


Остановите войну!
for scientists:


default search action
CoRR, August 2013
- Masaaki Nagahara, Daniel E. Quevedo, Jan Østergaard:
Packetized Predictive Control for Rate-Limited Networks via Sparse Representation. - Ryan K. Williams, Andrea Gasparri, Bhaskar Krishnamachari:
Route Swarm: Wireless Network Optimization through Mobility. - Ralph Tanbourgi, Sarabjot Singh, Jeffrey G. Andrews, Friedrich K. Jondral:
A Tractable Model for Non-Coherent Joint-Transmission Base Station Cooperation. - David J. Galas, Nikita A. Sakhanenko, Benjamin Keller:
On Lattices and the Dualities of Information Measures. - Kaiwen Zhang, Hans-Arno Jacobsen:
SDN-like: The Next Generation of Pub/Sub. - David Eppstein:
Drawing Arrangement Graphs In Small Grids, Or How To Play Planarity. - Wei Wang, Baochun Li, Ben Liang:
Dominant Resource Fairness in Cloud Computing Systems with Heterogeneous Servers. - Yinglei Song:
An Improved Parameterized Algorithm for the Independent Feedback Vertex Set Problem. - Alex Pappachen James, Linu Rose V. J. Francis, Dinesh Sasi Kumar:
Resistive Threshold Logic. - Gan Zheng, Ioannis Krikidis, Jiangyuan Li, Athina P. Petropulu, Björn E. Ottersten:
Improving Physical Layer Secrecy Using Full-Duplex Jamming Receivers. - Fatemeh Teymoori, Hamid Nabizadeh, Farzaneh Teymoori:
A new approach in position-based routing protocol using learning automata for vanets in city scenario. - Han-Lim Choi:
Mutual Information-Based Planning for Informative Windowed Forecasting of Continuous-Time Linear Systems. - Adam Noel, Karen C. Cheung, Robert Schober:
Optimal Receiver Design for Diffusive Molecular Communication with Flow and Additive Noise. - Reza Asvadi, Tad Matsumoto, Markku J. Juntti:
Joint Distributed Source-Channel Decoding for LDPC-Coded Binary Markov Sources. - A. Kornyushkin:
X- problem of value three. - Afonso S. Bandeira, Dustin G. Mixon:
Near-optimal phase retrieval of sparse vectors. - Ömer Demirel, Ivo F. Sbalzarini:
Balancing indivisible real-valued loads in arbitrary networks. - Torsten Grust, Alexander Ulrich:
First-Class Functions for First-Order Database Engines. - Michael Dinitz, Merav Parter:
Braess's Paradox in Wireless Networks: The Danger of Improved Technology. - Urs Niesen, Mohammad Ali Maddah-Ali:
Coded Caching with Nonuniform Demands. - László Egri, Pavol Hell, Benoît Larose, Arash Rafiey:
Space complexity of list H-colouring: a dichotomy. - Thomas Place, Lorijn van Rooijen, Marc Zeitoun:
Separating Regular Languages by Locally Testable and Locally Threshold Testable Languages. - Chris Unsworth, Patrick Prosser:
An n-ary Constraint for the Stable Marriage Problem. - Stephen Pasteris:
Fast Product Format. - Oren Salzman, Dan Halperin:
Asymptotically near-optimal RRT for fast, high-quality, motion planning. - Salim Ismail Al-Akhras, Sofiène Tahar, Gabriela Nicolescu, Michel Langevin, Pierre G. Paulin:
On the Verification of a WiMax Design Using Symbolic Simulation. 23-37 - Dara O. Shayda:
On Kolmogorov Complexity of Random Very Long Braided Words. - Jan A. Bergstra, Cornelis A. Middelburg:
Instruction sequence expressions for the secure hash algorithm SHA-256. - Tarik Anouari, Abdelkrim Haqiq:
Performance Analysis of VoIP Traffic in WiMAX using various Service Classes. - Roberto Amadini, Maurizio Gabbrielli, Jacopo Mauro:
Features for Building CSP Portfolio Solvers. - Helen Z. Margetts, Peter John, Scott A. Hale, Stéphane Reissfelder:
Leadership without Leaders? Starters and Followers in Online Collective Action. - Norbert Paul:
Applications of continuous functions in topological CAD data. - Ryoma Sin'ya:
Text Compression using Abstract Numeration System on a Regular Language. - António Ravara, Josep Silva:
Proceedings 9th International Workshop on Automated Specification and Verification of Web Systems, WWV 2013, Florence, Italy, 6th June 2013. EPTCS 123, 2013 [contents] - Qiang Qiu, Rama Chellappa:
Compositional Dictionaries for Domain Adaptive Face Recognition. - Qiang Qiu, Guillermo Sapiro:
Learning Robust Subspace Clustering. - Qiang Qiu, Guillermo Sapiro, Ching-Hui Chen:
Domain-invariant Face Recognition using Learned Low-rank Transformation. - Qiang Qiu, Zhuolin Jiang, Rama Chellappa:
Sparse Dictionary-based Attributes for Action Recognition and Summarization. - Leonardo Borba, Marcus Ritt:
Exact and Heuristic Methods for the Assembly Line Worker Assignment and Balancing Problem. - Przemyslaw A. Grabowicz, Luca Maria Aiello, Filippo Menczer:
Fast animation of large dynamic networks. - (Withdrawn) On the partition of R^n by hyperplanes.
- Mohamed Chakroun, Ali Wali, Adel M. Alimi:
MAS for video objects segmentation and tracking based on active contours and SURF descriptor. - John Gekas:
Social Data Mining through Distributed Mobile Sensing. - Shervan Fekri Ershad, Hadi Tajalizadeh, Shahram Jafari:
Design and Development of an Expert System to Help Head of University Departments. - Emanuel Aldea, Khurom H. Kiyani:
Hybrid Focal Stereo Networks for Pattern Analysis in Homogeneous Scenes. - Benjamin Graham:
Sparse arrays of signatures for online character recognition. - Mahdi Nasrullah Al-Ameen:
An Intelligent Fire Alert System using Wireless Mobile Communication. - Bo Li, Xin Zhao:
A New 3D Geometric Approach to Focus and Context Lens Effect Simulation. - Masaaki Nagahara, Clyde F. Martin:
L1-Optimal Splines for Outlier Rejection. - Masaaki Nagahara, Yutaka Yamamoto:
Optimal Discretization of Analog Filters via Sampled-Data H-infinity Control Theory. - Luca Cesari, Rosario Pugliese
, Francesco Tiezzi:
Blind-date Conversation Joining. 3-18 - Gabriel Ciobanu
, Ross Horne, Vladimiro Sassone:
Local Type Checking for Linked Data Consumers. 19-33 - Ivan Lanese, Fabrizio Montesi
, Gianluigi Zavattaro:
Amending Choreographies. 34-48 - James Smith:
Proving Properties of Rich Internet Applications. 49-63 - Michael J. Bannister, Zhanpeng Cheng, William E. Devanny, David Eppstein:
Superpatterns and Universal Point Sets. - Fuzhang Wu, Dong-Ming Yan, Weiming Dong, Xiaopeng Zhang, Peter Wonka:
Inverse Procedural Modeling of Facade Layouts. - Stefan Hetzl, Daniel Weller:
Expansion Trees with Cut. - Henri Bruno Razafindradina, Nicolas Raft Razafindrakoto, Paul Auguste Randriamitantsoa:
Improved Watermarking Scheme Using Discrete Cosine Transform and Schur Decomposition. - Tahina Ezéchiel Rakotondraina, Henri Bruno Razafindradina:
Authentication System Securing Index of Image using SVD and ECC. - Shenglong Zhou, Lingchen Kong, Ziyan Luo, Naihua Xiu:
New RIC Bounds via l_q-minimization with 0<q<=1 in Compressed Sensing. - Gregory Z. Gutin, Gabriele Muciaccia, Anders Yeo:
Parameterized Complexity of k-Chinese Postman Problem. - Bin Yang, Manohar Kaul, Christian S. Jensen:
Using Incomplete Information for Complete Weight Annotation of Road Networks - Extended Version. - Alessandro Crismani, Udo Schilcher, Günther Brandner, Stavros Toumpis, Christian Bettstetter:
Cooperative Relaying in Wireless Networks under Spatially Correlated Interference. - Paola Cattabriga:
A note on Türing's 1936. - James Cheney:
Static Enforceability of XPath-Based Access Control Policies. - Ehirim Henry:
The Effects Of Computerizing Banking Operations. - Stefanie Scherzinger, Meike Klettke, Uta Störl:
Managing Schema Evolution in NoSQL Data Stores. - Giovanni Indiveri, Gianfranco Parlangeli:
Further results on the observability analysis and observer design for single range localization in 3D. - Masaaki Nagahara, Daniel E. Quevedo, Jan Østergaard:
Sparsely-Packetized Predictive Control by Orthogonal Matching Pursuit. - Zack Fitzsimmons, Edith Hemaspaandra, Lane A. Hemaspaandra:
Control in the Presence of Manipulators: Cooperative and Competitive Cases. - Zhengjun Cao:
On Two Conversion Methods of Decimal-to-Binary. - M. A. Awad, Magdi Zakria Rashad, M. A. Elsoud, M. A. El-Dosuky:
Visualization of Job Scheduling in Grid Computers. - Günce Keziban Orman, Vincent Labatut, Hocine Cherifi:
Towards realistic artificial benchmark for community detection algorithms evaluation. - Abidin Kaya, Bahattin Yildiz, Irfan Siap:
New extremal and optimal binary self-dual codes from quadratic residue codes over f_2+uf_2+u^2f_2. - Eugene Goldberg, Mitesh Jain, Panagiotis Manolios:
Verification of Sequential Circuits by Tests-As-Proofs Paradigm. - Cheng Wang, Bhuvan Urgaonkar, Qian Wang, George Kesidis, Anand Sivasubramaniam:
Data Center Cost Optimization Via Workload Modulation Under Real-World Electricity Pricing. - Henri Bruno Razafindradina, Paul Auguste Randriamitantsoa, Nicolas Raft Razafindrakoto:
Compression d'images par SVD et sur-approximation des composantes de chrominance. - Hulya Seferoglu, Eytan H. Modiano:
TCP-Aware Backpressure Routing and Scheduling. - Michael E. Saks, C. Seshadhri:
Estimating the longest increasing sequence in polylogarithmic time. - Rick Ma, Samuel Cheng:
Zero-error Slepian-Wolf Coding of Confined Correlated Sources with Deviation Symmetry. - Masaaki Nagahara, Yutaka Yamamoto:
Frequency Domain Min-Max Optimization of Noise-Shaping Delta-Sigma Modulators. - Yupeng Fu, Kian Win Ong, Yannis Papakonstantinou:
Declarative Ajax Web Applications through SQL++ on a Unified Application State. - Jimmy S. J. Ren, Wei Wang, Jiawei Wang, Stephen Shaoyi Liao:
Exploring The Contribution of Unlabeled Data in Financial Sentiment Analysis. - Samet Atdag, Vincent Labatut:
A Comparison of Named Entity Recognition Tools Applied to Biographical Texts. - Syed Haani Masood:
Performance comparison of IEEE 802.11g and IEEE 802.11n in the presence of interference from 802.15.4 networks. - Xu Li, Xingming Sun, Quansheng Liu:
Image Integrity Authentication Scheme Based On Fixed Point Theory. - Jaydip Sen:
A Survey on Security and Privacy Protocols for Cognitive Wireless Sensor Networks. - Mark Graham, Scott A. Hale, Devin Gaffney:
Where in the World are You? Geolocation and Language Identification in Twitter. - Arpan Chattopadhyay, Marceau Coupechoux, Anurag Kumar:
As-You-Go Deployment of a Wireless Network with On-Line Measurements and Backtracking. - Johannes Borgström, Andrew D. Gordon, Michael Greenberg
, James Margetson, Jurgen Van Gael:
Measure Transformer Semantics for Bayesian Machine Learning. - Pushan Kumar Dutta
, Mrinal K. Naskar, O. P. Mishra:
Impact of two-level fuzzy cluster head selection model for wireless sensor network: An Energy efficient approach in remote monitoring scenarios. - Meisam Booshehri, Abbas Malekpour, Peter Luksch:
An Improving Method for Loop Unrolling. - Meisam Booshehri, Abbas Malekpour, Peter Luksch, Kamran Zamanifar, Shahdad Shariatmadari:
Ontology Enrichment by Extracting Hidden Assertional Knowledge from Text. - Alexey Potapov, Sergey Rodionov:
Universal Empathy and Ethical Bias for Artificial General Intelligence. - Debi Prasanna Acharjya, Debarati Bhattacharjee:
A Rough Computing based Performance Evaluation Approach for Educational Institutions. - Mohammad Noshad, Maïté Brandt-Pearce:
High-Speed Visible Light Indoor Networks Based on Optical Orthogonal Codes and Combinatorial Designs. - Stasa Milojevic:
Accuracy of simple, initials-based methods for author name disambiguation. - Alexander A. Semenov, Oleg Zaikin:
On estimating total time to solve SAT in distributed computing environments: Application to the SAT@home project. - Bing Wang, Puripant Ruchikachorn, Klaus Mueller:
SketchPadN-D: WYDIWYG Sculpting and Editing in High-Dimensional Space. - Ibrahim Sabek, Moustafa Youssef:
MonoStream: A Minimal-Hardware High Accuracy Device-free WLAN Localization System. - Yasunori Ishihara, Nobutaka Suzuki, Kenji Hashimoto, Shougo Shimizu, Toru Fujiwara:
XPath Satisfiability with Parent Axes or Qualifiers Is Tractable under Many of Real-World DTDs. - Monika Henzinger, Sebastian Krinninger, Danupon Nanongkai:
Dynamic Approximate All-Pairs Shortest Paths: Breaking the O(mn) Barrier and Derandomization. - James D. Wilson, Simi Wang, Peter J. Mucha, Shankar Bhamidi, Andrew B. Nobel:
A Testing Based Extraction Algorithm for Identifying Significant Communities in Networks. - Syed Haani Masood, Syed Ali Raza, Mark Coates:
Content Distribution Strategies in Opportunistic Networks. - Salman Zafar:
The Economic and Sustainability Future of Cellular Networks. - Masaaki Nagahara, Yutaka Yamamoto:
H-Infinity-Optimal Fractional Delay Filters. - Masaaki Nagahara, Takahiro Matsuda, Kazunori Hayashi:
Compressive Sampling for Remote Control Systems. - Matthias Thimm, Gabriele Kern-Isberner:
Stratified Labelings for Abstract Argumentation. - Ziyang Meng, Guodong Shi, Karl Henrik Johansson:
Multi-agent Systems with Compasses. - Onur Yilmaz:
Effects of Individual Success on Globally Distributed Team Performance. - Rohit Bhadauria, Rajdeep Borgohain, Abirlal Biswas, Sugata Sanyal:
Secure Authentication of Cloud Data Mining API. - Goutam Paul, Anupam Chattopadhyay, Chander Chandak:
Designing Parity Preserving Reversible Circuits. - Jian Zhao, Chuan Wu, Zongpeng Li:
Cost Minimization in Multiple IaaS Clouds: A Double Auction Approach. - Alex Graves:
Generating Sequences With Recurrent Neural Networks. - Yanfeng Geng, Christos G. Cassandras:
Quasi-dynamic Traffic Light Control for a Single Intersection. - Bo Li:
A Survey of Spline-based Volumetric Data Modeling Framework and Its Applications. - Bo Li:
A Spline-based Volumetric Data Modeling Framework and Its Applications. - Song-Nam Hong, Giuseppe Caire:
On Interference Networks over Finite Fields. - Parimita Saikia, Karen Das:
Head Gesture Recognition using Optical Flow based Classification with Reinforcement of GMM based Background Subtraction. - A. Kowcika, Uma Maheswari, T. V. Geetha:
Context Specific Event Model For News Articles. - Shailesh Vaya:
The complexity of resolving conflicts on MAC. - Dusan Jakovetic, João Manuel Freitas Xavier, José M. F. Moura:
Convergence Rates of Distributed Nesterov-like Gradient Methods on Random Networks. - Mischael Schill, Sebastian Nanz, Bertrand Meyer:
Handling Parallelism in a Concurrency Model. - (Withdrawn) An Incentive-Based Energy-Efficient Management Framework for Service Discovery in Device-to-Device Communications.
- Fragkiskos D. Malliaros, Michalis Vazirgiannis:
Clustering and Community Detection in Directed Networks: A Survey. - Parinaz Naghizadeh Ardabili, Mingyan Liu:
Closing the Price of Anarchy Gap in the Interdependent Security Game. - Yoram Bachrach, Vasilis Syrgkanis, Milan Vojnovic:
Incentives and Efficiency in Uncertain Collaborative Environments. - Azad Dehghan:
Boundary adjustment of events in clinical named entity recognition. - Rishabh K. Iyer, Stefanie Jegelka, Jeff A. Bilmes:
Fast Semidifferential-based Submodular Function Optimization. - Ping Li, Gennady Samorodnitsky, John E. Hopcroft:
Sign Stable Projections, Sign Cauchy Projections and Chi-Square Kernels. - Cristobal J. Garcia, Peter A. Gloor, Julia Gluesing, Casper Lassenius, Christine Miller, Maria Paasivaara, Ken Riopelle:
Proceedings of the 4th International Conference on Collaborative Innovation Networks COINs13, Santiago de Chile, August 11-13, 2013. - Björn Lohrmann, Daniel Warneke, Odej Kao:
Nephele Streaming: Stream Processing Under QoS Constraints At Scale. - Clemens Grabmayer, Jan Rochel:
Term Graph Representations for Cyclic Lambda-Terms. - David White:
Traversals of Infinite Graphs with Random Local Orientations. - Kafui Monu, Paul Ralph:
Beyond Gamification: Implications of Purposeful Games for the Information Systems Discipline. - Ardeshir Kianercy, Aram Galstyan:
Coevolutionary networks of reinforcement-learning agents. - Tiancheng Li:
A Gap between Simulation and Practice for Recursive Filters: On the State Transition Noise. - Rajesh Hemant Chitnis, László Egri, Dániel Marx:
List H-Coloring a Graph by Removing Few Vertices. - Guoqiong Liao, Yuchen Zhao, Sihong Xie, Philip S. Yu:
Latent Networks Fusion based Model for Event Recommendation in Offline Ephemeral Social Networks.