![](https://dblp.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
default search action
CoRR, October 2008
- Michael H. Freedman:
Complexity Classes as Mathematical Axioms. - Matthias Fischer, Matthias Hilbig, Claudius Jähn, Friedhelm Meyer auf der Heide, Martin Ziegler:
Planar Visibility Counting. - Salim Y. El Rouayheb, Alexander Sprintson, Costas N. Georghiades:
On the Index Coding Problem and its Relation to Network Coding and Matroid Theory. - Alvaro H. Salas:
Acerca del Algoritmo de Dijkstra. - Murat Alanyali, Maxim Dashouk:
Occupancy distributions of homogeneous queueing systems under opportunistic scheduling. - Wilson Wong, Wei Liu, Mohammed Bennamoun:
Determining the Unithood of Word Sequences using a Probabilistic Approach. - Koichiro Kitagawa, Toshiyuki Tanaka:
Optimization of sequences in CDMA systems: a statistical-mechanics approach. - Wilson Wong, Wei Liu, Mohammed Bennamoun:
Determining the Unithood of Word Sequences using Mutual Information and Independence Measure. - Andrij A. Rovenchak, Ján Macutek, Charles Riley:
Distribution of complexities in the Vai script. - David R. Musser, Gor V. Nishanov:
A Fast Generic Sequence Matching Algorithm. - K. B. Nakshatrala, Albert J. Valocchi:
Non-negative mixed finite element formulations for a tensorial diffusion equation. - Lu Lu, Soung Chang Liew, Shengli Zhang:
Collision Resolution by Exploiting Symbol Misalignment. - Aldar C.-F. Chan:
Cryptographic Defence against Misbehaving TCP Receivers. - Wilson Wong, Wei Liu, Mohammed Bennamoun:
Enhanced Integrated Scoring for Cleaning Dirty Texts. - Filipe Cabecinhas, Nuno P. Lopes, Renato Crisostomo, Luís Veiga:
Optimizing Binary Code Produced by Valgrind (Project Report on Virtual Execution Environments Course - AVExe). - Péter Fülöp, Benedek Kovács, Sándor Imre:
Mobility Management Framework. - Amin Jafarian, Sriram Vishwanath:
On the Capacity of One-sided Two user Gaussian Fading Broadcast Channels. - Bart de Keijzer:
Three New Complexity Results for Resource Allocation Problems. - (Withdrawn) The Ratio Index for Budgeted Learning, with Applications.
- Andrew Thangaraj, Safitha J. Raj:
Reed-Solomon Subcodes with Nontrivial Traces: Distance Properties and Soft-Decision Decoding. - Siddharth Barman, Shuchi Chawla:
Packing multiway cuts in capacitated graphs. - Jaeok Park, Mihaela van der Schaar:
Stackelberg Contention Games in Multi-User Networks. - Ravi Tandon, Sennur Ulukus:
A New Upper Bound on the Capacity of a Class of Primitive Relay Channels. - Stefano Soffia:
Definition and Implementation of a Points-To Analysis for C-like Languages. - Pedram Pad, Mahdi Soltanolkotabi, Saeed Hadikhanlou, Arash Enayati, Farrokh Marvasti:
Errorless Codes for Over-loaded CDMA with Active User Detection. - Mohammad Javad Faraji, Pedram Pad, Farrokh Marvasti:
A New Method for Constructing Large Size WBE Codes with Low Complexity ML Decoder. - Dario Fertonani, Tolga M. Duman:
Novel Bounds on the Capacity of the Binary Deletion Channel. - Zizhong Chen, Jack J. Dongarra:
Condition Numbers of Gaussian Random Matrices. - Anatoly Pashkevich, Damien Chablat
, Philippe Wenger:
Stiffness Analysis Of Multi-Chain Parallel Robotic Systems. - Pin-Hsun Lin, Shih-Chun Lin, Chung-Pi Lee, Hsuan-Jung Su:
Cognitive Radio with Partial Channel State Information at the Transmitter. - Kirill A. Sorudeykin:
Software Engineering & Systems Design Nature. - Dev G. Rajnarayan, David H. Wolpert:
Bias-Variance Techniques for Monte Carlo Optimization: Cross-validation for the CE Method. - Chien-Hwa Hwang:
Asymptotic Eigenvalue Moments of Wishart-Type Random Matrix Without Ergodicity in One Channel Realization. - K. Raj Kumar, Giuseppe Caire, Aris L. Moustakas:
Asymptotic Performance of Linear Receivers in MIMO Fading Channels. - Toru Hasunuma, Toshimasa Ishii, Hirotaka Ono, Yushi Uno:
A linear time algorithm for L(2,1)-labeling of trees. - Cristopher Moore, Alexander Russell:
A simple constant-probability RP reduction from NP to Parity P. - Prasanna Chaporkar, Kimmo Kansanen, Ralf R. Müller:
Channel and Multiuser Diversities in Wireless Systems: Delay-Energy Tradeoff. - Shashi Kiran Chilappagari, Anantha Raman Krishnan, Bane Vasic, Michael W. Marcellin:
Low-Density Parity-Check Codes Which Can Correct Three Errors Under Iterative Decoding. - Jan A. Bergstra, Cornelis A. Middelburg:
On the expressiveness of single-pass instruction sequences. - Ori Shental, Danny Bickson, Paul H. Siegel, Jack K. Wolf, Danny Dolev:
Gaussian Belief Propagation for Solving Systems of Linear Equations: Theory and Application. - Moufida Maimour:
Maximally Radio-Disjoint Multipath Routing for Wireless Multimedia Sensor Networks. - Moufida Maimour, CongDuc Pham, Julien Amelot:
Load Repartition for Congestion Control in Multimedia Wireless Sensor Networks with Multipath Routing. - Jan A. Bergstra, Alban Ponse:
An Instruction Sequence Semigroup with Repeaters. - Omer Giménez:
On-the-fly Macros. - Onur Ozan Koyluoglu, Hesham El Gamal, Lifeng Lai, H. Vincent Poor:
Interference Alignment for Secrecy. - Enrico Paolini, Marco Chiani:
Construction of Near-Optimum Burst Erasure Correcting Low-Density Parity-Check Codes. - Pascal Vaillant
:
Une grammaire formelle du créole martiniquais pour la génération automatique. - Pascal Vaillant
:
A Layered Grammar Model: Using Tree-Adjoining Grammars to Build a Common Syntactic Kernel for Related Dialects. - Pascal Vaillant
, Richard Nock, Claudia Henry:
Analyse spectrale des textes: détection automatique des frontières de langue et de discours. - Attila Fekete:
Traffic Dynamics of Computer Networks. - Ali ParandehGheibi, Atilla Eryilmaz, Asuman E. Ozdaglar, Muriel Médard:
On Resource Allocation in Fading Multiple Access Channels - An Efficient Approximate Projection Approach. - Ali ParandehGheibi, Atilla Eryilmaz, Asuman E. Ozdaglar, Muriel Médard:
Resource Allocation in Multiple Access Channels. - Ali ParandehGheibi, Atilla Eryilmaz, Asuman E. Ozdaglar, Muriel Médard:
Dynamic Rate Allocation in Fading Multiple-access Channels. - Ali ParandehGheibi, Atilla Eryilmaz, Asuman E. Ozdaglar, Muriel Médard:
Rate and Power Allocation in Fading Multiple Access Channels. - Richard Nock, Pascal Vaillant
, Frank Nielsen, Claudia Henry:
Soft Uncoupling of Markov Chains for Permeable Language Distinction: A New Algorithm. - Ali ParandehGheibi, Muriel Médard, Asuman E. Ozdaglar, Atilla Eryilmaz:
Information Theory vs. Queueing Theory for Resource Allocation in Multiple Access Channels. - Sang Joon Kim, Natasha Devroye, Vahid Tarokh:
Bi-directional half-duplex protocols with multiple relays. - Victor Yodaiken:
The meaning of concurrent programs. - Mohamed Abdel Ghany, Ahmed K. Sultan, Hesham El Gamal:
ARQ-Based Secret Key Sharing. - Jure Leskovec, Kevin J. Lang, Anirban Dasgupta, Michael W. Mahoney:
Community Structure in Large Networks: Natural Cluster Sizes and the Absence of Large Well-Defined Clusters. - Ali Khaleghi, Ghaïs El Zein, Ijaz Haider Naqvi:
Demonstration of Time-Reversal in Indoor Ultra-Wideband Communication: Time Domain Measurement. - Krzysztof R. Apt, Arantza Estévez-Fernández:
Sequential pivotal mechanisms for public project problems. - Bikash Kumar Dey, Sidharth Jaggi, Michael Langberg:
"Real" Slepian-Wolf Codes. - Omar Mehanna, Ahmed K. Sultan, Hesham El Gamal:
Blind Cognitive MAC Protocols. - Marko A. Rodriguez, Joe Geldart:
An Evidential Path Logic for Multi-Relational Networks. - Ijaz Haider Naqvi, Ali Khaleghi, Ghaïs El Zein:
Performance Enhancement of Multiuser Time Reversal UWB Communication System. - Ijaz Haider Naqvi, Tanguy Pérennou:
A DCCP Congestion Control Mechanism for Wired- cum-Wireless Environments. - Rena Bakhshi
, Daniela Gavidia, Wan J. Fokkink, Maarten van Steen:
An Analytical Model of Information Dissemination for a Gossip-based Protocol. - Ruyong Feng, Michael F. Singer, Min Wu:
Liouvillian Solutions of Difference-Differential Equations. - Danny Bickson, Genia Bezman, Danny Dolev, Benny Pinkas:
Peer-to-Peer Secure Multi-Party Numerical Computation. - Danny Bickson, Ori Shental, Danny Dolev:
Distributed Kalman Filter via Gaussian Belief Propagation. - Danny Bickson, Yoav Tock, Ori Shental, Danny Dolev:
Polynomial Linear Programming with Gaussian Belief Propagation. - Gabriel Istrate:
Identifying almost sorted permutations from TCP buffer dynamics. - Danny Bickson, Elad Yom-Tov, Danny Dolev:
A Gaussian Belief Propagation Solver for Large Scale Support Vector Machines. - Alessandro Agnetis, Enrico Grande, Andrea Pacifici:
Demand allocation with latency cost functions. - Martin Burkhart, Daniela Brauckhoff, Martin May:
On the Utility of Anonymized Flow Traces for Anomaly Detection. - Danny Bickson, Danny Dolev, Ori Shental, Paul H. Siegel, Jack K. Wolf:
Gaussian Belief Propagation Based Multiuser Detection. - Christopher M. Frenz:
Introduction to Searching with Regular Expressions. - Minji Kim, Jay Kumar Sundararajan, Muriel Médard, Atilla Eryilmaz, Ralf Koetter:
Network Coding in a Multicast Switch. - Ori Shental, Paul H. Siegel, Jack K. Wolf, Danny Bickson, Danny Dolev:
Gaussian Belief Propagation Solver for Systems of Linear Equations. - Milan Bradonjic, Eddie Kohler, Rafail Ostrovsky:
Near-Optimal Radio Use For Wireless Network Synchronization. - Eitan Sayag, Amir Leshem, Nikos D. Sidiropoulos:
Finite Word Length Effects on Transmission Rate in Zero Forcing Linear Precoding for Multichannel DSL. - Abla Kammoun, Malika Kharouf, Walid Hachem, Jamal Najim
:
A Central Limit Theorem for the SINR at the LMMSE Estimator Output for Large Dimensional Signals. - Emeric Gioan, Christophe Paul:
Split decomposition and graph-labelled trees: characterizations and fully-dynamic algorithms for totally decomposable graphs. - Piotr Berman, Marek Karpinski, Alexander Zelikovsky:
1.25 Approximation Algorithm for the Steiner Tree Problem with Distances One and Two. - Côme Berbain, Olivier Billet, Anne Canteaut, Nicolas T. Courtois, Henri Gilbert, Louis Goubin, Aline Gouget, Louis Granboulan, Cédric Lauradoux, Marine Minier, Thomas Pornin, Hervé Sibert:
SOSEMANUK: a fast software-oriented stream cipher. - Heidi Gebauer:
Unsatisfiable (k,(4*2^k/k))-CNF formulas. - Soumya Jana:
Alphabet Sizes of Auxiliary Variables in Canonical Inner Bounds. - Raúl H. Etkin, Neri Merhav, Erik Ordentlich:
Error Exponents of Optimum Decoding for the Interference Channel. - Heidi Gebauer:
Disproving the Neighborhood Conjecture. - Axel Boldt, Michael Janich:
A global physician-oriented medical information system. - Heping Gao, Meera Sitharam:
Characterizing 1-Dof Henneberg-I graphs with efficient configuration spaces. - Pedro Miguel Moreira, Luís Paulo Reis
, António Augusto de Sousa:
Visualization Optimization : Application to the RoboCup Rescue Domain. - Hamed Owladeghaffari, Witold Pedrycz, Mostafa Sharifzadeh:
Modeling of Social Transitions Using Intelligent Systems. - Daniel Hirschkoff, Damien Pous:
On characterising strong bisimilarity in a fragment of CCS with replication. - Chunxi Li, Changjia Chen:
Initial Offset Placement in p2p Live Streaming Systems. - Sameer Pawar, Amir Salman Avestimehr, David N. C. Tse:
Diversity-Multiplexing Tradeoff of the Half-Duplex Relay Channel. - Chunxi Li, Changjia Chen:
Fetching Strategy in the Startup Stage of p2p Live Streaming. - Guangyue Han, Brian H. Marcus:
Asymptotics of Entropy Rate in Special Families of Hidden Markov Chains. - (Withdrawn) A Model for Communication in Clusters of Multi-core Machines.
- Neri Merhav:
Joint source-channel coding via statistical mechanics: thermal equilibrium between the source and the channel. - Valentin Polishchuk, Jukka Suomela:
A simple local 3-approximation algorithm for vertex cover. - Yves Bertot:
Structural abstract interpretation, A formal study using Coq. - Tobias Koch, Amos Lapidoth:
Multipath Channels of Unbounded Capacity. - Bogdan Nicolae, Gabriel Antoniu, Luc Bougé
:
Enabling Lock-Free Concurrent Fine-Grain Access to Massive Distributed Data: Application to Supernovae Detection. - Bogdan Nicolae, Gabriel Antoniu, Luc Bougé
:
Distributed Management of Massive Data: an Efficient Fine-Grain Data Access Scheme. - Slavcho Shtrakov:
Essential Arity Gap of k-Valued Functions. - Nikolaos Vasiloglou, Alexander G. Gray, David V. Anderson:
Non-Negative Matrix Factorization, Convexity and Isometry. - Sergey Loyka, François Gagnon:
On Outage and Error Rate Analysis of the Ordered V-BLAST. - Nan Liu, Deniz Gündüz, Andrea J. Goldsmith, H. Vincent Poor:
Interference Channels with Correlated Receiver Side Information. - Simone Faro, Thierry Lecroq:
Efficient Pattern Matching on Binary Strings. - Edward Rosten, Reid B. Porter, Tom Drummond:
Faster and better: a machine learning approach to corner detection. - Frédéric Meunier, Nicolas Wagner:
Dynamic assignment: there is an equilibrium ! - Anand D. Sarwate, Alexandros G. Dimakis:
The Impact of Mobility on Gossip Algorithms. - Jamshid Abouei, Alireza Bayesteh, Masoud Ebrahimi, Amir K. Khandani:
On the Throughput Maximization in Dencentralized Wireless Networks. - Viorica Sofronie-Stokkermans:
On combinations of local theory extensions. - Pannir Selvam Elamvazhuthi, Parag Shankar Kulkarni, Bikash Kumar Dey:
DSTC Layering Protocols in Wireless Cooperative Networks. - Damien Chablat
:
Path Planner for Objects, Robots and Mannequins by Multi-Agents Systems or Motion Captures. - Flavien Paccot, Philippe Lemoine, Nicolas Andreff, Damien Chablat
, Philippe Martinet:
A Vision-based Computed Torque Control for Parallel Kinematic Machines. - L. Sunil Chandran, Anita Das, Naveen Sivadasan:
On the cubicity of bipartite graphs. - Zhihang Yi, Il-Min Kim:
Finite-SNR Diversity-Multiplexing Tradeoff and Optimum Power Allocation in Bidirectional Cooperative Networks. - Nir Ailon:
A Simple Linear Ranking Algorithm Using Query Dependent Intercept Variables. - Jin Lu, José M. F. Moura:
Linear Time Encoding of LDPC Codes. - Martin Lévesque, Halima Elbiaze, Wael Hosny Fouad Aly:
Adaptive Hybrid Deflection and Retransmission Routing for Optical Burst-Switched Networks. - Krzysztof R. Apt, Francesca Rossi, Kristen Brent Venable:
A comparison of the notions of optimality in soft constraints and graphical games. - Krzysztof R. Apt, Vincent Conitzer, Mingyu Guo, Evangelos Markakis:
Welfare Undominated Groves Mechanisms. - Viorica Sofronie-Stokkermans:
Sheaves and geometric logic and applications to the modular verification of complex systems. - Ugo Dal Lago, Luca Roversi, Luca Vercelli:
Taming Modal Impredicativity: Superlazy Reduction. - Abla Kammoun, Malika Kharouf, Walid Hachem, Jamal Najim:
BER and Outage Probability Approximations for LMMSE Detectors on Correlated MIMO Channels. - Onur Ozan Koyluoglu, Hesham El Gamal:
On Power Control and Frequency Reuse in the Two User Cognitive Channel. - Joseph Y. Halpern, Rafael Pass:
Iterated Regret Minimization: A More Realistic Solution Concept. - Dimitris K. Tsolis, Spyros Sioutas, Theodore S. Papatheodorou:
Watermarking Digital Images Based on a Content Based Image Retrieval Technique. - Tobias Kuhn
:
Combining Semantic Wikis and Controlled Natural Language. - Huawei Shen, Xueqi Cheng, Kai Cai, Mao-Bin Hu:
Detect overlapping and hierarchical community structure in networks. - Lukasz Debowski:
On the Vocabulary of Grammar-Based Codes and the Logical Consistency of Texts. - Enrico Malizia, Luigi Palopoli, Francesco Scarcello:
On the Computational Complexity of the Bargaining Set and the Kernel in Compact Coalitional Games. - Zhaohua Luo:
Clone Theory: Its Syntax and Semantics, Applications to Universal Algebra, Lambda Calculus and Algebraic Logic. - Krzysztof R. Apt, Vangelis Markakis:
Optimal Strategies in Sequential Bidding. - Krzysztof R. Apt, Farhad Arbab, Huiye Ma:
A Distributed Platform for Mechanism Design. - David Harvey:
A cache-friendly truncated FFT. - Bike Xie, Miguel Griot, Andres I. Vila Casado, Richard D. Wesel:
Optimal Transmission Strategy and Explicit Capacity Region for Broadcast Z Channels. - Oliver Kennedy, Christoph Koch, Alan J. Demers:
Dynamic Approaches to In-Network Aggregation. - (Withdrawn) Having been misunderstood.
- Jan A. Bergstra, Mark Burgess:
A static theory of promises. - Cezara Dragoi, Gheorghe Stefanescu:
A sound spatio-temporal Hoare logic for the verification of structured interactive programs with registers and voices. - Xiaowen Zhang, Zhanyang Zhang, Xinzhou Wei:
Enhancements to A Lightweight RFID Authentication Protocol. - Keki M. Burjorjee:
The Fundamental Problem with the Building Block Hypothesis. - Keki M. Burjorjee:
Two Remarkable Computational Competencies of the Simple Genetic Algorithm. - Kostadin Koroutchev, Elka Korutcheva:
Text as Statistical Mechanics Object. - Kostadin Koroutchev, Elka Korutcheva:
Detecting the Most Unusual Part of a Digital Image. - Jörg Kliewer, Kamil Sh. Zigangirov, Christian Koller, Daniel J. Costello Jr.:
Coding Theorems for Repeat Multiple Accumulate Codes. - Amit M. Bhosle, Teofilo F. Gonzalez:
Efficient Algorithms and Routing Protocols for Handling Transient Single Node Failures. - Adam Lipowski, Dorota Lipowska:
Homonyms and synonyms in the n-objects naming game. - Istvan Szita, András Lörincz:
The many faces of optimism - Extended version. - Douglas P. Benjamin:
Grid Computing in the Collider Detector at Fermilab (CDF) scientific experiment. - Muthiah Annamalai, R. Leela Velusamy:
A Call-Graph Profiler for GNU Octave. - Vukosi Ntsakisi Marivate, Tshilidzi Marwala:
Social Learning Methods in Board Games. - Gabriela Ochoa, Marco Tomassini, Sébastien Vérel, Christian Darabos:
A Study of NK Landscapes' Basins and Local Optima Networks. - Sébastien Vérel, Gabriela Ochoa, Marco Tomassini:
The Connectivity of NK Landscapes' Basins: A Network Analysis. - Lesedi Melton Masisi, Fulufhelo V. Nelwamondo, Tshilidzi Marwala:
The use of entropy to measure structural diversity. - Amos Lapidoth, Jeffrey H. Shapiro, Vinodh Venkatesan, Ligong Wang:
The Poisson Channel at Low Input Powers. - François-Xavier Dupé, Luc Brun:
Hierarchical Bag of Paths for Kernel Based Shape Classification. - Kousha Etessami, Mihalis Yannakakis:
Recursive Concurrent Stochastic Games. - Pedro A. Ortega, Daniel A. Braun:
A Minimum Relative Entropy Principle for Learning and Acting. - Muthiah Annamalai, Darshan Shrestha, Saibun Tjuatja:
Experimental Study of Application Specific Source Coding for Wireless Sensor Networks. - Chao Tian, Soheil Mohajer, Suhas N. Diggavi:
Approximating the Gaussian Multiple Description Rate Region Under Symmetric Distortion Constraints. - Gérard Henry Edmond Duchamp, Silvia Goodenough, Karol A. Penson:
Rational Hadamard products via Quantum Diagonal Operators. - Dan Golding, Linda Wilson, Tshilidzi Marwala:
Emergency Centre Organization and Automated Triage System. - Yuxin Deng, Matthew Hennessy, Rob J. van Glabbeek, Carroll Morgan:
Characterising Testing Preorders for Finite Probabilistic Processes. - Carlo Fischione, Alberto Speranzon, Karl Henrik Johansson, Alberto L. Sangiovanni-Vincentelli:
Distributed Estimation over Wireless Sensor Networks with Packet Losses. - (Withdrawn) Optimal codes in deletion and insertion metric.
- Deepyaman Maiti, Sagnik Biswas, Amit Konar:
Design of a Fractional Order PID Controller Using Particle Swarm Optimization Technique. - Mohammad Shaqfeh, Norbert Goertz:
Comments on the Boundary of the Capacity Region of Multiaccess Fading Channels. - Bertrand Ducourthial, Sofiane Khalfallah, Franck Petit:
Best-effort Group Service in Dynamic Networks. - R. Musehane, F. Netshiongolwe, Fulufhelo V. Nelwamondo, Lesedi Melton Masisi, Tshilidzi Marwala:
Relationship between Diversity and Perfomance of Multiple Classifiers for Decision Support. - Vikram Chandrasekhar, Jeffrey G. Andrews, Tarik Muharemovic, Zukang Shen, Alan Gatherer:
Power Control in Two-Tier Femtocell Networks. - Nasir Uddin Ahmed, Farzad Rezaei, Sergey Loyka:
Control Theoretic Formulation of Capacity of Dynamic Electro Magnetic Channels. - Rahul Vaze, Robert W. Heath Jr.:
On the Capacity and Diversity-Multiplexing Tradeoff of the Two-Way Relay Channel. - Wei-jen Hsu, Thrasyvoulos Spyropoulos, Konstantinos Psounis, Ahmed Helmy:
Modeling Spatial and Temporal Dependencies of User Mobility in Wireless Mobile Networks. - Victor Lebreton:
Le trading algorithmique. - Julien Allali, Marie-France Sagot:
A new distance for high level RNA secondary structure comparison. - Tor Helleseth, Alexander Kholosha:
On the Equation $x^{2^l+1}+x+a=0$ over $\mathrm{GF}(2^k)$ (Extended Version). - Salah A. Aly, Ahmed E. Kamal:
Network Coding-based Protection Strategies Against a Single Link Failure in Optical Networks. - Pekka Orponen, Satu Elisa Schaeffer, Vanesa Avalos Gaytán:
Locally computable approximations for spectral clustering and absorption times of random walks. - Jeremiah J. Harmsen, William A. Pearlman:
Capacity of Steganographic Channels. - Moshe Dubiner:
Bucketing Coding and Information Theory for the Statistical High Dimensional Nearest Neighbor Problem. - Andreas Kaltenbrunner, Rodrigo Meza, Jens Grivolla, Joan Codina, Rafael E. Banchs:
Bicycle cycles and mobility patterns - Exploring and characterizing data from a community bicycle program. - Moshe Dubiner:
A Heterogeneous High Dimensional Approximate Nearest Neighbor Algorithm. - William W. Edmonson, Maarten H. van Emden:
Interval Semantics for Standard Floating-Point Arithmetic. - Marco Kuhlmann:
Ogden's Lemma for Regular Tree Languages. - Armen E. Allahverdyan:
Entropy of Hidden Markov Processes via Cycle Expansion. - Saeed Akhavan-Astaneh, Saeed Gazor:
Resource Allocation and Relay Selection for Collaborative Communications. - Nicol N. Schraudolph, Dmitry Kamenetsky:
Efficient Exact Inference in Planar Ising Models. - Valentin Savin:
Non binary LDPC codes over the binary erasure channel: density evolution analysis. - Tom Hirschowitz
, Aurélien Pardon:
Binding bigraphs as symmetric monoidal closed theories. - Richard Garner, Tom Hirschowitz
, Aurélien Pardon:
Graphical Presentations of Symmetric Monoidal Closed Theories. - Mugurel Ionut Andreica:
Efficient Algorithmic Techniques for Several Multidimensional Geometric Data Management and Analysis Problems. - Edward Rosten, Rohan Loveland:
Camera distortion self-calibration using the plumb-line constraint and minimal Hough entropy. - Weidong Huang:
An Eye Tracking Study into the Effects of Graph Layout. - Shlomi Dolev, Nir Tzachar:
Randomization Adaptive Self-Stabilization. - Andrea Abrardo, Paolo Detti, Marco Moretti:
Message passing resource allocation for the uplink of multicarrier systems. - Hervé Paulino, Luís M. B. Lopes:
The Mob core language and abstract machine (rev 0.2). - Pierre Genevès:
Logics for XML. - Toshiya Itoh, Yasuhiro Suzuki:
New Constructions for Query-Efficient Locally Decodable Codes of Subexponential Length. - Nikolaos Vasiloglou, Alexander G. Gray, David V. Anderson:
Learning Isometric Separation Maps. - Claudine Brucks, Christoph Schommer:
Assembling Actor-based Mind-Maps from Text Stream. - Effrosini Kokiopoulou, Pascal Frossard:
Classification of multiple observations by semi-supervised learning. - Seyed Saeed Changiz Rezaei, Shahab Oveis Gharan, Amir K. Khandani:
Cooperative Strategies for the Half-Duplex Gaussian Parallel Relay Channel: Simultaneous Relaying versus Successive Relaying. - Keqin Liu, Qing Zhao:
A Restless Bandit Formulation of Multi-channel Opportunistic Access: Indexablity and Index Policy. - Yi Zeng, Ning Zhong:
On Granular Knowledge Structures. - Jacques M. Bahi, Christophe Guyeux:
A topological chaos framework for hash functions. - Jacques M. Bahi, Christophe Guyeux:
A watermarking algorithm satisfying topological chaos properties. - Chiachi Huang, Viveck R. Cadambe, Syed Ali Jafar:
On the Capacity and Generalized Degrees of Freedom of the X Channel. - Henning Fernau, Fedor V. Fomin, Daniel Lokshtanov, Daniel Raible, Saket Saurabh, Yngve Villanger:
Kernel(s) for Problems With no Kernel: On Out-Trees With Many Leaves. - Torsten Grust, Manuel Mayr, Jan Rittinger:
XQuery Join Graph Isolation. - Robin A. Moser:
A constructive proof of the Lovasz Local Lemma. - Bradly Alicea:
The adaptability of physiological systems optimizes performance: new directions in augmentation. - Taolue Chen, Wan J. Fokkink, Rob J. van Glabbeek:
On Finite Bases for Weak Semantics: Failures versus Impossible Futures. - Akram Aldroubi, Haichao Wang, Kourosh Zarringhalam:
Sequential adaptive compressed sampling via Huffman codes. - Marek Cygan, Lukasz Kowalik, Marcin Pilipczuk, Mateusz Wykurz:
Exponential-Time Approximation of Hard Problems. - Jean Daligault, Gregory Z. Gutin, Eun Jung Kim, Anders Yeo:
FPT Algorithms and Kernels for the Directed $k$-Leaf Problem. - Josep Rifà, Victor A. Zinoviev:
New completely regular q-ary codes based on Kronecker products. - Dietrich Kuske, Markus Lohrey:
Automatic structures of bounded degree revisited. - Sten-Åke Tärnlund:
P is not equal to NP. - Claire François, Jean-Charles Lamirel, Shadi Al Shehabi:
Combining Advanced Visualization and Automatized Reasoning for Webometrics: A Test Study. - Travis Gagie:
A New Algorithm for Building Alphabetic Minimax Trees. - Ozgur Oyman, Moe Z. Win:
Power-Bandwidth Tradeoff in Multiuser Relay Channels with Opportunistic Scheduling. - Ozgur Oyman:
Reliability Bounds for Delay-Constrained Multi-hop Networks. - Yaming Yu:
Convergence and Monotonicity Problems in an Information-Theoretic Law of Small Numbers. - Rahul Sami, Andy Twigg:
Lower bounds for distributed markov chain problems. - Roser Sala-Llonch, Effrosini Kokiopoulou, Ivana Tosic, Pascal Frossard:
3D Face Recognition with Sparse Spherical Representations. - Alessandro Colantonio, Roberto Di Pietro, Alberto Ocello:
An Activity-Based Model for Separation of Duty. - Aleksandar Stojmirovic:
Quasi-metrics, Similarities and Searches: aspects of geometry of protein datasets. - Amitabha Bagchi, Garima Lahoti:
Relating Web pages to enable information-gathering tasks. - Peter Tröger:
The Multi-Core Era - Trends and Challenges. - Andrew Twigg:
Worst-case time decremental connectivity and k-edge witness. - Adrien Richard:
On the length of attractors in boolean networks with an interaction graph by layers. - Qiang Li, Yan He, Jing-ping Jiang:
A Novel Clustering Algorithm Based on a Modified Model of Random Walk. - Wilmari Bekker, Valentin Goranko:
Symbolic model checking of tense logics on rational Kripke models. - Stéphane Demri, Ranko Lazic, Arnaud Sangnier:
Model checking memoryful linear-time logics over one-counter automata. - Henryk Borowczyk:
A Combinatorial-Probabilistic Diagnostic Entropy and Information. - Marcelo Ris, Junior Barrera, David Correa Martins Jr.:
A branch-and-bound feature selection algorithm for U-shaped cost functions. - R. Nuriyev:
Detection of parallel steps in programs with arrays. - Tomás Feder, Shubha U. Nabar, Evimaria Terzi:
Anonymizing Graphs. - Rajeev Motwani, Shubha U. Nabar:
Anonymizing Unstructured Data. - R. Nuriyev:
Programming languages with algorithmically parallelizing problem. - Marcus Hutter, Shane Legg:
Temporal Difference Updating without a Learning Rate. - Ivan Yu. Mogilnykh, Patric R. J. Östergård, Olli Pottonen, Faina I. Solov'eva:
Reconstructing Extended Perfect Binary One-Error-Correcting Codes from Their Minimum Distance Graphs. - Daniil Ryabko, Marcus Hutter:
On the Possibility of Learning in Reactive Environments with Arbitrary Dependence. - Gilles Villard:
Kaltofen's division-free determinant algorithm differentiated for matrix adjoint computation. - Nihat Ay, Markus Müller, Arleta Szkola:
Effective Complexity and its Relation to Logical Depth. - Mark Giesbrecht, Daniel S. Roche:
Interpolation of Shifted-Lacunary Polynomials. - Mathias Niepert, Dirk Van Gucht, Marc Gyssens:
On the Conditional Independence Implication Problem: A Lattice-Theoretic Approach. - Sofie Haesevoets, Bart Kuijpers:
A triangle-based logic for affine-invariant querying of spatial and spatio-temporal data. - Kousha Etessami, Marta Z. Kwiatkowska, Moshe Y. Vardi, Mihalis Yannakakis:
Multi-Objective Model Checking of Markov Decision Processes. - R. Nuriyev:
Practical language based on systems of definitions. - Renat Nuriyev:
Non procedural language for parallel programs. - Pablo Ignacio Fierens:
Number of wireless sensors needed to detect a wildfire. - George Levin, Sergey Loyka:
From Multi-Keyholes to Measure of Correlation and Power Imbalance in MIMO Channels: Outage Capacity Analysis. - Pawel Sobkowicz:
Peer-review in the Internet age. - Tsuyoshi Ito, Hirotada Kobayashi, Keiji Matsumoto:
Oracularization and Two-Prover One-Round Interactive Proofs against Nonlocal Strategies. - Joseph B. Keller:
Evaluation of Authors and Journals. - Lenka Zdeborová, Marc Mézard:
Constraint satisfaction problems with isolated solutions are hard. - David Naccache, Igor E. Shparlinski:
Divisibility, Smoothness and Cryptographic Applications. - Stephanie Vance:
Mordell's inequality for Eisenstein and Hurwitz lattices. - Rida Laraki, Jean B. Lasserre:
Semidefinite programming for N-Player Games. - Emmanuel Briand, Rosa C. Orellana, Mercedes H. Rosas:
Reduced Kronecker coefficients and counter-examples to Mulmuley's saturation conjecture SH. - Hari Krovi, Martin Rötteler:
An Efficient Quantum Algorithm for the Hidden Subgroup Problem over Weyl-Heisenberg Groups. - Fei Wei, Huazhong Yang:
Directed Transmission Method, A Fully Asynchronous Approach to Solve Sparse Linear Systems in Parallel. - Annika Guenther, Gabriele Nebe:
Automorphisms of doubly-even self-dual binary codes. - Daoyi Dong, Chunlin Chen, Han-Xiong Li, Tzyh Jong Tarn:
Quantum reinforcement learning. - David W. Hogg, Dustin Lang:
Astronomical imaging: The theory of everything. - Bruno Cessac, Horacio Rostro-González, Juan Carlos Vasquez, Thierry Viéville:
To which extend is the "neural code" a metric ? - Bruno Cessac, Olivier Rochel, Thierry Viéville:
Introducing numerical bounds to improve event-based neural network simulation. - Satyam Mukherjee, Gautam Mukherjee, Neelima Gupte:
Statistical Characterizers of Transport in a Communication Network. - Alain Couvreur:
Sums of residues on algebraic surfaces and application to coding theory. - Christopher J. Fluke, David G. Barnes, N. T. Jones:
Interchanging Interactive 3-d Graphics for Cosmology. - Adam Lipowski, Dorota Lipowska:
Computational modelling of evolution: ecosystems and language. - Jerome Le Ny, Eric Feron, Munther A. Dahleh:
Scheduling Kalman Filters in Continuous Time. - Alec Pawling, Ping Yan, Julián Candia, Timothy W. Schoenharl, Gregory R. Madey:
Anomaly Detection in Streaming Sensor Data. - Kazushi Mimura:
Typical Performance of Irregular Low-Density Generator-Matrix Codes for Lossy Compression. - Anil N. Hirani, K. B. Nakshatrala, Jehanzeb Hameed Chaudhry:
Numerical method for Darcy flow derived using Discrete Exterior Calculus. - Pavel Chebotarev:
A Class of Graph-Geodetic Distances Generalizing the Shortest-Path and the Resistance Distances. - Shigeru Furuichi:
An axiomatic characterization of a two-parameter extended relative entropy. - Xinjia Chen:
Robust Estimation of Mean Values. - Xinjia Chen:
A Theory of Truncated Inverse Sampling. - Dorit Aharonov, Michael Ben-Or, Fernando G. S. L. Brandão, Or Sattath
:
The Pursuit For Uniqueness: Extending Valiant-Vazirani Theorem to the Probabilistic and Quantum Settings.
![](https://dblp.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.