default search action
CoRR, April 2010
- Kamran Karimi, Neil G. Dickson, Firas Hamze:
High-Performance Physics Simulations Using Multi-Core CPUs and GPGPUs in a Volunteer Computing Context. - Neil G. Dickson, Kamran Karimi, Firas Hamze:
Importance of Explicit Vectorization for CPU and GPU Software Performance. - Martin Haenggi:
Interference in Lattice Networks. - Sudipto Das, Ömer Egecioglu, Amr El Abbadi:
Anonimos: An LP based Approach for Anonymizing Weighted Social Network Graphs. - Andrés Arcia-Moret, Yubo Yang, Nicolas Montavont, David Ros:
A Study of Bandwidth-Perception Management Mechanisms in IEEE 802.16 Networks. - Dai Tri Man Le:
A Characterization of Combined Traces Using Labeled Stratified Order Structures. - Hirotoshi Yasuoka, Tachio Terauchi:
Quantitative Information Flow - Verification Hardness and Possibilities. - Yao Sun, Dingkang Wang:
A New Proof of the F5 Algorithm. - Akisato Kimura, Derek Pang, Tatsuto Takeuchi, Kouji Miyazato, Junji Yamato, Kunio Kashino:
A stochastic model of human visual attention with a dynamic Bayesian network. - Benjamin Hoffmann, Mikhail Lifshits, Yury Lifshits, Dirk Nowotka:
Maximal Intersection Queries in Randomized Input Models. - Rahul Jain, Hartmut Klauck, Miklos Santha:
Optimal Direct Sum Results for Deterministic and Randomized Decision Tree Complexity. - Joseph Blomer, Nihar Jindal:
Opportunistic Routing in Ad Hoc Networks: How many relays should there be? What rate should nodes use? - Kai Xie, Jing Li:
Precoded Turbo Equalizer for Power Line Communication Systems. - Alexandre Chapoutot:
Interval Slopes as Numerical Abstract Domain for Floating-Point Variables. - Julien Henaut, Aubin Lecointre, Daniela Dragomirescu, Robert Plana:
Radio Interface for High Data Rate Wireless Sensor Networks. - Oliver Johnson, Matthew Aldridge, Robert J. Piechocki:
Delay-rate tradeoff in ergodic interference alignment. - Anders Drachen, Lennart E. Nacke, Georgios N. Yannakakis, Anja Lee Pedersen:
Psychophysiological Correlations with Gameplay Experience Dimensions. - Lennart E. Nacke, Craig A. Lindley:
Affective Ludology, Flow and Immersion in a First- Person Shooter: Measurement of Player Experience. - Lennart E. Nacke:
From Playability to a Hierarchical Game Usability Model. - Sophie Stellmach, Lennart E. Nacke, Raimund Dachselt, Craig A. Lindley:
Trends and Techniques in Visual Gaze Analysis. - Lennart E. Nacke, Sophie Stellmach, Dennis Sasse, Craig A. Lindley:
Gameplay experience in a gaze interaction game. - Vincenzo Pellegrini, Luca Rose, Mario Di Dio:
On Memory Accelerated Signal Processing within Software Defined Radios. - Amine Laourine, Aaron B. Wagner:
The Degraded Poisson Wiretap Channel. - Salah-Eddine Elayoubi, Eitan Altman, Majed Haddad, Zwi Altman:
A hybrid decision approach for the association problem in heterogeneous networks. - Edith Elkind, Piotr Faliszewski:
Approximation Algorithms for Campaign Management. - Roghayeh Joda, Farshad Lahouti:
Network Code Design for Orthogonal Two-hop Network with Broadcasting Relay: A Joint Source Channel Network Coding Approach. - Srinivasagopalan Srivathsan, Costas Busch, S. Sitharama Iyengar:
An Oblivious Spanning Tree for Buy-at-Bulk Network Design Problems. - Tuvi Etzion, Alexander Vardy, Eitan Yaakobi:
Dense Error-Correcting Codes in the Lee Metric. - Sarif Sk. Hassan, Pabitra Pal Choudhury, Sugata Sanyal:
A Spatial Crypto Technique for Secure Data Transmission. - (Withdrawn) Facial Expression Representation Using Heteroscedastic Linear Discriminant Analysis and Gabor Wavelets.
- Soummya Kar, José M. F. Moura:
Gossip and Distributed Kalman Filtering: Weak Consensus under Weak Detectability. - Ali Tajer, Xiaodong Wang:
Multiuser Diversity Gain in Cognitive Networks. - Joseph M. Burdis, Irina A. Kogan:
Object-image correspondence for curves under finite and affine cameras. - Daniel S. Menasché, Antônio Augusto de Aragão Rocha, Edmundo de Souza e Silva, Rosa Maria Meri Leão, Donald F. Towsley, Arun Venkataramani:
Estimating Self-Sustainability in Peer-to-Peer Swarming Systems. - Marco Dalai:
A new bound for the capacity of the deletion channel with high deletion probabilities. - M. Amin Khajehnejad, Weiyu Xu, Amir Salman Avestimehr, Babak Hassibi:
Improved Sparse Recovery Thresholds with Two-Step Reweighted ℓ1 Minimization. - Alessandro Colantonio, Roberto Di Pietro:
CONCISE: Compressed 'n' Composable Integer Set. - Jasmine Norman, J. Paulraj Joseph, P. Prapoorna Roja:
A Faster Routing Scheme for Stationary Wireless Sensor Networks - A Hybrid Approach. - M. Anwar Hossain, Mohammed Tarique, Rumana Islam:
Shadowing Effects on Routing Protocol of Multihop Ad Hoc Networks. - Raphaël Clifford, Zvi Gotthilf, Moshe Lewenstein, Alexandru Popa:
Permuted Common Supersequence. - Zhiqiang Zhang, Yaoyun Shi:
On the parity complexity measures of Boolean functions. - Sergey Andreyev:
User-driven applications. - Sandipan Dey, Hameed Al-Qaheri, Sugata Sanyal:
Embedding Secret Data in HTML Web Page. - Mahmoud Khademi, Mohammad Hadi Kiapour, Mohammad Taghi Manzuri Shalmani, Ali Akbar Kiaei:
Analysis, Interpretation, and Recognition of Facial Action Units and Expressions Using Neuro-Fuzzy Modeling. - Sisir Koppaka, Ashish Ranjan Hota:
Superior Exploration-Exploitation Balance with Quantum-Inspired Hadamard Walks. - Mahmoud Khademi, Mohammad Taghi Manzuri Shalmani, Mohammad Hadi Kiapour, Ali Akbar Kiaei:
Recognizing Combinations of Facial Action Units with Different Intensity Using a Mixture of Hidden Markov Models and Neural Network. - Mahmoud Khademi, Mehran Safayani, Mohammad Taghi Manzuri Shalmani:
Multilinear Biased Discriminant Analysis: A Novel Method for Facial Action Unit Representation. - Robert Crowston, Gregory Z. Gutin, Mark Jones, Anders Yeo:
Linear-Number-of-Variables Kernel for Unit-Conflict-Free-Max-Sat Parameterized Above Expectation. - Shaunak Joshi, Przemyslaw Pawelczak, John D. Villasenor, Danijela Cabric, Sateesh Addepalli:
Impact of Connection Admission Process on Load Balancing in Cellular Networks. - Marco Levorato, Urbashi Mitra, Michele Zorzi:
Cognitive Interference Management in Retransmission-Based Wireless Networks. - Satish Babu Korada, Andrea Montanari:
Applications of Lindeberg Principle in Communications and Statistical Learning. - John Augustine, Sandip Das, Anil Maheshwari, Subhas C. Nandy, Sasanka Roy, Swami Sarvattomananda:
Recognizing the Largest Empty Circle and Axis-Parallel Rectangle in a Desired Location. - Rung Ching Chen, Kai-Fan Cheng, Chia-Fen Hsieh:
Using Rough Set and Support Vector Machine for Network Intrusion Detection. - Natarajan Meghanathan, Sumanth Reddy Allam, Loretta A. Moore:
Tools and techniques for Network Forensics. - G. N. Krishnamurthy, V. Ramaswamy:
Encryption Quality Analysis and Security Evaluation of CAST-128 Algorithm and its Modified Version using Digital Images. - Poonam Garg:
A Comparison between Memetic algorithm and Genetic algorithm for the cryptanalysis of Simplified Data Encryption Standard algorithm. - Debdutta Barman Roy, Rituparna Chaki, Nabendu Chaki:
A New Cluster-based Wormhole Intrusion detection algorithm for Mobile Ad-Hoc Networks. - Natasa Zivic:
Iterative method for improvement of coding and decryption. - Eric Ke Wang, Lucas Chi Kwong Hui, Siu-Ming Yiu:
A new key establishment scheme for wireless sensor networks. - Mohammed Misbahuddin, Sachin Narayanan, Bishwa Ranjan Ghosh:
Dynamic IDP Signature processing by fast elimination using DFA. - G. M. Tamilselvan, A. Shanmugam:
Effect of Inter Packet Delay in performance analysis of coexistence heterogeneous Wireless Packet Networks. - Mohammed A. Abuhelaleh, Khaled M. Elleithy, Thabet M. Mismar:
Clustered Hierarchy in Sensor Networks: Performance and Security. - Yoshito Kanamori, Seong-Moo Yoo:
Quantum Three-Pass protocol: Key distribution using quantum superposition states. - Natarajan Jaisankar, R. Saravanan, K. Durai Swamy:
Intelligent Detection System framework using Mobile agents. - Sugam Sharma, Hari Cohly, Tzusheng Pei:
On Generation of Firewall Log Status Reporter (SRr) Using Perl. - Alan Mink, Sheila Frankel, Ray A. Perlner:
Quantum Key Distribution (QKD) and Commodity Security Protocols: Introduction and Integration. - Dietrich Kuske, Jiamou Liu, Markus Lohrey:
The Isomorphism Problem for omega-Automatic Trees. - Oliver Kullmann:
Exact Ramsey Theory: Green-Tao numbers and SAT. - Kohtaro Tadaki:
A new representation of Chaitin Ωnumber based on compressible strings. - Anthony Kim, Muriel Médard:
Scalar-linear Solvability of Matroidal Networks Associated with Representable Matroids. - Ilango Sriram, Dave Cliff:
Effects of component-subscription network topology on large-scale data centre performance scaling. - Krishnendu Chatterjee, Thomas A. Henzinger, Barbara Jobstmann, Rohit Singh:
Measuring and Synthesizing Systems in Probabilistic Environments. - Valentin E. Brimkov:
Patrolling a Street Network is Strongly NP-Complete but in P for Tree Structures. - Mehran Safayani, Mohammad Taghi Manzuri Shalmani, Mahmoud Khademi:
Extended Two-Dimensional PCA for Efficient Face Representation and Recognition. - Mohamed Abid, Songbo Song, Hassnaa Moustafa, Hossam Afifi:
Integrating identity-based cryptography in IMS service authentication. - E. Sathiyamoorthy, N. Ch. Sriman Narayana Iyengar, V. Ramachandran:
Agent Based Trust Management Model Based on Weight Value Model for Online Auctions. - Ayatullah Faruk Mollah, Subhadip Basu, Mita Nasipuri, Dipak Kumar Basu:
Text/Graphics Separation for Business Card Images for Mobile Devices. - Mohammed Aijaz Ahmed, D. Rajya Lakshmi, Sayed Abdul Sattar:
Cryptanalysis of a more efficient and secure dynamic id-based remote user authentication scheme. - Yasir Arfat Malkani, Lachhman Das Dhomeja:
PSIM: A tool for analysis of device pairing methods. - M. Prabu Kumar, K. Praneesh Kumar Yadav:
Data security in mobile devices by geo locking. - Moheb R. Girgis, Tarek M. Mahmoud, Youssef S. Takroni, Hassan S. Hassan:
Performance evaluation of a new route optimization technique for mobile IP. - Jean-François Lalande, David Rodriguez, Christian Toinard:
Security properties in an open peer-to-peer network. - Johnneth de Sene Fonseca, Zair Abdelouahab, Denivaldo Lopes, Sofiane Labidi:
A security framework for SOA applications in mobile environment. - (Withdrawn) Securing AODV for MANETs using Message Digest with Secret Key.
- Soroush Akhlaghi, Abbas Kiani, Mohammad Reza Ghanavati:
Cost-Bandwidth Tradeoff In Distributed Storage Systems. - Somayeh Salimi, Mahmoud Salmasizadeh, Mohammad Reza Aref:
Generalized Secure Distributed Source Coding with Side Information. - Somayeh Salimi, Mahmoud Salmasizadeh, Mohammad Reza Aref:
Rate Regions of Secret Key Sharing in a New Source Model. - Jin-yi Cai, Sangxia Huang, Pinyan Lu:
From Holant To #CSP And Back: Dichotomy For Holant$^c$ Problems. - Daniel Gayo-Avello:
Nepotistic Relationships in Twitter and their Impact on Rank Prestige Algorithms. - Dmitry Gavinsky, Alexander A. Sherstov:
A Separation of NP and coNP in Multiparty Communication Complexity. - Laurent Bienvenu, Frank Stephan, Jason Teutsch:
How powerful are integer-valued martingales? - Dominic Dumrauf, Tim Süß:
On the Complexity of Local Search for Weighted Standard Set Problems. - Deli Qiao, Mustafa Cenk Gursoy, Senem Velipasalar:
Secure Communication over Fading Channels with Statistical QoS Constraints. - Deli Qiao, Mustafa Cenk Gursoy, Senem Velipasalar:
Secure Broadcasting over Fading Channels with Statistical QoS Constraints. - Qing Chen, Mustafa Cenk Gursoy:
Energy Efficiency Analysis in Amplify-and-Forward and Decode-and-Forward Cooperative Networks. - Junwei Zhang, Mustafa Cenk Gursoy:
Relay Beamforming Strategies for Physical-Layer Security. - Kimmo Fredriksson:
On building minimal automaton for subset matching queries. - Sami Akin, Mustafa Cenk Gursoy:
QoS Analysis of Cognitive Radio Channels with Perfect CSI at both Receiver and Transmitter. - Junwei Zhang, Mustafa Cenk Gursoy:
Collaborative Relay Beamforming for Secure Broadcasting. - Stevens Le Blond, Arnaud Legout, Fabrice Le Fessant, Walid Dabbous, Mohamed Ali Kâafar:
Spying the World from your Laptop -- Identifying and Profiling Content Providers and Big Downloaders in BitTorrent. - Kaushik Kumar Majumdar:
Indian policeman's dilemma: A game theoretic model. - Roberto Bagnara, Fred Mesnard, Andrea Pescetti, Enea Zaffanella:
The Automatic Synthesis of Linear Ranking Functions: The Complete Unabridged Version. - Marc Thurley:
The Complexity of Partition Functions on Hermitian Matrices. - David Doty, Matthew J. Patitz, Dustin Reishus, Robert T. Schweller, Scott M. Summers:
Strong Fault-Tolerance for Self-Assembly with Fuzzy Temperature. - Marko A. Rodriguez, Peter Neubauer:
The Graph Traversal Pattern. - Byung-Hak Kim, Arvind Yedla, Henry D. Pfister:
Message-Passing Inference on a Factor Graph for Collaborative Filtering. - Pablo Arrighi, Gilles Dowek:
On the completeness of quantum computation models. - Peter M. van de Ven, J. S. H. van Leeuwaarden, Dee Denteneer, A. J. E. M. Janssen:
Spatial fairness in linear wireless multi-access networks. - Yifan Chen, Chau Yuen:
Double-Directional Information Azimuth Spectrum and Relay Network Tomography for a Decentralized Wireless Relay Network. - Peter M. van de Ven, A. J. E. M. Janssen, J. S. H. van Leeuwaarden:
Optimal Tradeoff Between Exposed and Hidden Nodes in Large Wireless Networks. - Yuexian Hou, Tingxu Yan, Peng Zhang, Dawei Song, Wenjie Li:
On Tsallis Entropy Bias and Generalized Maximum Entropy Models. - Marcello M. Bersani, Achille Frigeri, Angelo Morzenti, Matteo Pradella, Matteo Rossi, Pierluigi San Pietro:
Bounded Reachability for Temporal Logic over Constraint Systems. - Emily J. King:
Grassmannian Fusion Frames. - Aditya Mahajan:
Optimal sequential transmission over broadcast channel with nested feedback. - Kenza Guenda:
New MDS Self-Dual Codes over Large Finite Fields. - Li Zhang, Shu Lin, Khaled A. S. Abdel-Ghaffar, Zhi Ding, Bo Zhou:
Circulant Arrays on Cyclic Subgroups of Finite Fields: Rank Analysis and Construction of Quasi-Cyclic LDPC Codes. - Danny Hermelin, Gad M. Landau, Shir Landau, Oren Weimann:
Unified Compression-Based Acceleration of Edit-Distance Computation. - Sami Akin, Mustafa Cenk Gursoy:
Ergodic Capacity Analysis in Cognitive Radio Systems under Channel Uncertainty. - Dung Viet Nguyen, Bane Vasic, Michael W. Marcellin, Shashi Kiran Chilappagari:
Structured LDPC Codes from Permutation Matrices Free of Small Trapping Sets. - Pushkar Tripathi:
A Deterministic Algorithm for the Vertex Connectivity Survivable Network Design Problem. - Avik Chaudhuri:
Liberalizing Dependency. - Elad Shaked, Oleg V. Michailovich:
Regularized Richardson-Lucy Algorithm for Sparse Reconstruction of Poissonian Images. - Zhi Xu:
Multi-Shift de Bruijn Sequence. - Dorit Ron, Ilya Safro, Achi Brandt:
Relaxation-based coarsening and multiscale graph organization. - Somayeh Fatahi, Nasser Ghasem-Aghaee:
Design and Implementation of an Intelligent Educational Model Based on Personality and Learner's Emotion. - Ismail A. Ismail, Mohammed A. Ramadan, Talaat S. El-Danaf, Ahmed H. Samak:
Signature Recognition using Multi Scale Fourier Descriptor And Wavelet Transform. - P. Anandhakumar, V. Balamurugan:
Feature-Based Adaptive Tolerance Tree (FATT): An Efficient Indexing Technique for Content-Based Image Retrieval Using Wavelet Transform. - Phanu Waraporn, Phayung Meesad, Gareth Clayton:
Ontology-supported processing of clinical text using medical knowledge integration for multi-label classification of diagnosis coding. - Hossein Rouhani Zeidanloo, Azizah Bt Abdul Manaf:
Botnet Detection by Monitoring Similar Communication Patterns. - (Withdrawn) Lightweight Distance bound Protocol for Low Cost RFID Tags.
- M. S. Saleem Basha, Dhavachelvan Ponnurangam:
Analysis of Empirical Software Effort Estimation Models. - Karl Schnaitter, Neoklis Polyzotis:
Semi-Automatic Index Tuning: Keeping DBAs in the Loop. - Ravindran Kannan:
Spectral Methods for Matrices and Tensors. - V. Chitraa, Antony Selvdoss Davamani:
A Survey on Preprocessing Methods for Web Usage Data. - Jacques Julliand, Nicolas Stouls, Pierre-Christophe Bué, Pierre-Alain Masson:
Syntactic Abstraction of B Models to Generate Tests. - Stevens Le Blond, Pere Manils, Chaabane Abdelberi, Mohamed Ali Kâafar, Arnaud Legout, Claude Castelluccia, Walid Dabbous:
De-anonymizing BitTorrent Users on Tor.