


default search action
CoRR, April 2014
- Mark Giesbrecht, Albert Heinle, Viktor Levandovskyy:
Factoring Differential Operators in n Variables. - Rodrigo Bongers:
EPICS process variables in different subnetworks and different IOCs without the use of the CaGateway. - Jeremiah Blocki, Manuel Blum, Anupam Datta:
Human Computable Passwords. - Neri Mickael, Denis Mestivier:
An efficient GPU acceptance-rejection algorithm for the selection of the next reaction to occur for Stochastic Simulation Algorithms. - Jihua Lu, Xiangming Li, Dan Liu:
Asynchronous Transmission of Wireless Multicast System with Genetic Joint Antennas Selection. - Immanuel Trummer, Christoph Koch:
Approximation Schemes for Many-Objective Query Optimization. - Ivana Maric, Dennis Hui:
Short Message Noisy Network Coding with Rate Splitting. - Maryam Hosseini, Narayana Santhanam:
On redundancy of memoryless sources over countable alphabets. - Abeer S. Al-Humaimeedy, Maribel Fernández:
General dynamic recovery for compensating CSP. 3-16 - Ed Blakey:
Ray tracing - computing the incomputable? 32-40 - Eugen Jiresch:
Towards a GPU-based implementation of interaction nets. 41-53 - Elvira Mayordomo
:
Effective dimension in some general metric spaces. 67-75 - Benedek Nagy, Sándor Vályi:
Computing discrete logarithm by interval-valued paradigm. 76-86 - Arno Pauly
, Matthew de Brecht:
Non-deterministic computation and the Jayne-Rogers Theorem. 87-96 - Sam Sanders:
Algorithm and proof as Ω-invariance and transfer: A new model of computation in nonstandard analysis. 97-109 - Alejandro Díaz-Caro
, Gilles Dowek
:
The probability of non-confluent systems. 1-15 - Marcela Quispe-Cruz
, Edward Hermann Haeusler, Lew Gordeev:
Proof-graphs for Minimal Implicational Logic. 16-29 - Pablo Arrighi, Simon Martiel, Zizhu Wang
:
Causal Dynamics of Discrete Surfaces. 30-40 - Adriana B. Compagnoni, Paola Giannini
, Catherine Kim, Matthew Milideo, Vishakha Sharma:
A Calculus of Located Entities. 41-56 - Carlos Alberto Ramírez Restrepo
, Jorge A. Pérez
, Jesús Aranda
, Juan Francisco Díaz
:
Towards Formal Interaction-Based Models of Grid Computing Infrastructures. 57-72 - Mario R. F. Benevides
, Isaque Lima, Rafael Nader, Pedro Rougemont
:
Using HMM in Strategic Games. 73-84 - Karin Quaas:
MTL-Model Checking of One-Clock Parametric Timed Automata is Undecidable. 5-17 - Youcheng Sun
, Giuseppe Lipari
, Étienne André
, Laurent Fribourg:
Toward Parametric Timed Interfaces for Real-Time Components. 49-64 - Mladen Skelin, Marc Geilen
, Francky Catthoor, Sverre Hendseth:
Worst-case Throughput Analysis for Parametric Rate and Parametric Actor Execution Time Scenario-Aware Dataflow Graphs. 65-79 - Iaakov Exman:
Interestingness a Unifying Paradigm Bipolar Function Composition. - Hongbo Si, Haris Vikalo, Sriram Vishwanath:
Haplotype Assembly: An Information Theoretic View. - Vikash Mansinghka, Daniel Selsam, Yura N. Perov:
Venture: a higher-order probabilistic programming platform with programmable inference. - Chan Dai Truyen Thai, Marion Berbineau:
Quantization for Uplink Transmissions in Two-tier Networks with Femtocells. - John Matta, Jeffrey Borwey, Gunes Ercal:
Comparative Resilience Notions and Vertex Attack Tolerance of Scale-Free Networks. - Shiu Kumar, Eun Sik Ham, Seong Ro Lee:
Traffic Monitoring Using M2M Communication. - Josep Díaz, George B. Mertzios:
Minimum Bisection is NP-hard on Unit Disk Graphs. - Bharat Adsul, Jinesh Machchhar, Milind A. Sohoni:
A Computational Framework for Boundary Representation of Solid Sweeps. - Siyi Wang, Weisi Guo, Mark D. McDonnell:
Downlink Interference Estimation without Feedback for Heterogeneous Network Interference Avoidance. - Siyi Wang, Weisi Guo, Song Qiu, Mark D. McDonnell:
Performance of Macro-Scale Molecular Communications with Sensor Cleanse Time. - Shusen Wang, Zhihua Zhang:
Efficient Algorithms and Error Analysis for the Modified Nystrom Method. - Albert Y. S. Lam, Yanhui Geng, Victor O. K. Li:
Information-Theoretic Bounds for Performance of Resource-Constrained Communication Systems. - Juha Kontinen, Julian-Steffen Müller, Henning Schnoor, Heribert Vollmer:
Modal Independence Logic. - O. O. Ogunduyile, Oludayo O. Olugbara, Lall Manoj:
Development of Wearable Systems for Ubiquitous Healthcare Service Provisioning. - David García, Ingmar Weber, Venkata Rama Kiran Garimella:
Gender Asymmetries in Reality and Fiction: The Bechdel Test of Social Media. - Mojtaba Soltanalian, Petre Stoica:
A Recursive Method for Enumeration of Costas Arrays. - Boris Bellalta, Alessandro Zocca, Cristina Cano, Alessandro Checco, Jaume Barceló, Alexey V. Vinel:
Throughput Analysis in CSMA/CA Networks using Continuous Time Markov Networks: A Tutorial. - Abidin Kaya, Bahattin Yildiz:
Extension theorems for self-dual codes over rings and new binary self-dual codes. - Andreas Veit, Christoph Goebel, Rohit Tidke, Christoph Doblander, Hans-Arno Jacobsen:
Household Electricity Demand Forecasting - Benchmarking State-of-the-Art Methods. - Peter Jung, Philipp Walk:
Sparse Model Uncertainties in Compressed Sensing with Application to Convolutions and Sporadic Communication. - Bassam A. Alqaralleh, Khaled Almiani:
Mobile Elements Scheduling for Periodic Sensor Applications. - Alessandro Borri, Giordano Pola, Maria Domenica Di Benedetto:
Symbolic Control Design of Nonlinear Networked Control Systems. - Sy-Quoc Le, Vincent Yan Fu Tan, Mehul Motani:
A Case Where Interference Does Not Affect The Channel Dispersion. - Victor Alvarez, Karl Bringmann, Saurabh Ray, Raimund Seidel:
Counting Triangulations and other Crossing-Free Structures Approximately. - Ahmed Douik
, Sameh Sorour, Mohamed-Slim Alouini
, Tareq Y. Al-Naffouri
:
On Minimizing the Maximum Broadcast Decoding Delay for Instantly Decodable Network Coding. - Jingge Zhu, Michael Gastpar:
Lattice Codes for Many-to-One Interference Channels With and Without Cognitive Messages. - Chandan K. Dubey, Thomas Holenstein:
Sampling a Uniformly Random Solution of a Quadratic Equation over Quotient Rings. - Jack Kelly, William J. Knottenbelt:
'UK-DALE': A dataset recording UK Domestic Appliance-Level Electricity demand and whole-house demand. - David Eppstein, Michael T. Goodrich, Michael Mitzenmacher, Pawel Pszona:
Wear Minimization for Cuckoo Hashing: How Not to Throw a Lot of Eggs into One Basket. - Mostafizur Rahman, Pritish Narayanan, Csaba Andras Moritz:
Metal-Gated Junctionless Nanowire Transistors. - Matthias Schröder, Victor L. Selivanov:
Hyperprojective Hierarchy of QCB0-spaces. - (Withdrawn) A Kernel-Based Nonparametric Test for Anomaly Detection over Line Networks.
- David Darmon, Elisa Omodei, Joshua Garland:
Followers Are Not Enough: Beyond Structural Communities in Online Social Networks. - Abhisek Kundu, Petros Drineas:
A Note on Randomized Element-wise Matrix Sparsification. - Bei Yu, David Z. Pan:
Layout Decomposition for Quadruple Patterning Lithography and Beyond. - Menglong Zhu, Nikolay Atanasov, George J. Pappas, Kostas Daniilidis:
Active Deformable Part Models. - John S. H. Baxter
, Martin Rajchl, Jing Yuan, Terry M. Peters:
A Continuous Max-Flow Approach to General Hierarchical Multi-Labelling Problems. - Paul S. Bonsma, Amer E. Mouawad:
The Complexity of Bounded Length Graph Recoloring. - Thomas Rothvoß:
Constructive discrepancy minimization for convex sets. - Andrew W. Eckford, Chan-Byoung Chae:
Scaling laws for molecular communication. - Ming Lei, Mohammad Reza Soleymani:
Performance of the Generalized Quantize-and-Forward Scheme over the Multiple-Access Relay Channel. - Lutz Bornmann:
Inter-rater reliability and convergent validity of F1000Prime peer review. - Sebastiano Vigna:
Further scramblings of Marsaglia's xorshift generators. - Chiyuan Zhang, Georgios Evangelopoulos
, Stephen Voinea, Lorenzo Rosasco, Tomaso A. Poggio:
A Deep Representation for Invariance And Music Classification. - Xu Chen, Zeeshan Syed, Alfred O. Hero III:
EEG Spatial Decoding and Classification with Logit Shrinkage Regularized Directed Information Assessment (L-SODA). - Emil Björnson, Mats Bengtsson, Björn E. Ottersten:
Optimal Multiuser Transmit Beamforming: A Difficult Problem with a Simple Solution Structure. - Fabio Mogavero
, Aniello Murano, Moshe Y. Vardi:
Proceedings 2nd International Workshop on Strategic Reasoning, SR 2014, Grenoble, France, April 5-6, 2014. EPTCS 146, 2014 [contents] - Miltiadis Allamanis, Charles Sutton:
Mining Idioms from Source Code. - Bei Yin, Michael Wu, Joseph R. Cavallaro, Christoph Studer:
Conjugate Gradient-based Soft-Output Detection and Precoding in Massive MIMO Systems. - Shuhang Wu, Shuangqing Wei, Yue Wang, Ramachandran Vaidyanathan, Jian Yuan:
Partition Information and its Transmission over Boolean Multi-Access Channels. - Ryutaroh Matsumoto:
New Asymptotic Metrics for Relative Generalized Hamming Weight. - Barbora Buhnova, Lucia Happe, Jan Kofron:
Proceedings 11th International Workshop on Formal Engineering approaches to Software Components and Architectures, FESCA 2014, Grenoble, France, 12th April 2014. EPTCS 147, 2014 [contents] - Robert Suderman, Daniel J. Lizotte, Nasser Mohieddin Abukhdeir:
Theory and Application of Shapelets to the Analysis of Surface Self-assembly Imaging. - Kevin Carlberg:
Adaptive $h$-refinement for reduced-order models. - Pokkuluri Kiran Sree, Inampudi Ramesh Babu, N. S. S. S. N. Usha Devi:
Cellular Automata and Its Applications in Bioinformatics: A Review. - Mohammed Zakarya Baba-Ahmed, Badr Benmammar, Fethi Tarik Bendimerad:
Self-protection and self-healing in the context of cognitive radio. - Loet Leydesdorff, Caroline S. Wagner, Lutz Bornmann:
The European Union, China, and the United States in the Top-1% and Top-10% Layers of Most-Frequently-Cited Publications: Competition and Collaborations. - Da Kuang, Raffay Hamid:
piCholesky: Polynomial Interpolation of Multiple Cholesky Factors for Efficient Approximate Cross-Validation. - Xin Kang, Chin Keong Ho, Sumei Sun:
Full-Duplex Wireless-Powered Communication Network with Energy Causality. - Haixin Zhang, Daijun Wei, Yong Hu, Xin Lan, Yong Deng:
Modelling the Self-similarity in Complex Networks Based on Coulomb's Law. - Jörg H. Kappes, Björn Andres, Fred A. Hamprecht, Christoph Schnörr, Sebastian Nowozin, Dhruv Batra, Sungwoong Kim, Bernhard X. Kausler, Thorben Kröger, Jan Lellmann, Nikos Komodakis, Bogdan Savchynskyy, Carsten Rother:
A Comparative Study of Modern Inference Techniques for Structured Discrete Energy Minimization Problems. - Li Gou, Yong Deng, Rehan Sadiq, Sankaran Mahadevan:
Modeling contaminant intrusion in water distribution networks based on D numbers. - Talal Rahwan, Victor Naroditskiy, Tomasz P. Michalak, Michael J. Wooldridge, Nicholas R. Jennings:
Towards a Fair Allocation of Rewards in Multi-Level Marketing. - Thomas Given-Wilson
:
An Intensional Concurrent Faithful Encoding of Turing Machines. 21-37 - Paul J. Werbos:
From ADP to the Brain: Foundations, Roadmap, Challenges and Research Priorities. - Saeid Sahraei, Michael C. Gastpar:
New Shortest Lattice Vector Problems of Polynomial Complexity. - Goce Chadzitaskos, Lenka Háková, Ondrej Kajínek:
Weyl group orbit functions in image processing. - Rob Arthan, Paulo Oliva:
On Affine Logic and Łukasiewicz Logic. - Xinpei Ma, Hiroki Sayama:
Mental Disorder Recovery Correlated with Centralities and Interactions on an Online Social Network. - David Adjiashvili, Noy Rotbart:
Labeling Schemes for Bounded Degree Graphs. - Oscar Esteban, Gert Wollny, Subrahmanyam Gorthi, María J. Ledesma-Carbayo, Jean-Philippe Thiran, Andrés Santos, Meritxell Bach Cuadra:
MBIS: Multivariate Bayesian Image Segmentation Tool. - John Fearnley, Rahul Savani
:
The Complexity of the Simplex Method. - André Frochaux, Martin Grohe, Nicole Schweikardt:
Monadic Datalog Containment on Trees. - Mostafizur Rahman, Santosh Khasanvis, Jiajun Shi, Mingyu Li, Csaba Andras Moritz:
Skybridge: 3-D Integrated Circuit Technology Alternative to CMOS. - Shai Vardi:
The secretary returns. - Mostafizur Rahman, Santosh Khasanvis, Csaba Andras Moritz:
Nanowire Volatile RAM as an Alternative to SRAM. - Mohammed Javed, P. Nagabhushan, B. B. Chaudhuri:
Extraction of Projection Profile, Run-Histogram and Entropy Features Straight from Run-Length Compressed Text-Documents. - Akin Osman Kazakci:
Conceptive Artificial Intelligence: Insights from design theory. - Julien Cassaigne, Vesa Halava, Tero Harju, François Nicolas:
Tighter Undecidability Bounds for Matrix Mortality, Zero-in-the-Corner Problems, and More. - Juan Carlos Cortés, Francisco-José Santonja, Ana C. Tarazona, Rafael J. Villanueva, Javier Villanueva-Oller:
A probabilistic estimation and prediction technique for dynamic continuous social science models: The evolution of the attitude of the Basque Country population towards ETA as a case study. - Gil Cohen, Avishay Tal:
Two Structural Results for Low Degree Polynomials and Applications. - Edwin Hammerich:
Waterfilling Theorems in the Time-Frequency Plane for the Heat Channel and a Related Source. - YounSun Cho:
Privacy-Preserving Social Network with Multigrained and Multilevel Access Control. - Yong Wang:
Entanglement in Quantum Process Algebra. - Hammurabi Mendes, Sorin Istrail:
Thermodynamic Hypothesis as Social Choice: An Impossibility Theorem for Protein Folding. - Xin-She Yang, Mehmet Karamanoglu, Xingshi He:
Multi-objective Flower Algorithm for Optimization. - Spyros Sioutas, Evangelos Sakkopoulos, Alexandros Panaretos, Dimitrios Tsoumakos, Panagiotis Gerolymatos, Giannis Tzimas, Yannis Manolopoulos:
D-P2P-Sim+: A Novel Distributed Framework for P2P Protocols Performance Testing. - Emanuela Merelli, Nicola Paoletti, Luca Tesei:
Adaptability Checking in Multi-Level Complex Systems. - Mahmoud Abo Khamis, Hung Q. Ngo, Christopher Ré, Atri Rudra:
Joins via Geometric Resolutions: Worst-case and Beyond. - Xin-She Yang, Slawomir Koziel, Leifur Þ. Leifsson:
Computational Optimization, Modelling and Simulation: Recent Trends and Challenges. - Deeparnab Chakrabarty, Kashyap Dixit, Madhav Jha, C. Seshadhri:
Property Testing on Product Distributions: Optimal Testers for Bounded Derivative Properties. - Emily Denton, Wojciech Zaremba, Joan Bruna, Yann LeCun, Rob Fergus:
Exploiting Linear Structure Within Convolutional Networks for Efficient Evaluation. - Geoffrey Irving:
Pentago is a First Player Win: Strongly Solving a Game Using Parallel In-Core Retrograde Analysis. - Serge Gaspers, Gregory B. Sorkin:
Separate, Measure and Conquer: Faster Algorithms for Max 2-CSP and Counting Dominating Sets. - Bertrand Wechsler, Dan Eilat, Nicolas Limal:
Information Flow Decompositions in Feedback Systems: General Case Study. - Mrinalkanti Ghosh, Satyadev Nandakumar, Atanu Pal:
Ornstein Isomorphism and Algorithmic Randomness. - Md. Enamul Haque, Abdullah Al Kaisan, Mahmudur R. Saniat, Aminur Rahman:
GPU Accelerated Fractal Image Compression for Medical Imaging in Parallel Computing Platform. - Mohsen Ghaffari, Bernhard Haeupler, Majid Khabbazian:
Randomized Broadcast in Radio Networks with Collision Detection. - Verica Bakeva, Aleksandra Popovska-Mitrovikj, Vesna Dimitrova:
Resistance of Statistical Attacks of Parastrophic Quasigroup Transformation. - Cem Evrendilek, Ismail Hakki Toroslu, Sasan Hashemi:
Task Assignment in Tree-Like Hierarchical Structures. - Oscar Stiffelman:
The Least Wrong Model Is Not in the Data. - Victor Marsault, Jacques Sakarovitch:
Breadth-first serialisation of trees and rational languages. - Allan Grønlund Jørgensen, Seth Pettie:
Threesomes, Degenerates, and Love Triangles. - Cosimo Anglano, Marco Guazzone, Matteo Sereno:
Maximizing Profit in Green Cellular Networks through Collaborative Games. - Daniel Lokshtanov, Marcin Pilipczuk, Michal Pilipczuk, Saket Saurabh:
Fixed-parameter tractable canonization and isomorphism test for graphs of bounded treewidth. - Tal Kopetz, Haim H. Permuter, Shlomo Shamai:
Multiple Access Channels with Combined Cooperation and Partial Cribbing. - Véronique Bruyère, Emmanuel Filiot
, Mickael Randour, Jean-François Raskin:
Expectations or Guarantees? I Want It All! A crossroad between games and MDPs. 1-8 - Lluís Godo
, Enrico Marchioni
:
Games for the Strategic Influence of Expectations. 9-15 - Wojciech Jamroga
, Matthijs Melissen, Henning Schnoor:
On Defendability of Security Properties. 17-25 - Francesco Belardinelli
:
Reasoning about Knowledge and Strategies: Epistemic Strategy Logic. 27-33 - Xiaowei Huang
, Ron van der Meyden
:
An Epistemic Strategy Logic (Extended Abstract). 35-41 - Patricia Bouyer, Nicolas Markey
, Steen Vester:
Nash Equilibria in Symmetric Games with Partial Observation. 49-55 - Dimitar P. Guelev:
Refining and Delegating Strategic Ability in ATL. 57-63 - Cláudia Nalon, Lan Zhang, Clare Dixon
, Ullrich Hustadt
:
A Resolution Prover for Coalition Logic. 65-73 - Xiang Jiang, Arno Pauly
:
Efficient Decomposition of Bimatrix Games (Extended Abstract). 75-81 - Benjamin Aminof, Sasha Rubin
:
First Cycle Games. 83-90 - Guillaume Aucher
, Bastien Maubert
, Sophie Pinchinat:
Automata Techniques for Epistemic Protocol Synthesis. 97-103 - Piero A. Bonatti
, Marco Faella, Luigi Sauro:
Partial Preferences for Mediated Bargaining. 105-111 - Fenglin Han, Jan Olaf Blech
, Peter Herrmann
, Heinz W. Schmidt:
Towards Verifying Safety Properties of Real-Time Probabilistic Systems. 1-15 - Stefan Stattelmann, Manuel Oriol, Thomas Gamer
:
Execution Time Analysis for Industrial Control Applications. 16-31 - Arnaud Lanoix, Olga Kouchnarenko
:
Component Substitution through Dynamic Reconfigurations. 32-46 - Christian Colombo
, Gordon J. Pace
:
Comprehensive Monitor-Oriented Compensation Programming. 47-61 - Rui Couto
, António Nestor Ribeiro
, José Creissac Campos
:
Application of Ontologies in Identifying Requirements Patterns in Use Cases. 62-76 - Antinisca Di Marco
, Catia Trubiani
:
A model-driven approach to broaden the detection of software performance antipatterns at runtime. 77-92 - Faiz Ul Muram, Huy Tran, Uwe Zdun:
Automated Mapping of UML Activity Diagrams to Formal Specifications for Supporting Containment Checking. 93-107 - Mounira Kezadri Hamiaz
, Marc Pantel, Benoît Combemale, Xavier Thirioux:
Correct-by-construction model composition: Application to the Invasive Software Composition method. 108-122 - Wei Bai, Emmanuel M. Tadjouddine, Yu Guo:
Enabling Automatic Certification of Online Auctions. 123-132 - Luciana Brasil Rebelo dos Santos
, Valdivino Alexandre de Santiago Júnior
, Nandamudi Lankalapalli Vijaykumar:
Transformation of UML Behavioral Diagrams to Support Software Model Checking. 133-142 - Kangqi Liu, Meixia Tao, Dingcheng Yang:
Generalized Signal Alignment For Arbitrary MIMO Two-Way Relay Channels. - Jun He, Feidun He, Hongbin Dong:
A Novel Genetic Algorithm using Helper Objectives for the 0-1 Knapsack Problem. - Youze Tang, Xiaokui Xiao, Yanchen Shi:
Influence Maximization: Near-Optimal Time Complexity Meets Practical Efficiency. - Zoran Hadzi-Velkov, Nikola Zlatanov, Robert Schober:
Optimal Power Control for Analog Bidirectional Relaying with Long-Term Relay Power Constraint. - Vikramkumar, Vijaykumar B, Trilochan:
Bayes and Naive Bayes Classifier. - Jiyi Li:
Map Route Ranking with Weighted Distance using Environmental Factors. - Michael Codish, Luís Cruz-Filipe, Peter Schneider-Kamp:
The Quest for Optimal Sorting Networks: Efficient Generation of Two-Layer Prefixes. - Jochen Burghardt, Birgit Heinz:
Implementing Anti-Unification Modulo Equational Theory. - Thomas Given-Wilson:
Expressiveness via Intensionality and Concurrency. - Joong Bum Rhim, Vivek K. Goyal:
Distributed Hypothesis Testing with Social Learning and Symmetric Fusion. - Fabian Monsees, Carsten Bockelmann, Dirk Wübben, Armin Dekorsy:
Compressed Sensing Bayes Risk Minimization for Under-determined Systems via Sphere Detection. - Lila Kari, Steffen Kopecki, Pierre-Étienne Meunier, Matthew J. Patitz, Shinnosuke Seki:
Binary pattern tile set synthesis is NP-hard. - Yan Liu, Haode Yan, Chunlei Liu:
A Class of Reducible Cyclic Codes and Their Weight Distribution. - Karine Zidane, Jérôme Lacan, Marie-Laure Boucheret, Charly Poulliat:
Improved channel estimation for interference cancellation in random access methods for satellite communications. - Marco Beccuti, Enrico Bibbona, András Horváth, Roberta Sirovich, Alessio Angius, Gianfranco Balbo:
Analysis of Petri Net Models through Stochastic Differential Equations. - Shay Mozes, Yahav Nussbaum, Oren Weimann:
Faster Shortest Paths in Dense Distance Graphs, with Applications. - Martin Kasparick, Renato L. G. Cavalcante, Stefan Valentin, Slawomir Stanczak, Masahiro Yukawa:
Kernel-Based Adaptive Online Reconstruction of Coverage Maps With Side Information. - Suman Joshi, Yashwant Singh Chauhan, Ashish Negi:
New Julia and Mandelbrot Sets for Jungck Ishikawa Iterates. - Tamal K. Dey, Alfred Rossi, Anastasios Sidiropoulos:
Spectral concentration, robust k-center, and simple clustering. - Thiago Henrique Silva, Pedro O. S. Vaz de Melo, Jussara M. Almeida, Mirco Musolesi, Antonio A. F. Loureiro:
You are What you Eat (and Drink): Identifying Cultural Boundaries by Analyzing Food & Drink Habits in Foursquare. - György Dósa, Leah Epstein:
Online bin packing with cardinality constraints revisited. - Leah Epstein, Asaf Levin:
Minimum total weighted completion time: Faster approximation schemes. - Stephen Tyree, Jacob R. Gardner, Kilian Q. Weinberger, Kunal Agrawal, John Tran:
Parallel Support Vector Machines in Practice. - Francisco Javier Martin-Vega, Francisco Javier López-Martínez, Gerardo Gómez, Mari Carmen Aguayo Torres:
Multi-User Coverage Probability of Uplink Cellular Systems: a Stochastic Geometry Approach. - Martin Farach-Colton, Katia Leal, Miguel A. Mosteiro, Christopher Thraves:
Dynamic Windows Scheduling with Reallocation. - Sungjin Im, Janardhan Kulkarni, Kamesh Munagala:
Competitive Algorithms from Competitive Equilibria: Non-Clairvoyant Scheduling under Polyhedral Constraints. - Jonathon Shlens:
A Tutorial on Principal Component Analysis. - Daniel M. Kane:
A Polylogarithmic PRG for Degree $2$ Threshold Functions in the Gaussian Setting. - Junjie Zhu, Siddhartan Govindasamy, Jeff Hwang:
Performance of Multiantenna Linear MMSE Receivers in Doubly Stochastic Networks. - Jun He, Honghai Zhang, Baohua Zhao, Sampath Rangarajan:
A Collaborative Framework for In-network Video Caching in Mobile Networks. - Ashutosh Nayyar, Matias Negrete-Pincetic, Kameshwar Poolla, Pravin Varaiya:
Duration-Differentiated Services in Electricity. - Ahmed H. Anwar, Ahmed El Shafie, Amr Mohamed, Tamer A. ElBatt, Mohsen Guizani:
Interference-based Optimal Power-efficient Access Scheme for Cognitive Radio Networks. - Ayush Bhandari, Achuta Kadambi, Refael Whyte, Christopher Barsi, Micha Feigin, Adrian A. Dorrington, Ramesh Raskar:
Resolving Multi-path Interference in Time-of-Flight Imaging via Modulation Frequency Diversity and Sparse Regularization. - Kai Li, Yong Wang, Meilin Liu:
A Task Allocation Schema Based on Response Time Optimization in Cloud Computing. - Chengyu Peng, Hong Cheng, Manchor Ko:
An Efficient Two-Stage Sparse Representation Method. - Christopher Amato, Frans A. Oliehoek:
Scalable Planning and Learning for Multiagent POMDPs. - Yifan Zhou, Zhifeng Zhao, Qianlan Ying, Rongpeng Li, Xuan Zhou, Honggang Zhang:
Two-tier Spatial Modeling of Base Stations in Cellular Networks. - Qianlan Ying, Zhifeng Zhao, Yifan Zhou, Rongpeng Li, Xuan Zhou, Honggang Zhang:
Modeling Spatial Distributions of Base Stations in Cellular Networks. - Pokkuluri Kiran Sree, Inampudi Ramesh Babu, N. S. S. S. N. Usha Devi:
AIS-MACA- Z: MACA based Clonal Classifier for Splicing Site, Protein Coding and Promoter Region Identification in Eukaryotes. - Mohammad Noshad, Maïté Brandt-Pearce:
Hadamard Coded Modulation: An Alternative to OFDM for Optical Wireless Communications. - (Withdrawn) Recognition of Handwritten MODI Numerals using Hu and Zernike features.
- Nilanjan Roy Chowdhury, Srikant Sukumar:
Persistence based analysis of consensus protocols for dynamic graph networks. - Germán Corrales Madueño, Cedomir Stefanovic, Petar Popovski:
Reliable Reporting for Massive M2M Communications with Periodic Resource Pooling. - Amirali Abdullah, Suresh Venkatasubramanian:
A directed isoperimetric inequality with application to Bregman near neighbor lower bounds. - Xin Kang, Yeow-Khiang Chia, Chin Keong Ho, Sumei Sun:
Cost minimization for fading channels with energy harvesting and conventional energy. - Jochen Burghardt:
Experiences in Developing Time-Critical Systems - The Case Study "Production Cell". - Jochen Burghardt:
Regular Substitution Sets: A Means of Controlling E-Unification. - Sergey Goncharov, Dirk Pattinson:
Coalgebraic Weak Bisimulation from Recursive Equations over Monads. - Bertram Felgenhauer, Aart Middeldorp, Harald Zankl, Vincent van Oostrom
:
Layer Systems for Proving Confluence. - Jochen Burghardt:
Formale Entwicklung einer Steuerung für eine Fertigungszelle mit SYSYFOS. - Giulio Coluccia, Aline Roumy, Enrico Magli:
Operational Rate-Distortion Performance of Single-source and Distributed Compressed Sensing. - Emna Zedini
, Imran Shafique Ansari
, Mohamed-Slim Alouini
:
Unified Performance Analysis of Mixed Line of Sight RF-FSO Fixed Gain Dual-Hop Transmission Systems. - Iovka Boneva, José Emilio Labra Gayo, Samuel Hym, Eric G. Prud'hommeaux, Harold R. Solbrig, Slawek Staworko:
Validating RDF with Shape Expressions. - Md. Selim Al Mamun, B. K. Karmaker:
Design of Reversible Counter. - Ahmed Tamrawi, Kang Gui, Suresh C. Kothari:
Event-Flow Graphs for Efficient Path-Sensitive Analyses. - Dongwoo Kim, Alice Oh:
Hierarchical Dirichlet Scaling Process. - Yuri Shalygo:
The Kinetic Basis of Self-Organized Pattern Formation. - Ardavan Rahimian:
Steerable Antennas for Automotive Communication Systems. - Omaima N. A. Al-Allaf:
Review of Face Detection Systems Based Artificial Neural Networks Algorithms. - Emilio Ferrara, Pasquale De Meo, Salvatore Catanese, Giacomo Fiumara:
Detecting criminal organizations in mobile phone networks. - Zohreh Zahedi, Rodrigo Costas, Paul Wouters:
How well developed are altmetrics? A cross-disciplinary analysis of the presence of 'alternative metrics' in scientific publications. - Kyeong Soo Kim:
Comments on "IEEE 1588 Clock Synchronization using Dual Slave Clocks in a Slave". - Nihat Engin Tunali, Yu-Chih Huang, Joseph J. Boutros, Krishna R. Narayanan:
Lattices over Eisenstein Integers for Compute-and-Forward. - Valery N. Gorbachev, E. M. Kaynarova, I. K. Metelev, E. S. Yakovleva:
Color to Gray and Back transformation for distributing color digital images. - K. Meenakshi, Ch. Srinivasa Rao, K. Satya Prasad:
Robust Video Watermarking Schemes in Phase domain Using Binary Phase Shift Keying. - Robert LiKamWa, Zhen Wang, Aaron Carroll, Felix Xiaozhu Lin, Lin Zhong:
Draining our Glass: An Energy and Heat Characterization of Google Glass. - Glencora Borradaile, Claire Mathieu, Theresa Migler:
Lower bounds for testing digraph connectivity with one-pass streaming algorithms. - Da Wang, Gauri Joshi, Gregory W. Wornell:
Efficient Task Replication for Fast Response Times in Parallel Computation. - Siarhei V. Charapitsa, Irina Ya. Dubovskaya, Alexander S. Lobko, Tatiana A. Savitskaya, Svetlana N. Sytova:
Structure of Belarusian educational and research web portal of nuclear knowledge. - Nima Haghpanah, Jason D. Hartline:
Reverse Mechanism Design. - Lilian Hong:
Optimizing Relay Precoding for Wireless Coordinated Relaying. - Maksym Gabielkov, Ashwin Rao, Arnaud Legout
:
Studying Social Networks at Scale: Macroscopic Anatomy of the Twitter Social Graph. - Zheng Wang, Ming-Jun Lai, Zhaosong Lu, Wei Fan, Hasan Davulcu, Jieping Ye:
Orthogonal Rank-One Matrix Pursuit for Low Rank Matrix Completion. - Michael Backes, Sven Bugiel, Sebastian Gerling, Philipp von Styp-Rekowsky:
Android Security Framework: Enabling Generic and Extensible Access Control on Android. - Abhishek Gupta, Serdar Yüksel, Tamer Basar, Cedric Langbort:
On the Existence of Optimal Policies for a Class of Static and Sequential Dynamic Teams. - Arastoo Fazeli, Amir Ajorlou, Ali Jadbabaie:
Optimal Budget Allocation in Social Networks: Quality or Seeding. - Yao Sun, Dongdai Lin, Dingkang Wang:
An Improvement over the GVW Algorithm for Inhomogeneous Polynomial Systems. - Cong Tian, Zhenhua Duan:
Buchi Determinization Made Tighter. - Farshad Shams, Marco Luise:
Upper-Bounding the Capacity of Relay Communications - Part II. - Karl Bringmann:
Why walking the dog takes time: Frechet distance has no strongly subquadratic algorithms unless SETH fails. - Hamidou Tembine:
Non-Asymptotic Mean-Field Games. - Michal Cierny, Zhi Ding, Risto Wichman:
Higher Rank Interference Effect on Weak Beamforming or OSTBC Terminals. - Pallavi V. S., D. Rukmani Devi:
Design of a High Speed FPGA-Based Classifier for Efficient Packet Classification. - Sukhchandan Randhawa, Anil Kumar Verma:
A Review of Power Aware Routing Protocols in Wireless Sensor Networks. - Swetha R., D. Rukmani Devi:
High Throughput and Less Area AMP Architecture for Audio Signal Restoration. - Sukhchandan Randhawa:
Research Challenges in Wireless Sensor Network: A State of the Play. - Wenjing Liao, Albert Fannjiang:
MUSIC for Single-Snapshot Spectral Estimation: Stability and Super-resolution. - Xiaojun Yuan:
MIMO Multiway Relaying with Clustered Full Data Exchange: Signal Space Alignment and Degrees of Freedom. - Jayita Mitra, Diganta Saha:
An Efficient Feature Selection in Classification of Audio Files. - Med. Essahafi:
Model Predictive Control (MPC) Applied To Coupled Tank Liquid Level System. - Yair Wiener, Steve Hanneke, Ran El-Yaniv:
A Compression Technique for Analyzing Disagreement-Based Active Learning. - Shmuel Friedland, Qun Li, Dan Schonfeld, Edgar A. Bernal:
Two algorithms for compressed sensing of sparse tensors. - Aske Plaat:
MTD(f), A Minimax Algorithm Faster Than NegaScout. - Avinash N. Bhute, B. B. Meshram:
Text Based Approach For Indexing And Retrieval Of Image And Video: A Review. - Aske Plaat, Jonathan Schaeffer, Wim Pijls, Arie de Bruin:
A New Paradigm for Minimax Search. - Aske Plaat, Jonathan Schaeffer, Wim Pijls, Arie de Bruin:
SSS* = Alpha-Beta + TT. - Aske Plaat, Jonathan Schaeffer, Wim Pijls, Arie de Bruin:
Nearly Optimal Minimax Tree Search? - Vivek Kulkarni, Rami Al-Rfou', Bryan Perozzi, Steven Skiena:
Exploring the power of GPU's for training Polyglot language models. - Dimitris S. Papailiopoulos, Anastasios Kyrillidis, Christos Boutsidis:
Provable Deterministic Leverage Score Sampling. - Fabio Mogavero, Giuseppe Perelli:
On the Remarkable Features of Binding Forms. - Jihong Park, Seong-Lyun Kim, Jens Zander:
Asymptotic Behavior of Ultra-Dense Cellular Networks and Its Economic Impact. - R. Vidya, G. M. Nasira, R. P. Jaia Priyankka:
Sparse Coding: A Deep Learning using Unlabeled Data for High - Level Representation. - Vadim Stadnik:
Fast Sequential Summation Algorithms Using Augmented Data Structures. - Guosheng Lin, Chunhua Shen, Qinfeng Shi, Anton van den Hengel, David Suter:
Fast Supervised Hashing with Decision Trees for High-Dimensional Data. - Friedrich Eisenbrand, Santosh S. Vempala:
Geometric Random Edge. - YounSun Cho:
Detecting a Corrupted Area in a 2-Dimensional Space. - Alexios Balatsoukas-Stimming, Andreas Burg:
Density Evolution for Min-Sum Decoding of LDPC Codes Under Unreliable Message Storage. - James Pallister, Kerstin Eder, Simon J. Hollis, Jeremy Bennett:
A high-level model of embedded flash energy consumption. - Alexander W. Churchill, Siddharth Sigtia, Chrisantha Fernando:
A Denoising Autoencoder that Guides Stochastic Search. - Radoslaw Klimek, Leszek Kotulski:
Proposal of a multiagent-based smart environment for the IoT. - Ruizhi Liao, Boris Bellalta, Miquel Oliver, Zhisheng Niu:
MU-MIMO MAC Protocols for Wireless Local Area Networks: A Survey. - Barbara Kordy, Sjouke Mauw
, Wolter Pieters:
Proceedings First International Workshop on Graphical Models for Security, GraMSec 2014, Grenoble, France, April 12, 2014. EPTCS 148, 2014 [contents] - Yauhen Klimiankou:
An Enhanced Multi-Pager Environment Support for Second Generation Microkernels. - Hu Li, Yuan'an Liu, Dongming Yuan, Hefei Hu, Sirui Duan:
Utility Optimal Scheduling in Degree-Limited Satellite Networks. - (Withdrawn) Proximal Navigation Graphs and t-spanners.
- Hu Li, Yuan'an Liu, Hefei Hu, Dongming Yuan, Sirui Duan:
Analysis of Capacity Region of Delay-Tolerant Hybrid Mobile Ad Hoc Networks. - Lu Yu, Chuang Liu, Zi-Ke Zhang:
Multi-Linear Interactive Matrix Factorization. - Dian-Wu Yue, Geoffrey Ye Li:
LOS-based Conjugate Beamforming and Power-Scaling Law in Massive-MIMO Systems. - Namita Mittal, Basant Agarwal, Ajay Gupta, Hemant Madhur:
Icon Based Information Retrieval and Disease Identification in Agriculture. - Claudio De Persis, Pietro Tesi:
On Resilient Control of Nonlinear Systems under Denial-of-Service. - Olawale Surajudeen Adebayo, Shafii Muhammad Abdulhamid
, Andrew E. Fluck:
The Prospects for e-Examinations in Nigeria and Australia. - Le Thanh Tan, Long Bao Le:
Channel Assignment With Access Contention Resolution for Cognitive Radio Networks. - Le Thanh Tan, Long Bao Le:
Distributed MAC Protocol for Cognitive Radio Networks: Design, Analysis, and Optimization. - (Withdrawn) Pseudo-Zernike Based Multi-Pass Automatic Target Recognition From Multi-Channel SAR.
- Andris Ambainis, Jozef Gruska, Shenggen Zheng:
Exact query complexity of some special classes of Boolean functions. - Guido Governatori:
Thou Shalt is not You Will. - Jozef Gruska, Daowen Qiu, Shenggen Zheng:
Potential of quantum finite automata with exact acceptance. - Congduc Pham, Fumitoshi Matsuno, Serge Stinckwich:
Proceedings of Third Workshop on Robots and Sensors integration in future rescue INformation system (ROSIN 2013). - Martin Stanek:
Memory-only selection of dictionary PINs. - Gabriel Leuenberger:
Universal Algorithmic Ethics. - Christian Konrad, László Kozma:
Streaming Algorithms for Partitioning Integer Sequences. - Alexios Balatsoukas-Stimming, Andreas Burg:
Faulty Successive Cancellation Decoding of Polar Codes for the Binary Erasure Channel. - Nir Ailon:
A Tighter Lower Bound For Fourier Transform in the Well Conditioned Model. - Gourav Verma
, Deepika Ramaiya:
Analysis, Review and Optimization of SONET/SDH Technology for today and future aspects. - Erik D. Demaine, Martin L. Demaine:
Fun with Fonts: Algorithmic Typography. - Artem Babenko, Anton Slesarev, Alexander Chigorin, Victor S. Lempitsky:
Neural Codes for Image Retrieval. - Mohammad Hassan Lotfi, George Kesidis, Saswati Sarkar:
Network Non-Neutrality on the Internet: Content Provision Under a Subscription Revenue Model. - Harris Kyriakou, Jeffrey V. Nickerson:
Collective Innovation in Open Source Hardware. - Lorenzo Pasquini:
A class of AM-QFT algorithms for power-of-two FFT. - Anugrah Kumar:
Determining the Consistency factor of Autopilot using Rough Set Theory. - Georgios Lestaris, Ioannis Charalampidis, Dario Berzano, Jakob Blomer, Predrag Buncic, Gerardo Ganis, René Meusel:
CernVM Online and Cloud Gateway: a uniform interface for CernVM contextualization and deployment. - Derrick Wing Kwan Ng, Robert Schober:
Max-min Fair Wireless Energy Transfer for Secure Multiuser Communication Systems. - Silviu S. Craciunas, Christoph M. Kirsch, Hannes Payer, Harald Röck, Ana Sokolova:
Concurrency and Scalability versus Fragmentation and Compaction with Compact-fit. - Artem Babenko, Victor S. Lempitsky:
Improving Bilayer Product Quantization for Billion-Scale Approximate Nearest Neighbors in High Dimensions. - Sagar Tirodkar, Yazad Baldawala, Sagar Ulane, Ashok Jori:
Improved 3-Dimensional Security in Cloud Computing. - Aditi Kalyani, Hemant Kumud, Shashi Pal Singh, Ajai Kumar, Hemant Darbari:
Evaluation and Ranking of Machine Translated Output in Hindi Language using Precision and Recall Oriented Metrics. - Zhe Wang, Naftaly H. Minsky:
Establishing Global Policies over Decentralized Online Social Networks. - Andreas Gemsa, Martin Nöllenburg, Ignaz Rutter:
Evaluation of Labeling Strategies for Rotating Maps. - Marco Bressan, Enoch Peserico, Luca Pretto:
Approximating PageRank locally with sublinear query complexity. - Forrest N. Iandola, Matthew W. Moskewicz, Sergey Karayev, Ross B. Girshick, Trevor Darrell, Kurt Keutzer:
DenseNet: Implementing Efficient ConvNet Descriptor Pyramids. - Anthony Sigogne, Matthieu Constant, Éric Laporte
:
Intégration des données d'un lexique syntaxique dans un analyseur syntaxique probabiliste. - Guoming Tang, Kui Wu, Jingsheng Lei, Jiuyang Tang:
Plug and Play! A Simple, Universal Model for Energy Disaggregation. - Maksymilian Bujok, Piotr Fronczak, Agata Fronczak:
Polish and English wordnets - statistical analysis of interconnected networks. - Richard Herrmann:
A fractal approach to the dark silicon problem: a comparison of 3D computer architectures - standard slices versus fractal Menger sponge geometry. - Silvia Goodenough, Christian Lavault:
On subsets of Riordan subgroups and Heisenberg-Weyl algebra. - Yessica Saez, Xiaolin Cao, Laszlo B. Kish, G. Pesti:
Securing vehicle communication systems by the KLJN key exchange protocol. - Le Thanh Tan, Long Bao Le:
Fair channel allocation and access design for cognitive ad hoc networks. - Bahador Saket, Paolo Simonetto, Stephen G. Kobourov, Katy Börner:
Node, Node-Link, and Node-Link-Group Diagrams: An Evaluation. - Sungjin Im, Janardhan Kulkarni, Kamesh Munagala, Kirk Pruhs:
SELFISHMIGRATE: A Scalable Algorithm for Non-clairvoyantly Scheduling Heterogeneous Processors. - Jochen Burghardt:
Eine entscheidbare Klasse n-stelliger Horn-Prädikate. - Mrinal Kumar, Shubhangi Saraf:
On the power of homogeneous depth 4 arithmetic circuits. - Tim Libert:
Privacy Implications of Health Information Seeking on the Web. - Mahnoosh Alizadeh, Anna Scaglione, Andrea Goldsmith, George Kesidis:
Capturing Aggregate Flexibility in Demand Response. - Mahnoosh Alizadeh, Anna Scaglione, Andy Applebaum, George Kesidis, Karl N. Levitt:
Scalable and Anonymous Modeling of Large Populations of Flexible Appliances. - Andre Gustavo Degraf Uchoa, Cornelius T. Healy, Rodrigo Caiado de Lamare, Peng Li:
Iterative Detection and LDPC Decoding Algorithms for MIMO Systems in Block-Fading Channels. - Amani K. Samha, Yuefeng Li, Jinglan Zhang:
Aspect-Based Opinion Extraction from Customer reviews. - Erlend Andreas Gjære, Per Håkon Meland:
Threats Management Throughout the Software Service Life-Cycle. 1-14 - Ludovic Apvrille, Yves Roudier:
Towards the Model-Driven Engineering of Secure yet Safe Embedded Systems. 15-30 - Stéphane Paul:
Towards Automating the Construction & Maintenance of Attack Trees: a Feasibility Study. 31-46 - Thomas Bauereiß, Dieter Hutter
:
Possibilistic Information Flow Control for Workflow Management Systems. 47-62 - Cristian Prisacariu
:
Actor Network Procedures as Psi-calculi for Security Ceremonies. 63-77 - Aitor Couce Vieira
, Siv Hilde Houmb, David Ríos Insua:
A Graphical Adversarial Risk Analysis Model for Oil and Gas Drilling Cybersecurity. 78-93 - Alexei Botchkarev:
Estimating the Accuracy of the Return on Investment (ROI) Performance Evaluations. - M. R. Avendi, Ha H. Nguyen, Nguyen Quoc-Tuan:
Multiple-Symbol Differential Detection for Distributed Space-Time Coding. - Le Thanh Tan, Long Bao Le:
Channel assignment for throughput maximization in cognitive radio networks. - Clifton Phua, Yuzhang Feng, Junyao Ji, Timothy Soh:
Visual and Predictive Analytics on Singapore News: Experiments on GDELT, Wikipedia, and ^STI. - Le Thanh Tan, Long Bao Le:
General analytical framework for cooperative sensing and access trade-off optimization. - Jonathon Shlens:
A Light Discussion and Derivation of Entropy. - Jonathon Shlens:
Notes on Generalized Linear Models of Neurons. - Jonathon Shlens:
Notes on Kullback-Leibler Divergence and Likelihood. - Duc Phu Chau, François Brémond, Monique Thonnat, Slawomir Bak:
Automatic Tracker Selection w.r.t Object Detection Performance. - Jalal Mahmud, Michelle X. Zhou, Nimrod Megiddo, Jeffrey Nichols, Clemens Drews:
Optimizing The Selection of Strangers To Answer Questions in Social Media. - P. Nagabhushan, Mohammed Javed, B. B. Chaudhuri:
Entropy Computation of Document Images in Run-Length Compressed Domain. - Michael A. Bender, Martin Farach-Colton, Sándor P. Fekete, Jeremy T. Fineman, Seth Gilbert:
Cost-oblivious storage reallocation. - Victor Alvarez, Felix Martin Schuhknecht, Jens Dittrich, Stefan Richter:
Main Memory Adaptive Indexing for Multi-core Systems. - Tony Lindeberg, Anders Friberg:
Idealized computational models for auditory receptive fields. - Shahar Dobzinski, Hu Fu, Robert Kleinberg:
On the Complexity of Computing an Equilibrium in Combinatorial Auctions. - Zeeshan Bhatti, Asadullah Shah, Mustafa Karabasi, Waheed Mahesar:
Expression driven Trignometric based Procedural Animation of Quadrupeds. - Dana Dannélls, Normunds Gruzitis:
Extracting a bilingual semantic grammar from FrameNet-annotated corpora. - Kaibin Huang, Victor O. K. Li:
Renewables Powered Cellular Networks: Energy Field and Network Coverage. - Amit Agarwal, Saloni Jain:
Efficient Optimal Algorithm of Task Scheduling in Cloud Computing Environment. - Joost Broekens, Tim Baarslag:
Optimistic Risk Perception during Learning Explains Risk-taking, Pathological Gambling, Sensation-seeking and Low Fear. - Anas Chaaban, Karlheinz Ochs, Aydin Sezgin:
Simultaneous Diagonalization: On the DoF Region of the K-user MIMO Multi-way Relay Channel. - Evgeny Burnaev, Vladimir Vovk:
Efficiency of conformalized ridge regression. - Uwe Schmidt, Jeremy Jancsary, Sebastian Nowozin, Stefan Roth, Carsten Rother:
Cascades of Regression Tree Fields for Image Restoration. - Bouchra Benammar, Nathalie Thomas, Marie-Laure Boucheret, Charly Poulliat, Mathieu Dervin:
An efficient time domain representation for Single-Carrier Frequency Division Multiple Access. - Tshilidzi Marwala:
Rational Counterfactuals. - Yalei Ji, Cedomir Stefanovic, Carsten Bockelmann, Armin Dekorsy, Petar Popovski:
Characterization of Coded Random Access with Compressive Sensing based Multi-User Detection. - Ali Chelli, Amir Hadjtaieb, Mohamed-Slim Alouini
:
Performance Analysis of Hybrid ARQ with Incremental Redundancy over Amplify-and-Forward Dual-Hop Relay Channels. - Eduardo Lidanski, Giang Nguyen:
Multiple-Tree Push-based Overlay Streaming. - Matteo Gallet, Georg Nawratil, Josef Schicho:
Bond theory for pentapods and hexapods. - Timur Mirzoev, Bruce Benson, David Hillhouse, Mickey Lewis:
Datacenter Changes vs. Employment Rates for Datacenter Managers In the Cloud Computing Era. - Timur Mirzoev, Gerard Gingo, Mike Stawchansky, Tracy White:
Apple IOS Devices for Network Administrators. - Saeed Doostali:
An Efficient Solution for Model Checking Abstract State Machine Using Bogor. - Timur Mirzoev, Ramón Álvarez:
Leveraging VMware vCloud Director Virtual Applications (vApps) for Operational Expense (OpEx) Efficiency. - Timur Mirzoev, Craig Brockman:
SAP HANA and its performance benefits. - Georg Kaes, Jürgen Mangler, Stefanie Rinderle-Ma, Ralph Vigne:
The NNN Formalization: Review and Development of Guideline Specification in the Care Domain. - Timur Mirzoev, Lawton Sack:
Webpage Load Speed: ASP.NET vs. PHP. - Andrew Dobson, George V. Moustakides, Kostas E. Bekris:
Sampling-based Roadmap Planners are Probably Near-Optimal after Finite Computation. - Timur Mirzoev:
Employing Virtualization for Information Technology Education. - Timur Mirzoev, Stacey White:
The Role of Client Isolation in Protecting Wi-Fi Users from ARP Spoofing Attacks. - Timur Mirzoev, Baijian Yang:
Securing Virtualized Datacenters. - Timur Mirzoev:
Synchronous replication of remote storage. - Ernie Cohen:
Coherent Causal Memory. - Nal Kalchbrenner, Edward Grefenstette, Phil Blunsom:
A Convolutional Neural Network for Modelling Sentences. - Gregory E. Newstadt, Dennis L. Wei, Alfred O. Hero III:
Resource-Constrained Adaptive Search and Tracking for Sparse Dynamic Targets. - Chunguo Li:
Sum-rate maximization of OFDMA femtocell networks that incorporates the QoS of macro mobile stations. - Abdoul Aziz Ciss:
Two-sources Randomness Extractors for Elliptic Curves. - Tuan Phung-Duc:
Markovian multiserver queues with staggered setup for data centers. - Kerstin Eder, Chris Harper, Ute Leonards
:
Towards the Safety of Human-in-the-Loop Robotics: Challenges and Opportunities for Safety Assurance of Robotic Co-Workers. - Feng Cen:
Distributed Joint Source and Channel Coding with Low-Density Parity-Check Codes. - Md. Munjure Mowla, S. M. Mahmud Hasan:
Performance Improvement of PAPR Reduction for OFDM Signal In LTE System. - Monika Kwiatkowska, Lukasz Swierczewski
:
Steganography - coding and intercepting the information from encoded pictures in the absence of any initial information. - Chenwei Wang, Hua Sun, Syed Ali Jafar:
Genie Chains: Exploring Outer Bounds on the Degrees of Freedom of MIMO Interference Networks. - Luan Viet Nguyen
, Taylor T. Johnson:
Virtual Prototyping and Distributed Control for Solar Array with Distributed Multilevel Inverter. - Mehran Alidoost Nia, Aida Ghorbani, Reza Ebrahimi Atani:
A Novel Anonymous Cloud Architecture Design; Providing Secure Online Services and Electronic Payments. - Thomas Bonald, James W. Roberts:
Enhanced Cluster Computing Performance Through Proportional Fairness. - Peter A. van der Helm:
Transparallel mind: Classical computing with quantum power. - Junyan Wang, Sai-Kit Yeung:
A Compact Linear Programming Relaxation for Binary Sub-modular MRF. - Christian Häger, Alexandre Graell i Amat, Fredrik Brännström, Alex Alvarado, Erik Agrell:
Improving Soft FEC Performance for Higher-Order Modulations by Bit Mapper Optimization. - Kangjin Kim, Georgios Fainekos, Sriram Sankaranarayanan:
On the Minimal Revision Problem of Specification Automata. - Md. Munjure Mowla, Md. Yeakub Ali, Abdulla Al Suman:
Better Performance ACF Operation for PAPR Reduction of OFDM Signal. - Sutani Ghosh:
Performance Analysis on The Basis of a Comparative Study Between Multipath Rayleigh Fading And AWGN Channel in The Presence of Various Interference. - Pedro Gonnet:
Efficient and Scalable Algorithms for Smoothed Particle Hydrodynamics on Hybrid Shared/Distributed-Memory Architectures. - Eita Nakamura, Tomohiko Nakamura, Yasuyuki Saito, Nobutaka Ono, Shigeki Sagayama:
Outer-Product Hidden Markov Model and Polyphonic MIDI Score Following. - Eita Nakamura, Nobutaka Ono, Shigeki Sagayama, Kenji Watanabe:
A Stochastic Temporal Model of Polyphonic MIDI Performance with Ornaments. - Richard G. Clegg, Raul Landa, João Taveira Araújo, Eleni Mykoniati, David Griffin, Miguel Rio:
TARDIS: Stably shifting traffic in space and time (extended version). - Yiannis Giannakopoulos, Elias Koutsoupias:
Duality and Optimality of Auctions for Uniform Distributions. - Jonathan D. Gammell
, Siddhartha S. Srinivasa, Timothy D. Barfoot:
Informed RRT*: Optimal Incremental Path Planning Focused through an Admissible Ellipsoidal Heuristic. - Timur Mirzoev:
Disaster Recovery Using Virtual Machines. - Ko-Jen Hsiao, Alex Kulesza, Alfred O. Hero III:
Social Collaborative Retrieval. - Timur Mirzoev:
Wireless Transmission of Video for Biomechanical Analysis. - Timur Mirzoev:
Analysis of Computer Hardware Affecting Video Transmission via IEEE 1394a connection. - Timur Mirzoev:
Low Rate Wireless Personal Area Networks (LR-WPAN 802.15.4 standard). - Vladan M. Jovanovic, Timur Mirzoev:
Teaching Network Storage Technology Assessment Outcomes and Directions. - Timur Mirzoev:
Automation Security. - Xiaojun Feng, Peng Lin, Qian Zhang:
FlexAuc: Serving Dynamic Demands in a Spectrum Trading Market with Flexible Auction. - Mainak Chowdhury, Andrea Goldsmith:
Low-complexity Decoding is Asymptotically Optimal in the SIMO MAC. - Victor G. Kurbatsky, Nikita V. Tomin, Vadim A. Spiryaev, Paul Leahy, Denis N. Sidorov, Alexei V. Zhukov:
Power System Parameters Forecasting Using Hilbert-Huang Transform and Machine Learning. - Mahyar Shirvanimoghaddam, Yonghui Li, Branka Vucetic:
Multiple Access Analog Fountain Codes. - Manju Kaushik, Rashmi Jain:
Gesture Based Interaction NUI: An Overview. - Minming Ni, Lei Zheng, Fei Tong, Jianping Pan, Lin Cai:
A Geometrical-Based Throughput Bound Analysis for Device-to-Device Communications in Cellular Networks. - Palash Dey, Neeldhara Misra, Y. Narahari:
Detecting Possible Manipulators in Elections. - Kayla Bishop, Hoon Hong:
The Secant-Newton Map is Optimal Among Contracting $n^{th}$ Degree Maps for $n^{th}$ Root Computation. - Matthew C. Valenti, Don J. Torrieri, Salvatore Talarico:
A Direct Approach to Computing Spatially Averaged Outage Probability. - Mohsen Ghaffari, Bernhard Haeupler:
Fast Structuring of Radio Networks for Multi-Message Communications. - Saeedeh Moloudi, Michael Lentmaier, Alexandre Graell i Amat:
Spatially Coupled Turbo Codes. - Ashish Chiplunkar, Sundar Vishwanathan:
Approximating Regular Graphic TSP in near linear time. - Dong Zhao, Huadong Ma, Liang Liu:
Frugal Online Incentive Mechanisms for Crowdsourcing Tasks Truthfully. - Marc Manzano, Faryad Darabi Sahneh, Caterina M. Scoglio, Eusebi Calle, José-Luis Marzo:
Robustness surfaces of complex networks. - Mircea Marin, Gabriel Istrate:
Learning cover context-free grammars from structural data. - Fu-Tai An, Yu-Li Hsueh, Kyeong Soo Kim, Ian M. White, Leonid G. Kazovsky:
A New Dynamic Bandwidth Allocation Protocol with Quality of Service in Ethernet-based Passive Optical Networks. - Kyeong Soo Kim:
On The Evolution of PON-Based FTTH Solutions. - Jiong Guo, Yash Raj Shrestha, Yongjie Yang:
How Credible is the Prediction of a Party-Based Election? - Alfonso de la Fuente Ruiz:
Quantum annealing. - Emanuele Bellini:
Yet another algorithm to compute the nonlinearity of a Boolean function. - Loet Leydesdorff, Félix de Moya-Anegón, Wouter de Nooy:
Aggregated journal-journal citation relations in Scopus and Web-of-Science matched and compared in terms of networks, maps, and interactive overlays. - Vaibhav Jha, Sunny Deol, Mohit Jha, G. K. Sharma:
Energy and Latency Aware Application Mapping Algorithm & Optimization for Homogeneous 3D Network on Chip. - Arnob Ghosh, Saswati Sarkar:
Quality Sensitive Price Competition in Spectrum Oligopoly: Part 1. - Lan V. Truong:
Posterior Matching Scheme for Gaussian Broadcast Channel with Feedback. - Evan Everett, Ashutosh Sabharwal:
A Signal-Space Analysis of Spatial Self-Interference Isolation for Full-Duplex Wireless. - Cédric Richier, Eitan Altman, Rachid El Azouzi, Tania Altman, Georges Linarès, Yonathan Portilla:
Modelling View-count Dynamics in YouTube. - Martin Rajchl, John S. H. Baxter
, Wu Qiu, Ali R. Khan, Aaron Fenster, Terry M. Peters, Jing Yuan:
RANCOR: Non-Linear Image Registration with Total Variation Regularization. - Thijs Laarhoven
:
Asymptotics of Fingerprinting and Group Testing: Tight Bounds from Channel Capacities. - Selma Belhadj Amor, Yossef Steinberg, Michèle A. Wigger:
MIMO MAC-BC Duality with Linear-Feedback Coding Schemes. - Timur Mirzoev:
Reduction of Field Loss by a Video Processing System. - Saeed Javanmardi, Mohammad Shojafar, Shahdad Shariatmadari, Sima S. Ahrabi:
FRTRUST: a fuzzy reputation based model for trust management in semantic P2P grids. - Guilherme Sperb Machado, Fabio Victora Hecht, Martin Waldburger, Burkhard Stiller:
Bypassing Cloud Providers' Data Validation to Store Arbitrary Data. - Aurélien Bellet, Yingyu Liang, Alireza Bagheri Garakani, Maria-Florina Balcan, Fei Sha:
Distributed Frank-Wolfe Algorithm: A Unified Framework for Communication-Efficient Sparse Learning. - Muhammad Nazmul Islam, Ashwin Sampath, Atul Maharshi, Ozge H. Koymen, Narayan B. Mandayam:
Wireless Backhaul Node Placement for Small Cell Networks. - Roozbeh Ebrahimi, Jie Gao, Golnaz Ghasemiesfeh, Grant Schoenebeck:
How Complex Contagions Spread and Spread Quickly. - Lingqing Ai, Xian Wu, Lingxiao Huang, Longbo Huang, Pingzhong Tang, Jian Li:
The Multi-shop Ski Rental Problem. - Duane Wilson, Giuseppe Ateniese:
To Share or Not to Share in Client-Side Encrypted Clouds. - Ditmar Parmeza, Miraldi Fifo:
Transaction Handling in COM, EJB and .NET. - Neil Walton:
Concave Switching in Single and Multihop Networks. - (Withdrawn) Real-time Decolorization using Dominant Colors.
- Robert Singer:
User Centered Development of Agent-based Business Process Models and Notations. - M. Rathna Devi, A. Anju:
Multiprocessor Scheduling of Dependent Tasks to Minimize Makespan and Reliability Cost Using NSGA-II. - Emanuele Bellini, Ilaria Simonetti, Massimiliano Sala:
Nonlinearity of Boolean functions: an algorithmic approach based on multivariate polynomials. - Sumit Kumar Dey, Shubham Anand:
Algorithm For Multi-Hand Finger Counting: An Easy Approach. - Luciano Pandolfi, Andrei Halanay:
Approximate controllability and lack of controllability to zero of the heat equation with memory. - Frank P. Kelly, Peter B. Key, Neil S. Walton:
Incentivized Optimal Advert Assignment via Utility Decomposition. - Fayssal Bendaoud, Marwen Abdennebi, Fedoua Didi:
Survey On Scheduling And Radio Resources Allocation In Lte. - Einollah Pira, Mohammad Reza Zand Miralvand, Fakhteh Soltani:
Verification of confliction and unreachability in rule-based expert systems with model checking. - Ravi Ranjan, G. Sahoo:
A New Clustering Approach for Anomaly Intrusion Detection. - Helger Lipmaa, Vitaly Skachek:
Linear Batch Codes. - Marina I. Maslennikova:
Reset Complexity of Ideal Languages. - Alexander Zeh, San Ling:
Decoding of Quasi-Cyclic Codes up to A New Lower Bound on the Minimum Distance. - Mehran Alidoost Nia, Ali Sajedi, Aryo Jamshidpey:
An Introduction to Digital Signature Schemes. - Peter Burcsi, Gabriele Fici, Zsuzsanna Lipták, Frank Ruskey, Joe Sawada:
Normal, Abby Normal, Prefix Normal. - Thijs Laarhoven
:
Asymptotics of Fingerprinting and Group Testing: Capacity-Achieving Log-Likelihood Decoders. - Hasan Abasi, Nader H. Bshouty:
A Simple Algorithm for Hamiltonicity. - Yiannis Giannakopoulos:
Bounding Optimal Revenue in Multiple-Items Auctions. - Xibo Jin, Fa Zhang, Lin Wang, Songlin Hu, Biyu Zhou, Zhiyong Liu:
A Joint Optimization of Operational Cost and Performance Interference in Cloud Data Centers. - Moran Feldman, Moshe Tennenholtz, Omri Weinstein:
Display Advertising with Information Mediators. - Avishy Y. Carmi, Daniel Moskovich:
Tangle Machines I: Concept. - Avishy Y. Carmi, Daniel Moskovich:
Tangle Machines II: Invariants. - Marco Baldi, Nicola Maturo, Giacomo Ricciutelli, Franco Chiaraluce:
LDPC coded transmissions over the Gaussian broadcast channel with confidential messages. - Md Pavel Mahmud, Alexander Schliep:
TreQ-CG: Clustering Accelerates High-Throughput Sequencing Read Mapping. - Dalwadi Bijal, Suthar Sanket:
Overview of Stemming Algorithms for Indian and Non-Indian Languages. - Bouchra Rahali Mohammed Feham:
Substrate integrated waveguide power divider, circulator and coupler in [10-15] GHz band. - Fekri M. Abduljalil:
A Novel Real-Time Video and Data Capture of Vehicular Accident in Intelligent Transportation Systems. - Saeid Pashazadeh, Saeed Saeedvand:
Modelling of Walking Humanoid Robot With Capability of Floor Detection and Dynamic Balancing Using Colored Petri Net. - Marius Leordeanu, Rahul Sukthankar:
Thoughts on a Recursive Classifier Graph: a Multiclass Network for Deep Object Recognition. - Wittawat Kositwattanarerk, Soon Sheng Ong, Frédérique E. Oggier:
Construction A of Lattices over Number Fields and Block Fading Wiretap Coding. - Xing Wei, Frank Aurzada, Michael P. McGarry, Martin Reisslein:
DyCaPPON: Dynamic Circuit and Packet Passive Optical Network (Extended Version). - Saied Pashazadeh, Elham Abdolrahimi Niyari:
Modeling Enterprise Architecture Using Timed Colored PETRI Net: Single Processor Scheduling. - Thomas Bläsius, Sebastian Lehmann, Ignaz Rutter:
Orthogonal Graph Drawing with Inflexible Edges. - Timotheos Aslanidis, Marios-Evangelos Kogias:
Algorithms for Packet Routing in Switching Networks with Reconfiguration Overhead. - Bo Wang, Anna Goldenberg:
Gradient-based Laplacian Feature Selection. - Oussama Noui, Lemnouar Noui:
A blind robust watermarking scheme based on svd and circulant matrices. - Talal Rahwan, Tomasz P. Michalak, Michael J. Wooldridge:
A Measure of Synergy in Coalitions. - Bernd Klasen:
SocioAware Content Distribution using P2P solutions in Hybrid Networks. - Aleck C. Johnsen, Ming-Yang Kao, Shinnosuke Seki:
Computing Minimum Tile Sets to Self-Assemble Colors Patterns. - Supratik Chakraborty, Daniel J. Fremont
, Kuldeep S. Meel, Sanjit A. Seshia, Moshe Y. Vardi:
Distribution-Aware Sampling and Weighted Model Counting for SAT. - Jonathon Shlens:
A Tutorial on Independent Component Analysis. - David Gunawan, Karno Budiono:
Comparative Analysis On Some Possible Partnership Schemes of Global IP Exchange Providers. - L. Yu, H. Liu, D. Zheng:
On More Bent Functions From Dillon Exponents. - Jean-Gabriel Ganascia, Pierre Glaudes, Andrea Del Lungo
:
Automatic Detection of Reuses and Citations in Literary Texts. - Tianlin Shi, Ming Liang, Xiaolin Hu:
A Reverse Hierarchy Model for Predicting Eye Fixations. - Runxin Wang, Rongke Liu, Yi Hou:
Joint Successive Cancellation Decoding of Polar Codes over Intersymbol Interference Channels. - (Withdrawn) Elevation Contour Analysis and Water body Extraction for Finding Water Scarcity Locations using DEM.
- Sudarshan Mukherjee, Saif Khan Mohammed:
On the Energy-Spectral Efficiency Trade-off of the MRC Receiver in Massive MIMO Systems with Transceiver Power Consumption. - Sohail Abid, Shahab Khan:
Improving Performance of Routing Protocols Using MRP Framework. - Kazuyuki Tanaka, Shun Kataoka, Muneki Yasuda, Yuji Waizumi, Chiou-Ting Hsu:
Bayesian image segmentations by Potts prior and loopy belief propagation. - Gergo Barta:
A Link-based Approach to Entity Resolution in Social Networks. - Huazi Zhang, Yichao Jin, Weiwen Zhang, Yonggang Wen:
Enhancing User Experience for Multi-Screen Social TV Streaming over Wireless Networks. - M. Kumaraswamy, Shaila K, V. Tejaswi, K. R. Venugopal, S. S. Iyengar
, Lalit M. Patnaik:
QoS group based optimal retransmission medium access protocol for wireless sensor networks. - Johan Sebastian Rosenkilde Nielsen, Alexander Zeh:
Multi-Trial Guruswami-Sudan Decoding for Generalised Reed-Solomon Codes. - Alexandre Adrien Chotard, Anne Auger, Nikolaus Hansen:
Markov Chain Analysis of Evolution Strategies on a Linear Constraint Optimization Problem. - Todd J. Bodnar, Victoria C. Barclay, Nilam Ram, Conrad S. Tucker, Marcel Salathé:
On the Ground Validation of Online Diagnosis with Twitter and Medical Records. - Ferdinando Cicalese, Gennaro Cordasco, Luisa Gargano, Martin Milanic, Joseph G. Peters, Ugo Vaccaro:
How to go Viral: Cheaply and Quickly. - Jónathan Heras
, Ekaterina Komendantskaya:
ACL2(ml): Machine-Learning for ACL2. 61-75 - Ángel F. García-Fernández, Mark R. Morelande, Jesús Grajal:
Labelled OSPA metric for fixed and known number of targets. - Martin Monperrus:
Principles of Antifragile Software. - Richa Gupta, Sunny Gupta, Anuradha Singhal:
Importance and Techniques of Information Hiding : A Review. - Marco Baldi, Nicola Maturo, Giacomo Ricciutelli, Franco Chiaraluce:
Practical LDPC coded modulation schemes for the fading broadcast channel with confidential messages. - Christopher Lindberg, Alexandre Graell i Amat, Henk Wymeersch:
Distributed Compressed Sensing for Sensor Networks with Packet Erasures. - Juho Lauri:
Further Hardness Results on Rainbow and Strong Rainbow Connectivity. - Frank Havemann, Birger Larsen:
Bibliometric Indicators of Young Authors in Astrophysics: Can Later Stars be Predicted? - Siyi Wang, Weisi Guo, Mark D. McDonnell:
Distance Distributions for Real Cellular Networks. - Siyi Wang, Weisi Guo, Mark D. McDonnell:
Transmit Pulse Shaping for Molecular Communications. - Siyi Wang, Weisi Guo, Chadi Khirallah, Dejan Vukobratovic, John Thompson:
Interference Allocation Scheduler for Green Multimedia Delivery. - Antoine Amarilli:
The Possibility Problem for Probabilistic XML (Extended Version). - Mark Kaminski, Yavor Nenov, Bernardo Cuenca Grau:
Datalog Rewritability of Disjunctive Datalog Programs and its Applications to Ontology Reasoning. - Mei Leng, Wee-Peng Tay, Tony Q. S. Quek, Hyundong Shin:
Distributed Local Linear Parameter Estimation using Gaussian SPAWN. - Johannes Rauh, Nils Bertschinger, Eckehard Olbrich, Jürgen Jost:
Reconsidering unique information: Towards a multivariate information decomposition. - George K. Atia:
Change Detection with Compressive Measurements. - Harald Kröll, Stefan Zwicky, Reto Odermatt, Lukas Bruderer, Andreas Burg, Qiuting Huang:
A Signal Processor for Gaussian Message Passing. - Gozde Ozcan, Mustafa Cenk Gursoy:
Energy-Efficient Power Adaptation for Cognitive Radio Systems under Imperfect Channel Sensing. - Robert Brijder:
Output Stability and Semilinear Sets in Chemical Reaction Networks and Deciders. - Peter Lofgren, Siddhartha Banerjee, Ashish Goel, C. Seshadhri:
FAST-PPR: Scaling Personalized PageRank Estimation for Large Graphs. - Xiangrong Zeng, Mário A. T. Figueiredo:
Decreasing Weighted Sorted ℓ1 Regularization. - Favio Demarco, Jifeng Xuan, Daniel Le Berre
, Martin Monperrus:
Automatic Repair of Buggy If Conditions and Missing Preconditions with SMT. - Cong Li, Michael Georgiopoulos, Georgios C. Anagnostopoulos:
Pareto-Path Multi-Task Multiple Kernel Learning. - Xu Chen:
Decentralized Computation Offloading Game For Mobile Cloud Computing. - Afonso S. Bandeira, Dustin G. Mixon, Benjamin Recht:
Compressive classification and the rare eclipse problem. - Yongcan Cao:
UAV Circumnavigating an Unknown Target Under a GPS-denied Environment with Range-only Measurements. - Joshua M. Hailpern, Niranjan Damera Venkata, Marina Danilevsky:
Pagination: It's what you say, not how long it takes to say it. - Adam Noel, Karen C. Cheung, Robert Schober:
Bounds on Distance Estimation via Diffusive Molecular Communication. - Konstantin Makarychev, Maxim Sviridenko:
Optimization Problems with Diseconomies of Scale via Decoupling. - Daniel Salmond, Alex J. Grant, Ian Grivell, Terence Chan:
On the rank of random matrices over finite fields. - Borhan Molazem Sanandaji, Pravin Varaiya:
Compressive Origin-Destination Matrix Estimation. - Haisheng Tan, Jiajun Yu, Hongyu Liang, Tiancheng Lou, Francis C. M. Lau:
Optimal Rendezvous Strategies for Different Environments in Cognitive Radio Networks. - Bapi Chatterjee, Nhan Nguyen Dang, Philippas Tsigas:
Efficient Lock-free Binary Search Trees. - Hatim Guermah, Tarik Fissaa, Hatim Hafiddi, Mahmoud Nassar, Abdelaziz Kriouile:
An Ontology Oriented Architecture for Context Aware Services Adaptation. - Mahdi Moeini, Zied Jemaï, Evren Sahin:
An Integer Programming Model for the Dynamic Location and Relocation of Emergency Vehicles: A Case Study. - Mahdi Moeini:
A Continuous Optimization Approach for the Financial Portfolio Selection under Discrete Asset Choice Constraints. - Yehuda Dar, Alfred M. Bruckstein:
Motion-Compensated Coding and Frame-Rate Up-Conversion: Models and Analysis. - Michael J. Wilber, Iljung S. Kwak, Serge J. Belongie
:
Cost-Effective HITs for Relative Similarity Comparisons. - William Yang Wang, Kathryn Mazaitis, Ni Lao, Tom M. Mitchell, William W. Cohen:
Efficient Inference and Learning in a Large Knowledge Base: Reasoning with Extracted Information using a Locally Groundable First-Order Probabilistic Logic. - Andrzej Kisielewicz, Marek Szykula:
Synchronizing Automata with Large Reset Lengths. - Xu Chen, Alfred O. Hero III, Silvio Savarese:
Shrinkage Optimized Directed Information using Pictorial Structures for Action Recognition. - Luiz Cortinhas, Patrick Monteiro, Amir Zahlan, Gabriel Vianna, Marcio Moscoso:
Embed System for Robotic Arm with 3 Degree of Freedom Controller using Computational Vision on Real-Time. - Gianfranco Bilardi, Andrea Pietracaprina, Geppino Pucci, Michele Scquizzato, Francesco Silvestri:
Network-Oblivious Algorithms. - Ilan Adler, Christos H. Papadimitriou, Aviad Rubinstein:
On Simplex Pivoting Rules and Complexity Theory. - Michael Schliephake, Erwin Laure:
Performance Analysis of Irregular Collective Communication with the Crystal Router Algorithm. - Sebastiano Vigna:
A Weighted Correlation Index for Rankings with Ties. - Sebastiano Vigna:
Supremum-Norm Convergence for Step-Asynchronous Successive Overrelaxation on M-matrices. - Hoai An Le Thi, Mahdi Moeini:
Portfolio Selection Under Buy-In Threshold Constraints Using DC Programming and DCA. - Mahdi Moeini, Hoai An Le Thi:
A DC programming approach for constrained two-dimensional non-guillotine cutting problem. - Andrea Ballatore:
Defacing the map: Cartographic vandalism in the digital commons. - Sourangsu Banerji:
Computer Simulation Codes for the Quine-McCluskey Method of Logic Minimization. - Franz G. Fuchs, Jon M. Hjelmervik:
Interactive Isogeometric Volume Visualization with Pixel-Accurate Geometry. - (Withdrawn) Learning Deep Convolutional Features for MRI Based Alzheimer's Disease Classification.
- Lee-Ad Gottlieb, Aryeh Kontorovich:
Near-optimal sample compression for nearest neighbors. - Meizhu Li, Qi Zhang, Xinyang Deng, Yong Deng:
Distance function of D numbers. - Rene Pickhardt, Thomas Gottron, Martin Körner, Paul Georg Wagner, Till Speicher, Steffen Staab:
A Generalized Language Model as the Combination of Skipped n-grams and Modified Kneser-Ney Smoothing. - Amit Daniely, Shai Shalev-Shwartz:
Complexity theoretic limitations on learning DNF's. - Karel De Vogeleer, Gérard Memmi
, Pierre Jouvelot, Fabien Coelho:
Modeling the Temperature Bias of Power Consumption for Nanometer-Scale CPUs in Application Processors. - Abhishek Ray, Siba Mishra, Durga Prasad Mohapatra:
An Approach for Computing Dynamic Slice of Concurrent Aspect-Oriented Programs. - Stephen Alstrup, Haim Kaplan, Mikkel Thorup, Uri Zwick:
Adjacency labeling schemes and induced-universal graphs. - Gang Li, Thakshila Wimalajeewa, Pramod K. Varshney:
Decentralized and Collaborative Subspace Pursuit: A Communication-Efficient Algorithm for Joint Sparsity Pattern Recovery. - Yuval Filmus, Hamed Hatami:
Bounds on the sum of L1 influences. - Hsien-Chih Chang, Sariel Har-Peled, Benjamin Raichel:
From Proximity to Utility: A Voronoi Partition of Pareto Optima. - Diego Fabregat-Traver:
Knowledge-Based Automatic Generation of Linear Algebra Algorithms and Code. - Ruslan Shevchenko:
Annotated imports. - Francesco Renna, Nicola Laurenti, Stefano Tomasin:
Achievable Secrecy Rates over MIMOME Gaussian Channels with GMM Signals in Low-Noise Regime. - E. G. Abramov, A. B. Komissarov, D. A. Kornyakov:
Generalized version of the support vector machine for binary classification problems: supporting hyperplane machine. - Iaakov Exman:
Web Search of New Linearized Medical Drug Leads. - Fei Wu, Yin Sun, Yang Yang, Kannan Srinivasan, Ness B. Shroff:
Constant Delay and Constant Feedback Moving Window Network Coding for Wireless Multicast: Design and Asymptotic Analysis. - (Withdrawn) Pure Nash Equilibrium in Capacitated Selfish Replication (CSR) Game.
- Alan Guo:
Group homomorphisms as error correcting codes. - Yukun Zhong, Zhiwei He, Xianhong Wang, Liao Gang:
New Efficient Method To Solve Longest Overlap Region Problem For Noncoding DNA Sequence. - Liang-Hao Huang, Hui-Ju Hung, Chih-Chung Lin, De-Nian Yang:
Scalable Steiner Tree for Multicast Communications in Software-Defined Networking. - Yukun Zhong, Zhiwei He, Xianhong Wang, Xiongbin Cao:
A Way For Accelerating The DNA Sequence Reconstruction Problem By CUDA. - Sian-Jheng Lin, Wei-Ho Chung, Yunghsiang S. Han:
Fast Ecoding/Decoding Algorithms for Reed-Solomon Erasure Codes. - Xiaolu Lu, Dongxu Li, Xiang Li, Ling Feng:
A 2D based Partition Strategy for Solving Ranking under Team Context (RTP). - Michael LeMay, Carl A. Gunter:
Network-on-Chip Firewall: Countering Defective and Malicious System-on-Chip Hardware. - Philippe Gaborit, Gilles Zémor:
On the hardness of the decoding and the minimum distance problems for rank codes. - Henning Thomsen, Elisabeth de Carvalho, Petar Popovski:
Using Wireless Network Coding to Replace a Wired with Wireless Backhaul. - Mamadou Moustapha Kanté, Vincent Limouzy, Arnaud Mary
, Lhouari Nourine, Takeaki Uno:
Polynomial Delay Algorithm for Listing Minimal Edge Dominating sets in Graphs. - Jun He, Boris Mitavskiy, Yuren Zhou:
A Theoretical Assessment of Solution Quality in Evolutionary Algorithms for the Knapsack Problem. - Stefan Wesemann, Gerhard P. Fettweis:
Distributed Asynchronous Optimization Framework for the MISO Interference Channel. - Jan Olaf Blech, Heinz W. Schmidt:
BeSpaceD: Towards a Tool Framework and Methodology for the Specification and Verification of Spatial Behavior of Distributed Software Component Systems. - Vladimir Kolmogorov, Christoph H. Lampert, Emilie Morvant, Rustem Takhanov:
Proceedings of The 38th Annual Workshop of the Austrian Association for Pattern Recognition (ÖAGM), 2014. - Zhenyao Zhu, Ping Luo, Xiaogang Wang, Xiaoou Tang:
Recover Canonical-View Faces in the Wild with Deep Neural Networks. - Tomasz Jurkiewicz, Kurt Mehlhorn, Patrick K. Nicholson:
Cache-Oblivious VAT-Algorithms. - Nikolay Atanasov, Roberto Tron, Victor M. Preciado, George J. Pappas:
Joint Estimation and Localization in Sensor Networks. - Mathieu Michel, Bruno Quoitin:
Technical Report : ContikiMAC vs X-MAC performance analysis. - Adrian Barbu, Gary Gramajo:
Face Detection Using a 3D Model on Face Keypoints. - Yuansheng Liu, Eric Yong Xie, Ge Cheng, Chengqing Li:
Deciphering a novel image cipher based on mixed transformed Logistic maps. - Tsung-Han Chan, Kui Jia, Shenghua Gao, Jiwen Lu, Zinan Zeng, Yi Ma:
PCANet: A Simple Deep Learning Baseline for Image Classification? - Cosme Adrover, Todd J. Bodnar, Marcel Salathé:
Targeting HIV-related Medication Side Effects and Sentiment Using Twitter Data. - Jaroslav Vondrejc, Jan Zeman, Ivo Marek:
Accurate upper-lower bounds on homogenized matrix by FFT-based Galerkin method. - Christian Schröder de Witt, Vladimir Zamdzhiev
:
The ZX calculus is incomplete for quantum mechanics. 285-292 - Ahmed Douik, Sameh Sorour, Hamidou Tembine, Tareq Y. Al-Naffouri, Mohamed-Slim Alouini:
A Game-Theoretic Framework for Decentralized Cooperative Data Exchange using Network Coding. - Leila Pishdad, Fabrice Labeau:
Approximate MMSE Estimator for Linear Dynamic Systems with Gaussian Mixture Noise. - Alexander Shekhovtsov:
Maximum Persistency in Energy Minimization. - Karthik Raman, Thorsten Joachims:
Methods for Ordinal Peer Grading. - Amir Konigsberg:
Avoiding Undesired Choices Using Intelligent Adaptive Systems. - René van Bevern, Sepp Hartung, André Nichterlein, Manuel Sorge:
Constant-factor approximations for Capacitated Arc Routing without triangle inequality. - Chen He, Z. Jane Wang, Victor C. M. Leung:
Unitary Query for the M x L x N MIMO Backscatter RFID Channel. - Clément Carbonnel, Martin C. Cooper, Emmanuel Hebrard:
On Backdoors To Tractable Constraint Languages. - Ahmed Douik
, Sameh Sorour, Mohamed-Slim Alouini
, Tareq Y. Al-Naffouri
:
Decoding Delay Controlled Reduction of Completion Time in Instantly Decodable Network Coding. - Eduardo A. Canale, Pablo Romero:
Diameter Constrained Reliability: Computational Complexity in terms of the diameter and number of terminals. - Deni Sabic, Damir Strbac, Samir Lemes, Malik Cabaravdic:
Upgrade of A Robot Workstation for Positioning of Measuring Objects on CMM. - Samir Lemes, Damir Strbac, Malik Cabaravdic:
Using industrial robot to manipulate the measured object in CMM. - Samir Lemes:
Information Security Management of Web Portals Based on Joomla CMS. - Yuxiao Dong, Jie Tang, Nitesh V. Chawla, Tiancheng Lou, Yang Yang, Bai Wang:
Inferring social status and rich club effects in enterprise communication networks. - Richard Williams, Lutz Bornmann:
The substantive and practical significance of citation impact differences between institutions: Guidelines for the analysis of percentiles using effect sizes and confidence intervals. - Lutz Bornmann, Caroline S. Wagner, Loet Leydesdorff:
BRICS countries and scientific excellence: A bibliometric analysis of most frequently-cited papers. - Samuel Haney, Ashwin Machanavajjhala, Bolin Ding:
Answering Query Workloads with Optimal Error under Blowfish Privacy. - Tobias Kuhn
, Matjaz Perc, Dirk Helbing:
Inheritance patterns in citation networks reveal scientific memes. - Bogdan Babych, Anthony Hartley:
Meta-evaluation of comparability metrics using parallel corpora. - Puxiao Han, Ruixin Niu, Mengqi Ren:
Distributed Approximate Message Passing for Compressed Sensing. - Anupam Gupta, Kunal Talwar, Udi Wieder:
Changing Bases: Multistage Optimization for Matroids and Matchings. - Sayan Bandyapadhyay, Santanu Bhowmick, Kasturi R. Varadarajan:
Approximation Schemes for Partitioning: Convex Decomposition and Surface Approximation. - David Coleman, Ioan Alexandru Sucan, Sachin Chitta, Nikolaus Correll:
Reducing the Barrier to Entry of Complex Robotic Software: a MoveIt! Case Study. - Changchun Zhang, Robert C. Qiu:
Data Modeling with Large Random Matrices in a Cognitive Radio Network Testbed: Initial Experimental Demonstrations with 70 Nodes. - Hélène Barcelo, Valerio Capraro:
Group size effect on cooperation in social dilemmas. - Amer E. Mouawad, Naomi Nishimura, Vinayak Pathak, Venkatesh Raman:
Shortest reconfiguration paths in the solution space of Boolean formulas. - Obaid Ur Rehman, Ian R. Petersen:
Robust Dynamic State Feedback Guaranteed Cost Control of Nonlinear Systems using Copies of Plant Nonlinearities. - Vladislav Voroninski, Zhiqiang Xu:
A strong restricted isometry property, with an application to phaseless compressed sensing. - Joshua A. Grochow, Toniann Pitassi:
Circuit complexity, proof complexity, and polynomial identity testing. - Wei Chen, Di He, Tie-Yan Liu, Tao Qin, Yixin Tao, Liwei Wang:
Generalized Second Price Auction with Probabilistic Broad Match. - Homa Hosseinmardi, Amir Ghasemianlangroodi, Richard Han, Qin Lv, Shivakant Mishra:
Analyzing Negative User Behavior in a Semi-anonymous Social Network. - Chaochao Lu, Xiaoou Tang:
Surpassing Human-Level Face Verification Performance on LFW with GaussianFace. - Claudio Martella, Dionysios Logothetis, Georgos Siganos:
Spinner: Scalable Graph Partitioning for the Cloud. - Pierre Lescanne:
Boltzmann samplers for random generation of lambda terms. - Chandrajit Pal, Avik Kotal, Asit Samanta, Amlan Chakrabarti, Ranjan Ghosh:
Design space exploration for image processing architectures on FPGA targets. - Hamid Ramezani, Fatemeh Fazel, Milica Stojanovic, Geert Leus:
Collision Tolerant Packet Scheduling for Underwater Acoustic Localization. - Fedor V. Fomin, Mathieu Liedloff, Pedro Montealegre-Barba, Ioan Todinca:
Algorithms parameterized by vertex cover and modular width, through potential maximal cliques. - Yang Qin, Xiaoxiong Zhong, Yuanyuan Yang, Yanlin Li, Li Li:
Joint Channel Assignment and Opportunistic Routing for Maximizing Throughput in Cognitive Radio Networks. - John D. Ramsdell, Daniel J. Dougherty, Joshua D. Guttman, Paul D. Rowe:
A Hybrid Analysis for Security Protocols with State. - Olivier Beaumont, Loris Marchal:
Analysis of Dynamic Scheduling Strategies for Matrix Multiplication on Heterogeneous Platforms. - Anna Bernasconi, Valentina Ciriani, Lorenzo Lago:
On the Error Resilience of Ordered Binary Decision Diagrams. - Catholijn M. Jonker, Joost Broekens, Aske Plaat:
Virtual Reflexes. - Antonin Delpeuch
:
Complexity of Grammar Induction for Quantum Types. 236-248 - Philip Greggory Lee, Ying Wu:
Scalable Matting: A Sub-linear Approach. - Ahmed Douik
, Sameh Sorour, Hamidou Tembine, Mohamed-Slim Alouini
, Tareq Y. Al-Naffouri
:
A Game Theoretic Approach to Minimize the Completion Time of Network Coded Cooperative Data Exchange. - Marco Guerini, Fabio Pianesi, Oliviero Stock:
Is it morally acceptable for a system to lie to persuade me? - Yunpeng Pan, Evangelos A. Theodorou:
Nonparametric Kullback-Leibler Stochastic Control. - György Dósa, Leah Epstein:
Colorful bin packing. - Reza Farrahi Moghaddam, Mohamed Cheriet:
Spiralet Sparse Representation. - Aditi Kalyani, Hemant Kumud, Shashi Pal Singh, Ajai Kumar:
Assessing the Quality of MT Systems for Hindi to English Translation. - Oron Sabag, Haim H. Permuter, Asaf Cohen:
Lossless Coding of Correlated Sources with Actions. - Jin-Yi Cai, Heng Guo, Tyson Williams:
The Complexity of Counting Edge Colorings and a Dichotomy for Some Higher Domain Holant Problems. - Sébastien Labbé, Christophe Reutenauer:
A d-dimensional extension of Christoffel words. - Yehuda Dar, Alfred M. Bruckstein:
Improving Low Bit-Rate Video Coding using Spatio-Temporal Down-Scaling. - Christina Papagiannopoulou, Grigorios Tsoumakas, Ioannis Tsamardinos:
Discovering and Exploiting Entailment Relationships in Multi-Label Learning. - Tamal Ghosh, Tanmoy Chakraborty, Pranab K. Dan:
An effective AHP-based metaheuristic approach to solve supplier selection problem. - Xia Li, Feng Lin, Robert C. Qiu:
Modeling Massive Amount of Experimental Data with Large Random Matrices in a Real-Time UWB-MIMO System. - Akhlaqur Rahman, Sumaira Tasnim:
Ensemble Classifiers and Their Applications: A Review. - Guy Van den Broeck, Adnan Darwiche:
On the Role of Canonicity in Bottom-up Knowledge Compilation. - Liang Gong, Hongyu Zhang, Hyunmin Seo, Sunghun Kim:
Locating Crashing Faults based on Crash Stack Traces. - Yuan Shi, Aurélien Bellet, Fei Sha:
Sparse Compositional Metric Learning. - Nicola Gatti, Marco Rocco, Sofia Ceppi, Enrico H. Gerding:
Mechanism Design for Mobile Geo-Location Advertising. - Vasireddy Srikanth, Pillem Ramesh:
Invisibility System Using Image Processing and Optical Camouflage Technology. - Ouais Alsharif, Philip Bachman, Joelle Pineau:
Lifelong Learning of Discriminative Representations. - Matthew D. Hoffman:
Stochastic Structured Mean-Field Variational Inference. - He Chen, Yonghui Li, João Luiz Rebelatto, Bartolomeu F. Uchôa Filho, Branka Vucetic:
Harvest-Then-Cooperate: Wireless-Powered Cooperative Communications. - Takuro Fukunaga:
Covering problems in edge- and node-weighted graphs. - William W. Hager, Jiajie Zhu:
Projection algorithms for non-convex minimization, with application to sparse principal component analysis. - Richa Gupta, Sunny Gupta, Anuradha Singhal:
Big Data: Overview. - Richa Gupta:
Web Mining using Artificial Ant Colonies: A Survey. - Richa Gupta:
Journey from Data Mining to Web Mining to Big Data. - Richa Gupta:
Information Hiding and Attacks : Review. - Yongchao Liu, Bertil Schmidt:
SWAPHI: Smith-Waterman Protein Database Search on Xeon Phi Coprocessors. - Amin Sakzad, Emanuele Viterbo, Joseph Jean Boutros, Yi Hong:
Phase Precoding for the Compute-and-Forward Protocol. - Mario Berljafa, Daniel Wortmann
, Edoardo Di Napoli:
An Optimized and Scalable Eigensolver for Sequences of Eigenvalue Problems. - (Withdrawn) Multiplicative weights in monotropic games.
- Giulio Colavolpe, Tommaso Foggi:
Time-Frequency Packing for High Capacity Coherent Optical Links. - Ning Chen, Jun Zhu, Jianfei Chen, Bo Zhang:
Dropout Training for Support Vector Machines. - Wolfram Lautenschlaeger:
A Deterministic TCP Bandwidth Sharing Model. - Matthieu Moinard, Isabelle Amonou, Pierre Duhamel, Patrice Brault:
Prediction of Transformed (DCT) Video Coding Residual for Video Compression. - Valérie Berthé, Sébastien Labbé:
Factor Complexity of S-adic sequences generated by the Arnoux-Rauzy-Poincaré Algorithm. - Bosiljka Tadic, Vladimir Gligorijevic, Marcin Skowron, Milovan Suvakov:
The Dynamics of Emotional Chats with Bots: Experiment and Agent-Based Simulations. - László Gyarmati, Nikolaos Laoutaris, Kostas Sdrolias, Pablo Rodriguez, Costas Courcoubetis:
From advertising profits to bandwidth prices-A quantitative methodology for negotiating premium peering. - Nataliia Stulova, José F. Morales, Manuel V. Hermenegildo:
An Approach to Assertion-based Debugging of Higher-Order (C)LP Programs. - Annabell Berger, Steffen Rechner:
Broder's Chain Is Not Rapidly Mixing. - Dmitry N. Kozlov:
Witness structures and immediate snapshot complexes. - Gavin Taylor, Connor Geer, David Piekut:
An Analysis of State-Relevance Weights and Sampling Distributions on L1-Regularized Approximate Linear Programming Approximation Accuracy. - Alan Guo, Madhu Sudan:
List decoding group homomorphisms between supersolvable groups. - Shqiponja Ahmetaj, Diego Calvanese, Magdalena Ortiz, Mantas Simkus:
Managing Change in Graph-structured Data Using Description Logics (long version with appendix). - Xiaochao Qian:
Build a compact cryptocurrency system purely based on PoS. - Mireille Bossy, Jose Espina, Cristian Paris, Antoine Rousseau:
Modeling the wind circulation around mills with a Lagrangian stochastic approach. - Behrouz Minaei-Bidgoli, Maryam Nazaridoust:
Case study: Data Mining of Associate Degree Accepted Candidates by Modular Method. - Christoph Waldhauser, Ronald Hochreiter, Johannes Otepka, Norbert Pfeifer, Sajid Ghuffar, Karolina Korzeniowska, Gerald Wagner:
Automated Classification of Airborne Laser Scanning Point Clouds. - Dong Du:
On Level persistence (Relevant level persistence numbers). - Lingpeng Kong, Noah A. Smith:
An Empirical Comparison of Parsing Methods for Stanford Dependencies. - Will Y. Zou, Xiaoyu Wang, Miao Sun, Yuanqing Lin:
Generic Object Detection With Dense Neural Patterns and Regionlets. - Antoine Bordes, Jason Weston, Nicolas Usunier:
Open Question Answering with Weakly Supervised Embedding Models. - Colleen Marzilli, Julie Delello, Shelly Marmion, Rochell McWhorter, Paul B. Roberts, T. Scott Marzilli:
Faculty Attitudes Towards Integrating Technology and Innovation. - Petra Berenbrink, Ralf Klasing, Adrian Kosowski, Frederik Mallmann-Trenn, Przemyslaw Uznanski:
Be Fair and Be Selfish! Characterizing Deterministic Diffusive Load-Balancing Schemes with Small Discrepancy. - Ather Gattami:
Kalman meets Shannon. - Navodit Misra, Ercan E. Kuruoglu:
Stable Graphical Models. - S. E. S. Bariran, K. S. M. Sahari, B. Yunus:
A novel interactive OBE approach in SCM pedagogy using beer game simulation theory. - Rick Zhang, Marco Pavone:
Control of Robotic Mobility-On-Demand Systems: a Queueing-Theoretical Perspective. - Holger Boche, Brendan Farrell:
Strong Divergence of Reconstruction Procedures for the Paley-Wiener Space $\mathcal{PW}^1_π$ and the Hardy Space $\mathcal{H}^1$. - Jeremy Avigad, Robert Y. Lewis, Cody Roux:
A heuristic prover for real inequalities. - Guoxu Zhou, Andrzej Cichocki, Qibin Zhao, Shengli Xie:
Efficient Nonnegative Tucker Decompositions: Algorithms and Uniqueness. - Teturo Kamae, Dong Han Kim:
A characterization of eventually periodicity. - Aanjhan Ranganathan, Boris Danev, Srdjan Capkun:
Low-power Distance Bounding. - Zohair Abu-Shaban, M. R. Bhavani Shankar, Hani Mehrpouyan, Björn E. Ottersten:
Enhanced List-Based Group-Wise Overloaded Receiver with Application to Satellite Reception. - Zohair Abu-Shaban, Hani Mehrpouyan, Joel Grotz, Björn E. Ottersten:
Overloaded Satellite Receiver Using SIC with Hybrid Beamforming and ML Detection. - Asma Mejri, Ghaya Rekaya-Ben Othman:
Efficient Decoding Algorithms for the Compute-and-Forward Strategy. - Florian Merz, Peter Sanders:
PReaCH: A Fast Lightweight Reachability Index using Pruning and Contraction Hierarchies. - Robert Schwarzenberg, Bernd Freisleben, Christopher Nimsky, Jan Egger:
Cube-Cut: Vertebral Body Segmentation in MRI-Data through Cubic-Shaped Divergences. - Miika Hannula, Juha Kontinen, Sebastian Link:
On Independence Atoms and Keys. - Moran Feldman, Ola Svensson, Rico Zenklusen:
A Simple Order-Oblivious O(log log(rank))-Competitive Algorithm for the Matroid Secretary Problem. - L. Sunil Chandran, Deepak Rajendraprasad, Marek Tesar:
Rainbow Colouring of Split Graphs. - Galina Jirásková, Tomás Masopust:
On Upper and Lower Bounds on the Length of Alternating Towers. - H. Birkan Yilmaz, Akif Cem Heren, Tuna Tugcu, Chan-Byoung Chae:
3-D Channel Characteristics for Molecular Communications with an Absorbing Receiver. - Thi-Van-Anh Nguyen, Arnaud Lallouet:
A Complete Solver for Constraint Games. - Ferdinando Cicalese, Balázs Keszegh, Bernard Lidický, Dömötör Pálvölgyi, Tomás Valla:
On the Tree Search Problem with Non-uniform Costs. - Daniel Lokshtanov, Pranabendu Misra, Fahad Panolan, Saket Saurabh:
Deterministic Truncation of Linear Matroids. - Shahin Kamali
, Alejandro López-Ortiz:
An All-Around Near-Optimal Solution for the Classic Bin Packing Problem. - Minh-Dung Tran, Gergely Ács, Claude Castelluccia:
Retargeting Without Tracking. - Antonio Córdoba, Daniel Aguilar-Hidalgo, María Carmen Lemos:
Collective computation in a network with distributed information. - Hadi Restgou Haghi, Mohammad Reza Kangavari, Behrang QasemiZadeh:
A Novel Approach for Video Temporal Annotation. - Jonatha Anselmi, Bruno Gaujal, Tommaso Nesti:
Control of parallel non-observable queues: asymptotic equivalence and optimality of periodic policies. - Daoyuan Wu, Rocky K. C. Chang:
Analyzing Android Browser Apps for file: // Vulnerabilities. - Edith Hemaspaandra, Lane A. Hemaspaandra, Henning Schnoor:
A Control Dichotomy for Pure Scoring Rules. - Behrang QasemiZadeh, Saeed Rahimi, Behrooz Mahmoodi Bakhtiari:
The First Parallel Multilingual Corpus of Persian: Toward a Persian BLARK. - Anand Louis, Yury Makarychev:
Approximation Algorithms for Hypergraph Small Set Expansion and Small Set Vertex Expansion. - Mohsen Raeesi, Mohammad Amin Morid, Mehdi Shajari:
Trust Evaluation using an Improved Context Similarity Measurement.