default search action
CoRR, March 2010
- Joshua V. Dillon, Krishnakumar Balasubramanian, Guy Lebanon:
Asymptotic Analysis of Generative Semi-Supervised Learning. - Yiling Chen, Jennifer Wortman Vaughan:
A New Understanding of Prediction Markets Via No-Regret Learning. - Rahul Srivastava, Can Emre Koksal:
Energy Optimal Transmission Scheduling in Wireless Sensor Networks. - Shuiyin Liu, Cong Ling, Damien Stehlé:
Randomized Lattice Decoding. - Marius Kloft, Ulf Brefeld, Sören Sonnenburg, Alexander Zien:
Non-Sparse Regularization and Efficient Training with Multiple Kernels. - Fu-Te Hsu, Hsuan-Jung Su:
Random Access Game in Fading Channels with Capture: Equilibria and Braess-like Paradoxes. - Chih-Ning Hsu, Hsuan-Jung Su, Pin-Hsun Lin:
Joint Subcarrier Pairing and Power Allocation for OFDM Transmission with Decode-and-Forward Relaying. - Yu-Han Yang, Shih-Chun Lin, Hsuan-Jung Su:
Multiuser MIMO Downlink Beamforming with Average SINR Constraints. - Martin Churchill, James Laird, Guy McCusker:
A Concrete Representation of Observational Equivalence for PCF. - Tomás Brázdil, Václav Brozek, Antonín Kucera, Jan Obdrzálek:
Qualitative Reachability in Stochastic BPA Games. - Alexander L. Strehl, John Langford, Sham M. Kakade:
Learning from Logged Implicit Exploration Data. - Prosenjit Bose, Karim Douïeb, Vida Dujmovic, Rolf Fagerberg:
An O(loglog n)-Competitive Binary Search Tree with Optimal Worst-Case Access Times. - Lihong Li, Wei Chu, John Langford, Robert E. Schapire:
A Contextual-Bandit Approach to Personalized News Article Recommendation. - Yun Kuen Cheung, Philippe Flajolet, Mordecai J. Golin, C. Y. James Lee:
Multidimensional Divide-and-Conquer and Weighted Digital Sums. - (Withdrawn) When LP is the Cure for Your Matching Woes: Approximating Stochastic Matchings.
- Andrei M. Sukhov, Natalia Yu. Kuznetsova, A. K. Pervitsky, Aleksey A. Galtsev:
Generating Function For Network Delay. - Aarti Singh, Robert D. Nowak, A. Robert Calderbank:
Detecting Weak but Hierarchically-Structured Patterns in Networks. - Steven Wegmann, Larry Gillick:
Why has (reasonably accurate) Automatic Speech Recognition been so hard to achieve? - Dmitry M. Malioutov, Sujay Sanghavi, Alan S. Willsky:
Sequential Compressed Sensing. - Richard A. Formato:
Central Force Optimization Applied to the PBM Suite of Antenna Benchmarks. - Chung-Pi Lee, Hsuan-Jung Su:
Peak to Average Power Ratio Reduction for Space-Time Codes That Achieve Diversity-Multiplexing Gain Tradeoff. - Riccardo Giacomelli, Radha Krishna Ganti, Martin Haenggi:
Outage Probability of General Ad Hoc Networks in the High-Reliability Regime. - Feng Gu, Julie Greensmith, Uwe Aickelin:
Further Exploration of the Dendritic Cell Algorithm: Antigen Multiplier and Time Windows. - (Withdrawn) On the Optimal Number of Cooperative Base Stations in Network MIMO Systems.
- Andrey Kutuzov:
Change of word types to word tokens ratio in the course of translation (based on Russian translations of K. Vonnegut novels). - Jamie Twycross, Uwe Aickelin:
libtissue - implementing innate immunity. - Dan Claudiu Ciresan, Ueli Meier, Luca Maria Gambardella, Jürgen Schmidhuber:
Deep Big Simple Neural Nets Excel on Handwritten Digit Recognition. - Yong Jiang, Shu-Tao Xia, Fang-Wei Fu:
Stopping Set Distributions of Some Linear Codes. - Gopinadh Sirigineedi, Antonios Tsourdos, Brian A. White, Rafal Zbikowski:
Modelling and Verification of Multiple UAV Mission Using SMV. 22-33 - Emil Vassev, Mike Hinchey:
Developing Experimental Models for NASA Missions with ASSL. 88 - Pablo Sprechmann, Ignacio Ramírez, Guillermo Sapiro, Yonina C. Eldar:
Collaborative Hierarchical Sparse Modeling. - Feng Gu, Julie Greensmith, Uwe Aickelin:
Exploration Of The Dendritic Cell Algorithm Using The Duration Calculus. - Joel A. Tropp:
The Sparsity Gap: Uncertainty Principles Proportional to Dimension. - Giorgi Japaridze:
A logical basis for constructive systems. - Piotr Kordy, Rom Langerak, Jan Willem Polderman:
Re-verification of a Lip Synchronization Protocol using Robust Reachability. 49-62 - Kamyar Moshksar, Amir K. Khandani:
On The Design of Signature Codes in Decentralized Wireless Networks. - Anne Driemel, Sariel Har-Peled, Carola Wenk:
Approximating the Fréchet Distance for Realistic Curves in Near Linear Time. - Thorsten Strufe:
Profile Popularity in a Business-oriented Online Social Network. - Jon M. Kleinberg, Katrina Ligett:
Information-Sharing and Privacy in Social Networks. - Pinar Donmez, Krishnakumar Balasubramanian, Guy Lebanon:
Unsupervised Supervised Learning II: Training Margin Based Classifiers without Labels. - Nicolas Brener:
A definable number which cannot be approximated algorithmically. - Chunhua Shen, Junae Kim, Lei Wang:
Scalable Large-Margin Mahalanobis Distance Metric Learning. - Sameer Pawar, Salim Y. El Rouayheb, Kannan Ramchandran:
On Secure Distributed Data Storage Under Repair Dynamics. - Anastasios Zouzias:
Low Dimensional Euclidean Volume Preserving Embeddings. - Pulkit Grover, Se Yong Park, Anant Sahai:
The finite-dimensional Witsenhausen counterexample. - Marcus Hutter, Minh-Ngoc Tran:
Model Selection with the Loss Rank Principle. - Pulkit Grover, Aaron B. Wagner, Anant Sahai:
Information embedding meets distributed control. - Victor Yodaiken:
State machine models of timing and circuit design. - Arvind Agarwal, Jeff M. Phillips, Suresh Venkatasubramanian:
A Unified Algorithmic Framework for Multi-Dimensional Scaling. - Loïc Besnard, Thierry Gautier, Julien Ouy, Jean-Pierre Talpin, Jean-Paul Bodeveix, Alexandre Cortier, Marc Pantel, Martin Strecker, Gérald Garcia, Ana-Elena Rugina, Jérémy Buisson, Fabien Dagnat:
Polychronous Interpretation of Synoptic, a Domain Specific Modeling Language for Embedded Flight-Software. 80-87 - Anahí Gajardo, Pierre Guillon:
Zigzags in Turing machines. - Sami Al-Maqtari, Habib Abdulrab, Eduard Babkin:
A new model for solution of complex distributed constrained problems. - Louise A. Dennis, Michael Fisher, Nicholas Lincoln, Alexei Lisitsa, Sandor M. Veres:
Agent Based Approaches to Engineering Autonomous Space Software. 63-67 - Yi Mao, Krishnakumar Balasubramanian, Guy Lebanon:
Linguistic Geometries for Unsupervised Dimensionality Reduction. - Mircea Lazar:
Flexible Lyapunov Functions and Applications to Fast Mechatronic Systems. 76-79 - Ayatullah Faruk Mollah, Subhadip Basu, Nibaran Das, Ram Sarkar, Mita Nasipuri, Mahantapas Kundu:
Text Region Extraction from Business Card Images for Mobile Devices. - Ayatullah Faruk Mollah, Subhadip Basu, Nibaran Das, Ram Sarkar, Mita Nasipuri, Mahantapas Kundu:
Binarizing Business Card Images for Mobile Devices. - Evan Ettinger, Yoav Freund:
Particle Filtering on the Audio Localization Manifold. - Mustapha Arfi, Bedine Ould M. Lemine, Carla Selmi:
Strategical languages of infinite words. - Joshua V. Dillon, Guy Lebanon:
Statistical and Computational Tradeoffs in Stochastic Composite Likelihood. - Arvind Agarwal, Hal Daumé III:
Exponential Family Hybrid Semi-Supervised Learning. - Anupam Gupta, Ravishankar Krishnaswamy, Viswanath Nagarajan, R. Ravi:
Approximation Algorithms for Optimal Decision Trees and Adaptive TSP Problems. - Chengfang Fang, Ee-Chien Chang:
Securing Kiosk using Mobile Devices coupled with Visual Inspection. - Ghadamali Bagherikaram, Abolfazl S. Motahari, Amir K. Khandani:
On the Secure Degrees-of-Freedom of the Multiple-Access-Channel. - Lili Zhang, Jinhua Jiang, Shuguang Cui:
Compress-and-Forward Performance in Low-SNR Relay Channels. - Raphaël Chenouard, Frédéric Jouault:
Automatically Discovering Hidden Transformation Chaining Constraints. - Aleksandar Kupusinac, Dusan Malbaski:
S-Program Calculus. - Roumen Anguelov, Inger Fabris-Rotelli:
Properties of the Discrete Pulse Transform for Multi-Dimensional Arrays. - Chenyi Zhang, Jun Pang:
On Probabilistic Alternating Simulations. - Julie Greensmith, Uwe Aickelin, Gianni Tedesco:
Information Fusion for Anomaly Detection with the Dendritic Cell Algorithm. - Florent R. Madelaine, Barnaby Martin:
The complexity of positive first-order logic without equality. - Yuzhe Jin, Young-Han Kim, Bhaskar D. Rao:
Support Recovery of Sparse Signals. - Ciamac Cyrus Moallemi, Devavrat Shah:
On the Flow-level Dynamics of a Packet-switched Network. - Wei Zhou, Jianfeng Zhan, Dan Meng, Dongyan Xu, Zhihong Zhang:
LogMaster: Mining Event Correlations in Logs of Large scale Cluster Systems. - Vicente H. F. Batista, George O. Ainsworth Jr., Fernando L. B. Ribeiro:
Parallel structurally-symmetric sparse matrix-vector products on multi-core processors. - Chi Wan Sung, Kenneth W. Shum, Wing Ho A. Yuen:
Information Flow in One-Dimensional Vehicular Ad Hoc Networks. - Zhihong Zhang, Jianfeng Zhan, Yong Li, Lei Wang, Dan Meng, Bo Sang:
Precise Request Tracing and Performance Debugging for Multi-tier Services of Black Boxes. - Jianfeng Zhan, Lei Wang, Weisong Shi, Shimin Gong, Xiutao Zang:
PhoenixCloud: Provisioning Resources for Heterogeneous Cloud Workloads. - Bo Sang, Jianfeng Zhan, Guanhua Tian:
Decreasing log data of multi-tier services for effective request tracing. - Blaise Genest, Anca Muscholl, Zhilin Wu:
Verifying Recursive Active Documents with Positive Data Tree Rewriting. - Richard A. Formato:
Parameter-Free Deterministic Global Search with Central Force Optimization. - Kathrin Knautz, Simone Soubusta, Wolfgang G. Stock:
Tag Clusters as Information Retrieval Interfaces. - Jörg Endrullis:
Levels of Undecidability in Infinitary Rewriting: Normalization and Reachability. - Carole Delporte-Gallet, Stéphane Devismes, Hugues Fauconnier, Mikel Larrea:
Algorithms For Extracting Timeliness Graphs. - Satadal Saha, Subhadip Basu, Mita Nasipuri, Dipak Kumar Basu:
An Offline Technique for Localization of License Plates for Indian Commercial Vehicles. - Peter D. Turney, Patrick Pantel:
From Frequency to Meaning: Vector Space Models of Semantics. - Lunjin Lu, Dae-Kyoo Kim:
Semantics-based Refinement of Mandatory Behavior of Sequence Diagrams. - Deepak Ponvel Chermakani:
Repeating Patterns in Linear Programs that express NP-Complete Problems. - Lei Wang, Jianfeng Zhan, Weisong Shi, Yi Liang, Lin Yuan:
In Cloud, Do MTC or HTC Service Providers Benefit from the Economies of Scale? - Diego Calvanese, Giuseppe De Giacomo, Maurizio Lenzerini, Moshe Y. Vardi:
View Synthesis from Schema Mappings. - Panduranga H. T, Naveen Kumar S. K:
Hybrid approach for Image Encryption Using SCAN Patterns and Carrier Images. - Viswanath Gunturi, Shashi Shekhar, Arnab Bhattacharya:
Minimum Spanning Tree on Spatio-Temporal Networks. - Gianni Tedesco, Jamie Twycross, Uwe Aickelin:
Integrating Innate and Adaptive Immunity for Intrusion Detection. - Erik Agrell, Magnus Karlsson:
On the symbol error probability of regular polytopes. - Dániel Marx, Ildikó Schlotter:
Cleaning Interval Graphs. - Ulrike von Luxburg, Agnes Radl, Matthias Hein:
Hitting times, commute distances and the spectral gap for large random geometric graphs. - Alejandro Lorca, Eduardo Huedo, Ignacio Martín Llorente:
The Grid[Way] Job Template Manager, a tool for parameter sweeping. - Jaroslaw Byrka, Aravind Srinivasan, Chaitanya Swamy:
Fault-Tolerant Facility Location: a randomized dependent LP-rounding algorithm. - Shariefuddin Pirzada, Guofei Zhou:
On k-hypertournament losing scores. - Glencora Borradaile, Piotr Sankowski, Christian Wulff-Nilsen:
Min st-Cut Oracle for Planar Graphs with Near-Linear Preprocessing Time. - Peter Fornai, Antal Iványi:
FIFO anomaly is unbounded. - David H. Wolpert, Gregory Benford:
What does Newcomb's paradox teach us? - Simeon Warner:
Author Identifiers in Scholarly Repositories. - Xinhua Zhang, Ankan Saha, S. V. N. Vishwanathan:
Faster Rates for training Max-Margin Markov Networks. - Javad Ghaderi, R. Srikant:
On the Design of Efficient CSMA Algorithms for Wireless Networks. - Antal Bege, Zoltán Kása:
Coding objects related to Catalan numbers. - Gyöngyvér Márton:
Public-key cryptography in functional programming context. - Peter Burcsi, Attila Kovács, Antal Tátrai:
Start-phase control of distributed systems written in Erlang/OTP. - Stefan Korecko, Branislav Sobota:
Using Coloured Petri Nets for design of parallel raytracing environment. - Peter Václavík, Jaroslav Porubän, Marek Mezei:
Automatic derivation of domain terms and concept location based on the analysis of the identifiers. - Branislav Sobota, Milan Guzan:
Macro and micro view on steady states in state space. - Seungyeon Kim, Guy Lebanon:
Local Space-Time Smoothing for Versioned Documents. - Onur Ozan Koyluoglu, Hesham El Gamal:
Polar Coding for Secure Transmission and Key Agreement. - Glencora Borradaile, James R. Lee, Anastasios Sidiropoulos:
Randomly removing g handles at once. - V. S. Meenakshi, G. Padmavathi:
Securing Iris Templates using Combined User and Soft Biometric based Password Hardened Fuzzy Vault. - Heidar Mamosian, Amir Masoud Rahmani, Mashalla Abbasi Dezfouli:
A New Clustering Approach based on Page's Path Similarity for Navigation Patterns Mining. - N. Rama, Meenakshi Lakshmanan:
A Computational Algorithm based on Empirical Analysis, that Composes Sanskrit Poetry. - Devpriya Soni, Namita Shrivastava, M. Kumar:
A Methodology for Empirical Quality Assessment of Object-Oriented Design. - Reza Gharoie Ahangar, Mahmood Yahyazadehfar, Hassan Pournaghshband:
The Comparison of Methods Artificial Neural Network with Linear Regression Using Specific Variables for Prediction Stock Price in Tehran Stock Exchange. - A. Jagadeesan, K. Duraiswamy:
Secured Cryptographic Key Generation From Multimodal Biometrics: Feature Level Fusion of Fingerprint and Iris. - M. Barathi, S. Valli:
Ontology Based Query Expansion Using Word Sense Disambiguation. - Dharmendra Choukse, Umesh Kumar Singh, Deepak Sukheja, Rekha Shahapurkar:
Implementing New-age Authentication Techniques using OpenID for Security Automation. - Khan Farhan Rafat, Muhammad Sher:
State Of The Art In Digital Steganography Focusing ASCII Text Documents. - Shahram Babaie, Ahmad Khadem Zadeh, Ali Hosseinalipour:
New clustering method to decrease probability of failure nodes and increasing the lifetime in WSNs. - T. D. Roopamala, S. K. Katti:
Comments on "Routh Stability Criterion". - Bala Dhandayuthapani Veerasamy:
Concurrent Approach to Flynn's SPMD Classification through Java. - Akshay K. Ojha, K. K. Biswal:
Multi-objective Geometric Programming Problem With Weighted Mean Method. - Nitul Dutta, Iti Saha Misra:
Use of Service Curve for Resource Reservation in Wired-cum-Wireless Scenario. - C. Ravichandiran, Pethuru Raj Chelliah, V. Vaidhyanathan:
Analysis, Modification, and Implementation (AMI) of Scheduling Algorithm for the IEEE 802.116e (Mobile WiMAX). - Manish Kumar, M. C. Srivastava, Umesh Kumar:
Current Conveyor Based Multifunction Filter. - Harshvardhan Tiwari, Krishna Asawa:
A Secure Hash Function MD-192 With Modified Message Expansion. - Mariana Maceiras Cabrera, Ernesto Ocampo Edye:
Integration of Rule Based Expert Systems and Case Based Reasoning in an Acute Bacterial Meningitis Clinical Decision Support System. - Abderrahim El Qadi, Driss Aboutajdine, Yassine Ennouary:
Formal Concept Analysis for Information Retrieval. - Bala Dhandayuthapani Veerasamy:
Creating A Model HTTP Server Program Using java. - Mofreh A. Hogo:
Evaluation of E-Learners Behaviour using Different Fuzzy Clustering Models: A Comparative Study. - M. V. Vijaya Saradhi, B. R. Sastry, P. Satish:
Hierarchical Approach for Online Mining--Emphasis towards Software Metrics.