


default search action
CoRR, April 2014
- Mark Giesbrecht, Albert Heinle, Viktor Levandovskyy:

Factoring Differential Operators in n Variables. - Rodrigo Bongers:

EPICS process variables in different subnetworks and different IOCs without the use of the CaGateway. - Jeremiah Blocki, Manuel Blum, Anupam Datta:

Human Computable Passwords. - Neri Mickael, Denis Mestivier:

An efficient GPU acceptance-rejection algorithm for the selection of the next reaction to occur for Stochastic Simulation Algorithms. - Jihua Lu, Xiangming Li, Dan Liu:

Asynchronous Transmission of Wireless Multicast System with Genetic Joint Antennas Selection. - Immanuel Trummer, Christoph Koch:

Approximation Schemes for Many-Objective Query Optimization. - Ivana Maric, Dennis Hui:

Short Message Noisy Network Coding with Rate Splitting. - Maryam Hosseini, Narayana Santhanam:

On redundancy of memoryless sources over countable alphabets. - Abeer S. Al-Humaimeedy, Maribel Fernández:

General dynamic recovery for compensating CSP. 3-16 - Ed Blakey:

Ray tracing - computing the incomputable? 32-40 - Eugen Jiresch:

Towards a GPU-based implementation of interaction nets. 41-53 - Elvira Mayordomo

:
Effective dimension in some general metric spaces. 67-75 - Benedek Nagy, Sándor Vályi:

Computing discrete logarithm by interval-valued paradigm. 76-86 - Arno Pauly

, Matthew de Brecht:
Non-deterministic computation and the Jayne-Rogers Theorem. 87-96 - Sam Sanders:

Algorithm and proof as Ω-invariance and transfer: A new model of computation in nonstandard analysis. 97-109 - Alejandro Díaz-Caro

, Gilles Dowek
:
The probability of non-confluent systems. 1-15 - Marcela Quispe-Cruz

, Edward Hermann Haeusler, Lew Gordeev:
Proof-graphs for Minimal Implicational Logic. 16-29 - Pablo Arrighi, Simon Martiel, Zizhu Wang

:
Causal Dynamics of Discrete Surfaces. 30-40 - Adriana B. Compagnoni, Paola Giannini

, Catherine Kim, Matthew Milideo, Vishakha Sharma:
A Calculus of Located Entities. 41-56 - Carlos Alberto Ramírez Restrepo

, Jorge A. Pérez
, Jesús Aranda
, Juan Francisco Díaz
:
Towards Formal Interaction-Based Models of Grid Computing Infrastructures. 57-72 - Mario R. F. Benevides

, Isaque Lima, Rafael Nader, Pedro Rougemont
:
Using HMM in Strategic Games. 73-84 - Karin Quaas:

MTL-Model Checking of One-Clock Parametric Timed Automata is Undecidable. 5-17 - Youcheng Sun

, Giuseppe Lipari
, Étienne André
, Laurent Fribourg:
Toward Parametric Timed Interfaces for Real-Time Components. 49-64 - Mladen Skelin, Marc Geilen

, Francky Catthoor, Sverre Hendseth:
Worst-case Throughput Analysis for Parametric Rate and Parametric Actor Execution Time Scenario-Aware Dataflow Graphs. 65-79 - Iaakov Exman:

Interestingness a Unifying Paradigm Bipolar Function Composition. - Hongbo Si, Haris Vikalo, Sriram Vishwanath:

Haplotype Assembly: An Information Theoretic View. - Vikash Mansinghka, Daniel Selsam, Yura N. Perov:

Venture: a higher-order probabilistic programming platform with programmable inference. - Chan Dai Truyen Thai, Marion Berbineau:

Quantization for Uplink Transmissions in Two-tier Networks with Femtocells. - John Matta, Jeffrey Borwey, Gunes Ercal:

Comparative Resilience Notions and Vertex Attack Tolerance of Scale-Free Networks. - Shiu Kumar, Eun Sik Ham, Seong Ro Lee:

Traffic Monitoring Using M2M Communication. - Josep Díaz, George B. Mertzios:

Minimum Bisection is NP-hard on Unit Disk Graphs. - Bharat Adsul, Jinesh Machchhar, Milind A. Sohoni:

A Computational Framework for Boundary Representation of Solid Sweeps. - Siyi Wang, Weisi Guo, Mark D. McDonnell:

Downlink Interference Estimation without Feedback for Heterogeneous Network Interference Avoidance. - Siyi Wang, Weisi Guo, Song Qiu, Mark D. McDonnell:

Performance of Macro-Scale Molecular Communications with Sensor Cleanse Time. - Shusen Wang, Zhihua Zhang:

Efficient Algorithms and Error Analysis for the Modified Nystrom Method. - Albert Y. S. Lam, Yanhui Geng, Victor O. K. Li:

Information-Theoretic Bounds for Performance of Resource-Constrained Communication Systems. - Juha Kontinen, Julian-Steffen Müller, Henning Schnoor, Heribert Vollmer:

Modal Independence Logic. - O. O. Ogunduyile, Oludayo O. Olugbara, Lall Manoj:

Development of Wearable Systems for Ubiquitous Healthcare Service Provisioning. - David García, Ingmar Weber, Venkata Rama Kiran Garimella:

Gender Asymmetries in Reality and Fiction: The Bechdel Test of Social Media. - Mojtaba Soltanalian, Petre Stoica:

A Recursive Method for Enumeration of Costas Arrays. - Boris Bellalta, Alessandro Zocca, Cristina Cano, Alessandro Checco, Jaume Barceló, Alexey V. Vinel:

Throughput Analysis in CSMA/CA Networks using Continuous Time Markov Networks: A Tutorial. - Abidin Kaya, Bahattin Yildiz:

Extension theorems for self-dual codes over rings and new binary self-dual codes. - Andreas Veit, Christoph Goebel, Rohit Tidke, Christoph Doblander, Hans-Arno Jacobsen:

Household Electricity Demand Forecasting - Benchmarking State-of-the-Art Methods. - Peter Jung, Philipp Walk:

Sparse Model Uncertainties in Compressed Sensing with Application to Convolutions and Sporadic Communication. - Bassam A. Alqaralleh, Khaled Almiani:

Mobile Elements Scheduling for Periodic Sensor Applications. - Alessandro Borri, Giordano Pola, Maria Domenica Di Benedetto:

Symbolic Control Design of Nonlinear Networked Control Systems. - Sy-Quoc Le, Vincent Yan Fu Tan, Mehul Motani:

A Case Where Interference Does Not Affect The Channel Dispersion. - Victor Alvarez, Karl Bringmann, Saurabh Ray, Raimund Seidel:

Counting Triangulations and other Crossing-Free Structures Approximately. - Ahmed Douik

, Sameh Sorour, Mohamed-Slim Alouini
, Tareq Y. Al-Naffouri
:
On Minimizing the Maximum Broadcast Decoding Delay for Instantly Decodable Network Coding. - Jingge Zhu, Michael Gastpar:

Lattice Codes for Many-to-One Interference Channels With and Without Cognitive Messages. - Chandan K. Dubey, Thomas Holenstein:

Sampling a Uniformly Random Solution of a Quadratic Equation over Quotient Rings. - Jack Kelly, William J. Knottenbelt:

'UK-DALE': A dataset recording UK Domestic Appliance-Level Electricity demand and whole-house demand. - David Eppstein, Michael T. Goodrich, Michael Mitzenmacher, Pawel Pszona:

Wear Minimization for Cuckoo Hashing: How Not to Throw a Lot of Eggs into One Basket. - Mostafizur Rahman, Pritish Narayanan, Csaba Andras Moritz:

Metal-Gated Junctionless Nanowire Transistors. - Matthias Schröder, Victor L. Selivanov:

Hyperprojective Hierarchy of QCB0-spaces. - (Withdrawn) A Kernel-Based Nonparametric Test for Anomaly Detection over Line Networks.

- David Darmon, Elisa Omodei, Joshua Garland:

Followers Are Not Enough: Beyond Structural Communities in Online Social Networks. - Abhisek Kundu, Petros Drineas:

A Note on Randomized Element-wise Matrix Sparsification. - Bei Yu, David Z. Pan:

Layout Decomposition for Quadruple Patterning Lithography and Beyond. - Menglong Zhu, Nikolay Atanasov, George J. Pappas, Kostas Daniilidis:

Active Deformable Part Models. - John S. H. Baxter

, Martin Rajchl, Jing Yuan, Terry M. Peters:
A Continuous Max-Flow Approach to General Hierarchical Multi-Labelling Problems. - Paul S. Bonsma, Amer E. Mouawad:

The Complexity of Bounded Length Graph Recoloring. - Thomas Rothvoß:

Constructive discrepancy minimization for convex sets. - Andrew W. Eckford, Chan-Byoung Chae:

Scaling laws for molecular communication. - Ming Lei, Mohammad Reza Soleymani:

Performance of the Generalized Quantize-and-Forward Scheme over the Multiple-Access Relay Channel. - Lutz Bornmann:

Inter-rater reliability and convergent validity of F1000Prime peer review. - Sebastiano Vigna:

Further scramblings of Marsaglia's xorshift generators. - Chiyuan Zhang, Georgios Evangelopoulos

, Stephen Voinea, Lorenzo Rosasco, Tomaso A. Poggio:
A Deep Representation for Invariance And Music Classification. - Xu Chen, Zeeshan Syed, Alfred O. Hero III:

EEG Spatial Decoding and Classification with Logit Shrinkage Regularized Directed Information Assessment (L-SODA). - Emil Björnson, Mats Bengtsson, Björn E. Ottersten:

Optimal Multiuser Transmit Beamforming: A Difficult Problem with a Simple Solution Structure. - Fabio Mogavero

, Aniello Murano, Moshe Y. Vardi:
Proceedings 2nd International Workshop on Strategic Reasoning, SR 2014, Grenoble, France, April 5-6, 2014. EPTCS 146, 2014 [contents] - Miltiadis Allamanis, Charles Sutton:

Mining Idioms from Source Code. - Bei Yin, Michael Wu, Joseph R. Cavallaro, Christoph Studer:

Conjugate Gradient-based Soft-Output Detection and Precoding in Massive MIMO Systems. - Shuhang Wu, Shuangqing Wei, Yue Wang, Ramachandran Vaidyanathan, Jian Yuan:

Partition Information and its Transmission over Boolean Multi-Access Channels. - Ryutaroh Matsumoto:

New Asymptotic Metrics for Relative Generalized Hamming Weight. - Barbora Buhnova, Lucia Happe

, Jan Kofron:
Proceedings 11th International Workshop on Formal Engineering approaches to Software Components and Architectures, FESCA 2014, Grenoble, France, 12th April 2014. EPTCS 147, 2014 [contents] - Robert Suderman, Daniel J. Lizotte

, Nasser Mohieddin Abukhdeir:
Theory and Application of Shapelets to the Analysis of Surface Self-assembly Imaging. - Kevin Carlberg:

Adaptive $h$-refinement for reduced-order models. - Pokkuluri Kiran Sree, Inampudi Ramesh Babu, N. S. S. S. N. Usha Devi:

Cellular Automata and Its Applications in Bioinformatics: A Review. - Mohammed Zakarya Baba-Ahmed, Badr Benmammar, Fethi Tarik Bendimerad:

Self-protection and self-healing in the context of cognitive radio. - Loet Leydesdorff, Caroline S. Wagner, Lutz Bornmann:

The European Union, China, and the United States in the Top-1% and Top-10% Layers of Most-Frequently-Cited Publications: Competition and Collaborations. - Da Kuang, Raffay Hamid:

piCholesky: Polynomial Interpolation of Multiple Cholesky Factors for Efficient Approximate Cross-Validation. - Xin Kang, Chin Keong Ho, Sumei Sun:

Full-Duplex Wireless-Powered Communication Network with Energy Causality. - Haixin Zhang, Daijun Wei, Yong Hu, Xin Lan, Yong Deng:

Modelling the Self-similarity in Complex Networks Based on Coulomb's Law. - Jörg H. Kappes, Björn Andres, Fred A. Hamprecht, Christoph Schnörr, Sebastian Nowozin, Dhruv Batra, Sungwoong Kim, Bernhard X. Kausler, Thorben Kröger, Jan Lellmann, Nikos Komodakis, Bogdan Savchynskyy, Carsten Rother:

A Comparative Study of Modern Inference Techniques for Structured Discrete Energy Minimization Problems. - Li Gou, Yong Deng, Rehan Sadiq, Sankaran Mahadevan:

Modeling contaminant intrusion in water distribution networks based on D numbers. - Talal Rahwan, Victor Naroditskiy, Tomasz P. Michalak, Michael J. Wooldridge, Nicholas R. Jennings:

Towards a Fair Allocation of Rewards in Multi-Level Marketing. - Thomas Given-Wilson

:
An Intensional Concurrent Faithful Encoding of Turing Machines. 21-37 - Paul J. Werbos:

From ADP to the Brain: Foundations, Roadmap, Challenges and Research Priorities. - Saeid Sahraei, Michael C. Gastpar:

New Shortest Lattice Vector Problems of Polynomial Complexity. - Goce Chadzitaskos, Lenka Háková, Ondrej Kajínek:

Weyl group orbit functions in image processing. - Rob Arthan, Paulo Oliva:

On Affine Logic and Łukasiewicz Logic. - Xinpei Ma, Hiroki Sayama:

Mental Disorder Recovery Correlated with Centralities and Interactions on an Online Social Network. - David Adjiashvili, Noy Rotbart:

Labeling Schemes for Bounded Degree Graphs. - Oscar Esteban, Gert Wollny, Subrahmanyam Gorthi, María J. Ledesma-Carbayo, Jean-Philippe Thiran, Andrés Santos, Meritxell Bach Cuadra:

MBIS: Multivariate Bayesian Image Segmentation Tool. - John Fearnley, Rahul Savani

:
The Complexity of the Simplex Method. - André Frochaux, Martin Grohe, Nicole Schweikardt:

Monadic Datalog Containment on Trees. - Mostafizur Rahman, Santosh Khasanvis, Jiajun Shi, Mingyu Li, Csaba Andras Moritz:

Skybridge: 3-D Integrated Circuit Technology Alternative to CMOS. - Shai Vardi:

The secretary returns. - Mostafizur Rahman, Santosh Khasanvis, Csaba Andras Moritz:

Nanowire Volatile RAM as an Alternative to SRAM. - Mohammed Javed, P. Nagabhushan, B. B. Chaudhuri:

Extraction of Projection Profile, Run-Histogram and Entropy Features Straight from Run-Length Compressed Text-Documents. - Akin Osman Kazakci:

Conceptive Artificial Intelligence: Insights from design theory. - Julien Cassaigne, Vesa Halava, Tero Harju, François Nicolas:

Tighter Undecidability Bounds for Matrix Mortality, Zero-in-the-Corner Problems, and More. - Juan Carlos Cortés, Francisco-José Santonja, Ana C. Tarazona, Rafael J. Villanueva, Javier Villanueva-Oller:

A probabilistic estimation and prediction technique for dynamic continuous social science models: The evolution of the attitude of the Basque Country population towards ETA as a case study. - Gil Cohen, Avishay Tal:

Two Structural Results for Low Degree Polynomials and Applications. - Edwin Hammerich:

Waterfilling Theorems in the Time-Frequency Plane for the Heat Channel and a Related Source. - YounSun Cho:

Privacy-Preserving Social Network with Multigrained and Multilevel Access Control. - Yong Wang:

Security Analyses of Quantum Communication Protocols. - Hammurabi Mendes, Sorin Istrail:

Thermodynamic Hypothesis as Social Choice: An Impossibility Theorem for Protein Folding. - Xin-She Yang, Mehmet Karamanoglu, Xingshi He:

Multi-objective Flower Algorithm for Optimization. - Spyros Sioutas, Evangelos Sakkopoulos, Alexandros Panaretos, Dimitrios Tsoumakos, Panagiotis Gerolymatos, Giannis Tzimas, Yannis Manolopoulos:

D-P2P-Sim+: A Novel Distributed Framework for P2P Protocols Performance Testing. - Emanuela Merelli, Nicola Paoletti, Luca Tesei:

Adaptability Checking in Multi-Level Complex Systems. - Mahmoud Abo Khamis, Hung Q. Ngo, Christopher Ré, Atri Rudra:

Joins via Geometric Resolutions: Worst-case and Beyond. - Xin-She Yang, Slawomir Koziel, Leifur Þ. Leifsson:

Computational Optimization, Modelling and Simulation: Recent Trends and Challenges. - Deeparnab Chakrabarty, Kashyap Dixit, Madhav Jha, C. Seshadhri:

Property Testing on Product Distributions: Optimal Testers for Bounded Derivative Properties. - Emily Denton, Wojciech Zaremba, Joan Bruna, Yann LeCun, Rob Fergus:

Exploiting Linear Structure Within Convolutional Networks for Efficient Evaluation. - Geoffrey Irving:

Pentago is a First Player Win: Strongly Solving a Game Using Parallel In-Core Retrograde Analysis. - Serge Gaspers, Gregory B. Sorkin:

Separate, Measure and Conquer: Faster Algorithms for Max 2-CSP and Counting Dominating Sets. - Bertrand Wechsler, Dan Eilat, Nicolas Limal:

Information Flow Decompositions in Feedback Systems: General Case Study. - Mrinalkanti Ghosh, Satyadev Nandakumar, Atanu Pal:

Ornstein Isomorphism and Algorithmic Randomness. - Md. Enamul Haque, Abdullah Al Kaisan, Mahmudur R. Saniat, Aminur Rahman:

GPU Accelerated Fractal Image Compression for Medical Imaging in Parallel Computing Platform. - Mohsen Ghaffari, Bernhard Haeupler, Majid Khabbazian:

Randomized Broadcast in Radio Networks with Collision Detection. - Verica Bakeva, Aleksandra Popovska-Mitrovikj, Vesna Dimitrova:

Resistance of Statistical Attacks of Parastrophic Quasigroup Transformation. - Cem Evrendilek, Ismail Hakki Toroslu, Sasan Hashemi:

Task Assignment in Tree-Like Hierarchical Structures. - Oscar Stiffelman:

The Least Wrong Model Is Not in the Data. - Victor Marsault, Jacques Sakarovitch:

Breadth-first serialisation of trees and rational languages. - Allan Grønlund Jørgensen, Seth Pettie:

Threesomes, Degenerates, and Love Triangles. - Cosimo Anglano, Marco Guazzone, Matteo Sereno:

Maximizing Profit in Green Cellular Networks through Collaborative Games. - Daniel Lokshtanov, Marcin Pilipczuk, Michal Pilipczuk, Saket Saurabh:

Fixed-parameter tractable canonization and isomorphism test for graphs of bounded treewidth. - Tal Kopetz, Haim H. Permuter, Shlomo Shamai:

Multiple Access Channels with Combined Cooperation and Partial Cribbing. - Véronique Bruyère, Emmanuel Filiot

, Mickael Randour, Jean-François Raskin:
Expectations or Guarantees? I Want It All! A crossroad between games and MDPs. 1-8 - Lluís Godo

, Enrico Marchioni
:
Games for the Strategic Influence of Expectations. 9-15 - Wojciech Jamroga

, Matthijs Melissen, Henning Schnoor:
On Defendability of Security Properties. 17-25 - Francesco Belardinelli

:
Reasoning about Knowledge and Strategies: Epistemic Strategy Logic. 27-33 - Xiaowei Huang

, Ron van der Meyden
:
An Epistemic Strategy Logic (Extended Abstract). 35-41 - Patricia Bouyer, Nicolas Markey

, Steen Vester:
Nash Equilibria in Symmetric Games with Partial Observation. 49-55 - Dimitar P. Guelev:

Refining and Delegating Strategic Ability in ATL. 57-63 - Cláudia Nalon, Lan Zhang, Clare Dixon

, Ullrich Hustadt
:
A Resolution Prover for Coalition Logic. 65-73 - Xiang Jiang, Arno Pauly

:
Efficient Decomposition of Bimatrix Games (Extended Abstract). 75-81 - Benjamin Aminof, Sasha Rubin

:
First Cycle Games. 83-90 - Guillaume Aucher

, Bastien Maubert
, Sophie Pinchinat:
Automata Techniques for Epistemic Protocol Synthesis. 97-103 - Piero A. Bonatti

, Marco Faella, Luigi Sauro:
Partial Preferences for Mediated Bargaining. 105-111 - Fenglin Han, Jan Olaf Blech

, Peter Herrmann
, Heinz W. Schmidt:
Towards Verifying Safety Properties of Real-Time Probabilistic Systems. 1-15 - Stefan Stattelmann, Manuel Oriol, Thomas Gamer

:
Execution Time Analysis for Industrial Control Applications. 16-31 - Arnaud Lanoix, Olga Kouchnarenko

:
Component Substitution through Dynamic Reconfigurations. 32-46 - Christian Colombo

, Gordon J. Pace
:
Comprehensive Monitor-Oriented Compensation Programming. 47-61 - Rui Couto

, António Nestor Ribeiro
, José Creissac Campos
:
Application of Ontologies in Identifying Requirements Patterns in Use Cases. 62-76 - Antinisca Di Marco

, Catia Trubiani
:
A model-driven approach to broaden the detection of software performance antipatterns at runtime. 77-92 - Faiz Ul Muram, Huy Tran, Uwe Zdun:

Automated Mapping of UML Activity Diagrams to Formal Specifications for Supporting Containment Checking. 93-107 - Mounira Kezadri Hamiaz

, Marc Pantel, Benoît Combemale, Xavier Thirioux:
Correct-by-construction model composition: Application to the Invasive Software Composition method. 108-122 - Wei Bai, Emmanuel M. Tadjouddine, Yu Guo:

Enabling Automatic Certification of Online Auctions. 123-132 - Luciana Brasil Rebelo dos Santos

, Valdivino Alexandre de Santiago Júnior
, Nandamudi Lankalapalli Vijaykumar:
Transformation of UML Behavioral Diagrams to Support Software Model Checking. 133-142 - Kangqi Liu, Meixia Tao, Dingcheng Yang:

Generalized Signal Alignment For Arbitrary MIMO Two-Way Relay Channels. - Jun He, Feidun He, Hongbin Dong:

A Novel Genetic Algorithm using Helper Objectives for the 0-1 Knapsack Problem. - Youze Tang, Xiaokui Xiao, Yanchen Shi:

Influence Maximization: Near-Optimal Time Complexity Meets Practical Efficiency. - Zoran Hadzi-Velkov, Nikola Zlatanov, Robert Schober:

Optimal Power Control for Analog Bidirectional Relaying with Long-Term Relay Power Constraint. - Vikramkumar, Vijaykumar B, Trilochan:

Bayes and Naive Bayes Classifier. - Jiyi Li:

Map Route Ranking with Weighted Distance using Environmental Factors. - Michael Codish, Luís Cruz-Filipe, Peter Schneider-Kamp:

The Quest for Optimal Sorting Networks: Efficient Generation of Two-Layer Prefixes. - Jochen Burghardt, Birgit Heinz:

Implementing Anti-Unification Modulo Equational Theory. - Thomas Given-Wilson:

Expressiveness via Intensionality and Concurrency. - Joong Bum Rhim, Vivek K. Goyal:

Distributed Hypothesis Testing with Social Learning and Symmetric Fusion. - Fabian Monsees, Carsten Bockelmann, Dirk Wübben, Armin Dekorsy:

Compressed Sensing Bayes Risk Minimization for Under-determined Systems via Sphere Detection. - Lila Kari, Steffen Kopecki, Pierre-Étienne Meunier, Matthew J. Patitz, Shinnosuke Seki:

Binary pattern tile set synthesis is NP-hard. - Yan Liu, Haode Yan, Chunlei Liu:

A Class of Reducible Cyclic Codes and Their Weight Distribution. - Karine Zidane, Jérôme Lacan, Marie-Laure Boucheret, Charly Poulliat:

Improved channel estimation for interference cancellation in random access methods for satellite communications. - Marco Beccuti, Enrico Bibbona, András Horváth, Roberta Sirovich, Alessio Angius, Gianfranco Balbo:

Analysis of Petri Net Models through Stochastic Differential Equations. - Shay Mozes, Yahav Nussbaum, Oren Weimann:

Faster Shortest Paths in Dense Distance Graphs, with Applications. - Martin Kasparick, Renato L. G. Cavalcante, Stefan Valentin, Slawomir Stanczak, Masahiro Yukawa:

Kernel-Based Adaptive Online Reconstruction of Coverage Maps With Side Information. - Suman Joshi, Yashwant Singh Chauhan, Ashish Negi:

New Julia and Mandelbrot Sets for Jungck Ishikawa Iterates. - Tamal K. Dey, Alfred Rossi, Anastasios Sidiropoulos:

Spectral concentration, robust k-center, and simple clustering. - Thiago Henrique Silva, Pedro O. S. Vaz de Melo, Jussara M. Almeida, Mirco Musolesi, Antonio A. F. Loureiro:

You are What you Eat (and Drink): Identifying Cultural Boundaries by Analyzing Food & Drink Habits in Foursquare. - György Dósa, Leah Epstein:

Online bin packing with cardinality constraints revisited. - Leah Epstein, Asaf Levin:

Minimum total weighted completion time: Faster approximation schemes. - Stephen Tyree, Jacob R. Gardner, Kilian Q. Weinberger, Kunal Agrawal, John Tran:

Parallel Support Vector Machines in Practice. - Francisco Javier Martin-Vega, Francisco Javier López-Martínez, Gerardo Gómez, Mari Carmen Aguayo Torres:

Multi-User Coverage Probability of Uplink Cellular Systems: a Stochastic Geometry Approach. - Martin Farach-Colton, Katia Leal, Miguel A. Mosteiro, Christopher Thraves:

Dynamic Windows Scheduling with Reallocation. - Sungjin Im, Janardhan Kulkarni, Kamesh Munagala:

Competitive Algorithms from Competitive Equilibria: Non-Clairvoyant Scheduling under Polyhedral Constraints. - Jonathon Shlens:

A Tutorial on Principal Component Analysis. - Daniel M. Kane:

A Polylogarithmic PRG for Degree $2$ Threshold Functions in the Gaussian Setting. - Junjie Zhu, Siddhartan Govindasamy, Jeff Hwang:

Performance of Multiantenna Linear MMSE Receivers in Doubly Stochastic Networks. - Jun He, Honghai Zhang, Baohua Zhao, Sampath Rangarajan:

A Collaborative Framework for In-network Video Caching in Mobile Networks. - Ashutosh Nayyar, Matias Negrete-Pincetic, Kameshwar Poolla, Pravin Varaiya:

Duration-Differentiated Services in Electricity. - Ahmed H. Anwar, Ahmed El Shafie, Amr Mohamed, Tamer A. ElBatt, Mohsen Guizani:

Interference-based Optimal Power-efficient Access Scheme for Cognitive Radio Networks. - Ayush Bhandari, Achuta Kadambi, Refael Whyte, Christopher Barsi, Micha Feigin, Adrian A. Dorrington, Ramesh Raskar:

Resolving Multi-path Interference in Time-of-Flight Imaging via Modulation Frequency Diversity and Sparse Regularization. - Kai Li, Yong Wang, Meilin Liu:

A Task Allocation Schema Based on Response Time Optimization in Cloud Computing. - Chengyu Peng, Hong Cheng, Manchor Ko:

An Efficient Two-Stage Sparse Representation Method. - Christopher Amato, Frans A. Oliehoek:

Scalable Planning and Learning for Multiagent POMDPs. - Yifan Zhou, Zhifeng Zhao, Qianlan Ying, Rongpeng Li, Xuan Zhou, Honggang Zhang:

Two-tier Spatial Modeling of Base Stations in Cellular Networks. - Qianlan Ying, Zhifeng Zhao, Yifan Zhou, Rongpeng Li, Xuan Zhou, Honggang Zhang:

Modeling Spatial Distributions of Base Stations in Cellular Networks. - Pokkuluri Kiran Sree, Inampudi Ramesh Babu, N. S. S. S. N. Usha Devi:

AIS-MACA- Z: MACA based Clonal Classifier for Splicing Site, Protein Coding and Promoter Region Identification in Eukaryotes. - Mohammad Noshad, Maïté Brandt-Pearce:

Hadamard Coded Modulation: An Alternative to OFDM for Optical Wireless Communications. - (Withdrawn) Recognition of Handwritten MODI Numerals using Hu and Zernike features.

- Nilanjan Roy Chowdhury, Srikant Sukumar:

Persistence based analysis of consensus protocols for dynamic graph networks. - Germán Corrales Madueño, Cedomir Stefanovic, Petar Popovski:

Reliable Reporting for Massive M2M Communications with Periodic Resource Pooling. - Amirali Abdullah, Suresh Venkatasubramanian:

A directed isoperimetric inequality with application to Bregman near neighbor lower bounds. - Xin Kang, Yeow-Khiang Chia, Chin Keong Ho, Sumei Sun:

Cost minimization for fading channels with energy harvesting and conventional energy. - Jochen Burghardt:

Experiences in Developing Time-Critical Systems - The Case Study "Production Cell". - Jochen Burghardt:

Regular Substitution Sets: A Means of Controlling E-Unification. - Sergey Goncharov, Dirk Pattinson:

Coalgebraic Weak Bisimulation from Recursive Equations over Monads. - Bertram Felgenhauer, Aart Middeldorp, Harald Zankl, Vincent van Oostrom

:
Layer Systems for Proving Confluence. - Jochen Burghardt:

Formale Entwicklung einer Steuerung für eine Fertigungszelle mit SYSYFOS. - Giulio Coluccia, Aline Roumy, Enrico Magli:

Operational Rate-Distortion Performance of Single-source and Distributed Compressed Sensing. - Emna Zedini

, Imran Shafique Ansari
, Mohamed-Slim Alouini
:
Unified Performance Analysis of Mixed Line of Sight RF-FSO Fixed Gain Dual-Hop Transmission Systems. - Iovka Boneva, José Emilio Labra Gayo, Samuel Hym, Eric G. Prud'hommeaux, Harold R. Solbrig, Slawek Staworko:

Validating RDF with Shape Expressions. - Md. Selim Al Mamun, B. K. Karmaker:

Design of Reversible Counter. - Ahmed Tamrawi, Kang Gui, Suresh C. Kothari:

Event-Flow Graphs for Efficient Path-Sensitive Analyses. - Dongwoo Kim, Alice Oh:

Hierarchical Dirichlet Scaling Process. - Yuri Shalygo:

The Kinetic Basis of Self-Organized Pattern Formation. - Ardavan Rahimian:

Steerable Antennas for Automotive Communication Systems. - Omaima N. A. Al-Allaf:

Review of Face Detection Systems Based Artificial Neural Networks Algorithms. - Emilio Ferrara, Pasquale De Meo, Salvatore Catanese, Giacomo Fiumara:

Detecting criminal organizations in mobile phone networks. - Zohreh Zahedi, Rodrigo Costas, Paul Wouters:

How well developed are altmetrics? A cross-disciplinary analysis of the presence of 'alternative metrics' in scientific publications. - Kyeong Soo Kim:

Comments on "IEEE 1588 Clock Synchronization using Dual Slave Clocks in a Slave". - Nihat Engin Tunali, Yu-Chih Huang, Joseph J. Boutros, Krishna R. Narayanan:

Lattices over Eisenstein Integers for Compute-and-Forward. - Valery N. Gorbachev, E. M. Kaynarova, I. K. Metelev, E. S. Yakovleva:

Color to Gray and Back transformation for distributing color digital images. - K. Meenakshi, Ch. Srinivasa Rao, K. Satya Prasad:

Robust Video Watermarking Schemes in Phase domain Using Binary Phase Shift Keying. - Robert LiKamWa, Zhen Wang, Aaron Carroll, Felix Xiaozhu Lin, Lin Zhong:

Draining our Glass: An Energy and Heat Characterization of Google Glass. - Glencora Borradaile, Claire Mathieu, Theresa Migler:

Lower bounds for testing digraph connectivity with one-pass streaming algorithms. - Da Wang, Gauri Joshi, Gregory W. Wornell:

Efficient Task Replication for Fast Response Times in Parallel Computation. - Siarhei V. Charapitsa, Irina Ya. Dubovskaya, Alexander S. Lobko, Tatiana A. Savitskaya, Svetlana N. Sytova:

Structure of Belarusian educational and research web portal of nuclear knowledge. - Nima Haghpanah, Jason D. Hartline:

Reverse Mechanism Design. - Lilian Hong:

Optimizing Relay Precoding for Wireless Coordinated Relaying. - Maksym Gabielkov, Ashwin Rao, Arnaud Legout

:
Studying Social Networks at Scale: Macroscopic Anatomy of the Twitter Social Graph. - Zheng Wang, Ming-Jun Lai, Zhaosong Lu, Wei Fan, Hasan Davulcu, Jieping Ye:

Orthogonal Rank-One Matrix Pursuit for Low Rank Matrix Completion. - Michael Backes, Sven Bugiel, Sebastian Gerling, Philipp von Styp-Rekowsky:

Android Security Framework: Enabling Generic and Extensible Access Control on Android. - Abhishek Gupta, Serdar Yüksel, Tamer Basar, Cedric Langbort:

On the Existence of Optimal Policies for a Class of Static and Sequential Dynamic Teams. - Arastoo Fazeli, Amir Ajorlou, Ali Jadbabaie:

Optimal Budget Allocation in Social Networks: Quality or Seeding. - Yao Sun, Dongdai Lin, Dingkang Wang:

An Improvement over the GVW Algorithm for Inhomogeneous Polynomial Systems. - Cong Tian, Zhenhua Duan:

Buchi Determinization Made Tighter. - Farshad Shams, Marco Luise:

Upper-Bounding the Capacity of Relay Communications - Part II. - Karl Bringmann:

Why walking the dog takes time: Frechet distance has no strongly subquadratic algorithms unless SETH fails. - Hamidou Tembine:

Non-Asymptotic Mean-Field Games. - Michal Cierny, Zhi Ding, Risto Wichman:

Higher Rank Interference Effect on Weak Beamforming or OSTBC Terminals. - Pallavi V. S., D. Rukmani Devi:

Design of a High Speed FPGA-Based Classifier for Efficient Packet Classification. - Sukhchandan Randhawa, Anil Kumar Verma:

A Review of Power Aware Routing Protocols in Wireless Sensor Networks. - Swetha R., D. Rukmani Devi:

High Throughput and Less Area AMP Architecture for Audio Signal Restoration. - Sukhchandan Randhawa:

Research Challenges in Wireless Sensor Network: A State of the Play. - Wenjing Liao, Albert Fannjiang:

MUSIC for Single-Snapshot Spectral Estimation: Stability and Super-resolution. - Xiaojun Yuan:

MIMO Multiway Relaying with Clustered Full Data Exchange: Signal Space Alignment and Degrees of Freedom. - Jayita Mitra, Diganta Saha:

An Efficient Feature Selection in Classification of Audio Files. - Med. Essahafi:

Model Predictive Control (MPC) Applied To Coupled Tank Liquid Level System. - Yair Wiener, Steve Hanneke, Ran El-Yaniv:

A Compression Technique for Analyzing Disagreement-Based Active Learning. - Shmuel Friedland, Qun Li, Dan Schonfeld, Edgar A. Bernal:

Two algorithms for compressed sensing of sparse tensors. - Aske Plaat:

MTD(f), A Minimax Algorithm Faster Than NegaScout. - Avinash N. Bhute, B. B. Meshram:

Text Based Approach For Indexing And Retrieval Of Image And Video: A Review. - Aske Plaat, Jonathan Schaeffer, Wim Pijls, Arie de Bruin:

A New Paradigm for Minimax Search. - Aske Plaat, Jonathan Schaeffer, Wim Pijls, Arie de Bruin:

SSS* = Alpha-Beta + TT. - Aske Plaat, Jonathan Schaeffer, Wim Pijls, Arie de Bruin:

Nearly Optimal Minimax Tree Search? - Vivek Kulkarni, Rami Al-Rfou', Bryan Perozzi, Steven Skiena:

Exploring the power of GPU's for training Polyglot language models. - Dimitris S. Papailiopoulos, Anastasios Kyrillidis, Christos Boutsidis:

Provable Deterministic Leverage Score Sampling. - Fabio Mogavero, Giuseppe Perelli:

On the Remarkable Features of Binding Forms. - Jihong Park, Seong-Lyun Kim, Jens Zander:

Asymptotic Behavior of Ultra-Dense Cellular Networks and Its Economic Impact. - R. Vidya, G. M. Nasira, R. P. Jaia Priyankka:

Sparse Coding: A Deep Learning using Unlabeled Data for High - Level Representation. - Vadim Stadnik:

Fast Sequential Summation Algorithms Using Augmented Data Structures. - Guosheng Lin, Chunhua Shen, Qinfeng Shi, Anton van den Hengel, David Suter:

Fast Supervised Hashing with Decision Trees for High-Dimensional Data. - Friedrich Eisenbrand, Santosh S. Vempala:

Geometric Random Edge. - YounSun Cho:

Detecting a Corrupted Area in a 2-Dimensional Space. - Alexios Balatsoukas-Stimming, Andreas Burg:

Density Evolution for Min-Sum Decoding of LDPC Codes Under Unreliable Message Storage. - James Pallister, Kerstin Eder, Simon J. Hollis, Jeremy Bennett:

A high-level model of embedded flash energy consumption. - Alexander W. Churchill, Siddharth Sigtia, Chrisantha Fernando:

A Denoising Autoencoder that Guides Stochastic Search. - Radoslaw Klimek, Leszek Kotulski:

Proposal of a multiagent-based smart environment for the IoT. - Ruizhi Liao, Boris Bellalta, Miquel Oliver, Zhisheng Niu:

MU-MIMO MAC Protocols for Wireless Local Area Networks: A Survey. - Barbara Kordy, Sjouke Mauw

, Wolter Pieters:
Proceedings First International Workshop on Graphical Models for Security, GraMSec 2014, Grenoble, France, April 12, 2014. EPTCS 148, 2014 [contents] - Yauhen Klimiankou:

An Enhanced Multi-Pager Environment Support for Second Generation Microkernels. - Hu Li, Yuan'an Liu, Dongming Yuan, Hefei Hu, Sirui Duan:

Utility Optimal Scheduling in Degree-Limited Satellite Networks. - (Withdrawn) Proximal Navigation Graphs and t-spanners.

- Hu Li, Yuan'an Liu, Hefei Hu, Dongming Yuan, Sirui Duan:

Analysis of Capacity Region of Delay-Tolerant Hybrid Mobile Ad Hoc Networks. - Lu Yu, Chuang Liu, Zi-Ke Zhang:

Multi-Linear Interactive Matrix Factorization. - Dian-Wu Yue, Geoffrey Ye Li:

LOS-based Conjugate Beamforming and Power-Scaling Law in Massive-MIMO Systems. - Namita Mittal, Basant Agarwal, Ajay Gupta, Hemant Madhur:

Icon Based Information Retrieval and Disease Identification in Agriculture. - Claudio De Persis, Pietro Tesi:

On Resilient Control of Nonlinear Systems under Denial-of-Service. - Olawale Surajudeen Adebayo, Shafii Muhammad Abdulhamid

, Andrew E. Fluck:
The Prospects for e-Examinations in Nigeria and Australia. - Le Thanh Tan, Long Bao Le:

Channel Assignment With Access Contention Resolution for Cognitive Radio Networks. - Le Thanh Tan, Long Bao Le:

Distributed MAC Protocol for Cognitive Radio Networks: Design, Analysis, and Optimization. - (Withdrawn) Pseudo-Zernike Based Multi-Pass Automatic Target Recognition From Multi-Channel SAR.

- Andris Ambainis, Jozef Gruska, Shenggen Zheng:

Exact query complexity of some special classes of Boolean functions. - Guido Governatori:

Thou Shalt is not You Will. - Jozef Gruska, Daowen Qiu, Shenggen Zheng:

Potential of quantum finite automata with exact acceptance. - Congduc Pham, Fumitoshi Matsuno, Serge Stinckwich:

Proceedings of Third Workshop on Robots and Sensors integration in future rescue INformation system (ROSIN 2013). - Martin Stanek:

Memory-only selection of dictionary PINs. - Gabriel Leuenberger:

Universal Algorithmic Ethics. - Christian Konrad, László Kozma:

Streaming Algorithms for Partitioning Integer Sequences. - Alexios Balatsoukas-Stimming, Andreas Burg:

Faulty Successive Cancellation Decoding of Polar Codes for the Binary Erasure Channel. - Nir Ailon:

A Tighter Lower Bound For Fourier Transform in the Well Conditioned Model. - Gourav Verma

, Deepika Ramaiya:
Analysis, Review and Optimization of SONET/SDH Technology for today and future aspects. - Erik D. Demaine, Martin L. Demaine:

Fun with Fonts: Algorithmic Typography. - Artem Babenko, Anton Slesarev, Alexander Chigorin, Victor S. Lempitsky:

Neural Codes for Image Retrieval. - Mohammad Hassan Lotfi, George Kesidis, Saswati Sarkar:

Network Non-Neutrality on the Internet: Content Provision Under a Subscription Revenue Model. - Harris Kyriakou, Jeffrey V. Nickerson:

Collective Innovation in Open Source Hardware. - Lorenzo Pasquini:

A class of AM-QFT algorithms for power-of-two FFT. - Anugrah Kumar:

Determining the Consistency factor of Autopilot using Rough Set Theory. - Georgios Lestaris, Ioannis Charalampidis, Dario Berzano, Jakob Blomer, Predrag Buncic, Gerardo Ganis, René Meusel:

CernVM Online and Cloud Gateway: a uniform interface for CernVM contextualization and deployment. - Derrick Wing Kwan Ng, Robert Schober:

Max-min Fair Wireless Energy Transfer for Secure Multiuser Communication Systems. - Silviu S. Craciunas, Christoph M. Kirsch, Hannes Payer, Harald Röck, Ana Sokolova:

Concurrency and Scalability versus Fragmentation and Compaction with Compact-fit. - Artem Babenko, Victor S. Lempitsky:

Improving Bilayer Product Quantization for Billion-Scale Approximate Nearest Neighbors in High Dimensions. - Sagar Tirodkar, Yazad Baldawala, Sagar Ulane, Ashok Jori:

Improved 3-Dimensional Security in Cloud Computing. - Aditi Kalyani, Hemant Kumud, Shashi Pal Singh, Ajai Kumar, Hemant Darbari:

Evaluation and Ranking of Machine Translated Output in Hindi Language using Precision and Recall Oriented Metrics. - Zhe Wang, Naftaly H. Minsky:

Establishing Global Policies over Decentralized Online Social Networks. - Andreas Gemsa, Martin Nöllenburg, Ignaz Rutter:

Evaluation of Labeling Strategies for Rotating Maps. - Marco Bressan, Enoch Peserico, Luca Pretto:

Approximating PageRank locally with sublinear query complexity. - Forrest N. Iandola, Matthew W. Moskewicz, Sergey Karayev, Ross B. Girshick, Trevor Darrell, Kurt Keutzer:

DenseNet: Implementing Efficient ConvNet Descriptor Pyramids. - Anthony Sigogne, Matthieu Constant, Éric Laporte

:
Intégration des données d'un lexique syntaxique dans un analyseur syntaxique probabiliste. - Guoming Tang, Kui Wu, Jingsheng Lei, Jiuyang Tang:

Plug and Play! A Simple, Universal Model for Energy Disaggregation. - Maksymilian Bujok, Piotr Fronczak, Agata Fronczak:

Polish and English wordnets - statistical analysis of interconnected networks. - Richard Herrmann:

A fractal approach to the dark silicon problem: a comparison of 3D computer architectures - standard slices versus fractal Menger sponge geometry. - Silvia Goodenough, Christian Lavault:

On subsets of Riordan subgroups and Heisenberg-Weyl algebra. - Yessica Saez, Xiaolin Cao, Laszlo B. Kish, G. Pesti:

Securing vehicle communication systems by the KLJN key exchange protocol. - Le Thanh Tan, Long Bao Le:

Fair channel allocation and access design for cognitive ad hoc networks. - Bahador Saket, Paolo Simonetto, Stephen G. Kobourov, Katy Börner:

Node, Node-Link, and Node-Link-Group Diagrams: An Evaluation. - Sungjin Im, Janardhan Kulkarni, Kamesh Munagala, Kirk Pruhs:

SELFISHMIGRATE: A Scalable Algorithm for Non-clairvoyantly Scheduling Heterogeneous Processors. - Jochen Burghardt:

Eine entscheidbare Klasse n-stelliger Horn-Prädikate. - Mrinal Kumar, Shubhangi Saraf:

On the power of homogeneous depth 4 arithmetic circuits. - Tim Libert:

Privacy Implications of Health Information Seeking on the Web. - Mahnoosh Alizadeh, Anna Scaglione, Andrea Goldsmith, George Kesidis:

Capturing Aggregate Flexibility in Demand Response. - Mahnoosh Alizadeh, Anna Scaglione, Andy Applebaum, George Kesidis, Karl N. Levitt:

Scalable and Anonymous Modeling of Large Populations of Flexible Appliances. - Andre Gustavo Degraf Uchoa, Cornelius T. Healy, Rodrigo Caiado de Lamare, Peng Li:

Iterative Detection and LDPC Decoding Algorithms for MIMO Systems in Block-Fading Channels. - Amani K. Samha, Yuefeng Li, Jinglan Zhang:

Aspect-Based Opinion Extraction from Customer reviews. - Erlend Andreas Gjære, Per Håkon Meland:

Threats Management Throughout the Software Service Life-Cycle. 1-14 - Ludovic Apvrille, Yves Roudier:

Towards the Model-Driven Engineering of Secure yet Safe Embedded Systems. 15-30 - Stéphane Paul:

Towards Automating the Construction & Maintenance of Attack Trees: a Feasibility Study. 31-46 - Thomas Bauereiß, Dieter Hutter

:
Possibilistic Information Flow Control for Workflow Management Systems. 47-62 - Cristian Prisacariu

:
Actor Network Procedures as Psi-calculi for Security Ceremonies. 63-77 - Aitor Couce Vieira

, Siv Hilde Houmb, David Ríos Insua:
A Graphical Adversarial Risk Analysis Model for Oil and Gas Drilling Cybersecurity. 78-93 - Alexei Botchkarev:

Estimating the Accuracy of the Return on Investment (ROI) Performance Evaluations. - M. R. Avendi, Ha H. Nguyen, Nguyen Quoc-Tuan:

Multiple-Symbol Differential Detection for Distributed Space-Time Coding. - Le Thanh Tan, Long Bao Le:

Channel assignment for throughput maximization in cognitive radio networks. - Clifton Phua, Yuzhang Feng, Junyao Ji, Timothy Soh:

Visual and Predictive Analytics on Singapore News: Experiments on GDELT, Wikipedia, and ^STI. - Le Thanh Tan, Long Bao Le:

General analytical framework for cooperative sensing and access trade-off optimization. - Jonathon Shlens:

A Light Discussion and Derivation of Entropy. - Jonathon Shlens:

Notes on Generalized Linear Models of Neurons. - Jonathon Shlens:

Notes on Kullback-Leibler Divergence and Likelihood. - Duc Phu Chau, François Brémond, Monique Thonnat, Slawomir Bak:

Automatic Tracker Selection w.r.t Object Detection Performance. - Jalal Mahmud, Michelle X. Zhou, Nimrod Megiddo, Jeffrey Nichols, Clemens Drews:

Optimizing The Selection of Strangers To Answer Questions in Social Media. - P. Nagabhushan, Mohammed Javed, B. B. Chaudhuri:

Entropy Computation of Document Images in Run-Length Compressed Domain. - Michael A. Bender, Martin Farach-Colton, Sándor P. Fekete, Jeremy T. Fineman, Seth Gilbert:

Cost-oblivious storage reallocation. - Victor Alvarez, Felix Martin Schuhknecht, Jens Dittrich, Stefan Richter:

Main Memory Adaptive Indexing for Multi-core Systems. - Tony Lindeberg, Anders Friberg:

Idealized computational models for auditory receptive fields. - Shahar Dobzinski, Hu Fu, Robert Kleinberg:

On the Complexity of Computing an Equilibrium in Combinatorial Auctions. - Zeeshan Bhatti, Asadullah Shah, Mustafa Karabasi, Waheed Mahesar:

Expression driven Trignometric based Procedural Animation of Quadrupeds. - Dana Dannélls, Normunds Gruzitis:

Extracting a bilingual semantic grammar from FrameNet-annotated corpora. - Kaibin Huang, Victor O. K. Li:

Renewables Powered Cellular Networks: Energy Field and Network Coverage. - Amit Agarwal, Saloni Jain:

Efficient Optimal Algorithm of Task Scheduling in Cloud Computing Environment. - Joost Broekens, Tim Baarslag:

Optimistic Risk Perception during Learning Explains Risk-taking, Pathological Gambling, Sensation-seeking and Low Fear. - Anas Chaaban, Karlheinz Ochs, Aydin Sezgin:

Simultaneous Diagonalization: On the DoF Region of the K-user MIMO Multi-way Relay Channel. - Evgeny Burnaev, Vladimir Vovk:

Efficiency of conformalized ridge regression. - Uwe Schmidt, Jeremy Jancsary, Sebastian Nowozin, Stefan Roth, Carsten Rother:

Cascades of Regression Tree Fields for Image Restoration. - Bouchra Benammar, Nathalie Thomas, Marie-Laure Boucheret, Charly Poulliat, Mathieu Dervin:

An efficient time domain representation for Single-Carrier Frequency Division Multiple Access. - Tshilidzi Marwala:

Rational Counterfactuals. - Yalei Ji, Cedomir Stefanovic, Carsten Bockelmann, Armin Dekorsy, Petar Popovski:

Characterization of Coded Random Access with Compressive Sensing based Multi-User Detection. - Ali Chelli, Amir Hadjtaieb, Mohamed-Slim Alouini

:
Performance Analysis of Hybrid ARQ with Incremental Redundancy over Amplify-and-Forward Dual-Hop Relay Channels. - Eduardo Lidanski, Giang Nguyen:

Multiple-Tree Push-based Overlay Streaming. - Matteo Gallet, Georg Nawratil, Josef Schicho:

Bond theory for pentapods and hexapods. - Timur Mirzoev, Bruce Benson, David Hillhouse, Mickey Lewis:

Datacenter Changes vs. Employment Rates for Datacenter Managers In the Cloud Computing Era. - Timur Mirzoev, Gerard Gingo, Mike Stawchansky, Tracy White:

Apple IOS Devices for Network Administrators. - Saeed Doostali:

An Efficient Solution for Model Checking Abstract State Machine Using Bogor. - Timur Mirzoev, Ramón Álvarez:

Leveraging VMware vCloud Director Virtual Applications (vApps) for Operational Expense (OpEx) Efficiency. - Timur Mirzoev, Craig Brockman:

SAP HANA and its performance benefits. - Georg Kaes, Jürgen Mangler, Stefanie Rinderle-Ma, Ralph Vigne:

The NNN Formalization: Review and Development of Guideline Specification in the Care Domain. - Timur Mirzoev, Lawton Sack:

Webpage Load Speed: ASP.NET vs. PHP. - Andrew Dobson, George V. Moustakides, Kostas E. Bekris:

Sampling-based Roadmap Planners are Probably Near-Optimal after Finite Computation. - Timur Mirzoev:

Employing Virtualization for Information Technology Education. - Timur Mirzoev, Stacey White:

The Role of Client Isolation in Protecting Wi-Fi Users from ARP Spoofing Attacks. - Timur Mirzoev, Baijian Yang:

Securing Virtualized Datacenters. - Timur Mirzoev:

Synchronous replication of remote storage. - Ernie Cohen:

Coherent Causal Memory. - Nal Kalchbrenner, Edward Grefenstette, Phil Blunsom:

A Convolutional Neural Network for Modelling Sentences. - Gregory E. Newstadt, Dennis L. Wei, Alfred O. Hero III:

Resource-Constrained Adaptive Search and Tracking for Sparse Dynamic Targets. - Chunguo Li:

Sum-rate maximization of OFDMA femtocell networks that incorporates the QoS of macro mobile stations. - Abdoul Aziz Ciss:

Two-sources Randomness Extractors for Elliptic Curves. - Tuan Phung-Duc:

Markovian multiserver queues with staggered setup for data centers. - Kerstin Eder

, Chris Harper, Ute Leonards
:
Towards the Safety of Human-in-the-Loop Robotics: Challenges and Opportunities for Safety Assurance of Robotic Co-Workers. - Feng Cen:

Distributed Joint Source and Channel Coding with Low-Density Parity-Check Codes. - Md. Munjure Mowla, S. M. Mahmud Hasan:

Performance Improvement of PAPR Reduction for OFDM Signal In LTE System. - Monika Kwiatkowska, Lukasz Swierczewski

:
Steganography - coding and intercepting the information from encoded pictures in the absence of any initial information. - Chenwei Wang, Hua Sun, Syed Ali Jafar:

Genie Chains: Exploring Outer Bounds on the Degrees of Freedom of MIMO Interference Networks. - Luan Viet Nguyen

, Taylor T. Johnson:
Virtual Prototyping and Distributed Control for Solar Array with Distributed Multilevel Inverter. - Mehran Alidoost Nia, Aida Ghorbani, Reza Ebrahimi Atani:

A Novel Anonymous Cloud Architecture Design; Providing Secure Online Services and Electronic Payments. - Thomas Bonald, James W. Roberts:

Enhanced Cluster Computing Performance Through Proportional Fairness. - Peter A. van der Helm:

Transparallel mind: Classical computing with quantum power. - Junyan Wang, Sai-Kit Yeung:

A Compact Linear Programming Relaxation for Binary Sub-modular MRF. - Christian Häger, Alexandre Graell i Amat, Fredrik Brännström, Alex Alvarado, Erik Agrell:

Improving Soft FEC Performance for Higher-Order Modulations by Bit Mapper Optimization. - Kangjin Kim, Georgios Fainekos, Sriram Sankaranarayanan:

On the Minimal Revision Problem of Specification Automata. - Md. Munjure Mowla, Md. Yeakub Ali, Abdulla Al Suman:

Better Performance ACF Operation for PAPR Reduction of OFDM Signal. - Sutani Ghosh:

Performance Analysis on The Basis of a Comparative Study Between Multipath Rayleigh Fading And AWGN Channel in The Presence of Various Interference. - Pedro Gonnet:

Efficient and Scalable Algorithms for Smoothed Particle Hydrodynamics on Hybrid Shared/Distributed-Memory Architectures. - Eita Nakamura, Tomohiko Nakamura, Yasuyuki Saito, Nobutaka Ono, Shigeki Sagayama:

Outer-Product Hidden Markov Model and Polyphonic MIDI Score Following. - Eita Nakamura, Nobutaka Ono, Shigeki Sagayama, Kenji Watanabe:

A Stochastic Temporal Model of Polyphonic MIDI Performance with Ornaments. - Richard G. Clegg, Raul Landa, João Taveira Araújo, Eleni Mykoniati, David Griffin, Miguel Rio:

TARDIS: Stably shifting traffic in space and time (extended version). - Yiannis Giannakopoulos, Elias Koutsoupias:

Duality and Optimality of Auctions for Uniform Distributions. - Jonathan D. Gammell

, Siddhartha S. Srinivasa, Timothy D. Barfoot:
Informed RRT*: Optimal Incremental Path Planning Focused through an Admissible Ellipsoidal Heuristic. - Timur Mirzoev:

Disaster Recovery Using Virtual Machines. - Ko-Jen Hsiao, Alex Kulesza, Alfred O. Hero III:

Social Collaborative Retrieval. - Timur Mirzoev:

Wireless Transmission of Video for Biomechanical Analysis. - Timur Mirzoev:

Analysis of Computer Hardware Affecting Video Transmission via IEEE 1394a connection. - Timur Mirzoev:

Low Rate Wireless Personal Area Networks (LR-WPAN 802.15.4 standard). - Vladan M. Jovanovic, Timur Mirzoev:

Teaching Network Storage Technology Assessment Outcomes and Directions. - Timur Mirzoev:

Automation Security. - Xiaojun Feng, Peng Lin, Qian Zhang:

FlexAuc: Serving Dynamic Demands in a Spectrum Trading Market with Flexible Auction. - Mainak Chowdhury, Andrea Goldsmith:

Low-complexity Decoding is Asymptotically Optimal in the SIMO MAC. - Victor G. Kurbatsky, Nikita V. Tomin, Vadim A. Spiryaev, Paul Leahy, Denis N. Sidorov, Alexei V. Zhukov:

Power System Parameters Forecasting Using Hilbert-Huang Transform and Machine Learning. - Mahyar Shirvanimoghaddam, Yonghui Li, Branka Vucetic:

Multiple Access Analog Fountain Codes. - Manju Kaushik, Rashmi Jain:

Gesture Based Interaction NUI: An Overview. - Minming Ni, Lei Zheng, Fei Tong, Jianping Pan, Lin Cai:

A Geometrical-Based Throughput Bound Analysis for Device-to-Device Communications in Cellular Networks. - Palash Dey, Neeldhara Misra, Y. Narahari:

Detecting Possible Manipulators in Elections. - Kayla Bishop, Hoon Hong:

The Secant-Newton Map is Optimal Among Contracting $n^{th}$ Degree Maps for $n^{th}$ Root Computation. - Matthew C. Valenti, Don J. Torrieri, Salvatore Talarico:

A Direct Approach to Computing Spatially Averaged Outage Probability. - Mohsen Ghaffari, Bernhard Haeupler:

Fast Structuring of Radio Networks for Multi-Message Communications. - Saeedeh Moloudi, Michael Lentmaier, Alexandre Graell i Amat:

Spatially Coupled Turbo Codes. - Ashish Chiplunkar, Sundar Vishwanathan:

Approximating Regular Graphic TSP in near linear time. - Dong Zhao, Huadong Ma, Liang Liu:

Frugal Online Incentive Mechanisms for Crowdsourcing Tasks Truthfully. - Marc Manzano, Faryad Darabi Sahneh, Caterina M. Scoglio, Eusebi Calle, José-Luis Marzo:

Robustness surfaces of complex networks. - Mircea Marin, Gabriel Istrate:

Learning cover context-free grammars from structural data. - Fu-Tai An, Yu-Li Hsueh, Kyeong Soo Kim, Ian M. White, Leonid G. Kazovsky:

A New Dynamic Bandwidth Allocation Protocol with Quality of Service in Ethernet-based Passive Optical Networks. - Kyeong Soo Kim:

On The Evolution of PON-Based FTTH Solutions. - Jiong Guo, Yash Raj Shrestha, Yongjie Yang:

How Credible is the Prediction of a Party-Based Election? - Alfonso de la Fuente Ruiz:

Quantum annealing. - Emanuele Bellini:

Yet another algorithm to compute the nonlinearity of a Boolean function. - Loet Leydesdorff, Félix de Moya-Anegón, Wouter de Nooy:

Aggregated journal-journal citation relations in Scopus and Web-of-Science matched and compared in terms of networks, maps, and interactive overlays. - Vaibhav Jha, Sunny Deol, Mohit Jha, G. K. Sharma:

Energy and Latency Aware Application Mapping Algorithm & Optimization for Homogeneous 3D Network on Chip. - Arnob Ghosh, Saswati Sarkar:

Quality Sensitive Price Competition in Spectrum Oligopoly: Part 1. - Lan V. Truong:

Posterior Matching Scheme for Gaussian Broadcast Channel with Feedback. - Evan Everett, Ashutosh Sabharwal:

A Signal-Space Analysis of Spatial Self-Interference Isolation for Full-Duplex Wireless. - Cédric Richier, Eitan Altman, Rachid El Azouzi, Tania Altman, Georges Linarès, Yonathan Portilla:

Modelling View-count Dynamics in YouTube. - Martin Rajchl, John S. H. Baxter

, Wu Qiu, Ali R. Khan, Aaron Fenster, Terry M. Peters, Jing Yuan:
RANCOR: Non-Linear Image Registration with Total Variation Regularization. - Thijs Laarhoven

:
Asymptotics of Fingerprinting and Group Testing: Tight Bounds from Channel Capacities. - Selma Belhadj Amor, Yossef Steinberg, Michèle A. Wigger:

MIMO MAC-BC Duality with Linear-Feedback Coding Schemes. - Timur Mirzoev:

Reduction of Field Loss by a Video Processing System. - Saeed Javanmardi, Mohammad Shojafar, Shahdad Shariatmadari, Sima S. Ahrabi:

FRTRUST: a fuzzy reputation based model for trust management in semantic P2P grids. - Guilherme Sperb Machado, Fabio Victora Hecht, Martin Waldburger, Burkhard Stiller:

Bypassing Cloud Providers' Data Validation to Store Arbitrary Data. - Aurélien Bellet, Yingyu Liang, Alireza Bagheri Garakani, Maria-Florina Balcan, Fei Sha:

Distributed Frank-Wolfe Algorithm: A Unified Framework for Communication-Efficient Sparse Learning. - Muhammad Nazmul Islam, Ashwin Sampath, Atul Maharshi, Ozge H. Koymen, Narayan B. Mandayam:

Wireless Backhaul Node Placement for Small Cell Networks. - Roozbeh Ebrahimi, Jie Gao, Golnaz Ghasemiesfeh, Grant Schoenebeck:

How Complex Contagions Spread and Spread Quickly. - Lingqing Ai, Xian Wu, Lingxiao Huang, Longbo Huang, Pingzhong Tang, Jian Li:

The Multi-shop Ski Rental Problem. - Duane Wilson, Giuseppe Ateniese:

To Share or Not to Share in Client-Side Encrypted Clouds. - Ditmar Parmeza, Miraldi Fifo:

Transaction Handling in COM, EJB and .NET. - Neil Walton:

Concave Switching in Single and Multihop Networks. - (Withdrawn) Real-time Decolorization using Dominant Colors.

- Robert Singer:

User Centered Development of Agent-based Business Process Models and Notations. - M. Rathna Devi, A. Anju:

Multiprocessor Scheduling of Dependent Tasks to Minimize Makespan and Reliability Cost Using NSGA-II. - Emanuele Bellini, Ilaria Simonetti, Massimiliano Sala:

Nonlinearity of Boolean functions: an algorithmic approach based on multivariate polynomials. - Sumit Kumar Dey, Shubham Anand:

Algorithm For Multi-Hand Finger Counting: An Easy Approach. - Luciano Pandolfi, Andrei Halanay:

Approximate controllability and lack of controllability to zero of the heat equation with memory. - Frank P. Kelly, Peter B. Key, Neil S. Walton:

Incentivized Optimal Advert Assignment via Utility Decomposition. - Fayssal Bendaoud, Marwen Abdennebi, Fedoua Didi:

Survey On Scheduling And Radio Resources Allocation In Lte. - Einollah Pira, Mohammad Reza Zand Miralvand, Fakhteh Soltani:

Verification of confliction and unreachability in rule-based expert systems with model checking. - Ravi Ranjan, G. Sahoo:

A New Clustering Approach for Anomaly Intrusion Detection. - Helger Lipmaa, Vitaly Skachek:

Linear Batch Codes. - Marina I. Maslennikova:

Reset Complexity of Ideal Languages. - Alexander Zeh, San Ling:

Decoding of Quasi-Cyclic Codes up to A New Lower Bound on the Minimum Distance. - Mehran Alidoost Nia, Ali Sajedi, Aryo Jamshidpey:

An Introduction to Digital Signature Schemes. - Peter Burcsi, Gabriele Fici, Zsuzsanna Lipták, Frank Ruskey, Joe Sawada:

Normal, Abby Normal, Prefix Normal. - Thijs Laarhoven

:
Asymptotics of Fingerprinting and Group Testing: Capacity-Achieving Log-Likelihood Decoders. - Hasan Abasi, Nader H. Bshouty:

A Simple Algorithm for Hamiltonicity. - Yiannis Giannakopoulos:

Bounding Optimal Revenue in Multiple-Items Auctions. - Xibo Jin, Fa Zhang, Lin Wang, Songlin Hu, Biyu Zhou, Zhiyong Liu:

A Joint Optimization of Operational Cost and Performance Interference in Cloud Data Centers. - Moran Feldman, Moshe Tennenholtz, Omri Weinstein:

Display Advertising with Information Mediators. - Avishy Y. Carmi, Daniel Moskovich:

Tangle Machines I: Concept. - Avishy Y. Carmi, Daniel Moskovich:

Tangle Machines II: Invariants. - Marco Baldi, Nicola Maturo, Giacomo Ricciutelli, Franco Chiaraluce:

LDPC coded transmissions over the Gaussian broadcast channel with confidential messages. - Md Pavel Mahmud, Alexander Schliep:

TreQ-CG: Clustering Accelerates High-Throughput Sequencing Read Mapping. - Dalwadi Bijal, Suthar Sanket:

Overview of Stemming Algorithms for Indian and Non-Indian Languages. - Bouchra Rahali Mohammed Feham:

Substrate integrated waveguide power divider, circulator and coupler in [10-15] GHz band. - Fekri M. Abduljalil:

A Novel Real-Time Video and Data Capture of Vehicular Accident in Intelligent Transportation Systems. - Saeid Pashazadeh, Saeed Saeedvand:

Modelling of Walking Humanoid Robot With Capability of Floor Detection and Dynamic Balancing Using Colored Petri Net. - Marius Leordeanu, Rahul Sukthankar:

Thoughts on a Recursive Classifier Graph: a Multiclass Network for Deep Object Recognition. - Wittawat Kositwattanarerk, Soon Sheng Ong, Frédérique E. Oggier:

Construction A of Lattices over Number Fields and Block Fading Wiretap Coding. - Xing Wei, Frank Aurzada, Michael P. McGarry, Martin Reisslein:

DyCaPPON: Dynamic Circuit and Packet Passive Optical Network (Extended Version). - Saied Pashazadeh, Elham Abdolrahimi Niyari:

Modeling Enterprise Architecture Using Timed Colored PETRI Net: Single Processor Scheduling. - Thomas Bläsius, Sebastian Lehmann, Ignaz Rutter:

Orthogonal Graph Drawing with Inflexible Edges. - Timotheos Aslanidis, Marios-Evangelos Kogias:

Algorithms for Packet Routing in Switching Networks with Reconfiguration Overhead. - Bo Wang, Anna Goldenberg:

Gradient-based Laplacian Feature Selection. - Oussama Noui, Lemnouar Noui:

A blind robust watermarking scheme based on svd and circulant matrices. - Talal Rahwan, Tomasz P. Michalak, Michael J. Wooldridge:

A Measure of Synergy in Coalitions. - Bernd Klasen:

SocioAware Content Distribution using P2P solutions in Hybrid Networks. - Aleck C. Johnsen, Ming-Yang Kao, Shinnosuke Seki:

Computing Minimum Tile Sets to Self-Assemble Colors Patterns. - Supratik Chakraborty, Daniel J. Fremont

, Kuldeep S. Meel, Sanjit A. Seshia, Moshe Y. Vardi:
Distribution-Aware Sampling and Weighted Model Counting for SAT. - Jonathon Shlens:

A Tutorial on Independent Component Analysis. - David Gunawan, Karno Budiono:

Comparative Analysis On Some Possible Partnership Schemes of Global IP Exchange Providers. - L. Yu, H. Liu, D. Zheng:

On More Bent Functions From Dillon Exponents. - Jean-Gabriel Ganascia, Pierre Glaudes, Andrea Del Lungo

:
Automatic Detection of Reuses and Citations in Literary Texts. - Tianlin Shi, Ming Liang, Xiaolin Hu:

A Reverse Hierarchy Model for Predicting Eye Fixations. - Runxin Wang, Rongke Liu, Yi Hou:

Joint Successive Cancellation Decoding of Polar Codes over Intersymbol Interference Channels. - (Withdrawn) Elevation Contour Analysis and Water body Extraction for Finding Water Scarcity Locations using DEM.

- Sudarshan Mukherjee, Saif Khan Mohammed:

On the Energy-Spectral Efficiency Trade-off of the MRC Receiver in Massive MIMO Systems with Transceiver Power Consumption. - Sohail Abid, Shahab Khan:

Improving Performance of Routing Protocols Using MRP Framework. - Kazuyuki Tanaka, Shun Kataoka, Muneki Yasuda, Yuji Waizumi, Chiou-Ting Hsu:

Bayesian image segmentations by Potts prior and loopy belief propagation. - Gergo Barta:

A Link-based Approach to Entity Resolution in Social Networks. - Huazi Zhang, Yichao Jin, Weiwen Zhang, Yonggang Wen:

Enhancing User Experience for Multi-Screen Social TV Streaming over Wireless Networks. - M. Kumaraswamy, Shaila K, V. Tejaswi, K. R. Venugopal, S. S. Iyengar

, Lalit M. Patnaik:
QoS group based optimal retransmission medium access protocol for wireless sensor networks. - Johan Sebastian Rosenkilde Nielsen, Alexander Zeh:

Multi-Trial Guruswami-Sudan Decoding for Generalised Reed-Solomon Codes. - Alexandre Adrien Chotard, Anne Auger, Nikolaus Hansen:

Markov Chain Analysis of Evolution Strategies on a Linear Constraint Optimization Problem. - Todd J. Bodnar, Victoria C. Barclay, Nilam Ram, Conrad S. Tucker, Marcel Salathé:

On the Ground Validation of Online Diagnosis with Twitter and Medical Records. - Ferdinando Cicalese, Gennaro Cordasco, Luisa Gargano, Martin Milanic, Joseph G. Peters, Ugo Vaccaro:

How to go Viral: Cheaply and Quickly. - Jónathan Heras

, Ekaterina Komendantskaya:
ACL2(ml): Machine-Learning for ACL2. 61-75 - Ángel F. García-Fernández, Mark R. Morelande, Jesús Grajal:

Labelled OSPA metric for fixed and known number of targets. - Martin Monperrus:

Principles of Antifragile Software. - Richa Gupta, Sunny Gupta, Anuradha Singhal:

Importance and Techniques of Information Hiding : A Review. - Marco Baldi, Nicola Maturo, Giacomo Ricciutelli, Franco Chiaraluce:

Practical LDPC coded modulation schemes for the fading broadcast channel with confidential messages. - Christopher Lindberg, Alexandre Graell i Amat, Henk Wymeersch:

Distributed Compressed Sensing for Sensor Networks with Packet Erasures. - Juho Lauri:

Further Hardness Results on Rainbow and Strong Rainbow Connectivity. - Frank Havemann, Birger Larsen:

Bibliometric Indicators of Young Authors in Astrophysics: Can Later Stars be Predicted? - Siyi Wang, Weisi Guo, Mark D. McDonnell:

Distance Distributions for Real Cellular Networks. - Siyi Wang, Weisi Guo, Mark D. McDonnell:

Transmit Pulse Shaping for Molecular Communications. - Siyi Wang, Weisi Guo, Chadi Khirallah, Dejan Vukobratovic, John Thompson:

Interference Allocation Scheduler for Green Multimedia Delivery. - Antoine Amarilli:

The Possibility Problem for Probabilistic XML (Extended Version). - Mark Kaminski, Yavor Nenov, Bernardo Cuenca Grau:

Datalog Rewritability of Disjunctive Datalog Programs and its Applications to Ontology Reasoning. - Mei Leng, Wee-Peng Tay, Tony Q. S. Quek, Hyundong Shin:

Distributed Local Linear Parameter Estimation using Gaussian SPAWN. - Johannes Rauh, Nils Bertschinger, Eckehard Olbrich, Jürgen Jost:

Reconsidering unique information: Towards a multivariate information decomposition. - George K. Atia:

Change Detection with Compressive Measurements. - Harald Kröll, Stefan Zwicky, Reto Odermatt, Lukas Bruderer, Andreas Burg, Qiuting Huang:

A Signal Processor for Gaussian Message Passing. - Gozde Ozcan, Mustafa Cenk Gursoy:

Energy-Efficient Power Adaptation for Cognitive Radio Systems under Imperfect Channel Sensing. - Robert Brijder:

Output Stability and Semilinear Sets in Chemical Reaction Networks and Deciders. - Peter Lofgren, Siddhartha Banerjee, Ashish Goel, C. Seshadhri:

FAST-PPR: Scaling Personalized PageRank Estimation for Large Graphs. - Xiangrong Zeng, Mário A. T. Figueiredo:

Decreasing Weighted Sorted ℓ1 Regularization. - Favio Demarco, Jifeng Xuan, Daniel Le Berre

, Martin Monperrus:
Automatic Repair of Buggy If Conditions and Missing Preconditions with SMT. - Cong Li, Michael Georgiopoulos, Georgios C. Anagnostopoulos:

Pareto-Path Multi-Task Multiple Kernel Learning. - Xu Chen:

Decentralized Computation Offloading Game For Mobile Cloud Computing. - Afonso S. Bandeira, Dustin G. Mixon, Benjamin Recht:

Compressive classification and the rare eclipse problem. - Yongcan Cao:

UAV Circumnavigating an Unknown Target Under a GPS-denied Environment with Range-only Measurements. - Joshua M. Hailpern, Niranjan Damera Venkata, Marina Danilevsky:

Pagination: It's what you say, not how long it takes to say it. - Adam Noel, Karen C. Cheung, Robert Schober:

Bounds on Distance Estimation via Diffusive Molecular Communication. - Konstantin Makarychev, Maxim Sviridenko:

Optimization Problems with Diseconomies of Scale via Decoupling. - Daniel Salmond, Alex J. Grant, Ian Grivell, Terence Chan:

On the rank of random matrices over finite fields. - Borhan Molazem Sanandaji, Pravin Varaiya:

Compressive Origin-Destination Matrix Estimation. - Haisheng Tan, Jiajun Yu, Hongyu Liang, Tiancheng Lou, Francis C. M. Lau:

Optimal Rendezvous Strategies for Different Environments in Cognitive Radio Networks. - Bapi Chatterjee, Nhan Nguyen Dang, Philippas Tsigas:

Efficient Lock-free Binary Search Trees. - Hatim Guermah, Tarik Fissaa, Hatim Hafiddi, Mahmoud Nassar, Abdelaziz Kriouile:

An Ontology Oriented Architecture for Context Aware Services Adaptation. - Mahdi Moeini, Zied Jemaï, Evren Sahin:

An Integer Programming Model for the Dynamic Location and Relocation of Emergency Vehicles: A Case Study. - Mahdi Moeini:

A Continuous Optimization Approach for the Financial Portfolio Selection under Discrete Asset Choice Constraints. - Yehuda Dar, Alfred M. Bruckstein:

Motion-Compensated Coding and Frame-Rate Up-Conversion: Models and Analysis. - Michael J. Wilber, Iljung S. Kwak, Serge J. Belongie

:
Cost-Effective HITs for Relative Similarity Comparisons. - William Yang Wang, Kathryn Mazaitis, Ni Lao, Tom M. Mitchell, William W. Cohen:

Efficient Inference and Learning in a Large Knowledge Base: Reasoning with Extracted Information using a Locally Groundable First-Order Probabilistic Logic. - Andrzej Kisielewicz, Marek Szykula:

Synchronizing Automata with Large Reset Lengths. - Xu Chen, Alfred O. Hero III, Silvio Savarese:

Shrinkage Optimized Directed Information using Pictorial Structures for Action Recognition. - Luiz Cortinhas, Patrick Monteiro, Amir Zahlan, Gabriel Vianna, Marcio Moscoso:

Embed System for Robotic Arm with 3 Degree of Freedom Controller using Computational Vision on Real-Time. - Gianfranco Bilardi, Andrea Pietracaprina, Geppino Pucci, Michele Scquizzato, Francesco Silvestri:

Network-Oblivious Algorithms. - Ilan Adler, Christos H. Papadimitriou, Aviad Rubinstein:

On Simplex Pivoting Rules and Complexity Theory. - Michael Schliephake, Erwin Laure:

Performance Analysis of Irregular Collective Communication with the Crystal Router Algorithm. - Sebastiano Vigna:

A Weighted Correlation Index for Rankings with Ties. - Sebastiano Vigna:

Supremum-Norm Convergence for Step-Asynchronous Successive Overrelaxation on M-matrices. - Hoai An Le Thi, Mahdi Moeini:

Portfolio Selection Under Buy-In Threshold Constraints Using DC Programming and DCA. - Mahdi Moeini, Hoai An Le Thi:

A DC programming approach for constrained two-dimensional non-guillotine cutting problem. - Andrea Ballatore:

Defacing the map: Cartographic vandalism in the digital commons. - Sourangsu Banerji:

Computer Simulation Codes for the Quine-McCluskey Method of Logic Minimization. - Franz G. Fuchs, Jon M. Hjelmervik:

Interactive Isogeometric Volume Visualization with Pixel-Accurate Geometry. - (Withdrawn) Learning Deep Convolutional Features for MRI Based Alzheimer's Disease Classification.

- Lee-Ad Gottlieb, Aryeh Kontorovich:

Near-optimal sample compression for nearest neighbors. - Meizhu Li, Qi Zhang, Xinyang Deng, Yong Deng:

Distance function of D numbers. - Rene Pickhardt, Thomas Gottron, Martin Körner, Paul Georg Wagner, Till Speicher, Steffen Staab:

A Generalized Language Model as the Combination of Skipped n-grams and Modified Kneser-Ney Smoothing. - Amit Daniely, Shai Shalev-Shwartz:

Complexity theoretic limitations on learning DNF's. - Karel De Vogeleer, Gérard Memmi

, Pierre Jouvelot, Fabien Coelho:
Modeling the Temperature Bias of Power Consumption for Nanometer-Scale CPUs in Application Processors. - Abhishek Ray, Siba Mishra, Durga Prasad Mohapatra:

An Approach for Computing Dynamic Slice of Concurrent Aspect-Oriented Programs. - Stephen Alstrup, Haim Kaplan, Mikkel Thorup, Uri Zwick:

Adjacency labeling schemes and induced-universal graphs. - Gang Li, Thakshila Wimalajeewa, Pramod K. Varshney:

Decentralized and Collaborative Subspace Pursuit: A Communication-Efficient Algorithm for Joint Sparsity Pattern Recovery. - Yuval Filmus, Hamed Hatami:

Bounds on the sum of L1 influences. - Hsien-Chih Chang, Sariel Har-Peled, Benjamin Raichel:

From Proximity to Utility: A Voronoi Partition of Pareto Optima. - Diego Fabregat-Traver:

Knowledge-Based Automatic Generation of Linear Algebra Algorithms and Code. - Ruslan Shevchenko:

Annotated imports. - Francesco Renna, Nicola Laurenti, Stefano Tomasin:

Achievable Secrecy Rates over MIMOME Gaussian Channels with GMM Signals in Low-Noise Regime. - E. G. Abramov, A. B. Komissarov, D. A. Kornyakov:

Generalized version of the support vector machine for binary classification problems: supporting hyperplane machine. - Iaakov Exman:

Web Search of New Linearized Medical Drug Leads. - Fei Wu, Yin Sun, Yang Yang, Kannan Srinivasan, Ness B. Shroff:

Constant Delay and Constant Feedback Moving Window Network Coding for Wireless Multicast: Design and Asymptotic Analysis. - (Withdrawn) Pure Nash Equilibrium in Capacitated Selfish Replication (CSR) Game.

- Alan Guo:

Group homomorphisms as error correcting codes. - Yukun Zhong, Zhiwei He, Xianhong Wang, Liao Gang:

New Efficient Method To Solve Longest Overlap Region Problem For Noncoding DNA Sequence. - Liang-Hao Huang, Hui-Ju Hung, Chih-Chung Lin, De-Nian Yang:

Scalable Steiner Tree for Multicast Communications in Software-Defined Networking. - Yukun Zhong, Zhiwei He, Xianhong Wang, Xiongbin Cao:

A Way For Accelerating The DNA Sequence Reconstruction Problem By CUDA. - Sian-Jheng Lin, Wei-Ho Chung, Yunghsiang S. Han:

Fast Ecoding/Decoding Algorithms for Reed-Solomon Erasure Codes. - Xiaolu Lu, Dongxu Li, Xiang Li, Ling Feng:

A 2D based Partition Strategy for Solving Ranking under Team Context (RTP). - Michael LeMay, Carl A. Gunter:

Network-on-Chip Firewall: Countering Defective and Malicious System-on-Chip Hardware. - Philippe Gaborit, Gilles Zémor:

On the hardness of the decoding and the minimum distance problems for rank codes. - Henning Thomsen, Elisabeth de Carvalho, Petar Popovski:

Using Wireless Network Coding to Replace a Wired with Wireless Backhaul. - Mamadou Moustapha Kanté, Vincent Limouzy, Arnaud Mary

, Lhouari Nourine, Takeaki Uno:
Polynomial Delay Algorithm for Listing Minimal Edge Dominating sets in Graphs. - Jun He, Boris Mitavskiy, Yuren Zhou:

A Theoretical Assessment of Solution Quality in Evolutionary Algorithms for the Knapsack Problem. - Stefan Wesemann, Gerhard P. Fettweis:

Distributed Asynchronous Optimization Framework for the MISO Interference Channel. - Jan Olaf Blech, Heinz W. Schmidt:

BeSpaceD: Towards a Tool Framework and Methodology for the Specification and Verification of Spatial Behavior of Distributed Software Component Systems. - Vladimir Kolmogorov, Christoph H. Lampert, Emilie Morvant, Rustem Takhanov:

Proceedings of The 38th Annual Workshop of the Austrian Association for Pattern Recognition (ÖAGM), 2014. - Zhenyao Zhu, Ping Luo, Xiaogang Wang, Xiaoou Tang:

Recover Canonical-View Faces in the Wild with Deep Neural Networks. - Tomasz Jurkiewicz, Kurt Mehlhorn, Patrick K. Nicholson:

Cache-Oblivious VAT-Algorithms. - Nikolay Atanasov, Roberto Tron, Victor M. Preciado, George J. Pappas:

Joint Estimation and Localization in Sensor Networks. - Mathieu Michel, Bruno Quoitin:

Technical Report : ContikiMAC vs X-MAC performance analysis. - Adrian Barbu, Gary Gramajo:

Face Detection Using a 3D Model on Face Keypoints. - Yuansheng Liu, Eric Yong Xie, Ge Cheng, Chengqing Li:

Deciphering a novel image cipher based on mixed transformed Logistic maps. - Tsung-Han Chan, Kui Jia, Shenghua Gao, Jiwen Lu, Zinan Zeng, Yi Ma:

PCANet: A Simple Deep Learning Baseline for Image Classification? - Cosme Adrover, Todd J. Bodnar, Marcel Salathé:

Targeting HIV-related Medication Side Effects and Sentiment Using Twitter Data. - Jaroslav Vondrejc, Jan Zeman, Ivo Marek:

Accurate upper-lower bounds on homogenized matrix by FFT-based Galerkin method. - Christian Schröder de Witt, Vladimir Zamdzhiev

:
The ZX calculus is incomplete for quantum mechanics. 285-292 - Ahmed Douik, Sameh Sorour, Hamidou Tembine, Tareq Y. Al-Naffouri, Mohamed-Slim Alouini:

A Game-Theoretic Framework for Decentralized Cooperative Data Exchange using Network Coding. - Leila Pishdad, Fabrice Labeau:

Approximate MMSE Estimator for Linear Dynamic Systems with Gaussian Mixture Noise. - Alexander Shekhovtsov:

Maximum Persistency in Energy Minimization. - Karthik Raman, Thorsten Joachims:

Methods for Ordinal Peer Grading. - Amir Konigsberg:

Avoiding Undesired Choices Using Intelligent Adaptive Systems. - René van Bevern, Sepp Hartung, André Nichterlein, Manuel Sorge:

Constant-factor approximations for Capacitated Arc Routing without triangle inequality. - Chen He, Z. Jane Wang, Victor C. M. Leung:

Unitary Query for the M x L x N MIMO Backscatter RFID Channel. - Clément Carbonnel, Martin C. Cooper, Emmanuel Hebrard:

On Backdoors To Tractable Constraint Languages. - Ahmed Douik

, Sameh Sorour, Mohamed-Slim Alouini
, Tareq Y. Al-Naffouri
:
Decoding Delay Controlled Reduction of Completion Time in Instantly Decodable Network Coding. - Eduardo A. Canale, Pablo Romero:

Diameter Constrained Reliability: Computational Complexity in terms of the diameter and number of terminals. - Deni Sabic, Damir Strbac, Samir Lemes, Malik Cabaravdic:

Upgrade of A Robot Workstation for Positioning of Measuring Objects on CMM. - Samir Lemes, Damir Strbac, Malik Cabaravdic:

Using industrial robot to manipulate the measured object in CMM. - Samir Lemes:

Information Security Management of Web Portals Based on Joomla CMS. - Yuxiao Dong, Jie Tang, Nitesh V. Chawla, Tiancheng Lou, Yang Yang, Bai Wang:

Inferring social status and rich club effects in enterprise communication networks. - Richard Williams, Lutz Bornmann:

The substantive and practical significance of citation impact differences between institutions: Guidelines for the analysis of percentiles using effect sizes and confidence intervals. - Lutz Bornmann, Caroline S. Wagner, Loet Leydesdorff:

BRICS countries and scientific excellence: A bibliometric analysis of most frequently-cited papers. - Samuel Haney, Ashwin Machanavajjhala, Bolin Ding:

Answering Query Workloads with Optimal Error under Blowfish Privacy. - Tobias Kuhn

, Matjaz Perc, Dirk Helbing:
Inheritance patterns in citation networks reveal scientific memes. - Bogdan Babych, Anthony Hartley:

Meta-evaluation of comparability metrics using parallel corpora. - Puxiao Han, Ruixin Niu, Mengqi Ren:

Distributed Approximate Message Passing for Compressed Sensing. - Anupam Gupta, Kunal Talwar, Udi Wieder:

Changing Bases: Multistage Optimization for Matroids and Matchings. - Sayan Bandyapadhyay, Santanu Bhowmick, Kasturi R. Varadarajan:

Approximation Schemes for Partitioning: Convex Decomposition and Surface Approximation. - David Coleman, Ioan Alexandru Sucan, Sachin Chitta, Nikolaus Correll:

Reducing the Barrier to Entry of Complex Robotic Software: a MoveIt! Case Study. - Changchun Zhang, Robert C. Qiu:

Data Modeling with Large Random Matrices in a Cognitive Radio Network Testbed: Initial Experimental Demonstrations with 70 Nodes. - Hélène Barcelo, Valerio Capraro:

Group size effect on cooperation in social dilemmas. - Amer E. Mouawad, Naomi Nishimura, Vinayak Pathak, Venkatesh Raman:

Shortest reconfiguration paths in the solution space of Boolean formulas. - Obaid Ur Rehman, Ian R. Petersen:

Robust Dynamic State Feedback Guaranteed Cost Control of Nonlinear Systems using Copies of Plant Nonlinearities. - Vladislav Voroninski, Zhiqiang Xu:

A strong restricted isometry property, with an application to phaseless compressed sensing. - Joshua A. Grochow, Toniann Pitassi:

Circuit complexity, proof complexity, and polynomial identity testing. - Wei Chen, Di He, Tie-Yan Liu, Tao Qin, Yixin Tao, Liwei Wang:

Generalized Second Price Auction with Probabilistic Broad Match. - Homa Hosseinmardi, Amir Ghasemianlangroodi, Richard Han, Qin Lv, Shivakant Mishra:

Analyzing Negative User Behavior in a Semi-anonymous Social Network. - Chaochao Lu, Xiaoou Tang:

Surpassing Human-Level Face Verification Performance on LFW with GaussianFace. - Claudio Martella, Dionysios Logothetis, Georgos Siganos:

Spinner: Scalable Graph Partitioning for the Cloud. - Pierre Lescanne:

Boltzmann samplers for random generation of lambda terms. - Chandrajit Pal, Avik Kotal, Asit Samanta, Amlan Chakrabarti, Ranjan Ghosh:

Design space exploration for image processing architectures on FPGA targets. - Hamid Ramezani, Fatemeh Fazel, Milica Stojanovic, Geert Leus:

Collision Tolerant Packet Scheduling for Underwater Acoustic Localization. - Fedor V. Fomin, Mathieu Liedloff, Pedro Montealegre-Barba, Ioan Todinca:

Algorithms parameterized by vertex cover and modular width, through potential maximal cliques. - Yang Qin, Xiaoxiong Zhong, Yuanyuan Yang, Yanlin Li, Li Li:

Joint Channel Assignment and Opportunistic Routing for Maximizing Throughput in Cognitive Radio Networks. - John D. Ramsdell, Daniel J. Dougherty, Joshua D. Guttman, Paul D. Rowe:

A Hybrid Analysis for Security Protocols with State. - Olivier Beaumont, Loris Marchal:

Analysis of Dynamic Scheduling Strategies for Matrix Multiplication on Heterogeneous Platforms. - Anna Bernasconi, Valentina Ciriani, Lorenzo Lago:

On the Error Resilience of Ordered Binary Decision Diagrams. - Catholijn M. Jonker, Joost Broekens, Aske Plaat:

Virtual Reflexes. - Antonin Delpeuch

:
Complexity of Grammar Induction for Quantum Types. 236-248 - Philip Greggory Lee, Ying Wu:

Scalable Matting: A Sub-linear Approach. - Ahmed Douik

, Sameh Sorour, Hamidou Tembine, Mohamed-Slim Alouini
, Tareq Y. Al-Naffouri
:
A Game Theoretic Approach to Minimize the Completion Time of Network Coded Cooperative Data Exchange. - Marco Guerini, Fabio Pianesi, Oliviero Stock:

Is it morally acceptable for a system to lie to persuade me? - Yunpeng Pan, Evangelos A. Theodorou:

Nonparametric Kullback-Leibler Stochastic Control. - György Dósa, Leah Epstein:

Colorful bin packing. - Reza Farrahi Moghaddam, Mohamed Cheriet:

Spiralet Sparse Representation. - Aditi Kalyani, Hemant Kumud, Shashi Pal Singh, Ajai Kumar:

Assessing the Quality of MT Systems for Hindi to English Translation. - Oron Sabag, Haim H. Permuter, Asaf Cohen:

Lossless Coding of Correlated Sources with Actions. - Jin-Yi Cai, Heng Guo, Tyson Williams:

The Complexity of Counting Edge Colorings and a Dichotomy for Some Higher Domain Holant Problems. - Sébastien Labbé, Christophe Reutenauer:

A d-dimensional extension of Christoffel words. - Yehuda Dar, Alfred M. Bruckstein:

Improving Low Bit-Rate Video Coding using Spatio-Temporal Down-Scaling. - Christina Papagiannopoulou, Grigorios Tsoumakas, Ioannis Tsamardinos:

Discovering and Exploiting Entailment Relationships in Multi-Label Learning. - Tamal Ghosh, Tanmoy Chakraborty, Pranab K. Dan:

An effective AHP-based metaheuristic approach to solve supplier selection problem. - Xia Li, Feng Lin, Robert C. Qiu:

Modeling Massive Amount of Experimental Data with Large Random Matrices in a Real-Time UWB-MIMO System. - Akhlaqur Rahman, Sumaira Tasnim:

Ensemble Classifiers and Their Applications: A Review. - Guy Van den Broeck, Adnan Darwiche:

On the Role of Canonicity in Bottom-up Knowledge Compilation. - Liang Gong, Hongyu Zhang, Hyunmin Seo, Sunghun Kim:

Locating Crashing Faults based on Crash Stack Traces. - Yuan Shi, Aurélien Bellet, Fei Sha:

Sparse Compositional Metric Learning. - Nicola Gatti, Marco Rocco, Sofia Ceppi, Enrico H. Gerding:

Mechanism Design for Mobile Geo-Location Advertising. - Vasireddy Srikanth, Pillem Ramesh:

Invisibility System Using Image Processing and Optical Camouflage Technology. - Ouais Alsharif, Philip Bachman, Joelle Pineau:

Lifelong Learning of Discriminative Representations. - Matthew D. Hoffman:

Stochastic Structured Mean-Field Variational Inference. - He Chen, Yonghui Li, João Luiz Rebelatto, Bartolomeu F. Uchôa Filho, Branka Vucetic:

Harvest-Then-Cooperate: Wireless-Powered Cooperative Communications. - Takuro Fukunaga:

Covering problems in edge- and node-weighted graphs. - William W. Hager, Jiajie Zhu:

Projection algorithms for non-convex minimization, with application to sparse principal component analysis. - Richa Gupta, Sunny Gupta, Anuradha Singhal:

Big Data: Overview. - Richa Gupta:

Web Mining using Artificial Ant Colonies: A Survey. - Richa Gupta:

Journey from Data Mining to Web Mining to Big Data. - Richa Gupta:

Information Hiding and Attacks : Review. - Yongchao Liu, Bertil Schmidt:

SWAPHI: Smith-Waterman Protein Database Search on Xeon Phi Coprocessors. - Amin Sakzad, Emanuele Viterbo, Joseph Jean Boutros, Yi Hong:

Phase Precoding for the Compute-and-Forward Protocol. - Mario Berljafa, Daniel Wortmann

, Edoardo Di Napoli:
An Optimized and Scalable Eigensolver for Sequences of Eigenvalue Problems. - (Withdrawn) Multiplicative weights in monotropic games.

- Giulio Colavolpe, Tommaso Foggi:

Time-Frequency Packing for High Capacity Coherent Optical Links. - Ning Chen, Jun Zhu, Jianfei Chen, Bo Zhang:

Dropout Training for Support Vector Machines. - Wolfram Lautenschlaeger:

A Deterministic TCP Bandwidth Sharing Model. - Matthieu Moinard, Isabelle Amonou, Pierre Duhamel, Patrice Brault:

Prediction of Transformed (DCT) Video Coding Residual for Video Compression. - Valérie Berthé, Sébastien Labbé:

Factor Complexity of S-adic sequences generated by the Arnoux-Rauzy-Poincaré Algorithm. - Bosiljka Tadic, Vladimir Gligorijevic, Marcin Skowron, Milovan Suvakov:

The Dynamics of Emotional Chats with Bots: Experiment and Agent-Based Simulations. - László Gyarmati, Nikolaos Laoutaris, Kostas Sdrolias, Pablo Rodriguez, Costas Courcoubetis:

From advertising profits to bandwidth prices-A quantitative methodology for negotiating premium peering. - Nataliia Stulova, José F. Morales, Manuel V. Hermenegildo:

An Approach to Assertion-based Debugging of Higher-Order (C)LP Programs. - Annabell Berger, Steffen Rechner:

Broder's Chain Is Not Rapidly Mixing. - Dmitry N. Kozlov:

Witness structures and immediate snapshot complexes. - Gavin Taylor, Connor Geer, David Piekut:

An Analysis of State-Relevance Weights and Sampling Distributions on L1-Regularized Approximate Linear Programming Approximation Accuracy. - Alan Guo, Madhu Sudan:

List decoding group homomorphisms between supersolvable groups. - Shqiponja Ahmetaj, Diego Calvanese, Magdalena Ortiz, Mantas Simkus:

Managing Change in Graph-structured Data Using Description Logics (long version with appendix). - Xiaochao Qian:

Build a compact cryptocurrency system purely based on PoS. - Mireille Bossy, Jose Espina, Cristian Paris, Antoine Rousseau:

Modeling the wind circulation around mills with a Lagrangian stochastic approach. - Behrouz Minaei-Bidgoli, Maryam Nazaridoust:

Case study: Data Mining of Associate Degree Accepted Candidates by Modular Method. - Christoph Waldhauser, Ronald Hochreiter, Johannes Otepka, Norbert Pfeifer, Sajid Ghuffar, Karolina Korzeniowska, Gerald Wagner:

Automated Classification of Airborne Laser Scanning Point Clouds. - Dong Du:

On Level persistence (Relevant level persistence numbers). - Lingpeng Kong, Noah A. Smith:

An Empirical Comparison of Parsing Methods for Stanford Dependencies. - Will Y. Zou, Xiaoyu Wang, Miao Sun, Yuanqing Lin:

Generic Object Detection With Dense Neural Patterns and Regionlets. - Antoine Bordes, Jason Weston, Nicolas Usunier:

Open Question Answering with Weakly Supervised Embedding Models. - Colleen Marzilli, Julie Delello, Shelly Marmion, Rochell McWhorter, Paul B. Roberts, T. Scott Marzilli:

Faculty Attitudes Towards Integrating Technology and Innovation. - Petra Berenbrink, Ralf Klasing, Adrian Kosowski, Frederik Mallmann-Trenn, Przemyslaw Uznanski:

Be Fair and Be Selfish! Characterizing Deterministic Diffusive Load-Balancing Schemes with Small Discrepancy. - Ather Gattami:

Kalman meets Shannon. - Navodit Misra, Ercan E. Kuruoglu:

Stable Graphical Models. - S. E. S. Bariran, K. S. M. Sahari, B. Yunus:

A novel interactive OBE approach in SCM pedagogy using beer game simulation theory. - Rick Zhang, Marco Pavone:

Control of Robotic Mobility-On-Demand Systems: a Queueing-Theoretical Perspective. - Holger Boche, Brendan Farrell:

Strong Divergence of Reconstruction Procedures for the Paley-Wiener Space $\mathcal{PW}^1_π$ and the Hardy Space $\mathcal{H}^1$. - Jeremy Avigad, Robert Y. Lewis, Cody Roux:

A heuristic prover for real inequalities. - Guoxu Zhou, Andrzej Cichocki, Qibin Zhao, Shengli Xie:

Efficient Nonnegative Tucker Decompositions: Algorithms and Uniqueness. - Teturo Kamae, Dong Han Kim:

A characterization of eventually periodicity. - Aanjhan Ranganathan, Boris Danev, Srdjan Capkun:

Low-power Distance Bounding. - Zohair Abu-Shaban, M. R. Bhavani Shankar, Hani Mehrpouyan, Björn E. Ottersten:

Enhanced List-Based Group-Wise Overloaded Receiver with Application to Satellite Reception. - Zohair Abu-Shaban, Hani Mehrpouyan, Joel Grotz, Björn E. Ottersten:

Overloaded Satellite Receiver Using SIC with Hybrid Beamforming and ML Detection. - Asma Mejri, Ghaya Rekaya-Ben Othman:

Efficient Decoding Algorithms for the Compute-and-Forward Strategy. - Florian Merz, Peter Sanders:

PReaCH: A Fast Lightweight Reachability Index using Pruning and Contraction Hierarchies. - Robert Schwarzenberg, Bernd Freisleben, Christopher Nimsky, Jan Egger:

Cube-Cut: Vertebral Body Segmentation in MRI-Data through Cubic-Shaped Divergences. - Miika Hannula, Juha Kontinen, Sebastian Link:

On Independence Atoms and Keys. - Moran Feldman, Ola Svensson, Rico Zenklusen:

A Simple Order-Oblivious O(log log(rank))-Competitive Algorithm for the Matroid Secretary Problem. - L. Sunil Chandran, Deepak Rajendraprasad, Marek Tesar:

Rainbow Colouring of Split Graphs. - Galina Jirásková, Tomás Masopust:

On Upper and Lower Bounds on the Length of Alternating Towers. - H. Birkan Yilmaz, Akif Cem Heren, Tuna Tugcu, Chan-Byoung Chae:

3-D Channel Characteristics for Molecular Communications with an Absorbing Receiver. - Thi-Van-Anh Nguyen, Arnaud Lallouet:

A Complete Solver for Constraint Games. - Ferdinando Cicalese, Balázs Keszegh, Bernard Lidický, Dömötör Pálvölgyi, Tomás Valla:

On the Tree Search Problem with Non-uniform Costs. - Daniel Lokshtanov, Pranabendu Misra, Fahad Panolan, Saket Saurabh:

Deterministic Truncation of Linear Matroids. - Shahin Kamali

, Alejandro López-Ortiz:
An All-Around Near-Optimal Solution for the Classic Bin Packing Problem. - Minh-Dung Tran, Gergely Ács, Claude Castelluccia:

Retargeting Without Tracking. - Antonio Córdoba, Daniel Aguilar-Hidalgo, María Carmen Lemos:

Collective computation in a network with distributed information. - Hadi Restgou Haghi, Mohammad Reza Kangavari, Behrang QasemiZadeh:

A Novel Approach for Video Temporal Annotation. - Jonatha Anselmi, Bruno Gaujal, Tommaso Nesti:

Control of parallel non-observable queues: asymptotic equivalence and optimality of periodic policies. - Daoyuan Wu, Rocky K. C. Chang:

Analyzing Android Browser Apps for file: // Vulnerabilities. - Edith Hemaspaandra, Lane A. Hemaspaandra, Henning Schnoor:

A Control Dichotomy for Pure Scoring Rules. - Behrang QasemiZadeh, Saeed Rahimi, Behrooz Mahmoodi Bakhtiari:

The First Parallel Multilingual Corpus of Persian: Toward a Persian BLARK. - Anand Louis, Yury Makarychev:

Approximation Algorithms for Hypergraph Small Set Expansion and Small Set Vertex Expansion. - Mohsen Raeesi, Mohammad Amin Morid, Mehdi Shajari:

Trust Evaluation using an Improved Context Similarity Measurement. 


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID