


default search action
CoRR, May 2014
- Moritz Kassner, William Patera, Andreas Bulling:
Pupil: An Open Source Platform for Pervasive Eye Tracking and Mobile Gaze-based Interaction. - Namyoon Lee, Robert W. Heath Jr.:
Space-Time Physical-Layer Network Coding. - Namyoon Lee, Ravi Tandon, Robert W. Heath Jr.:
Distributed Space-Time Interference Alignment. - Matthijs Vákár:
Syntax and Semantics of Linear Dependent Types. - Aaron Hunter:
Belief Revision and Trust. - T. El-Shishtawy:
A Mobile Management System for Reforming Subsidies Distribution in Developing Countries. - Zubair Nabi, Atif Alvi:
Clome: The Practical Implications of a Cloud-based Smart Home. - Paul F. Tupper:
Exemplar Dynamics Models of the Stability of Phonological Categories. - Giuseppe De Giacomo, Riccardo De Masellis, Marco Grasso, Fabrizio Maria Maggi, Marco Montali:
LTLf and LDLf Monitoring: A Technical Report. - Arseny M. Shur, Abuzer Yakaryilmaz:
Quantum, Stochastic, and Pseudo Stochastic Languages with Few States. - Haoyu Song, Jun Gong, Hongfei Chen, Justin Dustzadeh:
Unified POF Programming for Diversified SDN Data Plane. - Bertrand Wechsler, Dan Eilat, Nicolas Limal:
Information Flow Decomposition in Feedback Systems: Linear Time-Invariant Systems with Gaussian Channels. - Mahmoud Khademi, Louis-Philippe Morency:
Relative Facial Action Unit Detection. - Hoda Daou, Fabrice Labeau:
Medically Relevant Criteria used in EEG Compression for Improved Post-Compression Seizure Detection. - Hovhannes Tananyan:
Domination games played on line graphs of complete multipartite graphs. - C. Venkatesh, D. Nagaraju, T. Sunil Kumar Reddy:
Binary Protector: Intrusion Detection in Multitier Web Applications. - Antonios Michaloliakos, Ryan Rogalin, Yonglong Zhang, Konstantinos Psounis, Giuseppe Caire:
Performance Modeling of Next-Generation Wireless Networks. - Rajesh Hemant Chitnis, Graham Cormode, Mohammad Taghi Hajiaghayi, Morteza Monemizadeh:
Parameterized Streaming Algorithms for Vertex Cover. - Ms. Rajni, Ms. Reena:
Review of MANETS Using Distributed Public-key Cryptography. - Manju Kaushik, Rashmi Jain:
Natural User Interfaces: Trend in Virtual Interaction. - Christian A. Naesseth, Fredrik Lindsten, Thomas B. Schön:
Capacity estimation of two-dimensional channels using Sequential Monte Carlo. - Noémi Gaskó, Rodica Ioana Lung, D. Dumitrescu:
Computing Strong Nash Equilibria for Multiplayer Games. - Vaibhav Jha, Mohit Jha, G. K. Sharma:
Estimation of Optimized Energy and Latency Constraints for Task Allocation in 3d Network on Chip. - Phil Maguire, Philippe Moser, Rebecca Maguire, Virgil Griffith:
Is Consciousness Computable? Quantifying Integrated Information Using Algorithmic Information Theory. - Binbin Lin, Ji Yang, Xiaofei He, Jieping Ye:
Geodesic Distance Function Learning via Heat Flow on Vector Fields. - Kais Dukes:
Contextual Semantic Parsing using Crowdsourced Spatial Descriptions. - Ryutaroh Matsumoto:
Coding Theoretic Construction of Quantum Ramp Secret Sharing. - Anthony Bonato, David F. Gleich, Myunghwan Kim, Dieter Mitsche, Pawel Pralat, Amanda Tian, Stephen J. Young:
Dimensionality of social networks using motifs and eigenvalues. - Pierre de Buyl, Nelle Varoquaux:
Proceedings of the 6th European Conference on Python in Science (EuroSciPy 2013). - Matthieu Barjon, Arnaud Casteigts, Serge Chaumette, Colette Johnen, Yessin M. Neggaz:
Un algorithme de test pour la connexité temporelle des graphes dynamiques de faible densité. - Karim M. Mohamed, Mohamed A. Ismail, Nagia M. Ghanem:
VSCAN: An Enhanced Video Summarization using Density-based Spatial Clustering. - Amihood Amir, Timothy M. Chan, Moshe Lewenstein, Noa Lewenstein:
On Hardness of Jumbled Indexing. - Klesti Hoxha, Alda Kika, Eriglen Gani, Silvana Greca
:
Towards a Modular Recommender System for Research Papers written in Albanian. - Navya Chodisetti:
Analysis of Digital Knapsack Based Sealed Bid Auction. - Alireza Vahid, Mohammad Ali Maddah-Ali, Amir Salman Avestimehr:
Binary Fading Interference Channel with No CSIT. - Florian Kerschbaum, Martin Beck, Dagmar Schönfeld:
Inference Control for Privacy-Preserving Genome Matching. - Sreejith T. Veetil, Kiran Kuchi, Radha Krishna Ganti:
Performance of PZF and MMSE Receivers in Cellular Networks with Multi-User Spatial Multiplexing. - Greg Castañón, Mohamed A. Elgharib, Venkatesh Saligrama, Pierre-Marc Jodoin:
Retrieval in Long Surveillance Videos using User Described Motion and Object Attributes. - Joe-Mei Feng, Felix Krahmer:
An RIP-based approach to $ΣΔ$ quantization for compressed sensing. - Federica Panella:
Approximate Query Answering in Inconsistent Databases. - James Whitacre, Sven Schellenberg, Antony Iorio:
Coal Blending: Business Value, Analysis, and Optimization. - Cláudia Nalon, João Marcos, Clare Dixon:
Clausal Resolution for Modal Logics of Confluence. - Alireza Goudarzi, Matthew R. Lakin, Darko Stefanovic:
Reservoir Computing Approach to Robust Computation using Unreliable Nanoscale Networks. - Tsung-Yi Lin, Michael Maire, Serge J. Belongie, Lubomir D. Bourdev, Ross B. Girshick, James Hays, Pietro Perona, Deva Ramanan, Piotr Dollár, C. Lawrence Zitnick:
Microsoft COCO: Common Objects in Context. - Anirban Bhattacharyya, Andrey Mokhov, Ken Pierce, Manuel Mazzara:
On Formalisms for Dynamic Reconfiguration of Dependable Systems. - Danko Adrovic, Jan Verschelde:
Computing all Affine Solution Sets of Binomial Systems. - Leonardo Aniello, Andrea Bondavalli, Andrea Ceccarelli, Claudio Ciccotelli, Marcello Cinque, Flavio Frattini, Antonella Guzzo, Antonio Pecchia, Andrea Pugliese, Leonardo Querzoni, Stefano Russo:
Big Data in Critical Infrastructures Security Monitoring: Challenges and Opportunities. - Giuseppe Cicotti, Luigi Coppolino, Salvatore D'Antonio, Luigi Romano:
Big Data Analytics for QoS Prediction Through Probabilistic Model Checking. - Yixin Cao, Luciano N. Grippo, Martín Darío Safe:
Forbidden Induced Subgraphs of Normal Helly Circular-Arc Graphs: Characterization and Detection. - Uzay Çetin, Haluk O. Bingol:
Iterated Prisoners Dilemma with limited attention. - Jody Sankey, Matthew K. Wright:
Dovetail: Stronger Anonymity in Next-Generation Internet Routing. - Umang Vipul:
Map-Reduce Parallelization of Motif Discovery. - Noémi Gaskó, Mihai Suciu, Rodica Ioana Lung, D. Dumitrescu:
Characterization and Detection of epsilon-Berge Zhukovskii Equilibria. - Meik Dörpinghaus, Günther Koliander, Giuseppe Durisi, Erwin Riegler, Heinrich Meyr:
Oversampling Increases the Pre-Log of Noncoherent Fading Channels. - Michael Huth, Jim Huan-Pu Kuo, Nir Piterman:
Fatal Attractors in Parity Games: Building Blocks for Partial Solvers. - Mansoor Ebrahim, Shujaat Khan, UmerBin Khalid:
Symmetric Algorithm Survey: A Comparative Analysis. - Mansoor Ebrahim, Shujaat Khan, Syed Sheraz Ul Hasan Mohani:
Peer-to-Peer Network Simulators: an Analytical Review. - Sylwia Polberg:
Extension-based Semantics of Abstract Dialectical Frameworks. - Fábio M. Bayer, Renato J. Cintra, Arjuna Madanayake
, Uma Sadhvi Potluri:
Multiplierless Approximate 4-point DCT VLSI Architectures for Transform Block Coding. - Thomas Janson, Christian Schindelhauer:
Ad-Hoc Network Unicast in Time O(log log n) using Beamforming. - Sachin Lakra, T. V. Prasad, G. Ramakrishna:
Representation of a Sentence using a Polar Fuzzy Neutrosophic Semantic Net. - Rodica Bozianu, Catalin Dima, Emmanuel Filiot:
Safraless Synthesis for Epistemic Temporal Specifications. - Shao-Meng Qin, Hai-Jun Zhou:
Solving the undirected feedback vertex set problem by local search. - Fabrizio Grandoni, Tomasz Kociumaka, Michal Wlodarczyk:
An LP-Rounding $2\sqrt{2}$ Approximation for Restricted Maximum Acyclic Subgraph. - Ambedkar Dukkipati, Nithish Pai, Maria Francis, Abhishek Dubey:
Macaulay-Buchberger Basis Theorem for Residue Class Rings with Torsion and Border Bases over Rings. - Mehryar Mohri, Michael D. Riley:
On the Disambiguation of Weighted Automata. - Mathias Niepert, Pedro M. Domingos:
Exchangeable Variable Models. - Ines Marusic, James Worrell:
Complexity of Equivalence and Learning for Multiplicity Tree Automata. - Sina Lashgari, Amir Salman Avestimehr:
Blind Wiretap Channel with Delayed CSIT. - Aviad Rubinstein:
Computational Complexity of Approximate Nash Equilibrium in Large Games. - Moya Chen, Doris Xin, Damien Woods:
Parallel computation using active self-assembly. - Nicolas T. Courtois:
On The Longest Chain Rule and Programmed Self-Destruction of Crypto Currencies. - Radoslaw Michalski, Tomasz Kajdanowicz, Piotr Bródka, Przemyslaw Kazienko:
Seed Selection for Spread of Influence in Social Networks: Temporal vs. Static Approach. - Edward Hermann Haeusler:
How many times do we need and assumption ? - Sergei Gepshtein, Ivan Tyukin:
Optimal measurement of visual motion across spatial and temporal scales. - Antti Puurula, Jesse Read, Albert Bifet:
Kaggle LSHTC4 Winning Solution. - Omar S. Soliman, Eman AboElHamd:
Classification of Diabetes Mellitus using Modified Particle Swarm Optimization and Least Squares Support Vector Machine. - Jun Pang, Yang Liu:
Proceedings Third International Workshop on Engineering Safety and Security Systems, ESSS 2014, Singapore, Singapore, 13 May 2014. EPTCS 150, 2014 [contents] - Vladimir V. Rybakov:
A Note on Parameterised Knowledge Operations in Temporal Logic. - Vidit Sharma, Ashish Garg:
Numerical Investigation of Effects of Compound Angle and Length to Diameter Ratio on Adiabatic Film Cooling Effectiveness. - Ryoma Sin'ya, Kiminori Matsuzaki, Masataka Sassa:
Simultaneous Finite Automata: An Efficient Data-Parallel Model for Regular Expression Matching. - Lucas Antiqueira, Liang Zhao:
Spatial Neural Networks and their Functional Samples: Similarities and Differences. - Prabhjot Kaur:
Web Content Classification: A Survey. - (Withdrawn) On Lipschitz Continuity and Smoothness of Loss Functions in Learning to Rank.
- Sougata Chaudhuri, Ambuj Tewari:
Perceptron-like Algorithms and Generalization Bounds for Learning to Rank. - (Withdrawn) On the Construction of Maximum-Quality Aggregation Trees in Deadline-Constrained WSNs.
- Xuehan Xiong, Fernando De la Torre:
Supervised Descent Method for Solving Nonlinear Least Squares Problems in Computer Vision. - Aibek Makazhanov, Denilson Barbosa, Grzegorz Kondrak:
Extracting Family Relationship Networks from Novels. - James Brofos, Ajay Kannan, Rui Shu:
Automated Attribution and Intertextual Analysis. - Bin Li, Ruogu Li, Atilla Eryilmaz:
Throughput-Optimal Scheduling Design with Regular Service Guarantees in Wireless Networks. - Parosh Aziz Abdulla, Mohamed Faouzi Atig, Piotr Hofman, Richard Mayr, K. Narayan Kumar, Patrick Totzke:
Infinite-State Energy Games. - Vimalkumar Jeyakumar, Abdul Kabbani, Jeffrey C. Mogul, Amin Vahdat:
Flexible Network Bandwidth and Latency Provisioning in the Datacenter. - Mario Mastriani:
Rule of Three for Superresolution of Still Images with Applications to Compression and Denoising. - Michael F. Nowlan, Jose M. Faleiro, Bryan Ford:
Crux: Locality-Preserving Distributed Systems. - Xiaojun Wan:
x-index: a fantastic new indicator for quantifying a scientist's scientific impact. - Djamal Ziani:
Feature Selection On Boolean Symbolic Objects. - Djamal Ziani:
Configuration in ERP SaaS Multi-Tenancy. - Jin He, Mianxiong Dong, Kaoru Ota, Minyu Fan, Guangwei Wang:
NetSecCC: A Scalable and Fault-tolerant Architecture without Outsourcing Cloud Network Security. - Rajet Krishnan, Mohammad Reza Khanzadi, N. Krishnan, Alexandre Graell i Amat, Thomas Eriksson, Nicolò Mazzali, Giulio Colavolpe:
On the Impact of Oscillator Phase Noise on the Uplink Performance in a Massive MIMO-OFDM System. - Mohammadreza Malek-Mohammadi, Magnus Jansson, Arash Owrang, Ali Koochakzadeh, Massoud Babaie-Zadeh:
DOA Estimation in Partially Correlated Noise Using Low-Rank/Sparse Matrix Decomposition. - Manaal Faruqui:
"Translation can't change a name": Using Multilingual Data for Named Entity Recognition. - Bo Cheng, Ling Cheng:
Single machine slack due-window assignment and scheduling of linear time-dependent deteriorating jobs and a deteriorating maintenance activity. - Kangqi Liu, Meixia Tao:
Generalized Signal Alignment: On the Achievable DoF for Multi-User MIMO Two-Way Relay Channels. - Matthias Nickles, Alessandra Mileo:
Probabilistic Inductive Logic Programming Based on Answer Set Programming. - Hua Sun, Sundar R. Krishnamurthy, Syed Ali Jafar:
Rank Matching for Multihop Multiflow. - Euiwoong Lee:
Hardness of Graph Pricing through Generalized Max-Dicut. - Seyed M. Mirtaheri, Mustafa Emre Dinçtürk, Salman Hooshmand, Gregor von Bochmann, Guy-Vincent Jourdan, Iosif-Viorel Onut:
A Brief History of Web Crawlers. - Paul Accisano, Alper Üngör:
Finding a Curve in a Point Set. - Yonghong Yu, Can Wang, Yang Gao:
Attributes Coupling based Item Enhanced Matrix Factorization Technique for Recommender Systems. - Peng He, Bing Li, Deguang Zhang, Yutao Ma:
Simplification of Training Data for Cross-Project Defect Prediction. - Jingbo Liu, Emmanuel Abbe:
Polynomial complexity of polar codes for non-binary alphabets, key agreement and Slepian-Wolf coding. - John C. Duchi, Michael I. Jordan, Martin J. Wainwright, Yuchen Zhang:
Information-theoretic lower bounds for distributed statistical estimation with communication constraints. - Vishal Anand, Ramani S:
Fault Localization in a Software Project using Back-Tracking Principles of Matrix Dependency. - Tarushi Sharma, AmanPreet Kaur:
Analysis of Email Fraud detection using WEKA Tool. - Martin Skutella:
A note on the ring loading problem. - Hasan Abasi, Nader H. Bshouty, Hanna Mazzawi:
On Exact Learning Monotone DNF from Membership Queries. - Valmi Dufour-Lussier, Alice Hermann, Florence Le Ber, Jean Lieber:
Belief revision in the propositional closure of a qualitative algebra (extended version). - Hannes Strass:
On the Relative Expressiveness of Argumentation Frameworks, Normal Logic Programs and Abstract Dialectical Frameworks. - Xianrui Li, D. B. Pei, Q. Liu, Rui Shen:
Design of a capacitor-less low-dropout voltage regulator. - Jianmin Ji, Hannes Strass:
Implementing Default and Autoepistemic Logics via the Logic of GK. - P. Sakthivel, P. Krishna Sankar:
Multi-Path Routing and Wavelength Assignment (RWA) Algorithm for WDM Based Optical Networks. - Sascha Kurz:
Ready for the design of voting rules? - Serguei Kaniovski, Sascha Kurz:
The average representation - a cornucopia of power indices? - Alexander Zimin, Rasmus Ibsen-Jensen, Krishnendu Chatterjee:
Generalized Risk-Aversion in Stochastic Multi-Armed Bandits. - Krishnendu Chatterjee, Martin Chmelik, Przemyslaw Daca:
CEGAR for Qualitative Analysis of Probabilistic Systems. - Marcin Wrochna:
Reconfiguration in bounded bandwidth and treedepth. - Sergey Goncharov, Lutz Schröder, Christoph Rauch:
(Co-)Algebraic Foundations for Effect Handling and Iteration. - Florian Kammueller:
Confinement for Active Objects. - Zhana Bao:
Finding Inner Outliers in High Dimensional Space. - Zhana Bao:
Robust Subspace Outlier Detection in High Dimensional Space. - Marco Maratea, Luca Pulina, Francesco Ricca:
The Multi-engine ASP Solver ME-ASP: Progress Report. - Simon Kramer:
A Galois-Connection between Cattell's and Szondi's Personality Profiles. - Grzegorz Orynczak, Marcin Jakubek, Karol Wawrzyniak, Michal Klos:
Market Coupling as the Universal Algorithm to Assess Zonal Divisions. - Yanina Shkel, Vincent Y. F. Tan, Stark C. Draper:
Unequal Message Protection: Asymptotic and Non-Asymptotic Tradeoffs. - John S. H. Baxter
, Martin Rajchl, Jing Yuan, Terry M. Peters:
A Continuous Max-Flow Approach to Multi-Labeling Problems under Arbitrary Region Regularization. - Xu Chen, Dongning Guo:
Many-Access Channels: The Gaussian Case with Random User Activities. - Talha Cihad Gülcü, Alexander Barg:
Interactive Function Computation via Polar Coding.