callback( { "result":{ "query":":facetid:toc:\"db/journals/corr/corr1305.bht\"", "status":{ "@code":"200", "text":"OK" }, "time":{ "@unit":"msecs", "text":"81.34" }, "completions":{ "@total":"1", "@computed":"1", "@sent":"1", "c":{ "@sc":"1069", "@dc":"1069", "@oc":"1069", "@id":"43431273", "text":":facetid:toc:db/journals/corr/corr1305.bht" } }, "hits":{ "@total":"1069", "@computed":"1000", "@sent":"1000", "@first":"0", "hit":[{ "@score":"1", "@id":"4249342", "info":{"authors":{"author":[{"@pid":"43/7480","text":"Mouhamed Abdulla"},{"@pid":"53/5944","text":"Yousef R. Shayan"}]},"title":"Harnessing Simultaneously the Benefits of UWB and MBWA: A Practical Scenario.","venue":"CoRR","volume":"abs/1305.7250","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/AbdullaS13e","ee":"http://arxiv.org/abs/1305.7250","url":"https://dblp.org/rec/journals/corr/AbdullaS13e"}, "url":"URL#4249342" }, { "@score":"1", "@id":"4249401", "info":{"authors":{"author":[{"@pid":"52/3312","text":"Adrian Adewunmi"},{"@pid":"35/2751","text":"Uwe Aickelin"}]},"title":"Investigating the effectiveness of Variance Reduction Techniques in Manufacturing, Call Center and Cross-docking Discrete Event Simulation Models.","venue":"CoRR","volume":"abs/1305.7424","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/AdewunmiA13","ee":"http://arxiv.org/abs/1305.7424","url":"https://dblp.org/rec/journals/corr/AdewunmiA13"}, "url":"URL#4249401" }, { "@score":"1", "@id":"4249406", "info":{"authors":{"author":[{"@pid":"19/8010","text":"Ansuman Adhikary"},{"@pid":"19/2492","text":"Giuseppe Caire"}]},"title":"Joint Spatial Division and Multiplexing: Opportunistic Beamforming and User Grouping.","venue":"CoRR","volume":"abs/1305.7252","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/AdhikaryC13","ee":"http://arxiv.org/abs/1305.7252","url":"https://dblp.org/rec/journals/corr/AdhikaryC13"}, "url":"URL#4249406" }, { "@score":"1", "@id":"4249413", "info":{"authors":{"author":[{"@pid":"20/2653","text":"Bharat Adsul"},{"@pid":"53/7788","text":"Jinesh Machchhar"},{"@pid":"61/1262","text":"Milind A. Sohoni"}]},"title":"Local and Global Analysis of Parametric Solid Sweeps.","venue":"CoRR","volume":"abs/1305.7351","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/AdsulMS13","ee":"http://arxiv.org/abs/1305.7351","url":"https://dblp.org/rec/journals/corr/AdsulMS13"}, "url":"URL#4249413" }, { "@score":"1", "@id":"4249821", "info":{"authors":{"author":[{"@pid":"71/10511","text":"I. Ayachi"},{"@pid":"15/3972","text":"Ryan Kammarti"},{"@pid":"92/6213","text":"Mekki Ksouri"},{"@pid":"99/5601","text":"Pierre Borne"}]},"title":"Harmony search to solve the container storage problem with different container types.","venue":"CoRR","volume":"abs/1305.7254","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/AyachiKKB13a","ee":"http://arxiv.org/abs/1305.7254","url":"https://dblp.org/rec/journals/corr/AyachiKKB13a"}, "url":"URL#4249821" }, { "@score":"1", "@id":"4249830", "info":{"authors":{"author":{"@pid":"36/7534","text":"Anwarul Azim"}},"title":"Performance of Single User vs. Multiuser Modulation in Wireless Multicarrier (MC) Communications.","venue":"CoRR","volume":"abs/1305.7393","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/Azim13","ee":"http://arxiv.org/abs/1305.7393","url":"https://dblp.org/rec/journals/corr/Azim13"}, "url":"URL#4249830" }, { "@score":"1", "@id":"4250008", "info":{"authors":{"author":[{"@pid":"14/4061","text":"Bruno Barras"},{"@pid":"12/7583","text":"Lourdes Del Carmen González-Huesca"},{"@pid":"90/6992","text":"Hugo Herbelin"},{"@pid":"44/4388","text":"Yann Régis-Gianas"},{"@pid":"35/4153","text":"Enrico Tassi"},{"@pid":"w/MarkusWenzel","text":"Makarius Wenzel"},{"@pid":"63/5369","text":"Burkhart Wolff"}]},"title":"Pervasive Parallelism in Highly-Trustable Interactive Theorem Proving Systems.","venue":"CoRR","volume":"abs/1305.7360","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/BarrasGHRTWW13","ee":"http://arxiv.org/abs/1305.7360","url":"https://dblp.org/rec/journals/corr/BarrasGHRTWW13"}, "url":"URL#4250008" }, { "@score":"1", "@id":"4250063", "info":{"authors":{"author":[{"@pid":"24/6086","text":"Marie-Pierre Béal"},{"@pid":"02/9960","text":"Michel Blockelet"},{"@pid":"14/3467","text":"Catalin Dima"}]},"title":"Sofic-Dyck shifts.","venue":"CoRR","volume":"abs/1305.7413","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/BealBD13a","ee":"http://arxiv.org/abs/1305.7413","url":"https://dblp.org/rec/journals/corr/BealBD13a"}, "url":"URL#4250063" }, { "@score":"1", "@id":"4250624", "info":{"authors":{"author":[{"@pid":"24/5715","text":"Marco Canini"},{"@pid":"k/PetrKouznetsov","text":"Petr Kuznetsov"},{"@pid":"34/8852","text":"Dan Levin"},{"@pid":"58/3289-1","text":"Stefan Schmid 0001"}]},"title":"A Distributed SDN Control Plane for Consistent Policy Updates.","venue":"CoRR","volume":"abs/1305.7429","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/CaniniKLS13","ee":"http://arxiv.org/abs/1305.7429","url":"https://dblp.org/rec/journals/corr/CaniniKLS13"}, "url":"URL#4250624" }, { "@score":"1", "@id":"4250704", "info":{"authors":{"author":[{"@pid":"198/5326","text":"L. Chakhmakhchyan"},{"@pid":"30/3449","text":"D. L. Shepelyansky"}]},"title":"PageRank model of opinion formation on Ulam networks.","venue":"CoRR","volume":"abs/1305.7395","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/ChakhmakhchyanS13","ee":"http://arxiv.org/abs/1305.7395","url":"https://dblp.org/rec/journals/corr/ChakhmakhchyanS13"}, "url":"URL#4250704" }, { "@score":"1", "@id":"4250784", "info":{"authors":{"author":{"@pid":"94/3624","text":"Pavel Chebotarev"}},"title":"Studying new classes of graph metrics.","venue":"CoRR","volume":"abs/1305.7514","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/Chebotarev13","ee":"http://arxiv.org/abs/1305.7514","url":"https://dblp.org/rec/journals/corr/Chebotarev13"}, "url":"URL#4250784" }, { "@score":"1", "@id":"4250856", "info":{"authors":{"author":[{"@pid":"52/1286","text":"Duanbing Chen"},{"@pid":"94/1463","text":"Rui Xiao"},{"@pid":"14/1126","text":"An Zeng"},{"@pid":"32/940","text":"Yi-Cheng Zhang"}]},"title":"Path diversity improves the identification of influential spreaders.","venue":"CoRR","volume":"abs/1305.7480","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/ChenXZZ13","ee":"http://arxiv.org/abs/1305.7480","url":"https://dblp.org/rec/journals/corr/ChenXZZ13"}, "url":"URL#4250856" }, { "@score":"1", "@id":"4250868", "info":{"authors":{"author":[{"@pid":"06/4240","text":"Zhe Chen"},{"@pid":"55/7033","text":"Daqiang Zhang"},{"@pid":"14/1206","text":"Rongbo Zhu"},{"@pid":"149/0590","text":"Yinxue Ma"},{"@pid":"26/6924","text":"Ping Yin"},{"@pid":"11/4605","text":"Feng Xie"}]},"title":"A Review of Automated Formal Verification of Ad Hoc Routing Protocols for Wireless Sensor Networks.","venue":"CoRR","volume":"abs/1305.7410","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/ChenZZMYX13","ee":"http://arxiv.org/abs/1305.7410","url":"https://dblp.org/rec/journals/corr/ChenZZMYX13"}, "url":"URL#4250868" }, { "@score":"1", "@id":"4251238", "info":{"authors":{"author":{"@pid":"82/6860","text":"Michael A. Demetriou"}},"title":"Adaptation and optimization of synchronization gains in networked distributed parameter systems.","venue":"CoRR","volume":"abs/1305.7117","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/Demetriou13","ee":"http://arxiv.org/abs/1305.7117","url":"https://dblp.org/rec/journals/corr/Demetriou13"}, "url":"URL#4251238" }, { "@score":"1", "@id":"4251449", "info":{"authors":{"author":[{"@pid":"76/4947","text":"Frank Dylla"},{"@pid":"m/TillMossakowski","text":"Till Mossakowski"},{"@pid":"06/3872-2","text":"Thomas Schneider 0002"},{"@pid":"73/1193","text":"Diedrich Wolter"}]},"title":"Algebraic Properties of Qualitative Spatio-Temporal Calculi.","venue":"CoRR","volume":"abs/1305.7345","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/DyllaM0W13","ee":"http://arxiv.org/abs/1305.7345","url":"https://dblp.org/rec/journals/corr/DyllaM0W13"}, "url":"URL#4251449" }, { "@score":"1", "@id":"4251599", "info":{"authors":{"author":[{"@pid":"138/0709","text":"Stefan Fafianie"},{"@pid":"b/HLBodlaender","text":"Hans L. Bodlaender"},{"@pid":"33/7187","text":"Jesper Nederlof"}]},"title":"Speeding-up Dynamic Programming with Representative Sets - An Experimental Evaluation of Algorithms for Steiner Tree on Tree Decompositions.","venue":"CoRR","volume":"abs/1305.7448","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/FafianieBN13","ee":"http://arxiv.org/abs/1305.7448","url":"https://dblp.org/rec/journals/corr/FafianieBN13"}, "url":"URL#4251599" }, { "@score":"1", "@id":"4251723", "info":{"authors":{"author":[{"@pid":"94/3708","text":"Jan Feyereisl"},{"@pid":"35/2751","text":"Uwe Aickelin"}]},"title":"Privileged Information for Data Clustering.","venue":"CoRR","volume":"abs/1305.7454","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/FeyereislA13","ee":"http://arxiv.org/abs/1305.7454","url":"https://dblp.org/rec/journals/corr/FeyereislA13"}, "url":"URL#4251723" }, { "@score":"1", "@id":"4251739", "info":{"authors":{"author":[{"@pid":"62/3875","text":"Grazziela P. Figueredo"},{"@pid":"66/340","text":"Peer-Olaf Siebers"},{"@pid":"35/2751","text":"Uwe Aickelin"}]},"title":"Investigating Mathematical Models of Immuno-Interactions with Early-Stage Cancer under an Agent-Based Modelling Perspective.","venue":"CoRR","volume":"abs/1305.7471","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/FigueredoSA13","ee":"http://arxiv.org/abs/1305.7471","url":"https://dblp.org/rec/journals/corr/FigueredoSA13"}, "url":"URL#4251739" }, { "@score":"1", "@id":"4252079", "info":{"authors":{"author":[{"@pid":"79/6928","text":"James P. Gleeson"},{"@pid":"76/7592","text":"Davide Cellai"},{"@pid":"11/5392","text":"Jukka-Pekka Onnela"},{"@pid":"01/2405","text":"Mason A. Porter"},{"@pid":"40/10359","text":"Felix Reed-Tsochas"}]},"title":"A Simple Generative Model of Collective Online Behaviour.","venue":"CoRR","volume":"abs/1305.7440","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/GleesonCOPR13","ee":"http://arxiv.org/abs/1305.7440","url":"https://dblp.org/rec/journals/corr/GleesonCOPR13"}, "url":"URL#4252079" }, { "@score":"1", "@id":"4252232", "info":{"authors":{"author":[{"@pid":"81/7185","text":"Peter Grindrod"},{"@pid":"74/2160","text":"Desmond J. Higham"}]},"title":"Dynamical Systems to Monitor Complex Networks in Continuous Time.","venue":"CoRR","volume":"abs/1305.7430","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/GrindrodH13","ee":"http://arxiv.org/abs/1305.7430","url":"https://dblp.org/rec/journals/corr/GrindrodH13"}, "url":"URL#4252232" }, { "@score":"1", "@id":"4252254", "info":{"authors":{"author":[{"@pid":"24/1402-6","text":"Feng Gu 0006"},{"@pid":"10/58","text":"Julie Greensmith"},{"@pid":"35/2751","text":"Uwe Aickelin"}]},"title":"The Dendritic Cell Algorithm for Intrusion Detection.","venue":"CoRR","volume":"abs/1305.7416","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/GuGA13","ee":"http://arxiv.org/abs/1305.7416","url":"https://dblp.org/rec/journals/corr/GuGA13"}, "url":"URL#4252254" }, { "@score":"1", "@id":"4252255", "info":{"authors":{"author":[{"@pid":"24/1402-6","text":"Feng Gu 0006"},{"@pid":"10/58","text":"Julie Greensmith"},{"@pid":"35/2751","text":"Uwe Aickelin"}]},"title":"Theoretical formulation and analysis of the deterministic dendritic cell algorithm.","venue":"CoRR","volume":"abs/1305.7476","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/GuGA13a","ee":"http://arxiv.org/abs/1305.7476","url":"https://dblp.org/rec/journals/corr/GuGA13a"}, "url":"URL#4252255" }, { "@score":"1", "@id":"4252526", "info":{"authors":{"author":[{"@pid":"129/2783","text":"Liang Heng"},{"@pid":"119/5434","text":"Grace Xingxin Gao"}]},"title":"Accuracy of Range-Based Cooperative Localization in Wireless Sensor Networks: A Lower Bound Analysis.","venue":"CoRR","volume":"abs/1305.7272","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/HengG13","ee":"http://arxiv.org/abs/1305.7272","url":"https://dblp.org/rec/journals/corr/HengG13"}, "url":"URL#4252526" }, { "@score":"1", "@id":"4252536", "info":{"authors":{"author":[{"@pid":"h/HolgerHermanns","text":"Holger Hermanns"},{"@pid":"43/8180","text":"Jan Krcál"},{"@pid":"95/6511","text":"Jan Kretínský"}]},"title":"Compositional Verification and Optimization of Interactive Markov Chains.","venue":"CoRR","volume":"abs/1305.7332","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/HermannsKK13","ee":"http://arxiv.org/abs/1305.7332","url":"https://dblp.org/rec/journals/corr/HermannsKK13"}, "url":"URL#4252536" }, { "@score":"1", "@id":"4252948", "info":{"authors":{"author":[{"@pid":"j/RichardJozsa","text":"Richard Jozsa"},{"@pid":"30/8147","text":"Maarten Van den Nest"}]},"title":"Classical simulation complexity of extended Clifford circuits.","venue":"CoRR","volume":"abs/1305.6190","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/JozsaN13","ee":"http://arxiv.org/abs/1305.6190","url":"https://dblp.org/rec/journals/corr/JozsaN13"}, "url":"URL#4252948" }, { "@score":"1", "@id":"4252951", "info":{"authors":{"author":[{"@pid":"44/6690","text":"Kevin Judd"},{"@pid":"52/2179","text":"Michael Small"},{"@pid":"116/3069","text":"Thomas Stemler"}]},"title":"What exactly are the properties of scale-free and other networks?","venue":"CoRR","volume":"abs/1305.7296","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/JuddSS13","ee":"http://arxiv.org/abs/1305.7296","url":"https://dblp.org/rec/journals/corr/JuddSS13"}, "url":"URL#4252951" }, { "@score":"1", "@id":"4253428", "info":{"authors":{"author":{"@pid":"132/9002","text":"M. Naresh Kumar"}},"title":"Alternating Decision trees for early diagnosis of dengue fever.","venue":"CoRR","volume":"abs/1305.7331","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/Kumar13a","ee":"http://arxiv.org/abs/1305.7331","url":"https://dblp.org/rec/journals/corr/Kumar13a"}, "url":"URL#4253428" }, { "@score":"1", "@id":"4253535", "info":{"authors":{"author":{"@pid":"54/2884","text":"J. M. Landsberg"}},"title":"Geometric Complexity Theory: an introduction for geometers.","venue":"CoRR","volume":"abs/1305.7387","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/Landsberg13","ee":"http://arxiv.org/abs/1305.7387","url":"https://dblp.org/rec/journals/corr/Landsberg13"}, "url":"URL#4253535" }, { "@score":"1", "@id":"4253588", "info":{"authors":{"author":[{"@pid":"88/3262","text":"Jason D. Lee"},{"@pid":"116/2926","text":"Yuekai Sun"},{"@pid":"27/10733","text":"Jonathan E. Taylor"}]},"title":"On model selection consistency of regularized M-estimators.","venue":"CoRR","volume":"abs/1305.7477","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/LeeST13","ee":"http://arxiv.org/abs/1305.7477","url":"https://dblp.org/rec/journals/corr/LeeST13"}, "url":"URL#4253588" }, { "@score":"1", "@id":"4253760", "info":{"authors":{"author":[{"@pid":"75/5287","text":"Yihui Liu"},{"@pid":"35/2751","text":"Uwe Aickelin"},{"@pid":"94/3708","text":"Jan Feyereisl"},{"@pid":"120/3045","text":"Lindy Durrant"}]},"title":"Wavelet feature extraction and genetic algorithm for biomarker detection in colorectal cancer data.","venue":"CoRR","volume":"abs/1305.7465","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/LiuAFD13","ee":"http://arxiv.org/abs/1305.7465","url":"https://dblp.org/rec/journals/corr/LiuAFD13"}, "url":"URL#4253760" }, { "@score":"1", "@id":"4253795", "info":{"authors":{"author":[{"@pid":"65/2992","text":"Xiyang Liu"},{"@pid":"17/8100","text":"Zhongjie Ren"},{"@pid":"22/7949","text":"Xiuling Chang"},{"@pid":"81/7020","text":"Haichang Gao"},{"@pid":"35/2751","text":"Uwe Aickelin"}]},"title":"Draw a line on your PDA to authenticate.","venue":"CoRR","volume":"abs/1305.7482","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/LiuRCGA13","ee":"http://arxiv.org/abs/1305.7482","url":"https://dblp.org/rec/journals/corr/LiuRCGA13"}, "url":"URL#4253795" }, { "@score":"1", "@id":"4253887", "info":{"authors":{"author":[{"@pid":"26/123","text":"Robert Lukotka"},{"@pid":"65/4411","text":"Ján Mazák"},{"@pid":"58/5187","text":"Xuding Zhu"}]},"title":"Maximum 4-degenerate subgraph of a planar graph.","venue":"CoRR","volume":"abs/1305.6195","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/LukotkaMZ13","ee":"http://arxiv.org/abs/1305.6195","url":"https://dblp.org/rec/journals/corr/LukotkaMZ13"}, "url":"URL#4253887" }, { "@score":"1", "@id":"4253979", "info":{"authors":{"author":[{"@pid":"116/6436","text":"Anirudha Majumdar"},{"@pid":"22/1375","text":"Ram Vasudevan"},{"@pid":"66/1855","text":"Mark M. Tobenkin"},{"@pid":"73/1296","text":"Russ Tedrake"}]},"title":"Technical Report: Convex Optimization of Nonlinear Feedback Controllers via Occupation Measures.","venue":"CoRR","volume":"abs/1305.7484","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/MajumdarVTT13","ee":"http://arxiv.org/abs/1305.7484","url":"https://dblp.org/rec/journals/corr/MajumdarVTT13"}, "url":"URL#4253979" }, { "@score":"1", "@id":"4254237", "info":{"authors":{"author":[{"@pid":"91/7615","text":"Simon Miller"},{"@pid":"118/0674","text":"Susan Appleby"},{"@pid":"97/4637","text":"Jonathan M. Garibaldi"},{"@pid":"35/2751","text":"Uwe Aickelin"}]},"title":"Towards a More Systematic Approach to Secure Systems Design and Analysis.","venue":"CoRR","volume":"abs/1305.7467","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/MillerAGA13","ee":"http://arxiv.org/abs/1305.7467","url":"https://dblp.org/rec/journals/corr/MillerAGA13"}, "url":"URL#4254237" }, { "@score":"1", "@id":"4254611", "info":{"authors":{"author":[{"@pid":"121/2623","text":"Minh-Quoc Nghiem"},{"@pid":"121/2607","text":"Giovanni Yoko Kristianto"},{"@pid":"72/7616","text":"Goran Topic"},{"@pid":"63/1600","text":"Akiko Aizawa"}]},"title":"A hybrid approach for semantic enrichment of MathML mathematical expressions.","venue":"CoRR","volume":"abs/1305.7316","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/NghiemKTA13","ee":"http://arxiv.org/abs/1305.7316","url":"https://dblp.org/rec/journals/corr/NghiemKTA13"}, "url":"URL#4254611" }, { "@score":"1", "@id":"4255034", "info":{"authors":{"author":[{"@pid":"73/6934","text":"Roberto Di Pietro"},{"@pid":"18/5654","text":"Flavio Lombardi"},{"@pid":"34/4563","text":"Antonio Villani"}]},"title":"CUDA Leaks: Information Leakage in GPU Architectures.","venue":"CoRR","volume":"abs/1305.7383","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/PietroLV13","ee":"http://arxiv.org/abs/1305.7383","url":"https://dblp.org/rec/journals/corr/PietroLV13"}, "url":"URL#4255034" }, { "@score":"1", "@id":"4255149", "info":{"authors":{"author":[{"@pid":"32/222","text":"Tian Qiu"},{"@pid":"66/4971","text":"Tiantian Wang"},{"@pid":"17/146","text":"Zi-Ke Zhang"},{"@pid":"37/5177","text":"Li-Xin Zhong"},{"@pid":"09/4891","text":"Guang Chen"}]},"title":"Heterogeneity Involved Network-based Algorithm Leads to Accurate and Personalized Recommendations.","venue":"CoRR","volume":"abs/1305.7438","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/QiuWZZC13","ee":"http://arxiv.org/abs/1305.7438","url":"https://dblp.org/rec/journals/corr/QiuWZZC13"}, "url":"URL#4255149" }, { "@score":"1", "@id":"4255253", "info":{"authors":{"author":[{"@pid":"130/4023","text":"Jean-Florent Raymond"},{"@pid":"t/DimitriosMThilikos","text":"Dimitrios M. Thilikos"}]},"title":"Polynomial Gap Extensions of the Erdős-Pósa Theorem.","venue":"CoRR","volume":"abs/1305.7376","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/RaymondT13","ee":"http://arxiv.org/abs/1305.7376","url":"https://dblp.org/rec/journals/corr/RaymondT13"}, "url":"URL#4255253" }, { "@score":"1", "@id":"4255332", "info":{"authors":{"author":[{"@pid":"95/4402","text":"Chris M. Roadknight"},{"@pid":"35/2751","text":"Uwe Aickelin"},{"@pid":"97/7997","text":"Galina Sherman"}]},"title":"Validation of a Microsimulation of the Port of Dover.","venue":"CoRR","volume":"abs/1305.7458","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/RoadknightAS13","ee":"http://arxiv.org/abs/1305.7458","url":"https://dblp.org/rec/journals/corr/RoadknightAS13"}, "url":"URL#4255332" }, { "@score":"1", "@id":"4255449", "info":{"authors":{"author":[{"@pid":"39/11265","text":"Farhan Sahito"},{"@pid":"s/WolfgangSlany","text":"Wolfgang Slany"}]},"title":"Advanced Personnel Vetting Techniques in Critical Multi-Tennant Hosted Computing Environments.","venue":"CoRR","volume":"abs/1305.7488","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/SahitoS13","ee":"http://arxiv.org/abs/1305.7488","url":"https://dblp.org/rec/journals/corr/SahitoS13"}, "url":"URL#4255449" }, { "@score":"1", "@id":"4255672", "info":{"authors":{"author":{"@pid":"131/6494","text":"Ali Seyfi"}},"title":"A Focused Crawler Combinatory Link and Content Model Based on T-Graph Principles.","venue":"CoRR","volume":"abs/1305.7265","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/Seyfi13a","ee":"http://arxiv.org/abs/1305.7265","url":"https://dblp.org/rec/journals/corr/Seyfi13a"}, "url":"URL#4255672" }, { "@score":"1", "@id":"4255746", "info":{"authors":{"author":[{"@pid":"97/7997","text":"Galina Sherman"},{"@pid":"66/340","text":"Peer-Olaf Siebers"},{"@pid":"130/3844","text":"David Menachof"},{"@pid":"35/2751","text":"Uwe Aickelin"}]},"title":"Evaluating Different Cost-Benefit Analysis Methods for Port Security Operations.","venue":"CoRR","volume":"abs/1305.7422","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/ShermanSMA13","ee":"http://arxiv.org/abs/1305.7422","url":"https://dblp.org/rec/journals/corr/ShermanSMA13"}, "url":"URL#4255746" }, { "@score":"1", "@id":"4255908", "info":{"authors":{"author":[{"@pid":"198/5298","text":"Luis Sola"},{"@pid":"85/2562","text":"Miguel Romance"},{"@pid":"29/5053","text":"Regino Criado"},{"@pid":"87/8890","text":"Julio Flores"},{"@pid":"84/8909","text":"Alejandro García del Amo"},{"@pid":"25/2366","text":"Stefano Boccaletti"}]},"title":"Eigenvector centrality of nodes in multiplex networks.","venue":"CoRR","volume":"abs/1305.7445","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/SolaRCFAB13","ee":"http://arxiv.org/abs/1305.7445","url":"https://dblp.org/rec/journals/corr/SolaRCFAB13"}, "url":"URL#4255908" }, { "@score":"1", "@id":"4256144", "info":{"authors":{"author":[{"@pid":"91/470-1","text":"Chunming Tang 0001"},{"@pid":"83/9369","text":"Yanfeng Qi"},{"@pid":"12/6706","text":"Maozhi Xu"}]},"title":"A Note on Cyclic Codes from APN Functions.","venue":"CoRR","volume":"abs/1305.7294","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/TangQX13","ee":"http://arxiv.org/abs/1305.7294","url":"https://dblp.org/rec/journals/corr/TangQX13"}, "url":"URL#4256144" }, { "@score":"1", "@id":"4256526", "info":{"authors":{"author":[{"@pid":"51/8","text":"Liming Wang"},{"@pid":"22/7949","text":"Xiuling Chang"},{"@pid":"17/8100","text":"Zhongjie Ren"},{"@pid":"81/7020","text":"Haichang Gao"},{"@pid":"65/2992","text":"Xiyang Liu"},{"@pid":"35/2751","text":"Uwe Aickelin"}]},"title":"Against Spyware Using CAPTCHA in Graphical Password Scheme.","venue":"CoRR","volume":"abs/1305.7485","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/WangCRGLA13","ee":"http://arxiv.org/abs/1305.7485","url":"https://dblp.org/rec/journals/corr/WangCRGLA13"}, "url":"URL#4256526" }, { "@score":"1", "@id":"4256565", "info":{"authors":{"author":[{"@pid":"94/3104-8","text":"Ying Wang 0008"},{"@pid":"26/3810","text":"Chunhong Pan"},{"@pid":"81/6575","text":"Shiming Xiang"},{"@pid":"143/7389","text":"Feiyun Zhu"}]},"title":"Robust Hyperspectral Unmixing with Correntropy based Metric.","venue":"CoRR","volume":"abs/1305.7311","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/WangPXZ13","ee":"http://arxiv.org/abs/1305.7311","url":"https://dblp.org/rec/journals/corr/WangPXZ13"}, "url":"URL#4256565" }, { "@score":"1", "@id":"4256621", "info":{"authors":{"author":[{"@pid":"68/11467","text":"Jonathan Stuart Ward"},{"@pid":"24/1959","text":"Adam Barker"}]},"title":"Monitoring Large-Scale Cloud Systems with Layered Gossip Protocols.","venue":"CoRR","volume":"abs/1305.7403","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/WardB13b","ee":"http://arxiv.org/abs/1305.7403","url":"https://dblp.org/rec/journals/corr/WardB13b"}, "url":"URL#4256621" }, { "@score":"1", "@id":"4256661", "info":{"authors":{"author":[{"@pid":"48/5468","text":"Amanda M. Whitbrook"},{"@pid":"35/2751","text":"Uwe Aickelin"},{"@pid":"97/4637","text":"Jonathan M. Garibaldi"}]},"title":"Real-world Transfer of Evolved Artificial Immune System Behaviours between Small and Large Scale Robotic Platforms.","venue":"CoRR","volume":"abs/1305.7432","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/WhitbrookAG13","ee":"http://arxiv.org/abs/1305.7432","url":"https://dblp.org/rec/journals/corr/WhitbrookAG13"}, "url":"URL#4256661" }, { "@score":"1", "@id":"4256688", "info":{"authors":{"author":[{"@pid":"19/6719","text":"William O. Wilson"},{"@pid":"33/3213","text":"Phil Birkin"},{"@pid":"35/2751","text":"Uwe Aickelin"}]},"title":"Motif Detection Inspired by Immune Memory (JORS).","venue":"CoRR","volume":"abs/1305.7434","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/WilsonBA13","ee":"http://arxiv.org/abs/1305.7434","url":"https://dblp.org/rec/journals/corr/WilsonBA13"}, "url":"URL#4256688" }, { "@score":"1", "@id":"4256752", "info":{"authors":{"author":[{"@pid":"62/3147","text":"Feng Xia 0001"},{"@pid":"36/9359","text":"Linqiang Wang"},{"@pid":"55/7033","text":"Daqiang Zhang"},{"@pid":"29/2362","text":"Xue Zhang"},{"@pid":"29/9360","text":"Ruixia Gao"}]},"title":"Ada-MAC: An Adaptive MAC Protocol for Real-time and Reliable Health Monitoring, .","venue":"CoRR","volume":"abs/1305.7466","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/XiaWZZG13","ee":"http://arxiv.org/abs/1305.7466","url":"https://dblp.org/rec/journals/corr/XiaWZZG13"}, "url":"URL#4256752" }, { "@score":"1", "@id":"4256869", "info":{"authors":{"author":[{"@pid":"98/4848","text":"Cenk M. Yetis"},{"@pid":"01/6205-1","text":"Yong Zeng 0001"},{"@pid":"133/5256","text":"Kushal Anand"},{"@pid":"19/5809-1","text":"Yong Liang Guan 0001"},{"@pid":"06/202","text":"Erry Gunawan"}]},"title":"Sub-Stream Fairness and Numerical Correctness in MIMO Interference Channels.","venue":"CoRR","volume":"abs/1305.7323","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/YetisZAGG13a","ee":"http://arxiv.org/abs/1305.7323","url":"https://dblp.org/rec/journals/corr/YetisZAGG13a"}, "url":"URL#4256869" }, { "@score":"1", "@id":"4257015", "info":{"authors":{"author":[{"@pid":"15/4777","text":"Tao Zhang"},{"@pid":"66/340","text":"Peer-Olaf Siebers"},{"@pid":"35/2751","text":"Uwe Aickelin"}]},"title":"Modelling Electricity Consumption in Office Buildings: An Agent Based Approach.","venue":"CoRR","volume":"abs/1305.7437","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/ZhangSA13b","ee":"http://arxiv.org/abs/1305.7437","url":"https://dblp.org/rec/journals/corr/ZhangSA13b"}, "url":"URL#4257015" }, { "@score":"1", "@id":"4262483", "info":{"authors":{"author":[{"@pid":"129/1322","text":"Rozaimi Zakaria"},{"@pid":"129/1331","text":"Abd. Fatah Wahab"},{"@pid":"21/11063","text":"R. U. Gobithaasan"}]},"title":"Perfectly normal type-2 fuzzy interpolation B-spline curve","venue":"CoRR","volume":"abs/1305.0001","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-0001","ee":"http://arxiv.org/abs/1305.0001","url":"https://dblp.org/rec/journals/corr/abs-1305-0001"}, "url":"URL#4262483" }, { "@score":"1", "@id":"4262484", "info":{"authors":{"author":[{"@pid":"71/8324","text":"Balaji Lakshminarayanan"},{"@pid":"88/2483","text":"Yee Whye Teh"}]},"title":"Inferring ground truth from multi-annotator ordinal data: a probabilistic approach","venue":"CoRR","volume":"abs/1305.0015","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-0015","ee":"http://arxiv.org/abs/1305.0015","url":"https://dblp.org/rec/journals/corr/abs-1305-0015"}, "url":"URL#4262484" }, { "@score":"1", "@id":"4262485", "info":{"authors":{"author":{"@pid":"122/3040","text":"Firas A. Jassim"}},"title":"Image Compression By Embedding Five Modulus Method Into JPEG","venue":"CoRR","volume":"abs/1305.0020","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-0020","ee":"http://arxiv.org/abs/1305.0020","url":"https://dblp.org/rec/journals/corr/abs-1305-0020"}, "url":"URL#4262485" }, { "@score":"1", "@id":"4262486", "info":{"authors":{"author":{"@pid":"02/5193","text":"Mario Blaum"}},"title":"Construction of PMDS and SD Codes extending RAID 5","venue":"CoRR","volume":"abs/1305.0032","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-0032","ee":"http://arxiv.org/abs/1305.0032","url":"https://dblp.org/rec/journals/corr/abs-1305-0032"}, "url":"URL#4262486" }, { "@score":"1", "@id":"4262487", "info":{"authors":{"author":{"@pid":"29/7242","text":"Richard Gibson"}},"title":"Regret Minimization in Non-Zero-Sum Games with Applications to Building Champion Multiplayer Computer Poker Agents","venue":"CoRR","volume":"abs/1305.0034","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-0034","ee":"http://arxiv.org/abs/1305.0034","url":"https://dblp.org/rec/journals/corr/abs-1305-0034"}, "url":"URL#4262487" }, { "@score":"1", "@id":"4262488", "info":{"authors":{"author":[{"@pid":"56/7883-1","text":"Kevin S. Xu 0001"},{"@pid":"20/2373","text":"Mark Kliger"},{"@pid":"86/2531","text":"Yilun Chen"},{"@pid":"46/560","text":"Peter J. Woolf"},{"@pid":"h/AlfredOHeroIII","text":"Alfred O. Hero III"}]},"title":"Revealing social networks of spammers through spectral clustering","venue":"CoRR","volume":"abs/1305.0051","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-0051","ee":"http://arxiv.org/abs/1305.0051","url":"https://dblp.org/rec/journals/corr/abs-1305-0051"}, "url":"URL#4262488" }, { "@score":"1", "@id":"4262489", "info":{"authors":{"author":[{"@pid":"121/7973","text":"Gregory Ely"},{"@pid":"14/6374","text":"Shuchin Aeron"}]},"title":"Complexity penalized hydraulic fracture localization and moment tensor estimation under limited model information","venue":"CoRR","volume":"abs/1305.0060","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-0060","ee":"http://arxiv.org/abs/1305.0060","url":"https://dblp.org/rec/journals/corr/abs-1305-0060"}, "url":"URL#4262489" }, { "@score":"1", "@id":"4262490", "info":{"authors":{"author":[{"@pid":"61/3094","text":"Cunsheng Ding"},{"@pid":"93/1033","text":"Tor Helleseth"}]},"title":"Optimal Ternary Cyclic Codes from Monomials","venue":"CoRR","volume":"abs/1305.0061","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-0061","ee":"http://arxiv.org/abs/1305.0061","url":"https://dblp.org/rec/journals/corr/abs-1305-0061"}, "url":"URL#4262490" }, { "@score":"1", "@id":"4262491", "info":{"authors":{"author":[{"@pid":"130/3941","text":"Zeinab Taghavi"},{"@pid":"123/7942","text":"Narjes S. Movahedi"},{"@pid":"80/2440","text":"Sorin Draghici"},{"@pid":"07/7066","text":"Hamidreza Chitsaz"}]},"title":"Distilled Single Cell Genome Sequencing and De Novo Assembly for Sparse Microbial Communities","venue":"CoRR","volume":"abs/1305.0062","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-0062","ee":"http://arxiv.org/abs/1305.0062","url":"https://dblp.org/rec/journals/corr/abs-1305-0062"}, "url":"URL#4262491" }, { "@score":"1", "@id":"4262492", "info":{"authors":{"author":{"@pid":"129/1289","text":"Samuel Reid"}},"title":"On Generalizing a Temporal Formalism for Game Theory to the Asymptotic Combinatorics of S5 Modal Frames","venue":"CoRR","volume":"abs/1305.0064","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-0064","ee":"http://arxiv.org/abs/1305.0064","url":"https://dblp.org/rec/journals/corr/abs-1305-0064"}, "url":"URL#4262492" }, { "@score":"1", "@id":"4262493", "info":{"authors":{"author":[{"@pid":"14/5739-1","text":"Martin Fink 0001"},{"@pid":"98/8980","text":"Sergey Pupyrev"}]},"title":"Ordering Metro Lines by Block Crossings","venue":"CoRR","volume":"abs/1305.0069","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-0069","ee":"http://arxiv.org/abs/1305.0069","url":"https://dblp.org/rec/journals/corr/abs-1305-0069"}, "url":"URL#4262493" }, { "@score":"1", "@id":"4262494", "info":{"authors":{"author":[{"@pid":"43/1464","text":"Michal Feldman"},{"@pid":"63/5749-1","text":"David Kempe 0001"},{"@pid":"09/6191","text":"Brendan Lucier"},{"@pid":"53/1607","text":"Renato Paes Leme"}]},"title":"Pricing Public Goods for Private Sale","venue":"CoRR","volume":"abs/1305.0085","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-0085","ee":"http://arxiv.org/abs/1305.0085","url":"https://dblp.org/rec/journals/corr/abs-1305-0085"}, "url":"URL#4262494" }, { "@score":"1", "@id":"4262495", "info":{"authors":{"author":[{"@pid":"130/3998","text":"Jiyan Yang"},{"@pid":"49/10261","text":"Xiangrui Meng"},{"@pid":"10/6978","text":"Michael W. Mahoney"}]},"title":"Quantile Regression for Large-scale Applications","venue":"CoRR","volume":"abs/1305.0087","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-0087","ee":"http://arxiv.org/abs/1305.0087","url":"https://dblp.org/rec/journals/corr/abs-1305-0087"}, "url":"URL#4262495" }, { "@score":"1", "@id":"4262496", "info":{"authors":{"author":{"@pid":"l/PLescanne","text":"Pierre Lescanne"}},"title":"Bubbles are rational","venue":"CoRR","volume":"abs/1305.0101","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-0101","ee":"http://arxiv.org/abs/1305.0101","url":"https://dblp.org/rec/journals/corr/abs-1305-0101"}, "url":"URL#4262496" }, { "@score":"1", "@id":"4262497", "info":{"authors":{"author":[{"@pid":"116/2912","text":"Marthinus Christoffel du Plessis"},{"@pid":"35/1228","text":"Masashi Sugiyama"}]},"title":"Clustering Unclustered Data: Unsupervised Binary Labeling of Two Datasets Having Different Class Balances","venue":"CoRR","volume":"abs/1305.0103","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-0103","ee":"http://arxiv.org/abs/1305.0103","url":"https://dblp.org/rec/journals/corr/abs-1305-0103"}, "url":"URL#4262497" }, { "@score":"1", "@id":"4262498", "info":{"authors":{"author":[{"@pid":"e/DEppstein","text":"David Eppstein"},{"@pid":"g/MichaelTGoodrich","text":"Michael T. Goodrich"},{"@pid":"h/DanielSHirschberg","text":"Daniel S. Hirschberg"}]},"title":"Combinatorial Pair Testing: Distinguishing Workers from Slackers","venue":"CoRR","volume":"abs/1305.0110","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-0110","ee":"http://arxiv.org/abs/1305.0110","url":"https://dblp.org/rec/journals/corr/abs-1305-0110"}, "url":"URL#4262498" }, { "@score":"1", "@id":"4262499", "info":{"authors":{"author":[{"@pid":"90/1028","text":"Valérie Berthé"},{"@pid":"f/CleliadeFelice","text":"Clelia de Felice"},{"@pid":"130/3914","text":"Francesco Dolce"},{"@pid":"74/6417","text":"Dominique Perrin"},{"@pid":"13/6960","text":"Christophe Reutenauer"},{"@pid":"31/2873","text":"Giuseppina Rindone"}]},"title":"Return words in interval exchange transformations","venue":"CoRR","volume":"abs/1305.0120","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-0120","ee":"http://arxiv.org/abs/1305.0120","url":"https://dblp.org/rec/journals/corr/abs-1305-0120"}, "url":"URL#4262499" }, { "@score":"1", "@id":"4262500", "info":{"authors":{"author":[{"@pid":"65/8084","text":"Mate Boban"},{"@pid":"91/1276","text":"João Barros"},{"@pid":"96/1437","text":"Ozan K. Tonguz"}]},"title":"Geometry-Based Vehicle-to-Vehicle Channel Modeling for Large-Scale Simulation","venue":"CoRR","volume":"abs/1305.0124","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-0124","ee":"http://arxiv.org/abs/1305.0124","url":"https://dblp.org/rec/journals/corr/abs-1305-0124"}, "url":"URL#4262500" }, { "@score":"1", "@id":"4262501", "info":{"authors":{"author":[{"@pid":"90/1028","text":"Valérie Berthé"},{"@pid":"f/CleliadeFelice","text":"Clelia de Felice"},{"@pid":"130/3914","text":"Francesco Dolce"},{"@pid":"74/6417","text":"Dominique Perrin"},{"@pid":"13/6960","text":"Christophe Reutenauer"},{"@pid":"31/2873","text":"Giuseppina Rindone"}]},"title":"Bifix codes and the finite index basis property","venue":"CoRR","volume":"abs/1305.0127","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-0127","ee":"http://arxiv.org/abs/1305.0127","url":"https://dblp.org/rec/journals/corr/abs-1305-0127"}, "url":"URL#4262501" }, { "@score":"1", "@id":"4262502", "info":{"authors":{"author":{"@pid":"130/3793","text":"Gloria Lanci"}},"title":"Translating cities: the use of digital technologies in urban environments","venue":"CoRR","volume":"abs/1305.0135","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-0135","ee":"http://arxiv.org/abs/1305.0135","url":"https://dblp.org/rec/journals/corr/abs-1305-0135"}, "url":"URL#4262502" }, { "@score":"1", "@id":"4262503", "info":{"authors":{"author":[{"@pid":"n/LeeNaish","text":"Lee Naish"},{"@pid":"s/HaraldSondergaard","text":"Harald Søndergaard"}]},"title":"Truth versus information in logic programming","venue":"CoRR","volume":"abs/1305.0141","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-0141","ee":"http://arxiv.org/abs/1305.0141","url":"https://dblp.org/rec/journals/corr/abs-1305-0141"}, "url":"URL#4262503" }, { "@score":"1", "@id":"4262504", "info":{"authors":{"author":{"@pid":"06/3348","text":"Federico D. Sacerdoti"}},"title":"The Software Garden","venue":"CoRR","volume":"abs/1305.0152","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-0152","ee":"http://arxiv.org/abs/1305.0152","url":"https://dblp.org/rec/journals/corr/abs-1305-0152"}, "url":"URL#4262504" }, { "@score":"1", "@id":"4262505", "info":{"authors":{"author":[{"@pid":"56/9060","text":"Junting Chen"},{"@pid":"68/4401","text":"Vincent K. N. Lau"}]},"title":"Convergence Analysis of Mixed Timescale Cross-Layer Stochastic Optimization","venue":"CoRR","volume":"abs/1305.0153","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-0153","ee":"http://arxiv.org/abs/1305.0153","url":"https://dblp.org/rec/journals/corr/abs-1305-0153"}, "url":"URL#4262505" }, { "@score":"1", "@id":"4262506", "info":{"authors":{"author":[{"@pid":"74/5671","text":"Lilian Janin"},{"@pid":"14/4683","text":"Giovanna Rosone"},{"@pid":"24/8887","text":"Anthony J. Cox"}]},"title":"Adaptive reference-free compression of sequence quality scores","venue":"CoRR","volume":"abs/1305.0159","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-0159","ee":"http://arxiv.org/abs/1305.0159","url":"https://dblp.org/rec/journals/corr/abs-1305-0159"}, "url":"URL#4262506" }, { "@score":"1", "@id":"4262507", "info":{"authors":{"author":[{"@pid":"13/9839","text":"Markus J. Bauer"},{"@pid":"24/8887","text":"Anthony J. Cox"},{"@pid":"14/4683","text":"Giovanna Rosone"},{"@pid":"86/6093","text":"Marinella Sciortino"}]},"title":"Lightweight LCP Construction for Next-Generation Sequencing Datasets","venue":"CoRR","volume":"abs/1305.0160","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-0160","ee":"http://arxiv.org/abs/1305.0160","url":"https://dblp.org/rec/journals/corr/abs-1305-0160"}, "url":"URL#4262507" }, { "@score":"1", "@id":"4262508", "info":{"authors":{"author":[{"@pid":"41/8409","text":"Ahmad Biniaz"},{"@pid":"m/AnilMaheshwari","text":"Anil Maheshwari"},{"@pid":"35/6715","text":"Michiel H. M. Smid"}]},"title":"An Optimal Algorithm for the Euclidean Bottleneck Full Steiner Tree Problem","venue":"CoRR","volume":"abs/1305.0172","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-0172","ee":"http://arxiv.org/abs/1305.0172","url":"https://dblp.org/rec/journals/corr/abs-1305-0172"}, "url":"URL#4262508" }, { "@score":"1", "@id":"4262509", "info":{"authors":{"author":{"@pid":"63/522","text":"Amin Coja-Oghlan"}},"title":"Upper-bounding the k-colorability threshold by counting covers","venue":"CoRR","volume":"abs/1305.0177","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-0177","ee":"http://arxiv.org/abs/1305.0177","url":"https://dblp.org/rec/journals/corr/abs-1305-0177"}, "url":"URL#4262509" }, { "@score":"1", "@id":"4262510", "info":{"authors":{"author":[{"@pid":"74/6729","text":"Chiu-Wing Sham"},{"@pid":"83/6331-18","text":"Xu Chen 0018"},{"@pid":"l/FrancisChungMingLau","text":"Francis Chung-Ming Lau"},{"@pid":"48/76-11","text":"Yue Zhao 0011"},{"@pid":"15/6099","text":"Wai Man Tam"}]},"title":"A 2.0 Gb/s Throughput Decoder for QC-LDPC Convolutional Codes","venue":"CoRR","volume":"abs/1305.0185","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-0185","ee":"http://arxiv.org/abs/1305.0185","url":"https://dblp.org/rec/journals/corr/abs-1305-0185"}, "url":"URL#4262510" }, { "@score":"1", "@id":"4262511", "info":{"authors":{"author":[{"@pid":"51/8461","text":"Chantal Cherifi"},{"@pid":"06/7653","text":"Yvan Rivierre"},{"@pid":"50/6373","text":"Jean François Santucci"}]},"title":"A Community Based Algorithm for Large Scale Web Service Composition","venue":"CoRR","volume":"abs/1305.0187","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-0187","ee":"http://arxiv.org/abs/1305.0187","url":"https://dblp.org/rec/journals/corr/abs-1305-0187"}, "url":"URL#4262511" }, { "@score":"1", "@id":"4262512", "info":{"authors":{"author":[{"@pid":"51/8461","text":"Chantal Cherifi"},{"@pid":"50/6373","text":"Jean François Santucci"}]},"title":"A Comparative Study of Web Services Composition Networks","venue":"CoRR","volume":"abs/1305.0189","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-0189","ee":"http://arxiv.org/abs/1305.0189","url":"https://dblp.org/rec/journals/corr/abs-1305-0189"}, "url":"URL#4262512" }, { "@score":"1", "@id":"4262513", "info":{"authors":{"author":[{"@pid":"51/8461","text":"Chantal Cherifi"},{"@pid":"50/6373","text":"Jean François Santucci"}]},"title":"Analyzing Web Services Networks: a WS-NEXT Application","venue":"CoRR","volume":"abs/1305.0190","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-0190","ee":"http://arxiv.org/abs/1305.0190","url":"https://dblp.org/rec/journals/corr/abs-1305-0190"}, "url":"URL#4262513" }, { "@score":"1", "@id":"4262514", "info":{"authors":{"author":[{"@pid":"51/8461","text":"Chantal Cherifi"},{"@pid":"10/6591","text":"Vincent Labatut"},{"@pid":"50/6373","text":"Jean François Santucci"}]},"title":"Benefits of Semantics on Web Service Composition from a Complex Network Perspective","venue":"CoRR","volume":"abs/1305.0191","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-0191","ee":"http://arxiv.org/abs/1305.0191","url":"https://dblp.org/rec/journals/corr/abs-1305-0191"}, "url":"URL#4262514" }, { "@score":"1", "@id":"4262515", "info":{"authors":{"author":[{"@pid":"91/10307","text":"Cihan Aksoy"},{"@pid":"10/6591","text":"Vincent Labatut"},{"@pid":"51/8461","text":"Chantal Cherifi"},{"@pid":"50/6373","text":"Jean François Santucci"}]},"title":"MATAWS: A Multimodal Approach for Automatic WS Semantic Annotation","venue":"CoRR","volume":"abs/1305.0194","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-0194","ee":"http://arxiv.org/abs/1305.0194","url":"https://dblp.org/rec/journals/corr/abs-1305-0194"}, "url":"URL#4262515" }, { "@score":"1", "@id":"4262516", "info":{"authors":{"author":{"@pid":"51/8461","text":"Chantal Cherifi"}},"title":"Similartity Network For Semantic Web Services Substitution","venue":"CoRR","volume":"abs/1305.0195","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-0195","ee":"http://arxiv.org/abs/1305.0195","url":"https://dblp.org/rec/journals/corr/abs-1305-0195"}, "url":"URL#4262516" }, { "@score":"1", "@id":"4262517", "info":{"authors":{"author":[{"@pid":"51/8461","text":"Chantal Cherifi"},{"@pid":"10/6591","text":"Vincent Labatut"},{"@pid":"50/6373","text":"Jean François Santucci"}]},"title":"Topological Properties of Web Services Similarity Networks","venue":"CoRR","volume":"abs/1305.0196","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-0196","ee":"http://arxiv.org/abs/1305.0196","url":"https://dblp.org/rec/journals/corr/abs-1305-0196"}, "url":"URL#4262517" }, { "@score":"1", "@id":"4262518", "info":{"authors":{"author":[{"@pid":"130/3863","text":"Arik Nemtsov"},{"@pid":"a/AmirAverbuch","text":"Amir Averbuch"},{"@pid":"35/1270","text":"Alon Schclar"}]},"title":"Matrix Compression using the Nystroöm Method","venue":"CoRR","volume":"abs/1305.0203","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-0203","ee":"http://arxiv.org/abs/1305.0203","url":"https://dblp.org/rec/journals/corr/abs-1305-0203"}, "url":"URL#4262518" }, { "@score":"1", "@id":"4262519", "info":{"authors":{"author":[{"@pid":"130/3875","text":"Yves Berset"},{"@pid":"03/203","text":"Matús Medo"}]},"title":"The effect of the initial network configuration on preferential attachment","venue":"CoRR","volume":"abs/1305.0205","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-0205","ee":"http://arxiv.org/abs/1305.0205","url":"https://dblp.org/rec/journals/corr/abs-1305-0205"}, "url":"URL#4262519" }, { "@score":"1", "@id":"4262520", "info":{"authors":{"author":[{"@pid":"03/5448","text":"Mehryar Mohri"},{"@pid":"97/4479","text":"Afshin Rostamizadeh"}]},"title":"Perceptron Mistake Bounds","venue":"CoRR","volume":"abs/1305.0208","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-0208","ee":"http://arxiv.org/abs/1305.0208","url":"https://dblp.org/rec/journals/corr/abs-1305-0208"}, "url":"URL#4262520" }, { "@score":"1", "@id":"4262521", "info":{"authors":{"author":[{"@pid":"07/9556","text":"Aaron Gember"},{"@pid":"09/11479","text":"Anand Krishnamurthy"},{"@pid":"130/3932","text":"Saul St. John"},{"@pid":"117/4351","text":"Robert Grandl"},{"@pid":"54/5994","text":"Xiaoyang Gao"},{"@pid":"96/3486","text":"Ashok Anand"},{"@pid":"49/7538","text":"Theophilus Benson"},{"@pid":"a/AdityaAkella","text":"Aditya Akella"},{"@pid":"45/4044","text":"Vyas Sekar"}]},"title":"Stratos: A Network-Aware Orchestration Layer for Middleboxes in the Cloud","venue":"CoRR","volume":"abs/1305.0209","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-0209","ee":"http://arxiv.org/abs/1305.0209","url":"https://dblp.org/rec/journals/corr/abs-1305-0209"}, "url":"URL#4262521" }, { "@score":"1", "@id":"4262522", "info":{"authors":{"author":[{"@pid":"85/8024","text":"Akshay Krishnamurthy"},{"@pid":"36/10451","text":"James Sharpnack"},{"@pid":"64/5328","text":"Aarti Singh"}]},"title":"Recovering Graph-Structured Activations using Adaptive Compressive Measurements","venue":"CoRR","volume":"abs/1305.0213","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-0213","ee":"http://arxiv.org/abs/1305.0213","url":"https://dblp.org/rec/journals/corr/abs-1305-0213"}, "url":"URL#4262522" }, { "@score":"1", "@id":"4262523", "info":{"authors":{"author":[{"@pid":"130/4059","text":"Dina Dushnik"},{"@pid":"35/1270","text":"Alon Schclar"},{"@pid":"a/AmirAverbuch","text":"Amir Averbuch"}]},"title":"Video Segmentation via Diffusion Bases","venue":"CoRR","volume":"abs/1305.0218","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-0218","ee":"http://arxiv.org/abs/1305.0218","url":"https://dblp.org/rec/journals/corr/abs-1305-0218"}, "url":"URL#4262523" }, { "@score":"1", "@id":"4262524", "info":{"authors":{"author":[{"@pid":"68/6940","text":"Tamal Das"},{"@pid":"122/4925","text":"Marek Drogon"},{"@pid":"30/1610","text":"Admela Jukan"},{"@pid":"00/1956","text":"Marco Hoffmann"}]},"title":"An Agent-based Modeling Approach of Network Migration to New Technologies","venue":"CoRR","volume":"abs/1305.0219","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-0219","ee":"http://arxiv.org/abs/1305.0219","url":"https://dblp.org/rec/journals/corr/abs-1305-0219"}, "url":"URL#4262524" }, { "@score":"1", "@id":"4262525", "info":{"authors":{"author":[{"@pid":"127/7161","text":"Theodore Book"},{"@pid":"90/10335","text":"Martha Witick"},{"@pid":"w/DanSWallach","text":"Dan S. Wallach"}]},"title":"Automated generation of web server fingerprints","venue":"CoRR","volume":"abs/1305.0245","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-0245","ee":"http://arxiv.org/abs/1305.0245","url":"https://dblp.org/rec/journals/corr/abs-1305-0245"}, "url":"URL#4262525" }, { "@score":"1", "@id":"4262526", "info":{"authors":{"author":[{"@pid":"130/3714","text":"Nathan D. Monnig"},{"@pid":"04/762","text":"Bengt Fornberg"},{"@pid":"03/1017","text":"François G. Meyer"}]},"title":"Inverting Non-Linear Dimensionality Reduction with Scale-Free Radial Basis Interpolation","venue":"CoRR","volume":"abs/1305.0258","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-0258","ee":"http://arxiv.org/abs/1305.0258","url":"https://dblp.org/rec/journals/corr/abs-1305-0258"}, "url":"URL#4262526" }, { "@score":"1", "@id":"4262527", "info":{"authors":{"author":[{"@pid":"51/8461","text":"Chantal Cherifi"},{"@pid":"10/6591","text":"Vincent Labatut"},{"@pid":"50/6373","text":"Jean François Santucci"}]},"title":"Web Services Dependency Networks Analysis","venue":"CoRR","volume":"abs/1305.0261","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-0261","ee":"http://arxiv.org/abs/1305.0261","url":"https://dblp.org/rec/journals/corr/abs-1305-0261"}, "url":"URL#4262527" }, { "@score":"1", "@id":"4262528", "info":{"authors":{"author":{"@pid":"59/5301","text":"David I. Spivak"}},"title":"The operad of wiring diagrams: formalizing a graphical language for databases, recursion, and plug-and-play circuits","venue":"CoRR","volume":"abs/1305.0297","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-0297","ee":"http://arxiv.org/abs/1305.0297","url":"https://dblp.org/rec/journals/corr/abs-1305-0297"}, "url":"URL#4262528" }, { "@score":"1", "@id":"4262529", "info":{"authors":{"author":[{"@pid":"a/AndrewAdamatzky","text":"Andrew Adamatzky"},{"@pid":"29/6535","text":"Genaro Juárez Martínez"}]},"title":"Bio-imitaiton of Mexican migration routes to the USA with slime mould on 3D terrains","venue":"CoRR","volume":"abs/1305.0300","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-0300","ee":"http://arxiv.org/abs/1305.0300","url":"https://dblp.org/rec/journals/corr/abs-1305-0300"}, "url":"URL#4262529" }, { "@score":"1", "@id":"4262530", "info":{"authors":{"author":[{"@pid":"33/4996","text":"Richard J. Hughes"},{"@pid":"00/6837","text":"Jane E. Nordholt"},{"@pid":"130/3751","text":"Kevin P. McCabe"},{"@pid":"130/4058","text":"Raymond T. Newell"},{"@pid":"26/4983","text":"Charles G. Peterson"},{"@pid":"58/2475","text":"Rolando D. Somma"}]},"title":"Network-Centric Quantum Communications with Application to Critical Infrastructure Protection","venue":"CoRR","volume":"abs/1305.0305","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-0305","ee":"http://arxiv.org/abs/1305.0305","url":"https://dblp.org/rec/journals/corr/abs-1305-0305"}, "url":"URL#4262530" }, { "@score":"1", "@id":"4262531", "info":{"authors":{"author":[{"@pid":"53/1850","text":"Zhenyu Guo"},{"@pid":"13/3672-1","text":"Z. Jane Wang 0001"}]},"title":"An Adaptive Descriptor Design for Object Recognition in the Wild","venue":"CoRR","volume":"abs/1305.0311","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-0311","ee":"http://arxiv.org/abs/1305.0311","url":"https://dblp.org/rec/journals/corr/abs-1305-0311"}, "url":"URL#4262531" }, { "@score":"1", "@id":"4262532", "info":{"authors":{"author":[{"@pid":"99/4473","text":"Paul Tune"},{"@pid":"00/5147-4","text":"Hung X. Nguyen"},{"@pid":"72/6960","text":"Matthew Roughan"}]},"title":"Hidden Markov Model Identifiability via Tensors","venue":"CoRR","volume":"abs/1305.0321","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-0321","ee":"http://arxiv.org/abs/1305.0321","url":"https://dblp.org/rec/journals/corr/abs-1305-0321"}, "url":"URL#4262532" }, { "@score":"1", "@id":"4262533", "info":{"authors":{"author":[{"@pid":"86/8147","text":"Vladimir V. Gusev"},{"@pid":"129/1491","text":"Marina I. Maslennikova"},{"@pid":"49/4386","text":"Elena V. Pribavkina"}]},"title":"Finitely generated ideal languages and synchronizing automata","venue":"CoRR","volume":"abs/1305.0336","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-0336","ee":"http://arxiv.org/abs/1305.0336","url":"https://dblp.org/rec/journals/corr/abs-1305-0336"}, "url":"URL#4262533" }, { "@score":"1", "@id":"4262534", "info":{"authors":{"author":[{"@pid":"96/8072","text":"Adel Javanmard"},{"@pid":"83/5094","text":"Andrea Montanari"}]},"title":"Model Selection for High-Dimensional Regression under the Generalized Irrepresentability Condition","venue":"CoRR","volume":"abs/1305.0355","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-0355","ee":"http://arxiv.org/abs/1305.0355","url":"https://dblp.org/rec/journals/corr/abs-1305-0355"}, "url":"URL#4262534" }, { "@score":"1", "@id":"4262535", "info":{"authors":{"author":[{"@pid":"31/5872","text":"Mauro Femminella"},{"@pid":"31/4060","text":"Gianluca Reali"},{"@pid":"52/4271","text":"Walter Colitti"},{"@pid":"89/1935","text":"Kris Steenhaut"}]},"title":"A Markovian Model for Assessing the Consistency of Vehicular Storage Systems","venue":"CoRR","volume":"abs/1305.0356","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-0356","ee":"http://arxiv.org/abs/1305.0356","url":"https://dblp.org/rec/journals/corr/abs-1305-0356"}, "url":"URL#4262535" }, { "@score":"1", "@id":"4262536", "info":{"authors":{"author":{"@pid":"59/561","text":"Philipp Mayr 0001"}},"title":"Relevance distributions across Bradford Zones: Can Bradfordizing improve search?","venue":"CoRR","volume":"abs/1305.0357","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-0357","ee":"http://arxiv.org/abs/1305.0357","url":"https://dblp.org/rec/journals/corr/abs-1305-0357"}, "url":"URL#4262536" }, { "@score":"1", "@id":"4262537", "info":{"authors":{"author":[{"@pid":"31/5872","text":"Mauro Femminella"},{"@pid":"31/4060","text":"Gianluca Reali"},{"@pid":"130/3896","text":"Dario Valocchi"},{"@pid":"69/7883","text":"Roberto Francescangeli"},{"@pid":"s/HenningSchulzrinne","text":"Henning Schulzrinne"}]},"title":"Advanced Caching for Distributing Sensor Data through Programmable Nodes","venue":"CoRR","volume":"abs/1305.0359","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-0359","ee":"http://arxiv.org/abs/1305.0359","url":"https://dblp.org/rec/journals/corr/abs-1305-0359"}, "url":"URL#4262537" }, { "@score":"1", "@id":"4262538", "info":{"authors":{"author":[{"@pid":"93/7133-3","text":"Hai-Feng Zhang 0003"},{"@pid":"96/9827","text":"Zimo Yang"},{"@pid":"38/7254","text":"Zhi-Xi Wu"},{"@pid":"45/4425","text":"Bing-Hong Wang"},{"@pid":"98/4450-1","text":"Tao Zhou 0001"}]},"title":"Braess's Paradox in Epidemic Game: Better Condition Results in Less Payoff","venue":"CoRR","volume":"abs/1305.0361","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-0361","ee":"http://arxiv.org/abs/1305.0361","url":"https://dblp.org/rec/journals/corr/abs-1305-0361"}, "url":"URL#4262538" }, { "@score":"1", "@id":"4262539", "info":{"authors":{"author":[{"@pid":"130/3952","text":"Arezoo Aghaei Chadegani"},{"@pid":"130/4036","text":"Hadi Salehi"},{"@pid":"130/4028","text":"Melor Md. Yunus"},{"@pid":"130/4075","text":"Hadi Farhadi"},{"@pid":"130/4013","text":"Masood Fooladi"},{"@pid":"130/3722","text":"Maryam Farhadi"},{"@pid":"117/3748","text":"Nader Ale Ebrahim"}]},"title":"A Comparison between Two Main Academic Literature Collections: Web of Science and Scopus Databases","venue":"CoRR","volume":"abs/1305.0377","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-0377","ee":"http://arxiv.org/abs/1305.0377","url":"https://dblp.org/rec/journals/corr/abs-1305-0377"}, "url":"URL#4262539" }, { "@score":"1", "@id":"4262540", "info":{"authors":{"author":[{"@pid":"130/4013","text":"Masood Fooladi"},{"@pid":"130/4036","text":"Hadi Salehi"},{"@pid":"130/4028","text":"Melor Md. Yunus"},{"@pid":"130/3722","text":"Maryam Farhadi"},{"@pid":"130/3952","text":"Arezoo Aghaei Chadegani"},{"@pid":"130/4075","text":"Hadi Farhadi"},{"@pid":"117/3748","text":"Nader Ale Ebrahim"}]},"title":"Does Criticisms Overcome the Praises of Journal Impact Factor?","venue":"CoRR","volume":"abs/1305.0379","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-0379","ee":"http://arxiv.org/abs/1305.0379","url":"https://dblp.org/rec/journals/corr/abs-1305-0379"}, "url":"URL#4262540" }, { "@score":"1", "@id":"4262541", "info":{"authors":{"author":[{"@pid":"87/4995","text":"Prasanna Chaporkar"},{"@pid":"p/AlexandreProutiere","text":"Alexandre Proutière"}]},"title":"Optimal Distributed Scheduling in Wireless Networks under the SINR interference model","venue":"CoRR","volume":"abs/1305.0384","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-0384","ee":"http://arxiv.org/abs/1305.0384","url":"https://dblp.org/rec/journals/corr/abs-1305-0384"}, "url":"URL#4262541" }, { "@score":"1", "@id":"4262542", "info":{"authors":{"author":{"@pid":"c/AndrzejCichocki","text":"Andrzej Cichocki"}},"title":"Tensor Decompositions: A New Concept in Brain Data Analysis?","venue":"CoRR","volume":"abs/1305.0395","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-0395","ee":"http://arxiv.org/abs/1305.0395","url":"https://dblp.org/rec/journals/corr/abs-1305-0395"}, "url":"URL#4262542" }, { "@score":"1", "@id":"4262543", "info":{"authors":{"author":[{"@pid":"70/9784","text":"Hugo Reboredo"},{"@pid":"87/4027","text":"João M. F. Xavier"},{"@pid":"21/6763","text":"Miguel R. D. Rodrigues"}]},"title":"Filter Design with Secrecy Constraints: The MIMO Gaussian Wiretap Channel","venue":"CoRR","volume":"abs/1305.0412","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-0412","ee":"http://arxiv.org/abs/1305.0412","url":"https://dblp.org/rec/journals/corr/abs-1305-0412"}, "url":"URL#4262543" }, { "@score":"1", "@id":"4262544", "info":{"authors":{"author":[{"@pid":"50/1699","text":"Somayeh Danafar"},{"@pid":"73/7048","text":"Paola M. V. Rancoita"},{"@pid":"79/6604","text":"Tobias Glasmachers"},{"@pid":"41/11396","text":"Kevin Whittingstall"},{"@pid":"s/JurgenSchmidhuber","text":"Jürgen Schmidhuber"}]},"title":"Testing Hypotheses by Regularized Maximum Mean Discrepancy","venue":"CoRR","volume":"abs/1305.0423","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-0423","ee":"http://arxiv.org/abs/1305.0423","url":"https://dblp.org/rec/journals/corr/abs-1305-0423"}, "url":"URL#4262544" }, { "@score":"1", "@id":"4262545", "info":{"authors":{"author":[{"@pid":"56/7236","text":"Mathieu Chapelle"},{"@pid":"53/644","text":"Mathieu Liedloff"},{"@pid":"76/4573","text":"Ioan Todinca"},{"@pid":"28/6959","text":"Yngve Villanger"}]},"title":"TREEWIDTH and PATHWIDTH parameterized by vertex cover","venue":"CoRR","volume":"abs/1305.0433","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-0433","ee":"http://arxiv.org/abs/1305.0433","url":"https://dblp.org/rec/journals/corr/abs-1305-0433"}, "url":"URL#4262545" }, { "@score":"1", "@id":"4262546", "info":{"authors":{"author":{"@pid":"47/10698-2","text":"Julien Leroy 0002"}},"title":"An S-adic characterization of minimal subshifts with first difference of complexity 1 ≤ p(n+1) - p(n) ≤ 2.","venue":"CoRR","volume":"abs/1305.0434","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-0434","ee":"http://arxiv.org/abs/1305.0434","url":"https://dblp.org/rec/journals/corr/abs-1305-0434"}, "url":"URL#4262546" }, { "@score":"1", "@id":"4262547", "info":{"authors":{"author":[{"@pid":"130/4093","text":"Emily S. Darling"},{"@pid":"130/3705","text":"David Shiffman"},{"@pid":"130/3976","text":"Isabelle M. Côté"},{"@pid":"130/3745","text":"Joshua A. Drew"}]},"title":"The role of twitter in the life cycle of a scientific publication","venue":"CoRR","volume":"abs/1305.0435","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-0435","ee":"http://arxiv.org/abs/1305.0435","url":"https://dblp.org/rec/journals/corr/abs-1305-0435"}, "url":"URL#4262547" }, { "@score":"1", "@id":"4262548", "info":{"authors":{"author":[{"@pid":"00/5012","text":"Jie Zhou"},{"@pid":"87/7043","text":"Gang Yan"},{"@pid":"09/2993","text":"Choy Heng Lai"}]},"title":"Efficient routing on multilayered communication networks","venue":"CoRR","volume":"abs/1305.0438","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-0438","ee":"http://arxiv.org/abs/1305.0438","url":"https://dblp.org/rec/journals/corr/abs-1305-0438"}, "url":"URL#4262548" }, { "@score":"1", "@id":"4262549", "info":{"authors":{"author":{"@pid":"56/953","text":"Yoshua Bengio"}},"title":"Deep Learning of Representations: Looking Forward","venue":"CoRR","volume":"abs/1305.0445","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-0445","ee":"http://arxiv.org/abs/1305.0445","url":"https://dblp.org/rec/journals/corr/abs-1305-0445"}, "url":"URL#4262549" }, { "@score":"1", "@id":"4262550", "info":{"authors":{"author":[{"@pid":"83/2840","text":"Akitoshi Kawamura"},{"@pid":"c/StephenACook","text":"Stephen A. Cook"}]},"title":"Complexity Theory for Operators in Analysis","venue":"CoRR","volume":"abs/1305.0453","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-0453","ee":"http://arxiv.org/abs/1305.0453","url":"https://dblp.org/rec/journals/corr/abs-1305-0453"}, "url":"URL#4262550" }, { "@score":"1", "@id":"4262551", "info":{"authors":{"author":[{"@pid":"88/9058","text":"Giuliano Andrea Pagani"},{"@pid":"43/3220-1","text":"Marco Aiello 0001"}]},"title":"From the Grid to the Smart Grid, Topologically","venue":"CoRR","volume":"abs/1305.0458","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-0458","ee":"http://arxiv.org/abs/1305.0458","url":"https://dblp.org/rec/journals/corr/abs-1305-0458"}, "url":"URL#4262551" }, { "@score":"1", "@id":"4262552", "info":{"authors":{"author":[{"@pid":"51/8461","text":"Chantal Cherifi"},{"@pid":"50/6373","text":"Jean François Santucci"}]},"title":"On Topological Structure of Web Services Networks for Composition","venue":"CoRR","volume":"abs/1305.0467","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-0467","ee":"http://arxiv.org/abs/1305.0467","url":"https://dblp.org/rec/journals/corr/abs-1305-0467"}, "url":"URL#4262552" }, { "@score":"1", "@id":"4262553", "info":{"authors":{"author":[{"@pid":"51/8461","text":"Chantal Cherifi"},{"@pid":"50/6373","text":"Jean François Santucci"}]},"title":"Community Structure in Interaction Web Service Networks","venue":"CoRR","volume":"abs/1305.0471","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-0471","ee":"http://arxiv.org/abs/1305.0471","url":"https://dblp.org/rec/journals/corr/abs-1305-0471"}, "url":"URL#4262553" }, { "@score":"1", "@id":"4262554", "info":{"authors":{"author":[{"@pid":"130/3727","text":"A. V. Choudhari"},{"@pid":"130/3942","text":"N. A. Pande"},{"@pid":"65/6681","text":"M. R. Gupta"}]},"title":"Feasibility Analysis of Low Cost Graphical Processing Units for Electromagnetic Field Simulations by Finite Difference Time Domain Method.","venue":"CoRR","volume":"abs/1305.0483","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-0483","ee":"http://arxiv.org/abs/1305.0483","url":"https://dblp.org/rec/journals/corr/abs-1305-0483"}, "url":"URL#4262554" }, { "@score":"1", "@id":"4262555", "info":{"authors":{"author":[{"@pid":"72/4662","text":"Ruoming Jin"},{"@pid":"87/4461","text":"Guan Wang"}]},"title":"Simple, Fast, and Scalable Reachability Oracle","venue":"CoRR","volume":"abs/1305.0502","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-0502","ee":"http://arxiv.org/abs/1305.0502","url":"https://dblp.org/rec/journals/corr/abs-1305-0502"}, "url":"URL#4262555" }, { "@score":"1", "@id":"4262556", "info":{"authors":{"author":[{"@pid":"63/1078","text":"Jaemin Han"},{"@pid":"40/2614","text":"Chih-Chun Wang"},{"@pid":"67/1991","text":"Ness B. Shroff"}]},"title":"Graph-Theoretic Characterization of The Feasibility of The Precoding-Based 3-Unicast Interference Alignment Scheme","venue":"CoRR","volume":"abs/1305.0503","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-0503","ee":"http://arxiv.org/abs/1305.0503","url":"https://dblp.org/rec/journals/corr/abs-1305-0503"}, "url":"URL#4262556" }, { "@score":"1", "@id":"4262557", "info":{"authors":{"author":[{"@pid":"130/3940","text":"Matthew Babbitt"},{"@pid":"130/3823","text":"Jesse Geneson"},{"@pid":"93/2878","text":"Tanya Khovanova"}]},"title":"On k-visibility graphs","venue":"CoRR","volume":"abs/1305.0505","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-0505","ee":"http://arxiv.org/abs/1305.0505","url":"https://dblp.org/rec/journals/corr/abs-1305-0505"}, "url":"URL#4262557" }, { "@score":"1", "@id":"4262558", "info":{"authors":{"author":[{"@pid":"72/4662","text":"Ruoming Jin"},{"@pid":"02/6343","text":"Ning Ruan"},{"@pid":"93/796","text":"Bo You"},{"@pid":"w/HaixunWang","text":"Haixun Wang"}]},"title":"Hub-Accelerator: Fast and Exact Shortest Path Computation in Large Social Networks","venue":"CoRR","volume":"abs/1305.0507","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-0507","ee":"http://arxiv.org/abs/1305.0507","url":"https://dblp.org/rec/journals/corr/abs-1305-0507"}, "url":"URL#4262558" }, { "@score":"1", "@id":"4262559", "info":{"authors":{"author":[{"@pid":"43/3166-1","text":"Zhi Li 0001"},{"@pid":"65/6249","text":"Xiaoqing Zhu"},{"@pid":"96/2173","text":"Joshua Gahm"},{"@pid":"94/1243","text":"Rong Pan"},{"@pid":"67/6924","text":"Hao Hu"},{"@pid":"29/5373","text":"Ali C. Begen"},{"@pid":"69/549","text":"Dave Oran"}]},"title":"Probe and Adapt: Rate Adaptation for HTTP Video Streaming At Scale","venue":"CoRR","volume":"abs/1305.0510","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-0510","ee":"http://arxiv.org/abs/1305.0510","url":"https://dblp.org/rec/journals/corr/abs-1305-0510"}, "url":"URL#4262559" }, { "@score":"1", "@id":"4262560", "info":{"authors":{"author":[{"@pid":"49/1674","text":"Chris Whidden"},{"@pid":"57/5209","text":"Robert G. Beiko"},{"@pid":"73/3395","text":"Norbert Zeh"}]},"title":"Fixed-Parameter and Approximation Algorithms for Maximum Agreement Forests of Multifurcating Trees","venue":"CoRR","volume":"abs/1305.0512","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-0512","ee":"http://arxiv.org/abs/1305.0512","url":"https://dblp.org/rec/journals/corr/abs-1305-0512"}, "url":"URL#4262560" }, { "@score":"1", "@id":"4262561", "info":{"authors":{"author":[{"@pid":"72/4662","text":"Ruoming Jin"},{"@pid":"37/9376","text":"Yelong Shen"},{"@pid":"61/2115-1","text":"Lin Liu 0001"},{"@pid":"18/3298-1","text":"Xue-wen Chen 0001"}]},"title":"Limiting the Neighborhood: De-Small-World Network for Outbreak Prevention","venue":"CoRR","volume":"abs/1305.0513","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-0513","ee":"http://arxiv.org/abs/1305.0513","url":"https://dblp.org/rec/journals/corr/abs-1305-0513"}, "url":"URL#4262561" }, { "@score":"1", "@id":"4262562", "info":{"authors":{"author":{"@pid":"j/PetrJancar","text":"Petr Jancar"}},"title":"Finiteness up to bisimilarity is decidable for pushdown processes","venue":"CoRR","volume":"abs/1305.0516","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-0516","ee":"http://arxiv.org/abs/1305.0516","url":"https://dblp.org/rec/journals/corr/abs-1305-0516"}, "url":"URL#4262562" }, { "@score":"1", "@id":"4262563", "info":{"authors":{"author":[{"@pid":"25/9221","text":"Sushant Sachdeva"},{"@pid":"02/2229","text":"Nisheeth K. Vishnoi"}]},"title":"Matrix Inversion Is As Easy As Exponentiation","venue":"CoRR","volume":"abs/1305.0526","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-0526","ee":"http://arxiv.org/abs/1305.0526","url":"https://dblp.org/rec/journals/corr/abs-1305-0526"}, "url":"URL#4262563" }, { "@score":"1", "@id":"4262564", "info":{"authors":{"author":[{"@pid":"k/RDKleinberg","text":"Robert Kleinberg"},{"@pid":"65/782","text":"Yang Yuan"}]},"title":"On the Ratio of Revenue to Welfare in Single-Parameter Mechanism Design","venue":"CoRR","volume":"abs/1305.0534","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-0534","ee":"http://arxiv.org/abs/1305.0534","url":"https://dblp.org/rec/journals/corr/abs-1305-0534"}, "url":"URL#4262564" }, { "@score":"1", "@id":"4262565", "info":{"authors":{"author":[{"@pid":"84/594","text":"Marco Bernardo 0001"},{"@pid":"n/RDNicola","text":"Rocco De Nicola"},{"@pid":"l/MicheleLoreti","text":"Michele Loreti"}]},"title":"A Companion of "Relating Strong Behavioral Equivalences for Processes with Nondeterminism and Probabilities"","venue":"CoRR","volume":"abs/1305.0538","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-0538","ee":"http://arxiv.org/abs/1305.0538","url":"https://dblp.org/rec/journals/corr/abs-1305-0538"}, "url":"URL#4262565" }, { "@score":"1", "@id":"4262566", "info":{"authors":{"author":[{"@pid":"73/9634","text":"Shang Shang"},{"@pid":"130/4070","text":"Yuk Hui"},{"@pid":"62/1272-1","text":"Pan Hui 0001"},{"@pid":"117/8945","text":"Paul W. Cuff"},{"@pid":"52/6276","text":"Sanjeev R. Kulkarni"}]},"title":"Privacy Preserving Recommendation System Based on Groups","venue":"CoRR","volume":"abs/1305.0540","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-0540","ee":"http://arxiv.org/abs/1305.0540","url":"https://dblp.org/rec/journals/corr/abs-1305-0540"}, "url":"URL#4262566" }, { "@score":"1", "@id":"4262567", "info":{"authors":{"author":[{"@pid":"66/5185","text":"Renaud Lambiotte"},{"@pid":"78/8910","text":"Lionel Tabourier"},{"@pid":"61/1084","text":"Jean-Charles Delvenne"}]},"title":"Burstiness and spreading on temporal networks","venue":"CoRR","volume":"abs/1305.0543","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-0543","ee":"http://arxiv.org/abs/1305.0543","url":"https://dblp.org/rec/journals/corr/abs-1305-0543"}, "url":"URL#4262567" }, { "@score":"1", "@id":"4262568", "info":{"authors":{"author":{"@pid":"00/2902","text":"Anelia Somekh-Baruch"}},"title":"On Achievable Rates for Channels with Mismatched Decoding","venue":"CoRR","volume":"abs/1305.0547","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-0547","ee":"http://arxiv.org/abs/1305.0547","url":"https://dblp.org/rec/journals/corr/abs-1305-0547"}, "url":"URL#4262568" }, { "@score":"1", "@id":"4262569", "info":{"authors":{"author":[{"@pid":"04/5182","text":"David Garber"},{"@pid":"71/4705","text":"Delaram Kahrobaei"},{"@pid":"130/4025","text":"Ha T. Lam"}]},"title":"Analyzing the Length-Based Attack on Polycyclic Groups","venue":"CoRR","volume":"abs/1305.0548","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-0548","ee":"http://arxiv.org/abs/1305.0548","url":"https://dblp.org/rec/journals/corr/abs-1305-0548"}, "url":"URL#4262569" }, { "@score":"1", "@id":"4262570", "info":{"authors":{"author":{"@pid":"79/5040","text":"Matjaz Perc"}},"title":"Self-organization of progress across the century of physics","venue":"CoRR","volume":"abs/1305.0552","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-0552","ee":"http://arxiv.org/abs/1305.0552","url":"https://dblp.org/rec/journals/corr/abs-1305-0552"}, "url":"URL#4262570" }, { "@score":"1", "@id":"4262571", "info":{"authors":{"author":[{"@pid":"12/336","text":"Stephen Clark"},{"@pid":"94/5818","text":"Bob Coecke"},{"@pid":"89/9058","text":"Edward Grefenstette"},{"@pid":"86/5978","text":"Stephen Pulman"},{"@pid":"39/3325","text":"Mehrnoosh Sadrzadeh"}]},"title":"A quantum teleportation inspired algorithm produces sentence meaning from word meaning and grammatical structure","venue":"CoRR","volume":"abs/1305.0556","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-0556","ee":"http://arxiv.org/abs/1305.0556","url":"https://dblp.org/rec/journals/corr/abs-1305-0556"}, "url":"URL#4262571" }, { "@score":"1", "@id":"4262572", "info":{"authors":{"author":[{"@pid":"82/8255","text":"Changhong Zhao"},{"@pid":"12/6659","text":"Ufuk Topcu"},{"@pid":"18/3173","text":"Na Li"},{"@pid":"l/StevenHLow","text":"Steven H. Low"}]},"title":"Power System Dynamics as Primal-Dual Algorithm for Optimal Load Control","venue":"CoRR","volume":"abs/1305.0585","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-0585","ee":"http://arxiv.org/abs/1305.0585","url":"https://dblp.org/rec/journals/corr/abs-1305-0585"}, "url":"URL#4262572" }, { "@score":"1", "@id":"4262573", "info":{"authors":{"author":[{"@pid":"130/3846","text":"Taha Hassan"},{"@pid":"45/6442","text":"Fahad Javed"},{"@pid":"28/4728","text":"Naveed Arshad"}]},"title":"An Empirical Investigation of V-I Trajectory based Load Signatures for Non-Intrusive Load Monitoring","venue":"CoRR","volume":"abs/1305.0596","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-0596","ee":"http://arxiv.org/abs/1305.0596","url":"https://dblp.org/rec/journals/corr/abs-1305-0596"}, "url":"URL#4262573" }, { "@score":"1", "@id":"4262574", "info":{"authors":{"author":[{"@pid":"c/ShuchiChawla","text":"Shuchi Chawla 0001"},{"@pid":"38/6279","text":"Jason D. Hartline"},{"@pid":"73/7216","text":"David L. Malec"},{"@pid":"13/1446","text":"Balasubramanian Sivan"}]},"title":"Prior-Independent Mechanisms for Scheduling","venue":"CoRR","volume":"abs/1305.0597","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-0597","ee":"http://arxiv.org/abs/1305.0597","url":"https://dblp.org/rec/journals/corr/abs-1305-0597"}, "url":"URL#4262574" }, { "@score":"1", "@id":"4262575", "info":{"authors":{"author":[{"@pid":"74/16-1","text":"Hu Fu 0001"},{"@pid":"09/6191","text":"Brendan Lucier"},{"@pid":"13/1446","text":"Balasubramanian Sivan"},{"@pid":"32/8820","text":"Vasilis Syrgkanis"}]},"title":"Cost-Recovering Bayesian Algorithmic Mechanism Design","venue":"CoRR","volume":"abs/1305.0598","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-0598","ee":"http://arxiv.org/abs/1305.0598","url":"https://dblp.org/rec/journals/corr/abs-1305-0598"}, "url":"URL#4262575" }, { "@score":"1", "@id":"4262576", "info":{"authors":{"author":[{"@pid":"35/4574","text":"Alireza Mahdian"},{"@pid":"74/2447","text":"Richard Han 0001"},{"@pid":"11/808","text":"Qin Lv"},{"@pid":"37/3475","text":"Shivakant Mishra"}]},"title":"Results from a Practical Deployment of the MyZone Decentralized P2P Social Network","venue":"CoRR","volume":"abs/1305.0606","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-0606","ee":"http://arxiv.org/abs/1305.0606","url":"https://dblp.org/rec/journals/corr/abs-1305-0606"}, "url":"URL#4262576" }, { "@score":"1", "@id":"4262577", "info":{"authors":{"author":[{"@pid":"130/3781","text":"Redouane Sassioui"},{"@pid":"130/3987","text":"Aata El Hamss"},{"@pid":"67/7026","text":"Leszek Szczecinski"},{"@pid":"82/4787","text":"Mustapha Benjillali"}]},"title":"Resource Allocation for Downlink Channel Transmission Based on Superposition Coding","venue":"CoRR","volume":"abs/1305.0619","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-0619","ee":"http://arxiv.org/abs/1305.0619","url":"https://dblp.org/rec/journals/corr/abs-1305-0619"}, "url":"URL#4262577" }, { "@score":"1", "@id":"4262578", "info":{"authors":{"author":[{"@pid":"119/4792","text":"Kamlesh Sharma"},{"@pid":"31/2284","text":"T. V. Prasad 0001"}]},"title":"CONATION: English Command Input/Output System for Computers","venue":"CoRR","volume":"abs/1305.0625","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-0625","ee":"http://arxiv.org/abs/1305.0625","url":"https://dblp.org/rec/journals/corr/abs-1305-0625"}, "url":"URL#4262578" }, { "@score":"1", "@id":"4262579", "info":{"authors":{"author":{"@pid":"25/765","text":"Fuqiang Chen"}},"title":"An Improved EM algorithm","venue":"CoRR","volume":"abs/1305.0626","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-0626","ee":"http://arxiv.org/abs/1305.0626","url":"https://dblp.org/rec/journals/corr/abs-1305-0626"}, "url":"URL#4262579" }, { "@score":"1", "@id":"4262580", "info":{"authors":{"author":[{"@pid":"57/1785","text":"Deqing Wang"},{"@pid":"z/HuiZhang28","text":"Hui Zhang 0028"},{"@pid":"42/469-7","text":"Rui Liu 0007"},{"@pid":"15/2736","text":"Weifeng Lv"}]},"title":"Feature Selection Based on Term Frequency and T-Test for Text Categorization","venue":"CoRR","volume":"abs/1305.0638","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-0638","ee":"http://arxiv.org/abs/1305.0638","url":"https://dblp.org/rec/journals/corr/abs-1305-0638"}, "url":"URL#4262580" }, { "@score":"1", "@id":"4262581", "info":{"authors":{"author":[{"@pid":"130/3850","text":"Florian Bruse"},{"@pid":"35/5847","text":"Oliver Friedmann"},{"@pid":"181/2007-1","text":"Martin Lange"}]},"title":"Guarded Transformation for the Modal mu-Calculus","venue":"CoRR","volume":"abs/1305.0648","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-0648","ee":"http://arxiv.org/abs/1305.0648","url":"https://dblp.org/rec/journals/corr/abs-1305-0648"}, "url":"URL#4262581" }, { "@score":"1", "@id":"4262582", "info":{"authors":{"author":[{"@pid":"29/7591","text":"Laurent Bulteau"},{"@pid":"69/1771","text":"Christian Komusiewicz"}]},"title":"Minimum Common String Partition Parameterized by Partition Size is Fixed-Parameter Tractable","venue":"CoRR","volume":"abs/1305.0649","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-0649","ee":"http://arxiv.org/abs/1305.0649","url":"https://dblp.org/rec/journals/corr/abs-1305-0649"}, "url":"URL#4262582" }, { "@score":"1", "@id":"4262583", "info":{"authors":{"author":[{"@pid":"71/5482","text":"Nikola Serafimovski"},{"@pid":"71/8968","text":"Abdelhamid Younis"},{"@pid":"27/1923","text":"Raed Mesleh"},{"@pid":"129/1116","text":"Pat Chambers"},{"@pid":"88/609","text":"Marco Di Renzo"},{"@pid":"75/2596","text":"Cheng-Xiang Wang 0001"},{"@pid":"35/1547","text":"Peter M. Grant"},{"@pid":"06/4716","text":"Mark A. Beach"},{"@pid":"12/2168","text":"Harald Haas"}]},"title":"Practical Implementation of Spatial Modulation","venue":"CoRR","volume":"abs/1305.0664","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-0664","ee":"http://arxiv.org/abs/1305.0664","url":"https://dblp.org/rec/journals/corr/abs-1305-0664"}, "url":"URL#4262583" }, { "@score":"1", "@id":"4262584", "info":{"authors":{"author":{"@pid":"25/765","text":"Fuqiang Chen"}},"title":"Spectral Classification Using Restricted Boltzmann Machine","venue":"CoRR","volume":"abs/1305.0665","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-0665","ee":"http://arxiv.org/abs/1305.0665","url":"https://dblp.org/rec/journals/corr/abs-1305-0665"}, "url":"URL#4262584" }, { "@score":"1", "@id":"4262585", "info":{"authors":{"author":[{"@pid":"116/2924","text":"Ayad Ghany Ismaeel"},{"@pid":"130/3763","text":"Raghad Zuhair Yousif"},{"@pid":"130/3683","text":"Essa F. Abdallh"}]},"title":"GUI Based Automatic Remote Control of Gas Reduction System using PIC Microcontroller","venue":"CoRR","volume":"abs/1305.0668","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-0668","ee":"http://arxiv.org/abs/1305.0668","url":"https://dblp.org/rec/journals/corr/abs-1305-0668"}, "url":"URL#4262585" }, { "@score":"1", "@id":"4262586", "info":{"authors":{"author":[{"@pid":"b/JoanBoyar","text":"Joan Boyar"},{"@pid":"36/6469","text":"Sushmita Gupta"},{"@pid":"l/KimSLarsen","text":"Kim S. Larsen"}]},"title":"Relative Interval Analysis of Paging Algorithms on Access Graphs","venue":"CoRR","volume":"abs/1305.0669","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-0669","ee":"http://arxiv.org/abs/1305.0669","url":"https://dblp.org/rec/journals/corr/abs-1305-0669"}, "url":"URL#4262586" }, { "@score":"1", "@id":"4262587", "info":{"authors":{"author":[{"@pid":"116/2924","text":"Ayad Ghany Ismaeel"},{"@pid":"130/3837","text":"Sanaa Enwaya Rizqo"}]},"title":"Optimal Productivity of Succoring Patients System using Mobile GIS Based on WCF Technology","venue":"CoRR","volume":"abs/1305.0673","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-0673","ee":"http://arxiv.org/abs/1305.0673","url":"https://dblp.org/rec/journals/corr/abs-1305-0673"}, "url":"URL#4262587" }, { "@score":"1", "@id":"4262588", "info":{"authors":{"author":[{"@pid":"126/4652","text":"Julian Arz"},{"@pid":"90/834-1","text":"Johannes Fischer 0001"}]},"title":"LZ-Compressed String Dictionaries","venue":"CoRR","volume":"abs/1305.0674","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-0674","ee":"http://arxiv.org/abs/1305.0674","url":"https://dblp.org/rec/journals/corr/abs-1305-0674"}, "url":"URL#4262588" }, { "@score":"1", "@id":"4262589", "info":{"authors":{"author":[{"@pid":"51/8461","text":"Chantal Cherifi"},{"@pid":"10/6591","text":"Vincent Labatut"},{"@pid":"50/6373","text":"Jean François Santucci"}]},"title":"On Flexible Web Services Composition Networks","venue":"CoRR","volume":"abs/1305.0688","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-0688","ee":"http://arxiv.org/abs/1305.0688","url":"https://dblp.org/rec/journals/corr/abs-1305-0688"}, "url":"URL#4262589" }, { "@score":"1", "@id":"4262590", "info":{"authors":{"author":{"@pid":"h/EykeHullermeier","text":"Eyke Hüllermeier"}},"title":"Learning from Imprecise and Fuzzy Observations: Data Disambiguation through Generalized Loss Minimization","venue":"CoRR","volume":"abs/1305.0698","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-0698","ee":"http://arxiv.org/abs/1305.0698","url":"https://dblp.org/rec/journals/corr/abs-1305-0698"}, "url":"URL#4262590" }, { "@score":"1", "@id":"4262591", "info":{"authors":{"author":[{"@pid":"62/4319-1","text":"Nima Asadi 0001"},{"@pid":"00/7739","text":"Jimmy Lin"}]},"title":"Fast, Incremental Inverted Indexing in Main Memory for Web-Scale Collections","venue":"CoRR","volume":"abs/1305.0699","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-0699","ee":"http://arxiv.org/abs/1305.0699","url":"https://dblp.org/rec/journals/corr/abs-1305-0699"}, "url":"URL#4262591" }, { "@score":"1", "@id":"4262592", "info":{"authors":{"author":{"@pid":"130/4035","text":"Nina Evseenko"}},"title":"New hybrid distributed voting algorithm","venue":"CoRR","volume":"abs/1305.0711","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-0711","ee":"http://arxiv.org/abs/1305.0711","url":"https://dblp.org/rec/journals/corr/abs-1305-0711"}, "url":"URL#4262592" }, { "@score":"1", "@id":"4262593", "info":{"authors":{"author":[{"@pid":"128/8271","text":"Onur Tan"},{"@pid":"05/6552","text":"Deniz Gündüz"},{"@pid":"p/HVincentPoor","text":"H. Vincent Poor"}]},"title":"Increasing Smart Meter Privacy Through Energy Harvesting and Storage Devices","venue":"CoRR","volume":"abs/1305.0735","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-0735","ee":"http://arxiv.org/abs/1305.0735","url":"https://dblp.org/rec/journals/corr/abs-1305-0735"}, "url":"URL#4262593" }, { "@score":"1", "@id":"4262594", "info":{"authors":{"author":[{"@pid":"130/4006","text":"Philipp Kindermann"},{"@pid":"130/3750","text":"Benjamin Niedermann"},{"@pid":"99/44","text":"Ignaz Rutter"},{"@pid":"46/4811","text":"Marcus Schaefer 0001"},{"@pid":"80/1348-1","text":"André Schulz 0001"},{"@pid":"w/AlexanderWolff","text":"Alexander Wolff 0001"}]},"title":"Multi-Sided Boundary Labeling","venue":"CoRR","volume":"abs/1305.0750","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-0750","ee":"http://arxiv.org/abs/1305.0750","url":"https://dblp.org/rec/journals/corr/abs-1305-0750"}, "url":"URL#4262594" }, { "@score":"1", "@id":"4262595", "info":{"authors":{"author":{"@pid":"43/3828","text":"José M. Peña 0001"}},"title":"Marginal AMP Chain Graphs","venue":"CoRR","volume":"abs/1305.0751","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-0751","ee":"http://arxiv.org/abs/1305.0751","url":"https://dblp.org/rec/journals/corr/abs-1305-0751"}, "url":"URL#4262595" }, { "@score":"1", "@id":"4262596", "info":{"authors":{"author":[{"@pid":"128/3534","text":"Michael Hamann"},{"@pid":"99/7187","text":"Tanja Hartmann"},{"@pid":"w/DorotheaWagner","text":"Dorothea Wagner"}]},"title":"Hierarchies of Predominantly Connected Communities","venue":"CoRR","volume":"abs/1305.0757","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-0757","ee":"http://arxiv.org/abs/1305.0757","url":"https://dblp.org/rec/journals/corr/abs-1305-0757"}, "url":"URL#4262596" }, { "@score":"1", "@id":"4262597", "info":{"authors":{"author":[{"@pid":"29/9833","text":"Matthew Crossley"},{"@pid":"n/ANisbet","text":"Andy Nisbet"},{"@pid":"42/402","text":"Martyn Amos"}]},"title":"Quantifying the Impact of Parameter Tuning on Nature-Inspired Algorithms","venue":"CoRR","volume":"abs/1305.0763","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-0763","ee":"http://arxiv.org/abs/1305.0763","url":"https://dblp.org/rec/journals/corr/abs-1305-0763"}, "url":"URL#4262597" }, { "@score":"1", "@id":"4262598", "info":{"authors":{"author":[{"@pid":"29/3552","text":"Magnus Bordewich"},{"@pid":"g/CatherineSGreenhill","text":"Catherine S. Greenhill"},{"@pid":"33/2410","text":"Viresh Patel"}]},"title":"Mixing of the Glauber dynamics for the ferromagnetic Potts model","venue":"CoRR","volume":"abs/1305.0776","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-0776","ee":"http://arxiv.org/abs/1305.0776","url":"https://dblp.org/rec/journals/corr/abs-1305-0776"}, "url":"URL#4262598" }, { "@score":"1", "@id":"4262599", "info":{"authors":{"author":[{"@pid":"59/8717","text":"Jonathan D. Hauenstein"},{"@pid":"83/8775","text":"Christian Ikenmeyer"},{"@pid":"54/2884","text":"J. M. Landsberg"}]},"title":"Computer aided methods for lower bounds on the border rank","venue":"CoRR","volume":"abs/1305.0779","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-0779","ee":"http://arxiv.org/abs/1305.0779","url":"https://dblp.org/rec/journals/corr/abs-1305-0779"}, "url":"URL#4262599" }, { "@score":"1", "@id":"4262600", "info":{"authors":{"author":[{"@pid":"59/9798","text":"Daniel Dietsch"},{"@pid":"p/APodelski","text":"Andreas Podelski"},{"@pid":"86/982","text":"Jaechang Nam"},{"@pid":"52/5885","text":"Pantelis M. Papadopoulos"},{"@pid":"41/7506","text":"Martin Schäf"}]},"title":"Monitoring Student Activity in Collaborative Software Development","venue":"CoRR","volume":"abs/1305.0787","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-0787","ee":"http://arxiv.org/abs/1305.0787","url":"https://dblp.org/rec/journals/corr/abs-1305-0787"}, "url":"URL#4262600" }, { "@score":"1", "@id":"4262601", "info":{"authors":{"author":[{"@pid":"15/7256","text":"Manas Paul"},{"@pid":"32/71","text":"Jyotsna Kumar Mandal"}]},"title":"A Novel Symmetric Key Cryptographic Technique at Bit Level Based on Spiral Matrix Concept","venue":"CoRR","volume":"abs/1305.0807","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-0807","ee":"http://arxiv.org/abs/1305.0807","url":"https://dblp.org/rec/journals/corr/abs-1305-0807"}, "url":"URL#4262601" }, { "@score":"1", "@id":"4262602", "info":{"authors":{"author":[{"@pid":"116/2776","text":"Vadym Kliuchnikov"},{"@pid":"64/567","text":"Dmitri Maslov"}]},"title":"Optimization of Clifford Circuits","venue":"CoRR","volume":"abs/1305.0810","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-0810","ee":"http://arxiv.org/abs/1305.0810","url":"https://dblp.org/rec/journals/corr/abs-1305-0810"}, "url":"URL#4262602" }, { "@score":"1", "@id":"4262603", "info":{"authors":{"author":[{"@pid":"43/7418","text":"YuLong Zou"},{"@pid":"87/6482-1","text":"Xianbin Wang 0001"},{"@pid":"s/WeimingShen","text":"Weiming Shen 0001"}]},"title":"Optimal Relay Selection for Physical-Layer Security in Cooperative Wireless Networks","venue":"CoRR","volume":"abs/1305.0817","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-0817","ee":"http://arxiv.org/abs/1305.0817","url":"https://dblp.org/rec/journals/corr/abs-1305-0817"}, "url":"URL#4262603" }, { "@score":"1", "@id":"4262604", "info":{"authors":{"author":[{"@pid":"130/4055","text":"Jinchun Zhan"},{"@pid":"v/NamrataVaswani","text":"Namrata Vaswani"}]},"title":"Time Invariant Error Bounds for Modified-CS based Sparse Signal Sequence Recovery","venue":"CoRR","volume":"abs/1305.0842","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-0842","ee":"http://arxiv.org/abs/1305.0842","url":"https://dblp.org/rec/journals/corr/abs-1305-0842"}, "url":"URL#4262604" }, { "@score":"1", "@id":"4262605", "info":{"authors":{"author":[{"@pid":"o/MarisOzols","text":"Maris Ozols"},{"@pid":"317/7353-2","text":"Graeme Smith 0002"},{"@pid":"60/3047","text":"John A. Smolin"}]},"title":"Bound entangled states with secret key and their classical counterpart","venue":"CoRR","volume":"abs/1305.0848","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-0848","ee":"http://arxiv.org/abs/1305.0848","url":"https://dblp.org/rec/journals/corr/abs-1305-0848"}, "url":"URL#4262605" }, { "@score":"1", "@id":"4262606", "info":{"authors":{"author":[{"@pid":"84/7357","text":"Yossi Gilad"},{"@pid":"62/3150","text":"Amir Herzberg"},{"@pid":"94/7397","text":"Haya Schulmann"}]},"title":"Off-Path Hacking: The Illusion of Challenge-Response Authentication","venue":"CoRR","volume":"abs/1305.0854","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-0854","ee":"http://arxiv.org/abs/1305.0854","url":"https://dblp.org/rec/journals/corr/abs-1305-0854"}, "url":"URL#4262606" }, { "@score":"1", "@id":"4262607", "info":{"authors":{"author":{"@pid":"27/1075","text":"Çagdas Çalik"}},"title":"Nonlinearity Computation for Sparse Boolean Functions","venue":"CoRR","volume":"abs/1305.0860","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-0860","ee":"http://arxiv.org/abs/1305.0860","url":"https://dblp.org/rec/journals/corr/abs-1305-0860"}, "url":"URL#4262607" }, { "@score":"1", "@id":"4262608", "info":{"authors":{"author":[{"@pid":"130/3887","text":"Sarasvathi V."},{"@pid":"05/8148","text":"N. Ch. S. N. Iyengar"},{"@pid":"130/3938","text":"Snehanshu Saha"}]},"title":"Interference Aware Channel Assignmnet Using Edge Coloring in Multi-Channel Multi-Radio Wireless Mesh Networks","venue":"CoRR","volume":"abs/1305.0866","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-0866","ee":"http://arxiv.org/abs/1305.0866","url":"https://dblp.org/rec/journals/corr/abs-1305-0866"}, "url":"URL#4262608" }, { "@score":"1", "@id":"4262609", "info":{"authors":{"author":[{"@pid":"80/10703","text":"Chun Meng"},{"@pid":"122/0970","text":"Abhik Kumar Das"},{"@pid":"82/10960","text":"Abinesh Ramakrishnan"},{"@pid":"42/2660","text":"Syed Ali Jafar"},{"@pid":"82/5866","text":"Athina Markopoulou"},{"@pid":"71/2804","text":"Sriram Vishwanath"}]},"title":"Precoding-Based Network Alignment For Three Unicast Sessions","venue":"CoRR","volume":"abs/1305.0868","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-0868","ee":"http://arxiv.org/abs/1305.0868","url":"https://dblp.org/rec/journals/corr/abs-1305-0868"}, "url":"URL#4262609" }, { "@score":"1", "@id":"4262610", "info":{"authors":{"author":[{"@pid":"46/5337","text":"Sameer Pawar"},{"@pid":"53/5765","text":"Kannan Ramchandran"}]},"title":"Computing a k-sparse n-length Discrete Fourier Transform using at most 4k samples and O(k log k) complexity","venue":"CoRR","volume":"abs/1305.0870","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-0870","ee":"http://arxiv.org/abs/1305.0870","url":"https://dblp.org/rec/journals/corr/abs-1305-0870"}, "url":"URL#4262610" }, { "@score":"1", "@id":"4262611", "info":{"authors":{"author":[{"@pid":"23/1112-1","text":"Weifeng Liu 0001"},{"@pid":"35/6677","text":"Xiaomeng Wang"},{"@pid":"53/1297-1","text":"Yanjiang Wang 0001"}]},"title":"Dictionary learning based image enhancement for rarity detection","venue":"CoRR","volume":"abs/1305.0871","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-0871","ee":"http://arxiv.org/abs/1305.0871","url":"https://dblp.org/rec/journals/corr/abs-1305-0871"}, "url":"URL#4262611" }, { "@score":"1", "@id":"4262612", "info":{"authors":{"author":{"@pid":"p/RPucella","text":"Riccardo Pucella"}},"title":"Knowledge and Security","venue":"CoRR","volume":"abs/1305.0876","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-0876","ee":"http://arxiv.org/abs/1305.0876","url":"https://dblp.org/rec/journals/corr/abs-1305-0876"}, "url":"URL#4262612" }, { "@score":"1", "@id":"4262613", "info":{"authors":{"author":[{"@pid":"71/3765","text":"Hemal Shah"},{"@pid":"130/3943","text":"Yogeshwar Kosta"},{"@pid":"130/4054","text":"Vikrant Patel"}]},"title":"Characterizing and Evaluation :Temporal properties of real and synthetic datasets for DTN","venue":"CoRR","volume":"abs/1305.0896","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-0896","ee":"http://arxiv.org/abs/1305.0896","url":"https://dblp.org/rec/journals/corr/abs-1305-0896"}, "url":"URL#4262613" }, { "@score":"1", "@id":"4262614", "info":{"authors":{"author":[{"@pid":"94/5444","text":"Ursula Martin"},{"@pid":"73/2447","text":"Alison Pease"}]},"title":"Mathematical practice, crowdsourcing, and social machines","venue":"CoRR","volume":"abs/1305.0900","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-0900","ee":"http://arxiv.org/abs/1305.0900","url":"https://dblp.org/rec/journals/corr/abs-1305-0900"}, "url":"URL#4262614" }, { "@score":"1", "@id":"4262615", "info":{"authors":{"author":[{"@pid":"94/5444","text":"Ursula Martin"},{"@pid":"73/2447","text":"Alison Pease"}]},"title":"What does mathoverflow tell us about the production of mathematics?","venue":"CoRR","volume":"abs/1305.0904","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-0904","ee":"http://arxiv.org/abs/1305.0904","url":"https://dblp.org/rec/journals/corr/abs-1305-0904"}, "url":"URL#4262615" }, { "@score":"1", "@id":"4262616", "info":{"authors":{"author":{"@pid":"44/2106","text":"Mostafa H. Dahshan"}},"title":"Maximum-Bandwidth Node-Disjoint Paths","venue":"CoRR","volume":"abs/1305.0907","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-0907","ee":"http://arxiv.org/abs/1305.0907","url":"https://dblp.org/rec/journals/corr/abs-1305-0907"}, "url":"URL#4262616" }, { "@score":"1", "@id":"4262617", "info":{"authors":{"author":[{"@pid":"45/9916","text":"Luca Barletta"},{"@pid":"79/5442","text":"Flaminio Borgonovo"},{"@pid":"31/4899","text":"Matteo Cesana"}]},"title":"An Asymptotically Efficient Backlog Estimate for Dynamic Frame Aloha","venue":"CoRR","volume":"abs/1305.0909","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-0909","ee":"http://arxiv.org/abs/1305.0909","url":"https://dblp.org/rec/journals/corr/abs-1305-0909"}, "url":"URL#4262617" }, { "@score":"1", "@id":"4262618", "info":{"authors":{"author":{"@pid":"b/AMBenAmram","text":"Amir M. Ben-Amram"}},"title":"A Comment on Budach's Mouse-in-an-Octant Problem","venue":"CoRR","volume":"abs/1305.0911","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-0911","ee":"http://arxiv.org/abs/1305.0911","url":"https://dblp.org/rec/journals/corr/abs-1305-0911"}, "url":"URL#4262618" }, { "@score":"1", "@id":"4262619", "info":{"authors":{"author":[{"@pid":"56/8319","text":"Jalaluddin Qureshi"},{"@pid":"17/6484","text":"Chuan Heng Foh"},{"@pid":"83/6096","text":"Jianfei Cai 0001"}]},"title":"Primer and Recent Developments on Fountain Codes","venue":"CoRR","volume":"abs/1305.0918","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-0918","ee":"http://arxiv.org/abs/1305.0918","url":"https://dblp.org/rec/journals/corr/abs-1305-0918"}, "url":"URL#4262619" }, { "@score":"1", "@id":"4262620", "info":{"authors":{"author":[{"@pid":"130/3916","text":"M. A. Khayer Azad"},{"@pid":"28/4525","text":"Md. Shafiqul Islam"},{"@pid":"41/2962","text":"M. M. A. Hashem"}]},"title":"On Comparison between Evolutionary Programming Network-based Learning and Novel Evolution Strategy Algorithm-based Learning","venue":"CoRR","volume":"abs/1305.0922","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-0922","ee":"http://arxiv.org/abs/1305.0922","url":"https://dblp.org/rec/journals/corr/abs-1305-0922"}, "url":"URL#4262620" }, { "@score":"1", "@id":"4262621", "info":{"authors":{"author":[{"@pid":"130/3997","text":"Andrés Gomberoff"},{"@pid":"56/5491","text":"Víctor Muñoz"},{"@pid":"130/3818","text":"Pierre Paul Romagnoli"}]},"title":"The physics of custody arrangements","venue":"CoRR","volume":"abs/1305.0935","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-0935","ee":"http://arxiv.org/abs/1305.0935","url":"https://dblp.org/rec/journals/corr/abs-1305-0935"}, "url":"URL#4262621" }, { "@score":"1", "@id":"4262622", "info":{"authors":{"author":{"@pid":"130/3807","text":"Fatima Boumahdi"}},"title":"Endow a service-oriented architecture by a decisional aspect","venue":"CoRR","volume":"abs/1305.0936","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-0936","ee":"http://arxiv.org/abs/1305.0936","url":"https://dblp.org/rec/journals/corr/abs-1305-0936"}, "url":"URL#4262622" }, { "@score":"1", "@id":"4262623", "info":{"authors":{"author":[{"@pid":"83/2620","text":"Debajyoti Mukhopadhyay"},{"@pid":"16/7689","text":"Manoj Sharma"},{"@pid":"130/3762","text":"Gajanan Joshi"},{"@pid":"130/3748","text":"Trupti Pagare"},{"@pid":"130/4031","text":"Adarsha Palwe"}]},"title":"Intelligent Agent Based Semantic Web in Cloud Computing Environment","venue":"CoRR","volume":"abs/1305.0939","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-0939","ee":"http://arxiv.org/abs/1305.0939","url":"https://dblp.org/rec/journals/corr/abs-1305-0939"}, "url":"URL#4262623" }, { "@score":"1", "@id":"4262624", "info":{"authors":{"author":[{"@pid":"58/2379","text":"Piotr Faliszewski"},{"@pid":"h/EdithHemaspaandra","text":"Edith Hemaspaandra"},{"@pid":"h/LaneAHemaspaandra","text":"Lane A. Hemaspaandra"}]},"title":"Weighted Electoral Control","venue":"CoRR","volume":"abs/1305.0943","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-0943","ee":"http://arxiv.org/abs/1305.0943","url":"https://dblp.org/rec/journals/corr/abs-1305-0943"}, "url":"URL#4262624" }, { "@score":"1", "@id":"4262625", "info":{"authors":{"author":{"@pid":"49/3683","text":"Martin Haenggi"}},"title":"A Versatile Dependent Model for Heterogeneous Cellular Networks","venue":"CoRR","volume":"abs/1305.0947","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-0947","ee":"http://arxiv.org/abs/1305.0947","url":"https://dblp.org/rec/journals/corr/abs-1305-0947"}, "url":"URL#4262625" }, { "@score":"1", "@id":"4262626", "info":{"authors":{"author":{"@pid":"63/5727","text":"Iddo Tzameret"}},"title":"On Sparser Random 3SAT Refutation Algorithms and Feasible Interpolation","venue":"CoRR","volume":"abs/1305.0948","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-0948","ee":"http://arxiv.org/abs/1305.0948","url":"https://dblp.org/rec/journals/corr/abs-1305-0948"}, "url":"URL#4262626" }, { "@score":"1", "@id":"4262627", "info":{"authors":{"author":{"@pid":"05/6107","text":"Grenville J. Croll"}},"title":"BiEntropy - The Approximate Entropy of a Finite Binary String","venue":"CoRR","volume":"abs/1305.0954","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-0954","ee":"http://arxiv.org/abs/1305.0954","url":"https://dblp.org/rec/journals/corr/abs-1305-0954"}, "url":"URL#4262627" }, { "@score":"1", "@id":"4262628", "info":{"authors":{"author":[{"@pid":"129/1231","text":"Russell Ford"},{"@pid":"56/1846","text":"Changkyu Kim"},{"@pid":"36/6881","text":"Sundeep Rangan"}]},"title":"Opportunistic Third-Party Backhaul for Cellular Wireless Networks","venue":"CoRR","volume":"abs/1305.0958","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-0958","ee":"http://arxiv.org/abs/1305.0958","url":"https://dblp.org/rec/journals/corr/abs-1305-0958"}, "url":"URL#4262628" }, { "@score":"1", "@id":"4262629", "info":{"authors":{"author":[{"@pid":"43/6856","text":"William Graham Hoover"},{"@pid":"34/4324","text":"Carol Griswold Hoover"}]},"title":"Time-Reversible Random Number Generators : Solution of Our Challenge by Federico Ricci-Tersenghi","venue":"CoRR","volume":"abs/1305.0961","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-0961","ee":"http://arxiv.org/abs/1305.0961","url":"https://dblp.org/rec/journals/corr/abs-1305-0961"}, "url":"URL#4262629" }, { "@score":"1", "@id":"4262630", "info":{"authors":{"author":[{"@pid":"79/2361","text":"Rida Laraki"},{"@pid":"49/6721","text":"Panayotis Mertikopoulos"}]},"title":"Inertial game dynamics and applications to constrained optimization","venue":"CoRR","volume":"abs/1305.0967","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-0967","ee":"http://arxiv.org/abs/1305.0967","url":"https://dblp.org/rec/journals/corr/abs-1305-0967"}, "url":"URL#4262630" }, { "@score":"1", "@id":"4262631", "info":{"authors":{"author":{"@pid":"48/2168","text":"Yuan Zhang"}},"title":"Optimization Approach to Parametric Tuning of Power System Stabilizer Based on Trajectory Sensitivity Analysis","venue":"CoRR","volume":"abs/1305.0978","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-0978","ee":"http://arxiv.org/abs/1305.0978","url":"https://dblp.org/rec/journals/corr/abs-1305-0978"}, "url":"URL#4262631" }, { "@score":"1", "@id":"4262632", "info":{"authors":{"author":[{"@pid":"115/6940","text":"Charith Perera"},{"@pid":"z/ArkadyBZaslavsky","text":"Arkady B. Zaslavsky"},{"@pid":"c/PeterChristen","text":"Peter Christen"},{"@pid":"82/2760","text":"Dimitrios Georgakopoulos 0001"}]},"title":"Context Aware Computing for The Internet of Things: A Survey","venue":"CoRR","volume":"abs/1305.0982","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-0982","ee":"http://arxiv.org/abs/1305.0982","url":"https://dblp.org/rec/journals/corr/abs-1305-0982"}, "url":"URL#4262632" }, { "@score":"1", "@id":"4262633", "info":{"authors":{"author":[{"@pid":"45/8333","text":"Sun Sun"},{"@pid":"61/1489-1","text":"Min Dong 0001"},{"@pid":"86/2829","text":"Ben Liang 0001"}]},"title":"Real-Time Welfare-Maximizing Regulation Allocation in Dynamic Aggregator-EVs System","venue":"CoRR","volume":"abs/1305.0983","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-0983","ee":"http://arxiv.org/abs/1305.0983","url":"https://dblp.org/rec/journals/corr/abs-1305-0983"}, "url":"URL#4262633" }, { "@score":"1", "@id":"4262634", "info":{"authors":{"author":[{"@pid":"73/4861","text":"Ji Won Yoon"},{"@pid":"08/4223","text":"Nial Friel"}]},"title":"Efficient Estimation of the number of neighbours in Probabilistic K Nearest Neighbour Classification","venue":"CoRR","volume":"abs/1305.1002","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-1002","ee":"http://arxiv.org/abs/1305.1002","url":"https://dblp.org/rec/journals/corr/abs-1305-1002"}, "url":"URL#4262634" }, { "@score":"1", "@id":"4262635", "info":{"authors":{"author":{"@pid":"130/3756","text":"Geoffroy Ville"}},"title":"An Optimal Mastermind (4,7) Strategy and More Results in the Expected Case","venue":"CoRR","volume":"abs/1305.1010","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-1010","ee":"http://arxiv.org/abs/1305.1010","url":"https://dblp.org/rec/journals/corr/abs-1305-1010"}, "url":"URL#4262635" }, { "@score":"1", "@id":"4262636", "info":{"authors":{"author":[{"@pid":"68/4401","text":"Vincent K. N. Lau"},{"@pid":"21/3626-16","text":"Fan Zhang 0016"},{"@pid":"67/5781-1","text":"Ying Cui 0001"}]},"title":"Low Complexity Delay-Constrained Beamforming for Multi-User MIMO Systems with Imperfect CSIT","venue":"CoRR","volume":"abs/1305.1012","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-1012","ee":"http://arxiv.org/abs/1305.1012","url":"https://dblp.org/rec/journals/corr/abs-1305-1012"}, "url":"URL#4262636" }, { "@score":"1", "@id":"4262637", "info":{"authors":{"author":[{"@pid":"70/5481","text":"Andris Ambainis"},{"@pid":"75/8158","text":"Kaspars Balodis"},{"@pid":"77/9496","text":"Janis Iraids"},{"@pid":"18/5561","text":"Raitis Ozols"},{"@pid":"73/2835","text":"Juris Smotrovs"}]},"title":"Parameterized Quantum Query Complexity of Graph Collision","venue":"CoRR","volume":"abs/1305.1021","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-1021","ee":"http://arxiv.org/abs/1305.1021","url":"https://dblp.org/rec/journals/corr/abs-1305-1021"}, "url":"URL#4262637" }, { "@score":"1", "@id":"4262638", "info":{"authors":{"author":[{"@pid":"130/4002","text":"Ahmed Drissi"},{"@pid":"130/4030","text":"Ahmed Asimi"}]},"title":"A New Approch to Decoding of Rational Irreducible Goppa code","venue":"CoRR","volume":"abs/1305.1022","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-1022","ee":"http://arxiv.org/abs/1305.1022","url":"https://dblp.org/rec/journals/corr/abs-1305-1022"}, "url":"URL#4262638" }, { "@score":"1", "@id":"4262639", "info":{"authors":{"author":[{"@pid":"32/8036","text":"Mohammad Gheshlaghi Azar"},{"@pid":"36/321","text":"Alessandro Lazaric"},{"@pid":"27/1277","text":"Emma Brunskill"}]},"title":"Regret Bounds for Reinforcement Learning with Policy Advice","venue":"CoRR","volume":"abs/1305.1027","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-1027","ee":"http://arxiv.org/abs/1305.1027","url":"https://dblp.org/rec/journals/corr/abs-1305-1027"}, "url":"URL#4262639" }, { "@score":"1", "@id":"4262640", "info":{"authors":{"author":{"@pid":"39/698","text":"Ting-Li Chen"}},"title":"On the Convergence and Consistency of the Blurring Mean-Shift Process","venue":"CoRR","volume":"abs/1305.1040","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-1040","ee":"http://arxiv.org/abs/1305.1040","url":"https://dblp.org/rec/journals/corr/abs-1305-1040"}, "url":"URL#4262640" }, { "@score":"1", "@id":"4262641", "info":{"authors":{"author":[{"@pid":"130/0852","text":"Andrea Mercurio"},{"@pid":"07/7722-1","text":"Alessandro Di Giorgio 0001"},{"@pid":"130/3758","text":"Fabio Purificato"}]},"title":"Optimal Fully Electric Vehicle load balancing with an ADMM algorithm in Smartgrids","venue":"CoRR","volume":"abs/1305.1044","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-1044","ee":"http://arxiv.org/abs/1305.1044","url":"https://dblp.org/rec/journals/corr/abs-1305-1044"}, "url":"URL#4262641" }, { "@score":"1", "@id":"4262642", "info":{"authors":{"author":[{"@pid":"126/5099","text":"Firas Ajil Jassim"},{"@pid":"130/3710","text":"Fawzi H. Altaani"}]},"title":"Hybridization of Otsu Method and Median Filter for Color Image Segmentation","venue":"CoRR","volume":"abs/1305.1052","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-1052","ee":"http://arxiv.org/abs/1305.1052","url":"https://dblp.org/rec/journals/corr/abs-1305-1052"}, "url":"URL#4262642" }, { "@score":"1", "@id":"4262643", "info":{"authors":{"author":[{"@pid":"129/1290","text":"Jaroslav Horácek"},{"@pid":"87/5451","text":"Milan Hladík"}]},"title":"Subsquares Approach - Simple Scheme for Solving Overdetermined Interval Linear Systems","venue":"CoRR","volume":"abs/1305.1059","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-1059","ee":"http://arxiv.org/abs/1305.1059","url":"https://dblp.org/rec/journals/corr/abs-1305-1059"}, "url":"URL#4262643" }, { "@score":"1", "@id":"4262644", "info":{"authors":{"author":[{"@pid":"g/LauraGiordano1","text":"Laura Giordano 0001"},{"@pid":"02/725","text":"Valentina Gliozzi"},{"@pid":"o/NicolaOlivetti","text":"Nicola Olivetti"},{"@pid":"72/5211","text":"Gian Luca Pozzato"}]},"title":"On Rational Closure in Description Logics of Typicality","venue":"CoRR","volume":"abs/1305.1060","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-1060","ee":"http://arxiv.org/abs/1305.1060","url":"https://dblp.org/rec/journals/corr/abs-1305-1060"}, "url":"URL#4262644" }, { "@score":"1", "@id":"4262645", "info":{"authors":{"author":[{"@pid":"90/8335","text":"Shahriar Etemadi Tajbakhsh"},{"@pid":"28/2887","text":"Parastoo Sadeghi"}]},"title":"Random Linear Network Codes for Secrecy over Wireless Broadcast Channels","venue":"CoRR","volume":"abs/1305.1082","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-1082","ee":"http://arxiv.org/abs/1305.1082","url":"https://dblp.org/rec/journals/corr/abs-1305-1082"}, "url":"URL#4262645" }, { "@score":"1", "@id":"4262646", "info":{"authors":{"author":[{"@pid":"59/3959","text":"Olav Geil"},{"@pid":"116/5236","text":"Stefano Martin"}]},"title":"Further improvements on the Feng-Rao bound for dual codes","venue":"CoRR","volume":"abs/1305.1091","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-1091","ee":"http://arxiv.org/abs/1305.1091","url":"https://dblp.org/rec/journals/corr/abs-1305-1091"}, "url":"URL#4262646" }, { "@score":"1", "@id":"4262647", "info":{"authors":{"author":[{"@pid":"127/7315","text":"Luis I. Reyes Castro"},{"@pid":"21/9322","text":"Pratik Chaudhari"},{"@pid":"21/2684","text":"Jana Tumova"},{"@pid":"45/1718","text":"Sertac Karaman"},{"@pid":"78/2284","text":"Emilio Frazzoli"},{"@pid":"r/DanielaRus","text":"Daniela Rus"}]},"title":"Incremental Sampling-based Algorithm for Minimum-violation Motion Planning","venue":"CoRR","volume":"abs/1305.1102","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-1102","ee":"http://arxiv.org/abs/1305.1102","url":"https://dblp.org/rec/journals/corr/abs-1305-1102"}, "url":"URL#4262647" }, { "@score":"1", "@id":"4262648", "info":{"authors":{"author":{"@pid":"70/8238","text":"Tommaso Urli"}},"title":"json2run: a tool for experiment design & analysis","venue":"CoRR","volume":"abs/1305.1112","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-1112","ee":"http://arxiv.org/abs/1305.1112","url":"https://dblp.org/rec/journals/corr/abs-1305-1112"}, "url":"URL#4262648" }, { "@score":"1", "@id":"4262649", "info":{"authors":{"author":{"@pid":"45/11240-1","text":"Djallel Bouneffouf 0001"}},"title":"Towards User Profile Modelling in Recommender System","venue":"CoRR","volume":"abs/1305.1114","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-1114","ee":"http://arxiv.org/abs/1305.1114","url":"https://dblp.org/rec/journals/corr/abs-1305-1114"}, "url":"URL#4262649" }, { "@score":"1", "@id":"4262650", "info":{"authors":{"author":[{"@pid":"03/8396","text":"Coco Krumme"},{"@pid":"120/7352","text":"Alejandro Llorente"},{"@pid":"c/ManuelCebrian","text":"Manuel Cebrián"},{"@pid":"p/AlexPentland","text":"Alex Pentland"},{"@pid":"122/2977","text":"Esteban Moro Egido"}]},"title":"The predictability of consumer visitation patterns","venue":"CoRR","volume":"abs/1305.1120","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-1120","ee":"http://arxiv.org/abs/1305.1120","url":"https://dblp.org/rec/journals/corr/abs-1305-1120"}, "url":"URL#4262650" }, { "@score":"1", "@id":"4262651", "info":{"authors":{"author":[{"@pid":"69/2158","text":"John Augustine"},{"@pid":"12/10827","text":"Anisur Rahaman Molla"},{"@pid":"87/5169","text":"Ehab Morsy"},{"@pid":"p/GopalPandurangan","text":"Gopal Pandurangan"},{"@pid":"06/5220-2","text":"Peter Robinson 0002"},{"@pid":"u/EliUpfal","text":"Eli Upfal"}]},"title":"Storage and Search in Dynamic Peer-to-Peer Networks","venue":"CoRR","volume":"abs/1305.1121","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-1121","ee":"http://arxiv.org/abs/1305.1121","url":"https://dblp.org/rec/journals/corr/abs-1305-1121"}, "url":"URL#4262651" }, { "@score":"1", "@id":"4262652", "info":{"authors":{"author":[{"@pid":"59/6763","text":"Urmila Shrawankar"},{"@pid":"26/2161","text":"Vilas M. Thakare"}]},"title":"Acoustic Echo Cancellation Postfilter Design Issues For Speech Recognition System","venue":"CoRR","volume":"abs/1305.1141","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-1141","ee":"http://arxiv.org/abs/1305.1141","url":"https://dblp.org/rec/journals/corr/abs-1305-1141"}, "url":"URL#4262652" }, { "@score":"1", "@id":"4262653", "info":{"authors":{"author":[{"@pid":"59/6763","text":"Urmila Shrawankar"},{"@pid":"26/2161","text":"Vilas M. Thakare"}]},"title":"Techniques for Feature Extraction In Speech Recognition System : A Comparative Study","venue":"CoRR","volume":"abs/1305.1145","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-1145","ee":"http://arxiv.org/abs/1305.1145","url":"https://dblp.org/rec/journals/corr/abs-1305-1145"}, "url":"URL#4262653" }, { "@score":"1", "@id":"4262654", "info":{"authors":{"author":[{"@pid":"72/2314","text":"Daoshun Wang"},{"@pid":"130/4057","text":"Ziwei Ye"},{"@pid":"l/XiaoboLi-1","text":"Xiaobo Li 0001"}]},"title":"How to Collaborate between Threshold Schemes","venue":"CoRR","volume":"abs/1305.1146","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-1146","ee":"http://arxiv.org/abs/1305.1146","url":"https://dblp.org/rec/journals/corr/abs-1305-1146"}, "url":"URL#4262654" }, { "@score":"1", "@id":"4262655", "info":{"authors":{"author":{"@pid":"84/3300","text":"Darko Dimitrov"}},"title":"Efficient computation of trees with minimal atom-bond connectivity index","venue":"CoRR","volume":"abs/1305.1155","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-1155","ee":"http://arxiv.org/abs/1305.1155","url":"https://dblp.org/rec/journals/corr/abs-1305-1155"}, "url":"URL#4262655" }, { "@score":"1", "@id":"4262656", "info":{"authors":{"author":[{"@pid":"129/6546","text":"Timo Bingmann"},{"@pid":"s/PeterSanders","text":"Peter Sanders 0001"}]},"title":"Parallel String Sample Sort","venue":"CoRR","volume":"abs/1305.1157","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-1157","ee":"http://arxiv.org/abs/1305.1157","url":"https://dblp.org/rec/journals/corr/abs-1305-1157"}, "url":"URL#4262656" }, { "@score":"1", "@id":"4262657", "info":{"authors":{"author":[{"@pid":"57/3718","text":"Lucas Paletta"},{"@pid":"128/9380","text":"Katrin Santner"},{"@pid":"81/6118","text":"Gerald Fritz"},{"@pid":"10/9514","text":"Albert Hofmann"},{"@pid":"130/3738","text":"Gerald Lodron"},{"@pid":"39/5547","text":"Georg Thallinger"},{"@pid":"81/4623","text":"Heinz Mayer"}]},"title":"A Computer Vision System for Attention Mapping in SLAM based 3D Models","venue":"CoRR","volume":"abs/1305.1163","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-1163","ee":"http://arxiv.org/abs/1305.1163","url":"https://dblp.org/rec/journals/corr/abs-1305-1163"}, "url":"URL#4262657" }, { "@score":"1", "@id":"4262658", "info":{"authors":{"author":[{"@pid":"49/8816","text":"Mostepha Redouane Khouadjia"},{"@pid":"67/5235","text":"Marc Schoenauer"},{"@pid":"09/5817-1","text":"Vincent Vidal 0001"},{"@pid":"03/2344","text":"Johann Dréo"},{"@pid":"02/5876","text":"Pierre Savéant"}]},"title":"Multi-Objective AI Planning: Comparing Aggregation and Pareto Approaches","venue":"CoRR","volume":"abs/1305.1169","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-1169","ee":"http://arxiv.org/abs/1305.1169","url":"https://dblp.org/rec/journals/corr/abs-1305-1169"}, "url":"URL#4262658" }, { "@score":"1", "@id":"4262659", "info":{"authors":{"author":[{"@pid":"83/4438","text":"Frédéric Chazal"},{"@pid":"68/4942-2","text":"Jian Sun 0002"}]},"title":"Gromov-Hausdorff Approximation of Metric Spaces with Linear Structure","venue":"CoRR","volume":"abs/1305.1172","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-1172","ee":"http://arxiv.org/abs/1305.1172","url":"https://dblp.org/rec/journals/corr/abs-1305-1172"}, "url":"URL#4262659" }, { "@score":"1", "@id":"4262660", "info":{"authors":{"author":[{"@pid":"78/6764","text":"Lazaros K. Gallos"},{"@pid":"130/3849","text":"Fabricio Q. Potiguar"},{"@pid":"92/5186","text":"José S. Andrade Jr."},{"@pid":"65/1138","text":"Hernán A. Makse"}]},"title":"IMDB network revisited: unveiling fractal and modular properties from a typical small-world network","venue":"CoRR","volume":"abs/1305.1175","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-1175","ee":"http://arxiv.org/abs/1305.1175","url":"https://dblp.org/rec/journals/corr/abs-1305-1175"}, "url":"URL#4262660" }, { "@score":"1", "@id":"4262661", "info":{"authors":{"author":[{"@pid":"19/6116","text":"Jiri Filipovic"},{"@pid":"08/10872","text":"Matus Madzin"},{"@pid":"98/9282","text":"Jan Fousek"},{"@pid":"65/6662","text":"Ludek Matyska"}]},"title":"Optimizing CUDA Code By Kernel Fusion---Application on BLAS","venue":"CoRR","volume":"abs/1305.1183","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-1183","ee":"http://arxiv.org/abs/1305.1183","url":"https://dblp.org/rec/journals/corr/abs-1305-1183"}, "url":"URL#4262661" }, { "@score":"1", "@id":"4262662", "info":{"authors":{"author":[{"@pid":"121/8887","text":"Mohammad Reza Khanzadi"},{"@pid":"130/3701","text":"Dan Kuylenstierna"},{"@pid":"64/2235","text":"Thomas Eriksson"},{"@pid":"35/9747","text":"Herbert Zirath"}]},"title":"Calculation of the Performance of Communication Systems from Measured Oscillator Phase Noise","venue":"CoRR","volume":"abs/1305.1187","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-1187","ee":"http://arxiv.org/abs/1305.1187","url":"https://dblp.org/rec/journals/corr/abs-1305-1187"}, "url":"URL#4262662" }, { "@score":"1", "@id":"4262663", "info":{"authors":{"author":{"@pid":"81/10358","text":"Thomas Feulner"}},"title":"Canonical Forms and Automorphisms in the Projective Space","venue":"CoRR","volume":"abs/1305.1193","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-1193","ee":"http://arxiv.org/abs/1305.1193","url":"https://dblp.org/rec/journals/corr/abs-1305-1193"}, "url":"URL#4262663" }, { "@score":"1", "@id":"4262664", "info":{"authors":{"author":{"@pid":"123/2116","text":"Leslie N. Smith"}},"title":"How to find real-world applications for compressive sensing","venue":"CoRR","volume":"abs/1305.1199","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-1199","ee":"http://arxiv.org/abs/1305.1199","url":"https://dblp.org/rec/journals/corr/abs-1305-1199"}, "url":"URL#4262664" }, { "@score":"1", "@id":"4262665", "info":{"authors":{"author":[{"@pid":"21/4997","text":"Juan Cardelino"},{"@pid":"98/482","text":"Vicent Caselles"},{"@pid":"29/1455","text":"Marcelo Bertalmío"},{"@pid":"31/2874","text":"Gregory Randall"}]},"title":"A Contrario Selection of Optimal Partitions for Image Segmentation","venue":"CoRR","volume":"abs/1305.1206","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-1206","ee":"http://arxiv.org/abs/1305.1206","url":"https://dblp.org/rec/journals/corr/abs-1305-1206"}, "url":"URL#4262665" }, { "@score":"1", "@id":"4262666", "info":{"authors":{"author":[{"@pid":"127/7542","text":"Fabrizio Lecci"},{"@pid":"75/5558","text":"Alessandro Rinaldo"},{"@pid":"89/1660","text":"Larry A. Wasserman"}]},"title":"Statistical Analysis of Metric Graph Reconstruction","venue":"CoRR","volume":"abs/1305.1212","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-1212","ee":"http://arxiv.org/abs/1305.1212","url":"https://dblp.org/rec/journals/corr/abs-1305-1212"}, "url":"URL#4262666" }, { "@score":"1", "@id":"4262667", "info":{"authors":{"author":[{"@pid":"117/3727","text":"Nicolás Robinson-García"},{"@pid":"22/8982","text":"Jose G. Moreno-Torres"},{"@pid":"12/7259","text":"Daniel Torres-Salinas"},{"@pid":"18/8508","text":"Emilio Delgado López-Cózar"},{"@pid":"04/0","text":"Francisco Herrera"}]},"title":"The role of national university rankings in an international context: the case of the I-UGR Rankings of Spanish universities","venue":"CoRR","volume":"abs/1305.1216","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-1216","ee":"http://arxiv.org/abs/1305.1216","url":"https://dblp.org/rec/journals/corr/abs-1305-1216"}, "url":"URL#4262667" }, { "@score":"1", "@id":"4262668", "info":{"authors":{"author":[{"@pid":"02/5193","text":"Mario Blaum"},{"@pid":"07/3005","text":"James S. Plank"}]},"title":"Construction of two SD Codes","venue":"CoRR","volume":"abs/1305.1221","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-1221","ee":"http://arxiv.org/abs/1305.1221","url":"https://dblp.org/rec/journals/corr/abs-1305-1221"}, "url":"URL#4262668" }, { "@score":"1", "@id":"4262669", "info":{"authors":{"author":{"@pid":"t/JLTraff","text":"Jesper Larsson Träff"}},"title":"A Note on (Parallel) Depth- and Breadth-First Search by Arc Elimination","venue":"CoRR","volume":"abs/1305.1222","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-1222","ee":"http://arxiv.org/abs/1305.1222","url":"https://dblp.org/rec/journals/corr/abs-1305-1222"}, "url":"URL#4262669" }, { "@score":"1", "@id":"4262670", "info":{"authors":{"author":[{"@pid":"64/8128","text":"Farzad Rezaei"},{"@pid":"25/6012","text":"Charalambos D. Charalambous"},{"@pid":"33/8135","text":"Photios A. Stavrou"}]},"title":"Rate Distortion Function for a Class of Relative Entropy Sources","venue":"CoRR","volume":"abs/1305.1230","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-1230","ee":"http://arxiv.org/abs/1305.1230","url":"https://dblp.org/rec/journals/corr/abs-1305-1230"}, "url":"URL#4262670" }, { "@score":"1", "@id":"4262671", "info":{"authors":{"author":[{"@pid":"74/10957","text":"Alessandro Mirone"},{"@pid":"48/6605","text":"Emmanuel Brun"},{"@pid":"130/3958","text":"Paola Coan"}]},"title":"A Convex Functional for Image Denoising based on Patches with Constrained Overlaps and its vectorial application to Low Dose Differential Phase Tomography.","venue":"CoRR","volume":"abs/1305.1256","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-1256","ee":"http://arxiv.org/abs/1305.1256","url":"https://dblp.org/rec/journals/corr/abs-1305-1256"}, "url":"URL#4262671" }, { "@score":"1", "@id":"4262672", "info":{"authors":{"author":[{"@pid":"130/3937","text":"Edwin Chobot"},{"@pid":"130/3996","text":"Daniel Newby"},{"@pid":"130/3744","text":"Renee Chandler"},{"@pid":"130/4047","text":"Nusaybah Abu-Mulaweh"},{"@pid":"66/3019-1","text":"Chao Chen 0001"},{"@pid":"47/3176","text":"Carlos A. Pomalaza-Raez"}]},"title":"Design and Implementation of a Wireless Sensor and Actuator Network for Energy Measurement and Control at Home","venue":"CoRR","volume":"abs/1305.1259","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-1259","ee":"http://arxiv.org/abs/1305.1259","url":"https://dblp.org/rec/journals/corr/abs-1305-1259"}, "url":"URL#4262672" }, { "@score":"1", "@id":"4262673", "info":{"authors":{"author":[{"@pid":"84/6250","text":"Bernard C. Levy"},{"@pid":"85/10821","text":"Mattia Zorzi"}]},"title":"A Contraction Analysis of the Convergence of Risk-Sensitive Filters","venue":"CoRR","volume":"abs/1305.1268","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-1268","ee":"http://arxiv.org/abs/1305.1268","url":"https://dblp.org/rec/journals/corr/abs-1305-1268"}, "url":"URL#4262673" }, { "@score":"1", "@id":"4262674", "info":{"authors":{"author":[{"@pid":"130/3834","text":"Grasha Jacob"},{"@pid":"36/9561","text":"A. Murugan"}]},"title":"An Encryption Scheme with DNA Technology and JPEG Zigzag Coding for Secure Transmission of Images","venue":"CoRR","volume":"abs/1305.1270","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-1270","ee":"http://arxiv.org/abs/1305.1270","url":"https://dblp.org/rec/journals/corr/abs-1305-1270"}, "url":"URL#4262674" }, { "@score":"1", "@id":"4262675", "info":{"authors":{"author":[{"@pid":"67/8089","text":"Attila Szolnoki"},{"@pid":"79/5040","text":"Matjaz Perc"}]},"title":"Decelerated invasion and waning moon patterns in public goods games with delayed distribution","venue":"CoRR","volume":"abs/1305.1288","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-1288","ee":"http://arxiv.org/abs/1305.1288","url":"https://dblp.org/rec/journals/corr/abs-1305-1288"}, "url":"URL#4262675" }, { "@score":"1", "@id":"4262676", "info":{"authors":{"author":[{"@pid":"58/10532","text":"Xiang Ying"},{"@pid":"72/3380","text":"Shi-Qing Xin"},{"@pid":"h/YingHe1","text":"Ying He 0001"}]},"title":"Parallel Chen-Han (PCH) Algorithm for Discrete Geodesics","venue":"CoRR","volume":"abs/1305.1293","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-1293","ee":"http://arxiv.org/abs/1305.1293","url":"https://dblp.org/rec/journals/corr/abs-1305-1293"}, "url":"URL#4262676" }, { "@score":"1", "@id":"4262677", "info":{"authors":{"author":[{"@pid":"d/MartinDietzfelbinger","text":"Martin Dietzfelbinger"},{"@pid":"w/PhilippWoelfel","text":"Philipp Woelfel"}]},"title":"Tight Lower Bounds for Greedy Routing in Higher-Dimensional Small-World Grids","venue":"CoRR","volume":"abs/1305.1295","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-1295","ee":"http://arxiv.org/abs/1305.1295","url":"https://dblp.org/rec/journals/corr/abs-1305-1295"}, "url":"URL#4262677" }, { "@score":"1", "@id":"4262678", "info":{"authors":{"author":[{"@pid":"39/5799","text":"David Bamman"},{"@pid":"90/5204","text":"Noah A. Smith"}]},"title":"New Alignment Methods for Discriminative Book Summarization","venue":"CoRR","volume":"abs/1305.1319","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-1319","ee":"http://arxiv.org/abs/1305.1319","url":"https://dblp.org/rec/journals/corr/abs-1305-1319"}, "url":"URL#4262678" }, { "@score":"1", "@id":"4262679", "info":{"authors":{"author":{"@pid":"11/664","text":"Kevin C. Zatloukal"}},"title":"Classical and Quantum Algorithms for Testing Equivalence of Group Extensions","venue":"CoRR","volume":"abs/1305.1327","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-1327","ee":"http://arxiv.org/abs/1305.1327","url":"https://dblp.org/rec/journals/corr/abs-1305-1327"}, "url":"URL#4262679" }, { "@score":"1", "@id":"4262680", "info":{"authors":{"author":[{"@pid":"30/9060","text":"Quan Geng"},{"@pid":"56/2613","text":"Pramod Viswanath"}]},"title":"The Optimal Mechanism in $(ε,δ)$-Differential Privacy","venue":"CoRR","volume":"abs/1305.1330","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-1330","ee":"http://arxiv.org/abs/1305.1330","url":"https://dblp.org/rec/journals/corr/abs-1305-1330"}, "url":"URL#4262680" }, { "@score":"1", "@id":"4262681", "info":{"authors":{"author":[{"@pid":"122/2987","text":"Arnim Bleier"},{"@pid":"13/2968","text":"Andreas Strotmann"}]},"title":"Towards an Author-Topic-Term-Model Visualization of 100 Years of German Sociological Society Proceedings","venue":"CoRR","volume":"abs/1305.1343","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-1343","ee":"http://arxiv.org/abs/1305.1343","url":"https://dblp.org/rec/journals/corr/abs-1305-1343"}, "url":"URL#4262681" }, { "@score":"1", "@id":"4262682", "info":{"authors":{"author":[{"@pid":"129/1735","text":"Faouzi Benzarti"},{"@pid":"19/4890","text":"Hamid Amiri"}]},"title":"Speckle Noise Reduction in Medical Ultrasound Images","venue":"CoRR","volume":"abs/1305.1344","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-1344","ee":"http://arxiv.org/abs/1305.1344","url":"https://dblp.org/rec/journals/corr/abs-1305-1344"}, "url":"URL#4262682" }, { "@score":"1", "@id":"4262683", "info":{"authors":{"author":[{"@pid":"27/2931","text":"Anupam Gupta 0001"},{"@pid":"06/3696","text":"Kunal Talwar"},{"@pid":"80/11265","text":"David Witmer"}]},"title":"Sparsest Cut on Bounded Treewidth Graphs: Algorithms and Hardness Results","venue":"CoRR","volume":"abs/1305.1347","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-1347","ee":"http://arxiv.org/abs/1305.1347","url":"https://dblp.org/rec/journals/corr/abs-1305-1347"}, "url":"URL#4262683" }, { "@score":"1", "@id":"4262684", "info":{"authors":{"author":[{"@pid":"66/6009","text":"Alexandr Andoni"},{"@pid":"p/RinaPanigrahy","text":"Rina Panigrahy"}]},"title":"A Differential Equations Approach to Optimizing Regret Trade-offs","venue":"CoRR","volume":"abs/1305.1359","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-1359","ee":"http://arxiv.org/abs/1305.1359","url":"https://dblp.org/rec/journals/corr/abs-1305-1359"}, "url":"URL#4262684" }, { "@score":"1", "@id":"4262685", "info":{"authors":{"author":[{"@pid":"28/2073-8","text":"Wei Gao 0008"},{"@pid":"j/RongJin","text":"Rong Jin 0001"},{"@pid":"81/4341","text":"Shenghuo Zhu"},{"@pid":"z/ZhiHuaZhou","text":"Zhi-Hua Zhou"}]},"title":"One-Pass AUC Optimization","venue":"CoRR","volume":"abs/1305.1363","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-1363","ee":"http://arxiv.org/abs/1305.1363","url":"https://dblp.org/rec/journals/corr/abs-1305-1363"}, "url":"URL#4262685" }, { "@score":"1", "@id":"4262686", "info":{"authors":{"author":[{"@pid":"79/4191","text":"Fan Min 0001"},{"@pid":"z/WilliamZhu","text":"William Zhu 0001"}]},"title":"Granular association rules for multi-valued data","venue":"CoRR","volume":"abs/1305.1371","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-1371","ee":"http://arxiv.org/abs/1305.1371","url":"https://dblp.org/rec/journals/corr/abs-1305-1371"}, "url":"URL#4262686" }, { "@score":"1", "@id":"4262687", "info":{"authors":{"author":[{"@pid":"79/4191","text":"Fan Min 0001"},{"@pid":"z/WilliamZhu","text":"William Zhu 0001"}]},"title":"Cold-start recommendation through granular association rules","venue":"CoRR","volume":"abs/1305.1372","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-1372","ee":"http://arxiv.org/abs/1305.1372","url":"https://dblp.org/rec/journals/corr/abs-1305-1372"}, "url":"URL#4262687" }, { "@score":"1", "@id":"4262688", "info":{"authors":{"author":{"@pid":"46/8068","text":"Rob Gysel"}},"title":"Unique Perfect Phylogeny Characterizations via Uniquely Representable Chordal Graphs","venue":"CoRR","volume":"abs/1305.1375","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-1375","ee":"http://arxiv.org/abs/1305.1375","url":"https://dblp.org/rec/journals/corr/abs-1305-1375"}, "url":"URL#4262688" }, { "@score":"1", "@id":"4262689", "info":{"authors":{"author":[{"@pid":"91/11261","text":"Matías Di Martino"},{"@pid":"127/8156","text":"Guzmán Hernández"},{"@pid":"99/7541","text":"Marcelo Fiori"},{"@pid":"20/1638","text":"Alicia Fernández"}]},"title":"A new framework for optimal classifier design","venue":"CoRR","volume":"abs/1305.1396","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-1396","ee":"http://arxiv.org/abs/1305.1396","url":"https://dblp.org/rec/journals/corr/abs-1305-1396"}, "url":"URL#4262689" }, { "@score":"1", "@id":"4262690", "info":{"authors":{"author":[{"@pid":"11/4803","text":"Himanshu Tyagi"},{"@pid":"74/5681","text":"Prakash Narayan"}]},"title":"How Many Queries Will Resolve Common Randomness?","venue":"CoRR","volume":"abs/1305.1397","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-1397","ee":"http://arxiv.org/abs/1305.1397","url":"https://dblp.org/rec/journals/corr/abs-1305-1397"}, "url":"URL#4262690" }, { "@score":"1", "@id":"4262691", "info":{"authors":{"author":[{"@pid":"84/1769-5","text":"Feng Pan 0005"},{"@pid":"130/3855","text":"Aaron Schild"}]},"title":"Interdiction Problems on Planar Graphs","venue":"CoRR","volume":"abs/1305.1407","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-1407","ee":"http://arxiv.org/abs/1305.1407","url":"https://dblp.org/rec/journals/corr/abs-1305-1407"}, "url":"URL#4262691" }, { "@score":"1", "@id":"4262692", "info":{"authors":{"author":[{"@pid":"c/JinyiCai","text":"Jin-Yi Cai"},{"@pid":"03/11286","text":"Zhiguo Fu"}]},"title":"A Collapse Theorem for Holographic Algorithms with Matchgates on Domain Size at Most 4","venue":"CoRR","volume":"abs/1305.1409","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-1409","ee":"http://arxiv.org/abs/1305.1409","url":"https://dblp.org/rec/journals/corr/abs-1305-1409"}, "url":"URL#4262692" }, { "@score":"1", "@id":"4262693", "info":{"authors":{"author":[{"@pid":"90/8335","text":"Shahriar Etemadi Tajbakhsh"},{"@pid":"28/2887","text":"Parastoo Sadeghi"},{"@pid":"56/6217","text":"Rodney A. Kennedy"}]},"title":"Centralized and Cooperative Transmission of Secure Multiple Unicasts using Network Coding","venue":"CoRR","volume":"abs/1305.1415","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-1415","ee":"http://arxiv.org/abs/1305.1415","url":"https://dblp.org/rec/journals/corr/abs-1305-1415"}, "url":"URL#4262693" }, { "@score":"1", "@id":"4262694", "info":{"authors":{"author":{"@pid":"56/8213","text":"Peter Wittek"}},"title":"Somoclu: An Efficient Distributed Library for Self-Organizing Maps","venue":"CoRR","volume":"abs/1305.1422","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-1422","ee":"http://arxiv.org/abs/1305.1422","url":"https://dblp.org/rec/journals/corr/abs-1305-1422"}, "url":"URL#4262694" }, { "@score":"1", "@id":"4262695", "info":{"authors":{"author":[{"@pid":"59/6763","text":"Urmila Shrawankar"},{"@pid":"26/2161","text":"Vilas M. Thakare"}]},"title":"Speech Enhancement Modeling Towards Robust Speech Recognition System","venue":"CoRR","volume":"abs/1305.1426","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-1426","ee":"http://arxiv.org/abs/1305.1426","url":"https://dblp.org/rec/journals/corr/abs-1305-1426"}, "url":"URL#4262695" }, { "@score":"1", "@id":"4262696", "info":{"authors":{"author":[{"@pid":"89/7909","text":"Xiaoxiao Wu"},{"@pid":"16/5768","text":"Wing-Kin Ma"},{"@pid":"82/3202","text":"Anthony Man-Cho So"}]},"title":"Achievable Rate Derivations and Further Simulation Results for "Physical-Layer Multicasting by Stochastic Transmit Beamforming and Alamouti Space-Time Coding".","venue":"CoRR","volume":"abs/1305.1427","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-1427","ee":"http://arxiv.org/abs/1305.1427","url":"https://dblp.org/rec/journals/corr/abs-1305-1427"}, "url":"URL#4262696" }, { "@score":"1", "@id":"4262697", "info":{"authors":{"author":[{"@pid":"59/6763","text":"Urmila Shrawankar"},{"@pid":"26/2161","text":"Vilas M. Thakare"}]},"title":"Speech based Password Protected Cyber Applications","venue":"CoRR","volume":"abs/1305.1428","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-1428","ee":"http://arxiv.org/abs/1305.1428","url":"https://dblp.org/rec/journals/corr/abs-1305-1428"}, "url":"URL#4262697" }, { "@score":"1", "@id":"4262698", "info":{"authors":{"author":[{"@pid":"59/6763","text":"Urmila Shrawankar"},{"@pid":"60/1837","text":"Anjali Mahajan"}]},"title":"Speech User Interface for Information Retrieval","venue":"CoRR","volume":"abs/1305.1429","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-1429","ee":"http://arxiv.org/abs/1305.1429","url":"https://dblp.org/rec/journals/corr/abs-1305-1429"}, "url":"URL#4262698" }, { "@score":"1", "@id":"4262699", "info":{"authors":{"author":[{"@pid":"00/8298","text":"Ahmad Gharanjik"},{"@pid":"99/9174","text":"Bhavani Shankar Mysore Rama Rao"},{"@pid":"89/4678","text":"Pantelis-Daniel M. Arapoglou"},{"@pid":"45/2903","text":"Björn E. Ottersten"}]},"title":"Gateway Switching in Q/V Band Satellite Feeder Links","venue":"CoRR","volume":"abs/1305.1434","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-1434","ee":"http://arxiv.org/abs/1305.1434","url":"https://dblp.org/rec/journals/corr/abs-1305-1434"}, "url":"URL#4262699" }, { "@score":"1", "@id":"4262700", "info":{"authors":{"author":[{"@pid":"73/9430","text":"Renyuan Zhang"},{"@pid":"83/1970","text":"Kai Cai"},{"@pid":"117/3608","text":"Yongmei Gan"},{"@pid":"23/2730","text":"Zhaoan Wang"},{"@pid":"85/2667","text":"Walter Murray Wonham"}]},"title":"Supervision Localization of Timed Discrete-Event Systems","venue":"CoRR","volume":"abs/1305.1439","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-1439","ee":"http://arxiv.org/abs/1305.1439","url":"https://dblp.org/rec/journals/corr/abs-1305-1439"}, "url":"URL#4262700" }, { "@score":"1", "@id":"4262701", "info":{"authors":{"author":[{"@pid":"81/4541","text":"Mehmet Kayaoglu"},{"@pid":"16/7820","text":"Berkay Topcu"},{"@pid":"55/802","text":"Umut Uludag"}]},"title":"Standard Fingerprint Databases: Manual Minutiae Labeling and Matcher Performance Analyses","venue":"CoRR","volume":"abs/1305.1443","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-1443","ee":"http://arxiv.org/abs/1305.1443","url":"https://dblp.org/rec/journals/corr/abs-1305-1443"}, "url":"URL#4262701" }, { "@score":"1", "@id":"4262702", "info":{"authors":{"author":{"@pid":"120/7698","text":"Nikolai Krivulin"}},"title":"A constrained tropical optimization problem: complete solution and application example","venue":"CoRR","volume":"abs/1305.1454","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-1454","ee":"http://arxiv.org/abs/1305.1454","url":"https://dblp.org/rec/journals/corr/abs-1305-1454"}, "url":"URL#4262702" }, { "@score":"1", "@id":"4262703", "info":{"authors":{"author":[{"@pid":"95/2151","text":"Pier Stanislao Paolucci"},{"@pid":"75/405","text":"Iuliana Bacivarov"},{"@pid":"06/2739","text":"Gert Goossens"},{"@pid":"14/6306","text":"Rainer Leupers"},{"@pid":"14/112","text":"Frédéric Rousseau 0001"},{"@pid":"91/1802","text":"Christoph Schumacher"},{"@pid":"t/LotharThiele","text":"Lothar Thiele"},{"@pid":"41/2564","text":"Piero Vicini"}]},"title":"EURETILE 2010-2012 summary: first three years of activity of the European Reference Tiled Experiment","venue":"CoRR","volume":"abs/1305.1459","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-1459","ee":"http://arxiv.org/abs/1305.1459","url":"https://dblp.org/rec/journals/corr/abs-1305-1459"}, "url":"URL#4262703" }, { "@score":"1", "@id":"4262704", "info":{"authors":{"author":[{"@pid":"35/10709","text":"Rushan Ziatdinov"},{"@pid":"60/3153","text":"Kenjiro T. Miura 0001"}]},"title":"On the variety of planar spirals and their applications in computer aided design","venue":"CoRR","volume":"abs/1305.1473","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-1473","ee":"http://arxiv.org/abs/1305.1473","url":"https://dblp.org/rec/journals/corr/abs-1305-1473"}, "url":"URL#4262704" }, { "@score":"1", "@id":"4262705", "info":{"authors":{"author":[{"@pid":"85/3208","text":"Bernhard Haslhofer"},{"@pid":"s/SimeonWarner","text":"Simeon Warner"},{"@pid":"l/CarlLagoze","text":"Carl Lagoze"},{"@pid":"67/1254-1","text":"Martin Klein 0001"},{"@pid":"49/2073","text":"Robert Sanderson"},{"@pid":"n/MichaelLNelson","text":"Michael L. Nelson"},{"@pid":"s/HerbertVandeSompel","text":"Herbert Van de Sompel"}]},"title":"ResourceSync: Leveraging Sitemaps for Resource Synchronization","venue":"CoRR","volume":"abs/1305.1476","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-1476","ee":"http://arxiv.org/abs/1305.1476","url":"https://dblp.org/rec/journals/corr/abs-1305-1476"}, "url":"URL#4262705" }, { "@score":"1", "@id":"4262706", "info":{"authors":{"author":{"@pid":"p/LucianoPandolfi","text":"Luciano Pandolfi"}},"title":"Sharp control time for viscoelastic bodys","venue":"CoRR","volume":"abs/1305.1477","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-1477","ee":"http://arxiv.org/abs/1305.1477","url":"https://dblp.org/rec/journals/corr/abs-1305-1477"}, "url":"URL#4262706" }, { "@score":"1", "@id":"4262707", "info":{"authors":{"author":[{"@pid":"71/8968","text":"Abdelhamid Younis"},{"@pid":"08/187","text":"Sinan Sinanovic"},{"@pid":"88/609","text":"Marco Di Renzo"},{"@pid":"27/1923","text":"Raed Mesleh"},{"@pid":"12/2168","text":"Harald Haas"}]},"title":"Generalised Sphere Decoding for Spatial Modulation","venue":"CoRR","volume":"abs/1305.1478","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-1478","ee":"http://arxiv.org/abs/1305.1478","url":"https://dblp.org/rec/journals/corr/abs-1305-1478"}, "url":"URL#4262707" }, { "@score":"1", "@id":"4262708", "info":{"authors":{"author":{"@pid":"115/6533","text":"Clemens G. Raab"}},"title":"Generalization of Risch's Algorithm to Special Functions","venue":"CoRR","volume":"abs/1305.1481","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-1481","ee":"http://arxiv.org/abs/1305.1481","url":"https://dblp.org/rec/journals/corr/abs-1305-1481"}, "url":"URL#4262708" }, { "@score":"1", "@id":"4262709", "info":{"authors":{"author":[{"@pid":"12/7259","text":"Daniel Torres-Salinas"},{"@pid":"117/3727","text":"Nicolás Robinson-García"},{"@pid":"127/6513","text":"Alvaro Cabezas-Clavijo"},{"@pid":"44/5839","text":"Evaristo Jiménez-Contreras"}]},"title":"Analyzing the citation characteristics of books: edited books, book series and types of publishers in the Book Citation Index","venue":"CoRR","volume":"abs/1305.1483","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-1483","ee":"http://arxiv.org/abs/1305.1483","url":"https://dblp.org/rec/journals/corr/abs-1305-1483"}, "url":"URL#4262709" }, { "@score":"1", "@id":"4262710", "info":{"authors":{"author":[{"@pid":"127/6513","text":"Alvaro Cabezas-Clavijo"},{"@pid":"117/3727","text":"Nicolás Robinson-García"},{"@pid":"12/7259","text":"Daniel Torres-Salinas"},{"@pid":"44/5839","text":"Evaristo Jiménez-Contreras"},{"@pid":"130/3786","text":"Thomas Mikulka"},{"@pid":"34/8466","text":"Christian Gumpenberger"},{"@pid":"130/3989","text":"Ambros Wemisch"},{"@pid":"30/5063","text":"Juan Gorraiz"}]},"title":"Most borrowed is most cited? Library loan statistics as a proxy for monograph selection in citation indexes","venue":"CoRR","volume":"abs/1305.1488","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-1488","ee":"http://arxiv.org/abs/1305.1488","url":"https://dblp.org/rec/journals/corr/abs-1305-1488"}, "url":"URL#4262710" }, { "@score":"1", "@id":"4262711", "info":{"authors":{"author":[{"@pid":"56/8757","text":"Paul de Kerret"},{"@pid":"74/1747","text":"Maxime Guillaud"},{"@pid":"44/3570","text":"David Gesbert"}]},"title":"Degrees of Freedom of Certain Interference Alignment Schemes with Distributed CSIT","venue":"CoRR","volume":"abs/1305.1490","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-1490","ee":"http://arxiv.org/abs/1305.1490","url":"https://dblp.org/rec/journals/corr/abs-1305-1490"}, "url":"URL#4262711" }, { "@score":"1", "@id":"4262712", "info":{"authors":{"author":[{"@pid":"130/3853","text":"Alessandro Attanasi"},{"@pid":"130/3935","text":"Andrea Cavagna"},{"@pid":"130/3880","text":"Lorenzo Del Castello"},{"@pid":"130/4009","text":"Irene Giardina"},{"@pid":"130/3795","text":"Asja Jelic"},{"@pid":"130/3772","text":"Stefania Melillo"},{"@pid":"130/4061","text":"Leonardo Parisi"},{"@pid":"42/7444","text":"Edward Shen"},{"@pid":"130/3931","text":"Edmondo Silvestri"},{"@pid":"59/8775","text":"Massimiliano Viale"}]},"title":"Tracking in three dimensions via multi-path branching","venue":"CoRR","volume":"abs/1305.1495","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-1495","ee":"http://arxiv.org/abs/1305.1495","url":"https://dblp.org/rec/journals/corr/abs-1305-1495"}, "url":"URL#4262712" }, { "@score":"1", "@id":"4262713", "info":{"authors":{"author":[{"@pid":"86/10294","text":"Hong-Han Shuai"},{"@pid":"85/318","text":"De-Nian Yang"},{"@pid":"y/PhilipSYu","text":"Philip S. Yu"},{"@pid":"c/MingSyanChen","text":"Ming-Syan Chen"}]},"title":"Willingness Optimization for Social Group Activity","venue":"CoRR","volume":"abs/1305.1502","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-1502","ee":"http://arxiv.org/abs/1305.1502","url":"https://dblp.org/rec/journals/corr/abs-1305-1502"}, "url":"URL#4262713" }, { "@score":"1", "@id":"4262714", "info":{"authors":{"author":[{"@pid":"92/8817","text":"Ney Renau-Ferrer"},{"@pid":"53/2673","text":"Céline Rémi"}]},"title":"A Method for Visuo-Spatial Classification of Freehand Shapes Freely Sketched","venue":"CoRR","volume":"abs/1305.1520","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-1520","ee":"http://arxiv.org/abs/1305.1520","url":"https://dblp.org/rec/journals/corr/abs-1305-1520"}, "url":"URL#4262714" }, { "@score":"1", "@id":"4262715", "info":{"authors":{"author":[{"@pid":"06/1529","text":"Saif Khan Mohammed"},{"@pid":"76/3752","text":"Erik G. Larsson"}]},"title":"Constant-Envelope Multi-User Precoding for Frequency-Selective Massive MIMO Systems","venue":"CoRR","volume":"abs/1305.1525","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-1525","ee":"http://arxiv.org/abs/1305.1525","url":"https://dblp.org/rec/journals/corr/abs-1305-1525"}, "url":"URL#4262715" }, { "@score":"1", "@id":"4262716", "info":{"authors":{"author":[{"@pid":"03/6426","text":"Andrei Yu. Rumyantsev"},{"@pid":"87/6631","text":"Alexander Shen"}]},"title":"Probabilistic Constructions of Computable Objects and a Computable Version of Lovász Local Lemma","venue":"CoRR","volume":"abs/1305.1535","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-1535","ee":"http://arxiv.org/abs/1305.1535","url":"https://dblp.org/rec/journals/corr/abs-1305-1535"}, "url":"URL#4262716" }, { "@score":"1", "@id":"4262717", "info":{"authors":{"author":[{"@pid":"130/3836","text":"M. A. Sorokina"},{"@pid":"15/976","text":"S. K. Turitsyn"}]},"title":"Shannon capacity of nonlinear regenerative channels","venue":"CoRR","volume":"abs/1305.1537","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-1537","ee":"http://arxiv.org/abs/1305.1537","url":"https://dblp.org/rec/journals/corr/abs-1305-1537"}, "url":"URL#4262717" }, { "@score":"1", "@id":"4262718", "info":{"authors":{"author":[{"@pid":"130/3915","text":"Julian Mautner"},{"@pid":"130/3994","text":"Adi Makmal"},{"@pid":"130/4072","text":"Daniel Manzano"},{"@pid":"130/3723","text":"Markus Tiersch"},{"@pid":"06/698","text":"Hans J. Briegel"}]},"title":"Projective simulation for classical learning agents: a comprehensive investigation","venue":"CoRR","volume":"abs/1305.1578","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-1578","ee":"http://arxiv.org/abs/1305.1578","url":"https://dblp.org/rec/journals/corr/abs-1305-1578"}, "url":"URL#4262718" }, { "@score":"1", "@id":"4262719", "info":{"authors":{"author":{"@pid":"130/3755","text":"Alessandro Andrioni"}},"title":"A Clifford Algebra approach to the Discretizable Molecular Distance Geometry Problem","venue":"CoRR","volume":"abs/1305.1596","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-1596","ee":"http://arxiv.org/abs/1305.1596","url":"https://dblp.org/rec/journals/corr/abs-1305-1596"}, "url":"URL#4262719" }, { "@score":"1", "@id":"4262720", "info":{"authors":{"author":[{"@pid":"95/5045","text":"Aria Ghasemian Sahebi"},{"@pid":"14/2640","text":"S. Sandeep Pradhan"}]},"title":"Abelian Group Codes for Source Coding and Channel Coding","venue":"CoRR","volume":"abs/1305.1598","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-1598","ee":"http://arxiv.org/abs/1305.1598","url":"https://dblp.org/rec/journals/corr/abs-1305-1598"}, "url":"URL#4262720" }, { "@score":"1", "@id":"4262721", "info":{"authors":{"author":[{"@pid":"96/3060-7","text":"Yu Cheng 0007"},{"@pid":"73/343","text":"Florin Rusu"}]},"title":"Formal Representation of the SS-DB Benchmark and Experimental Evaluation in EXTASCID","venue":"CoRR","volume":"abs/1305.1609","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-1609","ee":"http://arxiv.org/abs/1305.1609","url":"https://dblp.org/rec/journals/corr/abs-1305-1609"}, "url":"URL#4262721" }, { "@score":"1", "@id":"4262722", "info":{"authors":{"author":{"@pid":"04/9956","text":"Dmitry Namiot"}},"title":"Location sharing without the central server","venue":"CoRR","volume":"abs/1305.1621","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-1621","ee":"http://arxiv.org/abs/1305.1621","url":"https://dblp.org/rec/journals/corr/abs-1305-1621"}, "url":"URL#4262722" }, { "@score":"1", "@id":"4262723", "info":{"authors":{"author":{"@pid":"h/JoseHernandezOrallo","text":"José Hernández-Orallo"}},"title":"A short note on estimating intelligence from user profiles in the context of universal psychometrics: prospects and caveats","venue":"CoRR","volume":"abs/1305.1655","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-1655","ee":"http://arxiv.org/abs/1305.1655","url":"https://dblp.org/rec/journals/corr/abs-1305-1655"}, "url":"URL#4262723" }, { "@score":"1", "@id":"4262724", "info":{"authors":{"author":[{"@pid":"57/8007","text":"Alberto Savioli"},{"@pid":"37/7972","text":"Emanuele Goldoni"},{"@pid":"36/86","text":"Pietro Savazzi"},{"@pid":"g/PaoloGamba","text":"Paolo Gamba"}]},"title":"Low Complexity Indoor Localization in Wireless Sensor Networks by UWB and Inertial Data Fusion","venue":"CoRR","volume":"abs/1305.1657","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-1657","ee":"http://arxiv.org/abs/1305.1657","url":"https://dblp.org/rec/journals/corr/abs-1305-1657"}, "url":"URL#4262724" }, { "@score":"1", "@id":"4262725", "info":{"authors":{"author":{"@pid":"130/3909","text":"Boudjemaa Boudaa"}},"title":"Vers une Substitution des Services Web sans Inconsistance Sémantique","venue":"CoRR","volume":"abs/1305.1666","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-1666","ee":"http://arxiv.org/abs/1305.1666","url":"https://dblp.org/rec/journals/corr/abs-1305-1666"}, "url":"URL#4262725" }, { "@score":"1", "@id":"4262726", "info":{"authors":{"author":[{"@pid":"26/10582","text":"Thiago Christiano Silva 0001"},{"@pid":"63/5422-1","text":"Liang Zhao 0001"}]},"title":"High Level Pattern Classification via Tourist Walks in Networks","venue":"CoRR","volume":"abs/1305.1679","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-1679","ee":"http://arxiv.org/abs/1305.1679","url":"https://dblp.org/rec/journals/corr/abs-1305-1679"}, "url":"URL#4262726" }, { "@score":"1", "@id":"4262727", "info":{"authors":{"author":[{"@pid":"37/1011","text":"Konstantin Makarychev"},{"@pid":"08/4400","text":"Yury Makarychev"},{"@pid":"84/7804","text":"Aravindan Vijayaraghavan"}]},"title":"Bilu-Linial Stable Instances of Max Cut","venue":"CoRR","volume":"abs/1305.1681","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-1681","ee":"http://arxiv.org/abs/1305.1681","url":"https://dblp.org/rec/journals/corr/abs-1305-1681"}, "url":"URL#4262727" }, { "@score":"1", "@id":"4262728", "info":{"authors":{"author":[{"@pid":"63/9408","text":"Nicholas Downing"},{"@pid":"12/1675","text":"Thibaut Feydy"},{"@pid":"s/PeterJStuckey","text":"Peter J. Stuckey"}]},"title":"Unsatisfiable Cores for Constraint Programming","venue":"CoRR","volume":"abs/1305.1690","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-1690","ee":"http://arxiv.org/abs/1305.1690","url":"https://dblp.org/rec/journals/corr/abs-1305-1690"}, "url":"URL#4262728" }, { "@score":"1", "@id":"4262729", "info":{"authors":{"author":[{"@pid":"05/4102-1","text":"Yajun Wang 0001"},{"@pid":"130/4064","text":"Sam Chiu-wai Wong"}]},"title":"Online Vertex Cover and Matching: Beating the Greedy Algorithm","venue":"CoRR","volume":"abs/1305.1694","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-1694","ee":"http://arxiv.org/abs/1305.1694","url":"https://dblp.org/rec/journals/corr/abs-1305-1694"}, "url":"URL#4262729" }, { "@score":"1", "@id":"4262730", "info":{"authors":{"author":[{"@pid":"130/3877","text":"Yusuf Erol"},{"@pid":"13/7007-5","text":"Lei Li 0005"},{"@pid":"130/4015","text":"Bharath Ramsundar"},{"@pid":"r/SJRussell","text":"Stuart Russell 0001"}]},"title":"The Extended Parameter Filter","venue":"CoRR","volume":"abs/1305.1704","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-1704","ee":"http://arxiv.org/abs/1305.1704","url":"https://dblp.org/rec/journals/corr/abs-1305-1704"}, "url":"URL#4262730" }, { "@score":"1", "@id":"4262731", "info":{"authors":{"author":[{"@pid":"130/3742","text":"Rushi Longadge"},{"@pid":"130/3761","text":"Snehalata Dongre"}]},"title":"Class Imbalance Problem in Data Mining Review","venue":"CoRR","volume":"abs/1305.1707","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-1707","ee":"http://arxiv.org/abs/1305.1707","url":"https://dblp.org/rec/journals/corr/abs-1305-1707"}, "url":"URL#4262731" }, { "@score":"1", "@id":"4262732", "info":{"authors":{"author":{"@pid":"130/3869","text":"Meenesh Bhardwaj"}},"title":"Optimization of stochastic database cracking","venue":"CoRR","volume":"abs/1305.1713","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-1713","ee":"http://arxiv.org/abs/1305.1713","url":"https://dblp.org/rec/journals/corr/abs-1305-1713"}, "url":"URL#4262732" }, { "@score":"1", "@id":"4262733", "info":{"authors":{"author":[{"@pid":"84/11143","text":"Ziyi Su"},{"@pid":"69/1513","text":"Frédérique Biennier"}]},"title":"On attribute-based usage control policy ratification for cooperative computing context","venue":"CoRR","volume":"abs/1305.1727","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-1727","ee":"http://arxiv.org/abs/1305.1727","url":"https://dblp.org/rec/journals/corr/abs-1305-1727"}, "url":"URL#4262733" }, { "@score":"1", "@id":"4262734", "info":{"authors":{"author":{"@pid":"55/1715","text":"Duo Xu"}},"title":"A Simple Technique for the Converse of Finite Blocklength Multiple Access Channels","venue":"CoRR","volume":"abs/1305.1729","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-1729","ee":"http://arxiv.org/abs/1305.1729","url":"https://dblp.org/rec/journals/corr/abs-1305-1729"}, "url":"URL#4262734" }, { "@score":"1", "@id":"4262735", "info":{"authors":{"author":{"@pid":"55/1715","text":"Duo Xu"}},"title":"The Redundancy of Slepian-Wolf Coding Revisited","venue":"CoRR","volume":"abs/1305.1730","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-1730","ee":"http://arxiv.org/abs/1305.1730","url":"https://dblp.org/rec/journals/corr/abs-1305-1730"}, "url":"URL#4262735" }, { "@score":"1", "@id":"4262736", "info":{"authors":{"author":[{"@pid":"62/9670","text":"Mark Thamm"},{"@pid":"122/2987","text":"Arnim Bleier"}]},"title":"When Politicians Tweet: A Study on the Members of the German Federal Diet","venue":"CoRR","volume":"abs/1305.1734","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-1734","ee":"http://arxiv.org/abs/1305.1734","url":"https://dblp.org/rec/journals/corr/abs-1305-1734"}, "url":"URL#4262736" }, { "@score":"1", "@id":"4262737", "info":{"authors":{"author":[{"@pid":"35/10709","text":"Rushan Ziatdinov"},{"@pid":"130/3894","text":"Rifkat I. Nabiyev"},{"@pid":"60/3153","text":"Kenjiro T. Miura 0001"}]},"title":"MC-curves and aesthetic measurements for pseudospiral curve segments","venue":"CoRR","volume":"abs/1305.1737","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-1737","ee":"http://arxiv.org/abs/1305.1737","url":"https://dblp.org/rec/journals/corr/abs-1305-1737"}, "url":"URL#4262737" }, { "@score":"1", "@id":"4262738", "info":{"authors":{"author":[{"@pid":"11/5575","text":"Joong Chae Na"},{"@pid":"22/4883","text":"Heejin Park"},{"@pid":"c/MCrochemore","text":"Maxime Crochemore"},{"@pid":"h/JHolub","text":"Jan Holub 0001"},{"@pid":"i/CSIliopoulos","text":"Costas S. Iliopoulos"},{"@pid":"66/3808","text":"Laurent Mouchard"},{"@pid":"p/KunsooPark","text":"Kunsoo Park"}]},"title":"Suffix Tree of Alignment: An Efficient Index for Similar Data","venue":"CoRR","volume":"abs/1305.1744","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-1744","ee":"http://arxiv.org/abs/1305.1744","url":"https://dblp.org/rec/journals/corr/abs-1305-1744"}, "url":"URL#4262738" }, { "@score":"1", "@id":"4262739", "info":{"authors":{"author":{"@pid":"45/11240-1","text":"Djallel Bouneffouf 0001"}},"title":"Mobile Recommender Systems Methods: An Overview","venue":"CoRR","volume":"abs/1305.1745","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-1745","ee":"http://arxiv.org/abs/1305.1745","url":"https://dblp.org/rec/journals/corr/abs-1305-1745"}, "url":"URL#4262739" }, { "@score":"1", "@id":"4262740", "info":{"authors":{"author":{"@pid":"63/2588","text":"Carsten W. Scherer"}},"title":"Structured H∞-Optimal Control for Nested Interconnections: A State-Space Solution","venue":"CoRR","volume":"abs/1305.1746","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-1746","ee":"http://arxiv.org/abs/1305.1746","url":"https://dblp.org/rec/journals/corr/abs-1305-1746"}, "url":"URL#4262740" }, { "@score":"1", "@id":"4262741", "info":{"authors":{"author":[{"@pid":"89/9222","text":"Ronen Dar"},{"@pid":"60/10966","text":"Mark Shtaif"},{"@pid":"97/1366","text":"Meir Feder"}]},"title":"New Bounds on the Capacity of Fiber-Optics Communications","venue":"CoRR","volume":"abs/1305.1762","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-1762","ee":"http://arxiv.org/abs/1305.1762","url":"https://dblp.org/rec/journals/corr/abs-1305-1762"}, "url":"URL#4262741" }, { "@score":"1", "@id":"4262742", "info":{"authors":{"author":[{"@pid":"92/10836","text":"Adam Noel"},{"@pid":"92/11335","text":"Karen C. Cheung"},{"@pid":"95/2265","text":"Robert Schober"}]},"title":"Improving Diffusion-Based Molecular Communication with Unanchored Enzymes","venue":"CoRR","volume":"abs/1305.1783","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-1783","ee":"http://arxiv.org/abs/1305.1783","url":"https://dblp.org/rec/journals/corr/abs-1305-1783"}, "url":"URL#4262742" }, { "@score":"1", "@id":"4262743", "info":{"authors":{"author":[{"@pid":"01/188","text":"Laurent Jacques"},{"@pid":"130/3995","text":"Kévin Degraux"},{"@pid":"57/3965","text":"Christophe De Vleeschouwer"}]},"title":"Quantized Iterative Hard Thresholding: Bridging 1-bit and High-Resolution Quantized Compressed Sensing","venue":"CoRR","volume":"abs/1305.1786","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-1786","ee":"http://arxiv.org/abs/1305.1786","url":"https://dblp.org/rec/journals/corr/abs-1305-1786"}, "url":"URL#4262743" }, { "@score":"1", "@id":"4262744", "info":{"authors":{"author":{"@pid":"45/11240-1","text":"Djallel Bouneffouf 0001"}},"title":"Evolution of the user's content: An Overview of the state of the art","venue":"CoRR","volume":"abs/1305.1787","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-1787","ee":"http://arxiv.org/abs/1305.1787","url":"https://dblp.org/rec/journals/corr/abs-1305-1787"}, "url":"URL#4262744" }, { "@score":"1", "@id":"4262745", "info":{"authors":{"author":[{"@pid":"92/10836","text":"Adam Noel"},{"@pid":"92/11335","text":"Karen C. Cheung"},{"@pid":"95/2265","text":"Robert Schober"}]},"title":"Using Dimensional Analysis to Assess Scalability and Accuracy in Molecular Communication","venue":"CoRR","volume":"abs/1305.1796","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-1796","ee":"http://arxiv.org/abs/1305.1796","url":"https://dblp.org/rec/journals/corr/abs-1305-1796"}, "url":"URL#4262745" }, { "@score":"1", "@id":"4262746", "info":{"authors":{"author":{"@pid":"79/6220","text":"Federico Ricci-Tersenghi"}},"title":"The solution to the challenge in "Time-Reversible Random Number Generators" by Wm. G. Hoover and Carol G. Hoover","venue":"CoRR","volume":"abs/1305.1805","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-1805","ee":"http://arxiv.org/abs/1305.1805","url":"https://dblp.org/rec/journals/corr/abs-1305-1805"}, "url":"URL#4262746" }, { "@score":"1", "@id":"4262747", "info":{"authors":{"author":[{"@pid":"34/9922","text":"Nikolaos Tziortziotis"},{"@pid":"17/2535","text":"Christos Dimitrakakis"},{"@pid":"56/6853","text":"Konstantinos Blekas"}]},"title":"Cover Tree Bayesian Reinforcement Learning","venue":"CoRR","volume":"abs/1305.1809","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-1809","ee":"http://arxiv.org/abs/1305.1809","url":"https://dblp.org/rec/journals/corr/abs-1305-1809"}, "url":"URL#4262747" }, { "@score":"1", "@id":"4262748", "info":{"authors":{"author":[{"@pid":"59/7705","text":"Marc Hellmuth"},{"@pid":"130/4004","text":"Manuel Noll"},{"@pid":"68/10369","text":"Lydia Ostermeier"}]},"title":"Strong Products of Hypergraphs: Unique Prime Factorization Theorems and Algorithms","venue":"CoRR","volume":"abs/1305.1824","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-1824","ee":"http://arxiv.org/abs/1305.1824","url":"https://dblp.org/rec/journals/corr/abs-1305-1824"}, "url":"URL#4262748" }, { "@score":"1", "@id":"4262749", "info":{"authors":{"author":[{"@pid":"130/3969","text":"Ward Jaradat"},{"@pid":"d/AlanDearle","text":"Alan Dearle"},{"@pid":"24/1959","text":"Adam Barker"}]},"title":"A Dataflow Language for Decentralised Orchestration of Web Service Workflows","venue":"CoRR","volume":"abs/1305.1840","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-1840","ee":"http://arxiv.org/abs/1305.1840","url":"https://dblp.org/rec/journals/corr/abs-1305-1840"}, "url":"URL#4262749" }, { "@score":"1", "@id":"4262750", "info":{"authors":{"author":[{"@pid":"130/3969","text":"Ward Jaradat"},{"@pid":"d/AlanDearle","text":"Alan Dearle"},{"@pid":"24/1959","text":"Adam Barker"}]},"title":"An Architecture for Decentralised Orchestration of Web Service Workflows","venue":"CoRR","volume":"abs/1305.1842","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-1842","ee":"http://arxiv.org/abs/1305.1842","url":"https://dblp.org/rec/journals/corr/abs-1305-1842"}, "url":"URL#4262750" }, { "@score":"1", "@id":"4262751", "info":{"authors":{"author":[{"@pid":"98/1019","text":"Rajat Shuvro Roy"},{"@pid":"130/3785","text":"Debashish Bhattacharya"},{"@pid":"23/3903","text":"Alexander Schliep"}]},"title":"Turtle: Identifying frequent k-mers with cache-efficient algorithms","venue":"CoRR","volume":"abs/1305.1861","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-1861","ee":"http://arxiv.org/abs/1305.1861","url":"https://dblp.org/rec/journals/corr/abs-1305-1861"}, "url":"URL#4262751" }, { "@score":"1", "@id":"4262752", "info":{"authors":{"author":[{"@pid":"48/609","text":"François Bertault"},{"@pid":"m/MirkaMiller","text":"Mirka Miller"},{"@pid":"82/246","text":"Hebert Pérez-Rosés"},{"@pid":"43/9859","text":"Ramiro Feria-Purón"},{"@pid":"83/10524","text":"Elaheh Vaezpour"}]},"title":"A Heuristic for Magic and Antimagic Graph Labellings","venue":"CoRR","volume":"abs/1305.1880","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-1880","ee":"http://arxiv.org/abs/1305.1880","url":"https://dblp.org/rec/journals/corr/abs-1305-1880"}, "url":"URL#4262752" }, { "@score":"1", "@id":"4262753", "info":{"authors":{"author":[{"@pid":"42/8212","text":"João F. C. Mota"},{"@pid":"87/4027","text":"João M. F. Xavier"},{"@pid":"53/6053","text":"Pedro M. Q. Aguiar"},{"@pid":"37/6355","text":"Markus Püschel"}]},"title":"Distributed Optimization With Local Domains: Applications in MPC and Network Flows","venue":"CoRR","volume":"abs/1305.1885","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-1885","ee":"http://arxiv.org/abs/1305.1885","url":"https://dblp.org/rec/journals/corr/abs-1305-1885"}, "url":"URL#4262753" }, { "@score":"1", "@id":"4262754", "info":{"authors":{"author":{"@pid":"120/7245","text":"Steven Thomas Smith"}},"title":"Geometric Optimization Methods for Adaptive Filtering","venue":"CoRR","volume":"abs/1305.1886","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-1886","ee":"http://arxiv.org/abs/1305.1886","url":"https://dblp.org/rec/journals/corr/abs-1305-1886"}, "url":"URL#4262754" }, { "@score":"1", "@id":"4262755", "info":{"authors":{"author":{"@pid":"129/1609","text":"Gaurav Pande"}},"title":"Performance Evaluation of Video Communications over 4G Network","venue":"CoRR","volume":"abs/1305.1887","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-1887","ee":"http://arxiv.org/abs/1305.1887","url":"https://dblp.org/rec/journals/corr/abs-1305-1887"}, "url":"URL#4262755" }, { "@score":"1", "@id":"4262756", "info":{"authors":{"author":[{"@pid":"39/3657-4","text":"Hong Xie 0004"},{"@pid":"l/JohnCSLui","text":"John C. S. Lui"}]},"title":"Mathematical Modeling of Product Rating: Sufficiency, Misbehavior and Aggregation Rules","venue":"CoRR","volume":"abs/1305.1899","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-1899","ee":"http://arxiv.org/abs/1305.1899","url":"https://dblp.org/rec/journals/corr/abs-1305-1899"}, "url":"URL#4262756" }, { "@score":"1", "@id":"4262757", "info":{"authors":{"author":{"@pid":"47/717","text":"Subhash C. Kak"}},"title":"Residue Classes of the PPT Sequence","venue":"CoRR","volume":"abs/1305.1900","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-1900","ee":"http://arxiv.org/abs/1305.1900","url":"https://dblp.org/rec/journals/corr/abs-1305-1900"}, "url":"URL#4262757" }, { "@score":"1", "@id":"4262758", "info":{"authors":{"author":[{"@pid":"130/3936","text":"Alexander V. Mamonov"},{"@pid":"88/5880","text":"Isabel N. Figueiredo"},{"@pid":"04/8401","text":"Pedro N. Figueiredo"},{"@pid":"00/6413","text":"Yen-Hsi Richard Tsai"}]},"title":"Automated polyp detection in colon capsule endoscopy","venue":"CoRR","volume":"abs/1305.1912","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-1912","ee":"http://arxiv.org/abs/1305.1912","url":"https://dblp.org/rec/journals/corr/abs-1305-1912"}, "url":"URL#4262758" }, { "@score":"1", "@id":"4262759", "info":{"authors":{"author":[{"@pid":"125/2145","text":"Yin Tat Lee"},{"@pid":"125/2326","text":"Aaron Sidford"}]},"title":"Efficient Accelerated Coordinate Descent Methods and Faster Algorithms for Solving Linear Systems","venue":"CoRR","volume":"abs/1305.1922","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-1922","ee":"http://arxiv.org/abs/1305.1922","url":"https://dblp.org/rec/journals/corr/abs-1305-1922"}, "url":"URL#4262759" }, { "@score":"1", "@id":"4262760", "info":{"authors":{"author":[{"@pid":"59/6763","text":"Urmila Shrawankar"},{"@pid":"60/1837","text":"Anjali Mahajan"}]},"title":"Speech: A Challenge to Digital Signal Processing Technology for Human-to-Computer Interaction","venue":"CoRR","volume":"abs/1305.1925","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-1925","ee":"http://arxiv.org/abs/1305.1925","url":"https://dblp.org/rec/journals/corr/abs-1305-1925"}, "url":"URL#4262760" }, { "@score":"1", "@id":"4262761", "info":{"authors":{"author":[{"@pid":"92/10836","text":"Adam Noel"},{"@pid":"92/11335","text":"Karen C. Cheung"},{"@pid":"95/2265","text":"Robert Schober"}]},"title":"Improving Receiver Performance of Diffusive Molecular Communication with Enzymes","venue":"CoRR","volume":"abs/1305.1926","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-1926","ee":"http://arxiv.org/abs/1305.1926","url":"https://dblp.org/rec/journals/corr/abs-1305-1926"}, "url":"URL#4262761" }, { "@score":"1", "@id":"4262762", "info":{"authors":{"author":[{"@pid":"50/3965","text":"Elena Camossi"},{"@pid":"01/3455","text":"Paola Villa"},{"@pid":"88/7187","text":"Luca Mazzola"}]},"title":"Semantic-based Anomalous Pattern Discovery in Moving Object Trajectories","venue":"CoRR","volume":"abs/1305.1946","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-1946","ee":"http://arxiv.org/abs/1305.1946","url":"https://dblp.org/rec/journals/corr/abs-1305-1946"}, "url":"URL#4262762" }, { "@score":"1", "@id":"4262763", "info":{"authors":{"author":[{"@pid":"127/6503","text":"Andrew S. Lan"},{"@pid":"51/3407","text":"Christoph Studer"},{"@pid":"02/11107","text":"Andrew E. Waters"},{"@pid":"32/2804","text":"Richard G. Baraniuk"}]},"title":"Joint Topic Modeling and Factor Analysis of Textual Information and Graded Response Data","venue":"CoRR","volume":"abs/1305.1956","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-1956","ee":"http://arxiv.org/abs/1305.1956","url":"https://dblp.org/rec/journals/corr/abs-1305-1956"}, "url":"URL#4262763" }, { "@score":"1", "@id":"4262764", "info":{"authors":{"author":[{"@pid":"49/5637","text":"Tom Froese"},{"@pid":"g/CarlosGershenson","text":"Carlos Gershenson"},{"@pid":"94/5921","text":"David A. Rosenblueth"}]},"title":"The Dynamically Extended Mind -- A Minimal Modeling Case Study","venue":"CoRR","volume":"abs/1305.1958","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-1958","ee":"http://arxiv.org/abs/1305.1958","url":"https://dblp.org/rec/journals/corr/abs-1305-1958"}, "url":"URL#4262764" }, { "@score":"1", "@id":"4262765", "info":{"authors":{"author":[{"@pid":"35/7150","text":"Nate Derbinsky"},{"@pid":"28/8775","text":"José Bento 0001"},{"@pid":"91/7851","text":"Veit Elser"},{"@pid":"40/3651","text":"Jonathan S. Yedidia"}]},"title":"An Improved Three-Weight Message-Passing Algorithm","venue":"CoRR","volume":"abs/1305.1961","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-1961","ee":"http://arxiv.org/abs/1305.1961","url":"https://dblp.org/rec/journals/corr/abs-1305-1961"}, "url":"URL#4262765" }, { "@score":"1", "@id":"4262766", "info":{"authors":{"author":[{"@pid":"18/3891","text":"Irit Dinur"},{"@pid":"59/254","text":"David Steurer"}]},"title":"Analytical Approach to Parallel Repetition","venue":"CoRR","volume":"abs/1305.1979","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-1979","ee":"http://arxiv.org/abs/1305.1979","url":"https://dblp.org/rec/journals/corr/abs-1305-1979"}, "url":"URL#4262766" }, { "@score":"1", "@id":"4262767", "info":{"authors":{"author":[{"@pid":"06/5576","text":"Vasanthan Raghavan"},{"@pid":"82/9058","text":"Greg Ver Steeg"},{"@pid":"16/3411","text":"Aram Galstyan"},{"@pid":"35/4214","text":"Alexander G. Tartakovsky"}]},"title":"Modeling Temporal Activity Patterns in Dynamic Social Networks","venue":"CoRR","volume":"abs/1305.1980","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-1980","ee":"http://arxiv.org/abs/1305.1980","url":"https://dblp.org/rec/journals/corr/abs-1305-1980"}, "url":"URL#4262767" }, { "@score":"1", "@id":"4262768", "info":{"authors":{"author":[{"@pid":"61/7730","text":"Madhur Srivastava"},{"@pid":"42/1440","text":"Satish Kumar Singh"},{"@pid":"86/352","text":"Prasanta K. Panigrahi"}]},"title":"A Statistical Method for Non-Linear Quantization in Lossy JPEG2000 Compression","venue":"CoRR","volume":"abs/1305.1986","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-1986","ee":"http://arxiv.org/abs/1305.1986","url":"https://dblp.org/rec/journals/corr/abs-1305-1986"}, "url":"URL#4262768" }, { "@score":"1", "@id":"4262769", "info":{"authors":{"author":[{"@pid":"d/DLDowe","text":"David L. Dowe"},{"@pid":"h/JoseHernandezOrallo","text":"José Hernández-Orallo"}]},"title":"On the universality of cognitive tests","venue":"CoRR","volume":"abs/1305.1991","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-1991","ee":"http://arxiv.org/abs/1305.1991","url":"https://dblp.org/rec/journals/corr/abs-1305-1991"}, "url":"URL#4262769" }, { "@score":"1", "@id":"4262770", "info":{"authors":{"author":[{"@pid":"130/4037","text":"Sawood Alam"},{"@pid":"11/3943","text":"Charles L. Cartledge"},{"@pid":"n/MichaelLNelson","text":"Michael L. Nelson"}]},"title":"HTTP Mailbox - Asynchronous RESTful Communication","venue":"CoRR","volume":"abs/1305.1992","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-1992","ee":"http://arxiv.org/abs/1305.1992","url":"https://dblp.org/rec/journals/corr/abs-1305-1992"}, "url":"URL#4262770" }, { "@score":"1", "@id":"4262771", "info":{"authors":{"author":{"@pid":"84/2955","text":"Keehang Kwon"}},"title":"Expressing Algorithms As Concise As Possible via Computability Logic","venue":"CoRR","volume":"abs/1305.2004","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-2004","ee":"http://arxiv.org/abs/1305.2004","url":"https://dblp.org/rec/journals/corr/abs-1305-2004"}, "url":"URL#4262771" }, { "@score":"1", "@id":"4262772", "info":{"authors":{"author":[{"@pid":"37/8117","text":"Jierui Xie"},{"@pid":"26/9777","text":"Mingming Chen"},{"@pid":"s/BKSzymanski","text":"Boleslaw K. Szymanski"}]},"title":"LabelRankT: Incremental Community Detection in Dynamic Networks via Label Propagation","venue":"CoRR","volume":"abs/1305.2006","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-2006","ee":"http://arxiv.org/abs/1305.2006","url":"https://dblp.org/rec/journals/corr/abs-1305-2006"}, "url":"URL#4262772" }, { "@score":"1", "@id":"4262773", "info":{"authors":{"author":[{"@pid":"25/4495","text":"Manu Basavaraju"},{"@pid":"26/3744","text":"Mathew C. Francis"}]},"title":"Strong chromatic index of chordless graphs","venue":"CoRR","volume":"abs/1305.2009","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-2009","ee":"http://arxiv.org/abs/1305.2009","url":"https://dblp.org/rec/journals/corr/abs-1305-2009"}, "url":"URL#4262773" }, { "@score":"1", "@id":"4262774", "info":{"authors":{"author":{"@pid":"22/11036-1","text":"Patrick E. Meyer 0001"}},"title":"A Rank Minrelation - Majrelation Coefficient","venue":"CoRR","volume":"abs/1305.2038","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-2038","ee":"http://arxiv.org/abs/1305.2038","url":"https://dblp.org/rec/journals/corr/abs-1305-2038"}, "url":"URL#4262774" }, { "@score":"1", "@id":"4262775", "info":{"authors":{"author":[{"@pid":"130/4020","text":"Jakub Bulin"},{"@pid":"89/5048","text":"Dejan Delic"},{"@pid":"49/4994","text":"Marcel Jackson"},{"@pid":"79/3520","text":"Todd Niven"}]},"title":"On the reduction of the CSP dichotomy conjecture to digraphs","venue":"CoRR","volume":"abs/1305.2039","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-2039","ee":"http://arxiv.org/abs/1305.2039","url":"https://dblp.org/rec/journals/corr/abs-1305-2039"}, "url":"URL#4262775" }, { "@score":"1", "@id":"4262776", "info":{"authors":{"author":[{"@pid":"117/2133","text":"Alexander Herzog"},{"@pid":"79/579","text":"Ludovic Righetti"},{"@pid":"89/7742","text":"Felix Grimminger"},{"@pid":"31/7744","text":"Peter Pastor"},{"@pid":"32/3952","text":"Stefan Schaal"}]},"title":"Momentum-based Balance Control for Torque-controlled Humanoids","venue":"CoRR","volume":"abs/1305.2042","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-2042","ee":"http://arxiv.org/abs/1305.2042","url":"https://dblp.org/rec/journals/corr/abs-1305-2042"}, "url":"URL#4262776" }, { "@score":"1", "@id":"4262777", "info":{"authors":{"author":[{"@pid":"130/3800","text":"Francis T. O'Donovan"},{"@pid":"11/8154","text":"Connie Fournelle"},{"@pid":"130/3964","text":"Steve Gaffigan"},{"@pid":"35/6810","text":"Oliver Brdiczka"},{"@pid":"90/6386","text":"Jianqiang Shen"},{"@pid":"16/3621-12","text":"Juan Liu 0012"},{"@pid":"97/258","text":"Kendra E. Moore"}]},"title":"Characterizing User Behavior and Information Propagation on a Social Multimedia Network","venue":"CoRR","volume":"abs/1305.2091","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-2091","ee":"http://arxiv.org/abs/1305.2091","url":"https://dblp.org/rec/journals/corr/abs-1305-2091"}, "url":"URL#4262777" }, { "@score":"1", "@id":"4262778", "info":{"authors":{"author":[{"@pid":"42/6606","text":"Jacek Sroka"},{"@pid":"s/KrzysztofStencel","text":"Krzysztof Stencel"},{"@pid":"68/5160","text":"Jerzy Tyszkiewicz"}]},"title":"Translating Relational Queries into Spreadsheets","venue":"CoRR","volume":"abs/1305.2103","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-2103","ee":"http://arxiv.org/abs/1305.2103","url":"https://dblp.org/rec/journals/corr/abs-1305-2103"}, "url":"URL#4262778" }, { "@score":"1", "@id":"4262779", "info":{"authors":{"author":[{"@pid":"36/6469","text":"Sushmita Gupta"},{"@pid":"59/577","text":"Shahin Kamali"},{"@pid":"l/ALopezOrtiz","text":"Alejandro López-Ortiz"}]},"title":"On Advice Complexity of the k-server Problem under Sparse Metrics","venue":"CoRR","volume":"abs/1305.2108","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-2108","ee":"http://arxiv.org/abs/1305.2108","url":"https://dblp.org/rec/journals/corr/abs-1305-2108"}, "url":"URL#4262779" }, { "@score":"1", "@id":"4262780", "info":{"authors":{"author":[{"@pid":"43/7418","text":"YuLong Zou"},{"@pid":"87/6482-1","text":"Xianbin Wang 0001"},{"@pid":"s/WeimingShen","text":"Weiming Shen 0001"}]},"title":"Intercept Probability Analysis of","venue":"CoRR","volume":"abs/1305.2112","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-2112","ee":"http://arxiv.org/abs/1305.2112","url":"https://dblp.org/rec/journals/corr/abs-1305-2112"}, "url":"URL#4262780" }, { "@score":"1", "@id":"4262781", "info":{"authors":{"author":[{"@pid":"89/7909","text":"Xiaoxiao Wu"},{"@pid":"16/5768","text":"Wing-Kin Ma"},{"@pid":"82/3202","text":"Anthony Man-Cho So"}]},"title":"Physical-Layer Multicasting by Stochastic Transmit Beamforming and Alamouti Space-Time Coding","venue":"CoRR","volume":"abs/1305.2123","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-2123","ee":"http://arxiv.org/abs/1305.2123","url":"https://dblp.org/rec/journals/corr/abs-1305-2123"}, "url":"URL#4262781" }, { "@score":"1", "@id":"4262782", "info":{"authors":{"author":[{"@pid":"03/1109","text":"Klaus Glashoff"},{"@pid":"07/2668","text":"Michael M. Bronstein"}]},"title":"Almost-commuting matrices are almost jointly diagonalizable","venue":"CoRR","volume":"abs/1305.2135","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-2135","ee":"http://arxiv.org/abs/1305.2135","url":"https://dblp.org/rec/journals/corr/abs-1305-2135"}, "url":"URL#4262782" }, { "@score":"1", "@id":"4262783", "info":{"authors":{"author":[{"@pid":"21/9014","text":"Minh Ngo"},{"@pid":"59/6145","text":"Fabio Massacci"},{"@pid":"77/6173","text":"Olga Gadyatskaya"}]},"title":"MAP-REDUCE Runtime Enforcement of Information Flow Policies","venue":"CoRR","volume":"abs/1305.2136","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-2136","ee":"http://arxiv.org/abs/1305.2136","url":"https://dblp.org/rec/journals/corr/abs-1305-2136"}, "url":"URL#4262783" }, { "@score":"1", "@id":"4262784", "info":{"authors":{"author":[{"@pid":"49/1548","text":"Igor Pak"},{"@pid":"17/8095","text":"Jed Yang"}]},"title":"The complexity of generalized domino tilings","venue":"CoRR","volume":"abs/1305.2154","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-2154","ee":"http://arxiv.org/abs/1305.2154","url":"https://dblp.org/rec/journals/corr/abs-1305-2154"}, "url":"URL#4262784" }, { "@score":"1", "@id":"4262785", "info":{"authors":{"author":[{"@pid":"121/7973","text":"Gregory Ely"},{"@pid":"14/6374","text":"Shuchin Aeron"}]},"title":"Robust Hydraulic Fracture Monitoring (HFM) of Multiple Time Overlapping Events Using a Generalized Discrete Radon Transform","venue":"CoRR","volume":"abs/1305.2169","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-2169","ee":"http://arxiv.org/abs/1305.2169","url":"https://dblp.org/rec/journals/corr/abs-1305-2169"}, "url":"URL#4262785" }, { "@score":"1", "@id":"4262786", "info":{"authors":{"author":[{"@pid":"121/7973","text":"Gregory Ely"},{"@pid":"14/6374","text":"Shuchin Aeron"},{"@pid":"30/3209","text":"Eric L. Miller 0001"}]},"title":"Exploiting Structural Complexity for Robust and Rapid Hyperspectral Imaging","venue":"CoRR","volume":"abs/1305.2170","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-2170","ee":"http://arxiv.org/abs/1305.2170","url":"https://dblp.org/rec/journals/corr/abs-1305-2170"}, "url":"URL#4262786" }, { "@score":"1", "@id":"4262787", "info":{"authors":{"author":[{"@pid":"42/8036","text":"Hamed Maleki"},{"@pid":"42/2660","text":"Syed Ali Jafar"}]},"title":"Optimality of Orthogonal Access for One-dimensional Convex Cellular Networks","venue":"CoRR","volume":"abs/1305.2173","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-2173","ee":"http://arxiv.org/abs/1305.2173","url":"https://dblp.org/rec/journals/corr/abs-1305-2173"}, "url":"URL#4262787" }, { "@score":"1", "@id":"4262788", "info":{"authors":{"author":[{"@pid":"07/10157","text":"Julien Herzen"},{"@pid":"37/800","text":"Cédric Westphal"},{"@pid":"t/PThiran","text":"Patrick Thiran"}]},"title":"Scalable Routing Easy as PIE: a Practical Isometric Embedding Protocol (Technical Report)","venue":"CoRR","volume":"abs/1305.2190","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-2190","ee":"http://arxiv.org/abs/1305.2190","url":"https://dblp.org/rec/journals/corr/abs-1305-2190"}, "url":"URL#4262788" }, { "@score":"1", "@id":"4262789", "info":{"authors":{"author":{"@pid":"81/4341","text":"Shenghuo Zhu"}},"title":"Stochastic gradient descent algorithms for strongly convex functions at O(1/T) convergence rates","venue":"CoRR","volume":"abs/1305.2218","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-2218","ee":"http://arxiv.org/abs/1305.2218","url":"https://dblp.org/rec/journals/corr/abs-1305-2218"}, "url":"URL#4262789" }, { "@score":"1", "@id":"4262790", "info":{"authors":{"author":[{"@pid":"129/1735","text":"Faouzi Benzarti"},{"@pid":"19/4890","text":"Hamid Amiri"}]},"title":"Repairing and Inpainting Damaged Images using Diffusion Tensor","venue":"CoRR","volume":"abs/1305.2221","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-2221","ee":"http://arxiv.org/abs/1305.2221","url":"https://dblp.org/rec/journals/corr/abs-1305-2221"}, "url":"URL#4262790" }, { "@score":"1", "@id":"4262791", "info":{"authors":{"author":{"@pid":"38/9421","text":"Robin Houston 0001"}},"title":"Linear Logic without Units","venue":"CoRR","volume":"abs/1305.2231","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-2231","ee":"http://arxiv.org/abs/1305.2231","url":"https://dblp.org/rec/journals/corr/abs-1305-2231"}, "url":"URL#4262791" }, { "@score":"1", "@id":"4262792", "info":{"authors":{"author":[{"@pid":"130/3886","text":"Tianyang Bai"},{"@pid":"56/4851","text":"Robert W. Heath Jr."}]},"title":"Asymptotic Coverage Probability and Rate in Massive MIMO Networks","venue":"CoRR","volume":"abs/1305.2233","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-2233","ee":"http://arxiv.org/abs/1305.2233","url":"https://dblp.org/rec/journals/corr/abs-1305-2233"}, "url":"URL#4262792" }, { "@score":"1", "@id":"4262793", "info":{"authors":{"author":[{"@pid":"35/2899-1","text":"Han Liu 0001"},{"@pid":"06/3311","text":"Lie Wang"},{"@pid":"82/199","text":"Tuo Zhao"}]},"title":"Calibrated Multivariate Regression with Application to Neural Semantic Basis Discovery.","venue":"CoRR","volume":"abs/1305.2238","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-2238","ee":"http://arxiv.org/abs/1305.2238","url":"https://dblp.org/rec/journals/corr/abs-1305-2238"}, "url":"URL#4262793" }, { "@score":"1", "@id":"4262794", "info":{"authors":{"author":[{"@pid":"71/6889","text":"Andrew W. Eckford"},{"@pid":"53/36-1","text":"Peter J. Thomas 0001"}]},"title":"Capacity of a Simple Intercellular Signal Transduction Channel","venue":"CoRR","volume":"abs/1305.2245","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-2245","ee":"http://arxiv.org/abs/1305.2245","url":"https://dblp.org/rec/journals/corr/abs-1305-2245"}, "url":"URL#4262794" }, { "@score":"1", "@id":"4262795", "info":{"authors":{"author":[{"@pid":"61/7730","text":"Madhur Srivastava"},{"@pid":"86/352","text":"Prasanta K. Panigrahi"}]},"title":"Quantum Image Representation Through Two-Dimensional Quantum States and Normalized Amplitude","venue":"CoRR","volume":"abs/1305.2251","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-2251","ee":"http://arxiv.org/abs/1305.2251","url":"https://dblp.org/rec/journals/corr/abs-1305-2251"}, "url":"URL#4262795" }, { "@score":"1", "@id":"4262796", "info":{"authors":{"author":[{"@pid":"08/9282","text":"William Yang Wang"},{"@pid":"130/3733","text":"Kathryn Mazaitis"},{"@pid":"c/WWCohen","text":"William W. Cohen"}]},"title":"Programming with Personalized PageRank: A Locally Groundable First-Order Probabilistic Logic","venue":"CoRR","volume":"abs/1305.2254","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-2254","ee":"http://arxiv.org/abs/1305.2254","url":"https://dblp.org/rec/journals/corr/abs-1305-2254"}, "url":"URL#4262796" }, { "@score":"1", "@id":"4262797", "info":{"authors":{"author":[{"@pid":"49/8816","text":"Mostepha Redouane Khouadjia"},{"@pid":"67/5235","text":"Marc Schoenauer"},{"@pid":"09/5817-1","text":"Vincent Vidal 0001"},{"@pid":"03/2344","text":"Johann Dréo"},{"@pid":"02/5876","text":"Pierre Savéant"}]},"title":"Quality Measures of Parameter Tuning for Aggregated Multi-Objective Temporal Planning","venue":"CoRR","volume":"abs/1305.2265","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-2265","ee":"http://arxiv.org/abs/1305.2265","url":"https://dblp.org/rec/journals/corr/abs-1305-2265"}, "url":"URL#4262797" }, { "@score":"1", "@id":"4262798", "info":{"authors":{"author":[{"@pid":"35/5625-8","text":"Fang Wang 0008"},{"@pid":"59/871-25","text":"Yi Li 0025"}]},"title":"Beyond Physical Connections: Tree Models in Human Pose Estimation","venue":"CoRR","volume":"abs/1305.2269","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-2269","ee":"http://arxiv.org/abs/1305.2269","url":"https://dblp.org/rec/journals/corr/abs-1305-2269"}, "url":"URL#4262798" }, { "@score":"1", "@id":"4262799", "info":{"authors":{"author":[{"@pid":"39/10261","text":"Seung Min Yu"},{"@pid":"87/47-1","text":"Jinho Choi 0001"},{"@pid":"32/673","text":"Seong-Lyun Kim"}]},"title":"Spreading Information in Mobile Wireless Networks","venue":"CoRR","volume":"abs/1305.2275","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-2275","ee":"http://arxiv.org/abs/1305.2275","url":"https://dblp.org/rec/journals/corr/abs-1305-2275"}, "url":"URL#4262799" }, { "@score":"1", "@id":"4262800", "info":{"authors":{"author":[{"@pid":"130/3806","text":"Omer Faruk Sozcu"},{"@pid":"35/10709","text":"Rushan Ziatdinov"},{"@pid":"130/3926","text":"Ismail Ipek"}]},"title":"The effects of computer assisted and distance learning of geometric modelling","venue":"CoRR","volume":"abs/1305.2276","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-2276","ee":"http://arxiv.org/abs/1305.2276","url":"https://dblp.org/rec/journals/corr/abs-1305-2276"}, "url":"URL#4262800" }, { "@score":"1", "@id":"4262801", "info":{"authors":{"author":[{"@pid":"123/4558","text":"Chengfeng Wen"},{"@pid":"77/1959","text":"Lok Ming Lui"}]},"title":"Geometric Registration of High-genus Surfaces","venue":"CoRR","volume":"abs/1305.2283","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-2283","ee":"http://arxiv.org/abs/1305.2283","url":"https://dblp.org/rec/journals/corr/abs-1305-2283"}, "url":"URL#4262801" }, { "@score":"1", "@id":"4262802", "info":{"authors":{"author":[{"@pid":"86/10265","text":"Klaus von Gleissenthall"},{"@pid":"r/AndreyRybalchenko","text":"Andrey Rybalchenko"}]},"title":"An Epistemic Perspective on Consistency of Concurrent Computations","venue":"CoRR","volume":"abs/1305.2295","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-2295","ee":"http://arxiv.org/abs/1305.2295","url":"https://dblp.org/rec/journals/corr/abs-1305-2295"}, "url":"URL#4262802" }, { "@score":"1", "@id":"4262803", "info":{"authors":{"author":[{"@pid":"83/10333","text":"Joshua Bialkowski"},{"@pid":"27/5773","text":"Michael W. Otte"},{"@pid":"78/2284","text":"Emilio Frazzoli"}]},"title":"Fast Collision Checking: From Single Robots to Multi-Robot Teams","venue":"CoRR","volume":"abs/1305.2299","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-2299","ee":"http://arxiv.org/abs/1305.2299","url":"https://dblp.org/rec/journals/corr/abs-1305-2299"}, "url":"URL#4262803" }, { "@score":"1", "@id":"4262804", "info":{"authors":{"author":{"@pid":"130/3805","text":"Sowmyan Jegatheesan"}},"title":"Cookies Invading Our Privacy for Marketing Advertising and Security Issues","venue":"CoRR","volume":"abs/1305.2306","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-2306","ee":"http://arxiv.org/abs/1305.2306","url":"https://dblp.org/rec/journals/corr/abs-1305-2306"}, "url":"URL#4262804" }, { "@score":"1", "@id":"4262805", "info":{"authors":{"author":[{"@pid":"22/1017","text":"Yehia El-khatib"},{"@pid":"b/GordonSBlair","text":"Gordon S. Blair"},{"@pid":"44/4460","text":"Bholanathsingh Surajbali"}]},"title":"Experiences of Using a Hybrid Cloud to Construct an Environmental Virtual Observatory","venue":"CoRR","volume":"abs/1305.2319","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-2319","ee":"http://arxiv.org/abs/1305.2319","url":"https://dblp.org/rec/journals/corr/abs-1305-2319"}, "url":"URL#4262805" }, { "@score":"1", "@id":"4262806", "info":{"authors":{"author":[{"@pid":"130/3768","text":"Harimalala Razanamanampisoa"},{"@pid":"130/3924","text":"Zely Arivelo Randriamanantany"},{"@pid":"130/3893","text":"Hery Tiana Rakotondramiarana"},{"@pid":"123/4579","text":"François Garde"},{"@pid":"123/4570","text":"Harry Boyer"}]},"title":"Simulation of a typical house in the region of Antananarivo, Madagascar. Determination of passive solutions using local materials.","venue":"CoRR","volume":"abs/1305.2322","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-2322","ee":"http://arxiv.org/abs/1305.2322","url":"https://dblp.org/rec/journals/corr/abs-1305-2322"}, "url":"URL#4262806" }, { "@score":"1", "@id":"4262807", "info":{"authors":{"author":[{"@pid":"h/MartinHoefer","text":"Martin Hoefer 0001"},{"@pid":"48/7186","text":"Thomas Kesselheim"}]},"title":"Universally Truthful Secondary Spectrum Auctions","venue":"CoRR","volume":"abs/1305.2350","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-2350","ee":"http://arxiv.org/abs/1305.2350","url":"https://dblp.org/rec/journals/corr/abs-1305-2350"}, "url":"URL#4262807" }, { "@score":"1", "@id":"4262808", "info":{"authors":{"author":[{"@pid":"130/3732","text":"Rashmi Makhijani"},{"@pid":"59/6763","text":"Urmila Shrawankar"},{"@pid":"26/2161","text":"Vilas M. Thakare"}]},"title":"Speech Enhancement Using Pitch Detection Approach For Noisy Environment","venue":"CoRR","volume":"abs/1305.2352","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-2352","ee":"http://arxiv.org/abs/1305.2352","url":"https://dblp.org/rec/journals/corr/abs-1305-2352"}, "url":"URL#4262808" }, { "@score":"1", "@id":"4262809", "info":{"authors":{"author":[{"@pid":"130/3883","text":"Jonathan D. Hogg"},{"@pid":"32/483","text":"Jennifer A. Scott"}]},"title":"Compressed threshold pivoting for sparse symmetric indefinite systems","venue":"CoRR","volume":"abs/1305.2353","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-2353","ee":"http://arxiv.org/abs/1305.2353","url":"https://dblp.org/rec/journals/corr/abs-1305-2353"}, "url":"URL#4262809" }, { "@score":"1", "@id":"4262810", "info":{"authors":{"author":[{"@pid":"116/2915","text":"Michele Starnini"},{"@pid":"130/3867","text":"Anna Machens"},{"@pid":"42/5539","text":"Ciro Cattuto"},{"@pid":"67/3434","text":"Alain Barrat"},{"@pid":"77/8654","text":"Romualdo Pastor-Satorras"}]},"title":"Immunization strategies for epidemic processes in time-varying contact networks","venue":"CoRR","volume":"abs/1305.2357","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-2357","ee":"http://arxiv.org/abs/1305.2357","url":"https://dblp.org/rec/journals/corr/abs-1305-2357"}, "url":"URL#4262810" }, { "@score":"1", "@id":"4262811", "info":{"authors":{"author":[{"@pid":"81/6421","text":"David P. Wipf"},{"@pid":"57/3924","text":"Haichao Zhang"}]},"title":"Revisiting Bayesian Blind Deconvolution","venue":"CoRR","volume":"abs/1305.2362","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-2362","ee":"http://arxiv.org/abs/1305.2362","url":"https://dblp.org/rec/journals/corr/abs-1305-2362"}, "url":"URL#4262811" }, { "@score":"1", "@id":"4262812", "info":{"authors":{"author":[{"@pid":"20/9562","text":"Deepali Virmani"},{"@pid":"130/3920","text":"Dhruv Talwar"},{"@pid":"130/3876","text":"Arun Dhingra"},{"@pid":"130/3685","text":"Tushar Bahl"}]},"title":"Priority Based Energy-Efficient Data Forwarding Algorithm in Wireless Sensor Networks","venue":"CoRR","volume":"abs/1305.2369","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-2369","ee":"http://arxiv.org/abs/1305.2369","url":"https://dblp.org/rec/journals/corr/abs-1305-2369"}, "url":"URL#4262812" }, { "@score":"1", "@id":"4262813", "info":{"authors":{"author":[{"@pid":"20/9562","text":"Deepali Virmani"},{"@pid":"30/9561","text":"Satbir Jain"}]},"title":"Scalable, Robust and Real Time Communication Architecture For Wireless Sensor Networks","venue":"CoRR","volume":"abs/1305.2370","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-2370","ee":"http://arxiv.org/abs/1305.2370","url":"https://dblp.org/rec/journals/corr/abs-1305-2370"}, "url":"URL#4262813" }, { "@score":"1", "@id":"4262814", "info":{"authors":{"author":[{"@pid":"03/1109","text":"Klaus Glashoff"},{"@pid":"07/2668","text":"Michael M. Bronstein"}]},"title":"Asymptotic metrics on the space of matrices under the commutation relation","venue":"CoRR","volume":"abs/1305.2384","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-2384","ee":"http://arxiv.org/abs/1305.2384","url":"https://dblp.org/rec/journals/corr/abs-1305-2384"}, "url":"URL#4262814" }, { "@score":"1", "@id":"4262815", "info":{"authors":{"author":[{"@pid":"217/3505","text":"Mohammad Ali Javidian"},{"@pid":"48/7924","text":"Rasoul Ramezanian"}]},"title":"Disappointment in Social Choice Protocols","venue":"CoRR","volume":"abs/1305.2386","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-2386","ee":"http://arxiv.org/abs/1305.2386","url":"https://dblp.org/rec/journals/corr/abs-1305-2386"}, "url":"URL#4262815" }, { "@score":"1", "@id":"4262816", "info":{"authors":{"author":[{"@pid":"60/4951","text":"Jianxin Liao"},{"@pid":"97/8704-94","text":"Lei Zhang 0094"},{"@pid":"09/4144-2","text":"Xiaomin Zhu 0002"},{"@pid":"37/2749-1","text":"Jingyu Wang 0001"},{"@pid":"130/3902","text":"Minyan Liao"}]},"title":"Loss Rate Based Fountain Codes for Data Transfer","venue":"CoRR","volume":"abs/1305.2387","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-2387","ee":"http://arxiv.org/abs/1305.2387","url":"https://dblp.org/rec/journals/corr/abs-1305-2387"}, "url":"URL#4262816" }, { "@score":"1", "@id":"4262817", "info":{"authors":{"author":[{"@pid":"117/9204","text":"Shafigh Parsazad"},{"@pid":"61/3123","text":"Ehsan Saboori"},{"@pid":"117/9438","text":"Amin Allahyar"}]},"title":"Fast Feature Reduction in intrusion detection datasets","venue":"CoRR","volume":"abs/1305.2388","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-2388","ee":"http://arxiv.org/abs/1305.2388","url":"https://dblp.org/rec/journals/corr/abs-1305-2388"}, "url":"URL#4262817" }, { "@score":"1", "@id":"4262818", "info":{"authors":{"author":[{"@pid":"95/884","text":"Kohtaro Tadaki"},{"@pid":"92/5313","text":"Norihisa Doi"}]},"title":"Cryptography and Algorithmic Randomness","venue":"CoRR","volume":"abs/1305.2391","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-2391","ee":"http://arxiv.org/abs/1305.2391","url":"https://dblp.org/rec/journals/corr/abs-1305-2391"}, "url":"URL#4262818" }, { "@score":"1", "@id":"4262819", "info":{"authors":{"author":[{"@pid":"28/6782","text":"Toshiro Kubota"},{"@pid":"130/4027","text":"Jessica Ranck"},{"@pid":"130/3858","text":"Briley Acker"},{"@pid":"130/3980","text":"Herman De Haan"}]},"title":"Shape Reconstruction and Recognition with Isolated Non-directional Cues","venue":"CoRR","volume":"abs/1305.2395","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-2395","ee":"http://arxiv.org/abs/1305.2395","url":"https://dblp.org/rec/journals/corr/abs-1305-2395"}, "url":"URL#4262819" }, { "@score":"1", "@id":"4262820", "info":{"authors":{"author":[{"@pid":"30/976","text":"Mikal Ziane"},{"@pid":"71/1464","text":"Mel Ó Cinnéide"}]},"title":"The Case for Explicit Coupling Constraints","venue":"CoRR","volume":"abs/1305.2398","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-2398","ee":"http://arxiv.org/abs/1305.2398","url":"https://dblp.org/rec/journals/corr/abs-1305-2398"}, "url":"URL#4262820" }, { "@score":"1", "@id":"4262821", "info":{"authors":{"author":{"@pid":"54/11468","text":"George A. Lozano"}},"title":"Ethics of using language editing services in an era of digital communication and heavily multiauthored papers","venue":"CoRR","volume":"abs/1305.2401","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-2401","ee":"http://arxiv.org/abs/1305.2401","url":"https://dblp.org/rec/journals/corr/abs-1305-2401"}, "url":"URL#4262821" }, { "@score":"1", "@id":"4262822", "info":{"authors":{"author":{"@pid":"37/2351","text":"James J. Cusick"}},"title":"Architecture and Production Readiness Reviews in Practice","venue":"CoRR","volume":"abs/1305.2402","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-2402","ee":"http://arxiv.org/abs/1305.2402","url":"https://dblp.org/rec/journals/corr/abs-1305-2402"}, "url":"URL#4262822" }, { "@score":"1", "@id":"4262823", "info":{"authors":{"author":{"@pid":"45/11240-1","text":"Djallel Bouneffouf 0001"}},"title":"Exponentiated Gradient LINUCB for Contextual Multi-Armed Bandits","venue":"CoRR","volume":"abs/1305.2415","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-2415","ee":"http://arxiv.org/abs/1305.2415","url":"https://dblp.org/rec/journals/corr/abs-1305-2415"}, "url":"URL#4262823" }, { "@score":"1", "@id":"4262824", "info":{"authors":{"author":{"@pid":"87/3135","text":"Thierry Moreau"}},"title":"Towards a Better Approximation of Full Domain Hash - or - The Reef and Shoal Integrity Arrangement","venue":"CoRR","volume":"abs/1305.2426","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-2426","ee":"http://arxiv.org/abs/1305.2426","url":"https://dblp.org/rec/journals/corr/abs-1305-2426"}, "url":"URL#4262824" }, { "@score":"1", "@id":"4262825", "info":{"authors":{"author":{"@pid":"24/9830","text":"Yakov Babichenko"}},"title":"Small Support Equilibria in Large Games","venue":"CoRR","volume":"abs/1305.2432","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-2432","ee":"http://arxiv.org/abs/1305.2432","url":"https://dblp.org/rec/journals/corr/abs-1305-2432"}, "url":"URL#4262825" }, { "@score":"1", "@id":"4262826", "info":{"authors":{"author":[{"@pid":"02/10264","text":"Po-Ling Loh"},{"@pid":"48/6396","text":"Martin J. Wainwright"}]},"title":"Regularized M-estimators with nonconvexity: Statistical and algorithmic theory for local optima","venue":"CoRR","volume":"abs/1305.2436","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-2436","ee":"http://arxiv.org/abs/1305.2436","url":"https://dblp.org/rec/journals/corr/abs-1305-2436"}, "url":"URL#4262826" }, { "@score":"1", "@id":"4262827", "info":{"authors":{"author":{"@pid":"91/1253","text":"Chao Tian"}},"title":"Rate Region of the (4,3,3) Exact-Repair Regenerating Codes","venue":"CoRR","volume":"abs/1305.2440","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-2440","ee":"http://arxiv.org/abs/1305.2440","url":"https://dblp.org/rec/journals/corr/abs-1305-2440"}, "url":"URL#4262827" }, { "@score":"1", "@id":"4262828", "info":{"authors":{"author":[{"@pid":"130/3982","text":"Itai Feigenbaum"},{"@pid":"69/704","text":"Jay Sethuraman"},{"@pid":"91/5496","text":"Chun Ye"}]},"title":"Approximately Optimal Mechanisms for Strategyproof Facility Location: Minimizing $L_p$ Norm of Costs","venue":"CoRR","volume":"abs/1305.2446","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-2446","ee":"http://arxiv.org/abs/1305.2446","url":"https://dblp.org/rec/journals/corr/abs-1305-2446"}, "url":"URL#4262828" }, { "@score":"1", "@id":"4262829", "info":{"authors":{"author":[{"@pid":"94/3075","text":"James R. Foulds"},{"@pid":"56/10549","text":"Levi Boyles"},{"@pid":"30/8315","text":"Christopher DuBois"},{"@pid":"s/PadhraicSmyth","text":"Padhraic Smyth"},{"@pid":"16/2286","text":"Max Welling"}]},"title":"Stochastic Collapsed Variational Bayesian Inference for Latent Dirichlet Allocation","venue":"CoRR","volume":"abs/1305.2452","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-2452","ee":"http://arxiv.org/abs/1305.2452","url":"https://dblp.org/rec/journals/corr/abs-1305-2452"}, "url":"URL#4262829" }, { "@score":"1", "@id":"4262830", "info":{"authors":{"author":[{"@pid":"93/11153","text":"Jonathan Starr"},{"@pid":"75/7589","text":"Omar El Ayach"},{"@pid":"56/4851","text":"Robert W. Heath Jr."}]},"title":"Interference Alignment in Distributed Antenna Systems","venue":"CoRR","volume":"abs/1305.2459","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-2459","ee":"http://arxiv.org/abs/1305.2459","url":"https://dblp.org/rec/journals/corr/abs-1305-2459"}, "url":"URL#4262830" }, { "@score":"1", "@id":"4262831", "info":{"authors":{"author":[{"@pid":"75/7589","text":"Omar El Ayach"},{"@pid":"98/6069","text":"Sridhar Rajagopal"},{"@pid":"62/3182","text":"Shadi Abu-Surra"},{"@pid":"53/6312","text":"Zhouyue Pi"},{"@pid":"56/4851","text":"Robert W. Heath Jr."}]},"title":"Spatially Sparse Precoding in Millimeter Wave MIMO Systems","venue":"CoRR","volume":"abs/1305.2460","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-2460","ee":"http://arxiv.org/abs/1305.2460","url":"https://dblp.org/rec/journals/corr/abs-1305-2460"}, "url":"URL#4262831" }, { "@score":"1", "@id":"4262832", "info":{"authors":{"author":[{"@pid":"11/2440","text":"Sonia Pérez-Díaz"},{"@pid":"25/811","text":"Li-Yong Shen"}]},"title":"Numerical Reparametrization of Rational Parametric Plane Curves","venue":"CoRR","volume":"abs/1305.2461","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-2461","ee":"http://arxiv.org/abs/1305.2461","url":"https://dblp.org/rec/journals/corr/abs-1305-2461"}, "url":"URL#4262832" }, { "@score":"1", "@id":"4262833", "info":{"authors":{"author":[{"@pid":"11/2440","text":"Sonia Pérez-Díaz"},{"@pid":"25/811","text":"Li-Yong Shen"}]},"title":"Characterization of Rational Ruled Surfaces","venue":"CoRR","volume":"abs/1305.2462","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-2462","ee":"http://arxiv.org/abs/1305.2462","url":"https://dblp.org/rec/journals/corr/abs-1305-2462"}, "url":"URL#4262833" }, { "@score":"1", "@id":"4262834", "info":{"authors":{"author":[{"@pid":"11/2440","text":"Sonia Pérez-Díaz"},{"@pid":"25/811","text":"Li-Yong Shen"}]},"title":"Determination and (re)parametrization of rational developable surfaces","venue":"CoRR","volume":"abs/1305.2463","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-2463","ee":"http://arxiv.org/abs/1305.2463","url":"https://dblp.org/rec/journals/corr/abs-1305-2463"}, "url":"URL#4262834" }, { "@score":"1", "@id":"4262835", "info":{"authors":{"author":[{"@pid":"d/ZdenekDvorak","text":"Zdenek Dvorák 0001"},{"@pid":"34/1317","text":"Bernard Lidický"}]},"title":"3-coloring triangle-free planar graphs with a precolored 8-cycle","venue":"CoRR","volume":"abs/1305.2467","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-2467","ee":"http://arxiv.org/abs/1305.2467","url":"https://dblp.org/rec/journals/corr/abs-1305-2467"}, "url":"URL#4262835" }, { "@score":"1", "@id":"4262836", "info":{"authors":{"author":[{"@pid":"92/6364","text":"Takayuki Nozaki"},{"@pid":"130/3713","text":"Masaki Maehara"},{"@pid":"47/1332","text":"Kenta Kasai"},{"@pid":"47/6166","text":"Kohichi Sakaniwa"}]},"title":"Weight Distribution for Non-binary Cluster LDPC Code Ensemble","venue":"CoRR","volume":"abs/1305.2480","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-2480","ee":"http://arxiv.org/abs/1305.2480","url":"https://dblp.org/rec/journals/corr/abs-1305-2480"}, "url":"URL#4262836" }, { "@score":"1", "@id":"4262837", "info":{"authors":{"author":[{"@pid":"19/818","text":"Boris Mitavskiy"},{"@pid":"75/5705-4","text":"Jun He 0004"}]},"title":"Combining Drift Analysis and Generalized Schema Theory to Design Efficient Hybrid and/or Mixed Strategy EAs","venue":"CoRR","volume":"abs/1305.2490","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-2490","ee":"http://arxiv.org/abs/1305.2490","url":"https://dblp.org/rec/journals/corr/abs-1305-2490"}, "url":"URL#4262837" }, { "@score":"1", "@id":"4262838", "info":{"authors":{"author":[{"@pid":"48/6760","text":"Svetlana Selivanova"},{"@pid":"60/934","text":"Victor L. Selivanov"}]},"title":"Computing Solution Operators of Boundary-value Problems for Some Linear Hyperbolic Systems of PDEs","venue":"CoRR","volume":"abs/1305.2494","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-2494","ee":"http://arxiv.org/abs/1305.2494","url":"https://dblp.org/rec/journals/corr/abs-1305-2494"}, "url":"URL#4262838" }, { "@score":"1", "@id":"4262839", "info":{"authors":{"author":[{"@pid":"130/3765","text":"Kristof Z. Szalay"},{"@pid":"18/7660","text":"Peter Csermely"}]},"title":"Perturbation centrality: a novel centrality measure obtained by the general network dynamics tool, Turbine","venue":"CoRR","volume":"abs/1305.2496","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-2496","ee":"http://arxiv.org/abs/1305.2496","url":"https://dblp.org/rec/journals/corr/abs-1305-2496"}, "url":"URL#4262839" }, { "@score":"1", "@id":"4262840", "info":{"authors":{"author":[{"@pid":"19/818","text":"Boris Mitavskiy"},{"@pid":"75/5705-4","text":"Jun He 0004"}]},"title":"A Further Generalization of the Finite-Population Geiringer-like Theorem for POMDPs to Allow Recombination Over Arbitrary Set Covers.","venue":"CoRR","volume":"abs/1305.2498","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-2498","ee":"http://arxiv.org/abs/1305.2498","url":"https://dblp.org/rec/journals/corr/abs-1305-2498"}, "url":"URL#4262840" }, { "@score":"1", "@id":"4262841", "info":{"authors":{"author":[{"@pid":"130/3819","text":"Ramkumar Lakshminarayanan"},{"@pid":"130/3712","text":"R. D. Balaji"},{"@pid":"122/2136-2","text":"Binod Kumar 0002"},{"@pid":"130/3889","text":"Malathi Balaji"}]},"title":"Augmented Reality in ICT for Minimum Knowledge Loss","venue":"CoRR","volume":"abs/1305.2500","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-2500","ee":"http://arxiv.org/abs/1305.2500","url":"https://dblp.org/rec/journals/corr/abs-1305-2500"}, "url":"URL#4262841" }, { "@score":"1", "@id":"4262842", "info":{"authors":{"author":[{"@pid":"19/818","text":"Boris Mitavskiy"},{"@pid":"76/3556","text":"Elio Tuci"},{"@pid":"55/6939","text":"Chris Cannings"},{"@pid":"65/2039","text":"Jonathan E. Rowe"},{"@pid":"75/5705-4","text":"Jun He 0004"}]},"title":"Geiringer Theorems: From Population Genetics to Computational Intelligence, Memory Evolutive Systems and Hebbian Learning","venue":"CoRR","volume":"abs/1305.2504","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-2504","ee":"http://arxiv.org/abs/1305.2504","url":"https://dblp.org/rec/journals/corr/abs-1305-2504"}, "url":"URL#4262842" }, { "@score":"1", "@id":"4262843", "info":{"authors":{"author":[{"@pid":"70/7247","text":"Purushottam Kar"},{"@pid":"01/6464","text":"Bharath K. Sriperumbudur"},{"@pid":"32/465-2","text":"Prateek Jain 0002"},{"@pid":"33/501","text":"Harish Karnick"}]},"title":"On the Generalization Ability of Online Learning Algorithms for Pairwise Loss Functions","venue":"CoRR","volume":"abs/1305.2505","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-2505","ee":"http://arxiv.org/abs/1305.2505","url":"https://dblp.org/rec/journals/corr/abs-1305-2505"}, "url":"URL#4262843" }, { "@score":"1", "@id":"4262844", "info":{"authors":{"author":[{"@pid":"155/9723","text":"Rina Foygel"},{"@pid":"05/2961","text":"Lester W. Mackey"}]},"title":"Corrupted Sensing: Novel Guarantees for Separating Structured Signals","venue":"CoRR","volume":"abs/1305.2524","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-2524","ee":"http://arxiv.org/abs/1305.2524","url":"https://dblp.org/rec/journals/corr/abs-1305-2524"}, "url":"URL#4262844" }, { "@score":"1", "@id":"4262845", "info":{"authors":{"author":[{"@pid":"93/2963","text":"Stéphane Ross"},{"@pid":"67/3448","text":"Jiaji Zhou"},{"@pid":"28/1244","text":"Yisong Yue"},{"@pid":"76/10090","text":"Debadeepta Dey"},{"@pid":"65/2021","text":"J. Andrew Bagnell"}]},"title":"Learning Policies for Contextual Submodular Prediction","venue":"CoRR","volume":"abs/1305.2532","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-2532","ee":"http://arxiv.org/abs/1305.2532","url":"https://dblp.org/rec/journals/corr/abs-1305-2532"}, "url":"URL#4262845" }, { "@score":"1", "@id":"4262846", "info":{"authors":{"author":[{"@pid":"130/4038","text":"Dmitry Kosolobov"},{"@pid":"130/3725","text":"Mikhail Rubinchik"},{"@pid":"05/3762","text":"Arseny M. Shur"}]},"title":"Finding Distinct Subpalindromes Online","venue":"CoRR","volume":"abs/1305.2540","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-2540","ee":"http://arxiv.org/abs/1305.2540","url":"https://dblp.org/rec/journals/corr/abs-1305-2540"}, "url":"URL#4262846" }, { "@score":"1", "@id":"4262847", "info":{"authors":{"author":[{"@pid":"15/2638","text":"Ashwinkumar Badanidiyuru"},{"@pid":"k/RDKleinberg","text":"Robert Kleinberg"},{"@pid":"91/4014","text":"Aleksandrs Slivkins"}]},"title":"Bandits with Knapsacks","venue":"CoRR","volume":"abs/1305.2545","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-2545","ee":"http://arxiv.org/abs/1305.2545","url":"https://dblp.org/rec/journals/corr/abs-1305-2545"}, "url":"URL#4262847" }, { "@score":"1", "@id":"4262848", "info":{"authors":{"author":[{"@pid":"88/6408","text":"Raúl H. Etkin"},{"@pid":"99/4585","text":"Farzad Parvaresh"},{"@pid":"31/9223","text":"Ilan Shomorony"},{"@pid":"63/1946","text":"Amir Salman Avestimehr"}]},"title":"On Min-Cut Algorithms for Half-Duplex Relay Networks","venue":"CoRR","volume":"abs/1305.2548","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-2548","ee":"http://arxiv.org/abs/1305.2548","url":"https://dblp.org/rec/journals/corr/abs-1305-2548"}, "url":"URL#4262848" }, { "@score":"1", "@id":"4262849", "info":{"authors":{"author":[{"@pid":"130/3881","text":"Guiomar Niso"},{"@pid":"130/3783","text":"Ricardo Bruña"},{"@pid":"01/5943","text":"Ernesto Pereda"},{"@pid":"130/4053","text":"Ricardo Gutiérrez"},{"@pid":"90/11390","text":"Ricardo Bajo"},{"@pid":"26/11374","text":"Fernando Maestú"},{"@pid":"69/5252","text":"Francisco del Pozo"}]},"title":"HERMES: towards an integrated toolbox to characterize functional and effective brain connectivity","venue":"CoRR","volume":"abs/1305.2550","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-2550","ee":"http://arxiv.org/abs/1305.2550","url":"https://dblp.org/rec/journals/corr/abs-1305-2550"}, "url":"URL#4262849" }, { "@score":"1", "@id":"4262850", "info":{"authors":{"author":[{"@pid":"125/8189-141","text":"Jun Wang 0141"},{"@pid":"88/7706","text":"Xi Xiong"},{"@pid":"21/6121-5","text":"Peng Liu 0005"}]},"title":"Practical Fine-grained Privilege Separation in Multithreaded Applications","venue":"CoRR","volume":"abs/1305.2553","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-2553","ee":"http://arxiv.org/abs/1305.2553","url":"https://dblp.org/rec/journals/corr/abs-1305-2553"}, "url":"URL#4262850" }, { "@score":"1", "@id":"4262851", "info":{"authors":{"author":[{"@pid":"99/2497","text":"Kartik Talamadupula"},{"@pid":"39/4681","text":"Octavian Udrea"},{"@pid":"80/5282","text":"Anton Riabov"},{"@pid":"73/6323","text":"Anand Ranganathan"}]},"title":"Strategic Planning for Network Data Analysis","venue":"CoRR","volume":"abs/1305.2561","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-2561","ee":"http://arxiv.org/abs/1305.2561","url":"https://dblp.org/rec/journals/corr/abs-1305-2561"}, "url":"URL#4262851" }, { "@score":"1", "@id":"4262852", "info":{"authors":{"author":[{"@pid":"95/2750","text":"Shai Shalev-Shwartz"},{"@pid":"07/4227-1","text":"Tong Zhang 0001"}]},"title":"Accelerated Mini-Batch Stochastic Dual Coordinate Ascent","venue":"CoRR","volume":"abs/1305.2581","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-2581","ee":"http://arxiv.org/abs/1305.2581","url":"https://dblp.org/rec/journals/corr/abs-1305-2581"}, "url":"URL#4262852" }, { "@score":"1", "@id":"4262853", "info":{"authors":{"author":[{"@pid":"61/10819","text":"Elad Domanovitz"},{"@pid":"03/3440","text":"Uri Erez"}]},"title":"On the Performance Limits of Scalar Coding Over MISO Channels","venue":"CoRR","volume":"abs/1305.2592","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-2592","ee":"http://arxiv.org/abs/1305.2592","url":"https://dblp.org/rec/journals/corr/abs-1305-2592"}, "url":"URL#4262853" }, { "@score":"1", "@id":"4262854", "info":{"authors":{"author":[{"@pid":"130/3712","text":"R. D. Balaji"},{"@pid":"130/3946","text":"Brijesh Ramniklal"},{"@pid":"130/3831","text":"N. Balasupramanian"},{"@pid":"130/3736","text":"Er. R. Malathi"}]},"title":"Mnemonics for Higher Education Using Contemporary Technologies","venue":"CoRR","volume":"abs/1305.2609","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-2609","ee":"http://arxiv.org/abs/1305.2609","url":"https://dblp.org/rec/journals/corr/abs-1305-2609"}, "url":"URL#4262854" }, { "@score":"1", "@id":"4262855", "info":{"authors":{"author":[{"@pid":"130/3819","text":"Ramkumar Lakshminarayanan"},{"@pid":"122/2136-2","text":"Binod Kumar 0002"},{"@pid":"130/3706","text":"M. Raju"}]},"title":"Cloud Computing Benefits for Educational Institutions","venue":"CoRR","volume":"abs/1305.2616","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-2616","ee":"http://arxiv.org/abs/1305.2616","url":"https://dblp.org/rec/journals/corr/abs-1305-2616"}, "url":"URL#4262855" }, { "@score":"1", "@id":"4262856", "info":{"authors":{"author":{"@pid":"10/4127","text":"Mark Korenblit"}},"title":"Full Square Rhomboids and Their Algebraic Expressions","venue":"CoRR","volume":"abs/1305.2636","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-2636","ee":"http://arxiv.org/abs/1305.2636","url":"https://dblp.org/rec/journals/corr/abs-1305-2636"}, "url":"URL#4262856" }, { "@score":"1", "@id":"4262857", "info":{"authors":{"author":[{"@pid":"23/3439-5","text":"Sheng Li 0005"},{"@pid":"98/6670","text":"Rodrigo C. de Lamare"}]},"title":"Adaptive Frequency Domain Detectors for SC-FDE in Multiuser DS-UWB Systems with Structured Channel Estimation and Direct Adaptation.","venue":"CoRR","volume":"abs/1305.2642","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-2642","ee":"http://arxiv.org/abs/1305.2642","url":"https://dblp.org/rec/journals/corr/abs-1305-2642"}, "url":"URL#4262857" }, { "@score":"1", "@id":"4262858", "info":{"authors":{"author":[{"@pid":"10/4127","text":"Mark Korenblit"},{"@pid":"89/3708","text":"Vadim E. Levit"}]},"title":"On the Optimal Representation of Algebraic Expressions of Fibonacci Graphs","venue":"CoRR","volume":"abs/1305.2645","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-2645","ee":"http://arxiv.org/abs/1305.2645","url":"https://dblp.org/rec/journals/corr/abs-1305-2645"}, "url":"URL#4262858" }, { "@score":"1", "@id":"4262859", "info":{"authors":{"author":[{"@pid":"10/4127","text":"Mark Korenblit"},{"@pid":"89/3708","text":"Vadim E. Levit"}]},"title":"Fibonacci Graphs and their Expressions","venue":"CoRR","volume":"abs/1305.2647","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-2647","ee":"http://arxiv.org/abs/1305.2647","url":"https://dblp.org/rec/journals/corr/abs-1305-2647"}, "url":"URL#4262859" }, { "@score":"1", "@id":"4262860", "info":{"authors":{"author":{"@pid":"05/9061","text":"Matus Telgarsky"}},"title":"Boosting with the Logistic Loss is Consistent","venue":"CoRR","volume":"abs/1305.2648","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-2648","ee":"http://arxiv.org/abs/1305.2648","url":"https://dblp.org/rec/journals/corr/abs-1305-2648"}, "url":"URL#4262860" }, { "@score":"1", "@id":"4262861", "info":{"authors":{"author":{"@pid":"130/3692","text":"Samuel Zbarsky"}},"title":"On Improved Bounds on Bounded Degree Spanning Trees for Points in Arbitrary Dimension","venue":"CoRR","volume":"abs/1305.2661","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-2661","ee":"http://arxiv.org/abs/1305.2661","url":"https://dblp.org/rec/journals/corr/abs-1305-2661"}, "url":"URL#4262861" }, { "@score":"1", "@id":"4262862", "info":{"authors":{"author":[{"@pid":"d/ZdenekDvorak","text":"Zdenek Dvorák 0001"},{"@pid":"34/1317","text":"Bernard Lidický"}]},"title":"4-critical graphs on surfaces without contractible (<=4)-cycles","venue":"CoRR","volume":"abs/1305.2670","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-2670","ee":"http://arxiv.org/abs/1305.2670","url":"https://dblp.org/rec/journals/corr/abs-1305-2670"}, "url":"URL#4262862" }, { "@score":"1", "@id":"4262863", "info":{"authors":{"author":[{"@pid":"04/6981","text":"Lawrence Ong"},{"@pid":"71/8318","text":"Fabian Lim"},{"@pid":"41/417","text":"Chin Keong Ho"}]},"title":"The Multi-Sender Multicast Index Coding","venue":"CoRR","volume":"abs/1305.2679","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-2679","ee":"http://arxiv.org/abs/1305.2679","url":"https://dblp.org/rec/journals/corr/abs-1305-2679"}, "url":"URL#4262863" }, { "@score":"1", "@id":"4262864", "info":{"authors":{"author":{"@pid":"29/9608","text":"Sulaiman S. AlDahri"}},"title":"A study for the effect of the Emphaticness and language and dialect for Voice Onset Time (VOT) in Modern Standard Arabic (MSA)","venue":"CoRR","volume":"abs/1305.2680","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-2680","ee":"http://arxiv.org/abs/1305.2680","url":"https://dblp.org/rec/journals/corr/abs-1305-2680"}, "url":"URL#4262864" }, { "@score":"1", "@id":"4262865", "info":{"authors":{"author":[{"@pid":"61/1026","text":"Achraf Karray"},{"@pid":"130/3917","text":"Rym Teyeb"},{"@pid":"21/2944","text":"Maher Ben Jemaa"}]},"title":"A Heuristic Approach for Web-Service Discovery and Selection","venue":"CoRR","volume":"abs/1305.2684","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-2684","ee":"http://arxiv.org/abs/1305.2684","url":"https://dblp.org/rec/journals/corr/abs-1305-2684"}, "url":"URL#4262865" }, { "@score":"1", "@id":"4262866", "info":{"authors":{"author":[{"@pid":"130/3871","text":"Ali Tourani"},{"@pid":"14/11095","text":"Amir Seyed Danesh"}]},"title":"Using Exclusive Web Crawlers to Store Better Results in Search Engines' Database","venue":"CoRR","volume":"abs/1305.2686","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-2686","ee":"http://arxiv.org/abs/1305.2686","url":"https://dblp.org/rec/journals/corr/abs-1305-2686"}, "url":"URL#4262866" }, { "@score":"1", "@id":"4262867", "info":{"authors":{"author":[{"@pid":"04/1215","text":"Duc Phu Chau"},{"@pid":"90/263","text":"Monique Thonnat"},{"@pid":"90/6418","text":"François Brémond"}]},"title":"Automatic Parameter Adaptation for Multi-object Tracking","venue":"CoRR","volume":"abs/1305.2687","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-2687","ee":"http://arxiv.org/abs/1305.2687","url":"https://dblp.org/rec/journals/corr/abs-1305-2687"}, "url":"URL#4262867" }, { "@score":"1", "@id":"4262868", "info":{"authors":{"author":{"@pid":"19/4639","text":"Duc-Phong Le"}},"title":"Further Refinements of Miller Algorithm on Edwards curves","venue":"CoRR","volume":"abs/1305.2694","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-2694","ee":"http://arxiv.org/abs/1305.2694","url":"https://dblp.org/rec/journals/corr/abs-1305-2694"}, "url":"URL#4262868" }, { "@score":"1", "@id":"4262869", "info":{"authors":{"author":{"@pid":"130/3866","text":"Ahmad Alamgir Khan"}},"title":"Preventing Phishing Attacks using One Time Password and User Machine Identification","venue":"CoRR","volume":"abs/1305.2704","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-2704","ee":"http://arxiv.org/abs/1305.2704","url":"https://dblp.org/rec/journals/corr/abs-1305-2704"}, "url":"URL#4262869" }, { "@score":"1", "@id":"4262870", "info":{"authors":{"author":[{"@pid":"130/2258","text":"Rafiullah Khan"},{"@pid":"25/5352-2","text":"Shaukat Ali 0002"}]},"title":"Conceptual Framework of Redundant Link Aggregation","venue":"CoRR","volume":"abs/1305.2708","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-2708","ee":"http://arxiv.org/abs/1305.2708","url":"https://dblp.org/rec/journals/corr/abs-1305-2708"}, "url":"URL#4262870" }, { "@score":"1", "@id":"4262871", "info":{"authors":{"author":{"@pid":"130/4026","text":"Ijaz Bukhari"}},"title":"Early Detection of Alzheimer's - A Crucial Requirement","venue":"CoRR","volume":"abs/1305.2713","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-2713","ee":"http://arxiv.org/abs/1305.2713","url":"https://dblp.org/rec/journals/corr/abs-1305-2713"}, "url":"URL#4262871" }, { "@score":"1", "@id":"4262872", "info":{"authors":{"author":[{"@pid":"89/8771","text":"Samet Oymak"},{"@pid":"09/1803","text":"Babak Hassibi"}]},"title":"Asymptotically Exact Denoising in Relation to Compressed Sensing","venue":"CoRR","volume":"abs/1305.2714","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-2714","ee":"http://arxiv.org/abs/1305.2714","url":"https://dblp.org/rec/journals/corr/abs-1305-2714"}, "url":"URL#4262872" }, { "@score":"1", "@id":"4262873", "info":{"authors":{"author":{"@pid":"130/3721","text":"Said Broumi"}},"title":"Generalized Neutrosophic Soft Set","venue":"CoRR","volume":"abs/1305.2724","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-2724","ee":"http://arxiv.org/abs/1305.2724","url":"https://dblp.org/rec/journals/corr/abs-1305-2724"}, "url":"URL#4262873" }, { "@score":"1", "@id":"4262874", "info":{"authors":{"author":[{"@pid":"83/7606","text":"Gergely Neu"},{"@pid":"89/2642","text":"Gábor Bartók"}]},"title":"An efficient algorithm for learning with semi-bandit feedback","venue":"CoRR","volume":"abs/1305.2732","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-2732","ee":"http://arxiv.org/abs/1305.2732","url":"https://dblp.org/rec/journals/corr/abs-1305-2732"}, "url":"URL#4262874" }, { "@score":"1", "@id":"4262875", "info":{"authors":{"author":[{"@pid":"96/2158","text":"Vinh Phu Nguyen"},{"@pid":"36/10262","text":"Pierre Kerfriden"},{"@pid":"51/6157","text":"Stéphane P. A. Bordas"}]},"title":"Isogeometric cohesive elements for two and three dimensional composite delamination analysis","venue":"CoRR","volume":"abs/1305.2738","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-2738","ee":"http://arxiv.org/abs/1305.2738","url":"https://dblp.org/rec/journals/corr/abs-1305-2738"}, "url":"URL#4262875" }, { "@score":"1", "@id":"4262876", "info":{"authors":{"author":[{"@pid":"65/811","text":"Bosiljka Tadic"},{"@pid":"21/5704","text":"Milovan Suvakov"}]},"title":"Can Human-Like Bots Control Collective Mood: Agent-Based Simulations of Online Chats","venue":"CoRR","volume":"abs/1305.2741","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-2741","ee":"http://arxiv.org/abs/1305.2741","url":"https://dblp.org/rec/journals/corr/abs-1305-2741"}, "url":"URL#4262876" }, { "@score":"1", "@id":"4262877", "info":{"authors":{"author":[{"@pid":"42/5527","text":"Sylvain Guillemot"},{"@pid":"95/1832","text":"Dániel Marx"}]},"title":"A faster FPT algorithm for Bipartite Contraction","venue":"CoRR","volume":"abs/1305.2743","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-2743","ee":"http://arxiv.org/abs/1305.2743","url":"https://dblp.org/rec/journals/corr/abs-1305-2743"}, "url":"URL#4262877" }, { "@score":"1", "@id":"4262878", "info":{"authors":{"author":[{"@pid":"27/2396","text":"Ahmet A. Husainov"},{"@pid":"47/11144","text":"Ekaterina S. Kudryashova"}]},"title":"Time Estimation Model of Concurrent Computing Systems","venue":"CoRR","volume":"abs/1305.2744","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-2744","ee":"http://arxiv.org/abs/1305.2744","url":"https://dblp.org/rec/journals/corr/abs-1305-2744"}, "url":"URL#4262878" }, { "@score":"1", "@id":"4262879", "info":{"authors":{"author":[{"@pid":"120/7702","text":"Oumair Naseer"},{"@pid":"120/7421","text":"Rana Atif Ali Khan"}]},"title":"Hybrid fuzzy logic and pid controller based ph neutralization pilot plant","venue":"CoRR","volume":"abs/1305.2752","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-2752","ee":"http://arxiv.org/abs/1305.2752","url":"https://dblp.org/rec/journals/corr/abs-1305-2752"}, "url":"URL#4262879" }, { "@score":"1", "@id":"4262880", "info":{"authors":{"author":[{"@pid":"130/3813","text":"Issam Sahmoudi"},{"@pid":"94/7761","text":"Abdelmonaime Lachkar"}]},"title":"Clustering Web Search Results For Effective Arabic Language Browsing","venue":"CoRR","volume":"abs/1305.2755","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-2755","ee":"http://arxiv.org/abs/1305.2755","url":"https://dblp.org/rec/journals/corr/abs-1305-2755"}, "url":"URL#4262880" }, { "@score":"1", "@id":"4262881", "info":{"authors":{"author":[{"@pid":"120/7702","text":"Oumair Naseer"},{"@pid":"130/3841","text":"Ayesha Naseer"},{"@pid":"120/7421","text":"Rana Atif Ali Khan"},{"@pid":"130/3947","text":"Humza Naseer"}]},"title":"Using Page Size for Controlling Duplicate Query Results in Semantic Web","venue":"CoRR","volume":"abs/1305.2758","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-2758","ee":"http://arxiv.org/abs/1305.2758","url":"https://dblp.org/rec/journals/corr/abs-1305-2758"}, "url":"URL#4262881" }, { "@score":"1", "@id":"4262882", "info":{"authors":{"author":[{"@pid":"26/8108","text":"François Mériaux"},{"@pid":"50/3734","text":"Samson Lasaulce"},{"@pid":"83/5153","text":"Hamidou Tembine"}]},"title":"Stochastic Differential Games and Energy-Efficient Power Control","venue":"CoRR","volume":"abs/1305.2767","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-2767","ee":"http://arxiv.org/abs/1305.2767","url":"https://dblp.org/rec/journals/corr/abs-1305-2767"}, "url":"URL#4262882" }, { "@score":"1", "@id":"4262883", "info":{"authors":{"author":[{"@pid":"130/3928","text":"Nahier Aldhafferi"},{"@pid":"12/5702","text":"Charles Watson"},{"@pid":"04/5980","text":"A. S. M. Sajeev"}]},"title":"Personal Information Privacy Settings of Online Social Networks and their Suitability for Mobile Internet Devices","venue":"CoRR","volume":"abs/1305.2770","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-2770","ee":"http://arxiv.org/abs/1305.2770","url":"https://dblp.org/rec/journals/corr/abs-1305-2770"}, "url":"URL#4262883" }, { "@score":"1", "@id":"4262884", "info":{"authors":{"author":{"@pid":"71/8976","text":"Marc Gillé"}},"title":"OBDD-Based Representation of Interval Graphs","venue":"CoRR","volume":"abs/1305.2772","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-2772","ee":"http://arxiv.org/abs/1305.2772","url":"https://dblp.org/rec/journals/corr/abs-1305-2772"}, "url":"URL#4262884" }, { "@score":"1", "@id":"4262885", "info":{"authors":{"author":[{"@pid":"83/6331","text":"Xu Chen"},{"@pid":"26/8108","text":"François Mériaux"},{"@pid":"66/4064","text":"Stefan Valentin"}]},"title":"Predicting a User's Next Cell With Supervised Learning Based on Channel States","venue":"CoRR","volume":"abs/1305.2776","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-2776","ee":"http://arxiv.org/abs/1305.2776","url":"https://dblp.org/rec/journals/corr/abs-1305-2776"}, "url":"URL#4262885" }, { "@score":"1", "@id":"4262886", "info":{"authors":{"author":[{"@pid":"32/3463","text":"Philip Bille"},{"@pid":"129/1722","text":"Patrick Hagge Cording"},{"@pid":"96/705","text":"Inge Li Gørtz"},{"@pid":"14/2490","text":"Benjamin Sach"},{"@pid":"08/8612","text":"Hjalte Wedel Vildhøj"},{"@pid":"16/10360","text":"Søren Vind"}]},"title":"Fingerprints in Compressed Strings","venue":"CoRR","volume":"abs/1305.2777","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-2777","ee":"http://arxiv.org/abs/1305.2777","url":"https://dblp.org/rec/journals/corr/abs-1305-2777"}, "url":"URL#4262886" }, { "@score":"1", "@id":"4262887", "info":{"authors":{"author":[{"@pid":"11/9764","text":"Fabian Pedregosa"},{"@pid":"117/7268","text":"Michael Eickenberg"},{"@pid":"62/2019","text":"Bertrand Thirion"},{"@pid":"15/7980","text":"Alexandre Gramfort"}]},"title":"HRF estimation improves sensitivity of fMRI encoding and decoding models","venue":"CoRR","volume":"abs/1305.2788","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-2788","ee":"http://arxiv.org/abs/1305.2788","url":"https://dblp.org/rec/journals/corr/abs-1305-2788"}, "url":"URL#4262887" }, { "@score":"1", "@id":"4262888", "info":{"authors":{"author":[{"@pid":"63/770","text":"Volker Pohl"},{"@pid":"126/4852","text":"Fanny Yang"},{"@pid":"39/3615","text":"Holger Boche"}]},"title":"Phaseless Signal Recovery in Infinite Dimensional Spaces using Structured Modulations","venue":"CoRR","volume":"abs/1305.2789","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-2789","ee":"http://arxiv.org/abs/1305.2789","url":"https://dblp.org/rec/journals/corr/abs-1305-2789"}, "url":"URL#4262888" }, { "@score":"1", "@id":"4262889", "info":{"authors":{"author":[{"@pid":"49/1548","text":"Igor Pak"},{"@pid":"17/8095","text":"Jed Yang"}]},"title":"Tiling simply connected regions with rectangles","venue":"CoRR","volume":"abs/1305.2796","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-2796","ee":"http://arxiv.org/abs/1305.2796","url":"https://dblp.org/rec/journals/corr/abs-1305-2796"}, "url":"URL#4262889" }, { "@score":"1", "@id":"4262890", "info":{"authors":{"author":[{"@pid":"46/4256","text":"Arthur J. Redfern"},{"@pid":"99/3778","text":"Kun Shi"}]},"title":"Quantization Noise Shaping for Information Maximizing ADCs","venue":"CoRR","volume":"abs/1305.2801","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-2801","ee":"http://arxiv.org/abs/1305.2801","url":"https://dblp.org/rec/journals/corr/abs-1305-2801"}, "url":"URL#4262890" }, { "@score":"1", "@id":"4262891", "info":{"authors":{"author":[{"@pid":"130/3930","text":"Preeti Badar"},{"@pid":"59/6763","text":"Urmila Shrawankar"}]},"title":"Human Mood Detection For Human Computer Interaction","venue":"CoRR","volume":"abs/1305.2827","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-2827","ee":"http://arxiv.org/abs/1305.2827","url":"https://dblp.org/rec/journals/corr/abs-1305-2827"}, "url":"URL#4262891" }, { "@score":"1", "@id":"4262892", "info":{"authors":{"author":[{"@pid":"275/7230","text":"Shweta V. Jain"},{"@pid":"59/6763","text":"Urmila Shrawankar"}]},"title":"Image Optimization and Prediction","venue":"CoRR","volume":"abs/1305.2828","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-2828","ee":"http://arxiv.org/abs/1305.2828","url":"https://dblp.org/rec/journals/corr/abs-1305-2828"}, "url":"URL#4262892" }, { "@score":"1", "@id":"4262893", "info":{"authors":{"author":[{"@pid":"50/7797","text":"Rahila Patel"},{"@pid":"59/6763","text":"Urmila Shrawankar"},{"@pid":"13/9572","text":"Mukesh M. Raghuwanshi"},{"@pid":"130/3724","text":"Anil N. Jaiswal"}]},"title":"Performance Enhancement of Distributed Quasi Steady-State Genetic Algorithm","venue":"CoRR","volume":"abs/1305.2830","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-2830","ee":"http://arxiv.org/abs/1305.2830","url":"https://dblp.org/rec/journals/corr/abs-1305-2830"}, "url":"URL#4262893" }, { "@score":"1", "@id":"4262894", "info":{"authors":{"author":[{"@pid":"130/3970","text":"Khushboo Thakkar"},{"@pid":"59/6763","text":"Urmila Shrawankar"}]},"title":"Test Model for Text Categorization and Text Summarization","venue":"CoRR","volume":"abs/1305.2831","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-2831","ee":"http://arxiv.org/abs/1305.2831","url":"https://dblp.org/rec/journals/corr/abs-1305-2831"}, "url":"URL#4262894" }, { "@score":"1", "@id":"4262895", "info":{"authors":{"author":[{"@pid":"90/11226","text":"Andreas Kosmatopoulos"},{"@pid":"87/172","text":"Kostas Tsichlas"}]},"title":"Dynamic Top-$k$ Dominating Queries","venue":"CoRR","volume":"abs/1305.2835","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-2835","ee":"http://arxiv.org/abs/1305.2835","url":"https://dblp.org/rec/journals/corr/abs-1305-2835"}, "url":"URL#4262895" }, { "@score":"1", "@id":"4262896", "info":{"authors":{"author":[{"@pid":"89/7799","text":"Smita Narendra Pathak"},{"@pid":"59/6763","text":"Urmila Shrawankar"}]},"title":"Infrastructure to Vehicle Real Time Secured Communication","venue":"CoRR","volume":"abs/1305.2836","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-2836","ee":"http://arxiv.org/abs/1305.2836","url":"https://dblp.org/rec/journals/corr/abs-1305-2836"}, "url":"URL#4262896" }, { "@score":"1", "@id":"4262897", "info":{"authors":{"author":[{"@pid":"130/3950","text":"Sumedha Chokhandre"},{"@pid":"59/6763","text":"Urmila Shrawankar"}]},"title":"An Algorithm to Improve Performance over Multihop Wireless Mesh Network","venue":"CoRR","volume":"abs/1305.2837","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-2837","ee":"http://arxiv.org/abs/1305.2837","url":"https://dblp.org/rec/journals/corr/abs-1305-2837"}, "url":"URL#4262897" }, { "@score":"1", "@id":"4262898", "info":{"authors":{"author":[{"@pid":"130/3848","text":"Vinay Kapse"},{"@pid":"59/6763","text":"Urmila Shrawankar"}]},"title":"Interference-Aware Channel Assignment for Maximizing Throughput in WMN","venue":"CoRR","volume":"abs/1305.2838","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-2838","ee":"http://arxiv.org/abs/1305.2838","url":"https://dblp.org/rec/journals/corr/abs-1305-2838"}, "url":"URL#4262898" }, { "@score":"1", "@id":"4262899", "info":{"authors":{"author":[{"@pid":"130/3732","text":"Rashmi Makhijani"},{"@pid":"59/6763","text":"Urmila Shrawankar"},{"@pid":"26/2161","text":"Vilas M. Thakare"}]},"title":"Opportunities & Challenges In Automatic Speech Recognition","venue":"CoRR","volume":"abs/1305.2846","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-2846","ee":"http://arxiv.org/abs/1305.2846","url":"https://dblp.org/rec/journals/corr/abs-1305-2846"}, "url":"URL#4262899" }, { "@score":"1", "@id":"4262900", "info":{"authors":{"author":[{"@pid":"130/3779","text":"Neema Mishra"},{"@pid":"59/6763","text":"Urmila Shrawankar"},{"@pid":"26/2161","text":"Vilas M. Thakare"}]},"title":"An Overview of Hindi Speech Recognition","venue":"CoRR","volume":"abs/1305.2847","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-2847","ee":"http://arxiv.org/abs/1305.2847","url":"https://dblp.org/rec/journals/corr/abs-1305-2847"}, "url":"URL#4262900" }, { "@score":"1", "@id":"4262901", "info":{"authors":{"author":[{"@pid":"129/1667","text":"Sultan Ullah"},{"@pid":"47/5834","text":"Xuefeng Zheng"},{"@pid":"21/6430","text":"Feng Zhou"}]},"title":"TCloud: A Dynamic Framework and Policies for Access Control across Multiple Domains in Cloud Computing","venue":"CoRR","volume":"abs/1305.2865","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-2865","ee":"http://arxiv.org/abs/1305.2865","url":"https://dblp.org/rec/journals/corr/abs-1305-2865"}, "url":"URL#4262901" }, { "@score":"1", "@id":"4262902", "info":{"authors":{"author":{"@pid":"60/8409","text":"Giovanni Viglietta"}},"title":"Face-Guarding Polyhedra","venue":"CoRR","volume":"abs/1305.2866","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-2866","ee":"http://arxiv.org/abs/1305.2866","url":"https://dblp.org/rec/journals/corr/abs-1305-2866"}, "url":"URL#4262902" }, { "@score":"1", "@id":"4262903", "info":{"authors":{"author":[{"@pid":"74/6892","text":"Ricardo Fabbri"},{"@pid":"130/3792","text":"Ivan N. Bastos"},{"@pid":"02/5124","text":"Francisco Duarte Moura Neto"},{"@pid":"42/10672","text":"Francisco J. P. Lopes"},{"@pid":"59/1925","text":"Wesley Nunes Gonçalves"},{"@pid":"17/6770","text":"Odemir Martinez Bruno"}]},"title":"Multi-q Pattern Classification of Polarization Curves","venue":"CoRR","volume":"abs/1305.2876","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-2876","ee":"http://arxiv.org/abs/1305.2876","url":"https://dblp.org/rec/journals/corr/abs-1305-2876"}, "url":"URL#4262903" }, { "@score":"1", "@id":"4262904", "info":{"authors":{"author":[{"@pid":"99/10966","text":"Kiril Solovey"},{"@pid":"51/9892","text":"Oren Salzman"},{"@pid":"h/DanHalperin","text":"Dan Halperin"}]},"title":"Finding a Needle in an Exponential Haystack: Discrete RRT for Exploration of Implicit Roadmaps in Multi-Robot Motion Planning","venue":"CoRR","volume":"abs/1305.2889","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-2889","ee":"http://arxiv.org/abs/1305.2889","url":"https://dblp.org/rec/journals/corr/abs-1305-2889"}, "url":"URL#4262904" }, { "@score":"1", "@id":"4262905", "info":{"authors":{"author":[{"@pid":"120/6549","text":"Renato B. Abreu"},{"@pid":"42/4311","text":"Lucas C. Cordeiro"},{"@pid":"25/6797","text":"Eddie B. L. Filho"}]},"title":"Verifying Fixed-Point Digital Filters using SMT-Based Bounded Model Checking","venue":"CoRR","volume":"abs/1305.2892","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-2892","ee":"http://arxiv.org/abs/1305.2892","url":"https://dblp.org/rec/journals/corr/abs-1305-2892"}, "url":"URL#4262905" }, { "@score":"1", "@id":"4262906", "info":{"authors":{"author":[{"@pid":"16/9673","text":"Andreas Galanis"},{"@pid":"00/3605","text":"Daniel Stefankovic"},{"@pid":"03/4633","text":"Eric Vigoda"}]},"title":"Inapproximability for Antiferromagnetic Spin Systems in the Tree Non-Uniqueness Region","venue":"CoRR","volume":"abs/1305.2902","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-2902","ee":"http://arxiv.org/abs/1305.2902","url":"https://dblp.org/rec/journals/corr/abs-1305-2902"}, "url":"URL#4262906" }, { "@score":"1", "@id":"4262907", "info":{"authors":{"author":[{"@pid":"87/6045","text":"Naoki Masuda"},{"@pid":"93/2901","text":"Konstantin Klemm"},{"@pid":"70/8193","text":"Víctor M. Eguíluz"}]},"title":"Temporal networks: slowing down diffusion by long lasting interactions","venue":"CoRR","volume":"abs/1305.2938","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-2938","ee":"http://arxiv.org/abs/1305.2938","url":"https://dblp.org/rec/journals/corr/abs-1305-2938"}, "url":"URL#4262907" }, { "@score":"1", "@id":"4262908", "info":{"authors":{"author":[{"@pid":"46/4581","text":"Reza Farrahi Moghaddam"},{"@pid":"75/10024","text":"Fereydoun Farrahi Moghaddam"},{"@pid":"69/4317","text":"Mohamed Cheriet"}]},"title":"Unsupervised ensemble of experts (EoE) framework for automatic binarization of document images","venue":"CoRR","volume":"abs/1305.2949","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-2949","ee":"http://arxiv.org/abs/1305.2949","url":"https://dblp.org/rec/journals/corr/abs-1305-2949"}, "url":"URL#4262908" }, { "@score":"1", "@id":"4262909", "info":{"authors":{"author":[{"@pid":"02/11468","text":"Grady I. Lemoine"},{"@pid":"292/7655","text":"Miao-Jung Yvonne Ou"}]},"title":"Finite Volume Modeling of Poroelastic-Fluid Wave Propagation with Mapped Grids","venue":"CoRR","volume":"abs/1305.2952","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-2952","ee":"http://arxiv.org/abs/1305.2952","url":"https://dblp.org/rec/journals/corr/abs-1305-2952"}, "url":"URL#4262909" }, { "@score":"1", "@id":"4262910", "info":{"authors":{"author":[{"@pid":"130/3779","text":"Neema Mishra"},{"@pid":"59/6763","text":"Urmila Shrawankar"},{"@pid":"26/2161","text":"Vilas M. Thakare"}]},"title":"Automatic Speech Recognition Using Template Model for Man-Machine Interface","venue":"CoRR","volume":"abs/1305.2959","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-2959","ee":"http://arxiv.org/abs/1305.2959","url":"https://dblp.org/rec/journals/corr/abs-1305-2959"}, "url":"URL#4262910" }, { "@score":"1", "@id":"4262911", "info":{"authors":{"author":[{"@pid":"130/3825","text":"Mostafa Azami"},{"@pid":"130/3939","text":"Manij Ranjbar"},{"@pid":"130/4074","text":"Ali Shokouhi Rostami"},{"@pid":"130/3699","text":"Amir Jahani Amiri"}]},"title":"Increasing the Network life Time by Simulated Annealing Algorithm in WSN with Point Coverage","venue":"CoRR","volume":"abs/1305.2966","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-2966","ee":"http://arxiv.org/abs/1305.2966","url":"https://dblp.org/rec/journals/corr/abs-1305-2966"}, "url":"URL#4262911" }, { "@score":"1", "@id":"4262912", "info":{"authors":{"author":[{"@pid":"23/3439-5","text":"Sheng Li 0005"},{"@pid":"98/6670","text":"Rodrigo C. de Lamare"}]},"title":"Blind Adaptive Reduced-Rank Detectors for DS-UWB Systems Based on Joint Iterative Optimization and the Constrained Constant Modulus Criterion.","venue":"CoRR","volume":"abs/1305.2974","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-2974","ee":"http://arxiv.org/abs/1305.2974","url":"https://dblp.org/rec/journals/corr/abs-1305-2974"}, "url":"URL#4262912" }, { "@score":"1", "@id":"4262913", "info":{"authors":{"author":[{"@pid":"05/7668","text":"Sanat Kumar Bista"},{"@pid":"48/3935","text":"Keshav P. Dahal"},{"@pid":"86/1424","text":"Peter I. Cowling"}]},"title":"Evolution of Cooperation in an Incentive Based Business Game Environment","venue":"CoRR","volume":"abs/1305.2978","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-2978","ee":"http://arxiv.org/abs/1305.2978","url":"https://dblp.org/rec/journals/corr/abs-1305-2978"}, "url":"URL#4262913" }, { "@score":"1", "@id":"4262914", "info":{"authors":{"author":[{"@pid":"05/7668","text":"Sanat Kumar Bista"},{"@pid":"48/3935","text":"Keshav P. Dahal"},{"@pid":"86/1424","text":"Peter I. Cowling"},{"@pid":"26/7668","text":"Bhadra Man Tuladhar"}]},"title":"Unraveling the Evolution of Defectors in Online Business Games","venue":"CoRR","volume":"abs/1305.2979","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-2979","ee":"http://arxiv.org/abs/1305.2979","url":"https://dblp.org/rec/journals/corr/abs-1305-2979"}, "url":"URL#4262914" }, { "@score":"1", "@id":"4262915", "info":{"authors":{"author":[{"@pid":"05/7668","text":"Sanat Kumar Bista"},{"@pid":"48/3935","text":"Keshav P. Dahal"},{"@pid":"86/1424","text":"Peter I. Cowling"},{"@pid":"26/7668","text":"Bhadra Man Tuladhar"}]},"title":"Metrics for Computing Trust in a Multi-Agent Environment","venue":"CoRR","volume":"abs/1305.2981","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-2981","ee":"http://arxiv.org/abs/1305.2981","url":"https://dblp.org/rec/journals/corr/abs-1305-2981"}, "url":"URL#4262915" }, { "@score":"1", "@id":"4262916", "info":{"authors":{"author":{"@pid":"56/953","text":"Yoshua Bengio"}},"title":"Estimating or Propagating Gradients Through Stochastic Neurons","venue":"CoRR","volume":"abs/1305.2982","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-2982","ee":"http://arxiv.org/abs/1305.2982","url":"https://dblp.org/rec/journals/corr/abs-1305-2982"}, "url":"URL#4262916" }, { "@score":"1", "@id":"4262917", "info":{"authors":{"author":[{"@pid":"16/7607","text":"Shaunak Mishra"},{"@pid":"90/7254","text":"I-Hsiang Wang"},{"@pid":"d/SNDiggavi","text":"Suhas N. Diggavi"}]},"title":"Opportunistic Interference Management for Multicarrier systems","venue":"CoRR","volume":"abs/1305.2985","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-2985","ee":"http://arxiv.org/abs/1305.2985","url":"https://dblp.org/rec/journals/corr/abs-1305-2985"}, "url":"URL#4262917" }, { "@score":"1", "@id":"4262918", "info":{"authors":{"author":[{"@pid":"21/9365","text":"Xingqin Lin"},{"@pid":"98/67","text":"Harish Viswanathan"}]},"title":"Dynamic Spectrum Refarming of GSM Spectrum for LTE Small Cells","venue":"CoRR","volume":"abs/1305.2999","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-2999","ee":"http://arxiv.org/abs/1305.2999","url":"https://dblp.org/rec/journals/corr/abs-1305-2999"}, "url":"URL#4262918" }, { "@score":"1", "@id":"4262919", "info":{"authors":{"author":[{"@pid":"74/3859-3","text":"Hong Huang 0003"},{"@pid":"79/2206","text":"Satyajayant Misra"},{"@pid":"58/1874-2","text":"Wei Tang 0002"},{"@pid":"65/2448","text":"Hajar Barani"},{"@pid":"130/4043","text":"Hussein Al-Azzawi"}]},"title":"Applications of Compressed Sensing in Communications Networks","venue":"CoRR","volume":"abs/1305.3002","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-3002","ee":"http://arxiv.org/abs/1305.3002","url":"https://dblp.org/rec/journals/corr/abs-1305-3002"}, "url":"URL#4262919" }, { "@score":"1", "@id":"4262920", "info":{"authors":{"author":[{"@pid":"71/9653","text":"Dai-Qiang Chen"},{"@pid":"61/4063","text":"Lizhi Cheng"}]},"title":"Fast Linearized Alternating Direction Minimization Algorithm with Adaptive Parameter Selection for Multiplicative Noise Removal.","venue":"CoRR","volume":"abs/1305.3006","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-3006","ee":"http://arxiv.org/abs/1305.3006","url":"https://dblp.org/rec/journals/corr/abs-1305-3006"}, "url":"URL#4262920" }, { "@score":"1", "@id":"4262921", "info":{"authors":{"author":[{"@pid":"l/KuangchihLee","text":"Kuang-Chih Lee"},{"@pid":"25/2423","text":"Ali Jalali"},{"@pid":"28/6587","text":"Ali Dasdan"}]},"title":"Real Time Bid Optimization with Smooth Budget Delivery in Online Advertising","venue":"CoRR","volume":"abs/1305.3011","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-3011","ee":"http://arxiv.org/abs/1305.3011","url":"https://dblp.org/rec/journals/corr/abs-1305-3011"}, "url":"URL#4262921" }, { "@score":"1", "@id":"4262922", "info":{"authors":{"author":[{"@pid":"71/9653","text":"Dai-Qiang Chen"},{"@pid":"61/4063","text":"Lizhi Cheng"}]},"title":"Novel variational model for inpainting in the wavelet domain","venue":"CoRR","volume":"abs/1305.3013","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-3013","ee":"http://arxiv.org/abs/1305.3013","url":"https://dblp.org/rec/journals/corr/abs-1305-3013"}, "url":"URL#4262922" }, { "@score":"1", "@id":"4262923", "info":{"authors":{"author":[{"@pid":"25/2423","text":"Ali Jalali"},{"@pid":"52/6948","text":"Santanu Kolay"},{"@pid":"130/3971","text":"Peter Foldes"},{"@pid":"28/6587","text":"Ali Dasdan"}]},"title":"Scalable Audience Reach Estimation in Real-time Online Advertising","venue":"CoRR","volume":"abs/1305.3014","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-3014","ee":"http://arxiv.org/abs/1305.3014","url":"https://dblp.org/rec/journals/corr/abs-1305-3014"}, "url":"URL#4262923" }, { "@score":"1", "@id":"4262924", "info":{"authors":{"author":[{"@pid":"124/2504","text":"Ashkan Paya"},{"@pid":"m/DanCristianMarinescu","text":"Dan C. Marinescu"}]},"title":"Clustering Algorithms for Scale-free Networks and Applications to Cloud Resource Management","venue":"CoRR","volume":"abs/1305.3031","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-3031","ee":"http://arxiv.org/abs/1305.3031","url":"https://dblp.org/rec/journals/corr/abs-1305-3031"}, "url":"URL#4262924" }, { "@score":"1", "@id":"4262925", "info":{"authors":{"author":[{"@pid":"52/10076","text":"Gongming Li"},{"@pid":"73/5552","text":"Hong An"}]},"title":"Phase-Priority based Directory Coherence for Multicore Processor","venue":"CoRR","volume":"abs/1305.3038","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-3038","ee":"http://arxiv.org/abs/1305.3038","url":"https://dblp.org/rec/journals/corr/abs-1305-3038"}, "url":"URL#4262925" }, { "@score":"1", "@id":"4262926", "info":{"authors":{"author":{"@pid":"81/10360","text":"Marek Smieja"}},"title":"Weighted Approach to General Entropy Function","venue":"CoRR","volume":"abs/1305.3040","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-3040","ee":"http://arxiv.org/abs/1305.3040","url":"https://dblp.org/rec/journals/corr/abs-1305-3040"}, "url":"URL#4262926" }, { "@score":"1", "@id":"4262927", "info":{"authors":{"author":[{"@pid":"b/JoanBoyar","text":"Joan Boyar"},{"@pid":"117/3489","text":"Magnus Find"}]},"title":"Cancellation-Free Circuits in Unbounded and Bounded Depth","venue":"CoRR","volume":"abs/1305.3041","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-3041","ee":"http://arxiv.org/abs/1305.3041","url":"https://dblp.org/rec/journals/corr/abs-1305-3041"}, "url":"URL#4262927" }, { "@score":"1", "@id":"4262928", "info":{"authors":{"author":{"@pid":"03/4075","text":"Paolo Braca"}},"title":"Running Consensus for Decentralized Detection","venue":"CoRR","volume":"abs/1305.3046","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-3046","ee":"http://arxiv.org/abs/1305.3046","url":"https://dblp.org/rec/journals/corr/abs-1305-3046"}, "url":"URL#4262928" }, { "@score":"1", "@id":"4262929", "info":{"authors":{"author":[{"@pid":"16/7607","text":"Shaunak Mishra"},{"@pid":"87/5736","text":"Christina Fragouli"},{"@pid":"20/5817","text":"Vinod M. Prabhakaran"},{"@pid":"d/SNDiggavi","text":"Suhas N. Diggavi"}]},"title":"Using Feedback for Secrecy over Graphs","venue":"CoRR","volume":"abs/1305.3051","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-3051","ee":"http://arxiv.org/abs/1305.3051","url":"https://dblp.org/rec/journals/corr/abs-1305-3051"}, "url":"URL#4262929" }, { "@score":"1", "@id":"4262930", "info":{"authors":{"author":[{"@pid":"38/7482","text":"Anas Chaaban"},{"@pid":"59/1906","text":"Karlheinz Ochs"},{"@pid":"12/218","text":"Aydin Sezgin"}]},"title":"The Degrees of Freedom of the MIMO Y-channel","venue":"CoRR","volume":"abs/1305.3054","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-3054","ee":"http://arxiv.org/abs/1305.3054","url":"https://dblp.org/rec/journals/corr/abs-1305-3054"}, "url":"URL#4262930" }, { "@score":"1", "@id":"4262931", "info":{"authors":{"author":[{"@pid":"26/3594","text":"Marco Baldi"},{"@pid":"85/2046-2","text":"Marco Bianchi 0002"},{"@pid":"64/4583","text":"Franco Chiaraluce"},{"@pid":"53/171","text":"Nicola Laurenti"},{"@pid":"61/794","text":"Stefano Tomasin"},{"@pid":"75/3179","text":"Francesco Renna"}]},"title":"Secrecy Transmission on Block Fading Channels: Theoretical Limits and Performance of Practical Codes","venue":"CoRR","volume":"abs/1305.3055","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-3055","ee":"http://arxiv.org/abs/1305.3055","url":"https://dblp.org/rec/journals/corr/abs-1305-3055"}, "url":"URL#4262931" }, { "@score":"1", "@id":"4262932", "info":{"authors":{"author":[{"@pid":"a/SergeAbiteboul","text":"Serge Abiteboul"},{"@pid":"162/9086","text":"Émilien Antoine"},{"@pid":"m/GeromeMiklau","text":"Gerome Miklau"},{"@pid":"s/JuliaStoyanovich","text":"Julia Stoyanovich"},{"@pid":"130/3774","text":"Jules Testard"}]},"title":"Rule-Based Application Development using Webdamlog","venue":"CoRR","volume":"abs/1305.3058","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-3058","ee":"http://arxiv.org/abs/1305.3058","url":"https://dblp.org/rec/journals/corr/abs-1305-3058"}, "url":"URL#4262932" }, { "@score":"1", "@id":"4262933", "info":{"authors":{"author":[{"@pid":"92/7536","text":"Jialong Han"},{"@pid":"w/JRWen","text":"Ji-Rong Wen"}]},"title":"Mining Frequent Neighborhood Patterns in Large Labeled Graphs","venue":"CoRR","volume":"abs/1305.3082","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-3082","ee":"http://arxiv.org/abs/1305.3082","url":"https://dblp.org/rec/journals/corr/abs-1305-3082"}, "url":"URL#4262933" }, { "@score":"1", "@id":"4262934", "info":{"authors":{"author":[{"@pid":"f/MichaelRFellows","text":"Michael R. Fellows"},{"@pid":"58/8776","text":"Bart M. P. Jansen"}]},"title":"FPT is Characterized by Useful Obstruction Sets","venue":"CoRR","volume":"abs/1305.3102","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-3102","ee":"http://arxiv.org/abs/1305.3102","url":"https://dblp.org/rec/journals/corr/abs-1305-3102"}, "url":"URL#4262934" }, { "@score":"1", "@id":"4262935", "info":{"authors":{"author":{"@pid":"74/298","text":"Hassan Rashidi"}},"title":"A fast method for implementation of the property lists in programming languages","venue":"CoRR","volume":"abs/1305.3103","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-3103","ee":"http://arxiv.org/abs/1305.3103","url":"https://dblp.org/rec/journals/corr/abs-1305-3103"}, "url":"URL#4262935" }, { "@score":"1", "@id":"4262936", "info":{"authors":{"author":[{"@pid":"55/7033","text":"Daqiang Zhang"},{"@pid":"45/8496","text":"Qin Zou 0001"},{"@pid":"54/214","text":"Zhiren Sun"}]},"title":"SECA: Snapshot-based Event Detection for Checking Asynchronous Context Consistency in Ubiquitous Computing","venue":"CoRR","volume":"abs/1305.3105","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-3105","ee":"http://arxiv.org/abs/1305.3105","url":"https://dblp.org/rec/journals/corr/abs-1305-3105"}, "url":"URL#4262936" }, { "@score":"1", "@id":"4262937", "info":{"authors":{"author":[{"@pid":"82/7526","text":"Sasa Petrovic"},{"@pid":"90/2594","text":"Miles Osborne"},{"@pid":"56/3029","text":"Victor Lavrenko"}]},"title":"I Wish I Didn't Say That! Analyzing and Predicting Deleted Messages in Twitter","venue":"CoRR","volume":"abs/1305.3107","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-3107","ee":"http://arxiv.org/abs/1305.3107","url":"https://dblp.org/rec/journals/corr/abs-1305-3107"}, "url":"URL#4262937" }, { "@score":"1", "@id":"4262938", "info":{"authors":{"author":{"@pid":"49/6555","text":"Julien Mairal"}},"title":"Optimization with First-Order Surrogate Functions","venue":"CoRR","volume":"abs/1305.3120","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-3120","ee":"http://arxiv.org/abs/1305.3120","url":"https://dblp.org/rec/journals/corr/abs-1305-3120"}, "url":"URL#4262938" }, { "@score":"1", "@id":"4262939", "info":{"authors":{"author":[{"@pid":"123/9433","text":"François Cuvelier"},{"@pid":"122/6334","text":"Caroline Japhet"},{"@pid":"130/4082","text":"Gilles Scarella"}]},"title":"An efficient way to perform the assembly of finite element matrices in Matlab and Octave","venue":"CoRR","volume":"abs/1305.3122","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-3122","ee":"http://arxiv.org/abs/1305.3122","url":"https://dblp.org/rec/journals/corr/abs-1305-3122"}, "url":"URL#4262939" }, { "@score":"1", "@id":"4262940", "info":{"authors":{"author":[{"@pid":"130/3803","text":"Muhammad Hilman"},{"@pid":"71/1191","text":"Heru Suhartanto"},{"@pid":"120/7685","text":"Arry Yanuar"}]},"title":"Performance Analysis of Embarassingly Parallel Application on Cluster Computer Environment: A Case Study of Virtual Screening with Autodock Vina 1.1 on Hastinapura Cluster.","venue":"CoRR","volume":"abs/1305.3123","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-3123","ee":"http://arxiv.org/abs/1305.3123","url":"https://dblp.org/rec/journals/corr/abs-1305-3123"}, "url":"URL#4262940" }, { "@score":"1", "@id":"4262941", "info":{"authors":{"author":[{"@pid":"24/2986","text":"Dmitry Tishkovsky"},{"@pid":"s/RenateASchmidt","text":"Renate A. Schmidt"}]},"title":"Refinement in the Tableau Synthesis Framework","venue":"CoRR","volume":"abs/1305.3131","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-3131","ee":"http://arxiv.org/abs/1305.3131","url":"https://dblp.org/rec/journals/corr/abs-1305-3131"}, "url":"URL#4262941" }, { "@score":"1", "@id":"4262942", "info":{"authors":{"author":[{"@pid":"21/10966","text":"M. Puck Rombach"},{"@pid":"01/2405","text":"Mason A. Porter"}]},"title":"Discriminating Power of Centrality Measures","venue":"CoRR","volume":"abs/1305.3146","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-3146","ee":"http://arxiv.org/abs/1305.3146","url":"https://dblp.org/rec/journals/corr/abs-1305-3146"}, "url":"URL#4262942" }, { "@score":"1", "@id":"4262943", "info":{"authors":{"author":[{"@pid":"21/4209","text":"Xiao-Bo Jin"},{"@pid":"47/6298","text":"Qiang Lu"},{"@pid":"90/4225","text":"Feng Wang"},{"@pid":"121/0982","text":"Quan-gong Huo"}]},"title":"Qualitative detection of oil adulteration with machine learning approaches","venue":"CoRR","volume":"abs/1305.3149","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-3149","ee":"http://arxiv.org/abs/1305.3149","url":"https://dblp.org/rec/journals/corr/abs-1305-3149"}, "url":"URL#4262943" }, { "@score":"1", "@id":"4262944", "info":{"authors":{"author":[{"@pid":"122/3036","text":"J. Ian Johnson"},{"@pid":"77/2466","text":"David Van Horn"}]},"title":"Concrete Semantics for Pushdown Analysis: The Essence of Summarization","venue":"CoRR","volume":"abs/1305.3163","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-3163","ee":"http://arxiv.org/abs/1305.3163","url":"https://dblp.org/rec/journals/corr/abs-1305-3163"}, "url":"URL#4262944" }, { "@score":"1", "@id":"4262945", "info":{"authors":{"author":[{"@pid":"00/3487","text":"Travis Gagie"},{"@pid":"49/3088","text":"Pawel Gawrychowski"},{"@pid":"n/YakovNekrich","text":"Yakov Nekrich"}]},"title":"Heaviest Induced Ancestors and Longest Common Substrings","venue":"CoRR","volume":"abs/1305.3164","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-3164","ee":"http://arxiv.org/abs/1305.3164","url":"https://dblp.org/rec/journals/corr/abs-1305-3164"}, "url":"URL#4262945" }, { "@score":"1", "@id":"4262946", "info":{"authors":{"author":[{"@pid":"77/8083","text":"Wen-Xiao Zhao"},{"@pid":"70/5823","text":"Han-Fu Chen"},{"@pid":"89/3174","text":"Haitao Fang"}]},"title":"Convergence of Distributed Randomized PageRank Algorithms","venue":"CoRR","volume":"abs/1305.3178","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-3178","ee":"http://arxiv.org/abs/1305.3178","url":"https://dblp.org/rec/journals/corr/abs-1305-3178"}, "url":"URL#4262946" }, { "@score":"1", "@id":"4262947", "info":{"authors":{"author":[{"@pid":"120/4430","text":"Wassim Bouachir"},{"@pid":"08/4305","text":"Atousa Torabi"},{"@pid":"90/2054","text":"Guillaume-Alexandre Bilodeau"},{"@pid":"130/3839","text":"Pascal Blais"}]},"title":"A Bag of Words Approach for Semantic Segmentation of Monitored Scenes","venue":"CoRR","volume":"abs/1305.3189","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-3189","ee":"http://arxiv.org/abs/1305.3189","url":"https://dblp.org/rec/journals/corr/abs-1305-3189"}, "url":"URL#4262947" }, { "@score":"1", "@id":"4262948", "info":{"authors":{"author":[{"@pid":"79/10265","text":"Philipp Winter"},{"@pid":"72/11061","text":"Tobias Pulls"},{"@pid":"80/10265","text":"Jürgen Fuß"}]},"title":"ScrambleSuit: A Polymorph Network Protocol to Circumvent Censorship","venue":"CoRR","volume":"abs/1305.3199","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-3199","ee":"http://arxiv.org/abs/1305.3199","url":"https://dblp.org/rec/journals/corr/abs-1305-3199"}, "url":"URL#4262948" }, { "@score":"1", "@id":"4262949", "info":{"authors":{"author":[{"@pid":"130/3955","text":"Gurpreet Singh Saini"},{"@pid":"130/3821","text":"Ashish Kots"},{"@pid":"58/1076","text":"Manoj Kumar"}]},"title":"DREAM_OLSR PROTOCOL (Distance Routing Effective Algorithm for Mobility - Optimized Link State Routing)","venue":"CoRR","volume":"abs/1305.3203","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-3203","ee":"http://arxiv.org/abs/1305.3203","url":"https://dblp.org/rec/journals/corr/abs-1305-3203"}, "url":"URL#4262949" }, { "@score":"1", "@id":"4262950", "info":{"authors":{"author":[{"@pid":"24/3624","text":"Paritosh K. Pandya"},{"@pid":"96/880","text":"Simoni S. Shah"}]},"title":"The Unary Fragments of Metric Interval Temporal Logic: Bounded versus Lower bound Constraints (Full Version)","venue":"CoRR","volume":"abs/1305.3204","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-3204","ee":"http://arxiv.org/abs/1305.3204","url":"https://dblp.org/rec/journals/corr/abs-1305-3204"}, "url":"URL#4262950" }, { "@score":"1", "@id":"4262951", "info":{"authors":{"author":[{"@pid":"63/1782","text":"Siu On Chan"},{"@pid":"d/IliasDiakonikolas","text":"Ilias Diakonikolas"},{"@pid":"s/RAServedio","text":"Rocco A. Servedio"},{"@pid":"70/7506","text":"Xiaorui Sun"}]},"title":"Efficient Density Estimation via Piecewise Polynomial Approximation","venue":"CoRR","volume":"abs/1305.3207","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-3207","ee":"http://arxiv.org/abs/1305.3207","url":"https://dblp.org/rec/journals/corr/abs-1305-3207"}, "url":"URL#4262951" }, { "@score":"1", "@id":"4262952", "info":{"authors":{"author":[{"@pid":"130/3805","text":"Sowmyan Jegatheesan"},{"@pid":"74/1774","text":"Nour El-Kadri"}]},"title":"Privacy and Security in IPv6","venue":"CoRR","volume":"abs/1305.3212","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-3212","ee":"http://arxiv.org/abs/1305.3212","url":"https://dblp.org/rec/journals/corr/abs-1305-3212"}, "url":"URL#4262952" }, { "@score":"1", "@id":"4262953", "info":{"authors":{"author":[{"@pid":"130/3767","text":"Senthur Balan S."},{"@pid":"130/3805","text":"Sowmyan Jegatheesan"},{"@pid":"130/4003","text":"Sakthi Ganesh M."}]},"title":"The Product Promotion and Consumer Retention Gap in Online Shopping","venue":"CoRR","volume":"abs/1305.3213","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-3213","ee":"http://arxiv.org/abs/1305.3213","url":"https://dblp.org/rec/journals/corr/abs-1305-3213"}, "url":"URL#4262953" }, { "@score":"1", "@id":"4262954", "info":{"authors":{"author":{"@pid":"83/6232","text":"David R. Stoutemyer"}},"title":"A computer algebra user interface manifesto","venue":"CoRR","volume":"abs/1305.3215","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-3215","ee":"http://arxiv.org/abs/1305.3215","url":"https://dblp.org/rec/journals/corr/abs-1305-3215"}, "url":"URL#4262954" }, { "@score":"1", "@id":"4262955", "info":{"authors":{"author":[{"@pid":"77/6050","text":"Arya Mazumdar"},{"@pid":"17/4991","text":"Venkat Chandar"},{"@pid":"94/5969","text":"Gregory W. Wornell"}]},"title":"Update Efficiency and Local Repairability Limits for Capacity Approaching Codes","venue":"CoRR","volume":"abs/1305.3224","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-3224","ee":"http://arxiv.org/abs/1305.3224","url":"https://dblp.org/rec/journals/corr/abs-1305-3224"}, "url":"URL#4262955" }, { "@score":"1", "@id":"4262956", "info":{"authors":{"author":[{"@pid":"72/11049","text":"Marko Seslija"},{"@pid":"03/1191","text":"Jacquelien M. A. Scherpen"},{"@pid":"20/5842","text":"Arjan van der Schaft"}]},"title":"Reaction-Diffusion Systems as Complex Networks","venue":"CoRR","volume":"abs/1305.3240","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-3240","ee":"http://arxiv.org/abs/1305.3240","url":"https://dblp.org/rec/journals/corr/abs-1305-3240"}, "url":"URL#4262956" }, { "@score":"1", "@id":"4262957", "info":{"authors":{"author":[{"@pid":"50/7864","text":"Ruta Mehta"},{"@pid":"84/5806","text":"Vijay V. Vazirani"}]},"title":"An Incentive Compatible, Efficient Market for Air Traffic Flow Management","venue":"CoRR","volume":"abs/1305.3241","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-3241","ee":"http://arxiv.org/abs/1305.3241","url":"https://dblp.org/rec/journals/corr/abs-1305-3241"}, "url":"URL#4262957" }, { "@score":"1", "@id":"4262958", "info":{"authors":{"author":[{"@pid":"09/3354","text":"Laszlo B. Kish"},{"@pid":"92/10983","text":"Chiman Kwan"}]},"title":"Physical uncloneable function hardware keys utilizing Kirchhoff-law-Johnson-noise secure key exchange and noise-based logic","venue":"CoRR","volume":"abs/1305.3248","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-3248","ee":"http://arxiv.org/abs/1305.3248","url":"https://dblp.org/rec/journals/corr/abs-1305-3248"}, "url":"URL#4262958" }, { "@score":"1", "@id":"4262959", "info":{"authors":{"author":[{"@pid":"130/4040","text":"Marian Popescu"},{"@pid":"130/3912","text":"Peter Dugan"},{"@pid":"75/9577","text":"Mohammad Pourhomayoun"},{"@pid":"130/3838","text":"Denise Risch"},{"@pid":"130/3864","text":"Hal Lewis"},{"@pid":"145/0935","text":"Christopher W. Clark"}]},"title":"Bioacoustical Periodic Pulse Train Signal Detection and Classification using Spectrogram Intensity Binarization and Energy Projection.","venue":"CoRR","volume":"abs/1305.3250","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-3250","ee":"http://arxiv.org/abs/1305.3250","url":"https://dblp.org/rec/journals/corr/abs-1305-3250"}, "url":"URL#4262959" }, { "@score":"1", "@id":"4262960", "info":{"authors":{"author":[{"@pid":"89/7720","text":"Amitabha Sinha"},{"@pid":"130/3747","text":"Soumojit Acharyya"},{"@pid":"13/6135","text":"Suranjan Chakraborty"},{"@pid":"130/3739","text":"Mitrava Sarkar"}]},"title":"Field Programmable DSP Arrays - A","venue":"CoRR","volume":"abs/1305.3251","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-3251","ee":"http://arxiv.org/abs/1305.3251","url":"https://dblp.org/rec/journals/corr/abs-1305-3251"}, "url":"URL#4262960" }, { "@score":"1", "@id":"4262961", "info":{"authors":{"author":[{"@pid":"130/3743","text":"Esteban N. Osella"},{"@pid":"54/869","text":"Hernan Haimovich"},{"@pid":"17/5824","text":"María M. Seron"}]},"title":"Fault-tolerant control under controller-driven sampling using virtual actuator strategy","venue":"CoRR","volume":"abs/1305.3252","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-3252","ee":"http://arxiv.org/abs/1305.3252","url":"https://dblp.org/rec/journals/corr/abs-1305-3252"}, "url":"URL#4262961" }, { "@score":"1", "@id":"4262962", "info":{"authors":{"author":[{"@pid":"130/4012","text":"Ketul Sheth"},{"@pid":"130/3984","text":"Shreya Shah"},{"@pid":"130/3688","text":"Darshan Shah"},{"@pid":"130/3782","text":"Anuja Odhekar"}]},"title":"Social Network for Smart Devices using Embedded Ethernet","venue":"CoRR","volume":"abs/1305.3253","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-3253","ee":"http://arxiv.org/abs/1305.3253","url":"https://dblp.org/rec/journals/corr/abs-1305-3253"}, "url":"URL#4262962" }, { "@score":"1", "@id":"4262963", "info":{"authors":{"author":{"@pid":"25/10260","text":"Flávia Linhalis Arantes"}},"title":"Requirements Engineering of a Web Portal using Organizational Semiotics Artifacts and Participatory Practices","venue":"CoRR","volume":"abs/1305.3255","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-3255","ee":"http://arxiv.org/abs/1305.3255","url":"https://dblp.org/rec/journals/corr/abs-1305-3255"}, "url":"URL#4262963" }, { "@score":"1", "@id":"4262964", "info":{"authors":{"author":{"@pid":"130/3977","text":"Gabriel C. Drummond-Cole"}},"title":"An update on domineering on rectangular boards","venue":"CoRR","volume":"abs/1305.3257","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-3257","ee":"http://arxiv.org/abs/1305.3257","url":"https://dblp.org/rec/journals/corr/abs-1305-3257"}, "url":"URL#4262964" }, { "@score":"1", "@id":"4262965", "info":{"authors":{"author":[{"@pid":"81/11533","text":"Can Karakus"},{"@pid":"90/7254","text":"I-Hsiang Wang"},{"@pid":"d/SNDiggavi","text":"Suhas N. Diggavi"}]},"title":"Interference Channel with Intermittent Feedback","venue":"CoRR","volume":"abs/1305.3265","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-3265","ee":"http://arxiv.org/abs/1305.3265","url":"https://dblp.org/rec/journals/corr/abs-1305-3265"}, "url":"URL#4262965" }, { "@score":"1", "@id":"4262966", "info":{"authors":{"author":[{"@pid":"61/37","text":"Jop Briët"},{"@pid":"07/3765","text":"Daniel Dadush"},{"@pid":"75/7718","text":"Sebastian Pokutta"}]},"title":"On the existence of 0/1 polytopes with high semidefinite extension complexity","venue":"CoRR","volume":"abs/1305.3268","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-3268","ee":"http://arxiv.org/abs/1305.3268","url":"https://dblp.org/rec/journals/corr/abs-1305-3268"}, "url":"URL#4262966" }, { "@score":"1", "@id":"4262967", "info":{"authors":{"author":[{"@pid":"130/4000","text":"Rémi Louf"},{"@pid":"02/7255","text":"Pablo Jensen"},{"@pid":"94/6744","text":"Marc Barthelemy"}]},"title":"Emergence of hierarchy in cost driven growth of spatial networks","venue":"CoRR","volume":"abs/1305.3282","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-3282","ee":"http://arxiv.org/abs/1305.3282","url":"https://dblp.org/rec/journals/corr/abs-1305-3282"}, "url":"URL#4262967" }, { "@score":"1", "@id":"4262968", "info":{"authors":{"author":{"@pid":"126/4992","text":"Maciej Skorski"}},"title":"A Convex Analysis Approach to Computational Entropy","venue":"CoRR","volume":"abs/1305.3288","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-3288","ee":"http://arxiv.org/abs/1305.3288","url":"https://dblp.org/rec/journals/corr/abs-1305-3288"}, "url":"URL#4262968" }, { "@score":"1", "@id":"4262969", "info":{"authors":{"author":[{"@pid":"124/3256","text":"Yongjune Kim 0001"},{"@pid":"74/1799","text":"B. V. K. Vijaya Kumar"}]},"title":"Redundancy Allocation of Partitioned Linear Block Codes","venue":"CoRR","volume":"abs/1305.3289","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-3289","ee":"http://arxiv.org/abs/1305.3289","url":"https://dblp.org/rec/journals/corr/abs-1305-3289"}, "url":"URL#4262969" }, { "@score":"1", "@id":"4262970", "info":{"authors":{"author":[{"@pid":"119/8008","text":"Harsh Taneja"},{"@pid":"130/4052","text":"Angela Xiao Wu"}]},"title":"Does the Great Firewall really isolate the Chinese? Integrating access blockage with cultural factors to explain web user behavior.","venue":"CoRR","volume":"abs/1305.3311","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-3311","ee":"http://arxiv.org/abs/1305.3311","url":"https://dblp.org/rec/journals/corr/abs-1305-3311"}, "url":"URL#4262970" }, { "@score":"1", "@id":"4262971", "info":{"authors":{"author":[{"@pid":"57/11142","text":"Eric C. Chi"},{"@pid":"38/6518","text":"Kenneth Lange"}]},"title":"Stable Estimation of a Covariance Matrix Guided by Nuclear Norm Penalties","venue":"CoRR","volume":"abs/1305.3312","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-3312","ee":"http://arxiv.org/abs/1305.3312","url":"https://dblp.org/rec/journals/corr/abs-1305-3312"}, "url":"URL#4262971" }, { "@score":"1", "@id":"4262972", "info":{"authors":{"author":{"@pid":"38/2434","text":"Shiri Chechik"}},"title":"Approximate Distance Oracle with Constant Query Time","venue":"CoRR","volume":"abs/1305.3314","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-3314","ee":"http://arxiv.org/abs/1305.3314","url":"https://dblp.org/rec/journals/corr/abs-1305-3314"}, "url":"URL#4262972" }, { "@score":"1", "@id":"4262973", "info":{"authors":{"author":[{"@pid":"23/3439-5","text":"Sheng Li 0005"},{"@pid":"98/6670","text":"Rodrigo C. de Lamare"}]},"title":"Linear Reduced-Rank Interference Suppression for DS-UWB Systems Using Switched Approximations of Adaptive Basis Functions","venue":"CoRR","volume":"abs/1305.3317","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-3317","ee":"http://arxiv.org/abs/1305.3317","url":"https://dblp.org/rec/journals/corr/abs-1305-3317"}, "url":"URL#4262973" }, { "@score":"1", "@id":"4262974", "info":{"authors":{"author":[{"@pid":"35/2227","text":"Saïd Jabbour"},{"@pid":"s/LakhdarSais","text":"Lakhdar Sais"},{"@pid":"86/7000","text":"Yakoub Salhi"}]},"title":"A Mining-Based Compression Approach for Constraint Satisfaction Problems","venue":"CoRR","volume":"abs/1305.3321","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-3321","ee":"http://arxiv.org/abs/1305.3321","url":"https://dblp.org/rec/journals/corr/abs-1305-3321"}, "url":"URL#4262974" }, { "@score":"1", "@id":"4262975", "info":{"authors":{"author":[{"@pid":"130/3789","text":"Scott Lapinski"},{"@pid":"13/1007","text":"Heather A. Piwowar"},{"@pid":"36/8819","text":"Jason Priem"}]},"title":"Riding the crest of the altmetrics wave: How librarians can help prepare faculty for the next generation of research impact metrics.","venue":"CoRR","volume":"abs/1305.3328","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-3328","ee":"http://arxiv.org/abs/1305.3328","url":"https://dblp.org/rec/journals/corr/abs-1305-3328"}, "url":"URL#4262975" }, { "@score":"1", "@id":"4262976", "info":{"authors":{"author":[{"@pid":"95/4731","text":"Dimitris Fotakis 0001"},{"@pid":"79/8819","text":"Christos Tzamos"}]},"title":"Strategy-Proof Facility Location for Concave Cost Functions","venue":"CoRR","volume":"abs/1305.3333","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-3333","ee":"http://arxiv.org/abs/1305.3333","url":"https://dblp.org/rec/journals/corr/abs-1305-3333"}, "url":"URL#4262976" }, { "@score":"1", "@id":"4262977", "info":{"authors":{"author":[{"@pid":"98/7659","text":"Cem Tekin"},{"@pid":"97/5725","text":"Mingyan Liu"}]},"title":"Online Learning in a Contract Selection Problem","venue":"CoRR","volume":"abs/1305.3334","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-3334","ee":"http://arxiv.org/abs/1305.3334","url":"https://dblp.org/rec/journals/corr/abs-1305-3334"}, "url":"URL#4262977" }, { "@score":"1", "@id":"4262978", "info":{"authors":{"author":[{"@pid":"63/478","text":"Siddharth Barman"},{"@pid":"98/4060","text":"Umang Bhaskar"},{"@pid":"92/7260","text":"Federico Echenique"},{"@pid":"56/4447","text":"Adam Wierman"}]},"title":"The Empirical Implications of Rank in Bimatrix Games","venue":"CoRR","volume":"abs/1305.3336","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-3336","ee":"http://arxiv.org/abs/1305.3336","url":"https://dblp.org/rec/journals/corr/abs-1305-3336"}, "url":"URL#4262978" }, { "@score":"1", "@id":"4262979", "info":{"authors":{"author":[{"@pid":"35/3725","text":"Ching-Hsien Hsu"},{"@pid":"55/7033","text":"Daqiang Zhang"},{"@pid":"y/ChaoTungYang","text":"Chao-Tung Yang"},{"@pid":"57/7849","text":"Hai-Cheng Chu"}]},"title":"An Efficient Method for Optimizing RFID Reader Deployment and Energy Saving","venue":"CoRR","volume":"abs/1305.3338","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-3338","ee":"http://arxiv.org/abs/1305.3338","url":"https://dblp.org/rec/journals/corr/abs-1305-3338"}, "url":"URL#4262979" }, { "@score":"1", "@id":"4262980", "info":{"authors":{"author":[{"@pid":"118/3940","text":"Weibin Sun"},{"@pid":"37/2827","text":"Robert Ricci"}]},"title":"Augmenting Operating Systems With the GPU","venue":"CoRR","volume":"abs/1305.3345","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-3345","ee":"http://arxiv.org/abs/1305.3345","url":"https://dblp.org/rec/journals/corr/abs-1305-3345"}, "url":"URL#4262980" }, { "@score":"1", "@id":"4262981", "info":{"authors":{"author":[{"@pid":"34/8285","text":"Arnob Ghosh"},{"@pid":"34/4059","text":"Saswati Sarkar"}]},"title":"Quality Sensitive Price Competition in Spectrum Oligopoly","venue":"CoRR","volume":"abs/1305.3351","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-3351","ee":"http://arxiv.org/abs/1305.3351","url":"https://dblp.org/rec/journals/corr/abs-1305-3351"}, "url":"URL#4262981" }, { "@score":"1", "@id":"4262982", "info":{"authors":{"author":[{"@pid":"28/9571","text":"Sandip Chakraborty"},{"@pid":"06/10310","text":"Soumyadip Majumder"},{"@pid":"06/6115","text":"Diganta Goswami"}]},"title":"Approximate Congestion Games for Load Balancing in Distributed Environment","venue":"CoRR","volume":"abs/1305.3354","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-3354","ee":"http://arxiv.org/abs/1305.3354","url":"https://dblp.org/rec/journals/corr/abs-1305-3354"}, "url":"URL#4262982" }, { "@score":"1", "@id":"4262983", "info":{"authors":{"author":[{"@pid":"01/6368-1","text":"He Wang 0001"},{"@pid":"36/2064","text":"Xiangyun Zhou 0001"},{"@pid":"76/6601","text":"Mark C. Reed"}]},"title":"Analytical Evaluation of Coverage-Oriented Femtocell Network Deployment","venue":"CoRR","volume":"abs/1305.3356","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-3356","ee":"http://arxiv.org/abs/1305.3356","url":"https://dblp.org/rec/journals/corr/abs-1305-3356"}, "url":"URL#4262983" }, { "@score":"1", "@id":"4262984", "info":{"authors":{"author":[{"@pid":"05/7001","text":"Satyajit Thakor"},{"@pid":"83/3272","text":"Terence Chan"},{"@pid":"25/5822","text":"Kenneth W. Shum"}]},"title":"Symmetry in Distributed Storage Systems","venue":"CoRR","volume":"abs/1305.3358","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-3358","ee":"http://arxiv.org/abs/1305.3358","url":"https://dblp.org/rec/journals/corr/abs-1305-3358"}, "url":"URL#4262984" }, { "@score":"1", "@id":"4262985", "info":{"authors":{"author":[{"@pid":"129/1571","text":"Ritesh Kolte"},{"@pid":"12/4534","text":"Ayfer Özgür"}]},"title":"Generalized Diversity-Multiplexing Tradeoff of Half-Duplex Relay Networks","venue":"CoRR","volume":"abs/1305.3364","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-3364","ee":"http://arxiv.org/abs/1305.3364","url":"https://dblp.org/rec/journals/corr/abs-1305-3364"}, "url":"URL#4262985" }, { "@score":"1", "@id":"4262986", "info":{"authors":{"author":[{"@pid":"13/8759","text":"Kumar Viswanatha"},{"@pid":"62/3836","text":"Emrah Akyol"},{"@pid":"85/5752","text":"Kenneth Rose"}]},"title":"On the Role of Common Codewords in Quadratic Gaussian Multiple Descriptions Coding","venue":"CoRR","volume":"abs/1305.3375","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-3375","ee":"http://arxiv.org/abs/1305.3375","url":"https://dblp.org/rec/journals/corr/abs-1305-3375"}, "url":"URL#4262986" }, { "@score":"1", "@id":"4262987", "info":{"authors":{"author":[{"@pid":"11/8209","text":"Laura Bernadó"},{"@pid":"71/3289","text":"Thomas Zemen"},{"@pid":"06/5372","text":"Fredrik Tufvesson"},{"@pid":"54/2683","text":"Andreas F. Molisch"},{"@pid":"44/1996","text":"Christoph F. Mecklenbräuker"}]},"title":"Delay and Doppler Spreads of Non-Stationary Vehicular Channels for Safety Relevant Scenarios","venue":"CoRR","volume":"abs/1305.3376","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-3376","ee":"http://arxiv.org/abs/1305.3376","url":"https://dblp.org/rec/journals/corr/abs-1305-3376"}, "url":"URL#4262987" }, { "@score":"1", "@id":"4262988", "info":{"authors":{"author":[{"@pid":"130/4011","text":"Naseem Biadsy"},{"@pid":"r/LiorRokach","text":"Lior Rokach"},{"@pid":"s/ArminShmilovici","text":"Armin Shmilovici"}]},"title":"Transfer Learning for Content-Based Recommender Systems using Tree Matching","venue":"CoRR","volume":"abs/1305.3384","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-3384","ee":"http://arxiv.org/abs/1305.3384","url":"https://dblp.org/rec/journals/corr/abs-1305-3384"}, "url":"URL#4262988" }, { "@score":"1", "@id":"4262989", "info":{"authors":{"author":{"@pid":"129/1487","text":"Giovanni Birolo"}},"title":"A Witness Extraction Technique by Proof Normalization Based on Interactive Realizability","venue":"CoRR","volume":"abs/1305.3388","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-3388","ee":"http://arxiv.org/abs/1305.3388","url":"https://dblp.org/rec/journals/corr/abs-1305-3388"}, "url":"URL#4262989" }, { "@score":"1", "@id":"4262990", "info":{"authors":{"author":[{"@pid":"85/3827","text":"Daniel Augot"},{"@pid":"f/MatthieuFiniasz","text":"Matthieu Finiasz"}]},"title":"Exhaustive Search for Small Dimension Recursive MDS Diffusion Layers for Block Ciphers and Hash Functions","venue":"CoRR","volume":"abs/1305.3396","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-3396","ee":"http://arxiv.org/abs/1305.3396","url":"https://dblp.org/rec/journals/corr/abs-1305-3396"}, "url":"URL#4262990" }, { "@score":"1", "@id":"4262991", "info":{"authors":{"author":[{"@pid":"99/8750","text":"Johannes Niedermayer"},{"@pid":"18/2478","text":"Andreas Züfle"},{"@pid":"79/7126","text":"Tobias Emrich"},{"@pid":"r/MatthiasRenz","text":"Matthias Renz"},{"@pid":"34/6253","text":"Nikos Mamoulis"},{"@pid":"c/LeiChen0002","text":"Lei Chen 0002"},{"@pid":"k/HansPeterKriegel","text":"Hans-Peter Kriegel"}]},"title":"Probabilistic Nearest Neighbor Queries on Uncertain Moving Object Trajectories","venue":"CoRR","volume":"abs/1305.3407","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-3407","ee":"http://arxiv.org/abs/1305.3407","url":"https://dblp.org/rec/journals/corr/abs-1305-3407"}, "url":"URL#4262991" }, { "@score":"1", "@id":"4262992", "info":{"authors":{"author":[{"@pid":"120/7388","text":"David Stotz"},{"@pid":"18/6668","text":"Erwin Riegler"},{"@pid":"97/4598","text":"Helmut Bölcskei"}]},"title":"Almost Lossless Analog Signal Separation","venue":"CoRR","volume":"abs/1305.3422","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-3422","ee":"http://arxiv.org/abs/1305.3422","url":"https://dblp.org/rec/journals/corr/abs-1305-3422"}, "url":"URL#4262992" }, { "@score":"1", "@id":"4262993", "info":{"authors":{"author":[{"@pid":"71/8968","text":"Abdelhamid Younis"},{"@pid":"129/9750","text":"William H. Thompson"},{"@pid":"88/609","text":"Marco Di Renzo"},{"@pid":"75/2596","text":"Cheng-Xiang Wang 0001"},{"@pid":"06/4716","text":"Mark A. Beach"},{"@pid":"12/2168","text":"Harald Haas"},{"@pid":"35/1547","text":"Peter M. Grant"}]},"title":"Performance of Spatial Modulation using Measured Real-World Channels","venue":"CoRR","volume":"abs/1305.3437","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-3437","ee":"http://arxiv.org/abs/1305.3437","url":"https://dblp.org/rec/journals/corr/abs-1305-3437"}, "url":"URL#4262993" }, { "@score":"1", "@id":"4262994", "info":{"authors":{"author":[{"@pid":"130/3856","text":"Sanjeel Parekh"},{"@pid":"83/932","text":"Pratik Shah"}]},"title":"Nyquist Filter Design using POCS Methods: Including Constraints in Design","venue":"CoRR","volume":"abs/1305.3446","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-3446","ee":"http://arxiv.org/abs/1305.3446","url":"https://dblp.org/rec/journals/corr/abs-1305-3446"}, "url":"URL#4262994" }, { "@score":"1", "@id":"4262995", "info":{"authors":{"author":[{"@pid":"60/5184","text":"Walter Quattrociocchi"},{"@pid":"50/6478","text":"Guido Caldarelli"},{"@pid":"92/9669","text":"Antonio Scala"}]},"title":"Self-healing networks: redundancy and structure","venue":"CoRR","volume":"abs/1305.3450","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-3450","ee":"http://arxiv.org/abs/1305.3450","url":"https://dblp.org/rec/journals/corr/abs-1305-3450"}, "url":"URL#4262995" }, { "@score":"1", "@id":"4262996", "info":{"authors":{"author":[{"@pid":"36/8083","text":"Fulvio Forni"},{"@pid":"54/461","text":"Rodolphe Sepulchre"}]},"title":"On differentially dissipative dynamical systems","venue":"CoRR","volume":"abs/1305.3456","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-3456","ee":"http://arxiv.org/abs/1305.3456","url":"https://dblp.org/rec/journals/corr/abs-1305-3456"}, "url":"URL#4262996" }, { "@score":"1", "@id":"4262997", "info":{"authors":{"author":[{"@pid":"11/6556","text":"Karsten Fyhn"},{"@pid":"157/8095","text":"Marco F. Duarte"},{"@pid":"93/2935","text":"Søren Holdt Jensen"}]},"title":"Compressive Parameter Estimation for Sparse Translation-Invariant Signals Using Polar Interpolation","venue":"CoRR","volume":"abs/1305.3483","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-3483","ee":"http://arxiv.org/abs/1305.3483","url":"https://dblp.org/rec/journals/corr/abs-1305-3483"}, "url":"URL#4262997" }, { "@score":"1", "@id":"4262998", "info":{"authors":{"author":[{"@pid":"130/3851","text":"Ana Isabel Fernandes"},{"@pid":"00/6302","text":"Miguel Goulão"},{"@pid":"43/3475","text":"Armanda Rodrigues"}]},"title":"A Comparison of Maps Application Programming Interfaces","venue":"CoRR","volume":"abs/1305.3485","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-3485","ee":"http://arxiv.org/abs/1305.3485","url":"https://dblp.org/rec/journals/corr/abs-1305-3485"}, "url":"URL#4262998" }, { "@score":"1", "@id":"4262999", "info":{"authors":{"author":[{"@pid":"81/9668","text":"Reinhard Heckel"},{"@pid":"97/4598","text":"Helmut Bölcskei"}]},"title":"Noisy Subspace Clustering via Thresholding","venue":"CoRR","volume":"abs/1305.3486","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-3486","ee":"http://arxiv.org/abs/1305.3486","url":"https://dblp.org/rec/journals/corr/abs-1305-3486"}, "url":"URL#4262999" }, { "@score":"1", "@id":"4263000", "info":{"authors":{"author":[{"@pid":"37/6765","text":"Fabrice Guillemin"},{"@pid":"70/4520","text":"Alain Simonian"}]},"title":"Stationary analysis of the Shortest Queue First service policy","venue":"CoRR","volume":"abs/1305.3490","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-3490","ee":"http://arxiv.org/abs/1305.3490","url":"https://dblp.org/rec/journals/corr/abs-1305-3490"}, "url":"URL#4263000" }, { "@score":"1", "@id":"4263001", "info":{"authors":{"author":[{"@pid":"37/6765","text":"Fabrice Guillemin"},{"@pid":"70/4520","text":"Alain Simonian"}]},"title":"Stationary analysis of the "Shortest Queue First" service policy: the asymmetric case","venue":"CoRR","volume":"abs/1305.3496","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-3496","ee":"http://arxiv.org/abs/1305.3496","url":"https://dblp.org/rec/journals/corr/abs-1305-3496"}, "url":"URL#4263001" }, { "@score":"1", "@id":"4263002", "info":{"authors":{"author":[{"@pid":"52/4677","text":"Sreechakra Goparaju"},{"@pid":"07/7218","text":"Itzhak Tamo"},{"@pid":"c/ARobertCalderbank","text":"A. Robert Calderbank"}]},"title":"An Improved Sub-Packetization Bound for Minimum Storage Regenerating Codes","venue":"CoRR","volume":"abs/1305.3498","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-3498","ee":"http://arxiv.org/abs/1305.3498","url":"https://dblp.org/rec/journals/corr/abs-1305-3498"}, "url":"URL#4263002" }, { "@score":"1", "@id":"4263003", "info":{"authors":{"author":[{"@pid":"75/4","text":"Tim Clark"},{"@pid":"39/4100","text":"Paolo Ciccarese"},{"@pid":"g/CaroleAGoble","text":"Carole A. Goble"}]},"title":"Micropublications: a Semantic Model for Claims, Evidence, Arguments and Annotations in Biomedical Communications","venue":"CoRR","volume":"abs/1305.3506","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-3506","ee":"http://arxiv.org/abs/1305.3506","url":"https://dblp.org/rec/journals/corr/abs-1305-3506"}, "url":"URL#4263003" }, { "@score":"1", "@id":"4263004", "info":{"authors":{"author":[{"@pid":"67/3434","text":"Alain Barrat"},{"@pid":"42/5539","text":"Ciro Cattuto"}]},"title":"Temporal networks of face-to-face human interactions","venue":"CoRR","volume":"abs/1305.3532","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-3532","ee":"http://arxiv.org/abs/1305.3532","url":"https://dblp.org/rec/journals/corr/abs-1305-3532"}, "url":"URL#4263004" }, { "@score":"1", "@id":"4263005", "info":{"authors":{"author":{"@pid":"37/6765","text":"Fabrice Guillemin"}},"title":"Analysis of a non-work conserving Generalized Processor Sharing queue","venue":"CoRR","volume":"abs/1305.3536","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-3536","ee":"http://arxiv.org/abs/1305.3536","url":"https://dblp.org/rec/journals/corr/abs-1305-3536"}, "url":"URL#4263005" }, { "@score":"1", "@id":"4263006", "info":{"authors":{"author":[{"@pid":"69/8316","text":"Ralph Tanbourgi"},{"@pid":"13/2912","text":"Holger Jäkel"},{"@pid":"97/6902","text":"Friedrich K. Jondral"}]},"title":"Cooperative Relaying in a Poisson Field of Interferers: A Diversity Order Analysis","venue":"CoRR","volume":"abs/1305.3537","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-3537","ee":"http://arxiv.org/abs/1305.3537","url":"https://dblp.org/rec/journals/corr/abs-1305-3537"}, "url":"URL#4263006" }, { "@score":"1", "@id":"4263007", "info":{"authors":{"author":[{"@pid":"68/3340-8","text":"Xin Jin 0008"},{"@pid":"l/ErranLLi","text":"Li Erran Li"},{"@pid":"51/7546","text":"Laurent Vanbever"},{"@pid":"r/JenniferRexford","text":"Jennifer Rexford"}]},"title":"SoftCell: Taking Control of Cellular Core Networks","venue":"CoRR","volume":"abs/1305.3568","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-3568","ee":"http://arxiv.org/abs/1305.3568","url":"https://dblp.org/rec/journals/corr/abs-1305-3568"}, "url":"URL#4263007" }, { "@score":"1", "@id":"4263008", "info":{"authors":{"author":[{"@pid":"194/4535","text":"Clive Elphick"},{"@pid":"w/PawelWocjan","text":"Pawel Wocjan"}]},"title":"Strengthening Turan's Theorem for Irregular Graphs","venue":"CoRR","volume":"abs/1305.3570","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-3570","ee":"http://arxiv.org/abs/1305.3570","url":"https://dblp.org/rec/journals/corr/abs-1305-3570"}, "url":"URL#4263008" }, { "@score":"1", "@id":"4263009", "info":{"authors":{"author":[{"@pid":"g/ErolGelenbe","text":"Erol Gelenbe"},{"@pid":"03/7171","text":"Omer H. Abdelrahman"}]},"title":"Search in Random Media with Lévy Flights","venue":"CoRR","volume":"abs/1305.3578","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-3578","ee":"http://arxiv.org/abs/1305.3578","url":"https://dblp.org/rec/journals/corr/abs-1305-3578"}, "url":"URL#4263009" }, { "@score":"1", "@id":"4263010", "info":{"authors":{"author":{"@pid":"130/3959","text":"David Kordalewski"}},"title":"New Greedy Heuristics For Set Cover and Set Packing","venue":"CoRR","volume":"abs/1305.3584","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-3584","ee":"http://arxiv.org/abs/1305.3584","url":"https://dblp.org/rec/journals/corr/abs-1305-3584"}, "url":"URL#4263010" }, { "@score":"1", "@id":"4263011", "info":{"authors":{"author":[{"@pid":"83/10397","text":"Dilip Bethanabhotla"},{"@pid":"19/2492","text":"Giuseppe Caire"},{"@pid":"n/MichaelJNeely","text":"Michael J. Neely"}]},"title":"Utility Optimal Scheduling and Admission Control for Adaptive Video Streaming in Small Cell Networks","venue":"CoRR","volume":"abs/1305.3586","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-3586","ee":"http://arxiv.org/abs/1305.3586","url":"https://dblp.org/rec/journals/corr/abs-1305-3586"}, "url":"URL#4263011" }, { "@score":"1", "@id":"4263012", "info":{"authors":{"author":[{"@pid":"02/8655","text":"Kaya Tutuncuoglu"},{"@pid":"04/8575","text":"Omur Ozel"},{"@pid":"y/AylinYener","text":"Aylin Yener"},{"@pid":"u/SennurUlukus","text":"Sennur Ulukus"}]},"title":"Binary Energy Harvesting Channel with Finite Energy Storage","venue":"CoRR","volume":"abs/1305.3595","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-3595","ee":"http://arxiv.org/abs/1305.3595","url":"https://dblp.org/rec/journals/corr/abs-1305-3595"}, "url":"URL#4263012" }, { "@score":"1", "@id":"4263013", "info":{"authors":{"author":[{"@pid":"13/8316","text":"Ahmed Badr"},{"@pid":"84/5679","text":"Ashish Khisti"},{"@pid":"76/1151","text":"Wai-Tian Tan"},{"@pid":"42/979","text":"John G. Apostolopoulos"}]},"title":"Robust Streaming Erasure Codes based on Deterministic Channel Approximations","venue":"CoRR","volume":"abs/1305.3596","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-3596","ee":"http://arxiv.org/abs/1305.3596","url":"https://dblp.org/rec/journals/corr/abs-1305-3596"}, "url":"URL#4263013" }, { "@score":"1", "@id":"4263014", "info":{"authors":{"author":[{"@pid":"73/8260","text":"Manuel Gomez-Rodriguez"},{"@pid":"l/JureLeskovec","text":"Jure Leskovec"},{"@pid":"97/119","text":"Bernhard Schölkopf"}]},"title":"Modeling Information Propagation with Survival Theory","venue":"CoRR","volume":"abs/1305.3616","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-3616","ee":"http://arxiv.org/abs/1305.3616","url":"https://dblp.org/rec/journals/corr/abs-1305-3616"}, "url":"URL#4263014" }, { "@score":"1", "@id":"4263015", "info":{"authors":{"author":{"@pid":"130/3925","text":"Knut Skogstrand Gjerden"}},"title":"Making the case of GPUs in courses on computational physics","venue":"CoRR","volume":"abs/1305.3625","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-3625","ee":"http://arxiv.org/abs/1305.3625","url":"https://dblp.org/rec/journals/corr/abs-1305-3625"}, "url":"URL#4263015" }, { "@score":"1", "@id":"4263016", "info":{"authors":{"author":[{"@pid":"75/9577","text":"Mohammad Pourhomayoun"},{"@pid":"130/3912","text":"Peter Dugan"},{"@pid":"130/4040","text":"Marian Popescu"},{"@pid":"130/3838","text":"Denise Risch"},{"@pid":"130/3864","text":"Hal Lewis"},{"@pid":"145/0935","text":"Christopher W. Clark"}]},"title":"Classification for Big Dataset of Bioacoustic Signals Based on Human Scoring System and Artificial Neural Network","venue":"CoRR","volume":"abs/1305.3633","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-3633","ee":"http://arxiv.org/abs/1305.3633","url":"https://dblp.org/rec/journals/corr/abs-1305-3633"}, "url":"URL#4263016" }, { "@score":"1", "@id":"4263017", "info":{"authors":{"author":[{"@pid":"75/9577","text":"Mohammad Pourhomayoun"},{"@pid":"130/3912","text":"Peter Dugan"},{"@pid":"130/4040","text":"Marian Popescu"},{"@pid":"145/0935","text":"Christopher W. Clark"}]},"title":"Bioacoustic Signal Classification Based on Continuous Region Processing, Grid Masking and Artificial Neural Network","venue":"CoRR","volume":"abs/1305.3635","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-3635","ee":"http://arxiv.org/abs/1305.3635","url":"https://dblp.org/rec/journals/corr/abs-1305-3635"}, "url":"URL#4263017" }, { "@score":"1", "@id":"4263018", "info":{"authors":{"author":[{"@pid":"19/1432","text":"Andreas Hellander"},{"@pid":"155/2196","text":"Michael J. Lawson"},{"@pid":"14/11200","text":"Brian Drawert"},{"@pid":"03/3669","text":"Linda R. Petzold"}]},"title":"Local error estimates for adaptive simulation of the Reaction-Diffusion Master Equation via operator splitting","venue":"CoRR","volume":"abs/1305.3639","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-3639","ee":"http://arxiv.org/abs/1305.3639","url":"https://dblp.org/rec/journals/corr/abs-1305-3639"}, "url":"URL#4263018" }, { "@score":"1", "@id":"4263019", "info":{"authors":{"author":[{"@pid":"73/8292","text":"Paulo Shakarian"},{"@pid":"51/2557","text":"Patrick Roos"},{"@pid":"122/3130","text":"Devon Callahan"},{"@pid":"130/3776","text":"Cory Kirk"}]},"title":"Mining for Geographically Disperse Communities in Social Networks by Leveraging Distance Modularity","venue":"CoRR","volume":"abs/1305.3668","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-3668","ee":"http://arxiv.org/abs/1305.3668","url":"https://dblp.org/rec/journals/corr/abs-1305-3668"}, "url":"URL#4263019" }, { "@score":"1", "@id":"4263020", "info":{"authors":{"author":{"@pid":"h/MarcusHutter","text":"Marcus Hutter"}},"title":"Sparse Adaptive Dirichlet-Multinomial-like Processes","venue":"CoRR","volume":"abs/1305.3671","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-3671","ee":"http://arxiv.org/abs/1305.3671","url":"https://dblp.org/rec/journals/corr/abs-1305-3671"}, "url":"URL#4263020" }, { "@score":"1", "@id":"4263021", "info":{"authors":{"author":[{"@pid":"71/10962","text":"Jianhang Gao"},{"@pid":"78/6217-1","text":"Qing Zhao 0001"},{"@pid":"89/5072","text":"Ananthram Swami"}]},"title":"The Thinnest Path Problem","venue":"CoRR","volume":"abs/1305.3688","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-3688","ee":"http://arxiv.org/abs/1305.3688","url":"https://dblp.org/rec/journals/corr/abs-1305-3688"}, "url":"URL#4263021" }, { "@score":"1", "@id":"4263022", "info":{"authors":{"author":[{"@pid":"01/6368-1","text":"He Wang 0001"},{"@pid":"36/2064","text":"Xiangyun Zhou 0001"},{"@pid":"76/6601","text":"Mark C. Reed"}]},"title":"Coverage and Throughput Analysis with a Non-Uniform Femtocell Deployment","venue":"CoRR","volume":"abs/1305.3694","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-3694","ee":"http://arxiv.org/abs/1305.3694","url":"https://dblp.org/rec/journals/corr/abs-1305-3694"}, "url":"URL#4263022" }, { "@score":"1", "@id":"4263023", "info":{"authors":{"author":[{"@pid":"62/5709","text":"Jean-Marie Chauvet"},{"@pid":"66/10011","text":"Eric Mahe"}]},"title":"Secrets from the GPU","venue":"CoRR","volume":"abs/1305.3699","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-3699","ee":"http://arxiv.org/abs/1305.3699","url":"https://dblp.org/rec/journals/corr/abs-1305-3699"}, "url":"URL#4263023" }, { "@score":"1", "@id":"4263024", "info":{"authors":{"author":[{"@pid":"05/7001","text":"Satyajit Thakor"},{"@pid":"g/AlexJGrant","text":"Alex J. Grant"},{"@pid":"83/3272","text":"Terence Chan"}]},"title":"Cut-Set Bounds on Network Information Flow","venue":"CoRR","volume":"abs/1305.3706","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-3706","ee":"http://arxiv.org/abs/1305.3706","url":"https://dblp.org/rec/journals/corr/abs-1305-3706"}, "url":"URL#4263024" }, { "@score":"1", "@id":"4263025", "info":{"authors":{"author":[{"@pid":"129/8044","text":"Jad Hachem"},{"@pid":"90/7254","text":"I-Hsiang Wang"},{"@pid":"87/5736","text":"Christina Fragouli"},{"@pid":"d/SNDiggavi","text":"Suhas N. Diggavi"}]},"title":"Coding with Encoding Uncertainty","venue":"CoRR","volume":"abs/1305.3733","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-3733","ee":"http://arxiv.org/abs/1305.3733","url":"https://dblp.org/rec/journals/corr/abs-1305-3733"}, "url":"URL#4263025" }, { "@score":"1", "@id":"4263026", "info":{"authors":{"author":[{"@pid":"55/8172","text":"Sepp Hartung"},{"@pid":"69/1771","text":"Christian Komusiewicz"},{"@pid":"32/8821","text":"André Nichterlein"},{"@pid":"57/1414","text":"Ondrej Suchý"}]},"title":"On Structural Parameterizations for the 2-Club Problem","venue":"CoRR","volume":"abs/1305.3735","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-3735","ee":"http://arxiv.org/abs/1305.3735","url":"https://dblp.org/rec/journals/corr/abs-1305-3735"}, "url":"URL#4263026" }, { "@score":"1", "@id":"4263027", "info":{"authors":{"author":[{"@pid":"123/4469","text":"Madhumita Sengupta"},{"@pid":"32/71","text":"J. K. Mandal 0001"}]},"title":"Wavelet Based Authentication/Secret Transmission Through Image Resizing(WASTIR)","venue":"CoRR","volume":"abs/1305.3753","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-3753","ee":"http://arxiv.org/abs/1305.3753","url":"https://dblp.org/rec/journals/corr/abs-1305-3753"}, "url":"URL#4263027" }, { "@score":"1", "@id":"4263028", "info":{"authors":{"author":[{"@pid":"130/3811","text":"Jennifer D. Warrender"},{"@pid":"19/6031","text":"Phillip Lord"}]},"title":"The Karyotype Ontology: a computational representation for human cytogenetic patterns","venue":"CoRR","volume":"abs/1305.3758","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-3758","ee":"http://arxiv.org/abs/1305.3758","url":"https://dblp.org/rec/journals/corr/abs-1305-3758"}, "url":"URL#4263028" }, { "@score":"1", "@id":"4263029", "info":{"authors":{"author":{"@pid":"130/3868","text":"Changtao Yu"}},"title":"On dually flat $(α,β)$-metrics","venue":"CoRR","volume":"abs/1305.3767","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-3767","ee":"http://arxiv.org/abs/1305.3767","url":"https://dblp.org/rec/journals/corr/abs-1305-3767"}, "url":"URL#4263029" }, { "@score":"1", "@id":"4263030", "info":{"authors":{"author":[{"@pid":"130/3828","text":"Fada Li"},{"@pid":"37/8125","text":"Wansu Bao"},{"@pid":"35/8126","text":"Xiangqun Fu"},{"@pid":"42/7674","text":"Yuchao Zhang"},{"@pid":"93/9279","text":"Tan Li"}]},"title":"A subexponential-time quantum algorithm for LWE problem","venue":"CoRR","volume":"abs/1305.3769","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-3769","ee":"http://arxiv.org/abs/1305.3769","url":"https://dblp.org/rec/journals/corr/abs-1305-3769"}, "url":"URL#4263030" }, { "@score":"1", "@id":"4263031", "info":{"authors":{"author":[{"@pid":"87/8910","text":"Niek Bouman"},{"@pid":"b/SemCBorst","text":"Sem C. Borst"},{"@pid":"j/JohanvanLeeuwaarden","text":"Johan van Leeuwaarden"}]},"title":"Delay Performance and Mixing Times in Random-Access Networks","venue":"CoRR","volume":"abs/1305.3774","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-3774","ee":"http://arxiv.org/abs/1305.3774","url":"https://dblp.org/rec/journals/corr/abs-1305-3774"}, "url":"URL#4263031" }, { "@score":"1", "@id":"4263032", "info":{"authors":{"author":[{"@pid":"125/2057","text":"Ali Bereyhi"},{"@pid":"04/6821","text":"Mohsen Bahrami"},{"@pid":"39/7805","text":"Mahtab Mirmohseni"},{"@pid":"91/4838","text":"Mohammad Reza Aref"}]},"title":"Empirical Coordination in a Triangular Multiterminal Network","venue":"CoRR","volume":"abs/1305.3778","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-3778","ee":"http://arxiv.org/abs/1305.3778","url":"https://dblp.org/rec/journals/corr/abs-1305-3778"}, "url":"URL#4263032" }, { "@score":"1", "@id":"4263033", "info":{"authors":{"author":[{"@pid":"82/5128","text":"Gabriel Kronberger"},{"@pid":"56/7232","text":"Michael Kommenda"}]},"title":"Evolution of Covariance Functions for Gaussian Process Regression using Genetic Programming","venue":"CoRR","volume":"abs/1305.3794","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-3794","ee":"http://arxiv.org/abs/1305.3794","url":"https://dblp.org/rec/journals/corr/abs-1305-3794"}, "url":"URL#4263033" }, { "@score":"1", "@id":"4263034", "info":{"authors":{"author":[{"@pid":"130/3961","text":"Ameer K. Mulla"},{"@pid":"130/3874","text":"Rachel K. Kalaimani"},{"@pid":"01/8207","text":"Debraj Chakraborty 0001"},{"@pid":"56/7140","text":"Madhu N. Belur"}]},"title":"Formation control with pole placement for multi-agent systems","venue":"CoRR","volume":"abs/1305.3797","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-3797","ee":"http://arxiv.org/abs/1305.3797","url":"https://dblp.org/rec/journals/corr/abs-1305-3797"}, "url":"URL#4263034" }, { "@score":"1", "@id":"4263035", "info":{"authors":{"author":[{"@pid":"12/4863","text":"Hassan Mansour"},{"@pid":"63/1000","text":"Özgür Yilmaz"}]},"title":"A fast randomized Kaczmarz algorithm for sparse solutions of consistent linear systems","venue":"CoRR","volume":"abs/1305.3803","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-3803","ee":"http://arxiv.org/abs/1305.3803","url":"https://dblp.org/rec/journals/corr/abs-1305-3803"}, "url":"URL#4263035" }, { "@score":"1", "@id":"4263036", "info":{"authors":{"author":[{"@pid":"120/4042","text":"Zahra Jafargholi"},{"@pid":"48/4265","text":"Emanuele Viola"}]},"title":"3SUM, 3XOR, Triangles","venue":"CoRR","volume":"abs/1305.3827","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-3827","ee":"http://arxiv.org/abs/1305.3827","url":"https://dblp.org/rec/journals/corr/abs-1305-3827"}, "url":"URL#4263036" }, { "@score":"1", "@id":"4263037", "info":{"authors":{"author":[{"@pid":"37/7414","text":"Lorenzo De Stefani"},{"@pid":"02/6456-1","text":"Francesco Silvestri 0001"}]},"title":"Exploiting non-constant safe memory in resilient algorithms and data structures","venue":"CoRR","volume":"abs/1305.3828","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-3828","ee":"http://arxiv.org/abs/1305.3828","url":"https://dblp.org/rec/journals/corr/abs-1305-3828"}, "url":"URL#4263037" }, { "@score":"1", "@id":"4263038", "info":{"authors":{"author":[{"@pid":"130/3944","text":"Egbert Rijke"},{"@pid":"52/1626","text":"Bas Spitters"}]},"title":"Sets in homotopy type theory","venue":"CoRR","volume":"abs/1305.3835","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-3835","ee":"http://arxiv.org/abs/1305.3835","url":"https://dblp.org/rec/journals/corr/abs-1305-3835"}, "url":"URL#4263038" }, { "@score":"1", "@id":"4263039", "info":{"authors":{"author":{"@pid":"07/8400","text":"Giovanni Luca Ciampaglia"}},"title":"A framework for the calibration of social simulation models","venue":"CoRR","volume":"abs/1305.3842","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-3842","ee":"http://arxiv.org/abs/1305.3842","url":"https://dblp.org/rec/journals/corr/abs-1305-3842"}, "url":"URL#4263039" }, { "@score":"1", "@id":"4263040", "info":{"authors":{"author":[{"@pid":"48/4475","text":"Emmanuel Grolleau"},{"@pid":"74/6780","text":"Joël Goossens"},{"@pid":"18/2956","text":"Liliana Cucu-Grosjean"}]},"title":"On the periodic behavior of real-time schedulers on identical multiprocessor platforms","venue":"CoRR","volume":"abs/1305.3849","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-3849","ee":"http://arxiv.org/abs/1305.3849","url":"https://dblp.org/rec/journals/corr/abs-1305-3849"}, "url":"URL#4263040" }, { "@score":"1", "@id":"4263041", "info":{"authors":{"author":{"@pid":"122/2841","text":"Richard Ellis-Braithwaite"}},"title":"Analysing the Assumed Benefits of Software Requirements","venue":"CoRR","volume":"abs/1305.3853","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-3853","ee":"http://arxiv.org/abs/1305.3853","url":"https://dblp.org/rec/journals/corr/abs-1305-3853"}, "url":"URL#4263041" }, { "@score":"1", "@id":"4263042", "info":{"authors":{"author":[{"@pid":"04/8772","text":"Giovanna Miritello"},{"@pid":"10/517","text":"Rubén Lara"},{"@pid":"122/2977","text":"Esteban Moro Egido"}]},"title":"Time allocation in social networks: correlation between social structure and human communication dynamics","venue":"CoRR","volume":"abs/1305.3865","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-3865","ee":"http://arxiv.org/abs/1305.3865","url":"https://dblp.org/rec/journals/corr/abs-1305-3865"}, "url":"URL#4263042" }, { "@score":"1", "@id":"4263043", "info":{"authors":{"author":{"@pid":"03/7805","text":"Anna Blasiak"}},"title":"Multicut Lower Bounds via Network Coding","venue":"CoRR","volume":"abs/1305.3869","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-3869","ee":"http://arxiv.org/abs/1305.3869","url":"https://dblp.org/rec/journals/corr/abs-1305-3869"}, "url":"URL#4263043" }, { "@score":"1", "@id":"4263044", "info":{"authors":{"author":[{"@pid":"80/8483","text":"Blerim Cici"},{"@pid":"94/1167","text":"Enrique Frías-Martínez"},{"@pid":"04/5326","text":"Nikolaos Laoutaris"}]},"title":"A tale of 2 continents and 4 cities about the influence of demographics and social constraints on ride-sharing","venue":"CoRR","volume":"abs/1305.3876","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-3876","ee":"http://arxiv.org/abs/1305.3876","url":"https://dblp.org/rec/journals/corr/abs-1305-3876"}, "url":"URL#4263044" }, { "@score":"1", "@id":"4263045", "info":{"authors":{"author":{"@pid":"125/6741","text":"Daniel Christen"}},"title":"Rule-Based Semantic Tagging. An Application Undergoing Dictionary Glosses","venue":"CoRR","volume":"abs/1305.3882","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-3882","ee":"http://arxiv.org/abs/1305.3882","url":"https://dblp.org/rec/journals/corr/abs-1305-3882"}, "url":"URL#4263045" }, { "@score":"1", "@id":"4263046", "info":{"authors":{"author":[{"@pid":"27/443-1","text":"Sanjay Rawat 0001"},{"@pid":"45/9679","text":"Dumitru Ceara"},{"@pid":"07/2632","text":"Laurent Mounier"},{"@pid":"37/5694","text":"Marie-Laure Potet"}]},"title":"Combining Static and Dynamic Analysis for Vulnerability Detection","venue":"CoRR","volume":"abs/1305.3883","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-3883","ee":"http://arxiv.org/abs/1305.3883","url":"https://dblp.org/rec/journals/corr/abs-1305-3883"}, "url":"URL#4263046" }, { "@score":"1", "@id":"4263047", "info":{"authors":{"author":{"@pid":"93/8841","text":"Dilip K. Prasad"}},"title":"Geometric primitive feature extraction - concepts, algorithms, and applications","venue":"CoRR","volume":"abs/1305.3885","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-3885","ee":"http://arxiv.org/abs/1305.3885","url":"https://dblp.org/rec/journals/corr/abs-1305-3885"}, "url":"URL#4263047" }, { "@score":"1", "@id":"4263048", "info":{"authors":{"author":[{"@pid":"04/9663","text":"Roarke Horstmeyer"},{"@pid":"130/3966","text":"Benjamin Judkewitz"},{"@pid":"130/3794","text":"Ivo M. Vellekoop"},{"@pid":"66/9773","text":"Changhuei Yang"}]},"title":"Physical key-protected one-time pad","venue":"CoRR","volume":"abs/1305.3886","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-3886","ee":"http://arxiv.org/abs/1305.3886","url":"https://dblp.org/rec/journals/corr/abs-1305-3886"}, "url":"URL#4263048" }, { "@score":"1", "@id":"4263049", "info":{"authors":{"author":[{"@pid":"98/6670","text":"Rodrigo C. de Lamare"},{"@pid":"72/7818","text":"Vítor H. Nascimento"}]},"title":"Joint Model-Order and Step-Size Adaptation using Convex Combinations of Adaptive Reduced-Rank Filters","venue":"CoRR","volume":"abs/1305.3887","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-3887","ee":"http://arxiv.org/abs/1305.3887","url":"https://dblp.org/rec/journals/corr/abs-1305-3887"}, "url":"URL#4263049" }, { "@score":"1", "@id":"4263050", "info":{"authors":{"author":[{"@pid":"58/10358","text":"Curt Schieler"},{"@pid":"117/8945","text":"Paul Cuff"}]},"title":"Rate-Distortion Theory for Secrecy Systems","venue":"CoRR","volume":"abs/1305.3905","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-3905","ee":"http://arxiv.org/abs/1305.3905","url":"https://dblp.org/rec/journals/corr/abs-1305-3905"}, "url":"URL#4263050" }, { "@score":"1", "@id":"4263051", "info":{"authors":{"author":[{"@pid":"62/3836","text":"Emrah Akyol"},{"@pid":"85/5752","text":"Kenneth Rose"},{"@pid":"b/TamerBasar","text":"Tamer Basar"}]},"title":"Gaussian Sensor Networks with Adversarial Nodes","venue":"CoRR","volume":"abs/1305.3931","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-3931","ee":"http://arxiv.org/abs/1305.3931","url":"https://dblp.org/rec/journals/corr/abs-1305-3931"}, "url":"URL#4263051" }, { "@score":"1", "@id":"4263052", "info":{"authors":{"author":[{"@pid":"75/1280","text":"Reid Priedhorsky"},{"@pid":"17/551","text":"Aron Culotta"},{"@pid":"35/2428","text":"Sara Y. Del Valle"}]},"title":"Inferring the Origin Locations of Tweets with Quantitative Confidence","venue":"CoRR","volume":"abs/1305.3932","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-3932","ee":"http://arxiv.org/abs/1305.3932","url":"https://dblp.org/rec/journals/corr/abs-1305-3932"}, "url":"URL#4263052" }, { "@score":"1", "@id":"4263053", "info":{"authors":{"author":[{"@pid":"146/0779","text":"David T.-H. Kao"},{"@pid":"45/284","text":"Ashutosh Sabharwal"}]},"title":"An Upper Bound on the Capacity of Vector Dirty Paper with Unknown Spin and Stretch","venue":"CoRR","volume":"abs/1305.3934","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-3934","ee":"http://arxiv.org/abs/1305.3934","url":"https://dblp.org/rec/journals/corr/abs-1305-3934"}, "url":"URL#4263053" }, { "@score":"1", "@id":"4263054", "info":{"authors":{"author":[{"@pid":"40/1187","text":"Tony Shaska"},{"@pid":"90/6314","text":"Q. Wang"}]},"title":"On the automorphism groups of some AG-codes based on Ca, b curves","venue":"CoRR","volume":"abs/1305.3937","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-3937","ee":"http://arxiv.org/abs/1305.3937","url":"https://dblp.org/rec/journals/corr/abs-1305-3937"}, "url":"URL#4263054" }, { "@score":"1", "@id":"4263055", "info":{"authors":{"author":[{"@pid":"130/3904","text":"A. Djimeli"},{"@pid":"130/3830","text":"Daniel Tchiotsop"},{"@pid":"130/3711","text":"René Tchinda"}]},"title":"Analysis Of Interest Points Of Curvelet Coefficients Contributions Of Microscopic Images And Improvement Of Edges","venue":"CoRR","volume":"abs/1305.3939","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-3939","ee":"http://arxiv.org/abs/1305.3939","url":"https://dblp.org/rec/journals/corr/abs-1305-3939"}, "url":"URL#4263055" }, { "@score":"1", "@id":"4263056", "info":{"authors":{"author":[{"@pid":"a/DavidAvis","text":"David Avis"},{"@pid":"35/5847","text":"Oliver Friedmann"}]},"title":"An exponential lower bound for Cunningham's rule","venue":"CoRR","volume":"abs/1305.3944","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-3944","ee":"http://arxiv.org/abs/1305.3944","url":"https://dblp.org/rec/journals/corr/abs-1305-3944"}, "url":"URL#4263056" }, { "@score":"1", "@id":"4263057", "info":{"authors":{"author":[{"@pid":"119/3872","text":"Gauri Joshi"},{"@pid":"80/1770","text":"Yanpei Liu"},{"@pid":"00/6219","text":"Emina Soljanin"}]},"title":"On the Delay-Storage Trade-off in Content Download from Coded Distributed Storage Systems","venue":"CoRR","volume":"abs/1305.3945","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-3945","ee":"http://arxiv.org/abs/1305.3945","url":"https://dblp.org/rec/journals/corr/abs-1305-3945"}, "url":"URL#4263057" }, { "@score":"1", "@id":"4263058", "info":{"authors":{"author":[{"@pid":"79/4495","text":"Jingon Joung"},{"@pid":"41/417","text":"Chin Keong Ho"},{"@pid":"46/3348","text":"Sumei Sun"}]},"title":"Spectral Efficiency and Energy Efficiency of OFDM Systems: Impact of Power Amplifiers and Countermeasures","venue":"CoRR","volume":"abs/1305.3959","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-3959","ee":"http://arxiv.org/abs/1305.3959","url":"https://dblp.org/rec/journals/corr/abs-1305-3959"}, "url":"URL#4263058" }, { "@score":"1", "@id":"4263059", "info":{"authors":{"author":[{"@pid":"130/3690","text":"Ibrahim Issa"},{"@pid":"43/8860","text":"Silas L. Fong"},{"@pid":"63/1946","text":"Amir Salman Avestimehr"}]},"title":"Two-Hop Interference Channels: Impact of Linear Time-Varying Schemes","venue":"CoRR","volume":"abs/1305.3969","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-3969","ee":"http://arxiv.org/abs/1305.3969","url":"https://dblp.org/rec/journals/corr/abs-1305-3969"}, "url":"URL#4263059" }, { "@score":"1", "@id":"4263060", "info":{"authors":{"author":[{"@pid":"56/1575","text":"Chengxi Ye"},{"@pid":"46/3391","text":"Dacheng Tao"},{"@pid":"71/5333","text":"Mingli Song"},{"@pid":"j/DavidWJacobs","text":"David W. Jacobs"},{"@pid":"16/0","text":"Min Wu"}]},"title":"Sparse Norm Filtering","venue":"CoRR","volume":"abs/1305.3971","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-3971","ee":"http://arxiv.org/abs/1305.3971","url":"https://dblp.org/rec/journals/corr/abs-1305-3971"}, "url":"URL#4263060" }, { "@score":"1", "@id":"4263061", "info":{"authors":{"author":[{"@pid":"128/3878","text":"Jeffrey K. Wiens"},{"@pid":"14/6563","text":"John M. Stockie"}]},"title":"An efficient parallel immersed boundary algorithm using a pseudo-compressible fluid solver","venue":"CoRR","volume":"abs/1305.3976","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-3976","ee":"http://arxiv.org/abs/1305.3976","url":"https://dblp.org/rec/journals/corr/abs-1305-3976"}, "url":"URL#4263061" }, { "@score":"1", "@id":"4263062", "info":{"authors":{"author":[{"@pid":"09/5254","text":"Puneet Kumar"},{"@pid":"130/3972","text":"Dharminder Kumar"}]},"title":"A Conceptual E-Governance Framework for Improving Child Immunization Process in India","venue":"CoRR","volume":"abs/1305.3978","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-3978","ee":"http://arxiv.org/abs/1305.3978","url":"https://dblp.org/rec/journals/corr/abs-1305-3978"}, "url":"URL#4263062" }, { "@score":"1", "@id":"4263063", "info":{"authors":{"author":[{"@pid":"94/8814","text":"Kaixu Zhang"},{"@pid":"71/4716","text":"Can Wang"},{"@pid":"95/3291","text":"Maosong Sun"}]},"title":"Binary Tree based Chinese Word Segmentation","venue":"CoRR","volume":"abs/1305.3981","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-3981","ee":"http://arxiv.org/abs/1305.3981","url":"https://dblp.org/rec/journals/corr/abs-1305-3981"}, "url":"URL#4263063" }, { "@score":"1", "@id":"4263064", "info":{"authors":{"author":[{"@pid":"14/5359-1","text":"Yang Cai 0001"},{"@pid":"d/ConstantinosDaskalakis","text":"Constantinos Daskalakis"},{"@pid":"52/2474","text":"S. Matthew Weinberg"}]},"title":"Reducing Revenue to Welfare Maximization: Approximation Algorithms and other Generalizations","venue":"CoRR","volume":"abs/1305.4000","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-4000","ee":"http://arxiv.org/abs/1305.4000","url":"https://dblp.org/rec/journals/corr/abs-1305-4000"}, "url":"URL#4263064" }, { "@score":"1", "@id":"4263065", "info":{"authors":{"author":[{"@pid":"14/5359-1","text":"Yang Cai 0001"},{"@pid":"d/ConstantinosDaskalakis","text":"Constantinos Daskalakis"},{"@pid":"52/2474","text":"S. Matthew Weinberg"}]},"title":"Understanding Incentives: Mechanism Design becomes Algorithm Design","venue":"CoRR","volume":"abs/1305.4002","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-4002","ee":"http://arxiv.org/abs/1305.4002","url":"https://dblp.org/rec/journals/corr/abs-1305-4002"}, "url":"URL#4263065" }, { "@score":"1", "@id":"4263066", "info":{"authors":{"author":[{"@pid":"99/5469","text":"Cédric Herzet"},{"@pid":"53/6760","text":"Charles Soussen"},{"@pid":"29/5552","text":"Jérôme Idier"},{"@pid":"19/1281","text":"Rémi Gribonval"}]},"title":"Exact Recovery Conditions for Sparse Representations with Partial Support Information","venue":"CoRR","volume":"abs/1305.4008","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-4008","ee":"http://arxiv.org/abs/1305.4008","url":"https://dblp.org/rec/journals/corr/abs-1305-4008"}, "url":"URL#4263066" }, { "@score":"1", "@id":"4263067", "info":{"authors":{"author":[{"@pid":"52/9509","text":"Piotr Fronczak"},{"@pid":"93/9508","text":"Agata Fronczak"},{"@pid":"130/3749","text":"Maksymilian Bujok"}]},"title":"Exponential random graph models for networks with community structure","venue":"CoRR","volume":"abs/1305.4014","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-4014","ee":"http://arxiv.org/abs/1305.4014","url":"https://dblp.org/rec/journals/corr/abs-1305-4014"}, "url":"URL#4263067" }, { "@score":"1", "@id":"4263068", "info":{"authors":{"author":[{"@pid":"130/3810","text":"Junzhou Zhao"},{"@pid":"84/7882","text":"Pinghui Wang"},{"@pid":"71/6308","text":"Jing Tao"},{"@pid":"18/10062","text":"Xiaobo Ma"},{"@pid":"45/503","text":"Xiaohong Guan"}]},"title":"A Peep on the Interplays between Online Video Websites and Online Social Networks","venue":"CoRR","volume":"abs/1305.4018","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-4018","ee":"http://arxiv.org/abs/1305.4018","url":"https://dblp.org/rec/journals/corr/abs-1305-4018"}, "url":"URL#4263068" }, { "@score":"1", "@id":"4263069", "info":{"authors":{"author":{"@pid":"00/8481","text":"Jian-Ming Zhou"}},"title":"Computability vs. Nondeterministic and P vs. NP","venue":"CoRR","volume":"abs/1305.4029","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-4029","ee":"http://arxiv.org/abs/1305.4029","url":"https://dblp.org/rec/journals/corr/abs-1305-4029"}, "url":"URL#4263069" }, { "@score":"1", "@id":"4263070", "info":{"authors":{"author":[{"@pid":"75/5912-1","text":"Matthias Wilhelm 0001"},{"@pid":"87/2623","text":"Ivan Martinovic"},{"@pid":"s/JensBSchmitt","text":"Jens B. Schmitt"},{"@pid":"75/5939","text":"Vincent Lenders"}]},"title":"Air Dominance in Sensor Networks: Guarding Sensor Motes using Selective Interference","venue":"CoRR","volume":"abs/1305.4038","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-4038","ee":"http://arxiv.org/abs/1305.4038","url":"https://dblp.org/rec/journals/corr/abs-1305-4038"}, "url":"URL#4263070" }, { "@score":"1", "@id":"4263071", "info":{"authors":{"author":[{"@pid":"79/2198","text":"Hiroki Kuzuno"},{"@pid":"130/3981","text":"Satoshi Tonami"}]},"title":"Signature Generation for Sensitive Information Leakage in Android Applications","venue":"CoRR","volume":"abs/1305.4045","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-4045","ee":"http://arxiv.org/abs/1305.4045","url":"https://dblp.org/rec/journals/corr/abs-1305-4045"}, "url":"URL#4263071" }, { "@score":"1", "@id":"4263072", "info":{"authors":{"author":[{"@pid":"130/3829","text":"Gwezheneg Robert"},{"@pid":"73/2683","text":"Pierre Loidreau"},{"@pid":"85/3827","text":"Daniel Augot"}]},"title":"Rank metric and Gabidulin codes in characteristic zero","venue":"CoRR","volume":"abs/1305.4047","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-4047","ee":"http://arxiv.org/abs/1305.4047","url":"https://dblp.org/rec/journals/corr/abs-1305-4047"}, "url":"URL#4263072" }, { "@score":"1", "@id":"4263073", "info":{"authors":{"author":[{"@pid":"90/6552","text":"Martin Horsch"},{"@pid":"62/7091","text":"Stefan Becker"},{"@pid":"130/3797","text":"Juan Manuel Castillo"},{"@pid":"48/9998","text":"Stephan Deublein"},{"@pid":"130/3842","text":"Agnes Fröscher"},{"@pid":"130/3898","text":"Steffen Reiser"},{"@pid":"130/4034","text":"Stephan Werth"},{"@pid":"91/1069","text":"Jadran Vrabec"},{"@pid":"25/9998","text":"Hans Hasse"}]},"title":"Molecular modelling and simulation of electrolyte solutions, biomolecules, and wetting of component surfaces","venue":"CoRR","volume":"abs/1305.4048","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-4048","ee":"http://arxiv.org/abs/1305.4048","url":"https://dblp.org/rec/journals/corr/abs-1305-4048"}, "url":"URL#4263073" }, { "@score":"1", "@id":"4263074", "info":{"authors":{"author":[{"@pid":"41/11470","text":"Ahmad Assaf"},{"@pid":"94/5297","text":"Aline Senart"}]},"title":"Data Quality Principles in the Semantic Web","venue":"CoRR","volume":"abs/1305.4054","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-4054","ee":"http://arxiv.org/abs/1305.4054","url":"https://dblp.org/rec/journals/corr/abs-1305-4054"}, "url":"URL#4263074" }, { "@score":"1", "@id":"4263075", "info":{"authors":{"author":{"@pid":"67/6675","text":"Ted Hurley"}},"title":"Cryptography. key exchange, public key","venue":"CoRR","volume":"abs/1305.4063","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-4063","ee":"http://arxiv.org/abs/1305.4063","url":"https://dblp.org/rec/journals/corr/abs-1305-4063"}, "url":"URL#4263075" }, { "@score":"1", "@id":"4263076", "info":{"authors":{"author":{"@pid":"130/3986","text":"Syed Muhammad Arsalan Bashir"}},"title":"Font Acknowledgment and Character Extraction of Digital and Scanned Images","venue":"CoRR","volume":"abs/1305.4064","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-4064","ee":"http://arxiv.org/abs/1305.4064","url":"https://dblp.org/rec/journals/corr/abs-1305-4064"}, "url":"URL#4263076" }, { "@score":"1", "@id":"4263077", "info":{"authors":{"author":{"@pid":"25/765","text":"Fuqiang Chen"}},"title":"Contractive Denoising Autoencoder","venue":"CoRR","volume":"abs/1305.4076","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-4076","ee":"http://arxiv.org/abs/1305.4076","url":"https://dblp.org/rec/journals/corr/abs-1305-4076"}, "url":"URL#4263077" }, { "@score":"1", "@id":"4263078", "info":{"authors":{"author":[{"@pid":"130/3691","text":"Abir Messaoudi"},{"@pid":"53/11144","text":"Riadh Bouslimi"},{"@pid":"54/4115","text":"Jalel Akaichi"}]},"title":"Indexing Medical Images based on Collaborative Experts Reports","venue":"CoRR","volume":"abs/1305.4077","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-4077","ee":"http://arxiv.org/abs/1305.4077","url":"https://dblp.org/rec/journals/corr/abs-1305-4077"}, "url":"URL#4263078" }, { "@score":"1", "@id":"4263079", "info":{"authors":{"author":[{"@pid":"130/3757","text":"Patrick Hop"},{"@pid":"50/2281","text":"Xinghao Pan"}]},"title":"Conditions for Convergence in Regularized Machine Learning Objectives","venue":"CoRR","volume":"abs/1305.4081","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-4081","ee":"http://arxiv.org/abs/1305.4081","url":"https://dblp.org/rec/journals/corr/abs-1305-4081"}, "url":"URL#4263079" }, { "@score":"1", "@id":"4263080", "info":{"authors":{"author":[{"@pid":"130/3780","text":"I. Geisel"},{"@pid":"60/8738","text":"Kai Cordes"},{"@pid":"130/3878","text":"J. Mahnke"},{"@pid":"130/4051","text":"S. Jöllenbeck"},{"@pid":"o/JornOstermann","text":"Jörn Ostermann"},{"@pid":"130/4022","text":"J. Arlt"},{"@pid":"130/4067","text":"Wolfgang Ertmer"},{"@pid":"33/9835","text":"Carsten Klempt"}]},"title":"Evolutionary optimization of an experimental apparatus","venue":"CoRR","volume":"abs/1305.4094","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-4094","ee":"http://arxiv.org/abs/1305.4094","url":"https://dblp.org/rec/journals/corr/abs-1305-4094"}, "url":"URL#4263080" }, { "@score":"1", "@id":"4263081", "info":{"authors":{"author":[{"@pid":"02/11068","text":"Fabien Sacuto"},{"@pid":"23/2633","text":"Fabrice Labeau"},{"@pid":"80/2641","text":"Basile L. Agba"}]},"title":"Wide Band Time-Correlated Model for Wireless Communications under Impulsive Noise within Power Substation","venue":"CoRR","volume":"abs/1305.4095","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-4095","ee":"http://arxiv.org/abs/1305.4095","url":"https://dblp.org/rec/journals/corr/abs-1305-4095"}, "url":"URL#4263081" }, { "@score":"1", "@id":"4263082", "info":{"authors":{"author":[{"@pid":"130/3862","text":"Nicolas Gensollen"},{"@pid":"10/5018","text":"Vincent Gauthier"},{"@pid":"27/6088","text":"Michel Marot"},{"@pid":"40/6964","text":"Monique Becker"}]},"title":"Modeling and optimizing a distributed power network : A complex system approach of the prosumer management in the smart grid","venue":"CoRR","volume":"abs/1305.4096","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-4096","ee":"http://arxiv.org/abs/1305.4096","url":"https://dblp.org/rec/journals/corr/abs-1305-4096"}, "url":"URL#4263082" }, { "@score":"1", "@id":"4263083", "info":{"authors":{"author":[{"@pid":"130/4042","text":"Andrew Rudder"},{"@pid":"33/4355","text":"Wayne Goodridge"},{"@pid":"130/4048","text":"Shareeda Mohammed"}]},"title":"Using Bias Optimization for Reversible Data Hiding Using Image Interpolation","venue":"CoRR","volume":"abs/1305.4102","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-4102","ee":"http://arxiv.org/abs/1305.4102","url":"https://dblp.org/rec/journals/corr/abs-1305-4102"}, "url":"URL#4263083" }, { "@score":"1", "@id":"4263084", "info":{"authors":{"author":[{"@pid":"18/3197","text":"Tomás Brázdil"},{"@pid":"92/5602","text":"Krishnendu Chatterjee"},{"@pid":"01/2980","text":"Vojtech Forejt"},{"@pid":"k/AntoninKucera","text":"Antonín Kucera 0001"}]},"title":"Trading Performance for Stability in Markov Decision Processes","venue":"CoRR","volume":"abs/1305.4103","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-4103","ee":"http://arxiv.org/abs/1305.4103","url":"https://dblp.org/rec/journals/corr/abs-1305-4103"}, "url":"URL#4263084" }, { "@score":"1", "@id":"4263085", "info":{"authors":{"author":[{"@pid":"a/PCAttie","text":"Paul C. Attie"},{"@pid":"29/5476","text":"Fadi A. Zaraket"},{"@pid":"88/10535","text":"Mohammad Fawaz"},{"@pid":"40/11497","text":"Mohamad Noureddine"}]},"title":"Semantic Guidance and Feedback for the Construction of Specifications and Implementations","venue":"CoRR","volume":"abs/1305.4119","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-4119","ee":"http://arxiv.org/abs/1305.4119","url":"https://dblp.org/rec/journals/corr/abs-1305-4119"}, "url":"URL#4263085" }, { "@score":"1", "@id":"4263086", "info":{"authors":{"author":[{"@pid":"03/9922","text":"Andrew Gelfand"},{"@pid":"31/7062","text":"Jinwoo Shin"},{"@pid":"00/2960","text":"Michael Chertkov"}]},"title":"Belief Propagation for Linear Programming","venue":"CoRR","volume":"abs/1305.4130","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-4130","ee":"http://arxiv.org/abs/1305.4130","url":"https://dblp.org/rec/journals/corr/abs-1305-4130"}, "url":"URL#4263086" }, { "@score":"1", "@id":"4263087", "info":{"authors":{"author":[{"@pid":"10/5427","text":"Daniel Perrucci"},{"@pid":"84/612","text":"Marie-Françoise Roy"}]},"title":"Zero-nonzero and real-nonreal sign determination","venue":"CoRR","volume":"abs/1305.4131","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-4131","ee":"http://arxiv.org/abs/1305.4131","url":"https://dblp.org/rec/journals/corr/abs-1305-4131"}, "url":"URL#4263087" }, { "@score":"1", "@id":"4263088", "info":{"authors":{"author":[{"@pid":"47/8966","text":"Mustafa Ilhan Akbas"},{"@pid":"b/MatthiasRBrust","text":"Matthias R. Brust"},{"@pid":"15/5766","text":"Damla Turgut"}]},"title":"Social Network Generation and Role Determination Based on Smartphone Data","venue":"CoRR","volume":"abs/1305.4133","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-4133","ee":"http://arxiv.org/abs/1305.4133","url":"https://dblp.org/rec/journals/corr/abs-1305-4133"}, "url":"URL#4263088" }, { "@score":"1", "@id":"4263089", "info":{"authors":{"author":[{"@pid":"130/3686","text":"LeRoy Beasely"},{"@pid":"65/3040","text":"Troy Lee"},{"@pid":"27/5687","text":"Hartmut Klauck"},{"@pid":"51/5014","text":"Dirk Oliver Theis"}]},"title":"Dagstuhl Report 13082: Communication Complexity, Linear Optimization, and lower bounds for the nonnegative rank of matrices","venue":"CoRR","volume":"abs/1305.4147","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-4147","ee":"http://arxiv.org/abs/1305.4147","url":"https://dblp.org/rec/journals/corr/abs-1305-4147"}, "url":"URL#4263089" }, { "@score":"1", "@id":"4263090", "info":{"authors":{"author":[{"@pid":"43/7480","text":"Mouhamed Abdulla"},{"@pid":"53/5944","text":"Yousef R. Shayan"}]},"title":"On the Peculiarities of Design: An Engineering Perspective","venue":"CoRR","volume":"abs/1305.4148","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-4148","ee":"http://arxiv.org/abs/1305.4148","url":"https://dblp.org/rec/journals/corr/abs-1305-4148"}, "url":"URL#4263090" }, { "@score":"1", "@id":"4263091", "info":{"authors":{"author":[{"@pid":"04/9956","text":"Dmitry Namiot"},{"@pid":"40/7274","text":"Manfred Sneps-Sneppe"}]},"title":"Local Messages for Smartphones","venue":"CoRR","volume":"abs/1305.4163","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-4163","ee":"http://arxiv.org/abs/1305.4163","url":"https://dblp.org/rec/journals/corr/abs-1305-4163"}, "url":"URL#4263091" }, { "@score":"1", "@id":"4263092", "info":{"authors":{"author":[{"@pid":"130/3873","text":"Florian Willomitzer"},{"@pid":"118/9706","text":"Svenja Ettl"},{"@pid":"130/3872","text":"Christian Faber"},{"@pid":"18/241","text":"Gerd Häusler"}]},"title":"Flying Triangulation - towards the 3D movie camera","venue":"CoRR","volume":"abs/1305.4168","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-4168","ee":"http://arxiv.org/abs/1305.4168","url":"https://dblp.org/rec/journals/corr/abs-1305-4168"}, "url":"URL#4263092" }, { "@score":"1", "@id":"4263093", "info":{"authors":{"author":[{"@pid":"87/1621","text":"Vida Dujmovic"},{"@pid":"24/1769","text":"Pat Morin"},{"@pid":"35/6715","text":"Michiel H. M. Smid"}]},"title":"Average Stretch Factor: How Low Does It Go?","venue":"CoRR","volume":"abs/1305.4170","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-4170","ee":"http://arxiv.org/abs/1305.4170","url":"https://dblp.org/rec/journals/corr/abs-1305-4170"}, "url":"URL#4263093" }, { "@score":"1", "@id":"4263094", "info":{"authors":{"author":[{"@pid":"d/SBDavidson","text":"Susan B. Davidson"},{"@pid":"130/3777","text":"Xiaocheng Huang"},{"@pid":"s/JuliaStoyanovich","text":"Julia Stoyanovich"},{"@pid":"79/2280","text":"Xiaojie Yuan"}]},"title":"Search and Result Presentation in Scientific Workflow Repositories","venue":"CoRR","volume":"abs/1305.4195","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-4195","ee":"http://arxiv.org/abs/1305.4195","url":"https://dblp.org/rec/journals/corr/abs-1305-4195"}, "url":"URL#4263094" }, { "@score":"1", "@id":"4263095", "info":{"authors":{"author":{"@pid":"63/488","text":"Ralf Meyer"}},"title":"Efficient Parallelization of Short-Range Molecular Dynamics Simulations on Many-Core Systems","venue":"CoRR","volume":"abs/1305.4196","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-4196","ee":"http://arxiv.org/abs/1305.4196","url":"https://dblp.org/rec/journals/corr/abs-1305-4196"}, "url":"URL#4263095" }, { "@score":"1", "@id":"4263096", "info":{"authors":{"author":[{"@pid":"96/1434-2","text":"Di Li 0002"},{"@pid":"12/4889","text":"Lifeng Lai"},{"@pid":"48/4914","text":"Shuguang Cui"}]},"title":"Quickest Change Point Detection and Identification Across a Generic Sensor Array","venue":"CoRR","volume":"abs/1305.4199","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-4199","ee":"http://arxiv.org/abs/1305.4199","url":"https://dblp.org/rec/journals/corr/abs-1305-4199"}, "url":"URL#4263096" }, { "@score":"1", "@id":"4263097", "info":{"authors":{"author":[{"@pid":"130/3698","text":"Uzi Chester"},{"@pid":"60/5674","text":"Joel Ratsaby"}]},"title":"Machine learning on images using a string-distance","venue":"CoRR","volume":"abs/1305.4204","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-4204","ee":"http://arxiv.org/abs/1305.4204","url":"https://dblp.org/rec/journals/corr/abs-1305-4204"}, "url":"URL#4263097" }, { "@score":"1", "@id":"4263098", "info":{"authors":{"author":[{"@pid":"03/7171","text":"Omer H. Abdelrahman"},{"@pid":"g/ErolGelenbe","text":"Erol Gelenbe"},{"@pid":"04/8345","text":"Gökçe Görbil"},{"@pid":"37/7398","text":"Boris Oklander"}]},"title":"Mobile Network Anomaly Detection and Mitigation: The NEMESYS Approach","venue":"CoRR","volume":"abs/1305.4210","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-4210","ee":"http://arxiv.org/abs/1305.4210","url":"https://dblp.org/rec/journals/corr/abs-1305-4210"}, "url":"URL#4263098" }, { "@score":"1", "@id":"4263099", "info":{"authors":{"author":[{"@pid":"21/9365","text":"Xingqin Lin"},{"@pid":"84/4900","text":"Jeffrey G. Andrews"},{"@pid":"83/5785","text":"Amitava Ghosh"}]},"title":"A Comprehensive Framework for Device-to-Device Communications in Cellular Networks","venue":"CoRR","volume":"abs/1305.4219","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-4219","ee":"http://arxiv.org/abs/1305.4219","url":"https://dblp.org/rec/journals/corr/abs-1305-4219"}, "url":"URL#4263099" }, { "@score":"1", "@id":"4263100", "info":{"authors":{"author":[{"@pid":"82/2790","text":"Wei Yu"},{"@pid":"83/736","text":"Junpeng Chen"}]},"title":"The state-of-the-art in web-scale semantic information processing for cloud computing","venue":"CoRR","volume":"abs/1305.4228","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-4228","ee":"http://arxiv.org/abs/1305.4228","url":"https://dblp.org/rec/journals/corr/abs-1305-4228"}, "url":"URL#4263100" }, { "@score":"1", "@id":"4263101", "info":{"authors":{"author":[{"@pid":"130/4029","text":"Maghsood Parviz"},{"@pid":"130/3826","text":"Seyed Hassan Mousavi"},{"@pid":"130/4081","text":"Saeed Mirahmadi"}]},"title":"Key classification attack on block ciphers","venue":"CoRR","volume":"abs/1305.4229","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-4229","ee":"http://arxiv.org/abs/1305.4229","url":"https://dblp.org/rec/journals/corr/abs-1305-4229"}, "url":"URL#4263101" }, { "@score":"1", "@id":"4263102", "info":{"authors":{"author":[{"@pid":"51/534","text":"Wing-Kai Hon"},{"@pid":"k/TonKloks","text":"Ton Kloks"},{"@pid":"218/6758","text":"Hsiang-Hsuan Liu"},{"@pid":"91/6695","text":"Sheung-Hung Poon"},{"@pid":"19/3218","text":"Yue-Li Wang"}]},"title":"Independent set in categorical products of cographs and splitgraphs","venue":"CoRR","volume":"abs/1305.4237","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-4237","ee":"http://arxiv.org/abs/1305.4237","url":"https://dblp.org/rec/journals/corr/abs-1305-4237"}, "url":"URL#4263102" }, { "@score":"1", "@id":"4263103", "info":{"authors":{"author":[{"@pid":"14/10447","text":"Hongyu Cui"},{"@pid":"56/8969","text":"Rongqing Zhang 0001"},{"@pid":"02/2683","text":"Lingyang Song"},{"@pid":"32/2258","text":"Bingli Jiao"}]},"title":"Relay Selection for Bidirectional AF Relay Network with Outdated CSI","venue":"CoRR","volume":"abs/1305.4240","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-4240","ee":"http://arxiv.org/abs/1305.4240","url":"https://dblp.org/rec/journals/corr/abs-1305-4240"}, "url":"URL#4263103" }, { "@score":"1", "@id":"4263104", "info":{"authors":{"author":[{"@pid":"18/5038","text":"Loet Leydesdorff"},{"@pid":"79/394","text":"Han Woo Park"},{"@pid":"00/2719","text":"Caroline S. Wagner"}]},"title":"International Co-authorship Relations in the Social Science Citation Index: Is Internationalization Leading the Network?","venue":"CoRR","volume":"abs/1305.4242","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-4242","ee":"http://arxiv.org/abs/1305.4242","url":"https://dblp.org/rec/journals/corr/abs-1305-4242"}, "url":"URL#4263104" }, { "@score":"1", "@id":"4263105", "info":{"authors":{"author":[{"@pid":"81/9494","text":"Zohra Sbaï"},{"@pid":"39/141","text":"Mohamed Escheikh"}]},"title":"Model Checking Techniques for Verification of an Encryption Scheme for Wireless Sensor Networks","venue":"CoRR","volume":"abs/1305.4247","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-4247","ee":"http://arxiv.org/abs/1305.4247","url":"https://dblp.org/rec/journals/corr/abs-1305-4247"}, "url":"URL#4263105" }, { "@score":"1", "@id":"4263106", "info":{"authors":{"author":[{"@pid":"72/2594","text":"Lvzhou Li"},{"@pid":"36/1225","text":"Daowen Qiu"}]},"title":"Decidability of minimization of fuzzy automata","venue":"CoRR","volume":"abs/1305.4255","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-4255","ee":"http://arxiv.org/abs/1305.4255","url":"https://dblp.org/rec/journals/corr/abs-1305-4255"}, "url":"URL#4263106" }, { "@score":"1", "@id":"4263107", "info":{"authors":{"author":[{"@pid":"84/10265","text":"Peva Blanchard"},{"@pid":"d/ShlomiDolev","text":"Shlomi Dolev"},{"@pid":"b/JBeauquier","text":"Joffroy Beauquier"},{"@pid":"37/6431","text":"Sylvie Delaët"}]},"title":"Self-Stabilizing Paxos","venue":"CoRR","volume":"abs/1305.4263","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-4263","ee":"http://arxiv.org/abs/1305.4263","url":"https://dblp.org/rec/journals/corr/abs-1305-4263"}, "url":"URL#4263107" }, { "@score":"1", "@id":"4263108", "info":{"authors":{"author":[{"@pid":"84/5016","text":"Emmanuel Abbe"},{"@pid":"83/5094","text":"Andrea Montanari"}]},"title":"Conditional Random Fields, Planted Satisfaction, and Entropy Concentration","venue":"CoRR","volume":"abs/1305.4274","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-4274","ee":"http://arxiv.org/abs/1305.4274","url":"https://dblp.org/rec/journals/corr/abs-1305-4274"}, "url":"URL#4263108" }, { "@score":"1", "@id":"4263109", "info":{"authors":{"author":{"@pid":"65/9187","text":"Gunther Reißig"}},"title":"On the maximum rank of Toeplitz block matrices of blocks of a given pattern","venue":"CoRR","volume":"abs/1305.4277","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-4277","ee":"http://arxiv.org/abs/1305.4277","url":"https://dblp.org/rec/journals/corr/abs-1305-4277"}, "url":"URL#4263109" }, { "@score":"1", "@id":"4263110", "info":{"authors":{"author":[{"@pid":"41/5979-1","text":"Yue Wu 0001"},{"@pid":"122/2963","text":"Brian Tracey"},{"@pid":"40/2362","text":"Premkumar Natarajan"},{"@pid":"88/4474","text":"Joseph P. Noonan"}]},"title":"Blockwise SURE Shrinkage for Non-Local Means","venue":"CoRR","volume":"abs/1305.4298","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-4298","ee":"http://arxiv.org/abs/1305.4298","url":"https://dblp.org/rec/journals/corr/abs-1305-4298"}, "url":"URL#4263110" }, { "@score":"1", "@id":"4263111", "info":{"authors":{"author":[{"@pid":"130/4001","text":"Pablo Piedrahíta"},{"@pid":"25/9892","text":"Javier Borge-Holthoefer"},{"@pid":"46/5859","text":"Yamir Moreno"},{"@pid":"41/11094","text":"Alex Arenas"}]},"title":"Modeling self-sustained activity cascades in socio-technical networks","venue":"CoRR","volume":"abs/1305.4299","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-4299","ee":"http://arxiv.org/abs/1305.4299","url":"https://dblp.org/rec/journals/corr/abs-1305-4299"}, "url":"URL#4263111" }, { "@score":"1", "@id":"4263112", "info":{"authors":{"author":{"@pid":"120/7698","text":"Nikolai Krivulin"}},"title":"Solution of linear equations and inequalities in idempotent vector spaces","venue":"CoRR","volume":"abs/1305.4300","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-4300","ee":"http://arxiv.org/abs/1305.4300","url":"https://dblp.org/rec/journals/corr/abs-1305-4300"}, "url":"URL#4263112" }, { "@score":"1", "@id":"4263113", "info":{"authors":{"author":[{"@pid":"69/1732","text":"Alina Ene"},{"@pid":"47/4475","text":"Nitish Korula"},{"@pid":"116/4679","text":"Ali Vakilian"}]},"title":"Improved Approximation Algorithms for Connected Domatic Partitions and Related Problems","venue":"CoRR","volume":"abs/1305.4308","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-4308","ee":"http://arxiv.org/abs/1305.4308","url":"https://dblp.org/rec/journals/corr/abs-1305-4308"}, "url":"URL#4263113" }, { "@score":"1", "@id":"4263114", "info":{"authors":{"author":[{"@pid":"17/11473","text":"Kuwar Pratap Singh"},{"@pid":"43/9022","text":"P. K. Gupta"},{"@pid":"11/6766","text":"G. Singh"}]},"title":"Performance Evaluation of Enhanced Interior Gateway Routing Protocol in IPv6 Network","venue":"CoRR","volume":"abs/1305.4311","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-4311","ee":"http://arxiv.org/abs/1305.4311","url":"https://dblp.org/rec/journals/corr/abs-1305-4311"}, "url":"URL#4263114" }, { "@score":"1", "@id":"4263115", "info":{"authors":{"author":[{"@pid":"130/3790","text":"Sanket Satpathy"},{"@pid":"117/8945","text":"Paul Cuff"}]},"title":"Secure Cascade Channel Synthesis","venue":"CoRR","volume":"abs/1305.4314","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-4314","ee":"http://arxiv.org/abs/1305.4314","url":"https://dblp.org/rec/journals/corr/abs-1305-4314"}, "url":"URL#4263115" }, { "@score":"1", "@id":"4263116", "info":{"authors":{"author":[{"@pid":"75/10838","text":"Hiromu Mori"},{"@pid":"99/4849","text":"Yoshihiro Matsumoto"},{"@pid":"75/1686","text":"Victor V. Kryssanov"},{"@pid":"61/2630","text":"Eric W. Cooper"},{"@pid":"53/6456","text":"Hitoshi Ogawa"},{"@pid":"31/6801","text":"Shoji Makino"},{"@pid":"38/3467","text":"Zbigniew R. Struzik"},{"@pid":"05/1197","text":"Tomasz M. Rutkowski"}]},"title":"Multi-command Tactile Brain Computer Interface: A Feasibility Study","venue":"CoRR","volume":"abs/1305.4319","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-4319","ee":"http://arxiv.org/abs/1305.4319","url":"https://dblp.org/rec/journals/corr/abs-1305-4319"}, "url":"URL#4263116" }, { "@score":"1", "@id":"4263117", "info":{"authors":{"author":[{"@pid":"68/4020","text":"Peter L. Bartlett"},{"@pid":"g/PGrunwald","text":"Peter Grunwald"},{"@pid":"09/2622","text":"Peter Harremoës"},{"@pid":"52/11348","text":"Fares Hedayati"},{"@pid":"63/4977","text":"Wojciech Kotlowski"}]},"title":"Horizon-Independent Optimal Prediction with Log-Loss in Exponential Families","venue":"CoRR","volume":"abs/1305.4324","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-4324","ee":"http://arxiv.org/abs/1305.4324","url":"https://dblp.org/rec/journals/corr/abs-1305-4324"}, "url":"URL#4263117" }, { "@score":"1", "@id":"4263118", "info":{"authors":{"author":[{"@pid":"79/6928","text":"James P. Gleeson"},{"@pid":"150/8790","text":"Jonathan A. Ward"},{"@pid":"130/3901","text":"Kevin P. O'Sullivan"},{"@pid":"130/3726","text":"William T. Lee"}]},"title":"Competition-induced criticality in a model of meme popularity","venue":"CoRR","volume":"abs/1305.4328","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-4328","ee":"http://arxiv.org/abs/1305.4328","url":"https://dblp.org/rec/journals/corr/abs-1305-4328"}, "url":"URL#4263118" }, { "@score":"1", "@id":"4263119", "info":{"authors":{"author":[{"@pid":"e/AEnge","text":"Andreas Enge"},{"@pid":"44/5777","text":"Emmanuel Thomé"}]},"title":"Computing class polynomials for abelian surfaces","venue":"CoRR","volume":"abs/1305.4330","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-4330","ee":"http://arxiv.org/abs/1305.4330","url":"https://dblp.org/rec/journals/corr/abs-1305-4330"}, "url":"URL#4263119" }, { "@score":"1", "@id":"4263120", "info":{"authors":{"author":[{"@pid":"91/5037","text":"Michiaki Hamada"},{"@pid":"82/1336","text":"Hisanori Kiryu"},{"@pid":"10/5565-1","text":"Wataru Iwasaki 0001"},{"@pid":"70/3045","text":"Kiyoshi Asai"}]},"title":"Generalized Centroid Estimators in Bioinformatics","venue":"CoRR","volume":"abs/1305.4339","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-4339","ee":"http://arxiv.org/abs/1305.4339","url":"https://dblp.org/rec/journals/corr/abs-1305-4339"}, "url":"URL#4263120" }, { "@score":"1", "@id":"4263121", "info":{"authors":{"author":[{"@pid":"35/1270","text":"Alon Schclar"},{"@pid":"r/LiorRokach","text":"Lior Rokach"},{"@pid":"122/2740","text":"Amir Amit"}]},"title":"Ensembles of Classifiers based on Dimensionality Reduction","venue":"CoRR","volume":"abs/1305.4345","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-4345","ee":"http://arxiv.org/abs/1305.4345","url":"https://dblp.org/rec/journals/corr/abs-1305-4345"}, "url":"URL#4263121" }, { "@score":"1", "@id":"4263122", "info":{"authors":{"author":[{"@pid":"04/9956","text":"Dmitry Namiot"},{"@pid":"40/7274","text":"Manfred Sneps-Sneppe"}]},"title":"Mobile Services and Network Proximity","venue":"CoRR","volume":"abs/1305.4348","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-4348","ee":"http://arxiv.org/abs/1305.4348","url":"https://dblp.org/rec/journals/corr/abs-1305-4348"}, "url":"URL#4263122" }, { "@score":"1", "@id":"4263123", "info":{"authors":{"author":[{"@pid":"123/4969","text":"Michael James Scott"},{"@pid":"g/GeorgeGhinea","text":"Gheorghita Ghinea"}]},"title":"Promoting Game Accessibility: Experiencing an Induction on Inclusive Design Practice at the Global Games Jam","venue":"CoRR","volume":"abs/1305.4359","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-4359","ee":"http://arxiv.org/abs/1305.4359","url":"https://dblp.org/rec/journals/corr/abs-1305-4359"}, "url":"URL#4263123" }, { "@score":"1", "@id":"4263124", "info":{"authors":{"author":[{"@pid":"10/11140","text":"Anjan K. Koundinya"},{"@pid":"120/0411","text":"G. Harish"},{"@pid":"121/2273","text":"N. K. Srinath"},{"@pid":"121/2447","text":"G. E. Raghavendra Kumar"},{"@pid":"121/2215","text":"Y. V. Pramod"},{"@pid":"86/605","text":"R. Sandeep"},{"@pid":"121/2320","text":"G. Punith Kumar"}]},"title":"Performance Analysis of Parallel Pollard's Rho Algorithm","venue":"CoRR","volume":"abs/1305.4365","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-4365","ee":"http://arxiv.org/abs/1305.4365","url":"https://dblp.org/rec/journals/corr/abs-1305-4365"}, "url":"URL#4263124" }, { "@score":"1", "@id":"4263125", "info":{"authors":{"author":{"@pid":"85/1362","text":"Raphael Jolly"}},"title":"Parallelizing Stream with Future","venue":"CoRR","volume":"abs/1305.4367","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-4367","ee":"http://arxiv.org/abs/1305.4367","url":"https://dblp.org/rec/journals/corr/abs-1305-4367"}, "url":"URL#4263125" }, { "@score":"1", "@id":"4263126", "info":{"authors":{"author":[{"@pid":"02/1454","text":"Junjie Qin"},{"@pid":"63/8760","text":"Baosen Zhang"},{"@pid":"69/3555","text":"Ram Rajagopal"}]},"title":"Risk Limiting Dispatch with Ramping Constraints","venue":"CoRR","volume":"abs/1305.4372","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-4372","ee":"http://arxiv.org/abs/1305.4372","url":"https://dblp.org/rec/journals/corr/abs-1305-4372"}, "url":"URL#4263126" }, { "@score":"1", "@id":"4263127", "info":{"authors":{"author":{"@pid":"130/3843","text":"Sasa Paporovic"}},"title":"Realized collaboration across borders - Linux and the bioinformatic part","venue":"CoRR","volume":"abs/1305.4375","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-4375","ee":"http://arxiv.org/abs/1305.4375","url":"https://dblp.org/rec/journals/corr/abs-1305-4375"}, "url":"URL#4263127" }, { "@score":"1", "@id":"4263128", "info":{"authors":{"author":{"@pid":"10/9610","text":"Lukasz Swierczewski"}},"title":"3DES ECB Optimized for Massively Parallel CUDA GPU Architecture","venue":"CoRR","volume":"abs/1305.4376","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-4376","ee":"http://arxiv.org/abs/1305.4376","url":"https://dblp.org/rec/journals/corr/abs-1305-4376"}, "url":"URL#4263128" }, { "@score":"1", "@id":"4263129", "info":{"authors":{"author":[{"@pid":"130/4021","text":"Klajdi Karanxha"},{"@pid":"130/3760","text":"Kapies Vallipuram"},{"@pid":"130/3796","text":"Herman Sonfack"},{"@pid":"130/3908","text":"Gustavo Barbieri Pereira"}]},"title":"Software Requirements Specification - Softbody Simulation System","venue":"CoRR","volume":"abs/1305.4378","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-4378","ee":"http://arxiv.org/abs/1305.4378","url":"https://dblp.org/rec/journals/corr/abs-1305-4378"}, "url":"URL#4263129" }, { "@score":"1", "@id":"4263130", "info":{"authors":{"author":{"@pid":"17/11142","text":"Igor S. Sergeev"}},"title":"Implementation of linear maps with circulant matrices via modulo 2 rectifier circuits of bounded depth","venue":"CoRR","volume":"abs/1305.4389","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-4389","ee":"http://arxiv.org/abs/1305.4389","url":"https://dblp.org/rec/journals/corr/abs-1305-4389"}, "url":"URL#4263130" }, { "@score":"1", "@id":"4263131", "info":{"authors":{"author":[{"@pid":"78/814","text":"Arkadius G. Kalka"},{"@pid":"17/6917","text":"Mina Teicher"}]},"title":"Non-associative key establishment for leftdistributive systems","venue":"CoRR","volume":"abs/1305.4401","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-4401","ee":"http://arxiv.org/abs/1305.4401","url":"https://dblp.org/rec/journals/corr/abs-1305-4401"}, "url":"URL#4263131" }, { "@score":"1", "@id":"4263132", "info":{"authors":{"author":[{"@pid":"15/8262","text":"Mayur Agrawal"},{"@pid":"34/4085","text":"David J. Love"},{"@pid":"51/2502","text":"Venkataramanan Balakrishnan"}]},"title":"Communicating over Filter-and-Forward Relay Networks with Channel Output Feedback","venue":"CoRR","volume":"abs/1305.4403","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-4403","ee":"http://arxiv.org/abs/1305.4403","url":"https://dblp.org/rec/journals/corr/abs-1305-4403"}, "url":"URL#4263132" }, { "@score":"1", "@id":"4263133", "info":{"authors":{"author":{"@pid":"48/1273","text":"Amitav Mukherjee"}},"title":"Imbalanced Beamforming by a Multi-antenna Source for Secure Utilization of an Untrusted Relay","venue":"CoRR","volume":"abs/1305.4419","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-4419","ee":"http://arxiv.org/abs/1305.4419","url":"https://dblp.org/rec/journals/corr/abs-1305-4419"}, "url":"URL#4263133" }, { "@score":"1", "@id":"4263134", "info":{"authors":{"author":[{"@pid":"12/4988","text":"Youfang Lin"},{"@pid":"130/3684","text":"Xuguang Jia"},{"@pid":"92/3220","text":"Mingjie Lin"},{"@pid":"98/152","text":"Steve Gregory"},{"@pid":"07/9988","text":"Huaiyu Wan"},{"@pid":"27/8792-1","text":"Zhihao Wu 0001"}]},"title":"Inferring High Quality Co-Travel Networks","venue":"CoRR","volume":"abs/1305.4429","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-4429","ee":"http://arxiv.org/abs/1305.4429","url":"https://dblp.org/rec/journals/corr/abs-1305-4429"}, "url":"URL#4263134" }, { "@score":"1", "@id":"4263135", "info":{"authors":{"author":[{"@pid":"06/8315","text":"Xiangnan Kong"},{"@pid":"130/3949","text":"Bokai Cao"},{"@pid":"y/PhilipSYu","text":"Philip S. Yu"},{"@pid":"38/6013-1","text":"Ying Ding 0001"},{"@pid":"62/4871","text":"David J. Wild 0001"}]},"title":"Meta Path-Based Collective Classification in Heterogeneous Information Networks","venue":"CoRR","volume":"abs/1305.4433","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-4433","ee":"http://arxiv.org/abs/1305.4433","url":"https://dblp.org/rec/journals/corr/abs-1305-4433"}, "url":"URL#4263135" }, { "@score":"1", "@id":"4263136", "info":{"authors":{"author":{"@pid":"99/10702","text":"Akira Saitoh"}},"title":"Realistic cost for the model of coherent computing","venue":"CoRR","volume":"abs/1305.4440","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-4440","ee":"http://arxiv.org/abs/1305.4440","url":"https://dblp.org/rec/journals/corr/abs-1305-4440"}, "url":"URL#4263136" }, { "@score":"1", "@id":"4263137", "info":{"authors":{"author":[{"@pid":"35/10709","text":"Rushan Ziatdinov"},{"@pid":"130/3687","text":"Sajid Musa"}]},"title":"Rapid mental computation system as a tool for algorithmic thinking of elementary school students development","venue":"CoRR","volume":"abs/1305.4443","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-4443","ee":"http://arxiv.org/abs/1305.4443","url":"https://dblp.org/rec/journals/corr/abs-1305-4443"}, "url":"URL#4263137" }, { "@score":"1", "@id":"4263138", "info":{"authors":{"author":[{"@pid":"29/4190-31","text":"Jun Zhang 0031"},{"@pid":"57/10368","text":"Xinran Li"},{"@pid":"32/4321-1","text":"Fang-Wei Fu 0001"}]},"title":"Multi-receiver Authentication Scheme for Multiple Messages Based on Linear Codes","venue":"CoRR","volume":"abs/1305.4444","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-4444","ee":"http://arxiv.org/abs/1305.4444","url":"https://dblp.org/rec/journals/corr/abs-1305-4444"}, "url":"URL#4263138" }, { "@score":"1", "@id":"4263139", "info":{"authors":{"author":[{"@pid":"31/7859","text":"Jérémie Bigot"},{"@pid":"117/0374","text":"Claire Boyer"},{"@pid":"43/173","text":"Pierre Weiss"}]},"title":"An analysis of block sampling strategies in compressed sensing","venue":"CoRR","volume":"abs/1305.4446","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-4446","ee":"http://arxiv.org/abs/1305.4446","url":"https://dblp.org/rec/journals/corr/abs-1305-4446"}, "url":"URL#4263139" }, { "@score":"1", "@id":"4263140", "info":{"authors":{"author":[{"@pid":"d/GerardDuchamp","text":"Gérard Henry Edmond Duchamp"},{"@pid":"130/4049","text":"Ladji Kane"},{"@pid":"12/9061","text":"Vincel Hoang Ngoc Minh"},{"@pid":"73/2354","text":"Christophe Tollu"}]},"title":"Dual bases for non commutative symmetric and quasi-symmetric functions via monoidal factorization","venue":"CoRR","volume":"abs/1305.4447","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-4447","ee":"http://arxiv.org/abs/1305.4447","url":"https://dblp.org/rec/journals/corr/abs-1305-4447"}, "url":"URL#4263140" }, { "@score":"1", "@id":"4263141", "info":{"authors":{"author":[{"@pid":"130/3784","text":"Chen Bui"},{"@pid":"d/GerardDuchamp","text":"Gérard Henry Edmond Duchamp"},{"@pid":"12/9061","text":"Vincel Hoang Ngoc Minh"}]},"title":"Schützenberger's factorization on the (completed) Hopf algebra of $q-$stuffle product","venue":"CoRR","volume":"abs/1305.4450","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-4450","ee":"http://arxiv.org/abs/1305.4450","url":"https://dblp.org/rec/journals/corr/abs-1305-4450"}, "url":"URL#4263141" }, { "@score":"1", "@id":"4263142", "info":{"authors":{"author":[{"@pid":"57/9637","text":"Nathan O. Collier"},{"@pid":"06/4626","text":"Lisandro Dalcín"},{"@pid":"14/8769","text":"Victor M. Calo"}]},"title":"PetIGA: High-Performance Isogeometric Analysis","venue":"CoRR","volume":"abs/1305.4452","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-4452","ee":"http://arxiv.org/abs/1305.4452","url":"https://dblp.org/rec/journals/corr/abs-1305-4452"}, "url":"URL#4263142" }, { "@score":"1", "@id":"4263143", "info":{"authors":{"author":[{"@pid":"126/5066","text":"Shantanav Chakraborty"},{"@pid":"97/10088","text":"Subhashish Banerjee"},{"@pid":"48/10096","text":"Satyabrata Adhikari"},{"@pid":"67/103-1","text":"Atul Kumar 0001"}]},"title":"Entanglement in the Grover's Search Algorithm","venue":"CoRR","volume":"abs/1305.4454","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-4454","ee":"http://arxiv.org/abs/1305.4454","url":"https://dblp.org/rec/journals/corr/abs-1305-4454"}, "url":"URL#4263143" }, { "@score":"1", "@id":"4263144", "info":{"authors":{"author":[{"@pid":"34/8039","text":"Benjamin P. Vandervalk"},{"@pid":"41/7064","text":"E. Luke McCarthy"},{"@pid":"62/1322","text":"Mark D. Wilkinson"}]},"title":"SHARE: A Web Service Based Framework for Distributed Querying and Reasoning on the Semantic Web","venue":"CoRR","volume":"abs/1305.4455","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-4455","ee":"http://arxiv.org/abs/1305.4455","url":"https://dblp.org/rec/journals/corr/abs-1305-4455"}, "url":"URL#4263144" }, { "@score":"1", "@id":"4263145", "info":{"authors":{"author":[{"@pid":"130/3903","text":"Abidin Kaya"},{"@pid":"94/5991","text":"Bahattin Yildiz"},{"@pid":"68/1511","text":"Irfan Siap"}]},"title":"Quadratic Residue Codes over F_p+vF_p and their Gray Images","venue":"CoRR","volume":"abs/1305.4508","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-4508","ee":"http://arxiv.org/abs/1305.4508","url":"https://dblp.org/rec/journals/corr/abs-1305-4508"}, "url":"URL#4263145" }, { "@score":"1", "@id":"4263146", "info":{"authors":{"author":[{"@pid":"63/2965","text":"Radoslav Fulek"},{"@pid":"k/JanKyncl","text":"Jan Kyncl"},{"@pid":"130/3913","text":"Igor Malinovic"},{"@pid":"56/6527","text":"Dömötör Pálvölgyi"}]},"title":"Efficient c-planarity testing algebraically","venue":"CoRR","volume":"abs/1305.4519","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-4519","ee":"http://arxiv.org/abs/1305.4519","url":"https://dblp.org/rec/journals/corr/abs-1305-4519"}, "url":"URL#4263146" }, { "@score":"1", "@id":"4263147", "info":{"authors":{"author":{"@pid":"22/7414","text":"Miron B. Kursa"}},"title":"Robustness of the Random Forest-based gene selection methods","venue":"CoRR","volume":"abs/1305.4525","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-4525","ee":"http://arxiv.org/abs/1305.4525","url":"https://dblp.org/rec/journals/corr/abs-1305-4525"}, "url":"URL#4263147" }, { "@score":"1", "@id":"4263148", "info":{"authors":{"author":[{"@pid":"130/3999","text":"Nenad Markus"},{"@pid":"130/3859","text":"Miroslav Frljak"},{"@pid":"16/5947","text":"Igor S. Pandzic"},{"@pid":"a/JorgenAhlberg","text":"Jörgen Ahlberg"},{"@pid":"26/3602","text":"Robert Forchheimer"}]},"title":"A method for object detection based on pixel intensity comparisons","venue":"CoRR","volume":"abs/1305.4537","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-4537","ee":"http://arxiv.org/abs/1305.4537","url":"https://dblp.org/rec/journals/corr/abs-1305-4537"}, "url":"URL#4263148" }, { "@score":"1", "@id":"4263149", "info":{"authors":{"author":[{"@pid":"57/11470","text":"Víctor Valls"},{"@pid":"l/DouglasJLeith","text":"Douglas J. Leith"}]},"title":"Proportional Fair MU-MIMO in 802.11 WLANs","venue":"CoRR","volume":"abs/1305.4538","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-4538","ee":"http://arxiv.org/abs/1305.4538","url":"https://dblp.org/rec/journals/corr/abs-1305-4538"}, "url":"URL#4263149" }, { "@score":"1", "@id":"4263150", "info":{"authors":{"author":[{"@pid":"130/4063","text":"Govind Salvi"},{"@pid":"13/5262","text":"Puneet Sharma"},{"@pid":"70/4688","text":"Shanmuganathan Raman"}]},"title":"Efficient Image Retargeting for High Dynamic Range Scenes","venue":"CoRR","volume":"abs/1305.4544","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-4544","ee":"http://arxiv.org/abs/1305.4544","url":"https://dblp.org/rec/journals/corr/abs-1305-4544"}, "url":"URL#4263150" }, { "@score":"1", "@id":"4263151", "info":{"authors":{"author":[{"@pid":"32/4477","text":"Anand D. Sarwate"},{"@pid":"74/2569","text":"Tara Javidi"}]},"title":"Distributed Learning of Distributions via Social Sampling","venue":"CoRR","volume":"abs/1305.4548","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-4548","ee":"http://arxiv.org/abs/1305.4548","url":"https://dblp.org/rec/journals/corr/abs-1305-4548"}, "url":"URL#4263151" }, { "@score":"1", "@id":"4263152", "info":{"authors":{"author":[{"@pid":"27/10411","text":"Baran Tan Bacinoglu"},{"@pid":"31/269","text":"Elif Uysal-Biyikoglu"}]},"title":"Finite-horizon Online Transmission Rate and Power Adaptation on a Communication Link with Markovian Energy Harvesting","venue":"CoRR","volume":"abs/1305.4558","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-4558","ee":"http://arxiv.org/abs/1305.4558","url":"https://dblp.org/rec/journals/corr/abs-1305-4558"}, "url":"URL#4263152" }, { "@score":"1", "@id":"4263153", "info":{"authors":{"author":[{"@pid":"56/10964","text":"Adam R. Williamson"},{"@pid":"67/5839","text":"Tsung-Yi Chen"},{"@pid":"51/5171","text":"Richard D. Wesel"}]},"title":"Reliability-based Error Detection for Feedback Communication with Low Latency","venue":"CoRR","volume":"abs/1305.4560","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-4560","ee":"http://arxiv.org/abs/1305.4560","url":"https://dblp.org/rec/journals/corr/abs-1305-4560"}, "url":"URL#4263153" }, { "@score":"1", "@id":"4263154", "info":{"authors":{"author":{"@pid":"39/4271","text":"Ramon Ferrer-i-Cancho"}},"title":"Random crossings in dependency trees","venue":"CoRR","volume":"abs/1305.4561","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-4561","ee":"http://arxiv.org/abs/1305.4561","url":"https://dblp.org/rec/journals/corr/abs-1305-4561"}, "url":"URL#4263154" }, { "@score":"1", "@id":"4263155", "info":{"authors":{"author":{"@pid":"129/1706","text":"Jean Souviron"}},"title":"Correcting self-intersecting polygons using minimal memory A simple and efficient algorithm and thoughts on line-segment intersection algorithms.","venue":"CoRR","volume":"abs/1305.4573","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-4573","ee":"http://arxiv.org/abs/1305.4573","url":"https://dblp.org/rec/journals/corr/abs-1305-4573"}, "url":"URL#4263155" }, { "@score":"1", "@id":"4263156", "info":{"authors":{"author":[{"@pid":"130/3801","text":"Krishna Gopal Benerjee"},{"@pid":"70/6471-4","text":"Manish K. Gupta 0004"},{"@pid":"130/3870","text":"Nikhil Agrawal"}]},"title":"Reconstruction and Repair Degree of Fractional Repetition Codes","venue":"CoRR","volume":"abs/1305.4580","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-4580","ee":"http://arxiv.org/abs/1305.4580","url":"https://dblp.org/rec/journals/corr/abs-1305-4580"}, "url":"URL#4263156" }, { "@score":"1", "@id":"4263157", "info":{"authors":{"author":[{"@pid":"25/1492","text":"Subhash Khot"},{"@pid":"02/2229","text":"Nisheeth K. Vishnoi"}]},"title":"The Unique Games Conjecture, Integrality Gap for Cut Problems and Embeddability of Negative Type Metrics into ℓ1","venue":"CoRR","volume":"abs/1305.4581","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-4581","ee":"http://arxiv.org/abs/1305.4581","url":"https://dblp.org/rec/journals/corr/abs-1305-4581"}, "url":"URL#4263157" }, { "@score":"1", "@id":"4263158", "info":{"authors":{"author":{"@pid":"63/2073","text":"Ludovic Courtès"}},"title":"Functional Package Management with Guix","venue":"CoRR","volume":"abs/1305.4584","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-4584","ee":"http://arxiv.org/abs/1305.4584","url":"https://dblp.org/rec/journals/corr/abs-1305-4584"}, "url":"URL#4263158" }, { "@score":"1", "@id":"4263159", "info":{"authors":{"author":[{"@pid":"16/8909","text":"Chunhua Geng"},{"@pid":"126/5064","text":"Navid Naderializadeh"},{"@pid":"63/1946","text":"Amir Salman Avestimehr"},{"@pid":"42/2660","text":"Syed Ali Jafar"}]},"title":"On the Optimality of Treating Interference as Noise","venue":"CoRR","volume":"abs/1305.4610","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-4610","ee":"http://arxiv.org/abs/1305.4610","url":"https://dblp.org/rec/journals/corr/abs-1305-4610"}, "url":"URL#4263159" }, { "@score":"1", "@id":"4263160", "info":{"authors":{"author":[{"@pid":"65/10954","text":"Jack Poulson"},{"@pid":"20/2041","text":"Laurent Demanet"},{"@pid":"49/11115","text":"Nicholas Maxwell"},{"@pid":"68/3945","text":"Lexing Ying"}]},"title":"A parallel butterfly algorithm","venue":"CoRR","volume":"abs/1305.4650","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-4650","ee":"http://arxiv.org/abs/1305.4650","url":"https://dblp.org/rec/journals/corr/abs-1305-4650"}, "url":"URL#4263160" }, { "@score":"1", "@id":"4263161", "info":{"authors":{"author":[{"@pid":"67/1658","text":"Emil Björnson"},{"@pid":"19/4592","text":"Jakob Hoydis"},{"@pid":"90/3967","text":"Marios Kountouris"},{"@pid":"75/4085","text":"Mérouane Debbah"}]},"title":"Hardware Impairments in Large-scale MISO Systems: Energy Efficiency, Estimation, and Capacity Limits","venue":"CoRR","volume":"abs/1305.4651","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-4651","ee":"http://arxiv.org/abs/1305.4651","url":"https://dblp.org/rec/journals/corr/abs-1305-4651"}, "url":"URL#4263161" }, { "@score":"1", "@id":"4263162", "info":{"authors":{"author":{"@pid":"68/3831","text":"Amitabh Trehan"}},"title":"Algorithms for Self-Healing Networks","venue":"CoRR","volume":"abs/1305.4675","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-4675","ee":"http://arxiv.org/abs/1305.4675","url":"https://dblp.org/rec/journals/corr/abs-1305-4675"}, "url":"URL#4263162" }, { "@score":"1", "@id":"4263163", "info":{"authors":{"author":[{"@pid":"92/6566","text":"Evguenii V. Kurmyshev"},{"@pid":"96/9365","text":"Héctor A. Juárez"}]},"title":"What is a leader of opinion formation in bounded confidence models?","venue":"CoRR","volume":"abs/1305.4677","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-4677","ee":"http://arxiv.org/abs/1305.4677","url":"https://dblp.org/rec/journals/corr/abs-1305-4677"}, "url":"URL#4263163" }, { "@score":"1", "@id":"4263164", "info":{"authors":{"author":{"@pid":"15/5937","text":"David G. Messerschmitt"}},"title":"End-to-end interstellar communication system design for power efficiency","venue":"CoRR","volume":"abs/1305.4684","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-4684","ee":"http://arxiv.org/abs/1305.4684","url":"https://dblp.org/rec/journals/corr/abs-1305-4684"}, "url":"URL#4263164" }, { "@score":"1", "@id":"4263165", "info":{"authors":{"author":{"@pid":"91/1383","text":"Carlos Sarraute"}},"title":"Aplicacion de las Redes Neuronales al Reconocimiento de Sistemas Operativos","venue":"CoRR","volume":"abs/1305.4686","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-4686","ee":"http://arxiv.org/abs/1305.4686","url":"https://dblp.org/rec/journals/corr/abs-1305-4686"}, "url":"URL#4263165" }, { "@score":"1", "@id":"4263166", "info":{"authors":{"author":[{"@pid":"16/6136","text":"Mark Braverman"},{"@pid":"f/FEFich","text":"Faith Ellen"},{"@pid":"02/2005","text":"Rotem Oshman"},{"@pid":"p/TPitassi","text":"Toniann Pitassi"},{"@pid":"v/VinodVaikuntanathan","text":"Vinod Vaikuntanathan"}]},"title":"Tight Bounds for Set Disjointness in the Message Passing Model","venue":"CoRR","volume":"abs/1305.4696","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-4696","ee":"http://arxiv.org/abs/1305.4696","url":"https://dblp.org/rec/journals/corr/abs-1305-4696"}, "url":"URL#4263166" }, { "@score":"1", "@id":"4263167", "info":{"authors":{"author":[{"@pid":"10/8969","text":"Srinivas Yerramalli"},{"@pid":"42/4430-2","text":"Rahul Jain 0002"},{"@pid":"m/UrbashiMitra","text":"Urbashi Mitra"}]},"title":"Broadcast Channel Games: Equilibrium Characterization and a MIMO MAC-BC Game Duality","venue":"CoRR","volume":"abs/1305.4703","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-4703","ee":"http://arxiv.org/abs/1305.4703","url":"https://dblp.org/rec/journals/corr/abs-1305-4703"}, "url":"URL#4263167" }, { "@score":"1", "@id":"4263168", "info":{"authors":{"author":[{"@pid":"16/4505","text":"Yu Yang"},{"@pid":"59/859","text":"Deqiang Wang"},{"@pid":"33/3535-3","text":"Hua Wang 0003"},{"@pid":"78/6365-1","text":"Hongbo Liu 0001"}]},"title":"On BC-trees and BC-subtrees","venue":"CoRR","volume":"abs/1305.4711","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-4711","ee":"http://arxiv.org/abs/1305.4711","url":"https://dblp.org/rec/journals/corr/abs-1305-4711"}, "url":"URL#4263168" }, { "@score":"1", "@id":"4263169", "info":{"authors":{"author":[{"@pid":"42/6774","text":"Zhaosong Lu"},{"@pid":"98/4025","text":"Lin Xiao"}]},"title":"On the Complexity Analysis of Randomized Block-Coordinate Descent Methods","venue":"CoRR","volume":"abs/1305.4723","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-4723","ee":"http://arxiv.org/abs/1305.4723","url":"https://dblp.org/rec/journals/corr/abs-1305-4723"}, "url":"URL#4263169" }, { "@score":"1", "@id":"4263170", "info":{"authors":{"author":[{"@pid":"56/482","text":"Vladimir Ejov"},{"@pid":"66/7876","text":"Michael Haythorpe"},{"@pid":"130/3787","text":"Serguei Rossomakhine"}]},"title":"A Linear-size Conversion of HCP to 3HCP","venue":"CoRR","volume":"abs/1305.4729","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-4729","ee":"http://arxiv.org/abs/1305.4729","url":"https://dblp.org/rec/journals/corr/abs-1305-4729"}, "url":"URL#4263170" }, { "@score":"1", "@id":"4263171", "info":{"authors":{"author":[{"@pid":"62/343","text":"Danilo De Donno"},{"@pid":"95/1288","text":"Luca Catarinucci"},{"@pid":"70/4510","text":"Luciano Tarricone"}]},"title":"An UHF RFID Energy-Harvesting System Enhanced by a DC-DC Charge Pump in Silicon-on-Insulator Technology","venue":"CoRR","volume":"abs/1305.4731","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-4731","ee":"http://arxiv.org/abs/1305.4731","url":"https://dblp.org/rec/journals/corr/abs-1305-4731"}, "url":"URL#4263171" }, { "@score":"1", "@id":"4263172", "info":{"authors":{"author":[{"@pid":"62/343","text":"Danilo De Donno"},{"@pid":"95/1288","text":"Luca Catarinucci"},{"@pid":"70/4510","text":"Luciano Tarricone"}]},"title":"Enabling Self-Powered Autonomous Wireless Sensors with New-Generation I2C-RFID Chips","venue":"CoRR","volume":"abs/1305.4732","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-4732","ee":"http://arxiv.org/abs/1305.4732","url":"https://dblp.org/rec/journals/corr/abs-1305-4732"}, "url":"URL#4263172" }, { "@score":"1", "@id":"4263173", "info":{"authors":{"author":[{"@pid":"130/4016","text":"Manju Prasad"},{"@pid":"80/7688","text":"Andhe Dharani"}]},"title":"A qoi based energy efficient clustering for dense wireless sensor network","venue":"CoRR","volume":"abs/1305.4738","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-4738","ee":"http://arxiv.org/abs/1305.4738","url":"https://dblp.org/rec/journals/corr/abs-1305-4738"}, "url":"URL#4263173" }, { "@score":"1", "@id":"4263174", "info":{"authors":{"author":{"@pid":"08/8883","text":"Pietro Galliani"}},"title":"The Doxastic Interpretation of Team Semantics","venue":"CoRR","volume":"abs/1305.4744","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-4744","ee":"http://arxiv.org/abs/1305.4744","url":"https://dblp.org/rec/journals/corr/abs-1305-4744"}, "url":"URL#4263174" }, { "@score":"1", "@id":"4263175", "info":{"authors":{"author":{"@pid":"86/6327","text":"Nir Ailon"}},"title":"A Lower Bound for Fourier Transform Computation in a Linear Model Over 2x2 Unitary Gates Using Matrix Entropy","venue":"CoRR","volume":"abs/1305.4745","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-4745","ee":"http://arxiv.org/abs/1305.4745","url":"https://dblp.org/rec/journals/corr/abs-1305-4745"}, "url":"URL#4263175" }, { "@score":"1", "@id":"4263176", "info":{"authors":{"author":[{"@pid":"119/3841","text":"Remi A. Chou"},{"@pid":"36/10963","text":"Matthieu R. Bloch"},{"@pid":"84/5016","text":"Emmanuel Abbe"}]},"title":"Polar Coding for Secret-Key Generation","venue":"CoRR","volume":"abs/1305.4746","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-4746","ee":"http://arxiv.org/abs/1305.4746","url":"https://dblp.org/rec/journals/corr/abs-1305-4746"}, "url":"URL#4263176" }, { "@score":"1", "@id":"4263177", "info":{"authors":{"author":[{"@pid":"57/6313","text":"Fabien de Montgolfier"},{"@pid":"98/2963","text":"Mathieu Raffinot"},{"@pid":"17/6385","text":"Irena Rusu"}]},"title":"Easy identification of generalized common nested intervals","venue":"CoRR","volume":"abs/1305.4747","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-4747","ee":"http://arxiv.org/abs/1305.4747","url":"https://dblp.org/rec/journals/corr/abs-1305-4747"}, "url":"URL#4263177" }, { "@score":"1", "@id":"4263178", "info":{"authors":{"author":[{"@pid":"05/10836","text":"Maksym A. Girnyk"},{"@pid":"83/6821","text":"Mikko Vehkaperä"},{"@pid":"12/5461","text":"Lars K. Rasmussen"}]},"title":"Large-System Analysis of Correlated MIMO Multiple Access Channels with Arbitrary Signaling in the Presence of Interference","venue":"CoRR","volume":"abs/1305.4755","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-4755","ee":"http://arxiv.org/abs/1305.4755","url":"https://dblp.org/rec/journals/corr/abs-1305-4755"}, "url":"URL#4263178" }, { "@score":"1", "@id":"4263179", "info":{"authors":{"author":[{"@pid":"18/9226","text":"Parasaran Raman"},{"@pid":"12/4662","text":"Suresh Venkatasubramanian"}]},"title":"Power to the Points: Validating Data Memberships in Clusterings","venue":"CoRR","volume":"abs/1305.4757","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-4757","ee":"http://arxiv.org/abs/1305.4757","url":"https://dblp.org/rec/journals/corr/abs-1305-4757"}, "url":"URL#4263179" }, { "@score":"1", "@id":"4263180", "info":{"authors":{"author":[{"@pid":"b/BinhMinhBuiXuan","text":"Binh-Minh Bui-Xuan"},{"@pid":"43/1110","text":"Nick S. Jones"}]},"title":"How modular structure can simplify tasks on networks","venue":"CoRR","volume":"abs/1305.4760","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-4760","ee":"http://arxiv.org/abs/1305.4760","url":"https://dblp.org/rec/journals/corr/abs-1305-4760"}, "url":"URL#4263180" }, { "@score":"1", "@id":"4263181", "info":{"authors":{"author":{"@pid":"130/4024","text":"Marcin Kawalerowicz"}},"title":"Classification of automatic software build methods","venue":"CoRR","volume":"abs/1305.4776","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-4776","ee":"http://arxiv.org/abs/1305.4776","url":"https://dblp.org/rec/journals/corr/abs-1305-4776"}, "url":"URL#4263181" }, { "@score":"1", "@id":"4263182", "info":{"authors":{"author":{"@pid":"130/3933","text":"Bruno Ziliotto"}},"title":"Zero-sum repeated games: counterexamples to the existence of the asymptotic value and the conjecture maxmin=lim v(n)","venue":"CoRR","volume":"abs/1305.4778","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-4778","ee":"http://arxiv.org/abs/1305.4778","url":"https://dblp.org/rec/journals/corr/abs-1305-4778"}, "url":"URL#4263182" }, { "@score":"1", "@id":"4263183", "info":{"authors":{"author":[{"@pid":"90/6552","text":"Martin Horsch"},{"@pid":"94/10669","text":"Christoph Niethammer"},{"@pid":"91/1069","text":"Jadran Vrabec"},{"@pid":"25/9998","text":"Hans Hasse"}]},"title":"Computational molecular engineering as an emerging technology in process engineering","venue":"CoRR","volume":"abs/1305.4781","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-4781","ee":"http://arxiv.org/abs/1305.4781","url":"https://dblp.org/rec/journals/corr/abs-1305-4781"}, "url":"URL#4263183" }, { "@score":"1", "@id":"4263184", "info":{"authors":{"author":[{"@pid":"60/1830","text":"Rasmus Melchior Jacobsen"},{"@pid":"50/3930","text":"Petar Popovski"}]},"title":"Reliable Reception of Wireless Metering Data with Protocol Coding","venue":"CoRR","volume":"abs/1305.4786","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-4786","ee":"http://arxiv.org/abs/1305.4786","url":"https://dblp.org/rec/journals/corr/abs-1305-4786"}, "url":"URL#4263184" }, { "@score":"1", "@id":"4263185", "info":{"authors":{"author":[{"@pid":"130/3962","text":"Yessica Saez"},{"@pid":"09/3354","text":"Laszlo B. Kish"}]},"title":"Errors and their mitigation at the Kirchhoff-law-Johnson-noise secure key exchange","venue":"CoRR","volume":"abs/1305.4787","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-4787","ee":"http://arxiv.org/abs/1305.4787","url":"https://dblp.org/rec/journals/corr/abs-1305-4787"}, "url":"URL#4263185" }, { "@score":"1", "@id":"4263186", "info":{"authors":{"author":[{"@pid":"79/4191","text":"Fan Min 0001"},{"@pid":"z/WilliamZhu","text":"William Zhu 0001"}]},"title":"Mining top-k granular association rules for recommendation","venue":"CoRR","volume":"abs/1305.4801","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-4801","ee":"http://arxiv.org/abs/1305.4801","url":"https://dblp.org/rec/journals/corr/abs-1305-4801"}, "url":"URL#4263186" }, { "@score":"1", "@id":"4263187", "info":{"authors":{"author":[{"@pid":"81/7559","text":"Martin Rosvall"},{"@pid":"56/9672","text":"Alcides Viamontes Esquivel"},{"@pid":"91/8147","text":"Andrea Lancichinetti"},{"@pid":"18/2701","text":"Jevin D. West"},{"@pid":"66/5185","text":"Renaud Lambiotte"}]},"title":"Networks with Memory","venue":"CoRR","volume":"abs/1305.4807","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-4807","ee":"http://arxiv.org/abs/1305.4807","url":"https://dblp.org/rec/journals/corr/abs-1305-4807"}, "url":"URL#4263187" }, { "@score":"1", "@id":"4263188", "info":{"authors":{"author":[{"@pid":"69/2780","text":"Stefan Gerhold"},{"@pid":"k/ManuelKauers","text":"Manuel Kauers"},{"@pid":"31/4524","text":"Christoph Koutschan"},{"@pid":"93/112","text":"Peter Paule"},{"@pid":"16/370","text":"Carsten Schneider"},{"@pid":"28/3626","text":"Burkhard Zimmermann"}]},"title":"Computer-Assisted Proofs of Some Identities for Bessel Functions of Fractional Order","venue":"CoRR","volume":"abs/1305.4818","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-4818","ee":"http://arxiv.org/abs/1305.4818","url":"https://dblp.org/rec/journals/corr/abs-1305-4818"}, "url":"URL#4263188" }, { "@score":"1", "@id":"4263189", "info":{"authors":{"author":[{"@pid":"117/8453","text":"Mohamed Nader Jelassi"},{"@pid":"20/6407","text":"Sadok Ben Yahia"},{"@pid":"10/3832","text":"Engelbert Mephu Nguifo"}]},"title":"Nouvelle approche de recommandation personnalisee dans les folksonomies basee sur le profil des utilisateurs","venue":"CoRR","volume":"abs/1305.4820","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-4820","ee":"http://arxiv.org/abs/1305.4820","url":"https://dblp.org/rec/journals/corr/abs-1305-4820"}, "url":"URL#4263189" }, { "@score":"1", "@id":"4263190", "info":{"authors":{"author":[{"@pid":"r/SRane","text":"Shantanu Rane"},{"@pid":"44/6292-1","text":"Ye Wang 0001"},{"@pid":"63/3565","text":"Stark C. Draper"},{"@pid":"61/5637","text":"Prakash Ishwar"}]},"title":"Secure Biometrics: Concepts, Authentication Architectures and Challenges","venue":"CoRR","volume":"abs/1305.4832","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-4832","ee":"http://arxiv.org/abs/1305.4832","url":"https://dblp.org/rec/journals/corr/abs-1305-4832"}, "url":"URL#4263190" }, { "@score":"1", "@id":"4263191", "info":{"authors":{"author":{"@pid":"37/8656","text":"Hugues Randriambololona"}},"title":"An upper bound of Singleton type for the componentwise product of two linear codes","venue":"CoRR","volume":"abs/1305.4840","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-4840","ee":"http://arxiv.org/abs/1305.4840","url":"https://dblp.org/rec/journals/corr/abs-1305-4840"}, "url":"URL#4263191" }, { "@score":"1", "@id":"4263192", "info":{"authors":{"author":[{"@pid":"95/3616","text":"Jia Xu"},{"@pid":"95/6685","text":"Ubbo Visser"},{"@pid":"07/5799","text":"E. Patrick Shironoshita"},{"@pid":"26/1965","text":"Nigel M. John"},{"@pid":"22/6069","text":"Mansur R. Kabuka"}]},"title":"Extract ABox Modules for Efficient Ontology Querying","venue":"CoRR","volume":"abs/1305.4859","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-4859","ee":"http://arxiv.org/abs/1305.4859","url":"https://dblp.org/rec/journals/corr/abs-1305-4859"}, "url":"URL#4263192" }, { "@score":"1", "@id":"4263193", "info":{"authors":{"author":[{"@pid":"c/ChristianCachin","text":"Christian Cachin"},{"@pid":"42/4086","text":"Dan Dobre"},{"@pid":"57/6250","text":"Marko Vukolic"}]},"title":"BFT Storage with 2t+1 Data Replicas","venue":"CoRR","volume":"abs/1305.4868","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-4868","ee":"http://arxiv.org/abs/1305.4868","url":"https://dblp.org/rec/journals/corr/abs-1305-4868"}, "url":"URL#4263193" }, { "@score":"1", "@id":"4263194", "info":{"authors":{"author":[{"@pid":"15/4952","text":"Sergiu Hart"},{"@pid":"n/NoamNisan","text":"Noam Nisan"}]},"title":"The Query Complexity of Correlated Equilibria","venue":"CoRR","volume":"abs/1305.4874","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-4874","ee":"http://arxiv.org/abs/1305.4874","url":"https://dblp.org/rec/journals/corr/abs-1305-4874"}, "url":"URL#4263194" }, { "@score":"1", "@id":"4263195", "info":{"authors":{"author":[{"@pid":"k/MarcosAKiwi","text":"Marcos A. Kiwi"},{"@pid":"58/4840","text":"Cristina G. Fernandes"}]},"title":"Repetition-free longest common subsequence of random sequences","venue":"CoRR","volume":"abs/1305.4883","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-4883","ee":"http://arxiv.org/abs/1305.4883","url":"https://dblp.org/rec/journals/corr/abs-1305-4883"}, "url":"URL#4263195" }, { "@score":"1", "@id":"4263196", "info":{"authors":{"author":[{"@pid":"24/5914","text":"Christopher J. Paciorek"},{"@pid":"81/10962","text":"Benjamin Lipshitz"},{"@pid":"96/23-1","text":"Wei Zhuo 0001"},{"@pid":"98/5294","text":"Prabhat"},{"@pid":"34/10814","text":"Cari Kaufman"},{"@pid":"55/6373","text":"Rollin C. Thomas"}]},"title":"Parallelizing Gaussian Process Calculations in R","venue":"CoRR","volume":"abs/1305.4886","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-4886","ee":"http://arxiv.org/abs/1305.4886","url":"https://dblp.org/rec/journals/corr/abs-1305-4886"}, "url":"URL#4263196" }, { "@score":"1", "@id":"4263197", "info":{"authors":{"author":[{"@pid":"67/1254-1","text":"Martin Klein 0001"},{"@pid":"s/HerbertVandeSompel","text":"Herbert Van de Sompel"}]},"title":"Extending Sitemaps for ResourceSync","venue":"CoRR","volume":"abs/1305.4890","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-4890","ee":"http://arxiv.org/abs/1305.4890","url":"https://dblp.org/rec/journals/corr/abs-1305-4890"}, "url":"URL#4263197" }, { "@score":"1", "@id":"4263198", "info":{"authors":{"author":[{"@pid":"78/1228","text":"Jonathan Lutz"},{"@pid":"21/3607","text":"Charles J. Colbourn"},{"@pid":"56/6720","text":"Violet R. Syrotiuk"}]},"title":"ATLAS: Adaptive Topology- and Load-Aware Scheduling","venue":"CoRR","volume":"abs/1305.4897","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-4897","ee":"http://arxiv.org/abs/1305.4897","url":"https://dblp.org/rec/journals/corr/abs-1305-4897"}, "url":"URL#4263198" }, { "@score":"1", "@id":"4263199", "info":{"authors":{"author":[{"@pid":"22/7401","text":"Xunrui Yin"},{"@pid":"59/2227-58","text":"Yan Wang 0058"},{"@pid":"24/1320","text":"Zongpeng Li"},{"@pid":"10/5630-2","text":"Xin Wang 0002"},{"@pid":"84/3791","text":"Xiangyang Xue"}]},"title":"A Graph Minor Perspective to Multicast Network Coding","venue":"CoRR","volume":"abs/1305.4905","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-4905","ee":"http://arxiv.org/abs/1305.4905","url":"https://dblp.org/rec/journals/corr/abs-1305-4905"}, "url":"URL#4263199" }, { "@score":"1", "@id":"4263200", "info":{"authors":{"author":{"@pid":"54/1001","text":"Emil Jerábek"}},"title":"Rules with parameters in modal logic I","venue":"CoRR","volume":"abs/1305.4912","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-4912","ee":"http://arxiv.org/abs/1305.4912","url":"https://dblp.org/rec/journals/corr/abs-1305-4912"}, "url":"URL#4263200" }, { "@score":"1", "@id":"4263201", "info":{"authors":{"author":[{"@pid":"76/819","text":"Marek Cygan"},{"@pid":"g/FGrandoni","text":"Fabrizio Grandoni 0001"},{"@pid":"59/6411","text":"Danny Hermelin"}]},"title":"Tight Kernel Bounds for Problems on Graphs with Small Degeneracy","venue":"CoRR","volume":"abs/1305.4914","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-4914","ee":"http://arxiv.org/abs/1305.4914","url":"https://dblp.org/rec/journals/corr/abs-1305-4914"}, "url":"URL#4263201" }, { "@score":"1", "@id":"4263202", "info":{"authors":{"author":{"@pid":"l/MarkShLevin","text":"Mark Sh. Levin"}},"title":"Note on Evaluation of Hierarchical Modular Systems","venue":"CoRR","volume":"abs/1305.4917","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-4917","ee":"http://arxiv.org/abs/1305.4917","url":"https://dblp.org/rec/journals/corr/abs-1305-4917"}, "url":"URL#4263202" }, { "@score":"1", "@id":"4263203", "info":{"authors":{"author":[{"@pid":"43/10316","text":"Joshua Garland"},{"@pid":"80/2069","text":"Elizabeth Bradley"}]},"title":"On the importance of nonlinear modeling in computer performance prediction","venue":"CoRR","volume":"abs/1305.4924","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-4924","ee":"http://arxiv.org/abs/1305.4924","url":"https://dblp.org/rec/journals/corr/abs-1305-4924"}, "url":"URL#4263203" }, { "@score":"1", "@id":"4263204", "info":{"authors":{"author":[{"@pid":"78/7183","text":"Arthur Gonçalves Carvalho"},{"@pid":"a/AFRAraujo","text":"Aluizio F. R. Araújo"}]},"title":"Improving NSGA-II with an Adaptive Mutation Operator","venue":"CoRR","volume":"abs/1305.4947","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-4947","ee":"http://arxiv.org/abs/1305.4947","url":"https://dblp.org/rec/journals/corr/abs-1305-4947"}, "url":"URL#4263204" }, { "@score":"1", "@id":"4263205", "info":{"authors":{"author":[{"@pid":"129/1432","text":"Mohammadreza Chamanbaz"},{"@pid":"28/897","text":"Fabrizio Dabbene"},{"@pid":"t/RTempo","text":"Roberto Tempo"},{"@pid":"117/4705","text":"Venkatakrishnan Venkataramanan"},{"@pid":"28/903","text":"Qing-Guo Wang"}]},"title":"A Statistical Learning Theory Approach for Uncertain Linear and Bilinear Matrix Inequalities","venue":"CoRR","volume":"abs/1305.4952","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-4952","ee":"http://arxiv.org/abs/1305.4952","url":"https://dblp.org/rec/journals/corr/abs-1305-4952"}, "url":"URL#4263205" }, { "@score":"1", "@id":"4263206", "info":{"authors":{"author":[{"@pid":"75/8580","text":"Renato Oliveira"},{"@pid":"15/5054","text":"Paulo J. L. Adeodato"},{"@pid":"09/8524","text":"Arthur Carvalho"},{"@pid":"15/8581","text":"Icamaan Viegas"},{"@pid":"94/8580","text":"Christian Diego"},{"@pid":"98/5344","text":"Tsang Ing Ren"}]},"title":"A Data Mining Approach to Solve the Goal Scoring Problem","venue":"CoRR","volume":"abs/1305.4955","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-4955","ee":"http://arxiv.org/abs/1305.4955","url":"https://dblp.org/rec/journals/corr/abs-1305-4955"}, "url":"URL#4263206" }, { "@score":"1", "@id":"4263207", "info":{"authors":{"author":[{"@pid":"85/9020","text":"Alexander Bau"},{"@pid":"33/1518","text":"Johannes Waldmann"}]},"title":"Propositional Encoding of Constraints over Tree-Shaped Data","venue":"CoRR","volume":"abs/1305.4957","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-4957","ee":"http://arxiv.org/abs/1305.4957","url":"https://dblp.org/rec/journals/corr/abs-1305-4957"}, "url":"URL#4263207" }, { "@score":"1", "@id":"4263208", "info":{"authors":{"author":{"@pid":"n/MEJNewman","text":"M. E. J. Newman"}},"title":"Community detection and graph partitioning","venue":"CoRR","volume":"abs/1305.4974","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-4974","ee":"http://arxiv.org/abs/1305.4974","url":"https://dblp.org/rec/journals/corr/abs-1305-4974"}, "url":"URL#4263208" }, { "@score":"1", "@id":"4263209", "info":{"authors":{"author":[{"@pid":"37/8968","text":"Junil Choi"},{"@pid":"06/7413","text":"Zachary Chance"},{"@pid":"34/4085","text":"David J. Love"},{"@pid":"m/UpamanyuMadhow","text":"Upamanyu Madhow"}]},"title":"Noncoherent Trellis Coded Quantization: A Practical Limited Feedback Technique for Massive MIMO Systems","venue":"CoRR","volume":"abs/1305.4976","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-4976","ee":"http://arxiv.org/abs/1305.4976","url":"https://dblp.org/rec/journals/corr/abs-1305-4976"}, "url":"URL#4263209" }, { "@score":"1", "@id":"4263210", "info":{"authors":{"author":[{"@pid":"92/8398","text":"Arash Khabbazibasmenj"},{"@pid":"69/88","text":"Aboulnasr Hassanien"},{"@pid":"74/6270","text":"Sergiy A. Vorobyov"},{"@pid":"130/3812","text":"Matthew W. Morency"}]},"title":"Efficient Transmit Beamspace Design for Search-free Based DOA Estimation in MIMO Radar","venue":"CoRR","volume":"abs/1305.4979","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-4979","ee":"http://arxiv.org/abs/1305.4979","url":"https://dblp.org/rec/journals/corr/abs-1305-4979"}, "url":"URL#4263210" }, { "@score":"1", "@id":"4263211", "info":{"authors":{"author":[{"@pid":"06/2484-2","text":"Hao Fang 0002"},{"@pid":"74/6270","text":"Sergiy A. Vorobyov"},{"@pid":"15/5983-1","text":"Hai Jiang 0001"},{"@pid":"34/4091","text":"Omid Taheri"}]},"title":"Permutation Meets Parallel Compressed Sensing: How to Relax Restricted Isometry Property for 2D Sparse Signals","venue":"CoRR","volume":"abs/1305.4980","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-4980","ee":"http://arxiv.org/abs/1305.4980","url":"https://dblp.org/rec/journals/corr/abs-1305-4980"}, "url":"URL#4263211" }, { "@score":"1", "@id":"4263212", "info":{"authors":{"author":[{"@pid":"117/4067","text":"Julie Tibshirani"},{"@pid":"m/ChristopherDManning","text":"Christopher D. Manning"}]},"title":"Robust Logistic Regression using Shift Parameters","venue":"CoRR","volume":"abs/1305.4987","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-4987","ee":"http://arxiv.org/abs/1305.4987","url":"https://dblp.org/rec/journals/corr/abs-1305-4987"}, "url":"URL#4263212" }, { "@score":"1", "@id":"4263213", "info":{"authors":{"author":[{"@pid":"48/4482","text":"Shengbo Chen"},{"@pid":"76/5260","text":"Tarun Bansal"},{"@pid":"07/863","text":"Yin Sun"},{"@pid":"82/2823","text":"Prasun Sinha"},{"@pid":"67/1991","text":"Ness B. Shroff"}]},"title":"Life-Add: Lifetime Adjustable Design for WiFi Networks with Heterogeneous Energy Supplies","venue":"CoRR","volume":"abs/1305.4993","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-4993","ee":"http://arxiv.org/abs/1305.4993","url":"https://dblp.org/rec/journals/corr/abs-1305-4993"}, "url":"URL#4263213" }, { "@score":"1", "@id":"4263214", "info":{"authors":{"author":[{"@pid":"18/5103","text":"Jie Gong"},{"@pid":"13/6830","text":"John S. Thompson"},{"@pid":"34/4858-1","text":"Sheng Zhou 0001"},{"@pid":"51/2196","text":"Zhisheng Niu"}]},"title":"Base Station Sleeping and Resource Allocation in Renewable Energy Powered Cellular Networks","venue":"CoRR","volume":"abs/1305.4996","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-4996","ee":"http://arxiv.org/abs/1305.4996","url":"https://dblp.org/rec/journals/corr/abs-1305-4996"}, "url":"URL#4263214" }, { "@score":"1", "@id":"4263215", "info":{"authors":{"author":[{"@pid":"130/3865","text":"Saied Mehdian"},{"@pid":"86/2829","text":"Ben Liang 0001"}]},"title":"Optimal Frame Transmission for Scalable Video with Hierarchical Prediction Structure","venue":"CoRR","volume":"abs/1305.4999","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-4999","ee":"http://arxiv.org/abs/1305.4999","url":"https://dblp.org/rec/journals/corr/abs-1305-4999"}, "url":"URL#4263215" }, { "@score":"1", "@id":"4263216", "info":{"authors":{"author":[{"@pid":"89/9814","text":"Arunasalam Sambhanthan"},{"@pid":"130/3919","text":"Samantha Thelijjagoda"},{"@pid":"64/1786","text":"Joseph Tan"}]},"title":"Implications for Utilizing YouTube based Community Interactions for Destination Marketing","venue":"CoRR","volume":"abs/1305.5019","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-5019","ee":"http://arxiv.org/abs/1305.5019","url":"https://dblp.org/rec/journals/corr/abs-1305-5019"}, "url":"URL#4263216" }, { "@score":"1", "@id":"4263217", "info":{"authors":{"author":[{"@pid":"12/6879","text":"Shilpa Gulati"},{"@pid":"71/7744","text":"Chetan Jhurani"},{"@pid":"k/BenjaminKuipers","text":"Benjamin Kuipers"}]},"title":"A Nonlinear Constrained Optimization Framework for Comfortable and Customizable Motion Planning of Nonholonomic Mobile Robots - Part I.","venue":"CoRR","volume":"abs/1305.5024","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-5024","ee":"http://arxiv.org/abs/1305.5024","url":"https://dblp.org/rec/journals/corr/abs-1305-5024"}, "url":"URL#4263217" }, { "@score":"1", "@id":"4263218", "info":{"authors":{"author":[{"@pid":"12/6879","text":"Shilpa Gulati"},{"@pid":"71/7744","text":"Chetan Jhurani"},{"@pid":"k/BenjaminKuipers","text":"Benjamin Kuipers"}]},"title":"A Nonlinear Constrained Optimization Framework for Comfortable and Customizable Motion Planning of Nonholonomic Mobile Robots - Part II.","venue":"CoRR","volume":"abs/1305.5025","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-5025","ee":"http://arxiv.org/abs/1305.5025","url":"https://dblp.org/rec/journals/corr/abs-1305-5025"}, "url":"URL#4263218" }, { "@score":"1", "@id":"4263219", "info":{"authors":{"author":[{"@pid":"09/5661-2","text":"Yuchen Zhang 0002"},{"@pid":"41/439","text":"John C. Duchi"},{"@pid":"48/6396","text":"Martin J. Wainwright"}]},"title":"Divide and Conquer Kernel Ridge Regression: A Distributed Algorithm with Minimax Optimal Rates","venue":"CoRR","volume":"abs/1305.5029","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-5029","ee":"http://arxiv.org/abs/1305.5029","url":"https://dblp.org/rec/journals/corr/abs-1305-5029"}, "url":"URL#4263219" }, { "@score":"1", "@id":"4263220", "info":{"authors":{"author":[{"@pid":"25/7117","text":"David Tolpin"},{"@pid":"117/4870","text":"Tal Beja"},{"@pid":"08/1674","text":"Solomon Eyal Shimony"},{"@pid":"43/5063","text":"Ariel Felner"},{"@pid":"92/7121","text":"Erez Karpas"}]},"title":"Towards Rational Deployment of Multiple Heuristics in A*","venue":"CoRR","volume":"abs/1305.5030","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-5030","ee":"http://arxiv.org/abs/1305.5030","url":"https://dblp.org/rec/journals/corr/abs-1305-5030"}, "url":"URL#4263220" }, { "@score":"1", "@id":"4263221", "info":{"authors":{"author":{"@pid":"81/6780","text":"Jean-François Bercher"}},"title":"Some properties of generalized Fisher information in the context of nonextensive thermostatistics","venue":"CoRR","volume":"abs/1305.5040","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-5040","ee":"http://arxiv.org/abs/1305.5040","url":"https://dblp.org/rec/journals/corr/abs-1305-5040"}, "url":"URL#4263221" }, { "@score":"1", "@id":"4263222", "info":{"authors":{"author":[{"@pid":"47/2917","text":"Wenyi Zhang"},{"@pid":"98/3846","text":"Wei Guan"},{"@pid":"52/7742","text":"Jihui Ma"},{"@pid":"86/7779","text":"Junfang Tian"}]},"title":"A nonlinear pair-wise swapping dynamic to model the selfish rerouting evolutionary game","venue":"CoRR","volume":"abs/1305.5046","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-5046","ee":"http://arxiv.org/abs/1305.5046","url":"https://dblp.org/rec/journals/corr/abs-1305-5046"}, "url":"URL#4263222" }, { "@score":"1", "@id":"4263223", "info":{"authors":{"author":[{"@pid":"40/7987","text":"Palash Dey"},{"@pid":"n/YNarahari","text":"Y. Narahari"}]},"title":"Asymptotic Collusion-proofness of Voting Rules when the Number of Candidates is Large","venue":"CoRR","volume":"abs/1305.5053","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-5053","ee":"http://arxiv.org/abs/1305.5053","url":"https://dblp.org/rec/journals/corr/abs-1305-5053"}, "url":"URL#4263223" }, { "@score":"1", "@id":"4263224", "info":{"authors":{"author":[{"@pid":"53/442","text":"Alicja Wieczorkowska"},{"@pid":"22/7414","text":"Miron B. Kursa"}]},"title":"A Comparison of Random Forests and Ferns on Recognition of Instruments in Jazz Recordings","venue":"CoRR","volume":"abs/1305.5078","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-5078","ee":"http://arxiv.org/abs/1305.5078","url":"https://dblp.org/rec/journals/corr/abs-1305-5078"}, "url":"URL#4263224" }, { "@score":"1", "@id":"4263225", "info":{"authors":{"author":[{"@pid":"96/361-5","text":"Yi Fang 0005"},{"@pid":"17/6729-3","text":"Lin Wang 0003"},{"@pid":"35/5506","text":"Kai-Kit Wong"},{"@pid":"35/11418","text":"Kin-Fai Tong"}]},"title":"Performance of Joint Channel and Physical Network Coding Based on Alamouti STBC","venue":"CoRR","volume":"abs/1305.5082","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-5082","ee":"http://arxiv.org/abs/1305.5082","url":"https://dblp.org/rec/journals/corr/abs-1305-5082"}, "url":"URL#4263225" }, { "@score":"1", "@id":"4263226", "info":{"authors":{"author":[{"@pid":"130/3929","text":"Mario Berljafa"},{"@pid":"10/7481","text":"Edoardo Di Napoli"}]},"title":"A Parallel and Scalable Iterative Solver for Sequences of Dense Eigenproblems Arising in FLAPW","venue":"CoRR","volume":"abs/1305.5120","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-5120","ee":"http://arxiv.org/abs/1305.5120","url":"https://dblp.org/rec/journals/corr/abs-1305-5120"}, "url":"URL#4263226" }, { "@score":"1", "@id":"4263227", "info":{"authors":{"author":[{"@pid":"06/3291","text":"Kei Sakaguchi"},{"@pid":"129/4223","text":"Van Ky Nguyen"},{"@pid":"67/1014-11","text":"Yu Tao 0011"},{"@pid":"04/5083","text":"Gia Khanh Tran"},{"@pid":"51/2655","text":"Kiyomichi Araki"}]},"title":"Distributed Power Control Network and Green Building Test-bed for Demand Response in Smart Grid","venue":"CoRR","volume":"abs/1305.5132","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-5132","ee":"http://arxiv.org/abs/1305.5132","url":"https://dblp.org/rec/journals/corr/abs-1305-5132"}, "url":"URL#4263227" }, { "@score":"1", "@id":"4263228", "info":{"authors":{"author":[{"@pid":"17/8636","text":"Lovro Subelj"},{"@pid":"92/492","text":"Marko Bajec"}]},"title":"Groups of nodes in complex real-world networks: An algorithm and comparison of the state-of-the-art","venue":"CoRR","volume":"abs/1305.5136","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-5136","ee":"http://arxiv.org/abs/1305.5136","url":"https://dblp.org/rec/journals/corr/abs-1305-5136"}, "url":"URL#4263228" }, { "@score":"1", "@id":"4263229", "info":{"authors":{"author":[{"@pid":"92/6046","text":"Bo Xiao"},{"@pid":"130/3852","text":"Yuefeng Jing"},{"@pid":"130/4077","text":"Yonghong Guan"}]},"title":"A novel automatic thresholding segmentation method with local adaptive thresholds","venue":"CoRR","volume":"abs/1305.5160","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-5160","ee":"http://arxiv.org/abs/1305.5160","url":"https://dblp.org/rec/journals/corr/abs-1305-5160"}, "url":"URL#4263229" }, { "@score":"1", "@id":"4263230", "info":{"authors":{"author":[{"@pid":"09/8524","text":"Arthur Carvalho"},{"@pid":"27/3591","text":"Kate Larson"}]},"title":"A Truth Serum for Sharing Rewards","venue":"CoRR","volume":"abs/1305.5170","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-5170","ee":"http://arxiv.org/abs/1305.5170","url":"https://dblp.org/rec/journals/corr/abs-1305-5170"}, "url":"URL#4263230" }, { "@score":"1", "@id":"4263231", "info":{"authors":{"author":[{"@pid":"54/8608","text":"Nathan Berg"},{"@pid":"130/4080","text":"Chunyu Chen"},{"@pid":"36/195","text":"Murat Kantarcioglu"}]},"title":"Experiments in Information Sharing","venue":"CoRR","volume":"abs/1305.5176","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-5176","ee":"http://arxiv.org/abs/1305.5176","url":"https://dblp.org/rec/journals/corr/abs-1305-5176"}, "url":"URL#4263231" }, { "@score":"1", "@id":"4263232", "info":{"authors":{"author":[{"@pid":"01/7453","text":"Salvatore Cuomo"},{"@pid":"32/9987","text":"Ardelio Galletti"},{"@pid":"71/2567","text":"Giulio Giunta"},{"@pid":"133/9986","text":"Alfredo Starace"}]},"title":"Surface Reconstruction from Scattered Point via RBF Interpolation on GPU","venue":"CoRR","volume":"abs/1305.5179","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-5179","ee":"http://arxiv.org/abs/1305.5179","url":"https://dblp.org/rec/journals/corr/abs-1305-5179"}, "url":"URL#4263232" }, { "@score":"1", "@id":"4263233", "info":{"authors":{"author":[{"@pid":"130/3973","text":"Neven Caplar"},{"@pid":"64/7282","text":"Mirko Suznjevic"},{"@pid":"83/6380","text":"Maja Matijasevic"}]},"title":"Analysis of player's in-game performance vs rating: Case study of Heroes of Newerth","venue":"CoRR","volume":"abs/1305.5189","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-5189","ee":"http://arxiv.org/abs/1305.5189","url":"https://dblp.org/rec/journals/corr/abs-1305-5189"}, "url":"URL#4263233" }, { "@score":"1", "@id":"4263234", "info":{"authors":{"author":[{"@pid":"62/5065","text":"Jean-Lou De Carufel"},{"@pid":"119/1405","text":"Carsten Grimm"},{"@pid":"m/AnilMaheshwari","text":"Anil Maheshwari"},{"@pid":"78/6671","text":"Megan Owen"},{"@pid":"35/6715","text":"Michiel H. M. Smid"}]},"title":"A Note on the Unsolvability of the Weighted Region Shortest Path Problem","venue":"CoRR","volume":"abs/1305.5209","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-5209","ee":"http://arxiv.org/abs/1305.5209","url":"https://dblp.org/rec/journals/corr/abs-1305-5209"}, "url":"URL#4263234" }, { "@score":"1", "@id":"4263235", "info":{"authors":{"author":[{"@pid":"50/7911","text":"Mingyue Ji"},{"@pid":"19/2492","text":"Giuseppe Caire"},{"@pid":"54/2683","text":"Andreas F. Molisch"}]},"title":"Wireless Device-to-Device Caching Networks: Basic Principles and System Performance","venue":"CoRR","volume":"abs/1305.5216","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-5216","ee":"http://arxiv.org/abs/1305.5216","url":"https://dblp.org/rec/journals/corr/abs-1305-5216"}, "url":"URL#4263235" }, { "@score":"1", "@id":"4263236", "info":{"authors":{"author":[{"@pid":"86/10427","text":"Oscar Filio-Rodriguez"},{"@pid":"82/2711","text":"Serguei Primak"},{"@pid":"44/3525","text":"Valeri Y. Kontorovich"},{"@pid":"26/704","text":"Abdallah Shami"}]},"title":"A Game Theory Interpretation for Multiple Access in Cognitive Radio Networks with Random Number of Secondary Users","venue":"CoRR","volume":"abs/1305.5222","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-5222","ee":"http://arxiv.org/abs/1305.5222","url":"https://dblp.org/rec/journals/corr/abs-1305-5222"}, "url":"URL#4263236" }, { "@score":"1", "@id":"4263237", "info":{"authors":{"author":[{"@pid":"a/PAAbdulla","text":"Parosh Aziz Abdulla"},{"@pid":"94/8295","text":"Lorenzo Clemente"},{"@pid":"81/113","text":"Richard Mayr"},{"@pid":"80/1358","text":"Sven Sandberg"}]},"title":"Stochastic Parity Games on Lossy Channel Systems","venue":"CoRR","volume":"abs/1305.5228","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-5228","ee":"http://arxiv.org/abs/1305.5228","url":"https://dblp.org/rec/journals/corr/abs-1305-5228"}, "url":"URL#4263237" }, { "@score":"1", "@id":"4263238", "info":{"authors":{"author":[{"@pid":"14/3919","text":"L. Sunil Chandran"},{"@pid":"90/4674","text":"Wilfried Imrich"},{"@pid":"92/5653","text":"Rogers Mathew"},{"@pid":"40/8774","text":"Deepak Rajendraprasad"}]},"title":"Boxicity and Cubicity of Product Graphs","venue":"CoRR","volume":"abs/1305.5233","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-5233","ee":"http://arxiv.org/abs/1305.5233","url":"https://dblp.org/rec/journals/corr/abs-1305-5233"}, "url":"URL#4263238" }, { "@score":"1", "@id":"4263239", "info":{"authors":{"author":[{"@pid":"d/ChristianDoerr","text":"Christian Doerr"},{"@pid":"86/4283","text":"Norbert Blenn"},{"@pid":"v/PietVanMieghem","text":"Piet Van Mieghem"}]},"title":"Lognormal Infection Times of Online Information Spread","venue":"CoRR","volume":"abs/1305.5235","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-5235","ee":"http://arxiv.org/abs/1305.5235","url":"https://dblp.org/rec/journals/corr/abs-1305-5235"}, "url":"URL#4263239" }, { "@score":"1", "@id":"4263240", "info":{"authors":{"author":[{"@pid":"13/5827","text":"David Isaac Wolinsky"},{"@pid":"12/7905","text":"Ewa Syta"},{"@pid":"f/BryanFord","text":"Bryan Ford"}]},"title":"Hang With Your Buddies to Resist Intersection Attacks","venue":"CoRR","volume":"abs/1305.5236","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-5236","ee":"http://arxiv.org/abs/1305.5236","url":"https://dblp.org/rec/journals/corr/abs-1305-5236"}, "url":"URL#4263240" }, { "@score":"1", "@id":"4263241", "info":{"authors":{"author":{"@pid":"45/2309","text":"Robert E. Kent"}},"title":"FOLE: The First-order Logical Environment","venue":"CoRR","volume":"abs/1305.5240","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-5240","ee":"http://arxiv.org/abs/1305.5240","url":"https://dblp.org/rec/journals/corr/abs-1305-5240"}, "url":"URL#4263241" }, { "@score":"1", "@id":"4263242", "info":{"authors":{"author":[{"@pid":"93/3428","text":"Kerstin Dächert"},{"@pid":"k/KathrinKlamroth","text":"Kathrin Klamroth"}]},"title":"A linear bound on the number of scalarizations needed to solve discrete tricriteria optimization problems","venue":"CoRR","volume":"abs/1305.5266","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-5266","ee":"http://arxiv.org/abs/1305.5266","url":"https://dblp.org/rec/journals/corr/abs-1305-5266"}, "url":"URL#4263242" }, { "@score":"1", "@id":"4263243", "info":{"authors":{"author":{"@pid":"130/3704","text":"Bluma S. Gelley"}},"title":"Investigating Deletion in Wikipedia","venue":"CoRR","volume":"abs/1305.5267","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-5267","ee":"http://arxiv.org/abs/1305.5267","url":"https://dblp.org/rec/journals/corr/abs-1305-5267"}, "url":"URL#4263243" }, { "@score":"1", "@id":"4263244", "info":{"authors":{"author":[{"@pid":"80/9435","text":"Fernando G. S. L. Brandão"},{"@pid":"33/2156","text":"Michal Horodecki"},{"@pid":"130/3905","text":"Nelly Huei Ying Ng"},{"@pid":"82/5485","text":"Jonathan Oppenheim"},{"@pid":"89/5916","text":"Stephanie Wehner"}]},"title":"The second laws of quantum thermodynamics","venue":"CoRR","volume":"abs/1305.5278","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-5278","ee":"http://arxiv.org/abs/1305.5278","url":"https://dblp.org/rec/journals/corr/abs-1305-5278"}, "url":"URL#4263244" }, { "@score":"1", "@id":"4263245", "info":{"authors":{"author":[{"@pid":"120/7090","text":"Yin Zheng"},{"@pid":"99/607","text":"Yu-Jin Zhang"},{"@pid":"86/3862","text":"Hugo Larochelle"}]},"title":"A Supervised Neural Autoregressive Topic Model for Simultaneous Image Classification and Annotation","venue":"CoRR","volume":"abs/1305.5306","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-5306","ee":"http://arxiv.org/abs/1305.5306","url":"https://dblp.org/rec/journals/corr/abs-1305-5306"}, "url":"URL#4263245" }, { "@score":"1", "@id":"4263246", "info":{"authors":{"author":[{"@pid":"43/7884","text":"Ronald Y. Chang"},{"@pid":"11/1802","text":"Sian-Jheng Lin"},{"@pid":"35/8707","text":"Wei-Ho Chung"}]},"title":"Energy Efficient Transmission over Space Shift Keying Modulated MIMO Channels","venue":"CoRR","volume":"abs/1305.5316","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-5316","ee":"http://arxiv.org/abs/1305.5316","url":"https://dblp.org/rec/journals/corr/abs-1305-5316"}, "url":"URL#4263246" }, { "@score":"1", "@id":"4263247", "info":{"authors":{"author":{"@pid":"56/11466","text":"Roman Zapatrin"}},"title":"A toy model of information retrieval system based on quantum probability","venue":"CoRR","volume":"abs/1305.5330","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-5330","ee":"http://arxiv.org/abs/1305.5330","url":"https://dblp.org/rec/journals/corr/abs-1305-5330"}, "url":"URL#4263247" }, { "@score":"1", "@id":"4263248", "info":{"authors":{"author":{"@pid":"130/3716","text":"Valery Tabakov"}},"title":"System error of project ETONN and EIAS","venue":"CoRR","volume":"abs/1305.5337","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-5337","ee":"http://arxiv.org/abs/1305.5337","url":"https://dblp.org/rec/journals/corr/abs-1305-5337"}, "url":"URL#4263248" }, { "@score":"1", "@id":"4263249", "info":{"authors":{"author":[{"@pid":"62/3145","text":"Adam Kasperski"},{"@pid":"72/5778","text":"Pawel Zielinski 0001"}]},"title":"Combinatorial optimization problems with uncertain costs and the OWA criterion","venue":"CoRR","volume":"abs/1305.5339","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-5339","ee":"http://arxiv.org/abs/1305.5339","url":"https://dblp.org/rec/journals/corr/abs-1305-5339"}, "url":"URL#4263249" }, { "@score":"1", "@id":"4263250", "info":{"authors":{"author":[{"@pid":"45/9916","text":"Luca Barletta"},{"@pid":"51/3959","text":"Maurizio Magarini"},{"@pid":"96/1842","text":"Arnaldo Spalvieri"}]},"title":"Tight Upper and Lower Bounds to the Information Rate of the Phase Noise Channel","venue":"CoRR","volume":"abs/1305.5352","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-5352","ee":"http://arxiv.org/abs/1305.5352","url":"https://dblp.org/rec/journals/corr/abs-1305-5352"}, "url":"URL#4263250" }, { "@score":"1", "@id":"4263251", "info":{"authors":{"author":{"@pid":"22/3620","text":"Manoj Gopalkrishnan"}},"title":"A coercion-resistant protocol for conducting elections by telephone","venue":"CoRR","volume":"abs/1305.5359","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-5359","ee":"http://arxiv.org/abs/1305.5359","url":"https://dblp.org/rec/journals/corr/abs-1305-5359"}, "url":"URL#4263251" }, { "@score":"1", "@id":"4263252", "info":{"authors":{"author":[{"@pid":"38/7482","text":"Anas Chaaban"},{"@pid":"12/218","text":"Aydin Sezgin"},{"@pid":"63/1946","text":"Amir Salman Avestimehr"}]},"title":"Approximate Sum-Capacity of the Y-channel","venue":"CoRR","volume":"abs/1305.5376","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-5376","ee":"http://arxiv.org/abs/1305.5376","url":"https://dblp.org/rec/journals/corr/abs-1305-5376"}, "url":"URL#4263252" }, { "@score":"1", "@id":"4263253", "info":{"authors":{"author":[{"@pid":"20/1669","text":"Shie Mannor"},{"@pid":"83/7398","text":"Vianney Perchet"},{"@pid":"18/3915","text":"Gilles Stoltz"}]},"title":"A Primal Condition for Approachability with Partial Monitoring","venue":"CoRR","volume":"abs/1305.5399","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-5399","ee":"http://arxiv.org/abs/1305.5399","url":"https://dblp.org/rec/journals/corr/abs-1305-5399"}, "url":"URL#4263253" }, { "@score":"1", "@id":"4263254", "info":{"authors":{"author":{"@pid":"58/1792","text":"Benjamin Smith 0003"}},"title":"Families of fast elliptic curves from Q-curves","venue":"CoRR","volume":"abs/1305.5400","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-5400","ee":"http://arxiv.org/abs/1305.5400","url":"https://dblp.org/rec/journals/corr/abs-1305-5400"}, "url":"URL#4263254" }, { "@score":"1", "@id":"4263255", "info":{"authors":{"author":[{"@pid":"02/6787","text":"Wenkui Ding"},{"@pid":"20/5998","text":"Tao Wu"},{"@pid":"14/6841-1","text":"Tao Qin 0001"},{"@pid":"l/TieYanLiu","text":"Tie-Yan Liu"}]},"title":"Pure Price of Anarchy for Generalized Second Price Auction","venue":"CoRR","volume":"abs/1305.5404","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-5404","ee":"http://arxiv.org/abs/1305.5404","url":"https://dblp.org/rec/journals/corr/abs-1305-5404"}, "url":"URL#4263255" }, { "@score":"1", "@id":"4263256", "info":{"authors":{"author":[{"@pid":"43/10316","text":"Joshua Garland"},{"@pid":"75/8316","text":"Ryan G. James"},{"@pid":"80/2069","text":"Elizabeth Bradley"}]},"title":"Determinism, Complexity, and Predictability in Computer Performance","venue":"CoRR","volume":"abs/1305.5408","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-5408","ee":"http://arxiv.org/abs/1305.5408","url":"https://dblp.org/rec/journals/corr/abs-1305-5408"}, "url":"URL#4263256" }, { "@score":"1", "@id":"4263257", "info":{"authors":{"author":[{"@pid":"26/3594","text":"Marco Baldi"},{"@pid":"85/2046-2","text":"Marco Bianchi 0002"},{"@pid":"64/4583","text":"Franco Chiaraluce"},{"@pid":"44/4587","text":"Joachim Rosenthal"},{"@pid":"08/1881","text":"Davide Schipani"}]},"title":"Using LDGM Codes and Sparse Syndromes to Achieve Digital Signatures","venue":"CoRR","volume":"abs/1305.5436","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-5436","ee":"http://arxiv.org/abs/1305.5436","url":"https://dblp.org/rec/journals/corr/abs-1305-5436"}, "url":"URL#4263257" }, { "@score":"1", "@id":"4263258", "info":{"authors":{"author":[{"@pid":"55/2932","text":"Bruno Macchiavello"},{"@pid":"29/6012","text":"Camilo C. Dorea"},{"@pid":"86/6364","text":"Edson M. Hung"},{"@pid":"17/6315","text":"Gene Cheung"},{"@pid":"76/1151","text":"Wai-tian Tan"}]},"title":"Loss-resilient Coding of Texture and Depth for Free-viewpoint Video Conferencing","venue":"CoRR","volume":"abs/1305.5464","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-5464","ee":"http://arxiv.org/abs/1305.5464","url":"https://dblp.org/rec/journals/corr/abs-1305-5464"}, "url":"URL#4263258" }, { "@score":"1", "@id":"4263259", "info":{"authors":{"author":[{"@pid":"130/3741","text":"Stewart N. Ethier"},{"@pid":"130/3802","text":"Carlos Gamez"}]},"title":"A game-theoretic analysis of baccara chemin de fer","venue":"CoRR","volume":"abs/1305.5468","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-5468","ee":"http://arxiv.org/abs/1305.5468","url":"https://dblp.org/rec/journals/corr/abs-1305-5468"}, "url":"URL#4263259" }, { "@score":"1", "@id":"4263260", "info":{"authors":{"author":[{"@pid":"g/ErolGelenbe","text":"Erol Gelenbe"},{"@pid":"04/8345","text":"Gökçe Görbil"},{"@pid":"04/1483","text":"Dimitrios Tzovaras"},{"@pid":"117/7988","text":"Steffen Liebergeld"},{"@pid":"77/2018","text":"David García"},{"@pid":"95/5175","text":"Madalina Baltatu"},{"@pid":"49/3508","text":"George L. Lyberopoulos"}]},"title":"NEMESYS: Enhanced Network Security for Seamless Service Provisioning in the Smart Mobile Ecosystem","venue":"CoRR","volume":"abs/1305.5483","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-5483","ee":"http://arxiv.org/abs/1305.5483","url":"https://dblp.org/rec/journals/corr/abs-1305-5483"}, "url":"URL#4263260" }, { "@score":"1", "@id":"4263261", "info":{"authors":{"author":{"@pid":"91/8146","text":"John Scoville"}},"title":"Fast Autocorrelated Context Models for Data Compression","venue":"CoRR","volume":"abs/1305.5486","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-5486","ee":"http://arxiv.org/abs/1305.5486","url":"https://dblp.org/rec/journals/corr/abs-1305-5486"}, "url":"URL#4263261" }, { "@score":"1", "@id":"4263262", "info":{"authors":{"author":[{"@pid":"25/1492","text":"Subhash Khot"},{"@pid":"63/5004","text":"Madhur Tulsiani"},{"@pid":"65/6450","text":"Pratik Worah"}]},"title":"A Characterization of Strong Approximation Resistance","venue":"CoRR","volume":"abs/1305.5500","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-5500","ee":"http://arxiv.org/abs/1305.5500","url":"https://dblp.org/rec/journals/corr/abs-1305-5500"}, "url":"URL#4263262" }, { "@score":"1", "@id":"4263263", "info":{"authors":{"author":{"@pid":"55/1285","text":"Robert R. Tucci"}},"title":"Introduction to Judea Pearl's Do-Calculus","venue":"CoRR","volume":"abs/1305.5506","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-5506","ee":"http://arxiv.org/abs/1305.5506","url":"https://dblp.org/rec/journals/corr/abs-1305-5506"}, "url":"URL#4263263" }, { "@score":"1", "@id":"4263264", "info":{"authors":{"author":[{"@pid":"33/5673","text":"Mohsen Ghaffari 0001"},{"@pid":"26/5426","text":"Fabian Kuhn"}]},"title":"Distributed Minimum Cut Approximation","venue":"CoRR","volume":"abs/1305.5520","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-5520","ee":"http://arxiv.org/abs/1305.5520","url":"https://dblp.org/rec/journals/corr/abs-1305-5520"}, "url":"URL#4263264" }, { "@score":"1", "@id":"4263265", "info":{"authors":{"author":[{"@pid":"129/1381","text":"Shreyas Balakuntala"},{"@pid":"130/3890","text":"Sandeep Venkatesh"},{"@pid":"72/8260","text":"Rajarajeswari S."},{"@pid":"130/3948","text":"E. Abhiram"},{"@pid":"130/3857","text":"Ashwin R."},{"@pid":"130/4041","text":"K. M. Sunil Kumar"}]},"title":"An Intelligent System to Detect, Avoid and Maintain Potholes: A Graph Theoretic Approach","venue":"CoRR","volume":"abs/1305.5522","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-5522","ee":"http://arxiv.org/abs/1305.5522","url":"https://dblp.org/rec/journals/corr/abs-1305-5522"}, "url":"URL#4263265" }, { "@score":"1", "@id":"4263266", "info":{"authors":{"author":[{"@pid":"94/2655","text":"Changchuan Yin"},{"@pid":"130/3927","text":"Dongchul Yoo"},{"@pid":"y/StephenSTYau","text":"Stephen S.-T. Yau"}]},"title":"Denoising the 3-Base Periodicity Walks of DNA Sequences in Gene Finding","venue":"CoRR","volume":"abs/1305.5524","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-5524","ee":"http://arxiv.org/abs/1305.5524","url":"https://dblp.org/rec/journals/corr/abs-1305-5524"}, "url":"URL#4263266" }, { "@score":"1", "@id":"4263267", "info":{"authors":{"author":[{"@pid":"04/8575","text":"Omur Ozel"},{"@pid":"04/2970","text":"Khurram Shahzad"},{"@pid":"u/SennurUlukus","text":"Sennur Ulukus"}]},"title":"Optimal Scheduling for Energy Harvesting Transmitters with Hybrid Energy Storage","venue":"CoRR","volume":"abs/1305.5530","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-5530","ee":"http://arxiv.org/abs/1305.5530","url":"https://dblp.org/rec/journals/corr/abs-1305-5530"}, "url":"URL#4263267" }, { "@score":"1", "@id":"4263268", "info":{"authors":{"author":[{"@pid":"130/3895","text":"Frédéric P. A. Vogt"},{"@pid":"130/3730","text":"Luke J. Shingles"}]},"title":"Augmented Reality in Astrophysics","venue":"CoRR","volume":"abs/1305.5534","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-5534","ee":"http://arxiv.org/abs/1305.5534","url":"https://dblp.org/rec/journals/corr/abs-1305-5534"}, "url":"URL#4263268" }, { "@score":"1", "@id":"4263269", "info":{"authors":{"author":[{"@pid":"68/2307","text":"Alexander Bolshoy"},{"@pid":"68/1758","text":"Valery M. Kirzhner"}]},"title":"Algorithms of an optimal integer tree labeling","venue":"CoRR","volume":"abs/1305.5551","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-5551","ee":"http://arxiv.org/abs/1305.5551","url":"https://dblp.org/rec/journals/corr/abs-1305-5551"}, "url":"URL#4263269" }, { "@score":"1", "@id":"4263270", "info":{"authors":{"author":[{"@pid":"89/3687","text":"Adam Chalcraft"},{"@pid":"34/1908","text":"Samuel Kutin"},{"@pid":"16/4570","text":"David Petrie Moulton"}]},"title":"The Promise Polynomial Hierarchy","venue":"CoRR","volume":"abs/1305.5561","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-5561","ee":"http://arxiv.org/abs/1305.5561","url":"https://dblp.org/rec/journals/corr/abs-1305-5561"}, "url":"URL#4263270" }, { "@score":"1", "@id":"4263271", "info":{"authors":{"author":[{"@pid":"78/9885","text":"Taha Yasseri"},{"@pid":"67/6828","text":"Anselm Spoerri"},{"@pid":"60/9168","text":"Mark Graham"},{"@pid":"51/8194","text":"János Kertész"}]},"title":"The most controversial topics in Wikipedia: A multilingual and geographical analysis","venue":"CoRR","volume":"abs/1305.5566","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-5566","ee":"http://arxiv.org/abs/1305.5566","url":"https://dblp.org/rec/journals/corr/abs-1305-5566"}, "url":"URL#4263271" }, { "@score":"1", "@id":"4263272", "info":{"authors":{"author":[{"@pid":"w/DPWoodruff","text":"David P. Woodruff"},{"@pid":"45/47-1","text":"Qin Zhang 0001"}]},"title":"Subspace Embeddings and ℓp-Regression Using Exponential Random Variables","venue":"CoRR","volume":"abs/1305.5580","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-5580","ee":"http://arxiv.org/abs/1305.5580","url":"https://dblp.org/rec/journals/corr/abs-1305-5580"}, "url":"URL#4263272" }, { "@score":"1", "@id":"4263273", "info":{"authors":{"author":[{"@pid":"18/11472","text":"Qiaoyang Ye"},{"@pid":"54/1604","text":"Mazin Al-Shalash"},{"@pid":"96/5760","text":"Constantine Caramanis"},{"@pid":"84/4900","text":"Jeffrey G. Andrews"}]},"title":"On/Off Macrocells and Load Balancing in Heterogeneous Cellular Networks","venue":"CoRR","volume":"abs/1305.5585","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-5585","ee":"http://arxiv.org/abs/1305.5585","url":"https://dblp.org/rec/journals/corr/abs-1305-5585"}, "url":"URL#4263273" }, { "@score":"1", "@id":"4263274", "info":{"authors":{"author":[{"@pid":"46/4184-2","text":"Hao Feng 0002"},{"@pid":"54/2683","text":"Andreas F. Molisch"}]},"title":"Diversity Backpressure Scheduling and Routing with Mutual Information Accumulation in Wireless Ad-hoc Networks","venue":"CoRR","volume":"abs/1305.5588","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-5588","ee":"http://arxiv.org/abs/1305.5588","url":"https://dblp.org/rec/journals/corr/abs-1305-5588"}, "url":"URL#4263274" }, { "@score":"1", "@id":"4263275", "info":{"authors":{"author":[{"@pid":"93/9877","text":"Mahdi Shaghaghi"},{"@pid":"74/6270","text":"Sergiy A. Vorobyov"}]},"title":"Finite-Length and Asymptotic Analysis of Correlogram for Undersampled Data","venue":"CoRR","volume":"abs/1305.5592","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-5592","ee":"http://arxiv.org/abs/1305.5592","url":"https://dblp.org/rec/journals/corr/abs-1305-5592"}, "url":"URL#4263275" }, { "@score":"1", "@id":"4263276", "info":{"authors":{"author":[{"@pid":"128/6972-1","text":"Sijia Liu 0001"},{"@pid":"36/6214","text":"Makan Fardad"},{"@pid":"77/7955","text":"Engin Masazade"},{"@pid":"v/PKVarshney","text":"Pramod K. Varshney"}]},"title":"Optimal Periodic Sensor Scheduling in Large-Scale Dynamical Networks","venue":"CoRR","volume":"abs/1305.5601","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-5601","ee":"http://arxiv.org/abs/1305.5601","url":"https://dblp.org/rec/journals/corr/abs-1305-5601"}, "url":"URL#4263276" }, { "@score":"1", "@id":"4263277", "info":{"authors":{"author":[{"@pid":"35/7092-30","text":"Wei Wang 0030"},{"@pid":"l/BaochunLi","text":"Baochun Li"},{"@pid":"86/2829","text":"Ben Liang 0001"}]},"title":"To Reserve or Not to Reserve: Optimal Online Multi-Instance Acquisition in IaaS Clouds","venue":"CoRR","volume":"abs/1305.5608","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-5608","ee":"http://arxiv.org/abs/1305.5608","url":"https://dblp.org/rec/journals/corr/abs-1305-5608"}, "url":"URL#4263277" }, { "@score":"1", "@id":"4263278", "info":{"authors":{"author":[{"@pid":"46/1455","text":"Fred W. Glover"},{"@pid":"15/9","text":"Tao Ye"},{"@pid":"70/6032","text":"Abraham P. Punnen"},{"@pid":"92/1158","text":"Gary A. Kochenberger"}]},"title":"Integrating tabu search and VLSN search to develop enhanced algorithms: A case study using bipartite boolean quadratic programs.","venue":"CoRR","volume":"abs/1305.5610","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-5610","ee":"http://arxiv.org/abs/1305.5610","url":"https://dblp.org/rec/journals/corr/abs-1305-5610"}, "url":"URL#4263278" }, { "@score":"1", "@id":"4263279", "info":{"authors":{"author":[{"@pid":"80/2307","text":"Alice C. Niemeyer"},{"@pid":"16/6964","text":"Tomasz Popiel"},{"@pid":"98/2128","text":"Cheryl E. Praeger"}]},"title":"Straight-line programs with memory and matrix Bruhat decomposition","venue":"CoRR","volume":"abs/1305.5617","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-5617","ee":"http://arxiv.org/abs/1305.5617","url":"https://dblp.org/rec/journals/corr/abs-1305-5617"}, "url":"URL#4263279" }, { "@score":"1", "@id":"4263280", "info":{"authors":{"author":[{"@pid":"97/10365","text":"Vikram Arkalgud Chandrasetty"},{"@pid":"148/3679-1","text":"Sarah J. Johnson"},{"@pid":"18/2407","text":"Gottfried Lechner"}]},"title":"Memory Efficient Decoders using Spatially Coupled Quasi-Cyclic LDPC Codes","venue":"CoRR","volume":"abs/1305.5625","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-5625","ee":"http://arxiv.org/abs/1305.5625","url":"https://dblp.org/rec/journals/corr/abs-1305-5625"}, "url":"URL#4263280" }, { "@score":"1", "@id":"4263281", "info":{"authors":{"author":{"@pid":"92/1103","text":"Neri Merhav"}},"title":"Erasure/list exponents for Slepian-Wolf decoding","venue":"CoRR","volume":"abs/1305.5626","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-5626","ee":"http://arxiv.org/abs/1305.5626","url":"https://dblp.org/rec/journals/corr/abs-1305-5626"}, "url":"URL#4263281" }, { "@score":"1", "@id":"4263282", "info":{"authors":{"author":{"@pid":"130/3854","text":"Seppo Ilari Tirri"}},"title":"Algebraic Net Class Rewriting Systems, Syntax and Semantics for Knowledge Representation and Automated Problem Solving","venue":"CoRR","volume":"abs/1305.5637","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-5637","ee":"http://arxiv.org/abs/1305.5637","url":"https://dblp.org/rec/journals/corr/abs-1305-5637"}, "url":"URL#4263282" }, { "@score":"1", "@id":"4263283", "info":{"authors":{"author":[{"@pid":"129/9848","text":"Ruonan Wang"},{"@pid":"130/4018","text":"Christopher Harris"}]},"title":"Scaling Radio Astronomy Signal Correlation on Heterogeneous Supercomputers Using Various Data Distribution Methodologies","venue":"CoRR","volume":"abs/1305.5639","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-5639","ee":"http://arxiv.org/abs/1305.5639","url":"https://dblp.org/rec/journals/corr/abs-1305-5639"}, "url":"URL#4263283" }, { "@score":"1", "@id":"4263284", "info":{"authors":{"author":[{"@pid":"09/3925","text":"Li Yang"},{"@pid":"129/1563","text":"Rui-Rui Zhou"}]},"title":"Post-quantum security of encrypted key exchange protocol","venue":"CoRR","volume":"abs/1305.5640","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-5640","ee":"http://arxiv.org/abs/1305.5640","url":"https://dblp.org/rec/journals/corr/abs-1305-5640"}, "url":"URL#4263284" }, { "@score":"1", "@id":"4263285", "info":{"authors":{"author":[{"@pid":"117/5990","text":"George Garbis"},{"@pid":"88/8176","text":"Kostis Kyzirakos"},{"@pid":"40/4517","text":"Manolis Koubarakis"}]},"title":"Geographica: A Benchmark for Geospatial RDF Stores","venue":"CoRR","volume":"abs/1305.5653","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-5653","ee":"http://arxiv.org/abs/1305.5653","url":"https://dblp.org/rec/journals/corr/abs-1305-5653"}, "url":"URL#4263285" }, { "@score":"1", "@id":"4263286", "info":{"authors":{"author":[{"@pid":"130/3974","text":"Dmitry E. Chebukov"},{"@pid":"130/4032","text":"Alexander D. Izaak"},{"@pid":"130/3702","text":"Olga G. Misyurina"},{"@pid":"130/3740","text":"Yuri A. Pupyrev"},{"@pid":"130/3951","text":"Alexey B. Zhizhchenko"}]},"title":"Math-Net.Ru as a Digital Archive of the Russian Mathematical Knowledge from the XIX Century to Today","venue":"CoRR","volume":"abs/1305.5655","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-5655","ee":"http://arxiv.org/abs/1305.5655","url":"https://dblp.org/rec/journals/corr/abs-1305-5655"}, "url":"URL#4263286" }, { "@score":"1", "@id":"4263287", "info":{"authors":{"author":[{"@pid":"14/4896","text":"János Tapolcai"},{"@pid":"45/5812","text":"Gábor Rétvári"},{"@pid":"43/3942","text":"Attila Körösi"}]},"title":"Memory size bounds of prefix DAGs","venue":"CoRR","volume":"abs/1305.5662","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-5662","ee":"http://arxiv.org/abs/1305.5662","url":"https://dblp.org/rec/journals/corr/abs-1305-5662"}, "url":"URL#4263287" }, { "@score":"1", "@id":"4263288", "info":{"authors":{"author":[{"@pid":"130/3791","text":"Eckhard Hitzer"},{"@pid":"21/1261","text":"Tohru Nitta"},{"@pid":"29/5478","text":"Yasuaki Kuroe"}]},"title":"Applications of Clifford's Geometric Algebra","venue":"CoRR","volume":"abs/1305.5663","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-5663","ee":"http://arxiv.org/abs/1305.5663","url":"https://dblp.org/rec/journals/corr/abs-1305-5663"}, "url":"URL#4263288" }, { "@score":"1", "@id":"4263289", "info":{"authors":{"author":[{"@pid":"90/7358","text":"Abdelali Boussadi"},{"@pid":"117/6559","text":"Thibaut Caruba"},{"@pid":"130/3860","text":"Alexandre Karras"},{"@pid":"134/9270","text":"Sarah Berdot"},{"@pid":"74/5559","text":"Patrice Degoulet"},{"@pid":"71/9214","text":"Pierre Durieux"},{"@pid":"27/7359","text":"Brigitte Sabatier"}]},"title":"Validity of a clinical decision rule based alert system for drug dose adjustment in patients with renal failure intended to improve pharmacists' analysis of medication orders in hospitals.","venue":"CoRR","volume":"abs/1305.5665","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-5665","ee":"http://arxiv.org/abs/1305.5665","url":"https://dblp.org/rec/journals/corr/abs-1305-5665"}, "url":"URL#4263289" }, { "@score":"1", "@id":"4263290", "info":{"authors":{"author":[{"@pid":"50/6996-1","text":"Min Chen 0001"},{"@pid":"83/2733","text":"Luciano Floridi"},{"@pid":"06/5053","text":"Rita Borgo"}]},"title":"What is Visualization Really for?","venue":"CoRR","volume":"abs/1305.5670","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-5670","ee":"http://arxiv.org/abs/1305.5670","url":"https://dblp.org/rec/journals/corr/abs-1305-5670"}, "url":"URL#4263290" }, { "@score":"1", "@id":"4263291", "info":{"authors":{"author":[{"@pid":"41/5447-2","text":"Rachit Agarwal 0002"},{"@pid":"10/5018","text":"Vincent Gauthier"},{"@pid":"40/6964","text":"Monique Becker"},{"@pid":"130/3799","text":"Thouraya Toukabri"},{"@pid":"93/6277","text":"Hossam Afifi"}]},"title":"Enhancing Information Dissemination in Device to Device Metapopulation using Human Mobility Trace and Beamforming","venue":"CoRR","volume":"abs/1305.5675","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-5675","ee":"http://arxiv.org/abs/1305.5675","url":"https://dblp.org/rec/journals/corr/abs-1305-5675"}, "url":"URL#4263291" }, { "@score":"1", "@id":"4263292", "info":{"authors":{"author":[{"@pid":"71/4599","text":"Pedro Quaresma"},{"@pid":"77/783","text":"Vanda Santos"},{"@pid":"130/3847","text":"Seifeddine Bouallegue"}]},"title":"The Web Geometry Laboratory Project","venue":"CoRR","volume":"abs/1305.5703","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-5703","ee":"http://arxiv.org/abs/1305.5703","url":"https://dblp.org/rec/journals/corr/abs-1305-5703"}, "url":"URL#4263292" }, { "@score":"1", "@id":"4263293", "info":{"authors":{"author":[{"@pid":"82/1008","text":"Carst Tankink"},{"@pid":"30/5217","text":"Cezary Kaliszyk"},{"@pid":"63/5214","text":"Josef Urban"},{"@pid":"47/2251","text":"Herman Geuvers"}]},"title":"Formal Mathematics on Display: A Wiki for Flyspeck","venue":"CoRR","volume":"abs/1305.5710","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-5710","ee":"http://arxiv.org/abs/1305.5710","url":"https://dblp.org/rec/journals/corr/abs-1305-5710"}, "url":"URL#4263293" }, { "@score":"1", "@id":"4263294", "info":{"authors":{"author":{"@pid":"41/8860","text":"Michael Brand"}},"title":"Computing with and without arbitrary large numbers","venue":"CoRR","volume":"abs/1305.5713","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-5713","ee":"http://arxiv.org/abs/1305.5713","url":"https://dblp.org/rec/journals/corr/abs-1305-5713"}, "url":"URL#4263294" }, { "@score":"1", "@id":"4263295", "info":{"authors":{"author":[{"@pid":"48/6358","text":"Antonio Franchi"},{"@pid":"10/1831","text":"Paolo Robuffo Giordano"}]},"title":"Online Leader Selection for Multi-Agent Collective Tracking and Formation Maintenance","venue":"CoRR","volume":"abs/1305.5719","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-5719","ee":"http://arxiv.org/abs/1305.5719","url":"https://dblp.org/rec/journals/corr/abs-1305-5719"}, "url":"URL#4263295" }, { "@score":"1", "@id":"4263296", "info":{"authors":{"author":{"@pid":"41/6461","text":"Paul Libbrecht"}},"title":"Escaping the Trap of too Precise Topic Queries","venue":"CoRR","volume":"abs/1305.5724","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-5724","ee":"http://arxiv.org/abs/1305.5724","url":"https://dblp.org/rec/journals/corr/abs-1305-5724"}, "url":"URL#4263296" }, { "@score":"1", "@id":"4263297", "info":{"authors":{"author":[{"@pid":"96/2352","text":"Ali El-Zaart"},{"@pid":"130/4060","text":"Wafaa Kamel Al-Jibory"}]},"title":"Edge Detection in Radar Images Using Weibull Distribution","venue":"CoRR","volume":"abs/1305.5728","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-5728","ee":"http://arxiv.org/abs/1305.5728","url":"https://dblp.org/rec/journals/corr/abs-1305-5728"}, "url":"URL#4263297" }, { "@score":"1", "@id":"4263298", "info":{"authors":{"author":[{"@pid":"117/4296","text":"Yin Song"},{"@pid":"14/2589","text":"Longbing Cao"},{"@pid":"117/4874","text":"Xuhui Fan 0001"},{"@pid":"54/6265","text":"Wei Cao"},{"@pid":"07/314","text":"Jian Zhang"}]},"title":"Characterizing A Database of Sequential Behaviors with Latent Dirichlet Hidden Markov Models","venue":"CoRR","volume":"abs/1305.5734","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-5734","ee":"http://arxiv.org/abs/1305.5734","url":"https://dblp.org/rec/journals/corr/abs-1305-5734"}, "url":"URL#4263298" }, { "@score":"1", "@id":"4263299", "info":{"authors":{"author":[{"@pid":"83/1964","text":"Khalid Raza"},{"@pid":"130/3965","text":"Rajni Jaiswal"}]},"title":"Reconstruction and Analysis of Cancer-specific Gene Regulatory Networks from Gene Expression Profiles","venue":"CoRR","volume":"abs/1305.5750","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-5750","ee":"http://arxiv.org/abs/1305.5750","url":"https://dblp.org/rec/journals/corr/abs-1305-5750"}, "url":"URL#4263299" }, { "@score":"1", "@id":"4263300", "info":{"authors":{"author":[{"@pid":"b/PeterBruza","text":"Peter D. Bruza"},{"@pid":"11/3579","text":"Kirsty Kitto"},{"@pid":"130/3960","text":"Brentyn J. Ramm"},{"@pid":"07/1779","text":"Laurianne Sitbon"}]},"title":"A probabilistic framework for analysing the compositionality of conceptual combinations","venue":"CoRR","volume":"abs/1305.5753","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-5753","ee":"http://arxiv.org/abs/1305.5753","url":"https://dblp.org/rec/journals/corr/abs-1305-5753"}, "url":"URL#4263300" }, { "@score":"1", "@id":"4263301", "info":{"authors":{"author":{"@pid":"30/4923","text":"Fernand Meyer"}},"title":"Flooding edge or node weighted graphs","venue":"CoRR","volume":"abs/1305.5756","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-5756","ee":"http://arxiv.org/abs/1305.5756","url":"https://dblp.org/rec/journals/corr/abs-1305-5756"}, "url":"URL#4263301" }, { "@score":"1", "@id":"4263302", "info":{"authors":{"author":{"@pid":"12/1055-1","text":"Fang Wei-Kleiner"}},"title":"Tree Decomposition based Steiner Tree Computation over Large Graphs","venue":"CoRR","volume":"abs/1305.5757","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-5757","ee":"http://arxiv.org/abs/1305.5757","url":"https://dblp.org/rec/journals/corr/abs-1305-5757"}, "url":"URL#4263302" }, { "@score":"1", "@id":"4263303", "info":{"authors":{"author":[{"@pid":"w/ZhengWang13","text":"Zheng Wang 0013"},{"@pid":"11/8000","text":"Shuiyin Liu"},{"@pid":"11/916","text":"Cong Ling 0001"}]},"title":"Decoding by Sampling II: Derandomization and Soft-output Decoding","venue":"CoRR","volume":"abs/1305.5762","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-5762","ee":"http://arxiv.org/abs/1305.5762","url":"https://dblp.org/rec/journals/corr/abs-1305-5762"}, "url":"URL#4263303" }, { "@score":"1", "@id":"4263304", "info":{"authors":{"author":[{"@pid":"346/1196","text":"Oktay Ölmez"},{"@pid":"08/6089","text":"Aditya Ramamoorthy"}]},"title":"Replication based storage systems with local repair","venue":"CoRR","volume":"abs/1305.5764","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-5764","ee":"http://arxiv.org/abs/1305.5764","url":"https://dblp.org/rec/journals/corr/abs-1305-5764"}, "url":"URL#4263304" }, { "@score":"1", "@id":"4263305", "info":{"authors":{"author":{"@pid":"s/MosheSchwartz","text":"Moshe Schwartz 0001"}},"title":"Gray codes for vector spaces","venue":"CoRR","volume":"abs/1305.5765","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-5765","ee":"http://arxiv.org/abs/1305.5765","url":"https://dblp.org/rec/journals/corr/abs-1305-5765"}, "url":"URL#4263305" }, { "@score":"1", "@id":"4263306", "info":{"authors":{"author":[{"@pid":"23/4583","text":"Shmuel Friedland"},{"@pid":"42/6066-3","text":"Qun Li 0003"},{"@pid":"32/6590","text":"Dan Schonfeld"}]},"title":"Generalized Tensor Compressive Sensing","venue":"CoRR","volume":"abs/1305.5777","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-5777","ee":"http://arxiv.org/abs/1305.5777","url":"https://dblp.org/rec/journals/corr/abs-1305-5777"}, "url":"URL#4263306" }, { "@score":"1", "@id":"4263307", "info":{"authors":{"author":[{"@pid":"130/3978","text":"Christopher Aicher"},{"@pid":"44/9367","text":"Abigail Z. Jacobs"},{"@pid":"97/4275","text":"Aaron Clauset"}]},"title":"Adapting the Stochastic Block Model to Edge-Weighted Networks","venue":"CoRR","volume":"abs/1305.5782","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-5782","ee":"http://arxiv.org/abs/1305.5782","url":"https://dblp.org/rec/journals/corr/abs-1305-5782"}, "url":"URL#4263307" }, { "@score":"1", "@id":"4263308", "info":{"authors":{"author":[{"@pid":"37/44","text":"Vivek Srikumar"},{"@pid":"r/DanRoth","text":"Dan Roth"}]},"title":"An Inventory of Preposition Relations","venue":"CoRR","volume":"abs/1305.5785","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-5785","ee":"http://arxiv.org/abs/1305.5785","url":"https://dblp.org/rec/journals/corr/abs-1305-5785"}, "url":"URL#4263308" }, { "@score":"1", "@id":"4263309", "info":{"authors":{"author":{"@pid":"97/1370","text":"Marius Buliga"}},"title":"Graphic lambda calculus","venue":"CoRR","volume":"abs/1305.5786","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-5786","ee":"http://arxiv.org/abs/1305.5786","url":"https://dblp.org/rec/journals/corr/abs-1305-5786"}, "url":"URL#4263309" }, { "@score":"1", "@id":"4263310", "info":{"authors":{"author":[{"@pid":"71/3576","text":"Luca Consolini"},{"@pid":"21/4872","text":"Manfredi Maggiore"}]},"title":"Control of a Bicycle Using Virtual Holonomic Constraints","venue":"CoRR","volume":"abs/1305.5794","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-5794","ee":"http://arxiv.org/abs/1305.5794","url":"https://dblp.org/rec/journals/corr/abs-1305-5794"}, "url":"URL#4263310" }, { "@score":"1", "@id":"4263311", "info":{"authors":{"author":[{"@pid":"23/8733","text":"Alexandru Cioaca"},{"@pid":"89/2975","text":"Adrian Sandu"},{"@pid":"58/2546","text":"Eric de Sturler"}]},"title":"Efficient methods for computing observation impact in 4D-Var data assimilation","venue":"CoRR","volume":"abs/1305.5796","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-5796","ee":"http://arxiv.org/abs/1305.5796","url":"https://dblp.org/rec/journals/corr/abs-1305-5796"}, "url":"URL#4263311" }, { "@score":"1", "@id":"4263312", "info":{"authors":{"author":[{"@pid":"73/3023","text":"Dave Dice"},{"@pid":"71/1483","text":"Danny Hendler"},{"@pid":"130/3696","text":"Ilya Mirsky"}]},"title":"Lightweight Contention Management for Efficient Compare-and-Swap Operations","venue":"CoRR","volume":"abs/1305.5800","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-5800","ee":"http://arxiv.org/abs/1305.5800","url":"https://dblp.org/rec/journals/corr/abs-1305-5800"}, "url":"URL#4263312" }, { "@score":"1", "@id":"4263313", "info":{"authors":{"author":{"@pid":"70/6578","text":"Robert Piro"}},"title":"Model Theoretic Characterisations of Description Logics","venue":"CoRR","volume":"abs/1305.5820","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-5820","ee":"http://arxiv.org/abs/1305.5820","url":"https://dblp.org/rec/journals/corr/abs-1305-5820"}, "url":"URL#4263313" }, { "@score":"1", "@id":"4263314", "info":{"authors":{"author":[{"@pid":"27/1509","text":"Glencora Borradaile"},{"@pid":"121/3997","text":"Anna Harutyunyan"}]},"title":"Maximum st-flow in directed planar graphs via shortest paths","venue":"CoRR","volume":"abs/1305.5823","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-5823","ee":"http://arxiv.org/abs/1305.5823","url":"https://dblp.org/rec/journals/corr/abs-1305-5823"}, "url":"URL#4263314" }, { "@score":"1", "@id":"4263315", "info":{"authors":{"author":[{"@pid":"76/137","text":"Slim Bouker"},{"@pid":"75/830","text":"Rabie Saidi"},{"@pid":"20/6407","text":"Sadok Ben Yahia"},{"@pid":"10/3832","text":"Engelbert Mephu Nguifo"}]},"title":"Towards a semantic and statistical selection of association rules","venue":"CoRR","volume":"abs/1305.5824","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-5824","ee":"http://arxiv.org/abs/1305.5824","url":"https://dblp.org/rec/journals/corr/abs-1305-5824"}, "url":"URL#4263315" }, { "@score":"1", "@id":"4263316", "info":{"authors":{"author":[{"@pid":"92/6289-27","text":"Jie Chen 0027"},{"@pid":"32/7980","text":"Nannan Cao"},{"@pid":"97/4877","text":"Kian Hsiang Low"},{"@pid":"130/3992","text":"Ruofei Ouyang"},{"@pid":"84/2316","text":"Colin Keng-Yan Tan"},{"@pid":"88/7260","text":"Patrick Jaillet"}]},"title":"Parallel Gaussian Process Regression with Low-Rank Covariance Matrix Approximations","venue":"CoRR","volume":"abs/1305.5826","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-5826","ee":"http://arxiv.org/abs/1305.5826","url":"https://dblp.org/rec/journals/corr/abs-1305-5826"}, "url":"URL#4263316" }, { "@score":"1", "@id":"4263317", "info":{"authors":{"author":[{"@pid":"130/3746","text":"Monica Shekhar"},{"@pid":"124/3798","text":"R. A. K. Saravanaguru"}]},"title":"Semantic Web Search based on Ontology Modeling using Protege Reasoner","venue":"CoRR","volume":"abs/1305.5827","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-5827","ee":"http://arxiv.org/abs/1305.5827","url":"https://dblp.org/rec/journals/corr/abs-1305-5827"}, "url":"URL#4263317" }, { "@score":"1", "@id":"4263318", "info":{"authors":{"author":[{"@pid":"130/3816","text":"Shu-Zhen Lai"},{"@pid":"28/5928","text":"Hou-Biao Li"},{"@pid":"130/3892","text":"Zu-Tao Zhang"}]},"title":"A Symmetric Rank-one Quasi Newton Method for Non-negative Matrix Factorization","venue":"CoRR","volume":"abs/1305.5829","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-5829","ee":"http://arxiv.org/abs/1305.5829","url":"https://dblp.org/rec/journals/corr/abs-1305-5829"}, "url":"URL#4263318" }, { "@score":"1", "@id":"4263319", "info":{"authors":{"author":[{"@pid":"37/8130","text":"Laurent Lessard"},{"@pid":"62/3942","text":"Sanjay Lall"}]},"title":"Convexity of Decentralized Controller Synthesis","venue":"CoRR","volume":"abs/1305.5859","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-5859","ee":"http://arxiv.org/abs/1305.5859","url":"https://dblp.org/rec/journals/corr/abs-1305-5859"}, "url":"URL#4263319" }, { "@score":"1", "@id":"4263320", "info":{"authors":{"author":[{"@pid":"52/94-1","text":"An Liu 0001"},{"@pid":"68/4401","text":"Vincent K. N. Lau"},{"@pid":"59/7964","text":"Liangzhong Ruan"},{"@pid":"56/9060","text":"Junting Chen"},{"@pid":"123/9227","text":"Dengkun Xiao"}]},"title":"Hierarchical Radio Resource Optimization for Heterogeneous Networks with Enhanced Inter-cell Interference Coordination (eICIC)","venue":"CoRR","volume":"abs/1305.5884","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-5884","ee":"http://arxiv.org/abs/1305.5884","url":"https://dblp.org/rec/journals/corr/abs-1305-5884"}, "url":"URL#4263320" }, { "@score":"1", "@id":"4263321", "info":{"authors":{"author":{"@pid":"28/1484","text":"Jaydip Sen"}},"title":"Homomorphic Encryption: Theory & Applications","venue":"CoRR","volume":"abs/1305.5886","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-5886","ee":"http://arxiv.org/abs/1305.5886","url":"https://dblp.org/rec/journals/corr/abs-1305-5886"}, "url":"URL#4263321" }, { "@score":"1", "@id":"4263322", "info":{"authors":{"author":[{"@pid":"08/11141","text":"Farzin Haddadpour"},{"@pid":"16/4129","text":"Mohammad Hossein Yassaee"},{"@pid":"91/4838","text":"Mohammad Reza Aref"},{"@pid":"49/11141","text":"Amin Gohari"}]},"title":"When is it possible to simulate a DMC channel from another?","venue":"CoRR","volume":"abs/1305.5901","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-5901","ee":"http://arxiv.org/abs/1305.5901","url":"https://dblp.org/rec/journals/corr/abs-1305-5901"}, "url":"URL#4263322" }, { "@score":"1", "@id":"4263323", "info":{"authors":{"author":[{"@pid":"p/JustusHPiater","text":"Justus H. Piater"},{"@pid":"17/582","text":"Antonio Jose Rodríguez-Sánchez"}]},"title":"ÖAGM/AAPR 2013 - The 37th Annual Workshop of the Austrian Association for Pattern Recognition","venue":"CoRR","volume":"abs/1305.5905","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-5905","ee":"http://arxiv.org/abs/1305.5905","url":"https://dblp.org/rec/journals/corr/abs-1305-5905"}, "url":"URL#4263323" }, { "@score":"1", "@id":"4263324", "info":{"authors":{"author":[{"@pid":"80/10098","text":"Fahd Ahmed Khan"},{"@pid":"79/3490","text":"Kamel Tourki"},{"@pid":"64/6304","text":"Mohamed-Slim Alouini"},{"@pid":"11/6615","text":"Khalid A. Qaraqe"}]},"title":"Performance of Opportunistic Fixed Gain Bidirectional Relaying With Outdated CSI","venue":"CoRR","volume":"abs/1305.5913","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-5913","ee":"http://arxiv.org/abs/1305.5913","url":"https://dblp.org/rec/journals/corr/abs-1305-5913"}, "url":"URL#4263324" }, { "@score":"1", "@id":"4263325", "info":{"authors":{"author":[{"@pid":"94/8814","text":"Kaixu Zhang"},{"@pid":"95/3291","text":"Maosong Sun"}]},"title":"Reduce Meaningless Words for Joint Chinese Word Segmentation and Part-of-speech Tagging","venue":"CoRR","volume":"abs/1305.5918","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-5918","ee":"http://arxiv.org/abs/1305.5918","url":"https://dblp.org/rec/journals/corr/abs-1305-5918"}, "url":"URL#4263325" }, { "@score":"1", "@id":"4263326", "info":{"authors":{"author":[{"@pid":"19/3240","text":"Baofeng Wu"},{"@pid":"80/3062","text":"Jia Zheng"}]},"title":"A remark on algebraic immunity of Boolean functions","venue":"CoRR","volume":"abs/1305.5919","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-5919","ee":"http://arxiv.org/abs/1305.5919","url":"https://dblp.org/rec/journals/corr/abs-1305-5919"}, "url":"URL#4263326" }, { "@score":"1", "@id":"4263327", "info":{"authors":{"author":{"@pid":"17/7218","text":"Andrew Suk"}},"title":"A note on order-type homogeneous point sets","venue":"CoRR","volume":"abs/1305.5934","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-5934","ee":"http://arxiv.org/abs/1305.5934","url":"https://dblp.org/rec/journals/corr/abs-1305-5934"}, "url":"URL#4263327" }, { "@score":"1", "@id":"4263328", "info":{"authors":{"author":{"@pid":"130/4010","text":"Yichen Huang"}},"title":"Computational complexity of quantum correlation: quantum discord is NP-complete","venue":"CoRR","volume":"abs/1305.5941","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-5941","ee":"http://arxiv.org/abs/1305.5941","url":"https://dblp.org/rec/journals/corr/abs-1305-5941"}, "url":"URL#4263328" }, { "@score":"1", "@id":"4263329", "info":{"authors":{"author":[{"@pid":"117/4343","text":"Weihao Kong"},{"@pid":"33/5448-15","text":"Jian Li 0015"},{"@pid":"14/6841-1","text":"Tao Qin 0001"},{"@pid":"l/TieYanLiu","text":"Tie-Yan Liu"}]},"title":"Revenue Optimization for Group-Buying Websites","venue":"CoRR","volume":"abs/1305.5946","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-5946","ee":"http://arxiv.org/abs/1305.5946","url":"https://dblp.org/rec/journals/corr/abs-1305-5946"}, "url":"URL#4263329" }, { "@score":"1", "@id":"4263330", "info":{"authors":{"author":[{"@pid":"08/8883","text":"Pietro Galliani"},{"@pid":"08/503","text":"Jouko A. Väänänen"}]},"title":"On Dependence Logic","venue":"CoRR","volume":"abs/1305.5948","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-5948","ee":"http://arxiv.org/abs/1305.5948","url":"https://dblp.org/rec/journals/corr/abs-1305-5948"}, "url":"URL#4263330" }, { "@score":"1", "@id":"4263331", "info":{"authors":{"author":[{"@pid":"130/3890","text":"Sandeep Venkatesh"},{"@pid":"129/1381","text":"Shreyas Balakuntala"},{"@pid":"72/8260","text":"Rajarajeswari S."},{"@pid":"130/3885","text":"Nytika N. Shetty"},{"@pid":"130/4076","text":"Namratha Shetty"},{"@pid":"130/3921","text":"Neha Sudhakar"}]},"title":"Agent Based Intelligent Alert System for Smart-Phones","venue":"CoRR","volume":"abs/1305.5950","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-5950","ee":"http://arxiv.org/abs/1305.5950","url":"https://dblp.org/rec/journals/corr/abs-1305-5950"}, "url":"URL#4263331" }, { "@score":"1", "@id":"4263332", "info":{"authors":{"author":[{"@pid":"b/JanABergstra","text":"Jan A. Bergstra"},{"@pid":"06/5142","text":"Karl de Leeuw"}]},"title":"Questions related to Bitcoin and other Informational Money","venue":"CoRR","volume":"abs/1305.5956","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-5956","ee":"http://arxiv.org/abs/1305.5956","url":"https://dblp.org/rec/journals/corr/abs-1305-5956"}, "url":"URL#4263332" }, { "@score":"1", "@id":"4263333", "info":{"authors":{"author":[{"@pid":"21/9790","text":"Ahmed Alsum"},{"@pid":"n/MichaelLNelson","text":"Michael L. Nelson"}]},"title":"ArcLink: Optimization Techniques to Build and Retrieve the Temporal Web Graph","venue":"CoRR","volume":"abs/1305.5959","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-5959","ee":"http://arxiv.org/abs/1305.5959","url":"https://dblp.org/rec/journals/corr/abs-1305-5959"}, "url":"URL#4263333" }, { "@score":"1", "@id":"4263334", "info":{"authors":{"author":[{"@pid":"56/6585","text":"Sheng Huang"},{"@pid":"15/4074","text":"Mikael Skoglund"}]},"title":"Coding for Computing Irreducible Markovian Functions of Sources with Memory","venue":"CoRR","volume":"abs/1305.5960","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-5960","ee":"http://arxiv.org/abs/1305.5960","url":"https://dblp.org/rec/journals/corr/abs-1305-5960"}, "url":"URL#4263334" }, { "@score":"1", "@id":"4263335", "info":{"authors":{"author":[{"@pid":"g/MurdochGabbay","text":"Murdoch James Gabbay"},{"@pid":"g/MichaelGabbay","text":"Michael Gabbay 0001"}]},"title":"Representation and duality of the","venue":"CoRR","volume":"abs/1305.5968","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-5968","ee":"http://arxiv.org/abs/1305.5968","url":"https://dblp.org/rec/journals/corr/abs-1305-5968"}, "url":"URL#4263335" }, { "@score":"1", "@id":"4263336", "info":{"authors":{"author":{"@pid":"17/8035","text":"Laszlo Gyongyosi"}},"title":"The Private Classical Capacity of a Partially Degradable Quantum Channel","venue":"CoRR","volume":"abs/1305.5970","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-5970","ee":"http://arxiv.org/abs/1305.5970","url":"https://dblp.org/rec/journals/corr/abs-1305-5970"}, "url":"URL#4263336" }, { "@score":"1", "@id":"4263337", "info":{"authors":{"author":{"@pid":"130/4046","text":"Xinwen Jiang"}},"title":"A Polynomial Time Algorithm for the Hamilton Circuit Problem","venue":"CoRR","volume":"abs/1305.5976","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-5976","ee":"http://arxiv.org/abs/1305.5976","url":"https://dblp.org/rec/journals/corr/abs-1305-5976"}, "url":"URL#4263337" }, { "@score":"1", "@id":"4263338", "info":{"authors":{"author":[{"@pid":"55/7033","text":"Daqiang Zhang"},{"@pid":"14/1206","text":"Rongbo Zhu"},{"@pid":"130/4050","text":"Shuqiqiu Men"},{"@pid":"97/4817","text":"Vaskar Raychoudhury"}]},"title":"Query Representation with Global Consistency on User Click Graph","venue":"CoRR","volume":"abs/1305.5981","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-5981","ee":"http://arxiv.org/abs/1305.5981","url":"https://dblp.org/rec/journals/corr/abs-1305-5981"}, "url":"URL#4263338" }, { "@score":"1", "@id":"4263339", "info":{"authors":{"author":[{"@pid":"36/10963","text":"Matthieu R. Bloch"},{"@pid":"39/4721","text":"Jörg Kliewer"}]},"title":"Strong Coordination over a Line Network","venue":"CoRR","volume":"abs/1305.5992","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-5992","ee":"http://arxiv.org/abs/1305.5992","url":"https://dblp.org/rec/journals/corr/abs-1305-5992"}, "url":"URL#4263339" }, { "@score":"1", "@id":"4263340", "info":{"authors":{"author":[{"@pid":"85/4090","text":"Stavros G. Kolliopoulos"},{"@pid":"122/4041","text":"Yannis Moysoglou"}]},"title":"Integrality gaps for strengthened LP relaxations of Capacitated and Lower-Bounded Facility Location","venue":"CoRR","volume":"abs/1305.5998","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-5998","ee":"http://arxiv.org/abs/1305.5998","url":"https://dblp.org/rec/journals/corr/abs-1305-5998"}, "url":"URL#4263340" }, { "@score":"1", "@id":"4263341", "info":{"authors":{"author":[{"@pid":"41/439","text":"John C. Duchi"},{"@pid":"j/MichaelIJordan","text":"Michael I. Jordan"},{"@pid":"48/6396","text":"Martin J. Wainwright"}]},"title":"Local Privacy and Minimax Bounds: Sharp Rates for Probability Estimation","venue":"CoRR","volume":"abs/1305.6000","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-6000","ee":"http://arxiv.org/abs/1305.6000","url":"https://dblp.org/rec/journals/corr/abs-1305-6000"}, "url":"URL#4263341" }, { "@score":"1", "@id":"4263342", "info":{"authors":{"author":[{"@pid":"00/8911","text":"Wessam Afifi"},{"@pid":"47/2755","text":"Marwan Krunz"}]},"title":"Exploiting Self-Interference Suppression for Improved Spectrum Awareness/Efficiency in Cognitive Radio Systems","venue":"CoRR","volume":"abs/1305.6003","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-6003","ee":"http://arxiv.org/abs/1305.6003","url":"https://dblp.org/rec/journals/corr/abs-1305-6003"}, "url":"URL#4263342" }, { "@score":"1", "@id":"4263343", "info":{"authors":{"author":[{"@pid":"130/3817","text":"Sheng-Ming Cai"},{"@pid":"22/231-1","text":"Yi Gong 0001"}]},"title":"Cognitive Beamforming for Multiple Secondary Data Streams With Individual SNR Constraints","venue":"CoRR","volume":"abs/1305.6012","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-6012","ee":"http://arxiv.org/abs/1305.6012","url":"https://dblp.org/rec/journals/corr/abs-1305-6012"}, "url":"URL#4263343" }, { "@score":"1", "@id":"4263344", "info":{"authors":{"author":[{"@pid":"44/3546","text":"Guangwu Xu"},{"@pid":"72/51","text":"Zhiqiang Xu"}]},"title":"On the ℓ1-Norm Invariant Convex k-Sparse Decomposition of Signals","venue":"CoRR","volume":"abs/1305.6021","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-6021","ee":"http://arxiv.org/abs/1305.6021","url":"https://dblp.org/rec/journals/corr/abs-1305-6021"}, "url":"URL#4263344" }, { "@score":"1", "@id":"4263345", "info":{"authors":{"author":{"@pid":"96/2992","text":"Mahmoud A. Abdel-Aty"}},"title":"New Index for Quantifying an Individual's Scientific Research Output","venue":"CoRR","volume":"abs/1305.6026","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-6026","ee":"http://arxiv.org/abs/1305.6026","url":"https://dblp.org/rec/journals/corr/abs-1305-6026"}, "url":"URL#4263345" }, { "@score":"1", "@id":"4263346", "info":{"authors":{"author":{"@pid":"70/1794","text":"Tshilidzi Marwala"}},"title":"Semi-bounded Rationality: A model for decision making","venue":"CoRR","volume":"abs/1305.6037","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-6037","ee":"http://arxiv.org/abs/1305.6037","url":"https://dblp.org/rec/journals/corr/abs-1305-6037"}, "url":"URL#4263346" }, { "@score":"1", "@id":"4263347", "info":{"authors":{"author":{"@pid":"130/4033","text":"Daniel Graziotin"}},"title":"The Dynamics of Creativity in Software Development","venue":"CoRR","volume":"abs/1305.6045","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-6045","ee":"http://arxiv.org/abs/1305.6045","url":"https://dblp.org/rec/journals/corr/abs-1305-6045"}, "url":"URL#4263347" }, { "@score":"1", "@id":"4263348", "info":{"authors":{"author":[{"@pid":"130/3983","text":"Sidahmed Mokeddem"},{"@pid":"36/1682","text":"Baghdad Atmani"},{"@pid":"77/7833","text":"Mostéfa Mokaddem"}]},"title":"Supervised Feature Selection for Diagnosis of Coronary Artery Disease Based on Genetic Algorithm","venue":"CoRR","volume":"abs/1305.6046","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-6046","ee":"http://arxiv.org/abs/1305.6046","url":"https://dblp.org/rec/journals/corr/abs-1305-6046"}, "url":"URL#4263348" }, { "@score":"1", "@id":"4263349", "info":{"authors":{"author":{"@pid":"26/5164","text":"William M. Farmer"}},"title":"The Formalization of Syntax-Based Mathematical Algorithms Using Quotation and Evaluation","venue":"CoRR","volume":"abs/1305.6052","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-6052","ee":"http://arxiv.org/abs/1305.6052","url":"https://dblp.org/rec/journals/corr/abs-1305-6052"}, "url":"URL#4263349" }, { "@score":"1", "@id":"4263350", "info":{"authors":{"author":[{"@pid":"130/3900","text":"Timofey E. Samsonov"},{"@pid":"130/3967","text":"Vladimir N. Semin"},{"@pid":"130/4079","text":"Pavel I. Konstantinov"},{"@pid":"130/3891","text":"Mikhail I. Varentzov"}]},"title":"Calculation of geometric characteristics of land cover and urban canyon for multi-scale parameterization of megalopolis meteorological models.","venue":"CoRR","volume":"abs/1305.6067","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-6067","ee":"http://arxiv.org/abs/1305.6067","url":"https://dblp.org/rec/journals/corr/abs-1305-6067"}, "url":"URL#4263350" }, { "@score":"1", "@id":"4263351", "info":{"authors":{"author":[{"@pid":"90/6802","text":"Andreas Holzer"},{"@pid":"s/ChristianSchallhart","text":"Christian Schallhart"},{"@pid":"18/1323","text":"Michael Tautschnig"},{"@pid":"v/HelmutVeith","text":"Helmut Veith"}]},"title":"On the Structure and Complexity of Rational Sets of Regular Languages","venue":"CoRR","volume":"abs/1305.6074","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-6074","ee":"http://arxiv.org/abs/1305.6074","url":"https://dblp.org/rec/journals/corr/abs-1305-6074"}, "url":"URL#4263351" }, { "@score":"1", "@id":"4263352", "info":{"authors":{"author":[{"@pid":"130/3717","text":"Shawn X. Cui"},{"@pid":"f/MichaelHFreedman","text":"Michael H. Freedman"},{"@pid":"97/7989","text":"Zhenghan Wang"}]},"title":"Complexity Classes as Mathematical Axioms II","venue":"CoRR","volume":"abs/1305.6076","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-6076","ee":"http://arxiv.org/abs/1305.6076","url":"https://dblp.org/rec/journals/corr/abs-1305-6076"}, "url":"URL#4263352" }, { "@score":"1", "@id":"4263353", "info":{"authors":{"author":[{"@pid":"56/8263","text":"William Weiliang Li"},{"@pid":"92/3660-1","text":"Yuan Shen 0001"},{"@pid":"18/1437","text":"Ying Jun"},{"@pid":"80/3143","text":"Ying Jun Zhang"},{"@pid":"21/4583","text":"Moe Z. Win"}]},"title":"Robust power allocation for energy-efficient location aware networks","venue":"CoRR","volume":"abs/1305.6091","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-6091","ee":"http://arxiv.org/abs/1305.6091","url":"https://dblp.org/rec/journals/corr/abs-1305-6091"}, "url":"URL#4263353" }, { "@score":"1", "@id":"4263354", "info":{"authors":{"author":[{"@pid":"98/4158","text":"Jun-ichi Yamamoto"},{"@pid":"95/2224","text":"Tomohiro I"},{"@pid":"44/2355","text":"Hideo Bannai"},{"@pid":"88/1129","text":"Shunsuke Inenaga"},{"@pid":"35/1544","text":"Masayuki Takeda"}]},"title":"Faster Compact On-Line Lempel-Ziv Factorization","venue":"CoRR","volume":"abs/1305.6095","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-6095","ee":"http://arxiv.org/abs/1305.6095","url":"https://dblp.org/rec/journals/corr/abs-1305-6095"}, "url":"URL#4263354" }, { "@score":"1", "@id":"4263355", "info":{"authors":{"author":{"@pid":"84/2955","text":"Keehang Kwon"}},"title":"Bounded Inputs for Logic Programming","venue":"CoRR","volume":"abs/1305.6108","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-6108","ee":"http://arxiv.org/abs/1305.6108","url":"https://dblp.org/rec/journals/corr/abs-1305-6108"}, "url":"URL#4263355" }, { "@score":"1", "@id":"4263356", "info":{"authors":{"author":[{"@pid":"130/3778","text":"S. M. M. M. Kalyan Kumar"},{"@pid":"130/3735","text":"S. C. Pradhan"}]},"title":"Building Internal Cloud at NIC : A Preview","venue":"CoRR","volume":"abs/1305.6123","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-6123","ee":"http://arxiv.org/abs/1305.6123","url":"https://dblp.org/rec/journals/corr/abs-1305-6123"}, "url":"URL#4263356" }, { "@score":"1", "@id":"4263357", "info":{"authors":{"author":{"@pid":"58/5154","text":"Tuvi Etzion"}},"title":"Problems on q-Analogs in Coding Theory","venue":"CoRR","volume":"abs/1305.6126","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-6126","ee":"http://arxiv.org/abs/1305.6126","url":"https://dblp.org/rec/journals/corr/abs-1305-6126"}, "url":"URL#4263357" }, { "@score":"1", "@id":"4263358", "info":{"authors":{"author":[{"@pid":"97/4877","text":"Kian Hsiang Low"},{"@pid":"52/532","text":"John M. Dolan"},{"@pid":"k/PradeepKKhosla","text":"Pradeep K. Khosla"}]},"title":"Information-Theoretic Approach to Efficient Adaptive Path Planning for Mobile Robotic Environmental Sensing","venue":"CoRR","volume":"abs/1305.6129","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-6129","ee":"http://arxiv.org/abs/1305.6129","url":"https://dblp.org/rec/journals/corr/abs-1305-6129"}, "url":"URL#4263358" }, { "@score":"1", "@id":"4263359", "info":{"authors":{"author":[{"@pid":"130/3934","text":"Khushraj Madnani"},{"@pid":"k/SNKrishna","text":"Shankara Narayanan Krishna"},{"@pid":"24/3624","text":"Paritosh K. Pandya"}]},"title":"On the Decidability and Complexity of Some Fragments of Metric Temporal Logic","venue":"CoRR","volume":"abs/1305.6137","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-6137","ee":"http://arxiv.org/abs/1305.6137","url":"https://dblp.org/rec/journals/corr/abs-1305-6137"}, "url":"URL#4263359" }, { "@score":"1", "@id":"4263360", "info":{"authors":{"author":[{"@pid":"130/3835","text":"Vivek Narayanan"},{"@pid":"130/3809","text":"Ishan Arora"},{"@pid":"130/3729","text":"Arjun Bhatia"}]},"title":"Fast and accurate sentiment classification using an enhanced Naive Bayes model","venue":"CoRR","volume":"abs/1305.6143","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-6143","ee":"http://arxiv.org/abs/1305.6143","url":"https://dblp.org/rec/journals/corr/abs-1305-6143"}, "url":"URL#4263360" }, { "@score":"1", "@id":"4263361", "info":{"authors":{"author":[{"@pid":"24/1541","text":"Tien Tuan Anh Dinh"},{"@pid":"d/AnwitamanDatta","text":"Anwitaman Datta"}]},"title":"Streamforce: outsourcing access control enforcement for stream data to the clouds","venue":"CoRR","volume":"abs/1305.6146","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-6146","ee":"http://arxiv.org/abs/1305.6146","url":"https://dblp.org/rec/journals/corr/abs-1305-6146"}, "url":"URL#4263361" }, { "@score":"1", "@id":"4263362", "info":{"authors":{"author":[{"@pid":"75/1358","text":"Kien T. Truong"},{"@pid":"56/4851","text":"Robert W. Heath Jr."}]},"title":"Effects of Channel Aging in Massive MIMO Systems","venue":"CoRR","volume":"abs/1305.6151","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-6151","ee":"http://arxiv.org/abs/1305.6151","url":"https://dblp.org/rec/journals/corr/abs-1305-6151"}, "url":"URL#4263362" }, { "@score":"1", "@id":"4263363", "info":{"authors":{"author":[{"@pid":"89/3451","text":"Namyoon Lee"},{"@pid":"21/9365","text":"Xingqin Lin"},{"@pid":"84/4900","text":"Jeffrey G. Andrews"},{"@pid":"56/4851","text":"Robert W. Heath Jr."}]},"title":"Power Control for D2D Underlaid Cellular Networks: Modeling, Algorithms and Analysis","venue":"CoRR","volume":"abs/1305.6161","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-6161","ee":"http://arxiv.org/abs/1305.6161","url":"https://dblp.org/rec/journals/corr/abs-1305-6161"}, "url":"URL#4263363" }, { "@score":"1", "@id":"4263364", "info":{"authors":{"author":[{"@pid":"14/1106","text":"Ron Aharoni"},{"@pid":"71/6622","text":"Pierre Charbit"},{"@pid":"97/6766-2","text":"David M. Howard 0002"}]},"title":"On a Generalization of the Ryser-Brualdi-Stein Conjecture","venue":"CoRR","volume":"abs/1305.6164","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-6164","ee":"http://arxiv.org/abs/1305.6164","url":"https://dblp.org/rec/journals/corr/abs-1305-6164"}, "url":"URL#4263364" }, { "@score":"1", "@id":"4263365", "info":{"authors":{"author":[{"@pid":"127/0009","text":"Shangdi Chen"},{"@pid":"52/266","text":"Dawei Zhao"}]},"title":"New Construction of Authentication Codes with Arbitration from Pseudo-Symplectic Geometry over Finite Fields","venue":"CoRR","volume":"abs/1305.6175","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-6175","ee":"http://arxiv.org/abs/1305.6175","url":"https://dblp.org/rec/journals/corr/abs-1305-6175"}, "url":"URL#4263365" }, { "@score":"1", "@id":"4263366", "info":{"authors":{"author":{"@pid":"36/5639","text":"Tom Hirschowitz"}},"title":"Full abstraction for fair testing in CCS","venue":"CoRR","volume":"abs/1305.6184","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-6184","ee":"http://arxiv.org/abs/1305.6184","url":"https://dblp.org/rec/journals/corr/abs-1305-6184"}, "url":"URL#4263366" }, { "@score":"1", "@id":"4263367", "info":{"authors":{"author":{"@pid":"56/661","text":"Steven D. Prestwich"}},"title":"Improved Branch-and-Bound for Low Autocorrelation Binary Sequences","venue":"CoRR","volume":"abs/1305.6187","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-6187","ee":"http://arxiv.org/abs/1305.6187","url":"https://dblp.org/rec/journals/corr/abs-1305-6187"}, "url":"URL#4263367" }, { "@score":"1", "@id":"4263368", "info":{"authors":{"author":[{"@pid":"30/10480","text":"Iulia Dumitru"},{"@pid":"31/8136","text":"Grigore Stamatescu"},{"@pid":"50/4878","text":"Ioana Fagarasan"},{"@pid":"08/10480","text":"Sergiu Stelian Iliescu"}]},"title":"Dynamic Management Techniques for Increasing Energy Efficiency within a Data Center","venue":"CoRR","volume":"abs/1305.6203","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-6203","ee":"http://arxiv.org/abs/1305.6203","url":"https://dblp.org/rec/journals/corr/abs-1305-6203"}, "url":"URL#4263368" }, { "@score":"1", "@id":"4263369", "info":{"authors":{"author":{"@pid":"02/5652","text":"Dimitris Kugiumtzis"}},"title":"Direct coupling information measure from non-uniform embedding","venue":"CoRR","volume":"abs/1305.6204","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-6204","ee":"http://arxiv.org/abs/1305.6204","url":"https://dblp.org/rec/journals/corr/abs-1305-6204"}, "url":"URL#4263369" }, { "@score":"1", "@id":"4263370", "info":{"authors":{"author":{"@pid":"26/5164","text":"William M. Farmer"}},"title":"Chiron: A Set Theory with Types, Undefinedness, Quotation, and Evaluation","venue":"CoRR","volume":"abs/1305.6206","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-6206","ee":"http://arxiv.org/abs/1305.6206","url":"https://dblp.org/rec/journals/corr/abs-1305-6206"}, "url":"URL#4263370" }, { "@score":"1", "@id":"4263371", "info":{"authors":{"author":[{"@pid":"130/3884","text":"Snigdha Paul"},{"@pid":"117/9131","text":"Nisheeth Joshi"},{"@pid":"117/9130","text":"Iti Mathur"}]},"title":"Development of a Hindi Lemmatizer","venue":"CoRR","volume":"abs/1305.6211","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-6211","ee":"http://arxiv.org/abs/1305.6211","url":"https://dblp.org/rec/journals/corr/abs-1305-6211"}, "url":"URL#4263371" }, { "@score":"1", "@id":"4263372", "info":{"authors":{"author":{"@pid":"81/6780","text":"Jean-François Bercher"}},"title":"Some results on a $χ$-divergence, an~extended~Fisher information and~generalized~Cramér-Rao inequalities","venue":"CoRR","volume":"abs/1305.6213","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-6213","ee":"http://arxiv.org/abs/1305.6213","url":"https://dblp.org/rec/journals/corr/abs-1305-6213"}, "url":"URL#4263372" }, { "@score":"1", "@id":"4263373", "info":{"authors":{"author":{"@pid":"81/6780","text":"Jean-François Bercher"}},"title":"On some interrelations of generalized $q$-entropies and a generalized Fisher information, including a Cramér-Rao inequality","venue":"CoRR","volume":"abs/1305.6215","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-6215","ee":"http://arxiv.org/abs/1305.6215","url":"https://dblp.org/rec/journals/corr/abs-1305-6215"}, "url":"URL#4263373" }, { "@score":"1", "@id":"4263374", "info":{"authors":{"author":[{"@pid":"97/10365","text":"Vikram Arkalgud Chandrasetty"},{"@pid":"94/4757","text":"Syed Mahfuzul Aziz"}]},"title":"Resource Efficient LDPC Decoders for Multimedia Communication","venue":"CoRR","volume":"abs/1305.6216","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-6216","ee":"http://arxiv.org/abs/1305.6216","url":"https://dblp.org/rec/journals/corr/abs-1305-6216"}, "url":"URL#4263374" }, { "@score":"1", "@id":"4263375", "info":{"authors":{"author":{"@pid":"85/2104","text":"Michael J. Barber"}},"title":"Detecting hierarchical and overlapping network communities using locally optimal modularity changes","venue":"CoRR","volume":"abs/1305.6228","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-6228","ee":"http://arxiv.org/abs/1305.6228","url":"https://dblp.org/rec/journals/corr/abs-1305-6228"}, "url":"URL#4263375" }, { "@score":"1", "@id":"4263376", "info":{"authors":{"author":[{"@pid":"31/8136","text":"Grigore Stamatescu"},{"@pid":"90/9492","text":"Valentin Sgarciu"}]},"title":"Integration of Wireless Sensor Networks with Virtual Instrumentation in a Residential Environment","venue":"CoRR","volume":"abs/1305.6229","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-6229","ee":"http://arxiv.org/abs/1305.6229","url":"https://dblp.org/rec/journals/corr/abs-1305-6229"}, "url":"URL#4263376" }, { "@score":"1", "@id":"4263377", "info":{"authors":{"author":{"@pid":"11/145","text":"Richard Moot"}},"title":"Extended Lambek calculi and first-order linear logic","venue":"CoRR","volume":"abs/1305.6238","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-6238","ee":"http://arxiv.org/abs/1305.6238","url":"https://dblp.org/rec/journals/corr/abs-1305-6238"}, "url":"URL#4263377" }, { "@score":"1", "@id":"4263378", "info":{"authors":{"author":[{"@pid":"83/4438","text":"Frédéric Chazal"},{"@pid":"90/1249","text":"Marc Glisse"},{"@pid":"130/3715","text":"Catherine Labruère"},{"@pid":"87/10469","text":"Bertrand Michel"}]},"title":"Optimal rates of convergence for persistence diagrams in Topological Data Analysis","venue":"CoRR","volume":"abs/1305.6239","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-6239","ee":"http://arxiv.org/abs/1305.6239","url":"https://dblp.org/rec/journals/corr/abs-1305-6239"}, "url":"URL#4263378" }, { "@score":"1", "@id":"4263379", "info":{"authors":{"author":[{"@pid":"130/3753","text":"Zhengchao Wei"},{"@pid":"37/2197","text":"Zhi Ma"}]},"title":"Easily Implemented Rate Compatible Reconciliation Protocol for Quantum Key Distribution","venue":"CoRR","volume":"abs/1305.6244","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-6244","ee":"http://arxiv.org/abs/1305.6244","url":"https://dblp.org/rec/journals/corr/abs-1305-6244"}, "url":"URL#4263379" }, { "@score":"1", "@id":"4263380", "info":{"authors":{"author":[{"@pid":"69/2663","text":"Anastasios Giovanidis"},{"@pid":"b/FrancoisBaccelli","text":"François Baccelli"}]},"title":"A Stochastic Geometry Framework for Analyzing Pairwise-Cooperative Cellular Networks","venue":"CoRR","volume":"abs/1305.6254","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-6254","ee":"http://arxiv.org/abs/1305.6254","url":"https://dblp.org/rec/journals/corr/abs-1305-6254"}, "url":"URL#4263380" }, { "@score":"1", "@id":"4263381", "info":{"authors":{"author":[{"@pid":"49/8315","text":"Olesya Mryglod"},{"@pid":"28/8263","text":"Ralph Kenna"},{"@pid":"54/8317","text":"Yurij Holovatch"},{"@pid":"24/8261","text":"Bertrand Berche"}]},"title":"Comparison of a citation-based indicator and peer review for absolute and specific measures of research-group excellence","venue":"CoRR","volume":"abs/1305.6256","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-6256","ee":"http://arxiv.org/abs/1305.6256","url":"https://dblp.org/rec/journals/corr/abs-1305-6256"}, "url":"URL#4263381" }, { "@score":"1", "@id":"4263382", "info":{"authors":{"author":{"@pid":"g/MurdochGabbay","text":"Murdoch James Gabbay"}},"title":"Semantics out of context: nominal absolute denotations for first-order logic and computation","venue":"CoRR","volume":"abs/1305.6291","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-6291","ee":"http://arxiv.org/abs/1305.6291","url":"https://dblp.org/rec/journals/corr/abs-1305-6291"}, "url":"URL#4263382" }, { "@score":"1", "@id":"4263383", "info":{"authors":{"author":[{"@pid":"78/9428","text":"Juri Ranieri"},{"@pid":"23/127","text":"Amina Chebira"},{"@pid":"v/MVetterli","text":"Martin Vetterli"}]},"title":"Near-Optimal Sensor Placement for Inverse Problems","venue":"CoRR","volume":"abs/1305.6292","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-6292","ee":"http://arxiv.org/abs/1305.6292","url":"https://dblp.org/rec/journals/corr/abs-1305-6292"}, "url":"URL#4263383" }, { "@score":"1", "@id":"4263384", "info":{"authors":{"author":[{"@pid":"80/1194","text":"Lisi D'Alfonso"},{"@pid":"73/6179","text":"Gabriela Jeronimo"},{"@pid":"84/6203","text":"Pablo Solernó"}]},"title":"Effective Differential Nullstellensatz for Ordinary DAE Systems over the Complex Numbers","venue":"CoRR","volume":"abs/1305.6298","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-6298","ee":"http://arxiv.org/abs/1305.6298","url":"https://dblp.org/rec/journals/corr/abs-1305-6298"}, "url":"URL#4263384" }, { "@score":"1", "@id":"4263385", "info":{"authors":{"author":[{"@pid":"67/941","text":"Leslie Ann Goldberg"},{"@pid":"j/MarkJerrum","text":"Mark Jerrum"}]},"title":"The Complexity of Approximately Counting Tree Homomorphisms","venue":"CoRR","volume":"abs/1305.6306","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-6306","ee":"http://arxiv.org/abs/1305.6306","url":"https://dblp.org/rec/journals/corr/abs-1305-6306"}, "url":"URL#4263385" }, { "@score":"1", "@id":"4263386", "info":{"authors":{"author":[{"@pid":"130/3788","text":"Cristóbal A. Navarro"},{"@pid":"130/4073","text":"Fabrizio Canfora"},{"@pid":"h/NancyHitschfeldKahler","text":"Nancy Hitschfeld-Kahler"}]},"title":"Multi-core computation of transfer matrices for strip lattices in the Potts model","venue":"CoRR","volume":"abs/1305.6325","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-6325","ee":"http://arxiv.org/abs/1305.6325","url":"https://dblp.org/rec/journals/corr/abs-1305-6325"}, "url":"URL#4263386" }, { "@score":"1", "@id":"4263387", "info":{"authors":{"author":{"@pid":"130/3815","text":"Kristin Grace Erickson"}},"title":"The Story of Telebrain: A multi-performer telematic platform for performatization","venue":"CoRR","volume":"abs/1305.6332","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-6332","ee":"http://arxiv.org/abs/1305.6332","url":"https://dblp.org/rec/journals/corr/abs-1305-6332"}, "url":"URL#4263387" }, { "@score":"1", "@id":"4263388", "info":{"authors":{"author":[{"@pid":"98/6670","text":"Rodrigo C. de Lamare"},{"@pid":"34/5084","text":"Raimundo Sampaio Neto"}]},"title":"Adaptive Reduced-Rank Processing Using a Projection Operator Based on Joint Iterative Optimization of Adaptive Filters For CDMA Interference Suppression.","venue":"CoRR","volume":"abs/1305.6336","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-6336","ee":"http://arxiv.org/abs/1305.6336","url":"https://dblp.org/rec/journals/corr/abs-1305-6336"}, "url":"URL#4263388" }, { "@score":"1", "@id":"4263389", "info":{"authors":{"author":[{"@pid":"25/531-2","text":"Jasleen Kaur 0002"},{"@pid":"95/4719","text":"Filippo Radicchi"},{"@pid":"79/3056","text":"Filippo Menczer"}]},"title":"Universality of scholarly impact metrics","venue":"CoRR","volume":"abs/1305.6339","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-6339","ee":"http://arxiv.org/abs/1305.6339","url":"https://dblp.org/rec/journals/corr/abs-1305-6339"}, "url":"URL#4263389" }, { "@score":"1", "@id":"4263390", "info":{"authors":{"author":{"@pid":"35/3195","text":"Vance Faber"}},"title":"Global communication algorithms for Cayley graphs","venue":"CoRR","volume":"abs/1305.6349","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-6349","ee":"http://arxiv.org/abs/1305.6349","url":"https://dblp.org/rec/journals/corr/abs-1305-6349"}, "url":"URL#4263390" }, { "@score":"1", "@id":"4263391", "info":{"authors":{"author":[{"@pid":"52/266","text":"Dawei Zhao"},{"@pid":"40/1762","text":"Haipeng Peng"},{"@pid":"22/10176","text":"Shudong Li"},{"@pid":"33/5774","text":"Yixian Yang"}]},"title":"An efficient dynamic ID based remote user authentication scheme using self-certified public keys for multi-server environment","venue":"CoRR","volume":"abs/1305.6350","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-6350","ee":"http://arxiv.org/abs/1305.6350","url":"https://dblp.org/rec/journals/corr/abs-1305-6350"}, "url":"URL#4263391" }, { "@score":"1", "@id":"4263392", "info":{"authors":{"author":[{"@pid":"87/4746","text":"S. Karimi"},{"@pid":"28/1549","text":"K. B. Nakshatrala"}]},"title":"On multi-time-step monolithic coupling algorithms for elastodynamics","venue":"CoRR","volume":"abs/1305.6355","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-6355","ee":"http://arxiv.org/abs/1305.6355","url":"https://dblp.org/rec/journals/corr/abs-1305-6355"}, "url":"URL#4263392" }, { "@score":"1", "@id":"4263393", "info":{"authors":{"author":[{"@pid":"130/4028","text":"Melor Md. Yunus"},{"@pid":"130/4019","text":"Julian Lau Kiing Tuan"},{"@pid":"130/4036","text":"Hadi Salehi"}]},"title":"Using Blogs to Promote Writing Skill in ESL Classroom","venue":"CoRR","volume":"abs/1305.6358","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-6358","ee":"http://arxiv.org/abs/1305.6358","url":"https://dblp.org/rec/journals/corr/abs-1305-6358"}, "url":"URL#4263393" }, { "@score":"1", "@id":"4263394", "info":{"authors":{"author":[{"@pid":"130/4028","text":"Melor Md. Yunus"},{"@pid":"130/4036","text":"Hadi Salehi"},{"@pid":"130/3907","text":"Dexter Sigan Anak John"}]},"title":"Using Visual Aids as a Motivational Tool in Enhancing Students Interest in Reading Literary Texts","venue":"CoRR","volume":"abs/1305.6360","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-6360","ee":"http://arxiv.org/abs/1305.6360","url":"https://dblp.org/rec/journals/corr/abs-1305-6360"}, "url":"URL#4263394" }, { "@score":"1", "@id":"4263395", "info":{"authors":{"author":[{"@pid":"06/4676-4","text":"Xiao Liang 0004"},{"@pid":"27/3251","text":"Jichang Zhao"},{"@pid":"85/5090-4","text":"Li Dong 0004"},{"@pid":"x/KeXu","text":"Ke Xu 0001"}]},"title":"Unraveling the origin of exponential law in intra-urban human mobility","venue":"CoRR","volume":"abs/1305.6364","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-6364","ee":"http://arxiv.org/abs/1305.6364","url":"https://dblp.org/rec/journals/corr/abs-1305-6364"}, "url":"URL#4263395" }, { "@score":"1", "@id":"4263396", "info":{"authors":{"author":{"@pid":"130/3709","text":"Frank Vanderzwet"}},"title":"Fractional Pebbling Game Lower Bounds","venue":"CoRR","volume":"abs/1305.6376","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-6376","ee":"http://arxiv.org/abs/1305.6376","url":"https://dblp.org/rec/journals/corr/abs-1305-6376"}, "url":"URL#4263396" }, { "@score":"1", "@id":"4263397", "info":{"authors":{"author":[{"@pid":"130/3911","text":"Minh H.-T. Nguyen"},{"@pid":"38/6972","text":"Kok Kiong Tan"},{"@pid":"122/6883","text":"Wenyu Liang"},{"@pid":"237/1458","text":"Chek Sing Teo"}]},"title":"Robust Precision Positioning Control on Linear Ultrasonic Motor","venue":"CoRR","volume":"abs/1305.6379","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-6379","ee":"http://arxiv.org/abs/1305.6379","url":"https://dblp.org/rec/journals/corr/abs-1305-6379"}, "url":"URL#4263397" }, { "@score":"1", "@id":"4263398", "info":{"authors":{"author":[{"@pid":"19/6762","text":"Jörg Hendrik Kappes"},{"@pid":"48/9935","text":"Markus Speth"},{"@pid":"92/260","text":"Gerhard Reinelt"},{"@pid":"59/5226","text":"Christoph Schnörr"}]},"title":"Higher-order Segmentation via Multicuts","venue":"CoRR","volume":"abs/1305.6387","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-6387","ee":"http://arxiv.org/abs/1305.6387","url":"https://dblp.org/rec/journals/corr/abs-1305-6387"}, "url":"URL#4263398" }, { "@score":"1", "@id":"4263399", "info":{"authors":{"author":[{"@pid":"117/3395","text":"Yu-e Sun"},{"@pid":"75/4947-1","text":"He Huang 0001"},{"@pid":"l/XiangYangLi","text":"Xiang-Yang Li 0001"},{"@pid":"22/5227","text":"Zhili Chen"},{"@pid":"03/1094-11","text":"Wei Yang 0011"},{"@pid":"22/1748","text":"Hongli Xu"},{"@pid":"51/769","text":"Liusheng Huang"}]},"title":"Near-Optimal Truthful Auction Mechanisms in Secondary Spectrum Markets","venue":"CoRR","volume":"abs/1305.6390","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-6390","ee":"http://arxiv.org/abs/1305.6390","url":"https://dblp.org/rec/journals/corr/abs-1305-6390"}, "url":"URL#4263399" }, { "@score":"1", "@id":"4263400", "info":{"authors":{"author":[{"@pid":"130/3773","text":"Minh Hoang-Tuan Nguyen"},{"@pid":"38/6972","text":"Kok Kiong Tan"},{"@pid":"61/1681","text":"Sunan Huang 0001"}]},"title":"Enhanced Predictive Ratio Control of Interacting Systems","venue":"CoRR","volume":"abs/1305.6394","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-6394","ee":"http://arxiv.org/abs/1305.6394","url":"https://dblp.org/rec/journals/corr/abs-1305-6394"}, "url":"URL#4263400" }, { "@score":"1", "@id":"4263401", "info":{"authors":{"author":[{"@pid":"77/9958","text":"Golnaz Badkobeh"},{"@pid":"81/6991","text":"Gabriele Fici"},{"@pid":"l/ZsuzsannaLiptak","text":"Zsuzsanna Lipták"}]},"title":"A Note on Words With the Smallest Number of Closed Factors","venue":"CoRR","volume":"abs/1305.6395","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-6395","ee":"http://arxiv.org/abs/1305.6395","url":"https://dblp.org/rec/journals/corr/abs-1305-6395"}, "url":"URL#4263401" }, { "@score":"1", "@id":"4263402", "info":{"authors":{"author":[{"@pid":"130/3773","text":"Minh Hoang-Tuan Nguyen"},{"@pid":"38/6972","text":"Kok Kiong Tan"}]},"title":"From Parametric Model-based Optimization to robust PID Gain Scheduling","venue":"CoRR","volume":"abs/1305.6402","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-6402","ee":"http://arxiv.org/abs/1305.6402","url":"https://dblp.org/rec/journals/corr/abs-1305-6402"}, "url":"URL#4263402" }, { "@score":"1", "@id":"4263403", "info":{"authors":{"author":[{"@pid":"45/1753","text":"Andrea Cerri"},{"@pid":"96/1001","text":"Claudia Landi 0001"}]},"title":"Stability of persistence spaces of vector-valued continuous functions","venue":"CoRR","volume":"abs/1305.6425","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-6425","ee":"http://arxiv.org/abs/1305.6425","url":"https://dblp.org/rec/journals/corr/abs-1305-6425"}, "url":"URL#4263403" }, { "@score":"1", "@id":"4263404", "info":{"authors":{"author":[{"@pid":"52/2179","text":"Michael Small"},{"@pid":"44/6690","text":"Kevin Judd"},{"@pid":"116/3069","text":"Thomas Stemler"}]},"title":"What is preferential to preferential attachment?","venue":"CoRR","volume":"abs/1305.6429","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-6429","ee":"http://arxiv.org/abs/1305.6429","url":"https://dblp.org/rec/journals/corr/abs-1305-6429"}, "url":"URL#4263404" }, { "@score":"1", "@id":"4263405", "info":{"authors":{"author":[{"@pid":"14/3633","text":"Peter T. Breuer"},{"@pid":"b/JonathanPBowen","text":"Jonathan P. Bowen"}]},"title":"Towards Proving RISC Machine Code not Risky with respect to Memory Aliasing","venue":"CoRR","volume":"abs/1305.6431","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-6431","ee":"http://arxiv.org/abs/1305.6431","url":"https://dblp.org/rec/journals/corr/abs-1305-6431"}, "url":"URL#4263405" }, { "@score":"1", "@id":"4263406", "info":{"authors":{"author":[{"@pid":"96/10733","text":"Arash Ahadi"},{"@pid":"91/10733-1","text":"Ali Dehghan 0001"}]},"title":"The Complexity of the Proper Orientation Number","venue":"CoRR","volume":"abs/1305.6432","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-6432","ee":"http://arxiv.org/abs/1305.6432","url":"https://dblp.org/rec/journals/corr/abs-1305-6432"}, "url":"URL#4263406" }, { "@score":"1", "@id":"4263407", "info":{"authors":{"author":[{"@pid":"94/3624","text":"Pavel Chebotarev"},{"@pid":"81/5138","text":"Rafig Agaev"}]},"title":"Matrices of forests, analysis of networks, and ranking problems","venue":"CoRR","volume":"abs/1305.6441","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-6441","ee":"http://arxiv.org/abs/1305.6441","url":"https://dblp.org/rec/journals/corr/abs-1305-6441"}, "url":"URL#4263407" }, { "@score":"1", "@id":"4263408", "info":{"authors":{"author":[{"@pid":"130/2360","text":"Iheb Ben Amor"},{"@pid":"01/458","text":"Athman Bouguettaya"},{"@pid":"37/5056","text":"Mourad Ouziri"},{"@pid":"b/SalimaBenbernou","text":"Salima Benbernou"},{"@pid":"63/1468","text":"Mohamed Nadif"}]},"title":"Data Leak Aware Crowdsourcing in Social Network","venue":"CoRR","volume":"abs/1305.6451","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-6451","ee":"http://arxiv.org/abs/1305.6451","url":"https://dblp.org/rec/journals/corr/abs-1305-6451"}, "url":"URL#4263408" }, { "@score":"1", "@id":"4263409", "info":{"authors":{"author":[{"@pid":"83/3043-3","text":"Martin Wimmer 0003"},{"@pid":"67/4128","text":"Daniel Cederman"},{"@pid":"t/JLTraff","text":"Jesper Larsson Träff"},{"@pid":"t/PhilippasTsigas","text":"Philippas Tsigas"}]},"title":"Configurable Strategies for Work-stealing","venue":"CoRR","volume":"abs/1305.6474","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-6474","ee":"http://arxiv.org/abs/1305.6474","url":"https://dblp.org/rec/journals/corr/abs-1305-6474"}, "url":"URL#4263409" }, { "@score":"1", "@id":"4263410", "info":{"authors":{"author":[{"@pid":"130/3810","text":"Junzhou Zhao"},{"@pid":"l/JohnCSLui","text":"John C. S. Lui"},{"@pid":"t/DonaldFTowsley","text":"Don Towsley"},{"@pid":"45/503","text":"Xiaohong Guan"},{"@pid":"84/7882","text":"Pinghui Wang"}]},"title":"Social Sensor Placement in Large Scale Networks: A Graph Sampling Perspective","venue":"CoRR","volume":"abs/1305.6489","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-6489","ee":"http://arxiv.org/abs/1305.6489","url":"https://dblp.org/rec/journals/corr/abs-1305-6489"}, "url":"URL#4263410" }, { "@score":"1", "@id":"4263411", "info":{"authors":{"author":{"@pid":"59/2318","text":"Michael Hausenblas"}},"title":"Notes on Physical & Logical Data Layouts","venue":"CoRR","volume":"abs/1305.6506","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-6506","ee":"http://arxiv.org/abs/1305.6506","url":"https://dblp.org/rec/journals/corr/abs-1305-6506"}, "url":"URL#4263411" }, { "@score":"1", "@id":"4263412", "info":{"authors":{"author":{"@pid":"09/8524","text":"Arthur Carvalho"}},"title":"A Cooperative Coevolutionary Genetic Algorithm for Learning Bayesian Network Structures","venue":"CoRR","volume":"abs/1305.6537","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-6537","ee":"http://arxiv.org/abs/1305.6537","url":"https://dblp.org/rec/journals/corr/abs-1305-6537"}, "url":"URL#4263412" }, { "@score":"1", "@id":"4263413", "info":{"authors":{"author":[{"@pid":"74/7373","text":"Gregory Malecha"},{"@pid":"52/796","text":"Adam Chlipala"},{"@pid":"19/1989","text":"Thomas Braibant"},{"@pid":"130/3703","text":"Patrick Hulin"},{"@pid":"118/9819","text":"Edward Z. Yang"}]},"title":"MirrorShard: Proof by Computational Reflection with Verified Hints","venue":"CoRR","volume":"abs/1305.6543","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-6543","ee":"http://arxiv.org/abs/1305.6543","url":"https://dblp.org/rec/journals/corr/abs-1305-6543"}, "url":"URL#4263413" }, { "@score":"1", "@id":"4263414", "info":{"authors":{"author":{"@pid":"115/7432","text":"Gilad Gour"}},"title":"General symmetric informationally complete measurements exist in all dimensions","venue":"CoRR","volume":"abs/1305.6545","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-6545","ee":"http://arxiv.org/abs/1305.6545","url":"https://dblp.org/rec/journals/corr/abs-1305-6545"}, "url":"URL#4263414" }, { "@score":"1", "@id":"4263415", "info":{"authors":{"author":[{"@pid":"b/MichaelABender","text":"Michael A. Bender"},{"@pid":"f/MartinFarachColton","text":"Martin Farach-Colton"},{"@pid":"f/SandorPFekete","text":"Sándor P. Fekete"},{"@pid":"37/2868","text":"Jeremy T. Fineman"},{"@pid":"84/3601","text":"Seth Gilbert"}]},"title":"Reallocation Problems in Scheduling","venue":"CoRR","volume":"abs/1305.6555","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-6555","ee":"http://arxiv.org/abs/1305.6555","url":"https://dblp.org/rec/journals/corr/abs-1305-6555"}, "url":"URL#4263415" }, { "@score":"1", "@id":"4263416", "info":{"authors":{"author":[{"@pid":"09/8524","text":"Arthur Carvalho"},{"@pid":"75/8580","text":"Renato Oliveira"}]},"title":"Reinforcement Learning for the Soccer Dribbling Task","venue":"CoRR","volume":"abs/1305.6568","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-6568","ee":"http://arxiv.org/abs/1305.6568","url":"https://dblp.org/rec/journals/corr/abs-1305-6568"}, "url":"URL#4263416" }, { "@score":"1", "@id":"4263417", "info":{"authors":{"author":[{"@pid":"130/3720","text":"David Aristoff"},{"@pid":"38/9139","text":"Tony Lelièvre"}]},"title":"Mathematical Analysis of Temperature Accelerated Dynamics","venue":"CoRR","volume":"abs/1305.6569","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-6569","ee":"http://arxiv.org/abs/1305.6569","url":"https://dblp.org/rec/journals/corr/abs-1305-6569"}, "url":"URL#4263417" }, { "@score":"1", "@id":"4263418", "info":{"authors":{"author":[{"@pid":"82/3212","text":"Chandra Chekuri"},{"@pid":"99/3386","text":"Julia Chuzhoy"}]},"title":"Polynomial Bounds for the Grid-Minor Theorem","venue":"CoRR","volume":"abs/1305.6577","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-6577","ee":"http://arxiv.org/abs/1305.6577","url":"https://dblp.org/rec/journals/corr/abs-1305-6577"}, "url":"URL#4263418" }, { "@score":"1", "@id":"4263419", "info":{"authors":{"author":[{"@pid":"130/3954","text":"Maxime Viallet"},{"@pid":"130/3840","text":"Isabelle Baraffe"},{"@pid":"130/3945","text":"Rolf Walder"}]},"title":"Comparison of different nonlinear solvers for 2D time-implicit stellar hydrodynamics","venue":"CoRR","volume":"abs/1305.6581","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-6581","ee":"http://arxiv.org/abs/1305.6581","url":"https://dblp.org/rec/journals/corr/abs-1305-6581"}, "url":"URL#4263419" }, { "@score":"1", "@id":"4263420", "info":{"authors":{"author":[{"@pid":"130/3963","text":"Priyanka Kumar"},{"@pid":"41/5564","text":"Sathya Peri"}]},"title":"A TimeStamp based Multi-version STM Protocol that satisfies Opacity and Multi-Version Permissiveness","venue":"CoRR","volume":"abs/1305.6624","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-6624","ee":"http://arxiv.org/abs/1305.6624","url":"https://dblp.org/rec/journals/corr/abs-1305-6624"}, "url":"URL#4263420" }, { "@score":"1", "@id":"4263421", "info":{"authors":{"author":[{"@pid":"a/SvenApel","text":"Sven Apel"},{"@pid":"b/DirkBeyer1","text":"Dirk Beyer 0001"},{"@pid":"130/3897","text":"Karlheinz Friedberger"},{"@pid":"58/461","text":"Franco Raimondi"},{"@pid":"82/10359","text":"Alexander von Rhein"}]},"title":"Domain Types: Selecting Abstractions Based on Variable Usage","venue":"CoRR","volume":"abs/1305.6640","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-6640","ee":"http://arxiv.org/abs/1305.6640","url":"https://dblp.org/rec/journals/corr/abs-1305-6640"}, "url":"URL#4263421" }, { "@score":"1", "@id":"4263422", "info":{"authors":{"author":[{"@pid":"93/2963","text":"Stéphane Ross"},{"@pid":"35/5613","text":"Paul Mineiro"},{"@pid":"77/4488","text":"John Langford 0001"}]},"title":"Normalized Online Learning","venue":"CoRR","volume":"abs/1305.6646","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-6646","ee":"http://arxiv.org/abs/1305.6646","url":"https://dblp.org/rec/journals/corr/abs-1305-6646"}, "url":"URL#4263422" }, { "@score":"1", "@id":"4263423", "info":{"authors":{"author":[{"@pid":"130/4056","text":"Sheeraz Ahmad"},{"@pid":"79/5624","text":"Angela J. Yu"}]},"title":"Active Sensing as Bayes-Optimal Sequential Decision Making","venue":"CoRR","volume":"abs/1305.6650","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-6650","ee":"http://arxiv.org/abs/1305.6650","url":"https://dblp.org/rec/journals/corr/abs-1305-6650"}, "url":"URL#4263423" }, { "@score":"1", "@id":"4263424", "info":{"authors":{"author":[{"@pid":"56/6618","text":"Daniel Oliveira Cajueiro"},{"@pid":"96/8425","text":"Roberto F. S. Andrade"}]},"title":"Controlling self-organized criticality in complex networks","venue":"CoRR","volume":"abs/1305.6656","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-6656","ee":"http://arxiv.org/abs/1305.6656","url":"https://dblp.org/rec/journals/corr/abs-1305-6656"}, "url":"URL#4263424" }, { "@score":"1", "@id":"4263425", "info":{"authors":{"author":[{"@pid":"130/3822","text":"Trevor Campbell"},{"@pid":"60/6348-1","text":"Miao Liu 0001"},{"@pid":"43/3732","text":"Brian Kulis"},{"@pid":"43/1256","text":"Jonathan P. How"}]},"title":"Dynamic Clustering via Asymptotics of the Dependent Dirichlet Process Mixture","venue":"CoRR","volume":"abs/1305.6659","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-6659","ee":"http://arxiv.org/abs/1305.6659","url":"https://dblp.org/rec/journals/corr/abs-1305-6659"}, "url":"URL#4263425" }, { "@score":"1", "@id":"4263426", "info":{"authors":{"author":[{"@pid":"56/953","text":"Yoshua Bengio"},{"@pid":"83/6976","text":"Li Yao"},{"@pid":"39/7065","text":"Guillaume Alain"},{"@pid":"43/861","text":"Pascal Vincent"}]},"title":"Generalized Denoising Auto-Encoders as Generative Models","venue":"CoRR","volume":"abs/1305.6663","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-6663","ee":"http://arxiv.org/abs/1305.6663","url":"https://dblp.org/rec/journals/corr/abs-1305-6663"}, "url":"URL#4263426" }, { "@score":"1", "@id":"4263427", "info":{"authors":{"author":[{"@pid":"26/8237","text":"Alejandro Erickson"},{"@pid":"r/FrankRuskey","text":"Frank Ruskey"}]},"title":"Domino Tatami Covering is NP-complete","venue":"CoRR","volume":"abs/1305.6669","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-6669","ee":"http://arxiv.org/abs/1305.6669","url":"https://dblp.org/rec/journals/corr/abs-1305-6669"}, "url":"URL#4263427" }, { "@score":"1", "@id":"4263428", "info":{"authors":{"author":[{"@pid":"b/SergeyBereg","text":"Sergey Bereg"},{"@pid":"69/6852","text":"Ruy Fabila Monroy"},{"@pid":"38/3440","text":"David Flores-Peñaloza"},{"@pid":"l/MarioALopez","text":"Mario Alberto López"},{"@pid":"78/7298","text":"Pablo Pérez-Lantero"}]},"title":"Drawing the double circle on a grid of minimum size","venue":"CoRR","volume":"abs/1305.6693","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-6693","ee":"http://arxiv.org/abs/1305.6693","url":"https://dblp.org/rec/journals/corr/abs-1305-6693"}, "url":"URL#4263428" }, { "@score":"1", "@id":"4263429", "info":{"authors":{"author":[{"@pid":"89/4402-6","text":"Yang Gao 0006"},{"@pid":"88/2827-7","text":"Yan Chen 0007"},{"@pid":"68/3163","text":"K. J. Ray Liu"}]},"title":"On Cost-Effective Incentive Mechanisms in Microtask Crowdsourcing","venue":"CoRR","volume":"abs/1305.6705","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-6705","ee":"http://arxiv.org/abs/1305.6705","url":"https://dblp.org/rec/journals/corr/abs-1305-6705"}, "url":"URL#4263429" }, { "@score":"1", "@id":"4263430", "info":{"authors":{"author":[{"@pid":"56/2692-2","text":"Matthias Keil 0002"},{"@pid":"t/PeterThiemann","text":"Peter Thiemann 0001"}]},"title":"Type-based Dependency Analysis for JavaScript","venue":"CoRR","volume":"abs/1305.6721","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1305-6721","ee":"http://arxiv.org/abs/1305.6721","url":"https://dblp.org/rec/journals/corr/abs-1305-6721"}, "url":"URL#4263430" } ] } } } )