


default search action
CoRR, March 2012
- Babak Bagheri Hariri, Diego Calvanese, Giuseppe De Giacomo, Alin Deutsch, Marco Montali:
Verification of Relational Data-Centric Dynamic Systems with External Services. - Chithrupa Ramesh, Henrik Sandberg, Karl Henrik Johansson:
Design of State-based Schedulers for a Network of Control Loops. - Junshan Li:
Connectivity in one-dimensional ad hoc networks with an access point. - Georgios Piliouras, Tomás Valla, László A. Végh:
LP-based Covering Games with Low Price of Anarchy. - Felix Halim, Stratos Idreos, Panagiotis Karras, Roland H. C. Yap:
Stochastic Database Cracking: Towards Robust Adaptive Indexing in Main-Memory Column-Stores. - Georgios Giannikis, Gustavo Alonso, Donald Kossmann:
SharedDB: Killing One Thousand Queries With One Stone. - Joachim Selke, Christoph Lofi, Wolf-Tilo Balke:
Pushing the Boundaries of Crowd-enabled Databases with Query-driven Schema Expansion. - Bo Zhao, Benjamin I. P. Rubinstein, Jim Gemmell, Jiawei Han:
A Bayesian Approach to Discovering Truth from Conflicting Sources for Data Integration. - Prasang Upadhyaya, Magdalena Balazinska, Dan Suciu:
How to Price Shared Optimizations in the Cloud. - Albert Angel, Nick Koudas, Nikos Sarkas, Divesh Srivastava:
Dense Subgraph Maintenance under Streaming Edge Weight Updates for Real-time Story Identification. - Iman Elghandour, Ashraf Aboulnaga:
ReStore: Reusing Results of MapReduce Jobs. - Luis Quesada:
Using Barriers to Reduce the Sensitivity to Edge Miscalculations of Casting-Based Object Projection Feature Estimation. - Vince Bárány, Balder ten Cate, Martin Otto:
Queries with Guarded Negation (full version). - Rina Panigrahy, Li Zhang:
The Mind Grows Circuits. - Pradip Sircar:
Joint Estimation of Angle and Delay of Radio Wave Arrival under Multiplicative Noise Environment. - Egor Ianovski:
Cake Cutting Mechanisms. - Giorgi Japaridze:
On the system CL12 of computability logic. - Tianrong Lin:
On equivalence of multi-letter and multi-letter measure-many quantum finite automata. - Gunnar Wilken
, Andreas Weiermann
:
Derivation Lengths Classification of Gödel's T Extending Howard's Assignment. - Mita Pal, Soubhik Chakraborty, N. C. Mahanti:
How does the Shift-insertion sort behave when the sorting elements follow a Normal distribution? - Pankaj Dayama, Aditya Karnik, Y. Narahari:
Optimal Mix of Incentive Strategies for Product Marketing on Social Networks. - (Withdrawn) The Horse Raced Past: Gardenpath Processing in Dynamical Systems.
- Yingyi Bu, Vinayak R. Borkar, Michael J. Carey, Joshua Rosen, Neoklis Polyzotis, Tyson Condie, Markus Weimer, Raghu Ramakrishnan:
Scaling Datalog for Machine Learning on Big Data. - G. S. Raghavendra, N. Prasanna Kumar:
Statistical Approach for Selecting Elite Ants. - S. Nirmala Sugirtha Rajini, T. Bhuvaneswari:
An Interface using SOA Framework For Mediclaim Provider. - Gabriel Dulac-Arnold, Ludovic Denoyer, Philippe Preux, Patrick Gallinari:
Fast Reinforcement Learning with Large Action Sets using Error-Correcting Output Codes for MDP Factorization. - Dov M. Gabbay:
The Equational Approach to CF2 Semantics. - Michael Dinitz, Guy Kortsarz, Ran Raz:
Label Cover instances with large girth and the hardness of approximating basic k-spanner. - Tapalina Bhattasali, Rituparna Chaki, Sugata Sanyal:
Sleep Deprivation Attack Detection in Wireless Sensor Network. - Tapalina Bhattasali, Rituparna Chaki:
A Survey of Recent Intrusion Detection Systems for Wireless Sensor Network. - Boris Alexeev, M. Brian Jacokes:
A rearrangement step with potential uses in priority queues. - S. Chitra, J. B. Bhattacharjee, B. Thilakavathi:
Image Fusion and Re-Modified SPIHT for Fused Image. - Varsha Dani, Valerie King, Mahnush Movahedi, Jared Saia:
Breaking the O(nm) Bit Barrier: Secure Multiparty Computation with a Static Adversary. - Krishna V. Kaipa, Harish K. Pillai:
Weight spectrum of codes associated with the Grassmannian G(3,7). - S. Aruna, S. P. Rajagopalan, L. V. Nandakishore:
Application of Gist SVM in Cancer Detection. - Niels Drost, Jason Maassen, Maarten A. J. van Meersbergen, Henri E. Bal, F. Inti Pelupessy, Simon Portegies Zwart, Michael Kliphuis, Henk A. Dijkstra, Frank J. Seinstra:
High-Performance Distributed Multi-Model / Multi-Kernel Simulations: A Case-Study in Jungle Computing. - Frederico Araújo Durão, Peter Dolog:
A Personalized Tag-Based Recommendation in Social Web Systems. - Alfredo Esposito:
Debunking some myths about biometric authentication. - Aaron Roth, Grant Schoenebeck:
Conducting Truthful Surveys, Cheaply. - Abhijit Chowdhury, Angshu Kumar Sinha, Saurabh Dutta:
Introduction of a Triple Prime Symmetric Key Block Cipher. - Valérie Monfort, Sihem Cherif:
Bridging the Gap between Technical Heterogeneity of Context-Aware Platforms: Experimenting a Service Based Connectivity between Adaptable Android, WComp and OpenORB. - Edith Hemaspaandra, Lane A. Hemaspaandra, Jörg Rothe:
Online Voter Control in Sequential Elections. - Jan Olaf Blech:
On Compositional Reasoning for Guaranteeing Probabilistic Properties. - Theo Dimitrakos, David Brossard, Pierre de Leusse:
Securing business operations in an SOA. - Pierre de Leusse, Krzysztof Zielinski:
Toward Governance of Cross-Cloud Application Deployment. - Katuru S. M. Kalyana Chakravarthy:
"openness of search engine": A critical flaw in search systems; a case study on google, yahoo and bing. - Pierre de Leusse, Bartosz Kwolek, Krzysztof Zielinski:
A common interface for multi-rule-engine distributed systems. - Rob Arthan, Paulo Oliva:
(Dual) Hoops Have Unique Halving. - Pierre de Leusse, Panos Periorellis, Theo Dimitrakos, Srijith K. Nair:
Self Managed Security Cell, a security model for the Internet of Things and Services. - Pierre de Leusse, Theo Dimitrakos:
SOA-based security governance middleware. - Liyong Shen, Jin-San Cheng, Xiaohong Jia:
Homeomorphic approximation of the intersection curve of two rational surfaces. - Pierre de Leusse, Panos Periorellis, Paul Watson, Andreas Maierhofer:
Secure & Rapid Composition of Infrastructure Services in the Cloud. - Alan J. Cain, Victor Maltcev:
Finitely presented monoids with linear Dehn function need not have regular cross-sections. - Sophie Morier-Genoud, Valentin Ovsienko:
Orthogonal Designs and a Cubic Binary Function. - Liyong Shen, Chun-Ming Yuan, Xiao-Shan Gao:
Certified Approximation of Parametric Space Curves with Cubic B-spline Curves. - Shu Kong, Donghui Wang:
Multi-Level Feature Descriptor for Robust Texture Classification via Locality-Constrained Collaborative Strategy. - (Withdrawn) Inconsistency of the Zermelo-Fraenkel set theory with the axiom of choice and its effects on the computational complexity.
- Amelia Carolina Sparavigna, Roberto Marazzato:
Georeferenced lives. - Haidara Abdalla, Dmitry Ageyev:
Application of Multi-layer Graphs In the Design of MPLS Networks. - Martin Bachwerk, Carl Vogel:
Modelling Social Structures and Hierarchies in Language Evolution. - Dmitry Ageyev, Haidara Abdalla:
Multiservice Telecommunication Systems Parametrical Synthesis by using of Multilayer Graph Mathematical Model. - Martin Bachwerk, Carl Vogel:
Establishing linguistic conventions in task-oriented primeval dialogue. - Dmitry Ageyev, Artem Ignatenko:
Describing and Modeling of Video-on-Demand Service with the Usage of Multi-Layer Graph. - Julián Urbano, Diego Martín, Mónica Marrero, Jorge Morato:
Overview of EIREX 2011: Crowdsourcing. - Ludo Waltman, Nees Jan van Eck:
A new methodology for constructing a publication-level classification system of science. - Emilio Ferrara, Pasquale De Meo, Giacomo Fiumara, Alessandro Provetti:
The role of strong and weak ties in Facebook: a community structure perspective. - Olga Goussevskaia, Magnús M. Halldórsson, Roger Wattenhofer:
Algorithms for Wireless Capacity. - Mrinal Nandi, Amiya Nayak, Bimal K. Roy, Santanu Sarkar:
Hypothesis Testing and Decision Theoretic Approach for Fault Detection in Wireless Sensor Networks. - (Withdrawn) Efficient Approximation Algorithms for Optimal Large-scale Network Monitoring.
- Corinna Cortes, Mehryar Mohri, Afshin Rostamizadeh:
Algorithms for Learning Kernels Based on Centered Alignment. - Alex Brik, Jeffrey B. Remmel:
Expressing Preferences using Preference Set Constraint Atoms. - Vitaly Feldman:
Learning DNF Expressions from Fourier Spectrum. - Yonghui Xiao, Li Xiong:
Online query answering with differential privacy: a utility-driven approach using Bayesian inference. - Dmitry V. Chistikov:
Checking Tests for Read-Once Functions over Arbitrary Bases. - Qasim Siddique:
Kerberos Authentication in Wireless Sensor Networks. - Mark Sh. Levin
:
Towards Electronic Shopping of Composite Product. - Nikzad Babaii Rizvandi, Albert Y. Zomaya, Ali Javadzadeh Boloori, Javid Taheri:
On Modeling Dependency between MapReduce Configuration Parameters and Total Execution Time. - Vicenç Gómez, Hilbert J. Kappen, Nelly Litvak, Andreas Kaltenbrunner:
A likelihood-based framework for the analysis of discussion threads. - Yuri I. Manin, Matilde Marcolli:
Kolmogorov complexity and the asymptotic bound for error-correcting codes. - Ahmed Maalel, Habib Hadj Mabrouk
:
Contribution of Case Based Reasoning (CBR) in the Exploitation of Return of Experience. Application to Accident Scenarii in Railroad Transport. - Osama Attia, Tamer A. ElBatt:
On the Role of Vehicular Mobility in Cooperative Content Caching. - Vladimir Hahanov, Wajeb Gharibi, Eugenia Litvinova, Svetlana Chumachenko:
Verification and Diagnosis Infrastructure of SoC HDL-model. - Chun-Ying Chiang, Liang-Hao Huang, Hong-Gwa Yeh:
Target set selection problem for honeycomb networks. - Beniamino Accattoli, Delia Kesner:
Preservation of Strong Normalisation modulo permutations for the structural lambda-calculus. - Mohammed Fadle Abdulla:
Manual and Fast C Code Optimization. - Animashree Anandkumar, Daniel J. Hsu, Sham M. Kakade:
A Method of Moments for Mixture Models and Hidden Markov Models. - Jacques M. Bahi, Nicolas Friot, Christophe Guyeux:
Lyapunov exponent evaluation of a digital watermarking scheme proven to be secure. - Matthew S. Nokleby, Behnaam Aazhang:
Cooperative Compute-and-Forward. - Joseph Y. Halpern, Willemien Kets:
Ambiguous Language and Differences in Beliefs. - Abdessamad Mouzoune:
Towards an intelligence based conceptual framework for e-maintenance. - Adel Alahmadi, Robert E. L. Aldred, Romar dela Cruz, Patrick Solé, Carsten Thomassen:
The maximum number of minimal codewords in an $[n,k]-$code. - Mohammad Hossein Yassaee, Mohammad Reza Aref, Amin Gohari:
Achievability proof via output statistics of random binning. - Farzin Haddadpour, Mohammad Hossein Yassaee, Amin Gohari, Mohammad Reza Aref:
Coordination via a relay. - Jaydip Sen:
Secure and Energy-Efficient Data Aggregation in Wireless Sensor Networks. - Bo Li, Yijian Pei, Bin Shen, Hao Wu, Min He, Jundong Yang:
Resource Availability-Aware Advance Reservation for Parallel Jobs with Deadlines. - Shu Kong, Donghui Wang:
A Report on Multilinear PCA Plus Multilinear LDA to Deal with Tensorial Data: Visual Classification as An Example. - Marco Quartulli, Igor G. Olaizola:
A review of EO Mining. - Giuseppe Castagna
, Mariangiola Dezani-Ciancaglini
, Luca Padovani
:
On Global Types and Multi-Party Session. - Takayuki Katsuki, Masato Inoue:
Posterior Mean Super-Resolution with a Compound Gaussian Markov Random Field Prior. - Michael W. Mahoney:
Approximate Computation and Implicit Regularization for Very Large-scale Data Analysis. - Ahmed M. Mahran:
A handy systematic method for data hazards detection in an instruction set of a pipelined microprocessor. - Daniel Lokshtanov, N. S. Narayanaswamy, Venkatesh Raman, M. S. Ramanujan, Saket Saurabh:
Faster Parameterized Algorithms using Linear Programming. - Ronald de Haan:
Functional Logic Programming with Generalized Circular Coinduction. - Farzad Didehvar, Mohsen Mansouri, Zahra Taheri:
How much could we cover a set by c.e sets? - Shu Kong, Donghui Wang:
Online Discriminative Dictionary Learning for Image Classification Based on Block-Coordinate Descent Method. - Subhadip Basu, Nibaran Das, Ram Sarkar, Mahantapas Kundu, Mita Nasipuri, Dipak Kumar Basu:
An MLP based Approach for Recognition of Handwritten 'Bangla' Numerals. - Subhadip Basu, Nibaran Das, Ram Sarkar, Mahantapas Kundu, Mita Nasipuri, Dipak Kumar Basu:
Handwritten Bangla Alphabet Recognition using an MLP Based Classifier. - Hatem Ltaief
, Rio Yokota
:
Data-Driven Execution of Fast Multipole Methods. - José Ignacio Ronda, Antonio Valdés, Guillermo Gallego:
Autocalibration with the Minimum Number of Cameras with Known Pixel Shape. - Ionica Soare, Carmen Antohe:
Modeling the geographical studies with GeoGebra-software. - Luca Bortolussi, Jane Hillston:
Fluid Model Checking. - Georg Böcherer, Fabian Altenbach, Alex Alvarado, Steven Corroy, Rudolf Mathar:
An Efficient Algorithm to Calculate BICM Capacity. - Puripong Suthisopapan, Kenta Kasai, Anupap Meesomboon, Virasit Imtawil:
Near Capacity Approaching for Large MIMO Systems by Non-Binary LDPC Codes with MMSE Detection. - Fernando Brito e Abreu:
The cloud paradigm: Are you tuned for the lyrics? - Yuyang Wang, Roni Khardon, Pavlos Protopapas:
Infinite Shift-invariant Grouped Multi-task Learning for Gaussian Processes. - Ehsan Elhamifar, René Vidal:
Sparse Subspace Clustering: Algorithm, Theory, and Applications. - Loet Leydesdorff, Daniele Rotolo, Ismael Ràfols:
Bibliometric Perspectives on Medical Innovation using the Medical Subject Headings (MeSH) of PubMed. - Stéphane Ross, J. Andrew Bagnell:
Agnostic System Identification for Model-Based Reinforcement Learning. - Dimitrios I. Diochnos, Ioannis Z. Emiris, Elias P. Tsigaridas:
On the asymptotic and practical complexity of solving bivariate systems over the reals. - Ahmed Maalel, Habib Hadj Mabrouk
, Lassaâd Mejri, Henda Hajjami Ben Ghézala:
Development of an Ontology to Assist the Modeling of Accident Scenarii "Application on Railroad Transport". - David R. Stoutemyer:
Can the Eureqa symbolic regression program, computer algebra and numerical analysis help each other? - Sandeep Gupta, Chinya V. Ravishankar:
Lower bounds for Arrangement-based Range-Free Localization in Sensor Networks. - Alessandro Borri, Giordano Pola, Maria Domenica Di Benedetto:
A Symbolic Approach to the Design of Nonlinear Networked Control Systems. - Shiteng Chen, Elad Verbin, Wei Yu:
Data Structure Lower Bounds on Random Access to Grammar-Compressed Strings. - Tom Schrijvers, Guido Tack, Pieter Wuille, Horst Samulowitz, Peter J. Stuckey:
Search Combinators. - Abhijeet Bhorkar, Mohammad Naghshvar, Tara Javidi:
Opportunistic Routing with Congestion Diversity in Wireless Ad-hoc Networks. - Dan Ladley, Ian Wilkinson, Louise Young:
The Evolution of Cooperation in Business. - Ashwin Guha, Ambedkar Dukkipati:
An Algorithmic Characterization of Polynomial Functions over Z_{p^n}. - Tomoyuki Yuasa, Susumu Shirayama:
A New Analysis Method for Simulations Using Node Categorizations. - Rahul Jain, Yaoyun Shi, Zhaohui Wei, Shengyu Zhang:
Correlation/Communication complexity of generating bipartite states. - Jaydip Sen:
Secure and Privacy-Preserving Data Aggregation Protocols for Wireless Sensor Networks. - Tichakorn Wongpiromsarn, Emilio Frazzoli:
Control of Probabilistic Systems under Dynamic, Partially Known Environments with Temporal Logic Specifications. - Tichakorn Wongpiromsarn, Alphan Ulusoy, Calin Belta, Emilio Frazzoli, Daniela Rus:
Incremental Temporal Logic Synthesis of Control Policies for Robots Interacting with Dynamic Agents. - Abhik Banerjee, Rachit Agarwal, Vincent Gauthier, Chai Kiat Yeo, Hossam Afifi, Bu-Sung Lee:
A Self-Organization Framework for Wireless Ad Hoc Networks as Small Worlds. - Michelangelo Bucci, Alessandro De Luca, Gabriele Fici:
Enumeration and Structure of Trapezoidal Words. - Luciano Panek, Marcelo Firer:
Codes Satisfying the Chain Condition with a Poset Weights.