


default search action
CoRR, September 2013
September 2013
- Kamran Karimi, Aleks G. Pamir, M. Haris Afzal:

Accelerating a Cloud-Based Software GNSS Receiver. - Deepak Dhungana, Ching Hoo Tang, Christoph Weidenbach, Patrick Wischnewski:

Automated Verification of Interactive Rule-Based Configuration Systems (Additional Material). - Cheng Bo, Lan Zhang, Xiang-Yang Li:

SilentSense: Silent User Identification via Dynamics of Touch and Movement Behavioral Biometrics. - Kameng Nip, Zhenbo Wang, Fabrice Talla Nobibon, Roel Leus:

A Combination of Flow Shop Scheduling and the Shortest Path Problem. - Kameng Nip, Zhenbo Wang, Wenxun Xing:

Combinations of Some Shop Scheduling Problems and the Shortest Path Problem: Complexity and Approximation Algorithms. - Junaid Qadir:

Artificial Intelligence Based Cognitive Routing for Cognitive Radio Networks. - Seyed Pooya Shariatpanahi, Hamed Shah-Mansouri, Babak Hossein Khalaj:

Caching Gain in Wireless Networks with Fading: A Multi-User Diversity Perspective. - Hiroki Miyazako, Yutaka Hori, Shinji Hara:

Turing Instability in Reaction-Diffusion Systems with a Single Diffuser: Characterization Based on Root Locus. - Ryan Wen Liu, Tian Xu:

A Robust Alternating Direction Method for Constrained Hybrid Variational Deblurring Model. - An Zeng, Alexandre Vidmer, Matús Medo, Yi-Cheng Zhang:

Information filtering via hybridization of similarity preferential diffusion processes. - Tobias Breiten, Christopher A. Beattie, Serkan Gugercin:

Near-optimal Frequency-weighted Interpolatory Model Reduction. - Yury Polyanskiy, Sergio Verdú:

Empirical distribution of good channel codes with non-vanishing error probability (extended version). - Ahmed Douik, Sameh Sorour, Mohamed-Slim Alouini, Tareq Y. Al-Naffouri:

Delay Minimization for Instantly Decodable Network Coding in Persistent Channels with Feedback Intermittence. - Gaofei Wu, Matthew Geoffrey Parker:

A complementary construction using mutually unbiased bases. - Tryphon T. Georgiou, Anders Lindquist:

On time-reversibility of linear stochastic models. - S. Sri Gurudatta Yadav, R. V. Krishnaiah:

Haptic Science and Technology. - K. V. Rashmi, Nihar B. Shah, Dikang Gu, Hairong Kuang, Dhruba Borthakur, Kannan Ramchandran:

A Solution to the Network Challenges of Data Recovery in Erasure-coded Distributed Storage Systems: A Study on the Facebook Warehouse Cluster. - Oyelami Julius Olusegun, Norafida Binti Ithnin:

People Are the Answer to Security: Establishing a Sustainable Information Security Awareness Training (ISAT) Program in Organization. - Oyelami Julius Olusegun, Norafida Binti Ithnin:

Enhancing the Conventional Information Security Management Maturity Model (ISM3) in Resolving Human Factors in Organization Information Sharing. - Kamen Lozev:

Reconstruction and Uniqueness of Moving Obstacles. - Ram Chandra Singh Chauhan, Yatindra Nath Singh, Rachna Asthana:

Design of Minimum Correlated, Maximal Clique Sets of One-Dimensional Uni-polar (Optical) Orthogonal Codes. - George B. Mertzios, Mordechai Shalom, Prudence W. H. Wong, Shmuel Zaks:

Online Regenerator Placement. - Baofeng Wu, Dongdai Lin:

New constructions of quaternary bent functions. - Fei Gao, Dacheng Tao, Xinbo Gao, Xuelong Li:

Learning to Rank for Blind Image Quality Assessment. - Mian Lu, Lei Zhang, Huynh Phung Huynh, Zhongliang Ong, Yun Liang, Bingsheng He, Rick Siow Mong Goh, Richard Huynh:

Optimizing the MapReduce Framework on Intel Xeon Phi Coprocessor. - Lars Buitinck, Gilles Louppe, Mathieu Blondel, Fabian Pedregosa, Andreas Mueller, Olivier Grisel, Vlad Niculae, Peter Prettenhofer, Alexandre Gramfort, Jaques Grobler, Robert Layton, Jake VanderPlas, Arnaud Joly, Brian Holt, Gaël Varoquaux:

API design for machine learning software: experiences from the scikit-learn project. - Paolo Castiglione, Gerald Matz:

Energy-Neutral Source-Channel Coding with Battery and Memory Size Constraints. - Dragan Vidakovic, Dusko Parezanovic:

Generating Keys in Elliptic Curve Cryptosystems. - Igor C. Oliveira:

Algorithms versus Circuit Lower Bounds. - Yossi Azar, Adi Vardi:

Colored Packets with Deadlines and Metric Space Transition Cost. - Dan C. Ciresan, Jürgen Schmidhuber:

Multi-Column Deep Neural Networks for Offline Handwritten Chinese Character Classification. - Mihaela van der Schaar, Yuanzhang Xiao, William R. Zame:

Designing Efficient Resource Sharing For Impatient Players Using Limited Monitoring. - Kamran Riaz Khan, Affan A. Syed, Syed Ali Khayam:

Traffic analyzer for differentiating BitTorrent handshake failures from port-scans. - Antonis Sidiropoulos, Dimitrios Katsaros, Yannis Manolopoulos:

Categorizing Influential Authors Using Penalty Areas. - Rade Vuckovac:

A new kind of complexity. - (Withdrawn) Fundamental Limits of HRR Profiling and Velocity Compensation For Stepped-Frequency Waveforms.

- Xiaojiang Peng, Qiang Peng, Yu Qiao, Junzhou Chen, Mehtab Afzal

:
A Study on Unsupervised Dictionary Learning and Feature Encoding for Action Classification. - Attilio Fiandrotti, Valerio Bioglio, Marco Grangetto, Rossano Gaeta, Enrico Magli:

Band Codes for Energy-Efficient Network Coding with Application to P2P Mobile Streaming. - Michal Lopuszynski, Lukasz Bolikowski:

Tagging Scientific Publications using Wikipedia and Natural Language Processing Tools. Comparison on the ArXiv Dataset. - Taisuke Sato, Philipp J. Meyer:

Infinite probability computation by cyclic explanation graphs. - Indaco Biazzo, Alfredo Braunstein, Riccardo Zecchina:

On the performance of a cavity method based algorithm for the Prize-Collecting Steiner Tree Problem on graphs. - Florian Meyer, Ondrej Hlinka, Franz Hlawatsch:

Sigma Point Belief Propagation. - Manolis Ploumidis, Nikolaos Pappas, Apostolos Traganitis:

Throughput Optimal Flow Allocation on Multiple Paths for Random Access Wireless Multi-hop Networks. - Yi Cheng, Valery A. Ugrinovskii, Guanghui Wen:

Guaranteed Cost Tracking for Uncertain Coupled Multi-agent Systems Using Consensus over a Directed Graph. - Kevin Lano, Shekoufeh Kolahdouz Rahimi:

Case study: Class diagram restructuring. 8-15 - Sebastiaan J. van Schaik, Dan Olteanu, Robert Fink:

ENFrame: A Platform for Processing Probabilistic Data. - Konrad Kulakowski:

Heuristic Rating Estimation approach to the pairwise comparisons method. - Philipp Hupp:

Hierarchization for the Sparse Grid Combination Technique. - Joachim Rosenthal, Natalia Silberstein, Anna-Lena Trautmann:

On the Geometry of Balls in the Grassmannian and List Decoding of Lifted Gabidulin Codes. - Aurélie Lagoutte, Sébastien Tavenas:

The complexity of Shortest Common Supersequence for inputs with no identical consecutive letters. - Frédéric Maffray, Nicolas Trotignon:

Algorithms for perfectly contractile graphs. - Saddek Bensalem, Lavindra de Silva, Félix Ingrand, Rongjie Yan:

A Verifiable and Correct-by-Construction Controller for Robot Functional Levels. - Ayse Ünsal, Raymond Knopp:

Distributed Sensing and Transmission of Sporadic Random Samples in a Multiple-Access Channel. - Jean-Rémy Falleri, Cédric Teyton, Matthieu Foucault, Marc Palyart, Floréal Morandat, Xavier Blanc:

The Harmony Platform. - Mahdi Cheraghchi

, Venkatesan Guruswami:
Capacity of Non-Malleable Codes. - Eric Heim, Hamed Valizadegan, Milos Hauskrecht:

Relative Comparison Kernel Learning with Auxiliary Kernels. - William Bradley Glisson, Tim Storer:

Investigating Information Security Risks of Mobile Device Use within Organizations. - Louis-François Pau:

Botnet economics and devising defence schemes from attackers own reward processes. - Raphael 'kena' Poss:

Machines are benchmarked by code, not algorithms. - Daniel Zelazo, Antonio Franchi, Heinrich H. Bülthoff, Paolo Robuffo Giordano:

Decentralized Rigidity Maintenance Control with Range-only Measurements for Multi-Robot Systems. - Karim Habak, Khaled A. Harras

, Moustafa Youssef:
Bandwidth Aggregation Techniques in Heterogeneous Multi-homed Devices: A Survey. - Shyam Srinivasan:

Optimizing the performance of Lattice Gauge Theory simulations with Streaming SIMD extensions. - Siu On Chan, James R. Lee, Prasad Raghavendra, David Steurer:

Approximate Constraint Satisfaction Requires Large LP Relaxations. - Jiadong Wang, Kasra Vakilinia, Tsung-Yi Chen, Thomas A. Courtade, Guiqiang Dong, Tong Zhang, Hari Shankar, Richard D. Wesel:

Enhanced Precision Through Multiple Reads for LDPC Decoding in Flash Memories. - K. P. Shaji, I. Alsheba, Y. A. Syed Khadar, S. Kannan:

Multiparameter Monitoring and Fault Indication Using Inductive Power Transfer System. - Vijay Borges, Wilson Jeberson:

Survey of Context Information Fusion for Sensor Networks based Ubiquitous Systems. - Eitan Altman, Konstantin Avrachenkov, Jasper Goseling:

Coding for Caches in the Plane. - Mingchao Yu, Parastoo Sadeghi, Neda Aboutorab:

On Throughput and Decoding Delay Performance of Instantly Decodable Network Coding. - Massimo Rimondini, Claudio Squarcella, Giuseppe Di Battista:

From BGP to RTT and Beyond: Matching BGP Routing Changes and Network Delay Variations with an Eye on Traceroute Paths. - Sándor Vágvölgyi:

Threefold Post Correspondence System. - Georgios Koutsoumpakis, Iakovos Koutsoumpakis, Anastasios Gounaris:

Skew Handling in Aggregate Streaming Queries on GPUs. - Nathanaël François, Frédéric Magniez:

Input/Output Streaming Complexity of Reversal and Sorting. - Yi Zhou:

Majority Rule for Belief Evolution in Social Networks. - Ruben Martinez-Cantin:

BayesOpt: A Library for Bayesian optimization with Robotics Applications. - Patrizio Angelini, Giordano Da Lozzo, Giuseppe Di Battista, Fabrizio Frati:

Strip Planarity Testing of Embedded Planar Graphs. - Chu-Xu Zhang, Zi-Ke Zhang, Lu Yu, Chuang Liu, Hao Liu, Xiao-Yong Yan:

Information Filtering via Collaborative User Clustering Modeling. - Frédéric Maffray, Nicolas Trotignon, Kristina Vuskovic:

Algorithms for square-$3PC(\cdot, \cdot)$-free Berge graphs. - Mohammad Tofighi, Kivanç Köse, Ahmet Enis Çetin:

Denoising Using Projection Onto Convex Sets (POCS) Based Framework. - Tsung-Yi Chen, Adam R. Williamson, Nambi Seshadri, Richard D. Wesel:

Feedback Communication Systems with Limitations on Incremental Redundancy. - Ashish Sureka, Monika Gupta, Dipto Sarkar

, Vidushi Chaudhary:
A Case-Study on Teaching Undergraduate-Level Software Engineering Course Using Inverted-Classroom, Large-Group, Real-Client and Studio-Based Instruction Model. - Victor Khomenko, Roland Meyer, Reiner Hüchting:

A Polynomial Translation of pi-calculus FCPs to Safe Petri Nets. - Giuseppe Bianchi, Nicola Blefari-Melazzi, Alberto Caponi, Andrea Detti:

A General, Tractable and Accurate Model for a Cascade of Caches. - David M. Bryson, Charles Ofria:

Understanding Evolutionary Potential in Virtual CPU Instruction Set Architectures. - Mohammad Noshad, Maïté Brandt-Pearce:

Application of Expurgated PPM to Indoor Visible Light Communications - Part I: Single-User Systems. - Nadeem Javaid, Obaid Ur Rehman, Nabil Ali Alrajeh, Zahoor Ali Khan, Basit Manzoor, S. Ahmed:

AID: An Energy Efficient Decoding Scheme for LDPC Codes in Wireless Body Area Sensor Networks. - Frank Havlak, Mark E. Campbell:

Discrete and Continuous, Probabilistic Anticipation for Autonomous Robots in Urban Environments. - Mohammad Noshad, Maïté Brandt-Pearce:

Application of Expurgated PPM to Indoor Visible Light Communications - Part II: Access Networks. - Nick Williams

:
An Exploratory Data Survey of Drug Name Incidence and Prevalence From the FDA's Adverse Event Reporting System, 2004 to 2012Q2. - Furong Huang, U. N. Niranjan, Mohammad Umar Hakeem, Prateek Verma, Animashree Anandkumar:

Fast Detection of Overlapping Communities via Online Tensor Methods on GPUs. - Sina Lashgari, Amir Salman Avestimehr, Changho Suh:

Linear Degrees of Freedom of the X-Channel with Delayed CSIT. - H. Lookman Sithic, T. Balasubramanian:

Survey of Insurance Fraud Detection Using Data Mining Techniques. - Abla Kammoun, Karim Abed-Meraim:

Performance Analysis and Optimal Power Allocation for Linear Receivers Based on Superimposed Training. - Bart Jacobs:

Bases as Coalgebras. - Zhao Tan, Peng Yang, Arye Nehorai:

Joint Sparse Recovery Method for Compressed Sensing with Structured Dictionary Mismatch. - Muhammad Nazmul Islam, Narayan B. Mandayam, Sastry Kompella, Ivan Seskar:

Optimal Spectrum Fragmentation in NC-OFDMA based Multi-hop Networks. - Ezio Bartocci

, Luca Bortolussi
, Laura Nenzi
, Guido Sanguinetti
:
On the Robustness of Temporal Properties for Stochastic Models. 3-19 - Lubos Brim

, Tomas Vejpustek, David Safránek
, Jana Fabriková:
Robustness Analysis for Value-Freezing Signal Temporal Logic. 20-36 - Ye Chen, Christopher Short, Ádám M. Halász, Jeremy S. Edwards:

The impact of high density receptor clusters on VEGF signaling. 37-52 - Thao Dang, Tommaso Dreossi:

Falsifying Oscillation Properties of Parametric Biological Models. 53-67 - Vincent Noël

, Sergey Vakulenko, Ovidiu Radulescu
:
A hybrid mammalian cell cycle model. 68-83 - Oded Maler, Ádám M. Halász, Olivier Lebeltel, Ouri Maler:

Exploring the Dynamics of Mass Action Systems. 84-91 - Nicolas Mobilia, Alexandre Donzé

, Jean Marc Moulis
, Eric Fanchon:
Producing a Set of Models for the Iron Homeostasis Network. 92-98 - Qin Shu, Diana Catalina Ardila

, Ricardo G. Sanfelice
, Jonathan P. Vande Geest:
A Hybrid Model of a Genetic Regulatory Network in Mammalian Sclera. 99-105 - Rachit Agarwal, Matthew Caesar, Brighten Godfrey, Ben Y. Zhao:

Shortest Paths in Microseconds. - Stefano Berardi, Ugo de'Liguoro:

Non-monotonic Pre-fixed Points and Learning. 1-10 - Corina Cîrstea:

From Branching to Linear Time, Coalgebraically. 11-27 - José Espírito Santo

, Ralph Matthes
, Luís Pinto
:
A Coinductive Approach to Proof Search. 28-43 - Niels Bjørn Bugge Grathwohl

, Fritz Henglein, Dexter Kozen:
Infinitary Axiomatization of the Equational Theory of Context-Free Languages. 44-55 - Eleftherios Matsikoudis, Edward A. Lee:

The Fixed-Point Theory of Strictly Contracting Functions on Generalized Ultrametric Semilattices. 56-71 - Stefan Milius, Tadeusz Litak

:
Guard Your Daggers and Traces: On The Equational Properties of Guarded (Co-)recursion. 72-86 - Matteo Mio

, Alex Simpson:
Łukasiewicz mu-Calculus. 87-104 - Yutao Ma, Yang Wu, Youwei Xu:

Dynamics of Open-Source Software Developer's Commit Behavior: An Empirical Investigation of Subversion. - Ibrahim Issa, Silas L. Fong, Amir Salman Avestimehr:

Two-Hop Interference Channels: Impact of Linear Schemes. - Ugo de'Liguoro, Alexis Saurin:

Proceedings First Workshop on Control Operators and their Semantics, COS 2013, Eindhoven, The Netherlands, June 24-25, 2013. EPTCS 127, 2013 [contents] - Henry Corrigan-Gibbs, Bryan Ford:

Conscript Your Friends into Larger Anonymity Sets with JavaScript. - Benjamin Lévêque, David Y. Lin, Frédéric Maffray, Nicolas Trotignon:

Detecting induced subgraphs. - Nicolas Derhy, Christophe Picouleau, Nicolas Trotignon:

The four-in-a-tree problem in triangle-free graphs. - Ayan Seal, Mita Nasipuri, Debotosh Bhattacharjee, Dipak Kumar Basu:

Minutiae Based Thermal Face Recognition using Blood Perfusion Data. - Ayan Seal, Suranjan Ganguly, Debotosh Bhattacharjee, Mita Nasipuri, Dipak Kr. Basu:

Automated Thermal Face recognition based on Minutiae Extraction. - Ayan Seal, Suranjan Ganguly, Debotosh Bhattacharjee, Mita Nasipuri, Dipak Kumar Basu:

A Comparative Study of Human thermal face recognition based on Haar wavelet transform (HWT) and Local Binary Pattern (LBP). - Bruno Mery, Christian Retoré:

Advances in the Logical Representation of Lexical Semantics. - Bin Li, Hui Shen, David Tse:

Parallel Decoders of Polar Codes. - Maximilian Ranneberg:

Sensor Setups for State and Wind Estimation for Airborne Wind Energy Converters. - Turlough Neary, Matthew Cook:

Proceedings Machines, Computations and Universality 2013, MCU 2013, Zürich, Switzerland, September 9-11, 2013. EPTCS 128, 2013 [contents] - Luis M. Vaquero, Félix Cuadrado, Dionysios Logothetis, Claudio Martella:

xDGP: A Dynamic Graph Processing System with Adaptive Partitioning. - Elisângela Silva Dias, Diane Castonguay, Humberto J. Longo, Walid Abdala Rfaei Jradi:

Efficient Enumeration of All Chordless Cycles in Graphs. - Mathieu Andro, Gaëtan Tröger:

Statistiques et visibilité des bibliothèques numériques : quelles stratégies de diffusion ? - Damian Eads, David P. Helmbold, Edward Rosten:

Boosting in Location Space. - Zeyu Guo:

Randomness-efficient Curve Samplers. - Jeremy Cohen, Chris D. Cantwell, Neil P. Chue Hong, David Moxey, Malcolm Illingworth, Andrew Turner, John Darlington, Spencer J. Sherwin:

Simplifying the Development, Use and Sustainability of HPC Software. - Ana Cristina Mendes, Luísa Coheur, Sérgio Curto:

Learning to answer questions. - Rashmi Gupta, Nisheeth Joshi, Iti Mathur:

Analysing Quality of English-Hindi Machine Translation Engine Outputs Using Bayesian Classification. - Mahdi Cheraghchi, Venkatesan Guruswami:

Non-Malleable Coding Against Bit-wise and Split-State Tampering. - Ayan Seal, Suranjan Ganguly, Debotosh Bhattacharjee, Mita Nasipuri, Dipak Kumar Basu:

Minutiae Based Thermal Human Face Recognition using Label Connected Component Algorithm. - Ayan Seal, Suranjan Ganguly, Debotosh Bhattacharjee, Mita Nasipuri, Dipak Kr. Basu:

Thermal Human face recognition based on Haar wavelet transform and series matching technique. - Puneet Kumar Mongia, B. J. Singh:

Planning and Optimization of Wireless LANs through Field Measurements. - Eric M. Heien, Todd L. Miller, Becky Gietzel, Louise H. Kellogg:

Experiences with Automated Build and Test for Geodynamics Simulation Codes. - Mahmoud Ashour, Amr A. El-Sherif, Tamer A. ElBatt, Amr Mohamed:

Cooperative Access in Cognitive Radio Networks: Stable Throughput and Delay Tradeoffs. - Matthew G. Knepley, Jed Brown, Karl Rupp, Barry F. Smith:

Achieving High Performance with Unified Residual Evaluation. - Mohamed Abu Sharkh, Manar Jammal, Abdallah Shami, Abdelkader H. Ouda:

Resource Allocation in a Network-Based Cloud Computing Environment: Design Challenges. - Nian Li, Chunlei Li, Tor Helleseth, Cunsheng Ding, Xiaohu Tang:

Optimal Ternary Cyclic Codes with Minimum Distance Four and Five. - Mayank Manjrekar, Vinod Ramaswamy, Srinivas Shakkottai:

A Mean Field Game Approach to Scheduling in Cellular Systems. - Joseph Y. Halpern, Christopher Hitchcock:

Graded Causation and Defaults. - Joseph Y. Halpern, Christopher Hitchcock:

Compact Representations of Extended Causal Models. - Joseph Y. Halpern:

Weighted regret-based likelihood: a new approach to describing uncertainty. - Kerry A. Seitz Jr., Alex Kennedy, Owen Ransom, Bassam A. Younis

, John D. Owens:
A GPU Implementation for Two-Dimensional Shallow Water Modeling. - A. S. Syed Fiaz, N. Devi, S. Aarthi:

Bug Tracking and Reporting System. - Martin Balko, Pavel Klavík, Yota Otachi:

Bounded Representations of Interval and Proper Interval Graphs. - Keehang Kwon:

Pattern Matching via Choice Existential Quantifications in Imperative Languages. - Federico Aschieri:

Strong Normalization for HA + EM1 by Non-Deterministic Choice. 1-14 - Giovanni Birolo:

Interpreting a Classical Geometric Proof with Interactive Realizability. 30-44 - Harley Eades III, Aaron Stump:

Hereditary Substitution for the λΔ-Calculus. 45-65 - Bram Geron, Herman Geuvers:

Continuation calculus. 66-85 - Yoshihiko Kakutani, Daisuke Kimura:

Induction by Coinduction and Control Operators in Call-by-Name. 101-112 - James Laird

:
Combining and Relating Control Effects and their Semantics. 113-129 - Malgorzata Biernacka, Dariusz Biernacki

, Sergueï Lenglet, Marek Materzok:
Proving termination of evaluation for System F with control operators. 15-29 - Kenichi Morita:

Reversible Logic Elements with Memory and Their Universality. 3-14 - Damien Woods:

Intrinsic universality and the computational power of self-assembly. 16-22 - Nathalie Aubrun, Jarkko Kari:

Tiling Problems on Baumslag-Solitar groups. 35-46 - Rudolf Freund, Gheorghe Paun:

How to Obtain Computational Completeness in P Systems with One Catalyst. 47-61 - Rudolf Freund, Sergiu Ivanov, Marion Oswald, K. G. Subramanian:

One-dimensional Array Grammars and P Systems with Array Insertion and Deletion Rules. 62-75 - Anthony Gasperin:

Topology and Non-Deterministic Polynomial Time Computation : Avoidance of The Misbehaviour of Hub-Free Diagrams and Consequences. 76-84 - Christian Herrmann, Johanna Sokoli, Martin Ziegler:

Satisfiability of cross product terms is complete for real nondeterministic polytime Blum-Shub-Smale machines. 85-92 - Maurice Margenstern, K. G. Subramanian:

Hyperbolic tilings and formal language theory. 126-136 - Simon Martiel, Bruno Martin

:
Intrinsic Universality of Causal Graph Dynamics. 137-149 - Jacob Hendricks, Matthew J. Patitz

:
On the Equivalence of Cellular Automata and the Tile Assembly Model. 167-189 - Dmitry A. Zaitsev

:
A Small Universal Petri Net. 190-202 - Wei Liu, Nicolas Trotignon:

The $k$-in-a-tree problem for graphs of girth at least~$k$. - Marco Baldi, Federico Bambozzi, Franco Chiaraluce:

On a Family of Circulant Matrices for Quasi-Cyclic Low-Density Generator Matrix Codes. - Volker Diekert, Jonathan Kausch:

Logspace computations in graph products. - Kyatsandra G. Nagananda:

Electrical Structure-Based PMU Placement in Electric Power Systems. - Piotr Beling:

C++11 - idea r-wartości i przenoszenia. - Amparo Fúster-Sabater:

Characterization of the Least Periods of the Generalized Self-Shrinking Sequences. - Mingchao Yu, Neda Aboutorab, Parastoo Sadeghi:

From Instantly Decodable to Random Linear Network Coding. - Nikolaos Pappas, Marios Kountouris, Anthony Ephremides:

The Stability Region of the Two-User Interference Channel. - Todd J. Green, Alan Schmitt:

Proceedings of the 14th International Symposium on Database Programming Languages (DBPL 2013), August 30, 2013, Riva del Garda, Trento, Italy. 2013 [contents] - Nikolaos Pappas, Marios Kountouris, Anthony Ephremides, Apostolos Traganitis:

On the Stability Region of a Relay-Assisted Multiple Access Scheme. - Chiara Ravazzi, Paolo Frasca, Roberto Tempo, Hideaki Ishii:

Ergodic Randomized Algorithms and Dynamics over Networks. - Veeraruna Kavitha, Richard Combes:

Mixed Polling with Rerouting and Applications. - Raul Gonzalez, Eric Yawei Chen, Collin Jackson:

Automated Password Extraction Attack on Modern Password Managers. - Hector Zenil:

Turing, Randomness and Economics. - Zahra Sasanian, Robert Wille, D. Michael Miller:

Clarification on the Mapping of Reversible Circuits to the NCV-v1 Library. - Charles R. Ferenbaugh:

Experiments in Sustainable Software Practices for Future Architectures. - Zhengjun Cao, Lihua Liu:

Ordered Probability Mass Function. - Alireza Esna Ashari, Eric Feron:

Formally expressing the semantics of observer-based fault detection software. - Tara N. Sainath, Brian Kingsbury, Abdel-rahman Mohamed, George E. Dahl, George Saon, Hagen Soltau, Tomás Beran, Aleksandr Y. Aravkin, Bhuvana Ramabhadran:

Improvements to deep convolutional neural networks for LVCSR. - Laurent Jacques:

A Quantized Johnson Lindenstrauss Lemma: The Finding of Buffon's Needle. - Tara N. Sainath, Lior Horesh, Brian Kingsbury, Aleksandr Y. Aravkin, Bhuvana Ramabhadran:

Improving training time of Hessian-free optimization for deep neural networks using preconditioning and sampling. - Charith Perera, Arkady B. Zaslavsky, Michael Compton, Peter Christen, Dimitrios Georgakopoulos:

Semantic-driven Configuration of Internet of Things Middleware. - Shih-Chun Lin, Cheng-Liang Lin:

On Secrecy Capacity of Fast Fading MIMOME Wiretap Channels With Statistical CSIT. - Satyajit Thakor, Terence Chan, Alex J. Grant:

On the Capacity of Networks with Correlated Sources. - Xingqin Lin, Rapeepat Ratasuk, Amitava Ghosh, Jeffrey G. Andrews:

Modeling, Analysis and Optimization of Multicast Device-to-Device Transmission. - Oliver Obst, Adrian Trinchi, Simon G. Hardin, Matthew Chadwick, Ivan Cole, Tim H. Muster, Nigel Hoschke, Diet Ostry, Don Price, Khoa N. Pham, Tim Wark:

Nano-scale reservoir computing. - Oliver Obst, Joschka Boedecker:

Guided Self-Organization of Input-Driven Recurrent Neural Networks. - Weibing Deng, Armen E. Allahverdyan, B. Li, Qiuping A. Wang:

Rank-frequency relation for Chinese characters. - Yu-Xiang Wang, Choon Meng Lee, Loong-Fah Cheong, Kim-Chuan Toh:

Practical Matrix Completion and Corruption Recovery using Proximal Alternating Robust Subspace Minimization. - Weiran Wang, Miguel Á. Carreira-Perpiñán:

Projection onto the probability simplex: An efficient algorithm with a simple proof, and an application. - O. O. Ogunduyile, Keneilwe Zuva, O. A. Randle, Tranos Zuva:

Ubiquitous healthcare monitoring system using integrated triaxial accelerometer, spo2 and location sensors. - O. A. Randle, O. O. Ogunduyile, Tranos Zuva, N. A. Fashola:

A Comparism of the Performance of Supervised and Unsupervised Machine Learning Techniques in evolving Awale/Mancala/Ayo Game Player. - Nicolas Trotignon, Kristina Vuskovic:

Combinatorial optimization with 2-joins. - Joël Ouaknine, James Worrell:

Effective Positivity Problems for Simple Linear Recurrence Sequences. - Jørgen Bang-Jensen, Frédéric Havet, Nicolas Trotignon:

Finding an induced subdivision of a digraph. - Siyun Tang, Xiao Ma:

A New Chase-type Soft-decision Decoding Algorithm for Reed-Solomon Codes. - Yu Cao, Xiaoyan Guo, Stephen Todd:

Hyper-Graph Based Database Partitioning for Transactional Workloads. - Fedor V. Fomin, Ioan Todinca

, Yngve Villanger:
Large induced subgraphs via triangulations and CMSO. - Lorenzo Fagiano, Carlo Novara:

Identification of nonlinear controllers from data: theory and computation. - Nikolaos Pappas, Marios Kountouris, Jeongho Jeon, Anthony Ephremides, Apostolos Traganitis:

Network-Level Cooperation in Energy Harvesting Wireless Networks. - David J. Wilson, James H. Davenport, Matthew England, Russell J. Bradford:

A "Piano Movers" Problem Reformulated. - Masahito Hayashi:

Security analysis of epsilon-almost dual universal2 hash functions. - Alireza Pourranjbar, Jane Hillston:

An Aggregation Technique For Large-Scale PEPA Models With Non-Uniform Populations. - Jian Gao, Linzhi Shen, Fang-Wei Fu:

Skew Generalized Quasi-Cyclic Codes over Finite Fields. - Jian Gao, Linzhi Shen, Fang-Wei Fu:

Quasi-Cyclic Codes Over Finite Chain Rings. - Hai Xiong, Longjiang Qu, Chao Li:

A New Method to Compute the 2-adic Complexity of Binary Sequences. - Pawel Dlotko, Ruben Specogna:

Topology preserving thinning for cell complexes. - Henri Casanova, Arnaud Giersch, Arnaud Legrand, Martin Quinson, Frédéric Suter:

SimGrid: a Sustained Effort for the Versatile Simulation of Large Scale Distributed Systems. - Coral Calero, María Ángeles Moraga, Manuel F. Bertoa:

Towards a Software Product Sustainability Model. - Derrick Wing Kwan Ng, Robert Schober, Hussein M. Alnuweiri:

Power Efficient MISO Beamforming for Secure Layered Transmission. - Dohy Hong:

Fast ranking algorithm for very large data. - Jinho D. Choi:

Preparing Korean Data for the Shared Task on Parsing Morphologically Rich Languages. - Randy W. Heiland

, Betsy Thomas, Von Welch, Craig Jackson:
Toward a Research Software Security Maturity Model. - Yang Liu:

Towards a Unified Belief Structure in Games with indeterminate probabilities. - Pierre Olivier, Jalil Boukhobza, Eric Senn:

Flashmon V2: Monitoring Raw NAND Flash Memory I/O Requests on Embedded Linux. - Eric Angel, Evripidis Bampis, Vincent Chau:

Throughput Maximization in the Speed-Scaling Setting. - Garrett Bernstein, Kyle O'Brien:

Stochastic Agent-Based Simulations of Social Networks. - Shaun N. Joseph, Seif Omar Abu Bakr, Gabriel Lugo:

Convergence of Nearest Neighbor Pattern Classification with Selective Sampling. - Joshua A. Grochow, Youming Qiao:

Algorithms for group isomorphism via group extensions and cohomology. - Joost J. Joosten, Fernando Soler-Toscano, Hector Zenil:

Fractal dimension versus computational complexity. - Anshu Dubey, Steven R. Brandt, Richard C. Brower, M. Giles, Paul D. Hovland, Don Q. Lamb, Frank Löffler, Boyana Norris, Brian W. O'Shea, Claudio Rebbi, Marc Snir, Rajeev Thakur:

Software Abstractions and Methodologies for HPC Simulation Codes on Future Architectures. - Anshu Dubey, Brian van Straalen:

Experiences from Software Engineering of Large Scale AMR Multiphysics Code Frameworks. - Markus Blatt:

DUNE as an Example of Sustainable Open Source Scientific Software Development. - David Koop, Juliana Freire, Cláudio T. Silva:

Enabling Reproducible Science with VisTrails. - Eduardo Graells-Garrido, Barbara Poblete:

#Santiago is not #Chile, or is it? A Model to Normalize Social Media Impact. - Sekou L. Remy:

Web Standards as Standard Pieces in Robotics. - Troy A. Johnson, Patrick Seeling:

Desktop and Mobile Web Page Comparison: Characteristics, Trends, and Implications. - Mariano Beguerisse-Díaz, Borislav Vangelov, Mauricio Barahona

:
Finding role communities in directed networks using Role-Based Similarity, Markov Stability and the Relaxed Minimum Spanning Tree. - Sean Ahern, Eric Brugger, Brad Whitlock, Jeremy S. Meredith, Kathleen Biagas, Mark C. Miller, Hank Childs:

VisIt: Experiences with Sustainable Software. - Lynn K. Zentner, Michael G. Zentner, Victoria Farnsworth, Michael McLennan, Krishna P. C. Madhavan, Gerhard Klimeck:

nanoHUB.org: Experiences and Challenges in Software Sustainability for a Large Scientific Community. - Daisie Huang, Hilmar Lapp:

Software Engineering as Instrumentation for the Long Tail of Scientific Software. - Haitao Wang:

Aggregate-Max Nearest Neighbor Searching in the Plane. - Nicholas M. Weber, Andrea K. Thomer, Michael B. Twidale:

Niche Modeling: Ecological Metaphors for Sustainable Software in Science. - Charith Perera, Arkady B. Zaslavsky, Michael Compton, Peter Christen, Dimitrios Georgakopoulos:

Context Aware Sensor Configuration Model for Internet of Things. - Frank Löffler, Steven R. Brandt, Gabrielle Allen, Erik Schnetter

:
Cactus: Issues for Sustainable Simulation Software. - Ketan Maheshwari, David Kelly, Scott J. Krieder, Justin M. Wozniak, Daniel S. Katz, Mei Zhi-Gang, Mainak Mookherjee:

Reusability in Science: From Initial User Engagement to Dissemination of Results. - Jie Xu, Yangbo Song, Mihaela van der Schaar:

Information Sharing in Networks of Strategic Agents. - Craig A. Stewart, Julie Wernert, Eric A. Wernert, William K. Barnett, Von Welch:

Initial Findings from a Study of Best Practices and Models for Cyberinfrastructure Software Sustainability. - Haider Mehdi, Safeeullah Soomro, W. R. Khan, Abdul Ghafoor Memon, Abdul Hafeez:

Error-Rate Performance Analysis of Wireless Sensor Networks over Fading Channels. - Moustapha Diaby, Mark H. Karwan:

On Limits to the Scope of the Extended Formulations "Barriers". - Fatemeh Anari, Asefeh Asemi, Adeleh Asemi, Munir Abu Bakar:

Social Interactive Media Tools and Knowledge Sharing: A Case Study. - Shel Swenson, Yogesh Simmhan, Viktor K. Prasanna, Manish Parashar, E. Jason Riedy, David A. Bader, Richard W. Vuduc:

Sustainable Software Development for Next-Gen Sequencing (NGS) Bioinformatics on Emerging Platforms. - Jianqin Zhou, Wanquan Liu:

On the $k$-error linear complexity for $2^n$-periodic binary sequences via Cube Theory. - V. B. Surya Prasath

, O. Haddad:
Radar shadow detection in SAR images using DEM and projections. - Prashanth B. U. V:

Design and Implementation of Wireless Energy Meter System for Monitoring the Single Phase Supply. - Pierre Aboulker, Marko Radovanovic, Nicolas Trotignon, Kristina Vuskovic:

Graphs that do not contain a cycle with a node that has at least two neighbors on it. - Raphael C. S. Machado, Celina M. H. de Figueiredo, Nicolas Trotignon:

Edge-colouring and total-colouring chordless graphs. - (Withdrawn) Approximation Algorithms for a Balanced Capacity and Distance Constrained Vehicle Routing Problem.

- Guosheng Lin, Chunhua Shen, David Suter, Anton van den Hengel:

A General Two-Step Approach to Learning-Based Hashing. - Jan Egger, Junichi Tokuda, Laurent Chauvin, Bernd Freisleben, Christopher Nimsky, Tina Kapur, William M. Wells III:

Integration of the OpenIGTLink Network Protocol for Image-Guided Therapy with the Medical Platform MeVisLab. - John-Olof Nilsson, Peter Händel:

Timing estimation in distributed sensor and control systems with central processing. - Leopoldo E. Bertossi, Jaffer Gardezi:

Tractable vs. Intractable Cases of Matching Dependencies for Query Answering under Entity Resolution. - Jana Pazúriková, Ludek Matyska:

Parallel methods for calculation of long-range electrostatic interactions. - Eduardo Graells-Garrido, Ricardo Baeza-Yates:

Evolution of the Chilean Web: A Larger Study. - Azamat Mametjanov, Boyana Norris:

Software Autotuning for Sustainable Performance Portability. - Joël Ouaknine, James Worrell:

Ultimate Positivity is Decidable for Simple Linear Recurrence Sequences. - Eduardo Graells-Garrido, María Cecilia Rivara:

Zahir: a Object-Oriented Framework for Computer Graphics. - Gopalakrishna Palem:

Condition-Based Maintenance using Sensor Arrays and Telematics. - Nigam Chandra Parida, Soumyendu Raha, Anand Ramani:

Rollover Preventive Force Synthesis at Active Suspensions in a Vehicle Performing a Severe Maneuver with Wheels Lifted off. - Ramon Ferrer-i-Cancho:

The placement of the head that minimizes online memory: a complex systems approach. - Maria Chudnovsky, Paul D. Seymour, Nicolas Trotignon:

Detecting an induced net subdivision. - Feng Wu, Nicholas R. Jennings:

Regret-Based Multi-Agent Coordination with Uncertain Task Rewards. - Uri Mendlovic, Meir Feder:

Source Broadcasting to the Masses: Separation has a Bounded Loss. - Pritom Ahmed, Costas S. Iliopoulos, A. S. M. Sohidull Islam, M. Sohel Rahman:

The Swap Matching Problem Revisited. - Mark Mawson, Alistair J. Revell:

Memory transfer optimization for a lattice Boltzmann solver on Kepler architecture nVidia GPUs. - Stefano Riverso, Marcello Farina, Riccardo Scattolini, Giancarlo Ferrari-Trecate:

Plug-and-play distributed state estimation for linear systems. - Andrew Dodson, Roy McCann:

A Direct Power Controlled and Series Compensated EHV Transmission Line. - Obaid Ur Rehman, Ian R. Petersen:

A Robust Continuous Time Fixed Lag Smoother for Nonlinear Uncertain Systems. - Mohammad Reza Gholami, Luba Tetruashvili, Erik G. Ström, Yair Censor:

Cooperative Wireless Sensor Network Positioning via Implicit Convex Feasibility. - Amit Chakrabarti, Sagar Kale:

Submodular Maximization Meets Streaming: Matchings, Matroids, and More. - (Withdrawn) On the Strategic Allocation of Social Gratification.

- Sapan Naik, Nikunj Patel:

Single image super resolution in spatial and wavelet domain. - Luc Segoufin, Balder ten Cate:

Unary negation. - Qiang Qiu, Guillermo Sapiro:

Learning Transformations for Clustering and Classification. - Nuno Mendes, Pedro Neto, J. Norberto Pires, Altino Loureiro:

An optimal fuzzy-PI force/motion controller to increase industrial robot autonomy. - Pedro Neto, Nuno Mendes:

Direct off-line robot programming via a common CAD package. - Pedro Neto, Nuno Mendes, J. Norberto Pires

, António Paulo Moreira
:
CAD-based robot programming: The role of Fuzzy-PI force control in unstructured environments. - Elena Bellodi, Fabrizio Riguzzi:

Structure Learning of Probabilistic Logic Programs by Searching the Clause Space. - Nuno Mendes, Pedro Neto, J. Norberto Pires, Altino Loureiro:

Discretization and fitting of nominal data for autonomous robots. - Pedro Neto, Dário Pereira, J. Norberto Pires

, António Paulo Moreira
:
Real-Time and Continuous Hand Gesture Spotting: an Approach Based on Artificial Neural Networks. - Pedro Neto, Nuno Mendes, Ricardo Araújo, J. Norberto Pires, António Paulo Moreira

:
High-level robot programming based on CAD: dealing with unpredictable environments. - Marcos Ferreira, António Paulo Moreira

, Pedro Neto:
A low-cost laser scanning solution for flexible robotic cells: spray coating. - Pedro Neto, J. Norberto Pires

, António Paulo Moreira
:
Accelerometer-based control of an industrial robotic arm. - Pedro Neto, J. Norberto Pires, António Paulo Moreira

:
High-level programming and control for industrial robotics: using a hand-held accelerometer-based input device for gesture and posture recognition. - Gregory Alvarez, Charles Berenguer:

Puzzle Encryption Algorithm. - Nathan J. Bowler, Sergey Goncharov

, Paul Blain Levy, Lutz Schröder
:
Exploring the Boundaries of Monad Tensorability on Set. - Nicolas Dugué, Vincent Labatut

, Anthony Perez:
Rôle communautaire des capitalistes sociaux dans Twitter. - Tero Harju, Mike Müller:

Square-Free Shuffles of Words. - Pierre-Jean Spaenlehauer:

Complexity Bounds for Computing Critical Points with Gröbner Bases Algorithms: the Mixed Case. - Yongxin Wang, Kumbesan Sandrasegaran, Xinning Zhu, Jingjing Fei, Xiaoying Kong, Cheng-Chung Lin:

Frequency and time domain packet scheduling based on channel prediction with imperfect CQI in LTE. - Derrick Wing Kwan Ng, Robert Schober, Hussein M. Alnuweiri:

Secure Layered Transmission in Multicast Systems with Wireless Information and Power Transfer. - K. S. Kuppusamy, Leena Mary Francis, Gnanasekaran Aghila:

COSMOS A Context Sensitive Model For Dynamic Configuration Of Smartphones Using Multifactor Analysis. - Nicolas de Rugy-Altherre:

Determinant versus Permanent: salvation via generalization? The algebraic complexity of the Fermionant and the Immanant. - Yessica Saez, Laszlo B. Kish, Robert Mingesz, Zoltan Gingl, Claes-Goran Granqvist:

Current and voltage based bit errors and their combined mitigation for the Kirchhoff-law-Johnson-noise secure key exchange. - Seyyed Reza Khaze, Mohammad Masdari, Sohrab Hojjatkhah:

Application of Artificial Neural Networks in Estimating Participation in Elections. - Przemyslaw A. Grabowicz, Luca Maria Aiello, Víctor M. Eguíluz, Alejandro Jaimes:

Distinguishing Topical and Social Groups Based on Common Identity and Bond Theory. - Mohammad Amir Khusru Akhtar, Gadadhar Sahoo:

A Novel Methodology to Overcome Routing Misbehavior in MANET using Retaliation Model. - Didem Gözüpek, Fatih Alagöz:

A Fair Scheduling Model for Centralized Cognitive Radio Networks. - Subhonmesh Bose, Elizabeth Bodine-Baron, Babak Hassibi, Adam Wierman:

The Cost of an Epidemic over a Complex Network: A Random Matrix Approach. - Ram Chandra Singh Chauhan, Yatindra Nath Singh, Rachna Asthana:

A Search Algorithm to Find Multiple Sets of One Dimensional Unipolar (Optical) Orthogonal Codes with Same Code-length and Low Weight. - Ram Chandra Singh Chauhan, Yatindra Nath Singh, Rachna Asthana:

Design of Two Dimensional Unipolar (Optical) Orthogonal Codes Through One Dimensional Unipolar (Optical) Orthogonal Codes. - Olivier Serres, Abdullah Kayi, Ahmad Anbar, Tarek A. El-Ghazawi:

Hardware Support for Address Mapping in PGAS Languages; a UPC Case Study. - Saleh Almowuena:

An Efficient Key Agreement Scheme for Wireless Sensor Networks Using Third Parties. - Néstor Cataño, Camilo Rueda, Tim Wahls:

A Machine-Checked Proof for a Translation of Event-B Machines to JML. - Ebrahim MolavianJazi, J. Nicholas Laneman:

A Finite-Blocklength Perspective on Gaussian Multi-Access Channels. - Moez A. AbdelGawad:

An Overview of Nominal-Typing versus Structural-Typing in Object-Oriented Programming. - Shahin Shahrampour, Ali Jadbabaie:

Exponentially Fast Parameter Estimation in Networks Using Distributed Dual Averaging. - Rodrigo Lopez-Pablos:

Elementos de ingeniería de explotación de la información aplicados a la investigación tributaria fiscal. - Kirsch N. Mackey, Roy A. McCann:

An Optimal Load-Frequency Control Method for Inverter-Based Renewable Energy Transmission. - Anne C. Elster:

Software for Science: Some Personal Reflections. - Bolimera Ravi, T. Kishore Kumar:

Speech Enhancement using Kernel and Normalized Kernel Affine Projection Algorithm. - Arpna Shrivastava, R. C. Jain:

Performance analysis of modified algorithm for finding multilevel association rules. - Yahia Benmoussa, Jalil Boukhobza, Eric Senn, Djamel Benazzouz, Yassine Hadjadj-Aoul:

DyPS: Dynamic Processor Switching for Energy-Aware Video Decoding on Multi-core SoCs. - Martin Avanzini, Georg Moser:

Polynomial Path Orders. - Steven Chaplick, Radoslav Fulek, Pavel Klavík:

Extending Partial Representations of Circle Graphs. - Rui Fan, Jichang Zhao, Yan Chen, Ke Xu:

Anger is More Influential Than Joy: Sentiment Correlation in Weibo. - Dian Pratiwi:

Implementation of Function Point Analysis in Measuring The Volume Estimation of Software System in Object Oriented and Structural Model of Academic System. - Nicolás Robinson-García, Daniel Torres-Salinas, Juan Miguel Campanario, Emilio Delgado López-Cózar:

Letter to the editor: Against the Resilience of Rejected Manuscripts. - Emilio Delgado López-Cózar, Nicolás Robinson-García, Daniel Torres-Salinas:

The Google Scholar Experiment: how to index false papers and manipulate bibliometric indicators. - (Withdrawn) Robust watermarking based on DWT SVD.

- Rashmi Rai, G. Sahoo, Shabana Mehfuz:

Securing Software as a Service Model of Cloud Computing: Issues and Solutions. - Max Kemman, Martijn Kleppe, Stef Scagliola:

Just Google It - Digital Research Practices of Humanities Scholars. - Marco Guazzone, Cosimo Anglano, Roberto Aringhieri, Matteo Sereno:

Distributed Coalition Formation in Energy-Aware Cloud Federations: A Game-Theoretic Approach (Extended Version). - Karthik Reddy G:

Low power-area designs of 1bit full adder in cadence virtuoso platform. - Harinder Singh, Parteek Kumar:

Implementation of nlization framework for verbs, pronouns and determiners with eugene. - Abhinav Ganesan, B. Sundar Rajan:

Interference Alignment with Diversity for the 2 × 2 X-Network with three antennas. - Rakesh Mohanty, Sangita Patel, Shiba Prasad Dash, Burle Sharma:

TRANS outperforms MTF for two special types of request sequences without locality of reference. - Fabrice Kordon, Alban Linard, Marco Beccuti, Didier Buchs, Lukasz Fronc, Lom-Messan Hillah, Francis Hulin-Hubard, Fabrice Legond-Aubry, Niels Lohmann, Alexis Marechal, Emmanuel Paviot-Adet, Franck Pommereau, César Rodríguez, Christian Rohr, Yann Thierry-Mieg, Harro Wimmel, Karsten Wolf:

Model Checking Contest @ Petri Nets, Report on the 2013 edition. - Ying Ding, Min Song, Jia Han, Qi Yu, Erjia Yan, Lili Lin, Tamy Chambers:

Entitymetrics: Measuring the Impact of Entities. - Bob Diertens:

The Refined Function-Behaviour-Structure Framework. - Andrea Simonetto, Geert Leus:

On Distributed Optimization, Convex Relaxations, and Sensor Network Localization Problems. - Ahlam Maqqor, Akram Halli, Khalid Satori:

A multi-stream hmm approach to offline handwritten arabic word recognition. - Eva Darulova, Viktor Kuncak:

On Sound Compilation of Reals. - Giorgio Audrito, Alexandru I. Tomescu:

Enumeration of the adjunctive hierarchy of hereditarily finite sets. - R. H. Vishwanath, S. Leena, K. C. Srikantaiah, K. Shreekrishna Kumar, P. Deepa Shenoy, K. R. Venugopal, S. S. Iyengar

, Lalit M. Patnaik:
Forecasting Stock Time-Series using Data Approximation and Pattern Sequence Similarity. - (Withdrawn) Max-Flows on Sparse and Dense Networks.

- Michal Feldman, Brendan Lucier, Vasilis Syrgkanis:

Limits of Efficiency in Sequential Auctions. - Yahia Benmoussa, Jalil Boukhobza, Eric Senn, Djamel Benazzouz:

Evaluation of the Performance/Energy Overhead in DSP Video Decoding and its Implications. - Supratim Deb, Pantelis Monogioudis:

Learning Based Uplink Interference Management in 4G LTE Cellular Systems. - Erjia Yan:

Finding knowledge paths among scientific disciplines. - Fulvio Forni, Rodolphe Sepulchre, Arjan van der Schaft:

On differential passivity of physical systems. - Guodong Shi, Alexandre Proutière, Mikael Johansson, Karl Henrik Johansson:

Randomized Consensus with Attractive and Repulsive Links. - K. S. Sesh Kumar, Francis R. Bach:

Maximizing submodular functions using probabilistic graphical models. - Bondu Venkateswarlu, G. S. V. Prasad Raju:

Mine Blood Donors Information through Improved K-Means Clustering. - Hany SalahEldeen, Michael L. Nelson:

Resurrecting My Revolution: Using Social Link Neighborhood in Bringing Context to the Disappearing Web. - Sven Köhler, Bertram Ludäscher, Daniel Zinn:

First-Order Provenance Games. - Jeannette Bohg, Antonio Morales, Tamim Asfour, Danica Kragic:

Data-Driven Grasp Synthesis - A Survey. - Robert McColl, David Ediger, Jason Poovey, Dan Campbell, David A. Bader:

A Brief Study of Open Source Graph Databases. - Eduardo Graells-Garrido, Ricardo Baeza-Yates:

Caracterizando la Web Chilena. - Francesco Marigo:

Complete Valuations on Finite Distributive Lattices. - Han Su:

CrowdPlanner: A Crowd-Based Route Recommendation System. - Eleazar Chukwuka, Kamran Arshad:

Energt Efficient MAC Protocols for Wireless Sensor Network: A Survey. - Victor Pillac, Pascal Van Hentenryck, Caroline Even:

A Conflict-Based Path-Generation Heuristic for Evacuation Planning. - Son Hoang Dau, Wentu Song, Chau Yuen:

On Block Security of Regenerating Codes at the MBR Point for Distributed Storage Systems. - (Withdrawn) Asymptotically Optimal Beamforming for Video Streaming in Multi-Antenna Interference Networks.

- Ankit Sharma, Jan Vondrák:

Multiway Cut, the Golden Ratio, and Descending Thresholds. - Pengkai Zhao, Babak Daneshrad:

Adaptive Switching Between Single/Concurrent Link Scheme in Single Hop MIMO Networks. - Junping Zhou, Weihua Su, Minghao Yin:

Approximate Counting CSP Solutions Using Partition Function. - Raphael C. S. Machado, Celina M. H. de Figueiredo, Nicolas Trotignon:

Complexity of colouring problems restricted to unichord-free and \{square, unichord\}-free graphs. - Juan Carlos Moreno, V. B. Surya Prasath

, Gil Melfe Mateus Santos, Hugo Proença:
Robust Periocular Recognition By Fusing Sparse Representations of Color and Geometry Information. - Patoomsiri Songsiri, Thimaporn Phetkaew, Boonserm Kijsirikul:

Enhancements of Multi-class Support Vector Machine Construction from Binary Learners using Generalization Performance. - Pierre Sutra, Etienne Rivière, Pascal Felber:

An Efficient Distributed Obstruction-Free Compare-And-Swap Primitive. - Hyde Zhang, Stian Soiland-Reyes

, Carole A. Goble:
Taverna Mobile: Taverna workflows on Android. - Ingrid Dillo, René van Horik, Andrea Scharnhorst:

Training in Data Curation as Service in a Federated Data Infrastructure - the FrontOffice-BackOffice Model. - Oladunni Femijemilohun, Stuart D. Walker:

Empirical Performance Evaluation of Enhanced Throughput Schemes of IEEE802.11 Technology in Wireless Area Networks. - Ferdinando Cicalese, Eduardo Sany Laber, Aline Medeiros Saettler:

Decision Trees for the efficient evaluation of discrete functions: worst case and expected case analysis. - Stéphane Le Roux:

Lazy beats crazy: a spurious yet mathematical justification for laissez-faire. - Krishnendu Chatterjee, Martin Chmelik, Mathieu Tracol:

What is Decidable about Partially Observable Markov Decision Processes with ω-Regular Objectives. - Nathalie Bertrand, Patricia Bouyer, Thomas Brihaye, Amélie Stainer:

Emptiness and Universality Problems in Timed Automata with Positive Frequency. - Alexandre Denis, Samuel Cruz-Lara, Nadia Bellalem:

General Purpose Textual Sentiment Analysis and Emotion Detection Tools. - Muhammad Rizwan Asghar, Giovanni Russello:

ACTORS: A Goal-driven Approach for Capturing and Managing Consent in e-Health Systems. - Qingchuan Wang, Chen He, Lingge Jiang:

Analytical Framework of LDGM-based Iterative Quantization with Decimation. - Fredrik Johansson:

Rigorous high-precision computation of the Hurwitz zeta function and its derivatives. - Arman Boyaci, Tínaz Ekim, Mordechai Shalom, Shmuel Zaks:

Graphs of Edge-Intersecting Non-Splitting Paths in a Tree: Towards Hole Representations-Part I. - Joseph Hannigan, Guillermo Hernandez, Richard M. Medina, Patrick Roos, Paulo Shakarian:

Mining for Spatially-Near Communities in Geo-Located Social Networks. - Jonathan Ponniah, Yih-Chun Hu, P. R. Kumar:

A System-Theoretic Clean Slate Approach to Provably Secure Ad Hoc Wireless Networking. - Naci Saldi, Tamás Linder, Serdar Yüksel:

Randomized Quantization and Source Coding with Constrained Output Distribution. - Chunxiao Jiang, Yan Chen, K. J. Ray Liu:

Evolutionary Information Diffusion over Social Networks. - Chunxiao Jiang, Yan Chen, Yang Gao, K. J. Ray Liu:

Indian Buffet Game with Negative Network Externality and Non-Bayesian Social Learning. - Paulo Shakarian, Sean Eyre, Damon Paulo:

A Scalable Heuristic for Viral Marketing Under the Tipping Model. - Marcus D. Hanwell, Amitha Perera, Wes Turner, Patrick O'Leary, Katie Osterdahl, Bill Hoffman, William J. Schroeder:

Sustainable Software Ecosystems for Open Science. - Francisco Chicano, Andrew M. Sutton, L. Darrell Whitley, Enrique Alba:

Fitness Probability Distribution of Bit-Flip Mutation. - Daniel M. Kane:

The Average Sensitivity of an Intersection of Half Spaces. - (Withdrawn) The Classification Accuracy of Multiple-Metric Learning Algorithm on Multi-Sensor Fusion.

- Frank Nielsen, Richard Nock:

On the Chi square and higher-order Chi distances for approximating f-divergences. - Azlan Iqbal:

How Relevant Are Chess Composition Conventions? - Ping Cao, Zhao Dong, Ke Liu, Kai-Yuan Cai:

Robust Dynamic Selection of Tested Modules in Software Testing for Maximizing Delivered Reliability. - Matthew Gwynne, Oliver Kullmann:

On SAT representations of XOR constraints. - Neetu Goel, R. B. Garg:

Simulation of an Optimum Multilevel Dynamic Round Robin Scheduling Algorithm. - Francis R. Bach:

Convex relaxations of structured matrix factorizations. - Johannes Kotremba, Stefan Raß, Robert Singer:

Distributed Business Processes - A Framework for Modeling and Execution. - Ton Chanh Le:

Preliminary Notes on Termination and Non-Termination Reasoning. - Xiao-Bo Jin, Guanggang Geng, Dexian Zhang:

Combination of Multiple Bipartite Ranking for Web Content Quality Evaluation. - Steffen Limmer, Slawomir Stanczak, Mario Goldenbaum, Renato L. G. Cavalcante:

Exploiting Interference for Efficient Distributed Computation in Cluster-based Wireless Sensor Networks. - Mahmood S. Saadeh, Roy McCann:

Improved Stability Design of Interconnected Distributed Generation Resources. - Michael Borokhovich, Stefan Schmid:

How (Not) to Shoot in Your Foot with SDN Local Fast Failover: A Load-Connectivity Tradeoff. - Congzhe Cao, Zesong Fei, Jinhong Yuan, Jingming Kuang:

Low Complexity List Successive Cancellation Decoding of Polar Codes. - Roberto Asín, Juan Olate, Leo Ferres:

Cache Performance Study of Portfolio-Based Parallel CDCL SAT Solvers. - Chen Avin, Asaf Cohen, Yoram Haddad, Erez Kantor, Zvi Lotker, Merav Parter, David Peleg:

SINR Diagram with Interference Cancellation. - Zesong Fei, Congzhe Cao, Ming Xiao, Iqbal Hussain, Jingming Kuang:

Improved LT Codes in Low Overhead Regions for Binary Erasure Channels. - Arthur Carvalho, Stanko Dimitrov, Kate Larson:

Proper Scoring Rules for Unobservable Outcomes: An Application to the Peer-Review Process. - Paolo Di Lorenzo, Sergio Barbarossa:

Distributed Estimation and Control of Algebraic Connectivity over Random Graphs. - Jürgen Bokowski

, Vincent Pilaud:
On topological and geometric $(19_4)$ configurations. - Kalle Rutanen, Germán Gómez-Herrero, Sirkka-Liisa Eriksson, Karen O. Egiazarian:

A general definition of the big-oh notation for algorithm analysis. - Li Wang, Jie Shao, Yaqin Zhong, Weisong Zhao, Reza Malekian:

Modeling Based on Elman Wavelet Neural Network for Class-D Power Amplifiers. - Shayan Oveis Gharan, Luca Trevisan:

Partitioning into Expanders. - Akram Ajouli, Julien Cohen, Jean-Claude Royer:

Transformations between Composite and Visitor implementations in Java. - Iman Esmaili Paeen Afrakoti, Saeed Bagheri Shouraki, Farnood Merrikh-Bayat:

Using memristor crossbar structure to implement a novel adaptive real time fuzzy modeling algorithm. - Xiaoyu Chu, Harish Sethu:

Cooperative Topology Control with Adaptation for Improved Lifetime in Wireless Sensor Networks. - Xiaoyu Chu, Harish Sethu:

An Energy Balanced Dynamic Topology Control Algorithm for Improved Network Lifetime. - Salman Hooshmand, Mehdi Behshameh, Omid Hamidi:

A tabu search algorithm with efficient diversification strategy for high school timetabling problem. - Fatemeh Hamidi-Sepehr, Henry D. Pfister, Jean-François Chamberland:

Delay-Sensitive Communication over Fading Channel: Queueing Behavior and Code Parameter Selection. - Zeineb Abderrahim, Elhem Techini, Mohamed Salim Bouhlel:

Progressive Compression of 3D Objects with an Adaptive Quantization. - Chen Avin, Michael Borokhovich, Stefan Schmid:

OBST: A Self-Adjusting Peer-to-Peer Overlay Based on Multiple BSTs. - C. Seshadhri, Ali Pinar, Tamara G. Kolda

:
Wedge Sampling for Computing Clustering Coefficients and Triangle Counts on Large Graphs. - Ted Underwood, Michael L. Black, Loretta Auvil, Boris Capitanu:

Mapping Mutable Genres in Structurally Complex Volumes. - Peter Alvaro, Neil Conway, Joseph M. Hellerstein, David Maier:

Blazes: Coordination Analysis for Distributed Programs. - Aditya Vempaty, Lav R. Varshney, Pramod K. Varshney:

Reliable Crowdsourcing for Multi-Class Labeling using Coding Theory. - Parama Bagchi, Debotosh Bhattacharjee, Mita Nasipuri, Dipak Kumar Basu:

A Novel Approach in detecting pose orientation of a 3D face required for face. - Yanshan Wang, In-Chan Choi, Jae-Sung Lee:

Indexing by Latent Dirichlet Allocation. - Parama Bagchi, Debotosh Bhattacharjee, Mita Nasipuri, Dipak Kr. Basu:

A method for nose-tip based 3D face registration using maximum intensity algorithm. - Zhong-qin Wang, Ning Ye, Reza Malekian, Tingting Zhao, Ruchuan Wang:

Measuring the similarity of PML documents with RFID-based sensors. - Benjamin Bond, Lionel Levine:

Abelian networks: foundations and examples. - Daniel Frank, Karlheinz Ochs, Aydin Sezgin:

A Systematic Approach for Interference Alignment in CSIT-less Relay-Aided X-Networks. - Moreno Marzolla, Gabriele D'Angelo, Marco Mandrioli:

A Parallel Data Distribution Management Algorithm. - Vijayvaradharaj T. Muralidharan, B. Sundar Rajan:

Wireless Bidirectional Relaying, Latin Squares and Graph Vertex Coloring. - Sabyasachi Mukhopadhyay, Paritosh Bhattacharya, Bankim Bihari Ghosh:

Application of Vertex coloring in a particular triangular closed path structure and in Krafts inequality. - Joshua W. S. Brown, Olga Ohrimenko, Roberto Tamassia:

Haze: Privacy-Preserving Real-Time Traffic Statistics. - Gary L. Miller, Richard Peng, Shen Chen Xu:

Parallel Algorithms for Approximate Undirected Shortest Paths in $m\log^{3+α}n$ Work. - Qi Cheng, Jiyou Li, Jincheng Zhuang:

On Determining Deep Holes of Generalized Reed-Solomon Codes. - Don J. Torrieri, Salvatore Talarico, Matthew C. Valenti:

Multihop Routing in Ad Hoc Networks. - Feng Jiang, Jie Chen, A. Lee Swindlehurst:

Optimal Power Allocation for Parameter Tracking in a Distributed Amplify-and-Forward Sensor Network. - Abdelrahman M. Ibrahim, Tamer A. ElBatt, Amr El-Keyi:

Coverage Probability Analysis for Wireless Networks Using Repulsive Point Processes. - Fionn Murtagh:

Ultrametric Component Analysis with Application to Analysis of Text and of Emotion. - Charith Perera, Arkady B. Zaslavsky, Chi Harold Liu, Michael Compton, Peter Christen, Dimitrios Georgakopoulos:

Sensor Search Techniques for Sensing as a Service Architecture for The Internet of Things. - Hyunjun Kim, Cihan Tepedelenlioglu:

Unified Sum-BER Performance Analysis of AF MIMO Beamforming in Two-Way Relay Networks. - Ashutosh Singh, Yatindra Nath Singh:

Multipath Approach for Reliability in Query Network based Overlaid Multicasting. - (Withdrawn) An Alternate method to find the chromatic number of a Finite, Connected Graph.

- Frederik Armknecht, Manuel Hauptmann, Stefanie Roos, Thorsten Strufe:

Protecting Public OSN Posts from Unintended Access. - (Withdrawn) Dead Zone Penetration Protocol for Cognitive Radio Networks.

- Steffen Eger:

(Failure of the) Wisdom of the crowds in an endogenous opinion dynamics model with multiply biased agents. - Mohammad Fanaei, Matthew C. Valenti, Natalia A. Schmid:

Power Allocation for Distributed BLUE Estimation with Full and Limited Feedback of CSI. - Sungjin Im, Maxim Sviridenko:

Optimizing Maximum Flow Time and Maximum Throughput in Broadcast Scheduling. - Nicolae Cleju:

Optimized projections for compressed sensing via rank-constrained nearest correlation matrix. - Pece Mitrevski, Marjan Gusev:

On the Performance Potential of Speculative Execution based on Branch and Value Prediction. - Olivera Kostoska, Pece Mitrevski, Ilija Hristoski:

ICT and Competitiveness of the Macedonian Economy. - Ilija Hristoski, Pece Mitrevski:

Simulating e-Commerce Client-Server Interaction for Capacity Planning. - Paul Beame, Raphaël Clifford, Widad Machmouchi:

Element Distinctness, Frequency Moments, and Sliding Windows. - Yang Liu, Mingyan Liu, Sahand Haji Ali Ahmad:

Sufficient Conditions on the Optimality of Myopic Sensing in Opportunistic Channel Access: A Unifying Framework. - Luis Evaristo Caraballo, Carlos Ochoa, Pablo Pérez-Lantero:

Matching colored points with rectangles. - Yang Liu, Mingyan Liu:

Group Learning and Opinion Diffusion in a Broadcast Network. - Ágnes Cseh:

Stable flows with restricted edges. - Yang Liu, Mingyan Liu:

To Stay Or To Switch: Multiuser Dynamic Channel Access. - Yang Liu, Mingyan Liu, Jing Deng:

Revisiting Optimal Power Control: its Dual Effect on SNR and Contention. - Osvaldo Skliar, Ricardo E. Monge

, Guillermo Oviedo, Sherry Gapper:
A New Method for the Analysis of Signals: The Square Wave Transform (SWT). - Alexander Fish, Shamgar Gurevich:

The Incidence and Cross Methods for Efficient Radar Detection. - Matias Martinez, Laurence Duchien, Martin Monperrus:

Automatically Extracting Instances of Code Change Patterns with AST Analysis. - Jixue Liu, Selasi Kwashie, Jiuyong Li, Feiyue Ye, Millist W. Vincent:

Discovery of Approximate Differential Dependencies. - Sian-Jheng Lin, Wei-Ho Chung:

Novel Repair-by-Transfer Codes and Systematic Exact-MBR Codes with Lower Complexities and Smaller Field Sizes. - Sparsh Mittal:

Energy Saving Techniques for Phase Change Memory (PCM). - Rahul Singh

, I-Hong Hou, P. R. Kumar:
Pathwise Performance of Debt Based Policies for Wireless Networks with Hard Delay Constraints. - Keke Zu, Rodrigo Caiado de Lamare, Martin Haardt:

Low-Complexity Design of Generalized Block Diagonalization Precoding Algorithms for Multiuser MIMO Systems. - Ishani Chakraborty, Ahmed M. Elgammal:

Visual-Semantic Scene Understanding by Sharing Labels in a Context Network. - Tobias Friedrich, Frank Neumann, Christian Thyssen:

Multiplicative Approximations, Optimal Hypervolume Distributions, and the Choice of the Reference Point. - Haiyang Qian, Fu Li, Ravishankar Ravindran, Deep Medhi:

Energy-Aware Aggregation of Dynamic Temporal Workload in Data Centers. - Arpita Chakraborty, Srinjoy Ganguly, Mrinal Kanti Naskar, Anupam Karmakar:

A Trust Based Fuzzy Algorithm for Congestion Control in Wireless Multimedia Sensor Networks (TFCC). - Michael Van den Bergh, Xavier Boix, Gemma Roig, Luc Van Gool:

SEEDS: Superpixels Extracted via Energy-Driven Sampling. - Tong-Wook Shinn, Tadao Takaoka:

Efficient Graph Algorithms for Network Analysis. - Oswin Aichholzer, Thomas Hackl, Matias Korman, Alexander Pilz, Birgit Vogtenhuber:

Geodesic-Preserving Polygon Simplification. - Kechao Huang, Chulong Liang, Xiao Ma, Baoming Bai:

Unequal Error Protection by Partial Superposition Transmission Using LDPC Codes. - Wuqiong Luo, Wee-Peng Tay:

Finding an infection source under the SIS model. - Huyen Do, Alexandros Kalousis:

A Metric-learning based framework for Support Vector Machines and Multiple Kernel Learning. - Rob J. van Glabbeek, Ursula Goltz, Jens-Wolfhard Schicke-Uffmann:

On Characterising Distributability. - Folke Mitzlaff, Martin Atzmueller, Dominik Benz, Andreas Hotho, Gerd Stumme:

User-Relatedness and Community Structure in Social Interaction Networks. - Laura Luzzi, Roope Vehkalahti:

A new design criterion for spherically-shaped division algebra-based space-time codes. - Marco Guerini, Jacopo Staiano, Davide Albanese:

Exploring Image Virality in Google Plus. - Eric Goubault, Sylvie Putot:

Robustness analysis of finite precision implementations. - Damien Cassou, Stéphane Ducasse, Nicolas Petton:

SafeJS: Hermetic Sandboxing for JavaScript. - Gaétan Marceau, Pierre Savéant, Marc Schoenauer:

Strategic Planning in Air Traffic Control as a Multi-objective Stochastic Optimization Problem. - Dariusz Biernacki, Sergueï Lenglet:

Environmental Bisimulations for Delimited-Control Operators. - Gaétan Marceau, Pierre Savéant, Marc Schoenauer:

Computational Methods for Probabilistic Inference of Sector Congestion in Air Traffic Management. - Anuj Sharma, Prabin Kumar Panigrahi:

A Review of Financial Accounting Fraud Detection based on Data Mining Techniques. - Anuj Sharma, Prabin Kumar Panigrahi:

A Neural Network based Approach for Predicting Customer Churn in Cellular Network Services. - Anuj Sharma, Shubhamoy Dey:

Using Self-Organizing Maps for Sentiment Analysis. - Anuj Sharma, Shubhamoy Dey:

Performance Investigation of Feature Selection Methods. - Kato Mivule, Claude Turner:

A Review of Privacy Essentials for Confidential Mobile Data Transactions. - Kato Mivule:

Utilizing Noise Addition for Data Privacy, an Overview. - Kush R. Varshney:

Bounded Confidence Opinion Dynamics in a Social Network of Bayesian Decision Makers. - Andreas Gemsa, Benjamin Niedermann, Martin Nöllenburg:

Trajectory-Based Dynamic Map Labeling. - Kato Mivule, Claude Turner:

An Investigation of Data Privacy and Utility Preservation using KNN Classification as a Gauge. - Pan Feng, Zhang Heng-liang, Qi Jie:

Problem Complexity Research from Energy Perspective. - Fabrizio Altarelli, Alfredo Braunstein, Carla-Fabiana Chiasserini, Luca Dall'Asta, Paolo Giaccone, Emilio Leonardi, Riccardo Zecchina:

Stochastic Optimization of Service Provision with Selfish Users. - Debesh K. Das, Debabani Chowdhury, Bhargab B. Bhattacharya, Tsutomu Sasao:

Inadmissible Class of Boolean Functions under Stuck-at Faults. - Hani Mehrpouyan, Mohammad Reza Khanzadi, Michail Matthaiou

, Akbar M. Sayeed, Robert Schober, Yingbo Hua:
Improving Bandwidth Efficiency in E-band Communication Systems. - Ahmed Alsum, Michele C. Weigle, Michael L. Nelson, Herbert Van de Sompel:

Profiling Web Archive Coverage for Top-Level Domain and Content Language. - Yasmin AlNoamany, Michele C. Weigle, Michael L. Nelson:

Access Patterns for Robots and Humans in Web Archives. - Yasmin AlNoamany, Ahmed Alsum, Michele C. Weigle, Michael L. Nelson:

Who and What Links to the Internet Archive. - Pål Grønås Drange, Fedor V. Fomin, Michal Pilipczuk, Yngve Villanger:

Exploring Subexponential Parameterized Complexity of Completion Problems. - Patrick C. McGuire, A. Bonnici, K. R. Bruner, Christoph Gross, Jens Ormö, R. A. Smosna, Sebastian Walter, Lorenz Wendt:

The Cyborg Astrobiologist: Matching of Prior Textures by Image Compression for Geological Mapping and Novelty Detection. - Abdellatif Zaidi, Zohaib Hassan Awan, Shlomo Shamai, Luc Vandendorpe:

Secure Degrees of Freedom of MIMO X-Channels with Output Feedback and Delayed CSIT. - John D. Faben, Mark Jerrum:

The complexity of parity graph homomorphism: an initial investigation. - Lijun Chen, Seungil You:

The Weighted Sum Rate Maximization in MIMO Interference Networks: The Minimax Lagrangian Duality and Algorithm. - Peter D. Turney:

Domain and Function: A Dual-Space Model of Semantic Relations and Compositions. - Bernard Parisse:

A probabilistic and deterministic modular algorithm for computing Groebner basis over $\Q$. - Roman Kolpakov, Mikhail Podolskiy, Mikhail Posypkin, Nickolay Khrapov:

Searching of gapped repeats and subrepetitions in a word. - Ramon Ferrer-i-Cancho:

Why SOV might be initially preferred and then lost or recovered? A theoretical framework. - Andreas Christian Müller, Sven Behnke:

Learning a Loopy Model For Semantic Segmentation Exactly. - Qiaoyang Ye, Mazin Al-Shalash, Constantine Caramanis, Jeffrey G. Andrews:

Resource Optimization in Device-to-Device Cellular Systems Using Time-Frequency Hopping. - Dima Kagan, Michael Fire, Aviad Elyashar, Yuval Elovici:

Facebook Applications' Installation and Removal: A Temporal Analysis. - Gaétan Marceau, Pierre Savéant, Marc Schoenauer:

Multiobjective Tactical Planning under Uncertainty for Air Traffic Flow and Capacity Management. - Li Chen:

Algorithms for Computing Topological Invariants in 2D and 3D Digital Spaces. - Laszlo B. Kish, Claes-Goran Granqvist:

On the security of the Kirchhoff-law-Johnson-noise (KLJN) communicator. - Elaine Angelino, Varun Kanade:

Attribute-Efficient Evolvability of Linear Functions. - Benyuan Liu, Zhilin Zhang, Hongqi Fan, Qiang Fu:

Compression via Compressive Sensing : A Low-Power Framework for the Telemonitoring of Multi-Channel Physiological Signals. - Wei-Cheng Liao, Mingyi Hong, Ya-Feng Liu, Zhi-Quan Luo:

Base Station Activation and Linear Transceiver Design for Optimal Resource Management in Heterogeneous Networks. - Navin Goyal, Neil Olver, F. Bruce Shepherd:

Dynamic vs Oblivious Routing in Network Design. - Tianyang Bai, Rahul Vaze, Robert W. Heath Jr.:

Analysis of Blockage Effects on Urban Cellular Networks. - Rui Li, Kevin Chen-Chuan Chang:

EgoNet-UIUC: A Dataset For Ego Network Research. - Wuqiong Luo, Wee-Peng Tay, Mei Leng:

How to Identify an Infection Source with Limited Observations. - Lawrence Ong:

A New Class of Index Coding Instances Where Linear Coding is Optimal. - Tomás Mikolov, Quoc V. Le, Ilya Sutskever:

Exploiting Similarities among Languages for Machine Translation. - Mirza Golam Kibria, Hidekazu Murata:

An efficient algorithm for weighted sum-rate maximization in multicell downlink beamforming. - Hamid Reza Feyzmahdavian, Assad Al Alam, Ather Gattami:

Optimal Distributed Controller Design with Communication Delays: Application to Vehicle Formations. - Eric Järpe, Mattias Weckstén:

Detecting Encrypted code. - Raja Giryes, Michael Elad:

Sparsity Based Poisson Denoising with Dictionary Learning. - Ferran Hurtado, Maarten Löffler, Inês Matos, Vera Sacristán Adinolfi, Maria Saumell, Rodrigo I. Silveira, Frank Staals:

Terrain visibility with multiple viewpoints. - Martin Dias, Damien Cassou, Stéphane Ducasse:

Representing Code History with Development Environment Events. - M. Brzezinski-Spiczak, Krzysztof Dobosz, Mateusz Lis, M. Pintal:

Music Files Search System. - M. Lis, L. Pintal:

Report: GPU Based Massive Parallel Kawasaki Kinetics In Monte Carlo Modelling of Lipid Microdomains. - Cristian Lameiro, Óscar González, José Antonio García-Naya, Ignacio Santamaría, Luis Castedo:

Experimental Evaluation of Interference Alignment for Broadband WLAN Systems. - Basit Manzoor, Nadeem Javaid, Obaid Ur Rehman, Safdar Hussain Bouk, Syed Hassan Ahmed, Dongkyun Kim:

Energy Aware Error Control in Cooperative Communication in Wireless Sensor Networks. - Sadek Bouroubi, Fella Charchali, Nesrine Benyahia Tani:

The Set Partitions: Solution for the sharing secret keys. - Takashi Tanaka, Farhad Farokhi

, Cédric Langbort:
Faithful Implementations of Distributed Algorithms and Control Laws. - Muhammad Aslam, Muhammad Babar Rasheed, Tauseef Shah, Azizur Rahim, Zahoor Ali Khan, U. Qasim, M. W. Qasim, Ahmad Hassan, Abid Khan, Nadeem Javaid:

Energy optimization and Performance Analysis of Cluster Based Routing Protocols Extended from LEACH for WSNs. - Obaid Ur Rehman, Nadeem Javaid, Arsalan Haider, N. Amjad, A. A. Awan, M. Qamar, Zahoor Ali Khan, U. Qasim:

An Energy Efficient Decoding Scheme for Wireless Body Area Sensor Networks. - S. Ahmed, Muhammad Moid Sandhu, N. Amjad, Arsalan Haider, Mariam Akbar, Ashfaq Ahmad, Zahoor Ali Khan, U. Qasim, Nadeem Javaid:

iMOD LEACH: improved MODified LEACH Protocol for Wireless Sensor Networks. - Danish Mahmood, Nadeem Javaid, Zahoor Ali Khan, U. Qasim, Abid Khan, S. Qurashi, A. M. Memon:

Modeling and Evaluating Performance of Routing Operations in Reactive Routing Protocols. - Danish Mahmood, Nadeem Javaid, U. Qasim, Zahoor Ali Khan, Abid Khan, S. Qurashi, A. M. Memon:

Modeling and Evaluating Performance of Routing Operations in Proactive Routing Protocols. - Dimitris Sacharidis, Panagiotis Bouros:

Routing Directions: Keeping it Fast and Simple. - Piotr Skowron, Piotr Faliszewski:

Approximating the MaxCover Problem with Bounded Frequencies in FPT Time. - Percy Liang:

Lambda Dependency-Based Compositional Semantics. - Zhanpeng Huang, Pan Hui, Christoph Peylo, Dimitris Chatzopoulos:

Mobile augmented reality survey: a bottom-up approach. - John Christopher McCabe-Dansted, Tim French, Mark Reynolds, Sophie Pinchinat:

Specifying Robustness. - Christian Widmer, Philipp Drewe, Xinghua Lou, Shefali Umrania, Stephanie Heinrich, Gunnar Rätsch:

GRED: Graph-Regularized 3D Shape Reconstruction from Highly Anisotropic and Noisy Images. - A. T. Vermeltfoort, A. W. M. van Schijndel:

Comsol Simulations of Cracking in Point Loaded Masonry with Randomly Distributed Material Properties. - Thoralf Gutierrez, Gautier Krings, Vincent D. Blondel:

Evaluating socio-economic state of a country analyzing airtime credit and mobile phone datasets. - Abdul Razaque, Khaled M. Elleithy:

Restoring the privacy and confidentiality of users over Mobile collaborative learning (MCL) environment. - M. Ganesalingam, W. T. Gowers:

A fully automatic problem solver with human-style output. - Abdul Razaque, Khaled M. Elleithy:

Automatic energy saving (AES) modelto boost ubiquitous wireless sensor networks (WSNs). - Vlad Popov, Oleg Mazonka:

Faster Fair Solution for the Reader-Writer Problem. - Nyembo Salama, Christian Bach:

Introduction of 6th Generation Smart Phone combining the features of both Apple and Android smart phone. - Muhammad Shoaib Khan, Khaled M. Elleithy:

Robust Heterogeneous Network to Support Multitasking. - Yuan Shen, Wenhan Dai, Moe Z. Win:

Power Optimization for Network Localization. - Yuanxin Wu:

Further results on "Velocity-position integration formula, part I-Application to in-flight alignment". - Julien Alexandre Dit Sandretto, Cyprien Nicolas:

Cable-Driven Robots with Wireless Control Capability for Pedagogical Illustration in Science. - Anindya Banerjee, Olivier Danvy, Kyung-Goo Doh, John Hatcliff:

Semantics, Abstract Interpretation, and Reasoning about Programs: Essays Dedicated to David A. Schmidt on the Occasion of his Sixtieth Birthday, Manhattan, Kansas, USA, 19-20th September 2013. EPTCS 129, 2013 [contents] - Parama Bagchi, Debotosh Bhattacharjee, Mita Nasipuri, Dipak Kumar Basu:

A novel approach for nose tip detection using smoothing by weighted median filtering applied to 3D face images in variant poses. - Parama Bagchi, Debotosh Bhattacharjee, Mita Nasipuri, Dipak Kumar Basu:

Detection of pose orientation across single and multiple axes in case of 3D face images. - Parama Bagchi, Debotosh Bhattacharjee, Mita Nasipuri, Dipak Kumar Basu:

A novel approach to nose-tip and eye corners detection using H-K Curvature Analysis in case of 3D images. - Sayan Bhattacharya, Parinya Chalermsook, Kurt Mehlhorn, Adrian Neumann:

New Approximability Results for the Robust k-Median Problem. - Lukas Einkemmer, Alexander Ostermann:

Exponential Integrators on Graphic Processing Units. - Grzegorz Chrupala

:
Text segmentation with character-level text embeddings. - Shlomi Vituri:

Dispersion Analysis of Infinite Constellations in Ergodic Fading Channels. - Pekka Abrahamsson:

Measuring the Success of Software Process Improvement: The Dimensions. - Kaveh Mahdaviani, Raman Yazdani, Masoud Ardakani:

Overhead-Optimized Gamma Network Codes. - (Withdrawn) Security Enhancement of Biometric Authentication Scheme for Telecare Medicine Information Systems with Nonce.

- Andrea Cerone

, Matthew Hennessy:
Modelling Probabilistic Wireless Networks. - Patrizio Angelini, William S. Evans, Fabrizio Frati, Joachim Gudmundsson:

SEFE with No Mapping via Large Induced Outerplane Graphs in Plane Graphs. - Ann L. Edwards, Alexandra Kearney, Michael Rory Dawson

, Richard S. Sutton, Patrick M. Pilarski:
Temporal-Difference Learning to Assist Human Decision Making during the Control of an Artificial Limb. - Edouard Bonnet, Vangelis Th. Paschos, Florian Sikora:

Multiparameterizations for max $k$-set cover and related satisfiability problems. - Abuzer Yakaryilmaz:

Log-space counter is useful for unary languages by help of a constant-size quantum register. - Andriyan Bayu Suksmono:

A Simple Solution To The Uncertain Delay Problem in USRP Based SDR-Radar Systems. - Kai Zhu, Lei Ying:

A Robust Information Source Estimator with Sparse Observations. - Cenk M. Yetis, Yong Zeng, Kushal Anand, Yong Liang Guan, Erry Gunawan:

Sub-Stream Fairness and Numerical Correctness in MIMO Interference Channels. - Sushant Sachdeva, Nisheeth K. Vishnoi:

Approximation Theory and the Design of Fast Algorithms. - Nils Meyer, Manfred Ries, Stefan Solbrig, Tilo Wettig:

iDataCool: HPC with Hot-Water Cooling and Energy Reuse. - Mazen Alamir:

On Adaptive Measurement Inclusion Rate In Real-Time Moving-Horizon Observers. - Jun Kawahara, Koji M. Kobayashi, Shuichi Miyazaki:

Better Bounds for Online $k$-Frame Throughput Maximization in Network Switches. - Christoph Bunte, Amos Lapidoth, Alex Samorodnitsky:

The Zero-Undetected-Error Capacity Approaches the Sperner Capacity. - Angela Dappert, Andrew N. Jackson, Akiko Kimura:

Developing a Robust Migration Workflow for Preserving and Curating Hand-held Media. - Dipasree Pal, Mandar Mitra, Kalyankumar Datta:

Improving Query Expansion Using WordNet. - Marios Kountouris, Nikolaos Pappas:

HetNets and Massive MIMO: Modeling, Potential Gains, and Performance Analysis. - (Withdrawn) Cryptanalysis and Improvement of Yan et al.'s Biometric-based authentication scheme for Telecare Medicine Information Systems.

- Deepak Puthal:

A Near Optimal Approximation Algorithm for Vertex-Cover Problem. - Artur Jez, Markus Lohrey:

Approximation of smallest linear tree grammar. - Gábor Hegedüs, Josef Schicho, Hans-Peter Schröcker:

Four-Pose Synthesis of Angle-Symmetric 6R Linkages. - (Withdrawn) 3-extra connectivity of k-ary n-cube networks.

- Cezary Kaliszyk, Josef Urban:

HOL(y)Hammer: Online ATP Service for HOL Light. - Spyros C. Kontogiannis, Christos D. Zaroliagis:

Distance Oracles for Time-Dependent Networks. - Matthias Wilhelm, Vincent Lenders, Jens B. Schmitt:

An Analytical Model of Packet Collisions in IEEE 802.15.4 Wireless Networks. - Federico Cerutti, Alice Toniolo, Nir Oren, Timothy J. Norman:

Context-dependent Trust Decisions with Subjective Logic. - Cyril Voyant

, C. Darras, Marc Muselli, Christophe Paoli
, Marie-Laure Nivet, Philippe Poggi:
Bayesian rules and stochastic models for high accuracy prediction of solar radiation. - Deborah Pereg, Doron Benzvi:

Blind Deconvolution via Maximum Kurtosis Adaptive Filtering. - Nadia Creignou, Raïda Ktari, Arne Meier, Julian-Steffen Müller, Frédéric Olive, Heribert Vollmer:

Parameterized Enumeration with Ordering. - Ben Zamanzadeh, Naveen Ashish, Cartic Ramakrishnan, John Zimmerman:

Semantic Advertising. - Sean Whalen, Gaurav Pandey:

A Comparative Analysis of Ensemble Classifiers: Case Studies in Genomics. - Ruizhi Liao, Boris Bellalta, Trang Cao Minh, Jaume Barceló, Miquel Oliver:

Uni-MUMAC: A Unified Down/Up-link MU-MIMO MAC Protocol for IEEE 802.11ac WLANs. - Abdoulaye Tall, Richard Combes, Zwi Altman, Eitan Altman:

Distributed coordination of self-organizing mechanisms in communication networks. - Samuel Erskine, Ziengpieng Wu:

Securing the IEEE 802.16 OFDM WiMAX PHYSICAL AND MAC Layer Using STBC Coding and Encryption. - Svetoslav Nakov, Tihomir Ivanov:

A Calibration Algorithm for Microelectromechanical Systems Accelerometers in Inertial Navigation Sensors. - Mei-Mei Gu, Rong-Xia Hao:

3-extra connectivity of 3-ary n-cube networks. - Aleksandar Haber, Michel Verhaegen:

Subspace identification of large-scale interconnected systems. - Edson Flórez, Wilfredo Gómez, Lola Bautista:

An ant colony optimization algorithm for job shop scheduling problem. - Brandon Oselio, Alex Kulesza, Alfred O. Hero III:

Multi-layer graph analytics for dynamic social networks. - Yucel Altug, Aaron B. Wagner:

The third-order term in the normal approximation for singular channels. - Neil D. Jones:

A Swiss Pocket Knife for Computability. 1-17 - Colin Stirling:

A Proof System with Names for Modal Mu-calculus. 18-29 - Torben Æ. Mogensen:

A Comparison of Well-Quasi Orders on Trees. 30-40 - Isabella Mastroeni

:
Abstract interpretation-based approaches to Security - A Survey on Abstract Non-Interference and its Challenging Applications. 41-65 - Philip S. Mulry:

Notions of Monad Strength. 67-83 - Mads Rosendahl

:
Abstract Interpretation as a Programming Language. 84-104 - Jeffrey T. Denniston, Austin Melton, Stephen Ernest Rodabaugh:

Formal Contexts, Formal Concept Analysis, and Galois Connections. 105-120 - John Launchbury, Sava Krstic, T. E. Sauerwein:

Coroutining Folds with Hyperfunctions. 121-135 - Peter Sestoft:

Online partial evaluation of sheet-defined functions. 136-160 - Bor-Yuh Evan Chang

, Xavier Rival:
Modular Construction of Shape-Numeric Analyzers. 161-185 - Emanuele De Angelis

, Fabio Fioravanti
, Alberto Pettorossi
, Maurizio Proietti
:
Verification of Imperative Programs by Constraint Logic Program Transformation. 186-210 - Dimitra Giannakopoulou, Corina S. Pasareanu:

Abstraction and Learning for Infinite-State Compositional Verification. 211-228 - Julien Mercadal, Zoé Drey, Charles Consel:

Denotational Semantics of A User-Oriented, Domain-Specific Language. 229-249 - Robert Glück

:
Simulation of Two-Way Pushdown Automata Revisited. 250-258 - Johannes Neubauer, Bernhard Steffen, Tiziana Margaria

:
Higher-Order Process Modeling: Product-Lining, Variability Modeling and Beyond. 259-283 - Anindya Banerjee, David A. Naumann

:
A Simple Semantics and Static Analysis for Stack Inspection. 284-308 - Carolyn L. Talcott:

The Immune System: the ultimate fractionated cyber-physical system. 309-324 - Agostino Cortesi

, Giulia Costantini, Pietro Ferrara
:
A Survey on Product Operators in Abstract Interpretation. 325-336 - Chris Hankin

:
A short note on Simulation and Abstraction. 337-340 - Francesco Logozzo, Matthieu Martel:

Automatic Repair of Overflowing Expressions with Abstract Interpretation. 341-357 - Martin Bodin

, Thomas P. Jensen, Alan Schmitt:
Pretty-big-step-semantics-based Certified Abstract Interpretation (Preliminary version). 360-383 - Benedikt Nordhoff, Markus Müller-Olm, Peter Lammich:

Iterable Forward Reachability Analysis of Monitor-DPNs. 384-403 - Kedar S. Namjoshi:

Model Checking in Bits and Pieces. 404-416 - Jooyong Yi

:
A Case for Dynamic Reverse-code Generation to Debug Non-deterministic Programs. 419-428 - Fabrizio Frati, Serge Gaspers, Joachim Gudmundsson, Luke Mathieson:

Augmenting graphs to minimize the diameter. - Andrei Barbu, Siddharth Narayanaswamy, Jeffrey Mark Siskind:

Saying What You're Looking For: Linguistics Meets Video Search. - Antonis Achilleos, Michael Lampis:

Closing a Gap in the Complexity of Refinement Modal Logic. - Adam Noel, Karen C. Cheung, Robert Schober:

Diffusive Molecular Communication with Disruptive Flows. - Alex Davydow:

New Algorithms for Solving Tropical Linear Systems. - James Roberts, Nada Sbihi:

Exploring the Memory-Bandwidth Tradeoff in an Information-Centric Network. - Ralf Steinberger, Mohamed Ebrahim, Marco Turchi:

JRC EuroVoc Indexer JEX - A freely available multi-label categorisation tool. - Ralf Steinberger, Andreas Eisele, Szymon Klocek, Spyridon Pilos, Patrick Schlüter:

DGT-TM: A freely Available Translation Memory in 22 Languages. - David A. Karpuk, Camilla Hollanti:

Rotating Non-Uniform and High-Dimensional Constellations Using Geodesic Flow on Lie Groups. - Dheerendra Mishra, Sourav Mukhopadhyay:

Cryptanalysis of Wu and Xu's authentication scheme for Telecare Medicine Information Systems. - Andreas Strotmann, Arnim Bleier:

Author Name Co-Mention Analysis: Testing a Poor Man's Author Co-Citation Analysis Method. - Angela I. Barbero, Eirik Rosnes, Guang Yang, Øyvind Ytrehus:

Near-Field Passive RFID Communication: Channel Model and Code Design. - Dan Stowell, Mark D. Plumbley:

An open dataset for research on audio field recording archives: freefield1010. - Ralf Steinberger, Bruno Pouliquen, Erik Van der Goot:

An introduction to the Europe Media Monitor family of applications. - Peter Horák, Zsolt Tuza:

Speeding up Deciphering by Hypergraph Ordering. - Maurice Herlihy, Zhiyu Liu:

Well-Structured Futures and Cache Locality. - Marko Tanaskovic, Lorenzo Fagiano, Roy S. Smith, Manfred Morari:

Adaptive model predictive control with exploring property for constrained linear systems that uses basis function model parametrization. - Volker Diekert, Alexei Miasnikov, Armin Weiß:

Conjugacy in Baumslag's group, generic case complexity, and division in power circuits. - Aurélie Thébaut, Thibault Scholash, Brigitte Charnomordic, Nadine Hilgert:

A modeling approach to design a software sensor and analyze agronomical features - Application to sap flow and grape quality relationship. - Clément Moulin-Frier, Michael A. Arbib:

Recognizing Speech in a Novel Accent: The Motor Theory of Speech Perception Reframed. - Hao Zhuang, Shih-Hung Weng, Chung-Kuan Cheng:

Power Grid Simulation using Matrix Exponential Method with Rational Krylov Subspaces. - Emiliano De Cristofaro, Honglu Du, Julien Freudiger, Gregory Norcie:

Two-Factor or not Two-Factor? A Comparative Usability Study of Two-Factor Authentication. - Vikas J. Dongre, Vijay H. Mankar:

Development of Comprehensive Devnagari Numeral and Character Database for Offline Handwritten Character Recognition. - Reagan W. Moore:

Extensible Generic Data Management Software. - Ivan Girotto, Axel Kohlmeyer

, David Grellscheid, Shawn T. Brown:
Advanced Techniques for Scientific Programming and Collaborative Development of Open Source Software Packages at the International Centre for Theoretical Physics (ICTP). - Nikolay Atanasov, Jerome Le Ny, Kostas Daniilidis, George J. Pappas:

Information Acquisition with Sensing Robots: Algorithms and Error Bounds. - Saif M. Mohammad:

Even the Abstract have Colour: Consensus in Word-Colour Associations. - Umakant Mishra:

How to Implement Access Rights in an MIS Project. - Jun Geng, Erhan Bayraktar, Lifeng Lai:

Bayesian Quickest Change Point Detection with Sampling Right Constraints. - Nikolay Atanasov, Bharath Sankaran, Jerome Le Ny, George J. Pappas, Kostas Daniilidis:

Nonmyopic View Planning for Active Object Detection. - Laurent Lessard, Sanjay Lall:

An Algebraic Approach to the Control of Decentralized Systems. - Sina Y. Caliskan, Paulo Tabuada:

Compositional Transient Stability Analysis of Multi-Machine Power Networks. - Gang Chen:

Latent Fisher Discriminant Analysis. - Véronique Bruyère, Emmanuel Filiot, Mickael Randour, Jean-François Raskin:

Meet Your Expectations With Guarantees: Beyond Worst-Case Synthesis in Quantitative Games. - Haim H. Permuter, Himanshu Asnani, Tsachy Weissman:

Capacity of a POST Channel with and without Feedback. - Josef Spillner, Andrii Chaichenko, Andrey Brito, Francisco Vilar Brasileiro, Alexander Schill:

Operating the Cloud from Inside Out. - Shweta Gajbhiye, S. P. Karmore:

Cable Fault Monitoring and Indication: A Review. - Muhammad Irfan Uddin:

Advances in computer architecture. - Arijit Bishnu, Arijit Ghosh, Subhabrata Paul:

Parameterized complexity of k-tuple and liar's domination. - Paul Hunter, Guillermo A. Pérez, Jean-François Raskin:

Mean-payoff Games with Incomplete Information. - Anna Huber, Vladimir Kolmogorov:

Towards Minimizing k-Submodular Functions. - Ivan Komarov, Ali Dashti, Roshan D'Souza:

Fast k-NNG construction with GPU-based quick multi-select. - Robert Mansel Gower, Artur L. Gower:

Higher-order Reverse Automatic Differentiation with emphasis on the third-order. - Guodong Shi, Alexandre Proutière, Mikael Johansson, John S. Baras, Karl Henrik Johansson:

Emergent Behaviors over Signed Random Networks in Dynamical Environments. - Martin Dräxler, Johannes Blobel, Philipp Dreimann, Stefan Valentin, Holger Karl:

Anticipatory Buffer Control and Quality Selection for Wireless Video Streaming. - Foster Morrison:

High Precision Arithmetic for Scientific Applications. - Judith Bishop, Nikolai Tillmann, Arno Puder, Vinayak Naik:

PRoMoTo 2013 proceedings. - Washington A. Oliveira, Margarida P. Mello, Antônio Carlos Moretti, Ednei F. Reis:

The multi-vehicle covering tour problem: building routes for urban patrolling. - Scott Ainsworth, Michael L. Nelson:

Evaluating Sliding and Sticky Target Policies by Measuring Temporal Drift in Acyclic Walks Through a Web Archive. - Muhammad Irfan Uddin:

Microgrid - The microthreaded many-core architecture. - Manuel de la Sen, Asier Ibeas, Santiago Alonso-Quesada:

On the asymptotic hyperstability of switched systems. - Wojciech M. Golab, Jeremy Hurwitz, Xiaozhou Li:

On the k-Atomicity-Verification Problem. - (Withdrawn) Detection and Isolation of Failures in Linear Multi-Agent Networks.

- Daniel Leivant:

Alternating Turing machines for inductive languages. - Yang-Seok Choi, Hooman Shirani-Mehr:

Simultaneous Transmission and Reception: Algorithm, Design and System Level Performance. - Muhammad Irfan Uddin:

Design space exploration in the microthreaded many-core architecture. - Martin A. Coleman:

Integrating Communications and Merging Messaging via the eXtensible Messaging and Presence Protocol. - Jan Egger:

Image-guided therapy system for interstitial gynecologic brachytherapy in a multimodality operating suite. - John P. Steinberger:

Counting solutions to additive equations in random sets. - Fumin Shen, Chunhua Shen:

Generic Image Classification Approaches Excel on Face Recognition. - Lata B. T, Jansi P. K. R, Shaila K, D. N. Sujatha, K. R. Venugopal, Lalit M. Patnaik:

Multiple Domain Secure Routing for Wireless Sensor Networks. - Anna Choromanska, Tony Jebara:

Stochastic Bound Majorization. - Maxim A. Babenko, Pawel Gawrychowski, Tomasz Kociumaka, Tatiana Starikovskaya:

Substring Suffix Selection. - Sparsh Mittal:

A Cache-Coloring Based Technique for Saving Leakage Energy In Multitasking Systems. - Mona T. Diab, Nizar Habash, Owen Rambow, Ryan Roth:

LDC Arabic Treebanks and Associated Corpora: Data Divisions Manual. - Vladimir Kolmogorov:

Reweighted message passing revisited. - T. El-Shishtawy:

A Hybrid Algorithm for Matching Arabic Names. - Derek Harter:

Spike Synchronization Dynamics of Small-World Networks. - Michael A. Forbes, Ramprasad Saptharishi, Amir Shpilka:

Pseudorandomness for Multilinear Read-Once Algebraic Branching Programs, in any Order. - Robbert van Renesse, Nicolas Schiper, Fred B. Schneider:

Vive la Différence: Paxos vs. Viewstamped Replication vs. Zab. - Xiaogang Liu, Yuan Luo:

A particular case of the conjectures of Johansen and Helleseth and zeta functions. - Ioan Valeriu Grossu, C. I. Ciuluvica:

On the Importance of Communication and Errors in Supervised Learning of Artificial Neural Networks. - Jun-ichi Koga, Jiro Koga, Shunji Homma:

Checkerboard Problem to Topology Optimization of Continuum Structures. - Vineeth Bala Sukumaran, Utpal Mukherji:

On the tradeoff of average delay and average power for fading point-to-point links with monotone policies. - Tong-Wook Shinn, Tadao Takaoka:

Combining All Pairs Shortest Paths and All Pairs Bottleneck Paths Problems. - Andi Wahju Rahardjo Emanuel, Daniel Jahja Surjawan:

Revised Modularity Index to Measure Modularity of OSS Projects with Case Study of Freemind. - Andi Wahju Rahardjo Emanuel, Retantyo Wardoyo, Jazi Eko Istiyanto, Khabib Mustofa:

Modularity Index Metrics for Java-Based Open Source Software Projects. 


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID