default search action
CoRR, June 2009
- Nadia Fawaz, Keyvan Zarifi, Mérouane Debbah, David Gesbert:
Asymptotic Capacity and Optimal Precoding in MIMO Multi-Hop Relay Networks. - Serguei A. Mokhov, Joey Paquet, Mourad Debbabi:
Towards Automated Deduction in Blackmail Case Analysis with Forensic Lucid. - Brian Tomasik:
A Minimum Description Length Approach to Multitask Feature Selection. - Minas Gjoka, Maciej Kurant, Carter T. Butts, Athina Markopoulou:
A Walk in Facebook: Uniform Sampling of Users in Online Social Networks. - Serguei A. Mokhov, Lee Wei Huynh, Jian Li:
Managing Distributed MARF with SNMP. - Jerzy Marcinkowski, Jakub Michaliszyn:
The cost of being co-Buchi is nonlinear. - Zaenal Akbar, Laksana Tri Handoko:
Reverse method for labeling the information from semi-structured web pages. - Mahtab Hoseininia, Farzad Didehvar, Mir Mehdi Seyyed Esfahani:
Inventory competition in a multi channel distribution system: The Nash and Stackelberg game. - Abedelaziz Mohaisen, Dowon Hong:
Mitigating the ICA Attack against Rotation Based Transformation for Privacy Preserving Clustering. - Yuanlin Zhang, Forrest Sheng Bao:
A Survey of Tree Convex Sets Test. - Sumio Watanabe:
Equations of States in Statistical Learning for a Nonparametrizable and Regular Case. - Kimikazu Kato, Tikara Hosino:
Solving k-Nearest Vector Problem on Multiple Graphics Processors. - Thomas Roche, Cédric Tavernier:
Multi-Linear cryptanalysis in Power Analysis Attacks MLPA. - Thanh Tùng Kim, Albert Guillen i Fabregas:
Coded Modulation with Mismatched CSIT over Block-Fading Channels. - Arash Ghasemmehdi, Erik Agrell:
Optimal Projection Method in Sphere Decoding. - Jeong-Hoon Lee, Kyu-Young Whang, Hyo-Sang Lim, Byung-Suk Lee, Jun-Seok Heo:
Progressive Processing of Continuous Range Queries in Hierarchical Wireless Sensor Networks. - Vincent Nélis, Joël Goossens:
MORA: an Energy-Aware Slack Reclamation Scheme for Scheduling Sporadic Real-Time Tasks upon Multiprocessor Platforms. - Iman Firmansyah, Zaenal Akbar, Laksana Tri Handoko:
Microcontroller based distributed and networked control system for public cluster. - Vincent K. N. Lau, Yan Chen:
Delay-Optimal Power and Precoder Adaptation for Multi-stream MIMO Systems. - Christophe Paoli, Cyril Voyant, Marc Muselli, Marie-Laure Nivet:
Solar radiation forecasting using ad-hoc time series preprocessing and neural networks. - Andrea Pasquinucci:
Rivisiting Token/Bucket Algorithms in New Applications. - Gregory S. Chirikjian:
Information-Theoretic Inequalities on Unimodular Lie Groups. - Sébastien Li-Thiao-Té:
Semiparametric Estimation of a Noise Model with Quantization Errors. - Mugurel Ionut Andreica, Eliana-Dina Tirsa, Nicolae Tapus, Florin Pop, Ciprian Dobre:
Towards a Centralized Scheduling Framework for Communication Flows in Distributed Systems. - Mugurel Ionut Andreica, Eliana-Dina Tirsa, Alexandru Costan, Nicolae Tapus:
Offline Algorithms for Several Network Design, Clustering and QoS Optimization Problems. - Mugurel Ionut Andreica, Eliana-Dina Tirsa, Nicolae Tapus:
Data Distribution Optimization using Offline Algorithms and a Peer-to-Peer Small Diameter Tree Architecture with Bounded Node Degrees. - Damiano Mazza:
Observational Equivalence and Full Abstraction in the Symmetric Interaction Combinators. - Ilya Volnyansky, Vladimir Pestov:
Curse of Dimensionality in Pivot-based Indexes. - Xin Han, Francis Y. L. Chin, Hing-Fung Ting, Guochuan Zhang:
A New Upper Bound on 2D Online Bin Packing. - (Withdrawn) Computing the tree number of a cut-outerplanar graph.
- Li Li, Yudong Chen, Yi Zhang:
A Mixed-Fractal Model for Network Traffic. - Aditya Chopra, Heng Lian:
Total Variation, Adaptive Total Variation and Nonconvex Smoothly Clipped Absolute Deviation Penalty for Denoising Blocky Images. - Samson Lasaulce, Mérouane Debbah, Eitan Altman:
Methodologies for Analyzing Equilibria in Wireless Games. - Juan-Manuel Torres-Moreno, Mirta B. Gordon:
An optimal linear separator for the Sonar Signals Classification task. - André G. Holzner, Peter Igo-Kemenes, Salvatore Mele:
First results from the PARSE.Insight project: HEP survey on data preservation, re-use and (open) access. - G. Haikal:
A stabilized finite element formulation of non-smooth contact. - Jaeok Park, Mihaela van der Schaar:
Medium Access Control Protocols With Memory. - Joaquim Borges, Josep Rifà, Victor A. Zinoviev:
On linear completely regular codes with covering radius rho=1. Construction and classification. - Tian Lan, David T. H. Kao, Mung Chiang, Ashutosh Sabharwal:
An Axiomatic Theory of Fairness. - Haim Kaplan, Micha Sharir, Eugenii Shustin:
On lines and Joints. - Zohir Bouzid, Maria Gradinariu Potop-Butucaru, Sébastien Tixeuil:
Optimal Byzantine Resilient Convergence in Asynchronous Robot Networks. - Florian Niedermeier, Michael Niedermeier, Harald Kosch:
Quality assessment of the MPEG-4 scalable video CODEC. - Martin Holmes, Laurent Romary:
Encoding models for scholarly literature. - Chris Giannella:
New Instability Results for High Dimensional Nearest Neighbor Search. - Olga Holtz, Noam Shomron:
Computational Complexity and Numerical Stability of Linear Problems. - Peter Harremoës, Oliver Johnson, Ioannis Kontoyiannis:
Thinning, Entropy and the Law of Thin Numbers. - Brijesh Kumar Rai, Bikash Kumar Dey:
Sum-networks: System of polynomial equations, unachievability of coding capacity, reversibility, insufficiency of linear network coding. - Sebastian Bernhardsson, Luis Enrique Correa da Rocha, Petter Minnhagen:
Size dependent word frequencies and translational invariance of books. - Piotr Bania:
Dynamic Data Flow Analysis via Virtual Code Integration (aka The SpiderPig case). - Paul M. B. Vitányi:
Distributed elections in an Archimedean ring of processors. - Kun Zheng, Husheng Li, Seddik M. Djouadi, Jun Wang:
Spectrum Sensing in Low SNR Regime via Stochastic Resonance. - Lalitha Sankar, Xiaohu Shang, Elza Erkip, H. Vincent Poor:
Ergodic Fading Interference Channels: Sum-Capacity and Separability. - Subhash C. Kak:
Single Neuron Memories and the Network's Proximity Matrix. - Christoph Studer, Helmut Bölcskei:
Soft-Input Soft-Output Single Tree-Search Sphere Decoding. - Mohd Nazri Ismail:
Analyzing of MOS and Codec Selection for Voice over IP Technology. - Vasiliy Saiko:
Specific Characteristics of Applying the Paired Comparison Method for Parameterization of Consumer Wants. - Enrico Formenti, Alberto Dennunzio, Michael Weiss:
2D cellular automata: expansivity and decidability issues. - Emil Daniel Schwab:
A Partial Order on Bipartite Graphs with n Vertices. - A. A. Shumeyko, S. L. Sotnik:
Using Genetic Algorithms for Texts Classification Problems. - Gregory Z. Gutin, Daniel Karapetyan:
A Memetic Algorithm for the Multidimensional Assignment Problem. - Cristina Ofelia Stanciu:
Decision Support Systems Architectures. - Virgiliu Streian, Adela Ionescu:
Web Publishing of the Files Obtained by Flash. - Ramona Vasilescu:
PDF/A standard for long term archiving. - Valentin Vieriu, Catalin Tuican:
Adobe AIR, Bringing Rich Internet Applications to the Desktop. - Tiberiu Marius Karnyanszky, Mihai Titu:
Upon the Modeling and the Optimization of the Debiting Process through Computer Aided Non-Conventional Technologies. - Boris Yangel:
Fast Weak Learner Based on Genetic Algorithm. - Florentina Anica Pintea, Georgiana Petruta Fintineanu, Bogdan Ioan Selariu:
PayPal in Romania. - Yongxin Tong, Zhao Li, Dan Yu, Shilong Ma, Ke Xu:
Mining Compressed Repetitive Gapped Sequential Patterns Efficiently. - Sylvie Noël, Daniel Lemire:
On the Challenges of Collaborative Data Processing. - Matthew Marriotti:
Course Material Selection Rubric for Creating Network Security Courses. - Xiaorong Hou, Junwei Shao:
Spherical Distribution of 5 Points with Maximal Distance Sum. - Sayee C. Kompalli, Ravi R. Mazumdar:
On a Generalized Foster-Lyapunov Type Criterion for the Stability of Multidimensional Markov chains with Applications to the Slotted-Aloha Protocol with Finite Number of Queues. - Brian Carroll:
On Sparse Channel Estimation. - Christoph Koutschan:
Eliminating Human Insight: An Algorithmic Proof of Stembridge's TSPP Theorem. - Gagan Aggarwal, Gagan Goel, Aranyak Mehta:
Efficiency of (Revenue-)Optimal Mechanisms. - Thierry Bouche:
Report on the current state of the French DMLs. - Graeme Pope:
Modified Frame Reconstruction Algorithm for Compressive Sensing. - Arto Annila:
Physical portrayal of computational complexity. - Jean-Luc Fouquet, Jean-Marie Vanherpe:
On Fulkerson conjecture. - Éric Sopena, Jiaojiao Wu:
Coloring the square of the Cartesian product of two cycles. - Omer Khalid, Richard J. Anthony, Paul Nilsson, Kate Keahey, Markus Schulz, Miltos Petridis, Kevin Parrott:
Enabling and Optimizing Pilot Jobs using Xen based Virtual Machines for the HPC Grid Applications. - Ming-Sheng Shang, Ci-Hang Jin, Tao Zhou, Yi-Cheng Zhang:
Collaborative filtering based on multi-channel diffusion. - Paolo Mancarella, Giacomo Terreni, Fariba Sadri, Francesca Toni, Ulrich Endriss:
The CIFF Proof Procedure for Abductive Logic Programming with Constraints: Theory, Implementation and Experiments. - Georg Böcherer, Alexandre de Baynast:
fairMAC: A Distributed Cooperative MAC Protocol with Throughput/Transmission-Cost Tradeoff. - Yannick Chevalier, Mounira Kourjieh:
On the Decidability of (ground) Reachability Problems for Cryptographic Protocols (extended version). - Michael T. Goodrich:
Pipelined Algorithms to Detect Cheating in Long-Term Grid Computations. - Jörg Peters, Jianhua Fan:
On the Complexity of Smooth Spline Surfaces from Quad Meshes. - Mark D. Reid, Robert C. Williamson:
Generalised Pinsker Inequalities. - Marianne Azer, Sherif El-Kassas, Magdy S. El-Soudani:
A Full Image of the Wormhole Attacks - Towards Introducing Complex Wormhole Attacks in wireless Ad Hoc Networks. - Xu Liu, Jianfeng Zhan, Bibo Tu, Ming Zou, Dan Meng:
Similarity Analysis in Automatic Performance Debugging of SPMD Parallel Programs. - Wei Zhou, Jianfeng Zhan, Dan Meng:
Multidimensional Analysis of System Logs in Large-scale Cluster Systems. - Yonatan Kaspi, Neri Merhav:
Error Exponents for Broadcast Channels with Degraded Message Sets. - Madalina Ecaterina Andreica, Mugurel Ionut Andreica, Angela Andreica:
Efficient Algorithms for Several Constrained Activity Scheduling Problems in the Time and Space Domains. - Mugurel Ionut Andreica, Madalina Ecaterina Andreica, Daniel Ardelean:
Efficient Algorithms for Several Constrained Resource Allocation, Management and Discovery Problems. - Jianfeng Zhan, Lei Wang, Bibo Tu, Yong Li, Peng Wang, Wei Zhou, Dan Meng:
Phoenix Cloud : Consolidating Heterogeneous Workloads of Large Organizations on Cloud Computing Platforms. - Catalin Hritcu, Jan Schwinghammer:
A Step-indexed Semantics of Imperative Objects. - Gregory Z. Gutin, Eun Jung Kim, Stefan Szeider, Anders Yeo:
A Probabilistic Approach to Problems Parameterized Above Tight Lower Bound. - Gregory Z. Gutin, Daniel Karapetyan, Igor Razgon:
FPT Algorithms in Analysis of Heuristics for Extracting Networks in Linear Programs. - Silvio M. Duarte Queiros:
On the effectiveness of a binless entropy estimator for generalised entropic forms. - Emanuele Viola:
Cell-Probe Lower Bounds for Prefix Sums. - Alexander A. Sherstov:
On Quantum-Classical Equivalence for Composed Communication Problems. - Benjamin Chevallereau, Alain Bernard, Pierre Mévellec:
Améliorer les performances de l'industrie logicielle par une meilleure compréhension des besoins. - Ioannis Z. Emiris, Elias P. Tsigaridas, Antonios Varvitsiotis:
Algebraic methods for counting Euclidean embeddings of rigid graphs. - Qi Dai, Wei Sha:
The Physics of Compressive Sensing and the Gradient-Based Recovery Algorithms. - Arne Meier, Martin Mundhenk, Thomas Schneider, Michael Thomas, Volker Weber, Felix Weiss:
The Complexity of Satisfiability for Fragments of Hybrid Logic -- Part I. - Ender Ayanoglu:
On "A Novel Maximum Likelihood Decoding Algorithm for Orthogonal Space-Time Block Codes". - Asaf Levin, Uri Yovel:
Uniform unweighted set cover: The power of non-oblivious local search. - Vitaly Skachek:
Correcting a Fraction of Errors in Nonbinary Expander Codes with Linear Programming. - Farzad Didehvar:
On Defining 'I' "I logy". - Tobias Lutz, Christoph Hausl, Ralf Kötter:
Bits Through Relay Cascades with Half-Duplex Constraint. - Abdellatif Zaidi, Shivaprasad Kotagiri, J. Nicholas Laneman, Luc Vandendorpe:
Multiaccess Channels with State Known to One Encoder: Another Case of Degraded Message Sets. - Muhammad Fainan Hanif, Peter J. Smith:
On the Statistics of Cognitive Radio Capacity in Shadowing and Fast Fading Environments (Journal Version). - Dorel Micle, Marcel Torok-Oance, Liviu Maruia:
The morpho-topographic and cartographic analysis of the archaeological site Cornesti "Iarcuri", Timis County, Romania, using computer sciences methods (GIS and Remote Sensing techniques). - Rolf Andreas Rasenack:
Analyser Framework to verify Software Component. - Bolanle Oladejo, Adenike O. Osofisan, Victor Odumuyiwa:
Knowledge Management in Economic Intelligence with Reasoning on Temporal Attributes. - Pablo Piantanida, Gerald Matz, Pierre Duhamel:
Outage Behavior of Discrete Memoryless Channels (DMCs) Under Channel Estimation Errors. - Pierre Cocheteux, Alexandre Voisin, Eric Levrat, Benoît Iung:
Methodology for assessing system performance loss within a proactive maintenance framework. - Nikolaj N. Glazunov:
Toward a Category Theory Design of Ontological Knowledge Bases. - Cristopher Moore, Alexander Russell:
Approximating the Permanent via Nonabelian Determinants. - Marcus Hutter:
Feature Reinforcement Learning: Part I: Unstructured MDPs. - Robin Adams, Zhaohui Luo:
Classical Predicative Logic-Enriched Type Theories. - Behnood Gholami, Allen R. Tannenbaum, Wassim M. Haddad:
Segmentation of Facial Expressions Using Semi-Definite Programming and Generalized Principal Component Analysis. - Andrey Breslav:
Creating Textual Language Dialects Using Aspect-like Techniques. - Martin Renqiang Min, David A. Stanley, Zineng Yuan, Anthony J. Bonner, Zhaolei Zhang:
Large-Margin kNN Classification Using a Deep Encoder Network. - Ashish Khisti, Suhas N. Diggavi, Gregory W. Wornell:
Secret-Key Generation using Correlated Sources and Channels. - Arash Shaban-Nejad, Olga Ormandjieva, Mohamad Kassab, Volker Haarslev:
Managing Requirement Volatility in an Ontology-Driven Clinical LIMS Using Category Theory. International Journal of Telemedicine and Applications. - Serguei A. Mokhov:
Towards Improving Validation, Verification, Crash Investigations, and Event Reconstruction of Flight-Critical Systems with Self-Forensics. - Subhas Kumar Ghosh, Janardan Misra:
A Randomized Algorithm for 3-SAT. - Philippe Thomas, André Thomas:
How deals with discrete data for the reduction of simulation models using neural network. - Mikhail Nesterenko, Sébastien Tixeuil:
Ideal Stabilization. - Martin Fürer, Serge Gaspers, Shiva Prasad Kasiviswanathan:
An Exponential Time 2-Approximation Algorithm for Bandwidth. - Piotr Bania:
Evading network-level emulation. - Armen E. Allahverdyan, Aram Galstyan:
On Maximum a Posteriori Estimation of Hidden Markov Processes. - Anupam Gupta, Ravishankar Krishnaswamy, Amit Kumar, Danny Segev:
Scheduling with Outliers. - Raghunandan H. Keshavan, Andrea Montanari, Sewoong Oh:
Matrix Completion from Noisy Entries. - Liming Wang, Dan Schonfeld:
Mapping Equivalence for Symbolic Sequences: Theory and Applications. - Chandra Chekuri, Sungjin Im, Benjamin Moseley:
Minimizing Maximum Response Time and Delay Factor in Broadcast Scheduling.