CoRR, June 2005
- Dmitry Mogilevsky, Sean Keller:
SafeMPI - Extending MPI for Byzantine Error Detection on Parallel Clusters. - Angela Bonifati, Elaine Qing Chang, Terence Ho, Laks V. S. Lakshmanan:
HepToX: Heterogeneous Peer to Peer XML Databases. - Nicolas Capit, Georges Da Costa, Yiannis Georgiou, Guillaume Huard, Cyrille Martin, Grégory Mounié, Pierre Neyron, Olivier Richard:
A batch scheduler with high level components. - Vladimir Vovk, Ilia Nouretdinov, Akimichi Takemura, Glenn Shafer:
Defensive forecasting for linear protocols. - Farhad Meshkati, H. Vincent Poor, Stuart C. Schwartz:
A Non-Cooperative Power Control Game in Delay-Constrained Multiple-Access Networks. - Prakash Ishwar, Pierre Moulin:
On the existence and characterization of the maxent distribution under general moment inequality constraints. - Joost Engelfriet, Sebastian Maneth:
The Equivalence Problem for Deterministic MSO Tree Transducers is Decidable. - Raju Gangishetti, M. Choudary Gorantla, Manik Lal Das, Ashutosh Saxena:
Cryptanalysis of Key Issuing Protocols in ID-based Cryptosystems. - Nizar Messai, Marie-Dominique Devignes, Malika Smaïl-Tabbone, Amedeo Napoli:
Treillis de concepts et ontologies pour l'interrogation d'un annuaire de sources de données biologiques (BioRegistry). - Kambiz Azarian, Hesham El Gamal, Philip Schniter:
On the Achievable Diversity-Multiplexing Tradeoffs in Half-Duplex Cooperative Channels. - Vicky Choi, Navin Goyal:
An Efficient Approximation Algorithm for Point Pattern Matching Under Noise. - Rajgopal Kannan, Shuangqing Wei:
Analysis of Relationship between Strategic and Aggregate Energy Minimization in Delay-Constrained Wireless Networks. - Onureena Banerjee, Alexandre d'Aspremont, Laurent El Ghaoui:
Sparse Covariance Selection via Robust Maximum Likelihood Estimation. - Rada Chirkova, Michael R. Genesereth:
Database Reformulation with Integrity Constraints (extended abstract). - Youngchul Sung, Lang Tong, H. Vincent Poor:
Neyman-Pearson Detection of Gauss-Markov Signals in Noise: Closed-Form Error Exponent and Properties. - Arul D. Murugan, Hesham El Gamal, Mohamed Oussama Damen, Giuseppe Caire:
A Unified Framework for Tree Search Decoding : Rediscovering the Sequential Decoder. - Patrick Albert, Laurent Henocque, Mathias Kleiner:
A Constrained Object Model for Configuration Based Workflow Composition. - R. Shankar:
Framework for Hopfield Network based Adaptive routing - A design level approach for adaptive routing phenomena with Artificial Neural Network. - Srikumar Venugopal, Rajkumar Buyya, Kotagiri Ramamohanarao:
A Taxonomy of Data Grids for Distributed Data Sharing, Management and Processing. - Sriram N. Kizhakkemadam, Panos Papamichalis, Mandyam D. Srinath, Dinesh Rajan:
Tradeoff Between Source and Channel Coding for Erasure Channels. - Wen Ding, William Yurcik:
A Game Theoretic Economics Framework to understanding Information Security Oursourcing Market. - Weijun Zhu, Heechoon Lee, Daniel N. Liu, Michael P. Fitz:
Antenna array geometry and coding performance. - Jie Liu, Sheng Bao, Zhiqiang Jing, Shi Chen:
A Fixed-Length Coding Algorithm for DNA Sequence Compression. - Krishna R. Narayanan, Kapil Bhattad:
A Decision Feedback Based Scheme for Slepian-Wolf Coding of sources with Hidden Markov Correlation. - Kapil Bhattad, Niranjan Ratnakar, Ralf Koetter, Krishna R. Narayanan:
Minimal Network Coding for Multicast. - Krishna R. Narayanan, Kapil Bhattad:
Decision Feedback Based Scheme for Slepian-Wolf Coding of sources with Hidden Markov Correlation. - Bernard Jacquemin, Caroline Brun, Claude Roux:
Enriching a Text by Semantic Disambiguation for Information Extraction. - Caroline Brun, Bernard Jacquemin, Frédérique Segond:
Exploitation de dictionnaires électroniques pour la désambiguïsation sémantique lexicale. - Alexander Wiesmaier, Vangelis Karatsiolis, Marcus Lippert, Johannes A. Buchmann:
The Workshop - Implementing Well Structured Enterprise Applications. - Heiko Herrmann, Gunnar Rueckner:
Comparison of two different implementations of a finite-difference-method for first-order pde in mathematica and matlab. - Hongyuan Zhang, Huaiyu Dai, Quan Zhou, Brian L. Hughes:
Analysis on Transmit Antenna Selection for Spatial Multiplexing Systems: A Geometrical Approach. - Ramesh Johari, Shie Mannor, John N. Tsitsiklis:
Efficiency Loss in a Network Resource Allocation Game: The Case of Elastic Supply. - Kapil Bhattad, Krishna R. Narayanan:
An MSE Based Ttransfer Chart to Analyze Iterative Decoding Schemes. - Yong Luo:
Yet another normalisation proof for Martin-Lof's logical framework--Terms with correct arities are strongly normalising. - Daniele Gorla, Matthew Hennessy, Vladimiro Sassone:
Security Policies as Membranes in Systems for Global Computing. - Slawomir Staworko, Jan Chomicki:
Priority-Based Conflict Resolution in Inconsistent Relational Databases. - Mitsugu Iwamoto, Hirosuke Yamamoto, Hirohisa Ogawa:
Optimal multiple assignments based on integer programming in secret sharing schemes with general access structures. - Mitsugu Iwamoto, Hirosuke Yamamoto:
Strongly secure ramp secret sharing schemes for general access structures. - Juan José Amor, Gregorio Robles, Jesús M. González-Barahona:
Measuring Woody: The Size of Debian 3.0. - Jing Jiang, Krishna R. Narayanan:
Performance Analysis of Algebraic Soft Decoding of Reed-Solomon Codes over Binary Symmetric and Erasure Channels. - Jing Jiang, Krishna R. Narayanan:
Iterative Soft Input Soft Output Decoding of Reed-Solomon Codes by Adapting the Parity Check Matrix. - Bo Pang, Lillian Lee:
Seeing stars: Exploiting class relationships for sentiment categorization with respect to rating scales. - Wojciech Mazurczyk, Zbigniew Kotulski:
Alternative security architecture for IP Telephony based on digital watermarking. - K. C. V. Kalyanarama Sesha Sayee, Utpal Mukherji:
Stability of Scheduled Multi-access Communication over Quasi-static Flat Fading Channels with Random Coding and Independent Decoding. - David R. C. Dominguez, Kostadin Koroutchev, Eduardo Serrano, Francisco de Borja Rodríguez Ortiz:
Dynamical Neural Network: Information and Topology. - Cyril Measson, Andrea Montanari, Rüdiger L. Urbanke:
Maxwell Construction: The Hidden Bridge between Iterative and Maximum a Posteriori Decoding. - Sudharman K. Jayaweera:
Large System Decentralized Detection Performance Under Communication Constraints. - Ryutaroh Matsumoto, Kaoru Kurosawa, Toshiya Itoh, Toshimitsu Konno, Tomohiko Uyematsu:
Primal-dual distance bounds of linear codes with application to cryptography. - (Withdrawn) An Alternative to Huffman's Algorithm for Constructing Variable-Length Codes.
- Patrick C. McGuire, Javier Gómez-Elvira, José Antonio Rodríguez Manfredi, Eduardo Sebastián-Martínez, Jens Ormö, Enrique Díaz Martínez, Markus Oesker, Robert Haschke, Jörg Ontrup, Helge J. Ritter:
Field geology with a wearable computer: 1st results of the Cyborg Astrobiologist System. - Oscar Y. Takeshita:
A New Construction for LDPC Codes using Permutation Polynomials over Integer Rings. - Thomas Lux:
Emergent Statistical Wealth Distributions in Simple Monetary Exchange Models: A Critical Review. - Oscar Y. Takeshita:
On Maximum Contention-Free Interleavers and Permutation Polynomials over Integer Rings. - Boris Ryabko, Jaakko Astola:
Universal Codes as a Basis for Nonparametric Testing of Serial Independence for Time Series. - Yi-Dong Shen, Qiang Yang, Jia-Huai You, Li-Yan Yuan:
Deriving a Stationary Dynamic Bayesian Network from a Logic Program with Recursive Loops. - Petra Berenbrink, Tom Friedetzky, Leslie Ann Goldberg, Paul W. Goldberg, Zengjian Hu, Russell A. Martin:
Distributed Selfish Load Balancing. - Patrick Haffner, Steven J. Phillips, Robert E. Schapire:
Efficient Multiclass Implementations of L1-Regularized Maximum Entropy. - Aneta Zwierko, Zbigniew Kotulski:
Security of mobile agents: a new concept of the integrity protection. - Milan M. Cirkovic, Robert J. Bradbury:
Galactic Gradients, Postbiological Evolution and the Apparent Failure of SETI. - Sergey N. Dorogovtsev, Alexander V. Goltsev, J. F. F. Mendes:
Correlations in interacting systems with a network topology. - Mikhail G. Stepanov, Vladimir Y. Chernyak, Michael Chertkov, Bane V. Vasic:
Diagnosis of weaknesses in modern error correction codes: a physics approach. - Hervé Daudé, Marc Mézard, Thierry Mora, Riccardo Zecchina:
Pairs of SAT Assignment in Random Boolean Formulae. - L. Bogacz, Zdzislaw Burda, Wolfhard Janke, Bartlomiej Waclaw:
A program generating homogeneous random graphs with given weights. - Naoto Morikawa:
Discrete differential geometry of proteins: a new method for encoding three-dimensional structures of proteins. - Dimitri Grigoriev, Ilia V. Ponomarenko:
Constructions in public-key cryptography over matrix groups. - Radhakrishnan Srinivasan, H. P. Raghunandan:
Foundations of real analysis and computability theory in non-Aristotelian finitary logic. - Bruno Cessac, Jacques-A. Sepulchre:
Transmitting a signal by amplitude modulation in a chaotic network. - Paolo Luchini, Maurizio Quadrio:
A low-cost parallel implementation of direct numerical simulation of wall turbulence. - Fabio Benatti, Tyll Krueger, Markus Müller, Rainer Siegmund-Schultze, Arleta Szkola:
Entropy and Quantum Kolmogorov Complexity: A Quantum Brudno's Theorem. - Jason D. McEwen, Michael P. Hobson, Daniel J. Mortlock, Anthony N. Lasenby:
Fast directional continuous spherical wavelet transform algorithms.