


Остановите войну!
for scientists:


default search action
CoRR, May 2006
- Chao Tian, Suhas N. Diggavi:
On Multistage Successive Refinement for Wyner-Ziv Source Coding with Degraded Side Informations. - Chao-Yang Pang, Zheng-Wei Zhou, Guang-Can Guo:
A Hybrid Quantum Encoding Algorithm of Vector Quantization for Image Compression. - Amitabh Saxena, Ben Soh:
A New Cryptosystem Based On Hidden Order Groups. - Himanshu Thapliyal, M. B. Srinivas:
Novel Reversible Multiplier Architecture Using Reversible TSG Gate. - Ruoheng Liu, Ivana Maric, Roy D. Yates, Predrag Spasojevic:
The Discrete Memoryless Multiple Access Channel with Confidential Messages. - Shengtian Yang, Peiliang Qiu:
An Information-Spectrum Approach to Multiterminal Rate-Distortion Theory. - Priya Mahadevan, Dmitri V. Krioukov, Kevin R. Fall, Amin Vahdat:
Systematic Topology Analysis and Generation Using Degree Correlations. - Arnaud Durand, Etienne Grandjean:
The complexity of acyclic conjunctive queries revisited. - Marcus Hutter:
On the Foundations of Universal Sequence Prediction. - Di Wu, Predrag Spasojevic:
Complementary Set Matrices Satisfying a Column Correlation Constraint. - Prosenjit Bose, Vida Dujmovic, Danny Krizanc, Stefan Langerman, Pat Morin, David R. Wood, Stefanie Wuhrer:
A Characterization of the Degree Sequences of 2-Trees. - Luc Steels, Martin Loetzsch:
Perspective alignment in spatial language. - L. Sunil Chandran, Mathew C. Francis, Naveen Sivadasan:
Geometric representation of graphs in low dimension. - Yingbin Liang, H. Vincent Poor:
Generalized Multiple Access Channels with Confidential Messages. - Ciro Cattuto, Vittorio Loreto, Luciano Pietronero:
Collaborative Tagging and Semiotic Dynamics. - Yingbin Liang, Venugopal V. Veeravalli:
Cooperative Relay Broadcast Channels. - Phan Huy Tu, Tran Cao Son, Chitta Baral:
Reasoning and Planning with Sensing Actions, Incomplete Information, and Static Causal Laws using Answer Set Programming. - Florentin Smarandache
, Sukanto Bhattacharya, Mohammad Khoshnevisan, Housila P. Singh, Rajesh Singh, F. Kaymram, S. Malakar, Jose L. Salmeron:
Computational Modeling in Applied Problems: collected papers on econometrics, operations research, game theory and simulation. - Frédéric Chyzak, Michael Drmota, Thomas Klausner, Gerard Kok:
The Distribution of Patterns in Random Trees. - Sergey Alpaev:
Applied MVC Patterns. A pattern language. - Harald Zankl:
SAT Techniques for Lexicographic Path Orders. - Martin Kurth, Jim LeBlanc:
Toward a Collection-based Metadata Maintenance Model. - Ender Tekin, Aylin Yener:
The Gaussian Multiple Access Wire-Tap Channel with Collective Secrecy Constraints. - Shane Legg, Marcus Hutter:
A Formal Measure of Machine Intelligence. - Vytautas Perlibakas:
Face Recognition using Principal Component Analysis and Log-Gabor Filters. - Yuri Pritykin:
Strongly Almost Periodic Sequences under Finite Automata Mappings. - Vytautas Perlibakas:
Recognition of expression variant faces using masked log-Gabor features and Principal Component Analysis. - Ender Tekin, Aylin Yener:
The Gaussian Multiple Access Wire-Tap Channel. - Martin Fürer, Shiva Prasad Kasiviswanathan:
Spanners for Geometric Intersection Graphs. - Randy Cogill, Sanjay Lall:
A Delay Analysis of Maximal Matching Switching with Speedup. - Mihaela Dînsoreanu, Ioan Salomie, Kalman Pusztai:
On the Design of Agent-Based Systems using UML and Extensions. - Tudor Marian, Bogdan Dumitriu, Mihaela Dînsoreanu, Ioan Salomie:
A framework of reusable structures for mobile agent development. - Mihaela Dînsoreanu, Cristian Godja, Claudiu Anghel, Ioan Salomie, Tom Coffey:
Mobile Agent Based Solutions for Knowledge Assessment in elearning Environments. - Srinivas Shakkottai, R. Srikant:
Peer to Peer Networks for Defense Against Internet Worms. - Filip Radlinski, Thorsten Joachims:
Query Chains: Learning to Rank from Implicit Feedback. - Filip Radlinski, Thorsten Joachims:
Evaluating the Robustness of Learning from Implicit Feedback. - Filip Radlinski, Thorsten Joachims:
Minimally Invasive Randomization for Collecting Unbiased Preferences from Clickthrough Logs. - Tran Cao Son, Enrico Pontelli, Islam Elkabani:
An Unfolding-Based Semantics for Logic Programming with Aggregates. - Amitabha Roy, Stephan Zeisset, Charles J. Fleckenstein, John C. Huang:
Fast and Generalized Polynomial Time Memory Consistency Verification. - Marcus Hutter:
General Discounting versus Average Reward. - Jian Cao, Edmund M. Yeh:
Asymptotically Optimal Multiple-access Communication via Distributed Rate Splitting. - (Withdrawn) An unlikely result.
- Stefano Guerrini, Andrea Masini:
Continuations, proofs and tests. - Georg Schmidt, Vladimir Sidorenko:
Linear Shift-Register Synthesis for Multiple Sequences of Varying Length. - R. N. Mohan:
On Orthogonalities in Matrices. - Gil I. Shamir:
Patterns of i.i.d. Sequences and Their Entropy - Part I: General Bounds. - Mokshay M. Madiman, Andrew R. Barron:
Generalized Entropy Power Inequalities and Monotonicity Properties of Information. - S. Roch:
On Learning Thresholds of Parities and Unions of Rectangles in Random Walk Models. - V. M. Siddlenikov, R. N. Mohan, Moon Ho Lee:
On fractionally linear functions over a finite field. - Vikraman Arvind, Piyush P. Kurur:
A Polynomial Time Nilpotence Test for Galois Groups and Related Results. - Chad A. Cole, Stephen G. Wilson, Eric K. Hall, Thomas R. Giallorenzi:
A General Method for Finding Low Error Rates of LDPC Codes. - Yufang Xi, Edmund M. Yeh:
Node-Based Optimal Power Control, Routing, and Congestion Control in Wireless Networks. - Hussein Gibbins, Rajkumar Buyya:
Gridscape II: A Customisable and Pluggable Grid Monitoring Portal and its Integration with Google Maps. - François Lamarche, Lutz Straßburger:
From Proof Nets to the Free *-Autonomous Category. - David Bellot, Pierre Bessière:
Approximate Discrete Probability Distribution Representation using a Multi-Resolution Binary Tree. - Chee Shin Yeo, Marcos Dias de Assunção, Jia Yu, Anthony Sulistio, Srikumar Venugopal, Martin Placek, Rajkumar Buyya:
Utility Computing and Global Grids. - Rajiv Ranjan, Aaron Harwood, Rajkumar Buyya:
SLA-Based Coordinated Superscheduling Scheme and Performance for Computational Grids. - Russell O'Connor:
A Monadic, Functional Implementation of Real Numbers. - Jean-Marc Rosengard, Marian Florin Ursu:
Ontological Representations of Software Patterns. - Rajiv Ranjan, Aaron Harwood, Rajkumar Buyya:
A Case for Cooperative and Incentive-Based Coupling of Distributed Clusters. - Al-Mukaddim Khan Pathan, Md. Abdul Mottalib, Minhaz Fahim Zibran:
An Internet Framework to Bring Coherence between WAP and HTTP Ensuring Better Mobile Internet Security. - Al-Mukaddim Khan Pathan, Md. Golam Shagadul Amin Talukder:
QoSIP: A QoS Aware IP Routing Ptotocol for Multimedia Data. - Asif Ahmed Anik, Al-Mukaddim Khan Pathan:
An Electronic Payment System to Ensure Cost Effectiveness with Easy Security Incorporation for the Developing Countries. - Carsten Lutz, Frank Wolter:
Modal Logics of Topological Relations. - Hector Zenil, Francisco Hernández Quiroz:
On the possible Computational Power of the Human Mind. - Xiaowen Zhang, Ke Tang, Li Shu:
A Chaotic Cipher Mmohocc and Its Randomness Evaluation. - Desmond S. Lun:
Efficient Operation of Coded Packet Networks. - Alin Bostan, Frédéric Chyzak, Bruno Salvy, Thomas Cluzeau:
Low Complexity Algorithms for Linear Recurrences. - Nadav Yacov, Hadar Efraim, Haggai Kfir, Ido Kanter, Ori Shental:
Parallel vs. Sequential Belief Propagation Decoding of LDPC Codes over GF(q) and Markov Sources. - Stephen L. Smith, Mireille E. Broucke, Bruce A. Francis:
Curve Shortening and the Rendezvous Problem for Mobile Autonomous Robots. - Wei Wu, Sriram Vishwanath, Ari Arapostathis:
On the Capacity of Interference Channels with Degraded Message sets. - Wei Wu, Sriram Vishwanath, Ari Arapostathis:
On the Capacity of Gaussian Weak Interference Channels with Degraded Message sets. - Dionissios T. Hristopulos, Samuel Elogne:
Analytic Properties and Covariance Functions of a New Class of Generalized Gibbs Random Fields. - Michael Codish, Peter Schneider-Kamp, Vitaly Lagoon, René Thiemann, Jürgen Giesl:
SAT Solving for Argument Filterings. - Sebastien de la Kethulle de Ryhove, Ninoslav Marina, Geir E. Øien:
On the Capacity and Mutual Information of Memoryless Noncoherent Rayleigh-Fading Channels. - Jeroen F. J. Laros:
Numeration-automatic sequences. - Taesup Moon, Tsachy Weissman:
Universal Filtering via Hidden Markov Modeling. - Philippe Baptiste, Peter Brucker, Marek Chrobak, Christoph Dürr, Svetlana A. Kravchenko, Francis Sourd:
The Complexity of Mean Flow Time Scheduling Problems with Release Times. - Amos Lapidoth, Shlomo Shamai, Michèle A. Wigger:
On the Capacity of Fading MIMO Broadcast Channels with Imperfect Transmitter Side-Information. - Mohamed Ali Kâafar, Thierry Turletti, Walid Dabbous:
A Locating-First Approach for Scalable Overlay Multicast. - Marc Daumas, Guillaume Da Graça, David Defour:
Caractéristiques arithmétiques des processeurs graphiques. - Saugata Basu:
Efficient algorithm for computing the Euler-Poincaré characteristic of a semi-algebraic set defined by few quadratic inequalities. - Partha Basuchowdhuri:
Classical Authentication Aided Three-Stage Quantum Protocol. - Yingbin Liang, H. Vincent Poor:
The Generalized Multiple Access Channel with Confidential Messages. - Nachum Dershowitz, Ziyad Hanna, Alexander Nadel:
A Scalable Algorithm for Minimal Unsatisfiable Core Extraction. - Chih-Chun Wang, Sanjeev R. Kulkarni, H. Vincent Poor:
Upper Bounding the Performance of Arbitrary Finite LDPC Codes on Binary Erasure Channels. - Mustafa Cenk Gursoy:
Error Exponents and Cutoff Rate for Noncoherent Rician Fading Channels. - Ke Liu, Adnan Majeed, Nael B. Abu-Ghazaleh:
TARMAC: Traffic-Analysis Reslient MAC Protocol for Multi-Hop Wireless Networks. - Ke Liu, Nael B. Abu-Ghazaleh:
Aligned Virtual Coordinates for Greedy Routing in WSNs. - Santanu K. Maiti:
A Basic Introduction on Math-Link in Mathematica & the Technique for Running Mathematica Batch files in Background. - Emin Martinian, Martin J. Wainwright:
Low-density constructions can achieve the Wyner-Ziv and Gelfand-Pinsker bounds. - Lawrence Ong, Mehul Motani:
The Multiple Access Channel with Feedback and Correlated Sources. - Lawrence Ong, Mehul Motani:
The Capacity of the Single Source Multiple Relay Single Destination Mesh Network. - Simone Bova, Franco Montagna:
Proof Search in Hajek's Basic Logic. - Chau Yuen, Yong Liang Guan, Tjeng Thiang Tjhung:
Single-Symbol-Decodable Differential Space-Time Modulation Based on QO-STBC. - Yoann Dieudonné, Franck Petit:
Circle Formation of Weak Robots and Lyndon Words. - Marten van Dijk, Emina Torlak, Blaise Gassend, Srinivas Devadas:
A Generalized Two-Phase Analysis of Knowledge Flows in Security Protocols. - Sharon M. Betz, H. Vincent Poor:
Energy Efficiency in Multi-hop CDMA Networks: A Game Theoretic Analysis. - Michael B. Baer:
Prefix Coding under Siege. - Michael G. Rabbat, Mário A. T. Figueiredo, Robert D. Nowak:
Network Inference from Co-Occurrences. - Victor V. Kryssanov, Frank J. Rinaldo, Evgeny L. Kuleshov, Hitoshi Ogawa:
Modeling the Dynamics of Social Networks. - Adam L. Buchsbaum, Alon Efrat, Shaili Jain, Suresh Venkatasubramanian, Ke Yi:
Restricted Strip Covering and the Sensor Cover Problem. - Daniel Lemire:
A Better Alternative to Piecewise Linear Time Series Segmentation. - Blake Hegerle:
Parsing Transformative LR(1) Languages. - Chandra Nair, Abbas El Gamal:
An outer bound to the capacity region of the broadcast channel. - Daowen Qiu:
Supervisory Control of Fuzzy Discrete Event Systems: A Formal Approach. - Daowen Qiu, Fuchun Liu:
Fuzzy Discrete Event Systems under Fuzzy Observability and a test-algorithm. - Fuchun Liu, Daowen Qiu, Hongyan Xing, Zhujun Fan:
Diagnosability of Fuzzy Discrete Event Systems. - Emina Torlak, Marten van Dijk, Blaise Gassend, Daniel Jackson, Srinivas Devadas:
Knowledge Flow Analysis for Security Protocols. - Marko A. Rodriguez, Johan Bollen, Herbert Van de Sompel:
Mapping the Bid Behavior of Conference Referees. - Diane Hillmann, Stuart A. Sutton, Jon Phipps, Ryan Laundry:
A Metadata Registry from Vocabularies UP: The NSDL Registry Project. - Marko A. Rodriguez, Johan Bollen:
An Algorithm to Determine Peer-Reviewers. - Johan Bollen, Herbert Van de Sompel:
An Architecture for the Aggregation and Analysis of Scholarly Usage Data. - Abhishek Parakh:
Oblivious Transfer using Elliptic Curves. - Nick S. Jones, Lluis Masanes:
Key Distillation and the Secret-Bit Fraction. - Nan Liu, Sennur Ulukus:
Optimal Distortion-Power Tradeoffs in Gaussian Sensor Networks. - Seijoon Shim, Chan-Byoung Chae, Robert W. Heath Jr.:
A Lattice-Based MIMO Broadcast Precoder for Multi-Stream Transmission. - Christine A. Kelley, Deepak Sridhara, Joachim Rosenthal:
Pseudocodeword weights for non-binary LDPC codes. - Victor V. Kryssanov, H. Tamaki, K. Ueda:
An Internet-enabled technology to support Evolutionary Design. - Victor V. Kryssanov, H. Tamaki, S. Kitamura:
Understanding Design Fundamentals: How Synthesis and Analysis Drive Creativity, Resulting in Emergence. - Victor V. Kryssanov, Masayuki Okabe, Koh Kakusho, Michihiko Minoh:
Communication of Social Agents and the Digital City - A Semiotic Perspective. - Victor V. Kryssanov, Koh Kakusho, Evgeny L. Kuleshov, Michihiko Minoh:
Modeling Hypermedia-Based Communication. - Jaime S. Cardoso:
Classification of Ordinal Data. - Jorge Pérez, Marcelo Arenas, Claudio Gutierrez:
Semantics and Complexity of SPARQL. - Germain Drolet:
Combinational Logic Circuit Design with the Buchberger Algorithm. - David P. Bunde:
Power-aware scheduling for makespan and flow. - Steven Keith, Owen Kaser, Daniel Lemire:
Analyzing Large Collections of Electronic Text Using OLAP. - Alexander Kurz:
Logic Column 15: Coalgebras and Their Logics. - Wei Kang, Sennur Ulukus:
An Outer Bound for the Multi-Terminal Rate-Distortion Region. - Thierry Mora, Olivier Rivoire:
Error Exponents of Low-Density Parity-Check Codes on the Binary Erasure Channel. - Simon P. Morgan:
Notes on Geometric Measure Theory Applications to Image Processing; De-noising, Segmentation, Pattern, Texture, Lines, Gestalt and Occlusion. - Krzysztof R. Apt, Tadeusz Radzik:
Stable partitions in coalitional games. - Benoit Donnet, Philippe Raoult, Timur Friedman
:
Efficient Route Tracing from a Single Source. - Boon-Chong Seet, Bu-Sung Lee, Chiew Tong Lau:
DSR with Non-Optimal Route Suppression for MANETs. - Ron Dabora, Sergio D. Servetto:
On the Role of Estimate-and-Forward with Time-Sharing in Cooperative Communications. - Gerald Bourgeois:
Attaque algebrique de NTRU a l'aide des vecteurs de Witt. - Jun Chen, Venugopal V. Veeravalli:
Capacity Results for Block-Stationary Gaussian Fading Channels with a Peak Power Constraint. - Victor V. Kryssanov, V. A. Abramov, Yoshiro Fukuda, K. Konishi:
The meaning of manufacturing know-how. - Na Li, Wen-Feng Qi:
Construction and Count of Boolean Functions of an Odd Number of Variables with Maximum Algebraic Immunity.