Stop the war!
Остановите войну!
for scientists:
default search action
CoRR, April 2012
- Angel E. Lozano, Robert W. Heath Jr., Jeffrey G. Andrews:
Fundamental Limits of Cooperation. - Alexandros Manolakos, Yair Noam, Andrea J. Goldsmith:
Blind Null-space Tracking for MIMO Underlay Cognitive Radio Networks. - Giuliano Giacaglia, Xiaomeng Shi, Minji Kim, Daniel Enrique Lucani, Muriel Médard:
Systematic Network Coding with the Aid of a Full-Duplex Relay. - Ali Jalali, Javad Azimi, Xiaoli Z. Fern:
Exploration vs Exploitation in Bayesian Optimization. - Kwankyu Lee:
Unique Decoding of Plane AG Codes Revisited. - Jacques Carette, Russell O'Connor:
Theory Presentation Combinators. - Heru Susanto, Mohammad Nabil Almunawar, Yong Chee Tuan, Mehmet Sabih Aksoy:
I-SolFramework: An Integrated Solution Framework Six Layers Assessment on Multimedia Information Security Architecture Policy Compliance. - Christos Boutsidis, Alex Gittens:
Improved matrix algorithms via the Subsampled Randomized Hadamard Transform. - Ian Lim:
MIMO Z Channel Interference Management. - Shuqing Zeng:
Estimating Rigid Transformation Between Two Range Maps Using Expectation Maximization Algorithm. - Guangming Lang, Qingguo Li, Lankun Guo:
A new fuzzy rough sets based on fuzzy coverings. - Marek Smieja, Jacek Tabor:
Weighted Approach to Rényi Entropy. - Blaise Genest, Hugo Gimbert, Anca Muscholl, Igor Walukiewicz:
Asynchronous Games over Tree Architectures. - Marek Smieja, Jacek Tabor:
Partition Reduction for Lossy Data Compression Problem. - Thava Iyer, Robert Hsieh, Nikzad Babaii Rizvandi, Benoy Varghese, Roksana Boreli:
Mobile P2P Trusted On-Demand Video Streaming. - Jack Poulson, Björn Engquist, Sergey Fomel, Siwei Li, Lexing Ying:
A parallel sweeping preconditioner for high frequency heterogeneous 3D Helmholtz equations. - Chunyan Wang, Mao Ye, Bernardo A. Huberman:
From User Comments to On-line Conversations. - Ahmed Rezine:
Ordered Counter-Abstraction. - Uwe D. Hanebeck, Jannik Steinbring:
Progressive Gaussian Filtering. - Elad Hazan, Satyen Kale, Shai Shalev-Shwartz:
Near-Optimal Algorithms for Online Matrix Prediction. - Mario Jarmasz:
Roget's Thesaurus as a Lexical Resource for Natural Language Processing. - Adityanand Guntuboyina, Bodhisattva Sen:
Covering Numbers for Convex Functions. - Yahya S. Khiabani, Shuangqing Wei, Jian Yuan, Jian Wang:
Enhancement of Secrecy of Block Ciphered Systems by Deliberate Noise. - Srijith Ravikumar, Raju Balakrishnan, Subbarao Kambhampati:
Ranking Tweets Considering Trust and Relevance. - Zhigang Cao, Mingmin Yang, Xinglong Qu, Xiaoguang Yang:
Rebels Lead to the Doctrine of the Mean: Opinion Dynamic in a Heterogeneous DeGroot Model. - Zhigang Cao, Haoyu Gao, Xinglong Qu, Mingmin Yang, Xiaoguang Yang:
Coordination and Emergence in the Cellular Automated Fashion Game. - Deepjyoti Deka, Sriram Vishwanath:
Network Models for Power Grids: A Generative Approach. - Tsung-Hui Chang, Wing-Kin Ma, Chong-Yung Chi:
Worst-Case Robust Multiuser Transmit Beamforming Using Semidefinite Relaxation: Duality and Implications. - Jia Zeng, Zhi-Qiang Liu, Xiao-Qin Cao:
A New Approach to Speeding Up Topic Modeling. - Mete Ozay, Fatos T. Yarman-Vural:
A New Fuzzy Stacked Generalization Technique for Deep learning and Analysis of its Performance. - Hamid G. Bafghi, Babak Seyfe, Mahtab Mirmohseni, Mohammad Reza Aref:
On The Achievable Rate Region of a New Wiretap Channel With Side Information. - M. Rizwan Jameel Qureshi, Mehboob Sharif, Nayyar Iqbal:
Using Fuzzy Logic to Evaluate Normalization Completeness for An Improved Database Design. - Youssef Bassil:
Service-Oriented Architecture for Weaponry and Battle Command and Control Systems in Warfighting. - Youssef Bassil:
Expert PC Troubleshooter With Fuzzy-Logic And Self-Learning Support. - Youssef Bassil:
Hybrid Information Retrieval Model For Web Images. - Youssef Bassil:
Neural Network Model for Path-Planning of Robotic Rover Systems. - Youssef Bassil:
Parallel Spell-Checking Algorithm Based on Yahoo! N-Grams Dataset. - Youssef Bassil:
Service-Oriented Architecture for Space Exploration Robotic Rover Systems. - Youssef Bassil, Paul Semaan:
Semantic-Sensitive Web Information Retrieval Model for HTML Documents. - Youssef Bassil, Mohammad Alwani:
OCR Context-Sensitive Error Correction Based on Google Web 1T 5-Gram Data Set. - Youssef Bassil, Mohammad Alwani:
OCR Post-Processing Error Correction Algorithm using Google Online Spelling Suggestion. - Youssef Bassil:
Communication Language Specifications For Digital Ecosystems. - Youssef Bassil:
Management Language Specifications For Digital Ecosystems. - Youssef Bassil:
Windows And Linux Operating Systems From A Security Perspective. - Ying Cui, Vincent K. N. Lau, Yueping Wu:
Delay-aware BS Discontinuous Transmission Control and User Scheduling for Energy Harvesting Downlink Coordinated MIMO Systems. - Iftah Gamzu, Moti Medina:
Improved Approximation for Orienting Mixed Graphs. - Youssef Bassil, Aziz Barbar:
Sequential & Parallel Algorithms for Big-Integer Numbers Subtraction. - Youssef Bassil, Aziz Barbar:
MyProLang - My Programming Language: A Template-Driven Automatic Natural Programming Language. - Heru Susanto, Mohammad Nabil Almunawar, Mehmet Sabih Aksoy, Yong Chee Tuan:
A Simulation Approach Paradigm: An Optimization and Inventory Challenge Case Study. - Youssef Bassil, Aziz Barbar:
Sequential and Parallel Algorithms for the Addition of Big-Integer Numbers. - Heru Susanto, Mohammad Nabil Almunawar, Yong Chee Tuan, Mehmet Sabih Aksoy, Wahyudin P. Syam:
Integrated Solution Modeling Software: A New Paradigm on Information Security Review. - Mario Jarmasz, Stan Szpakowicz:
Roget's Thesaurus and Semantic Similarity. - Mario Jarmasz, Caroline Barrière:
Keyphrase Extraction : Enhancing Lists. - Mario Jarmasz, Stan Szpakowicz:
Not As Easy As It Seems: Automating the Construction of Lexical Chains Using Roget's Thesaurus. - Mario Jarmasz, Stan Szpakowicz:
Roget's Thesaurus: a Lexical Resource to Treasure. - Greg Fish:
Managing contextual artificial neural networks with a service-based mediator. - Jaydeep P. Bardhan, Matthew G. Knepley:
Computational science and re-discovery: open-source implementations of ellipsoidal harmonics for problems in potential theory. - Mark P. Woodward, Robert J. Wood:
Learning from Humans as an I-POMDP. - Mark P. Woodward, Robert J. Wood:
Framing Human-Robot Task Communication as a POMDP. - Przemyslaw Spurek, Jacek Tabor:
The memory centre. - K. S. Kuppusamy, Gnanasekaran Aghila:
A Model for Personalized Keyword Extraction from Web Pages using Segmentation. - Yue Zhao, Francis Chung-Ming Lau:
Implementation Of Decoders for LDPC Block Codes and LDPC Convolutional Codes Based on GPUs. - Chung-Chieh Fang:
Comments on "Prediction of Subharmonic Oscillation in Switching Converters Under Different Control Strategies". - Herman Geuvers, Robbert Krebbers, James McKinna:
The lambda-mu-T-calculus. - Wuqiong Luo, Wee-Peng Tay, Mei Leng:
Identifying Infection Sources and Regions in Large Networks. - Stefan Bauer, Lutz-Peter Nolte, Mauricio Reyes:
Skull-stripping for Tumor-bearing Brain Images. - Majlesi Shahrbanoo, Mehrpour Ali, Mehran Mohsenzadeh:
An Approach for Agile SOA Development using Agile Principals. - Mohamed Laaraiedh:
Implementation of Kalman Filter with Python Language. - Lisbeth Fajstrup, Eric Goubault, Emmanuel Haucourt, Samuel Mimram, Martin Raussen:
Trace Spaces: an Efficient New Technique for State-Space Reduction. - Konstantin Avrachenkov, Peter Jacko:
CCN Interest Forwarding Strategy as Multi-Armed Bandit Model with Delays. - Vasileios Lampos:
On voting intentions inference from Twitter content: a case study on UK 2010 General Election. - Bernhard C. Geiger, Gernot Kubin:
Relative Information Loss in the PCA. - (Withdrawn) On Dispersions of Discrete Memoryless Channels with Noncausal State Information at the Encoder.
- Philipp Winter, Stefan Lindskog:
How China Is Blocking Tor. - (Withdrawn) Data Gathering Scheme for Wireless SensorNetworks Using a Single Mobile Element.
- Zhenghao Zhang, Shuping Gong, Aleksandar D. Dimitrovski, Husheng Li:
Time Synchronization Attack in Smart Grid-Part I: Impact and Analysis. - Zhenghao Zhang, Matthew Trinkle, Aleksandar D. Dimitrovski, Husheng Li:
Time Synchronization Attack in Smart Grid-Part II: Cross Layer Detection Mechanism. - Nathalie Bertrand, John Fearnley, Sven Schewe:
Bounded Satisfiability for PCTL. - Tobias Buer, Jörg Homberger, Hermann Gehring:
A collaborative ant colony metaheuristic for distributed multi-level lot-sizing. - John D. Ramsdell:
Deducing Security Goals From Shape Analysis Sentences. - Yishay Mansour, S. Muthukrishnan, Noam Nisan:
Doubleclick Ad Exchange Auction. - José Miguel Díaz-Báñez, Ruy Fabila Monroy, Pablo Pérez-Lantero:
On the number of radial orderings of planar point sets. - Siddharth Barman, Xishuo Liu, Stark C. Draper, Benjamin Recht:
Decomposition Methods for Large Scale LP Decoding. - Badri Narayan Bhaskar, Gongguo Tang, Benjamin Recht:
Atomic norm denoising with applications to line spectral estimation. - Andrew Cotter, Shai Shalev-Shwartz, Nathan Srebro:
The Kernelized Stochastic Batch Perceptron. - Gildas Morvan, Daniel Jolly:
Multi-level agent-based modeling with the Influence Reaction principle. - Martin Biely, Peter Robinson, Ulrich Schmid:
Agreement in Directed Dynamic Networks. - Boris Bellalta, Jaume Barceló, Dirk Staehle, Alexey V. Vinel, Miquel Oliver:
On the Performance of Packet Aggregation in IEEE 802.11ac MU-MIMO WLANs. - Sergio Cabello:
Hardness of approximation for crossing number. - Matthias Scholz:
Validation of nonlinear PCA. - John Fearnley, Paul W. Goldberg, Rahul Savani, Troels Bjerre Sørensen:
Approximate Well-supported Nash Equilibria below Two-thirds. - Olivier Bailleux:
Unit contradiction versus unit propagation. - Seyed Hossein Hosseini, Mahrokh G. Shayesteh:
Gradually Atom Pruning for Sparse Reconstruction and Extension to Correlated Sparsity. - Anil N. Hirani, Kaushik Kalyanaraman, Evan VanderZee:
Delaunay Hodge Star. - Rohit Bhadauria, Sugata Sanyal:
Survey on Security Issues in Cloud Computing and Associated Mitigation Techniques. - (Withdrawn) Efficient Fruit Defect Detection and Glare removal Algorithm by anisotropic diffusion and 2D Gabor filter.
- Christoph Berkholz:
On the complexity of finding narrow proofs. - Shanshan Wang, Sugumar Murugesan, Junshan Zhang:
Exploiting Channel Correlation and PU Traffic Memory for Opportunistic Spectrum Scheduling. - Seyed Hossein Hosseini, Mahrokh G. Shayesteh:
Compressed Sensing for Denoising in Adaptive System Identification. - Shiva Kintali, Asaf Shapira:
A Note on the Balanced ST-Connectivity. - Kenneth L. Clarkson, Wolfgang Mulzer, C. Seshadhri:
Self-improving Algorithms for Coordinate-wise Maxima. - Mansoor I. Yousefi, Frank R. Kschischang:
Information Transmission using the Nonlinear Fourier Transform, Part II: Numerical Methods. - Holger Petersen:
Bounded Counter Languages. - Andrew Harms, Waheed U. Bajwa, A. Robert Calderbank:
Faster than Nyquist but Slower than Tropp et al. - Abhishek Ghosh, Sudhakar Pamarti:
Mitigating Timing Errors in Time-Interleaved ADCs: a signal conditioning approach. - Deeparnab Chakrabarty, C. Seshadhri:
Optimal bounds for monotonicity and Lipschitz testing over the hypercube. - (Withdrawn) The Cerny Conjecture.
- Phan Nhat Hai, Pascal Poncelet, Maguelonne Teisseire:
GeT_Move: An Efficient and Unifying Spatio-Temporal Pattern Mining Algorithm for Moving Objects. - Lawrence Ong, Chin Keong Ho:
Optimal Index Codes for a Class of Multicast Networks with Receiver Side Information. - Alexander Rakhlin, Ohad Shamir, Karthik Sridharan:
Relax and Localize: From Value to Algorithms. - Andri Mirzal, Shinichiro Yoshii, Masashi Furukawa:
PID Parameters Optimization by Using Genetic Algorithm. - Elisabeth Günther, Olaf Maurer, Nicole Megow, Andreas Wiese:
A New Approach to Online Scheduling: Approximating the Optimal Competitive Ratio. - Jin-San Cheng, Kai Jin, Xiao-Shan Gao, Daniel Lazard:
Certified Rational Parametric Approximation of Real Algebraic Space Curves with Local Generic Position Method. - Bharat Adsul, Jinesh Machchhar, Milind A. Sohoni:
A procedural framework and mathematical analysis for solid sweeps. - Guillaume Aupy, Anne Benoit, Fanny Dufossé, Yves Robert:
Reclaiming the energy of a schedule: models and algorithms. - Tom Gur, Omer Tamuz:
Testing Booleanity and the Uncertainty Principle. - Pierre Guillon, Charalampos Zinoviadis:
Densities and entropies in cellular automata. - Gábor Braun, Samuel Fiorini, Sebastian Pokutta, David Steurer:
Approximation Limits of Linear Programs (Beyond Hierarchies). - Laurent Decreusefond, Eduardo Ferraz, Philippe Martins, Thanh-Tung Vu:
Robust methods for LTE and WiMAX dimensioning. - Mikael Gast, Mathias Hauptmann:
Approximability of the Vertex Cover Problem in Power Law Graphs. - Shweta Singh, Ravindara Bhatt:
Adjacency Matrix Based Energy Efficient Scheduling using S-MAC Protocol in Wireless Sensor Networks. - Rainer Plaga, Frank Koob:
A formal definition and a new security mechanism of physical unclonable functions. - Brad Osgood, Aditya Siripuram, William Wu:
Discrete Sampling and Interpolation: Universal Sampling Sets for Discrete Bandlimited Spaces. - Erwan Le Martelot, Chris Hankin:
Fast Multi-Scale Detection of Relevant Communities. - Mikhail Kapralov, Ian Post, Jan Vondrák:
Online and stochastic variants of welfare maximization. - Corentin Briat:
Convergence and Equivalence results for the Jensen's inequality - Application to time-delay and sampled-data systems. - Johan Thapper, Stanislav Zivný:
The Power of Linear Programming for Valued CSPs. - Corentin Briat, Olivier Sename, Jean-François Lafay:
Memory Resilient Gain-scheduled State-Feedback Control of Uncertain LTI/LPV Systems with Time-Varying Delays. - Amotz Bar-Noy, Ben Baumer, Dror Rawitz:
Set It and Forget It: Approximating the Set Once Strip Cover Problem. - Matthieu Puigt, Anthony Griffin, Athanasios Mouchtaris:
Post-Nonlinear Sparse Component Analysis Using Single-Source Zones and Functional Data Clustering. - Seth Pettie:
Tightish Bounds on Davenport-Schinzel Sequences. - Harpreet S. Dhillon, Radha Krishna Ganti, Jeffrey G. Andrews:
Load-Aware Modeling and Analysis of Heterogeneous Cellular Networks. - Amitav Mukherjee, Minyan Pei, A. Lee Swindlehurst:
MIMO Precoding in Underlay Cognitive Radio Systems with Completely Unknown Primary CSI. - Michael E. Saks, C. Seshadhri:
Space efficient streaming algorithms for the distance to monotonicity and asymmetric edit distance. - François Le Gall:
Faster Algorithms for Rectangular Matrix Multiplication. - Adrian Kosowski:
A $\tilde O(n^2)$ Time-Space Trade-off for Undirected s-t Connectivity. - Sasko Ristov, Marjan Gusev, Magdalena Kostoska:
Cloud Computing Security in Business Information Systems. - Thomas Martin Gawlitza, Helmut Seidl:
Numerical Invariants through Convex Relaxation and Max-Strategy Iteration. - V. Krithika, Arshinder Kaur, K. Chandra Sekaran:
Web Services Supply Chains: A Literature Review. - Kamil Dedecius, Vladimíra Seckárová:
Dynamic Bayesian diffusion estimation.