callback( { "result":{ "query":":facetid:toc:\"db/journals/corr/corr1405.bht\"", "status":{ "@code":"200", "text":"OK" }, "time":{ "@unit":"msecs", "text":"90.87" }, "completions":{ "@total":"1", "@computed":"1", "@sent":"1", "c":{ "@sc":"1330", "@dc":"1330", "@oc":"1330", "@id":"43431285", "text":":facetid:toc:db/journals/corr/corr1405.bht" } }, "hits":{ "@total":"1330", "@computed":"1000", "@sent":"1000", "@first":"0", "hit":[{ "@score":"1", "@id":"3966396", "info":{"authors":{"author":[{"@pid":"70/3758-1","text":"Ji Zhao 0001"},{"@pid":"22/5614","text":"Deyu Meng"}]},"title":"FastMMD: Ensemble of Circular Discrepancy for Efficient Two-Sample Test.","venue":"CoRR","volume":"abs/1405.2664","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/0001M14a","ee":"http://arxiv.org/abs/1405.2664","url":"https://dblp.org/rec/journals/corr/0001M14a"}, "url":"URL#3966396" }, { "@score":"1", "@id":"3966397", "info":{"authors":{"author":[{"@pid":"20/8038-1","text":"Yixin Cao 0001"},{"@pid":"95/1832","text":"Dániel Marx"}]},"title":"Chordal Editing is Fixed-Parameter Tractable.","venue":"CoRR","volume":"abs/1405.7859","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/0001M14b","ee":"http://arxiv.org/abs/1405.7859","url":"https://dblp.org/rec/journals/corr/0001M14b"}, "url":"URL#3966397" }, { "@score":"1", "@id":"3966433", "info":{"authors":{"author":[{"@pid":"51/4962-3","text":"Aditi Gupta 0003"},{"@pid":"97/5147","text":"Ponnurangam Kumaraguru"},{"@pid":"c/CarlosCastillo1","text":"Carlos Castillo 0001"},{"@pid":"71/11429","text":"Patrick Meier"}]},"title":"TweetCred: A Real-time Web-based System for Assessing Credibility of Content on Twitter.","venue":"CoRR","volume":"abs/1405.5490","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/0003KCM14","ee":"http://arxiv.org/abs/1405.5490","url":"https://dblp.org/rec/journals/corr/0003KCM14"}, "url":"URL#3966433" }, { "@score":"1", "@id":"3966447", "info":{"authors":{"author":{"@pid":"146/0484","text":"Aadhityan A."}},"title":"A Novel Method for Developing Robotics via Artificial Intelligence and Internet of Things.","venue":"CoRR","volume":"abs/1405.3939","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/A14","ee":"http://arxiv.org/abs/1405.3939","url":"https://dblp.org/rec/journals/corr/A14"}, "url":"URL#3966447" }, { "@score":"1", "@id":"3966448", "info":{"authors":{"author":{"@pid":"90/3161","text":"Prashanth L. A."}},"title":"Policy Gradients for CVaR-Constrained MDPs.","venue":"CoRR","volume":"abs/1405.2690","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/A14a","ee":"http://arxiv.org/abs/1405.2690","url":"https://dblp.org/rec/journals/corr/A14a"}, "url":"URL#3966448" }, { "@score":"1", "@id":"3966464", "info":{"authors":{"author":[{"@pid":"125/7688","text":"Hasan Abasi"},{"@pid":"146/0656","text":"Ali Z. Abdi"},{"@pid":"b/NaderHBshouty","text":"Nader H. Bshouty"}]},"title":"Learning Boolean Halfspaces with Small Weights from Membership Queries.","venue":"CoRR","volume":"abs/1405.1535","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/AbasiAB14","ee":"http://arxiv.org/abs/1405.1535","url":"https://dblp.org/rec/journals/corr/AbasiAB14"}, "url":"URL#3966464" }, { "@score":"1", "@id":"3966466", "info":{"authors":{"author":[{"@pid":"125/7688","text":"Hasan Abasi"},{"@pid":"b/NaderHBshouty","text":"Nader H. Bshouty"},{"@pid":"84/5481","text":"Hanna Mazzawi"}]},"title":"On Exact Learning Monotone DNF from Membership Queries.","venue":"CoRR","volume":"abs/1405.0792","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/AbasiBM14","ee":"http://arxiv.org/abs/1405.0792","url":"https://dblp.org/rec/journals/corr/AbasiBM14"}, "url":"URL#3966466" }, { "@score":"1", "@id":"3966478", "info":{"authors":{"author":[{"@pid":"84/5016","text":"Emmanuel Abbe"},{"@pid":"99/11266","text":"Afonso S. Bandeira"},{"@pid":"146/0747","text":"Georgina Hall"}]},"title":"Exact Recovery in the Stochastic Block Model.","venue":"CoRR","volume":"abs/1405.3267","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/AbbeBH14","ee":"http://arxiv.org/abs/1405.3267","url":"https://dblp.org/rec/journals/corr/AbbeBH14"}, "url":"URL#3966478" }, { "@score":"1", "@id":"3966485", "info":{"authors":{"author":[{"@pid":"12/8356","text":"Ahmed Abdel-Hadi"},{"@pid":"73/1462","text":"T. Charles Clancy"}]},"title":"An Optimal Resource Allocation with Joint Carrier Aggregation in 4G-LTE.","venue":"CoRR","volume":"abs/1405.6448","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/Abdel-HadiC14","ee":"http://arxiv.org/abs/1405.6448","url":"https://dblp.org/rec/journals/corr/Abdel-HadiC14"}, "url":"URL#3966485" }, { "@score":"1", "@id":"3966489", "info":{"authors":{"author":[{"@pid":"12/8356","text":"Ahmed Abdel-Hadi"},{"@pid":"01/9664","text":"Awais Khawar"},{"@pid":"73/1462","text":"T. Charles Clancy"}]},"title":"Optimal Downlink Power Allocation in Cellular Networks.","venue":"CoRR","volume":"abs/1405.6440","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/Abdel-HadiKC14","ee":"http://arxiv.org/abs/1405.6440","url":"https://dblp.org/rec/journals/corr/Abdel-HadiKC14"}, "url":"URL#3966489" }, { "@score":"1", "@id":"3966490", "info":{"authors":{"author":[{"@pid":"146/0450","text":"Abdou Abdel-Rehim"},{"@pid":"69/11053","text":"Constantia Alexandrou"},{"@pid":"16/3030","text":"Nikos Anastopoulos"},{"@pid":"93/11053","text":"G. Koutsou"},{"@pid":"77/856","text":"Ioannis Liabotis"},{"@pid":"146/0605","text":"N. Papadopoulou"}]},"title":"PLQCD library for Lattice QCD on multi-core machines.","venue":"CoRR","volume":"abs/1405.0700","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/Abdel-RehimAAKLP14","ee":"http://arxiv.org/abs/1405.0700","url":"https://dblp.org/rec/journals/corr/Abdel-RehimAAKLP14"}, "url":"URL#3966490" }, { "@score":"1", "@id":"3966499", "info":{"authors":{"author":[{"@pid":"137/0125","text":"Amr Abdelnasser"},{"@pid":"45/1224","text":"Ekram Hossain 0001"},{"@pid":"86/1369","text":"Dong In Kim"}]},"title":"Tier-Aware Resource Allocation in OFDMA Macrocell-Small Cell Networks.","venue":"CoRR","volume":"abs/1405.2000","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/AbdelnasserHK14","ee":"http://arxiv.org/abs/1405.2000","url":"https://dblp.org/rec/journals/corr/AbdelnasserHK14"}, "url":"URL#3966499" }, { "@score":"1", "@id":"3966504", "info":{"authors":{"author":[{"@pid":"03/7171","text":"Omer H. Abdelrahman"},{"@pid":"g/ErolGelenbe","text":"Erol Gelenbe"}]},"title":"Signalling Storms in 3G Mobile Networks.","venue":"CoRR","volume":"abs/1405.2735","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/AbdelrahmanG14","ee":"http://arxiv.org/abs/1405.2735","url":"https://dblp.org/rec/journals/corr/AbdelrahmanG14"}, "url":"URL#3966504" }, { "@score":"1", "@id":"3966518", "info":{"authors":{"author":[{"@pid":"37/6689","text":"Mustafa Abdul Jabbar"},{"@pid":"61/7413","text":"Rio Yokota"},{"@pid":"27/854","text":"David E. Keyes"}]},"title":"Asynchronous Execution of the Fast Multipole Method Using Charm++.","venue":"CoRR","volume":"abs/1405.7487","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/AbdulJabbarYK14","ee":"http://arxiv.org/abs/1405.7487","url":"https://dblp.org/rec/journals/corr/AbdulJabbarYK14"}, "url":"URL#3966518" }, { "@score":"1", "@id":"3966528", "info":{"authors":{"author":[{"@pid":"a/PAAbdulla","text":"Parosh Aziz Abdulla"},{"@pid":"42/4028","text":"Mohamed Faouzi Atig"},{"@pid":"34/8773","text":"Piotr Hofman"},{"@pid":"81/113","text":"Richard Mayr"},{"@pid":"54/203","text":"K. Narayan Kumar"},{"@pid":"51/7221","text":"Patrick Totzke"}]},"title":"Infinite-State Energy Games.","venue":"CoRR","volume":"abs/1405.0628","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/AbdullaAHMKT14","ee":"http://arxiv.org/abs/1405.0628","url":"https://dblp.org/rec/journals/corr/AbdullaAHMKT14"}, "url":"URL#3966528" }, { "@score":"1", "@id":"3966540", "info":{"authors":{"author":[{"@pid":"91/2520","text":"Jacob D. Abernethy"},{"@pid":"137/3219","text":"Chansoo Lee"},{"@pid":"98/10358","text":"Abhinav Sinha"},{"@pid":"24/567","text":"Ambuj Tewari"}]},"title":"Online Linear Optimization via Smoothing.","venue":"CoRR","volume":"abs/1405.6076","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/AbernethyLST14","ee":"http://arxiv.org/abs/1405.6076","url":"https://dblp.org/rec/journals/corr/AbernethyLST14"}, "url":"URL#3966540" }, { "@score":"1", "@id":"3966547", "info":{"authors":{"author":[{"@pid":"78/6502","text":"Farid M. Ablayev"},{"@pid":"67/6378","text":"Aida Gainutdinova"},{"@pid":"148/1881","text":"Kamil Khadiev"},{"@pid":"82/4618","text":"Abuzer Yakaryilmaz"}]},"title":"Very narrow quantum OBDDs and width hierarchies for classical OBDDs.","venue":"CoRR","volume":"abs/1405.7849","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/AblayevGKY14","ee":"http://arxiv.org/abs/1405.7849","url":"https://dblp.org/rec/journals/corr/AblayevGKY14"}, "url":"URL#3966547" }, { "@score":"1", "@id":"3966550", "info":{"authors":{"author":[{"@pid":"146/0478","text":"Melika Abolhassani"},{"@pid":"22/4739","text":"MohammadHossein Bateni"},{"@pid":"334/4488","text":"MohammadTaghi Hajiaghayi"},{"@pid":"24/2937","text":"Hamid Mahini"},{"@pid":"125/3974","text":"Anshul Sawant"}]},"title":"Network Cournot Competition.","venue":"CoRR","volume":"abs/1405.1794","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/AbolhassaniBHMS14","ee":"http://arxiv.org/abs/1405.1794","url":"https://dblp.org/rec/journals/corr/AbolhassaniBHMS14"}, "url":"URL#3966550" }, { "@score":"1", "@id":"3966554", "info":{"authors":{"author":[{"@pid":"125/8850","text":"Hatem Abou-zeid"},{"@pid":"07/3173","text":"Hossam S. Hassanein"},{"@pid":"66/4064","text":"Stefan Valentin"},{"@pid":"20/10458","text":"Mohamed Fathy Feteiha"}]},"title":"A Lookback Scheduling Framework for Long-Term Quality-of-Service Over Multiple Cells.","venue":"CoRR","volume":"abs/1405.1155","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/Abou-zeidHVF14","ee":"http://arxiv.org/abs/1405.1155","url":"https://dblp.org/rec/journals/corr/Abou-zeidHVF14"}, "url":"URL#3966554" }, { "@score":"1", "@id":"3966569", "info":{"authors":{"author":[{"@pid":"146/0672","text":"Mário Abrantes"},{"@pid":"p/LuizMonizPereira","text":"Luís Moniz Pereira"}]},"title":"Properties of Stable Model Semantics Extensions.","venue":"CoRR","volume":"abs/1405.3896","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/AbrantesP14","ee":"http://arxiv.org/abs/1405.3896","url":"https://dblp.org/rec/journals/corr/AbrantesP14"}, "url":"URL#3966569" }, { "@score":"1", "@id":"3966581", "info":{"authors":{"author":[{"@pid":"146/0408","text":"Sallam Abualhaija"},{"@pid":"05/5338","text":"Karl-Heinz Zimmermann"}]},"title":"D-Bees: A Novel Method Inspired by Bee Colony Optimization for Solving Word Sense Disambiguation.","venue":"CoRR","volume":"abs/1405.1406","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/AbualhaijaZ14","ee":"http://arxiv.org/abs/1405.1406","url":"https://dblp.org/rec/journals/corr/AbualhaijaZ14"}, "url":"URL#3966581" }, { "@score":"1", "@id":"3966588", "info":{"authors":{"author":[{"@pid":"90/7361","text":"Beniamino Accattoli"},{"@pid":"44/3105","text":"Ugo Dal Lago"}]},"title":"Beta Reduction is Invariant, Indeed (Long Version).","venue":"CoRR","volume":"abs/1405.3311","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/AccattoliL14","ee":"http://arxiv.org/abs/1405.3311","url":"https://dblp.org/rec/journals/corr/AccattoliL14"}, "url":"URL#3966588" }, { "@score":"1", "@id":"3966590", "info":{"authors":{"author":[{"@pid":"93/9733","text":"Paul Accisano"},{"@pid":"59/1083","text":"Alper Üngör"}]},"title":"Finding a Curve in a Point Set.","venue":"CoRR","volume":"abs/1405.0762","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/AccisanoU14a","ee":"http://arxiv.org/abs/1405.0762","url":"https://dblp.org/rec/journals/corr/AccisanoU14a"}, "url":"URL#3966590" }, { "@score":"1", "@id":"3966599", "info":{"authors":{"author":[{"@pid":"74/5865","text":"Jayadev Acharya"},{"@pid":"45/10782","text":"Ashkan Jafarpour"},{"@pid":"o/AlonOrlitsky","text":"Alon Orlitsky"},{"@pid":"119/3884","text":"Ananda Theertha Suresh"}]},"title":"Universal Compression of Envelope Classes: Tight Characterization via Poisson Sampling.","venue":"CoRR","volume":"abs/1405.7460","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/AcharyaJOS14a","ee":"http://arxiv.org/abs/1405.7460","url":"https://dblp.org/rec/journals/corr/AcharyaJOS14a"}, "url":"URL#3966599" }, { "@score":"1", "@id":"3966612", "info":{"authors":{"author":{"@pid":"138/2490","text":"Chandranath Adak"}},"title":"Gabor Filter and Rough Clustering Based Edge Detection.","venue":"CoRR","volume":"abs/1405.0921","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/Adak14b","ee":"http://arxiv.org/abs/1405.0921","url":"https://dblp.org/rec/journals/corr/Adak14b"}, "url":"URL#3966612" }, { "@score":"1", "@id":"3966613", "info":{"authors":{"author":{"@pid":"138/2490","text":"Chandranath Adak"}},"title":"OPTICS Based Coverage in Wireless Sensor Network.","venue":"CoRR","volume":"abs/1405.7794","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/Adak14c","ee":"http://arxiv.org/abs/1405.7794","url":"https://dblp.org/rec/journals/corr/Adak14c"}, "url":"URL#3966613" }, { "@score":"1", "@id":"3966660", "info":{"authors":{"author":[{"@pid":"07/9552","text":"Danko Adrovic"},{"@pid":"49/4497","text":"Jan Verschelde"}]},"title":"Computing all Affine Solution Sets of Binomial Systems.","venue":"CoRR","volume":"abs/1405.0320","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/AdrovicV14","ee":"http://arxiv.org/abs/1405.0320","url":"https://dblp.org/rec/journals/corr/AdrovicV14"}, "url":"URL#3966660" }, { "@score":"1", "@id":"3966662", "info":{"authors":{"author":[{"@pid":"20/2653","text":"Bharat Adsul"},{"@pid":"53/7788","text":"Jinesh Machchhar"},{"@pid":"61/1262","text":"Milind A. Sohoni"}]},"title":"Incorporating Sharp Features in the General Solid Sweep Framework.","venue":"CoRR","volume":"abs/1405.7457","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/AdsulMS14a","ee":"http://arxiv.org/abs/1405.7457","url":"https://dblp.org/rec/journals/corr/AdsulMS14a"}, "url":"URL#3966662" }, { "@score":"1", "@id":"3966672", "info":{"authors":{"author":[{"@pid":"39/7267","text":"Sanaz Khan Afshar"},{"@pid":"05/7458","text":"Vincent Aravantinos"},{"@pid":"25/2826","text":"Osman Hasan"},{"@pid":"98/2059","text":"Sofiène Tahar"}]},"title":"Formalization of Complex Vectors in Higher-Order Logic.","venue":"CoRR","volume":"abs/1405.4034","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/AfsharAHT14","ee":"http://arxiv.org/abs/1405.4034","url":"https://dblp.org/rec/journals/corr/AfsharAHT14"}, "url":"URL#3966672" }, { "@score":"1", "@id":"3966684", "info":{"authors":{"author":[{"@pid":"72/3910","text":"Naman Agarwal"},{"@pid":"39/4771","text":"Guy Kindler"},{"@pid":"42/3927","text":"Alexandra Kolla"},{"@pid":"t/LucaTrevisan","text":"Luca Trevisan"}]},"title":"Unique Games on the Hypercube.","venue":"CoRR","volume":"abs/1405.1374","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/AgarwalKKT14","ee":"http://arxiv.org/abs/1405.1374","url":"https://dblp.org/rec/journals/corr/AgarwalKKT14"}, "url":"URL#3966684" }, { "@score":"1", "@id":"3966691", "info":{"authors":{"author":[{"@pid":"47/3504","text":"Akshai Aggarwal"},{"@pid":"117/9198","text":"Savita Gandhi"},{"@pid":"322/6601","text":"Nirbhay Chaubey"},{"@pid":"146/0519","text":"Naren Tada"},{"@pid":"146/0615","text":"Srushti Trivedi"}]},"title":"NDTAODV: Neighbor Defense Technique for Ad Hoc On-Demand Distance Vector(AODV) to mitigate flood attack in MANETS.","venue":"CoRR","volume":"abs/1405.6216","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/AggarwalGCTT14","ee":"http://arxiv.org/abs/1405.6216","url":"https://dblp.org/rec/journals/corr/AggarwalGCTT14"}, "url":"URL#3966691" }, { "@score":"1", "@id":"3966697", "info":{"authors":{"author":[{"@pid":"27/6007","text":"Omid Aghazadeh"},{"@pid":"17/709","text":"Stefan Carlsson"}]},"title":"Large Scale, Large Margin Classification using Indefinite Similarity Measures.","venue":"CoRR","volume":"abs/1405.6922","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/AghazadehC14","ee":"http://arxiv.org/abs/1405.6922","url":"https://dblp.org/rec/journals/corr/AghazadehC14"}, "url":"URL#3966697" }, { "@score":"1", "@id":"3966715", "info":{"authors":{"author":[{"@pid":"42/8968","text":"Inaki Estella Aguerri"},{"@pid":"05/6552","text":"Deniz Gündüz"}]},"title":"Capacity of a Class of State-Dependent Relay Channels.","venue":"CoRR","volume":"abs/1405.5195","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/AguerriG14","ee":"http://arxiv.org/abs/1405.5195","url":"https://dblp.org/rec/journals/corr/AguerriG14"}, "url":"URL#3966715" }, { "@score":"1", "@id":"3966718", "info":{"authors":{"author":[{"@pid":"36/10309","text":"Everaldo Aguiar"},{"@pid":"126/2218","text":"Saurabh Nagrecha"},{"@pid":"c/NiteshVChawla","text":"Nitesh V. Chawla"}]},"title":"Predicting Online Video Engagement Using Clickstreams.","venue":"CoRR","volume":"abs/1405.5147","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/AguiarNC14","ee":"http://arxiv.org/abs/1405.5147","url":"https://dblp.org/rec/journals/corr/AguiarNC14"}, "url":"URL#3966718" }, { "@score":"1", "@id":"3966731", "info":{"authors":{"author":[{"@pid":"67/7416","text":"Rabiah Ahmad"},{"@pid":"12/7114","text":"Shahrin Sahib"},{"@pid":"146/0460","text":"Muhamad Pahri Nor'Azuwa"}]},"title":"Effective Measurement Requirements for Network Security Management.","venue":"CoRR","volume":"abs/1405.5287","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/AhmadSN14","ee":"http://arxiv.org/abs/1405.5287","url":"https://dblp.org/rec/journals/corr/AhmadSN14"}, "url":"URL#3966731" }, { "@score":"1", "@id":"3966735", "info":{"authors":{"author":[{"@pid":"146/0676","text":"Tanveer Ahmad"},{"@pid":"146/0653","text":"Yan tian feng"}]},"title":"An improved accelerated frame slotted aloha (afsa) algorithm for tag collision in rfid.","venue":"CoRR","volume":"abs/1405.6217","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/Ahmadf14","ee":"http://arxiv.org/abs/1405.6217","url":"https://dblp.org/rec/journals/corr/Ahmadf14"}, "url":"URL#3966735" }, { "@score":"1", "@id":"3966750", "info":{"authors":{"author":[{"@pid":"127/7181","text":"Elsayed Ahmed"},{"@pid":"73/816","text":"Ahmed M. Eltawil"},{"@pid":"119/1459","text":"Zhouyuan Li"},{"@pid":"85/2510","text":"Bedri A. Cetiner"}]},"title":"Full-Duplex Systems Using Multi-Reconfigurable Antennas.","venue":"CoRR","volume":"abs/1405.7720","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/AhmedELC14","ee":"http://arxiv.org/abs/1405.7720","url":"https://dblp.org/rec/journals/corr/AhmedELC14"}, "url":"URL#3966750" }, { "@score":"1", "@id":"3966751", "info":{"authors":{"author":[{"@pid":"73/10238","text":"Waqar Ahmad"},{"@pid":"25/2826","text":"Osman Hasan"},{"@pid":"98/2059","text":"Sofiène Tahar"},{"@pid":"38/1822","text":"Mohammad Salah Hamdi"}]},"title":"Towards the Formal Reliability Analysis of Oil and Gas Pipelines.","venue":"CoRR","volume":"abs/1405.6985","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/AhmedHTH14","ee":"http://arxiv.org/abs/1405.6985","url":"https://dblp.org/rec/journals/corr/AhmedHTH14"}, "url":"URL#3966751" }, { "@score":"1", "@id":"3966767", "info":{"authors":{"author":[{"@pid":"33/289","text":"Oswin Aichholzer"},{"@pid":"05/1552","text":"Greg Aloupis"},{"@pid":"d/ErikDDemaine","text":"Erik D. Demaine"},{"@pid":"24/3615","text":"Martin L. Demaine"},{"@pid":"f/SandorPFekete","text":"Sándor P. Fekete"},{"@pid":"h/MichaelHoffmann","text":"Michael Hoffmann 0001"},{"@pid":"34/4423","text":"Anna Lubiw"},{"@pid":"s/JackSnoeyink","text":"Jack Snoeyink"},{"@pid":"86/8242","text":"Andrew Winslow"}]},"title":"Covering Folded Shapes.","venue":"CoRR","volume":"abs/1405.2378","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/AichholzerADDFHLSW14","ee":"http://arxiv.org/abs/1405.2378","url":"https://dblp.org/rec/journals/corr/AichholzerADDFHLSW14"}, "url":"URL#3966767" }, { "@score":"1", "@id":"3966776", "info":{"authors":{"author":[{"@pid":"86/6327","text":"Nir Ailon"},{"@pid":"j/ThorstenJoachims","text":"Thorsten Joachims"},{"@pid":"16/4051","text":"Zohar Shay Karnin"}]},"title":"Reducing Dueling Bandits to Cardinal Bandits.","venue":"CoRR","volume":"abs/1405.3396","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/AilonJK14","ee":"http://arxiv.org/abs/1405.3396","url":"https://dblp.org/rec/journals/corr/AilonJK14"}, "url":"URL#3966776" }, { "@score":"1", "@id":"3966780", "info":{"authors":{"author":[{"@pid":"92/1142","text":"Samy Ait-Aoudia"},{"@pid":"32/2657","text":"Roland Jégou"},{"@pid":"46/1013","text":"Dominique Michelucci"}]},"title":"Reduction of constraint systems.","venue":"CoRR","volume":"abs/1405.6131","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/Ait-AoudiaJM14","ee":"http://arxiv.org/abs/1405.6131","url":"https://dblp.org/rec/journals/corr/Ait-AoudiaJM14"}, "url":"URL#3966780" }, { "@score":"1", "@id":"3966820", "info":{"authors":{"author":{"@pid":"161/6552","text":"Jehad Al-Dallal"}},"title":"How and When to Flatten Java Classes?","venue":"CoRR","volume":"abs/1405.2066","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/Al-Dallal14","ee":"http://arxiv.org/abs/1405.2066","url":"https://dblp.org/rec/journals/corr/Al-Dallal14"}, "url":"URL#3966820" }, { "@score":"1", "@id":"3966822", "info":{"authors":{"author":[{"@pid":"146/0829","text":"Razen Al-Harbi"},{"@pid":"71/179","text":"Yasser Ebrahim"},{"@pid":"97/3036","text":"Panos Kalnis"}]},"title":"PHD-Store: An Adaptive SPARQL Engine with Dynamic Partitioning for Distributed RDF Repositories.","venue":"CoRR","volume":"abs/1405.4979","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/Al-HarbiEK14","ee":"http://arxiv.org/abs/1405.4979","url":"https://dblp.org/rec/journals/corr/Al-HarbiEK14"}, "url":"URL#3966822" }, { "@score":"1", "@id":"3966849", "info":{"authors":{"author":{"@pid":"153/5393","text":"Ibrahim M. Alabdulmohsin"}},"title":"A Mathematical Theory of Learning.","venue":"CoRR","volume":"abs/1405.1513","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/Alabdulmohsin14","ee":"http://arxiv.org/abs/1405.1513","url":"https://dblp.org/rec/journals/corr/Alabdulmohsin14"}, "url":"URL#3966849" }, { "@score":"1", "@id":"3966857", "info":{"authors":{"author":[{"@pid":"130/4037","text":"Sawood Alam"},{"@pid":"11/3943","text":"Charles L. Cartledge"},{"@pid":"n/MichaelLNelson","text":"Michael L. Nelson"}]},"title":"Support for Various HTTP Methods on the Web.","venue":"CoRR","volume":"abs/1405.2330","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/AlamCN14","ee":"http://arxiv.org/abs/1405.2330","url":"https://dblp.org/rec/journals/corr/AlamCN14"}, "url":"URL#3966857" }, { "@score":"1", "@id":"3966868", "info":{"authors":{"author":{"@pid":"50/8148","text":"Jesse Alama"}},"title":"Dialogues for proof search.","venue":"CoRR","volume":"abs/1405.1864","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/Alama14c","ee":"http://arxiv.org/abs/1405.1864","url":"https://dblp.org/rec/journals/corr/Alama14c"}, "url":"URL#3966868" }, { "@score":"1", "@id":"3966904", "info":{"authors":{"author":[{"@pid":"133/8397","text":"Rukshan Alexander"},{"@pid":"146/0932","text":"Miroshan Alexander"}]},"title":"An ICT-Based Real-Time Surveillance System for Controlling Dengue in Sri Lanka.","venue":"CoRR","volume":"abs/1405.4092","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/AlexanderA14","ee":"http://arxiv.org/abs/1405.4092","url":"https://dblp.org/rec/journals/corr/AlexanderA14"}, "url":"URL#3966904" }, { "@score":"1", "@id":"3966921", "info":{"authors":{"author":[{"@pid":"16/10079","text":"Hananeh Aliee"},{"@pid":"01/5394-14","text":"Liang Chen 0014"},{"@pid":"04/11159","text":"Mojtaba Ebrahimi"},{"@pid":"57/6207","text":"Michael Glaß"},{"@pid":"80/10660","text":"Faramarz Khosravi"},{"@pid":"55/3589","text":"Mehdi Baradaran Tahoori"}]},"title":"Towards Cross-layer Reliability Analysis of Transient and Permanent Faults.","venue":"CoRR","volume":"abs/1405.2914","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/AlieeCEGKT14","ee":"http://arxiv.org/abs/1405.2914","url":"https://dblp.org/rec/journals/corr/AlieeCEGKT14"}, "url":"URL#3966921" }, { "@score":"1", "@id":"3966926", "info":{"authors":{"author":[{"@pid":"36/3251","text":"Dan Alistarh"},{"@pid":"146/0480","text":"Justin Kopinsky"},{"@pid":"k/PetrKouznetsov","text":"Petr Kuznetsov"},{"@pid":"17/9098","text":"Srivatsan Ravi"},{"@pid":"s/NirShavit","text":"Nir Shavit"}]},"title":"Inherent Limitations of Hybrid Transactional Memory.","venue":"CoRR","volume":"abs/1405.5689","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/AlistarhKKRS14","ee":"http://arxiv.org/abs/1405.5689","url":"https://dblp.org/rec/journals/corr/AlistarhKKRS14"}, "url":"URL#3966926" }, { "@score":"1", "@id":"3966927", "info":{"authors":{"author":[{"@pid":"36/3251","text":"Dan Alistarh"},{"@pid":"146/0480","text":"Justin Kopinsky"},{"@pid":"119/6301","text":"Alexander Matveev"},{"@pid":"s/NirShavit","text":"Nir Shavit"}]},"title":"The LevelArray: A Fast, Practical Long-Lived Renaming Algorithm.","venue":"CoRR","volume":"abs/1405.5461","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/AlistarhKMS14","ee":"http://arxiv.org/abs/1405.5461","url":"https://dblp.org/rec/journals/corr/AlistarhKMS14"}, "url":"URL#3966927" }, { "@score":"1", "@id":"3966963", "info":{"authors":{"author":[{"@pid":"71/10554","text":"Amira Aloulou"},{"@pid":"45/9836","text":"Olfa Boubaker"}]},"title":"A Relevant Reduction Method for Dynamic Modeling of a Seven-linked Humanoid Robot in the Three-dimensional Space.","venue":"CoRR","volume":"abs/1405.2795","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/AloulouB14","ee":"http://arxiv.org/abs/1405.2795","url":"https://dblp.org/rec/journals/corr/AloulouB14"}, "url":"URL#3966963" }, { "@score":"1", "@id":"3966972", "info":{"authors":{"author":[{"@pid":"146/0878","text":"Mohammad Abu Alsheikh"},{"@pid":"00/1006","text":"Shaowei Lin"},{"@pid":"76/440","text":"Dusit Niyato"},{"@pid":"43/4600","text":"Hwee-Pink Tan"}]},"title":"Machine Learning in Wireless Sensor Networks: Algorithms, Strategies, and Applications.","venue":"CoRR","volume":"abs/1405.4463","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/AlsheikhLNT14","ee":"http://arxiv.org/abs/1405.4463","url":"https://dblp.org/rec/journals/corr/AlsheikhLNT14"}, "url":"URL#3966972" }, { "@score":"1", "@id":"3966973", "info":{"authors":{"author":[{"@pid":"146/0878","text":"Mohammad Abu Alsheikh"},{"@pid":"00/1006","text":"Shaowei Lin"},{"@pid":"43/4600","text":"Hwee-Pink Tan"},{"@pid":"76/440","text":"Dusit Niyato"}]},"title":"Area Coverage Under Low Sensor Density.","venue":"CoRR","volume":"abs/1405.4378","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/AlsheikhLTN14","ee":"http://arxiv.org/abs/1405.4378","url":"https://dblp.org/rec/journals/corr/AlsheikhLTN14"}, "url":"URL#3966973" }, { "@score":"1", "@id":"3966980", "info":{"authors":{"author":[{"@pid":"119/1352","text":"Tim Althoff"},{"@pid":"48/1492","text":"Damian Borth"},{"@pid":"43/7401","text":"Jörn Hees"},{"@pid":"d/AndreasDengel","text":"Andreas Dengel 0001"}]},"title":"Analysis and Forecasting of Trending Topics in Online Media Streams.","venue":"CoRR","volume":"abs/1405.7452","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/AlthoffBHD14","ee":"http://arxiv.org/abs/1405.7452","url":"https://dblp.org/rec/journals/corr/AlthoffBHD14"}, "url":"URL#3966980" }, { "@score":"1", "@id":"3966981", "info":{"authors":{"author":[{"@pid":"119/1352","text":"Tim Althoff"},{"@pid":"49/3976","text":"Cristian Danescu-Niculescu-Mizil"},{"@pid":"31/985","text":"Dan Jurafsky"}]},"title":"How to Ask for a Favor: A Case Study on the Success of Altruistic Requests.","venue":"CoRR","volume":"abs/1405.3282","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/AlthoffDJ14","ee":"http://arxiv.org/abs/1405.3282","url":"https://dblp.org/rec/journals/corr/AlthoffDJ14"}, "url":"URL#3966981" }, { "@score":"1", "@id":"3966982", "info":{"authors":{"author":[{"@pid":"119/1352","text":"Tim Althoff"},{"@pid":"05/10781","text":"Hyun Oh Song"},{"@pid":"d/TrevorDarrell","text":"Trevor Darrell"}]},"title":"Detection Bank: An Object Detection Based Video Representation for Multimedia Event Recognition.","venue":"CoRR","volume":"abs/1405.7102","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/AlthoffSD14","ee":"http://arxiv.org/abs/1405.7102","url":"https://dblp.org/rec/journals/corr/AlthoffSD14"}, "url":"URL#3966982" }, { "@score":"1", "@id":"3966983", "info":{"authors":{"author":[{"@pid":"44/9368","text":"Andrés Altieri"},{"@pid":"44/1416","text":"Pablo Piantanida"},{"@pid":"04/258","text":"Leonardo Rey Vega"},{"@pid":"44/8632","text":"Cecilia G. Galarza"}]},"title":"On Fundamental Trade-offs of Device-to-Device Communications in Large Wireless Networks.","venue":"CoRR","volume":"abs/1405.2295","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/AltieriPVG14","ee":"http://arxiv.org/abs/1405.2295","url":"https://dblp.org/rec/journals/corr/AltieriPVG14"}, "url":"URL#3966983" }, { "@score":"1", "@id":"3966997", "info":{"authors":{"author":[{"@pid":"17/4975","text":"Mario Alviano"},{"@pid":"115/6847","text":"Carmine Dodaro"},{"@pid":"r/FrancescoRicca","text":"Francesco Ricca"}]},"title":"Anytime Computation of Cautious Consequences in Answer Set Programming.","venue":"CoRR","volume":"abs/1405.3546","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/AlvianoDR14a","ee":"http://arxiv.org/abs/1405.3546","url":"https://dblp.org/rec/journals/corr/AlvianoDR14a"}, "url":"URL#3966997" }, { "@score":"1", "@id":"3966998", "info":{"authors":{"author":[{"@pid":"17/4975","text":"Mario Alviano"},{"@pid":"f/WolfgangFaber","text":"Wolfgang Faber 0001"}]},"title":"Semantics and Compilation of Answer Set Programming with Generalized Atoms.","venue":"CoRR","volume":"abs/1405.1287","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/AlvianoF14","ee":"http://arxiv.org/abs/1405.1287","url":"https://dblp.org/rec/journals/corr/AlvianoF14"}, "url":"URL#3966998" }, { "@score":"1", "@id":"3967023", "info":{"authors":{"author":[{"@pid":"136/8234","text":"Sivaram Ambikasaran"},{"@pid":"128/3950","text":"Michael O'Neil"}]},"title":"Fast symmetric factorization of hierarchical matrices with applications.","venue":"CoRR","volume":"abs/1405.0223","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/AmbikasaranO14","ee":"http://arxiv.org/abs/1405.0223","url":"https://dblp.org/rec/journals/corr/AmbikasaranO14"}, "url":"URL#3967023" }, { "@score":"1", "@id":"3967039", "info":{"authors":{"author":[{"@pid":"a/AAmir","text":"Amihood Amir"},{"@pid":"60/3556","text":"Timothy M. Chan"},{"@pid":"l/MosheLewenstein","text":"Moshe Lewenstein"},{"@pid":"33/5058","text":"Noa Lewenstein"}]},"title":"On Hardness of Jumbled Indexing.","venue":"CoRR","volume":"abs/1405.0189","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/AmirCLL14","ee":"http://arxiv.org/abs/1405.0189","url":"https://dblp.org/rec/journals/corr/AmirCLL14"}, "url":"URL#3967039" }, { "@score":"1", "@id":"3967068", "info":{"authors":{"author":[{"@pid":"69/775-5","text":"Vishal Anand 0005"},{"@pid":"146/0525","text":"Ramani S"}]},"title":"Fault Localization in a Software Project using Back-Tracking Principles of Matrix Dependency.","venue":"CoRR","volume":"abs/1405.0786","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/AnandS14","ee":"http://arxiv.org/abs/1405.0786","url":"https://dblp.org/rec/journals/corr/AnandS14"}, "url":"URL#3967068" }, { "@score":"1", "@id":"3967077", "info":{"authors":{"author":[{"@pid":"60/8821","text":"Nima Anari"},{"@pid":"82/4256","text":"Gagan Goel"},{"@pid":"11/8821","text":"Afshin Nikzad"}]},"title":"Mechanisms Design for Crowdsourcing: An Optimal 1-1/e Approximate Budget-Feasible Mechanism for Large Markets.","venue":"CoRR","volume":"abs/1405.2452","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/AnariGN14","ee":"http://arxiv.org/abs/1405.2452","url":"https://dblp.org/rec/journals/corr/AnariGN14"}, "url":"URL#3967077" }, { "@score":"1", "@id":"3967087", "info":{"authors":{"author":{"@pid":"117/9970","text":"Kerstin Andersson"}},"title":"Exact Probability Distribution versus Entropy.","venue":"CoRR","volume":"abs/1405.2418","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/Andersson14","ee":"http://arxiv.org/abs/1405.2418","url":"https://dblp.org/rec/journals/corr/Andersson14"}, "url":"URL#3967087" }, { "@score":"1", "@id":"3967098", "info":{"authors":{"author":[{"@pid":"84/4900","text":"Jeffrey G. Andrews"},{"@pid":"47/2793","text":"Stefano Buzzi"},{"@pid":"91/4197","text":"Wan Choi 0001"},{"@pid":"25/3433","text":"Stephen V. Hanly"},{"@pid":"84/1348","text":"Angel E. Lozano"},{"@pid":"45/1278","text":"Anthony C. K. Soong"},{"@pid":"78/6091-2","text":"Jianzhong (Charlie) Zhang"}]},"title":"What Will 5G Be?","venue":"CoRR","volume":"abs/1405.2957","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/AndrewsBCHLSZ14","ee":"http://arxiv.org/abs/1405.2957","url":"https://dblp.org/rec/journals/corr/AndrewsBCHLSZ14"}, "url":"URL#3967098" }, { "@score":"1", "@id":"3967104", "info":{"authors":{"author":[{"@pid":"87/6723","text":"Ion Androutsopoulos"},{"@pid":"99/1688","text":"Gerasimos Lampouras"},{"@pid":"39/6166","text":"Dimitrios Galanis"}]},"title":"Generating Natural Language Descriptions from OWL Ontologies: the NaturalOWL System.","venue":"CoRR","volume":"abs/1405.6164","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/AndroutsopoulosLG14","ee":"http://arxiv.org/abs/1405.6164","url":"https://dblp.org/rec/journals/corr/AndroutsopoulosLG14"}, "url":"URL#3967104" }, { "@score":"1", "@id":"3967105", "info":{"authors":{"author":[{"@pid":"119/4947","text":"Marcin Andrychowicz"},{"@pid":"86/5357","text":"Stefan Dziembowski"},{"@pid":"138/8989","text":"Daniel Malinowski"},{"@pid":"138/9041","text":"Lukasz Mazurek"}]},"title":"Modeling Bitcoin Contracts by Timed Automata.","venue":"CoRR","volume":"abs/1405.1861","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/AndrychowiczDMM14","ee":"http://arxiv.org/abs/1405.1861","url":"https://dblp.org/rec/journals/corr/AndrychowiczDMM14"}, "url":"URL#3967105" }, { "@score":"1", "@id":"3967118", "info":{"authors":{"author":[{"@pid":"32/10081","text":"Leonardo Aniello"},{"@pid":"31/4416","text":"Andrea Bondavalli"},{"@pid":"31/1895","text":"Andrea Ceccarelli"},{"@pid":"146/0123","text":"Claudio Ciccotelli"},{"@pid":"c/MarcelloCinque","text":"Marcello Cinque"},{"@pid":"79/9641","text":"Flavio Frattini"},{"@pid":"18/3019","text":"Antonella Guzzo"},{"@pid":"62/8357","text":"Antonio Pecchia"},{"@pid":"p/APugliese","text":"Andrea Pugliese 0001"},{"@pid":"24/2123","text":"Leonardo Querzoni"},{"@pid":"20/665","text":"Stefano Russo 0001"}]},"title":"Big Data in Critical Infrastructures Security Monitoring: Challenges and Opportunities.","venue":"CoRR","volume":"abs/1405.0325","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/AnielloBCCCFGPPQR14","ee":"http://arxiv.org/abs/1405.0325","url":"https://dblp.org/rec/journals/corr/AnielloBCCCFGPPQR14"}, "url":"URL#3967118" }, { "@score":"1", "@id":"3967139", "info":{"authors":{"author":{"@pid":"136/8357","text":"Christian Antic"}},"title":"On cascade products of answer set programs.","venue":"CoRR","volume":"abs/1405.3608","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/Antic14","ee":"http://arxiv.org/abs/1405.3608","url":"https://dblp.org/rec/journals/corr/Antic14"}, "url":"URL#3967139" }, { "@score":"1", "@id":"3967143", "info":{"authors":{"author":[{"@pid":"93/5223","text":"Lucas Antiqueira"},{"@pid":"63/5422","text":"Liang Zhao"}]},"title":"Spatial Neural Networks and their Functional Samples: Similarities and Differences.","venue":"CoRR","volume":"abs/1405.0573","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/AntiqueiraZ14","ee":"http://arxiv.org/abs/1405.0573","url":"https://dblp.org/rec/journals/corr/AntiqueiraZ14"}, "url":"URL#3967143" }, { "@score":"1", "@id":"3967174", "info":{"authors":{"author":[{"@pid":"146/0708","text":"Dor Arad"},{"@pid":"146/0898","text":"Yael Mordechai"},{"@pid":"32/897","text":"Hadas Shachnai"}]},"title":"Tighter Bounds for Makespan Minimization on Unrelated Machines.","venue":"CoRR","volume":"abs/1405.2530","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/AradMS14","ee":"http://arxiv.org/abs/1405.2530","url":"https://dblp.org/rec/journals/corr/AradMS14"}, "url":"URL#3967174" }, { "@score":"1", "@id":"3967177", "info":{"authors":{"author":[{"@pid":"118/0034","text":"Dejanira Araiza-Illan"},{"@pid":"56/6082","text":"Kerstin Eder"},{"@pid":"83/10538","text":"Arthur Richards"}]},"title":"Formal Verification of Control Systems Properties with Theorem Proving.","venue":"CoRR","volume":"abs/1405.7615","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/Araiza-IllanER14","ee":"http://arxiv.org/abs/1405.7615","url":"https://dblp.org/rec/journals/corr/Araiza-IllanER14"}, "url":"URL#3967177" }, { "@score":"1", "@id":"3967202", "info":{"authors":{"author":[{"@pid":"62/7440","text":"Miguel Areias 0001"},{"@pid":"20/2773-1","text":"Ricardo Rocha 0001"}]},"title":"A Simple and Efficient Lock-Free Hash Trie Design for Concurrent Tabling.","venue":"CoRR","volume":"abs/1405.2850","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/AreiasR14","ee":"http://arxiv.org/abs/1405.2850","url":"https://dblp.org/rec/journals/corr/AreiasR14"}, "url":"URL#3967202" }, { "@score":"1", "@id":"3967217", "info":{"authors":{"author":[{"@pid":"83/5211","text":"Vladimir Aristov 0002"},{"@pid":"91/11188","text":"Andrey Stroganov"}]},"title":"Development of the method of computer analogy for studying and solving complex nonlinear systems.","venue":"CoRR","volume":"abs/1405.6139","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/AristovS14","ee":"http://arxiv.org/abs/1405.6139","url":"https://dblp.org/rec/journals/corr/AristovS14"}, "url":"URL#3967217" }, { "@score":"1", "@id":"3967229", "info":{"authors":{"author":{"@pid":"61/9472","text":"Jörg Arndt"}},"title":"Subset-lex: did we miss an order?","venue":"CoRR","volume":"abs/1405.6503","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/Arndt14","ee":"http://arxiv.org/abs/1405.6503","url":"https://dblp.org/rec/journals/corr/Arndt14"}, "url":"URL#3967229" }, { "@score":"1", "@id":"3967233", "info":{"authors":{"author":[{"@pid":"146/0924","text":"Taylor B. Arnold"},{"@pid":"95/3027","text":"Ryan J. Tibshirani"}]},"title":"Efficient Implementations of the Generalized Lasso Dual Path Algorithm.","venue":"CoRR","volume":"abs/1405.3222","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/ArnoldT14","ee":"http://arxiv.org/abs/1405.3222","url":"https://dblp.org/rec/journals/corr/ArnoldT14"}, "url":"URL#3967233" }, { "@score":"1", "@id":"3967241", "info":{"authors":{"author":[{"@pid":"146/0679","text":"Megha Arora"},{"@pid":"146/0728","text":"Raghav Gupta"},{"@pid":"97/5147","text":"Ponnurangam Kumaraguru"}]},"title":"Indian Premier League (IPL), Cricket, Online Social Media.","venue":"CoRR","volume":"abs/1405.5009","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/AroraGK14","ee":"http://arxiv.org/abs/1405.5009","url":"https://dblp.org/rec/journals/corr/AroraGK14"}, "url":"URL#3967241" }, { "@score":"1", "@id":"3967243", "info":{"authors":{"author":[{"@pid":"146/0634","text":"Yosra Arous"},{"@pid":"45/9836","text":"Olfa Boubaker"}]},"title":"Gait trajectory generation for a five link bipedal robot based on a reduced dynamical model.","venue":"CoRR","volume":"abs/1405.3103","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/ArousB14","ee":"http://arxiv.org/abs/1405.3103","url":"https://dblp.org/rec/journals/corr/ArousB14"}, "url":"URL#3967243" }, { "@score":"1", "@id":"3967257", "info":{"authors":{"author":[{"@pid":"49/10336","text":"Oktay Arslan"},{"@pid":"155/9964","text":"Evangelos A. Theodorou"},{"@pid":"43/5956","text":"Panagiotis Tsiotras"}]},"title":"Information-Theoretic Stochastic Optimal Control via Incremental Sampling-based Algorithms.","venue":"CoRR","volume":"abs/1405.7392","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/ArslanTT14","ee":"http://arxiv.org/abs/1405.7392","url":"https://dblp.org/rec/journals/corr/ArslanTT14"}, "url":"URL#3967257" }, { "@score":"1", "@id":"3967267", "info":{"authors":{"author":[{"@pid":"138/6208","text":"P. V. Arun"},{"@pid":"152/3700","text":"Sunil Kumar Katiyar"}]},"title":"An evolutionary computational based approach towards automatic image registration.","venue":"CoRR","volume":"abs/1405.6136","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/ArunK14","ee":"http://arxiv.org/abs/1405.6136","url":"https://dblp.org/rec/journals/corr/ArunK14"}, "url":"URL#3967267" }, { "@score":"1", "@id":"3967271", "info":{"authors":{"author":[{"@pid":"57/8044","text":"Arash Asadi"},{"@pid":"31/1866","text":"Peter Jacko"},{"@pid":"46/1660","text":"Vincenzo Mancuso"}]},"title":"Modeling Multi-mode D2D Communications in LTE.","venue":"CoRR","volume":"abs/1405.6689","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/AsadiJM14","ee":"http://arxiv.org/abs/1405.6689","url":"https://dblp.org/rec/journals/corr/AsadiJM14"}, "url":"URL#3967271" }, { "@score":"1", "@id":"3967324", "info":{"authors":{"author":[{"@pid":"45/8761","text":"Joshua Atkins"},{"@pid":"80/8052","text":"Daniele Giacobello"}]},"title":"Trends and Perspectives for Signal Processing in Consumer Audio.","venue":"CoRR","volume":"abs/1405.4843","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/AtkinsG14","ee":"http://arxiv.org/abs/1405.4843","url":"https://dblp.org/rec/journals/corr/AtkinsG14"}, "url":"URL#3967324" }, { "@score":"1", "@id":"3967331", "info":{"authors":{"author":{"@pid":"143/7447","text":"James Atwood"}},"title":"Learning to Generate Networks.","venue":"CoRR","volume":"abs/1405.5868","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/Atwood14","ee":"http://arxiv.org/abs/1405.5868","url":"https://dblp.org/rec/journals/corr/Atwood14"}, "url":"URL#3967331" }, { "@score":"1", "@id":"3967351", "info":{"authors":{"author":[{"@pid":"75/1538","text":"Marcel Ausloos"},{"@pid":"09/6239","text":"Herbert Dawid"},{"@pid":"57/4638","text":"Ugo Merlone"}]},"title":"Spatial interactions in agent-based modeling.","venue":"CoRR","volume":"abs/1405.0733","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/AusloosDM14","ee":"http://arxiv.org/abs/1405.0733","url":"https://dblp.org/rec/journals/corr/AusloosDM14"}, "url":"URL#3967351" }, { "@score":"1", "@id":"3967366", "info":{"authors":{"author":[{"@pid":"60/1535","text":"Jeremy Avigad"},{"@pid":"21/8611","text":"Johannes Hölzl"},{"@pid":"146/0368","text":"Luke Serafin"}]},"title":"A formally verified proof of the Central Limit Theorem.","venue":"CoRR","volume":"abs/1405.7012","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/AvigadHS14","ee":"http://arxiv.org/abs/1405.7012","url":"https://dblp.org/rec/journals/corr/AvigadHS14"}, "url":"URL#3967366" }, { "@score":"1", "@id":"3967378", "info":{"authors":{"author":[{"@pid":"146/0820","text":"Edmond Awad"},{"@pid":"58/6050","text":"Richard Booth 0001"},{"@pid":"t/FernandoATohme","text":"Fernando Tohmé"},{"@pid":"17/525","text":"Iyad Rahwan"}]},"title":"Judgment Aggregation in Multi-Agent Argumentation.","venue":"CoRR","volume":"abs/1405.6509","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/AwadBTR14","ee":"http://arxiv.org/abs/1405.6509","url":"https://dblp.org/rec/journals/corr/AwadBTR14"}, "url":"URL#3967378" }, { "@score":"1", "@id":"3967381", "info":{"authors":{"author":[{"@pid":"137/8326","text":"Abhishek Awasthi"},{"@pid":"18/6095","text":"Jörg Lässig"},{"@pid":"34/4776","text":"Oliver Kramer 0001"}]},"title":"A Novel Approach to the Common Due-Date Problem on Single and Parallel Machines.","venue":"CoRR","volume":"abs/1405.1234","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/AwasthiLK14","ee":"http://arxiv.org/abs/1405.1234","url":"https://dblp.org/rec/journals/corr/AwasthiLK14"}, "url":"URL#3967381" }, { "@score":"1", "@id":"3967400", "info":{"authors":{"author":[{"@pid":"118/2623","text":"Hosein Azarbonyad"},{"@pid":"146/0547","text":"Reza Babazadeh"}]},"title":"A Genetic Algorithm for solving Quadratic Assignment Problem(QAP).","venue":"CoRR","volume":"abs/1405.5050","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/AzarbonyadB14","ee":"http://arxiv.org/abs/1405.5050","url":"https://dblp.org/rec/journals/corr/AzarbonyadB14"}, "url":"URL#3967400" }, { "@score":"1", "@id":"3967401", "info":{"authors":{"author":[{"@pid":"118/2623","text":"Hosein Azarbonyad"},{"@pid":"50/2756","text":"Azadeh Shakery"},{"@pid":"40/9125","text":"Heshaam Faili"}]},"title":"Learning to Exploit Different Translation Resources for Cross Language Information Retrieval.","venue":"CoRR","volume":"abs/1405.5447","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/AzarbonyadSF14","ee":"http://arxiv.org/abs/1405.5447","url":"https://dblp.org/rec/journals/corr/AzarbonyadSF14"}, "url":"URL#3967401" }, { "@score":"1", "@id":"3967416", "info":{"authors":{"author":{"@pid":"95/9958","text":"Rehan Abdul Aziz"}},"title":"Bound Founded Answer Set Programming.","venue":"CoRR","volume":"abs/1405.3367","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/Aziz14b","ee":"http://arxiv.org/abs/1405.3367","url":"https://dblp.org/rec/journals/corr/Aziz14b"}, "url":"URL#3967416" }, { "@score":"1", "@id":"3967424", "info":{"authors":{"author":[{"@pid":"95/9958","text":"Rehan Abdul Aziz"},{"@pid":"16/7407","text":"Geoffrey Chu"},{"@pid":"s/PeterJStuckey","text":"Peter James Stuckey"}]},"title":"Grounding Bound Founded Answer Set Programs.","venue":"CoRR","volume":"abs/1405.3362","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/AzizCS14","ee":"http://arxiv.org/abs/1405.3362","url":"https://dblp.org/rec/journals/corr/AzizCS14"}, "url":"URL#3967424" }, { "@score":"1", "@id":"3967432", "info":{"authors":{"author":{"@pid":"132/9128","text":"Reza Azizi"}},"title":"Empirical Study of Artificial Fish Swarm Algorithm.","venue":"CoRR","volume":"abs/1405.4138","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/Azizi14","ee":"http://arxiv.org/abs/1405.4138","url":"https://dblp.org/rec/journals/corr/Azizi14"}, "url":"URL#3967432" }, { "@score":"1", "@id":"3967433", "info":{"authors":{"author":[{"@pid":"146/0494","text":"Elham Azizi"},{"@pid":"56/776","text":"James E. Galagan"},{"@pid":"a/EdoardoAiroldi","text":"Edoardo M. Airoldi"}]},"title":"Learning modular structures from network data and node variables.","venue":"CoRR","volume":"abs/1405.2566","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/AziziGA14","ee":"http://arxiv.org/abs/1405.2566","url":"https://dblp.org/rec/journals/corr/AziziGA14"}, "url":"URL#3967433" }, { "@score":"1", "@id":"3967434", "info":{"authors":{"author":[{"@pid":"119/1327","text":"Hossein Azizpour"},{"@pid":"17/709","text":"Stefan Carlsson"}]},"title":"Self-tuned Visual Subclass Learning with Shared Samples An Incremental Approach.","venue":"CoRR","volume":"abs/1405.5732","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/AzizpourC14","ee":"http://arxiv.org/abs/1405.5732","url":"https://dblp.org/rec/journals/corr/AzizpourC14"}, "url":"URL#3967434" }, { "@score":"1", "@id":"3967447", "info":{"authors":{"author":[{"@pid":"b/MosheBabaioff","text":"Moshe Babaioff"},{"@pid":"43/3631","text":"Nicole Immorlica"},{"@pid":"09/6191","text":"Brendan Lucier"},{"@pid":"52/2474","text":"S. Matthew Weinberg"}]},"title":"A Simple and Approximately Optimal Mechanism for an Additive Buyer.","venue":"CoRR","volume":"abs/1405.6146","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/BabaioffILW14","ee":"http://arxiv.org/abs/1405.6146","url":"https://dblp.org/rec/journals/corr/BabaioffILW14"}, "url":"URL#3967447" }, { "@score":"1", "@id":"3967463", "info":{"authors":{"author":[{"@pid":"24/9830","text":"Yakov Babichenko"},{"@pid":"15/7867","text":"Omer Tamuz"}]},"title":"Graphical potential games.","venue":"CoRR","volume":"abs/1405.1481","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/BabichenkoT14","ee":"http://arxiv.org/abs/1405.1481","url":"https://dblp.org/rec/journals/corr/BabichenkoT14"}, "url":"URL#3967463" }, { "@score":"1", "@id":"3967498", "info":{"authors":{"author":[{"@pid":"57/6569","text":"Éric Badouel"},{"@pid":"h/LoicHelouet","text":"Loïc Hélouët"},{"@pid":"44/1755","text":"Georges Edouard Kouamou"},{"@pid":"36/7009","text":"Christophe Morvan"}]},"title":"A Grammatical Approach to Data-centric Case Management in a Distributed Collaborative Environment.","venue":"CoRR","volume":"abs/1405.3223","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/BadouelHKM14","ee":"http://arxiv.org/abs/1405.3223","url":"https://dblp.org/rec/journals/corr/BadouelHKM14"}, "url":"URL#3967498" }, { "@score":"1", "@id":"3967507", "info":{"authors":{"author":[{"@pid":"20/6834","text":"Jean-François Baget"},{"@pid":"146/0721","text":"Fabien Garreau"},{"@pid":"10/88","text":"Marie-Laure Mugnier"},{"@pid":"132/2824","text":"Swan Rocher"}]},"title":"Revisiting Chase Termination for Existential Rules and their Extension to Nonmonotonic Negation.","venue":"CoRR","volume":"abs/1405.1071","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/BagetGMR14","ee":"http://arxiv.org/abs/1405.1071","url":"https://dblp.org/rec/journals/corr/BagetGMR14"}, "url":"URL#3967507" }, { "@score":"1", "@id":"3967526", "info":{"authors":{"author":[{"@pid":"79/3898","text":"Mehdi Bahrami"},{"@pid":"60/9769","text":"Peyman Arebi"},{"@pid":"146/0689","text":"Hosseyn Bakhshizadeh"},{"@pid":"146/0864","text":"Hamed Barangi"}]},"title":"A Novel Self-Recognition Method for Autonomic Grid Networks Case Study: Advisor Labor Law Software Application.","venue":"CoRR","volume":"abs/1405.6178","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/BahramiABB14","ee":"http://arxiv.org/abs/1405.6178","url":"https://dblp.org/rec/journals/corr/BahramiABB14"}, "url":"URL#3967526" }, { "@score":"1", "@id":"3967539", "info":{"authors":{"author":[{"@pid":"198/5303","text":"Priya Bajaj"},{"@pid":"82/8262","text":"Supriya Raheja"}]},"title":"A Vague Improved Markov Model Approach for Web Page Prediction.","venue":"CoRR","volume":"abs/1405.7868","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/BajajR14","ee":"http://arxiv.org/abs/1405.7868","url":"https://dblp.org/rec/journals/corr/BajajR14"}, "url":"URL#3967539" }, { "@score":"1", "@id":"3967540", "info":{"authors":{"author":[{"@pid":"198/5303","text":"Priya Bajaj"},{"@pid":"82/8262","text":"Supriya Raheja"}]},"title":"Integrating Vague Association Mining with Markov Model.","venue":"CoRR","volume":"abs/1405.7869","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/BajajR14a","ee":"http://arxiv.org/abs/1405.7869","url":"https://dblp.org/rec/journals/corr/BajajR14a"}, "url":"URL#3967540" }, { "@score":"1", "@id":"3967551", "info":{"authors":{"author":{"@pid":"146/0711","text":"Mohsen A. Bakouri"}},"title":"Sensorless Physiological Control of Implantable Rotary Blood Pumps for Heart Failure Patients Using Modern Control Techniques.","venue":"CoRR","volume":"abs/1405.2419","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/Bakouri14","ee":"http://arxiv.org/abs/1405.2419","url":"https://dblp.org/rec/journals/corr/Bakouri14"}, "url":"URL#3967551" }, { "@score":"1", "@id":"3967574", "info":{"authors":{"author":[{"@pid":"26/3594","text":"Marco Baldi"},{"@pid":"123/4621","text":"Nicola Maturo"},{"@pid":"143/2966","text":"Eugenio Montali"},{"@pid":"64/4583","text":"Franco Chiaraluce"}]},"title":"AONT-LT: a Data Protection Scheme for Cloud and Cooperative Storage Systems.","venue":"CoRR","volume":"abs/1405.7586","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/BaldiMMC14","ee":"http://arxiv.org/abs/1405.7586","url":"https://dblp.org/rec/journals/corr/BaldiMMC14"}, "url":"URL#3967574" }, { "@score":"1", "@id":"3967578", "info":{"authors":{"author":[{"@pid":"b/RBaldoni","text":"Roberto Baldoni"},{"@pid":"30/10876","text":"Mario Caruso"},{"@pid":"87/7555","text":"Adriano Cerocchi"},{"@pid":"146/0123","text":"Claudio Ciccotelli"},{"@pid":"74/7555","text":"Luca Montanari"},{"@pid":"146/0948","text":"Luca Nicoletti"}]},"title":"Correlating power consumption and network traffic for improving data centers resiliency.","venue":"CoRR","volume":"abs/1405.2992","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/BaldoniCCCMN14","ee":"http://arxiv.org/abs/1405.2992","url":"https://dblp.org/rec/journals/corr/BaldoniCCCMN14"}, "url":"URL#3967578" }, { "@score":"1", "@id":"3967579", "info":{"authors":{"author":[{"@pid":"74/3410","text":"Marcello Balduccini"},{"@pid":"r/WCRegli","text":"William C. Regli"},{"@pid":"87/2421","text":"Duc N. Nguyen"}]},"title":"An ASP-Based Architecture for Autonomous UAVs in Dynamic Environments: Progress Report.","venue":"CoRR","volume":"abs/1405.1124","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/BalducciniRN14","ee":"http://arxiv.org/abs/1405.1124","url":"https://dblp.org/rec/journals/corr/BalducciniRN14"}, "url":"URL#3967579" }, { "@score":"1", "@id":"3967580", "info":{"authors":{"author":[{"@pid":"74/3410","text":"Marcello Balduccini"},{"@pid":"r/WCRegli","text":"William C. Regli"},{"@pid":"87/2421","text":"Duc N. Nguyen"}]},"title":"Towards an ASP-Based Architecture for Autonomous UAVs in Dynamic Environments (Extended Abstract).","venue":"CoRR","volume":"abs/1405.5443","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/BalducciniRN14a","ee":"http://arxiv.org/abs/1405.5443","url":"https://dblp.org/rec/journals/corr/BalducciniRN14a"}, "url":"URL#3967580" }, { "@score":"1", "@id":"3967602", "info":{"authors":{"author":{"@pid":"139/1297","text":"Akshay Balsubramani"}},"title":"Sharp Uniform Martingale Concentration Bounds.","venue":"CoRR","volume":"abs/1405.2639","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/Balsubramani14","ee":"http://arxiv.org/abs/1405.2639","url":"https://dblp.org/rec/journals/corr/Balsubramani14"}, "url":"URL#3967602" }, { "@score":"1", "@id":"3967611", "info":{"authors":{"author":[{"@pid":"146/0565","text":"Kristina Ban"},{"@pid":"146/0556","text":"Ivan Ivakic"},{"@pid":"75/9448","text":"Ana Mestrovic"}]},"title":"A preliminary study of Croatian Language Syllable Networks.","venue":"CoRR","volume":"abs/1405.4097","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/BanIM14","ee":"http://arxiv.org/abs/1405.4097","url":"https://dblp.org/rec/journals/corr/BanIM14"}, "url":"URL#3967611" }, { "@score":"1", "@id":"3967613", "info":{"authors":{"author":[{"@pid":"146/0565","text":"Kristina Ban"},{"@pid":"75/9448","text":"Ana Mestrovic"},{"@pid":"80/1817","text":"Sanda Martincic-Ipsic"}]},"title":"Initial Comparison of Linguistic Networks Measures for Parallel Texts.","venue":"CoRR","volume":"abs/1405.1893","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/BanMM14","ee":"http://arxiv.org/abs/1405.1893","url":"https://dblp.org/rec/journals/corr/BanMM14"}, "url":"URL#3967613" }, { "@score":"1", "@id":"3967640", "info":{"authors":{"author":{"@pid":"126/5179","text":"Sourangsu Banerji"}},"title":"Architectural Design of a RAM Arbiter.","venue":"CoRR","volume":"abs/1405.4232","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/Banerji14a","ee":"http://arxiv.org/abs/1405.4232","url":"https://dblp.org/rec/journals/corr/Banerji14a"}, "url":"URL#3967640" }, { "@score":"1", "@id":"3967650", "info":{"authors":{"author":[{"@pid":"08/6490","text":"Mayank Bansal"},{"@pid":"d/KostasDaniilidis","text":"Kostas Daniilidis"}]},"title":"Geometric Polynomial Constraints in Higher-Order Graph Matching.","venue":"CoRR","volume":"abs/1405.6261","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/BansalD14","ee":"http://arxiv.org/abs/1405.6261","url":"https://dblp.org/rec/journals/corr/BansalD14"}, "url":"URL#3967650" }, { "@score":"1", "@id":"3967654", "info":{"authors":{"author":[{"@pid":"133/7782","text":"Iulia Teodora Banu-Demergian"},{"@pid":"91/5802","text":"Gheorghe Stefanescu"}]},"title":"On contour representation of two dimensional patterns.","venue":"CoRR","volume":"abs/1405.3791","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/Banu-DemergianS14","ee":"http://arxiv.org/abs/1405.3791","url":"https://dblp.org/rec/journals/corr/Banu-DemergianS14"}, "url":"URL#3967654" }, { "@score":"1", "@id":"3967657", "info":{"authors":{"author":{"@pid":"133/5299","text":"Zhana Bao"}},"title":"Finding Inner Outliers in High Dimensional Space.","venue":"CoRR","volume":"abs/1405.0868","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/Bao14a","ee":"http://arxiv.org/abs/1405.0868","url":"https://dblp.org/rec/journals/corr/Bao14a"}, "url":"URL#3967657" }, { "@score":"1", "@id":"3967658", "info":{"authors":{"author":{"@pid":"133/5299","text":"Zhana Bao"}},"title":"Robust Subspace Outlier Detection in High Dimensional Space.","venue":"CoRR","volume":"abs/1405.0869","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/Bao14b","ee":"http://arxiv.org/abs/1405.0869","url":"https://dblp.org/rec/journals/corr/Bao14b"}, "url":"URL#3967658" }, { "@score":"1", "@id":"3967659", "info":{"authors":{"author":{"@pid":"133/5299","text":"Zhana Bao"}},"title":"K-NS: Section-Based Outlier Detection in High Dimensional Space.","venue":"CoRR","volume":"abs/1405.1027","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/Bao14c","ee":"http://arxiv.org/abs/1405.1027","url":"https://dblp.org/rec/journals/corr/Bao14c"}, "url":"URL#3967659" }, { "@score":"1", "@id":"3967683", "info":{"authors":{"author":[{"@pid":"93/9004","text":"Antimo Barbato"},{"@pid":"47/3507","text":"Antonio Capone"},{"@pid":"13/3479-2","text":"Lin Chen 0002"},{"@pid":"37/6549","text":"Fabio Martignon"},{"@pid":"30/4126","text":"Stefano Paris"}]},"title":"A Distributed Demand-Side Management Framework for the Smart Grid.","venue":"CoRR","volume":"abs/1405.1964","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/BarbatoCCMP14","ee":"http://arxiv.org/abs/1405.1964","url":"https://dblp.org/rec/journals/corr/BarbatoCCMP14"}, "url":"URL#3967683" }, { "@score":"1", "@id":"3967705", "info":{"authors":{"author":[{"@pid":"144/7373","text":"Matthieu Barjon"},{"@pid":"71/4157","text":"Arnaud Casteigts"},{"@pid":"38/859","text":"Serge Chaumette"},{"@pid":"16/4047","text":"Colette Johnen"},{"@pid":"144/7379","text":"Yessin M. Neggaz"}]},"title":"Un algorithme de test pour la connexité temporelle des graphes dynamiques de faible densité.","venue":"CoRR","volume":"abs/1405.0170","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/BarjonCCJN14a","ee":"http://arxiv.org/abs/1405.0170","url":"https://dblp.org/rec/journals/corr/BarjonCCJN14a"}, "url":"URL#3967705" }, { "@score":"1", "@id":"3967719", "info":{"authors":{"author":[{"@pid":"144/7336","text":"Amaro Barreal"},{"@pid":"06/716","text":"Camilla Hollanti"},{"@pid":"127/6902","text":"David A. Karpuk"},{"@pid":"80/718","text":"Hsiao-feng Lu"}]},"title":"Algebraic Codes and a New Physical Layer Transmission Protocol for Wireless Distributed Storage Systems.","venue":"CoRR","volume":"abs/1405.4375","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/BarrealHKL14","ee":"http://arxiv.org/abs/1405.4375","url":"https://dblp.org/rec/journals/corr/BarrealHKL14"}, "url":"URL#3967719" }, { "@score":"1", "@id":"3967732", "info":{"authors":{"author":[{"@pid":"04/5344","text":"Roman Barták"},{"@pid":"z/NengFaZhou","text":"Neng-Fa Zhou"}]},"title":"Using Tabled Logic Programming to Solve the Petrobras Planning Problem.","venue":"CoRR","volume":"abs/1405.2501","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/BartakZ14","ee":"http://arxiv.org/abs/1405.2501","url":"https://dblp.org/rec/journals/corr/BartakZ14"}, "url":"URL#3967732" }, { "@score":"1", "@id":"3967740", "info":{"authors":{"author":[{"@pid":"138/4839","text":"Ulrike Barthelmess"},{"@pid":"f/UlrichFurbach","text":"Ulrich Furbach"}]},"title":"Do we need Asimov's Laws?","venue":"CoRR","volume":"abs/1405.0961","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/BarthelmessF14","ee":"http://arxiv.org/abs/1405.0961","url":"https://dblp.org/rec/journals/corr/BarthelmessF14"}, "url":"URL#3967740" }, { "@score":"1", "@id":"3967752", "info":{"authors":{"author":{"@pid":"77/6660","text":"Alexander I. Barvinok"}},"title":"Computing the permanent of (some) complex matrices.","venue":"CoRR","volume":"abs/1405.1303","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/Barvinok14","ee":"http://arxiv.org/abs/1405.1303","url":"https://dblp.org/rec/journals/corr/Barvinok14"}, "url":"URL#3967752" }, { "@score":"1", "@id":"3967767", "info":{"authors":{"author":[{"@pid":"146/0654","text":"Farhana Bashar"},{"@pid":"83/5123","text":"S. M. Akramus Salehin"},{"@pid":"59/3573","text":"Thushara D. Abhayapala"}]},"title":"Analysis of Degrees of Freedom of Wideband Random Multipath Fields Observed Over Time and Space Windows.","venue":"CoRR","volume":"abs/1405.1153","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/BasharSA14","ee":"http://arxiv.org/abs/1405.1153","url":"https://dblp.org/rec/journals/corr/BasharSA14"}, "url":"URL#3967767" }, { "@score":"1", "@id":"3967768", "info":{"authors":{"author":[{"@pid":"146/0654","text":"Farhana Bashar"},{"@pid":"83/5123","text":"S. M. Akramus Salehin"},{"@pid":"59/3573","text":"Thushara D. Abhayapala"}]},"title":"Band Limited Signals Observed Over Finite Spatial and Temporal Windows: An Upper Bound to Signal Degrees of Freedom.","venue":"CoRR","volume":"abs/1405.2163","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/BasharSA14a","ee":"http://arxiv.org/abs/1405.2163","url":"https://dblp.org/rec/journals/corr/BasharSA14a"}, "url":"URL#3967768" }, { "@score":"1", "@id":"3967769", "info":{"authors":{"author":[{"@pid":"56/10224","text":"Mohammed Bakri Bashir"},{"@pid":"93/6052","text":"Muhammad Shafie Abdul Latif"},{"@pid":"142/2607","text":"Shafii Muhammad Abdulhamid"},{"@pid":"146/0868","text":"Cheah Tek Loon"}]},"title":"Grid-based Search Technique for Massive Academic Publications.","venue":"CoRR","volume":"abs/1405.6215","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/BashirLAL14","ee":"http://arxiv.org/abs/1405.6215","url":"https://dblp.org/rec/journals/corr/BashirLAL14"}, "url":"URL#3967769" }, { "@score":"1", "@id":"3967775", "info":{"authors":{"author":[{"@pid":"88/8656","text":"Raef Bassily"},{"@pid":"04/5072","text":"Adam D. Smith"},{"@pid":"31/8315","text":"Abhradeep Thakurta"}]},"title":"Private Empirical Risk Minimization, Revisited.","venue":"CoRR","volume":"abs/1405.7085","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/BassilyST14","ee":"http://arxiv.org/abs/1405.7085","url":"https://dblp.org/rec/journals/corr/BassilyST14"}, "url":"URL#3967775" }, { "@score":"1", "@id":"3967777", "info":{"authors":{"author":[{"@pid":"127/6491","text":"Ejder Bastug"},{"@pid":"09/3625","text":"Mehdi Bennis"},{"@pid":"75/4085","text":"Mérouane Debbah"}]},"title":"Cache-enabled Small Cell Networks: Modeling and Tradeoffs.","venue":"CoRR","volume":"abs/1405.3477","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/BastugBD14","ee":"http://arxiv.org/abs/1405.3477","url":"https://dblp.org/rec/journals/corr/BastugBD14"}, "url":"URL#3967777" }, { "@score":"1", "@id":"3967778", "info":{"authors":{"author":[{"@pid":"127/6491","text":"Ejder Bastug"},{"@pid":"09/3625","text":"Mehdi Bennis"},{"@pid":"75/4085","text":"Mérouane Debbah"}]},"title":"Living on the Edge: The Role of Proactive Caching in 5G Wireless Networks.","venue":"CoRR","volume":"abs/1405.5974","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/BastugBD14a","ee":"http://arxiv.org/abs/1405.5974","url":"https://dblp.org/rec/journals/corr/BastugBD14a"}, "url":"URL#3967778" }, { "@score":"1", "@id":"3967794", "info":{"authors":{"author":[{"@pid":"146/0609","text":"Arash Batni"},{"@pid":"41/4838","text":"Farshad Safaei"}]},"title":"A New Multi-Tiered Solid State Disk Using Slc/Mlc Combined Flash Memory.","venue":"CoRR","volume":"abs/1405.2157","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/BatniS14","ee":"http://arxiv.org/abs/1405.2157","url":"https://dblp.org/rec/journals/corr/BatniS14"}, "url":"URL#3967794" }, { "@score":"1", "@id":"3967809", "info":{"authors":{"author":{"@pid":"117/2586","text":"Petr Baudis"}},"title":"COCOpf: An Algorithm Portfolio Framework.","venue":"CoRR","volume":"abs/1405.3487","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/Baudis14","ee":"http://arxiv.org/abs/1405.3487","url":"https://dblp.org/rec/journals/corr/Baudis14"}, "url":"URL#3967809" }, { "@score":"1", "@id":"3967810", "info":{"authors":{"author":{"@pid":"117/2586","text":"Petr Baudis"}},"title":"Current Concepts in Version Control Systems.","venue":"CoRR","volume":"abs/1405.3496","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/Baudis14a","ee":"http://arxiv.org/abs/1405.3496","url":"https://dblp.org/rec/journals/corr/Baudis14a"}, "url":"URL#3967810" }, { "@score":"1", "@id":"3967824", "info":{"authors":{"author":[{"@pid":"134/4780","text":"John S. H. Baxter"},{"@pid":"85/11495","text":"Martin Rajchl"},{"@pid":"17/5765-1","text":"Jing Yuan 0001"},{"@pid":"p/TerryMPeters","text":"Terry M. Peters"}]},"title":"A Continuous Max-Flow Approach to Multi-Labeling Problems under Arbitrary Region Regularization.","venue":"CoRR","volume":"abs/1405.0892","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/BaxterRYP14a","ee":"http://arxiv.org/abs/1405.0892","url":"https://dblp.org/rec/journals/corr/BaxterRYP14a"}, "url":"URL#3967824" }, { "@score":"1", "@id":"3967829", "info":{"authors":{"author":[{"@pid":"11/10855","text":"Fábio M. Bayer"},{"@pid":"51/7601","text":"Renato J. Cintra"},{"@pid":"68/4217","text":"Arjuna Madanayake"},{"@pid":"146/1348","text":"Uma Sadhvi Potluri"}]},"title":"Multiplierless Approximate 4-point DCT VLSI Architectures for Transform Block Coding.","venue":"CoRR","volume":"abs/1405.0413","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/BayerCMP14","ee":"http://arxiv.org/abs/1405.0413","url":"https://dblp.org/rec/journals/corr/BayerCMP14"}, "url":"URL#3967829" }, { "@score":"1", "@id":"3967842", "info":{"authors":{"author":{"@pid":"47/6728","text":"Niel de Beaudrap"}},"title":"On the power of "modal quantum" computation.","venue":"CoRR","volume":"abs/1405.7381","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/Beaudrap14","ee":"http://arxiv.org/abs/1405.7381","url":"https://dblp.org/rec/journals/corr/Beaudrap14"}, "url":"URL#3967842" }, { "@score":"1", "@id":"3967846", "info":{"authors":{"author":[{"@pid":"146/0523","text":"Francesco Becattini"},{"@pid":"38/5526","text":"Arnab Chatterjee"},{"@pid":"21/1801","text":"Santo Fortunato"},{"@pid":"53/6698","text":"Marija Mitrovic"},{"@pid":"11/8148","text":"Raj Kumar Pan"},{"@pid":"146/0914","text":"Pietro Della Briotta Parolo"}]},"title":"The Nobel Prize delay.","venue":"CoRR","volume":"abs/1405.7136","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/BecattiniCFMPP14","ee":"http://arxiv.org/abs/1405.7136","url":"https://dblp.org/rec/journals/corr/BecattiniCFMPP14"}, "url":"URL#3967846" }, { "@score":"1", "@id":"3967862", "info":{"authors":{"author":[{"@pid":"146/0420","text":"Ziaeddin Beheshtifard"},{"@pid":"61/4408","text":"Mohammad Reza Meybodi"}]},"title":"Online Channel Assignment in Multi-Radio Wireless Mesh Networks Using Learning Automata.","venue":"CoRR","volume":"abs/1405.3448","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/BeheshtifardM14","ee":"http://arxiv.org/abs/1405.3448","url":"https://dblp.org/rec/journals/corr/BeheshtifardM14"}, "url":"URL#3967862" }, { "@score":"1", "@id":"3967865", "info":{"authors":{"author":{"@pid":"71/4661","text":"Salman Beigi"}},"title":"Maximal Entanglement - A New Measure of Entanglement.","venue":"CoRR","volume":"abs/1405.2502","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/Beigi14","ee":"http://arxiv.org/abs/1405.2502","url":"https://dblp.org/rec/journals/corr/Beigi14"}, "url":"URL#3967865" }, { "@score":"1", "@id":"3967885", "info":{"authors":{"author":{"@pid":"74/1531","text":"Roman V. Belavkin"}},"title":"Asymmetry of Risk and Value of Information.","venue":"CoRR","volume":"abs/1405.5860","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/Belavkin14","ee":"http://arxiv.org/abs/1405.5860","url":"https://dblp.org/rec/journals/corr/Belavkin14"}, "url":"URL#3967885" }, { "@score":"1", "@id":"3967895", "info":{"authors":{"author":[{"@pid":"146/0620","text":"James Belk"},{"@pid":"82/10652","text":"Collin Bleak"}]},"title":"Some undecidability results for asynchronous transducers and the Brin-Thompson group 2V.","venue":"CoRR","volume":"abs/1405.0982","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/BelkB14","ee":"http://arxiv.org/abs/1405.0982","url":"https://dblp.org/rec/journals/corr/BelkB14"}, "url":"URL#3967895" }, { "@score":"1", "@id":"3967914", "info":{"authors":{"author":[{"@pid":"31/8371","text":"Elena Bellodi"},{"@pid":"l/EvelinaLamma","text":"Evelina Lamma"},{"@pid":"26/4485","text":"Fabrizio Riguzzi"},{"@pid":"71/1213","text":"Vítor Santos Costa"},{"@pid":"118/8431","text":"Riccardo Zese"}]},"title":"Lifted Variable Elimination for Probabilistic Logic Programming.","venue":"CoRR","volume":"abs/1405.3218","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/BellodiLRCZ14","ee":"http://arxiv.org/abs/1405.3218","url":"https://dblp.org/rec/journals/corr/BellodiLRCZ14"}, "url":"URL#3967914" }, { "@score":"1", "@id":"3967934", "info":{"authors":{"author":[{"@pid":"144/7793","text":"Fayssal Bendaoud"},{"@pid":"70/3620","text":"Marwen Abdennebi"},{"@pid":"15/6263","text":"Fedoua Didi"}]},"title":"Allocation des ressources radio en LTE.","venue":"CoRR","volume":"abs/1405.3869","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/BendaoudAD14a","ee":"http://arxiv.org/abs/1405.3869","url":"https://dblp.org/rec/journals/corr/BendaoudAD14a"}, "url":"URL#3967934" }, { "@score":"1", "@id":"3967946", "info":{"authors":{"author":[{"@pid":"b/MichaelBenedikt","text":"Michael Benedikt"},{"@pid":"35/8772","text":"Rastislav Lenhardt"},{"@pid":"90/2367","text":"James Worrell 0001"}]},"title":"Model Checking Markov Chains Against Unambiguous Buchi Automata.","venue":"CoRR","volume":"abs/1405.4560","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/BenediktLW14","ee":"http://arxiv.org/abs/1405.4560","url":"https://dblp.org/rec/journals/corr/BenediktLW14"}, "url":"URL#3967946" }, { "@score":"1", "@id":"3967988", "info":{"authors":{"author":[{"@pid":"231/6342","text":"Ioana Oriana Bercea"},{"@pid":"20/6275","text":"Navin Goyal"},{"@pid":"22/9452","text":"David G. Harris 0001"},{"@pid":"s/AravindSrinivasan","text":"Aravind Srinivasan"}]},"title":"On Computing Maximal Independent Sets of Hypergraphs in Parallel.","venue":"CoRR","volume":"abs/1405.1133","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/BerceaGHS14","ee":"http://arxiv.org/abs/1405.1133","url":"https://dblp.org/rec/journals/corr/BerceaGHS14"}, "url":"URL#3967988" }, { "@score":"1", "@id":"3967994", "info":{"authors":{"author":{"@pid":"146/0462","text":"Ernst D. Berg"}},"title":"Introduction to Dynamic Unary Encoding.","venue":"CoRR","volume":"abs/1405.2846","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/Berg14","ee":"http://arxiv.org/abs/1405.2846","url":"https://dblp.org/rec/journals/corr/Berg14"}, "url":"URL#3967994" }, { "@score":"1", "@id":"3968015", "info":{"authors":{"author":[{"@pid":"35/3311","text":"Grégory Berhuy"},{"@pid":"58/1744","text":"Nadya Markin"},{"@pid":"72/4129","text":"B. A. Sethuraman"}]},"title":"Bounds of fast decodability of space time block codes, skew-Hermitian matrices, and Azumaya algebras.","venue":"CoRR","volume":"abs/1405.5966","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/BerhuyMS14","ee":"http://arxiv.org/abs/1405.5966","url":"https://dblp.org/rec/journals/corr/BerhuyMS14"}, "url":"URL#3968015" }, { "@score":"1", "@id":"3968037", "info":{"authors":{"author":[{"@pid":"120/7603","text":"Achilles Beros"},{"@pid":"h/CdlHiguera","text":"Colin de la Higuera"}]},"title":"A Canonical Semi-Deterministic Transducer.","venue":"CoRR","volume":"abs/1405.2476","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/BerosH14","ee":"http://arxiv.org/abs/1405.2476","url":"https://dblp.org/rec/journals/corr/BerosH14"}, "url":"URL#3968037" }, { "@score":"1", "@id":"3968038", "info":{"authors":{"author":{"@pid":"02/358","text":"Daniel Le Berre"}},"title":"Some thoughts about benchmarks for NMR.","venue":"CoRR","volume":"abs/1405.1183","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/Berre14","ee":"http://arxiv.org/abs/1405.1183","url":"https://dblp.org/rec/journals/corr/Berre14"}, "url":"URL#3968038" }, { "@score":"1", "@id":"3968054", "info":{"authors":{"author":[{"@pid":"b/LEBertossi","text":"Leopoldo E. Bertossi"},{"@pid":"11/6446","text":"Babak Salimi"}]},"title":"Unifying Causality, Diagnosis, Repairs and View-Updates in Databases.","venue":"CoRR","volume":"abs/1405.4228","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/BertossiS14","ee":"http://arxiv.org/abs/1405.4228","url":"https://dblp.org/rec/journals/corr/BertossiS14"}, "url":"URL#3968054" }, { "@score":"1", "@id":"3968059", "info":{"authors":{"author":[{"@pid":"31/1258","text":"Dimitris Bertsimas"},{"@pid":"146/0896","text":"J. Daniel Griffith"},{"@pid":"66/6170-4","text":"Vishal Gupta 0004"},{"@pid":"34/2029","text":"Mykel J. Kochenderfer"},{"@pid":"133/2906","text":"Velibor V. Misic"},{"@pid":"254/6066","text":"Robert J. Moss"}]},"title":"A Comparison of Monte Carlo Tree Search and Mathematical Optimization for Large Scale Dynamic Resource Allocation.","venue":"CoRR","volume":"abs/1405.5498","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/BertsimasGGKMM14","ee":"http://arxiv.org/abs/1405.5498","url":"https://dblp.org/rec/journals/corr/BertsimasGGKMM14"}, "url":"URL#3968059" }, { "@score":"1", "@id":"3968064", "info":{"authors":{"author":[{"@pid":"06/7874","text":"Omar Besbes"},{"@pid":"146/0790","text":"Yonatan Gur"},{"@pid":"85/2086","text":"Assaf Zeevi"}]},"title":"Optimal Exploration-Exploitation in a Multi-Armed-Bandit Problem with Non-stationary Rewards.","venue":"CoRR","volume":"abs/1405.3316","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/BesbesGZ14","ee":"http://arxiv.org/abs/1405.3316","url":"https://dblp.org/rec/journals/corr/BesbesGZ14"}, "url":"URL#3968064" }, { "@score":"1", "@id":"3968067", "info":{"authors":{"author":{"@pid":"79/7237","text":"Philippe Besse"}},"title":"Statistique et Big Data Analytics; Volumétrie, L'Attaque des Clones.","venue":"CoRR","volume":"abs/1405.6676","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/Besse14","ee":"http://arxiv.org/abs/1405.6676","url":"https://dblp.org/rec/journals/corr/Besse14"}, "url":"URL#3968067" }, { "@score":"1", "@id":"3968087", "info":{"authors":{"author":[{"@pid":"91/2292","text":"Olaf Beyersdorff"},{"@pid":"141/7753","text":"Leroy Chew"}]},"title":"Tableau vs. Sequent Calculi for Minimal Entailment.","venue":"CoRR","volume":"abs/1405.1565","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/BeyersdorffC14","ee":"http://arxiv.org/abs/1405.1565","url":"https://dblp.org/rec/journals/corr/BeyersdorffC14"}, "url":"URL#3968087" }, { "@score":"1", "@id":"3968106", "info":{"authors":{"author":[{"@pid":"24/4039","text":"Anurag Bhardwaj"},{"@pid":"53/8844","text":"Vignesh Jagadeesh"},{"@pid":"61/3773","text":"Wei Di"},{"@pid":"29/1333","text":"Robinson Piramuthu"},{"@pid":"99/3360","text":"Elizabeth F. Churchill"}]},"title":"Enhancing Visual Fashion Recommendations with Users in the Loop.","venue":"CoRR","volume":"abs/1405.4013","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/BhardwajJDPC14","ee":"http://arxiv.org/abs/1405.4013","url":"https://dblp.org/rec/journals/corr/BhardwajJDPC14"}, "url":"URL#3968106" }, { "@score":"1", "@id":"3968117", "info":{"authors":{"author":[{"@pid":"146/0931","text":"Drashti H. Bhatt"},{"@pid":"142/2791","text":"Kirit R. Rathod"},{"@pid":"142/2632","text":"Shardul J. Agravat"}]},"title":"A Study of Local Binary Pattern Method for Facial Expression Detection.","venue":"CoRR","volume":"abs/1405.6130","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/BhattRA14","ee":"http://arxiv.org/abs/1405.6130","url":"https://dblp.org/rec/journals/corr/BhattRA14"}, "url":"URL#3968117" }, { "@score":"1", "@id":"3968120", "info":{"authors":{"author":{"@pid":"116/4564","text":"Arka Bhattacharya"}},"title":"Approximation Algorithms for the Asymmetric Traveling Salesman Problem : Describing two recent methods.","venue":"CoRR","volume":"abs/1405.1781","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/Bhattacharya14","ee":"http://arxiv.org/abs/1405.1781","url":"https://dblp.org/rec/journals/corr/Bhattacharya14"}, "url":"URL#3968120" }, { "@score":"1", "@id":"3968134", "info":{"authors":{"author":[{"@pid":"90/8245","text":"Anirban Bhattacharyya"},{"@pid":"58/3155","text":"Andrey Mokhov"},{"@pid":"96/2952","text":"Ken Pierce"},{"@pid":"45/2295","text":"Manuel Mazzara"}]},"title":"On Formalisms for Dynamic Reconfiguration of Dependable Systems.","venue":"CoRR","volume":"abs/1405.0319","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/BhattacharyyaMPM14","ee":"http://arxiv.org/abs/1405.0319","url":"https://dblp.org/rec/journals/corr/BhattacharyyaMPM14"}, "url":"URL#3968134" }, { "@score":"1", "@id":"3968140", "info":{"authors":{"author":[{"@pid":"137/5767","text":"Zeeshan Bhatti"},{"@pid":"146/0510","text":"Ahmad Waqas"},{"@pid":"140/7593","text":"Imdad Ali Ismaili"},{"@pid":"146/0881","text":"Dil Nawaz Hakro"},{"@pid":"143/7396","text":"Waseem Javaid Soomro"}]},"title":"Phonetic based SoundEx & ShapeEx algorithm for Sindhi Spell Checker System.","venue":"CoRR","volume":"abs/1405.3033","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/BhattiWIHS14","ee":"http://arxiv.org/abs/1405.3033","url":"https://dblp.org/rec/journals/corr/BhattiWIHS14"}, "url":"URL#3968140" }, { "@score":"1", "@id":"3968159", "info":{"authors":{"author":[{"@pid":"42/747","text":"A. Bhuvaneswari"},{"@pid":"81/9035","text":"E. George Dharma Prakash Raj"},{"@pid":"146/0903","text":"V. Sinthu Janita Prakash"}]},"title":"ACO-ESSVHOA - Ant Colony Optimization based Multi-Criteria Decision Making for Efficient Signal Selection in Mobile Vertical Handoff.","venue":"CoRR","volume":"abs/1405.1514","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/BhuvaneswariRP14","ee":"http://arxiv.org/abs/1405.1514","url":"https://dblp.org/rec/journals/corr/BhuvaneswariRP14"}, "url":"URL#3968159" }, { "@score":"1", "@id":"3968164", "info":{"authors":{"author":[{"@pid":"118/3856","text":"Yi Bi"},{"@pid":"y/JiaHuaiYou","text":"Jia-Huai You"},{"@pid":"48/195-2","text":"Zhiyong Feng 0002"}]},"title":"A Well-Founded Semantics for FOL-Programs.","venue":"CoRR","volume":"abs/1405.3365","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/BiYF14","ee":"http://arxiv.org/abs/1405.3365","url":"https://dblp.org/rec/journals/corr/BiYF14"}, "url":"URL#3968164" }, { "@score":"1", "@id":"3968167", "info":{"authors":{"author":[{"@pid":"40/8910","text":"Jacob D. Biamonte"},{"@pid":"32/6870","text":"Jason Morton"},{"@pid":"146/0378","text":"Jacob W. Turner"}]},"title":"Tensor Network Contractions for #SAT.","venue":"CoRR","volume":"abs/1405.7375","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/BiamonteMT14","ee":"http://arxiv.org/abs/1405.7375","url":"https://dblp.org/rec/journals/corr/BiamonteMT14"}, "url":"URL#3968167" }, { "@score":"1", "@id":"3968221", "info":{"authors":{"author":[{"@pid":"52/8356","text":"Igor Bilogrevic"},{"@pid":"43/5273","text":"Julien Freudiger"},{"@pid":"36/6225","text":"Emiliano De Cristofaro"},{"@pid":"u/ErsinUzun","text":"Ersin Uzun"}]},"title":"What's the Gist? Privacy-Preserving Aggregation of User Profiles.","venue":"CoRR","volume":"abs/1405.1328","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/BilogrevicFCU14","ee":"http://arxiv.org/abs/1405.1328","url":"https://dblp.org/rec/journals/corr/BilogrevicFCU14"}, "url":"URL#3968221" }, { "@score":"1", "@id":"3968237", "info":{"authors":{"author":[{"@pid":"09/5071","text":"Alex Biryukov"},{"@pid":"22/2499","text":"Dmitry Khovratovich"},{"@pid":"47/8436","text":"Ivan Pustogarov"}]},"title":"Deanonymisation of clients in Bitcoin P2P network.","venue":"CoRR","volume":"abs/1405.7418","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/BiryukovKP14","ee":"http://arxiv.org/abs/1405.7418","url":"https://dblp.org/rec/journals/corr/BiryukovKP14"}, "url":"URL#3968237" }, { "@score":"1", "@id":"3968262", "info":{"authors":{"author":[{"@pid":"51/10359","text":"Neli Blagus"},{"@pid":"146/0822","text":"Gregor Weiss"},{"@pid":"17/8636","text":"Lovro Subelj"}]},"title":"Sampling node group structure of social and information networks.","venue":"CoRR","volume":"abs/1405.3093","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/BlagusWS14","ee":"http://arxiv.org/abs/1405.3093","url":"https://dblp.org/rec/journals/corr/BlagusWS14"}, "url":"URL#3968262" }, { "@score":"1", "@id":"3968267", "info":{"authors":{"author":[{"@pid":"230/9969","text":"Bob Blakley 0001"},{"@pid":"74/1652","text":"G. R. Blakley"},{"@pid":"146/0543","text":"Sean M. Blakley"}]},"title":"How to Draw Graphs: Seeing and Redrafting Large Networks in Security and Biology.","venue":"CoRR","volume":"abs/1405.5523","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/BlakleyBB14","ee":"http://arxiv.org/abs/1405.5523","url":"https://dblp.org/rec/journals/corr/BlakleyBB14"}, "url":"URL#3968267" }, { "@score":"1", "@id":"3968277", "info":{"authors":{"author":[{"@pid":"74/9125","text":"Thomas Bläsius"},{"@pid":"146/0757","text":"Guido Brückner"},{"@pid":"99/44","text":"Ignaz Rutter"}]},"title":"Complexity of Higher-Degree Orthogonal Graph Embedding in the Kandinsky Model.","venue":"CoRR","volume":"abs/1405.2300","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/BlasiusBR14","ee":"http://arxiv.org/abs/1405.2300","url":"https://dblp.org/rec/journals/corr/BlasiusBR14"}, "url":"URL#3968277" }, { "@score":"1", "@id":"3968317", "info":{"authors":{"author":[{"@pid":"b/CBlum","text":"Christian Blum 0001"},{"@pid":"l/JoseAntonioLozano","text":"José Antonio Lozano 0001"},{"@pid":"146/0693","text":"Pedro Pinacho Davidson"}]},"title":"Mathematical Programming Strategies for Solving the Minimum Common String Partition Problem.","venue":"CoRR","volume":"abs/1405.5646","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/BlumLD14","ee":"http://arxiv.org/abs/1405.5646","url":"https://dblp.org/rec/journals/corr/BlumLD14"}, "url":"URL#3968317" }, { "@score":"1", "@id":"3968325", "info":{"authors":{"author":{"@pid":"65/8084","text":"Mate Boban"}},"title":"Realistic and Efficient Channel Modeling for Vehicular Networks.","venue":"CoRR","volume":"abs/1405.1008","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/Boban14","ee":"http://arxiv.org/abs/1405.1008","url":"https://dblp.org/rec/journals/corr/Boban14"}, "url":"URL#3968325" }, { "@score":"1", "@id":"3968342", "info":{"authors":{"author":[{"@pid":"146/0500","text":"Rahali Bochra"},{"@pid":"81/7269","text":"Mohammed Feham"},{"@pid":"146/0855","text":"Junwu Tao"}]},"title":"Analysis of S Band Substrate Integrated Waveguide Power Divider, Circulator and Coupler.","venue":"CoRR","volume":"abs/1405.2031","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/BochraMT14","ee":"http://arxiv.org/abs/1405.2031","url":"https://dblp.org/rec/journals/corr/BochraMT14"}, "url":"URL#3968342" }, { "@score":"1", "@id":"3968355", "info":{"authors":{"author":[{"@pid":"06/7505-1","text":"Bart Bogaerts 0001"},{"@pid":"135/6136","text":"Joachim Jansen"},{"@pid":"b/MauriceBruynooghe","text":"Maurice Bruynooghe"},{"@pid":"72/8292","text":"Broes De Cat"},{"@pid":"01/5707","text":"Joost Vennekens"},{"@pid":"d/MarcDenecker","text":"Marc Denecker"}]},"title":"Simulating dynamic systems using Linear Time Calculus theories.","venue":"CoRR","volume":"abs/1405.1523","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/BogaertsJBCVD14","ee":"http://arxiv.org/abs/1405.1523","url":"https://dblp.org/rec/journals/corr/BogaertsJBCVD14"}, "url":"URL#3968355" }, { "@score":"1", "@id":"3968358", "info":{"authors":{"author":[{"@pid":"06/7505-1","text":"Bart Bogaerts 0001"},{"@pid":"01/5707","text":"Joost Vennekens"},{"@pid":"d/MarcDenecker","text":"Marc Denecker"},{"@pid":"b/JVdBussche","text":"Jan Van den Bussche"}]},"title":"FO(C): A Knowledge Representation Language of Causality.","venue":"CoRR","volume":"abs/1405.1833","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/BogaertsVDB14b","ee":"http://arxiv.org/abs/1405.1833","url":"https://dblp.org/rec/journals/corr/BogaertsVDB14b"}, "url":"URL#3968358" }, { "@score":"1", "@id":"3968366", "info":{"authors":{"author":[{"@pid":"160/8983","text":"Ludvig Bohlin"},{"@pid":"56/9672","text":"Alcides Viamontes Esquivel"},{"@pid":"91/8147","text":"Andrea Lancichinetti"},{"@pid":"81/7559","text":"Martin Rosvall"}]},"title":"Robustness of journal rankings by network flows with different amounts of memory.","venue":"CoRR","volume":"abs/1405.7832","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/BohlinELR14","ee":"http://arxiv.org/abs/1405.7832","url":"https://dblp.org/rec/journals/corr/BohlinELR14"}, "url":"URL#3968366" }, { "@score":"1", "@id":"3968375", "info":{"authors":{"author":[{"@pid":"53/4804","text":"Mikolaj Bojanczyk"},{"@pid":"117/9280","text":"Christoph Dittmann"},{"@pid":"k/StephanKreutzer","text":"Stephan Kreutzer"}]},"title":"Decomposition Theorems and Model-Checking for the Modal $μ$-Calculus.","venue":"CoRR","volume":"abs/1405.2234","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/BojanczykDK14","ee":"http://arxiv.org/abs/1405.2234","url":"https://dblp.org/rec/journals/corr/BojanczykDK14"}, "url":"URL#3968375" }, { "@score":"1", "@id":"3968398", "info":{"authors":{"author":[{"@pid":"42/11199","text":"Marthe Bonamy"},{"@pid":"32/813","text":"Benjamin Lévêque"},{"@pid":"87/2186","text":"Alexandre Pinlou"}]},"title":"Planar graphs with $Δ\\geq 7$ and no triangle adjacent to a C4 are minimally edge and total choosable.","venue":"CoRR","volume":"abs/1405.3422","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/BonamyLP14","ee":"http://arxiv.org/abs/1405.3422","url":"https://dblp.org/rec/journals/corr/BonamyLP14"}, "url":"URL#3968398" }, { "@score":"1", "@id":"3968401", "info":{"authors":{"author":[{"@pid":"16/2406","text":"Anthony Bonato"},{"@pid":"40/4457","text":"David F. Gleich"},{"@pid":"66/1606-1","text":"Myunghwan Kim 0002"},{"@pid":"11/3659","text":"Dieter Mitsche"},{"@pid":"p/PawelPralat","text":"Pawel Pralat"},{"@pid":"146/0866","text":"Amanda Tian"},{"@pid":"05/4973","text":"Stephen J. Young"}]},"title":"Dimensionality of social networks using motifs and eigenvalues.","venue":"CoRR","volume":"abs/1405.0157","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/BonatoGKMPTY14","ee":"http://arxiv.org/abs/1405.0157","url":"https://dblp.org/rec/journals/corr/BonatoGKMPTY14"}, "url":"URL#3968401" }, { "@score":"1", "@id":"3968420", "info":{"authors":{"author":[{"@pid":"80/4509","text":"Paola Bonizzoni"},{"@pid":"146/0892","text":"Anna Paola Carrieri"},{"@pid":"03/5602","text":"Gianluca Della Vedova"},{"@pid":"22/2634","text":"Gabriella Trucco"}]},"title":"Algorithms for the Constrained Perfect Phylogeny with Persistent Characters.","venue":"CoRR","volume":"abs/1405.7497","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/BonizzoniCVT14","ee":"http://arxiv.org/abs/1405.7497","url":"https://dblp.org/rec/journals/corr/BonizzoniCVT14"}, "url":"URL#3968420" }, { "@score":"1", "@id":"3968421", "info":{"authors":{"author":[{"@pid":"80/4509","text":"Paola Bonizzoni"},{"@pid":"03/5602","text":"Gianluca Della Vedova"},{"@pid":"85/5143","text":"Yuri Pirola"},{"@pid":"146/0686","text":"Marco Previtali"},{"@pid":"79/436","text":"Raffaella Rizzi"}]},"title":"Constructing String Graphs in External Memory.","venue":"CoRR","volume":"abs/1405.7520","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/BonizzoniVPPR14","ee":"http://arxiv.org/abs/1405.7520","url":"https://dblp.org/rec/journals/corr/BonizzoniVPPR14"}, "url":"URL#3968421" }, { "@score":"1", "@id":"3968446", "info":{"authors":{"author":[{"@pid":"15/10046","text":"Hamidreza Boostanimehr"},{"@pid":"75/1870","text":"Vijay K. Bhargava"}]},"title":"Unified and Distributed QoS-Driven Cell Association Algorithms in Heterogeneous Networks.","venue":"CoRR","volume":"abs/1405.2492","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/BoostanimehrB14","ee":"http://arxiv.org/abs/1405.2492","url":"https://dblp.org/rec/journals/corr/BoostanimehrB14"}, "url":"URL#3968446" }, { "@score":"1", "@id":"3968450", "info":{"authors":{"author":[{"@pid":"144/7822","text":"Dibya Jyoti Bora"},{"@pid":"138/1540","text":"Anil Kumar Gupta"}]},"title":"Effect of Different Distance Measures on the Performance of K-Means Algorithm: An Experimental Study in Matlab.","venue":"CoRR","volume":"abs/1405.7471","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/BoraG14a","ee":"http://arxiv.org/abs/1405.7471","url":"https://dblp.org/rec/journals/corr/BoraG14a"}, "url":"URL#3968450" }, { "@score":"1", "@id":"3968500", "info":{"authors":{"author":[{"@pid":"27/1509","text":"Glencora Borradaile"},{"@pid":"123/4590","text":"Theresa Migler"},{"@pid":"94/1460","text":"Gordon T. Wilfong"}]},"title":"Density decompositions of networks.","venue":"CoRR","volume":"abs/1405.1001","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/BorradaileMW14","ee":"http://arxiv.org/abs/1405.1001","url":"https://dblp.org/rec/journals/corr/BorradaileMW14"}, "url":"URL#3968500" }, { "@score":"1", "@id":"3968502", "info":{"authors":{"author":[{"@pid":"61/6091","text":"Paul L. Borrill"},{"@pid":"22/5395","text":"Mark Burgess"},{"@pid":"146/0865","text":"Todd Craw"},{"@pid":"146/0403","text":"Mike Dvorkin"}]},"title":"A Promise Theory Perspective on Data Networks.","venue":"CoRR","volume":"abs/1405.2627","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/BorrilBCD14","ee":"http://arxiv.org/abs/1405.2627","url":"https://dblp.org/rec/journals/corr/BorrilBCD14"}, "url":"URL#3968502" }, { "@score":"1", "@id":"3968504", "info":{"authors":{"author":[{"@pid":"32/1171","text":"Luca Bortolussi"},{"@pid":"146/0584","text":"Rytis Paskauskas"}]},"title":"Mean-Field approximation and Quasi-Equilibrium reduction of Markov Population Models.","venue":"CoRR","volume":"abs/1405.4200","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/BortolussiP14","ee":"http://arxiv.org/abs/1405.4200","url":"https://dblp.org/rec/journals/corr/BortolussiP14"}, "url":"URL#3968504" }, { "@score":"1", "@id":"3968524", "info":{"authors":{"author":[{"@pid":"82/6711","text":"Alin Bostan"},{"@pid":"126/6997","text":"Thierry Combot"},{"@pid":"64/522","text":"Mohab Safey El Din"}]},"title":"Computing necessary integrability conditions for planar parametrized homogeneous potentials.","venue":"CoRR","volume":"abs/1405.5342","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/BostanCM14","ee":"http://arxiv.org/abs/1405.5342","url":"https://dblp.org/rec/journals/corr/BostanCM14"}, "url":"URL#3968524" }, { "@score":"1", "@id":"3968525", "info":{"authors":{"author":[{"@pid":"82/6711","text":"Alin Bostan"},{"@pid":"123/4698","text":"Xavier Caruso"},{"@pid":"07/1002","text":"Éric Schost"}]},"title":"A fast algorithm for computing the characteristic polynomial of the p-curvature.","venue":"CoRR","volume":"abs/1405.5341","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/BostanCS14","ee":"http://arxiv.org/abs/1405.5341","url":"https://dblp.org/rec/journals/corr/BostanCS14"}, "url":"URL#3968525" }, { "@score":"1", "@id":"3968530", "info":{"authors":{"author":[{"@pid":"98/11425","text":"Jan A. Botha"},{"@pid":"96/4705","text":"Phil Blunsom"}]},"title":"Compositional Morphology for Word Representations and Language Modelling.","venue":"CoRR","volume":"abs/1405.4273","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/BothaB14","ee":"http://arxiv.org/abs/1405.4273","url":"https://dblp.org/rec/journals/corr/BothaB14"}, "url":"URL#3968530" }, { "@score":"1", "@id":"3968537", "info":{"authors":{"author":{"@pid":"45/9836","text":"Olfa Boubaker"}},"title":"The inverted Pendulum: A fundamental Benchmark in Control Theory and Robotics.","venue":"CoRR","volume":"abs/1405.3094","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/Boubaker14","ee":"http://arxiv.org/abs/1405.3094","url":"https://dblp.org/rec/journals/corr/Boubaker14"}, "url":"URL#3968537" }, { "@score":"1", "@id":"3968540", "info":{"authors":{"author":[{"@pid":"98/6845","text":"Petros T. Boufounos"},{"@pid":"01/188","text":"Laurent Jacques"},{"@pid":"17/7802","text":"Felix Krahmer"},{"@pid":"18/2222","text":"Rayan Saab"}]},"title":"Quantization and Compressive Sensing.","venue":"CoRR","volume":"abs/1405.1194","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/BoufounosJKS14","ee":"http://arxiv.org/abs/1405.1194","url":"https://dblp.org/rec/journals/corr/BoufounosJKS14"}, "url":"URL#3968540" }, { "@score":"1", "@id":"3968548", "info":{"authors":{"author":{"@pid":"45/11240-1","text":"Djallel Bouneffouf 0001"}},"title":"Étude des dimensions spécifiques du contexte dans un système de filtrage d'informations.","venue":"CoRR","volume":"abs/1405.6287","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/Bouneffouf14a","ee":"http://arxiv.org/abs/1405.6287","url":"https://dblp.org/rec/journals/corr/Bouneffouf14a"}, "url":"URL#3968548" }, { "@score":"1", "@id":"3968556", "info":{"authors":{"author":[{"@pid":"145/1652","text":"Thomas Bourgeat"},{"@pid":"63/1725","text":"Julien Bringer"},{"@pid":"96/4528","text":"Hervé Chabanne"},{"@pid":"145/1715","text":"Robin Champenois"},{"@pid":"145/1674","text":"Jérémie Clément"},{"@pid":"140/5400","text":"Houda Ferradi"},{"@pid":"145/1726","text":"Marc Heinrich"},{"@pid":"145/1642","text":"Paul Melotti"},{"@pid":"41/6833","text":"David Naccache"},{"@pid":"145/1655","text":"Antoine Voizard"}]},"title":"New Algorithmic Approaches to Point Constellation Recognition.","venue":"CoRR","volume":"abs/1405.1402","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/BourgeatBCCCFHMNV14","ee":"http://arxiv.org/abs/1405.1402","url":"https://dblp.org/rec/journals/corr/BourgeatBCCCFHMNV14"}, "url":"URL#3968556" }, { "@score":"1", "@id":"3968566", "info":{"authors":{"author":[{"@pid":"28/985","text":"Christos Boutsidis"},{"@pid":"w/DPWoodruff","text":"David P. Woodruff"}]},"title":"Optimal CUR Matrix Decompositions.","venue":"CoRR","volume":"abs/1405.7910","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/BoutsidisW14","ee":"http://arxiv.org/abs/1405.7910","url":"https://dblp.org/rec/journals/corr/BoutsidisW14"}, "url":"URL#3968566" }, { "@score":"1", "@id":"3968569", "info":{"authors":{"author":[{"@pid":"127/6954","text":"Yacine Bouzidi"},{"@pid":"17/1855","text":"Sylvain Lazard"},{"@pid":"02/1547","text":"Guillaume Moroz"},{"@pid":"06/1920","text":"Marc Pouget"},{"@pid":"16/163","text":"Fabrice Rouillier"}]},"title":"Improved algorithm for computing separating linear forms for bivariate systems.","venue":"CoRR","volume":"abs/1405.4740","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/BouzidiLMPR14","ee":"http://arxiv.org/abs/1405.4740","url":"https://dblp.org/rec/journals/corr/BouzidiLMPR14"}, "url":"URL#3968569" }, { "@score":"1", "@id":"3968571", "info":{"authors":{"author":[{"@pid":"79/1368","text":"Simone Bova"},{"@pid":"80/7529","text":"Robert Ganian"},{"@pid":"s/StefanSzeider","text":"Stefan Szeider"}]},"title":"Model Checking Existential Logic on Partially Ordered Sets.","venue":"CoRR","volume":"abs/1405.2891","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/BovaGS14","ee":"http://arxiv.org/abs/1405.2891","url":"https://dblp.org/rec/journals/corr/BovaGS14"}, "url":"URL#3968571" }, { "@score":"1", "@id":"3968574", "info":{"authors":{"author":{"@pid":"69/4699","text":"John C. Bowers"}},"title":"Computing the Straight Skeleton of a Simple Polygon from its Motorcycle Graph in Deterministic O(n log n) Time.","venue":"CoRR","volume":"abs/1405.6260","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/Bowers14","ee":"http://arxiv.org/abs/1405.6260","url":"https://dblp.org/rec/journals/corr/Bowers14"}, "url":"URL#3968574" }, { "@score":"1", "@id":"3968589", "info":{"authors":{"author":[{"@pid":"04/11267","text":"Rodica Bozianu"},{"@pid":"14/3467","text":"Catalin Dima"},{"@pid":"90/6190","text":"Emmanuel Filiot"}]},"title":"Safraless Synthesis for Epistemic Temporal Specifications.","venue":"CoRR","volume":"abs/1405.0424","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/BozianuDF14","ee":"http://arxiv.org/abs/1405.0424","url":"https://dblp.org/rec/journals/corr/BozianuDF14"}, "url":"URL#3968589" }, { "@score":"1", "@id":"3968595", "info":{"authors":{"author":[{"@pid":"68/11142","text":"Annina Bracher"},{"@pid":"92/8146","text":"Eran Hof"},{"@pid":"l/AmosLapidoth","text":"Amos Lapidoth"}]},"title":"Distributed Storage for Data Security.","venue":"CoRR","volume":"abs/1405.4981","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/BracherHL14","ee":"http://arxiv.org/abs/1405.4981","url":"https://dblp.org/rec/journals/corr/BracherHL14"}, "url":"URL#3968595" }, { "@score":"1", "@id":"3968598", "info":{"authors":{"author":[{"@pid":"120/7795","text":"Abbas Bradai"},{"@pid":"18/4550","text":"Toufik Ahmed"},{"@pid":"07/10586","text":"Samir Medjiah"}]},"title":"QoE assessment for SVC streaming in ENVISION.","venue":"CoRR","volume":"abs/1405.7629","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/BradaiAM14","ee":"http://arxiv.org/abs/1405.7629","url":"https://dblp.org/rec/journals/corr/BradaiAM14"}, "url":"URL#3968598" }, { "@score":"1", "@id":"3968617", "info":{"authors":{"author":{"@pid":"b/StefanBrass","text":"Stefan Brass"}},"title":"A Framework for Bottom-Up Simulation of SLD-Resolution.","venue":"CoRR","volume":"abs/1405.4021","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/Brass14","ee":"http://arxiv.org/abs/1405.4021","url":"https://dblp.org/rec/journals/corr/Brass14"}, "url":"URL#3968617" }, { "@score":"1", "@id":"3968620", "info":{"authors":{"author":[{"@pid":"118/3870","text":"Johann Brault-Baron"},{"@pid":"119/5011","text":"Florent Capelli"},{"@pid":"79/9794","text":"Stefan Mengel"}]},"title":"Understanding model counting for $β$-acyclic CNF-formulas.","venue":"CoRR","volume":"abs/1405.6043","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/Brault-BaronCM14","ee":"http://arxiv.org/abs/1405.6043","url":"https://dblp.org/rec/journals/corr/Brault-BaronCM14"}, "url":"URL#3968620" }, { "@score":"1", "@id":"3968639", "info":{"authors":{"author":{"@pid":"80/9827","text":"Joachim Breitner"}},"title":"The Correctness of Launchbury's Natural Semantics for Lazy Evaluation.","venue":"CoRR","volume":"abs/1405.3099","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/Breitner14","ee":"http://arxiv.org/abs/1405.3099","url":"https://dblp.org/rec/journals/corr/Breitner14"}, "url":"URL#3968639" }, { "@score":"1", "@id":"3968688", "info":{"authors":{"author":{"@pid":"144/7524","text":"James Brofos"}},"title":"A Hybrid Monte Carlo Architecture for Parameter Optimization.","venue":"CoRR","volume":"abs/1405.2377","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/Brofos14a","ee":"http://arxiv.org/abs/1405.2377","url":"https://dblp.org/rec/journals/corr/Brofos14a"}, "url":"URL#3968688" }, { "@score":"1", "@id":"3968689", "info":{"authors":{"author":[{"@pid":"144/7524","text":"James Brofos"},{"@pid":"146/0828","text":"Ajay Kannan"},{"@pid":"146/0885","text":"Rui Shu"}]},"title":"Automated Attribution and Intertextual Analysis.","venue":"CoRR","volume":"abs/1405.0616","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/BrofosKS14","ee":"http://arxiv.org/abs/1405.0616","url":"https://dblp.org/rec/journals/corr/BrofosKS14"}, "url":"URL#3968689" }, { "@score":"1", "@id":"3968729", "info":{"authors":{"author":{"@pid":"35/4292","text":"Sébastien Bubeck"}},"title":"Theory of Convex Optimization for Machine Learning.","venue":"CoRR","volume":"abs/1405.4980","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/Bubeck14","ee":"http://arxiv.org/abs/1405.4980","url":"https://dblp.org/rec/journals/corr/Bubeck14"}, "url":"URL#3968729" }, { "@score":"1", "@id":"3968755", "info":{"authors":{"author":{"@pid":"97/1370","text":"Marius Buliga"}},"title":"Zipper logic.","venue":"CoRR","volume":"abs/1405.6095","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/Buliga14","ee":"http://arxiv.org/abs/1405.6095","url":"https://dblp.org/rec/journals/corr/Buliga14"}, "url":"URL#3968755" }, { "@score":"1", "@id":"3968796", "info":{"authors":{"author":[{"@pid":"61/7383","text":"Enrique Burgos"},{"@pid":"08/7383","text":"Laura Hernández"},{"@pid":"55/7387","text":"Horacio Ceva"},{"@pid":"98/6635","text":"Roberto P. J. Perazzo"}]},"title":"Entropic determination of the phase transition in a coevolving opinion-formation model.","venue":"CoRR","volume":"abs/1405.7811","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/BurgosHCP14","ee":"http://arxiv.org/abs/1405.7811","url":"https://dblp.org/rec/journals/corr/BurgosHCP14"}, "url":"URL#3968796" }, { "@score":"1", "@id":"3968799", "info":{"authors":{"author":[{"@pid":"37/1608","text":"Michael G. Burke"},{"@pid":"62/3833","text":"Joan Lasenby"}]},"title":"Single camera pose estimation using Bayesian filtering and Kinect motion priors.","venue":"CoRR","volume":"abs/1405.5047","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/BurkeL14","ee":"http://arxiv.org/abs/1405.5047","url":"https://dblp.org/rec/journals/corr/BurkeL14"}, "url":"URL#3968799" }, { "@score":"1", "@id":"3968807", "info":{"authors":{"author":{"@pid":"13/2591","text":"Benjamin A. Burton"}},"title":"The cusped hyperbolic census is complete.","venue":"CoRR","volume":"abs/1405.2695","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/Burton14","ee":"http://arxiv.org/abs/1405.2695","url":"https://dblp.org/rec/journals/corr/Burton14"}, "url":"URL#3968807" }, { "@score":"1", "@id":"3968820", "info":{"authors":{"author":[{"@pid":"92/7804","text":"M. Majid Butt"},{"@pid":"20/4825","text":"Eduard A. Jorswieck"},{"@pid":"34/9386","text":"Amr Mohamed 0001"}]},"title":"Energy Efficient Multiuser Scheduling: Statistical Guarantees on Bursty Packet Loss.","venue":"CoRR","volume":"abs/1405.6154","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/ButtJM14","ee":"http://arxiv.org/abs/1405.6154","url":"https://dblp.org/rec/journals/corr/ButtJM14"}, "url":"URL#3968820" }, { "@score":"1", "@id":"3968822", "info":{"authors":{"author":[{"@pid":"146/0713","text":"Pierre de Buyl"},{"@pid":"146/0426","text":"Nelle Varoquaux"}]},"title":"Proceedings of the 6th European Conference on Python in Science (EuroSciPy 2013).","venue":"CoRR","volume":"abs/1405.0166","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/BuylV14","ee":"http://arxiv.org/abs/1405.0166","url":"https://dblp.org/rec/journals/corr/BuylV14"}, "url":"URL#3968822" }, { "@score":"1", "@id":"3968833", "info":{"authors":{"author":[{"@pid":"74/2172","text":"Sergio Cabello"},{"@pid":"c/OtfriedCheong","text":"Otfried Cheong"},{"@pid":"39/8820","text":"Lena Schlipf"}]},"title":"Finding Largest Rectangles in Convex Polygons.","venue":"CoRR","volume":"abs/1405.1223","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/CabelloCS14","ee":"http://arxiv.org/abs/1405.1223","url":"https://dblp.org/rec/journals/corr/CabelloCS14"}, "url":"URL#3968833" }, { "@score":"1", "@id":"3968837", "info":{"authors":{"author":[{"@pid":"35/7561","text":"Elena Cabrio"},{"@pid":"84/5009","text":"Serena Villata"}]},"title":"Towards a Benchmark of Natural Language Arguments.","venue":"CoRR","volume":"abs/1405.0941","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/CabrioV14","ee":"http://arxiv.org/abs/1405.0941","url":"https://dblp.org/rec/journals/corr/CabrioV14"}, "url":"URL#3968837" }, { "@score":"1", "@id":"3968846", "info":{"authors":{"author":{"@pid":"16/10261","text":"Xiaohao Cai"}},"title":"Variational Image Segmentation Model Coupled with Image Restoration Achievements.","venue":"CoRR","volume":"abs/1405.2128","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/Cai14","ee":"http://arxiv.org/abs/1405.2128","url":"https://dblp.org/rec/journals/corr/Cai14"}, "url":"URL#3968846" }, { "@score":"1", "@id":"3968868", "info":{"authors":{"author":[{"@pid":"119/3882","text":"Burak Çakmak"},{"@pid":"36/1568","text":"Ole Winther"},{"@pid":"36/6543","text":"Bernard H. Fleury"}]},"title":"S-AMP: Approximate Message Passing for General Matrix Ensembles.","venue":"CoRR","volume":"abs/1405.2767","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/CakmakWF14","ee":"http://arxiv.org/abs/1405.2767","url":"https://dblp.org/rec/journals/corr/CakmakWF14"}, "url":"URL#3968868" }, { "@score":"1", "@id":"3968875", "info":{"authors":{"author":[{"@pid":"c/FrancescoCalimeri","text":"Francesco Calimeri"},{"@pid":"64/2589","text":"Martin Gebser"},{"@pid":"m/MarcoMaratea","text":"Marco Maratea"},{"@pid":"r/FrancescoRicca","text":"Francesco Ricca"}]},"title":"The Design of the Fifth Answer Set Programming Competition.","venue":"CoRR","volume":"abs/1405.3710","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/CalimeriGMR14","ee":"http://arxiv.org/abs/1405.3710","url":"https://dblp.org/rec/journals/corr/CalimeriGMR14"}, "url":"URL#3968875" }, { "@score":"1", "@id":"3968880", "info":{"authors":{"author":[{"@pid":"89/4611","text":"Flávio du Pin Calmon"},{"@pid":"59/6288","text":"Mayank Varia"},{"@pid":"m/MurielMedard","text":"Muriel Médard"}]},"title":"An Exploration of the Role of Principal Inertia Components in Information Theory.","venue":"CoRR","volume":"abs/1405.1472","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/CalmonVM14","ee":"http://arxiv.org/abs/1405.1472","url":"https://dblp.org/rec/journals/corr/CalmonVM14"}, "url":"URL#3968880" }, { "@score":"1", "@id":"3968917", "info":{"authors":{"author":{"@pid":"136/1478","text":"Ercan Canhasi"}},"title":"Multi-layered graph-based multi-document summarization model.","venue":"CoRR","volume":"abs/1405.7975","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/Canhasi14","ee":"http://arxiv.org/abs/1405.7975","url":"https://dblp.org/rec/journals/corr/Canhasi14"}, "url":"URL#3968917" }, { "@score":"1", "@id":"3968921", "info":{"authors":{"author":[{"@pid":"90/4372","text":"Cristina Cano"},{"@pid":"12/6757","text":"David Malone"}]},"title":"Modeling, Analysis and Impact of a Long Transitory Phase in Random Access Protocols.","venue":"CoRR","volume":"abs/1405.5753","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/CanoM14a","ee":"http://arxiv.org/abs/1405.5753","url":"https://dblp.org/rec/journals/corr/CanoM14a"}, "url":"URL#3968921" }, { "@score":"1", "@id":"3968929", "info":{"authors":{"author":[{"@pid":"136/1825","text":"Nianxia Cao"},{"@pid":"35/5335","text":"Swastik Brahma"},{"@pid":"v/PKVarshney","text":"Pramod K. Varshney"}]},"title":"Target Tracking via Crowdsourcing: A Mechanism Design Approach.","venue":"CoRR","volume":"abs/1405.5543","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/CaoBV14","ee":"http://arxiv.org/abs/1405.5543","url":"https://dblp.org/rec/journals/corr/CaoBV14"}, "url":"URL#3968929" }, { "@score":"1", "@id":"3968934", "info":{"authors":{"author":[{"@pid":"20/8038-1","text":"Yixin Cao 0001"},{"@pid":"93/1750","text":"Luciano N. Grippo"},{"@pid":"20/1346","text":"Martín Darío Safe"}]},"title":"Forbidden Induced Subgraphs of Normal Helly Circular-Arc Graphs: Characterization and Detection.","venue":"CoRR","volume":"abs/1405.0329","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/CaoGS14","ee":"http://arxiv.org/abs/1405.0329","url":"https://dblp.org/rec/journals/corr/CaoGS14"}, "url":"URL#3968934" }, { "@score":"1", "@id":"3968963", "info":{"authors":{"author":[{"@pid":"01/9509","text":"Valerio Capraro"},{"@pid":"146/0452","text":"Conor Smyth"},{"@pid":"99/2831","text":"Kalliopi Mylona"},{"@pid":"24/4047","text":"Graham Niblo"}]},"title":"Benevolent characteristics promote cooperative behaviour among humans.","venue":"CoRR","volume":"abs/1405.1616","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/CapraroSMN14","ee":"http://arxiv.org/abs/1405.1616","url":"https://dblp.org/rec/journals/corr/CapraroSMN14"}, "url":"URL#3968963" }, { "@score":"1", "@id":"3968979", "info":{"authors":{"author":[{"@pid":"49/1449","text":"Jacques Carette"},{"@pid":"26/5164","text":"William M. Farmer"},{"@pid":"k/MKohlhase","text":"Michael Kohlhase"}]},"title":"Realms: A Structure for Consolidating Knowledge about Mathematical Theories.","venue":"CoRR","volume":"abs/1405.5956","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/CaretteFK14","ee":"http://arxiv.org/abs/1405.5956","url":"https://dblp.org/rec/journals/corr/CaretteFK14"}, "url":"URL#3968979" }, { "@score":"1", "@id":"3969002", "info":{"authors":{"author":[{"@pid":"88/6642","text":"Luciano Caroprese"},{"@pid":"10/5698","text":"Irina Trubitsyna"},{"@pid":"t/MiroslawTruszczynski","text":"Miroslaw Truszczynski"},{"@pid":"42/4927","text":"Ester Zumpano"}]},"title":"A Measure of Arbitrariness in Abductive Explanations.","venue":"CoRR","volume":"abs/1405.2494","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/CaropreseTTZ14","ee":"http://arxiv.org/abs/1405.2494","url":"https://dblp.org/rec/journals/corr/CaropreseTTZ14"}, "url":"URL#3969002" }, { "@score":"1", "@id":"3969007", "info":{"authors":{"author":[{"@pid":"23/5257","text":"Miguel Á. Carreira-Perpiñán"},{"@pid":"63/8652","text":"Weiran Wang"}]},"title":"LASS: a simple assignment model with Laplacian smoothing.","venue":"CoRR","volume":"abs/1405.5960","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/Carreira-PerpinanW14","ee":"http://arxiv.org/abs/1405.5960","url":"https://dblp.org/rec/journals/corr/Carreira-PerpinanW14"}, "url":"URL#3969007" }, { "@score":"1", "@id":"3969032", "info":{"authors":{"author":[{"@pid":"119/8329","text":"Greg Castañón"},{"@pid":"133/7276","text":"Mohamed A. Elgharib"},{"@pid":"67/4721","text":"Venkatesh Saligrama"},{"@pid":"16/6189","text":"Pierre-Marc Jodoin"}]},"title":"Retrieval in Long Surveillance Videos using User Described Motion and Object Attributes.","venue":"CoRR","volume":"abs/1405.0234","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/CastanonESJ14","ee":"http://arxiv.org/abs/1405.0234","url":"https://dblp.org/rec/journals/corr/CastanonESJ14"}, "url":"URL#3969032" }, { "@score":"1", "@id":"3969039", "info":{"authors":{"author":[{"@pid":"46/4669","text":"Sergio Castro"},{"@pid":"m/KimMens","text":"Kim Mens"},{"@pid":"67/4192","text":"Paulo Moura"}]},"title":"Customisable Handling of Java References in Prolog Programs.","venue":"CoRR","volume":"abs/1405.2693","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/CastroMM14","ee":"http://arxiv.org/abs/1405.2693","url":"https://dblp.org/rec/journals/corr/CastroMM14"}, "url":"URL#3969039" }, { "@score":"1", "@id":"3969079", "info":{"authors":{"author":[{"@pid":"122/2947","text":"Uzay Çetin"},{"@pid":"68/6349","text":"Haluk O. Bingol"}]},"title":"Iterated Prisoners Dilemma with limited attention.","venue":"CoRR","volume":"abs/1405.0343","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/CetinB14","ee":"http://arxiv.org/abs/1405.0343","url":"https://dblp.org/rec/journals/corr/CetinB14"}, "url":"URL#3969079" }, { "@score":"1", "@id":"3969108", "info":{"authors":{"author":[{"@pid":"146/0447","text":"Saptarshi Chakraborty"},{"@pid":"71/9013","text":"Dhrubajyoti Das"}]},"title":"An Overview of Face Liveness Detection.","venue":"CoRR","volume":"abs/1405.2227","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/ChakrabortyD14","ee":"http://arxiv.org/abs/1405.2227","url":"https://dblp.org/rec/journals/corr/ChakrabortyD14"}, "url":"URL#3969108" }, { "@score":"1", "@id":"3969144", "info":{"authors":{"author":[{"@pid":"128/0249","text":"Aftab Ahmed Chandio"},{"@pid":"70/8170","text":"Zhibin Yu"},{"@pid":"146/0815","text":"Feroz Shah Syed"},{"@pid":"143/2904","text":"Korejo Imtiaz Ali"}]},"title":"A Case Study on Job Scheduling Policy for Workload Characterization and Power Efficiency.","venue":"CoRR","volume":"abs/1405.3411","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/ChandioYSK14","ee":"http://arxiv.org/abs/1405.3411","url":"https://dblp.org/rec/journals/corr/ChandioYSK14"}, "url":"URL#3969144" }, { "@score":"1", "@id":"3969145", "info":{"authors":{"author":[{"@pid":"128/0249","text":"Aftab Ahmed Chandio"},{"@pid":"65/4369","text":"Dingju Zhu"},{"@pid":"146/0413","text":"Ali Hassan Sodhro"}]},"title":"Integration of Inter-Connectivity of Information System (i3) using Web Services.","venue":"CoRR","volume":"abs/1405.3724","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/ChandioZS14","ee":"http://arxiv.org/abs/1405.3724","url":"https://dblp.org/rec/journals/corr/ChandioZS14"}, "url":"URL#3969145" }, { "@score":"1", "@id":"3969172", "info":{"authors":{"author":[{"@pid":"72/6746-3","text":"Liang Chang 0003"},{"@pid":"s/UlrikeSattler","text":"Uli Sattler"},{"@pid":"42/5786","text":"Tianlong Gu"}]},"title":"Algorithm for Adapting Cases Represented in a Tractable Description Logic.","venue":"CoRR","volume":"abs/1405.4180","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/ChangSG14","ee":"http://arxiv.org/abs/1405.4180","url":"https://dblp.org/rec/journals/corr/ChangSG14"}, "url":"URL#3969172" }, { "@score":"1", "@id":"3969179", "info":{"authors":{"author":{"@pid":"146/0524","text":"Pratik P. Chaphekar"}},"title":"Survey of Key Distribution Schemes for Wireless Sensor Networks.","venue":"CoRR","volume":"abs/1405.4286","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/Chaphekar14","ee":"http://arxiv.org/abs/1405.4286","url":"https://dblp.org/rec/journals/corr/Chaphekar14"}, "url":"URL#3969179" }, { "@score":"1", "@id":"3969182", "info":{"authors":{"author":[{"@pid":"96/7603","text":"Angelos Charalambidis"},{"@pid":"e/ZoltanEsik","text":"Zoltán Ésik"},{"@pid":"r/PanosRondogiannis","text":"Panos Rondogiannis"}]},"title":"Minimum Model Semantics for Extensional Higher-order Logic Programming with Negation.","venue":"CoRR","volume":"abs/1405.3792","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/CharalambidisER14","ee":"http://arxiv.org/abs/1405.3792","url":"https://dblp.org/rec/journals/corr/CharalambidisER14"}, "url":"URL#3969182" }, { "@score":"1", "@id":"3969192", "info":{"authors":{"author":[{"@pid":"128/7918","text":"Ken Chatfield"},{"@pid":"78/470","text":"Karen Simonyan"},{"@pid":"99/2825","text":"Andrea Vedaldi"},{"@pid":"z/AndrewZisserman","text":"Andrew Zisserman"}]},"title":"Return of the Devil in the Details: Delving Deep into Convolutional Nets.","venue":"CoRR","volume":"abs/1405.3531","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/ChatfieldSVZ14","ee":"http://arxiv.org/abs/1405.3531","url":"https://dblp.org/rec/journals/corr/ChatfieldSVZ14"}, "url":"URL#3969192" }, { "@score":"1", "@id":"3969199", "info":{"authors":{"author":[{"@pid":"92/5602","text":"Krishnendu Chatterjee"},{"@pid":"60/10964","text":"Martin Chmelik"},{"@pid":"146/0751","text":"Przemyslaw Daca"}]},"title":"CEGAR for Qualitative Analysis of Probabilistic Systems.","venue":"CoRR","volume":"abs/1405.0835","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/ChatterjeeCD14","ee":"http://arxiv.org/abs/1405.0835","url":"https://dblp.org/rec/journals/corr/ChatterjeeCD14"}, "url":"URL#3969199" }, { "@score":"1", "@id":"3969218", "info":{"authors":{"author":[{"@pid":"99/4535","text":"Anupam Chattopadhyay"},{"@pid":"146/0588","text":"Nilanjan Pal"},{"@pid":"130/8473","text":"Soumajit Majumder"}]},"title":"Ancilla-Quantum Cost Trade-off during Reversible Logic Synthesis using Exclusive Sum-of-Products.","venue":"CoRR","volume":"abs/1405.6073","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/ChattopadhyayPM14","ee":"http://arxiv.org/abs/1405.6073","url":"https://dblp.org/rec/journals/corr/ChattopadhyayPM14"}, "url":"URL#3969218" }, { "@score":"1", "@id":"3969228", "info":{"authors":{"author":{"@pid":"146/0830","text":"Sushant Chaudhary"}},"title":"Load Frequency Control For Distributed Grid Power System Single Area & Multi-area System.","venue":"CoRR","volume":"abs/1405.2906","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/Chaudhary14","ee":"http://arxiv.org/abs/1405.2906","url":"https://dblp.org/rec/journals/corr/Chaudhary14"}, "url":"URL#3969228" }, { "@score":"1", "@id":"3969236", "info":{"authors":{"author":[{"@pid":"146/0616","text":"Sougata Chaudhuri"},{"@pid":"24/567","text":"Ambuj Tewari"}]},"title":"Perceptron-like Algorithms and Generalization Bounds for Learning to Rank.","venue":"CoRR","volume":"abs/1405.0591","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/ChaudhuriT14","ee":"http://arxiv.org/abs/1405.0591","url":"https://dblp.org/rec/journals/corr/ChaudhuriT14"}, "url":"URL#3969236" }, { "@score":"1", "@id":"3969258", "info":{"authors":{"author":[{"@pid":"72/10821","text":"Alessandro Checco"},{"@pid":"l/DouglasJLeith","text":"Douglas J. Leith"}]},"title":"Fast, Responsive Decentralised Graph Colouring.","venue":"CoRR","volume":"abs/1405.6987","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/CheccoL14","ee":"http://arxiv.org/abs/1405.6987","url":"https://dblp.org/rec/journals/corr/CheccoL14"}, "url":"URL#3969258" }, { "@score":"1", "@id":"3969268", "info":{"authors":{"author":{"@pid":"76/3584","text":"Lijiang Chen"}},"title":"Coordinate System Selection for Minimum Error Rate Training in Statistical Machine Translation.","venue":"CoRR","volume":"abs/1405.2434","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/Chen14c","ee":"http://arxiv.org/abs/1405.2434","url":"https://dblp.org/rec/journals/corr/Chen14c"}, "url":"URL#3969268" }, { "@score":"1", "@id":"3969269", "info":{"authors":{"author":{"@pid":"83/3627","text":"Hubie Chen"}},"title":"An Algebraic Hardness Criterion for Surjective Constraint Satisfaction.","venue":"CoRR","volume":"abs/1405.4917","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/Chen14d","ee":"http://arxiv.org/abs/1405.4917","url":"https://dblp.org/rec/journals/corr/Chen14d"}, "url":"URL#3969269" }, { "@score":"1", "@id":"3969270", "info":{"authors":{"author":{"@pid":"76/3584","text":"Lijiang Chen"}},"title":"Machine Translation Model based on Non-parallel Corpus and Semi-supervised Transductive Learning.","venue":"CoRR","volume":"abs/1405.5654","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/Chen14e","ee":"http://arxiv.org/abs/1405.5654","url":"https://dblp.org/rec/journals/corr/Chen14e"}, "url":"URL#3969270" }, { "@score":"1", "@id":"3969292", "info":{"authors":{"author":[{"@pid":"67/5839","text":"Tsung-Yi Chen"},{"@pid":"83/6331-18","text":"Xu Chen 0018"},{"@pid":"75/6451","text":"Dongning Guo"}]},"title":"Many-Broadcast Channels: Definition and Capacity in the Degraded Case.","venue":"CoRR","volume":"abs/1405.0963","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/ChenCG14","ee":"http://arxiv.org/abs/1405.0963","url":"https://dblp.org/rec/journals/corr/ChenCG14"}, "url":"URL#3969292" }, { "@score":"1", "@id":"3969319", "info":{"authors":{"author":[{"@pid":"83/6331-18","text":"Xu Chen 0018"},{"@pid":"75/6451","text":"Dongning Guo"}]},"title":"Many-Access Channels: The Gaussian Case with Random User Activities.","venue":"CoRR","volume":"abs/1405.0893","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/ChenG14a","ee":"http://arxiv.org/abs/1405.0893","url":"https://dblp.org/rec/journals/corr/ChenG14a"}, "url":"URL#3969319" }, { "@score":"1", "@id":"3969330", "info":{"authors":{"author":[{"@pid":"83/6331-4","text":"Xu Chen 0004"},{"@pid":"77/623-1","text":"Jianwei Huang 0001"}]},"title":"Imitation-based Social Spectrum Sharing.","venue":"CoRR","volume":"abs/1405.2822","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/ChenH14a","ee":"http://arxiv.org/abs/1405.2822","url":"https://dblp.org/rec/journals/corr/ChenH14a"}, "url":"URL#3969330" }, { "@score":"1", "@id":"3969331", "info":{"authors":{"author":[{"@pid":"83/6331-4","text":"Xu Chen 0004"},{"@pid":"77/623-1","text":"Jianwei Huang 0001"}]},"title":"Spatial Spectrum Access Game.","venue":"CoRR","volume":"abs/1405.3860","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/ChenH14b","ee":"http://arxiv.org/abs/1405.3860","url":"https://dblp.org/rec/journals/corr/ChenH14b"}, "url":"URL#3969331" }, { "@score":"1", "@id":"3969342", "info":{"authors":{"author":[{"@pid":"28/4743","text":"Taolue Chen"},{"@pid":"28/6047","text":"Stefan Kiefer"}]},"title":"On the Total Variation Distance of Labelled Markov Chains.","venue":"CoRR","volume":"abs/1405.2852","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/ChenK14","ee":"http://arxiv.org/abs/1405.2852","url":"https://dblp.org/rec/journals/corr/ChenK14"}, "url":"URL#3969342" }, { "@score":"1", "@id":"3969345", "info":{"authors":{"author":[{"@pid":"78/10285","text":"Hsien-Pu Chen"},{"@pid":"09/3354","text":"Laszlo B. Kish"},{"@pid":"131/6472","text":"Claes-Goran Granqvist"},{"@pid":"116/4719","text":"Gabor Schmera"}]},"title":"On the "cracking" scheme in the paper "A directional coupler attack against the Kish key distribution system" by Gunn, Allison and Abbott.","venue":"CoRR","volume":"abs/1405.2034","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/ChenKGS14a","ee":"http://arxiv.org/abs/1405.2034","url":"https://dblp.org/rec/journals/corr/ChenKGS14a"}, "url":"URL#3969345" }, { "@score":"1", "@id":"3969347", "info":{"authors":{"author":[{"@pid":"82/5049","text":"David L. Chen"},{"@pid":"37/6802-2","text":"Joohyun Kim 0002"},{"@pid":"m/RaymondJMooney","text":"Raymond J. Mooney"}]},"title":"Training a Multilingual Sportscaster: Using Perceptual Context to Learn Language.","venue":"CoRR","volume":"abs/1405.7711","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/ChenKM14","ee":"http://arxiv.org/abs/1405.7711","url":"https://dblp.org/rec/journals/corr/ChenKM14"}, "url":"URL#3969347" }, { "@score":"1", "@id":"3969349", "info":{"authors":{"author":[{"@pid":"56/9060","text":"Junting Chen"},{"@pid":"68/4401","text":"Vincent K. N. Lau"}]},"title":"Two-Tier Precoding for FDD Multi-cell Massive MIMO Time-Varying Interference Networks (Full Version).","venue":"CoRR","volume":"abs/1405.4608","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/ChenL14","ee":"http://arxiv.org/abs/1405.4608","url":"https://dblp.org/rec/journals/corr/ChenL14"}, "url":"URL#3969349" }, { "@score":"1", "@id":"3969359", "info":{"authors":{"author":[{"@pid":"121/5686","text":"Bocong Chen"},{"@pid":"83/3827","text":"San Ling"},{"@pid":"66/5976","text":"Guanghui Zhang"}]},"title":"Self-dual cyclic codes over finite chain rings.","venue":"CoRR","volume":"abs/1405.2602","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/ChenLZ14b","ee":"http://arxiv.org/abs/1405.2602","url":"https://dblp.org/rec/journals/corr/ChenLZ14b"}, "url":"URL#3969359" }, { "@score":"1", "@id":"3969363", "info":{"authors":{"author":[{"@pid":"146/0715","text":"Yuansi Chen"},{"@pid":"49/6555","text":"Julien Mairal"},{"@pid":"39/2793","text":"Zaïd Harchaoui"}]},"title":"Fast and Robust Archetypal Analysis for Representation Learning.","venue":"CoRR","volume":"abs/1405.6472","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/ChenMH14","ee":"http://arxiv.org/abs/1405.6472","url":"https://dblp.org/rec/journals/corr/ChenMH14"}, "url":"URL#3969363" }, { "@score":"1", "@id":"3969407", "info":{"authors":{"author":[{"@pid":"135/0179","text":"Moya Chen"},{"@pid":"135/0135","text":"Doris Xin"},{"@pid":"w/DamienWoods","text":"Damien Woods"}]},"title":"Parallel computation using active self-assembly.","venue":"CoRR","volume":"abs/1405.0527","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/ChenXW14","ee":"http://arxiv.org/abs/1405.0527","url":"https://dblp.org/rec/journals/corr/ChenXW14"}, "url":"URL#3969407" }, { "@score":"1", "@id":"3969418", "info":{"authors":{"author":[{"@pid":"22/11205-1","text":"Bowei Chen 0001"},{"@pid":"19/1243-2","text":"Shuai Yuan 0002"},{"@pid":"w/JunWang12","text":"Jun Wang 0012"}]},"title":"A Dynamic Pricing Model for Unifying Programmatic Guarantee and Real-Time Bidding in Display Advertising.","venue":"CoRR","volume":"abs/1405.5189","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/ChenYW14","ee":"http://arxiv.org/abs/1405.5189","url":"https://dblp.org/rec/journals/corr/ChenYW14"}, "url":"URL#3969418" }, { "@score":"1", "@id":"3969422", "info":{"authors":{"author":[{"@pid":"82/6198-1","text":"Hongbin Chen 0001"},{"@pid":"32/8437","text":"Fangfang Zhou"},{"@pid":"72/3887-1","text":"Jun Cai 0001"},{"@pid":"62/8585","text":"Zhao Feng"},{"@pid":"04/4991","text":"He Qian"}]},"title":"Geometric projection-based switching policy for multiple energy harvesting transmitters.","venue":"CoRR","volume":"abs/1405.4642","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/ChenZCFQ14","ee":"http://arxiv.org/abs/1405.4642","url":"https://dblp.org/rec/journals/corr/ChenZCFQ14"}, "url":"URL#3969422" }, { "@score":"1", "@id":"3969425", "info":{"authors":{"author":[{"@pid":"66/6179","text":"Tieming Chen"},{"@pid":"98/5660","text":"Xu Zhang"},{"@pid":"130/2381","text":"Shichao Jin"},{"@pid":"44/3696","text":"Okhee Kim"}]},"title":"Efficient classification using parallel and scalable compressed model and Its application on intrusion detection.","venue":"CoRR","volume":"abs/1405.3410","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/ChenZJK14","ee":"http://arxiv.org/abs/1405.3410","url":"https://dblp.org/rec/journals/corr/ChenZJK14"}, "url":"URL#3969425" }, { "@score":"1", "@id":"3969433", "info":{"authors":{"author":[{"@pid":"96/3253","text":"James Cheney"},{"@pid":"27/2651","text":"Roly Perera"}]},"title":"An Analytical Survey of Provenance Sanitization.","venue":"CoRR","volume":"abs/1405.5777","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/CheneyP14","ee":"http://arxiv.org/abs/1405.5777","url":"https://dblp.org/rec/journals/corr/CheneyP14"}, "url":"URL#3969433" }, { "@score":"1", "@id":"3969438", "info":{"authors":{"author":[{"@pid":"05/2700","text":"Bo Cheng"},{"@pid":"69/764-1","text":"Ling Cheng 0001"}]},"title":"Single machine slack due-window assignment and scheduling of linear time-dependent deteriorating jobs and a deteriorating maintenance activity.","venue":"CoRR","volume":"abs/1405.0712","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/ChengC14","ee":"http://arxiv.org/abs/1405.0712","url":"https://dblp.org/rec/journals/corr/ChengC14"}, "url":"URL#3969438" }, { "@score":"1", "@id":"3969441", "info":{"authors":{"author":[{"@pid":"78/8039","text":"Justin Cheng"},{"@pid":"49/3976","text":"Cristian Danescu-Niculescu-Mizil"},{"@pid":"l/JureLeskovec","text":"Jure Leskovec"}]},"title":"How Community Feedback Shapes User Behavior.","venue":"CoRR","volume":"abs/1405.1429","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/ChengDL14","ee":"http://arxiv.org/abs/1405.1429","url":"https://dblp.org/rec/journals/corr/ChengDL14"}, "url":"URL#3969441" }, { "@score":"1", "@id":"3969447", "info":{"authors":{"author":[{"@pid":"64/3701","text":"Chih-Hong Cheng"},{"@pid":"07/9299","text":"Chung-Hao Huang"},{"@pid":"28/800","text":"Harald Ruess"},{"@pid":"58/8937","text":"Stefan Stattelmann"}]},"title":"G4LTL-ST: Automatic Generation of PLC Programs.","venue":"CoRR","volume":"abs/1405.2409","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/ChengHRS14","ee":"http://arxiv.org/abs/1405.2409","url":"https://dblp.org/rec/journals/corr/ChengHRS14"}, "url":"URL#3969447" }, { "@score":"1", "@id":"3969452", "info":{"authors":{"author":[{"@pid":"c/SiuWingCheng","text":"Siu-Wing Cheng"},{"@pid":"146/0576","text":"Liam Mencel"},{"@pid":"33/3163","text":"Antoine Vigneron"}]},"title":"A Faster Algorithm for Computing Straight Skeletons.","venue":"CoRR","volume":"abs/1405.4691","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/ChengMV14","ee":"http://arxiv.org/abs/1405.4691","url":"https://dblp.org/rec/journals/corr/ChengMV14"}, "url":"URL#3969452" }, { "@score":"1", "@id":"3969459", "info":{"authors":{"author":[{"@pid":"87/5654","text":"Joseph Cheriyan"},{"@pid":"117/3136-2","text":"Zhihan Gao 0002"},{"@pid":"77/4787","text":"Konstantinos Georgiou"},{"@pid":"55/8911","text":"Sahil Singla 0001"}]},"title":"On Integrality Ratios for Asymmetric TSP in the Sherali-Adams Hierarchy.","venue":"CoRR","volume":"abs/1405.0945","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/CheriyanGGS14","ee":"http://arxiv.org/abs/1405.0945","url":"https://dblp.org/rec/journals/corr/CheriyanGGS14"}, "url":"URL#3969459" }, { "@score":"1", "@id":"3969504", "info":{"authors":{"author":[{"@pid":"00/9923","text":"Rajesh Hemant Chitnis"},{"@pid":"c/GrahamCormode","text":"Graham Cormode"},{"@pid":"334/4488","text":"Mohammad Taghi Hajiaghayi"},{"@pid":"11/4322","text":"Morteza Monemizadeh"}]},"title":"Parameterized Streaming Algorithms for Vertex Cover.","venue":"CoRR","volume":"abs/1405.0093","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/ChitnisCHM14","ee":"http://arxiv.org/abs/1405.0093","url":"https://dblp.org/rec/journals/corr/ChitnisCHM14"}, "url":"URL#3969504" }, { "@score":"1", "@id":"3969506", "info":{"authors":{"author":[{"@pid":"09/8037","text":"V. Chitraa"},{"@pid":"13/7867","text":"Antony Selvadoss Thanamani"}]},"title":"Web Log Data Analysis by Enhanced Fuzzy C Means Clustering.","venue":"CoRR","volume":"abs/1405.5509","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/ChitraaT14","ee":"http://arxiv.org/abs/1405.5509","url":"https://dblp.org/rec/journals/corr/ChitraaT14"}, "url":"URL#3969506" }, { "@score":"1", "@id":"3969520", "info":{"authors":{"author":{"@pid":"146/0744","text":"Navya Chodisetti"}},"title":"Analysis of Digital Knapsack Based Sealed Bid Auction.","venue":"CoRR","volume":"abs/1405.0201","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/Chodisetti14","ee":"http://arxiv.org/abs/1405.0201","url":"https://dblp.org/rec/journals/corr/Chodisetti14"}, "url":"URL#3969520" }, { "@score":"1", "@id":"3969535", "info":{"authors":{"author":{"@pid":"146/0811","text":"Vasyl Choliy"}},"title":"DDscat.C++ User and programmer guide.","venue":"CoRR","volume":"abs/1405.3630","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/Choliy14","ee":"http://arxiv.org/abs/1405.3630","url":"https://dblp.org/rec/journals/corr/Choliy14"}, "url":"URL#3969535" }, { "@score":"1", "@id":"3969550", "info":{"authors":{"author":[{"@pid":"146/0514","text":"Evan Chou"},{"@pid":"01/2867","text":"C. Sinan Güntürk"}]},"title":"Distributed noise-shaping quantization: I. Beta duals of finite frames and near-optimal quantization of random measurements.","venue":"CoRR","volume":"abs/1405.4628","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/ChouG14","ee":"http://arxiv.org/abs/1405.4628","url":"https://dblp.org/rec/journals/corr/ChouG14"}, "url":"URL#3969550" }, { "@score":"1", "@id":"3969574", "info":{"authors":{"author":[{"@pid":"41/11466","text":"Jürgen Christ"},{"@pid":"79/3265","text":"Jochen Hoenicke"}]},"title":"Weakly Equivalent Arrays.","venue":"CoRR","volume":"abs/1405.6939","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/ChristH14","ee":"http://arxiv.org/abs/1405.6939","url":"https://dblp.org/rec/journals/corr/ChristH14"}, "url":"URL#3969574" }, { "@score":"1", "@id":"3969578", "info":{"authors":{"author":[{"@pid":"96/11466","text":"Mark M. Christiansen"},{"@pid":"d/KenRDuffy","text":"Ken R. Duffy"},{"@pid":"89/4611","text":"Flávio du Pin Calmon"},{"@pid":"m/MurielMedard","text":"Muriel Médard"}]},"title":"Quantifying the computational security of multi-user systems.","venue":"CoRR","volume":"abs/1405.5024","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/ChristiansenDCM14","ee":"http://arxiv.org/abs/1405.5024","url":"https://dblp.org/rec/journals/corr/ChristiansenDCM14"}, "url":"URL#3969578" }, { "@score":"1", "@id":"3969617", "info":{"authors":{"author":[{"@pid":"04/11145","text":"Giuseppe Cicotti"},{"@pid":"32/5766","text":"Luigi Coppolino"},{"@pid":"06/552","text":"Salvatore D'Antonio"},{"@pid":"59/3062","text":"Luigi Romano"}]},"title":"Big Data Analytics for QoS Prediction Through Probabilistic Model Checking.","venue":"CoRR","volume":"abs/1405.0327","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/CicottiCDR14","ee":"http://arxiv.org/abs/1405.0327","url":"https://dblp.org/rec/journals/corr/CicottiCDR14"}, "url":"URL#3969617" }, { "@score":"1", "@id":"3969661", "info":{"authors":{"author":[{"@pid":"94/4051","text":"Francisco Claude"},{"@pid":"n/GonzaloNavarro","text":"Gonzalo Navarro 0001"},{"@pid":"90/10480","text":"Alberto Ordóñez Pereira"}]},"title":"Efficient Compressed Wavelet Trees over Large Alphabets.","venue":"CoRR","volume":"abs/1405.1220","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/ClaudeNP14","ee":"http://arxiv.org/abs/1405.1220","url":"https://dblp.org/rec/journals/corr/ClaudeNP14"}, "url":"URL#3969661" }, { "@score":"1", "@id":"3969682", "info":{"authors":{"author":[{"@pid":"c/MCodish","text":"Michael Codish"},{"@pid":"21/4578","text":"Luís Cruz-Filipe"},{"@pid":"42/4902-2","text":"Michael Frank 0002"},{"@pid":"36/5338","text":"Peter Schneider-Kamp"}]},"title":"Twenty-Five Comparators is Optimal when Sorting Nine Inputs (and Twenty-Nine for Ten).","venue":"CoRR","volume":"abs/1405.5754","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/CodishCFS14","ee":"http://arxiv.org/abs/1405.5754","url":"https://dblp.org/rec/journals/corr/CodishCFS14"}, "url":"URL#3969682" }, { "@score":"1", "@id":"3969713", "info":{"authors":{"author":[{"@pid":"61/8056","text":"Kobi Cohen"},{"@pid":"78/6217-1","text":"Qing Zhao 0001"}]},"title":"Asymptotically Optimal Sequential Tests for Anomaly Detection: Switching with Memory.","venue":"CoRR","volume":"abs/1405.4659","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/CohenZ14a","ee":"http://arxiv.org/abs/1405.4659","url":"https://dblp.org/rec/journals/corr/CohenZ14a"}, "url":"URL#3969713" }, { "@score":"1", "@id":"3969714", "info":{"authors":{"author":[{"@pid":"61/8056","text":"Kobi Cohen"},{"@pid":"78/6217-1","text":"Qing Zhao 0001"},{"@pid":"89/5072","text":"Ananthram Swami"}]},"title":"Optimal Index Policies for Anomaly Localization in Resource-Constrained Cyber Systems.","venue":"CoRR","volume":"abs/1405.4098","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/CohenZS14","ee":"http://arxiv.org/abs/1405.4098","url":"https://dblp.org/rec/journals/corr/CohenZS14"}, "url":"URL#3969714" }, { "@score":"1", "@id":"3969738", "info":{"authors":{"author":[{"@pid":"47/8356","text":"Richard Combes"},{"@pid":"p/AlexandreProutiere","text":"Alexandre Proutière"}]},"title":"Unimodal Bandits: Regret Lower Bounds and Optimal Algorithms.","venue":"CoRR","volume":"abs/1405.5096","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/CombesP14a","ee":"http://arxiv.org/abs/1405.5096","url":"https://dblp.org/rec/journals/corr/CombesP14a"}, "url":"URL#3969738" }, { "@score":"1", "@id":"3969742", "info":{"authors":{"author":[{"@pid":"c/MarcoComini","text":"Marco Comini"},{"@pid":"34/9881","text":"Laura Titolo"},{"@pid":"v/AliciaVillanueva","text":"Alicia Villanueva"}]},"title":"Abstract Diagnosis for tccp using a Linear Temporal Logic.","venue":"CoRR","volume":"abs/1405.3675","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/CominiTV14","ee":"http://arxiv.org/abs/1405.3675","url":"https://dblp.org/rec/journals/corr/CominiTV14"}, "url":"URL#3969742" }, { "@score":"1", "@id":"3969763", "info":{"authors":{"author":[{"@pid":"36/1270","text":"Sergio Consoli"},{"@pid":"30/2188","text":"José Andrés Moreno-Pérez"},{"@pid":"20/1436","text":"Kenneth Darby-Dowman"},{"@pid":"11/1904","text":"Nenad Mladenovic"}]},"title":"Mejora de la exploracion y la explotacion de las heuristicas constructivas para el MLSTP.","venue":"CoRR","volume":"abs/1405.1980","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/ConsoliMDM14","ee":"http://arxiv.org/abs/1405.1980","url":"https://dblp.org/rec/journals/corr/ConsoliMDM14"}, "url":"URL#3969763" }, { "@score":"1", "@id":"3969771", "info":{"authors":{"author":[{"@pid":"93/566","text":"Andrew R. Conway"},{"@pid":"10/1624","text":"Anthony J. Guttmann"}]},"title":"On the growth rate of 1324-avoiding permutations.","venue":"CoRR","volume":"abs/1405.6802","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/ConwayG14","ee":"http://arxiv.org/abs/1405.6802","url":"https://dblp.org/rec/journals/corr/ConwayG14"}, "url":"URL#3969771" }, { "@score":"1", "@id":"3969785", "info":{"authors":{"author":[{"@pid":"31/4395","text":"Giorgio Corani"},{"@pid":"146/0795","text":"Andrea Mignatti"}]},"title":"Credal Model Averaging for classification: representing prior ignorance and expert opinions.","venue":"CoRR","volume":"abs/1405.3559","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/CoraniM14","ee":"http://arxiv.org/abs/1405.3559","url":"https://dblp.org/rec/journals/corr/CoraniM14"}, "url":"URL#3969785" }, { "@score":"1", "@id":"3969798", "info":{"authors":{"author":[{"@pid":"98/1125","text":"José R. Correa"},{"@pid":"35/4992","text":"Tobias Harks"},{"@pid":"137/7141","text":"Vincent J. C. Kreuzen"},{"@pid":"73/8685","text":"Jannik Matuschke"}]},"title":"Fare Evasion in Transit Networks.","venue":"CoRR","volume":"abs/1405.2826","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/CorreaHKM14","ee":"http://arxiv.org/abs/1405.2826","url":"https://dblp.org/rec/journals/corr/CorreaHKM14"}, "url":"URL#3969798" }, { "@score":"1", "@id":"3969801", "info":{"authors":{"author":[{"@pid":"77/5783","text":"Corinna Cortes"},{"@pid":"03/5448","text":"Mehryar Mohri"},{"@pid":"10/11472","text":"Andres Muñoz Medina"}]},"title":"Adaptation Algorithm and Theory Based on Generalized Discrepancy.","venue":"CoRR","volume":"abs/1405.1503","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/CortesMM14","ee":"http://arxiv.org/abs/1405.1503","url":"https://dblp.org/rec/journals/corr/CortesMM14"}, "url":"URL#3969801" }, { "@score":"1", "@id":"3969825", "info":{"authors":{"author":[{"@pid":"02/1920","text":"Pierre Courtieu"},{"@pid":"33/1736","text":"Lionel Rieg"},{"@pid":"u/XavierUrbain","text":"Xavier Urbain"},{"@pid":"t/SebastienTixeuil","text":"Sébastien Tixeuil"}]},"title":"Impossibility of Gathering, a Certification.","venue":"CoRR","volume":"abs/1405.5902","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/CourtieuRUT14","ee":"http://arxiv.org/abs/1405.5902","url":"https://dblp.org/rec/journals/corr/CourtieuRUT14"}, "url":"URL#3969825" }, { "@score":"1", "@id":"3969826", "info":{"authors":{"author":{"@pid":"89/381","text":"Nicolas T. Courtois"}},"title":"On The Longest Chain Rule and Programmed Self-Destruction of Crypto Currencies.","venue":"CoRR","volume":"abs/1405.0534","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/Courtois14","ee":"http://arxiv.org/abs/1405.0534","url":"https://dblp.org/rec/journals/corr/Courtois14"}, "url":"URL#3969826" }, { "@score":"1", "@id":"3969836", "info":{"authors":{"author":[{"@pid":"50/8336","text":"Marcos Cramer"},{"@pid":"136/1506","text":"Pieter Van Hertum"},{"@pid":"146/0809","text":"Diego Agustín Ambrossio"},{"@pid":"d/MarcDenecker","text":"Marc Denecker"}]},"title":"Modelling Delegation and Revocation Schemes in IDP.","venue":"CoRR","volume":"abs/1405.1584","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/CramerHAD14","ee":"http://arxiv.org/abs/1405.1584","url":"https://dblp.org/rec/journals/corr/CramerHAD14"}, "url":"URL#3969836" }, { "@score":"1", "@id":"3969867", "info":{"authors":{"author":[{"@pid":"30/8486","text":"Flávio Cruz"},{"@pid":"20/2773-1","text":"Ricardo Rocha 0001"},{"@pid":"g/SCGoldstein","text":"Seth Copen Goldstein"},{"@pid":"p/FPfenning","text":"Frank Pfenning"}]},"title":"A Linear Logic Programming Language for Concurrent Programming over Graph Structures.","venue":"CoRR","volume":"abs/1405.3556","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/CruzRGP14","ee":"http://arxiv.org/abs/1405.3556","url":"https://dblp.org/rec/journals/corr/CruzRGP14"}, "url":"URL#3969867" }, { "@score":"1", "@id":"3969881", "info":{"authors":{"author":[{"@pid":"39/11160","text":"Erik Cuevas"},{"@pid":"132/1692","text":"Alonso Echavarría"},{"@pid":"66/8017","text":"Marte A. Ramírez-Ortegón"}]},"title":"An optimization algorithm inspired by the States of Matter that improves the balance between exploration and exploitation.","venue":"CoRR","volume":"abs/1405.5066","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/CuevasER14","ee":"http://arxiv.org/abs/1405.5066","url":"https://dblp.org/rec/journals/corr/CuevasER14"}, "url":"URL#3969881" }, { "@score":"1", "@id":"3969883", "info":{"authors":{"author":[{"@pid":"39/11160","text":"Erik Cuevas"},{"@pid":"90/7517","text":"Mauricio Gonzalez"},{"@pid":"02/8040","text":"Daniel Zaldivar 0001"},{"@pid":"13/1481","text":"Marco Antonio Pérez Cisneros"}]},"title":"Multi-ellipses detection on images inspired by collective animal behavior.","venue":"CoRR","volume":"abs/1405.5164","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/CuevasGZC14","ee":"http://arxiv.org/abs/1405.5164","url":"https://dblp.org/rec/journals/corr/CuevasGZC14"}, "url":"URL#3969883" }, { "@score":"1", "@id":"3969884", "info":{"authors":{"author":[{"@pid":"39/11160","text":"Erik Cuevas"},{"@pid":"67/11250","text":"Noé Ortega-Sánchez"},{"@pid":"02/8040","text":"Daniel Zaldivar 0001"},{"@pid":"13/1481","text":"Marco Antonio Pérez Cisneros"}]},"title":"Circle detection by Harmony Search Optimization.","venue":"CoRR","volume":"abs/1405.7242","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/CuevasOZC14","ee":"http://arxiv.org/abs/1405.7242","url":"https://dblp.org/rec/journals/corr/CuevasOZC14"}, "url":"URL#3969884" }, { "@score":"1", "@id":"3969885", "info":{"authors":{"author":[{"@pid":"39/11160","text":"Erik Cuevas"},{"@pid":"37/10395","text":"Diego Oliva"},{"@pid":"02/8040","text":"Daniel Zaldivar 0001"},{"@pid":"13/1481","text":"Marco Antonio Pérez Cisneros"},{"@pid":"60/8818","text":"Gonzalo Pajares"}]},"title":"Opposition Based ElectromagnetismLike for Global Optimization.","venue":"CoRR","volume":"abs/1405.5172","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/CuevasOZCP14","ee":"http://arxiv.org/abs/1405.5172","url":"https://dblp.org/rec/journals/corr/CuevasOZCP14"}, "url":"URL#3969885" }, { "@score":"1", "@id":"3969888", "info":{"authors":{"author":[{"@pid":"39/11160","text":"Erik Cuevas"},{"@pid":"10/10794","text":"Felipe Sención-Echauri"},{"@pid":"02/8040","text":"Daniel Zaldivar 0001"},{"@pid":"13/1481","text":"Marco Antonio Pérez Cisneros"},{"@pid":"s/JuanHumbertoSossaAzuela","text":"Humberto Sossa"}]},"title":"A Multi-threshold Segmentation Approach Based on Artificial Bee Colony Optimization.","venue":"CoRR","volume":"abs/1405.7229","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/CuevasSZCS14","ee":"http://arxiv.org/abs/1405.7229","url":"https://dblp.org/rec/journals/corr/CuevasSZCS14"}, "url":"URL#3969888" }, { "@score":"1", "@id":"3969889", "info":{"authors":{"author":[{"@pid":"39/11160","text":"Erik Cuevas"},{"@pid":"212/6090","text":"Fernando Wario"},{"@pid":"59/10694","text":"Valentín Osuna-Enciso"},{"@pid":"02/8040","text":"Daniel Zaldivar 0001"},{"@pid":"13/1481","text":"Marco Antonio Pérez Cisneros"}]},"title":"Fast algorithm for Multiple-Circle detection on images using Learning Automata.","venue":"CoRR","volume":"abs/1405.5531","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/CuevasWOZC14","ee":"http://arxiv.org/abs/1405.5531","url":"https://dblp.org/rec/journals/corr/CuevasWOZC14"}, "url":"URL#3969889" }, { "@score":"1", "@id":"3969890", "info":{"authors":{"author":[{"@pid":"39/11160","text":"Erik Cuevas"},{"@pid":"212/6090","text":"Fernando Wario"},{"@pid":"02/8040","text":"Daniel Zaldivar 0001"},{"@pid":"13/1481","text":"Marco Antonio Pérez Cisneros"}]},"title":"Circle detection on images using Learning Automata.","venue":"CoRR","volume":"abs/1405.5406","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/CuevasWZC14","ee":"http://arxiv.org/abs/1405.5406","url":"https://dblp.org/rec/journals/corr/CuevasWZC14"}, "url":"URL#3969890" }, { "@score":"1", "@id":"3969891", "info":{"authors":{"author":[{"@pid":"39/11160","text":"Erik Cuevas"},{"@pid":"02/8040","text":"Daniel Zaldivar 0001"},{"@pid":"13/1481","text":"Marco Antonio Pérez Cisneros"}]},"title":"Seeking multi-thresholds for image segmentation with Learning Automata.","venue":"CoRR","volume":"abs/1405.7361","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/CuevasZC14","ee":"http://arxiv.org/abs/1405.7361","url":"https://dblp.org/rec/journals/corr/CuevasZC14"}, "url":"URL#3969891" }, { "@score":"1", "@id":"3969892", "info":{"authors":{"author":[{"@pid":"39/11160","text":"Erik Cuevas"},{"@pid":"02/8040","text":"Daniel Zaldivar 0001"},{"@pid":"13/1481","text":"Marco Antonio Pérez Cisneros"},{"@pid":"37/10395","text":"Diego Oliva"}]},"title":"Block matching algorithm based on Differential Evolution for motion estimation.","venue":"CoRR","volume":"abs/1405.4721","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/CuevasZCO14","ee":"http://arxiv.org/abs/1405.4721","url":"https://dblp.org/rec/journals/corr/CuevasZCO14"}, "url":"URL#3969892" }, { "@score":"1", "@id":"3969893", "info":{"authors":{"author":[{"@pid":"39/11160","text":"Erik Cuevas"},{"@pid":"02/8040","text":"Daniel Zaldivar 0001"},{"@pid":"13/1481","text":"Marco Antonio Pérez Cisneros"},{"@pid":"66/8017","text":"Marte A. Ramírez-Ortegón"}]},"title":"Polynomial trajectory algorithm for a biped robot.","venue":"CoRR","volume":"abs/1405.5937","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/CuevasZCR14","ee":"http://arxiv.org/abs/1405.5937","url":"https://dblp.org/rec/journals/corr/CuevasZCR14"}, "url":"URL#3969893" }, { "@score":"1", "@id":"3969894", "info":{"authors":{"author":[{"@pid":"39/11160","text":"Erik Cuevas"},{"@pid":"02/8040","text":"Daniel Zaldivar 0001"},{"@pid":"13/1481","text":"Marco Antonio Pérez Cisneros"},{"@pid":"66/8017","text":"Marte A. Ramírez-Ortegón"}]},"title":"Circle detection using Discrete Differential Evolution Optimization.","venue":"CoRR","volume":"abs/1405.7362","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/CuevasZCR14a","ee":"http://arxiv.org/abs/1405.7362","url":"https://dblp.org/rec/journals/corr/CuevasZCR14a"}, "url":"URL#3969894" }, { "@score":"1", "@id":"3969895", "info":{"authors":{"author":[{"@pid":"39/11160","text":"Erik Cuevas"},{"@pid":"02/8040","text":"Daniel Zaldivar 0001"},{"@pid":"13/1481","text":"Marco Antonio Pérez Cisneros"},{"@pid":"88/2157","text":"Edgar N. Sánchez"},{"@pid":"66/8017","text":"Marte A. Ramírez-Ortegón"}]},"title":"Robust Fuzzy corner detector.","venue":"CoRR","volume":"abs/1405.5422","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/CuevasZCSR14","ee":"http://arxiv.org/abs/1405.5422","url":"https://dblp.org/rec/journals/corr/CuevasZCSR14"}, "url":"URL#3969895" }, { "@score":"1", "@id":"3969906", "info":{"authors":{"author":[{"@pid":"04/7480","text":"Daniel Cullina"},{"@pid":"85/4976","text":"Negar Kiyavash"}]},"title":"Generalized sphere-packing and sphere-covering bounds on the size of codes for combinatorial channels.","venue":"CoRR","volume":"abs/1405.1464","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/CullinaK14","ee":"http://arxiv.org/abs/1405.1464","url":"https://dblp.org/rec/journals/corr/CullinaK14"}, "url":"URL#3969906" }, { "@score":"1", "@id":"3969912", "info":{"authors":{"author":[{"@pid":"01/7453","text":"Salvatore Cuomo"},{"@pid":"144/7465","text":"Raffaele Farina"},{"@pid":"32/9987","text":"Ardelio Galletti"},{"@pid":"04/10646","text":"Livia Marcellino"}]},"title":"An error estimate of Gaussian Recursive Filter in 3Dvar problem.","venue":"CoRR","volume":"abs/1405.3468","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/CuomoFGM14","ee":"http://arxiv.org/abs/1405.3468","url":"https://dblp.org/rec/journals/corr/CuomoFGM14"}, "url":"URL#3969912" }, { "@score":"1", "@id":"3969913", "info":{"authors":{"author":[{"@pid":"c/FredericCuppens","text":"Frédéric Cuppens"},{"@pid":"g/AlbanGabillon","text":"Alban Gabillon"}]},"title":"Cover Story Management.","venue":"CoRR","volume":"abs/1405.5628","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/CuppensG14","ee":"http://arxiv.org/abs/1405.5628","url":"https://dblp.org/rec/journals/corr/CuppensG14"}, "url":"URL#3969913" }, { "@score":"1", "@id":"3969923", "info":{"authors":{"author":[{"@pid":"146/0752","text":"Ante Custic"},{"@pid":"92/153","text":"Bettina Klinz"},{"@pid":"w/GJWoeginger","text":"Gerhard J. Woeginger"}]},"title":"Planar 3-dimensional assignment problems with Monge-like cost arrays.","venue":"CoRR","volume":"abs/1405.5210","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/CusticKW14","ee":"http://arxiv.org/abs/1405.5210","url":"https://dblp.org/rec/journals/corr/CusticKW14"}, "url":"URL#3969923" }, { "@score":"1", "@id":"3969927", "info":{"authors":{"author":[{"@pid":"60/2919","text":"Fabio Cuzzolin"},{"@pid":"55/6754","text":"Diana Mateus"},{"@pid":"59/2097","text":"Radu Horaud"}]},"title":"Robust Temporally Coherent Laplacian Protrusion Segmentation of 3D Articulated Bodies.","venue":"CoRR","volume":"abs/1405.6563","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/CuzzolinMH14","ee":"http://arxiv.org/abs/1405.6563","url":"https://dblp.org/rec/journals/corr/CuzzolinMH14"}, "url":"URL#3969927" }, { "@score":"1", "@id":"3969937", "info":{"authors":{"author":{"@pid":"146/0580","text":"Márta Czenky"}},"title":"The Efficiency Examination of Teaching of Different Normalization Methods.","venue":"CoRR","volume":"abs/1405.1912","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/Czenky14","ee":"http://arxiv.org/abs/1405.1912","url":"https://dblp.org/rec/journals/corr/Czenky14"}, "url":"URL#3969937" }, { "@score":"1", "@id":"3969960", "info":{"authors":{"author":[{"@pid":"71/8725","text":"Konrad K. Dabrowski"},{"@pid":"18/5531","text":"Daniël Paulusma"}]},"title":"Clique-width of Graph Classes Defined by Two Forbidden Induced Subgraphs.","venue":"CoRR","volume":"abs/1405.7092","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/DabrowskiP14a","ee":"http://arxiv.org/abs/1405.7092","url":"https://dblp.org/rec/journals/corr/DabrowskiP14a"}, "url":"URL#3969960" }, { "@score":"1", "@id":"3969962", "info":{"authors":{"author":[{"@pid":"38/6981","text":"Dana Dachman-Soled"},{"@pid":"67/1162","text":"Vitaly Feldman"},{"@pid":"87/5034","text":"Li-Yang Tan"},{"@pid":"12/3708","text":"Andrew Wan"},{"@pid":"84/6371","text":"Karl Wimmer"}]},"title":"Approximate resilience, monotonicity, and the complexity of agnostic learning.","venue":"CoRR","volume":"abs/1405.5268","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/Dachman-SoledFTWW14","ee":"http://arxiv.org/abs/1405.5268","url":"https://dblp.org/rec/journals/corr/Dachman-SoledFTWW14"}, "url":"URL#3969962" }, { "@score":"1", "@id":"3969998", "info":{"authors":{"author":[{"@pid":"117/4997","text":"Michele Dallachiesa"},{"@pid":"a/CharuCAggarwal","text":"Charu C. Aggarwal"},{"@pid":"p/ThemisPalpanas","text":"Themis Palpanas"}]},"title":"Node Classification in Uncertain Graphs.","venue":"CoRR","volume":"abs/1405.5829","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/DallachiesaAP14","ee":"http://arxiv.org/abs/1405.5829","url":"https://dblp.org/rec/journals/corr/DallachiesaAP14"}, "url":"URL#3969998" }, { "@score":"1", "@id":"3969999", "info":{"authors":{"author":[{"@pid":"120/7611","text":"Hadassa Daltrophe"},{"@pid":"d/ShlomiDolev","text":"Shlomi Dolev"},{"@pid":"74/3704","text":"Zvi Lotker"}]},"title":"Big Data Representation as High Dimensional Configuration.","venue":"CoRR","volume":"abs/1405.2512","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/DaltropheDL14","ee":"http://arxiv.org/abs/1405.2512","url":"https://dblp.org/rec/journals/corr/DaltropheDL14"}, "url":"URL#3969999" }, { "@score":"1", "@id":"3970012", "info":{"authors":{"author":[{"@pid":"146/0473","text":"Hadi Daneshmand"},{"@pid":"73/8260","text":"Manuel Gomez-Rodriguez"},{"@pid":"94/3481","text":"Le Song"},{"@pid":"97/119","text":"Bernhard Schölkopf"}]},"title":"Estimating Diffusion Network Structures: Recovery Conditions, Sample Complexity & Soft-thresholding Algorithm.","venue":"CoRR","volume":"abs/1405.2936","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/DaneshmandGSS14","ee":"http://arxiv.org/abs/1405.2936","url":"https://dblp.org/rec/journals/corr/DaneshmandGSS14"}, "url":"URL#3970012" }, { "@score":"1", "@id":"3970017", "info":{"authors":{"author":[{"@pid":"06/5697","text":"Oscar M. Danielsson"},{"@pid":"27/6007","text":"Omid Aghazadeh"}]},"title":"Human Pose Estimation from RGB Input Using Synthetic Training Data.","venue":"CoRR","volume":"abs/1405.1213","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/DanielssonA14","ee":"http://arxiv.org/abs/1405.1213","url":"https://dblp.org/rec/journals/corr/DanielssonA14"}, "url":"URL#3970017" }, { "@score":"1", "@id":"3970020", "info":{"authors":{"author":[{"@pid":"19/7805","text":"Amit Daniely"},{"@pid":"95/2750","text":"Shai Shalev-Shwartz"}]},"title":"Optimal Learners for Multiclass Problems.","venue":"CoRR","volume":"abs/1405.2420","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/DanielyS14a","ee":"http://arxiv.org/abs/1405.2420","url":"https://dblp.org/rec/journals/corr/DanielyS14a"}, "url":"URL#3970020" }, { "@score":"1", "@id":"3970028", "info":{"authors":{"author":[{"@pid":"37/10819","text":"Hoda Daou"},{"@pid":"23/2633","text":"Fabrice Labeau"}]},"title":"Medically Relevant Criteria used in EEG Compression for Improved Post-Compression Seizure Detection.","venue":"CoRR","volume":"abs/1405.0086","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/DaouL14a","ee":"http://arxiv.org/abs/1405.0086","url":"https://dblp.org/rec/journals/corr/DaouL14a"}, "url":"URL#3970028" }, { "@score":"1", "@id":"3970046", "info":{"authors":{"author":{"@pid":"146/0783","text":"Sima Das"}},"title":"On Local and Global Centrality in Large Scale Networks.","venue":"CoRR","volume":"abs/1405.5512","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/Das14","ee":"http://arxiv.org/abs/1405.5512","url":"https://dblp.org/rec/journals/corr/Das14"}, "url":"URL#3970046" }, { "@score":"1", "@id":"3970064", "info":{"authors":{"author":[{"@pid":"146/0476","text":"Deepjoy Das"},{"@pid":"89/1531","text":"Sarat Saharia"}]},"title":"Implementation And Performance Evaluation Of Background Subtraction Algorithms.","venue":"CoRR","volume":"abs/1405.1815","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/DasS14","ee":"http://arxiv.org/abs/1405.1815","url":"https://dblp.org/rec/journals/corr/DasS14"}, "url":"URL#3970064" }, { "@score":"1", "@id":"3970076", "info":{"authors":{"author":[{"@pid":"d/ConstantinosDaskalakis","text":"Constantinos Daskalakis"},{"@pid":"52/2474","text":"S. Matthew Weinberg"}]},"title":"Bayesian Truthful Mechanisms for Job Scheduling from Bi-criterion Approximation Algorithms.","venue":"CoRR","volume":"abs/1405.5940","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/DaskalakisW14","ee":"http://arxiv.org/abs/1405.5940","url":"https://dblp.org/rec/journals/corr/DaskalakisW14"}, "url":"URL#3970076" }, { "@score":"1", "@id":"3970078", "info":{"authors":{"author":[{"@pid":"137/8017","text":"Deepesh Data"},{"@pid":"28/5000","text":"Bikash Kumar Dey"},{"@pid":"05/9669","text":"Manoj Mishra"},{"@pid":"20/5817","text":"Vinod M. Prabhakaran"}]},"title":"How to Securely Compute the Modulo-Two Sum of Binary Sources.","venue":"CoRR","volume":"abs/1405.2555","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/DataDMP14","ee":"http://arxiv.org/abs/1405.2555","url":"https://dblp.org/rec/journals/corr/DataDMP14"}, "url":"URL#3970078" }, { "@score":"1", "@id":"3970079", "info":{"authors":{"author":{"@pid":"146/0606","text":"Srayan Datta"}},"title":"Predicting Central Topics in a Blog Corpus from a Networks Perspective.","venue":"CoRR","volume":"abs/1405.2386","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/Datta14","ee":"http://arxiv.org/abs/1405.2386","url":"https://dblp.org/rec/journals/corr/Datta14"}, "url":"URL#3970079" }, { "@score":"1", "@id":"3970090", "info":{"authors":{"author":[{"@pid":"143/7291","text":"Manish B. Dave"},{"@pid":"146/0850","text":"Mitesh B. Nakrani"}]},"title":"Malicious User Detection in Spectrum Sensing for WRAN Using Different Outliers Detection Techniques.","venue":"CoRR","volume":"abs/1405.2685","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/DaveN14","ee":"http://arxiv.org/abs/1405.2685","url":"https://dblp.org/rec/journals/corr/DaveN14"}, "url":"URL#3970090" }, { "@score":"1", "@id":"3970114", "info":{"authors":{"author":[{"@pid":"86/8237","text":"Suma Dawn"},{"@pid":"33/6649","text":"Vikas Saxena"},{"@pid":"39/1480","text":"Bhudev Sharma"}]},"title":"Cognitive-mapping and contextual pyramid based Digital Elevation Model Registration and its effective storage using fractal based compression.","venue":"CoRR","volume":"abs/1405.6662","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/DawnSS14","ee":"http://arxiv.org/abs/1405.6662","url":"https://dblp.org/rec/journals/corr/DawnSS14"}, "url":"URL#3970114" }, { "@score":"1", "@id":"3970115", "info":{"authors":{"author":[{"@pid":"86/8237","text":"Suma Dawn"},{"@pid":"33/6649","text":"Vikas Saxena"},{"@pid":"39/1480","text":"Bhu Dev Sharma"}]},"title":"DEM Registration and Error Analysis using ASCII values.","venue":"CoRR","volume":"abs/1405.7771","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/DawnSS14a","ee":"http://arxiv.org/abs/1405.7771","url":"https://dblp.org/rec/journals/corr/DawnSS14a"}, "url":"URL#3970115" }, { "@score":"1", "@id":"3970151", "info":{"authors":{"author":[{"@pid":"70/312","text":"Ofer Dekel"},{"@pid":"53/2896","text":"Jian Ding"},{"@pid":"12/10044","text":"Tomer Koren"},{"@pid":"31/3175","text":"Yuval Peres"}]},"title":"Online Learning with Composite Loss Functions.","venue":"CoRR","volume":"abs/1405.4471","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/DekelDKP14","ee":"http://arxiv.org/abs/1405.4471","url":"https://dblp.org/rec/journals/corr/DekelDKP14"}, "url":"URL#3970151" }, { "@score":"1", "@id":"3970167", "info":{"authors":{"author":{"@pid":"125/2164","text":"Radhakrishnan Delhibabu"}},"title":"An Abductive Framework for Horn Knowledge Base Dynamics.","venue":"CoRR","volume":"abs/1405.2642","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/Delhibabu14","ee":"http://arxiv.org/abs/1405.2642","url":"https://dblp.org/rec/journals/corr/Delhibabu14"}, "url":"URL#3970167" }, { "@score":"1", "@id":"3970172", "info":{"authors":{"author":{"@pid":"27/3557","text":"Holger Dell"}},"title":"A simple proof that AND-compression of NP-complete problems is hard.","venue":"CoRR","volume":"abs/1405.4472","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/Dell14","ee":"http://arxiv.org/abs/1405.4472","url":"https://dblp.org/rec/journals/corr/Dell14"}, "url":"URL#3970172" }, { "@score":"1", "@id":"3970184", "info":{"authors":{"author":[{"@pid":"d/ErikDDemaine","text":"Erik D. Demaine"},{"@pid":"135/5961","text":"Nathan Pinsker"},{"@pid":"146/0503","text":"Jon Schneider"}]},"title":"Fast Dynamic Pointer Following via Link-Cut Trees.","venue":"CoRR","volume":"abs/1405.3739","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/DemainePS14","ee":"http://arxiv.org/abs/1405.3739","url":"https://dblp.org/rec/journals/corr/DemainePS14"}, "url":"URL#3970184" }, { "@score":"1", "@id":"3970199", "info":{"authors":{"author":{"@pid":"66/3604","text":"Yong Deng"}},"title":"D numbers theory: a generalization of Dempster-Shafer evidence theory.","venue":"CoRR","volume":"abs/1405.3175","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/Deng14c","ee":"http://arxiv.org/abs/1405.3175","url":"https://dblp.org/rec/journals/corr/Deng14c"}, "url":"URL#3970199" }, { "@score":"1", "@id":"3970206", "info":{"authors":{"author":[{"@pid":"146/0446","text":"H. Lydia Deng"},{"@pid":"115/4946","text":"John A. Scales"}]},"title":"Characterizing the Topography of Multi-dimensional Energy Landscapes.","venue":"CoRR","volume":"abs/1405.2948","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/DengS14","ee":"http://arxiv.org/abs/1405.2948","url":"https://dblp.org/rec/journals/corr/DengS14"}, "url":"URL#3970206" }, { "@score":"1", "@id":"3970234", "info":{"authors":{"author":[{"@pid":"146/0680","text":"Kalpit V. Desai"},{"@pid":"146/0532","text":"Roopesh Ranjan"}]},"title":"Insights from the Wikipedia Contest (IEEE Contest for Data Mining 2011).","venue":"CoRR","volume":"abs/1405.7393","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/DesaiR14","ee":"http://arxiv.org/abs/1405.7393","url":"https://dblp.org/rec/journals/corr/DesaiR14"}, "url":"URL#3970234" }, { "@score":"1", "@id":"3970257", "info":{"authors":{"author":[{"@pid":"125/2041","text":"Prateek Dewan"},{"@pid":"97/5147","text":"Ponnurangam Kumaraguru"}]},"title":"It Doesn't Break Just on Twitter. Characterizing Facebook content During Real World Events.","venue":"CoRR","volume":"abs/1405.4820","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/DewanK14","ee":"http://arxiv.org/abs/1405.4820","url":"https://dblp.org/rec/journals/corr/DewanK14"}, "url":"URL#3970257" }, { "@score":"1", "@id":"3970261", "info":{"authors":{"author":[{"@pid":"d/TamalKDey","text":"Tamal K. Dey"},{"@pid":"02/5860","text":"Fengtao Fan"},{"@pid":"28/5745-1","text":"Yusu Wang 0001"}]},"title":"Dimension Detection with Local Homology.","venue":"CoRR","volume":"abs/1405.3534","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/DeyFW14","ee":"http://arxiv.org/abs/1405.3534","url":"https://dblp.org/rec/journals/corr/DeyFW14"}, "url":"URL#3970261" }, { "@score":"1", "@id":"3970263", "info":{"authors":{"author":[{"@pid":"40/7987","text":"Palash Dey"},{"@pid":"85/6789","text":"Neeldhara Misra"},{"@pid":"n/YNarahari","text":"Y. Narahari"}]},"title":"Complexity of Kernelization in the Possible Winner Problem.","venue":"CoRR","volume":"abs/1405.3865","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/DeyMN14a","ee":"http://arxiv.org/abs/1405.3865","url":"https://dblp.org/rec/journals/corr/DeyMN14a"}, "url":"URL#3970263" }, { "@score":"1", "@id":"3970303", "info":{"authors":{"author":[{"@pid":"d/VolkerDiekert","text":"Volker Diekert"},{"@pid":"74/6087","text":"Artur Jez"},{"@pid":"18/6721","text":"Wojciech Plandowski"}]},"title":"Finding All Solutions of Equations in Free Groups and Monoids with Involution.","venue":"CoRR","volume":"abs/1405.5133","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/DiekertJP14","ee":"http://arxiv.org/abs/1405.5133","url":"https://dblp.org/rec/journals/corr/DiekertJP14"}, "url":"URL#3970303" }, { "@score":"1", "@id":"3970312", "info":{"authors":{"author":[{"@pid":"119/3901","text":"Lior Dikstein"},{"@pid":"88/4362","text":"Haim H. Permuter"},{"@pid":"87/3545","text":"Yossef Steinberg"}]},"title":"On State Dependent Broadcast Channels with Cooperation.","venue":"CoRR","volume":"abs/1405.5083","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/DiksteinPS14","ee":"http://arxiv.org/abs/1405.5083","url":"https://dblp.org/rec/journals/corr/DiksteinPS14"}, "url":"URL#3970312" }, { "@score":"1", "@id":"3970368", "info":{"authors":{"author":[{"@pid":"20/7937","text":"Björn Döbel"},{"@pid":"146/0469","text":"Robert Muschner"},{"@pid":"h/HHartig","text":"Hermann Härtig"}]},"title":"Resource-Aware Replication on Heterogeneous Multicores: Challenges and Opportunities.","venue":"CoRR","volume":"abs/1405.2913","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/DobelMH14","ee":"http://arxiv.org/abs/1405.2913","url":"https://dblp.org/rec/journals/corr/DobelMH14"}, "url":"URL#3970368" }, { "@score":"1", "@id":"3970373", "info":{"authors":{"author":[{"@pid":"d/EEDoberkat","text":"Ernst-Erich Doberkat"},{"@pid":"46/7604","text":"Pedro Sánchez Terraf"}]},"title":"Stochastic Nondeterminism and Effectivity Functions.","venue":"CoRR","volume":"abs/1405.7141","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/DoberkatT14","ee":"http://arxiv.org/abs/1405.7141","url":"https://dblp.org/rec/journals/corr/DoberkatT14"}, "url":"URL#3970373" }, { "@score":"1", "@id":"3970379", "info":{"authors":{"author":[{"@pid":"72/3265","text":"Edward Dobson"},{"@pid":"133/2176","text":"Ademir Hujdurovic"},{"@pid":"93/6920","text":"Martin Milanic"},{"@pid":"17/4445","text":"Gabriel Verret"}]},"title":"Vertex-transitive CIS graphs.","venue":"CoRR","volume":"abs/1405.7874","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/DobsonHMV14","ee":"http://arxiv.org/abs/1405.7874","url":"https://dblp.org/rec/journals/corr/DobsonHMV14"}, "url":"URL#3970379" }, { "@score":"1", "@id":"3970400", "info":{"authors":{"author":[{"@pid":"120/7524","text":"Manlio De Domenico"},{"@pid":"47/2075","text":"Vincenzo Nicosia"},{"@pid":"41/11094","text":"Alex Arenas"},{"@pid":"16/1297","text":"Vito Latora"}]},"title":"Layer aggregation and reducibility of multilayer interconnected networks.","venue":"CoRR","volume":"abs/1405.0425","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/DomenicoNAL14","ee":"http://arxiv.org/abs/1405.0425","url":"https://dblp.org/rec/journals/corr/DomenicoNAL14"}, "url":"URL#3970400" }, { "@score":"1", "@id":"3970401", "info":{"authors":{"author":[{"@pid":"120/7524","text":"Manlio De Domenico"},{"@pid":"01/2405","text":"Mason A. Porter"},{"@pid":"41/11094","text":"Alex Arenas"}]},"title":"Multilayer Analysis and Visualization of Networks.","venue":"CoRR","volume":"abs/1405.0843","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/DomenicoPA14","ee":"http://arxiv.org/abs/1405.0843","url":"https://dblp.org/rec/journals/corr/DomenicoPA14"}, "url":"URL#3970401" }, { "@score":"1", "@id":"3970413", "info":{"authors":{"author":[{"@pid":"146/0803","text":"Yishun Dong"},{"@pid":"132/7757","text":"Farzan Farnia"},{"@pid":"12/4534","text":"Ayfer Özgür"}]},"title":"Near Optimal Energy Control and Approximate Capacity of Energy Harvesting Communication.","venue":"CoRR","volume":"abs/1405.1156","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/DongFO14","ee":"http://arxiv.org/abs/1405.1156","url":"https://dblp.org/rec/journals/corr/DongFO14"}, "url":"URL#3970413" }, { "@score":"1", "@id":"3970416", "info":{"authors":{"author":[{"@pid":"62/6234","text":"Mianxiong Dong"},{"@pid":"05/4746-1","text":"He Li 0001"},{"@pid":"18/4822","text":"Kaoru Ota"},{"@pid":"22/5702","text":"Haojin Zhu"}]},"title":"HVSTO: Efficient Privacy Preserving Hybrid Storage in Cloud Data Center.","venue":"CoRR","volume":"abs/1405.6200","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/DongLOZ14","ee":"http://arxiv.org/abs/1405.6200","url":"https://dblp.org/rec/journals/corr/DongLOZ14"}, "url":"URL#3970416" }, { "@score":"1", "@id":"3970441", "info":{"authors":{"author":[{"@pid":"98/4349","text":"Meik Dörpinghaus"},{"@pid":"126/5116","text":"Günther Koliander"},{"@pid":"12/3405","text":"Giuseppe Durisi"},{"@pid":"18/6668","text":"Erwin Riegler"},{"@pid":"72/1999","text":"Heinrich Meyr"}]},"title":"Oversampling Increases the Pre-Log of Noncoherent Fading Channels.","venue":"CoRR","volume":"abs/1405.0370","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/DorpinghausKDRM14","ee":"http://arxiv.org/abs/1405.0370","url":"https://dblp.org/rec/journals/corr/DorpinghausKDRM14"}, "url":"URL#3970441" }, { "@score":"1", "@id":"3970457", "info":{"authors":{"author":{"@pid":"94/9671","text":"Niall Douglas"}},"title":"Large Code Base Change Ripple Management in C++: My thoughts on how a new Boost C++ Library could help.","venue":"CoRR","volume":"abs/1405.3323","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/Douglas14","ee":"http://arxiv.org/abs/1405.3323","url":"https://dblp.org/rec/journals/corr/Douglas14"}, "url":"URL#3970457" }, { "@score":"1", "@id":"3970481", "info":{"authors":{"author":[{"@pid":"146/0699","text":"Andi Drebes"},{"@pid":"12/296","text":"Karine Heydemann"},{"@pid":"65/8110","text":"Antoniu Pop"},{"@pid":"81/858-1","text":"Albert Cohen 0001"},{"@pid":"n/NathalieDrach","text":"Nathalie Drach"}]},"title":"Automatic Detection of Performance Anomalies in Task-Parallel Programs.","venue":"CoRR","volume":"abs/1405.2916","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/DrebesHPCD14","ee":"http://arxiv.org/abs/1405.2916","url":"https://dblp.org/rec/journals/corr/DrebesHPCD14"}, "url":"URL#3970481" }, { "@score":"1", "@id":"3970496", "info":{"authors":{"author":[{"@pid":"58/11363","text":"Martin Drohmann"},{"@pid":"144/7705","text":"Kevin Carlberg"}]},"title":"The ROMES method for statistical modeling of reduced-order-model error.","venue":"CoRR","volume":"abs/1405.5170","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/DrohmannC14","ee":"http://arxiv.org/abs/1405.5170","url":"https://dblp.org/rec/journals/corr/DrohmannC14"}, "url":"URL#3970496" }, { "@score":"1", "@id":"3970501", "info":{"authors":{"author":[{"@pid":"146/0424","text":"Jeffrey M. Druce"},{"@pid":"71/1945","text":"Jarvis D. Haupt"},{"@pid":"132/9399","text":"Stefano Gonella"}]},"title":"Anomaly-Sensitive Dictionary Learning for Unsupervised Diagnostics of Solid Media.","venue":"CoRR","volume":"abs/1405.2496","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/DruceHG14","ee":"http://arxiv.org/abs/1405.2496","url":"https://dblp.org/rec/journals/corr/DruceHG14"}, "url":"URL#3970501" }, { "@score":"1", "@id":"3970525", "info":{"authors":{"author":[{"@pid":"146/0753","text":"Eduardo Ruiz Duarte"},{"@pid":"86/6590","text":"Octavio Páez Osuna"}]},"title":"Explicit endomorphism of the Jacobian of a hyperelliptic function field of genus 2 using base field operations.","venue":"CoRR","volume":"abs/1405.5755","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/DuarteO14","ee":"http://arxiv.org/abs/1405.5755","url":"https://dblp.org/rec/journals/corr/DuarteO14"}, "url":"URL#3970525" }, { "@score":"1", "@id":"3970531", "info":{"authors":{"author":[{"@pid":"126/6658","text":"Shiv Ram Dubey"},{"@pid":"42/7531","text":"Anand Singh Jalal"}]},"title":"Adapted Approach for Fruit Disease Identification using Images.","venue":"CoRR","volume":"abs/1405.4930","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/DubeyJ14","ee":"http://arxiv.org/abs/1405.4930","url":"https://dblp.org/rec/journals/corr/DubeyJ14"}, "url":"URL#3970531" }, { "@score":"1", "@id":"3970539", "info":{"authors":{"author":[{"@pid":"41/439","text":"John C. Duchi"},{"@pid":"j/MichaelIJordan","text":"Michael I. Jordan"},{"@pid":"48/6396","text":"Martin J. Wainwright"},{"@pid":"09/5661-2","text":"Yuchen Zhang 0002"}]},"title":"Information-theoretic lower bounds for distributed statistical estimation with communication constraints.","venue":"CoRR","volume":"abs/1405.0782","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/DuchiJWZ14","ee":"http://arxiv.org/abs/1405.0782","url":"https://dblp.org/rec/journals/corr/DuchiJWZ14"}, "url":"URL#3970539" }, { "@score":"1", "@id":"3970540", "info":{"authors":{"author":[{"@pid":"74/3123","text":"Gregory J. Duck"},{"@pid":"22/1880","text":"Rémy Haemmerlé"},{"@pid":"94/756","text":"Martin Sulzmann"}]},"title":"On Termination, Confluence and Consistent CHR-based Type Inference.","venue":"CoRR","volume":"abs/1405.3393","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/DuckHS14","ee":"http://arxiv.org/abs/1405.3393","url":"https://dblp.org/rec/journals/corr/DuckHS14"}, "url":"URL#3970540" }, { "@score":"1", "@id":"3970547", "info":{"authors":{"author":[{"@pid":"28/8296","text":"Valmi Dufour-Lussier"},{"@pid":"31/9819","text":"Alice Hermann"},{"@pid":"88/1945","text":"Florence Le Ber"},{"@pid":"20/3650","text":"Jean Lieber"}]},"title":"Belief revision in the propositional closure of a qualitative algebra (extended version).","venue":"CoRR","volume":"abs/1405.0795","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/Dufour-LussierHBL14","ee":"http://arxiv.org/abs/1405.0795","url":"https://dblp.org/rec/journals/corr/Dufour-LussierHBL14"}, "url":"URL#3970547" }, { "@score":"1", "@id":"3970554", "info":{"authors":{"author":{"@pid":"77/8155","text":"Kais Dukes"}},"title":"Contextual Semantic Parsing using Crowdsourced Spatial Descriptions.","venue":"CoRR","volume":"abs/1405.0145","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/Dukes14","ee":"http://arxiv.org/abs/1405.0145","url":"https://dblp.org/rec/journals/corr/Dukes14"}, "url":"URL#3970554" }, { "@score":"1", "@id":"3970555", "info":{"authors":{"author":[{"@pid":"64/1176","text":"Ambedkar Dukkipati"},{"@pid":"146/0641","text":"Nithish Pai"},{"@pid":"129/1447","text":"Maria Francis"},{"@pid":"67/525","text":"Abhishek Dubey"}]},"title":"Macaulay-Buchberger Basis Theorem for Residue Class Rings with Torsion and Border Bases over Rings.","venue":"CoRR","volume":"abs/1405.0472","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/DukkipatiPFD14","ee":"http://arxiv.org/abs/1405.0472","url":"https://dblp.org/rec/journals/corr/DukkipatiPFD14"}, "url":"URL#3970555" }, { "@score":"1", "@id":"3970561", "info":{"authors":{"author":[{"@pid":"63/3349","text":"Ilya Dumer"},{"@pid":"126/4786","text":"Alexey A. Kovalev"},{"@pid":"45/10944","text":"Leonid P. Pryadko"}]},"title":"Numerical Techniques for Finding the Distances of Quantum Codes.","venue":"CoRR","volume":"abs/1405.0348","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/DumerKP14","ee":"http://arxiv.org/abs/1405.0348","url":"https://dblp.org/rec/journals/corr/DumerKP14"}, "url":"URL#3970561" }, { "@score":"1", "@id":"3970562", "info":{"authors":{"author":{"@pid":"21/6149","text":"Bogdan Dumitrescu"}},"title":"Faster Alternatives to the Randomized Extended Kaczmarz Algorithm.","venue":"CoRR","volume":"abs/1405.6920","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/Dumitrescu14","ee":"http://arxiv.org/abs/1405.6920","url":"https://dblp.org/rec/journals/corr/Dumitrescu14"}, "url":"URL#3970562" }, { "@score":"1", "@id":"3970611", "info":{"authors":{"author":[{"@pid":"122/5016","text":"Alex Dytso"},{"@pid":"29/6900","text":"Daniela Tuninetti"},{"@pid":"27/5905","text":"Natasha Devroye"}]},"title":"On the Two-user Interference Channel with Partial Codebook Knowledge at one Receiver.","venue":"CoRR","volume":"abs/1405.1117","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/DytsoTD14a","ee":"http://arxiv.org/abs/1405.1117","url":"https://dblp.org/rec/journals/corr/DytsoTD14a"}, "url":"URL#3970611" }, { "@score":"1", "@id":"3970618", "info":{"authors":{"author":[{"@pid":"57/9280","text":"Mansoor Ebrahim"},{"@pid":"144/7449","text":"Shujaat Khan"},{"@pid":"144/7770","text":"UmerBin Khalid"}]},"title":"Symmetric Algorithm Survey: A Comparative Analysis.","venue":"CoRR","volume":"abs/1405.0398","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/EbrahimKK14a","ee":"http://arxiv.org/abs/1405.0398","url":"https://dblp.org/rec/journals/corr/EbrahimKK14a"}, "url":"URL#3970618" }, { "@score":"1", "@id":"3970619", "info":{"authors":{"author":[{"@pid":"57/9280","text":"Mansoor Ebrahim"},{"@pid":"144/7449","text":"Shujaat Khan"},{"@pid":"146/0479","text":"Syed Sheraz Ul Hasan Mohani"}]},"title":"Peer-to-Peer Network Simulators: an Analytical Review.","venue":"CoRR","volume":"abs/1405.0400","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/EbrahimKM14","ee":"http://arxiv.org/abs/1405.0400","url":"https://dblp.org/rec/journals/corr/EbrahimKM14"}, "url":"URL#3970619" }, { "@score":"1", "@id":"3970645", "info":{"authors":{"author":{"@pid":"198/5297","text":"Alex Eftimiades"}},"title":"Kahler: An Implementation of Discrete Exterior Calculus on Hermitian Manifolds.","venue":"CoRR","volume":"abs/1405.7879","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/Eftimiades14","ee":"http://arxiv.org/abs/1405.7879","url":"https://dblp.org/rec/journals/corr/Eftimiades14"}, "url":"URL#3970645" }, { "@score":"1", "@id":"3970658", "info":{"authors":{"author":[{"@pid":"e/UweEgly","text":"Uwe Egly"},{"@pid":"133/1922","text":"Martin Kronegger"},{"@pid":"85/828","text":"Florian Lonsing"},{"@pid":"23/11461","text":"Andreas Pfandler"}]},"title":"Conformant Planning as a Case Study of Incremental QBF Solving.","venue":"CoRR","volume":"abs/1405.7253","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/EglyKLP14","ee":"http://arxiv.org/abs/1405.7253","url":"https://dblp.org/rec/journals/corr/EglyKLP14"}, "url":"URL#3970658" }, { "@score":"1", "@id":"3970689", "info":{"authors":{"author":{"@pid":"85/11142","text":"T. El-Shishtawy"}},"title":"A Mobile Management System for Reforming Subsidies Distribution in Developing Countries.","venue":"CoRR","volume":"abs/1405.0039","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/El-Shishtawy14","ee":"http://arxiv.org/abs/1405.0039","url":"https://dblp.org/rec/journals/corr/El-Shishtawy14"}, "url":"URL#3970689" }, { "@score":"1", "@id":"3970696", "info":{"authors":{"author":[{"@pid":"42/6480","text":"Mohamed A. El-Zawawy"},{"@pid":"146/0642","text":"Mohammad N. Alanazi"}]},"title":"An Efficient Binary Technique for Trace Simplifications of Concurrent Programs.","venue":"CoRR","volume":"abs/1405.4399","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/El-ZawawyA14b","ee":"http://arxiv.org/abs/1405.4399","url":"https://dblp.org/rec/journals/corr/El-ZawawyA14b"}, "url":"URL#3970696" }, { "@score":"1", "@id":"3970697", "info":{"authors":{"author":[{"@pid":"42/6480","text":"Mohamed A. El-Zawawy"},{"@pid":"146/0642","text":"Mohammad N. Alanazi"}]},"title":"Probabilistic Alias Analysis for Parallel Programming in SSA Forms.","venue":"CoRR","volume":"abs/1405.4401","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/El-ZawawyA14c","ee":"http://arxiv.org/abs/1405.4401","url":"https://dblp.org/rec/journals/corr/El-ZawawyA14c"}, "url":"URL#3970697" }, { "@score":"1", "@id":"3970704", "info":{"authors":{"author":[{"@pid":"18/10799","text":"Hesham ElSawy"},{"@pid":"45/1224","text":"Ekram Hossain 0001"}]},"title":"Analytical Modeling of Mode Selection and Power Control for Underlay D2D Communication in Cellular Networks.","venue":"CoRR","volume":"abs/1405.2017","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/ElSawyH14a","ee":"http://arxiv.org/abs/1405.2017","url":"https://dblp.org/rec/journals/corr/ElSawyH14a"}, "url":"URL#3970704" }, { "@score":"1", "@id":"3970713", "info":{"authors":{"author":[{"@pid":"145/5238","text":"Anis Elbahi"},{"@pid":"44/9613","text":"Mohamed Ali Mahjoub"},{"@pid":"00/11472","text":"Mohamed Nazih Omri"}]},"title":"Hidden Markov Model for Inferring Learner Task Using Mouse Movement.","venue":"CoRR","volume":"abs/1405.5249","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/ElbahiMO14","ee":"http://arxiv.org/abs/1405.5249","url":"https://dblp.org/rec/journals/corr/ElbahiMO14"}, "url":"URL#3970713" }, { "@score":"1", "@id":"3970753", "info":{"authors":{"author":[{"@pid":"146/0647","text":"Hisham Elshaer"},{"@pid":"55/3857","text":"Federico Boccardi"},{"@pid":"31/2788","text":"Mischa Dohler"},{"@pid":"60/4176","text":"Ralf Irmer"}]},"title":"Downlink and Uplink Decoupling: a Disruptive Architectural Design for 5G Networks.","venue":"CoRR","volume":"abs/1405.1853","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/ElshaerBDI14","ee":"http://arxiv.org/abs/1405.1853","url":"https://dblp.org/rec/journals/corr/ElshaerBDI14"}, "url":"URL#3970753" }, { "@score":"1", "@id":"3970774", "info":{"authors":{"author":[{"@pid":"32/1797","text":"Jörg Endrullis"},{"@pid":"78/3173","text":"Dimitri Hendriks"},{"@pid":"k/JWKlop","text":"Jan Willem Klop"},{"@pid":"14/10091","text":"Andrew Polonsky"}]},"title":"An Introduction to the Clocked Lambda Calculus.","venue":"CoRR","volume":"abs/1405.7500","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/EndrullisHKP14","ee":"http://arxiv.org/abs/1405.7500","url":"https://dblp.org/rec/journals/corr/EndrullisHKP14"}, "url":"URL#3970774" }, { "@score":"1", "@id":"3970775", "info":{"authors":{"author":[{"@pid":"32/1797","text":"Jörg Endrullis"},{"@pid":"z/HZantema","text":"Hans Zantema"}]},"title":"Non-termination using Regular Languages.","venue":"CoRR","volume":"abs/1405.5662","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/EndrullisZ14","ee":"http://arxiv.org/abs/1405.5662","url":"https://dblp.org/rec/journals/corr/EndrullisZ14"}, "url":"URL#3970775" }, { "@score":"1", "@id":"3970783", "info":{"authors":{"author":{"@pid":"123/4583","text":"Matthew England 0001"}},"title":"Formulating problems for real algebraic geometry.","venue":"CoRR","volume":"abs/1405.3461","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/England14","ee":"http://arxiv.org/abs/1405.3461","url":"https://dblp.org/rec/journals/corr/England14"}, "url":"URL#3970783" }, { "@score":"1", "@id":"3970785", "info":{"authors":{"author":[{"@pid":"123/4583","text":"Matthew England 0001"},{"@pid":"41/6722","text":"Russell J. Bradford"},{"@pid":"28/1296","text":"James H. Davenport"},{"@pid":"85/11468","text":"David J. Wilson"}]},"title":"Choosing a variable ordering for truth-table invariant cylindrical algebraic decomposition by incremental triangular decomposition.","venue":"CoRR","volume":"abs/1405.6094","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/EnglandBDW14","ee":"http://arxiv.org/abs/1405.6094","url":"https://dblp.org/rec/journals/corr/EnglandBDW14"}, "url":"URL#3970785" }, { "@score":"1", "@id":"3970786", "info":{"authors":{"author":[{"@pid":"123/4583","text":"Matthew England 0001"},{"@pid":"85/11468","text":"David J. Wilson"},{"@pid":"41/6722","text":"Russell J. Bradford"},{"@pid":"28/1296","text":"James H. Davenport"}]},"title":"Using the Regular Chains Library to build cylindrical algebraic decompositions by projecting and lifting.","venue":"CoRR","volume":"abs/1405.6090","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/EnglandWBD14","ee":"http://arxiv.org/abs/1405.6090","url":"https://dblp.org/rec/journals/corr/EnglandWBD14"}, "url":"URL#3970786" }, { "@score":"1", "@id":"3970790", "info":{"authors":{"author":[{"@pid":"e/ChantalEnguehard","text":"Chantal Enguehard"},{"@pid":"89/5389","text":"Mathieu Mangeot"}]},"title":"Computerization of African languages-French dictionaries.","venue":"CoRR","volume":"abs/1405.5893","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/EnguehardM14","ee":"http://arxiv.org/abs/1405.5893","url":"https://dblp.org/rec/journals/corr/EnguehardM14"}, "url":"URL#3970790" }, { "@score":"1", "@id":"3970795", "info":{"authors":{"author":[{"@pid":"22/3233","text":"Young-Ho Eom"},{"@pid":"95/9656","text":"Pablo Aragón"},{"@pid":"53/4822","text":"David Laniado"},{"@pid":"16/5161","text":"Andreas Kaltenbrunner"},{"@pid":"27/6106","text":"Sebastiano Vigna"},{"@pid":"30/3449","text":"Dima Shepelyansky"}]},"title":"Interactions of cultures and top people of Wikipedia from ranking of 24 language editions.","venue":"CoRR","volume":"abs/1405.7183","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/EomALKVS14","ee":"http://arxiv.org/abs/1405.7183","url":"https://dblp.org/rec/journals/corr/EomALKVS14"}, "url":"URL#3970795" }, { "@score":"1", "@id":"3970821", "info":{"authors":{"author":[{"@pid":"01/10889","text":"Tugba Erpek"},{"@pid":"12/8356","text":"Ahmed Abdel-Hadi"},{"@pid":"73/1462","text":"T. Charles Clancy"}]},"title":"An Optimal Application-Aware Resource Block Scheduling in LTE.","venue":"CoRR","volume":"abs/1405.7446","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/ErpekAC14","ee":"http://arxiv.org/abs/1405.7446","url":"https://dblp.org/rec/journals/corr/ErpekAC14"}, "url":"URL#3970821" }, { "@score":"1", "@id":"3970825", "info":{"authors":{"author":[{"@pid":"136/6745","text":"Åsmund Ervik"},{"@pid":"60/7812","text":"Svend Tollak Munkejord"},{"@pid":"61/2576","text":"Bernhard Müller"}]},"title":"Extending a serial 3D two-phase CFD code to parallel execution over MPI by using the PETSc library for domain decomposition.","venue":"CoRR","volume":"abs/1405.3805","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/ErvikMM14","ee":"http://arxiv.org/abs/1405.3805","url":"https://dblp.org/rec/journals/corr/ErvikMM14"}, "url":"URL#3970825" }, { "@score":"1", "@id":"3970827", "info":{"authors":{"author":[{"@pid":"147/5136","text":"Sukru Burc Eryilmaz"},{"@pid":"120/2574","text":"Duygu Kuzum"},{"@pid":"32/2315","text":"Rakesh Gnana David Jeyasingh"},{"@pid":"67/8410","text":"SangBum Kim"},{"@pid":"130/3050","text":"Matthew BrightSky"},{"@pid":"49/9704","text":"Chung Lam"},{"@pid":"48/6697","text":"H.-S. Philip Wong"}]},"title":"Experimental Demonstration of Array-level Learning with Phase Change Synaptic Devices.","venue":"CoRR","volume":"abs/1405.7716","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/EryilmazKJKBLW14a","ee":"http://arxiv.org/abs/1405.7716","url":"https://dblp.org/rec/journals/corr/EryilmazKJKBLW14a"}, "url":"URL#3970827" }, { "@score":"1", "@id":"3970844", "info":{"authors":{"author":{"@pid":"e/JEsparza","text":"Javier Esparza"}},"title":"Keeping a Crowd Safe: On the Complexity of Parameterized Verification (Corrected version).","venue":"CoRR","volume":"abs/1405.1841","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/Esparza14","ee":"http://arxiv.org/abs/1405.1841","url":"https://dblp.org/rec/journals/corr/Esparza14"}, "url":"URL#3970844" }, { "@score":"1", "@id":"3970846", "info":{"authors":{"author":[{"@pid":"e/JEsparza","text":"Javier Esparza"},{"@pid":"133/7812","text":"Philipp Hoffmann"}]},"title":"Negotiation Games.","venue":"CoRR","volume":"abs/1405.6820","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/EsparzaH14","ee":"http://arxiv.org/abs/1405.6820","url":"https://dblp.org/rec/journals/corr/EsparzaH14"}, "url":"URL#3970846" }, { "@score":"1", "@id":"3970892", "info":{"authors":{"author":[{"@pid":"59/1344","text":"Iaakov Exman"},{"@pid":"146/0802","text":"Gilad Amar"},{"@pid":"146/0945","text":"Ran Shaltiel"}]},"title":"The Interestingness Tool for Search in the Web.","venue":"CoRR","volume":"abs/1405.3557","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/ExmanAS14","ee":"http://arxiv.org/abs/1405.3557","url":"https://dblp.org/rec/journals/corr/ExmanAS14"}, "url":"URL#3970892" }, { "@score":"1", "@id":"3970914", "info":{"authors":{"author":[{"@pid":"138/0709","text":"Stefan Fafianie"},{"@pid":"93/5872","text":"Stefan Kratsch"}]},"title":"Streaming Kernelization.","venue":"CoRR","volume":"abs/1405.1356","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/FafianieK14","ee":"http://arxiv.org/abs/1405.1356","url":"https://dblp.org/rec/journals/corr/FafianieK14"}, "url":"URL#3970914" }, { "@score":"1", "@id":"3970948", "info":{"authors":{"author":[{"@pid":"83/1454","text":"Yan Fang"},{"@pid":"04/10661","text":"Matthew J. Cotter"},{"@pid":"26/1312","text":"Donald M. Chiarulli"},{"@pid":"82/5271","text":"Steven P. Levitan"}]},"title":"Image Segmentation Using Frequency Locking of Coupled Oscillators.","venue":"CoRR","volume":"abs/1405.2362","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/FangCCL14","ee":"http://arxiv.org/abs/1405.2362","url":"https://dblp.org/rec/journals/corr/FangCCL14"}, "url":"URL#3970948" }, { "@score":"1", "@id":"3970982", "info":{"authors":{"author":[{"@pid":"26/6720","text":"János Farkas"},{"@pid":"146/0926","text":"Stephen Haddock"},{"@pid":"129/8484","text":"Panagiotis Saltsidis"}]},"title":"Software Defined Networking Supported by IEEE 802.1Q.","venue":"CoRR","volume":"abs/1405.6953","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/FarkasHS14","ee":"http://arxiv.org/abs/1405.6953","url":"https://dblp.org/rec/journals/corr/FarkasHS14"}, "url":"URL#3970982" }, { "@score":"1", "@id":"3970993", "info":{"authors":{"author":{"@pid":"07/9769","text":"Manaal Faruqui"}},"title":""Translation can't change a name": Using Multilingual Data for Named Entity Recognition.","venue":"CoRR","volume":"abs/1405.0701","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/Faruqui14","ee":"http://arxiv.org/abs/1405.0701","url":"https://dblp.org/rec/journals/corr/Faruqui14"}, "url":"URL#3970993" }, { "@score":"1", "@id":"3971005", "info":{"authors":{"author":[{"@pid":"08/1571","text":"Jean-Charles Faugère"},{"@pid":"94/1801","text":"Ayoub Otmani"},{"@pid":"42/3351","text":"Ludovic Perret"},{"@pid":"143/4445","text":"Frédéric de Portzamparc"},{"@pid":"53/7044","text":"Jean-Pierre Tillich"}]},"title":"Folding Alternant and Goppa Codes with Non-Trivial Automorphism Groups.","venue":"CoRR","volume":"abs/1405.5101","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/FaugereOPPT14","ee":"http://arxiv.org/abs/1405.5101","url":"https://dblp.org/rec/journals/corr/FaugereOPPT14"}, "url":"URL#3971005" }, { "@score":"1", "@id":"3971010", "info":{"authors":{"author":[{"@pid":"10/446","text":"Gérard Favier"},{"@pid":"70/9233","text":"André L. F. de Almeida"}]},"title":"Overview of Constrained PARAFAC Models.","venue":"CoRR","volume":"abs/1405.7442","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/FavierA14","ee":"http://arxiv.org/abs/1405.7442","url":"https://dblp.org/rec/journals/corr/FavierA14"}, "url":"URL#3971010" }, { "@score":"1", "@id":"3971011", "info":{"authors":{"author":[{"@pid":"37/768","text":"Lene M. Favrholdt"},{"@pid":"146/0522","text":"Jesper W. Mikkelsen"}]},"title":"Online Max-Edge-Coloring of Paths and Trees.","venue":"CoRR","volume":"abs/1405.3817","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/FavrholdtM14","ee":"http://arxiv.org/abs/1405.3817","url":"https://dblp.org/rec/journals/corr/FavrholdtM14"}, "url":"URL#3971011" }, { "@score":"1", "@id":"3971030", "info":{"authors":{"author":[{"@pid":"146/0867","text":"Tobias Fehenberger"},{"@pid":"85/6225","text":"Norbert Hanik"}]},"title":"Mutual Information as a Figure of Merit for Optical Fiber Systems.","venue":"CoRR","volume":"abs/1405.2029","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/FehenbergerH14","ee":"http://arxiv.org/abs/1405.2029","url":"https://dblp.org/rec/journals/corr/FehenbergerH14"}, "url":"URL#3971030" }, { "@score":"1", "@id":"3971048", "info":{"authors":{"author":[{"@pid":"67/1162","text":"Vitaly Feldman"},{"@pid":"47/7934","text":"Pravesh Kothari"}]},"title":"Agnostic Learning of Disjunctions on Symmetric Distributions.","venue":"CoRR","volume":"abs/1405.6791","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/FeldmanK14","ee":"http://arxiv.org/abs/1405.6791","url":"https://dblp.org/rec/journals/corr/FeldmanK14"}, "url":"URL#3971048" }, { "@score":"1", "@id":"3971062", "info":{"authors":{"author":[{"@pid":"17/1903","text":"Philip Vos Fellman"},{"@pid":"146/0764","text":"Roxana Wright"}]},"title":"Modeling Terrorist Networks, Complex Systems at the Mid-range.","venue":"CoRR","volume":"abs/1405.6989","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/FellmanW14","ee":"http://arxiv.org/abs/1405.6989","url":"https://dblp.org/rec/journals/corr/FellmanW14"}, "url":"URL#3971062" }, { "@score":"1", "@id":"3971070", "info":{"authors":{"author":[{"@pid":"17/1152-5","text":"Wei Feng 0005"},{"@pid":"31/5649","text":"Jiaya Jia"},{"@pid":"29/3742","text":"Zhi-Qiang Liu"}]},"title":"ESSP: An Efficient Approach to Minimizing Dense and Nonsubmodular Energy Functions.","venue":"CoRR","volume":"abs/1405.4583","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/FengJL14","ee":"http://arxiv.org/abs/1405.4583","url":"https://dblp.org/rec/journals/corr/FengJL14"}, "url":"URL#3971070" }, { "@score":"1", "@id":"3971071", "info":{"authors":{"author":[{"@pid":"120/3325","text":"Joe-Mei Feng"},{"@pid":"17/7802","text":"Felix Krahmer"}]},"title":"An RIP-based approach to $ΣΔ$ quantization for compressed sensing.","venue":"CoRR","volume":"abs/1405.0237","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/FengK14","ee":"http://arxiv.org/abs/1405.0237","url":"https://dblp.org/rec/journals/corr/FengK14"}, "url":"URL#3971071" }, { "@score":"1", "@id":"3971085", "info":{"authors":{"author":[{"@pid":"48/8772","text":"Olivier Fercoq"},{"@pid":"13/9687-1","text":"Zheng Qu 0001"},{"@pid":"62/8001","text":"Peter Richtárik"},{"@pid":"42/3759-1","text":"Martin Takác 0001"}]},"title":"Fast Distributed Coordinate Descent for Non-Strongly Convex Losses.","venue":"CoRR","volume":"abs/1405.5300","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/FercoqQRT14","ee":"http://arxiv.org/abs/1405.5300","url":"https://dblp.org/rec/journals/corr/FercoqQRT14"}, "url":"URL#3971085" }, { "@score":"1", "@id":"3971087", "info":{"authors":{"author":[{"@pid":"39/9589","text":"S. M. Ferdous"},{"@pid":"r/MohammadSohelRahman","text":"M. Sohel Rahman"}]},"title":"An Integer Programming Formulation of the Minimum Common String Partition problem.","venue":"CoRR","volume":"abs/1405.6081","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/FerdousR14a","ee":"http://arxiv.org/abs/1405.6081","url":"https://dblp.org/rec/journals/corr/FerdousR14a"}, "url":"URL#3971087" }, { "@score":"1", "@id":"3971088", "info":{"authors":{"author":[{"@pid":"09/5712","text":"Sarah Ferguson"},{"@pid":"55/8370","text":"Brandon Luders"},{"@pid":"143/6087","text":"Robert C. Grande"},{"@pid":"43/1256","text":"Jonathan P. How"}]},"title":"Real-Time Predictive Modeling and Robust Avoidance of Pedestrians with Uncertain, Changing Intentions.","venue":"CoRR","volume":"abs/1405.5581","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/FergusonLGH14","ee":"http://arxiv.org/abs/1405.5581","url":"https://dblp.org/rec/journals/corr/FergusonLGH14"}, "url":"URL#3971088" }, { "@score":"1", "@id":"3971091", "info":{"authors":{"author":[{"@pid":"91/7581","text":"Ricardo Queiroz de Araujo Fernandes"},{"@pid":"93/6371","text":"Edward Hermann Haeusler"},{"@pid":"55/4356","text":"Luiz Carlos Pereira"}]},"title":"Intuitionistic PUC-Logic for Constructive Counterfactuals.","venue":"CoRR","volume":"abs/1405.5279","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/FernandesHP14a","ee":"http://arxiv.org/abs/1405.5279","url":"https://dblp.org/rec/journals/corr/FernandesHP14a"}, "url":"URL#3971091" }, { "@score":"1", "@id":"3971092", "info":{"authors":{"author":[{"@pid":"91/7581","text":"Ricardo Queiroz de Araujo Fernandes"},{"@pid":"93/6371","text":"Edward Hermann Haeusler"},{"@pid":"55/4356","text":"Luiz Carlos Pereira"}]},"title":"PUC-Logic embedding of Lewis' Deontic Logics.","venue":"CoRR","volume":"abs/1405.7285","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/FernandesHP14b","ee":"http://arxiv.org/abs/1405.7285","url":"https://dblp.org/rec/journals/corr/FernandesHP14b"}, "url":"URL#3971092" }, { "@score":"1", "@id":"3971103", "info":{"authors":{"author":[{"@pid":"115/6465","text":"Guido Carlo Ferrante"},{"@pid":"22/6539","text":"Jocelyn Fiorina"},{"@pid":"64/6193","text":"Maria-Gabriella Di Benedetto"}]},"title":"Robustness of Time Reversal vs. All-Rake Transceivers in Multiple Access Channels.","venue":"CoRR","volume":"abs/1405.4459","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/FerranteFB14","ee":"http://arxiv.org/abs/1405.4459","url":"https://dblp.org/rec/journals/corr/FerranteFB14"}, "url":"URL#3971103" }, { "@score":"1", "@id":"3971112", "info":{"authors":{"author":[{"@pid":"146/0781","text":"Ronedo Ferreira"},{"@pid":"51/7814","text":"Waldir A. Moreira"},{"@pid":"m/PauloMendes","text":"Paulo Mendes 0001"},{"@pid":"g/MarioGerla","text":"Mario Gerla"},{"@pid":"18/4139","text":"Eduardo Cerqueira"}]},"title":"Improving the Delivery Rate of Digital Inclusion Applications for Amazon Riverside Communities by Using an Integrated Bluetooth DTN Architecture.","venue":"CoRR","volume":"abs/1405.7084","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/FerreiraMMGC14","ee":"http://arxiv.org/abs/1405.7084","url":"https://dblp.org/rec/journals/corr/FerreiraMMGC14"}, "url":"URL#3971112" }, { "@score":"1", "@id":"3971121", "info":{"authors":{"author":{"@pid":"47/3798","text":"Stefano Ferretti"}},"title":"On the Topology Maintenance of Dynamic P2P Overlays through Self-Healing Local Interactions.","venue":"CoRR","volume":"abs/1405.4085","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/Ferretti14a","ee":"http://arxiv.org/abs/1405.4085","url":"https://dblp.org/rec/journals/corr/Ferretti14a"}, "url":"URL#3971121" }, { "@score":"1", "@id":"3971143", "info":{"authors":{"author":[{"@pid":"98/7536","text":"Flavio V. D. de Figueiredo"},{"@pid":"34/5480","text":"Jussara M. Almeida"},{"@pid":"52/6010","text":"Yasuko Matsubara"},{"@pid":"15/606","text":"Bruno Ribeiro 0001"},{"@pid":"f/CFaloutsos","text":"Christos Faloutsos"}]},"title":"Revisit Behavior in Social Media: The Phoenix-R Model and Discoveries.","venue":"CoRR","volume":"abs/1405.1459","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/FigueiredoAMRF14","ee":"http://arxiv.org/abs/1405.1459","url":"https://dblp.org/rec/journals/corr/FigueiredoAMRF14"}, "url":"URL#3971143" }, { "@score":"1", "@id":"3971145", "info":{"authors":{"author":[{"@pid":"88/5880","text":"Isabel N. Figueiredo"},{"@pid":"42/270","text":"Carlos F. Leal"},{"@pid":"60/1624","text":"Giuseppe Romanazzi"},{"@pid":"26/5447","text":"Björn Engquist"}]},"title":"An Homogenization Model for Aberrant Crypt Foci.","venue":"CoRR","volume":"abs/1405.1386","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/FigueiredoLRE14","ee":"http://arxiv.org/abs/1405.1386","url":"https://dblp.org/rec/journals/corr/FigueiredoLRE14"}, "url":"URL#3971145" }, { "@score":"1", "@id":"3971181", "info":{"authors":{"author":[{"@pid":"34/6741","text":"Andrew Fish"},{"@pid":"73/6140","text":"Alexei Lisitsa 0001"}]},"title":"Detecting unknots via equational reasoning, I: Exploration.","venue":"CoRR","volume":"abs/1405.4211","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/FishL14","ee":"http://arxiv.org/abs/1405.4211","url":"https://dblp.org/rec/journals/corr/FishL14"}, "url":"URL#3971181" }, { "@score":"1", "@id":"3971243", "info":{"authors":{"author":[{"@pid":"146/0725","text":"Marco Formentin"},{"@pid":"46/612","text":"Alberto Lovison"},{"@pid":"34/2172","text":"Amos Maritan"},{"@pid":"146/0807","text":"Giovanni Zanzotto"}]},"title":"Universal activity pattern in human interactive dynamics.","venue":"CoRR","volume":"abs/1405.5726","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/FormentinLMZ14","ee":"http://arxiv.org/abs/1405.5726","url":"https://dblp.org/rec/journals/corr/FormentinLMZ14"}, "url":"URL#3971243" }, { "@score":"1", "@id":"3971244", "info":{"authors":{"author":[{"@pid":"36/8083","text":"Fulvio Forni"},{"@pid":"54/461","text":"Rodolphe Sepulchre"}]},"title":"Differentially positive systems.","venue":"CoRR","volume":"abs/1405.6298","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/ForniS14","ee":"http://arxiv.org/abs/1405.6298","url":"https://dblp.org/rec/journals/corr/ForniS14"}, "url":"URL#3971244" }, { "@score":"1", "@id":"3971257", "info":{"authors":{"author":[{"@pid":"74/8036","text":"Florent Foucaud"},{"@pid":"45/5748","text":"George B. Mertzios"},{"@pid":"86/3606","text":"Reza Naserasr"},{"@pid":"57/8037","text":"Aline Parreau"},{"@pid":"71/8037","text":"Petru Valicov"}]},"title":"Identification, location-domination and metric dimension on interval and permutation graphs.","venue":"CoRR","volume":"abs/1405.2424","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/FoucaudMNPV14","ee":"http://arxiv.org/abs/1405.2424","url":"https://dblp.org/rec/journals/corr/FoucaudMNPV14"}, "url":"URL#3971257" }, { "@score":"1", "@id":"3971268", "info":{"authors":{"author":{"@pid":"57/5333","text":"Laurent Fournier"}},"title":"Merchant Sharing Towards a Zero Marginal Cost Economy.","venue":"CoRR","volume":"abs/1405.2051","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/Fournier14","ee":"http://arxiv.org/abs/1405.2051","url":"https://dblp.org/rec/journals/corr/Fournier14"}, "url":"URL#3971268" }, { "@score":"1", "@id":"3971279", "info":{"authors":{"author":[{"@pid":"67/6150","text":"Marco Frailis"},{"@pid":"146/0433","text":"Stefano Sartor"},{"@pid":"79/2232","text":"Andrea Zacchei"},{"@pid":"146/0597","text":"Marcello Lodi"},{"@pid":"146/0650","text":"Roberto Cirami"},{"@pid":"48/2010","text":"Fabio Pasian"},{"@pid":"65/6614","text":"Massimo Trifoglio"},{"@pid":"95/5587","text":"Andrea Bulgarelli"},{"@pid":"57/1730","text":"Fulvio Gianotti"},{"@pid":"15/244","text":"Enrico Franceschi"},{"@pid":"146/0409","text":"Luciano Nicastro"},{"@pid":"89/10903","text":"Vito Conforti"},{"@pid":"146/0722","text":"Andrea Zoli"},{"@pid":"146/0853","text":"Ricky Smart"},{"@pid":"146/0394","text":"Roberto Morbidelli"},{"@pid":"146/0376","text":"Mauro Dadina"}]},"title":"DAS: a data management system for instrument tests and operations.","venue":"CoRR","volume":"abs/1405.7584","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/FrailisSZLCPTBGFNCZSMD14","ee":"http://arxiv.org/abs/1405.7584","url":"https://dblp.org/rec/journals/corr/FrailisSZLCPTBGFNCZSMD14"}, "url":"URL#3971279" }, { "@score":"1", "@id":"3971287", "info":{"authors":{"author":{"@pid":"f/MassimoFranceschetti","text":"Massimo Franceschetti"}},"title":"On Landau's eigenvalue theorem and information cut-sets.","venue":"CoRR","volume":"abs/1405.1761","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/Franceschetti14","ee":"http://arxiv.org/abs/1405.1761","url":"https://dblp.org/rec/journals/corr/Franceschetti14"}, "url":"URL#3971287" }, { "@score":"1", "@id":"3971290", "info":{"authors":{"author":[{"@pid":"146/0797","text":"John Francisco"},{"@pid":"146/0739","text":"Victor Sadikov"}]},"title":"Structured Approach to Web Development.","venue":"CoRR","volume":"abs/1405.1992","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/FranciscoS14","ee":"http://arxiv.org/abs/1405.1992","url":"https://dblp.org/rec/journals/corr/FranciscoS14"}, "url":"URL#3971290" }, { "@score":"1", "@id":"3971295", "info":{"authors":{"author":[{"@pid":"12/10406","text":"François Fouquet"},{"@pid":"55/3058","text":"Grégory Nain"},{"@pid":"45/3878","text":"Brice Morin"},{"@pid":"63/587","text":"Erwan Daubert"},{"@pid":"97/947","text":"Olivier Barais"},{"@pid":"74/5308","text":"Noël Plouzeau"},{"@pid":"j/JeanMarcJezequel","text":"Jean-Marc Jézéquel"}]},"title":"Kevoree Modeling Framework (KMF): Efficient modeling techniques for runtime use.","venue":"CoRR","volume":"abs/1405.6817","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/FrancoisNMDBPJ14","ee":"http://arxiv.org/abs/1405.6817","url":"https://dblp.org/rec/journals/corr/FrancoisNMDBPJ14"}, "url":"URL#3971295" }, { "@score":"1", "@id":"3971307", "info":{"authors":{"author":[{"@pid":"168/4931","text":"Carlos A. Freitas"},{"@pid":"90/2878","text":"Fabrício Benevenuto"},{"@pid":"06/900-1","text":"Saptarshi Ghosh 0001"},{"@pid":"12/919","text":"Adriano Veloso"}]},"title":"Reverse Engineering Socialbot Infiltration Strategies in Twitter.","venue":"CoRR","volume":"abs/1405.4927","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/FreitasBGV14","ee":"http://arxiv.org/abs/1405.4927","url":"https://dblp.org/rec/journals/corr/FreitasBGV14"}, "url":"URL#3971307" }, { "@score":"1", "@id":"3971310", "info":{"authors":{"author":[{"@pid":"144/7602","text":"Daniel J. Fremont"},{"@pid":"s/SanjitASeshia","text":"Sanjit A. Seshia"}]},"title":"Speeding Up SMT-Based Quantitative Program Analysis.","venue":"CoRR","volume":"abs/1405.7320","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/FremontS14","ee":"http://arxiv.org/abs/1405.7320","url":"https://dblp.org/rec/journals/corr/FremontS14"}, "url":"URL#3971310" }, { "@score":"1", "@id":"3971336", "info":{"authors":{"author":[{"@pid":"54/574","text":"Stephan Friedrichs"},{"@pid":"44/3488","text":"Michael Hemmer"},{"@pid":"00/1310-1","text":"Christiane Schmidt 0001"}]},"title":"A PTAS for the continuous 1.5D Terrain Guarding Problem.","venue":"CoRR","volume":"abs/1405.6564","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/FriedrichsHS14","ee":"http://arxiv.org/abs/1405.6564","url":"https://dblp.org/rec/journals/corr/FriedrichsHS14"}, "url":"URL#3971336" }, { "@score":"1", "@id":"3971356", "info":{"authors":{"author":{"@pid":"63/9065","text":"Yanwei Fu"}},"title":"Multi-view Metric Learning for Multi-view Video Summarization.","venue":"CoRR","volume":"abs/1405.6434","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/Fu14","ee":"http://arxiv.org/abs/1405.6434","url":"https://dblp.org/rec/journals/corr/Fu14"}, "url":"URL#3971356" }, { "@score":"1", "@id":"3971359", "info":{"authors":{"author":[{"@pid":"16/7565","text":"Jie Fu"},{"@pid":"69/2960","text":"Rayna Dimitrova"},{"@pid":"12/6659","text":"Ufuk Topcu"}]},"title":"Abstractions and sensor design in partial-information, reactive controller synthesis.","venue":"CoRR","volume":"abs/1405.1630","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/FuDT14","ee":"http://arxiv.org/abs/1405.1630","url":"https://dblp.org/rec/journals/corr/FuDT14"}, "url":"URL#3971359" }, { "@score":"1", "@id":"3971383", "info":{"authors":{"author":{"@pid":"34/6557","text":"Yuichiro Fujiwara"}},"title":"Instantaneous Quantum Channel Estimation during Quantum Information Processing.","venue":"CoRR","volume":"abs/1405.6267","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/Fujiwara14","ee":"http://arxiv.org/abs/1405.6267","url":"https://dblp.org/rec/journals/corr/Fujiwara14"}, "url":"URL#3971383" }, { "@score":"1", "@id":"3971392", "info":{"authors":{"author":[{"@pid":"229/8200","text":"Nitesh A. Funde"},{"@pid":"198/5268","text":"P. R. Pardhi"}]},"title":"Analysis Of Possible Attack On AODV Protocol In MANET.","venue":"CoRR","volume":"abs/1405.7840","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/FundeP14","ee":"http://arxiv.org/abs/1405.7840","url":"https://dblp.org/rec/journals/corr/FundeP14"}, "url":"URL#3971392" }, { "@score":"1", "@id":"3971394", "info":{"authors":{"author":[{"@pid":"f/UlrichFurbach","text":"Ulrich Furbach"},{"@pid":"33/4876","text":"Claudia Schon"}]},"title":"Semantically Guided Evolution of SHI ABoxes.","venue":"CoRR","volume":"abs/1405.1192","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/FurbachS14a","ee":"http://arxiv.org/abs/1405.1192","url":"https://dblp.org/rec/journals/corr/FurbachS14a"}, "url":"URL#3971394" }, { "@score":"1", "@id":"3971413", "info":{"authors":{"author":[{"@pid":"146/0629","text":"Divyajyothi M. G."},{"@pid":"146/0673","text":"Rachappa"},{"@pid":"80/5269","text":"D. H. Rao"}]},"title":"A scenario based approach for dealing with challenges in a pervasive computing environment.","venue":"CoRR","volume":"abs/1405.6661","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/GRR14","ee":"http://arxiv.org/abs/1405.6661","url":"https://dblp.org/rec/journals/corr/GRR14"}, "url":"URL#3971413" }, { "@score":"1", "@id":"3971421", "info":{"authors":{"author":{"@pid":"g/AlbanGabillon","text":"Alban Gabillon"}},"title":"A Logical Formalization of a Secure XML Database.","venue":"CoRR","volume":"abs/1405.5671","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/Gabillon14","ee":"http://arxiv.org/abs/1405.5671","url":"https://dblp.org/rec/journals/corr/Gabillon14"}, "url":"URL#3971421" }, { "@score":"1", "@id":"3971431", "info":{"authors":{"author":[{"@pid":"88/7795","text":"Francesco Gadaleta"},{"@pid":"04/8280","text":"Nick Nikiforakis"},{"@pid":"84/4044","text":"Jan Tobias Mühlberg"},{"@pid":"13/86","text":"Wouter Joosen"}]},"title":"HyperForce: Hypervisor-enForced Execution of Security-Critical Code.","venue":"CoRR","volume":"abs/1405.5648","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/GadaletaNMJ14","ee":"http://arxiv.org/abs/1405.5648","url":"https://dblp.org/rec/journals/corr/GadaletaNMJ14"}, "url":"URL#3971431" }, { "@score":"1", "@id":"3971432", "info":{"authors":{"author":[{"@pid":"88/7795","text":"Francesco Gadaleta"},{"@pid":"04/8280","text":"Nick Nikiforakis"},{"@pid":"21/2957","text":"Yves Younan"},{"@pid":"13/86","text":"Wouter Joosen"}]},"title":"Hello rootKitty: A lightweight invariance-enforcing framework.","venue":"CoRR","volume":"abs/1405.5651","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/GadaletaNYJ14","ee":"http://arxiv.org/abs/1405.5651","url":"https://dblp.org/rec/journals/corr/GadaletaNYJ14"}, "url":"URL#3971432" }, { "@score":"1", "@id":"3971433", "info":{"authors":{"author":[{"@pid":"88/7795","text":"Francesco Gadaleta"},{"@pid":"97/7967","text":"Raoul Strackx"},{"@pid":"04/8280","text":"Nick Nikiforakis"},{"@pid":"85/6647","text":"Frank Piessens"},{"@pid":"13/86","text":"Wouter Joosen"}]},"title":"On the effectiveness of virtualization-based security.","venue":"CoRR","volume":"abs/1405.6058","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/GadaletaSNPJ14","ee":"http://arxiv.org/abs/1405.6058","url":"https://dblp.org/rec/journals/corr/GadaletaSNPJ14"}, "url":"URL#3971433" }, { "@score":"1", "@id":"3971434", "info":{"authors":{"author":[{"@pid":"127/7320","text":"Akshay Gadde"},{"@pid":"146/0542","text":"Aamir Anis"},{"@pid":"o/AntonioOrtega","text":"Antonio Ortega"}]},"title":"Active Semi-Supervised Learning Using Sampling Theory for Graph Signals.","venue":"CoRR","volume":"abs/1405.4324","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/GaddeAO14","ee":"http://arxiv.org/abs/1405.4324","url":"https://dblp.org/rec/journals/corr/GaddeAO14"}, "url":"URL#3971434" }, { "@score":"1", "@id":"3971440", "info":{"authors":{"author":{"@pid":"g/EliGafni","text":"Eli Gafni"}},"title":"Set Consensus: Captured by a Set of Runs with Ramifications.","venue":"CoRR","volume":"abs/1405.5145","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/Gafni14","ee":"http://arxiv.org/abs/1405.5145","url":"https://dblp.org/rec/journals/corr/Gafni14"}, "url":"URL#3971440" }, { "@score":"1", "@id":"3971451", "info":{"authors":{"author":[{"@pid":"146/0538","text":"Lei Gai"},{"@pid":"c/WeiChen21","text":"Wei Chen 0021"},{"@pid":"146/0697","text":"Zhichao Xu"},{"@pid":"146/0765","text":"Changhe Qiu"},{"@pid":"39/1084-3","text":"Tengjiao Wang 0003"}]},"title":"Towards Efficient Path Query on Social Network with Hybrid RDF Management.","venue":"CoRR","volume":"abs/1405.6500","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/Gai0XQW14","ee":"http://arxiv.org/abs/1405.6500","url":"https://dblp.org/rec/journals/corr/Gai0XQW14"}, "url":"URL#3971451" }, { "@score":"1", "@id":"3971453", "info":{"authors":{"author":[{"@pid":"25/2131","text":"Pierre Gaillard"},{"@pid":"146/0429","text":"Paul Baudin"}]},"title":"A consistent deterministic regression tree for non-parametric prediction of time series.","venue":"CoRR","volume":"abs/1405.1533","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/GaillardB14","ee":"http://arxiv.org/abs/1405.1533","url":"https://dblp.org/rec/journals/corr/GaillardB14"}, "url":"URL#3971453" }, { "@score":"1", "@id":"3971460", "info":{"authors":{"author":[{"@pid":"146/0696","text":"Andrej Gajduk"},{"@pid":"97/6500","text":"Zoran Utkovski"},{"@pid":"142/3935","text":"Lasko Basnarkov"},{"@pid":"08/5597","text":"Ljupco Kocarev"}]},"title":"Energy-efficiency in Decentralized Wireless Networks: A Game-theoretic Approach inspired by Evolutionary Biology.","venue":"CoRR","volume":"abs/1405.3491","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/GajdukUBK14","ee":"http://arxiv.org/abs/1405.3491","url":"https://dblp.org/rec/journals/corr/GajdukUBK14"}, "url":"URL#3971460" }, { "@score":"1", "@id":"3971479", "info":{"authors":{"author":[{"@pid":"37/9386","text":"Daniel Gall"},{"@pid":"f/TWFruhwirth","text":"Thom W. Frühwirth"}]},"title":"Exchanging Conflict Resolution in an Adaptable Implementation of ACT-R.","venue":"CoRR","volume":"abs/1405.3570","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/GallF14","ee":"http://arxiv.org/abs/1405.3570","url":"https://dblp.org/rec/journals/corr/GallF14"}, "url":"URL#3971479" }, { "@score":"1", "@id":"3971480", "info":{"authors":{"author":[{"@pid":"g/JPGallagher","text":"John P. Gallagher"},{"@pid":"146/0527","text":"Bishoksan Kafle"}]},"title":"Analysis and Transformation Tools for Constrained Horn Clause Verification.","venue":"CoRR","volume":"abs/1405.3883","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/GallagherK14","ee":"http://arxiv.org/abs/1405.3883","url":"https://dblp.org/rec/journals/corr/GallagherK14"}, "url":"URL#3971480" }, { "@score":"1", "@id":"3971499", "info":{"authors":{"author":[{"@pid":"134/0620","text":"Jonathan D. Gammell"},{"@pid":"86/626","text":"Siddhartha S. Srinivasa"},{"@pid":"b/TimDBarfoot","text":"Timothy D. Barfoot"}]},"title":"BIT*: Batch Informed Trees for Optimal Sampling-based Planning via Dynamic Programming on Implicit Random Geometric Graphs.","venue":"CoRR","volume":"abs/1405.5848","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/GammellSB14a","ee":"http://arxiv.org/abs/1405.5848","url":"https://dblp.org/rec/journals/corr/GammellSB14a"}, "url":"URL#3971499" }, { "@score":"1", "@id":"3971516", "info":{"authors":{"author":[{"@pid":"16/5983","text":"Pierre Ganty"},{"@pid":"81/5510","text":"Radu Iosif"}]},"title":"Generating Bounded Languages Using Bounded Control Sets.","venue":"CoRR","volume":"abs/1405.3069","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/GantyI14","ee":"http://arxiv.org/abs/1405.3069","url":"https://dblp.org/rec/journals/corr/GantyI14"}, "url":"URL#3971516" }, { "@score":"1", "@id":"3971518", "info":{"authors":{"author":{"@pid":"02/563","text":"Jian Gao"}},"title":"Linear Codes over Z9+uZ9 MacWilliams Identity, Self-Dual Codes, Quadratic Residue Codes and Constacyclic Codes.","venue":"CoRR","volume":"abs/1405.3347","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/Gao14a","ee":"http://arxiv.org/abs/1405.3347","url":"https://dblp.org/rec/journals/corr/Gao14a"}, "url":"URL#3971518" }, { "@score":"1", "@id":"3971530", "info":{"authors":{"author":[{"@pid":"92/2834-1","text":"Lin Gao 0001"},{"@pid":"77/623-1","text":"Jianwei Huang 0001"},{"@pid":"09/1381","text":"Ying-Ju Chen"},{"@pid":"64/6717","text":"Biying Shou"}]},"title":"Combining Spot and Futures Markets: A Hybrid Market Approach to Dynamic Spectrum Access.","venue":"CoRR","volume":"abs/1405.7175","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/GaoHCS14","ee":"http://arxiv.org/abs/1405.7175","url":"https://dblp.org/rec/journals/corr/GaoHCS14"}, "url":"URL#3971530" }, { "@score":"1", "@id":"3971533", "info":{"authors":{"author":[{"@pid":"92/2834-1","text":"Lin Gao 0001"},{"@pid":"80/7475","text":"George Iosifidis"},{"@pid":"77/623-1","text":"Jianwei Huang 0001"},{"@pid":"03/3843","text":"Leandros Tassiulas"},{"@pid":"61/11289","text":"Duozhe Li"}]},"title":"Bargaining-based Mobile Data Offloading.","venue":"CoRR","volume":"abs/1405.5641","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/GaoIHTL14","ee":"http://arxiv.org/abs/1405.5641","url":"https://dblp.org/rec/journals/corr/GaoIHTL14"}, "url":"URL#3971533" }, { "@score":"1", "@id":"3971550", "info":{"authors":{"author":[{"@pid":"71/10962","text":"Jianhang Gao"},{"@pid":"78/6217-1","text":"Qing Zhao 0001"},{"@pid":"89/5072","text":"Ananthram Swami"}]},"title":"Minimum Information Dominating Set for Opinion Sampling.","venue":"CoRR","volume":"abs/1405.5572","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/GaoZS14","ee":"http://arxiv.org/abs/1405.5572","url":"https://dblp.org/rec/journals/corr/GaoZS14"}, "url":"URL#3971550" }, { "@score":"1", "@id":"3971568", "info":{"authors":{"author":[{"@pid":"98/516","text":"Ankit Garg"},{"@pid":"54/9061","text":"Tengyu Ma 0001"},{"@pid":"62/3796","text":"Huy L. Nguyen"}]},"title":"Lower Bound for High-Dimensional Statistical Learning Problem via Direct-Sum Theorem.","venue":"CoRR","volume":"abs/1405.1665","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/GargMN14","ee":"http://arxiv.org/abs/1405.1665","url":"https://dblp.org/rec/journals/corr/GargMN14"}, "url":"URL#3971568" }, { "@score":"1", "@id":"3971579", "info":{"authors":{"author":[{"@pid":"130/3680","text":"Alessia Garofalo"},{"@pid":"122/7987","text":"Cesario Di Sarno"},{"@pid":"99/3823","text":"Ilaria Matteucci"},{"@pid":"11/6996","text":"Marco Vallini"},{"@pid":"27/10079","text":"Valerio Formicola"}]},"title":"Closing the loop of SIEM analysis to Secure Critical Infrastructures.","venue":"CoRR","volume":"abs/1405.2995","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/GarofaloSMVF14","ee":"http://arxiv.org/abs/1405.2995","url":"https://dblp.org/rec/journals/corr/GarofaloSMVF14"}, "url":"URL#3971579" }, { "@score":"1", "@id":"3971586", "info":{"authors":{"author":[{"@pid":"46/5195","text":"Michael S. Gashler"},{"@pid":"146/0453","text":"Stephen C. Ashmore"}]},"title":"Training Deep Fourier Neural Networks To Fit Time-Series Data.","venue":"CoRR","volume":"abs/1405.2262","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/GashlerA14","ee":"http://arxiv.org/abs/1405.2262","url":"https://dblp.org/rec/journals/corr/GashlerA14"}, "url":"URL#3971586" }, { "@score":"1", "@id":"3971587", "info":{"authors":{"author":[{"@pid":"14/8285","text":"Noémi Gaskó"},{"@pid":"46/4356","text":"Rodica Ioana Lung"},{"@pid":"d/DumitruDumitrescu","text":"D. Dumitrescu"}]},"title":"Computing Strong Nash Equilibria for Multiplayer Games.","venue":"CoRR","volume":"abs/1405.0108","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/GaskoLD14","ee":"http://arxiv.org/abs/1405.0108","url":"https://dblp.org/rec/journals/corr/GaskoLD14"}, "url":"URL#3971587" }, { "@score":"1", "@id":"3971588", "info":{"authors":{"author":[{"@pid":"14/8285","text":"Noémi Gaskó"},{"@pid":"116/9405","text":"Mihai Suciu 0001"},{"@pid":"46/4356","text":"Rodica Ioana Lung"},{"@pid":"d/DumitruDumitrescu","text":"D. Dumitrescu"}]},"title":"Characterization and Detection of epsilon-Berge Zhukovskii Equilibria.","venue":"CoRR","volume":"abs/1405.0355","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/GaskoSLD14","ee":"http://arxiv.org/abs/1405.0355","url":"https://dblp.org/rec/journals/corr/GaskoSLD14"}, "url":"URL#3971588" }, { "@score":"1", "@id":"3971604", "info":{"authors":{"author":[{"@pid":"g/NicolaGatti","text":"Nicola Gatti 0001"},{"@pid":"36/321","text":"Alessandro Lazaric"},{"@pid":"70/8523","text":"Marco Rocco"},{"@pid":"69/11487","text":"Francesco Trovò"}]},"title":"Truthful Learning Mechanisms for Multi-Slot Sponsored Search Auctions with Externalities.","venue":"CoRR","volume":"abs/1405.2484","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/GattiLRT14","ee":"http://arxiv.org/abs/1405.2484","url":"https://dblp.org/rec/journals/corr/GattiLRT14"}, "url":"URL#3971604" }, { "@score":"1", "@id":"3971609", "info":{"authors":{"author":[{"@pid":"146/0608","text":"Thibault Gauthier"},{"@pid":"30/5217","text":"Cezary Kaliszyk"}]},"title":"Matching concepts across HOL libraries.","venue":"CoRR","volume":"abs/1405.3906","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/GauthierK14","ee":"http://arxiv.org/abs/1405.3906","url":"https://dblp.org/rec/journals/corr/GauthierK14"}, "url":"URL#3971609" }, { "@score":"1", "@id":"3971611", "info":{"authors":{"author":[{"@pid":"15/5240","text":"Marco Gavanelli"},{"@pid":"59/8229","text":"Stefano Bragaglia"},{"@pid":"m/MichelaMilano","text":"Michela Milano"},{"@pid":"c/FedericoChesani","text":"Federico Chesani"},{"@pid":"81/3031","text":"Elisa Marengo"},{"@pid":"83/8292","text":"Paolo Cagnoli"}]},"title":"Multi-Criteria Optimal Planning for Energy Policies in CLP.","venue":"CoRR","volume":"abs/1405.3824","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/GavanelliBMCMC14","ee":"http://arxiv.org/abs/1405.3824","url":"https://dblp.org/rec/journals/corr/GavanelliBMCMC14"}, "url":"URL#3971611" }, { "@score":"1", "@id":"3971623", "info":{"authors":{"author":[{"@pid":"140/7683","text":"Vivekananda Gayen"},{"@pid":"75/3877","text":"Kamal Sarkar"}]},"title":"An HMM Based Named Entity Recognition System for Indian Languages: The JU System at ICON 2013.","venue":"CoRR","volume":"abs/1405.7397","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/GayenS14a","ee":"http://arxiv.org/abs/1405.7397","url":"https://dblp.org/rec/journals/corr/GayenS14a"}, "url":"URL#3971623" }, { "@score":"1", "@id":"3971633", "info":{"authors":{"author":[{"@pid":"64/2589","text":"Martin Gebser"},{"@pid":"09/1205","text":"Roland Kaminski"},{"@pid":"60/3303","text":"Benjamin Kaufmann"},{"@pid":"s/TorstenSchaub","text":"Torsten Schaub"}]},"title":"Clingo = ASP + Control: Preliminary Report.","venue":"CoRR","volume":"abs/1405.3694","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/GebserKKS14","ee":"http://arxiv.org/abs/1405.3694","url":"https://dblp.org/rec/journals/corr/GebserKKS14"}, "url":"URL#3971633" }, { "@score":"1", "@id":"3971635", "info":{"authors":{"author":[{"@pid":"54/3483","text":"Viliam Geffert"},{"@pid":"82/4618","text":"Abuzer Yakaryilmaz"}]},"title":"Classical automata on promise problems.","venue":"CoRR","volume":"abs/1405.6671","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/GeffertY14","ee":"http://arxiv.org/abs/1405.6671","url":"https://dblp.org/rec/journals/corr/GeffertY14"}, "url":"URL#3971635" }, { "@score":"1", "@id":"3971646", "info":{"authors":{"author":[{"@pid":"g/ErolGelenbe","text":"Erol Gelenbe"},{"@pid":"03/7171","text":"Omer H. Abdelrahman"}]},"title":"Search in the Universe of Big Networks and Data.","venue":"CoRR","volume":"abs/1405.2760","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/GelenbeA14","ee":"http://arxiv.org/abs/1405.2760","url":"https://dblp.org/rec/journals/corr/GelenbeA14"}, "url":"URL#3971646" }, { "@score":"1", "@id":"3971647", "info":{"authors":{"author":[{"@pid":"23/306","text":"Michael Gelfond"},{"@pid":"z/YuanlinZhang","text":"Yuanlin Zhang 0002"}]},"title":"Vicious Circle Principle and Logic Programs with Aggregates.","venue":"CoRR","volume":"abs/1405.3637","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/GelfondZ14","ee":"http://arxiv.org/abs/1405.3637","url":"https://dblp.org/rec/journals/corr/GelfondZ14"}, "url":"URL#3971647" }, { "@score":"1", "@id":"3971648", "info":{"authors":{"author":[{"@pid":"146/0475","text":"Bluma Gelley"},{"@pid":"50/2356","text":"Ajita John"}]},"title":"Like, Comment, Repin: User Interaction on Pinterest.","venue":"CoRR","volume":"abs/1405.1752","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/GelleyJ14","ee":"http://arxiv.org/abs/1405.1752","url":"https://dblp.org/rec/journals/corr/GelleyJ14"}, "url":"URL#3971648" }, { "@score":"1", "@id":"3971649", "info":{"authors":{"author":[{"@pid":"122/7948","text":"Quentin Gemine"},{"@pid":"46/1769","text":"Damien Ernst"},{"@pid":"142/3008","text":"Bertrand Cornélusse"}]},"title":"Active network management for electrical distribution systems: problem formulation and benchmark.","venue":"CoRR","volume":"abs/1405.2806","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/GemineEC14","ee":"http://arxiv.org/abs/1405.2806","url":"https://dblp.org/rec/journals/corr/GemineEC14"}, "url":"URL#3971649" }, { "@score":"1", "@id":"3971653", "info":{"authors":{"author":[{"@pid":"146/0581","text":"Nicholas Generous"},{"@pid":"146/0669","text":"Geoffrey Fairchild"},{"@pid":"82/7456","text":"Alina Deshpande"},{"@pid":"35/2428","text":"Sara Y. Del Valle"},{"@pid":"75/1280","text":"Reid Priedhorsky"}]},"title":"Detecting epidemics using Wikipedia article views: A demonstration of feasibility with language as location proxy.","venue":"CoRR","volume":"abs/1405.3612","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/GenerousFDVP14","ee":"http://arxiv.org/abs/1405.3612","url":"https://dblp.org/rec/journals/corr/GenerousFDVP14"}, "url":"URL#3971653" }, { "@score":"1", "@id":"3971679", "info":{"authors":{"author":[{"@pid":"58/8317","text":"Sergei Gepshtein"},{"@pid":"87/1262","text":"Ivan Tyukin"}]},"title":"Optimal measurement of visual motion across spatial and temporal scales.","venue":"CoRR","volume":"abs/1405.0545","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/GepshteinT14","ee":"http://arxiv.org/abs/1405.0545","url":"https://dblp.org/rec/journals/corr/GepshteinT14"}, "url":"URL#3971679" }, { "@score":"1", "@id":"3971681", "info":{"authors":{"author":[{"@pid":"24/11152","text":"Majid Gerami"},{"@pid":"79/5620-1","text":"Ming Xiao 0001"},{"@pid":"l/JunLi4","text":"Jun Li 0004"},{"@pid":"61/6100","text":"Carlo Fischione"},{"@pid":"36/4948","text":"Zihuai Lin"}]},"title":"Repair for Distributed Storage Systems in Packet Erasure Networks.","venue":"CoRR","volume":"abs/1405.3188","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/GeramiXLFL14","ee":"http://arxiv.org/abs/1405.3188","url":"https://dblp.org/rec/journals/corr/GeramiXLFL14"}, "url":"URL#3971681" }, { "@score":"1", "@id":"3971697", "info":{"authors":{"author":[{"@pid":"146/0434","text":"Kimia Ghaffari"},{"@pid":"25/3074","text":"Mohammad Soltani Delgosha"},{"@pid":"93/7772","text":"Neda Abdolvand"}]},"title":"Towards Cloud Computing: A SWOT Analysis on its Adoption in SMEs.","venue":"CoRR","volume":"abs/1405.1932","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/GhaffariDA14","ee":"http://arxiv.org/abs/1405.1932","url":"https://dblp.org/rec/journals/corr/GhaffariDA14"}, "url":"URL#3971697" }, { "@score":"1", "@id":"3971701", "info":{"authors":{"author":[{"@pid":"33/5673","text":"Mohsen Ghaffari 0001"},{"@pid":"92/6079","text":"Erez Kantor"},{"@pid":"l/NancyALynch","text":"Nancy A. Lynch"},{"@pid":"98/6904","text":"Calvin C. Newport"}]},"title":"Multi-Message Broadcast with Abstract MAC Layers and Unreliable Links.","venue":"CoRR","volume":"abs/1405.1671","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/GhaffariKLN14","ee":"http://arxiv.org/abs/1405.1671","url":"https://dblp.org/rec/journals/corr/GhaffariKLN14"}, "url":"URL#3971701" }, { "@score":"1", "@id":"3971702", "info":{"authors":{"author":[{"@pid":"83/8377","text":"Cesar Ghali"},{"@pid":"33/4298","text":"Ashok Narayanan"},{"@pid":"69/549","text":"David Oran"},{"@pid":"08/1183","text":"Gene Tsudik"}]},"title":"Secure Fragmentation for Content-Centric Networks.","venue":"CoRR","volume":"abs/1405.2861","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/GhaliNOT14","ee":"http://arxiv.org/abs/1405.2861","url":"https://dblp.org/rec/journals/corr/GhaliNOT14"}, "url":"URL#3971702" }, { "@score":"1", "@id":"3971707", "info":{"authors":{"author":[{"@pid":"137/6087","text":"Samah A. M. Ghanem"},{"@pid":"20/10099","text":"Munnujahan Ara"}]},"title":"Secure Data Transmission in Cooperative Modes: Relay and MAC.","venue":"CoRR","volume":"abs/1405.3507","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/GhanemA14","ee":"http://arxiv.org/abs/1405.3507","url":"https://dblp.org/rec/journals/corr/GhanemA14"}, "url":"URL#3971707" }, { "@score":"1", "@id":"3971713", "info":{"authors":{"author":{"@pid":"119/7938","text":"Meghdad Ghari"}},"title":"Tableau Proof Systems for Justification Logics.","venue":"CoRR","volume":"abs/1405.1828","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/Ghari14b","ee":"http://arxiv.org/abs/1405.1828","url":"https://dblp.org/rec/journals/corr/Ghari14b"}, "url":"URL#3971713" }, { "@score":"1", "@id":"3971744", "info":{"authors":{"author":[{"@pid":"86/9990","text":"Mohammad Gholami"},{"@pid":"129/4910","text":"Mehdi Samadieh"}]},"title":"Quasi Cyclic LDPC Codes Based on Finite Set Systems.","venue":"CoRR","volume":"abs/1405.3775","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/GholamiS14","ee":"http://arxiv.org/abs/1405.3775","url":"https://dblp.org/rec/journals/corr/GholamiS14"}, "url":"URL#3971744" }, { "@score":"1", "@id":"3971757", "info":{"authors":{"author":[{"@pid":"146/0843","text":"Atanu Kumar Ghosh"},{"@pid":"65/4425","text":"Arnab Chakraborty"}]},"title":"Compressive Sampling Using EM Algorithm.","venue":"CoRR","volume":"abs/1405.5311","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/GhoshC14","ee":"http://arxiv.org/abs/1405.5311","url":"https://dblp.org/rec/journals/corr/GhoshC14"}, "url":"URL#3971757" }, { "@score":"1", "@id":"3971776", "info":{"authors":{"author":[{"@pid":"62/4967","text":"Hassan Ghozlan"},{"@pid":"04/1411","text":"Gerhard Kramer"}]},"title":"Phase Modulation for Discrete-time Wiener Phase Noise Channels with Oversampling at High SNR.","venue":"CoRR","volume":"abs/1405.2605","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/GhozlanK14","ee":"http://arxiv.org/abs/1405.2605","url":"https://dblp.org/rec/journals/corr/GhozlanK14"}, "url":"URL#3971776" }, { "@score":"1", "@id":"3971777", "info":{"authors":{"author":[{"@pid":"146/0717","text":"Sukhpal Singh Ghuman"},{"@pid":"16/5567","text":"Emanuele Giaquinta"},{"@pid":"t/JormaTarhio","text":"Jorma Tarhio"}]},"title":"Alternative Algorithms for Lyndon Factorization.","venue":"CoRR","volume":"abs/1405.4892","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/GhumanGT14","ee":"http://arxiv.org/abs/1405.4892","url":"https://dblp.org/rec/journals/corr/GhumanGT14"}, "url":"URL#3971777" }, { "@score":"1", "@id":"3971779", "info":{"authors":{"author":[{"@pid":"62/8776","text":"Piero Giacomelli"},{"@pid":"80/5505","text":"Åsa Smedberg"}]},"title":"The Eve of 3D Printing in Telemedicine: State of the Art and Future Challenges.","venue":"CoRR","volume":"abs/1405.2305","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/GiacomelliS14","ee":"http://arxiv.org/abs/1405.2305","url":"https://dblp.org/rec/journals/corr/GiacomelliS14"}, "url":"URL#3971779" }, { "@score":"1", "@id":"3971780", "info":{"authors":{"author":[{"@pid":"g/GDGiacomo","text":"Giuseppe De Giacomo"},{"@pid":"90/7560","text":"Riccardo De Masellis"},{"@pid":"77/2851","text":"Marco Grasso"},{"@pid":"05/801","text":"Fabrizio Maria Maggi"},{"@pid":"85/1455","text":"Marco Montali"}]},"title":"LTLf and LDLf Monitoring: A Technical Report.","venue":"CoRR","volume":"abs/1405.0054","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/GiacomoMGMM14","ee":"http://arxiv.org/abs/1405.0054","url":"https://dblp.org/rec/journals/corr/GiacomoMGMM14"}, "url":"URL#3971780" }, { "@score":"1", "@id":"3971835", "info":{"authors":{"author":[{"@pid":"50/7998","text":"Raja Giryes"},{"@pid":"e/MichaelElad","text":"Michael Elad"},{"@pid":"b/AlfredMBruckstein","text":"Alfred M. Bruckstein"}]},"title":"Sparsity Based Methods for Overparametrized Variational Problems.","venue":"CoRR","volume":"abs/1405.4969","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/GiryesEB14","ee":"http://arxiv.org/abs/1405.4969","url":"https://dblp.org/rec/journals/corr/GiryesEB14"}, "url":"URL#3971835" }, { "@score":"1", "@id":"3971860", "info":{"authors":{"author":[{"@pid":"146/0509","text":"Elisabeth Glocker"},{"@pid":"56/1316-4","text":"Qingqing Chen 0004"},{"@pid":"146/0841","text":"Asheque M. Zaidi"},{"@pid":"07/6841","text":"Ulf Schlichtmann"},{"@pid":"s/DSchmittLandsiedel","text":"Doris Schmitt-Landsiedel"}]},"title":"Emulated ASIC Power and Temperature Monitor System for FPGA Prototyping of an Invasive MPSoC Computing Architecture.","venue":"CoRR","volume":"abs/1405.2909","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/GlockerCZSS14","ee":"http://arxiv.org/abs/1405.2909","url":"https://dblp.org/rec/journals/corr/GlockerCZSS14"}, "url":"URL#3971860" }, { "@score":"1", "@id":"3971884", "info":{"authors":{"author":{"@pid":"146/0705","text":"Stefano Gogioso"}},"title":"Aspects of Statistical Physics in Computational Complexity.","venue":"CoRR","volume":"abs/1405.3558","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/Gogioso14","ee":"http://arxiv.org/abs/1405.3558","url":"https://dblp.org/rec/journals/corr/Gogioso14"}, "url":"URL#3971884" }, { "@score":"1", "@id":"3971897", "info":{"authors":{"author":[{"@pid":"119/3922","text":"Ziv Goldfeld"},{"@pid":"88/4362","text":"Haim H. Permuter"},{"@pid":"04/1411","text":"Gerhard Kramer"}]},"title":"Duality of a Source Coding Problem and the Semi-Deterministic Broadcast Channel with Rate-Limited Cooperation.","venue":"CoRR","volume":"abs/1405.7812","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/GoldfeldPK14","ee":"http://arxiv.org/abs/1405.7812","url":"https://dblp.org/rec/journals/corr/GoldfeldPK14"}, "url":"URL#3971897" }, { "@score":"1", "@id":"3971909", "info":{"authors":{"author":{"@pid":"37/7589","text":"Walid Gomaa 0001"}},"title":"Computability and Complexity over the Product Topology of Real Numbers.","venue":"CoRR","volume":"abs/1405.1590","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/Gomaa14","ee":"http://arxiv.org/abs/1405.1590","url":"https://dblp.org/rec/journals/corr/Gomaa14"}, "url":"URL#3971909" }, { "@score":"1", "@id":"3971913", "info":{"authors":{"author":[{"@pid":"53/7728","text":"Ana Sofia Gomes"},{"@pid":"33/4396","text":"José Júlio Alferes"}]},"title":"Transaction Logic with (Complex) Events.","venue":"CoRR","volume":"abs/1405.3790","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/GomesA14","ee":"http://arxiv.org/abs/1405.3790","url":"https://dblp.org/rec/journals/corr/GomesA14"}, "url":"URL#3971913" }, { "@score":"1", "@id":"3971925", "info":{"authors":{"author":[{"@pid":"81/6307","text":"Gerardo Gómez"},{"@pid":"146/0614","text":"Lorenzo Hortiguela"},{"@pid":"118/1286","text":"Quiliano Pérez"},{"@pid":"118/1285","text":"Javier Lorca"},{"@pid":"118/1287","text":"Raquel García"},{"@pid":"56/1112","text":"Mari Carmen Aguayo Torres"}]},"title":"YouTube QoE Evaluation Tool for Android Wireless Terminals.","venue":"CoRR","volume":"abs/1405.4709","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/GomezHPLGT14","ee":"http://arxiv.org/abs/1405.4709","url":"https://dblp.org/rec/journals/corr/GomezHPLGT14"}, "url":"URL#3971925" }, { "@score":"1", "@id":"3971933", "info":{"authors":{"author":[{"@pid":"35/1880","text":"Bernardo Gonçalves"},{"@pid":"p/FabioPorto","text":"Fábio Porto 0001"}]},"title":"$Υ$-DB: Managing scientific hypotheses as uncertain data.","venue":"CoRR","volume":"abs/1405.4607","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/GoncalvesP14","ee":"http://arxiv.org/abs/1405.4607","url":"https://dblp.org/rec/journals/corr/GoncalvesP14"}, "url":"URL#3971933" }, { "@score":"1", "@id":"3971934", "info":{"authors":{"author":[{"@pid":"35/1880","text":"Bernardo Gonçalves"},{"@pid":"p/FabioPorto","text":"Fábio Porto 0001"}]},"title":"Managing large-scale scientific hypotheses as uncertain data with support for predictive analytics.","venue":"CoRR","volume":"abs/1405.5905","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/GoncalvesP14a","ee":"http://arxiv.org/abs/1405.5905","url":"https://dblp.org/rec/journals/corr/GoncalvesP14a"}, "url":"URL#3971934" }, { "@score":"1", "@id":"3971940", "info":{"authors":{"author":[{"@pid":"g/SergeyGoncharov1","text":"Sergey Goncharov 0001"},{"@pid":"69/2397","text":"Lutz Schröder"},{"@pid":"146/0540","text":"Christoph Rauch"}]},"title":"(Co-)Algebraic Foundations for Effect Handling and Iteration.","venue":"CoRR","volume":"abs/1405.0854","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/GoncharovSR14","ee":"http://arxiv.org/abs/1405.0854","url":"https://dblp.org/rec/journals/corr/GoncharovSR14"}, "url":"URL#3971940" }, { "@score":"1", "@id":"3971941", "info":{"authors":{"author":[{"@pid":"36/9509","text":"Yannai A. Gonczarowski"},{"@pid":"n/NoamNisan","text":"Noam Nisan"},{"@pid":"o/RafailOstrovsky","text":"Rafail Ostrovsky"},{"@pid":"147/4867","text":"Will Rosenbaum"}]},"title":"A Stable Marriage Requires Communication.","venue":"CoRR","volume":"abs/1405.7709","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/GonczarowskiNOR14","ee":"http://arxiv.org/abs/1405.7709","url":"https://dblp.org/rec/journals/corr/GonczarowskiNOR14"}, "url":"URL#3971941" }, { "@score":"1", "@id":"3971961", "info":{"authors":{"author":[{"@pid":"146/0623","text":"Carlos Luis González-Valiente"},{"@pid":"146/0814","text":"Magda León Santos"},{"@pid":"146/0758","text":"Zoia Rivera"}]},"title":"El egresado de la carrera Ciencias de la Información y su inserción en la gestión de mercadotecnia.","venue":"CoRR","volume":"abs/1405.6660","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/Gonzalez-ValienteSR14","ee":"http://arxiv.org/abs/1405.6660","url":"https://dblp.org/rec/journals/corr/Gonzalez-ValienteSR14"}, "url":"URL#3971961" }, { "@score":"1", "@id":"3971977", "info":{"authors":{"author":[{"@pid":"90/9826","text":"Aditya Gopalan"},{"@pid":"96/5760","text":"Constantine Caramanis"},{"@pid":"61/4596","text":"Sanjay Shakkottai"}]},"title":"Wireless Scheduling with Partial Channel State Information: Large Deviations and Optimality.","venue":"CoRR","volume":"abs/1405.6307","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/GopalanCS14","ee":"http://arxiv.org/abs/1405.6307","url":"https://dblp.org/rec/journals/corr/GopalanCS14"}, "url":"URL#3971977" }, { "@score":"1", "@id":"3971995", "info":{"authors":{"author":[{"@pid":"56/4603","text":"Elisa Gorla"},{"@pid":"143/4484","text":"Maike Massierer"}]},"title":"Index Calculus in the Trace Zero Variety.","venue":"CoRR","volume":"abs/1405.1059","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/GorlaM14a","ee":"http://arxiv.org/abs/1405.1059","url":"https://dblp.org/rec/journals/corr/GorlaM14a"}, "url":"URL#3971995" }, { "@score":"1", "@id":"3971996", "info":{"authors":{"author":[{"@pid":"56/4603","text":"Elisa Gorla"},{"@pid":"143/4484","text":"Maike Massierer"}]},"title":"An optimal representation for the trace zero subgroup.","venue":"CoRR","volume":"abs/1405.2733","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/GorlaM14b","ee":"http://arxiv.org/abs/1405.2733","url":"https://dblp.org/rec/journals/corr/GorlaM14b"}, "url":"URL#3971996" }, { "@score":"1", "@id":"3971997", "info":{"authors":{"author":[{"@pid":"56/4603","text":"Elisa Gorla"},{"@pid":"98/11466","text":"Alberto Ravagnani"}]},"title":"Subspace codes from Ferrers diagrams.","venue":"CoRR","volume":"abs/1405.2736","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/GorlaR14","ee":"http://arxiv.org/abs/1405.2736","url":"https://dblp.org/rec/journals/corr/GorlaR14"}, "url":"URL#3971997" }, { "@score":"1", "@id":"3971998", "info":{"authors":{"author":[{"@pid":"40/1212","text":"Sedat Görmüs"},{"@pid":"97/7910","text":"Mohammud Zubeir Bocus"}]},"title":"Efficient Cooperative Anycasting for AMI Mesh Networks.","venue":"CoRR","volume":"abs/1405.1558","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/GormusB14","ee":"http://arxiv.org/abs/1405.1558","url":"https://dblp.org/rec/journals/corr/GormusB14"}, "url":"URL#3971998" }, { "@score":"1", "@id":"3972003", "info":{"authors":{"author":[{"@pid":"146/0851","text":"Hemalata A. Gosavi"},{"@pid":"146/0947","text":"Manish R. Umale"}]},"title":"Public Auditing and Data Dynamics for Storage Security in Cloud Computing.","venue":"CoRR","volume":"abs/1405.6263","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/GosaviU14","ee":"http://arxiv.org/abs/1405.6263","url":"https://dblp.org/rec/journals/corr/GosaviU14"}, "url":"URL#3972003" }, { "@score":"1", "@id":"3972010", "info":{"authors":{"author":[{"@pid":"56/6296","text":"Antonis G. Gotsis"},{"@pid":"37/4517","text":"Stelios Stefanatos"},{"@pid":"59/1890","text":"Angeliki Alexiou"}]},"title":"Spatial Coordination Strategies in Future Ultra-Dense Wireless Networks.","venue":"CoRR","volume":"abs/1405.2576","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/GotsisSA14","ee":"http://arxiv.org/abs/1405.2576","url":"https://dblp.org/rec/journals/corr/GotsisSA14"}, "url":"URL#3972010" }, { "@score":"1", "@id":"3972014", "info":{"authors":{"author":[{"@pid":"g/GeorgGottlob","text":"Georg Gottlob"},{"@pid":"60/909","text":"Giorgio Orsi 0001"},{"@pid":"89/5672","text":"Andreas Pieris"}]},"title":"Query Rewriting and Optimization for Ontological Databases.","venue":"CoRR","volume":"abs/1405.2848","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/GottlobOP14","ee":"http://arxiv.org/abs/1405.2848","url":"https://dblp.org/rec/journals/corr/GottlobOP14"}, "url":"URL#3972014" }, { "@score":"1", "@id":"3972015", "info":{"authors":{"author":[{"@pid":"08/8398","text":"Carsten Gottschlich"},{"@pid":"78/2353","text":"Dominic Schuhmacher"}]},"title":"The Shortlist Method for Fast Computation of the Earth Mover's Distance and Finding Optimal Solutions to Transportation Problems.","venue":"CoRR","volume":"abs/1405.7903","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/GottschlichS14","ee":"http://arxiv.org/abs/1405.7903","url":"https://dblp.org/rec/journals/corr/GottschlichS14"}, "url":"URL#3972015" }, { "@score":"1", "@id":"3972019", "info":{"authors":{"author":[{"@pid":"44/9508","text":"Alireza Goudarzi"},{"@pid":"41/2189","text":"Matthew R. Lakin"},{"@pid":"s/DarkoStefanovic","text":"Darko Stefanovic"}]},"title":"Reservoir Computing Approach to Robust Computation using Unreliable Nanoscale Networks.","venue":"CoRR","volume":"abs/1405.0296","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/GoudarziLS14","ee":"http://arxiv.org/abs/1405.0296","url":"https://dblp.org/rec/journals/corr/GoudarziLS14"}, "url":"URL#3972019" }, { "@score":"1", "@id":"3972032", "info":{"authors":{"author":[{"@pid":"99/11265","text":"Michael G. Gowanlock"},{"@pid":"25/6606","text":"Henri Casanova"}]},"title":"Technical Report: Parallel Distance Threshold Query Processing for Spatiotemporal Trajectory Databases on the GPU.","venue":"CoRR","volume":"abs/1405.7461","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/GowanlockC14","ee":"http://arxiv.org/abs/1405.7461","url":"https://dblp.org/rec/journals/corr/GowanlockC14"}, "url":"URL#3972032" }, { "@score":"1", "@id":"3972044", "info":{"authors":{"author":[{"@pid":"68/1552","text":"Szymon Grabowski"},{"@pid":"54/4531","text":"Sebastian Deorowicz"},{"@pid":"146/0810","text":"Lukasz Roguski"}]},"title":"Disk-based genome sequencing data compression.","venue":"CoRR","volume":"abs/1405.6874","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/GrabowskiDR14","ee":"http://arxiv.org/abs/1405.6874","url":"https://dblp.org/rec/journals/corr/GrabowskiDR14"}, "url":"URL#3972044" }, { "@score":"1", "@id":"3972045", "info":{"authors":{"author":[{"@pid":"68/1552","text":"Szymon Grabowski"},{"@pid":"81/2581","text":"Marcin Raniszewski"}]},"title":"Two simple full-text indexes based on the suffix array.","venue":"CoRR","volume":"abs/1405.5919","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/GrabowskiR14","ee":"http://arxiv.org/abs/1405.5919","url":"https://dblp.org/rec/journals/corr/GrabowskiR14"}, "url":"URL#3972045" }, { "@score":"1", "@id":"3972059", "info":{"authors":{"author":[{"@pid":"g/FGrandoni","text":"Fabrizio Grandoni 0001"},{"@pid":"38/9892","text":"Tomasz Kociumaka"},{"@pid":"146/0687","text":"Michal Wlodarczyk 0001"}]},"title":"An LP-Rounding $2\\sqrt{2}$ Approximation for Restricted Maximum Acyclic Subgraph.","venue":"CoRR","volume":"abs/1405.0456","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/GrandoniKW14","ee":"http://arxiv.org/abs/1405.0456","url":"https://dblp.org/rec/journals/corr/GrandoniKW14"}, "url":"URL#3972059" }, { "@score":"1", "@id":"3972060", "info":{"authors":{"author":[{"@pid":"18/10826","text":"Clara Granell"},{"@pid":"75/6382","text":"Sergio Gómez"},{"@pid":"41/11094","text":"Alex Arenas"}]},"title":"Competing spreading processes on multiplex networks: awareness and epidemics.","venue":"CoRR","volume":"abs/1405.4480","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/GranellGA14","ee":"http://arxiv.org/abs/1405.4480","url":"https://dblp.org/rec/journals/corr/GranellGA14"}, "url":"URL#3972060" }, { "@score":"1", "@id":"3972062", "info":{"authors":{"author":[{"@pid":"146/0401","text":"Thomas Gransden"},{"@pid":"36/3976","text":"Neil Walkinshaw"},{"@pid":"26/680","text":"Rajeev Raman"}]},"title":"Mining State-Based Models from Proof Corpora.","venue":"CoRR","volume":"abs/1405.3623","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/GransdenWR14","ee":"http://arxiv.org/abs/1405.3623","url":"https://dblp.org/rec/journals/corr/GransdenWR14"}, "url":"URL#3972062" }, { "@score":"1", "@id":"3972072", "info":{"authors":{"author":[{"@pid":"14/6611","text":"Alan Gray"},{"@pid":"82/1477","text":"Kevin Stratford"}]},"title":"targetDP: an Abstraction of Lattice Based Parallelism with Portable Performance.","venue":"CoRR","volume":"abs/1405.6162","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/GrayS14","ee":"http://arxiv.org/abs/1405.6162","url":"https://dblp.org/rec/journals/corr/GrayS14"}, "url":"URL#3972072" }, { "@score":"1", "@id":"3972073", "info":{"authors":{"author":[{"@pid":"130/4033","text":"Daniel Graziotin"},{"@pid":"99/2479-1","text":"Xiaofeng Wang 0001"},{"@pid":"71/5809","text":"Pekka Abrahamsson"}]},"title":"Software developers, moods, emotions, and performance.","venue":"CoRR","volume":"abs/1405.4422","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/GraziotinWA14","ee":"http://arxiv.org/abs/1405.4422","url":"https://dblp.org/rec/journals/corr/GraziotinWA14"}, "url":"URL#3972073" }, { "@score":"1", "@id":"3972075", "info":{"authors":{"author":[{"@pid":"62/9116","text":"Neville Grech"},{"@pid":"146/0743","text":"Kyriakos Georgiou"},{"@pid":"127/7416","text":"James Pallister"},{"@pid":"146/0698","text":"Steve Kerrison"},{"@pid":"56/6082","text":"Kerstin Eder"}]},"title":"Static energy consumption analysis of LLVM IR programs.","venue":"CoRR","volume":"abs/1405.4565","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/GrechGPKE14","ee":"http://arxiv.org/abs/1405.4565","url":"https://dblp.org/rec/journals/corr/GrechGPKE14"}, "url":"URL#3972075" }, { "@score":"1", "@id":"3972083", "info":{"authors":{"author":[{"@pid":"146/0563","text":"Kristjan H. Greenewald"},{"@pid":"h/AlfredOHeroIII","text":"Alfred O. Hero III"}]},"title":"Kronecker PCA Based Spatio-Temporal Modeling of Video for Dismount Classification.","venue":"CoRR","volume":"abs/1405.4574","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/GreenewaldH14","ee":"http://arxiv.org/abs/1405.4574","url":"https://dblp.org/rec/journals/corr/GreenewaldH14"}, "url":"URL#3972083" }, { "@score":"1", "@id":"3972108", "info":{"authors":{"author":[{"@pid":"127/6376","text":"Eric Gribkoff"},{"@pid":"96/7521","text":"Guy Van den Broeck"},{"@pid":"s/DanSuciu","text":"Dan Suciu"}]},"title":"Understanding the Complexity of Lifted Inference and Asymmetric Weighted Model Counting.","venue":"CoRR","volume":"abs/1405.3250","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/GribkoffBS14","ee":"http://arxiv.org/abs/1405.3250","url":"https://dblp.org/rec/journals/corr/GribkoffBS14"}, "url":"URL#3972108" }, { "@score":"1", "@id":"3972150", "info":{"authors":{"author":[{"@pid":"99/6359","text":"Raman Grover"},{"@pid":"31/3455","text":"Michael J. Carey 0001"}]},"title":"Scalable Fault-Tolerant Data Feeds in AsterixDB.","venue":"CoRR","volume":"abs/1405.1705","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/GroverC14","ee":"http://arxiv.org/abs/1405.1705","url":"https://dblp.org/rec/journals/corr/GroverC14"}, "url":"URL#3972150" }, { "@score":"1", "@id":"3972177", "info":{"authors":{"author":[{"@pid":"146/0876","text":"Nicolás Guarín-Zapata"},{"@pid":"79/10828","text":"Juan Gómez"},{"@pid":"55/8524","text":"Juan Jaramillo"}]},"title":"Seismic Wave Scattering Through a Compressed Hybrid BEM/FEM Method.","venue":"CoRR","volume":"abs/1405.4044","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/Guarin-ZapataGJ14","ee":"http://arxiv.org/abs/1405.4044","url":"https://dblp.org/rec/journals/corr/Guarin-ZapataGJ14"}, "url":"URL#3972177" }, { "@score":"1", "@id":"3972217", "info":{"authors":{"author":[{"@pid":"146/0862","text":"Talha Cihad Gülcü"},{"@pid":"b/AlexanderBarg","text":"Alexander Barg"}]},"title":"Interactive Function Computation via Polar Coding.","venue":"CoRR","volume":"abs/1405.0894","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/GulcuB14","ee":"http://arxiv.org/abs/1405.0894","url":"https://dblp.org/rec/journals/corr/GulcuB14"}, "url":"URL#3972217" }, { "@score":"1", "@id":"3972221", "info":{"authors":{"author":[{"@pid":"211/8621","text":"Amelia Jane Gully"},{"@pid":"98/6670","text":"Rodrigo C. de Lamare"}]},"title":"Sparsity-Aware Filtered-X Affine Projection Algorithms for Active Noise Control.","venue":"CoRR","volume":"abs/1405.6945","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/GullyL14","ee":"http://arxiv.org/abs/1405.6945","url":"https://dblp.org/rec/journals/corr/GullyL14"}, "url":"URL#3972221" }, { "@score":"1", "@id":"3972249", "info":{"authors":{"author":[{"@pid":"52/8147","text":"Jin-Li Guo"},{"@pid":"146/0839","text":"Qi Suo"}]},"title":"Comment on "Quantifying Long-term Scientific Impact".","venue":"CoRR","volume":"abs/1405.1574","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/GuoS14b","ee":"http://arxiv.org/abs/1405.1574","url":"https://dblp.org/rec/journals/corr/GuoS14b"}, "url":"URL#3972249" }, { "@score":"1", "@id":"3972256", "info":{"authors":{"author":[{"@pid":"93/356-2","text":"Meng Guo 0002"},{"@pid":"21/2684","text":"Jana Tumova"},{"@pid":"10/1107","text":"Dimos V. Dimarogonas"}]},"title":"Cooperative Decentralized Multi-agent Control under Local LTL Tasks and Connectivity Constraints.","venue":"CoRR","volume":"abs/1405.1836","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/GuoTD14","ee":"http://arxiv.org/abs/1405.1836","url":"https://dblp.org/rec/journals/corr/GuoTD14"}, "url":"URL#3972256" }, { "@score":"1", "@id":"3972268", "info":{"authors":{"author":{"@pid":"146/0564","text":"Uma Gupta"}},"title":"Research On Permanent Magnet BLDC for small electric vehicle.","venue":"CoRR","volume":"abs/1405.6815","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/Gupta14e","ee":"http://arxiv.org/abs/1405.6815","url":"https://dblp.org/rec/journals/corr/Gupta14e"}, "url":"URL#3972268" }, { "@score":"1", "@id":"3972280", "info":{"authors":{"author":[{"@pid":"131/6777","text":"Shikhar Kumar Gupta"},{"@pid":"131/6754","text":"Foram Joshi"},{"@pid":"131/6889","text":"Dixita Limbachiya"},{"@pid":"70/6471-4","text":"Manish K. Gupta 0004"}]},"title":"3DNA: A Tool for DNA Sculpting.","venue":"CoRR","volume":"abs/1405.4118","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/GuptaJLG14","ee":"http://arxiv.org/abs/1405.4118","url":"https://dblp.org/rec/journals/corr/GuptaJLG14"}, "url":"URL#3972280" }, { "@score":"1", "@id":"3972282", "info":{"authors":{"author":[{"@pid":"09/6861-5","text":"Neha Gupta 0005"},{"@pid":"97/5147","text":"Ponnurangam Kumaraguru"}]},"title":"Exploration of gaps in Bitly's spam detection and relevant counter measures.","venue":"CoRR","volume":"abs/1405.1511","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/GuptaK14","ee":"http://arxiv.org/abs/1405.1511","url":"https://dblp.org/rec/journals/corr/GuptaK14"}, "url":"URL#3972282" }, { "@score":"1", "@id":"3972336", "info":{"authors":{"author":{"@pid":"17/8035","text":"Laszlo Gyongyosi"}},"title":"Multidimensional Manifold Extraction for Multicarrier Continuous-Variable Quantum Key Distribution.","venue":"CoRR","volume":"abs/1405.6948","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/Gyongyosi14d","ee":"http://arxiv.org/abs/1405.6948","url":"https://dblp.org/rec/journals/corr/Gyongyosi14d"}, "url":"URL#3972336" }, { "@score":"1", "@id":"3972359", "info":{"authors":{"author":[{"@pid":"38/11048","text":"Aleksandar Haber"},{"@pid":"91/602","text":"Michel Verhaegen"}]},"title":"Sparse approximate inverses of Gramians and impulse response matrices of large-scale interconnected systems.","venue":"CoRR","volume":"abs/1405.2580","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/HaberV14","ee":"http://arxiv.org/abs/1405.2580","url":"https://dblp.org/rec/journals/corr/HaberV14"}, "url":"URL#3972359" }, { "@score":"1", "@id":"3972360", "info":{"authors":{"author":[{"@pid":"37/10398","text":"Md. Tarek Habib"},{"@pid":"117/9264","text":"Rahat Hossain Faisal"},{"@pid":"09/10036","text":"M. Rokonuzzaman"},{"@pid":"41/1433","text":"Farruk Ahmed"}]},"title":"Automated Fabric Defect Inspection: A Survey of Classifiers.","venue":"CoRR","volume":"abs/1405.6177","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/HabibFRA14","ee":"http://arxiv.org/abs/1405.6177","url":"https://dblp.org/rec/journals/corr/HabibFRA14"}, "url":"URL#3972360" }, { "@score":"1", "@id":"3972368", "info":{"authors":{"author":[{"@pid":"33/5454","text":"Hamed Haddadi"},{"@pid":"88/6355","text":"Georgios Smaragdakis"},{"@pid":"r/KKRamakrishnan","text":"K. K. Ramakrishnan"}]},"title":"Opportunities in a Federated Cloud Marketplace.","venue":"CoRR","volume":"abs/1405.1811","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/HaddadiSR14","ee":"http://arxiv.org/abs/1405.1811","url":"https://dblp.org/rec/journals/corr/HaddadiSR14"}, "url":"URL#3972368" }, { "@score":"1", "@id":"3972370", "info":{"authors":{"author":[{"@pid":"18/4935","text":"Fatima Zohra Hadjam"},{"@pid":"m/ClaudioMoraga","text":"Claudio Moraga"}]},"title":"Introduction to RIMEP2: A Multi-Expression Programming System for the Design of Reversible Digital Circuits.","venue":"CoRR","volume":"abs/1405.2226","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/HadjamM14","ee":"http://arxiv.org/abs/1405.2226","url":"https://dblp.org/rec/journals/corr/HadjamM14"}, "url":"URL#3972370" }, { "@score":"1", "@id":"3972383", "info":{"authors":{"author":{"@pid":"93/6371","text":"Edward Hermann Haeusler"}},"title":"How many times do we need and assumption ?","venue":"CoRR","volume":"abs/1405.0541","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/Haeusler14a","ee":"http://arxiv.org/abs/1405.0541","url":"https://dblp.org/rec/journals/corr/Haeusler14a"}, "url":"URL#3972383" }, { "@score":"1", "@id":"3972418", "info":{"authors":{"author":[{"@pid":"32/10840","text":"Scott A. Hale"},{"@pid":"78/9885","text":"Taha Yasseri"},{"@pid":"146/0706","text":"Josh Cowls"},{"@pid":"54/7253","text":"Eric T. Meyer"},{"@pid":"71/5292","text":"Ralph Schroeder"},{"@pid":"66/43","text":"Helen Z. Margetts"}]},"title":"Mapping the UK Webspace: Fifteen Years of British Universities on the Web.","venue":"CoRR","volume":"abs/1405.2856","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/HaleYCMSM14","ee":"http://arxiv.org/abs/1405.2856","url":"https://dblp.org/rec/journals/corr/HaleYCMSM14"}, "url":"URL#3972418" }, { "@score":"1", "@id":"3972445", "info":{"authors":{"author":{"@pid":"58/1452","text":"Wilhelmiina Hämäläinen"}},"title":"General upper bounds for well-behaving goodness measures on dependency rules.","venue":"CoRR","volume":"abs/1405.1339","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/Hamalainen14","ee":"http://arxiv.org/abs/1405.1339","url":"https://dblp.org/rec/journals/corr/Hamalainen14"}, "url":"URL#3972445" }, { "@score":"1", "@id":"3972446", "info":{"authors":{"author":{"@pid":"58/1452","text":"Wilhelmiina Hämäläinen"}},"title":"Assessing the statistical significance of association rules.","venue":"CoRR","volume":"abs/1405.1360","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/Hamalainen14a","ee":"http://arxiv.org/abs/1405.1360","url":"https://dblp.org/rec/journals/corr/Hamalainen14a"}, "url":"URL#3972446" }, { "@score":"1", "@id":"3972447", "info":{"authors":{"author":{"@pid":"58/1452","text":"Wilhelmiina Hämäläinen"}},"title":"New tight approximations for Fisher's exact test.","venue":"CoRR","volume":"abs/1405.1250","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/Hamalainen14b","ee":"http://arxiv.org/abs/1405.1250","url":"https://dblp.org/rec/journals/corr/Hamalainen14b"}, "url":"URL#3972447" }, { "@score":"1", "@id":"3972448", "info":{"authors":{"author":[{"@pid":"146/0847","text":"Safa Hamdare"},{"@pid":"146/0388","text":"Varsha Nagpurkar"},{"@pid":"146/0550","text":"Jayashri Mittal"}]},"title":"Securing SMS Based One Time Password Technique from Man in the Middle Attack.","venue":"CoRR","volume":"abs/1405.4828","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/HamdareNM14","ee":"http://arxiv.org/abs/1405.4828","url":"https://dblp.org/rec/journals/corr/HamdareNM14"}, "url":"URL#3972448" }, { "@score":"1", "@id":"3972454", "info":{"authors":{"author":[{"@pid":"146/0787","text":"Kenza Hamidouche"},{"@pid":"41/6237","text":"Walid Saad"},{"@pid":"75/4085","text":"Mérouane Debbah"}]},"title":"Many-to-Many Matching Games for Proactive Social-Caching in Wireless Small Cell Networks.","venue":"CoRR","volume":"abs/1405.5390","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/HamidoucheSD14","ee":"http://arxiv.org/abs/1405.5390","url":"https://dblp.org/rec/journals/corr/HamidoucheSD14"}, "url":"URL#3972454" }, { "@score":"1", "@id":"3972481", "info":{"authors":{"author":[{"@pid":"35/7252","text":"Yanjun Han"},{"@pid":"32/1776","text":"Huadong Meng"},{"@pid":"92/3660-1","text":"Yuan Shen 0001"},{"@pid":"157/0177","text":"Xiao-Ping Zhang 0002"}]},"title":"Performance Limits and Geometric Properties of Narrowband Array Localization.","venue":"CoRR","volume":"abs/1405.4372","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/HanMSZ14","ee":"http://arxiv.org/abs/1405.4372","url":"https://dblp.org/rec/journals/corr/HanMSZ14"}, "url":"URL#3972481" }, { "@score":"1", "@id":"3972496", "info":{"authors":{"author":[{"@pid":"146/0531","text":"Tebbi Hanane"},{"@pid":"146/0507","text":"Azzoune Hamid"}]},"title":"An Expert System for Automatic Reading of A Text Written in Standard Arabic.","venue":"CoRR","volume":"abs/1405.1924","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/HananeH14","ee":"http://arxiv.org/abs/1405.1924","url":"https://dblp.org/rec/journals/corr/HananeH14"}, "url":"URL#3972496" }, { "@score":"1", "@id":"3972506", "info":{"authors":{"author":[{"@pid":"94/1143","text":"Frank Hannig"},{"@pid":"t/JurgenTeich","text":"Jürgen Teich"}]},"title":"Proceedings of the First Workshop on Resource Awareness and Adaptivity in Multi-Core Computing (Racing 2014).","venue":"CoRR","volume":"abs/1405.2281","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/HannigT14","ee":"http://arxiv.org/abs/1405.2281","url":"https://dblp.org/rec/journals/corr/HannigT14"}, "url":"URL#3972506" }, { "@score":"1", "@id":"3972545", "info":{"authors":{"author":{"@pid":"92/2584","text":"Kazuya Haraguchi"}},"title":"An Efficient Local Search for Partial Latin Square Extension Problem.","venue":"CoRR","volume":"abs/1405.2571","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/Haraguchi14","ee":"http://arxiv.org/abs/1405.2571","url":"https://dblp.org/rec/journals/corr/Haraguchi14"}, "url":"URL#3972545" }, { "@score":"1", "@id":"3972548", "info":{"authors":{"author":{"@pid":"h/YannisHaralambous","text":"Yannis Haralambous"}},"title":"Les mathématiques de la langue : l'approche formelle de Montague.","venue":"CoRR","volume":"abs/1405.4248","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/Haralambous14","ee":"http://arxiv.org/abs/1405.4248","url":"https://dblp.org/rec/journals/corr/Haralambous14"}, "url":"URL#3972548" }, { "@score":"1", "@id":"3972549", "info":{"authors":{"author":{"@pid":"h/YannisHaralambous","text":"Yannis Haralambous"}},"title":"New Perspectives in Sinographic Language Processing Through the Use of Character Structure.","venue":"CoRR","volume":"abs/1405.5474","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/Haralambous14a","ee":"http://arxiv.org/abs/1405.5474","url":"https://dblp.org/rec/journals/corr/Haralambous14a"}, "url":"URL#3972549" }, { "@score":"1", "@id":"3972551", "info":{"authors":{"author":[{"@pid":"h/YannisHaralambous","text":"Yannis Haralambous"},{"@pid":"03/3264","text":"Vitaly Klyuev"}]},"title":"Thematically Reinforced Explicit Semantic Analysis.","venue":"CoRR","volume":"abs/1405.4364","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/HaralambousK14","ee":"http://arxiv.org/abs/1405.4364","url":"https://dblp.org/rec/journals/corr/HaralambousK14"}, "url":"URL#3972551" }, { "@score":"1", "@id":"3972554", "info":{"authors":{"author":[{"@pid":"h/YannisHaralambous","text":"Yannis Haralambous"},{"@pid":"146/0952","text":"Julie Sauvage-Vincent"},{"@pid":"29/4994","text":"John Puentes"}]},"title":"INAUT, a Controlled Language for the French Coast Pilot Books Instructions nautiques.","venue":"CoRR","volume":"abs/1405.3772","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/HaralambousSP14","ee":"http://arxiv.org/abs/1405.3772","url":"https://dblp.org/rec/journals/corr/HaralambousSP14"}, "url":"URL#3972554" }, { "@score":"1", "@id":"3972596", "info":{"authors":{"author":[{"@pid":"121/3997","text":"Anna Harutyunyan"},{"@pid":"117/4932","text":"Tim Brys"},{"@pid":"85/562","text":"Peter Vrancx"},{"@pid":"95/232","text":"Ann Nowé"}]},"title":"Off-Policy Shaping Ensembles in Reinforcement Learning.","venue":"CoRR","volume":"abs/1405.5358","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/HarutyunyanBVN14","ee":"http://arxiv.org/abs/1405.5358","url":"https://dblp.org/rec/journals/corr/HarutyunyanBVN14"}, "url":"URL#3972596" }, { "@score":"1", "@id":"3972600", "info":{"authors":{"author":[{"@pid":"19/8336","text":"Cengis Hasan"},{"@pid":"a/EitanAltman","text":"Eitan Altman"},{"@pid":"69/1193","text":"Jean-Marie Gorce"}]},"title":"On the Nash Stability in the Hedonic Coalition Formation Games.","venue":"CoRR","volume":"abs/1405.3360","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/HasanAG14","ee":"http://arxiv.org/abs/1405.3360","url":"https://dblp.org/rec/journals/corr/HasanAG14"}, "url":"URL#3972600" }, { "@score":"1", "@id":"3972610", "info":{"authors":{"author":{"@pid":"146/0391","text":"Hayder Raheem Hashim"}},"title":"The Discrete Logarithm problem in the ElGamal cryptosystem over the abelian group U(n) Where n= pm, or 2pm.","venue":"CoRR","volume":"abs/1405.0914","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/Hashim14","ee":"http://arxiv.org/abs/1405.0914","url":"https://dblp.org/rec/journals/corr/Hashim14"}, "url":"URL#3972610" }, { "@score":"1", "@id":"3972614", "info":{"authors":{"author":{"@pid":"118/4246","text":"John Haslegrave"}},"title":"Bounds on Herman's algorithm.","venue":"CoRR","volume":"abs/1405.5209","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/Haslegrave14","ee":"http://arxiv.org/abs/1405.5209","url":"https://dblp.org/rec/journals/corr/Haslegrave14"}, "url":"URL#3972614" }, { "@score":"1", "@id":"3972616", "info":{"authors":{"author":{"@pid":"136/2306","text":"Mohamed A. Hassan"}},"title":"Hybrid Intelligent System; A Self-Adaptive Network Protection System "Using Soft Computing and Open-Source Tools".","venue":"CoRR","volume":"abs/1405.1958","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/Hassan14","ee":"http://arxiv.org/abs/1405.1958","url":"https://dblp.org/rec/journals/corr/Hassan14"}, "url":"URL#3972616" }, { "@score":"1", "@id":"3972620", "info":{"authors":{"author":[{"@pid":"39/10836","text":"Mai H. Hassan"},{"@pid":"90/5456-2","text":"Md. Jahangir Hossain 0002"}]},"title":"Cooperative Beamforming for Cognitive Radio-Based Broadcasting Systems with Asynchronous Interferences.","venue":"CoRR","volume":"abs/1405.1802","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/HassanH14","ee":"http://arxiv.org/abs/1405.1802","url":"https://dblp.org/rec/journals/corr/HassanH14"}, "url":"URL#3972620" }, { "@score":"1", "@id":"3972644", "info":{"authors":{"author":[{"@pid":"64/3924","text":"Martin Haugh"},{"@pid":"42/675","text":"Chun Wang"}]},"title":"Information Relaxations and Dynamic Zero-Sum Games.","venue":"CoRR","volume":"abs/1405.4347","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/HaughW14","ee":"http://arxiv.org/abs/1405.4347","url":"https://dblp.org/rec/journals/corr/HaughW14"}, "url":"URL#3972644" }, { "@score":"1", "@id":"3972666", "info":{"authors":{"author":[{"@pid":"72/739","text":"Elad Hazan"},{"@pid":"12/10044","text":"Tomer Koren"},{"@pid":"83/11388","text":"Kfir Y. Levy"}]},"title":"Logistic Regression: Tight Bounds for Stochastic and Online Optimization.","venue":"CoRR","volume":"abs/1405.3843","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/HazanKL14","ee":"http://arxiv.org/abs/1405.3843","url":"https://dblp.org/rec/journals/corr/HazanKL14"}, "url":"URL#3972666" }, { "@score":"1", "@id":"3972667", "info":{"authors":{"author":[{"@pid":"146/0404","text":"Jan Hazla"},{"@pid":"02/803","text":"Thomas Holenstein"}]},"title":"Upper Tail Estimates with Combinatorial Proofs.","venue":"CoRR","volume":"abs/1405.2349","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/HazlaH14","ee":"http://arxiv.org/abs/1405.2349","url":"https://dblp.org/rec/journals/corr/HazlaH14"}, "url":"URL#3972667" }, { "@score":"1", "@id":"3972674", "info":{"authors":{"author":[{"@pid":"96/1681","text":"Jin He"},{"@pid":"62/6234","text":"Mianxiong Dong"},{"@pid":"18/4822","text":"Kaoru Ota"},{"@pid":"171/1029","text":"Minyu Fan"},{"@pid":"80/3633","text":"Guangwei Wang"}]},"title":"NetSecCC: A Scalable and Fault-tolerant Architecture without Outsourcing Cloud Network Security.","venue":"CoRR","volume":"abs/1405.0660","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/HeDOFW14","ee":"http://arxiv.org/abs/1405.0660","url":"https://dblp.org/rec/journals/corr/HeDOFW14"}, "url":"URL#3972674" }, { "@score":"1", "@id":"3972687", "info":{"authors":{"author":[{"@pid":"84/6016","text":"Peng He"},{"@pid":"13/2692-10","text":"Bing Li 0010"},{"@pid":"146/0512","text":"Deguang Zhang"},{"@pid":"07/4142","text":"Yutao Ma"}]},"title":"Simplification of Training Data for Cross-Project Defect Prediction.","venue":"CoRR","volume":"abs/1405.0773","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/HeLZM14","ee":"http://arxiv.org/abs/1405.0773","url":"https://dblp.org/rec/journals/corr/HeLZM14"}, "url":"URL#3972687" }, { "@score":"1", "@id":"3972716", "info":{"authors":{"author":[{"@pid":"116/4762","text":"James Hegeman"},{"@pid":"p/SVPemmaraju","text":"Sriram V. Pemmaraju"}]},"title":"Lessons from the Congested Clique Applied to MapReduce.","venue":"CoRR","volume":"abs/1405.4356","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/HegemanP14","ee":"http://arxiv.org/abs/1405.4356","url":"https://dblp.org/rec/journals/corr/HegemanP14"}, "url":"URL#3972716" }, { "@score":"1", "@id":"3972733", "info":{"authors":{"author":[{"@pid":"52/7224","text":"Matthias Heizmann"},{"@pid":"79/3265","text":"Jochen Hoenicke"},{"@pid":"p/APodelski","text":"Andreas Podelski"}]},"title":"Termination Analysis by Learning Terminating Programs.","venue":"CoRR","volume":"abs/1405.4189","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/HeizmannHP14","ee":"http://arxiv.org/abs/1405.4189","url":"https://dblp.org/rec/journals/corr/HeizmannHP14"}, "url":"URL#3972733" }, { "@score":"1", "@id":"3972763", "info":{"authors":{"author":[{"@pid":"116/3006","text":"Julien Henry"},{"@pid":"45/8611","text":"Mihail Asavoae"},{"@pid":"m/DavidMonniaux","text":"David Monniaux"},{"@pid":"64/2083","text":"Claire Maïza"}]},"title":"How to Compute Worst-Case Execution Time by Optimization Modulo Theory and a Clever Encoding of Program Semantics.","venue":"CoRR","volume":"abs/1405.7962","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/HenryAMM14","ee":"http://arxiv.org/abs/1405.7962","url":"https://dblp.org/rec/journals/corr/HenryAMM14"}, "url":"URL#3972763" }, { "@score":"1", "@id":"3972768", "info":{"authors":{"author":[{"@pid":"16/9134","text":"Matthias Henze"},{"@pid":"136/6088","text":"Rafel Jaume"}]},"title":"Bottleneck Partial-Matching Voronoi Diagrams.","venue":"CoRR","volume":"abs/1405.0900","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/HenzeJ14","ee":"http://arxiv.org/abs/1405.0900","url":"https://dblp.org/rec/journals/corr/HenzeJ14"}, "url":"URL#3972768" }, { "@score":"1", "@id":"3972819", "info":{"authors":{"author":[{"@pid":"64/11260","text":"Yuya Higashikawa"},{"@pid":"g/MordecaiJGolin","text":"Mordecai J. Golin"},{"@pid":"55/4413","text":"Naoki Katoh"}]},"title":"Improved Algorithms for Multiple Sink Location Problems in Dynamic Path Networks.","venue":"CoRR","volume":"abs/1405.5613","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/HigashikawaGK14","ee":"http://arxiv.org/abs/1405.5613","url":"https://dblp.org/rec/journals/corr/HigashikawaGK14"}, "url":"URL#3972819" }, { "@score":"1", "@id":"3972839", "info":{"authors":{"author":[{"@pid":"85/4929","text":"Chien-Ju Ho"},{"@pid":"91/4014","text":"Aleksandrs Slivkins"},{"@pid":"w/JenniferWortman","text":"Jennifer Wortman Vaughan"}]},"title":"Adaptive Contract Design for Crowdsourcing Markets: Bandit Algorithms for Repeated Principal-Agent Problems.","venue":"CoRR","volume":"abs/1405.2875","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/HoSV14","ee":"http://arxiv.org/abs/1405.2875","url":"https://dblp.org/rec/journals/corr/HoSV14"}, "url":"URL#3972839" }, { "@score":"1", "@id":"3972857", "info":{"authors":{"author":[{"@pid":"06/4513","text":"Ronald Hochreiter"},{"@pid":"17/9883","text":"Christoph Waldhauser"}]},"title":"Effects of Sampling Methods on Prediction Quality. The Case of Classifying Land Cover Using Decision Trees.","venue":"CoRR","volume":"abs/1405.3295","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/HochreiterW14f","ee":"http://arxiv.org/abs/1405.3295","url":"https://dblp.org/rec/journals/corr/HochreiterW14f"}, "url":"URL#3972857" }, { "@score":"1", "@id":"3972875", "info":{"authors":{"author":[{"@pid":"h/MichaelHoffmann","text":"Michael Hoffmann 0001"},{"@pid":"76/9060","text":"Vincent Kusters"},{"@pid":"37/8210","text":"Tillmann Miltzow"}]},"title":"Halving Balls in Deterministic Linear Time.","venue":"CoRR","volume":"abs/1405.1894","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/HoffmannKM14","ee":"http://arxiv.org/abs/1405.1894","url":"https://dblp.org/rec/journals/corr/HoffmannKM14"}, "url":"URL#3972875" }, { "@score":"1", "@id":"3972921", "info":{"authors":{"author":[{"@pid":"h/HolgerHHoos","text":"Holger H. Hoos"},{"@pid":"28/9142","text":"Marius Lindauer"},{"@pid":"s/TorstenSchaub","text":"Torsten Schaub"}]},"title":"claspfolio 2: Advances in Algorithm Selection for Answer Set Programming.","venue":"CoRR","volume":"abs/1405.1520","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/HoosLS14","ee":"http://arxiv.org/abs/1405.1520","url":"https://dblp.org/rec/journals/corr/HoosLS14"}, "url":"URL#3972921" }, { "@score":"1", "@id":"3972972", "info":{"authors":{"author":[{"@pid":"50/8126","text":"Mahboobeh Houshmand"},{"@pid":"69/5980","text":"Morteza Saheb Zamani"},{"@pid":"09/3136","text":"Mehdi Sedighi"},{"@pid":"04/8884","text":"Mona Arabzadeh"}]},"title":"Decomposition of Diagonal Hermitian Quantum Gates Using Multiple-Controlled Pauli Z Gates.","venue":"CoRR","volume":"abs/1405.6741","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/HoushmandZSA14","ee":"http://arxiv.org/abs/1405.6741","url":"https://dblp.org/rec/journals/corr/HoushmandZSA14"}, "url":"URL#3972972" }, { "@score":"1", "@id":"3972975", "info":{"authors":{"author":[{"@pid":"146/0463","text":"Klesti Hoxha"},{"@pid":"146/0927","text":"Alda Kika"},{"@pid":"146/0544","text":"Eriglen Gani"},{"@pid":"146/0714","text":"Silvana Greca"}]},"title":"Towards a Modular Recommender System for Research Papers written in Albanian.","venue":"CoRR","volume":"abs/1405.0190","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/HoxhaKGG14","ee":"http://arxiv.org/abs/1405.0190","url":"https://dblp.org/rec/journals/corr/HoxhaKGG14"}, "url":"URL#3972975" }, { "@score":"1", "@id":"3972999", "info":{"authors":{"author":[{"@pid":"123/4657","text":"Pili Hu"},{"@pid":"c/ShermanSMChow","text":"Sherman S. M. Chow"},{"@pid":"l/WingCheongLau","text":"Wing Cheong Lau"}]},"title":"Secure Friend Discovery via Privacy-Preserving and Decentralized Community Detection.","venue":"CoRR","volume":"abs/1405.4951","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/HuCL14","ee":"http://arxiv.org/abs/1405.4951","url":"https://dblp.org/rec/journals/corr/HuCL14"}, "url":"URL#3972999" }, { "@score":"1", "@id":"3973030", "info":{"authors":{"author":[{"@pid":"32/3716","text":"Xueqing Huang"},{"@pid":"a/NirwanAnsari","text":"Nirwan Ansari"}]},"title":"Joint Spectrum and Power Allocation for Multi-node Cooperative Wireless Systems.","venue":"CoRR","volume":"abs/1405.5730","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/HuangA14","ee":"http://arxiv.org/abs/1405.5730","url":"https://dblp.org/rec/journals/corr/HuangA14"}, "url":"URL#3973030" }, { "@score":"1", "@id":"3973031", "info":{"authors":{"author":[{"@pid":"32/3716","text":"Xueqing Huang"},{"@pid":"a/NirwanAnsari","text":"Nirwan Ansari"}]},"title":"Optimal Cooperative Power Allocation for Energy Harvesting Enabled Relay Networks.","venue":"CoRR","volume":"abs/1405.5764","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/HuangA14a","ee":"http://arxiv.org/abs/1405.5764","url":"https://dblp.org/rec/journals/corr/HuangA14a"}, "url":"URL#3973031" }, { "@score":"1", "@id":"3973036", "info":{"authors":{"author":[{"@pid":"82/241","text":"Qixing Huang"},{"@pid":"11/5123-2","text":"Yuxin Chen 0002"},{"@pid":"g/LeonidasJGuibas","text":"Leonidas J. Guibas"}]},"title":"Scalable Semidefinite Relaxation for Maximum A Posterior Estimation.","venue":"CoRR","volume":"abs/1405.4807","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/HuangCG14","ee":"http://arxiv.org/abs/1405.4807","url":"https://dblp.org/rec/journals/corr/HuangCG14"}, "url":"URL#3973036" }, { "@score":"1", "@id":"3973041", "info":{"authors":{"author":[{"@pid":"144/7675","text":"Zongyan Huang"},{"@pid":"123/4583","text":"Matthew England 0001"},{"@pid":"85/11468","text":"David J. Wilson"},{"@pid":"28/1296","text":"James H. Davenport"},{"@pid":"p/LCPaulson","text":"Lawrence C. Paulson"}]},"title":"A comparison of three heuristics to choose the variable ordering for CAD.","venue":"CoRR","volume":"abs/1405.6082","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/HuangEWDP14","ee":"http://arxiv.org/abs/1405.6082","url":"https://dblp.org/rec/journals/corr/HuangEWDP14"}, "url":"URL#3973041" }, { "@score":"1", "@id":"3973047", "info":{"authors":{"author":[{"@pid":"32/3716","text":"Xueqing Huang"},{"@pid":"78/744-2","text":"Tao Han 0002"},{"@pid":"a/NirwanAnsari","text":"Nirwan Ansari"}]},"title":"On Green Energy Powered Cognitive Radio Networks.","venue":"CoRR","volume":"abs/1405.5747","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/HuangHA14","ee":"http://arxiv.org/abs/1405.5747","url":"https://dblp.org/rec/journals/corr/HuangHA14"}, "url":"URL#3973047" }, { "@score":"1", "@id":"3973049", "info":{"authors":{"author":[{"@pid":"22/6958","text":"Xiaohui Huang"},{"@pid":"49/10052","text":"Xing Hu"},{"@pid":"146/0770","text":"Weichang Jiang"},{"@pid":"90/5587","text":"Zhi Yang"},{"@pid":"17/5705","text":"Hao Li"}]},"title":"Application of Multilayer Feedforward Neural Networks in Predicting Tree Height and Forest Stock Volume of Chinese Fir.","venue":"CoRR","volume":"abs/1405.5206","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/HuangHJYL14","ee":"http://arxiv.org/abs/1405.5206","url":"https://dblp.org/rec/journals/corr/HuangHJYL14"}, "url":"URL#3973049" }, { "@score":"1", "@id":"3973062", "info":{"authors":{"author":[{"@pid":"81/6685-26","text":"Wei Huang 0026"},{"@pid":"05/4625","text":"Jian Lou"},{"@pid":"63/6151","text":"Zhonghua Wen"}]},"title":"Allocating Indivisible Resources under Price Rigidities in Polynomial Time.","venue":"CoRR","volume":"abs/1405.6573","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/HuangLW14","ee":"http://arxiv.org/abs/1405.6573","url":"https://dblp.org/rec/journals/corr/HuangLW14"}, "url":"URL#3973062" }, { "@score":"1", "@id":"3973063", "info":{"authors":{"author":[{"@pid":"81/6685-26","text":"Wei Huang 0026"},{"@pid":"05/4625","text":"Jian Lou"},{"@pid":"63/6151","text":"Zhonghua Wen"}]},"title":"A Parallel Elicitation-Free Protocol for Allocating Indivisible Goods.","venue":"CoRR","volume":"abs/1405.6578","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/HuangLW14a","ee":"http://arxiv.org/abs/1405.6578","url":"https://dblp.org/rec/journals/corr/HuangLW14a"}, "url":"URL#3973063" }, { "@score":"1", "@id":"3973064", "info":{"authors":{"author":[{"@pid":"94/3756-1","text":"Dong Huang 0001"},{"@pid":"78/1117","text":"Jian-Huang Lai"},{"@pid":"69/9023","text":"Chang-Dong Wang"}]},"title":"Combining Multiple Clusterings via Crowd Agreement Estimation and Multi-Granularity Link Analysis.","venue":"CoRR","volume":"abs/1405.1297","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/HuangLW14b","ee":"http://arxiv.org/abs/1405.1297","url":"https://dblp.org/rec/journals/corr/HuangLW14b"}, "url":"URL#3973064" }, { "@score":"1", "@id":"3973074", "info":{"authors":{"author":[{"@pid":"181/2445-4","text":"Zhenyu Huang 0004"},{"@pid":"62/6846-4","text":"Yao Sun 0004"},{"@pid":"44/6488","text":"Dongdai Lin"}]},"title":"On the Efficiency of Solving Boolean Polynomial Systems with the Characteristic Set Method.","venue":"CoRR","volume":"abs/1405.4596","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/HuangSL14","ee":"http://arxiv.org/abs/1405.4596","url":"https://dblp.org/rec/journals/corr/HuangSL14"}, "url":"URL#3973074" }, { "@score":"1", "@id":"3973082", "info":{"authors":{"author":[{"@pid":"146/0549","text":"Sandra Huber"},{"@pid":"22/6481","text":"Martin Josef Geiger"},{"@pid":"76/3449","text":"Marc Sevaux"}]},"title":"Interactive Reference Point-Based Guided Local Search for the Bi-objective Inventory Routing Problem.","venue":"CoRR","volume":"abs/1405.5643","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/HuberGS14","ee":"http://arxiv.org/abs/1405.5643","url":"https://dblp.org/rec/journals/corr/HuberGS14"}, "url":"URL#3973082" }, { "@score":"1", "@id":"3973088", "info":{"authors":{"author":[{"@pid":"68/2681","text":"Alexis Huck"},{"@pid":"16/681","text":"François de Vieilleville"},{"@pid":"43/173","text":"Pierre Weiss"},{"@pid":"121/6013","text":"Manuel Grizonnet"}]},"title":"Hyperspectral pan-sharpening: a variational convex constrained formulation to impose parallel level lines, solved with ADMM.","venue":"CoRR","volume":"abs/1405.2403","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/HuckVWG14","ee":"http://arxiv.org/abs/1405.2403","url":"https://dblp.org/rec/journals/corr/HuckVWG14"}, "url":"URL#3973088" }, { "@score":"1", "@id":"3973103", "info":{"authors":{"author":{"@pid":"28/4803-1","text":"Aaron Hunter 0001"}},"title":"Belief Revision and Trust.","venue":"CoRR","volume":"abs/1405.0034","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/Hunter14a","ee":"http://arxiv.org/abs/1405.0034","url":"https://dblp.org/rec/journals/corr/Hunter14a"}, "url":"URL#3973103" }, { "@score":"1", "@id":"3973108", "info":{"authors":{"author":[{"@pid":"23/4530","text":"Anthony Hunter"},{"@pid":"07/1317","text":"Matthias Thimm"}]},"title":"Probabilistic Argumentation with Epistemic Extensions and Incomplete Information.","venue":"CoRR","volume":"abs/1405.3376","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/HunterT14","ee":"http://arxiv.org/abs/1405.3376","url":"https://dblp.org/rec/journals/corr/HunterT14"}, "url":"URL#3973108" }, { "@score":"1", "@id":"3973124", "info":{"authors":{"author":[{"@pid":"h/MichaelHuth","text":"Michael Huth 0001"},{"@pid":"119/6765","text":"Jim Huan-Pu Kuo"},{"@pid":"p/NPiterman","text":"Nir Piterman"}]},"title":"Fatal Attractors in Parity Games: Building Blocks for Partial Solvers.","venue":"CoRR","volume":"abs/1405.0386","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/HuthKP14","ee":"http://arxiv.org/abs/1405.0386","url":"https://dblp.org/rec/journals/corr/HuthKP14"}, "url":"URL#3973124" }, { "@score":"1", "@id":"3973143", "info":{"authors":{"author":[{"@pid":"133/8515","text":"Huda Ibeid"},{"@pid":"61/7413","text":"Rio Yokota"},{"@pid":"27/854","text":"David E. Keyes"}]},"title":"A Performance Model for the Communication in Fast Multipole Methods on HPC Platforms.","venue":"CoRR","volume":"abs/1405.6362","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/IbeidYK14","ee":"http://arxiv.org/abs/1405.6362","url":"https://dblp.org/rec/journals/corr/IbeidYK14"}, "url":"URL#3973143" }, { "@score":"1", "@id":"3973186", "info":{"authors":{"author":[{"@pid":"49/10034","text":"Matteo Interlandi"},{"@pid":"t/LetiziaTanca","text":"Letizia Tanca"}]},"title":"On the CALM Principle for Bulk Synchronous Parallel Computation.","venue":"CoRR","volume":"abs/1405.7264","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/InterlandiT14","ee":"http://arxiv.org/abs/1405.7264","url":"https://dblp.org/rec/journals/corr/InterlandiT14"}, "url":"URL#3973186" }, { "@score":"1", "@id":"3973249", "info":{"authors":{"author":{"@pid":"09/1881","text":"Szabolcs Iván"}},"title":"On state complexity of unions of binary factor-free languages.","venue":"CoRR","volume":"abs/1405.1107","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/Ivan14b","ee":"http://arxiv.org/abs/1405.1107","url":"https://dblp.org/rec/journals/corr/Ivan14b"}, "url":"URL#3973249" }, { "@score":"1", "@id":"3973258", "info":{"authors":{"author":{"@pid":"125/6836","text":"Ivan Ivek"}},"title":"Supervised Dictionary Learning by a Variational Bayesian Group Sparse Nonnegative Matrix Factorization.","venue":"CoRR","volume":"abs/1405.6914","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/Ivek14","ee":"http://arxiv.org/abs/1405.6914","url":"https://dblp.org/rec/journals/corr/Ivek14"}, "url":"URL#3973258" }, { "@score":"1", "@id":"3973273", "info":{"authors":{"author":[{"@pid":"139/6425","text":"Rafael Izbicki"},{"@pid":"139/6468","text":"Rafael Bassi Stern"}]},"title":"Learning with many experts: model selection and sparsity.","venue":"CoRR","volume":"abs/1405.3292","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/IzbickiS14","ee":"http://arxiv.org/abs/1405.3292","url":"https://dblp.org/rec/journals/corr/IzbickiS14"}, "url":"URL#3973273" }, { "@score":"1", "@id":"3973275", "info":{"authors":{"author":[{"@pid":"146/0723","text":"Jeya Pradha J."},{"@pid":"146/0936","text":"Sanket S. Kalamkar"},{"@pid":"66/6866","text":"Adrish Banerjee"}]},"title":"Energy Harvesting Cognitive Radio with Channel-Aware Sensing Strategy.","venue":"CoRR","volume":"abs/1405.6415","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/JKB14","ee":"http://arxiv.org/abs/1405.6415","url":"https://dblp.org/rec/journals/corr/JKB14"}, "url":"URL#3973275" }, { "@score":"1", "@id":"3973283", "info":{"authors":{"author":{"@pid":"16/762","text":"Ethan K. Jackson"}},"title":"A Module System for Domain-Specific Languages.","venue":"CoRR","volume":"abs/1405.4041","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/Jackson14","ee":"http://arxiv.org/abs/1405.4041","url":"https://dblp.org/rec/journals/corr/Jackson14"}, "url":"URL#3973283" }, { "@score":"1", "@id":"3973284", "info":{"authors":{"author":[{"@pid":"36/5034","text":"Matthew O. Jackson"},{"@pid":"146/0644","text":"Stephen M. Nei"}]},"title":"Networks of Military Alliances, Wars, and International Trade.","venue":"CoRR","volume":"abs/1405.6400","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/JacksonN14","ee":"http://arxiv.org/abs/1405.6400","url":"https://dblp.org/rec/journals/corr/JacksonN14"}, "url":"URL#3973284" }, { "@score":"1", "@id":"3973293", "info":{"authors":{"author":{"@pid":"73/6880","text":"Swen Jacobs"}},"title":"Extended AIGER Format for Synthesis.","venue":"CoRR","volume":"abs/1405.5793","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/Jacobs14","ee":"http://arxiv.org/abs/1405.5793","url":"https://dblp.org/rec/journals/corr/Jacobs14"}, "url":"URL#3973293" }, { "@score":"1", "@id":"3973295", "info":{"authors":{"author":[{"@pid":"146/0893","text":"Christian T. Jacobs"},{"@pid":"146/0441","text":"Alexandros Avdis"},{"@pid":"08/9991","text":"Gerard J. Gorman"},{"@pid":"42/8769","text":"Matthew D. Piggott"}]},"title":"PyRDM: A Python-based library for automating the management and online publication of scientific software and data.","venue":"CoRR","volume":"abs/1405.7290","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/JacobsAGP14","ee":"http://arxiv.org/abs/1405.7290","url":"https://dblp.org/rec/journals/corr/JacobsAGP14"}, "url":"URL#3973295" }, { "@score":"1", "@id":"3973307", "info":{"authors":{"author":[{"@pid":"146/0800","text":"Max Jaderberg"},{"@pid":"99/2825","text":"Andrea Vedaldi"},{"@pid":"z/AndrewZisserman","text":"Andrew Zisserman"}]},"title":"Speeding up Convolutional Neural Networks with Low Rank Expansions.","venue":"CoRR","volume":"abs/1405.3866","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/JaderbergVZ14","ee":"http://arxiv.org/abs/1405.3866","url":"https://dblp.org/rec/journals/corr/JaderbergVZ14"}, "url":"URL#3973307" }, { "@score":"1", "@id":"3973308", "info":{"authors":{"author":[{"@pid":"198/5293","text":"Shruti Jadon"},{"@pid":"198/5330","text":"Anubhav Singhal"},{"@pid":"86/8237","text":"Suma Dawn"}]},"title":"Military Simulator - A Case Study of Behaviour Tree and Unity based architecture.","venue":"CoRR","volume":"abs/1405.7944","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/JadonSD14","ee":"http://arxiv.org/abs/1405.7944","url":"https://dblp.org/rec/journals/corr/JadonSD14"}, "url":"URL#3973308" }, { "@score":"1", "@id":"3973329", "info":{"authors":{"author":{"@pid":"27/4639","text":"Shikha Jain"}},"title":"Security Threats in MANETS : A Review.","venue":"CoRR","volume":"abs/1405.5320","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/Jain14a","ee":"http://arxiv.org/abs/1405.5320","url":"https://dblp.org/rec/journals/corr/Jain14a"}, "url":"URL#3973329" }, { "@score":"1", "@id":"3973330", "info":{"authors":{"author":{"@pid":"98/11170","text":"Brijnesh J. Jain"}},"title":"Flip-Flop Sublinear Models for Graphs: Proof of Theorem 1.","venue":"CoRR","volume":"abs/1405.7897","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/Jain14b","ee":"http://arxiv.org/abs/1405.7897","url":"https://dblp.org/rec/journals/corr/Jain14b"}, "url":"URL#3973330" }, { "@score":"1", "@id":"3973337", "info":{"authors":{"author":[{"@pid":"17/10818","text":"Paridhi Jain 0001"},{"@pid":"97/5147","text":"Ponnurangam Kumaraguru"}]},"title":"@I to @Me: An Anatomy of Username Changing Behavior on Twitter.","venue":"CoRR","volume":"abs/1405.6539","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/JainK14","ee":"http://arxiv.org/abs/1405.6539","url":"https://dblp.org/rec/journals/corr/JainK14"}, "url":"URL#3973337" }, { "@score":"1", "@id":"3973343", "info":{"authors":{"author":[{"@pid":"42/4430-1","text":"Rahul Jain 0001"},{"@pid":"21/9668","text":"Zhaohui Wei"},{"@pid":"88/3400","text":"Penghui Yao"},{"@pid":"47/3459-2","text":"Shengyu Zhang 0002"}]},"title":"Approximate and Multipartite Quantum Correlation (Communication) Complexity.","venue":"CoRR","volume":"abs/1405.6015","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/JainWYZ14","ee":"http://arxiv.org/abs/1405.6015","url":"https://dblp.org/rec/journals/corr/JainWYZ14"}, "url":"URL#3973343" }, { "@score":"1", "@id":"3973374", "info":{"authors":{"author":[{"@pid":"75/7678","text":"Alireza Khoshkbarforoushha"},{"@pid":"57/2301","text":"Pooyan Jamshidi"},{"@pid":"18/10134","text":"Mahdi Fahmideh Gholami"},{"@pid":"w/LizheWang","text":"Lizhe Wang 0001"},{"@pid":"68/163-1","text":"Rajiv Ranjan 0001"}]},"title":"Metrics for BPEL Process Reusability Analysis in a Workflow System.","venue":"CoRR","volume":"abs/1405.6179","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/JamshidiFWR14","ee":"http://arxiv.org/abs/1405.6179","url":"https://dblp.org/rec/journals/corr/JamshidiFWR14"}, "url":"URL#3973374" }, { "@score":"1", "@id":"3973375", "info":{"authors":{"author":{"@pid":"j/PetrJancar","text":"Petr Jancar"}},"title":"Bisimulation Equivalence of First-Order Grammars.","venue":"CoRR","volume":"abs/1405.7923","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/Jancar14","ee":"http://arxiv.org/abs/1405.7923","url":"https://dblp.org/rec/journals/corr/Jancar14"}, "url":"URL#3973375" }, { "@score":"1", "@id":"3973389", "info":{"authors":{"author":{"@pid":"135/6136","text":"Joachim Jansen"}},"title":"Model revision inference for extensions of first order logic.","venue":"CoRR","volume":"abs/1405.4206","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/Jansen14a","ee":"http://arxiv.org/abs/1405.4206","url":"https://dblp.org/rec/journals/corr/Jansen14a"}, "url":"URL#3973389" }, { "@score":"1", "@id":"3973391", "info":{"authors":{"author":[{"@pid":"22/8638","text":"Thomas Janson"},{"@pid":"s/ChristianSchindelhauer","text":"Christian Schindelhauer"}]},"title":"Ad-Hoc Network Unicast in Time O(log log n) using Beamforming.","venue":"CoRR","volume":"abs/1405.0417","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/JansonS14","ee":"http://arxiv.org/abs/1405.0417","url":"https://dblp.org/rec/journals/corr/JansonS14"}, "url":"URL#3973391" }, { "@score":"1", "@id":"3973405", "info":{"authors":{"author":{"@pid":"120/8973","text":"Grzegorz Jaskiewicz"}},"title":"Logic Programming as Scripting Language for Bots in Computer Games - Research Overview.","venue":"CoRR","volume":"abs/1405.3795","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/Jaskiewicz14","ee":"http://arxiv.org/abs/1405.3795","url":"https://dblp.org/rec/journals/corr/Jaskiewicz14"}, "url":"URL#3973405" }, { "@score":"1", "@id":"3973407", "info":{"authors":{"author":{"@pid":"25/10057","text":"Michal Jastrzebski"}},"title":"On total communication complexity of collapsing protocols for pointer jumping problem.","venue":"CoRR","volume":"abs/1405.7596","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/Jastrzebski14","ee":"http://arxiv.org/abs/1405.7596","url":"https://dblp.org/rec/journals/corr/Jastrzebski14"}, "url":"URL#3973407" }, { "@score":"1", "@id":"3973425", "info":{"authors":{"author":[{"@pid":"63/5509","text":"Prem Prakash Jayaraman"},{"@pid":"115/6940","text":"Charith Perera"},{"@pid":"82/2760","text":"Dimitrios Georgakopoulos 0001"},{"@pid":"z/ArkadyBZaslavsky","text":"Arkady B. Zaslavsky"}]},"title":"MOSDEN: A Scalable Mobile Collaborative Platform for Opportunistic Sensing Applications.","venue":"CoRR","volume":"abs/1405.5867","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/JayaramanPGZ14","ee":"http://arxiv.org/abs/1405.5867","url":"https://dblp.org/rec/journals/corr/JayaramanPGZ14"}, "url":"URL#3973425" }, { "@score":"1", "@id":"3973432", "info":{"authors":{"author":[{"@pid":"145/5278","text":"Khaoula Jayech"},{"@pid":"145/5270","text":"Nesrine Trimech"},{"@pid":"44/9613","text":"Mohamed Ali Mahjoub"},{"@pid":"46/1396","text":"Najoua Essoukri Ben Amara"}]},"title":"Dynamic Hierarchical Bayesian Network for Arabic Handwritten Word Recognition.","venue":"CoRR","volume":"abs/1405.5248","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/JayechTMA14","ee":"http://arxiv.org/abs/1405.5248","url":"https://dblp.org/rec/journals/corr/JayechTMA14"}, "url":"URL#3973432" }, { "@score":"1", "@id":"3973456", "info":{"authors":{"author":[{"@pid":"122/9337","text":"Vimalkumar Jeyakumar"},{"@pid":"37/8397","text":"Mohammad Alizadeh"},{"@pid":"139/1794","text":"Yilong Geng"},{"@pid":"55/4381","text":"Changhoon Kim"},{"@pid":"m/DMazieres","text":"David Mazières"}]},"title":"Millions of Little Minions: Using Packets for Low Latency Network Programming and Visibility.","venue":"CoRR","volume":"abs/1405.7143","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/JeyakumarAGKM14","ee":"http://arxiv.org/abs/1405.7143","url":"https://dblp.org/rec/journals/corr/JeyakumarAGKM14"}, "url":"URL#3973456" }, { "@score":"1", "@id":"3973457", "info":{"authors":{"author":[{"@pid":"122/9337","text":"Vimalkumar Jeyakumar"},{"@pid":"91/4608","text":"Abdul Kabbani"},{"@pid":"m/JeffreyCMogul","text":"Jeffrey C. Mogul"},{"@pid":"v/AminVahdat","text":"Amin Vahdat"}]},"title":"Flexible Network Bandwidth and Latency Provisioning in the Datacenter.","venue":"CoRR","volume":"abs/1405.0631","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/JeyakumarKMV14","ee":"http://arxiv.org/abs/1405.0631","url":"https://dblp.org/rec/journals/corr/JeyakumarKMV14"}, "url":"URL#3973457" }, { "@score":"1", "@id":"3973460", "info":{"authors":{"author":[{"@pid":"144/7338","text":"Vaibhav Jha"},{"@pid":"144/7355","text":"Mohit Jha"},{"@pid":"78/5874","text":"G. K. Sharma 0001"}]},"title":"Estimation of Optimized Energy and Latency Constraints for Task Allocation in 3d Network on Chip.","venue":"CoRR","volume":"abs/1405.0109","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/JhaJS14","ee":"http://arxiv.org/abs/1405.0109","url":"https://dblp.org/rec/journals/corr/JhaJS14"}, "url":"URL#3973460" }, { "@score":"1", "@id":"3973463", "info":{"authors":{"author":[{"@pid":"144/7355","text":"Mohit Jha"},{"@pid":"01/8038","text":"Shailja Shukla"}]},"title":"Design Of Fuzzy Logic Traffic Controller For Isolated Intersections With Emergency Vehicle Priority System Using MATLAB Simulation.","venue":"CoRR","volume":"abs/1405.0936","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/JhaS14","ee":"http://arxiv.org/abs/1405.0936","url":"https://dblp.org/rec/journals/corr/JhaS14"}, "url":"URL#3973463" }, { "@score":"1", "@id":"3973465", "info":{"authors":{"author":[{"@pid":"50/7911","text":"Mingyue Ji"},{"@pid":"19/2492","text":"Giuseppe Caire"},{"@pid":"54/2683","text":"Andreas F. Molisch"}]},"title":"Fundamental Limits of Caching in Wireless D2D Networks.","venue":"CoRR","volume":"abs/1405.5336","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/JiCM14","ee":"http://arxiv.org/abs/1405.5336","url":"https://dblp.org/rec/journals/corr/JiCM14"}, "url":"URL#3973465" }, { "@score":"1", "@id":"3973470", "info":{"authors":{"author":[{"@pid":"16/1844","text":"Jianmin Ji"},{"@pid":"52/4232","text":"Hannes Strass"}]},"title":"Implementing Default and Autoepistemic Logics via the Logic of GK.","venue":"CoRR","volume":"abs/1405.0809","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/JiS14","ee":"http://arxiv.org/abs/1405.0809","url":"https://dblp.org/rec/journals/corr/JiS14"}, "url":"URL#3973470" }, { "@score":"1", "@id":"3973496", "info":{"authors":{"author":[{"@pid":"146/0518","text":"Lurong Jiang"},{"@pid":"14/3339","text":"Xinyu Jin"},{"@pid":"96/6094","text":"Yongxiang Xia"},{"@pid":"146/0771","text":"Bo Ouyang"},{"@pid":"146/0572","text":"Duanpo Wu"},{"@pid":"16/3283-14","text":"Xi Chen 0014"}]},"title":"A Scale-Free Topology Construction Model for Wireless Sensor Networks.","venue":"CoRR","volume":"abs/1405.3368","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/JiangJXOWC14","ee":"http://arxiv.org/abs/1405.3368","url":"https://dblp.org/rec/journals/corr/JiangJXOWC14"}, "url":"URL#3973496" }, { "@score":"1", "@id":"3973504", "info":{"authors":{"author":[{"@pid":"05/8330","text":"Wanchun Jiang"},{"@pid":"05/6995","text":"Fengyuan Ren"},{"@pid":"74/4022","text":"Xin Yue"},{"@pid":"53/2571-1","text":"Chuang Lin 0001"}]},"title":"Scale Congestion Control to Ultra-High Speed Ethernet.","venue":"CoRR","volume":"abs/1405.1127","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/JiangRYL14","ee":"http://arxiv.org/abs/1405.1127","url":"https://dblp.org/rec/journals/corr/JiangRYL14"}, "url":"URL#3973504" }, { "@score":"1", "@id":"3973518", "info":{"authors":{"author":[{"@pid":"146/0897","text":"Rahul A. Jichkar"},{"@pid":"14/8152","text":"M. B. Chandak"}]},"title":"An implementation on detection of trusted service provider in mobile ad-hoc networks.","venue":"CoRR","volume":"abs/1405.3912","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/JichkarC14","ee":"http://arxiv.org/abs/1405.3912","url":"https://dblp.org/rec/journals/corr/JichkarC14"}, "url":"URL#3973518" }, { "@score":"1", "@id":"3973521", "info":{"authors":{"author":[{"@pid":"39/9887","text":"Andrea Jiménez"},{"@pid":"18/6947","text":"Martin Loebl"}]},"title":"Directed cycle double covers and cut-obstacles.","venue":"CoRR","volume":"abs/1405.6929","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/JimenezL14","ee":"http://arxiv.org/abs/1405.6929","url":"https://dblp.org/rec/journals/corr/JimenezL14"}, "url":"URL#3973521" }, { "@score":"1", "@id":"3973535", "info":{"authors":{"author":[{"@pid":"28/6227","text":"Hang-Hyun Jo"},{"@pid":"22/3233","text":"Young-Ho Eom"}]},"title":"Generalized friendship paradox in networks with tunable degree-attribute correlation.","venue":"CoRR","volume":"abs/1405.1279","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/JoE14","ee":"http://arxiv.org/abs/1405.1279","url":"https://dblp.org/rec/journals/corr/JoE14"}, "url":"URL#3973535" }, { "@score":"1", "@id":"3973544", "info":{"authors":{"author":[{"@pid":"02/452","text":"Moa Johansson"},{"@pid":"124/5885","text":"Dan Rosén"},{"@pid":"40/7376","text":"Nicholas Smallbone"},{"@pid":"74/2610","text":"Koen Claessen"}]},"title":"Hipster: Integrating Theory Exploration in a Proof Assistant.","venue":"CoRR","volume":"abs/1405.3426","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/JohanssonRSC14","ee":"http://arxiv.org/abs/1405.3426","url":"https://dblp.org/rec/journals/corr/JohanssonRSC14"}, "url":"URL#3973544" }, { "@score":"1", "@id":"3973550", "info":{"authors":{"author":[{"@pid":"127/6882","text":"Samuel D. Johnson"},{"@pid":"47/2376","text":"Tsai-Ching Lu"}]},"title":"Algorithm Instance Games.","venue":"CoRR","volume":"abs/1405.3296","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/JohnsonL14","ee":"http://arxiv.org/abs/1405.3296","url":"https://dblp.org/rec/journals/corr/JohnsonL14"}, "url":"URL#3973550" }, { "@score":"1", "@id":"3973579", "info":{"authors":{"author":[{"@pid":"60/8399","text":"Joshua Mason Joseph"},{"@pid":"03/5863","text":"Javier Vélez"},{"@pid":"32/2668","text":"Nicholas Roy"}]},"title":"Structural Return Maximization for Reinforcement Learning.","venue":"CoRR","volume":"abs/1405.2606","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/JosephVR14","ee":"http://arxiv.org/abs/1405.2606","url":"https://dblp.org/rec/journals/corr/JosephVR14"}, "url":"URL#3973579" }, { "@score":"1", "@id":"3973587", "info":{"authors":{"author":[{"@pid":"119/3872","text":"Gauri Joshi"},{"@pid":"47/2142","text":"Yuval Kochman"},{"@pid":"94/5969","text":"Gregory W. Wornell"}]},"title":"Throughput-Smoothness Trade-offs in Multicasting of an Ordered Packet Stream.","venue":"CoRR","volume":"abs/1405.3697","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/JoshiKW14a","ee":"http://arxiv.org/abs/1405.3697","url":"https://dblp.org/rec/journals/corr/JoshiKW14a"}, "url":"URL#3973587" }, { "@score":"1", "@id":"3973590", "info":{"authors":{"author":[{"@pid":"85/3641","text":"Michael Joswig"},{"@pid":"89/296","text":"Frank H. Lutz"},{"@pid":"146/0668","text":"Mimi Tsuruga"}]},"title":"Heuristics for Sphere Recognition.","venue":"CoRR","volume":"abs/1405.3848","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/JoswigLT14","ee":"http://arxiv.org/abs/1405.3848","url":"https://dblp.org/rec/journals/corr/JoswigLT14"}, "url":"URL#3973590" }, { "@score":"1", "@id":"3973612", "info":{"authors":{"author":[{"@pid":"34/2955","text":"Nevin Vunka Jungum"},{"@pid":"59/7381","text":"Razvi Doomun"},{"@pid":"57/4973","text":"Soulakshmee D. Ghurbhurrun"},{"@pid":"28/1057","text":"Sameerchand Pudaruth"}]},"title":"Collaborative Driving Support System in Mobile Pervasive Environments.","venue":"CoRR","volume":"abs/1405.6218","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/JungumDGP14","ee":"http://arxiv.org/abs/1405.6218","url":"https://dblp.org/rec/journals/corr/JungumDGP14"}, "url":"URL#3973612" }, { "@score":"1", "@id":"3973627", "info":{"authors":{"author":[{"@pid":"146/0655","text":"K. Jyothi"},{"@pid":"86/6835","text":"C. J. Prabhakar"}]},"title":"Multi Modal Face Recognition Using Block Based Curvelet Features.","venue":"CoRR","volume":"abs/1405.2641","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/JyothiP14","ee":"http://arxiv.org/abs/1405.2641","url":"https://dblp.org/rec/journals/corr/JyothiP14"}, "url":"URL#3973627" }, { "@score":"1", "@id":"3973647", "info":{"authors":{"author":[{"@pid":"17/9715","text":"Swanand Kadhe"},{"@pid":"84/3296","text":"Alex Sprintson"}]},"title":"Weakly Secure Regenerating Codes for Distributed Storage.","venue":"CoRR","volume":"abs/1405.2894","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/KadheS14","ee":"http://arxiv.org/abs/1405.2894","url":"https://dblp.org/rec/journals/corr/KadheS14"}, "url":"URL#3973647" }, { "@score":"1", "@id":"3973655", "info":{"authors":{"author":{"@pid":"146/0860","text":"Pawel Kaftan"}},"title":"A more efficient algorithm for an NP-complete problem.","venue":"CoRR","volume":"abs/1405.6347","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/Kaftan14","ee":"http://arxiv.org/abs/1405.6347","url":"https://dblp.org/rec/journals/corr/Kaftan14"}, "url":"URL#3973655" }, { "@score":"1", "@id":"3973658", "info":{"authors":{"author":{"@pid":"137/8097","text":"Brijender Kahanwal"}},"title":"Comparative Study of the Function Overloading and Function Overriding Using C++.","venue":"CoRR","volume":"abs/1405.1302","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/Kahanwal14b","ee":"http://arxiv.org/abs/1405.1302","url":"https://dblp.org/rec/journals/corr/Kahanwal14b"}, "url":"URL#3973658" }, { "@score":"1", "@id":"3973671", "info":{"authors":{"author":[{"@pid":"146/0515","text":"Kazuki Kajiwara"},{"@pid":"00/11469","text":"Tuan Phung-Duc"}]},"title":"Asymptotic and Numerical Analysis of Multiserver Retrial Queue with Guard Channel for Cellular Networks.","venue":"CoRR","volume":"abs/1405.1916","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/KajiwaraP14","ee":"http://arxiv.org/abs/1405.1916","url":"https://dblp.org/rec/journals/corr/KajiwaraP14"}, "url":"URL#3973671" }, { "@score":"1", "@id":"3973680", "info":{"authors":{"author":[{"@pid":"146/0936","text":"Sanket S. Kalamkar"},{"@pid":"66/6866","text":"Adrish Banerjee"}]},"title":"On the Effect of Primary User Traffic on Secondary Throughput and Outage Probability Under Rayleigh Flat Fading Channel.","venue":"CoRR","volume":"abs/1405.2809","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/KalamkarB14","ee":"http://arxiv.org/abs/1405.2809","url":"https://dblp.org/rec/journals/corr/KalamkarB14"}, "url":"URL#3973680" }, { "@score":"1", "@id":"3973703", "info":{"authors":{"author":[{"@pid":"30/5217","text":"Cezary Kaliszyk"},{"@pid":"63/5214","text":"Josef Urban"},{"@pid":"66/1279","text":"Jirí Vyskocil"},{"@pid":"47/2251","text":"Herman Geuvers"}]},"title":"Developing Corpus-based Translation Methods between Informal and Formal Mathematics: Project Description.","venue":"CoRR","volume":"abs/1405.3451","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/KaliszykUVG14","ee":"http://arxiv.org/abs/1405.3451","url":"https://dblp.org/rec/journals/corr/KaliszykUVG14"}, "url":"URL#3973703" }, { "@score":"1", "@id":"3973731", "info":{"authors":{"author":[{"@pid":"146/0935","text":"Rubi Kambo"},{"@pid":"146/0601","text":"Amit Yerpude"}]},"title":"Classification of Basmati Rice Grain Variety using Image Processing and Principal Component Analysis.","venue":"CoRR","volume":"abs/1405.7626","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/KamboY14","ee":"http://arxiv.org/abs/1405.7626","url":"https://dblp.org/rec/journals/corr/KamboY14"}, "url":"URL#3973731" }, { "@score":"1", "@id":"3973739", "info":{"authors":{"author":{"@pid":"47/6815","text":"Florian Kammueller"}},"title":"Confinement for Active Objects.","venue":"CoRR","volume":"abs/1405.0867","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/Kammueller14","ee":"http://arxiv.org/abs/1405.0867","url":"https://dblp.org/rec/journals/corr/Kammueller14"}, "url":"URL#3973739" }, { "@score":"1", "@id":"3973757", "info":{"authors":{"author":[{"@pid":"146/0454","text":"V. Kandiah"},{"@pid":"00/1344","text":"Bertrand Georgeot"},{"@pid":"82/6927","text":"Olivier Giraud"}]},"title":"Move ordering and communities in complex networks describing the game of go.","venue":"CoRR","volume":"abs/1405.6077","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/KandiahGG14","ee":"http://arxiv.org/abs/1405.6077","url":"https://dblp.org/rec/journals/corr/KandiahGG14"}, "url":"URL#3973757" }, { "@score":"1", "@id":"3973781", "info":{"authors":{"author":[{"@pid":"59/3077","text":"Serguei Kaniovski"},{"@pid":"90/4098","text":"Sascha Kurz"}]},"title":"The average representation - a cornucopia of power indices?","venue":"CoRR","volume":"abs/1405.0825","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/KaniovskiK14","ee":"http://arxiv.org/abs/1405.0825","url":"https://dblp.org/rec/journals/corr/KaniovskiK14"}, "url":"URL#3973781" }, { "@score":"1", "@id":"3973797", "info":{"authors":{"author":[{"@pid":"146/0779","text":"David T. H. Kao"},{"@pid":"63/1946","text":"Amir Salman Avestimehr"}]},"title":"Linear Degrees of Freedom of the MIMO X-Channel with Delayed CSIT.","venue":"CoRR","volume":"abs/1405.1091","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/KaoA14","ee":"http://arxiv.org/abs/1405.1091","url":"https://dblp.org/rec/journals/corr/KaoA14"}, "url":"URL#3973797" }, { "@score":"1", "@id":"3973807", "info":{"authors":{"author":{"@pid":"149/2655","text":"Faruk Karaaslan"}},"title":"Neutrosophic soft sets with applications in decision making.","venue":"CoRR","volume":"abs/1405.7964","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/Karaaslan14a","ee":"http://arxiv.org/abs/1405.7964","url":"https://dblp.org/rec/journals/corr/Karaaslan14a"}, "url":"URL#3973807" }, { "@score":"1", "@id":"3973825", "info":{"authors":{"author":[{"@pid":"51/7805","text":"Thomas Karcher"},{"@pid":"146/0631","text":"Christopher Guckes"},{"@pid":"t/WalterFTichy","text":"Walter F. Tichy"}]},"title":"Autotuning and Self-Adaptability in Concurrency Libraries.","venue":"CoRR","volume":"abs/1405.2918","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/KarcherGT14","ee":"http://arxiv.org/abs/1405.2918","url":"https://dblp.org/rec/journals/corr/KarcherGT14"}, "url":"URL#3973825" }, { "@score":"1", "@id":"3973832", "info":{"authors":{"author":[{"@pid":"87/4746","text":"S. Karimi"},{"@pid":"28/1549","text":"K. B. Nakshatrala"}]},"title":"A monolithic multi-time-step computational framework for advective-diffusive-reactive transient systems with disparate scales.","venue":"CoRR","volume":"abs/1405.3230","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/KarimiN14","ee":"http://arxiv.org/abs/1405.3230","url":"https://dblp.org/rec/journals/corr/KarimiN14"}, "url":"URL#3973832" }, { "@score":"1", "@id":"3973858", "info":{"authors":{"author":[{"@pid":"27/7164","text":"Brian Karrer"},{"@pid":"n/MEJNewman","text":"Mark E. J. Newman"},{"@pid":"27/6064","text":"Lenka Zdeborová"}]},"title":"Percolation on sparse networks.","venue":"CoRR","volume":"abs/1405.0483","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/KarrerNZ14","ee":"http://arxiv.org/abs/1405.0483","url":"https://dblp.org/rec/journals/corr/KarrerNZ14"}, "url":"URL#3973858" }, { "@score":"1", "@id":"3973860", "info":{"authors":{"author":[{"@pid":"13/8264","text":"Márton Karsai"},{"@pid":"90/9760","text":"Gerardo Iñiguez"},{"@pid":"45/6349","text":"Kimmo Kaski"},{"@pid":"51/8194","text":"János Kertész"}]},"title":"Complex contagion process in spreading of online innovation.","venue":"CoRR","volume":"abs/1405.6879","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/KarsaiIKK14","ee":"http://arxiv.org/abs/1405.6879","url":"https://dblp.org/rec/journals/corr/KarsaiIKK14"}, "url":"URL#3973860" }, { "@score":"1", "@id":"3973898", "info":{"authors":{"author":[{"@pid":"62/3145","text":"Adam Kasperski"},{"@pid":"41/10526","text":"Adam Kurpisz"},{"@pid":"72/5778","text":"Pawel Zielinski 0001"}]},"title":"Approximability of the robust representatives selection problem.","venue":"CoRR","volume":"abs/1405.5381","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/KasperskiKZ14","ee":"http://arxiv.org/abs/1405.5381","url":"https://dblp.org/rec/journals/corr/KasperskiKZ14"}, "url":"URL#3973898" }, { "@score":"1", "@id":"3973899", "info":{"authors":{"author":[{"@pid":"62/3145","text":"Adam Kasperski"},{"@pid":"72/5778","text":"Pawel Zielinski 0001"}]},"title":"Single machine scheduling problems with uncertain parameters and the OWA criterion.","venue":"CoRR","volume":"abs/1405.5371","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/KasperskiZ14","ee":"http://arxiv.org/abs/1405.5371","url":"https://dblp.org/rec/journals/corr/KasperskiZ14"}, "url":"URL#3973899" }, { "@score":"1", "@id":"3973900", "info":{"authors":{"author":[{"@pid":"62/3145","text":"Adam Kasperski"},{"@pid":"72/5778","text":"Pawel Zielinski 0001"}]},"title":"Complexity of the robust weighted independent set problems on interval graphs.","venue":"CoRR","volume":"abs/1405.5376","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/KasperskiZ14a","ee":"http://arxiv.org/abs/1405.5376","url":"https://dblp.org/rec/journals/corr/KasperskiZ14a"}, "url":"URL#3973900" }, { "@score":"1", "@id":"3973902", "info":{"authors":{"author":[{"@pid":"146/0436","text":"Moritz Kassner"},{"@pid":"146/0769","text":"William Patera"},{"@pid":"67/1543","text":"Andreas Bulling"}]},"title":"Pupil: An Open Source Platform for Pervasive Eye Tracking and Mobile Gaze-based Interaction.","venue":"CoRR","volume":"abs/1405.0006","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/KassnerPB14","ee":"http://arxiv.org/abs/1405.0006","url":"https://dblp.org/rec/journals/corr/KassnerPB14"}, "url":"URL#3973902" }, { "@score":"1", "@id":"3973906", "info":{"authors":{"author":[{"@pid":"152/3700","text":"Sunil Kumar Katiyar"},{"@pid":"138/6208","text":"P. V. Arun"}]},"title":"Comparative analysis of common edge detection techniques in context of object extraction.","venue":"CoRR","volume":"abs/1405.6132","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/KatiyarA14","ee":"http://arxiv.org/abs/1405.6132","url":"https://dblp.org/rec/journals/corr/KatiyarA14"}, "url":"URL#3973906" }, { "@score":"1", "@id":"3973907", "info":{"authors":{"author":[{"@pid":"152/3700","text":"Sunil Kumar Katiyar"},{"@pid":"138/6208","text":"P. V. Arun"}]},"title":"A review over the applicability of image entropy in analyses of remote sensing datasets.","venue":"CoRR","volume":"abs/1405.6133","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/KatiyarA14a","ee":"http://arxiv.org/abs/1405.6133","url":"https://dblp.org/rec/journals/corr/KatiyarA14a"}, "url":"URL#3973907" }, { "@score":"1", "@id":"3973908", "info":{"authors":{"author":[{"@pid":"152/3700","text":"Sunil Kumar Katiyar"},{"@pid":"138/6208","text":"P. V. Arun"}]},"title":"Cellular Automata based adaptive resampling technique for the processing of remotely sensed imagery.","venue":"CoRR","volume":"abs/1405.6135","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/KatiyarA14b","ee":"http://arxiv.org/abs/1405.6135","url":"https://dblp.org/rec/journals/corr/KatiyarA14b"}, "url":"URL#3973908" }, { "@score":"1", "@id":"3973909", "info":{"authors":{"author":[{"@pid":"152/3700","text":"Sunil Kumar Katiyar"},{"@pid":"138/6208","text":"P. V. Arun"}]},"title":"An enhanced neural network based approach towards object extraction.","venue":"CoRR","volume":"abs/1405.6137","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/KatiyarA14c","ee":"http://arxiv.org/abs/1405.6137","url":"https://dblp.org/rec/journals/corr/KatiyarA14c"}, "url":"URL#3973909" }, { "@score":"1", "@id":"3973912", "info":{"authors":{"author":[{"@pid":"54/4482","text":"Sophia Katrenko"},{"@pid":"73/2717","text":"Pieter W. Adriaans"},{"@pid":"43/205","text":"Maarten van Someren"}]},"title":"Using Local Alignments for Relation Recognition.","venue":"CoRR","volume":"abs/1405.7713","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/KatrenkoAS14","ee":"http://arxiv.org/abs/1405.7713","url":"https://dblp.org/rec/journals/corr/KatrenkoAS14"}, "url":"URL#3973912" }, { "@score":"1", "@id":"3973931", "info":{"authors":{"author":[{"@pid":"67/11350","text":"Emilie Kaufmann"},{"@pid":"99/1572","text":"Olivier Cappé"},{"@pid":"62/6263","text":"Aurélien Garivier"}]},"title":"On the Complexity of A/B Testing.","venue":"CoRR","volume":"abs/1405.3224","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/KaufmannCG14","ee":"http://arxiv.org/abs/1405.3224","url":"https://dblp.org/rec/journals/corr/KaufmannCG14"}, "url":"URL#3973931" }, { "@score":"1", "@id":"3973934", "info":{"authors":{"author":{"@pid":"80/4424","text":"Prabhjot Kaur"}},"title":"Web Content Classification: A Survey.","venue":"CoRR","volume":"abs/1405.0580","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/Kaur14","ee":"http://arxiv.org/abs/1405.0580","url":"https://dblp.org/rec/journals/corr/Kaur14"}, "url":"URL#3973934" }, { "@score":"1", "@id":"3973941", "info":{"authors":{"author":{"@pid":"146/0521","text":"Manju Kaushik"}},"title":"System Software: Concepts and Approach.","venue":"CoRR","volume":"abs/1405.1505","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/Kaushik14","ee":"http://arxiv.org/abs/1405.1505","url":"https://dblp.org/rec/journals/corr/Kaushik14"}, "url":"URL#3973941" }, { "@score":"1", "@id":"3973945", "info":{"authors":{"author":[{"@pid":"146/0521","text":"Manju Kaushik"},{"@pid":"61/10935","text":"Rashmi Jain"}]},"title":"Natural User Interfaces: Trend in Virtual Interaction.","venue":"CoRR","volume":"abs/1405.0101","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/KaushikJ14b","ee":"http://arxiv.org/abs/1405.0101","url":"https://dblp.org/rec/journals/corr/KaushikJ14b"}, "url":"URL#3973945" }, { "@score":"1", "@id":"3973963", "info":{"authors":{"author":[{"@pid":"130/3903","text":"Abidin Kaya"},{"@pid":"94/5991","text":"Bahattin Yildiz"},{"@pid":"68/1511","text":"Irfan Siap"}]},"title":"New extremal binary self-dual codes from F_4 + uF_4-lifts of quadratic double circulant codes over F_4.","venue":"CoRR","volume":"abs/1405.7147","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/KayaYS14","ee":"http://arxiv.org/abs/1405.7147","url":"https://dblp.org/rec/journals/corr/KayaYS14"}, "url":"URL#3973963" }, { "@score":"1", "@id":"3973965", "info":{"authors":{"author":[{"@pid":"82/8131","text":"Shahab Kaynama"},{"@pid":"41/311","text":"Jeremy H. Gillula"},{"@pid":"34/7142","text":"Claire J. Tomlin"}]},"title":"A sampling-based approach to scalable constraint satisfaction in linear sampled-data systems - Part I: Computation.","venue":"CoRR","volume":"abs/1405.2363","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/KaynamaGT14","ee":"http://arxiv.org/abs/1405.2363","url":"https://dblp.org/rec/journals/corr/KaynamaGT14"}, "url":"URL#3973965" }, { "@score":"1", "@id":"3973989", "info":{"authors":{"author":[{"@pid":"19/6234","text":"Jean-Marc Kelif"},{"@pid":"70/3238","text":"Olivier Simon"}]},"title":"Impact of Directional Receiving Antennas on Wireless Networks.","venue":"CoRR","volume":"abs/1405.3137","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/KelifS14","ee":"http://arxiv.org/abs/1405.3137","url":"https://dblp.org/rec/journals/corr/KelifS14"}, "url":"URL#3973989" }, { "@score":"1", "@id":"3973998", "info":{"authors":{"author":{"@pid":"198/5336","text":"Mina Kemiha"}},"title":"Empirical mode decomposition and normalshrink tresholding for speech denoising.","venue":"CoRR","volume":"abs/1405.7895","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/Kemiha14","ee":"http://arxiv.org/abs/1405.7895","url":"https://dblp.org/rec/journals/corr/Kemiha14"}, "url":"URL#3973998" }, { "@score":"1", "@id":"3974007", "info":{"authors":{"author":[{"@pid":"40/10716","text":"Richard W. Kenyon"},{"@pid":"28/6310","text":"Charles Radin"},{"@pid":"20/6179-2","text":"Kui Ren 0002"},{"@pid":"129/7351","text":"Lorenzo Sadun"}]},"title":"Multipodal Structure and Phase Transitions in Large Constrained Graphs.","venue":"CoRR","volume":"abs/1405.0599","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/KenyonRRS14","ee":"http://arxiv.org/abs/1405.0599","url":"https://dblp.org/rec/journals/corr/KenyonRRS14"}, "url":"URL#3974007" }, { "@score":"1", "@id":"3974014", "info":{"authors":{"author":[{"@pid":"86/676","text":"Anne-Marie Kermarrec"},{"@pid":"97/766","text":"Christopher Thraves"}]},"title":"Signed graph embedding: when everybody can sit closer to friends than enemies.","venue":"CoRR","volume":"abs/1405.5023","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/KermarrecT14","ee":"http://arxiv.org/abs/1405.5023","url":"https://dblp.org/rec/journals/corr/KermarrecT14"}, "url":"URL#3974014" }, { "@score":"1", "@id":"3974021", "info":{"authors":{"author":[{"@pid":"26/5304","text":"Florian Kerschbaum"},{"@pid":"70/2640","text":"Martin Beck"},{"@pid":"35/3039","text":"Dagmar Schönfeld"}]},"title":"Inference Control for Privacy-Preserving Genome Matching.","venue":"CoRR","volume":"abs/1405.0205","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/KerschbaumBS14","ee":"http://arxiv.org/abs/1405.0205","url":"https://dblp.org/rec/journals/corr/KerschbaumBS14"}, "url":"URL#3974021" }, { "@score":"1", "@id":"3974022", "info":{"authors":{"author":{"@pid":"133/8603","text":"Nicholas Kersting"}},"title":"Fast and Fuzzy Private Set Intersection.","venue":"CoRR","volume":"abs/1405.3272","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/Kersting14","ee":"http://arxiv.org/abs/1405.3272","url":"https://dblp.org/rec/journals/corr/Kersting14"}, "url":"URL#3974022" }, { "@score":"1", "@id":"3974031", "info":{"authors":{"author":[{"@pid":"k/ChristophWKessler","text":"Christoph W. Keßler"},{"@pid":"73/11156","text":"Usman Dastgeer"},{"@pid":"72/2266-1","text":"Lu Li 0001"}]},"title":"Optimized Composition: Generating Efficient Code for Heterogeneous Systems from Multi-Variant Components, Skeletons and Containers.","venue":"CoRR","volume":"abs/1405.2915","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/KesslerDL14","ee":"http://arxiv.org/abs/1405.2915","url":"https://dblp.org/rec/journals/corr/KesslerDL14"}, "url":"URL#3974031" }, { "@score":"1", "@id":"3974032", "info":{"authors":{"author":[{"@pid":"82/11470","text":"Pramod Kumar Kewat"},{"@pid":"146/0884","text":"Bappaditya Ghosh"},{"@pid":"146/0596","text":"Sukhamoy Pattanayak"}]},"title":"Cyclic codes over the ring $ \\Z_p[u, v]/\\langle u2, v2, uv-vu\\rangle$.","venue":"CoRR","volume":"abs/1405.5981","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/KewatGP14","ee":"http://arxiv.org/abs/1405.5981","url":"https://dblp.org/rec/journals/corr/KewatGP14"}, "url":"URL#3974032" }, { "@score":"1", "@id":"3974039", "info":{"authors":{"author":[{"@pid":"42/7974","text":"Mahmoud Khademi"},{"@pid":"31/739","text":"Louis-Philippe Morency"}]},"title":"Relative Facial Action Unit Detection.","venue":"CoRR","volume":"abs/1405.0085","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/KhademiM14","ee":"http://arxiv.org/abs/1405.0085","url":"https://dblp.org/rec/journals/corr/KhademiM14"}, "url":"URL#3974039" }, { "@score":"1", "@id":"3974040", "info":{"authors":{"author":[{"@pid":"146/0643","text":"Prajakta P. Khairnar"},{"@pid":"146/0371","text":"C. A. Manjare"}]},"title":"Image Resolution and Contrast Enhancement of Satellite Geographical Images with Removal of Noise using Wavelet Transforms.","venue":"CoRR","volume":"abs/1405.1967","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/KhairnarM14","ee":"http://arxiv.org/abs/1405.1967","url":"https://dblp.org/rec/journals/corr/KhairnarM14"}, "url":"URL#3974040" }, { "@score":"1", "@id":"3974057", "info":{"authors":{"author":[{"@pid":"81/8334","text":"Nilesh Khambekar"},{"@pid":"78/1741","text":"Chad M. Spooner"},{"@pid":"c/VipinChaudhary","text":"Vipin Chaudhary"}]},"title":"Going Towards Discretized Spectrum Space: Quantification of Spectrum Consumption Spaces and a Quantified Spectrum Access Paradigm.","venue":"CoRR","volume":"abs/1405.2216","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/KhambekarSC14","ee":"http://arxiv.org/abs/1405.2216","url":"https://dblp.org/rec/journals/corr/KhambekarSC14"}, "url":"URL#3974057" }, { "@score":"1", "@id":"3974066", "info":{"authors":{"author":[{"@pid":"141/0712","text":"Parvez Mahmood Khan"},{"@pid":"43/1029","text":"M. M. Sufyan Beg"}]},"title":"Measuring Cost of Quality (CoQ) on SDLC Projects is Indispensible for Effective Software Quality Assurance.","venue":"CoRR","volume":"abs/1405.4824","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/KhanB14","ee":"http://arxiv.org/abs/1405.4824","url":"https://dblp.org/rec/journals/corr/KhanB14"}, "url":"URL#3974066" }, { "@score":"1", "@id":"3974067", "info":{"authors":{"author":[{"@pid":"141/0712","text":"Parvez Mahmood Khan"},{"@pid":"43/1029","text":"M. M. Sufyan Beg"}]},"title":"Application of Sizing Estimation Techniques for Business Critical Software Project Management.","venue":"CoRR","volume":"abs/1405.6335","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/KhanB14a","ee":"http://arxiv.org/abs/1405.6335","url":"https://dblp.org/rec/journals/corr/KhanB14a"}, "url":"URL#3974067" }, { "@score":"1", "@id":"3974083", "info":{"authors":{"author":{"@pid":"123/4604","text":"Mustafa Khandwawala"}},"title":"Belief propagation for minimum weight many-to-one matchings in the random complete graph.","venue":"CoRR","volume":"abs/1405.1292","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/Khandwawala14","ee":"http://arxiv.org/abs/1405.1292","url":"https://dblp.org/rec/journals/corr/Khandwawala14"}, "url":"URL#3974083" }, { "@score":"1", "@id":"3974084", "info":{"authors":{"author":{"@pid":"123/4604","text":"Mustafa Khandwawala"}},"title":"Solutions to recursive distributional equations for the mean-field TSP and related problems.","venue":"CoRR","volume":"abs/1405.1316","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/Khandwawala14a","ee":"http://arxiv.org/abs/1405.1316","url":"https://dblp.org/rec/journals/corr/Khandwawala14a"}, "url":"URL#3974084" }, { "@score":"1", "@id":"3974116", "info":{"authors":{"author":[{"@pid":"68/3639","text":"Samaneh Khoshrou"},{"@pid":"65/5236","text":"Jaime S. Cardoso 0001"},{"@pid":"163/4492","text":"Luís Filipe Teixeira 0001"}]},"title":"Active Mining of Parallel Video Streams.","venue":"CoRR","volume":"abs/1405.3382","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/KhoshrouCT14","ee":"http://arxiv.org/abs/1405.3382","url":"https://dblp.org/rec/journals/corr/KhoshrouCT14"}, "url":"URL#3974116" }, { "@score":"1", "@id":"3974124", "info":{"authors":{"author":[{"@pid":"142/2497","text":"Mboni Kibelloh"},{"@pid":"03/5903","text":"Yukun Bao"}]},"title":"Perceptions of International Female Students Towards E-learning in Resolving High Education and Family Role Strain.","venue":"CoRR","volume":"abs/1405.3377","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/KibellohB14","ee":"http://arxiv.org/abs/1405.3377","url":"https://dblp.org/rec/journals/corr/KibellohB14"}, "url":"URL#3974124" }, { "@score":"1", "@id":"3974125", "info":{"authors":{"author":[{"@pid":"142/2497","text":"Mboni Kibelloh"},{"@pid":"03/5903","text":"Yukun Bao"}]},"title":"Can Online MBA Programs Allow Professional Working Mothers to Balance Work, Family, and Career Progression? A Case Study in China.","venue":"CoRR","volume":"abs/1405.3381","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/KibellohB14a","ee":"http://arxiv.org/abs/1405.3381","url":"https://dblp.org/rec/journals/corr/KibellohB14a"}, "url":"URL#3974125" }, { "@score":"1", "@id":"3974126", "info":{"authors":{"author":[{"@pid":"64/607","text":"Mario Kicherer"},{"@pid":"52/6717","text":"Wolfgang Karl"}]},"title":"Heterogeneity-aware Fault Tolerance using a Self-Organizing Runtime System.","venue":"CoRR","volume":"abs/1405.2912","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/KichererK14","ee":"http://arxiv.org/abs/1405.2912","url":"https://dblp.org/rec/journals/corr/KichererK14"}, "url":"URL#3974126" }, { "@score":"1", "@id":"3974132", "info":{"authors":{"author":[{"@pid":"94/7632","text":"Takayuki Kihara"},{"@pid":"97/6798","text":"Arno Pauly"}]},"title":"Point degree spectra of represented spaces.","venue":"CoRR","volume":"abs/1405.6866","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/KiharaP14","ee":"http://arxiv.org/abs/1405.6866","url":"https://dblp.org/rec/journals/corr/KiharaP14"}, "url":"URL#3974132" }, { "@score":"1", "@id":"3974150", "info":{"authors":{"author":[{"@pid":"07/1501","text":"Yoon Kim"},{"@pid":"117/4855","text":"Yi-I Chiu"},{"@pid":"146/0437","text":"Kentaro Hanaki"},{"@pid":"146/0546","text":"Darshan Hegde"},{"@pid":"18/5906","text":"Slav Petrov"}]},"title":"Temporal Analysis of Language through Neural Language Models.","venue":"CoRR","volume":"abs/1405.3515","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/KimCHHP14","ee":"http://arxiv.org/abs/1405.3515","url":"https://dblp.org/rec/journals/corr/KimCHHP14"}, "url":"URL#3974150" }, { "@score":"1", "@id":"3974164", "info":{"authors":{"author":[{"@pid":"51/3339","text":"Dongmyoung Kim"},{"@pid":"146/0594","text":"Taejun Park"},{"@pid":"95/3705","text":"Hyoil Kim"},{"@pid":"c/SunghyunChoi","text":"Sunghyun Choi 0001"}]},"title":"Load Balancing in Two-Tier Cellular Networks with Open and Hybrid Access Femtocells.","venue":"CoRR","volume":"abs/1405.6773","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/KimPKC14","ee":"http://arxiv.org/abs/1405.6773","url":"https://dblp.org/rec/journals/corr/KimPKC14"}, "url":"URL#3974164" }, { "@score":"1", "@id":"3974173", "info":{"authors":{"author":[{"@pid":"07/1501","text":"Yoon Kim"},{"@pid":"146/0819","text":"Owen Zhang"}]},"title":"Credibility Adjusted Term Frequency: A Supervised Term Weighting Scheme for Sentiment Analysis and Text Classification.","venue":"CoRR","volume":"abs/1405.3518","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/KimZ14","ee":"http://arxiv.org/abs/1405.3518","url":"https://dblp.org/rec/journals/corr/KimZ14"}, "url":"URL#3974173" }, { "@score":"1", "@id":"3974176", "info":{"authors":{"author":{"@pid":"33/236","text":"Chris Kimble"}},"title":"What Cost Knowledge Management? The Example of Infosys.","venue":"CoRR","volume":"abs/1405.1679","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/Kimble14a","ee":"http://arxiv.org/abs/1405.1679","url":"https://dblp.org/rec/journals/corr/Kimble14a"}, "url":"URL#3974176" }, { "@score":"1", "@id":"3974177", "info":{"authors":{"author":{"@pid":"33/236","text":"Chris Kimble"}},"title":"Electronic Health Records: Cure-all or Chronic Condition?","venue":"CoRR","volume":"abs/1405.2088","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/Kimble14b","ee":"http://arxiv.org/abs/1405.2088","url":"https://dblp.org/rec/journals/corr/Kimble14b"}, "url":"URL#3974177" }, { "@score":"1", "@id":"3974179", "info":{"authors":{"author":[{"@pid":"146/0430","text":"Ben Kimmett"},{"@pid":"t/AlexThomo","text":"Alex Thomo"},{"@pid":"v/SrinivasanVenkatesh","text":"S. Venkatesh 0001"}]},"title":"Three-Way Joins on MapReduce: An Experimental Study.","venue":"CoRR","volume":"abs/1405.4027","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/KimmettTV14","ee":"http://arxiv.org/abs/1405.4027","url":"https://dblp.org/rec/journals/corr/KimmettTV14"}, "url":"URL#3974179" }, { "@score":"1", "@id":"3974187", "info":{"authors":{"author":[{"@pid":"143/0676","text":"Alon Kipnis"},{"@pid":"g/AndreaJGoldsmith","text":"Andrea J. Goldsmith"},{"@pid":"34/2720","text":"Tsachy Weissman"},{"@pid":"e/YoninaCEldar","text":"Yonina C. Eldar"}]},"title":"Distortion-Rate Function of Sub-Nyquist Sampled Gaussian Sources.","venue":"CoRR","volume":"abs/1405.5329","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/KipnisGWE14","ee":"http://arxiv.org/abs/1405.5329","url":"https://dblp.org/rec/journals/corr/KipnisGWE14"}, "url":"URL#3974187" }, { "@score":"1", "@id":"3974224", "info":{"authors":{"author":{"@pid":"95/8910","text":"Lorenz Klaus"}},"title":"A Strongly Polynomial Reduction for Linear Programs over Grids.","venue":"CoRR","volume":"abs/1405.1827","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/Klaus14","ee":"http://arxiv.org/abs/1405.1827","url":"https://dblp.org/rec/journals/corr/Klaus14"}, "url":"URL#3974224" }, { "@score":"1", "@id":"3974225", "info":{"authors":{"author":[{"@pid":"10/8821","text":"Pavel Klavík"},{"@pid":"49/9752","text":"A. Cristiano I. Malossi"},{"@pid":"38/459","text":"Constantine Bekas"},{"@pid":"14/6780","text":"Alessandro Curioni"}]},"title":"Changing Computing Paradigms Towards Power Efficiency.","venue":"CoRR","volume":"abs/1405.4644","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/KlavikMBC14","ee":"http://arxiv.org/abs/1405.4644","url":"https://dblp.org/rec/journals/corr/KlavikMBC14"}, "url":"URL#3974225" }, { "@score":"1", "@id":"3974233", "info":{"authors":{"author":[{"@pid":"k/JonMKleinberg","text":"Jon M. Kleinberg"},{"@pid":"89/9697","text":"Sigal Oren"}]},"title":"Time-Inconsistent Planning: A Computational Problem in Behavioral Economics.","venue":"CoRR","volume":"abs/1405.1254","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/KleinbergO14","ee":"http://arxiv.org/abs/1405.1254","url":"https://dblp.org/rec/journals/corr/KleinbergO14"}, "url":"URL#3974233" }, { "@score":"1", "@id":"3974252", "info":{"authors":{"author":{"@pid":"06/7589","text":"Andreas Klöckner"}},"title":"Loo.py: transformation-based code generation for GPUs and CPUs.","venue":"CoRR","volume":"abs/1405.7470","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/Klockner14","ee":"http://arxiv.org/abs/1405.7470","url":"https://dblp.org/rec/journals/corr/Klockner14"}, "url":"URL#3974252" }, { "@score":"1", "@id":"3974271", "info":{"authors":{"author":[{"@pid":"99/6145","text":"David B. Knoester"},{"@pid":"83/229","text":"Heather Goldsby"},{"@pid":"36/1930","text":"Christoph Adami"}]},"title":"Leveraging Evolutionary Search to Discover Self-Adaptive and Self-Organizing Cellular Automata.","venue":"CoRR","volume":"abs/1405.4322","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/KnoesterGA14","ee":"http://arxiv.org/abs/1405.4322","url":"https://dblp.org/rec/journals/corr/KnoesterGA14"}, "url":"URL#3974271" }, { "@score":"1", "@id":"3974287", "info":{"authors":{"author":[{"@pid":"132/8977","text":"Tomás Kociský"},{"@pid":"127/0228","text":"Karl Moritz Hermann"},{"@pid":"96/4705","text":"Phil Blunsom"}]},"title":"Learning Bilingual Word Representations by Marginalizing Alignments.","venue":"CoRR","volume":"abs/1405.0947","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/KociskyHB14","ee":"http://arxiv.org/abs/1405.0947","url":"https://dblp.org/rec/journals/corr/KociskyHB14"}, "url":"URL#3974287" }, { "@score":"1", "@id":"3974300", "info":{"authors":{"author":{"@pid":"15/5669","text":"Andrea Kohlhase"}},"title":"Search Interfaces for Mathematicians.","venue":"CoRR","volume":"abs/1405.3758","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/Kohlhase14","ee":"http://arxiv.org/abs/1405.3758","url":"https://dblp.org/rec/journals/corr/Kohlhase14"}, "url":"URL#3974300" }, { "@score":"1", "@id":"3974322", "info":{"authors":{"author":[{"@pid":"89/3764","text":"Vladimir Kolmogorov"},{"@pid":"159/1618","text":"Michal Rolínek"}]},"title":"Superconcentrators of Density 25.3.","venue":"CoRR","volume":"abs/1405.7828","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/KolmogorovR14","ee":"http://arxiv.org/abs/1405.7828","url":"https://dblp.org/rec/journals/corr/KolmogorovR14"}, "url":"URL#3974322" }, { "@score":"1", "@id":"3974327", "info":{"authors":{"author":[{"@pid":"129/1571","text":"Ritesh Kolte"},{"@pid":"12/4534","text":"Ayfer Özgür"},{"@pid":"d/SNDiggavi","text":"Suhas N. Diggavi"}]},"title":"When are dynamic relaying strategies necessary in half-duplex wireless networks?","venue":"CoRR","volume":"abs/1405.1782","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/KolteOD14","ee":"http://arxiv.org/abs/1405.1782","url":"https://dblp.org/rec/journals/corr/KolteOD14"}, "url":"URL#3974327" }, { "@score":"1", "@id":"3974336", "info":{"authors":{"author":[{"@pid":"10/6764","text":"Anvesh Komuravelli"},{"@pid":"44/3532","text":"Arie Gurfinkel"},{"@pid":"79/5752","text":"Sagar Chaki"}]},"title":"SMT-based Model Checking for Recursive Programs.","venue":"CoRR","volume":"abs/1405.4028","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/KomuravelliGC14","ee":"http://arxiv.org/abs/1405.4028","url":"https://dblp.org/rec/journals/corr/KomuravelliGC14"}, "url":"URL#3974336" }, { "@score":"1", "@id":"3974345", "info":{"authors":{"author":[{"@pid":"56/1470","text":"Boris Konev"},{"@pid":"73/6140","text":"Alexei Lisitsa 0001"}]},"title":"Computer-Aided Proof of Erdos Discrepancy Properties.","venue":"CoRR","volume":"abs/1405.3097","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/KonevL14a","ee":"http://arxiv.org/abs/1405.3097","url":"https://dblp.org/rec/journals/corr/KonevL14a"}, "url":"URL#3974345" }, { "@score":"1", "@id":"3974375", "info":{"authors":{"author":[{"@pid":"140/2303","text":"Dominik Kopczynski"},{"@pid":"r/SvenRahmann","text":"Sven Rahmann"}]},"title":"Using the Expectation Maximization Algorithm with Heterogeneous Mixture Components for the Analysis of Spectrometry Data.","venue":"CoRR","volume":"abs/1405.5501","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/KopczynskiR14","ee":"http://arxiv.org/abs/1405.5501","url":"https://dblp.org/rec/journals/corr/KopczynskiR14"}, "url":"URL#3974375" }, { "@score":"1", "@id":"3974398", "info":{"authors":{"author":[{"@pid":"127/8215","text":"Dani Korpi"},{"@pid":"74/6777","text":"Lauri Anttila"},{"@pid":"89/6586","text":"Mikko Valkama"}]},"title":"Reference Receiver Aided Digital Self-Interference Cancellation in MIMO Full-Duplex Transceivers.","venue":"CoRR","volume":"abs/1405.2202","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/KorpiAV14","ee":"http://arxiv.org/abs/1405.2202","url":"https://dblp.org/rec/journals/corr/KorpiAV14"}, "url":"URL#3974398" }, { "@score":"1", "@id":"3974412", "info":{"authors":{"author":[{"@pid":"146/0921","text":"David A. Kosower"},{"@pid":"146/0888","text":"Juan J. Lopez-Villarejo"}]},"title":"Flowgen: Flowchart-Based Documentation for C++ Codes.","venue":"CoRR","volume":"abs/1405.3240","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/KosowerL14","ee":"http://arxiv.org/abs/1405.3240","url":"https://dblp.org/rec/journals/corr/KosowerL14"}, "url":"URL#3974412" }, { "@score":"1", "@id":"3974424", "info":{"authors":{"author":[{"@pid":"120/1917","text":"Bojana Koteska"},{"@pid":"120/1894","text":"Anastas Misev"}]},"title":"Change Management and Version Control of Scientific Applications.","venue":"CoRR","volume":"abs/1405.1873","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/KoteskaM14","ee":"http://arxiv.org/abs/1405.1873","url":"https://dblp.org/rec/journals/corr/KoteskaM14"}, "url":"URL#3974424" }, { "@score":"1", "@id":"3974431", "info":{"authors":{"author":{"@pid":"146/0617","text":"Giorgos Kouropoulos"}},"title":"Calculation software for efficiency and penetration of a fibrous filter medium based on the mathematical models of air filtration.","venue":"CoRR","volume":"abs/1405.1300","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/Kouropoulos14","ee":"http://arxiv.org/abs/1405.1300","url":"https://dblp.org/rec/journals/corr/Kouropoulos14"}, "url":"URL#3974431" }, { "@score":"1", "@id":"3974437", "info":{"authors":{"author":[{"@pid":"91/9987","text":"Danai Koutra"},{"@pid":"33/6188","text":"Paul N. Bennett"},{"@pid":"h/EricHorvitz","text":"Eric Horvitz"}]},"title":"Events and Controversies: Influences of a Shocking News Event on Information Seeking.","venue":"CoRR","volume":"abs/1405.1486","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/KoutraBH14","ee":"http://arxiv.org/abs/1405.1486","url":"https://dblp.org/rec/journals/corr/KoutraBH14"}, "url":"URL#3974437" }, { "@score":"1", "@id":"3974485", "info":{"authors":{"author":{"@pid":"k/SimonKramer","text":"Simon Kramer 0001"}},"title":"A Galois-Connection between Cattell's and Szondi's Personality Profiles.","venue":"CoRR","volume":"abs/1405.0877","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/Kramer14b","ee":"http://arxiv.org/abs/1405.0877","url":"https://dblp.org/rec/journals/corr/Kramer14b"}, "url":"URL#3974485" }, { "@score":"1", "@id":"3974500", "info":{"authors":{"author":[{"@pid":"146/0700","text":"Kobi Kremnizer"},{"@pid":"146/0951","text":"André Ranchin"}]},"title":"Integrated Information-induced quantum collapse.","venue":"CoRR","volume":"abs/1405.0879","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/KremnizerR14","ee":"http://arxiv.org/abs/1405.0879","url":"https://dblp.org/rec/journals/corr/KremnizerR14"}, "url":"URL#3974500" }, { "@score":"1", "@id":"3974513", "info":{"authors":{"author":[{"@pid":"01/1516","text":"Vikram Krishnamurthy"},{"@pid":"35/8759","text":"Omid Namvar Gharehshiran"},{"@pid":"22/8514","text":"Maziyar Hamdi"}]},"title":"Interactive Sensing and Decision Making in Social Networks.","venue":"CoRR","volume":"abs/1405.1129","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/KrishnamurthyGH14","ee":"http://arxiv.org/abs/1405.1129","url":"https://dblp.org/rec/journals/corr/KrishnamurthyGH14"}, "url":"URL#3974513" }, { "@score":"1", "@id":"3974519", "info":{"authors":{"author":[{"@pid":"146/0428","text":"Nikhil Krishnan"},{"@pid":"57/1162","text":"Dror Baron"},{"@pid":"m/MehmetKivancMihcak","text":"Mehmet Kivanç Mihçak"}]},"title":"A Parallel Two-Pass MDL Context Tree Algorithm for Universal Source Coding.","venue":"CoRR","volume":"abs/1405.6322","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/KrishnanBM14","ee":"http://arxiv.org/abs/1405.6322","url":"https://dblp.org/rec/journals/corr/KrishnanBM14"}, "url":"URL#3974519" }, { "@score":"1", "@id":"3974521", "info":{"authors":{"author":[{"@pid":"57/4126","text":"Rajet Krishnan"},{"@pid":"121/8887","text":"Mohammad Reza Khanzadi"},{"@pid":"92/427","text":"N. Krishnan"},{"@pid":"95/3707","text":"Alexandre Graell i Amat"},{"@pid":"64/2235","text":"Thomas Eriksson"},{"@pid":"00/11106","text":"Nicolò Mazzali"},{"@pid":"c/GiulioColavolpe","text":"Giulio Colavolpe"}]},"title":"On the Impact of Oscillator Phase Noise on the Uplink Performance in a Massive MIMO-OFDM System.","venue":"CoRR","volume":"abs/1405.0669","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/KrishnanKKAEMC14","ee":"http://arxiv.org/abs/1405.0669","url":"https://dblp.org/rec/journals/corr/KrishnanKKAEMC14"}, "url":"URL#3974521" }, { "@score":"1", "@id":"3974535", "info":{"authors":{"author":[{"@pid":"82/11060","text":"Manfred Kröhnert"},{"@pid":"91/6559","text":"Nikolaus Vahrenkamp"},{"@pid":"22/11061","text":"Johny Paul"},{"@pid":"37/3374","text":"Walter Stechele"},{"@pid":"34/6686","text":"Tamim Asfour"}]},"title":"Resource Prediction for Humanoid Robots.","venue":"CoRR","volume":"abs/1405.2911","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/KrohnertVPSA14","ee":"http://arxiv.org/abs/1405.2911","url":"https://dblp.org/rec/journals/corr/KrohnertVPSA14"}, "url":"URL#3974535" }, { "@score":"1", "@id":"3974539", "info":{"authors":{"author":{"@pid":"146/0485","text":"Robert Krone"}},"title":"Numerical Hilbert functions for Macaulay2.","venue":"CoRR","volume":"abs/1405.5293","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/Krone14","ee":"http://arxiv.org/abs/1405.5293","url":"https://dblp.org/rec/journals/corr/Krone14"}, "url":"URL#3974539" }, { "@score":"1", "@id":"3974554", "info":{"authors":{"author":[{"@pid":"02/5321","text":"Meng-Lin Ku"},{"@pid":"88/2827-7","text":"Yan Chen 0007"},{"@pid":"68/3163","text":"K. J. Ray Liu"}]},"title":"Data-Driven Stochastic Models and Policies for Energy Harvesting Sensor Communications.","venue":"CoRR","volume":"abs/1405.7254","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/KuCL14","ee":"http://arxiv.org/abs/1405.7254","url":"https://dblp.org/rec/journals/corr/KuCL14"}, "url":"URL#3974554" }, { "@score":"1", "@id":"3974571", "info":{"authors":{"author":{"@pid":"146/0849","text":"Max Kuhn"}},"title":"Futility Analysis in the Cross-Validation of Machine Learning Models.","venue":"CoRR","volume":"abs/1405.6974","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/Kuhn14","ee":"http://arxiv.org/abs/1405.6974","url":"https://dblp.org/rec/journals/corr/Kuhn14"}, "url":"URL#3974571" }, { "@score":"1", "@id":"3974580", "info":{"authors":{"author":[{"@pid":"43/1108","text":"Margreta Kuijper"},{"@pid":"57/9219","text":"Anna-Lena Trautmann"}]},"title":"Iterative List-Decoding of Gabidulin Codes via Gröbner Based Interpolation.","venue":"CoRR","volume":"abs/1405.7152","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/KuijperT14a","ee":"http://arxiv.org/abs/1405.7152","url":"https://dblp.org/rec/journals/corr/KuijperT14a"}, "url":"URL#3974580" }, { "@score":"1", "@id":"3974630", "info":{"authors":{"author":[{"@pid":"25/7975","text":"Shamanth Kumar"},{"@pid":"92/309-1","text":"Huan Liu 0001"},{"@pid":"91/877","text":"Sameep Mehta"},{"@pid":"s/LVenkataSubramaniam","text":"L. Venkata Subramaniam"}]},"title":"From Tweets to Events: Exploring a Scalable Solution for Twitter Streams.","venue":"CoRR","volume":"abs/1405.1392","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/KumarLMS14","ee":"http://arxiv.org/abs/1405.1392","url":"https://dblp.org/rec/journals/corr/KumarLMS14"}, "url":"URL#3974630" }, { "@score":"1", "@id":"3974651", "info":{"authors":{"author":[{"@pid":"146/0383","text":"D. Sachin Kumar"},{"@pid":"146/0587","text":"P. R. Seshadri"},{"@pid":"146/0533","text":"N. Vaishnav"},{"@pid":"146/0906","text":"Saraswathi Janaki"}]},"title":"Real Time Speckle Image De-Noising.","venue":"CoRR","volume":"abs/1405.6166","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/KumarSVJ14","ee":"http://arxiv.org/abs/1405.6166","url":"https://dblp.org/rec/journals/corr/KumarSVJ14"}, "url":"URL#3974651" }, { "@score":"1", "@id":"3974653", "info":{"authors":{"author":[{"@pid":"132/4102","text":"Akshay Kumar"},{"@pid":"19/543","text":"Ravi Tandon"},{"@pid":"73/1462","text":"T. Charles Clancy"}]},"title":"On the Latency of Erasure-Coded Cloud Storage Systems.","venue":"CoRR","volume":"abs/1405.2833","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/KumarTC14","ee":"http://arxiv.org/abs/1405.2833","url":"https://dblp.org/rec/journals/corr/KumarTC14"}, "url":"URL#3974653" }, { "@score":"1", "@id":"3974664", "info":{"authors":{"author":[{"@pid":"133/8612","text":"Jeremy Kun"},{"@pid":"140/7206","text":"Rajmonda Caceres"},{"@pid":"140/7452","text":"Kevin Carter"}]},"title":"Locally Boosted Graph Aggregation for Community Detection.","venue":"CoRR","volume":"abs/1405.3210","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/KunCC14","ee":"http://arxiv.org/abs/1405.3210","url":"https://dblp.org/rec/journals/corr/KunCC14"}, "url":"URL#3974664" }, { "@score":"1", "@id":"3974666", "info":{"authors":{"author":[{"@pid":"127/6541","text":"Atreyee Kundu"},{"@pid":"12/3960","text":"Niranjan Balachandran"},{"@pid":"01/7143","text":"Debasish Chatterjee"}]},"title":"Algorithmic synthesis of stabilizing switching signals for discrete-time switched linear systems.","venue":"CoRR","volume":"abs/1405.1857","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/KunduBC14","ee":"http://arxiv.org/abs/1405.1857","url":"https://dblp.org/rec/journals/corr/KunduBC14"}, "url":"URL#3974666" }, { "@score":"1", "@id":"3974695", "info":{"authors":{"author":{"@pid":"90/4098","text":"Sascha Kurz"}},"title":"Ready for the design of voting rules?","venue":"CoRR","volume":"abs/1405.0823","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/Kurz14b","ee":"http://arxiv.org/abs/1405.0823","url":"https://dblp.org/rec/journals/corr/Kurz14b"}, "url":"URL#3974695" }, { "@score":"1", "@id":"3974698", "info":{"authors":{"author":[{"@pid":"129/1695","text":"Gerhard Kurz"},{"@pid":"129/1281","text":"Igor Gilitschenski"},{"@pid":"h/UDHanebeck","text":"Uwe D. Hanebeck"}]},"title":"Efficient Evaluation of the Probability Density Function of a Wrapped Normal Distribution.","venue":"CoRR","volume":"abs/1405.6397","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/KurzGH14","ee":"http://arxiv.org/abs/1405.6397","url":"https://dblp.org/rec/journals/corr/KurzGH14"}, "url":"URL#3974698" }, { "@score":"1", "@id":"3974699", "info":{"authors":{"author":[{"@pid":"90/4098","text":"Sascha Kurz"},{"@pid":"15/11216","text":"Nicola Maaser"},{"@pid":"65/11121","text":"Stefan Napel"},{"@pid":"22/5982","text":"Matthias Weber"}]},"title":"Mostly Sunny: A Forecast of Tomorrow's Power Index Research.","venue":"CoRR","volume":"abs/1405.1510","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/KurzMNW14","ee":"http://arxiv.org/abs/1405.1510","url":"https://dblp.org/rec/journals/corr/KurzMNW14"}, "url":"URL#3974699" }, { "@score":"1", "@id":"3974704", "info":{"authors":{"author":[{"@pid":"142/2536","text":"Atul Singh Kushwah"},{"@pid":"146/0661","text":"Sachin Manglasheril"}]},"title":"Performance Estimation of 2*3 MIMO-MC-CDMA in Rayleigh Fading Channel.","venue":"CoRR","volume":"abs/1405.6170","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/KushwahM14","ee":"http://arxiv.org/abs/1405.6170","url":"https://dblp.org/rec/journals/corr/KushwahM14"}, "url":"URL#3974704" }, { "@score":"1", "@id":"3974705", "info":{"authors":{"author":[{"@pid":"142/2536","text":"Atul Singh Kushwah"},{"@pid":"146/0661","text":"Sachin Manglasheril"}]},"title":"Performance Estimation of 2*3 MIMO-MC-CDMA using Convolution Code.","venue":"CoRR","volume":"abs/1405.6171","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/KushwahM14a","ee":"http://arxiv.org/abs/1405.6171","url":"https://dblp.org/rec/journals/corr/KushwahM14a"}, "url":"URL#3974705" }, { "@score":"1", "@id":"3974710", "info":{"authors":{"author":[{"@pid":"k/ShayKutten","text":"Shay Kutten"},{"@pid":"61/2421","text":"Danupon Nanongkai"},{"@pid":"p/GopalPandurangan","text":"Gopal Pandurangan"},{"@pid":"06/5220-2","text":"Peter Robinson 0002"}]},"title":"Distributed Symmetry Breaking in Hypergraphs.","venue":"CoRR","volume":"abs/1405.1649","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/KuttenNPR14","ee":"http://arxiv.org/abs/1405.1649","url":"https://dblp.org/rec/journals/corr/KuttenNPR14"}, "url":"URL#3974710" }, { "@score":"1", "@id":"3974725", "info":{"authors":{"author":[{"@pid":"92/5526","text":"Branislav Kveton"},{"@pid":"96/780","text":"Zheng Wen"},{"@pid":"88/4556","text":"Azin Ashkan"},{"@pid":"03/5455","text":"Michal Valko"}]},"title":"Learning to Act Greedily: Polymatroid Semi-Bandits.","venue":"CoRR","volume":"abs/1405.7752","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/KvetonWAV14","ee":"http://arxiv.org/abs/1405.7752","url":"https://dblp.org/rec/journals/corr/KvetonWAV14"}, "url":"URL#3974725" }, { "@score":"1", "@id":"3974738", "info":{"authors":{"author":[{"@pid":"53/9879","text":"Anastasios Kyrillidis"},{"@pid":"146/0423","text":"Rabeeh Karimi Mahabadi"},{"@pid":"133/8252","text":"Quoc Tran-Dinh"},{"@pid":"70/5301","text":"Volkan Cevher"}]},"title":"Scalable sparse covariance estimation via self-concordance.","venue":"CoRR","volume":"abs/1405.3263","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/KyrillidisMTC14","ee":"http://arxiv.org/abs/1405.3263","url":"https://dblp.org/rec/journals/corr/KyrillidisMTC14"}, "url":"URL#3974738" }, { "@score":"1", "@id":"3974753", "info":{"authors":{"author":[{"@pid":"32/8775","text":"Carlos E. Laciana"},{"@pid":"146/0559","text":"G. Gual"},{"@pid":"146/0373","text":"D. Kalmus"},{"@pid":"131/6649","text":"Nicolas Oteiza Aguirre"},{"@pid":"49/8776","text":"Santiago L. Rovere"}]},"title":"Diffusion of two brands in competition: cross-brand effect.","venue":"CoRR","volume":"abs/1405.7358","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/LacianaGKAR14","ee":"http://arxiv.org/abs/1405.7358","url":"https://dblp.org/rec/journals/corr/LacianaGKAR14"}, "url":"URL#3974753" }, { "@score":"1", "@id":"3974754", "info":{"authors":{"author":[{"@pid":"133/0809","text":"Emanuel Lacic"},{"@pid":"133/6840","text":"Dominik Kowald"},{"@pid":"144/2869","text":"Lukas Eberhard"},{"@pid":"94/8283","text":"Christoph Trattner"},{"@pid":"09/7458","text":"Denis Parra"},{"@pid":"59/4973","text":"Leandro Balby Marinho"}]},"title":"Utilizing Online Social Network and Location-Based Data to Recommend Items in an Online Marketplace.","venue":"CoRR","volume":"abs/1405.1837","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/LacicKETPM14","ee":"http://arxiv.org/abs/1405.1837","url":"https://dblp.org/rec/journals/corr/LacicKETPM14"}, "url":"URL#3974754" }, { "@score":"1", "@id":"3974756", "info":{"authors":{"author":[{"@pid":"133/0809","text":"Emanuel Lacic"},{"@pid":"133/6840","text":"Dominik Kowald"},{"@pid":"94/8283","text":"Christoph Trattner"}]},"title":"SocRecM: A Scalable Social Recommender Engine for Online Marketplaces.","venue":"CoRR","volume":"abs/1405.1842","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/LacicKT14","ee":"http://arxiv.org/abs/1405.1842","url":"https://dblp.org/rec/journals/corr/LacicKT14"}, "url":"URL#3974756" }, { "@score":"1", "@id":"3974758", "info":{"authors":{"author":[{"@pid":"122/3058","text":"Xavier Lacoste"},{"@pid":"18/9881","text":"Mathieu Faverge"},{"@pid":"33/5623","text":"George Bosilca"},{"@pid":"60/2993","text":"Pierre Ramet"},{"@pid":"52/1362","text":"Samuel Thibault"}]},"title":"Taking advantage of hybrid systems for sparse direct solvers via task-based runtimes.","venue":"CoRR","volume":"abs/1405.2636","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/LacosteFBRT14","ee":"http://arxiv.org/abs/1405.2636","url":"https://dblp.org/rec/journals/corr/LacosteFBRT14"}, "url":"URL#3974758" }, { "@score":"1", "@id":"3974763", "info":{"authors":{"author":[{"@pid":"87/4368","text":"Torbjörn Lager"},{"@pid":"11/4190","text":"Jan Wielemaker"}]},"title":"Pengines: Web Logic Programming Made Easy.","venue":"CoRR","volume":"abs/1405.3953","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/LagerW14","ee":"http://arxiv.org/abs/1405.3953","url":"https://dblp.org/rec/journals/corr/LagerW14"}, "url":"URL#3974763" }, { "@score":"1", "@id":"3974764", "info":{"authors":{"author":[{"@pid":"44/3105","text":"Ugo Dal Lago"},{"@pid":"91/4180","text":"Claudia Faggian"},{"@pid":"26/4542","text":"Ichiro Hasuo"},{"@pid":"143/2718","text":"Akira Yoshimizu"}]},"title":"The Geometry of Synchronization (Long Version).","venue":"CoRR","volume":"abs/1405.3427","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/LagoFHY14","ee":"http://arxiv.org/abs/1405.3427","url":"https://dblp.org/rec/journals/corr/LagoFHY14"}, "url":"URL#3974764" }, { "@score":"1", "@id":"3974772", "info":{"authors":{"author":{"@pid":"09/1570","text":"Rafael Lahoz-Beltra"}},"title":"The "crisis of noosphere" as a limiting factor to achieve the point of technological singularity.","venue":"CoRR","volume":"abs/1405.3378","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/Lahoz-Beltra14","ee":"http://arxiv.org/abs/1405.3378","url":"https://dblp.org/rec/journals/corr/Lahoz-Beltra14"}, "url":"URL#3974772" }, { "@score":"1", "@id":"3974783", "info":{"authors":{"author":[{"@pid":"45/4248","text":"Sachin Lakra"},{"@pid":"31/2284","text":"T. V. Prasad 0001"},{"@pid":"119/4835","text":"G. Ramakrishna"}]},"title":"Representation of a Sentence using a Polar Fuzzy Neutrosophic Semantic Net.","venue":"CoRR","volume":"abs/1405.0423","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/LakraPR14","ee":"http://arxiv.org/abs/1405.0423","url":"https://dblp.org/rec/journals/corr/LakraPR14"}, "url":"URL#3974783" }, { "@score":"1", "@id":"3974793", "info":{"authors":{"author":[{"@pid":"146/0946","text":"Raphaël Lallement"},{"@pid":"96/4774","text":"Lavindra de Silva"},{"@pid":"90/1707","text":"Rachid Alami"}]},"title":"HATP: An HTN Planner for Robotics.","venue":"CoRR","volume":"abs/1405.5345","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/LallementSA14","ee":"http://arxiv.org/abs/1405.5345","url":"https://dblp.org/rec/journals/corr/LallementSA14"}, "url":"URL#3974793" }, { "@score":"1", "@id":"3974826", "info":{"authors":{"author":{"@pid":"89/3613","text":"Dmitry V. Lande"}},"title":"Building of Networks of Natural Hierarchies of Terms Based on Analysis of Texts Corpora.","venue":"CoRR","volume":"abs/1405.6068","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/Lande14","ee":"http://arxiv.org/abs/1405.6068","url":"https://dblp.org/rec/journals/corr/Lande14"}, "url":"URL#3974826" }, { "@score":"1", "@id":"3974848", "info":{"authors":{"author":[{"@pid":"89/1893","text":"Vahid Lari"},{"@pid":"132/8210","text":"Alexandru Tanase"},{"@pid":"94/1143","text":"Frank Hannig"},{"@pid":"t/JurgenTeich","text":"Jürgen Teich"}]},"title":"Massively Parallel Processor Architectures for Resource-aware Computing.","venue":"CoRR","volume":"abs/1405.2907","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/LariTHT14","ee":"http://arxiv.org/abs/1405.2907","url":"https://dblp.org/rec/journals/corr/LariTHT14"}, "url":"URL#3974848" }, { "@score":"1", "@id":"3974853", "info":{"authors":{"author":[{"@pid":"135/4966","text":"Benjamin Larrousse"},{"@pid":"50/3734","text":"Samson Lasaulce"}]},"title":"Coded Power Control: Performance Analysis.","venue":"CoRR","volume":"abs/1405.6908","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/LarrousseL14","ee":"http://arxiv.org/abs/1405.6908","url":"https://dblp.org/rec/journals/corr/LarrousseL14"}, "url":"URL#3974853" }, { "@score":"1", "@id":"3974862", "info":{"authors":{"author":[{"@pid":"87/10827","text":"Sina Lashgari"},{"@pid":"63/1946","text":"Amir Salman Avestimehr"}]},"title":"Blind Wiretap Channel with Delayed CSIT.","venue":"CoRR","volume":"abs/1405.0521","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/LashgariA14","ee":"http://arxiv.org/abs/1405.0521","url":"https://dblp.org/rec/journals/corr/LashgariA14"}, "url":"URL#3974862" }, { "@score":"1", "@id":"3974883", "info":{"authors":{"author":[{"@pid":"144/7820","text":"Juho Lauri"},{"@pid":"20/9410","text":"Melissa S. Keranen"}]},"title":"Computing Minimum Rainbow and Strong Rainbow Colorings of Block Graphs.","venue":"CoRR","volume":"abs/1405.6893","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/LauriK14","ee":"http://arxiv.org/abs/1405.6893","url":"https://dblp.org/rec/journals/corr/LauriK14"}, "url":"URL#3974883" }, { "@score":"1", "@id":"3974890", "info":{"authors":{"author":{"@pid":"83/10757","text":"Glenn Lawyer"}},"title":"Understanding the spreading power of all nodes in a network: a continuous-time perspective.","venue":"CoRR","volume":"abs/1405.6707","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/Lawyer14","ee":"http://arxiv.org/abs/1405.6707","url":"https://dblp.org/rec/journals/corr/Lawyer14"}, "url":"URL#3974890" }, { "@score":"1", "@id":"3974896", "info":{"authors":{"author":[{"@pid":"78/6802","text":"Anh Le"},{"@pid":"29/6214","text":"Lorenzo Keller"},{"@pid":"27/825","text":"Hulya Seferoglu"},{"@pid":"80/8483","text":"Blerim Cici"},{"@pid":"87/5736","text":"Christina Fragouli"},{"@pid":"82/5866","text":"Athina Markopoulou"}]},"title":"MicroCast: Cooperative Video Streaming using Cellular and D2D Connections.","venue":"CoRR","volume":"abs/1405.3622","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/LeKSCFM14","ee":"http://arxiv.org/abs/1405.3622","url":"https://dblp.org/rec/journals/corr/LeKSCFM14"}, "url":"URL#3974896" }, { "@score":"1", "@id":"3974899", "info":{"authors":{"author":[{"@pid":"29/6166","text":"Quoc V. Le"},{"@pid":"45/8055","text":"Tomás Mikolov"}]},"title":"Distributed Representations of Sentences and Documents.","venue":"CoRR","volume":"abs/1405.4053","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/LeM14","ee":"http://arxiv.org/abs/1405.4053","url":"https://dblp.org/rec/journals/corr/LeM14"}, "url":"URL#3974899" }, { "@score":"1", "@id":"3974904", "info":{"authors":{"author":[{"@pid":"118/3873","text":"Tiep Le"},{"@pid":"p/EnricoPontelli","text":"Enrico Pontelli"},{"@pid":"s/TranCaoSon","text":"Tran Cao Son"},{"@pid":"97/4283-1","text":"William Yeoh 0001"}]},"title":"Logic and Constraint Logic Programming for Distributed Constraint Optimization.","venue":"CoRR","volume":"abs/1405.1734","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/LePSY14","ee":"http://arxiv.org/abs/1405.1734","url":"https://dblp.org/rec/journals/corr/LePSY14"}, "url":"URL#3974904" }, { "@score":"1", "@id":"3974920", "info":{"authors":{"author":{"@pid":"129/5624","text":"Euiwoong Lee"}},"title":"Hardness of Graph Pricing through Generalized Max-Dicut.","venue":"CoRR","volume":"abs/1405.0740","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/Lee14a","ee":"http://arxiv.org/abs/1405.0740","url":"https://dblp.org/rec/journals/corr/Lee14a"}, "url":"URL#3974920" }, { "@score":"1", "@id":"3974930", "info":{"authors":{"author":[{"@pid":"35/8021","text":"Namgil Lee"},{"@pid":"c/AndrzejCichocki","text":"Andrzej Cichocki"}]},"title":"Fundamental Tensor Operations for Large-Scale Data Analysis in Tensor Train Formats.","venue":"CoRR","volume":"abs/1405.7786","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/LeeC14b","ee":"http://arxiv.org/abs/1405.7786","url":"https://dblp.org/rec/journals/corr/LeeC14b"}, "url":"URL#3974930" }, { "@score":"1", "@id":"3974936", "info":{"authors":{"author":[{"@pid":"89/3451","text":"Namyoon Lee"},{"@pid":"56/4851","text":"Robert W. Heath Jr."}]},"title":"Space-Time Physical-Layer Network Coding.","venue":"CoRR","volume":"abs/1405.0029","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/LeeH14","ee":"http://arxiv.org/abs/1405.0029","url":"https://dblp.org/rec/journals/corr/LeeH14"}, "url":"URL#3974936" }, { "@score":"1", "@id":"3974951", "info":{"authors":{"author":[{"@pid":"22/8024","text":"Kyumin Lee"},{"@pid":"m/JalalMahmud","text":"Jalal Mahmud"},{"@pid":"50/6953","text":"Jilin Chen"},{"@pid":"90/5406","text":"Michelle X. Zhou"},{"@pid":"59/3064","text":"Jeffrey Nichols 0001"}]},"title":"Who Will Retweet This? Automatically Identifying and Engaging Strangers on Twitter to Spread Information.","venue":"CoRR","volume":"abs/1405.3750","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/LeeMCZN14","ee":"http://arxiv.org/abs/1405.3750","url":"https://dblp.org/rec/journals/corr/LeeMCZN14"}, "url":"URL#3974951" }, { "@score":"1", "@id":"3974952", "info":{"authors":{"author":[{"@pid":"89/3451","text":"Namyoon Lee"},{"@pid":"44/4323","text":"David Morales-Jiménez"},{"@pid":"84/1348","text":"Angel E. Lozano"},{"@pid":"56/4851","text":"Robert W. Heath Jr."}]},"title":"Spectral Efficiency of Dynamic Coordinated Beamforming: A Stochastic Geometry Approach.","venue":"CoRR","volume":"abs/1405.1365","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/LeeMLH14","ee":"http://arxiv.org/abs/1405.1365","url":"https://dblp.org/rec/journals/corr/LeeMLH14"}, "url":"URL#3974952" }, { "@score":"1", "@id":"3974958", "info":{"authors":{"author":[{"@pid":"54/6244","text":"Hooyeon Lee"},{"@pid":"s/YoavShoham","text":"Yoav Shoham"}]},"title":"Stable Invitations.","venue":"CoRR","volume":"abs/1405.7751","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/LeeS14a","ee":"http://arxiv.org/abs/1405.7751","url":"https://dblp.org/rec/journals/corr/LeeS14a"}, "url":"URL#3974958" }, { "@score":"1", "@id":"3974962", "info":{"authors":{"author":[{"@pid":"89/3451","text":"Namyoon Lee"},{"@pid":"19/543","text":"Ravi Tandon"},{"@pid":"56/4851","text":"Robert W. Heath Jr."}]},"title":"Distributed Space-Time Interference Alignment.","venue":"CoRR","volume":"abs/1405.0032","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/LeeTH14","ee":"http://arxiv.org/abs/1405.0032","url":"https://dblp.org/rec/journals/corr/LeeTH14"}, "url":"URL#3974962" }, { "@score":"1", "@id":"3974989", "info":{"authors":{"author":[{"@pid":"133/7839","text":"Jan Leike"},{"@pid":"52/7224","text":"Matthias Heizmann"}]},"title":"Geometric Series as Nontermination Arguments for Linear Lasso Programs.","venue":"CoRR","volume":"abs/1405.4413","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/LeikeH14a","ee":"http://arxiv.org/abs/1405.4413","url":"https://dblp.org/rec/journals/corr/LeikeH14a"}, "url":"URL#3974989" }, { "@score":"1", "@id":"3974998", "info":{"authors":{"author":[{"@pid":"146/0482","text":"Gabriel Lellouch"},{"@pid":"98/7479","text":"Amit Kumar Mishra"}]},"title":"Optimization of OFDM radar waveforms using genetic algorithms.","venue":"CoRR","volume":"abs/1405.4894","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/LellouchM14","ee":"http://arxiv.org/abs/1405.4894","url":"https://dblp.org/rec/journals/corr/LellouchM14"}, "url":"URL#3974998" }, { "@score":"1", "@id":"3975000", "info":{"authors":{"author":{"@pid":"144/7673","text":"Samir Lemes"}},"title":"Održavanje računarskih sistema.","venue":"CoRR","volume":"abs/1405.7135","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/Lemes14a","ee":"http://arxiv.org/abs/1405.7135","url":"https://dblp.org/rec/journals/corr/Lemes14a"}, "url":"URL#3975000" }, { "@score":"1", "@id":"3975012", "info":{"authors":{"author":[{"@pid":"63/9221","text":"Maxime Lenormand"},{"@pid":"124/0927","text":"Antònia Tugores"},{"@pid":"86/10826","text":"Pere Colet"},{"@pid":"52/4537","text":"José J. Ramasco"}]},"title":"Tweets on the road.","venue":"CoRR","volume":"abs/1405.5070","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/LenormandTCR14","ee":"http://arxiv.org/abs/1405.5070","url":"https://dblp.org/rec/journals/corr/LenormandTCR14"}, "url":"URL#3975012" }, { "@score":"1", "@id":"3975017", "info":{"authors":{"author":[{"@pid":"59/6303-1","text":"Christoph Lenzen 0001"},{"@pid":"l/NancyALynch","text":"Nancy A. Lynch"},{"@pid":"98/6904","text":"Calvin C. Newport"},{"@pid":"71/9000","text":"Tsvetomira Radeva"}]},"title":"Trade-offs between Selection Complexity and Performance when Searching the Plane without Communication.","venue":"CoRR","volume":"abs/1405.1688","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/LenzenLNR14","ee":"http://arxiv.org/abs/1405.1688","url":"https://dblp.org/rec/journals/corr/LenzenLNR14"}, "url":"URL#3975017" }, { "@score":"1", "@id":"3975018", "info":{"authors":{"author":[{"@pid":"59/6303-1","text":"Christoph Lenzen 0001"},{"@pid":"22/2858","text":"Boaz Patt-Shamir"}]},"title":"Improved Distributed Steiner Forest Construction.","venue":"CoRR","volume":"abs/1405.2011","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/LenzenP14","ee":"http://arxiv.org/abs/1405.2011","url":"https://dblp.org/rec/journals/corr/LenzenP14"}, "url":"URL#3975018" }, { "@score":"1", "@id":"3975038", "info":{"authors":{"author":[{"@pid":"24/10537","text":"Samantha Leung"},{"@pid":"35/9358","text":"Edward Lui"},{"@pid":"p/RPass","text":"Rafael Pass"}]},"title":"Voting with Coarse Beliefs.","venue":"CoRR","volume":"abs/1405.5827","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/LeungLP14","ee":"http://arxiv.org/abs/1405.5827","url":"https://dblp.org/rec/journals/corr/LeungLP14"}, "url":"URL#3975038" }, { "@score":"1", "@id":"3975054", "info":{"authors":{"author":{"@pid":"86/3727","text":"Dirk Lewandowski"}},"title":"Evaluating the retrieval effectiveness of Web search engines using a representative query sample.","venue":"CoRR","volume":"abs/1405.2210","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/Lewandowski14","ee":"http://arxiv.org/abs/1405.2210","url":"https://dblp.org/rec/journals/corr/Lewandowski14"}, "url":"URL#3975054" }, { "@score":"1", "@id":"3975055", "info":{"authors":{"author":{"@pid":"86/3727","text":"Dirk Lewandowski"}},"title":"Why we need an independent index of the Web.","venue":"CoRR","volume":"abs/1405.2212","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/Lewandowski14a","ee":"http://arxiv.org/abs/1405.2212","url":"https://dblp.org/rec/journals/corr/Lewandowski14a"}, "url":"URL#3975055" }, { "@score":"1", "@id":"3975100", "info":{"authors":{"author":[{"@pid":"27/8659","text":"Wei-Chiang Li"},{"@pid":"67/4030","text":"Tsung-Hui Chang"},{"@pid":"23/2424","text":"Chong-Yung Chi"}]},"title":"Multicell Coordinated Beamforming with Rate Outage Constraint-Part I: Complexity Analysis.","venue":"CoRR","volume":"abs/1405.2982","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/LiCC14","ee":"http://arxiv.org/abs/1405.2982","url":"https://dblp.org/rec/journals/corr/LiCC14"}, "url":"URL#3975100" }, { "@score":"1", "@id":"3975101", "info":{"authors":{"author":[{"@pid":"27/8659","text":"Wei-Chiang Li"},{"@pid":"67/4030","text":"Tsung-Hui Chang"},{"@pid":"23/2424","text":"Chong-Yung Chi"}]},"title":"Multicell Coordinated Beamforming with Rate Outage Constraint-Part II: Efficient Approximation Algorithms.","venue":"CoRR","volume":"abs/1405.2984","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/LiCC14a","ee":"http://arxiv.org/abs/1405.2984","url":"https://dblp.org/rec/journals/corr/LiCC14a"}, "url":"URL#3975101" }, { "@score":"1", "@id":"3975143", "info":{"authors":{"author":[{"@pid":"89/6764-14","text":"Bin Li 0014"},{"@pid":"49/7891","text":"Ruogu Li"},{"@pid":"56/5751","text":"Atilla Eryilmaz"}]},"title":"Throughput-Optimal Scheduling Design with Regular Service Guarantees in Wireless Networks.","venue":"CoRR","volume":"abs/1405.0625","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/LiLE14","ee":"http://arxiv.org/abs/1405.0625","url":"https://dblp.org/rec/journals/corr/LiLE14"}, "url":"URL#3975143" }, { "@score":"1", "@id":"3975164", "info":{"authors":{"author":[{"@pid":"135/9401","text":"Borui Li"},{"@pid":"63/259","text":"Chundi Mu"},{"@pid":"12/5838","text":"Tao Wang"},{"@pid":"67/6523","text":"Qian Peng"}]},"title":"Revised Version of a JCIT Paper-Comparison of Feature Point Extraction Algorithms for Vision Based Autonomous Aerial Refueling.","venue":"CoRR","volume":"abs/1405.6163","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/LiMWP14","ee":"http://arxiv.org/abs/1405.6163","url":"https://dblp.org/rec/journals/corr/LiMWP14"}, "url":"URL#3975164" }, { "@score":"1", "@id":"3975165", "info":{"authors":{"author":[{"@pid":"89/6764-11","text":"Bin Li 0011"},{"@pid":"28/3620","text":"Tian-Tsong Ng"},{"@pid":"82/6624-1","text":"Xiaolong Li 0001"},{"@pid":"02/4567","text":"Shunquan Tan"},{"@pid":"90/6446","text":"Jiwu Huang"}]},"title":"JPEG Noises beyond the First Compression Cycle.","venue":"CoRR","volume":"abs/1405.7571","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/LiNLTH14","ee":"http://arxiv.org/abs/1405.7571","url":"https://dblp.org/rec/journals/corr/LiNLTH14"}, "url":"URL#3975165" }, { "@score":"1", "@id":"3975174", "info":{"authors":{"author":[{"@pid":"260/7125","text":"Xianrui Li"},{"@pid":"146/0663","text":"D. B. Pei"},{"@pid":"44/385","text":"Q. Liu"},{"@pid":"59/2617","text":"Rui Shen"}]},"title":"Design of a capacitor-less low-dropout voltage regulator.","venue":"CoRR","volume":"abs/1405.0806","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/LiPLS14","ee":"http://arxiv.org/abs/1405.0806","url":"https://dblp.org/rec/journals/corr/LiPLS14"}, "url":"URL#3975174" }, { "@score":"1", "@id":"3975213", "info":{"authors":{"author":[{"@pid":"55/1539","text":"Fangfang Li"},{"@pid":"59/2340","text":"Guandong Xu"},{"@pid":"14/2589","text":"Longbing Cao"}]},"title":"Coupled Item-based Matrix Factorization.","venue":"CoRR","volume":"abs/1405.6223","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/LiXC14","ee":"http://arxiv.org/abs/1405.6223","url":"https://dblp.org/rec/journals/corr/LiXC14"}, "url":"URL#3975213" }, { "@score":"1", "@id":"3975215", "info":{"authors":{"author":[{"@pid":"146/0808","text":"Yan Kit Li"},{"@pid":"09/0","text":"Min Xu"},{"@pid":"01/10572","text":"Chun-Ho Ng"},{"@pid":"25/4018","text":"Patrick P. C. Lee"}]},"title":"Efficient Hybrid Inline and Out-of-line Deduplication for Backup Storage.","venue":"CoRR","volume":"abs/1405.5661","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/LiXNL14","ee":"http://arxiv.org/abs/1405.5661","url":"https://dblp.org/rec/journals/corr/LiXNL14"}, "url":"URL#3975215" }, { "@score":"1", "@id":"3975219", "info":{"authors":{"author":[{"@pid":"17/5705","text":"Hao Li"},{"@pid":"146/0416","text":"Dazuo Yang"},{"@pid":"146/0486","text":"Fudi Chen"},{"@pid":"146/0465","text":"Yibing Zhou"},{"@pid":"69/5658","text":"Zhilong Xiu"}]},"title":"Application of Artificial Neural Networks in Predicting Abrasion Resistance of Solution Polymerized Styrene-Butadiene Rubber Based Composites.","venue":"CoRR","volume":"abs/1405.5550","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/LiYCZX14","ee":"http://arxiv.org/abs/1405.5550","url":"https://dblp.org/rec/journals/corr/LiYCZX14"}, "url":"URL#3975219" }, { "@score":"1", "@id":"3975222", "info":{"authors":{"author":[{"@pid":"85/5487","text":"Le Li"},{"@pid":"22/456","text":"Jianjun Yang"},{"@pid":"134/9325","text":"Kaili Zhao"},{"@pid":"61/3906","text":"Yang Xu"},{"@pid":"82/1228-2","text":"Honggang Zhang 0002"},{"@pid":"146/0477","text":"Zhuoyi Fan"}]},"title":"Graph Regularized Non-negative Matrix Factorization By Maximizing Correntropy.","venue":"CoRR","volume":"abs/1405.2246","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/LiYZXZF14","ee":"http://arxiv.org/abs/1405.2246","url":"https://dblp.org/rec/journals/corr/LiYZXZF14"}, "url":"URL#3975222" }, { "@score":"1", "@id":"3975230", "info":{"authors":{"author":[{"@pid":"58/1568-2","text":"Chang Li 0002"},{"@pid":"z/JunZhang4","text":"Jun Zhang 0004"},{"@pid":"49/3683","text":"Martin Haenggi"},{"@pid":"95/5358","text":"Khaled Ben Letaief"}]},"title":"User-Centric Intercell Interference Nulling for Downlink Small Cell Networks.","venue":"CoRR","volume":"abs/1405.4395","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/LiZHL14","ee":"http://arxiv.org/abs/1405.4395","url":"https://dblp.org/rec/journals/corr/LiZHL14"}, "url":"URL#3975230" }, { "@score":"1", "@id":"3975241", "info":{"authors":{"author":[{"@pid":"23/110-8","text":"Dong Liang 0008"},{"@pid":"26/4957","text":"Shun'ichi Kaneko"}]},"title":"Improvements and Experiments of a Compact Statistical Background Model.","venue":"CoRR","volume":"abs/1405.6275","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/LiangK14a","ee":"http://arxiv.org/abs/1405.6275","url":"https://dblp.org/rec/journals/corr/LiangK14a"}, "url":"URL#3975241" }, { "@score":"1", "@id":"3975243", "info":{"authors":{"author":[{"@pid":"115/6838","text":"Chulong Liang"},{"@pid":"35/573-1","text":"Xiao Ma 0001"},{"@pid":"39/10967","text":"Qiutao Zhuang"},{"@pid":"80/1849","text":"Baoming Bai"}]},"title":"Spatial Coupling of Generator Matrix: A General Approach to Design of Good Codes at a Target BER.","venue":"CoRR","volume":"abs/1405.2524","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/LiangMZB14","ee":"http://arxiv.org/abs/1405.2524","url":"https://dblp.org/rec/journals/corr/LiangMZB14"}, "url":"URL#3975243" }, { "@score":"1", "@id":"3975271", "info":{"authors":{"author":[{"@pid":"146/0502","text":"Haiko Lietz"},{"@pid":"32/4045","text":"Claudia Wagner 0001"},{"@pid":"122/2987","text":"Arnim Bleier"},{"@pid":"01/6659","text":"Markus Strohmaier"}]},"title":"When Politicians Talk: Assessing Online Conversational Practices of Political Parties on Twitter.","venue":"CoRR","volume":"abs/1405.6824","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/LietzWBS14","ee":"http://arxiv.org/abs/1405.6824","url":"https://dblp.org/rec/journals/corr/LietzWBS14"}, "url":"URL#3975271" }, { "@score":"1", "@id":"3975296", "info":{"authors":{"author":{"@pid":"27/9828","text":"Tianrong Lin"}},"title":"The complexity of model-checking of stateless probabilistic pushdown processes against PCTL.","venue":"CoRR","volume":"abs/1405.4806","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/Lin14","ee":"http://arxiv.org/abs/1405.4806","url":"https://dblp.org/rec/journals/corr/Lin14"}, "url":"URL#3975296" }, { "@score":"1", "@id":"3975318", "info":{"authors":{"author":[{"@pid":"47/8105","text":"Tsung-Yi Lin"},{"@pid":"73/1498","text":"Michael Maire"},{"@pid":"b/SJBelongie","text":"Serge J. Belongie"},{"@pid":"52/546","text":"Lubomir D. Bourdev"},{"@pid":"89/7658","text":"Ross B. Girshick"},{"@pid":"57/5958","text":"James Hays"},{"@pid":"p/PietroPerona","text":"Pietro Perona"},{"@pid":"49/488","text":"Deva Ramanan"},{"@pid":"62/750","text":"Piotr Dollár"},{"@pid":"10/6888","text":"C. Lawrence Zitnick"}]},"title":"Microsoft COCO: Common Objects in Context.","venue":"CoRR","volume":"abs/1405.0312","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/LinMBHPRDZ14","ee":"http://arxiv.org/abs/1405.0312","url":"https://dblp.org/rec/journals/corr/LinMBHPRDZ14"}, "url":"URL#3975318" }, { "@score":"1", "@id":"3975327", "info":{"authors":{"author":[{"@pid":"55/1226","text":"Jun Lin"},{"@pid":"133/4013","text":"Chenrong Xiong"},{"@pid":"56/6499-1","text":"Zhiyuan Yan 0001"}]},"title":"A Reduced Latency List Decoding Algorithm for Polar Codes.","venue":"CoRR","volume":"abs/1405.4819","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/LinXY14","ee":"http://arxiv.org/abs/1405.4819","url":"https://dblp.org/rec/journals/corr/LinXY14"}, "url":"URL#3975327" }, { "@score":"1", "@id":"3975329", "info":{"authors":{"author":[{"@pid":"51/8073","text":"Binbin Lin"},{"@pid":"00/5542","text":"Ji Yang"},{"@pid":"h/XiaofeiHe","text":"Xiaofei He 0001"},{"@pid":"03/5454","text":"Jieping Ye"}]},"title":"Geodesic Distance Function Learning via Heat Flow on Vector Fields.","venue":"CoRR","volume":"abs/1405.0133","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/LinYHY14","ee":"http://arxiv.org/abs/1405.0133","url":"https://dblp.org/rec/journals/corr/LinYHY14"}, "url":"URL#3975329" }, { "@score":"1", "@id":"3975341", "info":{"authors":{"author":[{"@pid":"28/9220","text":"Sajan Goud Lingala"},{"@pid":"66/1014","text":"Edward DiBella"},{"@pid":"12/4336","text":"Mathews Jacob"}]},"title":"Deformation corrected compressed sensing (DC-CS): a novel framework for accelerated dynamic MRI.","venue":"CoRR","volume":"abs/1405.7718","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/LingalaDJ14","ee":"http://arxiv.org/abs/1405.7718","url":"https://dblp.org/rec/journals/corr/LingalaDJ14"}, "url":"URL#3975341" }, { "@score":"1", "@id":"3975363", "info":{"authors":{"author":{"@pid":"01/6541","text":"Benyuan Liu"}},"title":"Py-oopsi: the python implementation of the fast-oopsi algorithm.","venue":"CoRR","volume":"abs/1405.6181","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/Liu14d","ee":"http://arxiv.org/abs/1405.6181","url":"https://dblp.org/rec/journals/corr/Liu14d"}, "url":"URL#3975363" }, { "@score":"1", "@id":"3975370", "info":{"authors":{"author":[{"@pid":"43/7726","text":"Jingbo Liu"},{"@pid":"84/5016","text":"Emmanuel Abbe"}]},"title":"Polynomial complexity of polar codes for non-binary alphabets, key agreement and Slepian-Wolf coding.","venue":"CoRR","volume":"abs/1405.0776","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/LiuA14a","ee":"http://arxiv.org/abs/1405.0776","url":"https://dblp.org/rec/journals/corr/LiuA14a"}, "url":"URL#3975370" }, { "@score":"1", "@id":"3975384", "info":{"authors":{"author":[{"@pid":"43/7726","text":"Jingbo Liu"},{"@pid":"117/8945","text":"Paul Cuff"},{"@pid":"v/SVerdu","text":"Sergio Verdú"}]},"title":"Key Capacity with Limited One-Way Communication for Product Sources.","venue":"CoRR","volume":"abs/1405.7441","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/LiuCV14","ee":"http://arxiv.org/abs/1405.7441","url":"https://dblp.org/rec/journals/corr/LiuCV14"}, "url":"URL#3975384" }, { "@score":"1", "@id":"3975427", "info":{"authors":{"author":[{"@pid":"30/8653","text":"Meizhu Liu"},{"@pid":"78/6574-1","text":"Le Lu 0001"},{"@pid":"01/2390","text":"Xiaojing Ye"},{"@pid":"y/ShipengYu","text":"Shipeng Yu"}]},"title":"Coarse-to-Fine Classification via Parametric and Nonparametric Models for Computer-Aided Diagnosis.","venue":"CoRR","volume":"abs/1405.4308","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/LiuLYY14","ee":"http://arxiv.org/abs/1405.4308","url":"https://dblp.org/rec/journals/corr/LiuLYY14"}, "url":"URL#3975427" }, { "@score":"1", "@id":"3975432", "info":{"authors":{"author":[{"@pid":"72/2590","text":"Jing Liu"},{"@pid":"34/4515","text":"Fei Qiao"},{"@pid":"44/5256","text":"Zhijian Ou"},{"@pid":"94/1128","text":"Huazhong Yang"}]},"title":"Low-complexity video encoder for smart eyes based on underdetermined blind signal separation.","venue":"CoRR","volume":"abs/1405.5948","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/LiuQOY14","ee":"http://arxiv.org/abs/1405.5948","url":"https://dblp.org/rec/journals/corr/LiuQOY14"}, "url":"URL#3975432" }, { "@score":"1", "@id":"3975438", "info":{"authors":{"author":[{"@pid":"47/5615-1","text":"Li-Ping Liu 0001"},{"@pid":"58/766","text":"Daniel Sheldon"},{"@pid":"d/TGDietterich","text":"Thomas G. Dietterich"}]},"title":"Gaussian Approximation of Collective Graphical Models.","venue":"CoRR","volume":"abs/1405.5156","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/LiuSD14","ee":"http://arxiv.org/abs/1405.5156","url":"https://dblp.org/rec/journals/corr/LiuSD14"}, "url":"URL#3975438" }, { "@score":"1", "@id":"3975446", "info":{"authors":{"author":[{"@pid":"137/0231","text":"Kangqi Liu"},{"@pid":"85/4712","text":"Meixia Tao"}]},"title":"Generalized Signal Alignment: On the Achievable DoF for Multi-User MIMO Two-Way Relay Channels.","venue":"CoRR","volume":"abs/1405.0718","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/LiuT14","ee":"http://arxiv.org/abs/1405.0718","url":"https://dblp.org/rec/journals/corr/LiuT14"}, "url":"URL#3975446" }, { "@score":"1", "@id":"3975466", "info":{"authors":{"author":[{"@pid":"97/4626-15","text":"Yi Liu 0015"},{"@pid":"01/753","text":"Chau Yuen"},{"@pid":"28/531","text":"Xianghui Cao"},{"@pid":"69/7964","text":"Naveed Ul L. Hassan"},{"@pid":"55/2484-1","text":"Jiming Chen 0001"}]},"title":"Design of A Scalable Hybrid MAC Protocol for Heterogeneous M2M Networks.","venue":"CoRR","volume":"abs/1405.6360","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/LiuYCHC14","ee":"http://arxiv.org/abs/1405.6360","url":"https://dblp.org/rec/journals/corr/LiuYCHC14"}, "url":"URL#3975466" }, { "@score":"1", "@id":"3975551", "info":{"authors":{"author":{"@pid":"l/StevenHLow","text":"Steven H. Low"}},"title":"Convex Relaxation of Optimal Power Flow, Part I: Formulations and Equivalence.","venue":"CoRR","volume":"abs/1405.0766","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/Low14","ee":"http://arxiv.org/abs/1405.0766","url":"https://dblp.org/rec/journals/corr/Low14"}, "url":"URL#3975551" }, { "@score":"1", "@id":"3975552", "info":{"authors":{"author":{"@pid":"l/StevenHLow","text":"Steven H. Low"}},"title":"Convex Relaxation of Optimal Power Flow, Part II: Exactness.","venue":"CoRR","volume":"abs/1405.0814","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/Low14a","ee":"http://arxiv.org/abs/1405.0814","url":"https://dblp.org/rec/journals/corr/Low14a"}, "url":"URL#3975552" }, { "@score":"1", "@id":"3975564", "info":{"authors":{"author":[{"@pid":"97/6483","text":"Feng Lu"},{"@pid":"42/370","text":"Ziqiang Chen"}]},"title":"Newton-Type Iterative Solver for Multiple View $L2$ Triangulation.","venue":"CoRR","volume":"abs/1405.3352","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/LuC14a","ee":"http://arxiv.org/abs/1405.3352","url":"https://dblp.org/rec/journals/corr/LuC14a"}, "url":"URL#3975564" }, { "@score":"1", "@id":"3975593", "info":{"authors":{"author":[{"@pid":"37/4424-1","text":"Xiao Lu 0001"},{"@pid":"37/1304-1","text":"Ping Wang 0001"},{"@pid":"76/440","text":"Dusit Niyato"},{"@pid":"83/514","text":"Zhu Han 0001"}]},"title":"Resource Allocation in Wireless Networks with RF Energy Harvesting and Transfer.","venue":"CoRR","volume":"abs/1405.5630","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/LuWNH14a","ee":"http://arxiv.org/abs/1405.5630","url":"https://dblp.org/rec/journals/corr/LuWNH14a"}, "url":"URL#3975593" }, { "@score":"1", "@id":"3975606", "info":{"authors":{"author":{"@pid":"146/0474","text":"Puneet Singh Ludu"}},"title":"Inferring gender of a Twitter user using celebrities it follows.","venue":"CoRR","volume":"abs/1405.6667","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/Ludu14","ee":"http://arxiv.org/abs/1405.6667","url":"https://dblp.org/rec/journals/corr/Ludu14"}, "url":"URL#3975606" }, { "@score":"1", "@id":"3975614", "info":{"authors":{"author":[{"@pid":"86/10079","text":"Giuseppe Antonio Di Luna"},{"@pid":"96/778","text":"Paola Flocchini"},{"@pid":"45/7850","text":"Sruti Gan Chaudhuri"},{"@pid":"s/NicolaSantoro","text":"Nicola Santoro"},{"@pid":"60/8409","text":"Giovanni Viglietta"}]},"title":"Robots with Lights: Overcoming Obstructed Visibility Without Colliding.","venue":"CoRR","volume":"abs/1405.2430","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/LunaFCSV14","ee":"http://arxiv.org/abs/1405.2430","url":"https://dblp.org/rec/journals/corr/LunaFCSV14"}, "url":"URL#3975614" }, { "@score":"1", "@id":"3975621", "info":{"authors":{"author":[{"@pid":"16/9912","text":"Peng Luo"},{"@pid":"75/2366-2","text":"Yongli Li 0002"},{"@pid":"42/5085","text":"Chong Wu"}]},"title":"Towards Cost-efficient Sampling Methods.","venue":"CoRR","volume":"abs/1405.5756","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/LuoLW14","ee":"http://arxiv.org/abs/1405.5756","url":"https://dblp.org/rec/journals/corr/LuoLW14"}, "url":"URL#3975621" }, { "@score":"1", "@id":"3975628", "info":{"authors":{"author":[{"@pid":"43/4720-10","text":"Tao Luo 0010"},{"@pid":"44/7702","text":"Zaifeng Shi"}]},"title":"An FPGA-based Parallel Architecture for Face Detection using Mixed Color Models.","venue":"CoRR","volume":"abs/1405.7032","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/LuoS14","ee":"http://arxiv.org/abs/1405.7032","url":"https://dblp.org/rec/journals/corr/LuoS14"}, "url":"URL#3975628" }, { "@score":"1", "@id":"3975651", "info":{"authors":{"author":[{"@pid":"132/9295","text":"Robert J. Lyon"},{"@pid":"81/5859","text":"J. M. Brooke"},{"@pid":"11/3172","text":"Joshua D. Knowles"},{"@pid":"132/9382","text":"Benjamin W. Stappers"}]},"title":"Hellinger Distance Trees for Imbalanced Streams.","venue":"CoRR","volume":"abs/1405.2278","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/LyonBKS14","ee":"http://arxiv.org/abs/1405.2278","url":"https://dblp.org/rec/journals/corr/LyonBKS14"}, "url":"URL#3975651" }, { "@score":"1", "@id":"3975656", "info":{"authors":{"author":{"@pid":"19/2951","text":"Xudong Ma"}},"title":"Write-Once-Memory Codes by Source Polarization.","venue":"CoRR","volume":"abs/1405.6262","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/Ma14","ee":"http://arxiv.org/abs/1405.6262","url":"https://dblp.org/rec/journals/corr/Ma14"}, "url":"URL#3975656" }, { "@score":"1", "@id":"3975660", "info":{"authors":{"author":[{"@pid":"146/0389","text":"Anna Ma"},{"@pid":"54/9464","text":"Arjuna Flenner"},{"@pid":"03/2691","text":"Deanna Needell"},{"@pid":"55/1416","text":"Allon G. Percus"}]},"title":"Improving Image Clustering using Sparse Text and the Wisdom of the Crowds.","venue":"CoRR","volume":"abs/1405.2102","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/MaFNP14","ee":"http://arxiv.org/abs/1405.2102","url":"https://dblp.org/rec/journals/corr/MaFNP14"}, "url":"URL#3975660" }, { "@score":"1", "@id":"3975670", "info":{"authors":{"author":[{"@pid":"131/6734","text":"Yanting Ma"},{"@pid":"15/7663","text":"Jin Tan"},{"@pid":"146/0428","text":"Nikhil Krishnan"},{"@pid":"57/1162","text":"Dror Baron"}]},"title":"Empirical Bayes and Full Bayes for Signal Estimation.","venue":"CoRR","volume":"abs/1405.2113","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/MaTKB14","ee":"http://arxiv.org/abs/1405.2113","url":"https://dblp.org/rec/journals/corr/MaTKB14"}, "url":"URL#3975670" }, { "@score":"1", "@id":"3975715", "info":{"authors":{"author":[{"@pid":"146/0461","text":"Andrew F. Magee"},{"@pid":"146/0799","text":"Michael R. May"},{"@pid":"66/4040","text":"Brian R. Moore"}]},"title":"The Dawn of Open Access to Phylogenetic Data.","venue":"CoRR","volume":"abs/1405.6623","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/MageeMM14","ee":"http://arxiv.org/abs/1405.6623","url":"https://dblp.org/rec/journals/corr/MageeMM14"}, "url":"URL#3975715" }, { "@score":"1", "@id":"3975719", "info":{"authors":{"author":{"@pid":"132/0959","text":"Victor Magron"}},"title":"NLCertify: A Tool for Formal Nonlinear Optimization.","venue":"CoRR","volume":"abs/1405.5668","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/Magron14","ee":"http://arxiv.org/abs/1405.5668","url":"https://dblp.org/rec/journals/corr/Magron14"}, "url":"URL#3975719" }, { "@score":"1", "@id":"3975721", "info":{"authors":{"author":[{"@pid":"36/6708","text":"Phil Maguire"},{"@pid":"66/5817","text":"Philippe Moser"},{"@pid":"00/1872","text":"Rebecca Maguire"},{"@pid":"89/5030","text":"Virgil Griffith"}]},"title":"Is Consciousness Computable? Quantifying Integrated Information Using Algorithmic Information Theory.","venue":"CoRR","volume":"abs/1405.0126","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/MaguireMMG14","ee":"http://arxiv.org/abs/1405.0126","url":"https://dblp.org/rec/journals/corr/MaguireMMG14"}, "url":"URL#3975721" }, { "@score":"1", "@id":"3975722", "info":{"authors":{"author":[{"@pid":"36/6708","text":"Phil Maguire"},{"@pid":"66/5817","text":"Philippe Moser"},{"@pid":"00/1872","text":"Rebecca Maguire"},{"@pid":"k/MarkTKeane","text":"Mark T. Keane"}]},"title":"A Computational Theory of Subjective Probability.","venue":"CoRR","volume":"abs/1405.6142","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/MaguireMMK14","ee":"http://arxiv.org/abs/1405.6142","url":"https://dblp.org/rec/journals/corr/MaguireMMK14"}, "url":"URL#3975722" }, { "@score":"1", "@id":"3975723", "info":{"authors":{"author":[{"@pid":"124/2493","text":"Stefan Magureanu"},{"@pid":"47/8356","text":"Richard Combes"},{"@pid":"p/AlexandreProutiere","text":"Alexandre Proutière"}]},"title":"Lipschitz Bandits: Regret Lower Bounds and Optimal Algorithms.","venue":"CoRR","volume":"abs/1405.4758","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/MagureanuCP14","ee":"http://arxiv.org/abs/1405.4758","url":"https://dblp.org/rec/journals/corr/MagureanuCP14"}, "url":"URL#3975723" }, { "@score":"1", "@id":"3975725", "info":{"authors":{"author":[{"@pid":"97/3847","text":"Sridhar Mahadevan"},{"@pid":"58/2670-6","text":"Bo Liu 0006"},{"@pid":"46/11107","text":"Philip S. Thomas"},{"@pid":"10/242","text":"William Dabney"},{"@pid":"14/8174","text":"Stephen Giguere 0001"},{"@pid":"133/1846","text":"Nicholas Jacek"},{"@pid":"66/10996","text":"Ian Gemp"},{"@pid":"51/4433-2","text":"Ji Liu 0002"}]},"title":"Proximal Reinforcement Learning: A New Theory of Sequential Decision Making in Primal-Dual Spaces.","venue":"CoRR","volume":"abs/1405.6757","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/MahadevanLTDGJG014","ee":"http://arxiv.org/abs/1405.6757","url":"https://dblp.org/rec/journals/corr/MahadevanLTDGJG014"}, "url":"URL#3975725" }, { "@score":"1", "@id":"3975727", "info":{"authors":{"author":[{"@pid":"08/8693","text":"Dhruv Mahajan 0001"},{"@pid":"35/6732","text":"S. Sathiya Keerthi"},{"@pid":"86/2741","text":"S. Sundararajan"}]},"title":"A Distributed Algorithm for Training Nonlinear Kernel Machines.","venue":"CoRR","volume":"abs/1405.4543","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/MahajanKS14","ee":"http://arxiv.org/abs/1405.4543","url":"https://dblp.org/rec/journals/corr/MahajanKS14"}, "url":"URL#3975727" }, { "@score":"1", "@id":"3975728", "info":{"authors":{"author":[{"@pid":"08/8693","text":"Dhruv Mahajan 0001"},{"@pid":"35/6732","text":"S. Sathiya Keerthi"},{"@pid":"86/2741","text":"S. Sundararajan"}]},"title":"A distributed block coordinate descent method for training $l_1$ regularized linear classifiers.","venue":"CoRR","volume":"abs/1405.4544","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/MahajanKS14a","ee":"http://arxiv.org/abs/1405.4544","url":"https://dblp.org/rec/journals/corr/MahajanKS14a"}, "url":"URL#3975728" }, { "@score":"1", "@id":"3975747", "info":{"authors":{"author":[{"@pid":"18/4138","text":"Arif Mahmood"},{"@pid":"63/807","text":"Ajmal S. Mian"}]},"title":"Semi-supervised Spectral Clustering for Classification.","venue":"CoRR","volume":"abs/1405.5737","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/MahmoodM14","ee":"http://arxiv.org/abs/1405.5737","url":"https://dblp.org/rec/journals/corr/MahmoodM14"}, "url":"URL#3975747" }, { "@score":"1", "@id":"3975758", "info":{"authors":{"author":[{"@pid":"m/JalalMahmud","text":"Jalal Mahmud"},{"@pid":"90/5406","text":"Michelle X. Zhou"},{"@pid":"m/NimrodMegiddo","text":"Nimrod Megiddo"},{"@pid":"59/3064","text":"Jeffrey Nichols 0001"},{"@pid":"92/208","text":"Clemens Drews"}]},"title":"Recommending Targeted Strangers from Whom to Solicit Information on Social Media.","venue":"CoRR","volume":"abs/1405.5574","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/MahmudZMND14a","ee":"http://arxiv.org/abs/1405.5574","url":"https://dblp.org/rec/journals/corr/MahmudZMND14a"}, "url":"URL#3975758" }, { "@score":"1", "@id":"3975761", "info":{"authors":{"author":[{"@pid":"98/1959","text":"André Murbach Maidl"},{"@pid":"64/4850","text":"Sérgio Medeiros 0001"},{"@pid":"80/5193","text":"Fabio Mascarenhas"},{"@pid":"90/4557","text":"Roberto Ierusalimschy"}]},"title":"Error Reporting in Parsing Expression Grammars.","venue":"CoRR","volume":"abs/1405.6646","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/MaidlMMI14","ee":"http://arxiv.org/abs/1405.6646","url":"https://dblp.org/rec/journals/corr/MaidlMMI14"}, "url":"URL#3975761" }, { "@score":"1", "@id":"3975778", "info":{"authors":{"author":{"@pid":"66/4092","text":"Zoran Majkic"}},"title":"Saturation of the morphisms in the database category.","venue":"CoRR","volume":"abs/1405.3955","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/Majkic14b","ee":"http://arxiv.org/abs/1405.3955","url":"https://dblp.org/rec/journals/corr/Majkic14b"}, "url":"URL#3975778" }, { "@score":"1", "@id":"3975788", "info":{"authors":{"author":[{"@pid":"116/1681","text":"Aibek Makazhanov"},{"@pid":"b/DBarbosa","text":"Denilson Barbosa 0001"},{"@pid":"40/3774","text":"Grzegorz Kondrak"}]},"title":"Extracting Family Relationship Networks from Novels.","venue":"CoRR","volume":"abs/1405.0603","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/MakazhanovBK14","ee":"http://arxiv.org/abs/1405.0603","url":"https://dblp.org/rec/journals/corr/MakazhanovBK14"}, "url":"URL#3975788" }, { "@score":"1", "@id":"3975796", "info":{"authors":{"author":[{"@pid":"27/9763","text":"Stephen Makonin"},{"@pid":"146/0756","text":"Maryam H. Kashani"},{"@pid":"24/1366","text":"Lyn Bartram"}]},"title":"The Affect of Lifestyle Factors on Eco-Visualization Design.","venue":"CoRR","volume":"abs/1405.5263","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/MakoninKB14","ee":"http://arxiv.org/abs/1405.5263","url":"https://dblp.org/rec/journals/corr/MakoninKB14"}, "url":"URL#3975796" }, { "@score":"1", "@id":"3975807", "info":{"authors":{"author":[{"@pid":"29/9879","text":"Mohammadreza Malek-Mohammadi"},{"@pid":"10/5572","text":"Magnus Jansson"},{"@pid":"17/8657","text":"Arash Owrang"},{"@pid":"117/3284","text":"Ali Koochakzadeh"},{"@pid":"51/3888","text":"Massoud Babaie-Zadeh"}]},"title":"DOA Estimation in Partially Correlated Noise Using Low-Rank/Sparse Matrix Decomposition.","venue":"CoRR","volume":"abs/1405.0674","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/Malek-MohammadiJOKB14","ee":"http://arxiv.org/abs/1405.0674","url":"https://dblp.org/rec/journals/corr/Malek-MohammadiJOKB14"}, "url":"URL#3975807" }, { "@score":"1", "@id":"3975819", "info":{"authors":{"author":[{"@pid":"96/2914","text":"Enrique Mallada"},{"@pid":"73/3609","text":"Randy A. Freeman"},{"@pid":"85/4619","text":"Ao Tang"}]},"title":"Distributed Synchronization of Heterogeneous Oscillators on Networks with Arbitrary Topology.","venue":"CoRR","volume":"abs/1405.6467","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/MalladaFT14","ee":"http://arxiv.org/abs/1405.6467","url":"https://dblp.org/rec/journals/corr/MalladaFT14"}, "url":"URL#3975819" }, { "@score":"1", "@id":"3975820", "info":{"authors":{"author":[{"@pid":"96/2914","text":"Enrique Mallada"},{"@pid":"06/257","text":"Xiaoqiao Meng"},{"@pid":"70/6076","text":"Michel Hack"},{"@pid":"89/5992-2","text":"Li Zhang 0002"},{"@pid":"85/4619","text":"Ao Tang"}]},"title":"Skewless Network Clock Synchronization Without Discontinuity: Convergence and Performance.","venue":"CoRR","volume":"abs/1405.6477","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/MalladaMH0T14","ee":"http://arxiv.org/abs/1405.6477","url":"https://dblp.org/rec/journals/corr/MalladaMH0T14"}, "url":"URL#3975820" }, { "@score":"1", "@id":"3975822", "info":{"authors":{"author":[{"@pid":"10/5130","text":"Achraf Mallat"},{"@pid":"57/5692","text":"Sinan Gezici"},{"@pid":"24/1194","text":"Davide Dardari"},{"@pid":"v/LucVandendorpe","text":"Luc Vandendorpe"}]},"title":"Statistics of the MLE and Approximate Upper and Lower Bounds - Part 2: Threshold Computation and Optimal Signal Design.","venue":"CoRR","volume":"abs/1405.4647","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/MallatGDV14","ee":"http://arxiv.org/abs/1405.4647","url":"https://dblp.org/rec/journals/corr/MallatGDV14"}, "url":"URL#3975822" }, { "@score":"1", "@id":"3975839", "info":{"authors":{"author":{"@pid":"89/5389","text":"Mathieu Mangeot"}},"title":"MotàMot project: conversion of a French-Khmer published dictionary for building a multilingual lexical system.","venue":"CoRR","volume":"abs/1405.5674","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/Mangeot14","ee":"http://arxiv.org/abs/1405.5674","url":"https://dblp.org/rec/journals/corr/Mangeot14"}, "url":"URL#3975839" }, { "@score":"1", "@id":"3975862", "info":{"authors":{"author":[{"@pid":"21/1911-2","text":"Ali Mansouri 0002"},{"@pid":"72/6246","text":"Mohamed Salim Bouhlel"}]},"title":"Exact values for the Grundy number of some graphs.","venue":"CoRR","volume":"abs/1405.6432","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/MansouriB14b","ee":"http://arxiv.org/abs/1405.6432","url":"https://dblp.org/rec/journals/corr/MansouriB14b"}, "url":"URL#3975862" }, { "@score":"1", "@id":"3975863", "info":{"authors":{"author":[{"@pid":"21/1911-2","text":"Ali Mansouri 0002"},{"@pid":"72/6246","text":"Mohamed Salim Bouhlel"}]},"title":"Results for grundy number of the complement of bipartite graphs.","venue":"CoRR","volume":"abs/1405.6433","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/MansouriB14c","ee":"http://arxiv.org/abs/1405.6433","url":"https://dblp.org/rec/journals/corr/MansouriB14c"}, "url":"URL#3975863" }, { "@score":"1", "@id":"3975864", "info":{"authors":{"author":[{"@pid":"21/1911-2","text":"Ali Mansouri 0002"},{"@pid":"72/6246","text":"Mohamed Salim Bouhlel"}]},"title":"Coloration de nombre de Grundy pour les graphes triangulés.","venue":"CoRR","volume":"abs/1405.7383","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/MansouriB14d","ee":"http://arxiv.org/abs/1405.7383","url":"https://dblp.org/rec/journals/corr/MansouriB14d"}, "url":"URL#3975864" }, { "@score":"1", "@id":"3975869", "info":{"authors":{"author":[{"@pid":"90/8292","text":"Theofrastos Mantadelis"},{"@pid":"20/2773-1","text":"Ricardo Rocha 0001"},{"@pid":"67/4192","text":"Paulo Moura"}]},"title":"Tabling, Rational Terms, and Coinduction Finally Together!","venue":"CoRR","volume":"abs/1405.2794","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/MantadelisRM14","ee":"http://arxiv.org/abs/1405.2794","url":"https://dblp.org/rec/journals/corr/MantadelisRM14"}, "url":"URL#3975869" }, { "@score":"1", "@id":"3975878", "info":{"authors":{"author":[{"@pid":"92/8900","text":"Marc Manzano"},{"@pid":"29/5798","text":"Eusebi Calle"},{"@pid":"27/8901","text":"Jordi Ripoll"},{"@pid":"131/0457","text":"Anna Manolova Fagertun"},{"@pid":"126/1014","text":"Victor Torres-Padrosa"},{"@pid":"89/8263","text":"Sakshi Pahwa"},{"@pid":"31/822","text":"Caterina M. Scoglio"}]},"title":"Epidemic and Cascading Survivability of Complex Networks.","venue":"CoRR","volume":"abs/1405.0455","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/ManzanoCRFTPS14","ee":"http://arxiv.org/abs/1405.0455","url":"https://dblp.org/rec/journals/corr/ManzanoCRFTPS14"}, "url":"URL#3975878" }, { "@score":"1", "@id":"3975899", "info":{"authors":{"author":[{"@pid":"m/MarcoMaratea","text":"Marco Maratea"},{"@pid":"35/6729","text":"Luca Pulina"},{"@pid":"r/FrancescoRicca","text":"Francesco Ricca"}]},"title":"The Multi-engine ASP Solver ME-ASP: Progress Report.","venue":"CoRR","volume":"abs/1405.0876","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/MarateaPR14","ee":"http://arxiv.org/abs/1405.0876","url":"https://dblp.org/rec/journals/corr/MarateaPR14"}, "url":"URL#3975899" }, { "@score":"1", "@id":"3975916", "info":{"authors":{"author":[{"@pid":"146/0411","text":"Domagoj Margan"},{"@pid":"75/9448","text":"Ana Mestrovic"},{"@pid":"80/1817","text":"Sanda Martincic-Ipsic"}]},"title":"Complex Networks Measures for Differentiation between Normal and Shuffled Croatian Texts.","venue":"CoRR","volume":"abs/1405.3786","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/MarganMM14","ee":"http://arxiv.org/abs/1405.3786","url":"https://dblp.org/rec/journals/corr/MarganMM14"}, "url":"URL#3975916" }, { "@score":"1", "@id":"3975917", "info":{"authors":{"author":[{"@pid":"146/0411","text":"Domagoj Margan"},{"@pid":"80/1817","text":"Sanda Martincic-Ipsic"},{"@pid":"75/9448","text":"Ana Mestrovic"}]},"title":"Preliminary Report on the Structure of Croatian Linguistic Co-occurrence Networks.","venue":"CoRR","volume":"abs/1405.4433","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/MarganMM14a","ee":"http://arxiv.org/abs/1405.4433","url":"https://dblp.org/rec/journals/corr/MarganMM14a"}, "url":"URL#3975917" }, { "@score":"1", "@id":"3975922", "info":{"authors":{"author":[{"@pid":"91/2956","text":"Marghny H. Mohamed"},{"@pid":"146/0894","text":"Rasha M. Abd El-Aziz"},{"@pid":"146/0832","text":"Ahmed I. Taloba"}]},"title":"An Effective Evolutionary Clustering Algorithm: Hepatitis C Case Study.","venue":"CoRR","volume":"abs/1405.6173","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/MarghnyET14","ee":"http://arxiv.org/abs/1405.6173","url":"https://dblp.org/rec/journals/corr/MarghnyET14"}, "url":"URL#3975922" }, { "@score":"1", "@id":"3975934", "info":{"authors":{"author":[{"@pid":"133/3582","text":"Panos P. Markopoulos"},{"@pid":"62/2590","text":"George N. Karystinos"},{"@pid":"p/DimitriosAPados","text":"Dimitrios A. Pados"}]},"title":"Optimal Algorithms for L1-subspace Signal Processing.","venue":"CoRR","volume":"abs/1405.6785","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/MarkopoulosKP14","ee":"http://arxiv.org/abs/1405.6785","url":"https://dblp.org/rec/journals/corr/MarkopoulosKP14"}, "url":"URL#3975934" }, { "@score":"1", "@id":"3975940", "info":{"authors":{"author":[{"@pid":"30/10019","text":"Kyle Marple"},{"@pid":"g/GopalGupta","text":"Gopal Gupta 0001"}]},"title":"Dynamic Consistency Checking in Goal-Directed Answer Set Programming.","venue":"CoRR","volume":"abs/1405.3603","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/MarpleG14","ee":"http://arxiv.org/abs/1405.3603","url":"https://dblp.org/rec/journals/corr/MarpleG14"}, "url":"URL#3975940" }, { "@score":"1", "@id":"3975964", "info":{"authors":{"author":{"@pid":"71/520","text":"Ruben Martinez-Cantin"}},"title":"BayesOpt: A Bayesian Optimization Library for Nonlinear Optimization, Experimental Design and Bandits.","venue":"CoRR","volume":"abs/1405.7430","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/Martinez-Cantin14","ee":"http://arxiv.org/abs/1405.7430","url":"https://dblp.org/rec/journals/corr/Martinez-Cantin14"}, "url":"URL#3975964" }, { "@score":"1", "@id":"3975981", "info":{"authors":{"author":[{"@pid":"146/0630","text":"Claudio Maruccio"},{"@pid":"146/0761","text":"Laura De Lorenzis"},{"@pid":"146/0953","text":"Luana Persano"},{"@pid":"146/0637","text":"Dario Pisignano"}]},"title":"Computational homogenization of fibrous piezoelectric materials.","venue":"CoRR","volume":"abs/1405.3302","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/MaruccioLPP14","ee":"http://arxiv.org/abs/1405.3302","url":"https://dblp.org/rec/journals/corr/MaruccioLPP14"}, "url":"URL#3975981" }, { "@score":"1", "@id":"3975984", "info":{"authors":{"author":[{"@pid":"146/0449","text":"Ines Marusic"},{"@pid":"90/2367","text":"James Worrell 0001"}]},"title":"Complexity of Equivalence and Learning for Multiplicity Tree Automata.","venue":"CoRR","volume":"abs/1405.0514","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/MarusicW14","ee":"http://arxiv.org/abs/1405.0514","url":"https://dblp.org/rec/journals/corr/MarusicW14"}, "url":"URL#3975984" }, { "@score":"1", "@id":"3976003", "info":{"authors":{"author":{"@pid":"129/1491","text":"Marina I. Maslennikova"}},"title":"Complexity of checking whether two automata are synchronized by the same language.","venue":"CoRR","volume":"abs/1405.3576","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/Maslennikova14a","ee":"http://arxiv.org/abs/1405.3576","url":"https://dblp.org/rec/journals/corr/Maslennikova14a"}, "url":"URL#3976003" }, { "@score":"1", "@id":"3976019", "info":{"authors":{"author":{"@pid":"146/0396","text":"Mario Mastriani"}},"title":"Rule of Three for Superresolution of Still Images with Applications to Compression and Denoising.","venue":"CoRR","volume":"abs/1405.0632","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/Mastriani14","ee":"http://arxiv.org/abs/1405.0632","url":"https://dblp.org/rec/journals/corr/Mastriani14"}, "url":"URL#3976019" }, { "@score":"1", "@id":"3976020", "info":{"authors":{"author":{"@pid":"146/0396","text":"Mario Mastriani"}},"title":"Lossless compression catalyst based on binary allocation via modular arithmetic.","venue":"CoRR","volume":"abs/1405.0933","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/Mastriani14a","ee":"http://arxiv.org/abs/1405.0933","url":"https://dblp.org/rec/journals/corr/Mastriani14a"}, "url":"URL#3976020" }, { "@score":"1", "@id":"3976054", "info":{"authors":{"author":{"@pid":"54/1968","text":"Ryutaroh Matsumoto"}},"title":"Coding Theoretic Construction of Quantum Ramp Secret Sharing.","venue":"CoRR","volume":"abs/1405.0149","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/Matsumoto14a","ee":"http://arxiv.org/abs/1405.0149","url":"https://dblp.org/rec/journals/corr/Matsumoto14a"}, "url":"URL#3976054" }, { "@score":"1", "@id":"3976057", "info":{"authors":{"author":[{"@pid":"124/7945","text":"Nobuyuki Matsumoto"},{"@pid":"198/5371","text":"Yuta Michimura"},{"@pid":"198/5335","text":"Yoichi Aso"},{"@pid":"198/5356","text":"Kimio Tsubono"}]},"title":"An optically trapped mirror for reaching the standard quantum limit.","venue":"CoRR","volume":"abs/1405.4906","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/MatsumotoMAT14","ee":"http://arxiv.org/abs/1405.4906","url":"https://dblp.org/rec/journals/corr/MatsumotoMAT14"}, "url":"URL#3976057" }, { "@score":"1", "@id":"3976058", "info":{"authors":{"author":[{"@pid":"146/0541","text":"Akira Matsuo"},{"@pid":"29/7383-2","text":"Keisuke Fujii 0002"},{"@pid":"47/891","text":"Nobuyuki Imoto"}]},"title":"A quantum algorithm for additive approximation of Ising partition functions.","venue":"CoRR","volume":"abs/1405.2749","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/MatsuoFI14","ee":"http://arxiv.org/abs/1405.2749","url":"https://dblp.org/rec/journals/corr/MatsuoFI14"}, "url":"URL#3976058" }, { "@score":"1", "@id":"3976064", "info":{"authors":{"author":[{"@pid":"30/6664","text":"Oliver Mattes"},{"@pid":"52/6717","text":"Wolfgang Karl"}]},"title":"Evaluating the Self-Optimization Process of the Adaptive Memory Management Architecture Self-aware Memory.","venue":"CoRR","volume":"abs/1405.2910","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/MattesK14","ee":"http://arxiv.org/abs/1405.2910","url":"https://dblp.org/rec/journals/corr/MattesK14"}, "url":"URL#3976064" }, { "@score":"1", "@id":"3976123", "info":{"authors":{"author":[{"@pid":"06/5485","text":"Robby G. McKilliam"},{"@pid":"g/AlexJGrant","text":"Alex J. Grant"},{"@pid":"12/334","text":"I. Vaughan L. Clarkson"}]},"title":"Finding a closest point in a lattice of Voronoi's first kind.","venue":"CoRR","volume":"abs/1405.7014","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/McKilliamGC14","ee":"http://arxiv.org/abs/1405.7014","url":"https://dblp.org/rec/journals/corr/McKilliamGC14"}, "url":"URL#3976123" }, { "@score":"1", "@id":"3976157", "info":{"authors":{"author":[{"@pid":"118/0002","text":"Haifa Mehdi"},{"@pid":"45/9836","text":"Olfa Boubaker"}]},"title":"Robust Tracking Control for Constrained Robots.","venue":"CoRR","volume":"abs/1405.1821","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/MehdiB14","ee":"http://arxiv.org/abs/1405.1821","url":"https://dblp.org/rec/journals/corr/MehdiB14"}, "url":"URL#3976157" }, { "@score":"1", "@id":"3976158", "info":{"authors":{"author":[{"@pid":"49/10817","text":"Motahareh Eslami Mehdiabadi"},{"@pid":"01/4547","text":"Hamid R. Rabiee"},{"@pid":"00/10770","text":"Mostafa Salehi"}]},"title":"Sampling from Diffusion Networks.","venue":"CoRR","volume":"abs/1405.7258","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/MehdiabadiRS14","ee":"http://arxiv.org/abs/1405.7258","url":"https://dblp.org/rec/journals/corr/MehdiabadiRS14"}, "url":"URL#3976158" }, { "@score":"1", "@id":"3976159", "info":{"authors":{"author":[{"@pid":"49/10817","text":"Motahareh Eslami Mehdiabadi"},{"@pid":"01/4547","text":"Hamid R. Rabiee"},{"@pid":"00/10770","text":"Mostafa Salehi"}]},"title":"Diffusion-Aware Sampling and Estimation in Information Diffusion Networks.","venue":"CoRR","volume":"abs/1405.7631","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/MehdiabadiRS14a","ee":"http://arxiv.org/abs/1405.7631","url":"https://dblp.org/rec/journals/corr/MehdiabadiRS14a"}, "url":"URL#3976159" }, { "@score":"1", "@id":"3976170", "info":{"authors":{"author":[{"@pid":"146/0938","text":"Shraddha Mehta"},{"@pid":"146/0397","text":"Vaishali Kalariya"}]},"title":"Efficient Tracking of a Moving Object using Inter-Frame Coding.","venue":"CoRR","volume":"abs/1405.4389","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/MehtaK14","ee":"http://arxiv.org/abs/1405.4389","url":"https://dblp.org/rec/journals/corr/MehtaK14"}, "url":"URL#3976170" }, { "@score":"1", "@id":"3976171", "info":{"authors":{"author":[{"@pid":"146/0938","text":"Shraddha Mehta"},{"@pid":"146/0397","text":"Vaishali Kalariya"}]},"title":"Real Time Object Tracking Based on Inter-frame Coding: A Review.","venue":"CoRR","volume":"abs/1405.4390","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/MehtaK14a","ee":"http://arxiv.org/abs/1405.4390","url":"https://dblp.org/rec/journals/corr/MehtaK14a"}, "url":"URL#3976171" }, { "@score":"1", "@id":"3976178", "info":{"authors":{"author":{"@pid":"53/915","text":"Gang Mei"}},"title":"A Straightforward Preprocessing Approach for Accelerating Convex Hull Computations on the GPU.","venue":"CoRR","volume":"abs/1405.3454","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/Mei14","ee":"http://arxiv.org/abs/1405.3454","url":"https://dblp.org/rec/journals/corr/Mei14"}, "url":"URL#3976178" }, { "@score":"1", "@id":"3976202", "info":{"authors":{"author":[{"@pid":"31/11075-3","text":"Alexey A. Melnikov 0001"},{"@pid":"130/3994","text":"Adi Makmal"},{"@pid":"06/698","text":"Hans J. Briegel"}]},"title":"Projective simulation applied to the grid-world and the mountain-car problem.","venue":"CoRR","volume":"abs/1405.5459","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/MelnikovMB14","ee":"http://arxiv.org/abs/1405.5459","url":"https://dblp.org/rec/journals/corr/MelnikovMB14"}, "url":"URL#3976202" }, { "@score":"1", "@id":"3976215", "info":{"authors":{"author":[{"@pid":"04/2866","text":"Isabel Méndez-Díaz"},{"@pid":"87/812","text":"Graciela L. Nasini"},{"@pid":"86/5488","text":"Daniel E. Severín"}]},"title":"An exact DSatur-based algorithm for the Equitable Coloring Problem.","venue":"CoRR","volume":"abs/1405.7011","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/Mendez-DiazNS14","ee":"http://arxiv.org/abs/1405.7011","url":"https://dblp.org/rec/journals/corr/Mendez-DiazNS14"}, "url":"URL#3976215" }, { "@score":"1", "@id":"3976216", "info":{"authors":{"author":[{"@pid":"04/2866","text":"Isabel Méndez-Díaz"},{"@pid":"87/812","text":"Graciela L. Nasini"},{"@pid":"86/5488","text":"Daniel E. Severín"}]},"title":"A tabu search heuristic for the Equitable Coloring Problem.","venue":"CoRR","volume":"abs/1405.7020","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/Mendez-DiazNS14a","ee":"http://arxiv.org/abs/1405.7020","url":"https://dblp.org/rec/journals/corr/Mendez-DiazNS14a"}, "url":"URL#3976216" }, { "@score":"1", "@id":"3976219", "info":{"authors":{"author":[{"@pid":"146/0859","text":"Alessio Meneghetti"},{"@pid":"19/1809","text":"Massimiliano Sala"},{"@pid":"69/1330","text":"Alessandro Tomasi 0001"}]},"title":"A weight-distribution bound for entropy extractors using linear binary codes.","venue":"CoRR","volume":"abs/1405.2820","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/MeneghettiST14","ee":"http://arxiv.org/abs/1405.2820","url":"https://dblp.org/rec/journals/corr/MeneghettiST14"}, "url":"URL#3976219" }, { "@score":"1", "@id":"3976241", "info":{"authors":{"author":[{"@pid":"60/9476","text":"Farshad Merrikh-Bayat"},{"@pid":"37/11305","text":"Seyedeh-Nafiseh Mirebrahimi"},{"@pid":"146/0745","text":"Mohammad-Reza Khalili"}]},"title":"Discrete-Time Fractional-Order PID Controller: Definition, Tuning, Digital Realization and Experimental Results.","venue":"CoRR","volume":"abs/1405.0144","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/Merrikh-BayatMK14","ee":"http://arxiv.org/abs/1405.0144","url":"https://dblp.org/rec/journals/corr/Merrikh-BayatMK14"}, "url":"URL#3976241" }, { "@score":"1", "@id":"3976285", "info":{"authors":{"author":[{"@pid":"12/11469","text":"Antonios Michaloliakos"},{"@pid":"73/11466","text":"Ryan Rogalin"},{"@pid":"146/0870","text":"Yonglong Zhang"},{"@pid":"68/3430","text":"Konstantinos Psounis"},{"@pid":"19/2492","text":"Giuseppe Caire"}]},"title":"Performance Modeling of Next-Generation Wireless Networks.","venue":"CoRR","volume":"abs/1405.0089","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/MichaloliakosRZPC14","ee":"http://arxiv.org/abs/1405.0089","url":"https://dblp.org/rec/journals/corr/MichaloliakosRZPC14"}, "url":"URL#3976285" }, { "@score":"1", "@id":"3976286", "info":{"authors":{"author":[{"@pid":"12/9833","text":"Radoslaw Michalski"},{"@pid":"74/608","text":"Tomasz Kajdanowicz"},{"@pid":"41/7376","text":"Piotr Bródka"},{"@pid":"k/PrzemyslawKazienko","text":"Przemyslaw Kazienko"}]},"title":"Seed Selection for Spread of Influence in Social Networks: Temporal vs. Static Approach.","venue":"CoRR","volume":"abs/1405.0538","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/MichalskiKBK14","ee":"http://arxiv.org/abs/1405.0538","url":"https://dblp.org/rec/journals/corr/MichalskiKBK14"}, "url":"URL#3976286" }, { "@score":"1", "@id":"3976343", "info":{"authors":{"author":[{"@pid":"116/2758","text":"Robert Mingesz"},{"@pid":"146/0882","text":"Gergely Vadai"},{"@pid":"46/7999","text":"Zoltan Gingl"}]},"title":"What kind of noise guarantees security for the Kirchhoff-Loop-Johnson-Noise key exchange?","venue":"CoRR","volume":"abs/1405.1196","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/MingeszVG14","ee":"http://arxiv.org/abs/1405.1196","url":"https://dblp.org/rec/journals/corr/MingeszVG14"}, "url":"URL#3976343" }, { "@score":"1", "@id":"3976359", "info":{"authors":{"author":[{"@pid":"01/8524","text":"Seyed M. Mirtaheri"},{"@pid":"01/9795","text":"Mustafa Emre Dinçtürk"},{"@pid":"135/5993","text":"Salman Hooshmand"},{"@pid":"b/GvBochmann","text":"Gregor von Bochmann"},{"@pid":"99/2759","text":"Guy-Vincent Jourdan"},{"@pid":"90/5997","text":"Iosif-Viorel Onut"}]},"title":"A Brief History of Web Crawlers.","venue":"CoRR","volume":"abs/1405.0749","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/MirtaheriDHBJO14","ee":"http://arxiv.org/abs/1405.0749","url":"https://dblp.org/rec/journals/corr/MirtaheriDHBJO14"}, "url":"URL#3976359" }, { "@score":"1", "@id":"3976361", "info":{"authors":{"author":[{"@pid":"122/5382","text":"Jawad Mirza"},{"@pid":"57/5882-1","text":"Peter J. Smith 0001"},{"@pid":"64/3238","text":"Pawel A. Dmochowski"},{"@pid":"54/554","text":"Mansoor Shafi"}]},"title":"Limited Feedback MU Massive MISO Systems with Differential TCQ in Temporally Correlated Channels.","venue":"CoRR","volume":"abs/1405.6052","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/MirzaSDS14","ee":"http://arxiv.org/abs/1405.6052","url":"https://dblp.org/rec/journals/corr/MirzaSDS14"}, "url":"URL#3976361" }, { "@score":"1", "@id":"3976383", "info":{"authors":{"author":[{"@pid":"29/7412","text":"Mishari Al Mishari"},{"@pid":"123/9642","text":"Ekin Oguz"},{"@pid":"08/1183","text":"Gene Tsudik"}]},"title":"Fighting Authorship Linkability with Crowdsourcing.","venue":"CoRR","volume":"abs/1405.4918","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/MishariOT14","ee":"http://arxiv.org/abs/1405.4918","url":"https://dblp.org/rec/journals/corr/MishariOT14"}, "url":"URL#3976383" }, { "@score":"1", "@id":"3976426", "info":{"authors":{"author":[{"@pid":"146/0826","text":"Sunny Mitra"},{"@pid":"146/0904","text":"Ritwik Mitra"},{"@pid":"80/495-2","text":"Martin Riedl 0002"},{"@pid":"20/6100","text":"Chris Biemann"},{"@pid":"m/AnimeshMukherjee","text":"Animesh Mukherjee 0001"},{"@pid":"77/2307-2","text":"Pawan Goyal 0002"}]},"title":"That's sick dude!: Automatic identification of word sense change across different timescales.","venue":"CoRR","volume":"abs/1405.4392","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/MitraMRBMG14","ee":"http://arxiv.org/abs/1405.4392","url":"https://dblp.org/rec/journals/corr/MitraMRBMG14"}, "url":"URL#3976426" }, { "@score":"1", "@id":"3976440", "info":{"authors":{"author":{"@pid":"56/9887","text":"Kato Mivule"}},"title":"A Codon Frequency Obfuscation Heuristic for Raw Genomic Data Privacy.","venue":"CoRR","volume":"abs/1405.5410","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/Mivule14","ee":"http://arxiv.org/abs/1405.5410","url":"https://dblp.org/rec/journals/corr/Mivule14"}, "url":"URL#3976440" }, { "@score":"1", "@id":"3976447", "info":{"authors":{"author":[{"@pid":"17/9836","text":"Hanéne Mkaouar"},{"@pid":"45/9836","text":"Olfa Boubaker"}]},"title":"Compliant motion control for handling a single object by two similar industrial robots.","venue":"CoRR","volume":"abs/1405.1515","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/MkaouarB14","ee":"http://arxiv.org/abs/1405.1515","url":"https://dblp.org/rec/journals/corr/MkaouarB14"}, "url":"URL#3976447" }, { "@score":"1", "@id":"3976479", "info":{"authors":{"author":[{"@pid":"167/7706","text":"Mohamed Mbida"},{"@pid":"146/0567","text":"Abdellah Ezzati"}]},"title":"OSCMAC Duty Cycle with Multi Helpers CT Mode WILEM Technology in Wireless Sensor Networks.","venue":"CoRR","volume":"abs/1405.1993","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/MohamedA14","ee":"http://arxiv.org/abs/1405.1993","url":"https://dblp.org/rec/journals/corr/MohamedA14"}, "url":"URL#3976479" }, { "@score":"1", "@id":"3976481", "info":{"authors":{"author":[{"@pid":"146/0768","text":"Karim M. Mohamed"},{"@pid":"08/6642","text":"Mohamed A. Ismail"},{"@pid":"87/4511","text":"Nagia M. Ghanem"}]},"title":"VSCAN: An Enhanced Video Summarization using Density-based Spatial Clustering.","venue":"CoRR","volume":"abs/1405.0174","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/MohamedIG14","ee":"http://arxiv.org/abs/1405.0174","url":"https://dblp.org/rec/journals/corr/MohamedIG14"}, "url":"URL#3976481" }, { "@score":"1", "@id":"3976487", "info":{"authors":{"author":[{"@pid":"86/8945","text":"Mohammad Mohammadi"},{"@pid":"33/4219","text":"Shahram Jafari"}]},"title":"An expert system for recommending suitable ornamental fish addition to an aquarium based on aquarium condition.","venue":"CoRR","volume":"abs/1405.1524","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/MohammadiJ14","ee":"http://arxiv.org/abs/1405.1524","url":"https://dblp.org/rec/journals/corr/MohammadiJ14"}, "url":"URL#3976487" }, { "@score":"1", "@id":"3976488", "info":{"authors":{"author":[{"@pid":"29/10359","text":"Elaheh Mohammadi"},{"@pid":"06/1232","text":"Farokh Marvasti"}]},"title":"Optimal Distortion of Non-Uniform Sampling.","venue":"CoRR","volume":"abs/1405.3980","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/MohammadiM14","ee":"http://arxiv.org/abs/1405.3980","url":"https://dblp.org/rec/journals/corr/MohammadiM14"}, "url":"URL#3976488" }, { "@score":"1", "@id":"3976500", "info":{"authors":{"author":[{"@pid":"03/5448","text":"Mehryar Mohri"},{"@pid":"73/924","text":"Michael D. Riley"}]},"title":"On the Disambiguation of Weighted Automata.","venue":"CoRR","volume":"abs/1405.0500","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/MohriR14","ee":"http://arxiv.org/abs/1405.0500","url":"https://dblp.org/rec/journals/corr/MohriR14"}, "url":"URL#3976500" }, { "@score":"1", "@id":"3976510", "info":{"authors":{"author":[{"@pid":"54/2683","text":"Andreas F. Molisch"},{"@pid":"19/2492","text":"Giuseppe Caire"},{"@pid":"49/219","text":"David Ott"},{"@pid":"12/107","text":"Jeffrey R. Foerster"},{"@pid":"83/10397","text":"Dilip Bethanabhotla"},{"@pid":"50/7911","text":"Mingyue Ji"}]},"title":"Caching Eliminates the Wireless Bottleneck in Video-Aware Wireless Networks.","venue":"CoRR","volume":"abs/1405.5864","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/MolischCOFBJ14","ee":"http://arxiv.org/abs/1405.5864","url":"https://dblp.org/rec/journals/corr/MolischCOFBJ14"}, "url":"URL#3976510" }, { "@score":"1", "@id":"3976522", "info":{"authors":{"author":[{"@pid":"146/0374","text":"Andrea Monacchi"},{"@pid":"121/0273","text":"Dominik Egarter"},{"@pid":"51/75","text":"Wilfried Elmenreich"},{"@pid":"19/8814","text":"Salvatore D'Alessandro"},{"@pid":"191/4511","text":"Andrea M. Tonello"}]},"title":"GREEND: An Energy Consumption Dataset of Households in Italy and Austria.","venue":"CoRR","volume":"abs/1405.3100","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/MonacchiEEDT14","ee":"http://arxiv.org/abs/1405.3100","url":"https://dblp.org/rec/journals/corr/MonacchiEEDT14"}, "url":"URL#3976522" }, { "@score":"1", "@id":"3976578", "info":{"authors":{"author":{"@pid":"11/145","text":"Richard Moot"}},"title":"Hybrid Type-Logical Grammars, First-Order Linear Logic and the Descriptive Inadequacy of Lambda Grammars.","venue":"CoRR","volume":"abs/1405.6678","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/Moot14","ee":"http://arxiv.org/abs/1405.6678","url":"https://dblp.org/rec/journals/corr/Moot14"}, "url":"URL#3976578" }, { "@score":"1", "@id":"3976580", "info":{"authors":{"author":{"@pid":"33/8486","text":"Michael Morak"}},"title":"The Impact of Disjunction on Reasoning under Existential Rules: Research Summary.","venue":"CoRR","volume":"abs/1405.5109","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/Morak14","ee":"http://arxiv.org/abs/1405.5109","url":"https://dblp.org/rec/journals/corr/Morak14"}, "url":"URL#3976580" }, { "@score":"1", "@id":"3976582", "info":{"authors":{"author":[{"@pid":"44/4323","text":"David Morales-Jiménez"},{"@pid":"08/4084","text":"Raymond H. Y. Louie"},{"@pid":"51/5954","text":"Matthew R. McKay"},{"@pid":"48/4792-2","text":"Yang Chen 0002"}]},"title":"Multiple-Antenna Signal Detection in Cognitive Radio Networks with Multiple Primary User Signals.","venue":"CoRR","volume":"abs/1405.6408","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/Morales-JimenezLMC14","ee":"http://arxiv.org/abs/1405.6408","url":"https://dblp.org/rec/journals/corr/Morales-JimenezLMC14"}, "url":"URL#3976582" }, { "@score":"1", "@id":"3976622", "info":{"authors":{"author":[{"@pid":"146/0545","text":"Reza Mosayebi"},{"@pid":"90/9872","text":"Hamidreza Arjmandi"},{"@pid":"49/11141","text":"Amin Gohari"},{"@pid":"25/311","text":"Masoumeh Nasiri-Kenari"},{"@pid":"m/UrbashiMitra","text":"Urbashi Mitra"}]},"title":"Receivers for Diffusion-Based Molecular Communication: Exploiting Memory and Sampling Rate.","venue":"CoRR","volume":"abs/1405.0147","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/MosayebiAGNM14","ee":"http://arxiv.org/abs/1405.0147","url":"https://dblp.org/rec/journals/corr/MosayebiAGNM14"}, "url":"URL#3976622" }, { "@score":"1", "@id":"3976624", "info":{"authors":{"author":[{"@pid":"146/0578","text":"Yasir Q. Mohsin"},{"@pid":"145/8415","text":"Greg Ongie"},{"@pid":"12/4336","text":"Mathews Jacob"}]},"title":"Iterative Non-Local Shrinkage Algorithm for MR Image Reconstruction.","venue":"CoRR","volume":"abs/1405.5494","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/MoshinOJ14","ee":"http://arxiv.org/abs/1405.5494","url":"https://dblp.org/rec/journals/corr/MoshinOJ14"}, "url":"URL#3976624" }, { "@score":"1", "@id":"3976646", "info":{"authors":{"author":[{"@pid":"74/8082","text":"Amer E. Mouawad"},{"@pid":"n/NaomiNishimura","text":"Naomi Nishimura"},{"@pid":"25/2134","text":"Venkatesh Raman 0001"},{"@pid":"143/7540","text":"Marcin Wrochna"}]},"title":"Reconfiguration over tree decompositions.","venue":"CoRR","volume":"abs/1405.2447","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/MouawadNRW14","ee":"http://arxiv.org/abs/1405.2447","url":"https://dblp.org/rec/journals/corr/MouawadNRW14"}, "url":"URL#3976646" }, { "@score":"1", "@id":"3976656", "info":{"authors":{"author":[{"@pid":"146/0583","text":"Karima Haddou ou Moussa"},{"@pid":"146/0570","text":"Ute Sondergeld"},{"@pid":"59/561","text":"Philipp Mayr 0001"},{"@pid":"m/PeterMutschke","text":"Peter Mutschke"},{"@pid":"r/MRittberger","text":"Marc Rittberger"}]},"title":"Assessing Educational Research - An Information Service for Monitoring a Heterogeneous Research Field.","venue":"CoRR","volume":"abs/1405.6738","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/MoussaSMMR14","ee":"http://arxiv.org/abs/1405.6738","url":"https://dblp.org/rec/journals/corr/MoussaSMMR14"}, "url":"URL#3976656" }, { "@score":"1", "@id":"3976664", "info":{"authors":{"author":[{"@pid":"29/7674","text":"Mahnush Movahedi"},{"@pid":"72/2042","text":"Jared Saia"},{"@pid":"27/7672","text":"Mahdi Zamani"}]},"title":"Secure Anonymous Broadcast.","venue":"CoRR","volume":"abs/1405.5326","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/MovahediSZ14","ee":"http://arxiv.org/abs/1405.5326","url":"https://dblp.org/rec/journals/corr/MovahediSZ14"}, "url":"URL#3976664" }, { "@score":"1", "@id":"3976682", "info":{"authors":{"author":[{"@pid":"34/1240","text":"Krikamol Muandet"},{"@pid":"96/464","text":"Kenji Fukumizu"},{"@pid":"01/6464","text":"Bharath K. Sriperumbudur"},{"@pid":"56/2574","text":"Arthur Gretton"},{"@pid":"97/119","text":"Bernhard Schölkopf"}]},"title":"Kernel Mean Shrinkage Estimators.","venue":"CoRR","volume":"abs/1405.5505","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/MuandetFSGS14","ee":"http://arxiv.org/abs/1405.5505","url":"https://dblp.org/rec/journals/corr/MuandetFSGS14"}, "url":"URL#3976682" }, { "@score":"1", "@id":"3976690", "info":{"authors":{"author":{"@pid":"146/0386","text":"Siddhartha Mukherjee"}},"title":"Study on performance improvement of oil paint image filter algorithm using parallel pattern library.","venue":"CoRR","volume":"abs/1405.1020","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/Mukherjee14a","ee":"http://arxiv.org/abs/1405.1020","url":"https://dblp.org/rec/journals/corr/Mukherjee14a"}, "url":"URL#3976690" }, { "@score":"1", "@id":"3976725", "info":{"authors":{"author":[{"@pid":"59/2641","text":"Akihiro Munemasa"},{"@pid":"90/4164","text":"Yoshio Sano"},{"@pid":"122/3120","text":"Tetsuji Taniguchi"}]},"title":"On the smallest eigenvalues of the line graphs of some trees.","venue":"CoRR","volume":"abs/1405.3475","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/MunemasaST14","ee":"http://arxiv.org/abs/1405.3475","url":"https://dblp.org/rec/journals/corr/MunemasaST14"}, "url":"URL#3976725" }, { "@score":"1", "@id":"3976732", "info":{"authors":{"author":[{"@pid":"60/4182","text":"Olga Muñoz"},{"@pid":"98/2685","text":"Antonio Pascual-Iserte"},{"@pid":"99/1385","text":"Josep Vidal"}]},"title":"Optimization of Radio and Computational Resources for Energy Efficiency in Latency-Constrained Application Offloading.","venue":"CoRR","volume":"abs/1405.4487","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/MunozPV14","ee":"http://arxiv.org/abs/1405.4487","url":"https://dblp.org/rec/journals/corr/MunozPV14"}, "url":"URL#3976732" }, { "@score":"1", "@id":"3976745", "info":{"authors":{"author":[{"@pid":"m/FionnMurtagh","text":"Fionn Murtagh"},{"@pid":"23/3071","text":"Adam Ganz"}]},"title":"Pattern Recognition in Narrative: Analysis of Narratives of Emotion.","venue":"CoRR","volume":"abs/1405.3539","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/MurtaghG14","ee":"http://arxiv.org/abs/1405.3539","url":"https://dblp.org/rec/journals/corr/MurtaghG14"}, "url":"URL#3976745" }, { "@score":"1", "@id":"3976761", "info":{"authors":{"author":[{"@pid":"m/PeterMutschke","text":"Peter Mutschke"},{"@pid":"02/1053","text":"Andrea Scharnhorst"},{"@pid":"72/6402","text":"Christophe Guéret"},{"@pid":"59/561","text":"Philipp Mayr 0001"},{"@pid":"95/533","text":"Preben Hansen"},{"@pid":"74/6127","text":"Aida Slavic"}]},"title":"Knowledge Maps and Information Retrieval (KMIR).","venue":"CoRR","volume":"abs/1405.7857","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/MutschkeSGMHS14","ee":"http://arxiv.org/abs/1405.7857","url":"https://dblp.org/rec/journals/corr/MutschkeSGMHS14"}, "url":"URL#3976761" }, { "@score":"1", "@id":"3976769", "info":{"authors":{"author":{"@pid":"78/8781","text":"Zubair Nabi"}},"title":"The Zen of Graduate-level Programming.","venue":"CoRR","volume":"abs/1405.2489","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/Nabi14","ee":"http://arxiv.org/abs/1405.2489","url":"https://dblp.org/rec/journals/corr/Nabi14"}, "url":"URL#3976769" }, { "@score":"1", "@id":"3976770", "info":{"authors":{"author":{"@pid":"78/8781","text":"Zubair Nabi"}},"title":"A $35 Firewall for the Developing World.","venue":"CoRR","volume":"abs/1405.2517","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/Nabi14a","ee":"http://arxiv.org/abs/1405.2517","url":"https://dblp.org/rec/journals/corr/Nabi14a"}, "url":"URL#3976770" }, { "@score":"1", "@id":"3976772", "info":{"authors":{"author":[{"@pid":"78/8781","text":"Zubair Nabi"},{"@pid":"84/6376","text":"Atif Alvi"}]},"title":"Clome: The Practical Implications of a Cloud-based Smart Home.","venue":"CoRR","volume":"abs/1405.0047","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/NabiA14","ee":"http://arxiv.org/abs/1405.0047","url":"https://dblp.org/rec/journals/corr/NabiA14"}, "url":"URL#3976772" }, { "@score":"1", "@id":"3976778", "info":{"authors":{"author":[{"@pid":"146/0746","text":"Marjan Naderinejad"},{"@pid":"69/3835","text":"Mohammad Jafar Tarokh"},{"@pid":"146/0671","text":"Alireza Poorebrahimi"}]},"title":"Recognition and Ranking Critical Success Factors of Business Intelligence in Hospitals - Case Study: Hasheminejad Hospital.","venue":"CoRR","volume":"abs/1405.4597","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/NaderinejadTP14","ee":"http://arxiv.org/abs/1405.4597","url":"https://dblp.org/rec/journals/corr/NaderinejadTP14"}, "url":"URL#3976778" }, { "@score":"1", "@id":"3976782", "info":{"authors":{"author":[{"@pid":"146/0902","text":"Christian A. Naesseth"},{"@pid":"22/8369","text":"Fredrik Lindsten"},{"@pid":"85/4891","text":"Thomas B. Schön"}]},"title":"Capacity estimation of two-dimensional channels using Sequential Monte Carlo.","venue":"CoRR","volume":"abs/1405.0102","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/NaessethLS14","ee":"http://arxiv.org/abs/1405.0102","url":"https://dblp.org/rec/journals/corr/NaessethLS14"}, "url":"URL#3976782" }, { "@score":"1", "@id":"3976791", "info":{"authors":{"author":[{"@pid":"176/5714","text":"Kyatsandra G. Nagananda"},{"@pid":"15/165","text":"Shalinee Kishore"},{"@pid":"11/4798","text":"Rick S. Blum"}]},"title":"A PMU Scheduling Scheme for Transmission of Synchrophasor Data in Electric Power Systems.","venue":"CoRR","volume":"abs/1405.6790","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/NaganandaKB14","ee":"http://arxiv.org/abs/1405.6790","url":"https://dblp.org/rec/journals/corr/NaganandaKB14"}, "url":"URL#3976791" }, { "@score":"1", "@id":"3976833", "info":{"authors":{"author":[{"@pid":"61/6528","text":"Cláudia Nalon"},{"@pid":"00/3290-1","text":"João Marcos 0001"},{"@pid":"d/ClareDixon","text":"Clare Dixon"}]},"title":"Clausal Resolution for Modal Logics of Confluence.","venue":"CoRR","volume":"abs/1405.0293","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/NalonMD14","ee":"http://arxiv.org/abs/1405.0293","url":"https://dblp.org/rec/journals/corr/NalonMD14"}, "url":"URL#3976833" }, { "@score":"1", "@id":"3976871", "info":{"authors":{"author":[{"@pid":"87/3366","text":"Nina Narodytska"},{"@pid":"86/2576","text":"Toby Walsh"}]},"title":"The Computational Impact of Partial Votes on Strategic Voting.","venue":"CoRR","volume":"abs/1405.7714","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/NarodytskaW14","ee":"http://arxiv.org/abs/1405.7714","url":"https://dblp.org/rec/journals/corr/NarodytskaW14"}, "url":"URL#3976871" }, { "@score":"1", "@id":"3976881", "info":{"authors":{"author":[{"@pid":"119/7627","text":"Athanasios Naskos"},{"@pid":"80/10717","text":"Emmanouela Stachtiari"},{"@pid":"g/AGounaris","text":"Anastasios Gounaris"},{"@pid":"20/2927","text":"Panagiotis Katsaros"},{"@pid":"48/2152","text":"Dimitrios Tsoumakos"},{"@pid":"83/741","text":"Ioannis Konstantinou"},{"@pid":"73/2079","text":"Spyros Sioutas"}]},"title":"Cloud elasticity using probabilistic model checking.","venue":"CoRR","volume":"abs/1405.4699","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/NaskosSGKTKS14","ee":"http://arxiv.org/abs/1405.4699","url":"https://dblp.org/rec/journals/corr/NaskosSGKTKS14"}, "url":"URL#3976881" }, { "@score":"1", "@id":"3976886", "info":{"authors":{"author":[{"@pid":"07/8331","text":"Ali Bou Nassif"},{"@pid":"c/LuizFernandoCapretz","text":"Luiz Fernando Capretz"},{"@pid":"20/2202","text":"Danny Ho"}]},"title":"Analyzing the Non-Functional Requirements in the Desharnais Dataset for Software Effort Estimation.","venue":"CoRR","volume":"abs/1405.1131","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/NassifCH14","ee":"http://arxiv.org/abs/1405.1131","url":"https://dblp.org/rec/journals/corr/NassifCH14"}, "url":"URL#3976886" }, { "@score":"1", "@id":"3976893", "info":{"authors":{"author":{"@pid":"146/0788","text":"Tim Natusch"}},"title":"Application of Lossless Data Compression Techniques to Radio Astronomy Data flows.","venue":"CoRR","volume":"abs/1405.5634","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/Natusch14","ee":"http://arxiv.org/abs/1405.5634","url":"https://dblp.org/rec/journals/corr/Natusch14"}, "url":"URL#3976893" }, { "@score":"1", "@id":"3976898", "info":{"authors":{"author":[{"@pid":"120/9715-1","text":"Muhammad Naveed 0001"},{"@pid":"44/2529","text":"Erman Ayday"},{"@pid":"27/9193","text":"Ellen Wright Clayton"},{"@pid":"29/10785","text":"Jacques Fellay"},{"@pid":"g/CarlAGunter","text":"Carl A. Gunter"},{"@pid":"h/JPHubaux","text":"Jean-Pierre Hubaux"},{"@pid":"m/BradleyMalin","text":"Bradley A. Malin"},{"@pid":"06/6268","text":"XiaoFeng Wang 0001"}]},"title":"Privacy and Security in the Genomic Era.","venue":"CoRR","volume":"abs/1405.1891","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/NaveedACFGHMW14","ee":"http://arxiv.org/abs/1405.1891","url":"https://dblp.org/rec/journals/corr/NaveedACFGHMW14"}, "url":"URL#3976898" }, { "@score":"1", "@id":"3976931", "info":{"authors":{"author":[{"@pid":"92/6335","text":"James Neufeld"},{"@pid":"72/251-1","text":"András György 0001"},{"@pid":"96/6660","text":"Dale Schuurmans"},{"@pid":"62/567","text":"Csaba Szepesvári"}]},"title":"Adaptive Monte Carlo via Bandit Allocation.","venue":"CoRR","volume":"abs/1405.3318","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/NeufeldGSS14","ee":"http://arxiv.org/abs/1405.3318","url":"https://dblp.org/rec/journals/corr/NeufeldGSS14"}, "url":"URL#3976931" }, { "@score":"1", "@id":"3976940", "info":{"authors":{"author":[{"@pid":"n/MEJNewman","text":"M. E. J. Newman"},{"@pid":"116/9873","text":"Travis Martin"}]},"title":"Equitable random graphs.","venue":"CoRR","volume":"abs/1405.1440","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/NewmanM14","ee":"http://arxiv.org/abs/1405.1440","url":"https://dblp.org/rec/journals/corr/NewmanM14"}, "url":"URL#3976940" }, { "@score":"1", "@id":"3976941", "info":{"authors":{"author":{"@pid":"98/6904","text":"Calvin Newport"}},"title":"Consensus with an Abstract MAC Layer.","venue":"CoRR","volume":"abs/1405.1382","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/Newport14","ee":"http://arxiv.org/abs/1405.1382","url":"https://dblp.org/rec/journals/corr/Newport14"}, "url":"URL#3976941" }, { "@score":"1", "@id":"3976942", "info":{"authors":{"author":{"@pid":"98/6904","text":"Calvin C. Newport"}},"title":"Radio Network Lower Bounds Made Easy.","venue":"CoRR","volume":"abs/1405.7300","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/Newport14a","ee":"http://arxiv.org/abs/1405.7300","url":"https://dblp.org/rec/journals/corr/Newport14a"}, "url":"URL#3976942" }, { "@score":"1", "@id":"3976946", "info":{"authors":{"author":[{"@pid":"131/9898","text":"Behnam Neyshabur"},{"@pid":"08/4400","text":"Yury Makarychev"},{"@pid":"50/3633","text":"Nathan Srebro"}]},"title":"Clustering, Hamming Embedding, Generalized LSH and the Max Norm.","venue":"CoRR","volume":"abs/1405.3167","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/NeyshaburMS14","ee":"http://arxiv.org/abs/1405.3167","url":"https://dblp.org/rec/journals/corr/NeyshaburMS14"}, "url":"URL#3976946" }, { "@score":"1", "@id":"3976954", "info":{"authors":{"author":[{"@pid":"22/11256","text":"Christiane L. Kameni Ngassa"},{"@pid":"09/6566","text":"Valentin Savin"},{"@pid":"59/8757","text":"Elsa Dupraz"},{"@pid":"72/6976","text":"David Declercq"}]},"title":"Density Evolution and Functional Threshold for the Noisy Min-Sum Decoder.","venue":"CoRR","volume":"abs/1405.6594","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/NgassaSDD14","ee":"http://arxiv.org/abs/1405.6594","url":"https://dblp.org/rec/journals/corr/NgassaSDD14"}, "url":"URL#3976954" }, { "@score":"1", "@id":"3976956", "info":{"authors":{"author":[{"@pid":"121/2623","text":"Minh-Quoc Nghiem"},{"@pid":"121/2607","text":"Giovanni Yoko Kristianto"},{"@pid":"72/7616","text":"Goran Topic"},{"@pid":"63/1600","text":"Akiko Aizawa"}]},"title":"Which one is better: presentation-based or content-based math search?","venue":"CoRR","volume":"abs/1405.3353","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/NghiemKTA14","ee":"http://arxiv.org/abs/1405.3353","url":"https://dblp.org/rec/journals/corr/NghiemKTA14"}, "url":"URL#3976956" }, { "@score":"1", "@id":"3976961", "info":{"authors":{"author":[{"@pid":"60/4037","text":"Hien Quoc Ngo"},{"@pid":"69/3561","text":"Himal A. Suraweera"},{"@pid":"74/4742","text":"Michail Matthaiou"},{"@pid":"76/3752","text":"Erik G. Larsson"}]},"title":"Multipair Full-Duplex Relaying with Massive Arrays and Linear Processing.","venue":"CoRR","volume":"abs/1405.1063","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/NgoSML14","ee":"http://arxiv.org/abs/1405.1063","url":"https://dblp.org/rec/journals/corr/NgoSML14"}, "url":"URL#3976961" }, { "@score":"1", "@id":"3976963", "info":{"authors":{"author":[{"@pid":"20/11471","text":"Hieu Duy Nguyen"},{"@pid":"60/2536-6","text":"Rui Zhang 0006"},{"@pid":"46/3348","text":"Sumei Sun"}]},"title":"Improper Signaling for Symbol Error Rate Minimization in K-User Interference Channel.","venue":"CoRR","volume":"abs/1405.7440","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/Nguyen0S14","ee":"http://arxiv.org/abs/1405.7440","url":"https://dblp.org/rec/journals/corr/Nguyen0S14"}, "url":"URL#3976963" }, { "@score":"1", "@id":"3976968", "info":{"authors":{"author":[{"@pid":"00/2953","text":"Linh Anh Nguyen"},{"@pid":"52/6475","text":"Joanna Golinska-Pilarek"}]},"title":"ExpTime Tableaux with Global Caching for the Description Logic SHOQ.","venue":"CoRR","volume":"abs/1405.7221","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/NguyenG14","ee":"http://arxiv.org/abs/1405.7221","url":"https://dblp.org/rec/journals/corr/NguyenG14"}, "url":"URL#3976968" }, { "@score":"1", "@id":"3976978", "info":{"authors":{"author":[{"@pid":"84/8339-1","text":"Hai Thanh Nguyen 0001"},{"@pid":"17/3180","text":"Jérémie Mary"},{"@pid":"16/4835","text":"Philippe Preux"}]},"title":"Cold-start Problems in Recommendation Systems via Contextual-bandit Algorithms.","venue":"CoRR","volume":"abs/1405.7544","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/NguyenMP14","ee":"http://arxiv.org/abs/1405.7544","url":"https://dblp.org/rec/journals/corr/NguyenMP14"}, "url":"URL#3976978" }, { "@score":"1", "@id":"3976995", "info":{"authors":{"author":[{"@pid":"58/5954","text":"Matthias Nickles"},{"@pid":"53/280","text":"Alessandra Mileo"}]},"title":"Probabilistic Inductive Logic Programming Based on Answer Set Programming.","venue":"CoRR","volume":"abs/1405.0720","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/NicklesM14","ee":"http://arxiv.org/abs/1405.0720","url":"https://dblp.org/rec/journals/corr/NicklesM14"}, "url":"URL#3976995" }, { "@score":"1", "@id":"3976997", "info":{"authors":{"author":[{"@pid":"68/9023","text":"Olivier Nicol"},{"@pid":"17/3180","text":"Jérémie Mary"},{"@pid":"16/4835","text":"Philippe Preux"}]},"title":"Improving offline evaluation of contextual bandit algorithms via bootstrapping techniques.","venue":"CoRR","volume":"abs/1405.3536","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/NicolMP14","ee":"http://arxiv.org/abs/1405.3536","url":"https://dblp.org/rec/journals/corr/NicolMP14"}, "url":"URL#3976997" }, { "@score":"1", "@id":"3977011", "info":{"authors":{"author":[{"@pid":"125/2081","text":"Johan Sebastian Rosenkilde Nielsen"},{"@pid":"02/3860","text":"Peter Beelen"}]},"title":"Sub-quadratic Decoding of One-point Hermitian Codes.","venue":"CoRR","volume":"abs/1405.6008","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/NielsenB14","ee":"http://arxiv.org/abs/1405.6008","url":"https://dblp.org/rec/journals/corr/NielsenB14"}, "url":"URL#3977011" }, { "@score":"1", "@id":"3977021", "info":{"authors":{"author":[{"@pid":"n/MathiasNiepert","text":"Mathias Niepert"},{"@pid":"d/PedroDomingos","text":"Pedro M. Domingos"}]},"title":"Exchangeable Variable Models.","venue":"CoRR","volume":"abs/1405.0501","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/NiepertD14","ee":"http://arxiv.org/abs/1405.0501","url":"https://dblp.org/rec/journals/corr/NiepertD14"}, "url":"URL#3977021" }, { "@score":"1", "@id":"3977031", "info":{"authors":{"author":[{"@pid":"62/6555","text":"Stefanos Nikolaidis"},{"@pid":"146/0891","text":"Keren Gu"},{"@pid":"01/5768","text":"Ramya Ramakrishnan"},{"@pid":"30/6778","text":"Julie A. Shah"}]},"title":"Efficient Model Learning for Human-Robot Collaborative Tasks.","venue":"CoRR","volume":"abs/1405.6341","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/NikolaidisGRS14","ee":"http://arxiv.org/abs/1405.6341","url":"https://dblp.org/rec/journals/corr/NikolaidisGRS14"}, "url":"URL#3977031" }, { "@score":"1", "@id":"3977068", "info":{"authors":{"author":{"@pid":"61/4828","text":"Elena Nogina"}},"title":"On Logic of Formal Provability and Explicit Proofs.","venue":"CoRR","volume":"abs/1405.2559","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/Nogina14","ee":"http://arxiv.org/abs/1405.2559","url":"https://dblp.org/rec/journals/corr/Nogina14"}, "url":"URL#3977068" }, { "@score":"1", "@id":"3977079", "info":{"authors":{"author":[{"@pid":"26/3471","text":"Nima Noorshams"},{"@pid":"63/2019","text":"Aravind Iyengar"}]},"title":"A Novel Stochastic Decoding of LDPC Codes with Quantitative Guarantees.","venue":"CoRR","volume":"abs/1405.6353","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/NoorshamsI14","ee":"http://arxiv.org/abs/1405.6353","url":"https://dblp.org/rec/journals/corr/NoorshamsI14"}, "url":"URL#3977079" }, { "@score":"1", "@id":"3977093", "info":{"authors":{"author":[{"@pid":"47/2805-1","text":"Peter Novák 0001"},{"@pid":"w/CeesWitteveen","text":"Cees Witteveen"}]},"title":"On the cost-complexity of multi-context systems.","venue":"CoRR","volume":"abs/1405.7295","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/NovakW14","ee":"http://arxiv.org/abs/1405.7295","url":"https://dblp.org/rec/journals/corr/NovakW14"}, "url":"URL#3977093" }, { "@score":"1", "@id":"3977098", "info":{"authors":{"author":[{"@pid":"26/9960","text":"Thomas Nowak"},{"@pid":"50/2598","text":"Bernadette Charron-Bost"}]},"title":"An Overview of Transience Bounds in Max-Plus Algebra.","venue":"CoRR","volume":"abs/1405.3458","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/NowakC14","ee":"http://arxiv.org/abs/1405.3458","url":"https://dblp.org/rec/journals/corr/NowakC14"}, "url":"URL#3977098" }, { "@score":"1", "@id":"3977099", "info":{"authors":{"author":[{"@pid":"22/2106","text":"Michael F. Nowlan"},{"@pid":"147/1195","text":"Jose M. Faleiro"},{"@pid":"f/BryanFord","text":"Bryan Ford"}]},"title":"Crux: Locality-Preserving Distributed Systems.","venue":"CoRR","volume":"abs/1405.0637","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/NowlanFF14","ee":"http://arxiv.org/abs/1405.0637","url":"https://dblp.org/rec/journals/corr/NowlanFF14"}, "url":"URL#3977099" }, { "@score":"1", "@id":"3977156", "info":{"authors":{"author":[{"@pid":"34/4116","text":"Kunihisa Okano"},{"@pid":"47/6327","text":"Hideaki Ishii"}]},"title":"Minimum data rate for stabilization of linear systems with parametric uncertainties.","venue":"CoRR","volume":"abs/1405.5932","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/OkanoI14","ee":"http://arxiv.org/abs/1405.5932","url":"https://dblp.org/rec/journals/corr/OkanoI14"}, "url":"URL#3977156" }, { "@score":"1", "@id":"3977158", "info":{"authors":{"author":[{"@pid":"146/0825","text":"V. C. K. P. Arul Oli"},{"@pid":"146/0526","text":"Elayaraja Ponram"}]},"title":"Wireless Fidelity Real Time Security System.","venue":"CoRR","volume":"abs/1405.1019","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/OliP14","ee":"http://arxiv.org/abs/1405.1019","url":"https://dblp.org/rec/journals/corr/OliP14"}, "url":"URL#3977158" }, { "@score":"1", "@id":"3977170", "info":{"authors":{"author":[{"@pid":"139/3178","text":"George Souza Oliveira"},{"@pid":"87/6562","text":"Anderson Faustino da Silva"}]},"title":"Towards an Efficient Prolog System by Code Introspection.","venue":"CoRR","volume":"abs/1405.2564","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/OliveiraS14","ee":"http://arxiv.org/abs/1405.2564","url":"https://dblp.org/rec/journals/corr/OliveiraS14"}, "url":"URL#3977170" }, { "@score":"1", "@id":"3977173", "info":{"authors":{"author":[{"@pid":"05/2184","text":"Esa Ollila"},{"@pid":"01/432","text":"Hyon-Jung Kim"},{"@pid":"k/VisaKoivunen","text":"Visa Koivunen"}]},"title":"Robust iterative hard thresholding for compressed sensing.","venue":"CoRR","volume":"abs/1405.1502","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/OllilaKK14","ee":"http://arxiv.org/abs/1405.1502","url":"https://dblp.org/rec/journals/corr/OllilaKK14"}, "url":"URL#3977173" }, { "@score":"1", "@id":"3977189", "info":{"authors":{"author":{"@pid":"128/0467","text":"Ehsan Omidi"}},"title":"Modeling and Nonlinear Control of Gantry Crane Using Feedback Linearization Method.","venue":"CoRR","volume":"abs/1405.5926","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/Omidi14","ee":"http://arxiv.org/abs/1405.5926","url":"https://dblp.org/rec/journals/corr/Omidi14"}, "url":"URL#3977189" }, { "@score":"1", "@id":"3977195", "info":{"authors":{"author":[{"@pid":"39/1521","text":"Kian Win Ong"},{"@pid":"p/YPapakonstantinou","text":"Yannis Papakonstantinou"},{"@pid":"146/0923","text":"Romain Vernoux"}]},"title":"The SQL++ Semi-structured Data Model and Query Language: A Capabilities Survey of SQL-on-Hadoop, NoSQL and NewSQL Databases.","venue":"CoRR","volume":"abs/1405.3631","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/OngPV14","ee":"http://arxiv.org/abs/1405.3631","url":"https://dblp.org/rec/journals/corr/OngPV14"}, "url":"URL#3977195" }, { "@score":"1", "@id":"3977197", "info":{"authors":{"author":{"@pid":"31/4428","text":"Shmuel Onn"}},"title":"Huge Multiway Table Problems.","venue":"CoRR","volume":"abs/1405.1189","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/Onn14a","ee":"http://arxiv.org/abs/1405.1189","url":"https://dblp.org/rec/journals/corr/Onn14a"}, "url":"URL#3977197" }, { "@score":"1", "@id":"3977198", "info":{"authors":{"author":[{"@pid":"11/5392","text":"Jukka-Pekka Onnela"},{"@pid":"51/6724","text":"Benjamin N. Waber"},{"@pid":"p/AlexPentland","text":"Alex Pentland"},{"@pid":"144/5542","text":"Sebastian Schnorf"},{"@pid":"71/1244","text":"David Lazer"}]},"title":"Using sociometers to quantify social interaction patterns.","venue":"CoRR","volume":"abs/1405.6224","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/OnnelaWPSL14","ee":"http://arxiv.org/abs/1405.6224","url":"https://dblp.org/rec/journals/corr/OnnelaWPSL14"}, "url":"URL#3977198" }, { "@score":"1", "@id":"3977219", "info":{"authors":{"author":{"@pid":"146/0848","text":"Olena Orobinska"}},"title":"Automatic Method Of Domain Ontology Construction based on Characteristics of Corpora POS-Analysis.","venue":"CoRR","volume":"abs/1405.1346","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/Orobinska14","ee":"http://arxiv.org/abs/1405.1346","url":"https://dblp.org/rec/journals/corr/Orobinska14"}, "url":"URL#3977219" }, { "@score":"1", "@id":"3977223", "info":{"authors":{"author":[{"@pid":"86/1519","text":"Romeo Ortega"},{"@pid":"63/8085","text":"Elena Panteley"}]},"title":"When is a Parameterized Controller Suitable for Adaptive Control?","venue":"CoRR","volume":"abs/1405.7921","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/OrtegaP14","ee":"http://arxiv.org/abs/1405.7921","url":"https://dblp.org/rec/journals/corr/OrtegaP14"}, "url":"URL#3977223" }, { "@score":"1", "@id":"3977226", "info":{"authors":{"author":[{"@pid":"22/2525","text":"Ronald Ortner"},{"@pid":"83/7401","text":"Odalric-Ambrym Maillard"},{"@pid":"84/1607","text":"Daniil Ryabko"}]},"title":"Selecting Near-Optimal Approximate State Representations in Reinforcement Learning.","venue":"CoRR","volume":"abs/1405.2652","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/OrtnerMR14","ee":"http://arxiv.org/abs/1405.2652","url":"https://dblp.org/rec/journals/corr/OrtnerMR14"}, "url":"URL#3977226" }, { "@score":"1", "@id":"3977227", "info":{"authors":{"author":[{"@pid":"136/6139","text":"Grzegorz Orynczak"},{"@pid":"136/6049","text":"Marcin Jakubek"},{"@pid":"62/3428","text":"Karol Wawrzyniak"},{"@pid":"136/6102","text":"Michal Klos"}]},"title":"Market Coupling as the Universal Algorithm to Assess Zonal Divisions.","venue":"CoRR","volume":"abs/1405.0878","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/OrynczakJWK14","ee":"http://arxiv.org/abs/1405.0878","url":"https://dblp.org/rec/journals/corr/OrynczakJWK14"}, "url":"URL#3977227" }, { "@score":"1", "@id":"3977239", "info":{"authors":{"author":[{"@pid":"59/10694","text":"Valentín Osuna-Enciso"},{"@pid":"39/11160","text":"Erik Cuevas"},{"@pid":"s/JuanHumbertoSossaAzuela","text":"Humberto Sossa"}]},"title":"A Comparison of Nature Inspired Algorithms for Multi-threshold Image Segmentation.","venue":"CoRR","volume":"abs/1405.7406","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/Osuna-EncisoCS14","ee":"http://arxiv.org/abs/1405.7406","url":"https://dblp.org/rec/journals/corr/Osuna-EncisoCS14"}, "url":"URL#3977239" }, { "@score":"1", "@id":"3977243", "info":{"authors":{"author":[{"@pid":"146/0415","text":"Ilya V. Otpuschennikov"},{"@pid":"52/9890","text":"Alexander A. Semenov"},{"@pid":"146/0792","text":"Stepan Kochemazov"}]},"title":"Transalg: a Tool for Translating Procedural Descriptions of Discrete Functions to SAT (Tool Paper).","venue":"CoRR","volume":"abs/1405.1544","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/OtpuschennikovSK14","ee":"http://arxiv.org/abs/1405.1544","url":"https://dblp.org/rec/journals/corr/OtpuschennikovSK14"}, "url":"URL#3977243" }, { "@score":"1", "@id":"3977284", "info":{"authors":{"author":[{"@pid":"90/790","text":"Tapio Pahikkala"},{"@pid":"66/10547","text":"Michiel Stock"},{"@pid":"50/4446","text":"Antti Airola"},{"@pid":"41/6124","text":"Tero Aittokallio"},{"@pid":"96/4375","text":"Bernard De Baets"},{"@pid":"02/2445","text":"Willem Waegeman"}]},"title":"A two-step learning approach for solving full and almost full cold start problems in dyadic prediction.","venue":"CoRR","volume":"abs/1405.4423","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/PahikkalaSAABW14","ee":"http://arxiv.org/abs/1405.4423","url":"https://dblp.org/rec/journals/corr/PahikkalaSAABW14"}, "url":"URL#3977284" }, { "@score":"1", "@id":"3977302", "info":{"authors":{"author":[{"@pid":"44/1276","text":"Madhumangal Pal"},{"@pid":"36/11230","text":"Anita Pal"}]},"title":"Scheduling algorithm to select $k$ optimal programme slots in television channels: A graph theoretic approach.","venue":"CoRR","volume":"abs/1405.2199","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/PalP14","ee":"http://arxiv.org/abs/1405.2199","url":"https://dblp.org/rec/journals/corr/PalP14"}, "url":"URL#3977302" }, { "@score":"1", "@id":"3977310", "info":{"authors":{"author":[{"@pid":"71/10825","text":"Vasyl Palchykov"},{"@pid":"45/6349","text":"Kimmo Kaski"},{"@pid":"51/8194","text":"János Kertész"}]},"title":"Transmission of cultural traits in layered ego-centric networks.","venue":"CoRR","volume":"abs/1405.6009","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/PalchykovKK14","ee":"http://arxiv.org/abs/1405.6009","url":"https://dblp.org/rec/journals/corr/PalchykovKK14"}, "url":"URL#3977310" }, { "@score":"1", "@id":"3977352", "info":{"authors":{"author":{"@pid":"125/2234","text":"Federica Panella"}},"title":"Approximate Query Answering in Inconsistent Databases.","venue":"CoRR","volume":"abs/1405.0253","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/Panella14","ee":"http://arxiv.org/abs/1405.0253","url":"https://dblp.org/rec/journals/corr/Panella14"}, "url":"URL#3977352" }, { "@score":"1", "@id":"3977364", "info":{"authors":{"author":[{"@pid":"16/5695","text":"Enrico Paolini"},{"@pid":"84/6001","text":"Cedomir Stefanovic"},{"@pid":"68/5804","text":"Gianluigi Liva"},{"@pid":"50/3930","text":"Petar Popovski"}]},"title":"Coded Random Access: How Coding Theory Helps to Build Random Access Protocols.","venue":"CoRR","volume":"abs/1405.4127","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/PaoliniSLP14","ee":"http://arxiv.org/abs/1405.4127","url":"https://dblp.org/rec/journals/corr/PaoliniSLP14"}, "url":"URL#3977364" }, { "@score":"1", "@id":"3977370", "info":{"authors":{"author":[{"@pid":"24/6583-3","text":"Georgios Papadopoulos 0003"},{"@pid":"94/165","text":"Hanna Kurniawati"},{"@pid":"46/2649","text":"Nicholas M. Patrikalakis"}]},"title":"Analysis of Asymptotically Optimal Sampling-based Motion Planning Algorithms for Lipschitz Continuous Dynamical Systems.","venue":"CoRR","volume":"abs/1405.2872","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/PapadopoulosKP14","ee":"http://arxiv.org/abs/1405.2872","url":"https://dblp.org/rec/journals/corr/PapadopoulosKP14"}, "url":"URL#3977370" }, { "@score":"1", "@id":"3977372", "info":{"authors":{"author":[{"@pid":"93/4868","text":"Evanthia Papadopoulou"},{"@pid":"125/2905","text":"Maksym Zavershynskyi"}]},"title":"The Higher-Order Voronoi Diagram of Line Segments.","venue":"CoRR","volume":"abs/1405.3806","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/PapadopoulouZ14","ee":"http://arxiv.org/abs/1405.3806","url":"https://dblp.org/rec/journals/corr/PapadopoulouZ14"}, "url":"URL#3977372" }, { "@score":"1", "@id":"3977407", "info":{"authors":{"author":{"@pid":"146/0742","text":"Paritosh Parmar"}},"title":"Use of Computer Vision to Detect Tangles in Tangled Objects.","venue":"CoRR","volume":"abs/1405.4802","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/Parmar14","ee":"http://arxiv.org/abs/1405.4802","url":"https://dblp.org/rec/journals/corr/Parmar14"}, "url":"URL#3977407" }, { "@score":"1", "@id":"3977414", "info":{"authors":{"author":[{"@pid":"57/8037","text":"Aline Parreau"},{"@pid":"30/1875","text":"Michel Rigo"},{"@pid":"86/8091","text":"Eric Rowland"},{"@pid":"68/9687","text":"Élise Vandomme"}]},"title":"A new approach to the $2$-regularity of the l-abelian complexity of 2-automatic sequences.","venue":"CoRR","volume":"abs/1405.3532","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/ParreauRRV14","ee":"http://arxiv.org/abs/1405.3532","url":"https://dblp.org/rec/journals/corr/ParreauRRV14"}, "url":"URL#3977414" }, { "@score":"1", "@id":"3977425", "info":{"authors":{"author":[{"@pid":"65/8368","text":"Razvan Pascanu"},{"@pid":"22/9988","text":"Yann N. Dauphin"},{"@pid":"56/10453","text":"Surya Ganguli"},{"@pid":"56/953","text":"Yoshua Bengio"}]},"title":"On the saddle point problem for non-convex optimization.","venue":"CoRR","volume":"abs/1405.4604","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/PascanuDGB14","ee":"http://arxiv.org/abs/1405.4604","url":"https://dblp.org/rec/journals/corr/PascanuDGB14"}, "url":"URL#3977425" }, { "@score":"1", "@id":"3977470", "info":{"authors":{"author":[{"@pid":"22/11061","text":"Johny Paul"},{"@pid":"37/3374","text":"Walter Stechele"},{"@pid":"82/11060","text":"Manfred Kröhnert"},{"@pid":"34/6686","text":"Tamim Asfour"}]},"title":"Resource-Aware Programming for Robotic Vision.","venue":"CoRR","volume":"abs/1405.2908","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/PaulSKA14","ee":"http://arxiv.org/abs/1405.2908","url":"https://dblp.org/rec/journals/corr/PaulSKA14"}, "url":"URL#3977470" }, { "@score":"1", "@id":"3977477", "info":{"authors":{"author":[{"@pid":"37/8062","text":"Theodore P. Pavlic"},{"@pid":"146/0887","text":"Alyssa M. Adams"},{"@pid":"123/1798","text":"Paul C. W. Davies"},{"@pid":"146/0929","text":"Sara Imari Walker"}]},"title":"Self-referencing cellular automata: A model of the evolution of information control in biological systems.","venue":"CoRR","volume":"abs/1405.4070","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/PavlicADW14","ee":"http://arxiv.org/abs/1405.4070","url":"https://dblp.org/rec/journals/corr/PavlicADW14"}, "url":"URL#3977477" }, { "@score":"1", "@id":"3977495", "info":{"authors":{"author":[{"@pid":"61/11268","text":"Truls Pedersen"},{"@pid":"67/11251","text":"Sjur K. Dyrkolbotn"},{"@pid":"88/11269","text":"Piotr Kazmierczak"}]},"title":"Big, but not unruly: Tractable norms for anonymous game structures.","venue":"CoRR","volume":"abs/1405.6899","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/PedersenDK14","ee":"http://arxiv.org/abs/1405.6899","url":"https://dblp.org/rec/journals/corr/PedersenDK14"}, "url":"URL#3977495" }, { "@score":"1", "@id":"3977502", "info":{"authors":{"author":[{"@pid":"129/1503","text":"Sen Pei"},{"@pid":"42/2549","text":"Lev Muchnik"},{"@pid":"92/5186","text":"José S. Andrade Jr."},{"@pid":"47/4401-1","text":"Zhiming Zheng 0001"},{"@pid":"65/1138","text":"Hernán A. Makse"}]},"title":"Searching for superspreaders of information in real-world social media.","venue":"CoRR","volume":"abs/1405.1790","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/PeiMAZM14","ee":"http://arxiv.org/abs/1405.1790","url":"https://dblp.org/rec/journals/corr/PeiMAZM14"}, "url":"URL#3977502" }, { "@score":"1", "@id":"3977520", "info":{"authors":{"author":[{"@pid":"35/10806","text":"Tong Peng"},{"@pid":"98/6670","text":"Rodrigo C. de Lamare"}]},"title":"Adaptive Delay-Tolerant Distributed Space-Time Coding Based on Adjustable Code Matrices for Cooperative MIMO Relaying Systems.","venue":"CoRR","volume":"abs/1405.4571","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/PengL14","ee":"http://arxiv.org/abs/1405.4571","url":"https://dblp.org/rec/journals/corr/PengL14"}, "url":"URL#3977520" }, { "@score":"1", "@id":"3977531", "info":{"authors":{"author":[{"@pid":"133/6556","text":"Xiaojiang Peng"},{"@pid":"68/6610-2","text":"Limin Wang 0002"},{"@pid":"90/9541","text":"Xingxing Wang"},{"@pid":"q/YuQiao1","text":"Yu Qiao 0001"}]},"title":"Bag of Visual Words and Fusion Methods for Action Recognition: Comprehensive Study and Good Practice.","venue":"CoRR","volume":"abs/1405.4506","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/PengWWQ14","ee":"http://arxiv.org/abs/1405.4506","url":"https://dblp.org/rec/journals/corr/PengWWQ14"}, "url":"URL#3977531" }, { "@score":"1", "@id":"3977541", "info":{"authors":{"author":[{"@pid":"94/2721","text":"Kostas P. Peppas"},{"@pid":"88/9797","text":"Martin Zamkotsian"},{"@pid":"69/6650","text":"Fotis I. Lazarakis"},{"@pid":"20/485","text":"Panayotis G. Cottis"}]},"title":"Asymptotic Error Performance Analysis of Spatial Modulation under Generalized Fading.","venue":"CoRR","volume":"abs/1405.7851","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/PeppasZLC14","ee":"http://arxiv.org/abs/1405.7851","url":"https://dblp.org/rec/journals/corr/PeppasZLC14"}, "url":"URL#3977541" }, { "@score":"1", "@id":"3977542", "info":{"authors":{"author":{"@pid":"25/10461","text":"Billy Peralta"}},"title":"Simultaneous Feature and Expert Selection within Mixture of Experts.","venue":"CoRR","volume":"abs/1405.7624","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/Peralta14","ee":"http://arxiv.org/abs/1405.7624","url":"https://dblp.org/rec/journals/corr/Peralta14"}, "url":"URL#3977542" }, { "@score":"1", "@id":"3977544", "info":{"authors":{"author":[{"@pid":"146/0857","text":"Gamaliel Percino"},{"@pid":"11/9226","text":"Peter Klimek"},{"@pid":"68/5032","text":"Stefan Thurner"}]},"title":"Instrumentational complexity of music genres and why simplicity sells.","venue":"CoRR","volume":"abs/1405.5057","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/PercinoKT14","ee":"http://arxiv.org/abs/1405.5057","url":"https://dblp.org/rec/journals/corr/PercinoKT14"}, "url":"URL#3977544" }, { "@score":"1", "@id":"3977550", "info":{"authors":{"author":[{"@pid":"p/LuizMonizPereira","text":"Luís Moniz Pereira"},{"@pid":"130/8374","text":"Emmanuelle-Anna Dietz"},{"@pid":"48/415","text":"Steffen Hölldobler"}]},"title":"Contextual Abductive Reasoning with Side-Effects.","venue":"CoRR","volume":"abs/1405.3713","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/PereiraDH14","ee":"http://arxiv.org/abs/1405.3713","url":"https://dblp.org/rec/journals/corr/PereiraDH14"}, "url":"URL#3977550" }, { "@score":"1", "@id":"3977569", "info":{"authors":{"author":[{"@pid":"30/9830","text":"Michele Peroli"},{"@pid":"93/2273","text":"Luca Viganò 0001"},{"@pid":"146/0796","text":"Matteo Zavatteri"}]},"title":"Non-collaborative Attackers and How and Where to Defend Flawed Security Protocols (Extended Version).","venue":"CoRR","volume":"abs/1405.6912","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/PeroliVZ14","ee":"http://arxiv.org/abs/1405.6912","url":"https://dblp.org/rec/journals/corr/PeroliVZ14"}, "url":"URL#3977569" }, { "@score":"1", "@id":"3977597", "info":{"authors":{"author":{"@pid":"31/2528","text":"Michael Kai Petersen"}},"title":"When push comes to shove verbs literally shake due to latent semantic parameters of size and intensity.","venue":"CoRR","volume":"abs/1405.1359","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/Petersen14b","ee":"http://arxiv.org/abs/1405.1359","url":"https://dblp.org/rec/journals/corr/Petersen14b"}, "url":"URL#3977597" }, { "@score":"1", "@id":"3977608", "info":{"authors":{"author":{"@pid":"81/5945","text":"Nicola Cufaro Petroni"}},"title":"Entropy and its discontents: A note on definitions.","venue":"CoRR","volume":"abs/1405.7601","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/Petroni14","ee":"http://arxiv.org/abs/1405.7601","url":"https://dblp.org/rec/journals/corr/Petroni14"}, "url":"URL#3977608" }, { "@score":"1", "@id":"3977620", "info":{"authors":{"author":[{"@pid":"65/585","text":"Götz E. Pfander"},{"@pid":"37/9829","text":"Pavel Zheltov"}]},"title":"Estimation of Overspread Scattering Functions.","venue":"CoRR","volume":"abs/1405.2475","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/PfanderZ14","ee":"http://arxiv.org/abs/1405.2475","url":"https://dblp.org/rec/journals/corr/PfanderZ14"}, "url":"URL#3977620" }, { "@score":"1", "@id":"3977623", "info":{"authors":{"author":[{"@pid":"136/5123","text":"Mai Quyen Pham"},{"@pid":"22/4117","text":"Laurent Duval"},{"@pid":"95/6069","text":"Caroline Chaux"},{"@pid":"78/2060","text":"Jean-Christophe Pesquet"}]},"title":"A Primal-Dual Proximal Algorithm for Sparse Template-Based Adaptive Filtering: Application to Seismic Multiple Removal.","venue":"CoRR","volume":"abs/1405.1081","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/PhamDCP14","ee":"http://arxiv.org/abs/1405.1081","url":"https://dblp.org/rec/journals/corr/PhamDCP14"}, "url":"URL#3977623" }, { "@score":"1", "@id":"3977641", "info":{"authors":{"author":[{"@pid":"95/1110","text":"Ramin Pichevar"},{"@pid":"33/8054","text":"Jason Wung"},{"@pid":"80/8052","text":"Daniele Giacobello"},{"@pid":"45/8761","text":"Joshua Atkins"}]},"title":"Design and Optimization of a Speech Recognition Front-End for Distant-Talking Control of a Music Playback Device.","venue":"CoRR","volume":"abs/1405.1379","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/PichevarWGA14","ee":"http://arxiv.org/abs/1405.1379","url":"https://dblp.org/rec/journals/corr/PichevarWGA14"}, "url":"URL#3977641" }, { "@score":"1", "@id":"3977656", "info":{"authors":{"author":[{"@pid":"53/5809","text":"Elaine Pimentel"},{"@pid":"o/CarlosOlarte","text":"Carlos Olarte"},{"@pid":"26/7042","text":"Vivek Nigam"}]},"title":"A Proof Theoretic Study of Soft Concurrent Constraint Programming.","venue":"CoRR","volume":"abs/1405.2329","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/PimentelON14","ee":"http://arxiv.org/abs/1405.2329","url":"https://dblp.org/rec/journals/corr/PimentelON14"}, "url":"URL#3977656" }, { "@score":"1", "@id":"3977670", "info":{"authors":{"author":[{"@pid":"70/8027","text":"Leila Pishdad"},{"@pid":"23/2633","text":"Fabrice Labeau"}]},"title":"A New Reduction Scheme for Gaussian Sum Filters.","venue":"CoRR","volume":"abs/1405.3164","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/PishdadL14a","ee":"http://arxiv.org/abs/1405.3164","url":"https://dblp.org/rec/journals/corr/PishdadL14a"}, "url":"URL#3977670" }, { "@score":"1", "@id":"3977692", "info":{"authors":{"author":[{"@pid":"50/8891","text":"Piotr Plonski"},{"@pid":"60/11227","text":"Krzysztof Zaremba"}]},"title":"Visualizing Random Forest with Self-Organising Map.","venue":"CoRR","volume":"abs/1405.6684","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/PlonskiZ14","ee":"http://arxiv.org/abs/1405.6684","url":"https://dblp.org/rec/journals/corr/PlonskiZ14"}, "url":"URL#3977692" }, { "@score":"1", "@id":"3977706", "info":{"authors":{"author":{"@pid":"09/4704","text":"Thierry Poibeau"}},"title":"Optimality Theory as a Framework for Lexical Acquisition.","venue":"CoRR","volume":"abs/1405.6682","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/Poibeau14","ee":"http://arxiv.org/abs/1405.6682","url":"https://dblp.org/rec/journals/corr/Poibeau14"}, "url":"URL#3977706" }, { "@score":"1", "@id":"3977708", "info":{"authors":{"author":[{"@pid":"42/8759","text":"Luisa F. Polanía"},{"@pid":"03/7822","text":"Rafael E. Carrillo"},{"@pid":"45/2944","text":"Manuel Blanco-Velasco"},{"@pid":"b/KennethEBarner","text":"Kenneth E. Barner"}]},"title":"Exploiting Prior Knowledge in Compressed Sensing Wireless ECG Systems.","venue":"CoRR","volume":"abs/1405.4201","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/PolaniaCBB14","ee":"http://arxiv.org/abs/1405.4201","url":"https://dblp.org/rec/journals/corr/PolaniaCBB14"}, "url":"URL#3977708" }, { "@score":"1", "@id":"3977714", "info":{"authors":{"author":{"@pid":"01/10429","text":"Sylwia Polberg"}},"title":"Extension-based Semantics of Abstract Dialectical Frameworks.","venue":"CoRR","volume":"abs/1405.0406","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/Polberg14","ee":"http://arxiv.org/abs/1405.0406","url":"https://dblp.org/rec/journals/corr/Polberg14"}, "url":"URL#3977714" }, { "@score":"1", "@id":"3977715", "info":{"authors":{"author":[{"@pid":"135/8832","text":"Mihai Polceanu"},{"@pid":"54/2925","text":"Cédric Buche"}]},"title":"Towards A Theory-Of-Mind-Inspired Generic Decision-Making Framework.","venue":"CoRR","volume":"abs/1405.5048","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/PolceanuB14","ee":"http://arxiv.org/abs/1405.5048","url":"https://dblp.org/rec/journals/corr/PolceanuB14"}, "url":"URL#3977715" }, { "@score":"1", "@id":"3977717", "info":{"authors":{"author":[{"@pid":"129/1675","text":"Bryan Poling"},{"@pid":"84/3850","text":"Gilad Lerman"},{"@pid":"22/6733","text":"Arthur Szlam"}]},"title":"Better Feature Tracking Through Subspace Constraints.","venue":"CoRR","volume":"abs/1405.2316","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/PolingLS14","ee":"http://arxiv.org/abs/1405.2316","url":"https://dblp.org/rec/journals/corr/PolingLS14"}, "url":"URL#3977717" }, { "@score":"1", "@id":"3977725", "info":{"authors":{"author":[{"@pid":"74/8860","text":"Yury Polyanskiy"},{"@pid":"24/2219-1","text":"Yihong Wu 0001"}]},"title":"Dissipation of information in channels with input constraints.","venue":"CoRR","volume":"abs/1405.3629","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/PolyanskiyW14","ee":"http://arxiv.org/abs/1405.3629","url":"https://dblp.org/rec/journals/corr/PolyanskiyW14"}, "url":"URL#3977725" }, { "@score":"1", "@id":"3977749", "info":{"authors":{"author":[{"@pid":"11/8526","text":"Christopher M. Poskitt"},{"@pid":"31/6990","text":"Detlef Plump"}]},"title":"Verifying Monadic Second-Order Properties of Graph Programs.","venue":"CoRR","volume":"abs/1405.5927","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/PoskittP14","ee":"http://arxiv.org/abs/1405.5927","url":"https://dblp.org/rec/journals/corr/PoskittP14"}, "url":"URL#3977749" }, { "@score":"1", "@id":"3977750", "info":{"authors":{"author":{"@pid":"15/5377","text":"Raphael Poss"}},"title":"Haskell for OCaml programmers.","venue":"CoRR","volume":"abs/1405.3072","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/Poss14","ee":"http://arxiv.org/abs/1405.3072","url":"https://dblp.org/rec/journals/corr/Poss14"}, "url":"URL#3977750" }, { "@score":"1", "@id":"3977751", "info":{"authors":{"author":{"@pid":"15/5377","text":"Raphael Poss"}},"title":"Categories from scratch.","venue":"CoRR","volume":"abs/1405.3073","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/Poss14a","ee":"http://arxiv.org/abs/1405.3073","url":"https://dblp.org/rec/journals/corr/Poss14a"}, "url":"URL#3977751" }, { "@score":"1", "@id":"3977760", "info":{"authors":{"author":[{"@pid":"119/2595","text":"Konstantinos Poularakis"},{"@pid":"03/3843","text":"Leandros Tassiulas"}]},"title":"Exploiting User Mobility for Wireless Content Delivery.","venue":"CoRR","volume":"abs/1405.6286","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/PoularakisT14","ee":"http://arxiv.org/abs/1405.6286","url":"https://dblp.org/rec/journals/corr/PoularakisT14"}, "url":"URL#3977760" }, { "@score":"1", "@id":"3977771", "info":{"authors":{"author":[{"@pid":"86/5576","text":"Alexander M. Powell"},{"@pid":"79/7396","text":"J. Tyler Whitehouse"}]},"title":"Error bounds for consistent reconstruction: random polytopes and coverage processes.","venue":"CoRR","volume":"abs/1405.7094","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/PowellW14","ee":"http://arxiv.org/abs/1405.7094","url":"https://dblp.org/rec/journals/corr/PowellW14"}, "url":"URL#3977771" }, { "@score":"1", "@id":"3977781", "info":{"authors":{"author":[{"@pid":"01/654","text":"Maria Prandini"},{"@pid":"95/650","text":"Simone Garatti"},{"@pid":"139/4984","text":"Riccardo Vignali"}]},"title":"Performance assessment and design of abstracted models for stochastic hybrid systems through a randomized approach.","venue":"CoRR","volume":"abs/1405.7197","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/PrandiniGV14","ee":"http://arxiv.org/abs/1405.7197","url":"https://dblp.org/rec/journals/corr/PrandiniGV14"}, "url":"URL#3977781" }, { "@score":"1", "@id":"3977807", "info":{"authors":{"author":[{"@pid":"146/0385","text":"Annette Pressman"},{"@pid":"146/0636","text":"Kai Hock"}]},"title":"Zgoubi: A startup guide for the complete beginner.","venue":"CoRR","volume":"abs/1405.4921","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/PressmanH14","ee":"http://arxiv.org/abs/1405.4921","url":"https://dblp.org/rec/journals/corr/PressmanH14"}, "url":"URL#3977807" }, { "@score":"1", "@id":"3977816", "info":{"authors":{"author":[{"@pid":"36/8243","text":"Julie De Pril"},{"@pid":"68/2919","text":"János Flesch"},{"@pid":"48/605","text":"Jeroen Kuipers"},{"@pid":"86/7059","text":"Gijs Schoenmakers"},{"@pid":"86/7060","text":"Koos Vrieze"}]},"title":"Existence of Secure Equilibrium in Multi-Player Games with Perfect Information.","venue":"CoRR","volume":"abs/1405.1615","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/PrilFKSV14","ee":"http://arxiv.org/abs/1405.1615","url":"https://dblp.org/rec/journals/corr/PrilFKSV14"}, "url":"URL#3977816" }, { "@score":"1", "@id":"3977818", "info":{"authors":{"author":[{"@pid":"146/0571","text":"Ben Pringle"},{"@pid":"91/7323","text":"Mukkai Krishnamoorthy"},{"@pid":"146/0632","text":"Kenneth Simons"}]},"title":"Case study to approaches to finding patterns in citation networks.","venue":"CoRR","volume":"abs/1405.5845","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/PringleKS14","ee":"http://arxiv.org/abs/1405.5845","url":"https://dblp.org/rec/journals/corr/PringleKS14"}, "url":"URL#3977818" }, { "@score":"1", "@id":"3977819", "info":{"authors":{"author":{"@pid":"23/3456","text":"Cristian Prisacariu"}},"title":"Higher Dimensional Modal Logic.","venue":"CoRR","volume":"abs/1405.4100","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/Prisacariu14a","ee":"http://arxiv.org/abs/1405.4100","url":"https://dblp.org/rec/journals/corr/Prisacariu14a"}, "url":"URL#3977819" }, { "@score":"1", "@id":"3977839", "info":{"authors":{"author":[{"@pid":"18/6234","text":"Justo Puerto"},{"@pid":"62/6226","text":"Federico Perea"}]},"title":"On two solution concepts in a class of multicriteria games.","venue":"CoRR","volume":"abs/1405.3176","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/PuertoP14","ee":"http://arxiv.org/abs/1405.3176","url":"https://dblp.org/rec/journals/corr/PuertoP14"}, "url":"URL#3977839" }, { "@score":"1", "@id":"3977846", "info":{"authors":{"author":[{"@pid":"66/6291","text":"Antti Puurula"},{"@pid":"41/5377","text":"Jesse Read"},{"@pid":"48/1070","text":"Albert Bifet"}]},"title":"Kaggle LSHTC4 Winning Solution.","venue":"CoRR","volume":"abs/1405.0546","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/PuurulaRB14","ee":"http://arxiv.org/abs/1405.0546","url":"https://dblp.org/rec/journals/corr/PuurulaRB14"}, "url":"URL#3977846" }, { "@score":"1", "@id":"3977855", "info":{"authors":{"author":[{"@pid":"125/2230","text":"Junjian Qi"},{"@pid":"09/1171-1","text":"Kai Sun 0001"}]},"title":"Power System Dynamic State Estimation by Unscented Kalman Filter with Guaranteed Positive Semi-definite State Covariance.","venue":"CoRR","volume":"abs/1405.6426","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/QiS14","ee":"http://arxiv.org/abs/1405.6426","url":"https://dblp.org/rec/journals/corr/QiS14"}, "url":"URL#3977855" }, { "@score":"1", "@id":"3977876", "info":{"authors":{"author":[{"@pid":"146/0658","text":"Shao-Meng Qin"},{"@pid":"127/6497","text":"Hai-Jun Zhou"}]},"title":"Solving the undirected feedback vertex set problem by local search.","venue":"CoRR","volume":"abs/1405.0446","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/QinZ14","ee":"http://arxiv.org/abs/1405.0446","url":"https://dblp.org/rec/journals/corr/QinZ14"}, "url":"URL#3977876" }, { "@score":"1", "@id":"3977885", "info":{"authors":{"author":[{"@pid":"115/5698","text":"Xi Qiu"},{"@pid":"99/1798","text":"Christopher Stewart"}]},"title":"Topic words analysis based on LDA model.","venue":"CoRR","volume":"abs/1405.3726","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/QiuS14","ee":"http://arxiv.org/abs/1405.3726","url":"https://dblp.org/rec/journals/corr/QiuS14"}, "url":"URL#3977885" }, { "@score":"1", "@id":"3977899", "info":{"authors":{"author":[{"@pid":"127/6195","text":"Abdul Quamar"},{"@pid":"d/AmolDeshpande","text":"Amol Deshpande"},{"@pid":"00/7739","text":"Jimmy Lin"}]},"title":"NScale: Neighborhood-centric Large-Scale Graph Analytics in the Cloud.","venue":"CoRR","volume":"abs/1405.1499","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/QuamarDL14","ee":"http://arxiv.org/abs/1405.1499","url":"https://dblp.org/rec/journals/corr/QuamarDL14"}, "url":"URL#3977899" }, { "@score":"1", "@id":"3977904", "info":{"authors":{"author":[{"@pid":"146/0909","text":"Hani A. Qudaih"},{"@pid":"146/0818","text":"Mohammed A. Bawazir"},{"@pid":"146/0440","text":"Shuaibu Hassan Usman"},{"@pid":"146/0628","text":"Jamaludin Ibrahim"}]},"title":"Persuasive Technology Contributions Toward Enhance Information Security Awareness in an Organization.","venue":"CoRR","volume":"abs/1405.1157","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/QudaihBUI14","ee":"http://arxiv.org/abs/1405.1157","url":"https://dblp.org/rec/journals/corr/QudaihBUI14"}, "url":"URL#3977904" }, { "@score":"1", "@id":"3977906", "info":{"authors":{"author":[{"@pid":"22/5754","text":"Daniel E. Quevedo"},{"@pid":"117/3432","text":"Wann-Jiun Ma"},{"@pid":"95/1467-1","text":"Vijay Gupta 0001"}]},"title":"Anytime Control using Input Sequences with Markovian Processor Availability.","venue":"CoRR","volume":"abs/1405.0751","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/QuevedoMG14","ee":"http://arxiv.org/abs/1405.0751","url":"https://dblp.org/rec/journals/corr/QuevedoMG14"}, "url":"URL#3977906" }, { "@score":"1", "@id":"3977924", "info":{"authors":{"author":[{"@pid":"44/6542","text":"Maben Rabi"},{"@pid":"77/6455","text":"Chithrupa Ramesh"},{"@pid":"81/3323","text":"Karl Henrik Johansson"}]},"title":"Separated design of encoder and controller for networked linear quadratic optimal control.","venue":"CoRR","volume":"abs/1405.0135","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/RabiRJ14","ee":"http://arxiv.org/abs/1405.0135","url":"https://dblp.org/rec/journals/corr/RabiRJ14"}, "url":"URL#3977924" }, { "@score":"1", "@id":"3977949", "info":{"authors":{"author":[{"@pid":"03/10548","text":"Mukund Raghothaman"},{"@pid":"26/7125","text":"Abhishek Udupa"}]},"title":"Language to Specify Syntax-Guided Synthesis Problems.","venue":"CoRR","volume":"abs/1405.5590","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/RaghothamanU14","ee":"http://arxiv.org/abs/1405.5590","url":"https://dblp.org/rec/journals/corr/RaghothamanU14"}, "url":"URL#3977949" }, { "@score":"1", "@id":"3977958", "info":{"authors":{"author":[{"@pid":"146/0421","text":"Hasnae Rahimi"},{"@pid":"17/9728","text":"Hanan El Bakkali"}]},"title":"A New Trust Reputation System for E-Commerce Applications.","venue":"CoRR","volume":"abs/1405.3199","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/RahimiB14","ee":"http://arxiv.org/abs/1405.3199","url":"https://dblp.org/rec/journals/corr/RahimiB14"}, "url":"URL#3977958" }, { "@score":"1", "@id":"3977970", "info":{"authors":{"author":[{"@pid":"36/7958","text":"Md. Habibur Rahman"},{"@pid":"23/10123","text":"Mohammad Nasiruddin"}]},"title":"Impact of Two Realistic Mobility Models for Vehicular Safety Applications.","venue":"CoRR","volume":"abs/1405.2417","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/RahmanN14","ee":"http://arxiv.org/abs/1405.2417","url":"https://dblp.org/rec/journals/corr/RahmanN14"}, "url":"URL#3977970" }, { "@score":"1", "@id":"3977971", "info":{"authors":{"author":[{"@pid":"76/3887","text":"Altaf Rahman"},{"@pid":"67/3142","text":"Vincent Ng 0001"}]},"title":"Narrowing the Modeling Gap: A Cluster-Ranking Approach to Coreference Resolution.","venue":"CoRR","volume":"abs/1405.5202","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/RahmanN14a","ee":"http://arxiv.org/abs/1405.5202","url":"https://dblp.org/rec/journals/corr/RahmanN14a"}, "url":"URL#3977971" }, { "@score":"1", "@id":"3977977", "info":{"authors":{"author":[{"@pid":"143/7360","text":"Akhlaqur Rahman"},{"@pid":"74/11463","text":"Sumaira Tasnim"}]},"title":"Application of Machine Learning Techniques in Aquaculture.","venue":"CoRR","volume":"abs/1405.1304","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/RahmanT14b","ee":"http://arxiv.org/abs/1405.1304","url":"https://dblp.org/rec/journals/corr/RahmanT14b"}, "url":"URL#3977977" }, { "@score":"1", "@id":"3977992", "info":{"authors":{"author":{"@pid":"146/0492","text":"Sweta Rai"}},"title":"Student Dropout Risk Assessment in Undergraduate Course at Residential University.","venue":"CoRR","volume":"abs/1405.3727","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/Rai14","ee":"http://arxiv.org/abs/1405.3727","url":"https://dblp.org/rec/journals/corr/Rai14"}, "url":"URL#3977992" }, { "@score":"1", "@id":"3977994", "info":{"authors":{"author":[{"@pid":"146/0890","text":"A. M. Raid"},{"@pid":"146/0917","text":"W. M. Khedr"},{"@pid":"39/9673","text":"Mohamed A. El-Dosuky"},{"@pid":"146/0444","text":"Wesam Ahmed"}]},"title":"Jpeg Image Compression Using Discrete Cosine Transform - A Survey.","venue":"CoRR","volume":"abs/1405.6147","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/RaidKEA14","ee":"http://arxiv.org/abs/1405.6147","url":"https://dblp.org/rec/journals/corr/RaidKEA14"}, "url":"URL#3977994" }, { "@score":"1", "@id":"3978008", "info":{"authors":{"author":[{"@pid":"19/9044-2","text":"M. Rajalakshmi 0002"},{"@pid":"124/3829","text":"P. Subashini 0001"}]},"title":"Texture Based Image Segmentation of Chili Pepper X-Ray Images Using Gabor Filter.","venue":"CoRR","volume":"abs/1405.1966","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/RajalakshmiS14","ee":"http://arxiv.org/abs/1405.1966","url":"https://dblp.org/rec/journals/corr/RajalakshmiS14"}, "url":"URL#3978008" }, { "@score":"1", "@id":"3978015", "info":{"authors":{"author":[{"@pid":"146/0382","text":"Ms. Rajni"},{"@pid":"146/0626","text":"Ms. Reena"}]},"title":"Review of MANETS Using Distributed Public-key Cryptography.","venue":"CoRR","volume":"abs/1405.0100","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/RajniR14","ee":"http://arxiv.org/abs/1405.0100","url":"https://dblp.org/rec/journals/corr/RajniR14"}, "url":"URL#3978015" }, { "@score":"1", "@id":"3978018", "info":{"authors":{"author":[{"@pid":"142/2474","text":"Ali Rakhshan"},{"@pid":"146/0844","text":"Evan Ray"},{"@pid":"72/4747","text":"Hossein Pishro-Nik"}]},"title":"Real-Time Estimation of the Distribution of Brake Response Times for an Individual Driver Using Vehicular Ad Hoc Network.","venue":"CoRR","volume":"abs/1405.6161","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/RakhshanRP14","ee":"http://arxiv.org/abs/1405.6161","url":"https://dblp.org/rec/journals/corr/RakhshanRP14"}, "url":"URL#3978018" }, { "@score":"1", "@id":"3978037", "info":{"authors":{"author":[{"@pid":"146/0539","text":"Sagar V. Ramani"},{"@pid":"146/0380","text":"Yagnik N. Tank"}]},"title":"Indoor Navigation on Google Maps and Indoor Localization Using RSS Fingerprinting.","venue":"CoRR","volume":"abs/1405.5669","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/RamaniT14","ee":"http://arxiv.org/abs/1405.5669","url":"https://dblp.org/rec/journals/corr/RamaniT14"}, "url":"URL#3978037" }, { "@score":"1", "@id":"3978082", "info":{"authors":{"author":{"@pid":"28/1732","text":"Marc'Aurelio Ranzato"}},"title":"On Learning Where To Look.","venue":"CoRR","volume":"abs/1405.5488","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/Ranzato14","ee":"http://arxiv.org/abs/1405.5488","url":"https://dblp.org/rec/journals/corr/Ranzato14"}, "url":"URL#3978082" }, { "@score":"1", "@id":"3978088", "info":{"authors":{"author":[{"@pid":"115/6908","text":"Xiongbin Rao"},{"@pid":"68/4401","text":"Vincent K. N. Lau"}]},"title":"Distributed Compressive CSIT Estimation and Feedback for FDD Multi-user Massive MIMO Systems.","venue":"CoRR","volume":"abs/1405.2786","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/RaoL14a","ee":"http://arxiv.org/abs/1405.2786","url":"https://dblp.org/rec/journals/corr/RaoL14a"}, "url":"URL#3978088" }, { "@score":"1", "@id":"3978092", "info":{"authors":{"author":[{"@pid":"180/5591","text":"K. Sankeerth Rao"},{"@pid":"20/5817","text":"Vinod M. Prabhakaran"}]},"title":"A New Upperbound for the Oblivious Transfer Capacity of Discrete Memoryless Channels.","venue":"CoRR","volume":"abs/1405.2049","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/RaoP14","ee":"http://arxiv.org/abs/1405.2049","url":"https://dblp.org/rec/journals/corr/RaoP14"}, "url":"URL#3978092" }, { "@score":"1", "@id":"3978107", "info":{"authors":{"author":[{"@pid":"140/7654","text":"Hossein Rashmanlou"},{"@pid":"44/1276","text":"Madhumangal Pal"}]},"title":"Isometry on Interval-valued Fuzzy Graphs.","venue":"CoRR","volume":"abs/1405.6003","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/RashmanlouP14a","ee":"http://arxiv.org/abs/1405.6003","url":"https://dblp.org/rec/journals/corr/RashmanlouP14a"}, "url":"URL#3978107" }, { "@score":"1", "@id":"3978109", "info":{"authors":{"author":[{"@pid":"05/4174","text":"Jean-François Raskin"},{"@pid":"11/7805","text":"Ocan Sankur"}]},"title":"Multiple-Environment Markov Decision Processes.","venue":"CoRR","volume":"abs/1405.4733","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/RaskinS14","ee":"http://arxiv.org/abs/1405.4733","url":"https://dblp.org/rec/journals/corr/RaskinS14"}, "url":"URL#3978109" }, { "@score":"1", "@id":"3978119", "info":{"authors":{"author":[{"@pid":"31/5228","text":"Mohammad Rastegari"},{"@pid":"48/9076","text":"Shobeir Fakhraei"},{"@pid":"21/11103","text":"Jonghyun Choi"},{"@pid":"j/DavidWJacobs","text":"David W. Jacobs"},{"@pid":"d/LarrySDavis","text":"Larry S. Davis"}]},"title":"Comparing apples to apples in the evaluation of binary coding methods.","venue":"CoRR","volume":"abs/1405.1005","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/RastegariFCJD14","ee":"http://arxiv.org/abs/1405.1005","url":"https://dblp.org/rec/journals/corr/RastegariFCJD14"}, "url":"URL#3978119" }, { "@score":"1", "@id":"3978125", "info":{"authors":{"author":[{"@pid":"93/10042","text":"Asiri Rathnayake"},{"@pid":"94/2056","text":"Hayo Thielecke"}]},"title":"Static Analysis for Regular Expression Exponential Runtime via Substructural Logics.","venue":"CoRR","volume":"abs/1405.7058","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/RathnayakeT14","ee":"http://arxiv.org/abs/1405.7058","url":"https://dblp.org/rec/journals/corr/RathnayakeT14"}, "url":"URL#3978125" }, { "@score":"1", "@id":"3978140", "info":{"authors":{"author":[{"@pid":"10/8399","text":"Siamak Ravanbakhsh"},{"@pid":"g/RussellGreiner","text":"Russell Greiner"},{"@pid":"15/1159","text":"Brendan J. Frey"}]},"title":"Training Restricted Boltzmann Machine by Perturbation.","venue":"CoRR","volume":"abs/1405.1436","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/RavanbakhshGF14","ee":"http://arxiv.org/abs/1405.1436","url":"https://dblp.org/rec/journals/corr/RavanbakhshGF14"}, "url":"URL#3978140" }, { "@score":"1", "@id":"3978155", "info":{"authors":{"author":[{"@pid":"146/0846","text":"Camellia Ray"},{"@pid":"124/2903","text":"Jayanta Kumar Das"},{"@pid":"39/5993","text":"Pabitra Pal Choudhury"}]},"title":"On Analysis and Generation of some Biologically Important Boolean Functions.","venue":"CoRR","volume":"abs/1405.2271","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/RayDC14","ee":"http://arxiv.org/abs/1405.2271","url":"https://dblp.org/rec/journals/corr/RayDC14"}, "url":"URL#3978155" }, { "@score":"1", "@id":"3978196", "info":{"authors":{"author":{"@pid":"146/0854","text":"Stephen L. Reed"}},"title":"Bitcoin Cooperative Proof-of-Stake.","venue":"CoRR","volume":"abs/1405.5741","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/Reed14","ee":"http://arxiv.org/abs/1405.5741","url":"https://dblp.org/rec/journals/corr/Reed14"}, "url":"URL#3978196" }, { "@score":"1", "@id":"3978201", "info":{"authors":{"author":[{"@pid":"146/0613","text":"Nafay Hifzur Rehman"},{"@pid":"90/1874","text":"Neelam Verma"}]},"title":"Application of Modified Multi Model Predictive Control Algorithm to Fluid Catalytic Cracking Unit.","venue":"CoRR","volume":"abs/1405.2708","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/RehmanV14","ee":"http://arxiv.org/abs/1405.2708","url":"https://dblp.org/rec/journals/corr/RehmanV14"}, "url":"URL#3978201" }, { "@score":"1", "@id":"3978204", "info":{"authors":{"author":[{"@pid":"r/GregoryJReid","text":"Greg Reid"},{"@pid":"52/3194","text":"Fei Wang"},{"@pid":"28/2300","text":"Wenyuan Wu"}]},"title":"Geometric involutive bases for positive dimensional polynomial ideals and SDP methods.","venue":"CoRR","volume":"abs/1405.7115","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/ReidWW14","ee":"http://arxiv.org/abs/1405.7115","url":"https://dblp.org/rec/journals/corr/ReidWW14"}, "url":"URL#3978204" }, { "@score":"1", "@id":"3978208", "info":{"authors":{"author":[{"@pid":"r/KlausReinhardt","text":"Klaus Reinhardt"},{"@pid":"82/4618","text":"Abuzer Yakaryilmaz"}]},"title":"The minimum amount of useful space: New results and new directions.","venue":"CoRR","volume":"abs/1405.2892","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/ReinhardtY14","ee":"http://arxiv.org/abs/1405.2892","url":"https://dblp.org/rec/journals/corr/ReinhardtY14"}, "url":"URL#3978208" }, { "@score":"1", "@id":"3978293", "info":{"authors":{"author":[{"@pid":"62/7479","text":"Stefano Rini"},{"@pid":"s/ShlomoShamai","text":"Shlomo Shamai"}]},"title":"On Capacity of the Dirty Paper Channel with Fading Dirt in the Strong Fading Regime.","venue":"CoRR","volume":"abs/1405.2221","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/RiniS14a","ee":"http://arxiv.org/abs/1405.2221","url":"https://dblp.org/rec/journals/corr/RiniS14a"}, "url":"URL#3978293" }, { "@score":"1", "@id":"3978295", "info":{"authors":{"author":[{"@pid":"18/5916","text":"Shamim Ripon"},{"@pid":"142/2610","text":"Aoyan Barua"},{"@pid":"142/2455","text":"Mohammad Salah Uddin"}]},"title":"Analysis Tool for UNL-Based Knowledge Representation.","venue":"CoRR","volume":"abs/1405.1397","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/RiponBU14","ee":"http://arxiv.org/abs/1405.1397","url":"https://dblp.org/rec/journals/corr/RiponBU14"}, "url":"URL#3978295" }, { "@score":"1", "@id":"3978300", "info":{"authors":{"author":{"@pid":"96/9925","text":"Fabián Riquelme"}},"title":"Satisfaction in societies with opinion leaders and mediators: properties and an axiomatization.","venue":"CoRR","volume":"abs/1405.3460","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/Riquelme14","ee":"http://arxiv.org/abs/1405.3460","url":"https://dblp.org/rec/journals/corr/Riquelme14"}, "url":"URL#3978300" }, { "@score":"1", "@id":"3978308", "info":{"authors":{"author":[{"@pid":"117/3860","text":"Stefano Riverso"},{"@pid":"146/0879","text":"Fabio Sarzo"},{"@pid":"05/4552","text":"Giancarlo Ferrari-Trecate"}]},"title":"Plug-and-play voltage and frequency control of islanded microgrids with meshed topology.","venue":"CoRR","volume":"abs/1405.2421","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/RiversoSF14","ee":"http://arxiv.org/abs/1405.2421","url":"https://dblp.org/rec/journals/corr/RiversoSF14"}, "url":"URL#3978308" }, { "@score":"1", "@id":"3978311", "info":{"authors":{"author":{"@pid":"61/934","text":"Nikzad Babaii Rizvandi"}},"title":"Performance Provisioning and Energy Efficiency in Cloud and Distributed Computing Systems.","venue":"CoRR","volume":"abs/1405.2523","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/Rizvandi14","ee":"http://arxiv.org/abs/1405.2523","url":"https://dblp.org/rec/journals/corr/Rizvandi14"}, "url":"URL#3978311" }, { "@score":"1", "@id":"3978317", "info":{"authors":{"author":[{"@pid":"04/5627","text":"Neil Robertson 0001"},{"@pid":"52/1135","text":"Paul D. Seymour"},{"@pid":"01/2054","text":"Robin Thomas 0001"}]},"title":"Girth six cubic graphs have Petersen minors.","venue":"CoRR","volume":"abs/1405.0533","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/RobertsonST14","ee":"http://arxiv.org/abs/1405.0533","url":"https://dblp.org/rec/journals/corr/RobertsonST14"}, "url":"URL#3978317" }, { "@score":"1", "@id":"3978336", "info":{"authors":{"author":[{"@pid":"131/6637","text":"David M. S. Rodrigues"},{"@pid":"06/918","text":"Vitorino Ramos"}]},"title":"Traversing News with Ant Colony Optimisation and Negative Pheromones.","venue":"CoRR","volume":"abs/1405.6285","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/RodriguesR14","ee":"http://arxiv.org/abs/1405.6285","url":"https://dblp.org/rec/journals/corr/RodriguesR14"}, "url":"URL#3978336" }, { "@score":"1", "@id":"3978340", "info":{"authors":{"author":[{"@pid":"32/6775","text":"Miguel Rodríguez-Pérez"},{"@pid":"72/1957","text":"Sergio Herrería-Alonso"},{"@pid":"35/180","text":"Manuel Fernández-Veiga"},{"@pid":"07/1925","text":"Cándido López-García"}]},"title":"Improving Energy Efficiency in Upstream EPON Channels by Packet Coalescing.","venue":"CoRR","volume":"abs/1405.5351","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/Rodriguez-PerezHFL14","ee":"http://arxiv.org/abs/1405.5351","url":"https://dblp.org/rec/journals/corr/Rodriguez-PerezHFL14"}, "url":"URL#3978340" }, { "@score":"1", "@id":"3978341", "info":{"authors":{"author":[{"@pid":"32/6775","text":"Miguel Rodríguez-Pérez"},{"@pid":"72/1957","text":"Sergio Herrería-Alonso"},{"@pid":"35/180","text":"Manuel Fernández-Veiga"},{"@pid":"07/1925","text":"Cándido López-García"}]},"title":"The persistent congestion problem of FAST-TCP: analysis and solutions.","venue":"CoRR","volume":"abs/1405.5364","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/Rodriguez-PerezHFL14a","ee":"http://arxiv.org/abs/1405.5364","url":"https://dblp.org/rec/journals/corr/Rodriguez-PerezHFL14a"}, "url":"URL#3978341" }, { "@score":"1", "@id":"3978342", "info":{"authors":{"author":[{"@pid":"32/6775","text":"Miguel Rodríguez-Pérez"},{"@pid":"72/1957","text":"Sergio Herrería-Alonso"},{"@pid":"35/180","text":"Manuel Fernández-Veiga"},{"@pid":"07/1925","text":"Cándido López-García"}]},"title":"Common Problems in Delay-Based Congestion Control Algorithms: A Gallery of Solutions.","venue":"CoRR","volume":"abs/1405.5365","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/Rodriguez-PerezHFL14b","ee":"http://arxiv.org/abs/1405.5365","url":"https://dblp.org/rec/journals/corr/Rodriguez-PerezHFL14b"}, "url":"URL#3978342" }, { "@score":"1", "@id":"3978357", "info":{"authors":{"author":[{"@pid":"31/748","text":"Francesco Romano"},{"@pid":"07/11047","text":"Daniele Pucci"},{"@pid":"21/3290","text":"Francesco Nori"}]},"title":"Collocated Adaptive Control of Underactuated Mechanical Systems.","venue":"CoRR","volume":"abs/1405.5005","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/RomanoPN14","ee":"http://arxiv.org/abs/1405.5005","url":"https://dblp.org/rec/journals/corr/RomanoPN14"}, "url":"URL#3978357" }, { "@score":"1", "@id":"3978358", "info":{"authors":{"author":[{"@pid":"r/AlexanderBRomanovsky","text":"Alexander B. Romanovsky"},{"@pid":"51/1943","text":"Marc-Olivier Killijian"}]},"title":"The Tenth European Dependable Computer Conference.","venue":"CoRR","volume":"abs/1405.2998","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/RomanovskyK14","ee":"http://arxiv.org/abs/1405.2998","url":"https://dblp.org/rec/journals/corr/RomanovskyK14"}, "url":"URL#3978358" }, { "@score":"1", "@id":"3978361", "info":{"authors":{"author":[{"@pid":"21/4228","text":"Laurent Romary"},{"@pid":"51/874","text":"Andreas Witt"}]},"title":"Méthodes pour la représentation informatisée de données lexicales / Methoden der Speicherung lexikalischer Daten.","venue":"CoRR","volume":"abs/1405.3925","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/RomaryW14","ee":"http://arxiv.org/abs/1405.3925","url":"https://dblp.org/rec/journals/corr/RomaryW14"}, "url":"URL#3978361" }, { "@score":"1", "@id":"3978377", "info":{"authors":{"author":[{"@pid":"183/6454","text":"José Ricardo Furlan Ronqui"},{"@pid":"10/1957","text":"Gonzalo Travieso"}]},"title":"Analyzing complex networks through correlations in centrality measurements.","venue":"CoRR","volume":"abs/1405.7724","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/RonquiT14","ee":"http://arxiv.org/abs/1405.7724","url":"https://dblp.org/rec/journals/corr/RonquiT14"}, "url":"URL#3978377" }, { "@score":"1", "@id":"3978389", "info":{"authors":{"author":[{"@pid":"01/6788","text":"Lorenzo Rosasco"},{"@pid":"127/6624","text":"Andrea Tacchetti"},{"@pid":"18/8186","text":"Silvia Villa"}]},"title":"Regularization by Early Stopping for Online Learning Algorithms.","venue":"CoRR","volume":"abs/1405.0042","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/RosascoTV14","ee":"http://arxiv.org/abs/1405.0042","url":"https://dblp.org/rec/journals/corr/RosascoTV14"}, "url":"URL#3978389" }, { "@score":"1", "@id":"3978405", "info":{"authors":{"author":[{"@pid":"17/5085","text":"Ryan A. Rossi"},{"@pid":"33/11518","text":"Nesreen K. Ahmed"}]},"title":"Role Discovery in Networks.","venue":"CoRR","volume":"abs/1405.7134","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/RossiA14a","ee":"http://arxiv.org/abs/1405.7134","url":"https://dblp.org/rec/journals/corr/RossiA14a"}, "url":"URL#3978405" }, { "@score":"1", "@id":"3978453", "info":{"authors":{"author":{"@pid":"11/10308","text":"Aviad Rubinstein"}},"title":"Computational Complexity of Approximate Nash Equilibrium in Large Games.","venue":"CoRR","volume":"abs/1405.0524","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/Rubinstein14","ee":"http://arxiv.org/abs/1405.0524","url":"https://dblp.org/rec/journals/corr/Rubinstein14"}, "url":"URL#3978453" }, { "@score":"1", "@id":"3978454", "info":{"authors":{"author":{"@pid":"11/10308","text":"Aviad Rubinstein"}},"title":"Inapproximability of Nash Equilibrium.","venue":"CoRR","volume":"abs/1405.3322","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/Rubinstein14a","ee":"http://arxiv.org/abs/1405.3322","url":"https://dblp.org/rec/journals/corr/Rubinstein14a"}, "url":"URL#3978454" }, { "@score":"1", "@id":"3978464", "info":{"authors":{"author":[{"@pid":"139/0819","text":"Ben Ruijl"},{"@pid":"34/3620","text":"Jos Vermaseren"},{"@pid":"53/5607","text":"Aske Plaat"},{"@pid":"h/HJaapvandenHerik","text":"H. Jaap van den Herik"}]},"title":"HEPGAME and the Simplification of Expressions.","venue":"CoRR","volume":"abs/1405.6369","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/RuijlVPH14","ee":"http://arxiv.org/abs/1405.6369","url":"https://dblp.org/rec/journals/corr/RuijlVPH14"}, "url":"URL#3978464" }, { "@score":"1", "@id":"3978489", "info":{"authors":{"author":[{"@pid":"67/9012","text":"Alexander M. Rush"},{"@pid":"29/1340-1","text":"Michael Collins 0001"}]},"title":"A Tutorial on Dual Decomposition and Lagrangian Relaxation for Inference in Natural Language Processing.","venue":"CoRR","volume":"abs/1405.5208","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/RushC14","ee":"http://arxiv.org/abs/1405.5208","url":"https://dblp.org/rec/journals/corr/RushC14"}, "url":"URL#3978489" }, { "@score":"1", "@id":"3978497", "info":{"authors":{"author":{"@pid":"34/5919","text":"Vladimir V. Rybakov"}},"title":"A Note on Parameterised Knowledge Operations in Temporal Logic.","venue":"CoRR","volume":"abs/1405.0559","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/Rybakov14","ee":"http://arxiv.org/abs/1405.0559","url":"https://dblp.org/rec/journals/corr/Rybakov14"}, "url":"URL#3978497" }, { "@score":"1", "@id":"3978499", "info":{"authors":{"author":{"@pid":"r/AndreyRybalchenko","text":"Andrey Rybalchenko"}},"title":"(Quantified) Horn Constraint Solving for Program Verification and Synthesis.","venue":"CoRR","volume":"abs/1405.7739","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/Rybalchenko14","ee":"http://arxiv.org/abs/1405.7739","url":"https://dblp.org/rec/journals/corr/Rybalchenko14"}, "url":"URL#3978499" } ] } } } )