Denis S. Krotov
: On the binary codes with parameters of triply-shortened 1-perfect codes.
: Distributed Denial of Service is a Scalability Problem.
, Gerhard Wunder
: On Interference Alignment and the Deterministic Capacity for Cellular Channels with Weak Symmetric Cross Links.
: Introduction to the model-free control of microgrids.
: Relations between redundancy patterns of the Shannon code and wave diffraction patterns of partially disordered media.
Linh Anh Nguyen
: A Cut-Free ExpTime Tableau Decision Procedure for the Logic Extending Converse-PDL with Regular Inclusion Axioms.
: Reconstruction of Binary Functions and Shapes from Incomplete Frequency Information.
, Yung Yi
: On the Payoff Mechanisms in Peer-Assisted Services with Multiple Content Providers: Rationality and Fairness.
: Image Retrieval Method Using Top-surf Descriptor.
: Visual Concept Detection and Real Time Object Detection.
, Pan Hui
: Modeling Internet Security Investments: The Case of Dealing with Information Uncertainty.
, Qing Zhao
: A Note on: `Algorithms for Connected Set Cover Problem and Fault-Tolerant Connected Set Cover Problem'.
, Amit Sahai
: Potent Tree Codes and their applications: Coding for Interactive Communication, revisited.
: Modeling network technology deployment rates with different network models.
: Possibilities and impossibilities in Kolmogorov complexity extraction.
: An Efficient Algorithm for Detection of Selfish Packet Dropping Nodes in Wireless Mesh Networks.
: Compressed Sensing and Matrix Completion with Constant Proportion of Corruptions.
Ming Lam Leung
: Fixed Parameter Tractable Algorithm for Firefighting Problem.
: Super Critical and Sub Critical Regimes of Percolation with Secure Communication.
, Bouchaib Bounabat
: Platform for Assessing Strategic Alignment Using Enterprise Architecture: Application to E-Government Process Assessment.
Daniel M. Kane
: A Small PRG for Polynomial Threshold Functions of Gaussians.
Wai Han Fong
: Coding Bounds for Multiple Phased-Burst Correction and Single Burst Correction Codes.
: An Agent-based Architecture for a Knowledge-work Support System.
: Translating Pseudo-Boolean Constraints into CNF.
: Dimensionality Decrease Heuristics for NP Complete Problems.
: Which weighted circulant networks have perfect state transfer?
: Characterization of circulant graphs having perfect state transfer.
: "Improved FCM algorithm for Clustering on Web Usage Mining".
Aris L. Moustakas
: Tails of Random Matrix Diagonal Elements: The Case of the Wishart Inverse.
: The Structure of Differential Invariants and Differential Cut Elimination.
: Amortised Resource Analysis with Separation Logic.
: PAC learnability versus VC dimension: a footnote to a basic result of statistical learning.
: Stability of Modified-CS and LS-CS for Recursive Reconstruction of Sparse Signal Sequences.
: Extracting Parts of 2D Shapes Using Local and Global Interactions Simultaneously.
: Sparse Representation of White Gaussian Noise with Application to L0-Norm Decoding in Noisy Compressed Sensing.
: The Critical Exponent is Computable for Automatic Sequences. 231-239
Kook Jin Ahn
, Sudipto Guha
: Linear Programming in the Semi-streaming Model with Application to the Maximum Matching Problem.
A. N. Trahtman
: Modifying the upper bound on the length of minimal synchronizing word.
: A Simplified and Improved Free-Variable Framework for Hilbert's epsilon as an Operator of Indefinite Committed Choice.
, Jiwu Shu
: C-Codes: Cyclic Lowest-Density MDS Array Codes Constructed Using Starters for RAID 6.
Fernando G. Lobo
: Idealized Dynamic Population Sizing for Uniformly Scaled Problems.
: Parallel calculation of the median and order statistics on GPUs with application to robust regression.