


default search action
CoRR, October 2014
- Fabien Gouyon, Bob L. Sturm, João Lobato Oliveira, Nuno Hespanhol, Thibault Langlois:
On Evaluation Validity in Music Autotagging. - Thibaud Antignac, Daniel Le Métayer:
Privacy by Design: From Technologies to Architectures (Position Paper). - Bartlomiej Blaszczyszyn, Mohamed Kadhem Karray:
What frequency bandwidth to run cellular network in a given country? - a downlink dimensioning problem. - Ramoni O. Adeogun:
A Robust MUSIC Based Scheme for Interference Location in Satellite Systems with Multibeam Antennas. - Jie Fu, Ufuk Topcu:
Integrating active sensing into reactive synthesis with temporal logic constraints under partial observations. - Yao Sun, Dingkang Wang, Zhenyu Huang, Dongdai Lin:
A Monomial-Oriented GVW for Computing Gröbner Bases. - Jingchu Liu, Tao Zhao, Sheng Zhou, Yu Cheng, Zhisheng Niu:
CONCERT: A Cloud-Based Architecture for Next-generation Cellular Systems. - Atul Kanaujia:
Coupling Top-down and Bottom-up Methods for 3D Human Pose and Shape Estimation from Monocular Image Sequences. - Guillaume Desjardins, Heng Luo, Aaron C. Courville, Yoshua Bengio:
Deep Tempering. - Zheng Chang, Jie Gong, Tapani Ristaniemi, Zhisheng Niu:
Energy Efficient Resource Allocation and User Scheduling for Collaborative Mobile Clouds with Hybrid Receivers. - Meital Ben Sinai, Nimrod Partush, Shir Yadid, Eran Yahav:
Exploiting Social Navigation. - Özgür Yilmaz:
Reservoir Computing using Cellular Automata. - David Lillis
, Rem W. Collier, Mauro Dragone, Gregory M. P. O'Hare:
An Agent-Based Approach to Component Management. - Iqbal Hussain, Ming Xiao, Lars K. Rasmussen:
Rateless Codes for the Multi-Way Relay Channel. - Eva Darulova, Viktor Kuncak:
On Numerical Error Propagation with Sensitivity. - Michael Shekelyan, Gregor Jossé, Matthias Schubert:
ParetoPrep: Fast computation of Path Skylines Queries. - Mateusz Malinowski, Mario Fritz:
A Multi-World Approach to Question Answering about Real-World Scenes based on Uncertain Input. - Iqbal Hussain, Ming Xiao, Lars K. Rasmussen:
Buffer-Based Distributed LT Codes. - Juheon Lee, Xiaohao Cai, Carola-Bibiane Schönlieb, David Coomes:
Non-parametric Image Registration of Airborne LiDAR, Hyperspectral and Photographic Imagery of Forests. - Dame Diongue, Ousmane Thiare:
An Energy Efficient Self-healing Mechanism for Long Life Wireless Sensor Networks. - Aleksandra Pizurica:
Pattern Encoding on the Poincare Sphere. - Benjamin Fish, Jeremy Kun, Ádám Dániel Lelkes, Lev Reyzin, György Turán:
On the Computational Complexity of MapReduce. - William B. March, Bo Xiao, George Biros:
ASKIT: Approximate Skeletonization Kernel-Independent Treecode in High Dimensions. - Chao Li, Michael Hay, Gerome Miklau, Yue Wang:
A Data- and Workload-Aware Algorithm for Range Queries Under Differential Privacy. - Julia Chuzhoy:
Improved Bounds for the Flat Wall Theorem. - Christian Häger, Alexandre Graell i Amat, Fredrik Brännström, Alex Alvarado, Erik Agrell:
Terminated and Tailbiting Spatially Coupled Codes with Optimized Bit Mappings for Spectrally Efficient Fiber-Optical Systems. - Tom De Smedt:
Modeling Creativity: Case Studies in Python. - Dirk Roorda, Gino Kalkman, Martijn Naaijer, Andreas van Cranenburgh:
LAF-Fabric: a data analysis tool for Linguistic Annotation Framework with an application to the Hebrew Bible. - Virgilio P. Sison:
Bases of the Galois Ring $GR(p^r, m)$ over the Integer Ring $Z_{p^r}$. - Yanchuan Sim
:
A Morphological Analyzer for Japanese Nouns, Verbs and Adjectives. - Ilya Sergey, Aleksandar Nanevski, Anindya Banerjee:
Specifying and Verifying Concurrent Algorithms with Histories and Subjectivity. - Tomás Kaiser, Maria Saumell, Nico Van Cleemput:
10-Gabriel graphs are Hamiltonian. - Alexey Milovanov:
The properties of absolutely non-stochastic strings. - Subhadip Mukherjee, Rupam Basu, Chandra Sekhar Seelamantula:
A Robust Dictionary Learning Algorithm for Image Denoising. - Brian Lee Yung Rowe:
Using social network graph analysis for interest detection. - Qing Wang, Domenico Giustiniano, Daniele Puccinelli:
An Open-Source Research Platform for Embedded Visible Light Networking. - Lionel Eyraud-Dubois, Loris Marchal, Oliver Sinnen, Frédéric Vivien:
Parallel scheduling of task trees with limited memory. - Mahmadou Issoufou Tiado, Riadh Dhaou, André-Luc Beylot:
Cross-Layer Extended Persistent Timeout Policy for SCTP and DSDV. - Mahmadou Issoufou Tiado, Riadh Dhaou, André-Luc Beylot:
Cross layer Interaction Models for SCTP and OLSR. - Roman V. Yampolskiy:
The Universe of Minds. - Jagdish Lal Raheja, B. Ajay, Ankit Chaudhary:
Real Time Fabric Defect Detection System on an Embedded DSP Platform. - Aamir Shafi, Aleem Akhtar, Ansar Javed, Bryan Carpenter:
Teaching Parallel Programming Using Java. - Rafael M. Frongillo, Yiling Chen, Ian A. Kash:
Elicitation for Aggregation. - Michael Heindlmaier, Navid Reyhanian, Shirin Saeedi Bidokhti:
Capacity Regions of Two-Receiver Broadcast Packet Erasure Channels with Feedback and Memory. - M. Andrecut:
A String-Based Public Key Cryptosystem. - Viktoriia Sharmanska
, Novi Quadrianto, Christoph H. Lampert:
Learning to Transfer Privileged Information. - Markus Wittmann, Thomas Zeiser, Georg Hager, Gerhard Wellein:
Modeling and analyzing performance for highly optimized propagation steps of the lattice Boltzmann method on sparse lattices. - Rafael M. Frongillo, Mark D. Reid:
Risk Dynamics in Trade Networks. - Nicolò Michelusi, Urbashi Mitra:
Cross-layer design of distributed sensing-estimation with quality feedback, Part I: Optimal schemes. - Nicolò Michelusi, Urbashi Mitra:
Cross-layer design of distributed sensing-estimation with quality feedback, Part II: Myopic schemes. - Alekh Agarwal, Alina Beygelzimer, Daniel J. Hsu, John Langford, Matus Telgarsky:
Scalable Nonlinear Learning with Adaptive Polynomial Expansions. - Masahito Hayashi, Himanshu Tyagi, Shun Watanabe:
Strong Converse for a Degraded Wiretap Channel via Active Hypothesis Testing. - Jiaqi Gu, Rodrigo C. de Lamare:
Joint SIC and Relay Selection for Cooperative DS-CDMA Systems. - Arash Golibagh Mahyari, Selin Aviyente:
Identification of Dynamic functional brain network states Through Tensor Decomposition. - Graeme N. Wilson, Alejandro Ramirez-Serrano, Qiao Sun:
Vehicle Parameter Independent Gain Matrix Selection for a Quadrotor using State-Space Controller Design Methods. - Jesper Larsson Träff, Martin Wimmer:
An improved, easily computable combinatorial lower bound for weighted graph bipartitioning. - Zakria Hussain, Arto Klami, Jussi Kujala, Alex Po Leung, Kitsuchart Pasupa
, Peter Auer, Samuel Kaski, Jorma Laaksonen, John Shawe-Taylor:
PinView: Implicit Feedback in Content-Based Image Retrieval. - Dan Martinec, Ivo Herman
, Michael Sebek:
The transfer-function approach to travelling waves in path graphs. - Nibaran Das, Sandip Pramanik, Subhadip Basu, Punam Kumar Saha, Ram Sarkar, Mahantapas Kundu, Mita Nasipuri:
Recognition of Handwritten Bangla Basic Characters and Digits using Convex Hull based Feature Set. - Ludovic Denoyer, Patrick Gallinari:
Deep Sequential Neural Network. - Farshid Sahba, Maryam Nazaridoust:
Museum Automation with RFID. - Fredrick Romanus Ishengoma:
Online Social Networks and Terrorism 2.0 in Developing Countries. - Adam B. Mtaho, Fredrick Romanus Ishengoma:
Factors Affecting QoS in Tanzania Cellular Networks. - Fredrick Romanus Ishengoma:
Authentication System for Smart Homes Based on ARM7TDMI-S and IRIS-Fingerprint Recognition Technologies. - Ahmad Biniaz, Anil Maheshwari, Michiel H. M. Smid:
Matching in Gabriel Graphs. - Richard John Preen, Larry Bull:
Design Mining Interacting Wind Turbines: Surrogate-Assisted Coevolution of Rapid Prototyped VAWT. - Vincent Cohen-Addad, Claire Mathieu:
The Unreasonable Success of Local Search: Geometric Optimization. - Jacopo Pantaleoni:
A massively parallel algorithm for constructing the BWT of large string sets. - Diego Fabregat-Traver, Paolo Bientinesi:
Automatic Generation of Loop-Invariants for Matrix Operations. - Diego Fabregat-Traver, Paolo Bientinesi:
Knowledge-Based Automatic Generation of Partitioned Matrix Expressions. - Stefanie Haustein, Vincent Larivière, Mike Thelwall
, Didier Amyot, Isabella Peters:
Tweets vs. Mendeley readers: How do these two social media metrics differ? - Konstantin Avrachenkov, Nelly Litvak, Liudmila Ostroumova Prokhorenkova, Eugenia Suyargulova:
Quick Detection of High-degree Entities in Large Directed Networks. - A. Mani:
Algebraic Semantics of Proto-Transitive Rough Sets. - Thomas Nickson, Igor Potapov:
Broadcasting Automata and Patterns on Z^2. - Hugh L. Kennedy:
Multidimensional Digital Smoothing Filters for Target Detection. - Mateus de Oliveira Oliveira:
An Algorithmic Metatheorem for Directed Treewidth. - Ghislain Fourny:
Cell Stores. - Zhe Liu, Ingmar Weber:
Is Twitter a Public Sphere for Online Conflicts? A Cross-Ideological and Cross-Hierarchical Look. - Sithan Kanna, Dahir H. Dini, Yili Xia, Ron Shu-Yuen Hui, Danilo P. Mandic:
Distributed Widely Linear Frequency Estimation in Unbalanced Three Phase Power Systems. - Karel De Vogeleer, Gérard Memmi
, Pierre Jouvelot, Fabien Coelho:
The Impact of Surface Size on the Radiative Thermal Behavior of Embedded Systems. - Hugo Jair Escalante, Mauricio A. García-Limón, Alicia Morales-Reyes, Mario Graff, Manuel Montes-y-Gómez, Eduardo F. Morales:
Term-Weighting Learning via Genetic Programming for Text Classification. - Christian Bauckhage:
A Note on Archetypal Analysis and the Approximation of Convex Hulls. - (Withdrawn) Stability of Asynchronous Networked Control Systems with Probabilistic Clocks.
- Mikhail Prisheltsev:
Adaptive two-dimensional wavelet transformation based on the Haar system. - Ying Li, Xin Wang:
BRVST: Efficient and Content-Expressive Information Matching Overlay in Wireless Networks. - Eduardo A. Canale, Pablo Romero, Gerardo Rubino:
A Full Characterization of Irrelevant Components in Diameter Constrained Reliability. - Dániel Kondor, László Dobos, István Csabai, András Bodor, Gábor Vattay, Tamás Budavári, Alexander S. Szalay:
Efficient classification of billions of points into complex geographic regions using hierarchical triangular mesh. - Ivan V. Oseledets, G. V. Ovchinnikov:
Fast, memory efficient low-rank approximation of SimRank. - Felix Hill, KyungHyun Cho, Sébastien Jean, Coline Devin, Yoshua Bengio:
Not All Neural Embeddings are Born Equal. - Laurent Jacques, Christophe De Vleeschouwer, Yannick Boursier, Prasad Sudhakar, C. De Mol, Aleksandra Pizurica, Sandrine Anthoine, Pierre Vandergheynst, Pascal Frossard, Cagdas Bilen, Srdan Kitic, Nancy Bertin, Rémi Gribonval, Nicolas Boumal, Bamdev Mishra, Pierre-Antoine Absil, Rodolphe Sepulchre, Shaun Bundervoet, Colas Schretter, Ann Dooms, Peter Schelkens, Olivier Chabiron, François Malgouyres, Jean-Yves Tourneret, Nicolas Dobigeon, Pierre Chainais, Cédric Richard
, Bruno Cornelis, Ingrid Daubechies, David B. Dunson, Marie Danková, Pavel Rajmic, Kévin Degraux, Valerio Cambareri, Bert Geelen, Gauthier Lafruit, Gianluca Setti, Jean-François Determe, Jérôme Louveaux, François Horlin, Angélique Drémeau, Patrick Héas, Cédric Herzet, Vincent Duval, Gabriel Peyré, Alhussein Fawzi, Mike E. Davies, Nicolas Gillis, Stephen A. Vavasis, Charles Soussen, Luc Le Magoarou, Jingwei Liang, Jalal Fadili, Antoine Liutkus, David Martina, Sylvain Gigan, Laurent Daudet, Mauro Maggioni, Stanislav Minsker, Nate Strawn, C. Mory, Fred Maurice Ngolè Mboula, Jean-Luc Starck, Ignace Loris, Samuel Vaiter, Mohammad Golbabaee, Dejan Vukobratovic:
Proceedings of the second "international Traveling Workshop on Interactions between Sparse models and Technology" (iTWIST'14). - Roya Ensafi, Philipp Winter, Abdullah Mueen, Jedidiah R. Crandall:
Large-scale Spatiotemporal Characterization of Inconsistencies in the World's Largest Firewall. - Zhicheng Yan, Vignesh Jagadeesh, Dennis DeCoste, Wei Di, Robinson Piramuthu:
HD-CNN: Hierarchical Deep Convolutional Neural Network for Image Classification. - Brett W. Israelsen, Dale A. Smith:
Generalized Laguerre Reduction of the Volterra Kernel for Practical Identification of Nonlinear Dynamic Systems. - Qiaosong Wang, Vignesh Jagadeesh, Bryan Ressler, Robinson Piramuthu:
Im2Fit: Fast 3D Model Fitting and Anthropometrics using Single Consumer Depth Camera and Synthetic Data. - Sharan Chetlur, Cliff Woolley, Philippe Vandermersch, Jonathan Cohen, John Tran, Bryan Catanzaro, Evan Shelhamer:
cuDNN: Efficient Primitives for Deep Learning. - Chih-Hang Wang, De-Nian Yang, Wen-Tsuen Chen:
Scheduling for Multi-Camera Surveillance in LTE Networks. - Michael Elkin, Ofer Neiman, Christian Wulff-Nilsen:
Space-Efficient Path-Reporting Approximate Distance Oracles. - Andreas Brandstädt, Pavel Ficur, Arne Leitert, Martin Milanic:
Polynomial-time Algorithms for Weighted Efficient Domination Problems in AT-free Graphs and Dually Chordal Graphs. - Niv Buchbinder
, Moran Feldman, Roy Schwartz:
Comparing Apples and Oranges: Query Tradeoff in Submodular Maximization. - Nadav Cohen, Amnon Shashua:
SimNets: A Generalization of Convolutional Networks. - Thomas Bonald, James W. Roberts:
Multi-resource fairness: Objectives, algorithms and performance. - Maciej Rafal Burak:
Multi-step Uniformization with Steady-State Detection in Nonstationary M/M/s Queuing Systems. - Junhua Li, Zbigniew R. Struzik, Liqing Zhang, Andrzej Cichocki:
Feature Learning from Incomplete EEG with Denoising Autoencoder. - Parisa Rahimzadeh, Farid Ashtiani:
Analytical Evaluation of Saturation Throughput of a Cognitive 802.11-based WLAN Overlaid on a WiMAX-TDD Network. - Krishnendu Chatterjee, Monika Henzinger, Veronika Loitzenbauer:
Improved Algorithms for One-Pair and k-Pair Streett Objectives. - Carl Boettiger:
An introduction to Docker for reproducible research, with examples from the R environment. - Bart M. P. Jansen, Dániel Marx:
Characterizing the easy-to-find subgraphs from the viewpoint of polynomial-time algorithms, kernels, and Turing kernels. - Shuchang Zhou, Zhihua Zhang, Xiaobing Feng:
Group Orbit Optimization: A Unified Approach to Data Normalization. - Jean Gregoire:
Priority-based coordination of mobile robots. - Silvio Traversaro
, Daniele Pucci, Francesco Nori:
In Situ Calibration of Six-Axes Force Torque Sensors using Accelerometer Measurements. - Marino Miculan, Marco Peressotti:
Structural operational semantics for non-deterministic processes with quantitative aspects. - Kaibin Huang, Jiayi Chen, Vincent K. N. Lau:
Communications Using Ubiquitous Antennas: Free-Space Propagation. - Victor Adrian Prisacariu, Olaf Kähler, Ming-Ming Cheng, Carl Yuheng Ren, Julien P. C. Valentin, Philip H. S. Torr, Ian D. Reid, David William Murray:
A Framework for the Volumetric Integration of Depth Images. - Eugénio Rodrigues
, Adélio Rodrigues Gaspar, Álvaro Gomes, Manuel Gameiro da Silva:
Contributions of natural ventilation on thermal performance of alternative floor plan designs. - Branislav Kveton, Zheng Wen, Azin Ashkan, Csaba Szepesvári:
Tight Regret Bounds for Stochastic Combinatorial Semi-Bandits. - Dennis Wei, Kush R. Varshney:
Robust Binary Hypothesis Testing Under Contaminated Likelihoods. - Federico Rossi, Marco Pavone:
Distributed consensus with mixed time/communication bandwidth performance metrics. - Abdul Kadir:
A Model of Plant Identification System Using GLCM, Lacunarity And Shen Features. - Inna Smirnova:
A Systematic Approach to Setting Up Distributed Global Collaborations for Software-based Products in the Automotive Domain. - Marcos Portnoi, Chien-Chung Shen:
Loc-Auth: Location-Enabled Authentication Through Attribute-Based Encryption. - Raja Giryes, Yaniv Plan, Roman Vershynin:
On the Effective Measure of Dimension in the Analysis Cosparse Model. - Le Li, Jianjun Yang, Yang Xu, Zhen Qin, Honggang Zhang:
Document Clustering Based On Max-Correntropy Non-Negative Matrix Factorization. - Steve Hanneke, Liu Yang:
Minimax Analysis of Active Learning. - Eva C. Song, Paul W. Cuff, H. Vincent Poor:
A Rate-Distortion Based Secrecy System with Side Information at the Decoders. - Giuseppe Di Battista, Fabrizio Frati:
A Survey on Small-Area Planar Graph Drawing. - Yen-Kai Liao, Chih-Han Wang, De-Nian Yang, Wen-Tsuen Chen:
Uplink Scheduling for LTE 4G Video Surveillance System. - Chandra Chekuri, Julia Chuzhoy:
Degree-3 Treewidth Sparsifiers. - Su Hu, Zi Long Liu, Yong Liang Guan, Wenhui Xiong, Guoan Bi, Shaoqian Li:
Sequence Design for Cognitive CDMA Communications under Arbitrary Spectrum Hole Constraint. - Rahul Rama Varior, Gang Wang, Jiwen Lu:
Learning Invariant Color Features for Person Re-Identification. - Frank Nielsen, Richard Nock:
Further results on the hyperbolic Voronoi diagrams. - Nannan Wang, Xinbo Gao, Dacheng Tao, Xuelong Li:
Facial Feature Point Detection: A Comprehensive Survey. - Stefan G. Weber:
Alltagstaugliche Biometrie: Entwicklungen, Herausforderungen und Chancen. - Wojciech Czerwinski, Wim Martens:
A Note on Decidable Separability by Piecewise Testable Languages. - Jiangbo Huang:
Programing implementation of the Quine-McCluskey method for minimization of Boolean expression. - Kezhi Wang, Yunfei Chen, Marco Di Renzo:
Outage Probability of Dual-Hop Selective AF With Randomly Distributed and Fixed Interferers. - Frédéric Giroire, Dorian Mazauric, Joanna Moulierac:
Energy Efficient Routing by Switching-Off Network Interfaces. - Alejandro López-Ortiz, Daniela Maftuleac:
Optimal Strategies for Search and Rescue Operations with Robot Swarms. - Valery D. Solovyev, Vladimir V. Bochkarev:
Generating abbreviations using Google Books library. - Arash Einolghozati, Mohsen Sardari, Faramarz Fekri:
Design and Analysis of Wireless Communication Systems Using Diffusion-Based Molecular Communication Among Bacteria. - Arash Einolghozati, Mohsen Sardari, Faramarz Fekri:
Relaying in Diffusion-Based Molecular Communication. - Christine P. D. M. van der Aa, Monique M. H. Pollmann, Aske Plaat, Rutger Jan van der Gaag:
Computer-mediated communication in adults with high-functioning Autism Spectrum Conditions. - Junhua Mao, Wei Xu, Yi Yang, Jiang Wang, Alan L. Yuille:
Explain Images with Multimodal Recurrent Neural Networks. - Sougata Chaudhuri, Ambuj Tewari:
Online Ranking with Top-1 Feedback. - Elliot Anshelevich, Shreyas Sekar:
Market price competition in networks: How do monopolies impact social welfare? - Mitsugu Iwamoto, Kazuo Ohta, Junji Shikata:
Security Formalizations and Their Relationships for Encryption and Key Agreement in Information-Theoretic Cryptography. - Xianwen Wang, Shenmeng Xu, Zhi Wang, Lian Peng, Chuanli Wang:
International Scientific Collaboration of China: Collaborating Countries, Institutions and Individuals. - Xianwen Wang, Shenmeng Xu, Di Liu, Yongxia Liang:
The Role of Chinese-American Scientists in China-US Scientific Collaboration: A Study in Nanotechnology. - Koen Samyn, Sofie Van Hoecke, Bart Pieters, Charles-Frederik Hollemeersch, Aljosha Demeulemeester, Rik Van de Walle:
Real-time animation of human characters with fuzzy controllers. - Walaa Medhat, Ahmed Hassan Yousef, Hoda Korashy Mohamed:
Corpora Preparation and Stopword List Generation for Arabic data in Social Network. - Roi Livni, Shai Shalev-Shwartz, Ohad Shamir:
On the Computational Efficiency of Training Neural Networks. - Stavros G. Kolliopoulos, Yannis Moysoglou:
Extended Formulation Lower Bounds via Hypergraph Coloring? - Yulia S. Maslennikova, Vladimir V. Bochkarev:
Training Algorithm for Neuro-Fuzzy Network Based on Singular Spectrum Analysis. - Amjed Tahir, Stephen G. MacDonell, Jim Buchan:
Understanding Class-level Testability Through Dynamic Analysis. - Aleksandar Milenkoski, Marco Vieira, Bryan D. Payne, Nuno Antunes, Samuel Kounev:
Technical Information on Vulnerabilities of Hypercall Handlers. - Aleksandar Milenkoski, Alexandru Iosup
, Samuel Kounev, Kai Sachs, Piotr Rygielski, Jason Ding, Walfredo Cirne, Florian Rosenberg:
Cloud Usage Patterns: A Formalism for Description of Cloud Usage Scenarios. - Aleksandar Milenkoski, Samuel Kounev, Alberto Avritzer, Nuno Antunes, Marco Vieira:
On Benchmarking Intrusion Detection Systems in Virtualized Environments. - Rupesh Kumar Srivastava, Jonathan Masci, Faustino J. Gomez, Jürgen Schmidhuber:
Understanding Locally Competitive Networks. - Zeynab Bahrami Bidoni, Roy George:
Network Performance Rank: An Approach for Comparison of Complex Networks. - Himanshu Chauhan, Vijay K. Garg:
Necessary and Sufficient Conditions on Partial Orders for Modeling Concurrent Computations. - Sam Burnett, Nick Feamster:
Encore: Lightweight Measurement of Web Censorship with Cross-Origin Requests. - Thomas Steinke, Jonathan R. Ullman:
Interactive Fingerprinting Codes and the Hardness of Preventing False Discovery. - Devavrat Shah, Kang Zhang:
Bayesian regression and Bitcoin. - Pavel Sakov:
EnKF-C user guide. - Hao Lu, Mahantesh Halappanavar, Ananth Kalyanaraman:
Parallel Heuristics for Scalable Community Detection. - (Withdrawn) Multi-resource Fair Allocation with Bounded Number of Tasks in Cloud Computing Systems.
- Abhronil Sengupta, Sri Harsha Choday, Yusung Kim, Kaushik Roy:
Spin Orbit Torque Based Electronic Neuron. - Jan Olaf Blech, Maria Spichkova, Ian D. Peake, Heinz W. Schmidt:
Cyber-Virtual Systems: Simulation, Validation & Visualization. - Xun Zhou, Chin Keong Ho, Rui Zhang:
Wireless Power Meets Energy Harvesting: A Joint Energy Allocation Approach. - Akshay Kumar Maan, Dinesh Sasi Kumar, Sherin Sugathan, Alex Pappachen James:
Memristive Threshold Logic Circuit Design of Fast Moving Object Detection. - Kritsada Mamat, Wiroonsak Santipach:
On Transmit Beamforming for MISO-OFDM Channels With Finite-Rate Feedback. - Albert Y. S. Lam, Ka-Cheong Leung, Victor O. K. Li:
Capacity Management for Vehicle-to-Grid Power Regulation Services with Smart Charging Mechanism. - Rahul Vaze, Jainam Doshi, Kaibin Huang:
Receiver Antenna Partitioning for Simultaneous Wireless Information and Power Transfer. - Rushil Nagda, Siddhartha Satpathi, Rahul Vaze:
Optimal Offline and Competitive Online Strategies for Transmitter-Receiver Energy Harvesting. - Alkida Balliu, Dennis Olivetti, Özalp Babaoglu, Moreno Marzolla, Alina Sîrbu:
BiDAl: Big Data Analyzer for Cluster Traces. - Joan Boyar, Magnus Gausdal Find:
Constructive Relationships Between Algebraic Thickness and Normality. - Alberto Ravagnani:
Rank-metric codes and their MacWilliams identities. - Osama M. Abdalla, Sherif A. Hammad, H. Ahmed Yousef:
A Framework for Real Time Hardware in the loop Simulation for Control Design. - Walaa Medhat, Ahmed Hassan Yousef, Hoda Korashy Mohamed:
Combined Algorithm for Data Mining using Association rules. - Rasha Y. Tantawy, Ziad Farouk, Shereen Mohamed, Ahmed H. Yousef:
Using Professional Social Networking as an Innovative Method for Data Extraction: The ICT Alumni Index Case Study. - Angélique Dremeau, Florent Krzakala:
Phase recovery from a Bayesian point of view: the variational approach. - Javad B. Ebrahimi, Mahdi Jafari Siavoshani:
Linear Index Coding via Graph Homomorphism. - Chao-Kai Wen, Yongpeng Wu, Kai-Kit Wong, Robert Schober, Pangan Ting:
Performance Limits of Massive MIMO Systems Based on Bayes-Optimal Inference. - Sriram Nandha Premnath, Zygmunt J. Haas:
A Practical, Secure, and Verifiable Cloud Computing for Mobile Systems. - Karen I. Aardal, Pierre Le Bodic:
Approximation algorithms for the Transportation Problem with Market Choice and related models. - Nan Li, Rong Jin, Zhi-Hua Zhou:
Top Rank Optimization in Linear Time. - Axel Barrau, Silvère Bonnabel:
The invariant extended Kalman filter as a stable observer. - Farzana Afrin, Mohammad Saiedur Rahaman:
An adaptive quasi harmonic broadcasting scheme with optimal bandwidth requirement. - Apostolos Syropoulos:
Fuzzy Categories. - Jeremiah Blocki, Saranga Komanduri, Lorrie Faith Cranor, Anupam Datta:
Spaced Repetition and Mnemonics Enable Recall of Multiple Strong Passwords. - (Withdrawn) Energy-Efficient Resource Allocation for Fractional Frequency Reuse in Heterogeneous Networks.
- Marco Winkler, Jörg Reichardt:
Node-Specific Triad Pattern Mining: A Novel Tool for Complex-Network Analysis. - Xiang Xiang, Minh Dao, Gregory D. Hager, Trac D. Tran:
Hierarchical Sparse and Collaborative Low-Rank Representation for Emotion Recognition. - Devu Manikantan Shila, Xianghui Cao, Yu Cheng, Zequ Yang, Yang Zhou, Jiming Chen:
Ghost-in-the-Wireless: Energy Depletion Attack on ZigBee. - Bakthavachalam Elango, Periyaswamy Rajendran, Lutz Bornmann:
A macro level scientometric analysis of world tribology research output (1998 - 2012). - Zihui Liu, Jens Zumbrägel, Marcus Greferath, Xin-Wen Wu:
New Results on the Pseudoredundancy. - Yichen Jiang, Yi Ji, Tianhua Liu:
An Anonymous Communication Scheme based on Ring Signature in VANETs. - (Withdrawn) A Survey on Mobile Affective Computing.
- Zoltán Király, Sándor Kisfaludi-Bak:
Notes on dual-critical graphs. - Thierry Rakotoarivelo, Guillaume Jourjon, Olivier Mehani, Maximilian Ott, Mike Zink:
Repeatable Experiments with LabWiki. - Salman Fadaei, Martin Bichler:
A Truthful-in-expectation Mechanism for the Generalized Assignment Problem. - Manoj Gopalkrishnan:
A Cost/ Speed/ Reliability Trade-off in Erasing a Bit. - Ahmad Abdelfattah, David E. Keyes, Hatem Ltaief
:
KBLAS: An Optimized Library for Dense Matrix-Vector Multiplication on GPU Accelerators. - Andrey A. Shchurov
:
A Formal Model of Distributed Systems For Test Generation Missions. - Joshua Davis:
A Covert Channel Based on Web Read-time Modulation. - Stefanie Haustein, Timothy D. Bowman, Kim Holmberg, Isabella Peters, Vincent Larivière:
Astrophysicists on Twitter: An in-depth analysis of tweeting and scientific publication behavior. - Andrey A. Shchurov
, Radek Marik:
A Formal Approach to Distributed System Tests Design. - Erik Schnetter, Marek Blazewicz, Steven R. Brandt, David M. Koppelman, Frank Löffler:
Chemora: A PDE Solving Framework for Modern HPC Architectures. - Fredrick Romanus Ishengoma:
A Novel Design of IEEE 802.15.4 and Solar Based Autonomous Water Quality Monitoring Prototype using ECHERP. - Yongjune Kim, B. V. K. Vijaya Kumar:
Writing on dirty flash memory. - Fabrizio Smith, Maurizio Proietti:
Ontology-based Representation and Reasoning on Process Models: A Logic Programming Approach. - (Withdrawn) Feature Engineering for Supervised Link Prediction on Dynamic Social Networks.
- Andrés R. Masegosa:
Stochastic Discriminative EM. - Rania Morsi, Diomidis S. Michalopoulos, Robert Schober:
Performance Analysis of Wireless Powered Communication with Finite/Infinite Energy Storage. - Joshua Juen, Anupam Das, Aaron Johnson, Nikita Borisov, Matthew Caesar:
Defending Tor from Network Adversaries: A Case Study of Network Path Prediction. - Cheng Cheng, Yingchun Jiang, Qiyu Sun:
Sampling and Galerkin reconstruction in reproducing kernel spaces. - Chinwendu Enyioha, Mohammad Amin Rahimian, George J. Pappas, Ali Jadbabaie:
Controllability and Fraction of Leaders in Infinite Network. - Nicolò Michelusi, Sahand Pirbadian, Mohamed Y. El-Naggar, Urbashi Mitra:
A Stochastic Model for Electron Transfer in Bacterial Cables. - Anamitra Roy Choudhury, Syamantak Das, Naveen Garg, Amit Kumar:
Rejecting Jobs to Minimize Load and Maximum Flow-time. - Wei-Cheng Kuo, Chih-Chun Wang:
Robust And Optimal Opportunistic Scheduling For Downlink 2-Flow Network Coding With Varying Channel Quality and Rate Adaptation. - Maurice Margenstern:
A weakly universal cellular automaton in the heptagrid with three states. - Lutz Bornmann:
Measuring impact in research evaluations. - Lu Liu, Xianghui Cao, Yu Cheng, Li Wang:
On Optimizing Energy Efficiency in Multi-Radio Multi-Channel Wireless Networks. - Luis M. Vaquero
, Félix Cuadrado, Matei Ripeanu:
Systems for Near Real-Time Analysis of Large-Scale Dynamic Graphs. - Wentao Huang, Tracey Ho, Michael Langberg, Jörg Kliewer:
Single-Source/Sink Network Error Correction Is as Hard as Multiple-Unicast. - Yiling Chen, Or Sheffet, Salil P. Vadhan:
Privacy Games. - Mansoor I. Yousefi, Frank R. Kschischang:
On the Per-Sample Capacity of Nondispersive Optical Fibers. - Azam S. Zavar Moosavi, Adrian Sandu:
Approximate Exponential Algorithms to Solve the Chemical Master Equation. - D. Michael Freemon:
Maximizing Utilization and Performance of Guaranteed-Bandwidth Long Fat Networks and Virtual Circuits. - Qi Yu, Xinran He, Yan Liu:
GLAD: Group Anomaly Detection in Social Media Analysis- Extended Abstract. - Bomin Jiang, Zhiyong Sun, Brian D. O. Anderson:
Higher order Voronoi based mobile coverage control. - Travis E. Gibson, Zheng Qu, Anuradha M. Annaswamy, Eugene Lavretsky:
Adaptive Output Feedback based on Closed-loop Reference Models. - David Coleman, Ioan Alexandru Sucan, Mark Moll, Kei Okada, Nikolaus Correll:
Experience-Based Planning with Sparse Roadmap Spanners. - Oliver James, Heung-No Lee:
Restricted Isometry Random Variables: Probability Distributions, RIC Prediction and Phase Transition Analysis for Gaussian Encoders. - WeiQiang Xu, Wenchu Yuan, Qingjiang Shi, Xiaodong Wang, Yake Zhang:
Distributed Energy Efficient Cross-layer Optimization for Multihop MIMO Cognitive Radio Networks with Primary User Rate Protection. - Xianghui Cao, Xiangwei Zhou, Yu Cheng:
Energy Efficient Spectrum Sensing for State Estimation over A Wireless Channel. - WeiQiang Xu, Yushu Zhang, Qingjiang Shi, Xiaodong Wang:
Energy Management and Cross Layer Optimization for Wireless Sensor Network Powered by Heterogeneous Energy Sources. - David Menotti, Giovani Chiachia, Allan da Silva Pinto, William Robson Schwartz, Hélio Pedrini, Alexandre Xavier Falcão, Anderson Rocha:
Deep Representations for Iris, Face, and Fingerprint Spoofing Attack Detection. - V. Kiran Kumar:
Semantic Web Approach towards Interoperability and Privacy issues in Social Networks. - Chris Meissen, Laurent Lessard, Murat Arcak, Andrew K. Packard:
Compositional Performance Certification of Interconnected Systems using ADMM. - Maria Francis, Ambedkar Dukkipati:
Generalized Hash Functions based on Multivariate Ideal Lattices. - A. Albkerat, Biju Issac
:
Analysis of IPv6 Transition Technologies. - Thomas Colcombet
, Clemens Ley, Gabriele Puppis
:
Logics with rigidly guarded data tests. - Kennedy Edemacu
, Martin Euku, Richard Ssekibuule:
Packet Drop Attack Detection Techniques in Wireless Ad hoc Networks: A Review. - Anne Siemon, Stephan Menzel, Rainer Waser, Eike Linn:
A Complementary Resistive Switch-based Crossbar Array Adder. - Ashis Kumar Mandal, Rikta Sen:
Supervised learning Methods for Bangla Web Document Categorization. - Taymaz Rahkar-Farshi
, Sara Behjat-Jamal, Mohammad-Reza Feizi-Derakhshi:
An improved multimodal PSO method based on electrostatic interaction using n- nearest-neighbor local search. - Adil H. M. Aldlawie, Ghassan A. QasMarrogy:
Performance evaluation of the effect ofnoise power jammer on the mobile bluetooth network. - Stefania Costantini:
Committment-Based Data-Aware Multi-Agent-Contexts Systems. - Pablo Dorta-González, María-Isabel Dorta-González, Rafael Suárez-Vega:
An approach to the author citation potential: Measures of scientific performance which are invariant across scientific fields. - Van Bang Le, Andrea Oversberg, Oliver Schaudt:
Squares of $3$-sun-free split graphs. - Yang Liu, Maosong Sun:
Contrastive Unsupervised Word Alignment with Non-Local Features. - Ashish Chandra, Mohammad Suaib, Rizwan Beg:
Low cost page quality factors to detect web spam. - Saman Feghhi, Douglas J. Leith:
A Successful Web Traffic Analysis Attack Using Only Timing Information. - Amirpasha Shirazinia, Subhrakanti Dey:
Sparse Gaussian Linear Dimensionality Reduction over Noisy Communication Channels. - Xianyan Wu, Qi Han, Dan Le, Xiamu Niu:
A New Method for Estimating the Widths of JPEG Images. - Jean Creusefond, Thomas Largillier, Sylvain Peyronnet:
Finding compact communities in large graphs. - Giulio Cimini, Tiziano Squartini, Nicolò Musmeci, Michelangelo Puliga, Andrea Gabrielli, Diego Garlaschelli, Stefano Battiston, Guido Caldarelli:
Reconstructing topological properties of complex networks using the fitness model. - George Grispos, Tim Storer, William Bradley Glisson:
Calm Before the Storm: The Challenges of Cloud Computing in Digital Forensics. - Nathalie Bertrand
, Patricia Bouyer, Thomas Brihaye, Quentin Menet, Christel Baier
, Marcus Größer, Marcin Jurdzinski
:
Stochastic Timed Automata. - Waqas Aman:
A Framework for Analysis and Comparison of Dynamic Malware Analysis Tools. - Carlo Kleber da Silva Rodrigues:
On the Optimization of BitTorrent-Like Protocols for Interactive On-Demand Streaming Systems. - Chih-Hung Chang:
Strongly Mixing Properties of Multidimensional Cellular Automata. - Ehsan Ebrahimi Khaleghi, Jean-Claude Belfiore:
Compute-and-Forward for the Interference Channel: Diversity Precoding. - Roger Bilisoly:
Language-based Examples in the Statistics Classroom. - Luigi Nardi, Bruno Bodin, M. Zeeshan Zia, John Mawer, Andy Nisbet, Paul H. J. Kelly, Andrew J. Davison, Mikel Luján, Michael F. P. O'Boyle, Graham D. Riley, Nigel P. Topham, Steve B. Furber:
Introducing SLAMBench, a performance and accuracy benchmarking methodology for SLAM. - Andrej Gajduk, Mirko Todorovski, Ljupco Kocarev:
Improved steady-state stability of power grids with a communication infrastructure. - Khairul Azha A. Aziz, Shahrum Shah Abdullah:
Face Detection Using Radial Basis Functions Neural Networks With Fixed Spread. - Suman Shrestha:
Image Denoising using New Adaptive Based Median Filters. - Andrej Gajduk, Mirko Todorovski, Jürgen Kurths, Ljupco Kocarev:
Improving power grid transient stability by plug-in electric vehicles. - Yuxin Hu, Luming Zhang:
An Aerial Image Recognition Framework using Discrimination and Redundancy Quality Measure. - Jim Jing-Yan Wang, Xin Gao:
Learning manifold to regularize nonnegative matrix factorization. - Sharareh Alipour, Bahman Kalantari, Hamid Homapour:
Fast Approximation and Randomized Algorithms for Diameter. - June Zhang, José M. F. Moura:
Role of Subgraphs in Epidemics over Finite-Size Networks under the Scaled SIS Process. - Bahman Kalantari, Eric Lee:
Newton-Ellipsoid Method and its Polynomiography. - Lawrence Nehemiah:
Towards EHR interoperability in Tanzania hospitals: Issues, Challenges and Opportunities. - Shafii Muhammad Abdulhamid, Muhammad Shafie Abdul Latif:
League Championship Algorithm Based Job Scheduling Scheme for Infrastructure as a Service Cloud. - Alexander Golovnev, Alexander S. Kulikov, Ivan Mihajlin:
Families with infants: speeding up algorithms for NP-hard problems using FFT. - Anurag Acharya, Alex Verstak, Helder Suzuki, Sean Henderson, Mikhail Iakhiaev, Cliff Chiung-Yu Lin, Namit Shetty:
Rise of the Rest: The Growing Impact of Non-Elite Journals. - Brad Ballinger, Mirela Damian, David Eppstein, Robin Y. Flatland, Jessica Ginepro, Thomas C. Hull:
Minimum Forcing Sets for Miura Folding Patterns. - Martin Prantl:
Image compression overview. - Chetan Kaushik, Atul Mishra:
A Scalable, Lexicon Based Technique for Sentiment Analysis. - Ilias Diakonikolas, Daniel M. Kane, Vladimir Nikishkin:
Testing Identity of Structured Distributions. - Adam Clearwater, Clemens Puppe, Arkadii Slinko:
The single-crossing property on a tree. - Elsa Dupraz, David Declercq, Bane Vasic, Valentin Savin:
Analysis and Design of Finite Alphabet Iterative Decoders Robust to Faulty Hardware. - Daniela Maftuleac, SeoungKyou Lee, Sándor P. Fekete, Aditya Kumar Akash, Alejandro López-Ortiz, James McLurkin:
Local Policies for Efficiently Patrolling a Triangulated Region by a Robot Swarm. - Erin Wolf Chambers, Mikael Vejdemo-Johansson:
Computing minimum area homologies. - Jian Sun, Xiaofeng Zhong, Xuan Zhou, Xiaolong Fu:
Recommendation Scheme Based on Converging Properties for Contents Broadcasting. - Farrokh Etezadi, Ashish Khisti, Mitchell D. Trott:
Zero-Delay Sequential Transmission of Markov Sources Over Burst Erasure Channels. - Ashok Kumar Moses, Rajesh Sundaresan:
Minimization Problems Based on a Parametric Family of Relative Entropies I: Forward Projection. - R. Kaniezhil, C. Chandrasekar:
Improvement of Spectrum Sharing using Traffic pattern prediction. - (Withdrawn) Synthesis of Sequential Reversible Circuits through Finite State Machine.
- Leo van Iersel, Steven Kelk, Nela Lekic, Simone Linz:
Satisfying ternary permutation constraints by multiple linear orders or phylogenetic trees. - Vishal Pareek:
A New Gate for Optimal Fault Tolerant & Testable Reversible Sequential Circuit Design. - Todd Davies:
Digital Rights and Freedoms: A Framework for Surveying Users and Analyzing Policies. - R. M. Farouk, S. Badr, M. Sayed Elahl:
Recognition of cDNA microarray image Using Feedforward artificial neural network. - Qibin Zhao, Guoxu Zhou, Liqing Zhang, Andrzej Cichocki, Shun-ichi Amari:
Robust Bayesian Tensor Factorization for Incomplete Multiway Data. - Asghar Asgharian-Sardroud, Alireza Bagheri:
Unit-length embedding of cycles and paths on grid graphs. - Silas L. Fong, Vincent Y. F. Tan:
Asymptotic Expansions for Gaussian Channels with Feedback under a Peak Power Constraint. - Jelena Ignjatovic, Miroslav Ciric, Zorana Jancic:
Weighted finite automata with output. - WeiQiang Xu, Jianchen Tu, Qingjiang Shi:
Cross-Layer Control for Worse Case Delay Guarantees in Heterogeneous Powered Wireless Sensor Network via Lyapunov Optimization. - Adel M. Elmahdy, Amr El-Keyi, Tamer A. ElBatt, Karim G. Seddik:
On the Stable Throughput of Cooperative Cognitive Radio Networks with Finite Relaying Buffer. - Antoine Deleforge, Walter Kellermann:
Phase-Optimized K-SVD for Signal Extraction from Underdetermined Multichannel Sparse Mixtures. - Lazaros Lazaridis, Maria Papatsimouli, George F. Fragulis:
S.A.T.E.P.: Synchronous-Asynchronous Tele-education Platform. - Steven Schockaert, Sanjiang Li
:
Realizing RCC8 networks using convex regions. - Bahidja Boukenadil:
Importance of realistic mobility models for vanet network simulation. - Olga Podolskaya:
On Circuit Complexity of Parity and Majority Functions in Antichain Basis. - Alexander Kurz, Stefan Milius, Dirk Pattinson, Lutz Schröder:
Simplified Coalgebraic Trace Equivalence. - Jalaj Upadhyay:
Circulant Matrices and Differential Privacy. - Haythem Ghazouani:
Genetic Stereo Matching Algorithm with Fuzzy Fitness. - Andreas Schwarz, Christian Huemmer, Roland Maas, Walter Kellermann:
Spatial Diffuseness Features for DNN-Based Speech Recognition in Noisy and Reverberant Environments. - (Withdrawn) Efficient On-line Detection of Temporal Patterns.
- Emily L. Spratt, Ahmed M. Elgammal:
Computational Beauty: Aesthetic Judgment at the Intersection of Art and Science. - Eric Bax, Lingjie Weng, Xu Tian:
Validation of k-Nearest Neighbor Classifiers Using Inclusion and Exclusion. - Armando Castañeda, Yannai A. Gonczarowski, Yoram Moses:
Unbeatable Consensus. - Jeremie Houssineau, Daniel E. Clark, Spela Ivekovic, Chee Sing Lee, Jose Franco:
A unified approach for multi-object triangulation, tracking and camera calibration. - Bishoy Moussa, Mahmoud Mostafa, Mahmoud El-Khouly:
XML Schema-based Minification for Communication of Security Information and Event Management (SIEM) Systems in Cloud Environments. - Kezhi Wang, Yunfei Chen, Jiming Chen:
Novel energy detection using uniform noise distribution. - Yun-He Cao, Xiang-Gen Xia:
IRCI Free MIMO OFDM SAR Using Circularly Shifted Zadoff-Chu Sequences. - Panayotis Mertikopoulos
, Elena Veronica Belmega:
Transmit without regrets: Online optimization in MIMO-OFDM cognitive radio systems. - Alistair Sinclair, Piyush Srivastava, Daniel Stefankovic, Yitong Yin:
Spatial mixing and the connective constant: Optimal bounds. - Tadilo Endeshaw Bogale, Long Bao Le, Afshin Haghighat:
Hybrid Analog-Digital Beamforming: How Many RF Chains and Phase Shifters Do We Need? - Wenlong Shen, Weisheng Hong, Xianghui Cao, Bo Yin, Devu Manikantan Shila, Yu Cheng:
Secure Key Establishment for Device-to-Device Communications. - Andrew D. King, Catherine C. McGeoch:
Algorithm engineering for a quantum annealing platform. - David Lillis
, Rem W. Collier, Howell R. Jordan:
Evaluation of a Conversation Management Toolkit for Multi Agent Programming. - David Lillis
, Fergus Toolan, Rem W. Collier, John Dunnion:
Extending Probabilistic Data Fusion Using Sliding Windows. - Eric Price:
Optimal Lower Bound for Itemset Frequency Indicator Sketches. - Anudhyan Boral, Michael Mitzenmacher:
Multi-Party Set Reconciliation Using Characteristic Polynomials. - Mohamed Bebah, Amine Chennoufi, Azzeddine Mazroui, Abdelhak Lakhouaja:
Hybrid approaches for automatic vowelization of Arabic texts. - Gábor Erdélyi, Edith Hemaspaandra, Lane A. Hemaspaandra:
More Natural Models of Electoral Control by Partition. - Félix Balado, David Haughton:
Optimum Perfect Universal Steganography of Finite Memoryless Sources. - Shreyasee Mukherjee, Kai Su, Narayan B. Mandayam, K. K. Ramakrishnan, Dipankar Raychaudhuri, Ivan Seskar:
Evaluating Opportunistic Delivery of Large Content with TCP over WiFi in I2V Communication. - Florian Yger:
Challenge IEEE-ISBI/TCB : Application of Covariance matrices and wavelet marginals. - Forrest Fabian Jesse:
Entropy NAND: Early Functional Completeness in Entropy Networks. - Ferhat Özgür Çatak:
Polarization Measurement of High Dimensional Social Media Messages With Support Vector Machine Algorithm Using Mapreduce. - Sy-Quoc Le, Vincent Yan Fu Tan, Mehul Motani:
Second-Order Coding Rates for Conditional Rate-Distortion. - Amirhossein Aminfar, Eric Darve:
A Fast Sparse Solver for Finite-Element Matrices. - Michael G. Gowanlock, Henri Casanova:
Technical Report: Towards Efficient Indexing of Spatiotemporal Trajectories on the GPU for Distance Threshold Similarity Searches. - Minghui Yang, Jin Li, Keqin Feng, Dongdai Lin:
Generalized Hamming Weights of Irreducible Cyclic Codes. - Giovanni Caudullo:
Applying Geospatial Semantic Array Programming for a Reproducible Set of Bioclimatic Indices in Europe. - Jean-Philippe Hamiez, Jin-Kao Hao:
A note on a sports league scheduling problem. - Giuseppe Toscani:
A concavity property for the reciprocal of Fisher information and its consequences on Costa's EPI. - João F. C. Mota, Nikos Deligiannis, Miguel R. D. Rodrigues:
Compressed Sensing With Side Information: Geometrical Interpretation and Performance Bounds. - Srikanth Pai Bantwal, B. Sundar Rajan:
On the Bounds of Certain Maximal Linear Codes in a Projective Space. - Thorsten Ehlers, Mike Müller:
Faster Sorting Networks for $17$, $19$ and $20$ Inputs. - Georg Bachmeier, Michael Luttenberger, Maximilian Schlund:
Finite Automata for the Sub- and Superword Closure of CFLs: Descriptional and Computational Complexity. - Shenghao Yang, Soung Chang Liew, Lizhao You, Yi Chen:
Linearly-Coupled Fountain Codes. - Zheng Chen, Marios Kountouris:
Distributed SIR-Aware Opportunistic Access Control for D2D Underlaid Cellular Networks. - Hanli Qiao:
New SVD based initialization strategy for Non-negative Matrix Factorization. - Tiffany A. Huang, Matanya B. Horowitz, Joel W. Burdick:
Convex Model Predictive Control for Vehicular Systems. - Paulo Sérgio Almeida, Ali Shoker, Carlos Baquero:
Efficient State-based CRDTs by Delta-Mutation. - Michael Greenberg:
Space-Efficient Manifest Contracts. - Omar Alonso, Vasilis Kandylas:
A Study on Placement of Social Buttons in Web Pages. - Ryan Kavanagh
, Jean-Marie Madiot:
On Coupled Logical Bisimulation for the Lambda-Calculus. - Ubiratam de Paula Junior, Lúcia M. A. Drummond, Daniel de Oliveira, Yuri Frota, Valmir Carneiro Barbosa:
Handling Flash-Crowd Events to Improve the Performance of Web Applications. - Ender Konukoglu, Melanie Ganz:
Approximate False Positive Rate Control in Selection Frequency for Random Forest. - Patrick K. Nicholson, Pawel Gawrychowski:
Encodings of Range Maximum-Sum Segment Queries and Applications. - Zhe Wang, Vaneet Aggarwal, Xiaodong Wang:
Multiuser Joint Energy-Bandwidth Allocation with Energy Harvesting - Part I: Optimum Algorithm & Multiple Point-to-Point Channels. - Rafael Dowsley, Anderson C. A. Nascimento:
On the Oblivious Transfer Capacity of Generalized Erasure Channels against Malicious Adversaries. - Zhe Wang, Vaneet Aggarwal, Xiaodong Wang:
Multiuser Joint Energy-Bandwidth Allocation with Energy Harvesting - Part II: Multiple Broadcast Channels & Proportional Fairness. - S. V. Kasmir Raja, V. Rajitha, Meenakshi Lakshmanan:
An Ontology for Comprehensive Tutoring of Euphonic Conjunctions of Sanskrit Grammar. - Curt Schieler, Paul W. Cuff:
The Henchman Problem: Measuring Secrecy by the Minimum Distortion in a List. - Omar Rafique:
Area Versus Speed Trade-off Analysis of a WiMAX Deinterleaver Circuit Design. - Thomas Genet:
Towards Static Analysis of Functional Programs using Tree Automata Completion. - Claude Carlet, Guang Gong, Yin Tan:
Quadratic Zero-Difference Balanced Functions, APN Functions and Strongly Regular Graphs. - Chung-Yu Lou, Babak Daneshrad, Richard D. Wesel:
Optimizing Pilot Length for a Go/No-Go Decision in Two-State Block Fading Channels with Feedback. - Daoud Clarke:
Riesz Logic. - Alexandros G. Dimakis, Anna Gál, Ankit Singh Rawat, Zhao Song:
Batch Codes through Dense Graphs without Short Cycles. - Wenbo Wang, Andres Kwasinski, Zhu Han:
Power allocation with stackelberg game in femtocell networks: a self-learning approach. - Philippe Vincent-Lamarre, Jade Boivin, Yassine Gargouri, Vincent Larivière, Stevan Harnad:
Estimating Open Access Mandate Effectiveness: I. The MELIBEA Score. - Weiliang Han, Xiang-Gen Xia, Jianhua Ge:
Cyclic Delay Transmission for Vector OFDM Systems. - Biao Luo, Derong Liu, Tingwen Huang:
Q-learning for Optimal Control of Continuous-time Systems. - Mohammed Javed, P. Nagabhushan, B. B. Chaudhuri:
Direct Processing of Document Images in Compressed Domain. - Shihao Yan, Robert A. Malaney, Ido Nevat, Gareth W. Peters:
Location Spoofing Detection for VANETs by a Single Base Station in Rician Fading Channels. - Yongpeng Wu, Chao-Kai Wen, Chengshan Xiao, Xiqi Gao, Robert Schober:
Linear Precoding for the MIMO Multiple Access Channel with Finite Alphabet Inputs and Statistical CSI. - Bakthavachalam Elango, Periyaswamy Rajendran:
Whole counting vs. whole-normalized counting: A country level comparative study of internationally collaborated papers on Tribology. - Jayakrushna Sahoo, Ashok Kumar Das, Adrijit Goswami:
An Algorithm for Mining High Utility Closed Itemsets and Generators. - Behrooz Razeghi, Ghosheh Abed Hodtani, Seyed Alireza Seyedin:
Coverage Region Analysis for MIMO Amplify-and-Forward Relay Channel with the Source to Destination Link. - Mustafa Anil Koçak, Elza Erkip:
Communicating Lists Over a Noisy Channel. - Rifkat I. Nabiyev, Rushan Ziatdinov:
A mathematical design and evaluation of Bernstein-Bezier curves' shape features using the laws of technical aesthetics. - Radoslav Fulek:
Toward the Hanani-Tutte Theorem for Clustered Graphs. - Mugen Peng, Yuan Li, Jiamo Jiang, Jian Li, Chonggang Wang:
Heterogeneous Cloud Radio Access Networks: A New Perspective for Enhancing Spectral and Energy Efficiencies. - Yu Cheng, Ho Yee Cheung, Shaddin Dughmi, Shang-Hua Teng:
Signaling in Quasipolynomial time. - Mohammad Momani, Maen Takruri, Rami Al-Hmouz:
Risk Assessment Algorithm in Wireless Sensor Networks using Beta Distribution. - Ruggiero Cavallo, Christopher A. Wilkens:
GSP with General Independent Click-Through-Rates. - Greg Yang:
Computabilities of Validity and Satisfiability in Probability Logics over Finite and Countable Models. - Tareq M. Malas, Georg Hager, Hatem Ltaief
, Holger Stengel, Gerhard Wellein, David E. Keyes:
Multicore-optimized wavefront diamond blocking for optimizing stencil updates. - Derrick Wing Kwan Ng, Robert Schober:
Secure and Green SWIPT in Distributed Antenna Networks with Limited Backhaul Capacity. - Son Nguyen Hong, Hao Nguyen Anh, Trong Thua Huynh:
A Study on Impacts of RTT Inaccuracy on Dynamic Bandwidth Allocation in PON and Solution. - Xin Yuan, Patrick Llull, David J. Brady, Lawrence Carin:
Tree-Structure Bayesian Compressive Sensing for Video. - William Moran, Frederick R. Cohen, Zengfu Wang, Sofia Suvorova, Douglas Cochran, Tom Taylor, Peter Mark Farrell, Stephen D. Howard:
Bounds on Multiple Sensor Fusion. - Hengky Susanto, Byung-Guk Kim, Benyuan Liu:
QoE Support for Multi-Layered Multimedia Applications. - Asmae Drhima, Mustapha Najmeddine
:
Duality for Modules and Applications to Decoding Linear Codes over Finite Commutative Rings. - Arijit Bishnu, Kunal Dutta, Arijit Ghosh, Subhabrata Paul:
$(1, j)$-set problem in graphs. - Javier Borge-Holthoefer, Walid Magdy, Kareem Darwish, Ingmar Weber:
Content and Network Dynamics Behind Egyptian Political Polarization on Twitter. - Hongyang Sun, Patricia Stolf, Jean-Marc Pierson, Georges Da Costa:
Energy-Efficient and Thermal-Aware Resource Management for Heterogeneous Datacenters. - Soumendu Chakraborty, Anand Singh Jalal, Charul Bhatnagar:
An Efficient Bit Plane X-OR Algorithm for Irreversible Image Steganography. - Soumendu Chakraborty, Anand Singh Jalal, Charul Bhatnagar:
Secret Image Sharing Using Grayscale Payload Decomposition and Irreversible Image Steganography. - Kristian Kersting, Martin Mladenov, Pavel Tokmakov:
Relational Linear Programs. - Peter Hossain, Adaulfo Komisarczuk, Garin Pawetczak, Sarah Van Dijk, Isabella Axelsen:
Machine Learning Techniques in Cognitive Radio Networks. - Sariel Har-Peled, Haim Kaplan, Micha Sharir, Shakhar Smorodinsky:
Epsilon-Nets for Halfspaces Revisited. - Álvaro García-Recuero, Sérgio Esteves, Luís Veiga:
Quality-of-Data for Consistency Levels in Geo-replicated Cloud Data Stores. - Paul Bendich, Ellen Gasparovic, John Harer, Rauf Izmailov, Linda Ness:
Multi-Scale Local Shape Analysis and Feature Selection in Machine Learning Applications. - Oliver Knill:
Characteristic Length and Clustering. - Dani Korpi, Timo Huusari, Yang-Seok Choi, Lauri Anttila, Shilpa Talwar, Mikko Valkama:
Full-Duplex Mobile Device - Pushing The Limits. - Matin Macktoobian, Mohammad Jafari, Erfan Attarzadeh Gh:
Applied Neural Cross-Correlation into the Curved Trajectory Detection Process for Braitenberg Vehicles. - Ntjatji Gosebo:
The Impact of e-Politician on the Adoption of e-Service: Perceptions from a sample of South African Municipal IT Heads. - Son Hoang Dau, Wentu Song, Chau Yuen:
Secure Erasure Codes With Partial Decodability. - Joaquín García-Alfaro
, Gürkan Gür:
Proceedings 2014 International Workshop on Advanced Intrusion Detection and Prevention, AIDP 2014, Marrakesh, Morocco, June 2014. EPTCS 165, 2014 [contents] - Matthias Keil, Peter Thiemann:
Symbolic Solving of Extended Regular Expression Inequalities. - Bartlomiej Bosek, Hal A. Kierstead, Tomasz Krawczyk, Grzegorz Matecki, Matthew E. Smith:
An Improved Subexponential Bound for On-line Chain Partitioning. - Jaikumar Radhakrishnan, Pranab Sen, Naqueeb Warsi:
One-shot Marton inner bound for classical-quantum broadcast channel. - Ram Niwash Mahia, Deepak Fulwani, Mahaveer Singh:
Characterization of Driver Nodes of Anti-Stable Networks. - Jan Henrik Ziegeldorf, Nicolai Viol, Martin Henze
, Klaus Wehrle
:
POSTER: Privacy-preserving Indoor Localization. - (Withdrawn) The clique problem on inductive $k$-independent graphs.
- Paul Emmerich, Florian Wohlfart, Daniel Raumer, Georg Carle:
MoonGen: A Scriptable High-Speed Packet Generator. - Kalliopi Kravari, Nick Bassiliades:
DISARM: A Social Distributed Agent Reputation Model based on Defeasible Logic. - Joshua Parker, Arnold P. Boedihardjo:
Evidence of spatial embedding in the IPv4 router-level Internet network. - Haifang Li, Fei Tian, Wei Chen, Tao Qin, Tie-Yan Liu:
Generalization Analysis for Game-Theoretic Machine Learning. - (Withdrawn) Single Image Super Resolution via Manifold Approximation.
- Valerio Capraro, Joseph Y. Halpern:
Translucent Players: Explaining Cooperative Behavior in Social Dilemmas. - Paolo Baldan, Filippo Bonchi, Henning Kerstan, Barbara König:
Behavioral Metrics via Functor Lifting. - Jayadev Acharya, Constantinos Daskalakis:
Testing Poisson Binomial Distributions. - Michael Felderer, Elizabeth Bjarnason, Markus Borg, Michael Unterkalmsteiner, Mirko Morandini, Matt Staats:
Workshop Summary of the 1st International Workshop on Requirements and Testing (RET'14). - Fatemeh Rajabi-Alni, Alireza Bagheri, Behrouz Minaei-Bidgoli:
An O(n^3) time algorithm for the maximum weight b-matching problem on bipartite graphs. - Talha Cihad Gülcü, Alexander Barg:
Achieving Secrecy Capacity of the Wiretap Channel and Broadcast Channel with a Confidential Component. - Travis Gagie, Gonzalo Navarro, Yakov Nekrich, Alberto Ordóñez Pereira:
Efficient and Compact Representations of Prefix Codes. - David Abdurachmanov, Peter Elmer, Giulio Eulisse, Robert Knight, Tapio Niemi, Jukka K. Nurminen, Filip Nyback, Goncalo Pestana, Zhonghong Ou, Kashif Nizam Khan:
Techniques and tools for measuring energy efficiency of scientific software applications. - David Abdurachmanov, Brian Bockelman, Peter Elmer, Giulio Eulisse, Robert Knight, Shahzad Muzaffar:
Heterogeneous High Throughput Scientific Computing with APM X-Gene and Intel Xeon Phi. - Yongxin Chen, Tryphon T. Georgiou, Michele Pavon:
Optimal steering of a linear stochastic system to a final probability distribution, part II. - Junhui Shen, Peiyan Zhu, Rui Fan, Wei Tan:
Sentiment Analysis based on User Tag for Traditional Chinese Medicine in Weibo. - K. Brad Wray, Lutz Bornmann:
Philosophy of science viewed through the lense of "References Publication Years spectrosopy" (RPYS). - Xirong Li:
Tag Relevance Fusion for Social Image Retrieval. - Lavanya Sita Tekumalla, Chiranjib Bhattacharyya:
Mining Block I/O Traces for Cache Preloading with Sparse Temporal Non-parametric Mixture of Multivariate Poisson. - Hiroki Sayama, Roberta Sinatra:
Social Diffusion and Global Drift on Networks. - Nikolaos Pappas, Manolis Ploumidis, Apostolos Traganitis:
Performance Evaluation of Flow Allocation with Successive Interference Cancelation for Random Access WMNs. - Ali Eslami, Chuan Huang, Junshan Zhang, Shuguang Cui:
Cascading Failures in Finite-Size Random Geometric Networks. - Emil Björnson, Erik G. Larsson, Mérouane Debbah:
Optimizing Multi-Cell Massive MIMO for Spectral Efficiency: How Many Users Should Be Scheduled? - Yuriy V. Pershin, Fabio L. Traversa, Massimiliano Di Ventra:
Memcomputing with membrane memcapacitive systems. - Eyal En Gad, Yue Li, Jörg Kliewer, Michael Langberg, Anxiao Jiang, Jehoshua Bruck:
Asymmetric Error Correction and Flash-Memory Rewriting using Polar Codes. - Ryan A. Rossi, Nesreen K. Ahmed:
NetworkRepository: A Graph Data Repository with Visual Interactive Analytics. - Bahman Kalantari:
Randomized Triangle Algorithms for Convex Hull Membership. - Mohamad Trad, Raja Jurdak, Rajib Kumar Rana:
Guiding Ebola Patients to Suitable Health Facilities: An SMS-based Approach. - Marco Di Renzo:
Stochastic Geometry Modeling and Analysis of Multi-Tier Millimeter Wave Cellular Networks. - Abid Mehmood
, Dayang N. A. Jawawi:
An exploratory study of the suitability of UML-based aspect modeling techniques with respect to their integration into Model-Driven Engineering context. - Masa-aki Takizawa, Masahiro Yukawa, Cédric Richard:
A stochastic behavior analysis of stochastic restricted-gradient descent algorithm in reproducing kernel Hilbert spaces. - Cem Tekin, Mihaela van der Schaar:
eTutor: Online Learning for Personalized Education. - Jan Vrsek, Miroslav Lávicka:
Recognizing implicitly given rational canal surfaces. - Saeid Sahraei, Michael Gastpar:
Compute-and-Forward: Finding the Best Equation. - Chengwen Xing, Zesong Fei, Yiqing Zhou, Zhengang Pan, Hualei Wang:
Transceiver Design with Matrix-Version Water-Filling Solutions under Mixed Power Constraints. - Symeon Chouvardas, Gerasimos Mileounis, Nicholas Kalouptsidis, Sergios Theodoridis:
Greedy Sparsity-Promoting Algorithms for Distributed Learning. - Iyed Khammassi, Rachid El Azouzi, Majed Haddad, Issam Mabrouki:
A Game Theoretic Model for Network Virus Protection. - Tong Zhang, Xiaofeng Tao, Qimei Cui:
Joint Multi-Cell Resource Allocation Using Pure Binary-Integer Programming for LTE Uplink. - Sardaouna Hamadou, Abdelouahed Gherbi, John Mullins, Sofiene Beji:
A Time-Triggered Constraint-Based Calculus for Avionic Systems. - Rita Ammanouil, André Ferrari, Cédric Richard:
A graph Laplacian regularization for hyperspectral data unmixing. - Xianwen Wang, Chen Liu, Wenli Mao:
Does A Paper Being Featured on The Cover of A Journal Guarantee More Attention and Greater Impact? - Haewoon Kwak, Jisun An:
Understanding News Geography and Major Determinants of Global News Coverage of Disasters. - Junyeong Seo, Youngchul Sung, Gilwon Lee, Donggun Kim:
Training Beam Sequence Design for Millimeter-Wave MIMO Systems: A POMDP Framework. - Fabrizio Montesi:
Process-aware web programming with Jolie. - Rifkat I. Nabiyev, Ilshat H. Nabiyev, Rushan Ziatdinov:
The potential of mobile exhibition as a form of implementation for social transformation and educational expo-design in addressing public social problems. - Chern Hong Lim, Anhar Risnumawan, Chee Seng Chan:
Scene Image is Non-Mutually Exclusive - A Fuzzy Qualitative Scene Understanding. - Xingqin Lin, Libin Jiang, Jeffrey G. Andrews:
Performance Analysis of Asynchronous Multicarrier Wireless Networks. - Adam Petcher, Greg Morrisett:
The Foundational Cryptography Framework. - Mei Kuan Lim, Chee Seng Chan, Dorothy Ndedi Monekosso, Paolo Remagnino:
Refined Particle Swarm Intelligence Method for Abrupt Motion Tracking. - Wai Lam Hoo, Chee Seng Chan:
Zero-Shot Object Recognition System based on Topic Model. - Wei Ren Tan, Chee Seng Chan, Yogarajah Pratheepan, Joan Condell:
A Fusion Approach for Efficient Human Skin Detection. - Wai Lam Hoo, Tae-Kyun Kim, Yuru Pei, Chee Seng Chan:
Enhanced Random Forest with Image/Patch-Level Learning for Image Understanding. - Mei Kuan Lim, Ven Jyn Kok, Chen Change Loy, Chee Seng Chan:
Crowd Saliency Detection via Global Similarity Structure. - Jakub Kozik, Grzegorz Matecki:
A lazy approach to on-line bipartite matching. - Nathanaël Fijalkow:
What is known about the Value 1 Problem for Probabilistic Automata? - Rishabh Jain, Sakshi Gupta:
Optimizing the For loop: Comparison of For loop and micro For loop. - Guozheng Li, Zining Cao, Zheng Gao:
Refinement Checking for Multirate Hybrid ZIA. - Andrew Harms, Waheed U. Bajwa, A. Robert Calderbank:
Identification of Linear Time-Varying Systems Through Waveform Diversity. - Rami Al-Rfou, Vivek Kulkarni, Bryan Perozzi, Steven Skiena:
POLYGLOT-NER: Massive Multilingual Named Entity Recognition. - Yi-Peng Wei, Sennur Ulukus:
Polar Coding for the General Wiretap Channel. - Hans L. Bodlaender, Marc J. van Kreveld:
Google Scholar makes it Hard - the complexity of organizing one's publications. - Aaradhna Goyal, Ali Alshamrani, Dhivyaa Nandakumar, Dileep Vanga, Dmitriy Fingerman, Parul Gupta, Riya Ray, Srikanth Suryadevara:
Towards Refactoring DMARF and GIPSY OSS. - James P. Balhoff, T. Alexander Dececchi, Paula M. Mabee, Hilmar Lapp:
Presence-absence reasoning for evolutionary phenotypes. - Andrea Del Prete, Francesco Nori, Giorgio Metta, Lorenzo Natale:
Prioritized motion-force control of constrained fully-actuated robots: "Task Space Inverse Dynamics". - Debdipta Goswami, Chiranjib Saha, Kunal Pal, Swagatam Das:
Multi-Agent Shape Formation and Tracking Inspired from a Social Foraging Dynamics. - Petrut Cobârzan:
A new upper bound for Achlioptas processes. - Srinadh Bhojanapalli, Prateek Jain, Sujay Sanghavi:
Tighter Low-rank Approximation via Sampling the Leveraged Element. - Robert Krauthgamer, Tal Wagner:
Cheeger-type approximation for sparsest $st$-cut. - Liang Zhang, Zheng Yan, Donghan Feng, Gang Wang, Shaolun Xu, Naihu Li, Lei Jing:
Centralized and Decentralized Optimal Scheduling for Charging Electric Vehicles. - Xiankai Lu, Zheng Fang, Tao Xu, Haiting Zhang, Hongya Tuo:
Efficient Image Categorization with Sparse Fisher Vector. - Wenya Zhu, Xiankai Lu, Tao Xu, Ziyi Zhao:
High Order Structure Descriptors for Scene Images. - Neil Shah, Alex Beutel, Brian Gallagher, Christos Faloutsos:
Spotting Suspicious Link Behavior with fBox: An Adversarial Perspective. - Jason Weston, Sumit Chopra, Antoine Bordes:
Memory Networks. - Mei Kuan Lim, Chee Seng Chan, Dorothy Ndedi Monekosso, Paolo Remagnino:
Detection of Salient Regions in Crowded Scenes. - Taisuke Sato, Keiichi Kubota, Yoshitaka Kameya:
A Logic-based Approach to Generatively Defined Discriminative Modeling. - Ponnurangam Kumaraguru, Niharika Sachdeva:
Privacy4ICTD in India: Exploring Perceptions, Attitudes and Awareness about ICT Use. - Ivo Herman
, Dan Martinec, Zdenek Hurák, Michael Sebek:
Scaling of transfer functions in vehicular platoons: the role of asymmetry disputed. - Xiaohan Wang, Pengfei Liu, Yuantao Gu:
Local-set-based Graph Signal Reconstruction. - Le Liang, Wei Xu, Xiaodai Dong:
Low-Complexity Hybrid Precoding in Massive Multiuser MIMO Systems. - Siotai Cheong, Pinyi Fan:
Novel Degree Distribution Function for LT codes over Finite Field. - Loïc Michel:
Bernstein-based polynomial approach to study the stability of switched systems and formal verification using HOL Light. - Haythem Ghazouani:
Shape and Color Object Tracking for Real-Time Robotic Navigation. - Ting-Yu Ho, Yi-Nung Yeh, De-Nian Yang:
Multi-View 3D Video Multicast for Broadband IP Networks. - Harry J. F. Qiu, Ivan Wang Hei Ho, Chi K. Tse, Yu Xie:
Technical Report: A Methodology for Studying 802.11p VANET Broadcasting Performance with Practical Vehicle Distribution. - (Withdrawn) Model-Free 3D Reconstruction of Weld Joint Geometry Using Laser Scanning in Presence of Noise.
- Hamidreza Arjmandi, Gholamali Aminian, Amin Gohari, Masoumeh Nasiri-Kenari, Urbashi Mitra:
Capacity of Diffusion based Molecular Communication Networks over LTI-Poisson Channels. - Laureano Moreno-Pozas, Eduardo Martos-Naya:
A Random Matrix Model for $κ$-$μ$ Shadowed Fading. - Dean Eckles, Maurits Kaptein:
Thompson sampling with the online bootstrap. - Amir M. Ben-Amram, Aviad Pineles:
Flowchart Programs, Regular Expressions, and Decidability of Polynomial Growth-Rate. 24-49 - Subhadip Basu, Sudipta Dey, K. Mukherjee, T. S. Jana:
Online interpretation of numeric sign language using 2-d skeletal model. - Subhadip Basu, Mahantapas Kundu, Mita Nasipuri, Dipak Kumar Basu:
A two-pass fuzzy-geno approach to pattern classification. - Subhadip Basu, Saurav Chakraborty, K. Mukherjee, S. K. Pandit:
Online Tracking of Skin Colour Regions Against a Complex Background. - Dipak Kumar Kole, Subhadip Basu:
An Automated Group Key Authentication System Using Secret Image Sharing Scheme. - Paolo Ballarini:
Analysing oscillatory trends of discrete-state stochastic processes through HASL statistical model checking. - François Gonze, Raphaël M. Jungers:
On the Synchronizing Probability Function and the Triple Rendezvous Time for Synchronzing Automata. - Martin Lück, Arne Meier, Irina Schindler:
Parameterized Complexity of CTL: A Generalization of Courcelle's Theorem. - Karl Rupp, Josef Weinbub, Ansgar Jüngel, Tibor Grasser:
Pipelined Iterative Solvers with Kernel Fusion for Graphics Processing Units. - Lorenzo Clemente:
Unified Analysis of Collapsible and Ordered Pushdown Automata via Term Rewriting. - K. R. Sahasranand, Vinod Sharma:
Distributed Nonparametric Sequential Spectrum Sensing under Electromagnetic Interference. - Bernhard Rumpe, Christian Berger, Holger Krahn:
Softwaretechnische Absicherung intelligenter Systeme im Fahrzeug. - Pietro Codara, Ottavio M. D'Antona:
Generalized Fibonacci and Lucas cubes arising from powers of paths and cycles. - Wolfgang Pree, Marcus Fontoura, Bernhard Rumpe:
Product Line Annotations with UML-F. - Aldo de Luca, Alessandro De Luca:
Sturmian words and the Stern sequence. - Ian P. Mulholland, Enrico Paolini, Mark F. Flanagan:
Design of LDPC Code Ensembles with Fast Convergence Properties. - Barbara Paech, Bernhard Rumpe:
Towards Development of Correct Software using Views. - Ana Salagean, Matei Mandache-Salagean, Richard Winter, Raphael C.-W. Phan:
Higher Order Differentiation over Finite Fields with Applications to Generalising the Cube Attack. - Frank Duque, Carlos Hidalgo-Toscano:
An upper bound on the k-modem illumination problem. - Adam Case, Jack H. Lutz:
Mutual Dimension. - Stefanie Haustein, Timothy D. Bowman
, Kim Holmberg, Andrew Tsou, Cassidy R. Sugimoto, Vincent Larivière:
Tweets as impact indicators: Examining the implications of automated bot accounts on Twitter. - Shadman Sakib, Rakibul Haq, Tariq Wazed:
Unified mobile public health care system (UMPHCS) for underdeveloped countries. - Shadman Sakib, Anik Chowdhury, Shekh Tanvir Ahamed, Syed Imam Hasan:
Maze solving Algorithm for line following robot and derivation of linear path distance from nonlinear path. - Belal Amro:
Mobile Agent Systems, Recent Security Threats and Counter Measures. - Anshul Gupta, Sven Schewe
, Dominik Wojtczak
:
Making the Best of Limited Memory in Multi-Player Discounted Sum Games. 16-30 - Roghayeh Joda, Michele Zorzi:
Access Policy Design for Two Cognitive Secondary Users under a Primary ARQ Process. - Foto N. Afrati, Manas Joglekar, Christopher Ré, Semih Salihoglu, Jeffrey D. Ullman:
GYM: A Multiround Join Algorithm In MapReduce. - (Withdrawn) An improved approximation algorithm for k-median problem using a new factor-revealing LP.
- Adrien Devresse, Fabrizio Furano:
Efficient HTTP based I/O on very large datasets for high performance computing with the libdavix library. - Samuel R. Bowman, Christopher Potts, Christopher D. Manning:
Learning Distributed Word Representations for Natural Logic Reasoning. - Biju Issac
, K. Hamid, C. E. Tan:
Wireless Mobility Management with Prediction, Delay Reduction and Resource Management in 802.11 Networks. - Jashua Rajesh Modapothala, Biju Issac
:
Analysis of corporate environmental reports using statistical techniques and data mining. - Taimoor Abbas, Jörg Nuckelt, Thomas Kürner, Thomas Zemen, Christoph F. Mecklenbräuker, Fredrik Tufvesson:
Simulation and Measurement Based Vehicle-to-Vehicle Channel Characterization: Accuracy and Constraint Analysis. - Enrico Bazzoli, Claudio Criscione, Federico Maggi, Stefano Zanero:
XSS Peeker: A Systematic Analysis of Cross-site Scripting Vulnerability Scanners. - Ron Adar, Leah Epstein:
Models for the k-metric dimension. - Jie Wang, Jieping Ye:
Two-Layer Feature Reduction for Sparse-Group Lasso via Decomposition of Convex Sets. - Nicolò Michelusi, Michele Zorzi:
Optimal Adaptive Random Multiaccess in Energy Harvesting Wireless Sensor Networks. - Brijesh Dongol, Ian J. Hayes, Georg Struth:
Convolution, Separation and Concurrency. - Seeun Umboh:
Online Network Design Algorithms via Hierarchical Decompositions. - Badih Ghazi, Euiwoong Lee:
LP/SDP Hierarchy Lower Bounds for Decoding Random LDPC Codes. - Long Le, Douglas L. Jones:
Optimal Simultaneous Detection and Signal and Noise Power Estimation. - Adam Noel, Karen C. Cheung, Robert Schober:
Joint Channel Parameter Estimation via Diffusive Molecular Communication. - Aude Marzuoli, Emmanuel Boidot, Eric Feron, Paul B. C. van Erp, Alexis Ucko, Alexandre M. Bayen, Mark Hansen:
Anatomy of a Crash. - Nariman Farsad, H. Birkan Yilmaz, Andrew W. Eckford, Chan-Byoung Chae, Weisi Guo:
A Comprehensive Survey of Recent Advancements in Molecular Communication. - Adrien Ickowicz:
Approximate Bayesian algorithms for multiple target tracking with binary sensors. - Bernhard Haeupler, Mark S. Manasse, Kunal Talwar:
Consistent Weighted Sampling Made Fast, Small, and Easy. - David G. Anderson, Ming Gu, Christopher Melgaard:
An Efficient Algorithm for Unweighted Spectral Graph Sparsification. - Jinming Wen, Baojian Zhou, Wai Ho Mow, Xiao-Wen Chang:
Compute-and-Forward Protocol Design Based on Improved Sphere Decoding. - Xiangang Li, Xihong Wu:
Constructing Long Short-Term Memory based Deep Recurrent Neural Networks for Large Vocabulary Speech Recognition. - Peng Wang, Yonghui Li, Lingyang Song, Branka Vucetic:
Multi-Gigabits Millimetre Wave Wireless Communications for 5G: From Fixed Access to Cellular Networks. - Vincent Gramoli, Guillaume Jourjon, Olivier Mehani:
Can SDN Mitigate Disasters? - Nourhene Ellouze, Slim Rekhis
, Mohamed Allouche
, Noureddine Boudriga:
Digital Investigation of Security Attacks on Cardiac Implantable Medical Devices. 15-30 - Chris Chapman, Scott Knight, Tom Dean:
USBcat - Towards an Intrusion Surveillance Toolset. 31-43 - Muhammad Sabir Idrees, Yves Roudier, Ludovic Apvrille:
Model the System from Adversary Viewpoint: Threats Identification and Modeling. 45-58 - Wentan Yi, Shaozhen Chen:
Multidimensional Zero-Correlation Linear Attacks on Reduced-Round MISTY1. - Zai Yang, Lihua Xie:
Achieving High Resolution for Super-resolution via Reweighted Atomic Norm Minimization. - Petar Popovski:
Ultra-Reliable Communication in 5G Wireless Systems. - Manasij Venkatesh, Vikas Majjagi, Deepu Vijayasenan:
Implicit segmentation of Kannada characters in offline handwriting recognition using hidden Markov models. - (Withdrawn) Enhanced Multiobjective Evolutionary Algorithm based on Decomposition for Solving the Unit Commitment Problem.
- Martín Hötzel Escardó, Paulo Oliva:
The Herbrand Functional Interpretation of the Double Negation Shift. - Robert A. Bridges, John P. Collins, Erik M. Ferragut, Jason A. Laska, Blair D. Sullivan:
Multi-Level Anomaly Detection on Streaming Graph Data. - Chang-Ick Song, Cong Ling, Jaehyun Park, Bruno Clerckx:
MIMO Broadcasting for Simultaneous Wireless Information and Power Transfer: Weighted MMSE Approaches. - Christoph R. Birkl, Damien F. Frost, Adrien M. Bizeray, Robert R. Richardson, David A. Howey:
Modular converter system for low-cost off-grid energy storage using second life Li-ion batteries. - Matthieu Barjon, Arnaud Casteigts, Serge Chaumette, Colette Johnen, Yessin M. Neggaz:
Maintaining a Spanning Forest in Highly Dynamic Networks: The Synchronous Case. - Seibu Mary Jacob, Biju Issac
:
The mobile devices and its mobile learning usage analysis. - Biju Issac
, K. Hamid, C. E. Tan:
Hybrid Mobility Prediction of 802.11 Infrastructure Nodes by Location Tracking and Data Mining. - Seibu Mary Jacob, Biju Issac
:
Mobile Learning Culture and Effects in Higher Education. - Borislav Gajanovic, Bernhard Rumpe:
ALICE: An Advanced Logic for Interactive Component Engineering. - Christopher Herbon:
The HAWKwood Database. - Martina Eikel, Christian Scheideler, Alexander Setzer:
Minimum Linear Arrangement of Series-Parallel Graphs. - Biju Issac:
Secure ARP and Secure DHCP Protocols to Mitigate Security Attacks. - Ynte Vanderhoydonc, Wim Vanroose:
Constrained Runs algorithm as a lifting operator for the Boltzmann equation. - (Withdrawn) Optimal Allocation of Power Pool for Two-Cell Single-User Joint Transmission.
- Silvio Traversaro
, Andrea Del Prete, Riccardo Muradore, Lorenzo Natale, Francesco Nori:
Inertial Parameter Identification Including Friction and Motor Dynamics. - Andrea Del Prete, Francesco Romano, Lorenzo Natale, Giorgio Metta, Giulio Sandini, Francesco Nori:
Prioritized Optimal Control. - Stefan Schulze Frielinghaus, Michael Petter, Helmut Seidl:
Inter-procedural Two-Variable Herbrand Equalities. - Sergio Grammatico, Francesca Parise, Marcello Colombino, John Lygeros:
Decentralized Convergence to Nash Equilibria in Constrained Mean Field Control. - Gopal Sarma:
Should we train scientific generalists? - Andrea Del Prete, Nicolas Mansard, Francesco Nori, Giorgio Metta, Lorenzo Natale:
Partial Force Control of Constrained Floating-Base Robots. - Ynte Vanderhoydonc, Wim Vanroose:
Initialization of lattice Boltzmann models with the help of the numerical Chapman-Enskog expansion. - Daniel J. Hsu:
Weighted sampling of outer products. - Brijesh Dongol, Victor B. F. Gomes, Georg Struth:
Principles for Verification Tools: Separation Logic. - Ariyan Zarei:
Improve CAPTCHA's Security Using Gaussian Blur Filter. - (Withdrawn) Power Allocation and Scheduling for Two-Cell Distributed Interference Subtraction System.
- Massimo Stella, Markus Brede:
Patterns in the English Language: Phonological Networks, Percolation and Assembly Models. - Parosh Aziz Abdulla, Lorenzo Clemente, Richard Mayr, Sven Sandberg:
Stochastic Parity Games on Lossy Channel Systems. - Alina Sîrbu
, Özalp Babaoglu:
Towards a systematic analysis of cluster computing log data: the case of IBM BlueGene/Q. - Kato Mivule, Benjamin Harvey, Crystal Cobb, Hoda El-Sayed:
A Review of CUDA, MapReduce, and Pthreads Parallel Computing Models. - Alexios Balatsoukas-Stimming, Mani Bastani Parizi, Andreas Peter Burg:
On Metric Sorting for Successive Cancellation List Decoding of Polar Codes. - Ming Xu, Yiman Du, Jianping Wu, Yang Zhou, Yunpeng Xiao:
Map Matching based on Conditional Random Fields and Route Preference Mining for Uncertain Trajectories. - Raviteja Vemulapalli, Vinay Praneeth Boda, Rama Chellappa:
MKL-RT: Multiple Kernel Learning for Ratio-trace Problems via Convex Optimization. - Azam Khalili, Wael Bazzi, Amir Rastegarnia:
Analysis of incremental augmented affine projection algorithm for distributed estimation of complex signals. - Miguel Ángel Bautista, Antonio Hernández-Vela, Sergio Escalera, Laura Igual, Oriol Pujol, Josep Moya, Verónica Violant, María Teresa Anguera:
A Gesture Recognition System for Detecting Behavioral Patterns of ADHD. - Thibault Godin, Ines Klimann, Matthieu Picantin:
On Torsion-Free Semigroups Generated by Invertible Reversible Mealy Automata. - Jimmy Lin:
On the Feasibility and Implications of Self-Contained Search Engines in the Browser. - Tobias Isenberg, Heike Wehrheim:
Proof-Carrying Hardware via IC3. - Aakash Deshpande, Frédéric Herbreteau, B. Srivathsan, Thanh-Tung Tran, Igor Walukiewicz:
Fast detection of cycles in timed automata. - Bas Luttik, Fei Yang:
Executable Behaviour and the $π$-Calculus. - Michael Maire, Stella X. Yu, Pietro Perona:
Reconstructive Sparse Code Transfer for Contour Detection and Semantic Labeling. - Venkata N. Inukollu, Divya D. Keshamoni, Taeghyun Kang, Manikanta Inukollu:
Factors Influencing Quality of Mobile Apps: Role of Mobile App Development Life Cycle. - Alon Orlitsky, Narayana P. Santhanam:
Universal compression of Gaussian sources with unknown parameters. - Jayadeva, Suresh Chandra, Siddarth Sabharwal, Sanjit S. Batra:
Learning a hyperplane regressor by minimizing an exact bound on the VC dimension. - Dave Clites, Richard Orr, Jack Rieser, Michael Dellomo:
Providing Higher Throughput for a Single User with M-ary Orthogonal Walsh Codes. - Adrian Friebel, Johannes Neitsch, Tim Johann, Seddik Hammad, Jan G. Hengstler, Dirk Drasdo, Stefan Hoehme:
TiQuant: Software for tissue analysis, quantification and surface reconstruction. - Erte Pan, Zhu Han:
Non-parametric Bayesian Learning with Deep Learning Structure and Its Applications in Wireless Networks. - Zhuwei Wang, Xiaodong Wang, Lihan Liu:
Stochastic Optimal Linear Control of Wireless Networked Control Systems with Delays and Packet Losses. - Hamzah Asyrani Sulaiman, Abdullah Bade, Mohd Harun Abdullah:
Efficient Distance Computation Algorithm between Nearly Intersected Objects Using Dynamic Pivot Point in Virtual Environment Application. - Marlos C. Machado, Sriram Srinivasan, Michael Bowling:
Domain-Independent Optimistic Initialization for Reinforcement Learning. - Hirosuke Yamamoto, Masashi Ueda:
Identification Codes to Identify Multiple Objects. - Wojciech Zaremba, Ilya Sutskever:
Learning to Execute. - Derek Doran, Swapna S. Gokhale, Aldo Dagnino:
Accurate Local Estimation of Geo-Coordinates for Social Media Posts. - Joshua D. Guttman, Paul D. Rowe:
A Cut Principle for Information Flow. - Alireza Dirafzoon, Edgar J. Lobaton:
Robust Topological Feature Extraction for Mapping of Environments using Bio-Inspired Sensor Networks. - Kiyeon Kim, Sang-Woon Jeon, Janghoon Yang, Dong Ku Kim:
The Feasibility of Interference Alignment for Reverse TDD Systems in MIMO Cellular Networks. - Carl Vondrick, Hamed Pirsiavash, Aude Oliva, Antonio Torralba:
Acquiring Visual Classifiers from Human Imagination. - Darryl McAdams, Jonathan Sterling:
Dependent Types for Pragmatics. - Yilun Wang, Junjie Zheng, Sheng Zhang, Xujun Duan, Huafu Chen:
Randomized Structural Sparsity via Constrained Block Subsampling for Improved Sensitivity of Discriminative Voxel Identification. - Chayanika Sharma, Ritu Sibal:
Applications of different metaheuristic techniques for finding optimal tst order during integration testing of object oriented systems and their comparative study. - Biju Issac
, Raymond Chiong, Seibu Mary Jacob:
Analysis of Phishing Attacks and Countermeasures. - Weiyang Liu, Zhiding Yu, Lijia Lu, Yandong Wen, Hui Li, Yuexian Zou:
KCRC-LCD: Discriminative Kernel Collaborative Representation with Locality Constrained Dictionary for Visual Categorization. - Seibu Mary Jacob, Biju Issac
:
Formative Assessment and its E-learning Implementation. - Seibu Mary Jacob, Biju Issac
:
Problem Based Learning and Implementations. - Ibrahim Abdelaziz, Sherif M. Abdou, Hassanin M. Al-Barhamtoshy:
Large Vocabulary Arabic Online Handwriting Recognition System. - Biju Issac
, Khairuddhin Ab Hamid, C. E. Tan:
QoS Survey in IPv6 and Queuing Methods. - Biju Issac, Khairuddhin Ab Hamid, C. E. Tan:
Analysis of Demand Driven Ad-hoc Routing Protocols on Performance and Mobility. - (Withdrawn) Optimal Time Random Access to Grammar-Compressed Strings in Small Space.
- Derek Groen, David Abou Chacra, Rupert W. Nash, Jirí Jaros, Miguel O. Bernabeu, Peter V. Coveney:
Weighted decomposition in high-performance lattice-Boltzmann simulations: are some lattice sites more equal than others? - Junhui Hou, Lap-Pui Chau, Nadia Magnenat-Thalmann, Ying He:
Human Motion Capture Data Tailored Transform Coding. - Jakub Konecný, Jie Liu, Peter Richtárik, Martin Takác:
mS2GD: Mini-Batch Semi-Stochastic Gradient Descent in the Proximal Setting. - Gesualdo Scutari, Francisco Facchinei, Lorenzo Lampariello, Peiran Song:
Distributed Methods for Constrained Nonconvex Multi-Agent Optimization-Part I: Theory. - Ugonna Aralu:
Influence of Information Support System on ICT Use by distance learners in University of Lagos Nigeria. - Flaminia L. Luccio, Euripides Markou:
Mobile Agents Rendezvous in spite of a Malicious Agent. - Pablo Dorta-González
, María-Isabel Dorta-González, Dolores-Rosa Santos-Peñate, Rafael Suárez-Vega:
Research status and trends in Operations Research and Management Science (OR/MS) journals: A bibliometric analysis based on the Web of Science database 2001-2012. - Farnood Merrikh-Bayat, Xinjie Guo, H. A. Ommani, N. Do, Konstantin K. Likharev, Dmitri B. Strukov:
Redesigning Commercial Floating-Gate Memory for Analog Computing Applications. - Wojciech Mazurczyk, Elzbieta Rzeszutko:
Security - a perpetual war: lessons from nature. - Mickael Randour, Jean-François Raskin, Ocan Sankur:
Percentile Queries in Multi-Dimensional Markov Decision Processes. - Parisa A. Eliasi, Sundeep Rangan, Theodore S. Rappaport:
Low-Rank Spatial Channel Estimation for Millimeter Wave Cellular Systems. - Chayanika Sharma, Sangeeta Sabharwal, Ritu Sibal:
Applying Genetic Algorithm for Prioritization of Test Case Scenarios Derived from UML Diagrams. - Yannis Haralambous, Yassir Elidrissi, Philippe Lenca:
Arabic Language Text Classification Using Dependency Syntax-Based Feature Selection. - Kush R. Varshney, Lav R. Varshney:
Olfactory Signals and Systems. - Kathrin Baker, Michael Bloodgood, Bonnie J. Dorr, Nathaniel Wesley Filardo, Lori S. Levin, Christine D. Piatko:
A Modality Lexicon and its use in Automatic Tagging. - Elisângela Silva Dias, Diane Castonguay, Humberto J. Longo, Walid Abdala Rfaei Jradi, Hugo A. D. do Nascimento:
Fast Parallel Algorithm for Enumerating All Chordless Cycles in Graphs. - William W. Hager, James T. Hungerford, Ilya Safro:
A Multilevel Bilinear Programming Algorithm For the Vertex Separator Problem. - Yuksel Ozan Basciftci, Can Emre Koksal:
Delay Optimal Secrecy in Two-Relay Network. - Filippo Del Tedesco, David Sands, Alejandro Russo:
Type-Directed Compilation for Fault-Tolerant Non-Interference. - Wajeb Gharibi, Gharib Gharibi:
Gharibi_FaceCard for Contacts and Easy Personal - Information Exchange. - Ashok Kumar Moses, Rajesh Sundaresan:
Relative $α$-Entropy Minimizers Subject to Linear Statistical Constraints. - Shota Nakagawa, Ichiro Hasuo:
Near-Optimal Scheduler Synthesis for LTL with Future Discounting. - Mohammad M. Mansour:
Pruned Bit-Reversal Permutations: Mathematical Characterization, Fast Algorithms and Architectures. - (Withdrawn) Settling the Randomized k-sever Conjecture on Some Special Metrics.
- David Insa, Josep Silva:
Transforming while/do/for/foreach-Loops into Recursive Methods. - Pooya Davoodi, Rajeev Raman, Srinivasa Rao Satti:
On Succinct Representations of Binary Trees. - Chiraag Lala, Shay B. Cohen:
The Visualization of Change in Word Meaning over Time using Temporal Word Embeddings. - Dimitris Kallergis, Konstantinos Chimos, Stefanos Vizikidis, Theodoros Karvounidis, Christos Douligeris:
Pirus: A Web-based File Hosting Service with Object Oriented Logic in Cloud Computing. - Lampros Goussis, Ioannis E. Foukarakis, Dimitrios N. Kallergis:
Aspects and challenges of mashup creator design. - Dimitrios N. Kallergis
, Ioannis E. Foukarakis, George N. Prezerakos:
Design issues for distributed mobile social networks. - Pratikkumar Desai, Amit P. Sheth, Pramod Anantharam:
Semantic Gateway as a Service architecture for IoT Interoperability. - Muhammad Haris Mughees, Hamed Haddadi, Pan Hui:
Privacy Leakage in Mobile Computing: Tools, Methods, and Characteristics. - Ulrich Schöpp:
On the Relation of Interaction Semantics to Continuations and Defunctionalization. - Zhenwen Dai, Andreas C. Damianou, James Hensman, Neil D. Lawrence
:
Gaussian Process Models with Parallelization and GPU acceleration. - Danesh Tarapore, Jean-Baptiste Mouret:
Evolvability signatures of generative encodings: beyond standard performance benchmarks. - Amin Emad, Olgica Milenkovic:
Code Construction and Decoding Algorithms for Semi-Quantitative Group Testing with Nonuniform Thresholds. - Muhammad Aamir:
Content-Priority based Interest Forwarding in Content Centric Networks. - Jad Hamza:
Linearizability is EXPSPACE-complete. - Zhao Wang, Ming Xiao, Mikael Skoglund, H. Vincent Poor:
Secrecy Degrees of Freedom of Wireless X Networks Using Artificial Noise Alignment. - Holger Stengel, Jan Treibig, Georg Hager, Gerhard Wellein:
Quantifying performance bottlenecks of stencil computations using the Execution-Cache-Memory model. - Jaijeet Roychowdhury:
Boolean Computation Using Self-Sustaining Nonlinear Oscillators. - Binbin Dai, Wei Yu:
Sparse Beamforming and User-Centric Clustering for Downlink Cloud Radio Access Network. - Shuiyin Liu, Yi Hong, Emanuele Viterbo:
Unshared Secret Key Cryptography. - Shuyang Jiang, Yuantao Gu:
Block-Sparsity-Induced Adaptive Filter for Multi-Clustering System Identification. - David C. Del Rey Fernández, David W. Zingg:
Generalized Summation-by-Parts Operators for the Second Derivative with Variable Coefficients. - Juha Kontinen, Antti Kuusisto, Jonni Virtema:
Decidable Fragments of Logics Based on Team Semantics. - Katsuhiko Sano, Jonni Virtema:
Axiomatizing Propositional Dependence Logics. - Jinming Wen, Xiao-Wen Chang:
Success probability of the Babai estimators for box-constrained integer linear models. - Yuichi Yoshida:
Gowers Norm, Function Limits, and Parameter Estimation. - Jun Fang, Yanning Shen, Fuwei Li, Hongbin Li:
Prior Support Knowledge-Aided Sparse Bayesian Learning with Partly Erroneous Support Information. - Radu Iosif, Adam Rogalewicz, Tomás Vojnar:
Abstraction Refinement for Trace Inclusion of Data Automata. - Syed Zulqarnain Gilani, Faisal Shafait, Ajmal S. Mian:
Dense 3D Face Correspondence. - Meirav Zehavi:
Solving Parameterized Problems by Mixing Color Coding-Related Techniques. - Georgios Pitsilis, Wei Wang:
Harnessing the power of Social Bookmarking for improving tag-based Recommendations. - Yang Yang, Gesualdo Scutari, Daniel Pérez Palomar, Marius Pesavento:
A Parallel Stochastic Approximation Method for Nonconvex Multi-Agent Optimization Problems. - William Waites:
On the Provenance of Linked Data Statistics. - Paolo Pareti, Ewan Klein:
Learning Vague Concepts for the Semantic Web. - Ali Mesbah, Stefan Streif:
Stability for Receding-horizon Stochastic Model Predictive Control with Chance Constraints. - Mehdi Ashraphijuo, Vaneet Aggarwal, Xiaodong Wang:
On the Capacity Regions of Two-Way Diamond Channels. - Cristina David, Daniel Kroening, Matt Lewis:
Propositional Reasoning about Safety and Termination of Heap-Manipulating Programs. - Cristina David, Daniel Kroening, Matt Lewis:
Unrestricted Termination and Non-Termination Arguments for Bit-Vector Programs. - Muhammad Safdar, Ming Ronnier Luo, Xiaoyu Liu:
Comparing CSI and PCA in Amalgamation with JPEG for Spectral Image Compression. - Diego Didona, Paolo Romano:
On Bootstrapping Machine Learning Performance Predictors via Analytical Models. - Guru Guruganesh, Laura Sanità, Chaitanya Swamy:
Improved Region-Growing and Combinatorial Algorithms for $k$-Route Cut Problems. - Tang Liu, Daniela Tuninetti, Syed Ali Jafar:
The DoF of the Asymmetric MIMO Interference Channel with Square Direct Link Channel Matrices. - Jairo Alonso Giraldo, Alvaro A. Cárdenas, Nicanor Quijano:
Attenuating the Impact of Integrity Attacks on Real-Time Pricing in Smart Grids. - Santiago Segarra, Alejandro Ribeiro:
Stability and Continuity of Centrality Measures in Weighted Graphs. - Wafa Elmannai, Abdul Razaque, Khaled M. Elleithy:
Simulation based Study of TCP Variants in Hybrid Network. - Abeer Alabass, Khaled M. Elleithy, Abdul Razaque:
Dynamic Cluster Head Node Election (DCHNE) Model over Wireless Sensor Networks (WSNs). - Khaled M. Elleithy, Abdul Razaque:
Fostering of innovative usability testing to develop mobile application for mobile collaborative learning (MCL). - Yong Wang:
An Algebra of Reversible Computation. - Prateek Jain, Ambuj Tewari, Purushottam Kar:
On Iterative Hard Thresholding Methods for High-dimensional M-Estimation. - Christian Borgs, Jennifer T. Chayes, Adrian Marple, Shang-Hua Teng:
Fixed-Points of Social Choice: An Axiomatic Approach to Network Communities. - Masaaki Nagahara:
Sparsity Methods for Networked Control. - Michael Mitzenmacher, Vikram Nathan:
Hardness of Peeling with Stashes. - Haewoon Kwak, Jeremy Blackburn:
Linguistic Analysis of Toxic Behavior in an Online Video Game. - Britta Dorn, Dominikus Krüger:
On the Hardness of Bribery Variants in Voting with CP-Nets. - Meryem Benammar, Pablo Piantanida, Shlomo Shamai:
On the Compound Broadcast Channel: Multiple Description Coding and Interference Decoding. - Gregory Z. Gutin, Mark Jones, Magnus Wahlström:
Structural Parameterizations of the Mixed Chinese Postman Problem. - (Withdrawn) Universal laws and absolute lower bounds of feedback systems: entropy rate never decreases, generalized Bode integral, Gaussianity-whiteness measure, Gaussianing-whitening control, and beyond.
- Alexander Kartzow:
The field of the Reals and the Random Graph are not Finite-Word Ordinal-Automatic. - Michal Cáp, Peter Novák, Alexander Kleiner:
Finding Near-optimal Solutions in Multi-robot Path Planning. - Matthew J. Hirn, David P. Widemann:
Frames for subspaces of $\mathbb{C}^N$. - Kijung Shin, U Kang:
Distributed Methods for High-dimensional and Large-scale Tensor Factorization. - Sergei O. Kuznetsov, Artem Revenko:
Interactive Error Correction in Implicative Theories. - Albert Gordo:
Supervised mid-level features for word image representation. - Sudarshan Mukherjee, Saif Khan Mohammed:
Energy-Spectral Efficiency Trade-off for a Massive SU-MIMO System with Transceiver Power Consumption. - Moritz Kreutzer, Georg Hager, Gerhard Wellein, Andreas Pieper, Andreas Alvermann, Holger Fehske:
Performance Engineering of the Kernel Polynomial Method on Large-Scale CPU-GPU Systems. - Hui Liu, Zhiyong Chen, Xiaohua Tian, Xinbing Wang, Meixia Tao:
On Content-centric Wireless Delivery Networks. - Lorenzo Livi, Guido Del Vescovo, Antonello Rizzi, Fabio Massimo Frattale Mascioli:
Building pattern recognition applications with the SPARE library. - Parthapratim De:
Computationally -Efficient Algorithms for Multiuser Detection in Short Code Wideband CDMA (TDD) Systems.