default search action
CoRR, November 2009
- Atta Ebrahim E. ElAlfi, M. Esmel ElAlami, Y. M. Asem:
Knowledge Extraction for Discriminating Male and Female in Logical Reasoning from Student Model. - Gene Golovchinsky, Scott A. Carter, Jacob T. Biehl:
Beyond the Drawing Board: Toward More Effective Use of Whiteboard Content. - Hyoungshick Kim, Ji Won Yoon:
How to Compare the Scientific Contributions between Research Groups. - Sham M. Kakade, Ohad Shamir, Karthik Sridharan, Ambuj Tewari:
Learning Exponential Families in High-Dimensions: Strong Convexity and Sparsity. - Jean Cardinal, Samuel Fiorini, Gwenaël Joret, Raphaël M. Jungers, J. Ian Munro:
Sorting under Partial Information (without the Ellipsoid Algorithm). - Melda Yuksel, Xi Liu, Elza Erkip:
A Secure Communication Game with a Relay Helping the Eavesdropper. - Ian Pratt-Hartmann, Ivo Düntsch:
Functions Definable by Numerical Set-Expressions. - Boseung Kim, Joohyun Lee, Yongtae Shin:
(RCFT) ReClustering Formation Technique in Hierarchical Sensor Network. - Graham H. Norton:
Minimal Polynomial Algorithms for Finite Sequences. - Yu Huang, Jianping Yu, Jiannong Cao, Xiaoxing Ma, XianPing Tao, Jian Lu:
Checking Behavioral Consistency Constraints for Pervasive Context in Asynchronous Environments. - Swaroop Darbha, K. B. Nakshatrala, K. R. Rajagopal:
On the vibrations of lumped parameter systems governed by differential-algebraic equations. - Cédric Gaël Aboue-Nze, Frédéric Guinand, Yoann Pigné:
Impact of Obstacles on the Degree of Mobile Ad Hoc Connection Graphs. - Wilfried Huss, Ecaterina Sava, Wolfgang Woess:
Entropy sensitivity of languages defined by infinite automata, via Markov chains with forbidden transitions. - Reza Omrani, Gagan Garg, P. Vijay Kumar, Petros Elia, Pankaj Bhambhani:
Large Families of Optimal Two-Dimensional Optical Orthogonal Codes. - Rares Vasilescu:
An Alternative To Common Content Management Techniques. - Muhammad Aasim Qureshi, Mohd Fadzil Bin Hassan, Sohail Safdar, Rehan Akbar:
A O(E) Time Shortest Path Algorithm For Non Negative Weighted Undirected Graphs. - Erdal Panayirci, Hakan Dogan, H. Vincent Poor:
A Gibbs Sampling Based MAP Detection Algorithm for OFDM Over Rapidly Varying Mobile Radio Channels. - Dasika Ratna Deepthi, K. Eswaran:
A Mirroring Theorem and its Application to a New Method of Unsupervised Hierarchical Pattern Classification. - Mohammad Karimadini, Hai Lin:
Synchronized Task Decomposition for Cooperative Multi-agent Systems. - Alonso Silva, Eitan Altman, Mérouane Debbah, Hamidou Tembine, Chloé Jimenez:
Optimal mobile association on hybrid networks: centralized and decentralized case. - Christine Michel, Patrick Prévôt:
Knowledge Management Concepts For Training By Project An observation of the case of project management education. - Christine Michel, Élise Garrot-Lavoué:
Meshat: Monitoring and Experience Sharing Tool for Project-Based Learning. - Stefano Allesina:
Accelerating the pace of discovery by changing the peer review algorithm. - Cédric Artigue, Philippe Loubaton:
On the precoder design of flat fading MIMO systems equipped with MMSE receivers: a large system approach. - Keehang Kwon, Hong Pyo Ha:
Algorithm as Defining Dynamic Systems. - A. Essaouabi, F. Regragui, Elhassane Ibnelhaj:
A Wavelet-Based Digital Watermarking for Video. - Sudip Dogra, Ritwik Ray, Saustav Ghosh, Debharshi Bhattacharya, Subir Kumar Sarkar:
A Cost Effective RFID Based Customized DVD-ROM to Thwart Software Piracy. - Sohail Safdar, Mohd Fadzil Hassan, Muhammad Aasim Qureshi, Rehan Akbar:
Biologically Inspired Execution Framework for Vulnerable Workflow Systems. - Rébecca Deneckère, Adrian Iacovelli, Elena Kornyshova, Carine Souveyet:
From Method Fragments to Method Services. - Rébecca Deneckère, Elena Kornyshova, Colette Rolland:
Enhancing the Guidance of the Intentional Model "MAP": Graph Theory Application. - Joseph Sill, Gábor Takács, Lester W. Mackey, David Lin:
Feature-Weighted Linear Stacking. - Marvin Weinstein:
Strange Bedfellows: Quantum Mechanics and Data Mining. - Theodoros Lappas, Konstantinos Pelechrinis, Michalis Faloutsos:
A Simple Conceptual Generator for the Internet Graph. - Tao Cui, Tracey Ho, Jörg Kliewer:
On Secure Network Coding Over Networks With Unequal Link Capacities. - Boseung Kim, Huibin Lim, Yongtae Shin:
Routing Technique Based on Clustering for Data Duplication Prevention in Wireless Sensor Network. - M. Krishnaveni, Suresh Kumar Thakur, P. Subashini:
An Optimal Method For Wake Detection In SAR Images Using Radon Transformation Combined With Wavelet Filters. - Hyubgun Lee, Kyounghwa Lee, Yongtae Shin:
AES Implementation and Performance Evaluation on 8-bit Microcontrollers. - Francisco J. Rodríguez-Pérez, José Luis González Sánchez, Alfonso Gazo-Cervero:
GoS Proposal to Improve Trust and Delay of MPLS Flows for MCN Services. - Tich Phuoc Tran, Longbing Cao, Dat Tran, Cuong Duc Nguyen:
Novel Intrusion Detection using Probabilistic Neural Network and Adaptive Boosting. - Dang Tuan Nguyen, Ha Quy-Tinh Luong, Tuyen Thi-Thanh Do:
Building a Vietnamese Language Query Processing Framework for ELibrary Searching Systems. - Ahmed M. Manasrah, Awsan Hasan, Omar Amer Abouabdalla, Sureswaran Ramadass:
Detecting Botnet Activities Based on Abnormal DNS traffic. - Behrouz Minaei, Parinaz Saadat:
SOAP Serialization Performance Enhancement, Design And Implementation Of A Middleware. - Y. Ireaneus Anna Rejani, S. Thamarai Selvi:
Breast Cancer Detection Using Multilevel Thresholding. - Rajeswari Mukesh, A. Damodaram, V. Subbiah Bharathi:
Energy Efficient Security Architecture for Wireless BioMedical Sensor Networks. - C. Banerjee, S. K. Pandey:
Software Security Rules, SDLC Perspective. - Negin Razavi, Amir Masoud Rahmani, Mehran Mohsenzadeh:
A Context-based Trust Management Model for Pervasive Computing Systems. - Safieh Siadat, Amir Masoud Rahmani, Mehran Mohsenzadeh:
Proposed platform for improving grid security by trust management system. - Vani Perumal, Jagannathan Ramaswamy:
An Innovative Scheme For Effectual Fingerprint Data Compression Using Bezier Curve Representations. - Al-Sammarraie Hosam, Adli Mustafa, Shakeel Ahmad, Merza Abbas:
Exception Agent Detection System for IP Spoofing Over Online Environments. - A. Rajaram, S. Palaniswami:
A Trust Based Cross Layer Security Protocol for Mobile Ad hoc Networks. - Ravindra Guravannavar:
Optimization and Evaluation of Nested Queries and Procedures. - Moshe Mishali, Yonina C. Eldar, Asaf Elron:
Xampling--Part I: Practice. - Manar Mohaisen, HeeSeok Yoon, KyungHi Chang:
Radio Transmission Performance of EPCglobal Gen-2 RFID System. - Haim Avron, Gil Shklarski, Sivan Toledo:
On Element SDD Approximability. - Philip Bille, Inge Li Gørtz:
Fast Arc-Annotated Subsequence Matching in Linear Space. - Yifan Hu:
Visualizing Graphs with Node and Edge Labels. - Emmanuel Beffara:
Linear combinations of orders. - Ramy H. Gohary, Timothy N. Davidson:
The capacity region of a product of two unmatched Gaussian broadcast channels with three particular messages and a common message. - Aaron Potechin:
Bounds on monotone switching networks for directed connectivity. - Leonid Gurvits:
A proof of the log-concavity conjecture related to the computation of the ergodic capacity of MIMO channels. - Hong Ju Park, Boyu Li, Ender Ayanoglu:
Constellation Precoded Multiple Beamforming. - Animesh Agarwal, Vaibhav Shrimali, Manik Lal Das:
GSM Security Using Identity-based Cryptography. - Shirin Jalali, Tsachy Weissman:
Multiple Description Coding of Discrete Ergodic Sources. - Pasquale De Meo, Giovanni Quattrone, Giorgio Terracina, Domenico Ursino:
An XML-based Multi-Agent System for Supporting Online Recruitment Services. - Kanak Saxena, D. S. Rajpoot:
A Way to Understand Various Patterns of Data Mining Techniques for Selected Domains. - M. Irfan, M. M. Tahir N. Baig, Furqan H. Khan, Raheel M. Hashmi, Khurram Shehzad, Assad Ali:
Management of Location Based Advertisement Services using Spatial Triggers in Cellular Networks. - Shailendra Singh, Sanjay Silakari:
Generalized Discriminant Analysis algorithm for feature reduction in Cyber Attack Detection System. - Nizami Gasilov, Afet Golayoglu Fatullayev, Sahin Emrah Amrahov:
Solution of General Fuzzy Linear Systems. - Dániel Marx:
Tractable hypergraph properties for constraint satisfaction and conjunctive queries. - Ahmed Ahmedin, Marwa Ali, Ahmed K. Sultan, Mohammed Nafie:
Power and Transmission Duration Control for Un-Slotted Cognitive Radio Networks. - Stéphane Martin, Denis Lugiez:
Research report : Collaborative Peer 2 Peer Edition: Avoiding Conflicts is Better than Solving Conflicts. - M. Zuhair Nashed, Qiyu Sun:
Sampling and Reconstruction of Signals in a Reproducing Kernel Subspace of $L^p({\Bbb R}^d)$. - Paul Cuff:
State Information in Bayesian Games. - N. Rama, Meenakshi Lakshmanan:
A New Computational Schema for Euphonic Conjunctions in Sanskrit Processing. - Heidi Gebauer:
Construction of a Non-2-colorable k-uniform Hypergraph with Few Edges. - A. Essaouabi, Elhassane Ibnelhaj, F. Fegragui:
Digital Image Watermarking for Arbitrarily Shaped Objects Based On SA-DWT. - Umer Salim, David Gesbert, Dirk T. M. Slock:
Combining Training and Quantized Feedback in Multi-Antenna Reciprocal Channels. - Kaustubh Bhattacharyya, Kandarpa Kumar Sarma:
ANN-based Innovative Segmentation Method for Handwritten text in Assamese. - Rafael Ponce-Medellin, Juan Gabriel González Serna, Rocio Vargas A., Lirio Ruiz:
Technology Integration around the Geographic Information: A State of the Art. - Mandhapati P. Raju, Siddhartha Khaitan:
Domain Decomposition Based High Performance Parallel Computing. - Ritu Sindhu, Abdul Wahid, G. N. Purohit:
Multi-Agent System Interaction in Integrated SCM. - Sumalatha Ramachandran, Sujaya Paulraj, Sharon Joseph, Vetriselvi Ramaraj:
Enhanced Trustworthy and High-Quality Information Retrieval System for Web Search Engines. - Lahatra Rakotondrainibe, Yvan Kokar, Gheorghe Zaharia, Ghaïs El Zein:
Toward a Gigabit Wireless Communications System. - Hans Jørgen Bang, David Gesbert:
Multicell Zero-Forcing and User Scheduling on the Downlink of a Linear Cell Array. - Lahatra Rakotondrainibe, Yvan Kokar, Gheorghe Zaharia, Ghaïs El Zein, Eric Tanguy, Li Hongwu, Benoît Charbonnier:
Hybrid, Optical and Wireless Near-Gigabit Communications System. - Jörg Endrullis, Dimitri Hendriks, Jan Willem Klop:
Let's Make a Difference! - Jörg Endrullis, Clemens Grabmayer, Dimitri Hendriks, Jan Willem Klop:
Unique Normal Forms in Infinitary Weakly Orthogonal Term Rewriting. - Dimitris Kalles, Ilias Fykouras:
Examples as Interaction: On Humans Teaching a Computer to Play a Game. - Lahatra Rakotondrainibe, Yvan Kokar, Gheorghe Zaharia, Ghaïs El Zein:
Système de Communications Sans Fil Très Haut Débit à 60 GHz. - Adeel Razi, Daniel J. Ryan, Iain B. Collings, Jinhong Yuan:
Sum Rates, Rate Allocation, and User Scheduling for Multi-User MIMO Vector Perturbation Precoding. - Nicolas Bitouze, Alexandre Graell i Amat, Eirik Rosnes:
Error Correcting Coding for a Non-symmetric Ternary Channel. - Yan Zhu, Dongning Guo:
Ergodic Fading One-sided Interference Channels without State Information at Transmitters. - Georg Böcherer, Valdemar Cardoso da Rocha Jr., Cecilio Pimentel:
On the Capacity of Constrained Systems. - Herbert Van de Sompel, Michael L. Nelson, Robert Sanderson, Lyudmila Balakireva, Scott Ainsworth, Harihar Shankar:
Memento: Time Travel for the Web. - Robert D. Kleinberg, Aleksandrs Slivkins:
Sharp Dichotomies for Regret Minimization in Metric Spaces. - Yaning Liu, Gwendal Simon:
Peer-to-Peer Time-shifted Streaming Systems. - Avishai Wool:
Firewall Configuration Errors Revisited. - (Withdrawn) Continuity of mutual entropy in the large signal-to-noise ratio limit.
- Caroline Cance, Hugues Genevois, Danièle Dubois:
What is instrumentality in new digital msuical devices ? A contribution from cognitive linguistics and psychology. - Peter Beelen, Sudhir R. Ghorpade, Tom Høholdt:
Affine Grassmann Codes. - Ricardo Arencibia Jorge, Loet Leydesdorff, Zaida Chinchilla-Rodríguez, Ronald Rousseau, Soren W. Paris:
Retrieval of very large numbers of items in the Web of Science: an exercise to develop accurate search strategies. - Diana Lucio-Arias, Loet Leydesdorff:
The Dynamics of Exchanges and References among Scientific Texts, and the Autopoiesis of Discursive Knowledge. - Leo Egghe, Loet Leydesdorff:
The relation between Pearson's correlation coefficient r and Salton's cosine measure. - Han Park, Loet Leydesdorff:
Knowledge linkage structures in communication studies using citation analysis among communication journals. - Saugata Basu, Marie-Françoise Roy:
Bounding the radii of balls meeting every connected component of semi-algebraic sets. - Gagan Goel, Pushkar Tripathi, Lei Wang:
Optimal Approximation Algorithms for Multi-agent Combinatorial Problems with Discounted Price Functions. - Sina Jafarpour, Rebecca Willett, Maxim Raginsky, A. Robert Calderbank:
Performance Bounds for Expander-based Compressed Sensing in the presence of Poisson Noise. - Marcin Kubica, Jakub Radoszewski, Wojciech Rytter, Tomasz Walen:
On the maximal number of cubic subwords in a string. - Xiaoyu Chu, Harish Sethu:
A New Distributed Algorithm for Improved Coverage and Increased Lifetime in Sensor Networks. - Marc Harper:
Information Geometry and Evolutionary Game Theory. - Emanuel Diamant:
Machine Learning: When and Where the Horses Went Astray? - Don Coppersmith, Victor S. Miller:
Binary Non-tiles. - Christopher J. Hillar, Lek-Heng Lim:
Most tensor problems are NP hard. - Clemens Grabmayer:
From Abstract Rewriting Systems to Abstract Proof Systems. - Yusuke Watanabe, Michael Chertkov:
Belief Propagation and Loop Calculus for Permanent of a Non-Negative Matrix. - Hossein Bagheri, Abolfazl S. Motahari, Amir K. Khandani:
On the Capacity of the Half-Duplex Diamond Channel. - Loet Leydesdorff, Ping Zhou:
Co-word Analysis using the Chinese Character Set. - Yves-Roger Nehan, Rébecca Deneckère:
Situational Method Engineering: Fundamentals and Experiences. - Elena Kornyshova, Rébecca Deneckère, Camille Salinesi:
Method Chunks Selection by Multicriteria Techniques: an Extension of the Assembly-based Approach. - Elena Kornyshova, Rébecca Deneckère, Camille Salinesi:
Improving Software Development Processes with Multicriteria Methods. - Gitanjali Bhutani:
A Round-based Pricing Scheme for Maximizing Service Provider's Revenue in P2PTV Networks. - Sana Ullah, Yingji Zhong, S. M. Riazul Islam, Ahasanun Nessa, Kyung Sup Kwak:
Throughput Limits of IEEE 802.11 and IEEE 802.15.3. - (Withdrawn) MAC Layer Hurdles in BSNs.
- Ahasanun Nessa, Qinghai Yang, Sana Ullah, Humaun Kabir, Kyung Sup Kwak:
Performance Analysis of Two-Hop Cooperative MIMO transmission with Relay Selection in Rayleigh Fading Channel. - (Withdrawn) On the Development of Low Power MAC Protocol for WBANs.
- Gitanjali Bhutani:
A Near-Optimal Scheme for TCP ACK Pacing to Maintain Throughput in Wireless Networks. - Yingji Zhong, Kyung Sup Kwak, Sana Ullah:
MIMO Cluster Cooperative Assignment Cross Layer Scheme for Hybrid Wireless Sensor Networks. - Yingji Zhong, Sana Ullah, Kyung Sup Kwak:
A Novel Cross Layer Scheme for Multi-Channel Hybrid Cognitive Ad-hoc Networks. - Murad Ali, Sana Ullah, Pervez Khan:
Managing Innovation and Technology in Developing Countries. - Sana Ullah, M. A. Khan, Kyung Sup Kwak:
A discourse based approach in text-based machine translation. - Sana Ullah, Asdaque Hussain, Kyung Sup Kwak:
Resolution of Unidentified Words in Machine Translation. - Ahasanun Nessa, Moshaddique Al Ameen, Sana Ullah, Kyung Sup Kwak:
Applicability of Telemedicine in Bangladesh: Current Status and Future Prospects. - Sana Ullah, Xizhi An, Kyung Sup Kwak:
Towards Power Efficient MAC Protocol for In-Body and On-Body Sensor Networks. - Sana Ullah, Henry Higgins, M. Arif Siddiqui, Kyung Sup Kwak:
A Study of Implanted and Wearable Body Sensor Networks. - T. Tony Cai, Lie Wang, Guangwu Xu:
New Bounds for Restricted Isometry Constants. - Tyrel Russell, Toby Walsh:
Manipulating Tournaments in Cup and Round Robin Competitions.