode control to predict saddle-node bifurcation. - Chung-Chieh Fang:

Bifurcation Boundary Conditions for Switching DC-DC Converters Under Constant On-Time Control. - Pedro Quaresma

, Ralph-Johan Back:
Proceedings First Workshop on CTP Components for Educational Software, THedu'11, Wroclaw, Poland, 31th July 2011. EPTCS 79, 2011 [contents] - Chung-Chieh Fang:

Sampled-Data and Harmonic Balance Analyses of Average Current-Mode Controlled Buck Converter. - Francois Bentosela, Horia D. Cornean, Nicola Marchetti:

MIMO capacity for deterministic channel models: sublinear growth. - Seth Gilbert, Maxwell Young:

Making Evildoers Pay: Resource-Competitive Broadcast in Sensor Networks. - Tomasz Sobieszek:

Noncontinous additive entropies of partitions. - Adam Paszkiewicz, Tomasz Sobieszek:

Additive Entropies of Partitions. - John Wright, Arvind Ganesh, Kerui Min, Yi Ma:

Compressive Principal Component Pursuit. - (Withdrawn) The Černy conjecture.

- Kumar Nikhil, Swati Agarwal, Pankaj Sharma:

Securing a mobile adhoc network from routing attacks through the application of genetic algorithm. - Tiziana Calamoneri, Dario Frascaria, Blerina Sinaimeri:

All graphs with at most seven vertices are Pairwise Compatibility Graphs. - Edwin A. Henneken:

Publication Trends in Astronomy: The Lone Author. - Yang Yang, Jian Tan, Ness B. Shroff, Hesham El Gamal:

Delay Asymptotics with Retransmissions and Incremental Redundancy Codes over Erasure Channels. - Mohammad Reza Sohizadeh Abyaneh:

On the Privacy of Two Tag Ownership Transfer Protocols for RFIDs. - Zhongfeng Wang:

Super-FEC Codes for 40/100 Gbps Networking. - George B. Mertzios, Paul G. Spirakis:

Algorithms and Almost Tight Results for 3-Colorability of Small Diameter Graphs. - S. Venkata Krishnan, R. Sriram, N. Senthil Kumar:

Adaptive and Dynamic Wireless Routers with Smart Antenna for Power Management. - Barbara Petit:

A Categorical Model for the Lambda Calculus with Constructors. - Yun Wei, Chuanyi Ji, Floyd Galvan, Stephen Couvillon, George Orellana, James Momoh:

Non-Stationary Random Process for Large-Scale Failure and Recovery of Power Distributions. - Ahmed Hesham Mehana, Aria Nosratinia:

Diversity of MIMO Linear Precoding. - Katrina Ligett, Aaron Roth:

Take it or Leave it: Running a Survey when Privacy Comes at a Cost. - Wonsang You, M. S. Houari Sabirin, Munchurl Kim:

Real-time detection and tracking of multiple objects with partial decoding in H.264/AVC bitstream domain. - Kousha Etessami, Alistair Stewart, Mihalis Yannakakis:

Polynomial Time Algorithms for Branching Markov Decision Processes and Probabilistic Min(Max) Polynomial Bellman Equations. - Joseph J. Pfeiffer III, Timothy La Fond, Sebastián Moreno, Jennifer Neville:

Fast Generation of Large Scale Social Networks with Clustering. - Surjeet Kumar Yadav, Brijesh Bharadwaj, Saurabh Pal

:
Data Mining Applications: A comparative Study for Predicting Student's performance. - Sanober Shaikh, Madhuri Rao:

Association Rule Mining Based On Trade List. - Chan-Su Shin:

A Note on Minimum-Cost Coverage by Aligned Disks. - Daniel Borchmann:

A General Form of Attribute Exploration. - Serge Autexier, Dominik Dietrich, Marvin R. G. Schiller:

Towards an Intelligent Tutor for Mathematical Proofs. 1-28 - Ralph-Johan Back, Johannes Eriksson:

An Exercise in Invariant-based Programming with Interactive and Automatic Theorem Prover Support. 29-48 - Francisco Botana

, Miguel A. Abánades:
Automatic Deduction in Dynamic Geometry using Sage. 49-62 - Filip Maric, Ivan Petrovic, Danijela Petrovic, Predrag Janicic

:
Formalization and Implementation of Algebraic Methods in Geometry. 63-81 - Walther Neuper:

Automated Generation of User Guidance by Combining Computation and Deduction. 82-101 - Vanda Santos, Pedro Quaresma

:
Integrating DGSs and GATPs in an Adaptative and Collaborative Blended-Learning Web-Environment. 111-123 - Wolfgang Schreiner:

Computer-Assisted Program Reasoning Based on a Relational Semantics of Programs. 124-142 - Makarius Wenzel, Burkhart Wolff:

Isabelle/PIDE as Platform for Educational Tools. 143-153 - Usha Badhera, G. N. Purohit, S. Taruna:

Fault Based Techniques for Testing Boolean Expressions: A Survey. - Jordi Saludes, Sebastian Xambó:

The GF Mathematics Library. 102-110 - Yong Zeng, Erry Gunawan, Yong Liang Guan:

Improved Linear Precoding over Block Diagonalization in Multi-cell Cooperative Networks. - Carlo Alberto Boano, Kay Römer, Marco Antonio Zúñiga Zamalloa, Thiemo Voigt:

Jam-X: Wireless Agreement under Interference. - S. Rakesh, Ajitkumar A. Kaller, B. C. Shadakshari, B. Annappa:

Multilevel Image Encryption. - Massimo Gallo, Bruno Kauffmann, Luca Muscariello, Alain Simonian, Christian Tanguy:

Performance Evaluation of the Random Replacement Policy for Networks of Caches. - Tomoyuki Yamakami, Yuichi Kato:

The Dissecting Power of Regular Languages. - Andrea Asperti

, Wilmer Ricciotti, Claudio Sacerdoti Coen, Enrico Tassi:
A Bi-Directional Refinement Algorithm for the Calculus of (Co)Inductive Constructions. - Justin Hsu, Sanjeev Khanna, Aaron Roth:

Distributed Private Heavy Hitters. - Jean-Vivien Millo, Robert de Simone:

Periodic scheduling of marked graphs using balanced binary words. - G. Shankar:

Innovative SQA Service Maturity Model using CMMI and ITIL. - Bheshaj Kumar, Kavita Thakur, G. R. Sinha:

A new hybrid jpeg image compression scheme using symbol reduction technique. - Sarah Miracle, Dana Randall, Amanda Pascoe Streib, Prasad Tetali:

Algorithms for Sampling 3-Orientations of Planar Triangulations. - Vahid Aref, Nicolas Macris, Rüdiger L. Urbanke, Marc Vuffray:

Lossy Source Coding via Spatially Coupled LDGM Ensembles. - Owen Kaser, Daniel Lemire:

Strongly universal string hashing is fast. - Raghu Meka:

A PTAS for Computing the Supremum of Gaussian Processes. - Arpita Ghosh, R. Preston McAfee:

Crowdsourcing with Endogenous Entry. - Jens M. Schmidt

:
A Planarity Test via Construction Sequences. - Jennifer E. Padilla, Matthew J. Patitz, Raul Pena, Robert T. Schweller, Nadrian C. Seeman, Robert Sheline, Scott M. Summers, Xingsi Zhong:

Asynchronous Signal Passing for Tile Self-Assembly: Fuel Efficient Computation and Efficient Assembly of Shapes. - Changho Suh, I-Hsiang Wang, David Tse:

Two-way Interference Channels. - Lasse Kliemann:

The Price of Anarchy for Network Formation in an Adversary Model. - Isaac Fung, Konstantinos Georgiou, Jochen Könemann, Malcolm Sharpe:

Efficient Algorithms for Solving Hypergraphic Steiner Tree Relaxations in Quasi-Bipartite Instances. - David Eppstein:

Solving Single-digit Sudoku Subproblems. - Soumen Kanrar

:
Analysis and implementation of the Large Scale Video-on-Demand System. - (Withdrawn) ISAR Image Formation Using Sequential Minimization of L0 and L2 Norms.

- Nicolas Bonichon, Cyril Gavoille, Nicolas Hanusse, Ljubomir Perkovic:

The Stretch Factor of L1- and L∞-Delaunay Triangulations. - Emil Stefanov, Elaine Shi:

Path O-RAM: An Extremely Simple Oblivious RAM Protocol. - Jean-Marc Fedou, Gabriele Fici:

Vertical representation of C{\infty}-words. - Romeo Rizzi, Florian Sikora:

Some results on more flexible versions of Graph Motif. - (Withdrawn) Sphere Decoding for Spatial Modulation Systems with Arbitrary Nt.

- Uttam Kr. Mondal, J. K. Mandal:

Fabrication of Message Digest to Authenticate Audio Signals with Alternation of Coefficients of Harmonics in Multi-Stages (MDAC). - Sheng Cai, Jihang Ye, Minghua Chen, Jianxin Yan, Sidharth Jaggi:

Secure Compressed Reading in Smart Grids. - Derek O'Callaghan, Martin Harrigan, Joe Carthy, Pádraig Cunningham:

Identifying Discriminating Network Motifs in YouTube Spam. - C. Seshadhri, Ali Pinar, Tamara G. Kolda:

Fast Triangle Counting through Wedge Sampling. - Tatiana Starikovskaya:

Computing Lempel-Ziv Factorization Online. - Oren Salzman, Michael Hemmer, Dan Halperin:

On the Power of Manifold Samples in Exploring Configuration Spaces and the Dimensionality of Narrow Passages. - Anindya De, Elchanan Mossel:

Explicit Optimal Hardness via Gaussian stability results. - Farrokh Etezadi, Ashish Khisti, Mitchell D. Trott:

Sequential Coding of Markov Sources over Burst Erasure Channels. - Vladimir Savic, Henk Wymeersch, Santiago Zazo:

Belief Consensus Algorithms for Distributed Target Tracking in Wireless Sensor Networks. - Mohammad Iftekhar Husain,



Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID