default search action
CoRR, July 2010
- Patrick Armstrong, Ashok Agarwal, A. Bishop, Andre Charbonneau, Ronald J. Desmarais, K. Fransham, N. Hill, Ian Gable, S. Gaudet, Sharon Goliath, Roger Impey, C. Leavett-Brown, J. Ouellete, Michael Paterson, C. Pritchet, D. Penfold-Brown, Wayne Podaima, David Schade, Randall J. Sobie:
Cloud Scheduler: a resource manager for distributed compute clouds. - Yalin Chen, Jue-Sam Chou, Chun-Hui Huang:
Comments on Five Smart Card Based Password Authentication Protocols. - Yalin Chen, Jue-Sam Chou, Chun-Hui Huang:
Cryptanalysis on Four Two-Party Authentication Protocols. - Anton Beloglazov, Rajkumar Buyya, Young Choon Lee, Albert Y. Zomaya:
A Taxonomy and Survey of Energy-Efficient Data Centers and Cloud Computing Systems. - Nitin Bhatia, Vandana:
Survey of Nearest Neighbor Techniques. - Krishnan Kumar, J. Nafeesa Begum, V. Sumathy:
A Novel Approach towards Cost Effective Region-Based Group Key Agreement Protocol for Secure Group Communication. - Nayantara Bhatnagar, Andrej Bogdanov, Elchanan Mossel:
The Computational Complexity of Estimating Convergence Time. - Peter Harremoës, Igor Vajda:
On Pairs of f-divergences and their Joint Range. - Graham N. C. Kirby, Alan Dearle, Andrew J. McCarthy, Ronald Morrison, Kevin Mullen, Yanyan Yang, Richard Connor, Paula Welen, Andy Wilson:
First Smart Spaces. - Mubashir Husain Rehmani:
Channel Assortment Strategy for Reliable Communication in Multi-Hop Cognitive Radio Networks. - Thomas Ehrhard, Olivier Laurent:
Acyclic Solos and Differential Interaction Nets. - Mubashir Husain Rehmani, Aline Carneiro Viana, Hicham Khalife, Serge Fdida:
Adaptive and occupancy-based channel selection for unreliable cognitive radio networks. - Mubashir Husain Rehmani, Aline Carneiro Viana, Hicham Khalife, Serge Fdida:
A Cognitive Radio Based Internet Access Framework for Disaster Response Network Deployment. - Mubashir Husain Rehmani, Aline Carneiro Viana, Hicham Khalife, Serge Fdida:
Toward Reliable Contention-aware Data Dissemination in Multi-hop Cognitive Radio Ad Hoc Networks. - Martin Gebser, Torsten Schaub, Sven Thiele, Philippe Veber:
Detecting Inconsistencies in Large Biological Networks with Answer Set Programming. - Salvador Lucas:
From matrix interpretations over the rationals to matrix interpretations over the naturals. - Tansu Alpcan, Lacra Pavel, Nem Stefanovic:
An Optimization and Control Theoretic Approach to Noncooperative Game Design. - Adrian Kuhn, David Erni, Marcus Denker:
Empowering Collections with Swarm Behavior. - Neal E. Young:
A Bound on the Sum of Weighted Pairwise Distances of Points Constrained to Balls. - David Eppstein:
Regular Labelings and Geometric Structures. - Onur Sahin, Osvaldo Simeone, Elza Erkip:
Interference Channel with an Out-of-Band Relay. - Ajay Prasad, G. K. Panda, A. Mitra, Arjun Singh, Deepak Gour:
Applying l-Diversity in anonymizing collaborative social network. - Ajay Prasad, Saurabh Singh Verma, Ashok Kumar Sharma:
Certification Authority Monitored Multilevel and Stateful Policy Based Authorization in Services Oriented Grids. - Irfan Syamsuddin, Junseok Hwang:
The Application of AHP Model to Guide Decision Makers: A Case Study of E-banking Security. - Bill Fefferman, Christopher Umans:
Pseudorandom generators and the BQP vs. PH problem. - Duc Phu Chau, François Brémond, Etienne Corvée, Monique Thonnat:
Repairing People Trajectories Based on Point Clustering. - Markus Tauber:
Autonomic Management in a Distributed Storage System. - Benjamin Doerr, Marvin Künnemann, Magnus Wahlström:
Randomized Rounding for Routing and Covering Problems: Experiments and Improvements. - Amanda M. Whitbrook, Uwe Aickelin, Jonathan M. Garibaldi:
The Transfer of Evolved Artificial Immune System Behaviours between Small and Large Scale Robotic Platforms. - Fabian Lim, Aleksandar Kavcic:
Reliability Distributions of Truncated Max-log-map (MLM) Detectors Applied to ISI Channels. - Mithun Das Gupta:
Additive Non-negative Matrix Factorization for Missing Data. - René Ndoundam, Maurice Tchuenté, Claude Tadonki:
Parallel Chip Firing Game associated with n-cube orientations. - Tomoyuki Yamakami:
Approximate Counting for Complex-Weighted Boolean Constraint Satisfaction Problems. - David G. M. Mitchell, Roxana Smarandache, Michael Lentmaier, Daniel J. Costello Jr.:
Quasi-Cyclic Asymptotically Regular LDPC Codes. - Sergio Mascetti, Dario Freni, Claudio Bettini, Xiaoyang Sean Wang, Sushil Jajodia:
Privacy in geo-social networks: proximity notification with untrusted service providers and curious buddies. - Natarajan Meghanathan, Leslie C. Milton:
A Performance Comparison of Stability, Load-Balancing and Power-Aware Routing Protocols for Mobile Ad Hoc Networks. - Pooja Saini:
Impact Of Mobility and Transmission Range On The Performance of Backoff Algorithms For IEEE 802.11-Based Multi-hop Mobile Ad hoc Networks. - Addepalli V. N. Krishna, A. Vinaya Babu:
Role of Statistical tests in Estimation of the Security of a New Encryption Algorithm. - Ujwalla Gawande, Mukesh A. Zaveri, Avichal Kapur:
Improving Iris Recognition Accuracy By Score Based Fusion Method. - Dimple Juneja, Neha Arora:
An Ant Based Framework for Preventing DDoS Attack in Wireless Sensor Networks. - Krishna Chaithanya Lingashetty:
Delta Learning Rule for the Active Sites Model. - Aboulnasr Hassanien, Sergiy A. Vorobyov:
Transmit Energy Focusing for DOA Estimation in MIMO Radar with Colocated Antennas. - Jean-Claude Belfiore, Patrick Solé:
Unimodular Lattices for the Gaussian Wiretap Channel. - Kai Cai, Khaled Ben Letaief, Pingyi Fan, Rongquan Feng:
On the Solvability of 2-pair Unicast Networks --- A Cut-based Characterization. - Tetsuya Ishiu:
Notes on higher-dimensional tarai functions. - Byung-Hak Kim, Arvind Yedla, Henry D. Pfister:
IMP: A Message-Passing Algorithmfor Matrix Completion. - Blaine Nelson, Benjamin I. P. Rubinstein, Ling Huang, Anthony D. Joseph, Steven J. Lee, Satish Rao, J. D. Tygar:
Query Strategies for Evading Convex-Inducing Classifiers. - Yang Chen, Matthew R. McKay:
Perturbed Hankel Determinants: Applications to the Information Theory of MIMO Wireless Communications. - Glenn Langford:
An Improved Neighbourhood for the Traveling Tournament Problem. - Sundeep Rangan:
Femto-Macro Cellular Interference Control with Subband Scheduling and Interference Cancelation. - Steven W. Peters, Robert W. Heath Jr.:
User Partitioning for Less Overhead in MIMO Interference Channels. - Pranav Dandekar, Ashish Goel, Ramesh Govindan, Ian Post:
Liquidity in Credit Networks: A Little Trust Goes a Long Way. - Ahmed Badr, Ashish Khisti, Emin Martinian:
Diversity Embedded Streaming Erasure Codes (DE-SCo): Constructions and Optimality. - Farn Wang:
Simulation-Checking of Real-Time Systems with Fairness Assumptions. - Huy Anh Nguyen, Rong Zheng:
Binary Independent Component Analysis with OR Mixtures. - G. C. Pentzaropoulos:
Limits of responsiveness concerning human-readable knowledge bases: an operational analysis. - (Withdrawn) Computational Model of Music Sight Reading: A Reinforcement Learning Approach.
- Chandan Singh, Nitin Bhatia:
A Fast Decision Technique for Hierarchical Hough Transform for Line Detection. - (Withdrawn) A Reinforcement Learning Model Using Neural Networks for Music Sight Reading Learning Problem.
- Vikram Krishnamurthy:
Quickest Time Detection with Phase-Type Change Distribution and Social Learning. - George Katsirelos, Nina Narodytska, Toby Walsh:
On The Complexity and Completeness of Static Constraints for Breaking Row and Column Symmetry. - Christian Bessiere, George Katsirelos, Nina Narodytska, Claude-Guy Quimper, Toby Walsh:
Decomposition of the NVALUE constraint. - Toby Walsh:
Symmetry within and between solutions. - Toby Walsh:
Online Cake Cutting. - Santanu Halder, Debotosh Bhattacharjee, Mita Nasipuri, Dipak Kumar Basu, Mahantapas Kundu:
Face Synthesis (FASY) System for Determining the Characteristics of a Face Image. - Mausumi Bose, Rahul Mukerjee:
Anti-Collusion Digital Fingerprinting Codes via Partially Cover-Free Families. - Mrinal Kanti Bhowmik, Debotosh Bhattacharjee, Mita Nasipuri, Dipak Kumar Basu, Mahantapas Kundu:
Quotient Based Multiresolution Image Fusion of Thermal and Visual Images Using Daubechies Wavelet Transform for Human Face Recognition. - Mrinal Kanti Bhowmik, Debotosh Bhattacharjee, Mita Nasipuri, Dipak Kumar Basu, Mahantapas Kundu:
Fusion of Daubechies Wavelet Coefficients for Human Face Recognition. - Mrinal Kanti Bhowmik, Debotosh Bhattacharjee, Mita Nasipuri, Dipak Kumar Basu, Mahantapas Kundu:
Fusion of Wavelet Coefficients from Visual and Thermal Face Images for Human Face Recognition - A Comparative Study. - Mrinal Kanti Bhowmik, Debotosh Bhattacharjee, Mita Nasipuri, Dipak Kumar Basu, Mahantapas Kundu:
A Parallel Framework for Multilayer Perceptron for Human Face Recognition. - Mrinal Kanti Bhowmik, Debotosh Bhattacharjee, Mita Nasipuri, Dipak Kumar Basu, Mahantapas Kundu:
Image Pixel Fusion for Human Face Recognition. - Mrinal Kanti Bhowmik, Debotosh Bhattacharjee, Mita Nasipuri, Dipak Kumar Basu, Mahantapas Kundu:
Classification of Fused Images using Radial Basis Function Neural Network for Human Face Recognition. - Debotosh Bhattacharjee, Mrinal Kanti Bhowmik, Mita Nasipuri, Dipak Kumar Basu, Mahantapas Kundu:
Classification of fused face images using multilayer perceptron neural network. - Mrinal Kanti Bhowmik, Debotosh Bhattacharjee, Mita Nasipuri, Mahantapas Kundu, Dipak Kumar Basu:
Classification of Log-Polar-Visual Eigenfaces using Multilayer Perceptron. - Mirco Gelain, Maria Silvia Pini, Francesca Rossi, Kristen Brent Venable, Toby Walsh:
Local search for stable marriage problems with ties and incomplete lists. - Mrinal Kanti Bhowmik, Debotosh Bhattacharjee, Mita Nasipuri, Dipak Kumar Basu, Mahantapas Kundu:
Human Face Recognition using Line Features. - Fei Wei, Huazhong Yang:
Transmission Line Inspires A New Distributed Algorithm to Solve the Nonlinear Dynamical System of Physical Circuit. - Andreas U. Schmidt, Andreas Leicher, Yogendra Shah, Inhyok Cha:
Tree-formed Verification Data for Trusted Platforms. - Amnon Shashua, Gabi Pragier:
The Latent Bernoulli-Gauss Model for Data Analysis. - I-Hong Hou, P. R. Kumar:
Scheduling Periodic Real-Time Tasks with Heterogeneous Reward Requirements. - Avinash Achar, Srivatsan Laxman, P. S. Sastry:
A unified view of Automata-based algorithms for Frequent Episode Discovery. - John Robert Burger:
Artificial Learning in Artificial Memories. - Frederic Thouin, Mark Coates, Michael G. Rabbat:
Large scale probabilistic available bandwidth estimation. - Wojciech Mazurczyk, Milosz Smolarczyk, Krzysztof Szczypiorski:
Retransmission Steganography Applied. - Toby Walsh:
Is Computational Complexity a Barrier to Manipulation? - Zachary Snow, David Baelde, Gopalan Nadathur:
Redundancies in Dependently Typed Lambda Calculi and Their Relevance to Proof Search. - Guillermo Morales-Luna:
A Geometric Presentation of Probabilistic Satisfiability. - Kenta Kasai, Kohichi Sakaniwa:
Fountain Codes with Multiplicatively Repeated Non-Binary LDPC Codes. - Jing Han, Ming Li, Lei Guo:
Soft Control on Collective Behavior of a Group of Autonomous Agents by a Shill Agent. - Rémi Flamary, Benjamin Labbé, Alain Rakotomamonjy:
Filtrage vaste marge pour l'étiquetage séquentiel à noyaux de signaux. - Inês Lynce, Ralf Treinen:
Proceedings First International Workshop on Logics for Component Configuration, LoCoCo 2010, Edinburgh, UK, 10th July 2010. EPTCS 29, 2010 [contents] - Mirco Gelain, Maria Silvia Pini, Francesca Rossi, Kristen Brent Venable, Toby Walsh:
Local search for stable marriage problems. - Florian Dupuy, Philippe Loubaton:
On the Capacity Achieving Covariance Matrix for Frequency Selective MIMO Channels Using the Asymptotic Approach. - Vadim E. Levit, Eugen Mandrescu:
On the independence polynomial of an antiregular graph. - David Elkouss, Jesús Martínez-Mateo, Vicente Martín:
Secure rate-adaptive reconciliation. - Gyula Farkas, Béla Genge, Piroska Haller:
A Platform for Implementing Secure Wireless Ad Hoc Networks. - Jonathan Heusser, Pasquale Malacaria:
Quantifying Information Leak Vulnerabilities. - Béla Genge, Piroska Haller:
End-Host Distribution in Application-Layer Multicast: Main Issues and Solutions. - Arvind Yedla, Henry D. Pfister, Krishna R. Narayanan:
LDPC Code Design for Transmission of Correlated Sources Across Noisy Channels Without CSIT. - Jaroslaw Kwapien, Stanislaw Drozdz, Adam Orczyk:
Linguistic complexity: English vs. Polish, text vs. corpus. - Pedro A. Ortega, Daniel A. Braun:
An axiomatic formalization of bounded rationality based on a utility-information equivalence. - Gautam S. Thakur, Udayan Kumar, Ahmed Helmy, Wei-jen Hsu:
Analysis of Spatio-Temporal Preferences and Encounter Statistics for DTN Performance. - An Liu, Youjian Liu, Haige Xiang, Wu Luo:
MIMO B-MAC Interference Network Optimization under Rate Constraints by Polite Water-filling and Duality. - Oleg S. Pianykh:
Bilateral filters: what they can and cannot do. - Claude Michel, Michel Rueher:
Handling software upgradeability problems with MILP solvers. 1-10 - Josep Argelich, Daniel Le Berre, Inês Lynce, João Marques-Silva, Pascal Rapicault:
Solving Linux Upgradeability Problems Using Boolean Optimization. 11-22 - Paulo Trezentos:
Comparison of PBO solvers in a dependency solving domain. 23-31 - Emmanuel Ohayon, Matthieu Lemerre, Vincent David:
CONFIGEN: A tool for managing configuration options. 32-43 - Andreas Kübler, Christoph Zengler, Wolfgang Küchlin:
Model Counting in Product Configuration. 44-53 - Henryk Fuks:
Inflection system of a language as a complex network. - Ralf Koetter, Michelle Effros, Muriel Médard:
A Theory of Network Equivalence. - Edoardo Carta-Gerardino, Parisa Babaali:
Weighted Automata and Recurrence Equations for Regular Languages. - D. Sasikala, R. Neelaveni:
Registration of Brain Images using Fast Walsh Hadamard Transform. - Michael Ben-Or, Danny Dolev, Ezra N. Hoch:
Simple Gradecast Based Algorithms. - Annabelle McIver, Larissa Meinicke, Carroll Morgan:
Compositional closure for Bayes Risk in probabilistic noninterference. - Leonid Malinin, Natalia Malinina:
On the solution of the Graph Isomorphism Problem Part 1. - Patrik Wahlberg, Peter J. Schreier:
On the instantaneous frequency of Gaussian stochastic processes. - Dmitry V. Chistikov, Andrey A. Voronenko:
Learning Read-Once Functions Using Subcube Identity Queries. - Olesya Mryglod, Yurij Holovatch:
Intelligent data analysis based on the complex network theory methods: a case study. - Michael Okun:
On the Power of Impersonation Attacks. - Vojislav Gajic, Jianwei Huang, Bixio Rimoldi:
Competition of Wireless Providers for Atomic Users. - Chuan Heng Foh, Jianfei Cai, Jalaluddin Qureshi:
Collision Codes: Decoding Superimposed BPSK Modulated Wireless Transmissions. - Christian Hoffmann:
Exponential Time Complexity of Weighted Counting of Independent Sets. - Andreas Björklund, Thore Husfeldt, Petteri Kaski, Mikko Koivisto:
Narrow sieves for parameterized paths and packings. - Konstantin Kutzkov, Dominik Scheder:
Using CSP To Improve Deterministic 3-SAT. - Yanjun Ma, Jiandong Li, Rui Chen, Junliang Yao:
Group Based Interference Alignment. - Andréa W. Richa, Christian Scheideler, Stefan Schmid, Jin Zhang:
A Jamming-Resistant MAC Protocol for Multi-Hop Wireless Networks. - Omar Mehanna, Ahmed K. Sultan:
Inter-Sensing Time Optimization in Cognitive Radio Networks. - Xuebin Wu, Zhiyuan Yan, Ning Chen, Meghanad D. Wagh:
Prime Factor Cyclotomic Fourier Transforms with Reduced Complexity over Finite Fields. - Xuebin Wu, Meghanad D. Wagh, Ning Chen, Zhiyuan Yan, Ying Wang:
Composite Cyclotomic Fourier Transforms with Reduced Complexities. - Steven Bitner, Ovidiu Daescu:
Minimum Sum Dipolar Spanning Tree in R^3. - Vladimir Kolmogorov:
Submodularity on a tree: Unifying $L^\natural$-convex and bisubmodular functions. - Samir Kumar Bandyopadhyay, Indra Kanta Maitra:
An Alternative Approach of Steganography using Reference Image. - Stefano Rini, Daniela Tuninetti, Natasha Devroye:
New Results on the Capacity of the Gaussian Cognitive Interference Channel. - Eric Price:
Efficient Sketches for the Set Query Problem.