


default search action
CoRR, April 2006
- Fabrice Rossi, Brieuc Conan-Guez:
Theoretical Properties of Projection Based Multilayer Perceptrons with Functional Inputs. - Andrei Lopatenko, Leopoldo E. Bertossi:
Complexity of Consistent Query Answering in Databases under Cardinality-Based and Incremental Repair Semantics. - Petrus H. Potgieter:
Hypercomputing the Mandelbrot Set? - Alexander V. Evako:
The Poincare conjecture for digital spaces. Properties of digital n-dimensional disks and spheres. - Sergio D. Servetto:
Multiterminal Source Coding with Two Encoders--I: A Computable Outer Bound. - David Bateman, Andy Adler:
Sparse Matrix Implementation in Octave. - Laurent Boyer, Victor Poupet, Guillaume Theyssier:
On the Complexity of Limit Sets of Cellular Automata Associated with Probability Measures. - Esther M. Arkin, Hervé Brönnimann, Jeff Erickson, Sándor P. Fekete, Christian Knauer, Jonathan Lenchner, Joseph S. B. Mitchell, Kim Whittlesey:
Minimum-Cost Coverage of Point Sets by Disks. - Alexey V. Melkikh:
Can an Organism Adapt Itself to Unforeseen Circumstances? - Christos Dimitrakakis:
Nearly optimal exploration-exploitation decision thresholds. - Gad Getz, Noam Shental, Eytan Domany:
Semi-Supervised Learning -- A Statistical Physics Approach. - Sreeram Vuppala:
The Aryabhata Algorithm Using Least Absolute Remainders. - Shripad Thite:
On Covering a Graph Optimally with Induced Subgraphs. - O. Habibi, U. R. Patihnedj, M. O. Dhar:
Towards Analog Reverse Time Computation. - Xenofontas A. Dimitropoulos, Dmitri V. Krioukov, George F. Riley, Kimberly C. Claffy
:
Revealing the Autonomous System Taxonomy: The Machine Learning Approach. - Michael B. Baer:
On Conditional Branches in Optimal Search Trees. - Xenofontas A. Dimitropoulos, Dmitri V. Krioukov, Marina Fomenkov, Bradley Huffaker, Young Hyun, Kimberly C. Claffy
, George F. Riley:
AS Relationships: Inference and Validation. - Madhekar Suneel:
Cryptographic Pseudo-Random Sequences from the Chaotic Henon Map. - K. Venkatesh Prasad, Thomas J. Giuli, David Watson:
The Case for Modeling Security, Privacy, Usability and Reliability (SPUR) in Automotive Software. - (Withdrawn) Approximation Algorithms for Restricted Cycle Covers Based on Cycle Decompositions.
- Nima Sarshar, Behnam Attaran Rezaei, Vwani P. Roychowdhury:
Low Latency Wireless Ad-Hoc Networking: Power and Bandwidth Challenges and a Hierarchical Solution. - Robert Connelly, Erik D. Demaine, Martin L. Demaine, Sándor P. Fekete, Stefan Langerman, Joseph S. B. Mitchell, Ares Ribó, Günter Rote:
Locked and Unlocked Chains of Planar Shapes. - Sameet Sreenivasan, Reuven Cohen, Eduardo López, Zoltán Toroczkai, Harry Eugene Stanley:
Communication Bottlenecks in Scale-Free Networks. - Joel Friedman:
Cohomology in Grothendieck Topologies and Lower Bounds in Boolean Complexity II: A Simple Example. - Tie Liu, Pramod Viswanath:
An Extremal Inequality Motivated by Multiterminal Information Theoretic Problems. - Damiano Bolzoni, Sandro Etalle:
APHRODITE: an Anomaly-based Architecture for False Positive Reduction. - Majid Khayari, Stéphane Schneider, Isabelle Kramer, Laurent Romary:
Unification of multi-lingual scientific terminological resources using the ISO 16642 standard. The TermSciences initiative. - Tie Liu, Pramod Viswanath:
Two Proofs of the Fisher Information Inequality via Data Processing Arguments. - Richard J. Barton, Rong L. Zheng:
Order-Optimal Data Aggregation in Wireless Sensor Networks - Part I: Regular Networks. - Richard J. Barton:
The Influence of Adaptive Multicoding on Mutual Information and Channel Capacity for Uncertain Wideband CDMA Rayleigh Fading Channels. - Amos Lapidoth, Ligong Wang:
On the Low SNR Capacity of Peak-Limited Non-Coherent Fading Channels with Memory. - Martin Ziegler, Klaus Meer:
Real Computational Universality: The Word Problem for a class of groups with infinite presentation. - Shuangquan Wang, Ali Abdi:
Statistical Properties of Eigen-Modes and Instantaneous Mutual Information in MIMO Time-Varying Rayleigh Channels. - David Eppstein:
Squarepants in a Tree: Sum of Subtree Clustering and Hyperbolic Pants Decomposition. - R. N. Mohan, Sanpei Kageyama, Moon Ho Lee, Gao Yang:
Certain new M-matrices and their properties and applications. - Jakob Voss:
Collaborative thesaurus tagging the Wikipedia way. - Erik D. Demaine, Shay Mozes, Benjamin Rossman, Oren Weimann:
An O(n^3)-Time Algorithm for Tree Edit Distance. - Evgueni Petrov, Yuri Kostov, Elena Botoeva:
UniCalc.LIN: a linear constraint solver for the UniCalc system. - David Bateman, Laurent Mazet, Véronique Buzenac-Settineri, Markus Muck:
A Fixed-Point Type for Octave. - Nan Liu, Sennur Ulukus:
Optimal Distortion-Power Tradeoffs in Sensor Networks: Gauss-Markov Random Processes. - R. N. Mohan, Moon Ho Lee, Subash Pokreal:
On Orthogonality of Latin Squares. - Mihai Cristian Florea, Jean Dezert, Pierre Valin, Florentin Smarandache
, Anne-Laure Jousselme:
Adaptative combination rule and proportional conflict redistribution rule for information fusion. - Thomas P. Way, Lori L. Pollock:
Demand-driven Inlining in a Region-based Optimizer for ILP Architectures. - R. N. Mohan, Moon Ho Lee, Ram Paudal:
A new M-matrix of Type III, its properties and applications. - Sándor P. Fekete, Jörg Schepers, Jan van der Veen:
An exact algorithm for higher-dimensional orthogonal packing. - Dominique Lepetz, Max Némoz-Gaillard, Michaël Aupetit:
Concerning the differentiability of the energy function in vector quantization algorithms. - Raphaël M. Jungers, Vladimir Protasov, Vincent D. Blondel:
Efficient algorithms for deciding the type of growth of products of integer matrices. - Vita Hinze-Hoare:
Will the Butterfly Cipher keep your Network Data secure? Developments in Computer Encryption. - Vignesh Sethuraman, Bruce E. Hajek:
Low SNR Capacity of Fading Channels with Peak and Average Power Constraints. - R. N. Mohan:
On Hadamard Conjecture. - Michael Brinkmeier:
Structural Alignments of pseudo-knotted RNA-molecules in polynomial time. - M. Tentyukov, J. A. M. Vermaseren:
Extension of the functionality of the symbolic program FORM by external software. - Maciej Kurant, Patrick Thiran:
Survivable Routing in IP-over-WDM Networks in the Presence of Multiple Failures. - Alessandro Armando, Maria Paola Bonacina, Silvio Ranise, Stephan Schulz:
New results on rewrite-based satisfiability procedures. - Roman Vershynin:
Beyond Hirsch Conjecture: walks on random polytopes and smoothed complexity of the simplex method. - Woonchul Ham, Kemin Zhou:
A Short Note on The Volume of Hypersphere. - R. N. Mohan, P. T. Kulkarni:
A New Fault-Tolerant M-network and its Analysis. - Yury Lifshits:
Solving Classical String Problems on Compressed Texts. - Olivier Devillers, Philippe Guigue:
Inner and Outer Rounding of Boolean Operations on Lattice Polygonal Regions. - Evelyne Hubert, Alexandre Sedoglavic:
Polynomial Time Nondimensionalisation of Ordinary Differential Equations via their Lie Point Symmetries. - Edwin A. Henneken, Michael J. Kurtz
, Günther Eichhorn, Alberto Accomazzi, Carolyn Stern-Grant, Donna M. Thompson, Stephen S. Murray:
Effect of E-printing on Citation Rates in Astronomy and Physics. - Liang Wu:
Biologically Inspired Hierarchical Model for Feature Extraction and Localization. - Yi Hong, Emanuele Viterbo, Jean-Claude Belfiore:
Golden Space-Time Trellis Coded Modulation. - Mirco Mannucci:
Quantum Fuzzy Sets: Blending Fuzzy Set Theory and Quantum Computation. - Binh-Minh Bui-Xuan, Michel Habib
, Vincent Limouzy, Fabien de Montgolfier:
Unifying two Graph Decompositions with Modular Decomposition. - Elias P. Tsigaridas, Ioannis Z. Emiris:
Univariate polynomial real root isolation: Continued Fractions revisited. - R. N. Mohan, Moon Ho Lee, Subhash Pokrel:
Certain t-partite graphs. - Benjamin Doerr, Tobias Friedrich, Christian Klein, Ralf Osbild:
Unbiased Matrix Rounding. - Neri Merhav, Meir Feder:
Universal decoding with an erasure option. - Yongzhi Cao, Mingsheng Ying, Guoqing Chen:
Retraction and Generalized Extension of Computing with Words. - Nuno Santos, Birger Koblitz:
Distributed Metadata with the AMGA Metadata Catalog. - Francis Heylighen, Paul Cilliers, Carlos Gershenson:
Complexity and Philosophy. - Muthiah Annamalai, Hemant Kumar, R. Leela Velusamy:
Octave-GTK: A GTK binding for GNU Octave. - (Withdrawn) Complexity Constrained Noise-Free CDMA: Optimal Power Distribution and Spectral Efficiency.
- Qiming Lu, György Korniss, Boleslaw K. Szymanski:
Naming Games in Spatially-Embedded Random Networks. - Loreto Bravo, Leopoldo E. Bertossi:
Semantically Correct Query Answers in the Presence of Null Values. - Jun Chen, Toby Berger:
Successive Wyner-Ziv Coding Scheme and its Application to the Quadratic Gaussian CEO Problem. - Maria Chli, Philippe De Wilde:
The emergence of knowledge exchange: an agent-based model of a software market. - Alexander D. Scott, Gregory B. Sorkin:
Polynomial Constraint Satisfaction: A Framework for Counting and Sampling CSPs and Other Problems. - Alexander D. Scott, Gregory B. Sorkin:
Linear-programming design and analysis of fast algorithms for Max 2-Sat and Max 2-CSP. - Dominique Méry, Stephan Merz:
Event Systems and Access Control. - Farhad Meshkati, H. Vincent Poor, Stuart C. Schwartz, Radu V. Balan:
Energy-Efficient Power and Rate Control with QoS Constraints: A Game-Theoretic Approach. - Ori Shental, Ido Kanter:
Optimum Asymptotic Multiuser Efficiency of Pseudo-Orthogonal Randomly Spread CDMA. - Ziming Li, Michael F. Singer, Min Wu, Dabin Zheng:
A Recursive Method for Determining the One-Dimensional Submodules of Laurent-Ore Modules. - Gayathre Krishnan:
Information in Quantum Description and Gate Implementation. - Thomas Eiter, Michael Fink, Hans Tompits:
A Knowledge-Based Approach for Selecting Information Sources. - Yongzhi Cao, Lirong Xia, Mingsheng Ying:
Probabilistic Automata for Computing with Words. - Santanu K. Maiti:
How to Run Mathematica Batch-files in Background ? - Michele Tucci:
Evolutionary Socioeconomics: a Schumpeterian Computer Simulation. - Mirco Mannucci, Lisa Sparks, Daniele C. Struppa:
Simplicial models of social aggregation I. - Jun Chen, Toby Berger:
Robust Distributed Source Coding. - Sinan Gezici, Mung Chiang, H. Vincent Poor, Hisashi Kobayashi:
Optimal and Suboptimal Finger Selection Algorithms for MMSE Rake Receivers in Impulse Radio UWB Systems. - Frédérique E. Oggier, Ghaya Rekaya-Ben Othman, Jean-Claude Belfiore, Emanuele Viterbo:
Perfect Space Time Block Codes. - Luciano da Fontoura Costa, Erik M. Bollt:
A Fast and Accurate Nonlinear Spectral Method for Image Recognition and Registration. - Gregory Z. Gutin, Stefan Szeider, Anders Yeo:
Fixed-Parameter Complexity of Minimum Profile Problems. - Tracey Ho:
Polynomial-time algorithms for coding across multiple unicasts. - Sudipto Guha, Boulos Harb:
Approximation algorithms for wavelet transform coding of data streams. - Lawrence Ong, Mehul Motani:
Achievable Rates for the Multiple Access Channel with Feedback and Correlated Sources. - Lawrence Ong, Mehul Motani:
Myopic Coding in Wireless Networks. - Abhishek Parakh:
Protocols for Kak's Cubic Cipher and Diffie-Hellman Based Asymmetric Oblivious Key Exchange. - Alin Bostan, Frédéric Chyzak, François Ollivier, Bruno Salvy, Éric Schost, Alexandre Sedoglavic:
Fast computation of power series solutions of systems of differential equations. - Vita Hinze-Hoare:
HCI and Educational Metrics as Tools for VLE Evaluation. - Vita Hinze-Hoare:
Further Evaluationh of VLEs using HCI and Educational Metrics. - Akiko Manada, Navin Kashyap:
On the Shannon Covers of Certain Irreducible Constrained Systems of Finite Type. - Farid Benbadis, Jean-Jacques Puig, Marcelo Dias de Amorim, Claude Chaudet, Timur Friedman
, David Simplot-Ryl:
Jumps: Enhancing hop-count positioning in sensor networks using multiple coordinates. - Ofer Shayevitz, Ram Zamir, Meir Feder:
Bounded expected delay in arithmetic coding. - Aleksandar Jovicic, Pramod Viswanath:
Cognitive Radio: An Information-Theoretic Perspective. - Francesc Rosselló, Gabriel Valiente:
An Algebraic View of the Relation between Largest Common Subtrees and Smallest Common Supertrees. - Klaus Rabbertz
, Michael Thomas, Shaun Ashby, Marco Corvo, Stefano Argirò
, Nikolay Darmenov, Ramzy Darwish, David Evans, Burt Holzman, Natalie Ratnikova, Shahzad Muzaffar, Andreas Nowack, Tony Wildish, Bockjoo Kim, Joanna Weng, Volker Büge:
CMS Software Distribution on the LCG and OSG Grids. - Aram Galstyan, Tad Hogg, Kristina Lerman:
Modeling and Mathematical Analysis of Swarms of Microscopic Robots. - Kristina Lerman, Chris V. Jones, Aram Galstyan, Maja J. Mataric:
Analysis of Dynamic Task Allocation in Multi-Robot Systems. - Jacek Becla, Andrew Hanushevsky, Sergei Nikolaev, Ghaleb Abdulla, Alexander S. Szalay
, María A. Nieto-Santisteban, Ani Thakar, Jim Gray:
Designing a Multi-petabyte Database for LSST. - Sergio Caracciolo, Davide Fichera, Andrea Sportiello:
One-in-Two-Matching Problem is NP-complete. - Jonathan Paul Lewis Hatchett, Yoshiyuki Kabashima:
Survey propagation for the cascading Sourlas code. - Einat Klein, Noam Gross, Evi Kopelowitz, Michael Rosenbluh, Lev Khaykovich, Wolfgang Kinzel, Ido Kanter:
Public-channel cryptography based on mutual chaos pass filters. - Hong-Gwa Yeh:
A Dynamic View of Circular Colorings. - Philippe Rigollet:
Generalization error bounds in semi-supervised classification under the cluster assumption. - Ali Akhavi, Jean-François Marckert, Alain Rouault:
On the reduction of a random basis. - Mark Braverman, Michael Yampolsky:
Constructing Non-Computable Julia Sets. - Michael J. Gagen, Kae Nemoto:
Variational optimization of probability measure spaces resolves the chain store paradox. - Francesc Rosselló, Gabriel Valiente:
The transposition distance for phylogenetic trees. - Garry Bowen, Nilanjana Datta:
Beyond i.i.d. in Quantum Information Theory. - Dmitry Gavinsky:
On the Role of Shared Entanglement. - Scott Aaronson, Greg Kuperberg:
Quantum Versus Classical Proofs and Advice. - Andreas Klappenecker, Pradeep Kiran Sarvepalli:
Clifford Code Constructions of Operator Quantum Error Correcting Codes. - Christian Borgs, Jennifer T. Chayes, Elchanan Mossel, Sebastien Roch:
The Kesten-Stigum Reconstruction Bound Is Tight for Roughly Symmetric Binary Channels. - Shankar Bhamidi, Ram Rajagopal, Sébastien Roch:
Network Delay Inference from Additive Metrics. - Benjamin A. Burton:
Enumeration of non-orientable 3-manifolds using face pairing graphs and union-find.

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.