


default search action
CoRR, August 2012
- Mouti Hammami:

Maintenance de l'outil Wr2fdr de traduction de Wright vers CSP. - Junze Han, Xiang-Yang Li:

Network Agile Preference-Based Prefetching for Mobile Devices. - Sutanay Choudhury, Lawrence B. Holder, George Chin Jr., John Feo:

Large-scale continuous subgraph queries on streams. - Lawrence Ong:

Capacity Results for Two Classes of Three-Way Channels. - Sashank Dara:

Confidentiality without Encryption For Cloud Computational Privacy. - Ahmed Badr, Ashish Khisti, Wai-Tian Tan, John G. Apostolopoulos:

Streaming Codes for Channels with Burst and Isolated Erasures. - Dong-Wan Choi, Chin-Wan Chung, Yufei Tao:

A Scalable Algorithm for Maximizing Range Sum in Spatial Databases. - Ahmed M. Aly, Walid G. Aref, Mourad Ouzzani:

Spatial Queries with Two kNN Predicates. - Cheng Sheng, Nan Zhang, Yufei Tao, Xin Jin:

Optimal Algorithms for Crawling a Hidden Database in the Web. - Lu Qin, Jeffrey Xu Yu, Lijun Chang:

Diversifying Top-K Results. - Xin Cao, Lisi Chen, Gao Cong, Xiaokui Xiao:

Keyword-aware Optimal Route Search. - Bogdan Cautis, Evgeny Kharlamov:

Answering Queries using Views over Probabilistic XML: Complexity and Tractability. - Abhay Kumar Jha, Dan Suciu:

Probabilistic Databases with MarkoViews. - Konstantinos Mamouras, Sigal Oren, Lior Seeman, Lucja Kot, Johannes Gehrke:

The Complexity of Social Coordination. - Xiaofei Zhang, Lei Chen, Min Wang:

Efficient Multi-way Theta-Join Processing Using MapReduce. - Harold Lim, Herodotos Herodotou, Shivnath Babu:

Stubby: A Transformation-based Optimizer for MapReduce Workflows. - Zhuowei Bao, Susan B. Davidson, Tova Milo:

Labeling Workflow Views with Fine-Grained Dependencies. - Jaroslaw Szlichta, Parke Godfrey, Jarek Gryz:

Fundamentals of Order Dependencies. - Yu Cao, Chee-Yong Chan, Jie Li, Kian-Lee Tan:

Optimization of Analytic Window Functions. - Fabian Hueske, Mathias Peters, Matthias Sax, Astrid Rheinländer, Rico Bergmann, Aljoscha Krettek, Kostas Tzoumas:

Opening the Black Boxes in Data Flow Optimization. - Stephan Ewen, Kostas Tzoumas, Moritz Kaufmann, Volker Markl:

Spinning Fast Iterative Data Flows. - Svilen R. Mihaylov, Zachary G. Ives, Sudipto Guha:

REX: Recursive, Delta-Based Data-Centric Computation. - James Cheng, Zechao Shang, Hong Cheng, Haixun Wang, Jeffrey Xu Yu:

K-Reach: Who is in Your Small World. - Wenfei Fan, Xin Wang, Yinghui Wu:

Performance Guarantees for Distributed Reachability Queries. - Pirooz Chubak, Davood Rafiei:

Efficient Indexing and Querying over Syntactically Annotated Trees. - Ninghui Li, Wahbeh H. Qardaji, Dong Su, Jianneng Cao:

PrivBasis: Frequent Itemset Mining with Differential Privacy. - Ganzhao Yuan, Zhenjie Zhang, Marianne Winslett, Xiaokui Xiao, Yin Yang, Zhifeng Hao:

Low-Rank Mechanism: Optimizing Batch Queries under Differential Privacy. - Taeho Jung, Xiang-Yang Li:

Search Me If You Can: Privacy-preserving Location Query Service. - Denis Brechka:

Analysis of access in the Take-Grant model. - Stefan Kratsch, Pascal Schweitzer:

Graph Isomorphism for Graph Classes Characterized by two Forbidden Induced Subgraphs. - He Huang, Yu-e Sun, Xiang-Yang Li, Hongli Xu, Yousong Zhou, Liusheng Huang:

Truthful Auction Mechanism for Heterogeneous Spectrum Allocation in Wireless Networks. - Saida Aissi, Mohamed Salah Gouider:

Personalization in Geographic information systems: A survey. - Saida Aissi, Mohamed Salah Gouider:

Spatial and Spatio-Temporal Multidimensional Data Modelling: A Survey. - Othon Michail, Ioannis Chatzigiannakis, Paul G. Spirakis:

Naming and Counting in Anonymous Unknown Dynamic Networks. - (Withdrawn) Opportunistic Forwarding with Partial Centrality.

- Fabian Schuh, Andreas Schenk, Johannes B. Huber:

Matched Decoding for Punctured Convolutional Encoded Transmission Over ISI-Channels. - Asma Boudhief, Mohsen Maraoui, Mounir Zrigui:

Adaptation of pedagogical resources description standard (LOM) with the specificity of Arabic language. - Sándor P. Fekete:

The Complexity of MaxMin Length Triangulation. - Saida Aissi, Mohamed Salah Gouider:

Towards the Next Generation of Data Warehouse Personalization System: A Survey and a Comparative Study. - Jun Zhang, Zhenjie Zhang, Xiaokui Xiao, Yin Yang, Marianne Winslett:

Functional Mechanism: Regression Analysis under Differential Privacy. - Jianneng Cao, Panagiotis Karras:

Publishing Microdata with a Robust Privacy Guarantee. - Ziyu Guan, Xifeng Yan, Lance M. Kaplan:

Measuring Two-Event Structural Correlations on Graphs. - Jeffrey Jestes, Jeff M. Phillips, Feifei Li, Mingwang Tang:

Ranking Large Temporal Data. - Florian Funke, Alfons Kemper, Thomas Neumann

:
Compacting Transactional Data in Hybrid OLTP & OLAP Databases. - Alexander Hall, Olaf Bachmann, Robert Büssow, Silviu Ganceanu, Marc Nunkesser:

Processing a Trillion Cells per Mouse Click. - Danica Porobic, Ippokratis Pandis, Miguel Branco, Pinar Tözün, Anastasia Ailamaki:

OLTP on Hardware Islands. - Daniel Sheldon, Neal E. Young:

Hamming Approximation of NP Witnesses. - Antonio Munoz-Canavate, Pedro Hipola:

Electronic administration in Spain: from its beginnings to the present. - Stacy Patterson, Aaron J. Elmore, Faisal Nawab, Divyakant Agrawal, Amr El Abbadi:

Serializability, not Serial: Concurrency Control and Availability in Multi-Datacenter Datastores. - Alvin Cheung, Owen Arden, Samuel Madden, Andrew C. Myers:

Automatic Partitioning of Database Applications. - Caleb Chen Cao, Jieying She, Yongxin Tong, Lei Chen:

Whom to Ask? Jury Selection for Decision Making Tasks on Micro-blog Services. - Xiaochun Yang, Honglei Liu, Bin Wang:

ALAE: Accelerating Local Alignment with Affine Gap Exactly in Biosequence Databases. - K. Selçuk Candan, Rosaria Rossini, Maria Luisa Sapino, Xiaolan Wang:

sDTW: Computing DTW Distances using Locally Relevant Constraints based on Salient Feature Alignments. - Farhan Tauheed, Thomas Heinis, Felix Schürmann, Henry Markram, Anastasia Ailamaki:

SCOUT: Prefetching for Latent Feature Following Queries. - Kaibo Wang, Yin Huai, Rubao Lee, Fusheng Wang, Xiaodong Zhang, Joel H. Saltz:

Accelerating Pathology Image Data Cross-Comparison on CPU-GPU Hybrid Systems. - Jiexing Li, Arnd Christian König, Vivek R. Narasayya, Surajit Chaudhuri:

Robust Estimation of Resource Consumption for SQL Queries using Statistical Techniques. - Cosmin Bonchis, Gabriel Istrate:

A Parametric Worst-Case Approach to Fairness in TU-Cooperative Games. - Mahashweta Das, Saravanan Thirumuruganathan, Sihem Amer-Yahia, Gautam Das, Cong Yu:

Who Tags What? An Analysis Framework. - Haohan Zhu, George Kollios, Vassilis Athitsos:

A Generic Framework for Efficient and Effective Subsequence Retrieval. - Jens Dittrich, Jorge-Arnulfo Quiané-Ruiz, Stefan Richter, Stefan Schuh, Alekh Jindal, Jörg Schad:

Only Aggressive Elephants are Fast Elephants. - Rui Li, Shengjie Wang, Kevin Chen-Chuan Chang:

Multiple Location Profiling for Users and Relationships from Social Network and Content. - Woon-Hak Kang, Sang-Won Lee, Bongki Moon:

Flash-based Extended Cache for Higher Throughput and Faster Recovery. - Michael A. Bender, Martin Farach-Colton, Rob Johnson, Russell Kraner, Bradley C. Kuszmaul, Dzejla Medjedovic, Pablo Montes, Pradeep Shetty, Richard P. Spillane, Erez Zadok:

Don't Thrash: How to Cache Your Hash on Flash. - Robert Isele, Christian Bizer:

Learning Expressive Linkage Rules using Genetic Programming. - Yongxin Tong, Lei Chen, Yurong Cheng, Philip S. Yu:

Mining Frequent Itemsets over Uncertain Databases. - Christoph Lange, Till Mossakowski, Oliver Kutz, Christian Galinski, Michael Grüninger, Daniel Couto Vale:

The Distributed Ontology Language (DOL): Use Cases, Syntax, and Extensibility. - Simina Brânzei, Clara Forero, Kate Larson, Peter Bro Miltersen:

Equilibria of Chinese Auctions. - Jessica Chang, Harold N. Gabow, Samir Khuller:

A Model for Minimizing Active Processor Time. - Saptarshi Das, Indranil Pan, Khrist Sur, Shantanu Das:

Artificial Neural Network Based Prediction of Optimal Pseudo-Damping and Meta-Damping in Oscillatory Fractional Order Dynamical Systems. - Zahra Aminzare, Eduardo D. Sontag:

Logarithmic Lipschitz norms and diffusion-induced instability. - Mark A. Davenport, Deanna Needell, Michael B. Wakin:

Signal Space CoSaMP for Sparse Recovery with Redundant Dictionaries. - Amed Leiva-Mederos, José A. Senso, Sandor Dominguez-Velasco, Pedro Hipola:

An Automat for the Semantic Processing of Structured Information. - Julian Yarkony, Alexander Ihler, Charless C. Fowlkes:

Fast Planar Correlation Clustering for Image Segmentation. - Joan Feigenbaum, Michael Mitzenmacher, Georgios Zervas:

An Economic Analysis of User-Privacy Options in Ad-Supported Services. - Shaoli Liu, Yunji Chen, Tianshi Chen, Ling Li, Chao Lu:

Global Adaptive Routing Algorithm Without Additional Congestion Propagation Network. - Marko Savic, Milos Stojakovic:

Linear Time Algorithm for Optimal Feed-link Placement. - Andy Nguyen:

Solving Cyclic Longest Common Subsequence in Quadratic Time. - Shrutivandana Sharma, Demosthenis Teneketzis:

Local public good provisioning in networks: A Nash implementation mechanism. - Yun Jiang, Marcus Lim, Ashutosh Saxena:

Multidimensional Membership Mixture Models. - Esraa Alomari, Selvakumar Manickam, Brij B. Gupta, Shankar Karuppayah, Rafeef Alfaris:

Botnet-based Distributed Denial of Service (DDoS) Attacks on Web Servers: Classification and Art. - Zhili Chen, He Huang, Liusheng Huang:

True-MCSA: A Framework for Truthful Double Multi-Channel Spectrum Auctions. - Sergey Andreyev:

Fixed Interfaces, Adaptive Interfaces... What is next? Total movability - a new paradigm for the user interface. - Zhiping Jiang, Jizhong Zhao, Xiang-Yang Li, Jinsong Han, Wei Xi:

Rejecting the Attack: Source Authentication for Wi-Fi Management Frames using CSI Information. - Yun-Chol Jong:

Grey Power Models Based on Optimization of Initial Condition and Model Parameters. - Ju Sun, Yuqian Zhang, John Wright:

Efficient Point-to-Subspace Query in ℓ1 with Application to Robust Face Recognition. - Caijun Zhong, Himal A. Suraweera, Aiping Huang, Zhaoyang Zhang, Chau Yuen:

Outage Probability of Dual-Hop Multiple Antenna AF Relaying Systems with Interference. - Alice Miller, Patrick Prosser:

Diamond-free Degree Sequences. - Esa Hyytiä, Jörg Ott:

Criticality of Large Delay Tolerant Networks via Directed Continuum Percolation in Space-Time. - Ugo Dal Lago

, Simone Martini
:
On Constructor Rewrite Systems and the Lambda Calculus. - Shang Shang, Paul W. Cuff, Sanjeev R. Kulkarni, Pan Hui:

An Upper Bound on the Convergence Time for Distributed Binary Consensus. - Mária Ercsey-Ravasz, Zoltán Toroczkai:

Optimization hardness as transient chaos in an analog approach to constraint satisfaction. - Christopher Schwaab, Jeremy G. Siek:

Modular Type-Safety Proofs using Dependant Types. - Simon T. Powers, Jun He:

A hybrid artificial immune system and Self Organising Map for network intrusion detection. - Wen-Qi Duan:

A Constructive Algorithm to Prove P=NP. - Petteri Kaski, Mikko Koivisto, Janne H. Korhonen:

Fast Monotone Summation over Disjoint Sets. - Jing Yang, Stark C. Draper, Robert D. Nowak:

Learning the Interference Graph of a Wireless Network. - Lena Chekina, Dudu Mimran, Lior Rokach, Yuval Elovici, Bracha Shapira:

Detection of Deviations in Mobile Applications Network Behavior. - Anzar Ahmad, R. Gowri, S. C. Gupta:

Simulation Study For Performance Comparison in Hierarchical Network With CHG Approach in MANET. - Daniel Kharitonov:

Green Telecom Metrics in Perspective. - Ulrich Menne, Christian Raack, Roland Wessäly, Daniel Kharitonov:

Optimal Degree of Optical Circuit Switching in IP-over-WDM Networks. - Partha Pratim Ray:

Translation of Bengali Terms in Mobile Phones: a Simplified Approach Based on the Prescriptions of Conventional Accent Understand Ability. - Poulami Majumder, Partha Pratim Ray:

Hatch-Sens: a Theoretical Bio-Inspired Model to Monitor the Hatching of Plankton Culture in the Vicinity of Wireless Sensor Network. - (Withdrawn) Debugging Invariant Issues in Pseudo Embedded Program: an Analytical Approach.

- Partha Pratim Ray:

The green grid saga - a green initiative to data centers: a review. - Partha Pratim Ray, Ansuman Banerjee:

Debugging Memory Issues In Embedded Linux: A Case Study. - Foto N. Afrati, Dimitris Fotakis, Jeffrey D. Ullman:

Enumerating Subgraph Instances Using Map-Reduce. - XiaoHua Xu, Jiannong Cao, Xiang-Yang Li:

MLLS: Minimum Length Link Scheduling Under Physical Interference Model. - Wayes Tushar, Walid Saad, H. Vincent Poor, David B. Smith:

Economics of Electric Vehicle Charging: A Game Theoretic Approach. - Wei Gao, Zhi-Hua Zhou:

On the consistency of AUC Optimization. - Gregory Crosswhite:

Embracing divergence: a formalism for when your semiring is simply not complete, with applications in quantum simulation. - Yin Wang, Yuan He, Dapeng Cheng, Yunhao Liu, Xiang-Yang Li:

Triggercast: Enabling Wireless Collisions Constructive. - Frank Stephan, Jason Teutsch:

Things that can be made into themselves. - Mahnoosh Kholghi, Mohammad Reza Keyvanpour:

Comparative Evaluation of Data Stream Indexing Models. - Jizhong Zhao, Wei Xi, Jinsong Han, Shaojie Tang, Xiang-Yang Li, Yunhao Liu, Yihong Gong, Zehua Zhou:

Efficient and Secure Key Extraction using CSI without Chasing down Errors. - Hamed Hassanzadeh, Mohammad Reza Keyvanpour:

Semantic Web Requirements through Web Mining Techniques. - Diodato Ferraioli, Paolo Penna:

Imperfect best-response mechanisms. - Pith Xie:

Numerical Computations For Real Number System By Logical Calculus. - Bojan Marinkovic, Paola Glavan, Zoran Ognjanovic:

Description of the Chord Protocol using ASMs Formalism. - Manfred Kufleitner

, Pascal Weil
:
On logical hierarchies within FO2-definable languages. - Éric Duchêne, Gabriel Renault:

Vertex Nim played on graphs. - Partha Pratim Ray:

Universal Numeric Segment Display for Indian Scheduled Languages: an Architectural View. - Partha Pratim Ray:

Web based e-learning in india: the cumulative views of different aspects. - Shang Shang, Pan Hui, Sanjeev R. Kulkarni, Paul W. Cuff:

Wisdom of the Crowd: Incorporating Social Influence in Recommendation Models. - Shang Shang, Sanjeev R. Kulkarni, Paul W. Cuff, Pan Hui:

A Random Walk Based Model Incorporating Social Information for Recommendations. - Michael Mitzenmacher, George Varghese:

Biff (Bloom Filter) Codes : Fast Error Correction for Large Data Sets. - Nilanjan Dey, Anamitra Bardhan Roy, Sayantan Dey:

A Novel Approach of Color Image Hiding using RGB Color planes and DWT. - Jorge Pedraza Arpasi:

On the control of abelian group codes with information group of prime order. - Guanhong Pei, Anil Kumar S. Vullikanti:

Efficient Algorithms for Maximum Link Scheduling in Distributed Computing Models with SINR Constraints. - Martin E. Dyer, Alan M. Frieze, Catherine S. Greenhill:

On the chromatic number of a random hypergraph. - Ting Hu, Jun Fan, Qiang Wu, Ding-Xuan Zhou:

Learning Theory Approach to Minimum Error Entropy Criterion. - Mutaz M. Al-Debei, Enas M. Al-Lozi:

Implementations of ICT Innovations: A Comparative Analysis in terms of Challenges between Developed and Developing Countries. - Enas M. Al-Lozi, Mutaz M. Al-Debei:

A Framework of Value Exchange and Role Playing in Web 2.0 WebSites. - Dima Jalal, Mutaz M. Al-Debei:

Portals and Task Innovation: A Theoretical Framework Founded on Business Intelligence Thinking. - Yaqin Zhou, Xiang-Yang Li, Min Liu, Zhongcheng Li:

Link Scheduling for Throughput Maximization in Multihop Wireless Networks Under Physical Interference. - Nader Ale Ebrahim, Shamsuddin Ahmed, Zahari Taha:

Establishing Virtual R&D Teams: Obliged Policy. - Andrew Clark, Linda Bushnell, Radha Poovendran:

A Supermodular Optimization Framework for Leader Selection under Link Noise in Linear Multi-Agent Systems. - Tanmay Bhattacharya, Nilanjan Dey, S. R. Bhadra Chaudhuri:

A Session based Multiple Image Hiding Technique using DWT and DCT. - Paolo Gasti, Gene Tsudik, Ersin Uzun, Lixia Zhang:

DoS and DDoS in Named-Data Networking. - Sergey V. Yakhontov:

NP=NL and, therefore, P=NP as long as the polynomial upper bound is explicitly known for each language A in NP. - Misha Denil, Nando de Freitas:

Recklessly Approximate Sparse Coding. - Hema Swetha Koppula, Rudhir Gupta, Ashutosh Saxena:

Human Activity Learning using Object Affordances from RGB-D Videos. - Riad Akrour

, Marc Schoenauer, Michèle Sebag:
APRIL: Active Preference-learning based Reinforcement Learning. - Nasif Muslim, Md. Tanvir Adnan, Mohammad Zahidul Kabir, Md. Humayun Kabir, Sheikh Mominul Islam:

Design and implementation of a digital clock showing digits in Bangla font using microcontroller AT89C4051. - Laurent Reynaud, Tinku Rasheed, Kandeepan Sithamparanathan:

An Integrated Aerial Telecommunications Network that Supports Emergency Traffic. - Laurent Reynaud, Salim Zaïmi, Yvon Gourhant:

Competitive Assessments for HAP Delivery of Mobile Services in Emerging Countries. - Shiyu Ji, Xiaojun Tong, Miao Zhang:

Image encryption schemes for JPEG and GIF formats based on 3D baker with compound chaotic sequence generator. - Georgios Pitsilis, Svein J. Knapskog:

Social Trust as a solution to address sparsity-inherent problems of Recommender systems. - Dirk Lewandowski:

Credibility in Web Search Engines. - Giuseppe Savaré, Giuseppe Toscani:

The concavity of Rènyi entropy power. - Zahra Aminzare:

Remarks on contractions of reaction-diffusion PDE's on weighted L^2 norms. - Christopher Rose, I. Saira Mian, Ruochen Song:

Timing Channels with Multiple Identical Quanta. - N. S. Bhuvaneswari, R. Praveena, R. Divya:

System identification and modeling for interacting and non-interacting tank systems using intelligent techniques. - Fabian Altenbach, Steven Corroy, Georg Böcherer, Rudolf Mathar:

Strategies for Distributed Sensor Selection Using Convex Optimization. - Georg Böcherer:

Optimal Non-Uniform Mapping for Probabilistic Shaping. - Jasper De Bock, Gert de Cooman:

Credal nets under epistemic irrelevance. - Bartlomiej Placzek:

Uncertainty-dependent data collection in vehicular sensor networks. - Vladimir M. Blinovsky, Minglai Cai:

Classical-Quantum Arbitrarily Varying Wiretap Channel. - Viet Tung Hoang, Ben Morris, Phillip Rogaway:

An Enciphering Scheme Based on a Card Shuffle. - Andrea Simonetto, Tamás Keviczky, Mikael Johansson:

A Regularized Saddle-Point Algorithm for Networked Optimization with Resource Allocation Constraints. - Paul Dütting, Felix A. Fischer, Pichayut Jirapinyo, John K. Lai, Benjamin Lubin, David C. Parkes:

Payment Rules through Discriminant-Based Classifiers. - Stamatina Thomaidou, Michalis Vazirgiannis, Kyriakos Liakopoulos:

Toward an Integrated Framework for Automated Development and Optimization of Online Advertising Campaigns. - Reza Farahbakhsh, Naser Movahhedinia:

Seamless Handover for IMS over Mobile-IPv6 Using Context Transfer. - Rkia Aouinatou, Mostafa Belkasmi:

An efficient classification in IBE Provide with an improvement of BB2 to an efficient Commutative Blinding scheme. - Neri Merhav, Wojciech Szpankowski:

Average redundancy of the Shannon code for Markov sources. - Corentin Briat, Emre A. Yavuz, Gunnar Karlsson:

A conservation-law-based modular fluid-flow model for network congestion modeling. - Foteini Alvanaki, Sebastian Michel, Aleksandar Stupar:

Building and Maintaining Halls of Fame over a Database. - Marek Cygan, Marcin Pilipczuk:

On fixed-parameter algorithms for Split Vertex Deletion. - Ping Li, Art B. Owen, Cun-Hui Zhang:

One Permutation Hashing for Efficient Search and Learning. - Julia Chuzhoy, Shi Li:

A Polylogarithimic Approximation Algorithm for Edge-Disjoint Paths with Congestion 2. - Raj Rao Nadakuditi, M. E. J. Newman:

Spectra of random graphs with arbitrary expected degrees. - Holger Petersen:

The Power of Centralized PC Systems of Pushdown Automata. - Negin Golrezaei, Alexandros G. Dimakis, Andreas F. Molisch:

Scaling Behaviors of Wireless Device-to-Device Communications with Distributed Caching. - Shafigh Parsazad, Ehsan Saboori, Amin Allahyar:

Data Selection for Semi-Supervised Learning. - Brian K. Butler, Paul H. Siegel:

Numerical Issues Affecting LDPC Error Floors. - Kent E. Morrison:

The multiplication game. - Jeff Burke, Paolo Gasti, Naveen Nathan, Gene Tsudik:

Securing Instrumented Environments over Content-Centric Networking: the Case of Lighting Control. - Denis Brechka:

Algorithm for searching bridges of specified types in the protection graph for Take-Grant protection model. - Xianwen Wang, Zhi Wang, Shenmeng Xu:

Tracing scientists' research trends realtimely. - Yi Fang, Jing Xu, Lin Wang, Guanrong Chen:

Performance of MIMO Relay DCSK-CD Systems over Nakagami Fading Channels. - Christian Sternagel:

A Locale for Minimal Bad Sequences. - Christian Sternagel:

Getting Started with Isabelle/jEdit. - Ignacio Gomez Portillo:

Building Cooperative Networks. - Megumi Kaneko, Khaldoun Al Agha:

Compressed Sensing based Protocol. - Aman Chadha, Bharatraaj Savardekar, Jay Padhya:

Analysis of a Modern Voice Morphing Approach using Gaussian Mixture Models for Laryngectomees. - Geetishree Mishra, Rajeshwari Hegde, K. S. Gurumurthy:

Deploying Health Monitoring ECU Towards Enhancing the Performance of In-Vehicle Network. - Cheng Chen, Kui Wu, Srinivasan Venkatesh, R. Kesav Bharadwaj:

The Best Answers? Think Twice: Online Detection of Commercial Campaigns in the CQA Forums. - Atish Das Sarma, Ashwin Lall, Danupon Nanongkai, Amitabh Trehan:

Dense Subgraphs on Dynamic Networks. - Renate A. Schmidt, Dmitry Tishkovsky:

Using Tableau to Decide Description Logics with Full Role Negation and Identity. - Amy Zhang, Nadia Fawaz, Stratis Ioannidis, Andrea Montanari:

Guess Who Rated This Movie: Identifying Users Through Subspace Clustering. - Robert T. Schweller, Michael Sherman:

Fuel Efficient Computation in Passive Self-Assembly. - Yan Shvartzshnaider, Maximilian Ott:

Design For Change: Information-Centric Architecture to Support Agile Disaster Response. - Zaafir Barahim, M. Razvi Doomun, Nazrana Joomun:

Low-Cost Bluetooth Mobile Positioning for Location-based Application. - Christian Sternagel, René Thiemann, Sarah Winkler, Harald Zankl:

CeTA - A Tool for Certified Termination Analysis. - K. Pavan Srinath, B. Sundar Rajan:

Improved Perfect Space-Time Block Codes. - K. Pavan Srinath, B. Sundar Rajan:

Fast-Decodable MIDO Codes with large Coding Gain. - Christian Sternagel, René Thiemann:

Certification extends Termination Techniques. - Christian Sternagel, René Thiemann:

A Relative Dependency Pair Framework. - Thomas Sternagel, René Thiemann, Harald Zankl, Christian Sternagel:

Recording Completion for Finding and Certifying Proofs in Equational Logic. - René Thiemann:

Towards the Certification of Complexity Proofs. - Jingchao Chen:

A Dynamic Phase Selection Strategy for Satisfiability Solvers. - Tomás Brázdil, Antonín Kucera, Petr Novotný:

Determinacy in Stochastic Games with Unbounded Payoff Functions. - Christoph Dittmann, Stephan Kreutzer, Alexandru I. Tomescu:

Graph Operations on Parity Games and Polynomial-Time Algorithms. - Piotr Krzysztof Skowron, Piotr Faliszewski, Arkadii M. Slinko:

Proportional Representation as Resource Allocation: Approximability Results. - Josphineleela Ramakrishnan, Ramakrishnan Malaisamy:

Performance Measurement and Method Analysis (PMMA) for Fingerprint Reconstruction. - Josphineleela Ramakrishnan, M. Ramakrishnan:

An Efficient Automatic Attendance System Using Fingerprint Reconstruction Technique. - Swaprava Nath

, Pankaj Dayama, Dinesh Garg, Y. Narahari, James Y. Zou:
Mechanism Design for Time Critical and Cost Critical Task Execution via Crowdsourcing. - Ou Wu:

Color Assessment and Transfer for Web Pages. - Serge Gaspers, Eun Jung Kim, Sebastian Ordyniak, Saket Saurabh, Stefan Szeider:

Don't Be Strict in Local Search! - Serge Gaspers, Mikko Koivisto, Mathieu Liedloff, Sebastian Ordyniak, Stefan Szeider:

On Finding Optimal Polytrees. - Bin Dai, A. J. Han Vinck, Zhuojun Zhuang, Yuan Luo:

Information-Theoretical Security for Several Models of Multiple-Access Channel. - Radeep B. H., Sanjay Singh:

Ownership Authentication Transfer Protocol for Ubiquitous Computing Devices. - Valentin Goranko, Paolo Turrini:

Non-cooperative games with preplay negotiations. - Abhijeet Pareek, Philipp Woelfel:

RMR-Efficient Randomized Abortable Mutual Exclusion. - Amir Noori:

On the Relation between Centrality Measures and Consensus Algorithms. - (Withdrawn) Hybrid systems modeling for gas transmission network.

- Perrine Pittet, Christophe Nicolle, Christophe Cruz:

Guidelines for a Dynamic Ontology - Integrating Tools of Evolution and Versioning in Ontology. - Valentin Goranko:

Transformations of normal form games by preplay offers for payments among players. - Leonid B. Litinskii, Boris V. Kryzhanovsky, Anatoly B. Fonarev:

Operator formalism for optical neural network based on the parametrical four-wave mixing process. - Xi Chen, Martin E. Dyer, Leslie Ann Goldberg, Mark Jerrum, Pinyan Lu, Colin McQuillan, David Richerby:

The complexity of approximating conservative counting CSPs. - Ilan Shomorony, Amir Salman Avestimehr, Himanshu Asnani, Tsachy Weissman:

Worst-Case Source for Distributed Compression with Quadratic Distortion. - Xiaohua Xu, Xiang-Yang Li, Shaojie Tang, XuFei Mao:

Distributed Scheduling for Real-Time Convergecast in Wireless Sensor Networks. - Tasha Frankie, Gordon F. Hughes, Kenneth Kreutz-Delgado:

Analysis of Trim Commands on Overprovisioning and Write Amplification in Solid State Drives. - Qinghuai Gao:

The Super Robustness of Maximum Likelihood Location Estimator of Exponential Power Distribution, when p < 1. - Peter Sarlin:

Self-Organizing Time Map: An Abstraction of Temporal Multivariate Patterns. - Qiang Qian, Songcan Chen:

Metric Learning across Heterogeneous Domains by Respectively Aligning Both Priors and Posteriors. - Guangxu Guo, Songcan Chen:

Margin Distribution Controlled Boosting. - Sahand Negahban, Benjamin I. P. Rubinstein, Jim Gemmell:

Scaling Multiple-Source Entity Resolution using Statistically Efficient Transfer Learning. - Qi Wang, Yue Zhou:

New Classes of Zero-Difference Balanced Functions. - Supreeth K. Rao, Arpitha Prasad B., Anushree R. Shetty, Chinmai, R. Bhakthavathsalam, Rajeshwari Hegde:

Stereo Acoustic Perception based on Real Time Video Acquisition for Navigational Assistance. - Mohammad Waris Abdullah, Nazar Waheed

:
Performance and Detection of M-ary Frequency Shift Keying in Triple Layer Wireless Sensor Network. - Raghu Anantharangachar, Srinivasan Ramani:

Semantic Web Techniques for Yellow Page Service Providers. - Poo Kuan Hoong, Ian K. T. Tan, Chee Yik Keong:

Bittorrent Network Traffic Forecasting With ARMA. - Mina Mishra, Vijay H. Mankar:

Message Embedded cipher using 2-D chaotic map. - Richard Perry:

Batch Spreadsheet for C Programmers. - Mahdi Aiash, Glenford E. Mapp, Aboubaker Lasebae:

A Survey on Authentication and Key Agreement Protocols in Heterogeneous Networks. - Jean-Louis Dessalles:

Algorithmic Simplicity and Relevance. - Probir Roy, Md. Mejbah Ul Alam, Nishita Das:

Heuristic based task scheduling in multiprocessor systems with genetic algorithm by choosing the eligible processor. - Yucel Altug, Aaron B. Wagner:

Moderate Deviations in Channel Coding. - Laxmi Choudhary, Bhawani Shankar Burdak:

Role of Ranking Algorithms for Information Retrieval. - Jiannan Wang, Tim Kraska, Michael J. Franklin, Jianhua Feng:

CrowdER: Crowdsourcing Entity Resolution. - Michele Dallachiesa, Besmira Nushi, Katsiaryna Mirylenka, Themis Palpanas:

Uncertain Time-Series Similarity: Return to the Basics. - Tamraparni Dasu, Ji Meng Loh:

Statistical Distortion: Consequences of Data Cleaning. - Willis Lang, Stavros Harizopoulos, Jignesh M. Patel, Mehul A. Shah, Dimitris Tsirogiannis:

Towards Energy-Efficient Database Cluster Design. - Frédéric Rodriguez:

Technical report: CSVM dictionaries. - Santiago Ontañón:

Experiments with Game Tree Search in Real-Time Strategy Games. - B. Thirumala Rao, L. S. S. Reddy:

Scheduling Data Intensive Workloads through Virtualization on MapReduce based Clouds. - Fahimeh Farahbod, Mahdi Eftekhari:

Comparison of different T-norm operators in classification problems. - Kai Yang, Xi Zhou:

MIDI-LAB, a Powerful Visual Basic Program for Creating MIDI Music. - Akshai Aggarwal, Savita Gandhi, Nirbhay Chaubey, Pathik Shah, Madhvi Sadhwani:

AODVSEC: A Novel Approach to Secure Ad Hoc on-Demand Distance Vector (AODV) Routing Protocol from Insider Attacks in MANETs. - Richard Perry:

An Internet Approach for Engineering Student Exercises. - Manuel Rodriguez Rodriguez, Bobby Philip, Zhen Wang, Mark A. Berrill:

Block-Relaxation Methods for 3D Constant-Coefficient Stencils on GPUs and Multicore CPUs. - Sarabjot Singh, Harpreet S. Dhillon, Jeffrey G. Andrews:

Offloading in Heterogeneous Networks: Modeling, Analysis and Design Insights. - Ravi Tandon:

Determination Of Optimal Number Of Clusters In Wireless Sensor Networks. - Sukhpal Singh:

An algorithm for improving the quality of compacted JPEG image by minimizes the blocking artifacts. - Krishnama Raju Kanchu, Subhash C. Kak:

Goldbach Ellipse Sequences for Cryptographic Applications. - Horia Vlad Balan, Konstantinos Psounis:

Tag Spotting at the Interference Range. - Alvin Cheung, Armando Solar-Lezama, Samuel Madden:

Inferring SQL Queries Using Program Synthesis. - Francis R. Bach:

Sharp analysis of low-rank kernel matrix approximations. - Abdelhakim Khlifi, Ridha Bouallegue:

Comparison between Performances of Channel Estimation Techniques for CP-LTE and ZP-LTE Downlink Systems. - Abdul Razaque, Khaled M. Elleithy:

Discovery of Malicious Attacks to Improve Mobile Collaborative Learning (MCL). - Ryul Kim, Myongson Sihn, Okhyon Song:

Upper Bounds on the Number of Codewords of Some Separating Codes. - Vo Tam Van, Chau Yuen, Jing (Tiffany) Li:

Non-homogeneous distributed storage systems. - A. Forootaninia, M. B. Ghaznavi-Ghoushchi:

An Improved Watchdog Technique Based On Power-Aware Hierarchical Design For Ids In Wireless Sensor Networks. - M. Rajalakshmi, P. Subashini:

A study on non-destructive method for detecting Toxin in pepper using Neural networks. - Abdul Kareem, Mohammad Fazle Azeem:

A Novel Fuzzy Logic Based Adaptive Supertwisting Sliding Mode Control Algorithm for Dynamic Uncertain Systems. - Qifeng Qiao, Peter A. Beling:

Inverse Reinforcement Learning with Gaussian Process. - Ismael Etxeberria Agiriano, Isidro Calvo, Liliana Montero, Ivan Alonso:

A DDS-Based Scalable and Reconfigurable Framework for Cyber-Physical Systems. - K. Ishaque Ashar, V. Prathyusha, Srikrishna Bhashyam, Andrew Thangaraj:

Outer Bounds for the Capacity Region of a Gaussian Two-way Relay Channel. - Murali Sridhar, Srikrishna Bhashyam:

On the Sum Rate of a 2 x 2 Interference Network. - Volker Diekert, Anca Muscholl:

On distributed monitoring of asynchronous systems. - V. P. Gladis Pushpa Rathi, S. Palani:

Brain tumor MRI image classification with feature selection and extraction using linear discriminant analysis. - Harro Wimmel, Karsten Wolf:

Applying CEGAR to the Petri Net State Equation. - Khaled Merit, Abdelazziz Ouamri:

Securing Speech in GSM Networks using DES with Random Permutation and Inversion Algorithm. - Michael J. Bell, Colin S. Gillespie

, Daniel Swan, Phillip W. Lord:
An approach to describing and analysing bulk biological annotation quality: a case study using UniProtKB. - Mohammad Havaei, Nandivada Krishna Prasad, Velleshala Sudheer:

Elimination of ISI Using Improved LMS Based Decision Feedback Equalizer. - Sanaz Moshirian, Soheil Ghadami, Mohammad Havaei:

Blind Channel Equalization. - Fereydoun Farrahi Moghaddam, Reza Farrahi Moghaddam, Mohamed Cheriet:

Curved Space Optimization: A Random Search based on General Relativity Theory. - Dmytro Taranovsky:

Space-Efficient Circuit Evaluation. - Philip N. Klein, Shay Mozes, Christian Sommer:

Structured Recursive Separator Decompositions for Planar Graphs in Linear Time. - Ernest K. Ryu, Sean Choi:

Stochastic Kronecker Graph on Vertex-Centric BSP. - Xizhong Zheng, Robert Rettinger:

Point-Separable Classes of Simple Computable Planar Curves. - (Withdrawn) Analysis of Statistical Hypothesis based Learning Mechanism for Faster Crawling.

- Ranjita Kumari Swain, Prafulla Kumar Behera, Durga Prasad Mohapatra:

Minimal TestCase Generation for Object-Oriented Software with State Charts. - Kush R. Varshney, Peter M. van de Ven:

Balancing Lifetime and Classification Accuracy of Wireless Sensor Networks. - Mariano Tepper, Guillermo Sapiro:

L1 Splines for Robust, Simple, and Fast Smoothing of Grid Data. - Sofya Raskhodnikova, Grigory Yaroslavtsev:

Learning pseudo-Boolean k-DNF and Submodular Functions. - M. Razvi Doomun, K. M. Sunjiv Soyjaudah:

LOTKIP: Low Overhead TKIP Optimization for Ad Hoc Wireless Network. - Weiyu Xu, Lifeng Lai:

Compressed Hypothesis Testing: to Mix or Not to Mix? - Marwah Almasri, Khaled M. Elleithy, Abdul Razaque:

Analytical Study of Pre-congestion notification (PCN) techniques. - Olaf Mersmann, Bernd Bischl, Heike Trautmann, Markus Wagner, Frank Neumann:

A Novel Feature-Based Approach to Characterize Algorithm Performance for the Traveling Salesman Problem. - M. Anas, Nadeem Javaid, Anzar Mahmood, S. M. Raza, U. Qasim, Zahoor Ali Khan:

Minimizing Electricity Theft using Smart Meters in AMI. - Taisuke Izumi, Tadashi Wadayama:

A New Direction for Counting Perfect Matchings. - Rafael E. Carrillo, Jason D. McEwen, Dimitri Van De Ville, Jean-Philippe Thiran, Yves Wiaux:

Sparsity Averaging for Compressive Imaging. - Nadeem Javaid, Abida Sharif, Anzar Mahmood, Saeed Ahmed, Umar Qasim, Zahoor Ali Khan:

Monitoring and Controlling Power using Zigbee Communications. - Qurat ul Ain, Amarah Ikram, Nadeem Javaid, Umar Qasim, Zahoor Ali Khan:

Modeling Propagation Characteristics for Arm-Motion in Wireless Body Area Sensor Networks. - Arindam Sarkar, J. K. Mandal:

Energy Efficient Wireless Communication using Genetic Algorithm Guided Faster Light Weight Digital Signature Algorithm (GADSA). - Arindam Sarkar, J. K. Mandal:

Multilayer Perceptron Guided Key Generation Through Mutation with Recursive Replacement in Wireless Communication (MLPKG). - A. A. Khan, Nadeem Javaid, U. Qasim, Z. Lu, Zahoor Ali Khan:

HSEP: Heterogeneity-aware Hierarchical Stable Election Protocol for WSNs. - Tianshi Chen, Ke Tang, Guoliang Chen, Xin Yao:

A Large Population Size Can Be Unhelpful in Evolutionary Algorithms. - Azizur Rahim, Nadeem Javaid, Muhammad Aslam, Ziaur Rahman, U. Qasim, Zahoor Ali Khan:

A Comprehensive Survey of MAC Protocols for Wireless Body Area Networks. - Maxim Zhukovskiy, Dmitry Vinogradov, Yuri Pritykin, Liudmila Ostroumova, Evgeny Grechnikov, Gleb Gusev, Pavel Serdyukov, Andrei M. Raigorodskii:

Empirical Validation of the Buckley--Osthus Model for the Web Host Graph: Degree and Edge Distributions. - Yossi Gilad, Amir Herzberg:

TCP Injections for Fun and Clogging. - Kenza Guenda, T. Aaron Gulliver, S. Arash Sheikholeslam:

Lexicodes over Rings. - Diederik Aerts, Jan Broekaert, Liane Gabora, Tomas Veloz:

The Guppy Effect as Interference. - Ahmad Lashgar, Amirali Baniasadi, Ahmad Khonsari:

Dynamic Warp Resizing in High-Performance SIMT. - Aziz Ur Rehman, Mansoor Mustafa, Nadeem Javaid, Umar Qasim, Zahoor Ali Khan:

Analytical Survey of Wearable Sensors. - Danish Mahmood, Nadeem Javaid, U. Qasim, Zahoor Ali Khan:

Routing Load of Route Calculation and Route Maintenance in Wireless Proactive Routing Protocols. - Clemens Grabmayer, Jan Rochel:

Expressibility in the Lambda Calculus with Letrec. - Parastoo Sadeghi, Mingchao Yu:

Instantly Decodable versus Random Linear Network Coding: A Comparative Framework for Throughput and Decoding Delay Performance. - Yi Fang, Pingping Chen, Lin Wang, Francis Chung-Ming Lau, Kai-Kit Wong:

Performance Analysis of Protograph-based LDPC Codes with Spatial Diversity. - K. Latif, M. Jaffar, Nadeem Javaid, Malik Najmus Saqib, U. Qasim, Zahoor Ali Khan:

Performance Analysis of Hierarchical Routing Protocols in Wireless Sensor Networks. - M. S. Fareed, Nadeem Javaid, Mariam Akbar, Saniah Rehman, U. Qasim, Zahoor Ali Khan:

Optimal Number of Cluster Head Selection for Efficient Distribution of Sources in WSNs. - M. S. Fareed, Nadeem Javaid, S. Ahmed, Saniah Rehman, U. Qasim, Zahoor Ali Khan:

Analyzing Energy-efficiency and Route-selection of Multi-level Hierarchal Routing Protocols in WSNs. - T. N. Qureshi, Nadeem Javaid, M. Malik, U. Qasim, Zahoor Ali Khan:

On Performance Evaluation of Variants of DEEC in WSNs. - Zeeshan Abbas, Nadeem Javaid, Mahmood Ashraf Khan, S. Ahmed, U. Qasim, Zahoor Ali Khan:

Simulation Analysis of IEEE 802.15.4 Non-beacon Mode at Varying Data Rates. - Danish Mahmood, Nadeem Javaid, U. Qasim, Zahoor Ali Khan:

Routing Load of Route Discovery and Route Maintenance in Wireless Reactive Routing Protocols. - I. Israr, M. M. Yaqoob, Nadeem Javaid, U. Qasim, Zahoor Ali Khan:

Simulation Analysis of Medium Access Techniques. - M. M. Yaqoob, I. Israr, Nadeem Javaid, Mahmood Ashraf Khan, U. Qasim, Zahoor Ali Khan:

Transmission Delay of Multi-hop Heterogeneous Networks for Medical Applications. - Sebastian Szkoda, Zbigniew Koza, Mateusz Tykierko:

Accelerating cellular automata simulations using AVX and CUDA. - Sergio Grammatico, Gabriele Pannocchia:

Linear model predictive control based on polyhedral control Lyapunov functions: theory and applications. - Mauro Castelli, Luca Manzoni, Leonardo Vanneschi:

An Efficient Genetic Programming System with Geometric Semantic Operators and its Application to Human Oral Bioavailability Prediction. - Bas Luttik, Michel A. Reniers:

Proceedings Combined 19th International Workshop on Expressiveness in Concurrency and 9th Workshop on Structured Operational Semantics, EXPRESS/SOS 2012, Newcastle upon Tyne, UK, September 3, 2012. EPTCS 89, 2012 [contents] - Rishi Gupta, Piotr Indyk, Eric Price, Yaron Rachlin:

Compressive Sensing with Local Geometric Features. - (Withdrawn) Breaking Out The XML MisMatch Trap.

- Amal Khabou, James Demmel, Laura Grigori, Ming Gu:

LU factorization with panel rank revealing pivoting and its communication avoiding version. - Apostolos Syropoulos:

On Generalized Fuzzy Multisets and their Use in Computation. - Jan A. Bergstra:

Decision Taking for Selling Thread Startup. - Maria Luisa Bonet, Sam Buss, Jan Johannsen:

Improved Separations of Regular Resolution from Clause Learning Proof Systems. - Sreenivas Gollapudi, Samuel Ieong, Anitha Kannan:

Structured Query Reformulations in Commerce Search. - Nitish Upreti:

'CodeAliker' - Plagiarism Detection on the Cloud. - Bo Zhou, Qiankun Song:

Period Distribution of Inversive Pseudorandom Number Generators Over Galois Rings. - Enrico Formenti:

Proceedings 18th international workshop on Cellular Automata and Discrete Complex Systems and 3rd international symposium Journées Automates Cellulaires, AUTOMATA & JAC 2012, La Marana, Corsica, September 19-21, 2012. EPTCS 90, 2012 [contents] - Jianshu Chen, Ali H. Sayed:

Distributed Pareto Optimization via Diffusion Strategies. - S. Bogana, M. Helali, K. Paykan:

Error Probability of OSTB Codes and Capacity Analysis with Antenna Selection over Single-Antenna AF Relay Channels. - Eliahu Baransky, Gal Itzhak, Idan Shmuel, Noam Wagner, Eli Shoshan, Yonina C. Eldar:

A Sub-Nyquist Radar Prototype: Hardware and Algorithms. - Lovro Subelj, Marko Bajec:

Software systems through complex networks science: Review, analysis and applications. - Konrad Rawlik, Marc Toussaint, Sethu Vijayakumar:

Path Integral Control by Reproducing Kernel Hilbert Space Embedding. - Pedro C. Pinto, Patrick Thiran, Martin Vetterli:

Locating the Source of Diffusion in Large-Scale Networks. - Dennis Luxen, Dennis Schieferdecker:

Doing More for Less -- Cache-Aware Parallel Contraction Hierarchies Preprocessing. - Yanxiang Wang, Hari Sundaram, Lexing Xie:

Social Event Detection with Interaction Graph Modeling. - Marcel Wild:

Revisitin the enumeration of all models of a Boolean 2-CNF. - Patrick Traxler:

The Relative Exponential Time Complexity of Approximate Counting Satisfying Assignments. - Jan Olaf Blech:

Towards a Formalization of the OSGi Component Framework. - Christer Bäckström, Yue Chen, Peter Jonsson, Sebastian Ordyniak, Stefan Szeider:

The Complexity of Planning Revisited - A Parameterized Analysis. - Nachum Dershowitz:

The Generic Model of Computation. 59-71 - Patrick Jaillet, Xin Lu:

Near-Optimal Online Algorithms for Dynamic Resource Allocation Problems. - Muhammad Anshari, Mohammad Nabil Almunawar:

Empowered Customers in E-Health Business Process. - Tereza Klimosová, Daniel Král:

Hereditary properties of permutations are strongly testable. - Alex Citkin:

Characteristic formulas over intermediate logics. - Daniel S. Katz, Shantenu Jha, Manish Parashar, Omer F. Rana, Jon B. Weissman:

Survey and Analysis of Production Distributed Computing Infrastructures. - Jacek Sroka, Jan Hidders:

On Generating *-Sound Nets with Substitution. - Mikhail V. Kharinov:

Stable Segmentation of Digital Image. - Gerald Paul:

A GPU implementation of the Simulated Annealing Heuristic for the Quadratic Assignment Problem. - Xianwen Wang, Shenmeng Xu, Lian Peng, Zhi Wang, Chuanli Wang, Chunbo Zhang, Xianbing Wang:

Exploring scientists' working timetable: Do scientists often work overtime? - Vincent Labatut

, Atay Ozgovde:
Topological measures for the analysis of wireless sensor networks. - Ahmet Faruk Coskun, Oguz Kucur:

Unified Analysis of Transmit Antenna Selection/Space-Time Block Coding with Receive Selection and Combining over Nakagami-m Fading Channels in the Presence of Feedback Errors. - Stephen A. Cook, Yuval Filmus, Dai Tri Man Le:

The Complexity of the Comparator Circuit Value Problem. - Monik Khare, Neal E. Young:

Caching with rental cost and nuking. - Robert R. Tucci:

Shannon Information Theory Without Shedding Tears Over Delta \& Epsilon Proofs or Typical Sequences. - Marcello M. Bonsangue

, Stefan Milius, Jurriaan Rot:
On the specification of operations on the rational behaviour of systems. 3-18 - Wojciech Czerwinski

, Slawomir Lasota
:
Partially-commutative context-free languages. 35-48 - Maciej Gazda, Tim A. C. Willemse

:
Expressiveness and Completeness in Abstraction. 49-64 - Marco Giunti

, Catuscia Palamidessi
, Frank D. Valencia:
Hide and New in the Pi-Calculus. 65-79 - Rob J. van Glabbeek:

Musings on Encodings and Expressiveness. 81-98 - Piotr Hofman

, Patrick Totzke
:
Approximating Weak Bisimilarity of Basic Parallel Processes. 99-113 - Matias David Lee, Daniel Gebler, Pedro R. D'Argenio

:
Tree rules in probabilistic transition system specifications with negative and quantitative premises. 115-130 - Stephan Mennicke

:
An Operational Petri Net Semantics for the Join-Calculus. 131-147 - Maxim Strygin, Hayo Thielecke:

Operational semantics for signal handling. 149-163 - Giovanni Pighizzini:

Two-Way Finite Automata: Old and Recent Results. 3-20 - Ville Salo, Ilkka Törmä:

On Derivatives and Subpattern Orders of Countable Subshifts. 23-36 - Benjamin Hellouin de Menibus, Mathieu Sablik:

Entry times in automata with simple defect dynamics. 97-109 - Heather Betel, Pedro Paulo Balbi de Oliveira

, Paola Flocchini:
On the Parity Problem in One-Dimensional Cellular Automata. 110-126 - Thomas Fernique, Mathieu Sablik:

Local Rules for Computable Planar Tilings. 133-141 - Kenichi Morita

:
Universality of One-Dimensional Reversible and Number-Conserving Cellular Automata. 142-150 - Hiroshi Umeo, Kinuo Nishide, Keisuke Kubo:

A Simple Optimum-Time FSSP Algorithm for Multi-Dimensional Cellular Automata. 151-165 - Michael Vielhaber

:
Computing by Temporal Order: Asynchronous Cellular Automata. 166-176 - Pablo Arrighi, Nicolas Schabanel, Guillaume Theyssier:

Intrinsic Simulations between Stochastic Cellular Automata. 208-224 - Anaël Grandjean, Gaétan Richard, Véronique Terrier:

Linear functional classes over cellular automata. 177-193 - Simon Wacker, Thomas Worsch:

Phase Space Invertible Asynchronous Cellular Automata. 236-254 - Gabriele Fici

, Francesca Fiorenzi:
Topological properties of cellular automata on trees. 255-266 - Mathilde Noual, Damien Regnault, Sylvain Sené:

Boolean networks synchronism sensitivity and XOR circulant networks convergence time. 37-52 - Martin Kutrib

, Andreas Malcher
:
Transductions Computed by One-Dimensional Cellular Automata. 194-207 - Emmanuel Jeandel, Nicolas Rolin:

Fixed Parameter Undecidability for Wang Tilesets. 69-85 - Alberto Dennunzio, Pietro di Lena

, Luciano Margara
:
Strictly Temporally Periodic Points in Cellular Automata. 225-235 - Katsunobu Imai, Takahiro Hatsuda, Victor Poupet, Kota Sato:

A Universal Semi-totalistic Cellular Automaton on Kite and Dart Penrose Tilings. 267-278 - Luca Bonomi, Li Xiong, Rui Chen, Benjamin C. M. Fung:

Privacy Preserving Record Linkage via grams Projections. - Hyonil Kim, Choe Changil:

A Method for Selecting Noun Sense using Co-occurrence Relation in English-Korean Translation. - K. S. Kuppusamy, Gnanasekaran Aghila:

Multidimensional Web Page Evaluation Model Using Segmentation And Annotations. - Pradeesha Ashok, Umair Azmi, Sathish Govindarajan:

Small Strong Epsilon Nets. - Marat V. Burnashev, Hirosuke Yamamoto:

On Reliability Function of Gaussian Channel with Noisy Feedback: Zero Transmission Rate. - Yuchong Hu, Patrick P. C. Lee, Kenneth W. Shum:

Analysis and Construction of Functional Regenerating Codes with Uncoded Repair for Distributed Storage Systems. - Sudarshan Nandy

, Partha Pratim Sarkar, Achintya Das:
Analysis of a Statistical Hypothesis Based Learning Mechanism for Faster crawling. - (Withdrawn) Adaptive Energy Efficient Communications for Hybrid Aerial-Terrestrial Systems.

- Sergey V. Yakhontov:

Time- and space-efficient evaluation of the complex exponential function using series expansion. - Joshua Brody, Kasper Green Larsen:

Adapt or Die: Polynomial Lower Bounds for Non-Adaptive Dynamic Data Structures. - Venkatesan T. Chakaravarthy, Naga Praveen Kumar Katta, Monu Kedia, Ramakrishnan Rajamony, Aruna Ramanan, Yogish Sabharwal:

Mapping Strategies for the PERCS Architecture. - (Withdrawn) Ordered {AND, OR}-Decomposition and Binary-Decision Diagram.

- (Withdrawn) Energy Aware Routing in Heterogeneous Multi-Hop Wireless Networks.

- Wojciech Mazurczyk, Krzysztof Szczypiorski, Bartosz Jankowski:

Towards Steganography Detection Through Network Traffic Visualisation. - Amr Rizk, Zdravko Bozakov, Markus Fidler:

H-Probe: Estimating Traffic Correlations from Sampling and Active Network Probing. - Vasileios Lampos

:
Detecting Events and Patterns in Large-Scale User Generated Textual Streams with Statistical Learning Methods. - Gérard Wagener, Alexandre Dulaunoy, Radu State:

Torinj : Automated Exploitation Malware Targeting Tor Users. - Matthew Battey, Abhishek Parakh:

Efficient Quasigroup Block Cipher for Sensor Networks. - Lu Yang, Wei Zhang:

On Achievable Degrees of Freedom for MIMO X Channels. - Georg Hager, Jan Treibig, Johannes Habich, Gerhard Wellein:

Exploring performance and power properties of modern multicore chips via simple machine models. - Daniel N. Osherson, Scott Weinstein:

Quantified preference logic. - Alvin Cheung, Armando Solar-Lezama, Samuel Madden:

Using Program Synthesis for Social Recommendations. - Vincent Gripon, Vitaly Skachek, Michael G. Rabbat:

Forwarding Without Repeating: Efficient Rumor Spreading in Bounded-Degree Graphs. - Fulvio Forni, Rodolphe Sepulchre:

A differential Lyapunov framework for contraction analysis. - Leonid A. Levin:

Enumerable Distributions, Randomness, Dependence. - Andrea Campagna, Alan Guo, Ronitt Rubinfeld:

Local reconstructors and tolerant testers for connectivity and diameter. - Martin Kasparick, Gerhard Wunder:

Wireless Network Design Under Service Constraints. - Zhili Chen, Liusheng Huang, Wei Yang, Peng Meng, Haibo Miao:

More than Word Frequencies: Authorship Attribution via Natural Frequency Zoned Word Distribution Analysis. - Andreas Schutt, Thibaut Feydy, Peter J. Stuckey:

Explaining Time-Table-Edge-Finding Propagation for the Cumulative Resource Constraint. - Shun Watanabe:

Expurgation Exponent of Leaked Information in Privacy Amplification for Binary Sources. - Ehsan Saboori, Majid Rafigh, Alireza Nooriyan:

Analyzing the Dual-Path Peer-to-Peer Anonymous Approach. - Lei Zhou, Wei Yu:

Uplink Multicell Processing with Limited Backhaul via Successive Interference Cancellation. - Huasen Wu, Chenxi Zhu, Richard J. La, Xin Liu, Youguang Zhang:

Fast Adaptive S-ALOHA Scheme for Event-driven M2M Communications (Journal version). - Arif Nurwidyantoro, Edi Winarko:

Parallelization of Maximum Entropy POS Tagging for Bahasa Indonesia with MapReduce. - Marek Cygan, MohammadTaghi Hajiaghayi, Samir Khuller:

LP Rounding for k-Centers with Non-uniform Hard Capacities. - Saygun Onay:

Polar Codes for Nonasymmetric Slepian-Wolf Coding. - Atish Das Sarma, Anisur Rahaman Molla, Gopal Pandurangan, Eli Upfal:

Fast Distributed PageRank Computation. - Trshant Bhat, Sanjay Singh:

Variance based Scheduling to Improve the QoS Performance at the Cell Edge. - Bin Li, Hui Shen, David Tse:

An Adaptive Successive Cancellation List Decoder for Polar Codes with Cyclic Redundancy Check. - Francisco G. Serpa, Adam M. Graves, Artjay Javier:

Statistical Common Author Networks (SCAN). - Hisham A. H. Al-Khazali, Mohamad R. Askari:

Defect Diagnosis in Rotors Systems by Vibrations Data Collectors Using Trending Software. - Daniel Reem:

On the computation of zone and double zone diagrams. - Walaa M. Abd-Elhafiez, Wajeb Gharibi:

Color Image Compression Algorithm Based on the DCT Blocks. - Ashokkumar Ramalingam, Prabhu Dorairaj, Saranya Ramamoorthy:

Personal Safety Triggering System on Android Mobile Platform. - Christian Meilicke, Ondrej Sváb-Zamazal, Cássia Trojahn dos Santos, Ernesto Jiménez-Ruiz, José-Luis Aguirre, Heiner Stuckenschmidt, Bernardo Cuenca Grau:

Evaluating Ontology Matching Systems on Large, Multilingual and Real-world Test Cases. - Fatma Kalbat, Arafat Al-Dweik:

Low Complexity Space-Frequency MIMO OFDM System for Double-Selective Fading Channels. - Ezio Bartocci

, Luca Bortolussi:
Proceedings First International Workshop on Hybrid Systems and Biology, HSB 2012, Newcastle Upon Tyne, UK, 3rd September 2012. EPTCS 92, 2012 [contents] - Jakob L. Andersen, Christoph Flamm, Daniel Merkle, Peter F. Stadler:

Inferring Chemical Reaction Patterns Using Rule Composition in Graph Grammars. - Erick Chastain, Adi Livnat, Christos H. Papadimitriou, Umesh V. Vazirani:

Multiplicative Updates in Coordination Games and the Theory of Evolution. - Ehsan Saboori, Shahriar Mohammadi:

Anonymous Communication in Peer-to-Peer Networks for providing more Privacy and Security. - Manas Gaur:

Software Security analysis, static and dynamic testing in java and C environment, a comparative study. - Minji Kim, Thierry Klein, Emina Soljanin, João Barros, Muriel Médard:

Modeling Network Coded TCP: Analysis of Throughput and Energy Cost. - Razvi Doomun, Jayramsingh Doma, Sundeep Tengur:

AES-CBC Software Execution Optimization. - Santhosh Kumar, Jean-François Chamberland, Henry D. Pfister:

First-Passage Time and Large-Deviation Analysis for Erasure Channels with Memory. - Matthew S. Nokleby, Waheed U. Bajwa, A. Robert Calderbank, Behnaam Aazhang:

Toward Resource-Optimal Consensus over the Wireless Medium. - Chin Keong Ho, Patrick Ho Wang Fung, Sumei Sun:

Carrier Frequency Offset Estimation for Two-Way Relaying: Optimal Preamble and Estimator Design. - Preetha Theresa Joy, K. Poulose Jacob:

Cache Replacement Policies for Cooperative Caching in Mobile Ad hoc Networks. - Grigoriev Evgeny:

Impedance mismatch is not an "Objects vs. Relations" problem. - Maxime Crochemore, Costas S. Iliopoulos, Tomasz Kociumaka, Marcin Kubica, Jakub Pachocki, Jakub Radoszewski, Wojciech Rytter, Wojciech Tyczynski, Tomasz Walen:

A Note on Efficient Computation of All Abelian Periods in a String. - Pietro Murano, Tanvi Sethi:

Anthropomorphic User Interface Feedback in a Sewing Context and Affordances. - Alexei Yu. Uteshev:

Analytical Solution for the Generalized Fermat-Torricelli Problem. - Nadia Polikarpova, Carlo A. Furia, Yu Pei, Yi Wei, Bertrand Meyer:

What Good Are Strong Specifications? - Bob Diertens:

Concurrent Models for Object Execution. - Pankaj K. Agarwal, Jirí Matousek, Micha Sharir:

On Range Searching with Semialgebraic Sets II. - Chengwen Xing, Zesong Fei, Shaodan Ma, Jingming Kuang, Yik-Chung Wu:

A Unified Linear MSE Minimization MIMO Beamforming Design Based on Quadratic Matrix Programming. - Margareta Ackerman, Simina Brânzei:

Research Quality, Fairness, and Authorship Order. - Seungahn Nah, Gregory D. Saxton:

Modeling the adoption and use of social media by nonprofit organizations. - Guodong Shi, Mikael Johansson, Karl Henrik Johansson:

How Agreement and Disagreement Evolve over Random Dynamic Networks. - Paul B. Slater:

Comparative Bi-stochastizations and Clusterings/Regionalizations of the 1995-2000 U. S. Intercounty Migration Network. - Mahsa Badami, Ali Hamzeh, Sattar Hashemi:

A Novel Strategy Selection Method for Multi-Objective Clustering Algorithms Using Game Theory. - Vivek Vishal, Sagar Gugwad, Sanjay Singh:

Modeling and Verification of Agent based Adaptive Traffic Signal using Symbolic Model Verifier. - V. Venkata Ramana, A. Rama Mohan Reddy, K. Chandra Sekaran:

Bio Inspired Approach to Secure Routing in MANETs. - Toshiro Kubota:

Contour Completion Around a Fixation Point. - Haimonti Dutta, William Chan, Deepak Shankargouda, Manoj Pooleery, Axinia Radeva, Kyle Rego, Boyi Xie, Rebecca J. Passonneau, Austin Lee, Barbara Taranto:

Leveraging Subjective Human Annotation for Clustering Historic Newspaper Articles. - Marina Drosou, Evaggelia Pitoura:

DisC Diversity: Result Diversification based on Dissimilarity and Coverage. - Marko Seslija, Jacquelien M. A. Scherpen, Arjan van der Schaft:

Explicit Simplicial Discretization of Distributed-Parameter Port-Hamiltonian Systems. - Brij B. Gupta, Ramesh Chandra Joshi, Manoj Misra:

Distributed Denial of Service Prevention Techniques. - Alon Gonen, Sivan Sabato, Shai Shalev-Shwartz:

Efficient Pool-Based Active Learning of Halfspaces. - Zadia Codabux-Rossan, M. Razvi Doomun:

AES CCMP Algorithm with N-Way Interleaved Cipher Block Chaining. - Lars Birkedal

, Rasmus Ejlers Møgelberg, Jan Schwinghammer, Kristian Støvring:
First steps in synthetic guarded domain theory: step-indexing in the topos of trees. - Kai Chen, Kai Niu, Jiaru Lin:

Improved Successive Cancellation Decoding of Polar Codes. - Piyush Shrivastava:

Modeling and Control of CSTR using Model based Neural Network Predictive Control. - Muhammad Rafi, Sundus Hassan, Mohammad Shahid Shaikh:

Content-based Text Categorization using Wikitology. - Marc Lelarge, Hang Zhou:

Constant-Time Algorithms for Monomer-Dimer Systems on Bounded Degree Graphs. - Alexandre Benoît, Alin Bostan, Joris van der Hoeven:

Quasi-optimal multiplication of linear differential operators. - Tommy Nguyen, Boleslaw K. Szymanski:

Using Location-Based Social Networks to Validate Human Mobility and Relationships Models. - Luis Barba, Matias Korman, Stefan Langerman, Kunihiko Sadakane, Rodrigo I. Silveira:

Space-Time Trade-offs for Stack-Based Algorithms. - Vincent Christlein, Christian Riess, Johannes Jordan, Corinna Riess, Elli Angelopoulou:

An Evaluation of Popular Copy-Move Forgery Detection Approaches. - Minas Gjoka, Maciej Kurant, Athina Markopoulou:

2.5K-Graphs: from Sampling to Generation. - Qiong Liu:

A Survey of Recent View-based 3D Model Retrieval Methods. - Hisham A. H. Al-Khazali, Mohamad R. Askari:

Calculations of Frequency Response Functions (FRF) Using Computer Smart Office Software and Nyquist Plot under Gyroscopic Effect Rotation. - Qiang Qiu, Vishal M. Patel, Rama Chellappa:

Information-theoretic Dictionary Learning for Image Classification. - Bouaguel Waad, Ghazi Bel Mufti:

An improvement direction for filter selection techniques using information theory measures and quadratic optimization. - Mohammadreza Doostmohammadian, Usman A. Khan:

On the genericity properties in networked estimation: Topology design and sensor placement. - Liliana Borcea, Thomas Callaghan, George Papanicolaou:

Synthetic Aperture Radar Imaging and Motion Estimation via Robust Principle Component Analysis. - Jian Zhang, Shaohui Liu, Debin Zhao:

Improved Total Variation based Image Compressive Sensing Recovery by Nonlocal Regularization. - Jian Zhang, Ruiqin Xiong, Chen Zhao, Siwei Ma, Debin Zhao:

Exploiting Image Local And Nonlocal Consistency For Mixed Gaussian-Impulse Noise Removal. - Chris Thornton, Frank Hutter, Holger H. Hoos, Kevin Leyton-Brown:

Auto-WEKA: Automated Selection and Hyper-Parameter Optimization of Classification Algorithms. - Jian Zhang, Chen Zhao, Ruiqin Xiong, Siwei Ma, Debin Zhao:

Image Super-Resolution via Dual-Dictionary Learning And Sparse Representation. - Sergio Castillo-Perez, Joaquín García-Alfaro:

On the Use of Latency Graphs for the Construction of Tor Circuits. - Steven Meyer:

Adding Methodological Testing to Naur's Anti-formalism. - Pavlos S. Efraimidis, Remous-Aris Koutsiamanis:

On Money as a Means of Coordination between Network Packets. - Xavier Molinero, Fabián Riquelme, Maria J. Serna:

Social Influence as a Voting System: a Complexity Analysis of Parameters and Properties. - A. F. M. Sultanul Kabir, Razib Hayat Khan, Abul Ahsan Md. Mahmudul Haque, Mohammad Saiful Islam Mamun:

WiMAX or Wi-Fi: The Best Suited Candidate Technology for Building Wireless Access Infrastructure. - Sumanta Saha, Md. Safiqul Islam, Md. Sakhawat Hossen, Mohammad Saiful Islam Mamun:

A Novel Overlay IDS For Wireless Sensor Networks. - Mohammad Saiful Islam Mamun, A. F. M. Sultanul Kabir:

Hierarchical Design Based Intrusion Detection System For Wireless Ad hoc Network. - Francisco Heron de Carvalho Junior, Rafael Dueire Lins:

Haskell_#: Coordinating Functional Processes. - A. F. M. Sultanul Kabir, Mohammad Saiful Islam Mamun:

Graphical Query Builder in Opportunistic Sensor Networks to discover Sensor Information. - Jingyan Wang:

MultiG-Rank: Multiple graph regularized protein ranking. - Tzu-Han Chou, Stark C. Draper, Akbar M. Sayeed:

Secret Key Generation from Sparse Wireless Channels: Ergodic Capacity and Secrecy Outage. - Qi Chen, Hartmut Prautzsch:

General Midpoint Subdivision. - Tsvi Kopelowitz:

On-line Indexing for General Alphabets via Predecessor Queries on Subsets of an Ordered List. - Archana Vashisth, Iti Mathur, Nisheeth Joshi:

OntoAna: Domain Ontology for Human Anatomy. - Amy Fu, Parastoo Sadeghi, Muriel Médard:

Dynamic Rate Adaptation for Improved Throughput and Delay in Wireless Network Coded Broadcast. - Nima Taghipour, Daan Fierens, Guy Van den Broeck

, Jesse Davis, Hendrik Blockeel:
Lifted Variable Elimination: A Novel Operator and Completeness Results. - Igor G. Vladimirov, Ian R. Petersen:

State distributions and minimum relative entropy noise sequences in uncertain stochastic systems: the discrete time case. - Pritam Chanda, Aidong Zhang, Murali Ramanathan:

Algorithms for Efficient Mining of Statistically Significant Attribute Association Information. - Igor G. Vladimirov

, Ian R. Petersen:
Hardy-Schatten Norms of Systems, Output Energy Cumulants and Linear Quadro-Quartic Gaussian Control. - (Withdrawn) Joint-ViVo: Selecting and Weighting Visual Words Jointly for Bag-of-Features based Tissue Classification in Medical Images.

- Guanglei He, Zhihui Qin:

A New Algorithm for the Subtraction Games. - Kewen Liao, Hong Shen, Longkun Guo:

Constrained Fault-Tolerant Resource Allocation. - Vishnuvardhan Mannava, T. Ramesh:

Composite Design Pattern for Feature Oriented Service Injection and Composition of Web Services for Distributed Computing Systems with Service Oriented Architecture. - (Withdrawn) Discriminative Sparse Coding on Multi-Manifold for Data Representation and Classification.

- M. D. Sirajul Huque, C. Surekha, A. Kishore Kumar, Sri Latha:

Modelling Dead Rocking In Online Multiplayer Games. - (Withdrawn) Adaptive Graph via Multiple Kernel Learning for Nonnegative Matrix Factorization.

- Doug Bruce, Pras Pathmanathan, Jonathan P. Whiteley:

Modelling the effect of gap junctions on tissue-level cardiac electrophysiology. 1-15 - Romain Testylier, Thao Dang:

Analysis of parametric biological models with non-linear dynamics. 16-29 - Anastasis Georgoulas

, Allan Clark, Andrea Ocone, Stephen Gilmore, Guido Sanguinetti
:
A subsystems approach for parameter estimation of ODE models of hybrid systems. 30-41 - Nicolas Mobilia, Alexandre Donzé, Jean Marc Moulis

, Eric Fanchon:
A Model of the Cellular Iron Homeostasis Network Using Semi-Formal Methods for Parameter Space Exploration. 42-57 - Alberto Casagrande, Tommaso Dreossi, Carla Piazza

:
Hybrid Automata and ε-Analysis on a Neural Oscillator. 58-72 - Petr Dluhos

, Lubos Brim, David Safránek
:
On Expressing and Monitoring Oscillatory Dynamics. 73-87 - Vincent Noel

, Dima Grigoriev, Sergei Vakulenko, Ovidiu Radulescu
:
Hybrid models of the cell cycle molecular machinery. 88-105 - Giulio Caravagna

, Alex Graudenzi
, Marco Antoniotti, Giancarlo Mauri
, Alberto d'Onofrio
:
Effects of delayed immune-response in tumor immune-system interplay. 106-121 - Alexandre David, Dehui Du, Kim G. Larsen

, Axel Legay, Marius Mikucionis
, Danny Bøgsted Poulsen
, Sean Sedwards:
Statistical Model Checking for Stochastic Hybrid Systems. 122-136 - Loes Olde Loohuis, Andreas Witzel, Bud Mishra:

Towards Cancer Hybrid Automata. 137-151 - Pietro Liò

, Emanuela Merelli, Nicola Paoletti
:
Disease processes as hybrid dynamical systems. 152-166 - Vishal Vadgama, Bhavin Tanti, Chirag Modi, Nishant Doshi:

A novel approach for e-payment using virtual password system. - Ali Marandi, Mahdi Faghi Imani, Kavé Salamatian:

Optimization of Bloom Filter Parameters for Practical Bloom Filter Based Epidemic Forwarding in DTNs. - Igor S. Sergeev:

Upper bounds for the formula size of the majority function. - Saravanan Thirumuruganathan, Nan Zhang, Gautam Das:

Digging Deeper into Deep Web Databases by Breaking Through the Top-k Barrier. - Francisco Heron de Carvalho Junior, Rafael Dueire Lins:

Coordination Level Modeling and Analysis of Parallel Programs using Petri Nets. - Steve Kruba, Steven Baynes, Robert Hyer:

BPM, Agile, and Virtualization Combine to Create Effective Solutions. - Steve Kruba:

Significance of Rapid Solutions Development to Business Process Management. - (Withdrawn) Trace transform based method for color image domain identification.

- Nouredine Melab, Imen Chakroun, Mohand-Said Mezmaz, Daniel Tuyttens:

A GPU-accelerated Branch-and-Bound Algorithm for the Flow-Shop Scheduling Problem. - Amos Fiat, Anna R. Karlin, Elias Koutsoupias, Angelina Vidali:

Approaching Utopia: Strong Truthfulness and Externality-Resistant Mechanisms. - Manfred Droste, Heiko Vogler:

The Chomsky-Schützenberger Theorem for Quantitative Context-Free Languages. - Jay Gholap:

Performance Tuning Of J48 Algorithm For Prediction Of Soil Fertility. - Philipp Schaer, Daniel Hienert, Frank Sawitzki, Andias Wira-Alam, Thomas Lüke:

Dealing with Sparse Document and Topic Representations: Lab Report for CHiC 2012. - Zhifang Zhang:

Network Coding Based on Chinese Remainder Theorem. - Michael J. Gagen:

Using strong isomorphisms to construct game strategy spaces. - Stefano Rini, Carolin Huppert:

On the Capacity of the Cognitive Interference Channel with a Common Cognitive Message. - Marc Lelarge:

Coordination in Network Security Games: a Monotone Comparative Statics Approach. - Behrooz Kamary Aliabadi, Claude Berrou, Vincent Gripon, Xiaoran Jiang:

Learning sparse messages in networks of neural cliques. - Gowri Shankar Ramaswamy, F. Sagayaraj Francis:

Concept driven framework for Latent Table Discovery. - Denis Barthou

, Gilbert Grosdidier, Michael Kruse
, Olivier Pène, Claude Tadonki:
QIRAL: A High Level Language for Lattice QCD Code Generation. - Amir M. Ben-Amram, Samir Genaim:

On the Linear Ranking Problem for Integer Linear-Constraint Loops. - Morteza Mardani, Gonzalo Mateos, Georgios B. Giannakis:

Dynamic Anomalography: Tracking Network Anomalies via Sparsity and Low Rank. - Zhengzheng Xiang, Meixia Tao, Jianhua Mo, Xiaodong Wang:

Degrees of Freedom for MIMO Two-Way X Relay Channel. - Nishal Pradeepkumar Shah:

Recent Technological Advances in Natural Language Processing and Artificial Intelligence. - Arvind Yedla, Yung-Yih Jian, Phong S. Nguyen, Henry D. Pfister:

A Simple Proof of Threshold Saturation for Coupled Vector Recursions. - Eugene A. Maximov, Alexander P. Kurdyukov, Igor G. Vladimirov:

Anisotropic Norm Bounded Real Lemma for Linear Discrete Time Varying Systems. - Iztok Fister Jr., Tomaz Kosar, Marjan Mernik, Iztok Fister:

Upgrading EasyTime: from a textual to a visual language. - Ashraf Mohammed Iqbal, Abidalrahman Moh'd, Zahoor Ali Khan:

Semi-supervised Clustering Ensemble by Voting. - Paolo Boldi, Francesco Bonchi, Aristides Gionis, Tamir Tassa:

Injecting Uncertainty in Graphs for Identity Obfuscation. - Yingzhen Li, Ye Zhang:

Generating ordered list of Recommended Items: a Hybrid Recommender System of Microblog. - Xiaojing Shen, Pramod K. Varshney, Yunmin Zhu:

Robust Distributed Maximum Likelihood Estimation with Quantized Data. - Joseph M. Hellerstein, Christopher Ré, Florian Schoppmann, Daisy Zhe Wang, Eugene Fratkin, Aleksander Gorajek, Kee Siong Ng, Caleb Welton, Xixuan Feng, Kun Li, Arun Kumar:

The MADlib Analytics Library or MAD Skills, the SQL. - Avrilia Floratou, Nikhil Teletia, David J. DeWitt, Jignesh M. Patel, Donghui Zhang:

Can the Elephants Handle the NoSQL Onslaught? - Tilmann Rabl, Mohammad Sadoghi, Hans-Arno Jacobsen, Sergio Gómez-Villamor, Victor Muntés-Mulero, Serge Mankowskii:

Solving Big Data Challenges for Enterprise Application Performance Management. - Avraham Shinnar, David Cunningham, Benjamin Herta, Vijay A. Saraswat:

M3R: Increased performance for in-memory Hadoop jobs. - Philipp Rösch, Lars Dannecker, Gregor Hackenbroich, Franz Faerber:

A Storage Advisor for Hybrid-Store Databases. - Michal Switakowski, Peter Boncz, Marcin Zukowski:

From Cooperative Scans to Predictive Buffer Management. - George Lee, Jimmy Lin, Chuang Liu, Andrew Lorek, Dmitriy V. Ryaboy:

The Unified Logging Infrastructure for Data Analytics at Twitter. - Tomas Talius, Robin Dhamankar, Andrei Dumitrache, Hanuma Kodavalla:

Transaction Log Based Application Error Recovery and Point In-Time Query. - Andrew Lamb, Matt Fuller, Ramakrishna Varadarajan, Nga Tran, Ben Vandiver, Lyric Doshi, Chuck Bear:

The Vertica Analytic Database: C-Store 7 Years Later. - Yanpei Chen, Sara Alspaugh, Randy H. Katz:

Interactive Analytical Processing in Big Data Systems: A Cross-Industry Study of MapReduce Workloads. - Wang Lam, Lu Liu, STS Prasad, Anand Rajaraman, Zoheb Vacheri, AnHai Doan:

Muppet: MapReduce-Style Processing of Fast Data. - Gabriela Jacques-Silva, Bugra Gedik, Rohit Wagle, Kun-Lung Wu, Vibhore Kumar:

Building User-defined Runtime Adaptation Routines for Stream Processing Applications. - Junchen Jiang, Hongji Bao, Edward Y. Chang, Yuqian Li:

MOIST: A Scalable and Parallel Moving Object Indexer with School Tracking. - Dan R. K. Ports, Kevin Grittner:

Serializable Snapshot Isolation in PostgreSQL. - K. G. Preetha, A. Unnikrishnan, K. Poulose Jacob:

Performance improvement of multiple Connections in AODV with the concern of Node bandwidth. - Jesper Nederlof, Erik Jan van Leeuwen, Ruben van der Zwaan:

Reducing a Target Interval to a Few Exact Queries. - Enrico Siragusa, David Weese, Knut Reinert:

Fast and sensitive read mapping with approximate seeds and multiple backtracking. - Brian Macdonald

, Paulo Shakarian, Nicholas Howard, Geoffrey Moores:
Spreaders in the Network SIR Model: An Empirical Study. - Kyu-Young Whang, Tae-Seob Yun, Yeon-Mi Yeo, Il-Yeol Song, Hyuk-Yoon Kwon, In-Joong Kim:

ODYS: A Massively-Parallel Search Engine Using a DB-IR Tightly-Integrated Parallel DBMS. - Marcelo Serrano Zanetti, Emre Sarigöl, Ingo Scholtes, Claudio Juan Tessone, Frank Schweitzer:

A Quantitative Study of Social Organization in Open Source Software Communities. - Pol Blasco, Deniz Gündüz, Mischa Dohler:

A Learning Theoretic Approach to Energy Harvesting Communication System Optimization. - Ulrike Golas

, Thomas Soboll:
Proceedings Seventh ACCAT Workshop on Applied and Computational Category Theory, ACCAT 2012, Tallinn, Estonia, 1 April 2012. EPTCS 93, 2012 [contents] - M. Sreeraj, Sumam Mary Idicula:

An Online Character Recognition System to Convert Grantha Script to Malayalam. - Swaraj Bhat, Pradeep B. H., Keerthi S. Shetty, Sanjay Singh:

Formal Verification of Safety Properties for Ownership Authentication Transfer Protocol. - Aditi Gupta, Ponnurangam Kumaraguru, Ashish Sureka:

Characterizing Pedophile Conversations on the Internet using Online Grooming. - Natallia Kokash, António Ravara:

Proceedings 11th International Workshop on Foundations of Coordination Languages and Self Adaptation, FOCLASA 2012, Newcastle, U.K., September 8, 2012. EPTCS 91, 2012 [contents] - Kamesh Namuduri, Li Li, Mahadevan Gomathisankaran, Murali R. Varanasi:

The Chief Security Officer Problem. - Joshua C. Chang, Tom Chou:

Iterative graph cuts for image segmentation with a nonlinear statistical shape prior. - Li Li, Kamesh Namuduri, Shengli Fu:

Cooperative Communication Based on Random Beamforming Strategy in Wireless Sensor Networks. - Wentao Huang, Tracey Ho, Michael Langberg, Jörg Kliewer:

On secure network coding with uniform wiretap sets. - Yanchao Yang, Ganesh Sundaramoorthi:

Modeling Shape, Appearance and Self-Occlusions for Articulated Object Tracking. - Hamed Saghaei:

A Novel Architecture for Antenna Arrangement in Wireless Cellular CDMA Systems. - Qiang Qiu, Rama Chellappa:

A Unified Approach for Modeling and Recognition of Individual Actions and Group Activities. - Alexander Fish, Shamgar Gurevich, Ronny Hadani, Akbar M. Sayeed, Oded Schwartz:

Delay-Doppler Channel Estimation with Almost Linear Complexity. - Paul Cuff:

Distributed Channel Synthesis. - Feng Jiang, Jie Chen, A. Lee Swindlehurst:

Estimation in Phase-Shift and Forward Wireless Sensor Networks. - Roman Vetter, Norbert Stoop, Thomas Jenni, Falk K. Wittel, Hans J. Herrmann:

Subdivision Shell Elements with Anisotropic Growth. - Gabriel Keeble-Gagnère, Johan Nyström-Persson, Matthew I. Bellgard, Kenji Mizuguchi:

An Open Framework for Extensible Multi-Stage Bioinformatics Software. - Adamu Murtala Zungeru, Li-Minn Ang, S. R. S. Prabaharan, Kah Phooi Seng:

Radio Frequency Energy Harvesting and Management for Wireless Sensor Networks. - Marcin Pilipczuk, Michal Pilipczuk:

Finding a maximum induced degenerate subgraph faster than 2^n. - Hamid G. Bafghi, Babak Seyfe:

On The Secrecy of the Cognitive Interference Channel with Channel State. - Greg Ver Steeg, Aram Galstyan:

Inferring Predictive Links in Social Media Using Content Transfer. - Sruti Gan Chaudhuri, Krishnendu Mukhopadhyaya:

Leader Election and Gathering for Asynchronous Transparent Fat Robots without Chirality. - Wojciech M. Zabolotny:

Efficient transmission of measurement data from FPGA to embedded system via Ethernet link. - Srinivasan Krishnaswamy, Harish K. Pillai:

On Multisequences and their extensions. - Hicham Gueddah:

Introduction of the weight edition errors in the Levenshtein distance. - Mohammad Golbabaee, Simon Arberet, Pierre Vandergheynst:

Compressive Source Separation: Theory and Methods for Hyperspectral Imaging. - Ahmed El Shafie:

Optimal Spectrum Access for Cognitive Radios. - (Withdrawn) Optimal Planar Range Skyline Reporting with Linear Space in External Memory.

- Yufei Tao:

On Top-k Search and Range Reporting. - Elsayed Mohamed Elsayed Ahmed, M. I. Shehata, Hala A. A. El-Saka:

On Dynamical Cournot Game on a Graph. - Alexandre Bartel, Jacques Klein, Martin Monperrus, Kevin Allix, Yves Le Traon:

Improving Privacy on Android Smartphones Through In-Vivo Bytecode Instrumentation. - Alain Finkel, Jean Goubault-Larrecq:

Forward Analysis for WSTS, Part II: Complete WSTS. - Matús Medo:

Network-based information filtering algorithms: ranking and recommendation. - Loet Leydesdorff, Stasa Milojevic:

Scientometrics. - J. Slobbe, S. L. C. Verberkt:

Hacktivists: Cyberterrorists or Online Activists? - Michail N. Giannakos, Patrick Mikalef:

In the Face (book) of Social Learning. - Raphael Poss:

SL: a "quick and dirty" but working intermediate language for SVP systems. - Norbert Fogarasi, Kalman Tornai, János Levendovszky:

A novel Hopfield neural network approach for minimizing total weighted tardiness of jobs scheduled on identical machines. - Jeremiah Blocki, Avrim Blum, Anupam Datta, Or Sheffet:

Differentially Private Data Analysis of Social Networks via Restricted Sensitivity. - Tichakorn Wongpiromsarn, Nan Xiao, Keyou You, Kai Sim, Lihua Xie, Emilio Frazzoli, Daniela Rus:

Road Pricing for Spreading Peak Travel: Modeling and Design. - Joakim Bjørk, Dave Clarke, Einar Broch Johnsen, Olaf Owe

:
A Type-Safe Model of Adaptive Object Groups. 1-15 - Minas Charalambides

, Peter Dinges, Gul Agha:
Parameterized Concurrent Multi-Party Session Types. 16-30 - Gabriel Ciobanu

, Ross Horne
:
A Provenance Tracking Model for Data Updates. 31-44 - M. Usman Iftikhar, Danny Weyns

:
A Case Study on Formal Verification of Self-Adaptive Behaviors in a Decentralized System. 45-62 - Janusz A. Brzozowski, Baiyu Li:

Syntactic Complexity of R- and J-Trivial Regular Languages. - Oner Orhan, Deniz Gündüz, Elza Erkip:

Throughput Maximization for an Energy Harvesting Communication System with Processing Cost. - Yin Sun, Can Emre Koksal, Ness B. Shroff:

Capacity of Compound MIMO Channels with Additive Uncertainty. - Shalini Gupta, Avdhesh Gupta, Meena Sachdeva:

SOA Framework for Integrated Business Value Chain Actions. - Francis Maes, David Lupien St-Pierre, Damien Ernst:

Monte Carlo Search Algorithm Discovery for One Player Games. - Yoshiyuki Kabashima, Mikko Vehkaperä, Saikat Chatterjee:

Typical l1-recovery limit of sparse vectors represented by concatenations of random orthogonal matrices. - Willi-Hans Steeb, Yorick Hardy:

Hamilton Operators, Discrete Symmetries, Brute Force and SymbolicC++. - Charles Morisset:

Implementing Access Control Markov Decision Processes with GLPK/GMPL. - (Withdrawn) Optimal Charging of Electric Vehicles in Smart Grid: Characterization and Valley-Filling Algorithms.

- Surat Teerapittayanon, Kerim Fouli, Muriel Médard, Marie-José Montpetit, Xiaomeng Shi, Ivan Seskar, Abhimanyu Gosain:

Network Coding as a WiMAX Link Reliability Mechanism. - Tobias Jung, Louis Wehenkel, Damien Ernst, Francis Maes:

Optimized Look-Ahead Tree Policies: A Bridge Between Look-Ahead Tree Policies and Direct Policy Search. - Sibi Raj B. Pillai, Bikash Kumar Dey, Yash Deshpande, Krishnamoorthy Iyer:

Power Controlled Adaptive Sum-Capacity of Fading MACs with Distributed CSI. - Jae Won Yoo, Tie Liu, Shlomo Shamai, Chao Tian:

Worst-Case Expected-Capacity Loss of Slow-Fading Channels. - Husnabad Venkateswara Reddy, S. Viswanadha Raju, B. Ramasubba Reddy:

Comparing N-Node Set Importance Representative results with Node Importance Representative results for Categorical Clustering: An exploratory study. - Firouz Abdullah Al-Wassai, N. V. Kalyankar:

The Segmentation Fusion Method On10 Multi-Sensors. - Lewis Tseng, Nitin H. Vaidya:

Parameter-independent Iterative Approximate Byzantine Consensus. - Piotr J. Flatau:

User Manual for the Complex Conjugate Gradient Methods Library CCGPAK 2.0. - Sonia Jahid, Nikita Borisov:

PIRATTE: Proxy-based Immediate Revocation of ATTribute-based Encryption. - Shaochuan Wu, Michael G. Rabbat:

Broadcast Gossip Algorithms for Consensus on Strongly Connected Digraphs. - Dushyantha A. Basnayaka, Peter J. Smith

, Philippa A. Martin:
The Effect of Macrodiversity on the Performance of Maximal Ratio Combining in Flat Rayleigh Fading. - Dushyantha A. Basnayaka, Peter J. Smith

, Philippa A. Martin:
Performance Analysis of Dual-User Macrodiversity MIMO Systems with Linear Receivers in Flat Rayleigh Fading. - Shlomi Dolev, Juan A. Garay, Niv Gilboa, Vladimir Kolesnikov, Yelena Yuditsky:

Efficient Private Distributed Computation on Unbounded Input Streams. - Camelia-Mihaela Pintea

:
A Unifying Survey of Reinforced, Sensitive and Stigmergic Agent-Based Approaches for E-GTSP. - Camelia-Mihaela Pintea

, Gloria Cerasela Crisan, Mihai Manea:
Parallel ACO with a Ring Neighborhood for Dynamic TSP. - Leslie Ann Goldberg, Mark Jerrum, Colin McQuillan:

Approximating the partition function of planar two-state spin systems. - Paul Hunter, Joël Ouaknine, James Worrell:

Expressive Completeness of Metric Temporal Logic. - Tomás Masopust:

A Note on Limited Pushdown Alphabets in Stateless Deterministic Pushdown Automata. - (Withdrawn) Identification of Probabilities of Languages.

- Abdelwaheb Marzouki, Xin Jin:

Precoder Design for Orthogonal Space-Time Block Coding based Cognitive Radio with Polarized Antennas. - Ender Konukoglu, Ben Glocker, Antonio Criminisi, Kilian M. Pohl:

WESD - Weighted Spectral Distance for Measuring Shape Dissimilarity. - Tamal K. Dey, Fengtao Fan, Yusu Wang:

Computing Topological Persistence for Simplicial Maps. - An H. Do, Po T. Wang, Christine E. King, Sophia N. Chun, Zoran Nenadic:

Brain-Computer Interface Controlled Robotic Gait Orthosis: A Case Report. - Masoud Bekravi

, Shahram Jamali, Gholam Shaker:
Defense against SYN-Flood Denial of Service Attacks Based on Learning Automata. - Daniel Reem:

On the existence of a neutral region. - Ravi Tandon, Syed Ali Jafar, Shlomo Shamai, H. Vincent Poor:

On the Synergistic Benefits of Alternating CSIT for the MISO BC. - Lewis Tseng, Nitin H. Vaidya:

Exact Byzantine Consensus in Directed Graphs. - Javad Ghaderi, R. Srikant:

Opinion Dynamics in Social Networks: A Local Interaction Game with Stubborn Agents. - Ian Post, Yinyu Ye:

The simplex method is strongly polynomial for deterministic Markov decision processes. - Wei Zhang

, Xiaogang Wang, Deli Zhao, Xiaoou Tang:
Graph Degree Linkage: Agglomerative Clustering on a Directed Graph. - Mohammad Saiful Islam Mamun, Atsuko Miyaji:

An Optimized Signature Verification System for Vehicle Ad hoc NETwork. - Do Van Tuan, Tran Dang Hien, Pham Van At:

A Novel Data Hiding Scheme for Binary Images. - Mikolaj Bojanczyk, Luc Segoufin, Howard Straubing:

Piecewise testable tree languages. - David A. McAllester, Petri Myllymäki:

Proceedings of the Twenty-Fourth Conference on Uncertainty in Artificial Intelligence (2008). - Ronald Parr, Linda C. van der Gaag:

Proceedings of the Twenty-Third Conference on Uncertainty in Artificial Intelligence (2007). - Fahiem Bacchus, Tommi S. Jaakkola:

Proceedings of the Twenty-First Conference on Uncertainty in Artificial Intelligence (2005). - Rina Dechter, Thomas S. Richardson:

Proceedings of the Twenty-Second Conference on Uncertainty in Artificial Intelligence (2006). - Max Chickering, Joseph Y. Halpern:

Proceedings of the Twentieth Conference on Uncertainty in Artificial Intelligence (2004). - Katherine Edwards, Andrew D. King:

A superlocal version of Reed's Conjecture. - Yeow Meng Chee, Huaxiong Wang, Liang Feng Zhang:

On Bringer-Chabanne EPIR Protocol for Polynomial Evaluation. - Liang Feng Zhang:

On the Eigenvalues of Certain Matrices Over $\mathbb{Z}_m$. - Muhammad Javed, Bashir Ahmad, Zafar Abbas, Allah Nawaz, Muhammad Ali Abid, Ihsan Ullah:

Decreasing defect rate of test cases by designing and analysis for recursive modules of a program structure: Improvement in test cases. - Dusko Pavlovic:

Monoidal computer I: Basic computability by string diagrams. - Yuichiro Fujiwara, Vladimir D. Tonchev:

High-rate self-synchronizing codes. - Jaan Ubi:

General Managers Role in Balancing Subsidiary Between Internal Competition and Knowledge Sharing. - Tsvi Kopelowitz, Robert Krauthgamer:

Faster Clustering via Preprocessing. - Chao Li, Daniel Yang Li, Gerome Miklau, Dan Suciu:

A Theory of Pricing Private Data. - Erich Grädel, Jouko A. Väänänen:

Dependence and Independence. - Antonia M. Tulino, Giuseppe Caire, Sergio Verdú, Shlomo Shamai:

Support Recovery with Sparsely Sampled Free Random Matrices. - Peter J. Smith

, Pawel A. Dmochowski, Himal A. Suraweera, Mansoor Shafi:
The Effects of Limited Channel Knowledge on Cognitive Radio System Capacity. - Shrinivas Kudekar, Tom Richardson, Rüdiger L. Urbanke:

Wave-Like Solutions of General One-Dimensional Spatially Coupled Systems. - Holger Boche, Brendan Farrell:

On the Peak-to-Average Power Ratio Reduction Problem for Orthogonal Transmission Schemes. - Holger Boche, Brendan Farrell, Michel Ledoux, Moritz Wiese:

Expected Supremum of a Random Linear Combination of Shifted Kernels. - Paolo Magrassi:

How Non-linearity will Transform Information Systems. - Zoltán Fülöp, Heiko Vogler:

Characterizing Weighted MSO for Trees by Branching Transitive Closure Logics. - Zoltán Fülöp, Heiko Vogler:

Forward and Backward Application of Symbolic Tree Transducers. - (Withdrawn) A hybrid ACO approach to the Matrix Bandwidth Minimization Problem.

- Camelia-Mihaela Pintea

, Camelia Chira, D. Dumitrescu:
New results of ant algorithms for the Linear Ordering Problem. - Camelia-Mihaela Pintea

, Camelia Chira, D. Dumitrescu, Petrica C. Pop:
Sensitive Ants in Solving the Generalized Vehicle Routing Problem. - Petr A. Golovach, Pinar Heggernes, Dieter Kratsch, Yngve Villanger:

Generating All Minimal Edge Dominating Sets with Incremental-Polynomial Delay. - Salah A. Aly:

A Missing and Found Recognition System for Hajj and Umrah. - Camelia-Mihaela Pintea

, D. Dumitrescu:
Distributed Pharaoh System for Network Routing. - Yen-Cheng Liu, Ching-Wei Chen, Yu T. Su:

New Constructions of Zero-Correlation Zone Sequences. - Amy Poh Ai Ling, Kokichi Sugihara, Masao Mukaidono:

The Japanese Smart Grid Initiatives, Investments, and Collaborations. - Victor Marsault

, Jacques Sakarovitch:
On sets of numbers rationally represented in a rational base number system. - Alan Guo, Madhu Sudan:

New affine-invariant codes from lifting. - Hajime Matsui:

Fast Erasure-and-Error Decoding and Systematic Encoding of a Class of Affine Variety Codes. - Jaan Ubi, Innar Liiv, Evald Ubi, Leo Vohandu:

Data mining the MNC like internal co-opetition duality in a university context. - Bing-Rong Lin, Daniel Kifer:

A Framework for Extracting Semantic Guarantees from Privacy. - Zhongwei Tang, Alexey Castrodad, Mariano Tepper, Guillermo Sapiro:

Are You Imitating Me? Unsupervised Sparse Modeling for Group Activity Analysis from a Single Video. - Antonis Sidiropoulos:

Finding Communities in Site Web-Graphs and Citation Graphs. - Serhat Nazim Avci, Ender Ayanoglu:

Coded Path Protection Part 1: Efficient Conversion of Sharing to Coding. - Serhat Nazim Avci, Ender Ayanoglu:

Coded Path Protection Part 2: Design, Implementation, and Performance. - Emmanuel Boidot, Eric Feron:

Planning Random path distributions for ambush games in unstructured environments. - Huiwei Lv, Guangming Tan, Mingyu Chen, Ninghui Sun:

Compression and Sieve: Reducing Communication in Parallel Breadth First Search on Distributed Memory Systems. - Gabriela Czibula, Gloria Cerasela Crisan, Camelia-Mihaela Pintea

, István Gergely Czibula:
Soft Computing approaches on the Bandwidth Problem. - Alireza Nemaney Pour, Raheleh Kholghi, Soheil Behnam Roudsari:

Minimizing the Time of Spam Mail Detection by Relocating Filtering System to the Sender Mail Server. - Elina Eidkhani, Melisa Hajyvahabzadeh, S. Anahita Mortazavi, Alireza Nemaney Pour:

CRAW: Combination of Re-Keying and Authentication in Wireless Networks for Secure Multicast Increasing Efficiency of Member Join/Leave and Movement. - Melisa Hajyvahabzadeh, Elina Eidkhani, S. Anahita Mortazavi, Alireza Nemaney Pour:

An Efficient Group Key Management Using Code for Key Calculation for Simultaneous Join/Leave: CKCS. - M. Razvi Doomun, K. M. Sunjiv Soyjaudah:

Route Extrapolation for Source and Destination Camouflage in Wireless Ad Hoc Networks. - M. Razvi Doomun, K. M. Sunjiv Soyjaudah:

Modified Temporal Key Integrity Protocol For Efficient Wireless Network Security. - Sebastian Eggert, Henning Schnoor, Thomas Wilke:

Dynamic Noninterference: Consistent Policies, Characterizations and Verification. - Jean Cardinal, Gwenaël Joret:

Hitting all Maximal Independent Sets of a Bipartite Graph. - Ahmed El Shafie, Ahmed K. Sultan:

Cooperative Cognitive Relaying with Ordered Cognitive Multiple Access. - Shlomi Dolev, Omri Liba, Elad Michael Schiller:

Self-Stabilizing Byzantine Resilient Topology Discovery and Message Delivery. - Christos Dimitrakakis, Aikaterini Mitrokotsa:

Near-Optimal Node Blacklisting in Adversarial Networks. - Alexander G. Churbanov, Petr N. Vabishchevich:

Numerical Methods for Solving Convection-Diffusion Problems. - Christopher M. De Vries, Shlomo Geva, Andrew Trotman:

Document Clustering Evaluation: Divergence from a Random Baseline. - Ahmed El Shafie, Ahmed K. Sultan:

Optimal Random Access and Random Spectrum Sensing for an Energy Harvesting Cognitive Radio. - Qingsi Wang, Mingyan Liu, Rahul Jain:

Dynamic Pricing of Power in Smart-Grid Networks. - Sandeep Hosangadi:

Distance Measures for Sequences. 


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID