default search action
CoRR, June 2008
- Ali Sanaei, Mahdi Ramezani, Masoud Ardakani:
On the Design of Universal LDPC Codes. - Sherif Sakr:
An Experimental Investigation of XML Compression Tools. - Ravi Tandon, Sennur Ulukus:
Outer Bounds for Multiple Access Channels with Feedback using Dependence Balance. - Arnon Avron, Anna Zamansky:
Canonical calculi with (n,k)-ary quantifiers. - Hans Adler, Isolde Adler:
A note on clique-width and tree-width for structures. - Feng Xia:
QoS Challenges and Opportunities in Wireless Sensor/Actuator Networks. - Feng Xia, Youxian Sun, Yu-Chu Tian:
Feedback Scheduling of Priority-Driven Control Networks. - Feng Xia, Yu-Chu Tian, Youxian Sun, Jinxiang Dong:
Control-theoretic dynamic voltage scaling for embedded controllers. - Feng Xia, Wenhong Zhao, Youxian Sun, Yu-Chu Tian:
Fuzzy Logic Control Based QoS Management in Wireless Sensor/Actuator Networks. - N. A. Filimonova:
Regularization of Invers Problem for M-Ary Channel. - David Chadwick:
EuSpRIG TEAM work:Tools, Education, Audit, Management. - David R. Chadwick:
Training Gamble leads to Corporate Grumble? - Pat Cleary, David Ball, Mukul Madahar, Simon R. Thorne, Christopher Gosling, Karen Fernandez:
Investigating the use of Software Agents to Reduce The Risk of Undetected Errors in Strategic Spreadsheet Applications. - Arjen Hommersom, Peter J. F. Lucas, Patrick van Bommel:
Checking the Quality of Clinical Guidelines using Automated Reasoning Tools. - Alexander Ravsky, Oleg Verbitsky:
On collinear sets in straight line drawings. - Patrik Floréen, Marja Hassinen, Petteri Kaski, Jukka Suomela:
Local approximation algorithms for a class of 0/1 max-min linear programs. - Dmytro V. Lande:
Model of information diffusion. - Josep Díaz, Dieter Mitsche, Xavier Pérez-Giménez:
On the Probability of the Existence of Fixed-Size Components in Random Geometric Graphs. - N. C. Manoukis, E. C. Anderson:
GuiLiner: A Configurable and Extensible Graphical User Interface for Scientific Analysis and Simulation Software. - David Eppstein, Michael T. Goodrich:
Succinct Greedy Graph Drawing in the Hyperbolic Plane. - Damien Chablat:
Kinematic Analysis of the vertebra of an eel like robot. - Pradorn Sureephong, Nopasit Chakpitak, Laurent Buzon, Abdelaziz Bouras:
Cluster Development and Knowledge Exchange in Supply Chain. - Pradorn Sureephong, Nopasit Chakpitak, Yacine Ouzrout, Abdelaziz Bouras:
An Ontology-based Knowledge Management System for Industry Clusters. - Gábor Erdélyi, Markus Nowak, Jörg Rothe:
Sincere-Strategy Preference-Based Approval Voting Fully Resists Constructive Control and Broadly Resists Destructive Control. - Dominique Bontemps:
Universal Coding on Infinite Alphabets: Exponentially Decreasing Envelopes. - Krzysztof Szczypiorski, Igor Margasinski, Wojciech Mazurczyk:
Steganographic Routing in Multi Agent System Environment. - Michael Fleyer, Amir Rosenthal, Alexander Linden, Moshe Horowitz:
Multirate Synchronous Sampling of Sparse Multiband Signals. - Rui Zhang:
On Peak versus Average Interference Power Constraints for Spectrum Sharing in Cognitive Radio Networks. - Hongjun Jia, Li Zhang:
Directional Cross Diamond Search Algorithm for Fast Block Motion Estimation. - J. Muliadi, Said D. Jenie, Agus Budiyono:
Modeling And Simulation Of Prolate Dual-Spin Satellite Dynamics In An Inclined Elliptical Orbit: Case Study Of Palapa B2R Satellite. - Agus Budiyono:
Onboard Multivariable Controller Design for a Small Scale Helicopter Using Coefficient Diagram Method. - Sylvie Saget, François Legras, Gilles Coppin:
Collaborative model of interaction and Unmanned Vehicle Systems' interface. - Nenad Dedic, Gene Itkis, Leonid Reyzin, Scott Russell:
Upper and Lower Bounds on Black-Box Steganography. - Seyed Javad Kazemitabar, Hamid Jafarkhani:
Performance Analysis of Multiple Antenna Multi-User Detection. - Mugurel Ionut Andreica:
A Dynamic Programming Framework for Combinatorial Optimization Problems on Graphs with Bounded Pathwidth. - Amit K. Awasthi:
On the Security of Liaw et al.'s Scheme. - Darryl D. Holm, Alain Trouvé, Laurent Younes:
The Euler-Poincare theory of Metamorphosis. - Vassilis Kostakos:
Using Bluetooth to capture passenger trips on public transport buses. - (Withdrawn) On the Capacity of Gaussian Relay Channels.
- Himal A. Suraweera, Jason Gao, Peter J. Smith, Mansoor Shafi, Mike Faulkner:
Channel Capacity Limits of Cognitive Radio in Asymmetric Fading Environments. - Martin Haenggi:
Outage and Local Throughput and Capacity of Random Wireless Networks. - Kevin Buchin, Maike Buchin, Jaroslaw Byrka, Martin Nöllenburg, Yoshio Okamoto, Rodrigo I. Silveira, Alexander Wolff:
Drawing (Complete) Binary Tanglegrams: Hardness, Approximation, Fixed-Parameter Tractability. - Leslie Ann Goldberg, Mark Jerrum, Marek Karpinski:
The Mixing Time of Glauber Dynamics for Colouring Regular Trees. - Martin Nöllenburg, Danny Holten, Markus Völker, Alexander Wolff:
Drawing Binary Tanglegrams: An Experimental Evaluation. - Roberto M. Amadio:
On convergence-sensitive bisimulation and the embedding of CCS in timed CCS. - Joan Boyar, Sandy Irani, Kim S. Larsen:
A Comparison of Performance Measures for Online Algorithms. - Wojciech Mazurczyk, Józef Lubacz:
Analysis of a procedure for inserting steganographic data into VoIP calls. - Samir Datta, Nutan Limaye, Prajakta Nimbhorkar:
3-connected Planar Graph Isomorphism is in Log-space. - Hamidreza Farmanbar, Amir K. Khandani:
Capacity of Block-Memoryless Channels with Causal Channel Side Information. - Graham Cormode, Minos N. Garofalakis:
Histograms and Wavelets on Probabilistic Data. - Feyza Keceli, Inanc Inan, Ender Ayanoglu:
Fair and Efficient TCP Access in the IEEE 802.11 Infrastructure Basic Service Set. - Feyza Keceli, Inanc Inan, Ender Ayanoglu:
Fair Access Provisioning through Contention Parameter Adaptation in the IEEE 802.11e Infrastructure Basic Service Set. - Adrian Paschke:
Design Patterns for Complex Event Processing. - Miguel E. Andrés, Pedro R. D'Argenio, Peter van Rossum:
Significant Diagnostic Counterexamples in Probabilistic Model Checking. - Dominik Scheder, Philipp Zumstein:
An Improved Bound on the Number of Conflicts in Unsatisfiable k-CNF Formulas. - Irina Nesterenko, Stéphane Rauzy:
Utilisation des grammaires probabilistes dans les tâches de segmentation et d'annotation prosodique. - Michael Chertkov, Lukas Kroc, Massimo Vergassola:
Belief Propagation and Beyond for Particle Tracking. - Lav R. Varshney:
Performance of LDPC Codes Under Faulty Iterative Decoding. - Francisco Marcos de Assis, Paulo Mateus, Yasser Omar:
Quantum Authentication of Classical Messages with Perfect Security. - Rodrigo Torrens, Luis A. Núñez, Raisa Urribarri:
ICT, Community Memory and Technological Appropriation. - Andreas Klappenecker, Hyunyoung Lee, Jennifer L. Welch:
Scheduling Sensors by Tiling Lattices. - Khaled M. Khalil, M. Abdel-Aziz, Taymour T. Nazmy, Abdel-Badeeh M. Salem:
The Role of Artificial Intelligence Technologies in Crisis Response. - Robert L. Constable, Wojciech Moczydlowski:
Extracting Programs from Constructive HOL Proofs via IZF Set-Theoretic Semantics. - Chenggong Lv, Jun Wang, Lu Liu, Weijia You:
The Separation of Duty with Privilege Calculus. - Berry Groisman:
The end of Sleeping Beauty's nightmare. - Prasun Dutta, S. Pratik Khastgir, Anushree Roy:
Steiner trees and spanning trees in six-pin soap films. - (Withdrawn) Temporized Equilibria.
- Leonid Andreev:
From a set of parts to an indivisible whole. Part III: Holistic space of multi-object relations. - Mariano Rico, David Camacho, Óscar Corcho:
VPOET: Using a Distributed Collaborative Platform for Semantic Web Applications. - Lan Zhang, Ying-Chang Liang, Yan Xin, H. Vincent Poor:
Robust Cognitive Beamforming With Partial Channel State Information. - Sunder Lal, Vandani Verma:
An Identity Based Strong Bi-Designated Verifier (t, n) Threshold Proxy Signature Scheme. - Feng Xia, Guosong Tian, Youxian Sun:
Feedback Scheduling: An Event-Driven Paradigm. - Feng Xia, Youxian Sun:
Control-Scheduling Codesign: A Perspective on Integrating Control and Computing. - Xianmin Ming, Jiansheng Yang:
The Improvement of the Bound on Hash Family. - Olivier Finkel:
Topological Complexity of Context-Free omega-Languages: A Survey. - Greg Aloupis, Jean Cardinal, Sébastien Collette, Ferran Hurtado, Stefan Langerman, Joseph O'Rourke, Belén Palop:
Highway Hull Revisited. - (Withdrawn) On Mean Distance and Girth.
- Dmytro V. Lande, A. A. Snarskii:
Dynamic Network of Concepts from Web-Publications. - Guoshen Yu, Jean-Jacques E. Slotine:
Fast Wavelet-Based Visual Classification. - Andreas U. Schmidt:
On the Superdistribution of Digital Goods. - Krishnan Eswaran, Michael Gastpar, Kannan Ramchandran:
Bits through ARQs. - Gesualdo Scutari, Daniel Pérez Palomar, Sergio Barbarossa:
Competitive Design of Multiuser MIMO Systems based on Game Theory: A Unified View. - Feng Xia, Wenhong Zhao:
Flexible Time-Triggered Sampling in Smart Sensor-Based Wireless Control Systems. - Feng Xia, Yu-Chu Tian, Yanjun Li, Youxian Sun:
Wireless Sensor/Actuator Network Design for Mobile Control Applications. - Jagadeesh Harshan, B. Sundar Rajan:
Co-ordinate Interleaved Distributed Space-Time Coding for Two-Antenna-Relays Networks. - Maurice Margenstern:
The injectivity of the global function of a cellular automaton in the hyperbolic plane is undecidable. - Andreas U. Schmidt, Nicolai Kuntze, Rachid El Khayari:
SPAM over Internet Telephony and how to deal with it. - Ian Pratt-Hartmann:
Data-Complexity of the Two-Variable Fragment with Counting Quantifiers. - Arnaud Martin, Christophe Osswald:
Toward a combination rule to deal with partial conflict and specificity in belief functions theory. - Kasra Alishahi, Farrokh Marvasti, Vahid Aref, Pedram Pad:
Bounds on the Sum Capacity of Synchronous Binary CDMA Channels. - Ian A. Kash, Eric J. Friedman, Joseph Y. Halpern:
The Lotus-Eater Attack. - George I. Davida, Bruce E. Litow, Guangwu Xu:
Fast Arithmetics Using Chinese Remaindering. - David Eppstein, Elena Mumford:
Self-overlapping Curves Revisited. - Nikolaos Laoutaris, Laura J. Poplawski, Rajmohan Rajaraman, Ravi Sundaram, Shang-Hua Teng:
Bounded Budget Connection (BBC) Games or How to make friends and influence people, on a budget. - Daria Walukiewicz-Chrzaszcz, Jacek Chrzaszcz:
Consistency and Completeness of Rewriting in the Calculus of Constructions. - Ted Herman, Morten Mjelde:
Local Read-Write Operations in Sensor Networks. - Arnaud Martin, Hicham Laanaya, Andreas Arnold-Bos:
Evaluation for Uncertain Image Classification and Segmentation. - Arnaud Martin, Christophe Osswald:
A new generalization of the proportional conflict redistribution rule stable in terms of decision. - Arnaud Martin, Christophe Osswald:
Human expert fusion for image classification. - Arnaud Martin, Christophe Osswald:
Une nouvelle règle de combinaison répartissant le conflit - Applications en imagerie Sonar et classification de cibles Radar. - Christian Schulte, Guido Tack:
Perfect Derived Propagators. - Vasiliki Liagkou, Effie Makri, Paul G. Spirakis, Yannis C. Stamatiou:
A probabilistic key agreement scheme for sensor networks without key predistribution. - Michael Mrissa, Philippe Thiran, Jean-Marie Jacquet, Djamal Benslimane, Zakaria Maamar:
Cardinality heterogeneities in Web service composition: Issues and solutions. - K. Pavan Srinath, B. Sundar Rajan:
A Low-Complexity, Full-Rate, Full-Diversity 2 X 2 STBC with Golden Code's Coding Gain. - Fritz Müller:
Full Abstraction for a Recursively Typed Lambda Calculus with Parallel Conditional. - K. Pavan Srinath, B. Sundar Rajan:
A Low-decoding-complexity, Large coding Gain, Full-rate, Full-diversity STBC for 4 X 2 MIMO System. - Huan Zhang, Zonghua Liu, Ming Tang, Pak Ming Hui:
An adaptive routing strategy for packet delivery in complex networks. - Zonghua Liu, Weichuan Ma, Huan Zhang, Yin Sun, Pak Ming Hui:
An efficient approach of controlling traffic congestion in scale-free networks. - Xiaoyan Zhu, Zonghua Liu, Ming Tang:
Detrended fluctuation analysis of traffic data. - Sabri Chebira, Gilles Mercier, Jackson Francomme:
Définition d'une structure adaptative de réseau local sans fil à consommation optimisée. - Jackson Francomme, Gilles Mercier, Sabri Chebira:
Évaluation d'une application de transmission d'images médicales avec un réseau sans fil. - Kristina Lerman, Aram Galstyan:
Analysis of Social Voting Patterns on Digg. - Eyal Lubetzky, Uri Stav:
Non-linear index coding outperforming the linear optimum. - Anne Broadbent, Alain Tapp:
Information-Theoretically Secure Voting Without an Honest Majority. - Kai-Min Chung, Salil P. Vadhan:
Tight Bounds for Hashing Block Sources. - Luca Trevisan:
Max Cut and the Smallest Eigenvalue. - Shuo Feng, Irina A. Kogan, Hamid Krim:
Classification of curves in 2D and 3D via affine integral signatures. - Arnaud Martin:
Fusion de classifieurs pour la classification d'images sonar. - Arnaud Martin, Christophe Osswald:
Experts Fusion and Multilayer Perceptron Based on Belief Learning for Sonar Image Classification. - Arnaud Martin, Christophe Osswald:
Generalized proportional conflict redistribution rule applied to Sonar imagery and Radar targets classification. - François Nicolas:
A simple, polynomial-time algorithm for the matrix torsion problem. - Antonio G. García, Miguel Angel Hernández-Medina, G. Pérez-Villalón:
On the existence of compactly supported reconstruction functions in a sampling problem. - Domagoj Matijevic, Ralf Osbild:
Finding the theta-Guarded Region. - Joseph Y. Halpern:
Beyond Nash Equilibrium: Solution Concepts for the 21st Century. - Joseph Y. Halpern:
Defaults and Normality in Causal Structures. - James Demmel, Laura Grigori, Mark Hoemmen, Julien Langou:
Communication-avoiding parallel and sequential QR factorizations. - Alberto Perotti, Alberto Tarable, Sergio Benedetto, Guido Montorsi:
Capacity-achieving CPM schemes. - Vukosi Ntsakisi Marivate, George Ssali, Tshilidzi Marwala:
An Intelligent Multi-Agent Recommender System for Human Capacity Building. - Marko A. Rodriguez, Joshua Shinavier:
Exposing Multi-Relational Networks to Single-Relational Network Analysis Algorithms. - Martin Fürer, Shiva Prasad Kasiviswanathan:
Approximately Counting Embeddings into Random Graphs. - Evan VanderZee, Anil N. Hirani, Damrong Guoy:
Triangulation of Simple 3D Shapes with Well-Centered Tetrahedra. - Li Wang, Chen-Ping Zhu, Zhi-Ming Gu, Shi-Jie Xiong, Da-Ren He, Bing-Hong Wang:
Scaling of critical connectivity of mobile ad hoc communication networks. - Hamed Owladeghaffari:
Development of Hybrid Intelligent Systems and their Applications from Engineering Systems to Complex Systems. - Alexey S. Tarasov:
Existence of a polyhedron which does not have a non-overlapping pseudo-edge unfolding. - Hasan Guclu, Durgesh Rani Kumari, Murat Yuksel:
Ad-hoc Limited Scale-Free Models for Unstructured Peer-to-Peer Networks. - Nobuko Yoshida, Kohei Honda, Martin Berger:
Logical Reasoning for Higher-Order Functions with Local State. - Adrien van den Bossche, Thierry Val, Eric Campo:
Proposition of a full deterministic medium access method for wireless network in a robotic application.