default search action
CoRR, January 2012
- Plamen P. Fiziev, Denitsa R. Staicova:
Solving systems of transcendental equations involving the Heun functions. - Jeremy G. Siek, Michael M. Vitousek, Jonathan D. Turner:
Effects for Funargs. - Erik Silkensen, Jeremy G. Siek:
Well-typed Islands Parse Faster. - Jeremy G. Siek:
The C++0x "Concepts" Effort. - Vladimir S. Lerner:
The information path functional approach for a dynamic modeling of a controllable stochastic process. - Marian Grendár Jr., Jana Skutová, Vladimír Spitalský:
Spam filtering by quantitative profiles. - Mathew C. Francis, Daniel Gonçalves, Pascal Ochem:
The Maximum Clique Problem in Multiple Interval Graphs. - Md. Jawaherul Alam, Therese Biedl, Stefan Felsner, Michael Kaufmann, Stephen G. Kobourov, Torsten Ueckerdt:
Computing Cartograms with Optimal Complexity. - Rohith Dwarakanath Vallam, C. A. Subramanian, Ramasuri Narayanam, Yadati Narahari, Srinath Narasimha:
Topologies and Price of Stability of Complex Strategic Networks with Localized Payoffs : Analytical and Simulation Studies. - Wenni Zheng, Pengbo Bo, Yang Liu, Wenping Wang:
Fast B-spline Curve Fitting by L-BFGS. - (Withdrawn) On Truncated-SVD-like Sparse Solutions to Least-Squares Problems of Arbitrary Dimensions.
- Hao Zhang, Yuan Liu, Meixia Tao:
Resource Allocation with Subcarrier Pairing in OFDMA Two-Way Relay Networks. - Joonwoo Shin, Jaekyun Moon:
Weighted-Sum-Rate-Maximizing Linear Transceiver Filters for the K-User MIMO Interference Channel. - Chi Lin, Guowei Wu, Feng Xia, Mingchu Li, Lin Yao, Zhongyi Pei:
Energy Efficient Ant Colony Algorithms for Data Aggregation in Wireless Sensor Networks. - Zhikui Chen, Feng Xia, Tao Huang, Fanyu Bu, Haozhe Wang:
A Localization Method for the Internet of Things. - Haim Avron, Christos Boutsidis:
Faster Subset Selection for Matrices and Applications. - Vijendra Singh Bhadauria, Sanjeev Sharma, Ravindra Patel:
A Comparative Study of Location Management Schemes: Challenges and Guidelines. - Hong Ju Park, Ender Ayanoglu:
An Upper Bound to the Marginal PDF of the Ordered Eigenvalues of Wishart Matrices. - Shan Mei, Xuan Zhou, Yifan Zhu, Zhenghu Zu, Tao Zheng, Alexander Boukhanovsky, Peter M. A. Sloot:
Simulating City-level Airborne Infectious Diseases. - Salah A. Aly:
Distributed Data Collection and Storage Algorithms for Collaborative Learning Vision Sensor Devices with Applications to Pilgrimage. - Guowei Wu, Dongze Lu, Feng Xia, Lin Yao:
A Fault-Tolerant Emergency-Aware Access Control Scheme for Cyber-Physical Systems. - Tie Qiu, Wei Wang, Feng Xia, Guowei Wu, Yu Zhou:
A Failure Self-recovery Strategy with Balanced Energy Consumption for Wireless Ad Hoc Networks. - Guowei Wu, Feng Xia, Lin Yao, Yan Zhang, Yanwei Zhu:
A Hop-by-hop Cross-layer Congestion Control Scheme for Wireless Sensor Networks. - Feng Xia, Ruixia Gao, Linqiang Wang, Ruonan Hao:
Real-Time Performance Analysis of Infrastructure-based IEEE 802.11 Distributed Coordination Function. - Jin Wang, Hassan Abid, Sungyoung Lee, Lei Shu, Feng Xia:
A Secured Health Care Application Architecture for Cyber-Physical Systems. - Feng Xia, Ruonan Hao, Yang Cao, Lei Xue:
ART-GAS: An Adaptive and Real-Time GTS Allocation Scheme for IEEE 802.15.4. - Feng Xia, Jianhua Ma:
Building Smart Communities with Cyber-Physical Systems. - Fangwei Ding, Feng Xia, Wei Zhang, Xuhai Zhao, Chengchuan Ma:
Monitoring Energy Consumption of Smartphones. - Feng Xia, Wei Zhang, Fangwei Ding, Ruonan Hao:
A-GPS Assisted Wi-Fi Access Point Discovery on Mobile Devices for Energy Saving. - Ning Zhang, Jun'ichi Tatemura, Jignesh M. Patel, Hakan Hacigümüs:
Towards Cost-Effective Storage Provisioning for DBMSs. - Hongchan Roh, Sanghyun Park, Sungho Kim, Mincheol Shin, Sang-Won Lee:
B+-tree Index Optimization by Exploiting Internal Parallelism of Flash-based Solid State Drives. - Per-Åke Larson, Spyros Blanas, Cristian Diaconu, Craig Freedman, Jignesh M. Patel, Mike Zwilling:
High-Performance Concurrency Control Mechanisms for Main-Memory Databases. - Shuai Ma, Yang Cao, Wenfei Fan, Jinpeng Huai, Tianyu Wo:
Capturing Topology in Graph Pattern Matching. - Mateusz Pawlik, Nikolaus Augsten:
RTED: A Robust Algorithm for the Tree Edit Distance. - Yael Amsterdamer, Susan B. Davidson, Daniel Deutch, Tova Milo, Julia Stoyanovich, Val Tannen:
Putting Lipstick on Pig: Enabling Database-style Workflow Provenance. - Jun Gao, Ruoming Jin, Jiashuai Zhou, Jeffrey Xu Yu, Xiao Jiang, Tengjiao Wang:
Relational Approach for Shortest Path Discovery over Large Graphs. - Marina Barsky, Sangkyum Kim, Tim Weninger, Jiawei Han:
Mining Flipping Correlations from Large Datasets with Taxonomies. - Arnd Christian König, Bolin Ding, Surajit Chaudhuri, Vivek R. Narasayya:
A Statistical Approach Towards Robust Progress Estimation. - Sumit Ganguly:
A Lower Bound for Estimating High Moments of a Data Stream. - Julián Urbano, Mónica Marrero, Diego Martín, Jorge Morato:
Overview of EIREX 2010: Computing. - Vincent Graziano, Faustino J. Gomez, Mark B. Ring, Jürgen Schmidhuber:
T-Learning. - Janusz A. Brzozowski, Hellis Tamm:
Quotient Complexities of Atoms of Regular Languages. - Honggang Zhang, Sudarshan Vasudevan:
Design and Analysis of Coalitions in Data Swarming Systems. - Yin Sun, Zhoujia Mao, Xiaofeng Zhong, Yuanzhang Xiao, Shidong Zhou, Ness B. Shroff:
Optimal Distributed Power Allocation for Decode-and-Forward Relay Networks. - Emanuel Diamant:
Let us first agree on what the term "semantics" means: An unorthodox approach to an age-old debate. - Arnab Bhattacharyya, Eldar Fischer, Shachar Lovett:
Testing Low Complexity Affine-Invariant Properties. - Jean-Yves Marion:
Proceedings Second Workshop on Developments in Implicit Computational Complexity, Saarbrücken, DICE 2011, Germany, April 2nd and 3rd, 2011. EPTCS 75, 2011 [contents] - Thomas C. Schmidt, Matthias Wählisch:
Why We Shouldn't Forget Multicast in Name-oriented Publish/Subscribe. - Simon Bogner, Ulrich Rüde:
Liquid-gas-solid flows with lattice Boltzmann: Simulation of floating bodies. - Toni Stojanovski, Marko Vuckovic, Ivan Velinov:
Empirical study of performance of data binding in ASP.NET web applications. - Toni Stojanovski, Ljupco Krstevski:
On the Performance of Exhaustive Search with Cooperating agents. - Venceslav Kafedziski, Toni Stojanovski:
Compressive sampling with chaotic dynamical systems. - Anthony Labarre:
Lower bounding edit distances between permutations. - Mursel Tasgin, Haluk Bingol:
Gossip on Weighted Networks. - Martin Doerr, Yannis Tzitzikas:
Information Carriers and Identification of Information Objects: An Ontological Approach. - Elena Purcaru, Cristian Toma:
2D Barcode for DNA Encoding. - Marius Popa:
Methods and Techniques of Quality Management for ICT Audit Processes. - Dan-Sabin Popescu:
Hiding Malicious Content in PDF Documents. - Adrian Marius Chiuta:
AES Encryption and Decryption Using Direct3D 10 API. - Gagan Goel, Vahab S. Mirrokni, Renato Paes Leme:
Polyhedral Clinching Auctions and the Adwords Polytope. - Arvind Yedla, Henry D. Pfister, Krishna R. Narayanan:
Code Design for the Noisy Slepian-Wolf Problem. - Zhigang Cao, Xiaoguang Yang:
A note on anti-coordination and social interactions. - Xuechong Guan, Yongming Li:
Continuity in Information Algebras. - Yuxin Deng, Yuan Feng:
Open Bisimulation for Quantum Processes. - Feng Jiang, Jianqi Wang, A. Lee Swindlehurst:
Interference-Aware Scheduling for Connectivity in MIMO Ad Hoc Multicast Networks. - Najmeh Kamyabpour, Doan B. Hoang:
A Task Based Sensor-Centeric Model for overall Energy Consumption. - Feng Jiang, Jie Chen, A. Lee Swindlehurst:
Phase-Only Analog Encoding for a Multi-Antenna Fusion Center. - Praveen Likhar, Ravi Shankar Yadav, M. Keshava Rao:
Securing IEEE 802.11G WLAN Using OpenVPN and Its Impact Analysis. - Haris Aziz, Markus Brill, Paul Harrenstein:
Testing Substitutability of Weak Preferences. - Yuan Li, Yue Zhao, Haibin Kan:
Capacity Factors of a Point-to-point Network. - Swapnil Dhamal, Satyanath Bhat, K. R. Anoop, Varun R. Embar:
Pattern Clustering using Cooperative Game Theory. - Kin Cheong Sou, Henrik Sandberg, Karl Henrik Johansson:
Computing Critical $k$-tuples in Power Networks. - Wolfgang Dvorák:
Technical Note: Exploring Σ^P_2 / Π^P_2-hardness for Argumentation Problems with fixed distance to tractable classes. - Mark Braverman, Alexander Grigo, Cristobal Rojas:
Noise vs computational intractability in dynamics. - Fabian Pedregosa, Gaël Varoquaux, Alexandre Gramfort, Vincent Michel, Bertrand Thirion, Olivier Grisel, Mathieu Blondel, Peter Prettenhofer, Ron Weiss, Vincent Dubourg, Jake VanderPlas, Alexandre Passos, David Cournapeau, Matthieu Brucher, Matthieu Perrot, Edouard Duchesnay:
Scikit-learn: Machine Learning in Python. - Jan Verschelde, Genady Yoffe:
Evaluating polynomials in several variables and their derivatives on a GPU computing processor. - Steven Obua:
ProofPeer - A Cloud-based Interactive Theorem Proving System. - Markus Schläpfer, Tom Kessler, Wolfgang Kröger:
Reliability Analysis of Electric Power Systems Using an Object-oriented Hybrid Modeling Approach. - Libor Barto, Marcin Kozik:
Absorbing Subalgebras, Cyclic Terms, and the Constraint Satisfaction Problem. - Ronald de Haan, Nina Narodytska, Toby Walsh:
The RegularGcc Matrix Constraint. - Ivana Tosic, Sarah Drewes:
Learning joint intensity-depth sparse representations. - Deepak Ponvel Chermakani:
Expressing Reachability in Linear Recurrences, as Infinite Determinants and Rational Polynomial Equations. - Shankara Narayanan Krishna, Ganesh Khandu Narwane, S. Ramesh, Swarup Mohalik, Jean-Vivien Millo:
Formalizing Traceability and Derivability in Software Product Lines. - Mikolaj Bojanczyk, Slawomir Lasota:
An extension of data automata that captures XPath. - Thomas Maugey, Pascal Frossard:
Interactive multiview video system with non-complex navigation at the decoder. - Steven Weber, Jeffrey G. Andrews:
Transmission capacity of wireless networks. - Tomás Babiak, Mojmír Kretínský, Vojtech Rehák, Jan Strejcek:
LTL to Büchi Automata Translation: Fast and More Deterministic. - Ming Liu, Matthieu Crussière, Jean-François Hélard:
A Novel Data-Aided Channel Estimation with Reduced Complexity for TDS-OFDM Systems. - Pablo M. Olmos, Juan José Murillo-Fuentes, Fernando Pérez-Cruz:
Tree-Structure Expectation Propagation for LDPC Decoding over the BEC. - Manel Khelifi, Assia Djabelkhir:
LMEEC: Layered Multi-Hop Energy Efficient Cluster-based Routing Protocol for Wireless Sensor Networks. - Lu Wei, Olav Tirkkonen:
Spectrum Sensing in the Presence of Multiple Primary Users. - Gary McGuire, Bastian Tugemann, Gilles Civario:
There is no 16-Clue Sudoku: Solving the Sudoku Minimum Number of Clues Problem. - Dirk Hesselbach:
Umgebungserfassungssystem fuer mobile Roboter (environment logging system for mobile autonomous robots). - Hector Zenil:
On the Dynamic Qualitative Behaviour of Universal Computation. - Hector Zenil:
Computer Runtimes and the Length of Proofs: On an Algorithmic Probabilistic Application to Waiting Times in Automatic Theorem Proving. - Srishti Shukla, Vijayvaradharaj T. Muralidharan, B. Sundar Rajan:
Wireless Network-Coded Accumulate-Compute and Forward Two-Way Relaying. - Yuval Shavitt, Udi Weinsberg:
Topological Trends of Internet Content Providers. - Jia Zeng:
TMBP: A Topic Modeling Toolbox Using Belief Propagation. - Mohammad Siraj, Soumen Kanrar:
Performance of Modeling wireless networks in realistic environment. - Jordan Vrtanoski, Toni Stojanovski:
Order Handling in Convergent Environments. - Toni Stojanovski, Tomislav Dzekov:
Rapid Application Development Using Software Factories. - Manuel Bodirsky:
Complexity Classification in Infinite-Domain Constraint Satisfaction. - Dariusz Biernacki, Sergueï Lenglet:
Applicative Bisimulations for Delimited-Control Operators. - András Hajdu, Lajos Hajdu, Robert Tijdeman:
Approximations of the Euclidean distance by chamfer distances. - Alois Paulin:
Towards Self-Service Governance by Means of Information Technology. - Weiwei Han:
Weaknesses of a dynamic identity based authentication protocol for multi-server architecture. - Yangjia Li, Nengkun Yu, Mingsheng Ying:
Termination of Nondeterministic Quantum Programs. - Jan Kratochvíl, Torsten Ueckerdt:
Non-crossing Connectors in the Plane. - Mathilde Bouvel, Cédric Chauve, Marni Mishna, Dominique Rossin:
Average-case analysis of perfect sorting by reversals (Journal Version). - Eliska Janouchova, Anna Kucerová:
Competitive Comparison of Optimal Designs of Experiments for Sampling-based Sensitivity Analysis. - Wajeb Gharibi:
Symbian 'vulnerability' and Mobile Threats. - Athanasios Kehagias, Dieter Mitsche, Pawel Pralat:
Cops and Invisible Robbers: the Cost of Drunkenness. - Wajeb Gharibi:
Some Recommended Protection Technologies for Cyber Crime Based on Social Engineering Techniques -- Phishing. - Vladimir Hahanov, Wajeb Gharibi, Eugenia Litvinova, Svetlana Chumachenko:
Information Analysis Infrastructure for Diagnosis. - Sanjit A. Seshia:
Sciduction: Combining Induction, Deduction, and Structure for Verification and Synthesis. - Manel Khelifi, Assia Djabelkhir:
Un protocole de routage à basse consomation d'énergie selon l'approche de clustering pour les réseaux de capteurs sans fils. - Nada M. Alamri, Nadine Akkari Adra:
UMTS-WiMAX Vertical Handover in Next Generation Wireless Networks. - Terence H. Chan, Alex J. Grant:
Network Coding Capacity Regions via Entropy Functions. - Vo Tam Van, Seiichi Mita:
A Novel Error Correcting System Based on Product Codes for Future Magnetic Recording Channels. - Alois Paulin:
Secure SQL Server - Enabling Secure Access to Remote Relational Data. - (Withdrawn) Distributed Multiuser Sequential Channel Sensing Schemes in Multichannel Cognitive Radio Networks.
- Krasimir Yordzhev:
An Entertaining Example of Using the Concepts of Context-Free Grammar and Pushdown Automation. - Garimella Rama Murthy:
Gibbs-Shannon Entropy and Related Measures: Tsallis Entropy. - Sergueï Lenglet, Joe B. Wells:
Expansion for Universal Quantifiers. - Daniel Leivant, Ramyaa Ramyaa:
Implicit complexity for coinductive data: a characterization of corecurrence. 1-14 - Clément Aubert:
Sublogarithmic uniform Boolean proof nets. 15-27 - Evgeny Makarov:
Provably Total Functions of Arithmetic with Basic Terms. 28-32 - Lucien Capedevielle:
A type system for PSPACE derived from light linear logic. 33-46 - Jesus Diaz, David Arroyo, Francisco de Borja Rodríguez:
Formal security analysis of registration protocols for interactive systems: a methodology and a case of study. - Krasimir Yordzhev, Ana Markovska:
Method of the Multidimensional Sieve in the Practical Realization of some Combinatorial Algorithms. - Yongjun Liao, Wei Du, Pierre Geurts, Guy Leduc:
DMFSGD: A Decentralized Matrix Factorization Algorithm for Network Distance Prediction. - Mehmet Karaca, Özgür Erçetin:
Throughput Optimal Multi-user Scheduling via Hierarchical Modulation. - Edinah K. Gnang:
Computational Tutorial on Gröbner bases embedding Sage in LaTeX with SageTEX. - (Withdrawn) Autenticazione biometrica: Realtà e fantasia.
- Oleg Bisikalo, Irina Kravchuk:
Formalization of semantic network of image constructions in electronic content. - Hee-Kap Ahn, Sang-Sub Kim, Christian Knauer, Lena Schlipf, Chan-Su Shin, Antoine Vigneron:
Covering and Piercing Disks with Two Centers.