


default search action
CoRR, May 2012
- Mahmoud A. Abdel-Aty:

Indices to Quantify the Ranking of Arabic Journals and Research Output. - Christina Aperjis, Bernardo A. Huberman:

A Market for Unbiased Private Data: Paying Individuals According to their Privacy Attitudes. - Fergal Reid, Aaron F. McDaid, Neil J. Hurley:

Percolation Computation in Complex Networks. - Eyal Cohen, Shlomi Dolev, Sergey Frenkel, Boris Kryzhanovsky, Alexandr Palagushkin, Michael Rosenblit, Victor N. Zakharov:

Optical Solver of Combinatorial Problems: Nano-Technological Approach. - Mateusz Ujma, Nastaran Shafiei:

jpf-concurrent: An extension of Java PathFinder for java.util.concurrent. - Ankur Moitra:

A Singly-Exponential Time Algorithm for Computing Nonnegative Rank. - Giacomo Como, Ketan Savla, Daron Acemoglu, Munther A. Dahleh, Emilio Frazzoli:

Robust Distributed Routing in Dynamical Networks with Cascading Failures. - Keonkook Lee, Chan-Byoung Chae, Joonhyuk Kang:

Spectrum Leasing via Cooperation for Enhanced Physical-Layer Secrecy. - (Withdrawn) ProPPA: A Fast Algorithm for ℓ1 Minimization and Low-Rank Matrix Completion.

- Nebojsa Skrbina, Toni Stojanovski:

Using parallel processing for file carving. - Marko Vuckovic, Toni Stojanovski:

Migration of data for iKnow application at EURM - a case study. - Verche Cvetanoska, Toni Stojanovski:

Using high performance computing and Monte Carlo simulation for pricing american options. - Jung-Hun Yang, Dick Ettema, Koen Frenken, Frank Van Oort, Evert-Jan Visser:

Modelling spatial patterns of economic activity in the Netherlands. - Jagbeer Singh, Satyendra Prasad Singh:

Schedulability Test for Soft Real-Time Systems under Multiprocessor Environment by using an Earliest Deadline First Scheduling Algorithm. - Arpine Khachatryan, Rafayel R. Kamalian:

On the parameter μ21 of a complete bipartite graph. - Matteo Mio:

On the equivalence of game and denotational semantics for the probabilistic mu-calculus. - Rafayel R. Kamalian:

It was not known about simple cycles. - Rafayel R. Kamalian:

On one-sided interval edge colorings of biregular bipartite graphs. - Rafael R. Kamalian:

Estimates for the number of vertices with an interval spectrum in proper edge colorings of some graphs. - Marius Buliga:

$λ$-Scale, a lambda calculus for spaces with dilations. - Eden Chlamtac, Michael Dinitz, Robert Krauthgamer:

Everywhere-Sparse Spanners via Dense Subgraphs. - Maggie E. Habeeb, Delaram Kahrobaei, Vladimir Shpilrain:

A Secret Sharing Scheme Based on Group Presentations and the Word Problem. - Mohammad Shaqfeh, Hussein M. Alnuweiri:

Joint Power and Resource Allocation for Block-Fading Relay-Assisted Broadcast Channels. - Czeslaw Bylinski, Jesse Alama:

New developments in parsing Mizar. - Anupam Gupta, Viswanath Nagarajan:

Approximating Sparse Covering Integer Programs Online. - Carlo A. Furia:

A Survey of Multi-Tape Automata. - Mingyi Hong, Zhi-Quan Luo:

Distributed Linear Precoder Optimization and Base Station Selection for an Uplink Heterogeneous Network. - Anthony J. Cox, Markus J. Bauer, Tobias Jakobi, Giovanna Rosone:

Large-scale compression of genomic sequence databases with the Burrows-Wheeler transform. - Rafael R. Kamalian:

On cyclically-interval edge colorings of trees. - Jingjin Yu:

Shortest Path Induced Vertex Ordering and its Application to Multi-agent Formation Path Planning. - (Withdrawn) Poultry Diseases Expert System using Dempster-Shafer Theory.

- Russell Impagliazzo, Cristopher Moore, Alexander Russell:

An Entropic Proof of Chang's Inequality. - Allan Jørgensen, Maarten Löffler, Jeff M. Phillips:

Geometric Computations on Indecisive and Uncertain Points. - Yong Zeng, Cenk M. Yetis, Erry Gunawan, Yong Liang Guan, Rui Zhang:

Improving Achievable Rate for the Two-User SISO Interference Channel with Improper Gaussian Signaling. - Arash Afkanpour, András György, Csaba Szepesvári, Michael H. Bowling:

A Randomized Strategy for Learning to Combine Many Features. - Weimao Ke:

Least Information Modeling for Information Retrieval. - Li-Yang Tan:

Analysis of Boolean Functions. - (Withdrawn) Energy-Efficient Delay-Constrained Transmission and Sensing for Cognitive Radio Systems.

- Manav R. Bhatnagar:

Performance Analysis of Decode-and-Forward Relaying in Gamma-Gamma Fading Channels. - Lakshmi Prasad Natarajan, B. Sundar Rajan:

An Adaptive Conditional Zero-Forcing Decoder with Full-diversity, Least Complexity and Essentially-ML Performance for STBCs. - Pejman Goudarzi:

Stochastic TCO minimization for Video Transmission over IP Networks. - Hongyu Liang:

Signed and Minus Domination in Complete Multipartite Graphs. - Antonia Wachter-Zeh:

Bounds on List Decoding Gabidulin Codes. - Patrick Bahr

:
Modes of Convergence for Term Graph Rewriting. - Holger Hermanns, Andrea Turrini:

Deciding Probabilistic Automata Weak Bisimulation in Polynomial Time. - Rui Wang, Ke Tang:

Minimax Classifier for Uncertain Costs. - Dino Sejdinovic, Arthur Gretton, Bharath K. Sriperumbudur, Kenji Fukumizu:

Hypothesis testing using pairwise distances and associated kernels (with Appendix). - Jianjun Chen, Ashwin Machanavajjhala, George Varghese:

Scalable Social Coordination using Enmeshed Queries. - Aridj Mohamed, Djamel Eddine Zegour:

TH*:Scalable Distributed Trie Hashing. - Saeid Abolfazli, Zohreh Sanaei, Abdullah Gani:

Mobile Cloud Computing: A Review on Smartphone Augmentation Approaches. - Paolo Lella:

An efficient implementation of the algorithm computing the Borel-fixed points of a Hilbert scheme. - Per Austrin, Siavosh Benabbas, Konstantinos Georgiou:

Better Balance by Being Biased: A 0.8776-Approximation for Max Bisection. - Oksana Denysyuk, Luís E. T. Rodrigues:

Order-preserving Renaming in Synchronous Message Passing Systems with Byzantine Faults. - Hassan Keshavarz, Mohammad Reza Jabbarpour Sattari, Rafidah Md Noor:

Session Initiation Protocol Attacks and Challenges. - Federico Calzolari, Silvia Arezzini, Alberto Ciampa, Enrico Mazzoni, Andrea Domenici, Gigliola Vaglini:

High availability using virtualization - 3RC. - Gildas Morvan:

Multi-level agent-based modeling - Bibliography. - Varsha Dani, Mahnush Movahedi, Jared Saia:

Scalable Mechanisms for Rational Secret Sharing. - Zhiyuan Yan, Hongmei Xie:

Enhanced Algebraic Error Control for Random Linear Network Coding. - Deepak Agarwal, Bee-Chung Chen, Xuanhui Wang:

Multi-Faceted Ranking of News Articles using Post-Read Actions. - Richard Southwell, Jianwei Huang:

Complex Networks from Simple Rewrite Systems. - Philipp Hupp, Riko Jacob:

Tight Bounds for Low Dimensional Star Stencils in the External Memory Model. - Gang Chen, Jason J. Corso:

Greedy Multiple Instance Learning via Codebook Learning and Nearest Neighbor Voting. - Xun Zhou, Rui Zhang, Chin Keong Ho:

Wireless Information and Power Transfer: Architecture Design and Rate-Energy Tradeoff. - Marc Lanctot, Richard G. Gibson, Neil Burch, Martin Zinkevich, Michael H. Bowling:

No-Regret Learning in Extensive-Form Games with Imperfect Recall. - Yann Ponty:

Rule-weighted and terminal-weighted context-free grammars have identical expressivity. - David J. Rosenbaum:

Breaking the nlog n Barrier for Solvable-Group Isomorphism. - Ludo Waltman, Michael Schreiber:

On the calculation of percentile-based bibliometric indicators. - D. M. V. Satya Sriram, Gaurav Pandey, Debarghya Ghoshdastidar, Ambedkar Dukkipati, M. Narasimha Murty:

Maximum Entropy with Maximum J-Divergence Discrimination for Text Classification. - (Withdrawn) On Exploiting Hotspot and Entropy for Data Forwarding in Delay Tolerant Networks.

- Loet Leydesdorff, Ping Zhou, Lutz Bornmann:

How Can Journal Impact Factors be. - Christoph Berkholz:

Lower Bounds for Existential Pebble Games and k-Consistency Tests. - Lutz Bornmann, Loet Leydesdorff:

Citation impact of papers published from six prolific countries: A national comparison based on InCites data. - Dieter Duyck, Sheng Yang, Fambirai Takawira, Joseph Jean Boutros, Marc Moeneclaey:

Time-Varying Space-Only Codes for Coded MIMO. - Barry Hurley, Ted Hurley:

Paraunitary Matrices. - Arne Meier:

Generalized Complexity of ALC Subsumption. - Phuc V. Nguyen:

Using Data Warehouse to Support Building Strategy or Forecast Business Tend. - Jean-Luc Fouquet, Jean-Marie Vanherpe:

Reed's conjecture on some special classes of graphs. - Jean-Luc Fouquet, Jean-Marie Vanherpe:

Reed's Conjecture on hole expansions. - Boris Kryzhanovsky, Mikhail Kryzhanovsky, Magomed Malsagov:

Discretization of a matrix in the problem of quadratic functional binary minimization. - Carlos Alberto Fernández y Fernández:

Towards a new metamodel for the Task Flow Model of the Discovery Method. - Carlos Alberto Fernández y Fernández, José Angel Quintanar Morales:

Integrated Development Environment Gesture for modeling workflow diagrams. - Roger P. Pawlowski, Eric T. Phipps, Andrew G. Salinger:

Automating embedded analysis capabilities and managing software complexity in multiphysics simulation part I: template-based generic programming. - Boris Leistedt, Jason D. McEwen:

Exact Wavelets on the Ball. - Partha Kanuparthy, Warren Matthews, Constantine Dovrolis:

DNS-based Ingress Load Balancing: An Experimental Evaluation. - Andino Maseleno, Md. Mahmud Hasan:

African Trypanosomiasis Detection using Dempster-Shafer Theory. - Feng Jiang, Jie Chen, A. Lee Swindlehurst:

Parameter Tracking via Optimal Distributed Beamforming in an Analog Sensor Network. - Sean Chester, Alex Thomo, S. Venkatesh, Sue Whitesides:

Indexing Reverse Top-k Queries. - Evgeny V. Shulkin, Sergey M. Krasnopeyev:

Development of application for discovering and binding to published geospatial processes in distributed environments. - Lizhi Du:

Method Study on the 3x+1 Problem. - Jason Crampton, Gregory Z. Gutin, Anders Yeo:

On the Parameterized Complexity of the Workflow Satisfiability Problem. - Sirin Nitinawarat, George K. Atia, Venugopal V. Veeravalli:

Controlled Sensing for Multihypothesis Testing. - Alin Bostan, Frédéric Chyzak, Ziming Li, Bruno Salvy:

Fast Computation of Common Left Multiples of Linear Ordinary Differential Operators. - Maurizio Talamo, Maulahikmah Galinium, Christian H. Schunck, Franco Arcieri:

Interleaving Commands: a Threat to the Interoperability of Smartcard Based Security Applications. - Henning Wunderlich:

A note on a problem in communication complexity. - Antonio Campello, João Strapasson, Sueli I. Rodrigues Costa:

On projections of arbitrary lattices. - Anuj Dawar, Bjarki Holm:

Pebble games with algebraic rules. - Radhouane Boughammoura, Lobna Hlaoua, Mohamed Nazih Omri:

VIQI: A New Approach for Visual Interpretation of Deep Web Query Interfaces. - Radhouane Boughammoura, Lobna Hlaoua, Mohamed Nazih Omri:

ViQIE: A New Approach for Visual Query Interpretation and Extraction. - Andrés Alayón Glazunov

:
An Energy-Efficient MIMO Algorithm with Receive Power Constraint. - Andrés Alayón Glazunov

, Jie Zhang:
A note on the bivariate distribution representation of two perfectly correlated random variables by Dirac's $δ$-function. - Marcello M. Bersani, Achille Frigeri, Angelo Morzenti, Matteo Pradella, Matteo Rossi, Pierluigi San Pietro:

Constraint LTL Satisfiability Checking without Automata. - Jin-ichi Itoh, Joseph O'Rourke, Costin Vîlcu:

Source Unfoldings of Convex Polyhedra via Certain Closed Curves. - Amit Chakrabarti, Ranganath Kondapally, Zhenghui Wang:

Information Complexity versus Corruption and Applications to Orthogonality and Gap-Hamming. - Vincenzo Bonifaci, Andreas Wiese:

Scheduling Unrelated Machines of Few Different Types. - Wendelin Böhmer:

Robot Navigation using Reinforcement Learning and Slow Feature Analysis. - Sergio España, Arturo González, Oscar Pastor, Marcela Ruiz:

Communication Analysis modelling techniques. - (Withdrawn) On the Complexity of Recognizing S-composite and S-prime Graphs.

- Mario Blaum, James Lee Hafner, Steven Hetzler:

Partial-MDS Codes and their Application to RAID Type of Architectures. - Michael D. Conover, Bruno Gonçalves, Alessandro Flammini, Filippo Menczer:

Partisan Asymmetries in Online Political Activity. - Jason D. McEwen, Gilles Puy, Jean-Philippe Thiran, Pierre Vandergheynst, Dimitri Van De Ville, Yves Wiaux:

Sparse signal reconstruction on the sphere: implications of a new sampling theorem. - Pascal Koiran, Natacha Portier, Sébastien Tavenas:

A Wronskian Approach to the real τ-conjecture. - Alasdair Urquhart:

Width and size of regular resolution proofs. - Dongwoo Kim, Yeonseung Chung, Alice Oh:

Variable Selection for Latent Dirichlet Allocation. - Geoffrey Belter, Elizabeth R. Jessup, Thomas Nelson, Boyana Norris, Jeremy G. Siek:

Reliable Generation of High-Performance Matrix Algebra. - Benoit Baudry, Martin Monperrus:

Towards Ecology-Inspired Software Engineering. - James Clay III, Kevin Wortman:

A Durable Flash Memory Search Tree. - T. Soni Madhulatha:

An Overview on Clustering Methods. - Khalid Raza:

Application Of Data Mining In Bioinformatics. - Md. Rashid Farooqi, Khalid Raza:

A Comprehensive Study of CRM through Data Mining Techniques. - Vikas J. Dongre, Ramkrishna V. Yenkar, Vijay H. Mankar:

Interactive Learning through Hands-on Practice using Electronic Mini - Lab (EML): a Case Study. - Onur Küçüktunç, Erik Saule, Kamer Kaya, Ümit V. Çatalyürek:

Recommendation on Academic Networks using Direction Aware Citation Analysis. - Mauro Mangia, Riccardo Rovatti, Gianluca Setti:

Rakeness in the design of Analog-to-Information Conversion of Sparse and Localized Signals. - Jeffrey M. White, Kevin A. Wortman:

Divide-and-Conquer 3D Convex Hulls on the GPU. - Kumar Viswanatha, Emrah Akyol, Kenneth Rose:

Subset Typicality Lemmas and Improved Achievable Regions in Multiterminal Source Coding. - Xiaohui Bei, Ning Chen, Shengyu Zhang:

On the Complexity of Trial and Error. - Sidiq Hidayat, Bong Keun Kim, Kohtaro Ohba:

An Approach For Robots To Deal With Objects. - Travis Gagie:

Sequential-Access FM-Indexes. - Lingjie Duan, Biying Shou, Jianwei Huang:

Capacity Allocation and Pricing Strategies for Wireless Femtocell Services. - Víctor Valls, José Luis Sánchez, Cristina Cano, Boris Bellalta, Miquel Oliver:

Hierarchical Range Sectoring and Bidirectional Link Quality Estimation for On-demand Collections in WSNs. - (Withdrawn) A Factoring and Discrete Logarithm based Cryptosystem.

- Jingjun Han, Zhi Jin:

Proving inequalities and solving global optimization problems via simplified CAD projection. - Romeil Sandhu, Ayelet Dominitz, Yi Gao, Allen R. Tannenbaum:

Volumetric Mapping of Genus Zero Objects via Mass Preservation. - Siegfried Schomisch, Maria Zens, Philipp Mayr:

Are e-readers suitable tools for scholarly work? - Ryo Nomura, Toshiyasu Matsushima:

Information Spectrum Approach to Overflow Probability of Variable-Length Codes with Conditional Cost Function. - Ken-ichi Kawarabayashi, Mikkel Thorup:

Combinatorial coloring of 3-colorable graphs. - Bundit Laekhanukit, Shayan Oveis Gharan, Mohit Singh:

A Rounding by Sampling Approach to the Minimum Size k-Arc Connected Subgraph Problem. - Rajesh Hemant Chitnis, Marek Cygan, MohammadTaghi Hajiaghayi, Dániel Marx:

Directed Subset Feedback Vertex Set is Fixed-Parameter Tractable. - Nathan Kaplan:

MacWilliams Identities for $m$-tuple Weight Enumerators. - Li Yan, Marek Chrobak:

LP-rounding Algorithms for the Fault-Tolerant Facility Placement Problem. - Yishay Mansour, Aviad Rubinstein, Shai Vardi, Ning Xie

:
Converting online algorithms to local computation algorithms. - Thomas Kesselheim:

Approximation Algorithms for Wireless Link Scheduling with Flexible Data Rates. - Eitan Menahem, Rami Puzis:

Detecting Spammers via Aggregated Historical Data Set. - Abhisekh Sankaran, Bharat Adsul, Vivek Madan, Pritish Kamath, Supratik Chakraborty:

Preservation under Substructures modulo Bounded Cores. - Aroop Mukherjee, Soumen Kanrar

:
Image Enhancement with Statistical Estimation. - Max Hügel, Holger Rauhut, Thomas Strohmer:

Remote sensing via ℓ1 minimization. - Lukas Polacek, Ola Svensson:

Quasi-Polynomial Local Search for Restricted Max-Min Fair Allocation. - Yuval Lomnitz, Meir Feder:

A simpler derivation of the coding theorem. - Caroline S. Wagner, Loet Leydesdorff:

An Integrated Impact Indicator (I3): A New Definition of "Impact" with Policy Relevance. - Richard Kueng, David Gross:

RIPless compressed sensing from anisotropic measurements. - S. Swaddiwudhipong, M. J. Islam, Zishun Liu:

High Velocity Penetration/Perforation Using Coupled Smooth Particle Hydrodynamics-Finite Element Method. - Himabindu Lakkaraju, Indrajit Bhattacharya, Chiranjib Bhattacharyya:

Dynamic Multi-Relational Chinese Restaurant Process for Analyzing Influences on Users in Social Media. - Kiril Dichev, Fergal Reid, Alexey L. Lastovetsky:

Efficient and reliable network tomography in heterogeneous networks using BitTorrent broadcasts and clustering algorithms. - Mohammad Iftekhar Husain, Steven Y. Ko, Atri Rudra, Steve Uurtamo:

Almost Universal Hash Families are also Storage Enforcing. - Lin Yao, Bing Liu, Feng Xia, Guowei Wu, Qiang Lin:

A Group Key Management Protocol Based on Weight-Balanced 2-3 Tree for Wireless Sensor Networks. - Tomás Brázdil, Antonín Kucera, Petr Novotný, Dominik Wojtczak

:
Minimizing Expected Termination Time in One-Counter Markov Decision Processes. - Niv Buchbinder

, Joseph Naor, R. Ravi, Mohit Singh:
Approximation Algorithms for Online Weighted Rank Function Maximization under Matroid Constraints. - Dmitry Gavinsky, Shachar Lovett

, Michael E. Saks, Srikanth Srinivasan:
A Tail Bound for Read-k Families of Functions. - Hamed Maleki, Viveck R. Cadambe, Syed Ali Jafar:

Index Coding - An Interference Alignment Perspective. - Lucas Lacasa, Jacopo Tagliabue, Andrew Berdahl:

Crossover phenomenon in the performance of an Internet search engine. - Dan Chen, Pat Morin:

Approximating Majority Depth. - Serhat Nazim Avci, Ender Ayanoglu:

Optimal Algorithms for Near-Hitless Network Restoration via Diversity Coding. - José Miguel Díaz-Báñez, Matias Korman, Pablo Pérez-Lantero, Inmaculada Ventura:

Locating a single facility and a high-speed line. - Wentian Li:

Characterizing Ranked Chinese Syllable-to-Character Mapping Spectrum: A Bridge Between the Spoken and Written Chinese Language. - Michael T. Goodrich, Michael Mitzenmacher:

Anonymous Card Shuffling and its Applications to Parallel Mixnets. - Michael B. McCoy, Joel A. Tropp:

Sharp recovery bounds for convex deconvolution, with applications. - Deeparnab Chakrabarty, Zhiyi Huang:

Testing Coverage Functions. - Joanne Mun-Yee Lim, Chee Onn Chow:

Smart handover based on fuzzy logic trend in IEEE802.11 mobile IPv6 networks. - Abdulrahman Al Molijy, Ismail Hmeidi, Izzat Alsmadi:

Indexing of Arabic documents automatically based on lexical analysis. - Win Win Thant, Tin Myat Htwe, Ni Lar Thein:

Parsing of Myanmar sentences with function tagging. - Mohammad Arif, Tara Rani:

ACO based routing for MANETs. - Jyothi Pillai, O. P. Vyas:

CSHURI - Modified HURI algorithm for Customer Segmentation and Transaction Profitability. - Md Abdus Samad:

A Novel Window Function Yielding Suppressed Mainlobe Width and Minimum Sidelobe Peak. - Jian Yuan, Wenxia Zhang, Zhou-Hai Zhou:

An optimal consensus tracking control algorithm for autonomous underwater vehicles with disturbances. - Sinung Suakanto, Suhono H. Supangkat, Suhardi, Roberd Saragih:

Performance Measurement of Cloud Computing Services. - Karima Ben Hamida El Abri, Ammar Bouallegue:

A New UWB System Based on a Frequency Domain Transformation Of The Received Signal. - Srinivas Nidhra, Likith Poovanna, Vinay Sudha Ethiraj:

Visitor schedule management system- an intelligent decision support system. - Samir A. Elsagheer Mohamed, Ashraf Nasr, Gufran Ahmad Ansari:

Precise positioning systems for Vehicular Ad-Hoc Networks. - S. Aji, M. Ramachandra Kaimal:

Document summarization using positive pointwise mutual information. - Sajilal Divakaran:

Spectral Analysis of Projection Histogram for Enhancing Close matching character Recognition in Malayalam. - B. V. Patel, B. B. Meshram:

Content based video retrieval systems. - Jose Texier, Manuel E. Bermudez:

Traductor Writing System Web. - Vahid Farrokhi, Laszlo Pokoradi:

The necessities for building a model to evaluate Business Intelligence projects- Literature Review. - H. S. Jagadeesh, K. Suresh Babu, K. B. Raja:

DBC based Face Recognition using DWT. - Julien Plu, François Scharffe:

Publishing and linking transport data on the Web. - Manu V. T., Philomina Simon:

A novel statistical fusion rule for image fusion and its comparison in non subsampled contourlet transform domain and wavelet domain. - Muhammad Shahzad Aslam:

The impact of pharmacybernetic in reducing medication error. - Thomas Blumensath:

Compressed Sensing with Nonlinear Observations and Related Nonlinear Optimisation Problems. - Maher Heni, Ridha Bouallegue:

Power control in reactive routing protocol for Mobile Ad Hoc Network. - K. Ramesh, K. Somasundaram:

Improved Fair-Zone technique using Mobility Prediction in WSN. - L. Sunil Chandran, Deepak Rajendraprasad:

Rainbow Colouring of Split and Threshold Graphs. - Manuel Gomez-Rodriguez, Bernhard Schölkopf:

Submodular Inference of Diffusion Networks from Multiple Trees. - Giuseppe Cocco, Nader Alagha, Christian Ibars, Stefano Cioni:

A Network-Coded Diversity Protocol for Collision Recovery in Slotted ALOHA Networks. - K. Ramesh, K. Somasundaram:

A comparative study of clusterhead selection algorithms in wireless sensor networks. - Manuel Gomez-Rodriguez, Bernhard Schölkopf:

Influence Maximization in Continuous Time Diffusion Networks. - Sumit Sharma, Rohitt Sharma, Paramjit Singh, Aditya Mahajan:

Age Based User Interface in Mobile Operating System. - Ken Umeno, Aki-Hiro Sato:

Chaotic Method for Generating q-Gaussian Random Variables. - Himanshu Singh, Bhaskar Biswas:

Comparison of CSMA based MAC protocols of wireless sensor networks. - Wei Pan, Ye Yuan, Guy-Bart Stan:

Reconstruction of Arbitrary Biochemical Reaction Networks: A Compressive Sensing Approach. - Kevin P. Costello, Prasad Tetali, Pushkar Tripathi:

Matching with Commitments. - Anthony Fanous, Anthony Ephremides:

Stable Throughput in a Cognitive Wireless Network. - Guodong Shi, Karl Henrik Johansson:

Finite-time and Asymptotic Convergence of Distributed Averaging and Maximizing Algorithms. - Rourab Paul, Sangeet Saha, J. K. M. Sadique Uz Zaman, Suman Das, Amlan Chakrabarti, Ranjan Ghosh:

A simple 1-byte 1-clock RC4 design and its efficient implementation in FPGA coprocessor for secured ethernet communication. - Pedram Hajiani, Javad Poshtan:

Reconfigurable Controller Design For Actuator Faults In A Four-Tank System Benchmark. - Justin Thaler, Jonathan R. Ullman, Salil P. Vadhan:

Faster Algorithms for Privately Releasing Marginals. - Indranil Pan, Saptarshi Das:

Chaotic multi-objective optimization based design of fractional order PIλDμ controller in AVR system. - Ricardo Pires:

A Common Evaluation Setting for Just.Ask, Open Ephyra and Aranea QA systems. - Amos Fiat, Ariel Levavi:

Tight Lower Bounds on Envy-Free Makespan Approximation. - Behrouz Abdolali, Hossein Sameti:

A Novel Method For Speech Segmentation Based On Speakers' Characteristics. - Azedine Boulmakoul, Lamia Karim, Ahmed Lbath:

Moving Object Trajectories Meta-Model And Spatio-Temporal Queries. - Raj Rao Nadakuditi, M. E. J. Newman:

Graph spectra and the detectability of community structure in networks. - Paola Zizzi:

The non-algorithmic side of the mind. - Anna-Lena Trautmann:

Plücker Embedding of Cyclic Orbit Codes. - Jean-Marc Champarnaud, Hadrien Jeanne, Ludovic Mignot:

Derivatives of Approximate Regular Expressions. - Jascha Sohl-Dickstein:

The Natural Gradient by Analogy to Signal Whitening, and Recipes and Tricks for its Use. - K. B. Priya Iyer, V. Shanthi:

Goal Directed Relative Skyline Queries in Time Dependent Road Networks. - Bhavana S., K. L. Sudha:

Text Steganography using LSB insertion method along with Chaos Theory. - Mohandeep Sharma, Dilip Kumar:

Wishbone bus Architecture - A Survey and Comparison. - Amandeep Singh, Balwinder Singh:

Microcontroller Based Testing of Digital IP-Core. - Suvadip Batabyal, Parama Bhaumik:

Improving Network Performance with Affinity based Mobility Model in Opportunistic Network. - Mehdi Alipour, Mostafa E. Salehi, Hesamodin Shojaei Baghini:

Design Space Exploration to Find the Optimum Cache and Register File Size for Embedded Applications. - Ondrej Bílka:

Structured Grammars are Effective. - José Miguel Díaz-Báñez, Matias Korman, Pablo Pérez-Lantero, Inmaculada Ventura:

The 1-Center and 1-Highway problem. - Yongming Huang, Gan Zheng, Mats Bengtsson, Kai-Kit Wong, Luxi Yang, Björn E. Ottersten:

Distributed Multicell Beamforming Design Approaching Pareto Boundary with Max-Min Fairness. - Ishit Makwana, Vitrag Sheth:

A low power high bandwidth four quadrant analog multiplier in 32 nm CNFET technology. - Luisa Gargano, Adele A. Rescigno:

Strong Conflict-Free Coloring of Intervals. - Thamer A. Alrawashdeh, Mohammad I. Muhairat, Sokyna M. Alqatawnah:

Factors affecting acceptance of web-based training system: Using extended UTAUT and structural equation modeling. - Shweta Kharya:

Using data mining techniques for diagnosis and prognosis of cancer disease. - Venkatesan T. Chakaravarthy, Sambuddha Roy, Yogish Sabharwal:

Distributed Algorithms for Scheduling on Line and Tree Networks. - Jascha Sohl-Dickstein, Benjamin J. Culpepper:

Hamiltonian Annealed Importance Sampling for partition function estimation. - C. Ramya, G. Kavitha, K. S. Shreedhara:

Dynamic Grouping of Web Users Based on Their Web Access Patterns using ART1 Neural Network Clustering Algorithm. - Vince Grolmusz:

A Note on the PageRank of Undirected Graphs. - Arnaud Casteigts, Paola Flocchini, Emmanuel Godard, Nicola Santoro, Masafumi Yamashita:

Expressivity of Time-Varying Graphs and the Power of Waiting in Dynamic Networks. - Khalid Raza, Rafat Parveen:

Evolutionary algorithms in genetic regulatory networks model. - Shuqing Zeng:

Fast Optimal Joint Tracking-Registration for Multi-Sensor Systems. - Michèle Weiland, Lawrence Mitchell, Gerard Gorman, Stephan Kramer, Mark Parsons, James Southern:

Mixed-mode implementation of PETSc for scalable linear algebra on multi-core processors. - Ahmed Barnawi, Nadine Akkari, Muhammad Emran, Asif Irshad Khan:

Deploying SIP-based Mobile Exam Application onto Next Generation Network testbed. - Carlos Gershenson, Nelson Fernández:

Complexity and Information: Measuring Emergence, Self-organization, and Homeostasis at Multiple Scales. - K. S. Sreejini, A. Lijiya, V. K. Govindan:

M-FISH Karyotyping - A New Approach Based on Watershed Transform. - Mark Sh. Levin

:
Multiset Estimates and Combinatorial Synthesis. - Joseph O'Rourke:

Unfolding Prismatoids as Convex Patches: Counterexamples and Positive Results. - Lauri Hella, Matti Järvisalo, Antti Kuusisto, Juhana Laurinharju, Tuomo Lempiäinen, Kerkko Luosto, Jukka Suomela, Jonni Virtema:

Weak Models of Distributed Computing, with Connections to Modal Logic. - Pavani Sanghoi, Lavish Kansal:

Analysis of WiMAX Physical Layer Using Spatial Multiplexing. - Ryan A. Rossi, Brian Gallagher

, Jennifer Neville, Keith Henderson:
Dynamic Behavioral Mixed-Membership Model for Large Evolving Networks. - Elchanan Mossel, Ariel D. Procaccia, Miklós Z. Rácz:

A Smooth Transition from Powerlessness to Absolute Power. - Salah A. Aly, Mohamed Salim:

Data Dissemination And Collection Algorithms For Collaborative Sensor Networks Using Dynamic Cluster Heads. - Matthias Petschow, Elmar Peise, Paolo Bientinesi:

High-Performance Solvers for Dense Hermitian Eigenproblems. - Theresa Velden, Carl Lagoze:

The Extraction of Community Structures from Publication Networks to Support Ethnographic Observations of Field Differences in Scientific Communication. - Bas Luttik:

Unique Parallel Decomposition in Branching and Weak Bisimulation Semantics. - Adam C. Polak, Marco F. Duarte, Dennis Goeckel:

Performance Bounds for Grouped Incoherent Measurements in Compressive Sensing. - Vinh Phu Nguyen, Robert N. Simpson, Stéphane P. A. Bordas, Timon Rabczuk:

Isogeometric analysis: an overview and computer implementation aspects. - Huanhuan Sun, Taotao Zhang, Wenyi Zhang:

Separating the Wheat from the Chaff: Sensing Wireless Microphones in TVWS. - Andri Mirzal:

A Converged Algorithm for Tikhonov Regularized Nonnegative Matrix Factorization with Automatic Regularization Parameters Determination. - Rourab Paul, Sangeet Saha, Suman Sau, Amlan Chakrabarti:

Design and implementation of real time AES-128 on real time operating system for multiple FPGA communication. - Ankit Kumar, Tushar Patnaik, Vivek Kr Verma:

Discrimination of English to other Indian languages (Kannada and Hindi) for OCR system. - Ofer Feinerman, Amos Korman, Zvi Lotker, Jean-Sébastien Sereni:

Collaborative Search on the Plane without Communication. - Fedor M. Fominykh, Mikhail V. Volkov:

P(l)aying for Synchronization. - Konstantin Makarychev, Yury Makarychev, Aravindan Vijayaraghavan:

Approximation Algorithms for Semi-random Graph Partitioning Problems. - S. Padma, Ananthi Seshasaayee:

Maximum Spanning Tree Model on Personalized Web Based Collaborative Learning in Web 3.0. - Mehrdad Mahdavi, Tianbao Yang, Rong Jin:

Efficient Constrained Regret Minimization. - Suverna Sengar, Partha Pratim Bhattacharya:

Performance improvement in OFDM system by PAPR reduction. - Chi-Kin Chau, Lan Yu:

Truthful Complex-valued Knapsack Problem and Discrete Optimization in A/C Electrical Grid. - Yannis Stavrakas, George Papastefanatos, Theodore Dalamagas, Vassilis Christophides:

Diachronic Linked Data: Towards Long-Term Preservation of Structured Interrelated Information. - Clelia de Felice:

A note on the factorization conjecture. - Theodore Dalamagas, Nikos Bikakis, George Papastefanatos, Yannis Stavrakas, Artemis G. Hatzigeorgiou:

Publishing Life Science Data as Linked Open Data: the Case Study of miRBase. - Zhaosong Lu, Yong Zhang:

Sparse Approximation via Penalty Decomposition Methods. - Manoj Rameshchandra Thakur, Sugata Sanyal:

A Multi-Dimensional approach towards Intrusion Detection System. - Hossam M. Zawbaa, Salah A. Aly:

Hajj and Umrah Event Recognition Datasets. - Samir Medjiah, Toufik Ahmed, Francine Krief:

AGEM: Adaptive Greedy-Compass Energy-aware Multipath Routing Protocol for WMSNs. - Samir Medjiah, Toufik Ahmed:

Orion Routing Protocol for Delay-Tolerant Networks. - Samir Medjiah, Toufik Ahmed, Francine Krief:

GEAMS: a Greedy Energy-Aware Multipath Stream-based Routing Protocol for WMSNs. - Samir Medjiah, Toufik Ahmed, Abolghasem (Hamid) Asgari:

Streaming multimedia over WMSNs: an online multipath routing protocol. - Adrian Jackson, Orestis Agathokleous:

Dynamic Loop Parallelisation. - Mete Ozay, Ilke Öztekin, Uygar Öztekin, Fatos T. Yarman-Vural:

Mesh Learning for Classifying Cognitive Processes. - Ping Zhou, Yongfeng Zhong:

The citation-based indicator and combined impact indicator - New options for measuring impact. - Anna Lubiw, Vinayak Pathak:

Flip Distance Between Two Triangulations of a Point-Set is NP-complete. - François Leduc-Primeau, Saied Hemati, Shie Mannor, Warren J. Gross:

Relaxed Half-Stochastic Belief Propagation. - Kamal Kumar Chauhan, Amit Kumar Singh Sanger:

Securing Mobile Ad hoc Networks:Key Management and Routing. - Wei Xu, Xiaodai Dong, Wu-Sheng Lu:

MIMO Relaying Broadcast Channels with Linear Precoding and Quantized Channel State Information Feedback. - Julian Eberius, Katrin Braunschweig, Maik Thiele, Wolfgang Lehner

:
Identifying And Weighting Integration Hypotheses On Open Data Platforms. - Peter Mutschke, Mark Thamm:

Linking Social Networking Sites to Scholarly Information Portals by ScholarLib. - Benoît Otjacques, Mickaël Stefas, Maël Cornil, Fernand Feltz:

Open Data Visualization: Keeping Traces of the Exploration Process. - Maw-Shang Chang, Ton Kloks, Ching-Hao Liu:

Edge-clique graphs of cocktail parties have unbounded rankwidth. - Robert Atkey

, Patricia Johann, Neil Ghani:
Refining Inductive Types. - Adrian Jackson, Joachim Hein, Colin M. Roach:

Optimising Performance Through Unbalanced Decompositions. - Cynthia Kop, Femke van Raamsdonk:

Dynamic Dependency Pairs for Algebraic Functional Systems. - Pierre Aboulker, Pierre Charbit, Maria Chudnovsky, Nicolas Trotignon, Kristina Vuskovic:

LexBFS, structure and algorithms. - Changzhong Wang, Baiqing Sun, Qinghua Hu:

An improved approach to attribute reduction with covering rough sets. - James W. Smith, Ali Khajeh-Hosseini, Jonathan Stuart Ward, Ian Sommerville:

CloudMonitor: Profiling Power Usage. - Kolja B. Knauer, Piotr Micek, Bartosz Walczak:

Outerplanar graph drawings with few slopes. - Remi Coletta, Emmanuel Castanier, Patrick Valduriez, Christian Frisch, DuyHoa Ngo, Zohra Bellahsene:

Public Data Integration with WebSmatch. - Anh Huy Phan, Petr Tichavský, Andrzej Cichocki:

Low Complexity Damped Gauss-Newton Algorithms for CANDECOMP/PARAFAC. - Eirik Rosnes, Marcel Ambroze, Martin Tomlinson:

On the Minimum/Stopping Distance of Array Low-Density Parity-Check Codes. - Fábio Gagliardi Cozman, Avi Pfeffer:

Proceedings of the Twenty-Seventh Conference on Uncertainty in Artificial Intelligence (2011). - Peter Grunwald, Peter Spirtes:

Proceedings of the Twenty-Sixth Conference on Uncertainty in Artificial Intelligence (2010). - Reza Bosagh Zadeh, Shai Ben-David:

A Uniqueness Theorem for Clustering. - Changhe Yuan, Xiaolu Liu, Tsai-Ching Lu, Heejin Lim:

Most Relevant Explanation: Properties, Algorithms, and Evaluations. - Jin Yu, S. V. N. Vishwanathan, Jian Zhang:

The Entire Quantile Path of a Risk-Agnostic SVM Classifier. - Tianbao Yang, Rong Jin, Yun Chi, Shenghuo Zhu:

A Bayesian Framework for Community Detection Integrating Content and Link. - Max Welling:

Herding Dynamic Weights for Partially Observed Random Field Models. - Thomas J. Walsh, Istvan Szita, Carlos Diuk, Michael L. Littman:

Exploring compact reinforcement-learning representations with linear regression. - Yevgeniy Vorobeychik:

Simulation-Based Game Theoretic Analysis of Keyword Auctions with Low-Dimensional Bidding Strategies. - Christopher M. Vigorito:

Temporal-Difference Networks for Dynamical Systems with Continuous Observations and Actions. - Shankar Vembu, Thomas Gärtner, Mario Boley:

Probabilistic Structured Predictors. - Tran The Truyen, Dinh Q. Phung, Svetha Venkatesh:

Ordinal Boltzmann Machines for Collaborative Filtering. - Jin Tian, Ru He:

Computing Posterior Probabilities of Structural Features in Bayesian Networks. - Matthias Thimm:

Measuring Inconsistency in Probabilistic Knowledge Bases. - Graham W. Taylor, Geoffrey E. Hinton:

Products of Hidden Markov Models: It Takes N>1 to Tango. - Prithviraj Sen, Amol Deshpande, Lise Getoor:

Bisimulation-based Approximate Lifted Inference. - Steffen Rendle, Christoph Freudenthaler, Zeno Gantner, Lars Schmidt-Thieme:

BPR: Bayesian Personalized Ranking from Implicit Feedback. - Kevin Regan, Craig Boutilier:

Regret-based Reward Elicitation for Markov Decision Processes. - Pekka Parviainen, Mikko Koivisto:

Exact Structure Discovery in Bayesian Networks with Less Space. - Mathias Niepert:

Logical Inference Algorithms and Matrix Representations for Probabilistic Conditional Independence. - Sara Mostafavi, Quaid Morris:

Using the Gene Ontology Hierarchy when Predicting Gene Function. - Thomas P. Minka, Rongjing Xiang, Yuan (Alan) Qi:

Virtual Vector Machine for Bayesian Online Classification. - Ofer Meshi, Ariel Jaimovich, Amir Globerson, Nir Friedman:

Convexifying the Bethe Free Energy. - Talya Meltzer, Amir Globerson, Yair Weiss:

Convergent message passing algorithms - a unifying view. - Yi Mao, Guy Lebanon:

Domain Knowledge Uncertainty and Probabilistic Parameter Constraints. - Yishay Mansour, Mehryar Mohri, Afshin Rostamizadeh:

Multiple Source Adaptation and the Renyi Divergence. - Siwei Lyu:

Interpretation and Generalization of Score Matching. - Benjamin Lubin, David C. Parkes:

Quantifying the Strategyproofness of Mechanisms via Metrics on Payoff Distributions. - Jun Liu, Shuiwang Ji, Jieping Ye:

Multi-Task Feature Learning Via Efficient l2,1-Norm Minimization. - Ping Li:

Improving Compressed Counting. - M. Pawan Kumar, Daphne Koller:

MAP Estimation of Semi-Metric MRFs via Hierarchical Graph Cuts. - Samantha Kleinberg, Bud Mishra:

The Temporal Logic of Causal Structures. - Jacek Kisynski, David Poole:

Constraint Processing in Lifted Probabilistic Inference. - Oleg Kiselyov, Chung-chieh Shan:

Monolingual Probabilistic Programming Using Generalized Coroutines. - Kristian Kersting, Babak Ahmadi, Sriraam Natarajan:

Counting Belief Propagation. - Albert Xin Jiang, Kevin Leyton-Brown, Avi Pfeffer:

Temporal Action-Graph Games: A New Representation for Dynamic Games. - Tony Jebara:

MAP Estimation, Message Passing, and Perfect Graphs. - Peter Hooper, Yasin Abbasi-Yadkori, Russell Greiner, Bret Hoehn:

Improved Mean and Variance Approximations for Belief Net Responses via Network Doubling. - Matthias Hoffman, Hendrik Kück, Nando de Freitas, Arnaud Doucet:

New inference strategies for solving Markov Decision Processes using reversible jump MCMC. - Geoffrey J. Gordon, Sue Ann Hong, Miroslav Dudík:

First-Order Mixed Integer Linear Programming. - Joseph Gonzalez, Yucheng Low, Carlos Guestrin, David R. O'Hallaron:

Distributed Parallel Inference on Large Factor Graphs. - Kuzman Ganchev, Michael J. Kearns, Yuriy Nevmyvaka, Jennifer Wortman Vaughan:

Censored Exploration and the Dark Pool Problem. - Christian Fritz, Sheila A. McIlraith:

Generating Optimal Plans in Highly-Dynamic Domains. - Yu Fan, Christian R. Shelton:

Learning Continuous-Time Social Network Dynamics. - Miroslav Dudík, Geoffrey J. Gordon:

A Sampling-Based Approach to Computing Equilibria in Succinct Extensive-Form Games. - Finale Doshi-Velez, Zoubin Ghahramani:

Correlated Non-Parametric Latent Feature Models. - Mark Crowley, John Nelson, David Poole:

Seeing the Forest Despite the Trees: Large Scale Spatial-Temporal Decision Making. - Fábio Gagliardi Cozman, Rodrigo Bellizia Polastro:

Complexity Analysis and Variational Inference for Interpretation-based Probabilistic Description Logic. - Corinna Cortes, Mehryar Mohri, Afshin Rostamizadeh:

L2 Regularization for Learning Kernels. - Vincent Conitzer:

Prediction Markets, Mechanism Design, and Cooperative Game Theory. - Ido Cohn, Tal El-Hay, Nir Friedman, Raz Kupferman:

Mean Field Variational Approximation for Continuous-Time Bayesian Networks. - David M. Bradley, J. Andrew Bagnell:

Convex Coding. - Jordan L. Boyd-Graber, David M. Blei:

Multilingual Topic Models for Unaligned Text. - Blai Bonet:

Deterministic POMDPs Revisited. - Kedar Bellare, Gregory Druck, Andrew McCallum:

Alternating Projections for Learning with Expectation Constraints. - Peter L. Bartlett, Ambuj Tewari:

REGAL: A Regularization based Algorithm for Reinforcement Learning in Weakly Communicating MDPs. - Arthur U. Asuncion, Max Welling, Padhraic Smyth, Yee Whye Teh:

On Smoothing and Inference for Topic Models. - Otávio Augusto Bizetto Penatti, Eduardo Valle, Ricardo da Silva Torres:

Are visual dictionaries generalizable? - John Asmuth, Lihong Li, Michael L. Littman, Ali Nouri, David Wingate:

A Bayesian Sampling Approach to Exploration in Reinforcement Learning. - Daniel Andrade, Bernhard Sick:

Lower Bound Bayesian Networks - An Efficient Inference of Lower Bounds on Probability Distributions in Bayesian Networks. - Utku Kose, Omer Deperlioglu:

Intelligent learning environments within blended learning for ensuring effective C programming course. - Manish Sharma, Gurpadam Singh:

Evaluation of Proactive, Reactive and Hybrid Ad hoc Routing Protocol for various Battery models in VANET using Qualnet. - Eric Graves, Tan F. Wong:

Detectability of Symbol Manipulation by an Amplify-and-Forward Relay. - Ahmad Assaf, Eldad Louw, Aline Senart, Corentin Follenfant, Raphaël Troncy, David Trastour:

Improving Schema Matching with Linked Data. - Nikhilesh Barik, Sunil Karforma:

Risks and remedies in e-learning system. - David Leoni:

Non-Interactive Differential Privacy: a Survey. - Rajeev Bedi, Mohit Marwaha, Tajinder Singh, Harwinder Singh, Amritpal Singh:

Analysis of Different Privacy Preserving Cloud Storage Frameworks. - Mangesh Gupte, Darja Krushevskaja, S. Muthukrishnan:

Analyses of Cardinal Auctions. - Juliusz Chroboczek, Sylvain Lebresne:

Juppix: a Linux Live-CD for Undergraduate Students. - Soumen Kanrar

:
Efficient Packet Forwarding in Mesh Network. - Etienne Birmelé, Rui A. Ferreira, Roberto Grossi, Andrea Marino, Nadia Pisanti, Romeo Rizzi, Gustavo Akio Tominaga Sacomoto, Marie-France Sagot:

Optimal Listing of Cycles and st-Paths in Undirected Graphs. - Yusuf Perwej, Asif Perwej:

Forecasting of Indian Rupee (INR) / US Dollar (USD) Currency Exchange Rate Using Artificial Neural Network. - Yusuf Perwej, Firoj Parwej:

Perceptual Evaluation Of Playout Buffer Algorithm For Enhancing Perceived Quality Of Voice Transmission Over Ip Network. - Yusuf Perwej, Firoj Parwej, Asif Perwej:

An Adaptive Watermarking Technique for the copyright of digital images and Digital Image Protection. - Guang Chen, Tian Qiu, Zi-Ke Zhang:

Promotional effect on cold start problem and diversity in a data characteristic based recommendation method. - Eddy Chiu, Vincent K. N. Lau:

Cellular Multi-User Two-Way MIMO AF Relaying via Signal Space Alignment: Minimum Weighted SINR Maximization. - Qiaoyang Ye, Beiyu Rong, Yudong Chen, Mazin Al-Shalash, Constantine Caramanis, Jeffrey G. Andrews:

User Association for Load Balancing in Heterogeneous Cellular Networks. - Véronique Bruyère, Marc Ducobu, Olivier Gauwin:

Visibly pushdown automata on trees: universality and u-universality. - Indu Shakya, Falah H. Ali:

Spectral Efficiency of Multiple Access Fading Channels with Adaptive Interference Cancellation. - Ping Zhu, Qiaoyan Wen:

Operations on soft sets revisited. - Orly Avner, Shie Mannor, Ohad Shamir:

Decoupling Exploration and Exploitation in Multi-Armed Bandits. - Ali Goli, Seyed Hamed Hassani, Rüdiger L. Urbanke:

Universal Bounds on the Scaling Behavior of Polar Codes. - Gao Cong, Hua Lu, Beng Chin Ooi, Dongxiang Zhang, Meihui Zhang:

Efficient Spatial Keyword Search in Trajectory Databases. - Youssef Bassil:

A Comparative Study on the Performance of Permutation Algorithms. - Youssef Bassil:

A Comparative Study on the Performance of the Top DBMS Systems. - Sk. AbdulNabi, P. Premchand:

Effective performance of information retrieval on web by using web crawling. - David Harvey:

Faster arithmetic for number-theoretic transforms. - Paolo D'Alberto:

A Heterogeneous Accelerated Matrix Multiplication: OpenCL + APU + GPU+ Fast Matrix Multiply. - Yue Lin, Deng Cai, Cheng Li:

Density Sensitive Hashing. - Douglas S. Bridges:

Precompact Apartness Spaces. - Jin-Yi Cai, Xi Chen, Heng Guo, Pinyan Lu:

Inapproximability After Uniqueness Phase Transition in Two-Spin Systems. - Ping Li, Anshumali Shrivastava, Arnd Christian König:

b-Bit Minwise Hashing in Practice: Large-Scale Batch and Online Learning and Using GPUs for Fast Preprocessing with Simple Hash Functions. - Mrinalkanti Ghosh, Satyadev Nandakumar:

Predictive Complexity and Generalized Entropy Rate of Stationary Ergodic Processes. - Jaewook Kang, Heung-No Lee, Kiseon Kim:

Bayesian Hypothesis Test for Sparse Support Recovery using Belief Propagation. - Sari Haj Hussein:

The Hush Cryptosystem. - Dmitry V. Lande, Ya. A. Kalinovskiy, Yuliya E. Boyarinova:

The model of information retrieval based on the theory of hypercomplex numerical systems. - Sanjiv Sambandan:

Automating Open Fault Correction in Integrated Circuits via Field Induced Diffusion Limited Aggregation. - Bruno Scherrer, Victor Gabillon, Mohammad Ghavamzadeh, Matthieu Geist:

Approximate Modified Policy Iteration. - Ahmet Yasin Yazicioglu, Waseem Abbas, Magnus Egerstedt:

A Tight Lower Bound on the Controllability of Networks with Multiple Leaders. - Priyank Singhal, Nataasha Raul:

Malware Detection Module using Machine Learning Algorithms to Assist in Centralized Security in Enterprise Networks. - Sebastian Trapp, Matthias Wählisch, Jochen H. Schiller:

Bridge the Gap: Measuring and Analyzing Technical Data for Social Trust between Smartphones. - Ilias Diakonikolas, Christos H. Papadimitriou, George Pierrakos, Yaron Singer:

Efficiency-Revenue Trade-offs in Auctions. - Arthur Guez, David Silver, Peter Dayan:

Efficient Bayes-Adaptive Reinforcement Learning using Sample-Based Search. - Md. Nazmul Islam Khan, Rashed Ahmed, Md. Tariq Aziz:

A Survey of TCP Reno, New Reno and Sack Over Mobile Ad-Hoc Network. - Saurabh Singh, Abhinav Gupta, Alexei A. Efros:

Unsupervised Discovery of Mid-Level Discriminative Patches. - Luis Quesada, Pablo J. Villacorta:

Community-Quality-Based Player Ranking in Collaborative Games with no Explicit Objectives. - Sébastien Bubeck, Tengyao Wang, Nitin Viswanathan:

Multiple Identifications in Multi-Armed Bandits. - Luis Quesada, Fernando Berzal, Francisco J. Cortijo:

A Model-Driven Probabilistic Parser Generator. - Joonseok Lee

, Mingxuan Sun, Guy Lebanon:
A Comparative Study of Collaborative Filtering Algorithms. - Seungyeon Kim, Joshua V. Dillon, Guy Lebanon:

Cumulative Revision Map. - Siqi Zhao, Lin Zhong, Jehan Wickramasuriya, Venu Vasudevan, Robert LiKamWa, Ahmad Rahmati:

SportSense: Real-Time Detection of NFL Game Events from Twitter. - Farzad Parvaresh, Raúl H. Etkin:

Using Superposition Codebooks and Partial Decode and Forward in Low SNR Parallel Relay Networks. - Rekha Sunny T, Sabu M. Thampi:

Survey on Distributed Data Mining in P2P Networks. - Zohreh Sanaei, Saeid Abolfazli, Abdullah Gani, Rashid Hafeez Khokhar:

Tripod of Requirements in Horizontal Heterogeneous Mobile Cloud Computing. - Xiaozhong Xu, Ozgu Alay, Elza Erkip, Yao Wang, Shivendra S. Panwar:

Two-way Wireless Video Communication using Randomized Cooperation, Network Coding and Packet Level FEC. - Aaqib Patel, Md. Zafar Ali Khan, S. N. Merchant, Uday B. Desai:

Capacity and Spectral Efficiency of Interference Avoiding Cognitive Radio with Imperfect Detection. - Cen Lin, Yuan Liu, Meixia Tao:

Cross-Layer Optimization of Two-Way Relaying for Statistical QoS Guarantees. - Swarnendu Kar, Pramod K. Varshney:

On Linear Coherent Estimation with Spatial Collaboration. - Mohamed-Haykel Zayani, Vincent Gauthier, Djamal Zeghlache:

A Joint Model for IEEE 802.15.4 Physical and Medium Access Control Layers. - Naim Terbeh, Mounir Zrigui:

Arabic Language Learning Assisted by Computer, based on Automatic Speech Recognition. - Gianluigi Liva, Enrico Paolini, Michael Lentmaier, Marco Chiani:

Spatially-Coupled Random Access on Graphs. - Sruti Gan Chaudhuri:

Design and implementation of a differentiated service based qos model for real-time interactive traffic on constrained bandwidth ip networks. - Gianluigi Greco, Francesco Scarcello:

The Power of Tree Projections: When Local Consistency Answers Conjunctive Queries. - Mohamed-Haykel Zayani, Vincent Gauthier, Djamal Zeghlache:

Improving Link Prediction in Intermittently Connected Wireless Networks by Considering Link and Proximity Stabilities. - Mohamed-Haykel Zayani, Djamal Zeghlache:

Cooperation Enforcement for Packet Forwarding Optimization in Multi-hop Ad-hoc Networks. - Mohamed-Haykel Zayani, Vincent Gauthier, Ines Slama, Djamal Zeghlache:

Tracking Topology Dynamicity for Link Prediction in Intermittently Connected Wireless Networks. - Antonio J. Tallón-Ballesteros, Pedro Antonio Gutiérrez Peña, César Hervás-Martínez:

Distribution of the search of evolutionary product unit neural networks for classification. - Jean-Gabriel Luque, Ludovic Mignot, Florent Nicart

:
Some Combinatorial Operators in Language Theory. - Yonatan Kaspi, Neri Merhav:

On Real-Time and Causal Secure Source Coding. - Yefim Bakman:

Unfair items detection in educational measurement. - Aida Boussaada Zaier, Ridha Bouallegue:

A Full Performance Analysis of Channel Estimation Methods for Time Varying OFDM Systems. - Gruia Calinescu:

1.85 Approximation for Min-Power Strong Connectivity. - Mikael Gast, Mathias Hauptmann:

Efficient Parallel Computation of Nearest Neighbor Interchange Distances. - Alin Bostan, Muhammad F. I. Chowdhury, Romain Lebreton, Bruno Salvy, Éric Schost:

Power Series Solutions of Singular (q)-Differential Equations. - Kyoung-Dae Kim, Sayan Mitra, P. R. Kumar:

Bounded epsilon-Reach Set Computation of a Class of Deterministic and Transversal Linear Hybrid Automata. - Romain Giot, Christophe Rosenberger

:
Genetic Programming for Multibiometrics. - Jinyuan Chen, Petros Elia:

Degrees-of-Freedom Region of the MISO Broadcast Channel with General Mixed-CSIT. - Zhanshan (Sam) Ma:

A Note on Extending Taylor's Power Law for Characterizing Human Microbial Communities: Inspiration from Comparative Studies on the Distribution Patterns of Insects and Galaxies, and as a Case Study for Medical Ecology. - Eric T. Phipps, Roger P. Pawlowski:

Efficient Expression Templates for Operator Overloading-based Automatic Differentiation. - Eric Price, David P. Woodruff:

Lower Bounds for Adaptive Sparse Recovery. - Parikshit Gopalan, Raghu Meka, Omer Reingold:

DNF Sparsification and a Faster Deterministic Counting Algorithm. - So Hirai, Kenji Yamanishi:

Normalized Maximum Likelihood Coding for Exponential Family with Its Applications to Optimal Clustering. - Mohammad Mahmoody

, Hemanta K. Maji, Manoj Prabhakaran:
Limits of Random Oracles in Secure Computation. - Mary Cherian, T. R. Gopalakrishnan Nair:

A QoS-Aware Routing Protocol for Real-time Applications in Wireless Sensor Networks. - Alexandre Bartel, Jacques Klein, Martin Monperrus, Yves Le Traon:

Dexpler: Converting Android Dalvik Bytecode to Jimple for Static Analysis with Soot. - Tomasz Suslo:

The Correct Classic Generalized Least-Squares Estimator of an Unknown Constant Mean of Randon Field. - Fabrizio Grandoni:

On Min-Power Steiner Tree. - Damien Pous

:
Untyping Typed Algebras and Colouring Cyclic Linear Logic. - Ana Monga, Balwinder Singh:

Finite State Machine based Vending Machine Controller with Auto-Billing Features. - Samik Datta, Anirban Majumder, K. V. M. Naidu:

Capacitated Team Formation Problem on Social Networks. - Irene Marquez Corbella, Ruud Pellikaan:

Error-correcting pairs for a public-key cryptosystem. - (Withdrawn) P versus UP.

- Johannes Klaus Fichte:

The Good, the Bad, and the Odd: Cycles in Answer-Set Programs. - Cristiano Alessandro, Juan Pablo Carbajal, Andrea d'Avella:

Synthesis and Adaptation of Effective Motor Synergies for the Solution of Reaching Tasks. - Heath LeBlanc, Haotian Zhang, Shreyas Sundaram, Xenofon D. Koutsoukos:

Consensus of Multi-Agent Networks in the Presence of Adversaries Using Only Local Information. - Thibault Hervier, Silvère Bonnabel, François Goulette:

Accurate 3D maps from depth images and motion sensors via nonlinear Kalman filtering. - Nicolas Bousquet, Daniel Gonçalves

, George B. Mertzios, Christophe Paul, Ignasi Sau, Stéphan Thomassé
:
Parameterized Domination in Circle Graphs. - Roberto Henry Herrera, Mirko van der Baan:

Revisiting Homomorphic Wavelet Estimation and Phase Unwrapping. - Roberto Henry Herrera, Eduardo Moreno, Héctor Calás, Rubén Orozco:

Blind Deconvolution of Ultrasonic Signals Using High-Order Spectral Analysis and Wavelets. - Sangeetha Marikkannan:

Scheduling and allocation algorithm for an elliptic filter. - David Sutter, Joseph M. Renes, Frédéric Dupuis, Renato Renner:

Achieving the Capacity of any DMC using only Polar Codes. - Daniel Karapetyan, Abraham P. Punnen:

A reduced integer programming model for the ferry scheduling problem. - Pierre-Loïc Garoche, Temesghen Kahsai, Cesare Tinelli:

Invariant stream generators using automatic abstract transformers based on a decidable logic. - Jason Chang, John W. Fisher III:

Efficient Topology-Controlled Sampling of Implicit Shapes. - Vladimir V. V'yugin, Vladimir G. Trunov:

Asymptotically Optimal Algorithm for Short-Term Trading Based on the Method of Calibration. - Ulric J. Ferner, Muriel Médard, Emina Soljanin:

Toward Sustainable Networking: Storage Area Networks with Network Coding. - Steffen Lewitzka:

Necessity as justified truth. - Ümit V. Çatalyürek, John Feo, Assefaw Hadish Gebremedhin, Mahantesh Halappanavar, Alex Pothen:

Graph Coloring Algorithms for Muti-core and Massively Multithreaded Architectures. - William I. Gasarch, Kevin Lawler:

An NP-Complete Problem in Grid Coloring. - Nanao Kita:

A Partially Ordered Structure and a Generalization of the Canonical Partition for General Graphs with Perfect Matchings. - Andrew Lucas, Mark A. Stalzer, John Feo:

Parallel implementation of a fast randomized algorithm for the decomposition of low rank matrices. - Nicolas Kuhn, Emmanuel Lochin, Jérôme Lacan, Roksana Boreli, Caroline Bes, Laurence Clarac:

Enabling Realistic Cross-Layer Analysis based on Satellite Physical Layer Traces. - Olivier Mehani, Guillaume Jourjon, Thierry Rakotoarivelo:

A Method for the Characterisation of Observer Effects and its Application to OML. - Curt Schieler, Paul Cuff:

Secrecy Is Cheap if the Adversary Must Reconstruct. - Gang Wang, Manish Mohanlal, Christo Wilson, Xiao Wang, Miriam J. Metzger, Haitao Zheng, Ben Y. Zhao:

Social Turing Tests: Crowdsourcing Sybil Detection. - Saeed Hajizadeh, Ghosheh Abed Hodtani:

Three-Receiver Broadcast Channels with Side Information. - Evanny Obregon, Ki Won Sung, Jens Zander:

On the Feasibility of Low-Power Secondary Access to 960-1215 MHz Aeronautical Spectrum. - Roger P. Pawlowski, Eric T. Phipps, Andrew G. Salinger, Steven J. Owen, Christopher M. Siefert, Matthew L. Staten:

Automating embedded analysis capabilities and managing software complexity in multiphysics simulation part II: application to partial differential equations. - Yusuf Perwej, Kashiful Haq, Mohammad Uruj Jaleel, Sharad Saxena:

Some drastic improvements found in the analysis of routing protocol for the Bluetooth technology using scatternet. - Yusuf Perwej, Ashish Chaturvedi:

Machine Recognition of Hand Written Characters using Neural Networks. - Yusuf Perwej, Ashish Chaturvedi

:
Neural Networks for Handwritten English Alphabet Recognition. - Paolo Frasconi, Fabrizio Costa, Luc De Raedt, Kurt De Grave:

kLog: A Language for Logical and Relational Learning with Kernels. - Yonatan Aumann, Yair Dombb, Avinatan Hassidim:

Computing Socially-Efficient Cake Divisions. - Omar Saeed Al-Mushayt, Yusuf Perwej, Kashiful Haq:

Electronic-government in Saudi Arabia: A positive revolution in the peninsula. - Sheng-Yuan Tu, Ali H. Sayed:

Diffusion Strategies Outperform Consensus Strategies for Distributed Estimation over Adaptive Networks. - Dujdow Buranapanichkit, Yiannis Andreopoulos:

Distributed Time-Frequency Division Multiple Access Protocol For Wireless Sensor Networks. - Qiyu Jin, Ion Grama, Quansheng Liu:

Optimal Weights Mixed Filter for Removing Mixture of Gaussian and Impulse Noises. - Amir Herzberg, Haya Schulmann:

Fragmentation Considered Poisonous. - Xiaohan Zhao, Alessandra Sala, Christo Wilson, Xiao Wang, Sabrina Gaito, Haitao Zheng, Ben Y. Zhao:

Multi-scale Dynamics in a Massive Online Social Network. - Teck Aguilar, Syue-Ju Syue, Vincent Gauthier, Hossam Afifi, Chin-Liang Wang:

CoopGeo: A Beaconless Geographic Cross-Layer Protocol for Cooperative Wireless Ad Hoc Networks. - Cristiano Torezzan, João Strapasson, Sueli I. R. Costa, Rogério M. Siqueira:

Optimum Commutative Group Codes. - Kai Zhang, Xiao Ma, Shancheng Zhao, Baoming Bai, Xiaoyi Zhang:

A New Ensemble of Rate-Compatible LDPC Codes. - Justin Ziniel, Philip Schniter:

Dynamic Compressive Sensing of Time-Varying Signals via Approximate Message Passing. - Ittai Abraham, Moshe Babaioff, Shaddin Dughmi, Tim Roughgarden:

Combinatorial Auctions with Restricted Complements. - Christian Schridde:

The permanent, graph gadgets and counting solutions for certain types of planar formulas. - Van Minh Nguyen:

Low-Level and Successive Large-Level Excursions of a Stationary Gaussian Process. - Mark M. Christiansen, Ken R. Duffy:

Guesswork, large deviations and Shannon entropy. - Daniel Hienert, Francesco Luciano:

Extraction of Historical Events from Wikipedia. - Kee-Hoon Kim, Hosung Park, Seokbeom Hong, Jong-Seon No, Habong Chung:

Fast Correlation Computation Method for Matching Pursuit Algorithms in Compressed Sensing. - Payam Delgosha, Amin Aminzadeh Gohari:

Information Theoretic cutting of a cake. - Abhay Kumar Singh, Pramod Kumar Kewat:

On cyclic codes over the ring $Z_p + uZ_p + ... + u^{k-1}Z_p$. - Changyou Chen, Wray L. Buntine, Nan Ding:

Theory of Dependent Hierarchical Normalized Random Measures. - Changho Suh, Naveen Goela, Michael Gastpar:

Approximate Feedback Capacity of the Gaussian Multicast Channel. - Jan A. Bergstra:

Decision Taking as a Service. - Cedomir Stefanovic, Petar Popovski, Dejan Vukobratovic:

Frameless ALOHA Protocol for Wireless Networks. - Mihai Ivan, Gheorghe Ivan:

Sample programs in C++ for matrix computations in max plus algebra. - Pannaga Shivaswamy, Thorsten Joachims:

Online Structured Prediction via Coactive Learning. - Ali H. Sayed:

Diffusion Adaptation over Networks. - Yao Li, Emina Soljanin, Predrag Spasojevic:

Three Schemes for Wireless Coded Broadcast to Heterogeneous Users. - Dmytro V. Lande:

Visualization of features of a series of measurements with one-dimensional cellular structure. - Kouninef Belkacem, Bouzerita Mohamed:

Deployment of software components: Application to Wireless System. - Virgil Griffith, Christof Koch:

Quantifying synergistic mutual information. - Tsung-Yi Chen, Dariush Divsalar, Richard D. Wesel:

Chernoff Bounds for Analysis of Rate-Compatible Sphere-Packing with Numerous Transmissions. - Somdip Dey:

SD-AREE: A New Modified Caesar Cipher Cryptographic Method Along with Bit-Manipulation to Exclude Repetition from a Message to be Encrypted. - Jascha Sohl-Dickstein:

Efficient Methods for Unsupervised Learning of Probabilistic Models. - Yoav Goldberg:

Task-specific Word-Clustering for Part-of-Speech Tagging. - Dmitry Ageyev, Haidara Abdalla, O. V. Starkova:

Mpls Overlay Network Sinthesis Method With Multilayer Graph Usage. - George A. Lozano, Vincent Larivière, Yves Gingras:

The weakening relationship between the Impact Factor and papers' citations in the digital age. - Yi-Peng Wei, Shih-Chun Lin, Yu-Hsiu Lin, Hsuan-Jung Su:

Graph-based Code Design for Quadratic-Gaussian Wyner-Ziv Problem with Arbitrary Side Information. - (Withdrawn) Fuzzy - Rough Feature Selection With Π- Membership Function For Mammogram Classification.

- Ahmad Beirami, Mohsen Sardari, Faramarz Fekri:

Results on the Fundamental Gain of Memory-Assisted Universal Source Coding. - Mehryar Mohri, Andres Muñoz Medina:

New Analysis and Algorithm for Learning with Drifting Distributions. - Sergiu Goschin:

From Exact Learning to Computing Boolean Functions and Back Again. - Xiaoli Chu

, Yuhua Wu, David López-Pérez, Xiaofeng Tao:
On Providing Downlink Services in Collocated Spectrum-Sharing Macro and Femto Networks. - Muhammad Fahad Khan, Saira Beg:

Transference & Retrieval of Pulse-code modulation Audio over Short Messaging Service. - Petr Hlinený, Ondrej Moris:

Detours in Scope-Based Route Planning. - Kirill Trapeznikov, Venkatesh Saligrama, David A. Castañón:

Cost Sensitive Sequential Classification. - Yin Zhu, Yu Zheng, Liuhang Zhang, Darshan Santani, Xing Xie, Qiang Yang:

Inferring Taxi Status Using GPS Trajectories. - Fragkiskos Papadopoulos, Constantinos Psomas, Dmitri V. Krioukov:

Replaying the Geometric Growth of Complex Networks and Application to the AS Internet. - Mehdi Bahrami, Mohammad Bahrami:

An overview to Software Architecture in Intrusion Detection System. - Yoav Goldberg, Michael Elhadad:

Precision-biased Parsing and High-Quality Parse Selection. - Rodrigo C. de Lamare, Raimundo Sampaio Neto:

Minimum Mean-Squared Error Iterative Successive Parallel Arbitrated Decision Feedback Detectors for DS-CDMA Systems. - Rodrigo C. de Lamare, Raimundo Sampaio Neto:

Reduced-Rank Adaptive Filtering Based on Joint Iterative Optimization of Adaptive Filters. - Rodrigo C. de Lamare, Lei Wang, Rui Fa:

Adaptive Reduced-Rank LCMV Beamforming Algorithms Based on Joint Iterative Optimization of Filters: Design and Analysis. - Paulo Shakarian, Damon Paulo:

Large Social Networks can be Targeted for Viral Marketing with Small Seed Sets. - Chengxi Ye, Yuxu Lin, Mingli Song, Chun Chen, David W. Jacobs:

Spectral Graph Cut from a Filtering Point of View. - Peng Zhong, Mai Vu:

Combined Decode-Forward and Layered Noisy Network Coding Schemes for Relay Channels. - Sugata Sanyal, Manoj Rameshchandra Thakur:

A Hybrid Approach Towards Intrusion Detection Based on Artificial Immune System and Soft Computing. - Rémi Bonnet, Alain Finkel, Jérôme Leroux, Marc Zeitoun:

Model Checking Vector Addition Systems with one zero-test. - Salah A. Aly, Moataz M. Abdelwahab:

Hajj And Umrah Dataset For Face Recognition And Detection. - Bhaskar D. Rao, Zhilin Zhang, Yuzhe Jin:

Sparse Signal Recovery in the Presence of Intra-Vector and Inter-Vector Correlation. - Debprakash Patnaik, Naren Ramakrishnan, Srivatsan Laxman, Badrish Chandramouli:

Streaming Algorithms for Pattern Discovery over Dynamically Changing Event Sequences. - Hua Ouyang, Alexander G. Gray:

Stochastic Smoothing for Nonsmooth Minimizations: Accelerating SGD by Exploiting Structure. - Boaz Barak, Fernando G. S. L. Brandão, Aram W. Harrow, Jonathan A. Kelner, David Steurer, Yuan Zhou:

Hypercontractivity, Sum-of-Squares Proofs, and their Applications. - V. Rajesh, P. Vijaya Kumar:

CDMA Based Interconnect Mechanism for SOPC. - Saraju P. Mohanty:

ISWAR: An Imaging System with Watermarking and Attack Resilience. - Ofer Feinerman, Amos Korman:

Memory Lower Bounds for Randomized Collaborative Search and Applications to Biology. - Myunghwan Kim, Jure Leskovec:

Latent Multi-group Membership Graph Model. - Céline Aubel, Christoph Studer, Graeme Pope, Helmut Bölcskei:

Sparse Signal Separation in Redundant Dictionaries. - Marco Chiesa, Giuseppe Di Battista, Thomas Erlebach, Maurizio Patrignani:

Computational Complexity of Traffic Hijacking under BGP and S-BGP. - Jing Liu, Fei Qiao, Qi Wei, Huazhong Yang:

A Novel Video Compression Approach Based on Underdetermined Blind Source Separation. - Thomas Holenstein, Makrand Sinha:

Constructing a Pseudorandom Generator Requires an Almost Linear Number of Calls. - Graeme Pope, Helmut Bölcskei:

Sparse Signal Recovery in Hilbert Spaces. - Mika Göös, Jukka Suomela:

No Sublogarithmic-time Approximation Scheme for Bipartite Vertex Cover. - Anders Goude, Stefan Engblom:

Adaptive fast multipole methods on the GPU. - Balwinder Sodhi, T. V. Prabhakar:

Examining the Impact of Platform Properties on Quality Attributes. - Kilani Ilhem, Dalel Jabri, Bel Hadj Ali Naoui Saloua, Mohamed Naceur Abdelkrim:

Observer Design for Takagi-Sugeno Descriptor System with Lipschitz Constraints. - Yasser Karimian, Saeideh Ziapour, Mahmoud Ahmadian-Attari:

Parity Check Matrix Recognition from Noisy Codewords. - Zbigniew Paszkiewicz, Wojciech Cellary:

Computer Supported Collaborative Processes in Virtual Organizations. - Luciano Caroprese, Irina Trubitsyna, Miroslaw Truszczynski, Ester Zumpano:

The View-Update Problem for Indefinite Databases. - Steffen Grünewälder, Guy Lever, Luca Baldassarre, Sam Patterson, Arthur Gretton, Massimiliano Pontil:

Conditional mean embeddings as regressors - supplementary. - Yaroub Elloumi, Mohamed Akil, Mohamed Bedoui Hedi:

Timing and Code Size Optimization on Achieving Full Parallelism in Uniform Nested Loops. - Shirin Jalali, Arian Maleki, Richard G. Baraniuk:

Minimum Complexity Pursuit: Stability Analysis. - Ohad Elishco, Haim H. Permuter:

Capacity and coding for the Ising Channel with Feedback. - Jeffrey Knockel, George Saad, Jared Saia:

Self-Healing Algorithms for Byzantine Faults. - Flavien Breuvart:

On the discriminating power of tests in resource lambda-calculus. - Constantinos Panagiotakopoulos, Petroula Tsampouka:

The Role of Weight Shrinking in Large Margin Perceptron Learning. - Leonardo Minora, Jérémy Buisson, Flávio Oquendo, Thaís Vasconcelos Batista:

Issues of Architectural Description Languages for Handling Dynamic Reconfiguration. - Maarten Löffler, Wolfgang Mulzer:

Triangulating the Square and Squaring the Triangle: Quadtrees and Delaunay Triangulations are Equivalent. - Ilknur Icke, Andrew Rosenberg:

Visual and semantic interpretability of projections of high dimensional data for classification tasks. - Matthias Wählisch, Thomas C. Schmidt, Markus Vahlenkamp:

Backscatter from the Data Plane --- Threats to Stability and Security in Information-Centric Networking. - Bernd Bandemer:

An Achievable Rate Region for Three-Pair Interference Channels with Noise. - Chin Keong Ho, Peng Hui Tan, Sumei Sun:

Energy-Efficient Relaying over Multiple Slots with Causal CSI. - André Platzer:

Dynamic Logics of Dynamical Systems. - Andreas Krebs, Howard Straubing:

An effective characterization of the alternation hierarchy in two-variable logic. - Lewis Tseng, Nitin H. Vaidya:

Iterative Approximate Byzantine Consensus under a Generalized Fault Model. - Teodor Mihai Moldovan, Pieter Abbeel:

Safe Exploration in Markov Decision Processes. - Praveen Sivadasan, P. Sojan Lal:

Securing SQLJ Source Codes from Business Logic Disclosure by Data Hiding Obfuscation. - Randall Dougherty, Jack H. Lutz, R. Daniel Mauldin, Jason Teutsch:

Translating the Cantor set by a random. - Somdip Dey:

SD-EQR: A New Technique To Use QR CodesTM in Cryptography. - Bino Sebastian V., A. Unnikrishnan, Kannan Balakrishnan:

Gray Level Co-Occurrence Matrices: Generalisation and Some New Features. - Somdip Dey:

SD-REE: A Cryptographic Method to Exclude Repetition from a Message. - Thomas Degris, Martha White, Richard S. Sutton:

Off-Policy Actor-Critic. - Rahul Vaze, Piyush Gupta:

Bounds on Minimum Number of Anchors for Iterative Localization and its Connections to Bootstrap Percolation. - Michael Huber:

Perfect Secrecy Systems Immune to Spoofing Attacks. - Peter Horák, Otokar Grosek:

Towards a Solution of the Golomb-Welch Conjecture ? - Arash Behboodi, Pablo Piantanida:

Selective Coding Strategy for Unicast Composite Networks. - Gang Liao, Lian Luo, Lei Liu:

Hybrid Parallel Bidirectional Sieve based on SMP Cluster. - Thomas Brihaye, Véronique Bruyère, Julie De Pril:

On Equilibria in Quantitative Games with Reachability/Safety Objectives. - Amit Daniely, Nati Linial, Michael E. Saks:

Clustering is difficult only when it does not matter. - Yonatan Bilu, Amit Daniely, Nati Linial, Michael E. Saks:

On the practically interesting instances of MAXCUT. - Enrico Bozzo, Massimo Franceschet:

Effective and efficient approximations of the generalized inverse of the graph Laplacian matrix with an application to current-flow betweenness centrality. - Adethya Sudarsanan:

CloudPass - a passport system based on Cloud Computing and Near Field Communication. - Preeti Sharma, Monika Saluja, Krishan Kumar Saluja:

Detection techniques of selective forwarding attacks in wireless sensor networks: a survey. - Stephan Arlt, Ishan Banerjee, Cristiano Bertolini, Atif M. Memon, Martin Schäf:

Grey-box GUI Testing: Efficient Generation of Event Sequences. - Philipp Walk, Peter Jung:

Compressed Sensing on the Image of Bilinear Maps. - Shiv Naresh Shivhare

, Saritha Khethawat:
Emotion Detection from Text. - Yufeng Zhang, Zhenbang Chen, Ji Wang:

Speculative Symbolic Execution. - Hong Yu:

A Multiple Access Protocol for Multimedia Transmission over Wireless Networks. - Ahmad Lashgar, Amirali Baniasadi, Ahmad Khonsari:

Investigating Warp Size Impact in GPUs. - Akshara Pande, Vivekanand Pant, Shailendra Nigam:

SubGraD- An Approach for Subgraph Detection. - Arash Einolghozati, Mohsen Sardari, Ahmad Beirami, Faramarz Fekri:

Data Gathering in Networks of Bacteria Colonies: Collective Sensing and Relaying Using Molecular Communication. - Abbas Edalat, Ali Ghoroghi, Georgios Sakellariou:

Multi-games and a double game extension of the Prisoner's Dilemma. - Alan Mink, Anastase Nakassis:

LDPC for QKD Reconciliation. - Arash Einolghozati, Mohsen Sardari, Faramarz Fekri:

Collective Sensing-Capacity of Bacteria Populations. - K. Sreedhar, Y. Sreenivasulu:

Determination of RF source power in WPSN using modulated backscattering. - Arash Einolghozati, Mohsen Sardari, Faramarz Fekri:

Capacity of Diffusion-based Molecular Communication with Ligand Receptors. - M. Hasnat Kabir, Shaikh Enayet Ullah, Mustari Zaman, Md. Golam Rashed

:
Ber analysis of iterative turbo encoded miso wireless communication system under implementation of q-ostbc scheme. - Ajoy Kumar Datta, Anissa Lamani, Lawrence L. Larmore, Franck Petit:

Ring Exploration with Oblivious Myopic Robots. - Mojtaba Vaezi, Fabrice Labeau:

Systematic DFT Frames: Principle and Eigenvalues Structure. - Amrendra Kumar Mishra, H. Chandrasekharan:

Analytical Study of Hexapod miRNAs using Phylogenetic Methods. - Casper Steinmann, Mikael W. Ibsen, Anne S. Hansen, Jan H. Jensen:

FragIt: A Tool to Prepare Input Files for Fragment Based Quantum Chemical Calculations. - Matthew Anderson, Maciej Brodowicz, Hartmut Kaiser, Bryce Adelstein-Lelbach, Thomas L. Sterling:

Neutron Star Evolutions using Tabulated Equations of State with a New Execution Model. - Finley Freibert:

The Classification of Complementary Information Set Codes of Lengths 14 and 16. - Shuo Xiang, Xiaotong Shen, Jieping Ye:

Efficient Sparse Group Feature Selection via Nonconvex Optimization. - Dustin J. Webb, Jur van den Berg:

Kinodynamic RRT*: Optimal Motion Planning for Systems with Linear Differential Constraints. - Vijayalaxmi, Parvataneni Sudhakara Rao, S. Sreehari:

Neural Network Approach for Eye Detection. - Balwinder Sodhi, T. V. Prabhakar:

A Simplified Description of Fuzzy TOPSIS. - Nikolaos Triantafyllou, Petros S. Stefaneas, Panayiotis Frangos:

OTS/CafeOBJ2JML: An attempt to combine Design By Contract with Behavioral Specifications. - Ralph Tanbourgi, Holger Jäkel, Leonid Chaichenets, Friedrich K. Jondral:

Interference and Throughput in Aloha-based Ad Hoc Networks with Isotropic Node Distribution. - Nadya Markin, Frédérique E. Oggier:

Iterated Space-Time Code Constructions from Cyclic Algebras. - Severin Winkler, Jürg Wullschleger:

On the Efficiency of Classical and Quantum Secure Function Evaluation. - Neyre Tekbiyik, Tolga Girici, Elif Uysal-Biyikoglu, Kemal Leblebicioglu:

Proportional Fair Resource Allocation on an Energy Harvesting Downlink - Part I: Structure. - Felix Fontein, Kyle Marshall, Joachim Rosenthal, Davide Schipani, Anna-Lena Trautmann:

On Burst Error Correction and Storage Security of Noisy Data. - Neyre Tekbiyik, Tolga Girici, Elif Uysal-Biyikoglu, Kemal Leblebicioglu:

Proportional Fair Resource Allocation on an Energy Harvesting Downlink - Part II: Algorithms. - Prosenjit Bose, Jean Cardinal, Sébastien Collette, Ferran Hurtado, Matias Korman, Stefan Langerman, Perouz Taslakian:

Coloring and Guarding Arrangements. - Magnús M. Halldórsson, Pradipta Mitra:

Distributed Connectivity of Wireless Networks. - Amir Herzberg, Haya Schulmann:

Security of Patched DNS. - Ashwin Ganesan:

The automorphism group of Cayley graphs generated by connected transposition sets. - Bruno Jobard, Nicolas Ray, Dmitry Sokolov:

Visualizing 2D Flows with Animated Arrow Plots. - Nico Döttling, Rafael Dowsley, Jörn Müller-Quade, Anderson C. A. Nascimento:

A CCA2 Secure Variant of the McEliece Cryptosystem. - Jingjin Yu:

Diameters of Permutation Groups on Graphs, Multi-agent Path Planning, and Integer Multiflow on Directed Acyclic Graphs. - Anil Ada, Omar Fawzi, Hamed Hatami:

Spectral Norm of Symmetric Functions. - Ho Yuet Kwan, Kenneth W. Shum, Chi Wan Sung:

Linear Network Code for Erasure Broadcast Channel with Feedback: Complexity and Algorithms. - Rui Min, Yik-Chung Wu:

Joint Channel Estimation and Data. - Simon J. Gay, Nils Gesbert, António Ravara

, Vasco Thudichum Vasconcelos
:
Modular Session Types for Objects. - Xiang Ren, Zhouchen Lin:

Linearized Alternating Direction Method with Adaptive Penalty and Warm Starts for Fast Solving Transform Invariant Low-Rank Textures. - Ravindra Jain:

A hybrid clustering algorithm for data mining. - Claudio Taranto, Nicola Di Mauro, Floriana Esposito:

Language-Constraint Reachability Learning in Probabilistic Graphs. - Gang Liao, Lei Liu, Lian Luo:

A Adaptive XP-based approach to Agile Development. - Kehao Wang, Lin Chen, Quan Liu, Khaldoun Al Agha:

On Optimality of Myopic Policy for Restless Multi-armed Bandit Problem with Non i.i.d. Arms and Imperfect Detection. - Abuzer Yakaryilmaz:

Turing-equivalent automata using a fixed-size quantum memory. - Deniz Yuret:

FASTSUBS: An Efficient Admissible Algorithm for Finding the Most Likely Lexical Substitutes Using a Statistical Language Model. - Sune Darkner, Jon Sporring:

Locally Orderless Registration. - Michael Hemmer, Michal Kleinbort, Dan Halperin:

Improved Implementation of Point Location in General Two-Dimensional Subdivisions. - Donggun Kim, Junyeong Seo, Youngchul Sung:

Filter-and-Forward Transparent Relay Design for OFDM Systems. - Anna-Lena Trautmann:

Isometry and Automorphisms of Constant Dimension Codes. - Hayato Takahashi:

Algorithmic randomness and stochastic selection function. - Paolo Boldi, Sebastiano Vigna:

Four Degrees of Separation, Really. - Tobias Koch, Alfonso Martinez, Albert Guillen i Fabregas:

The Capacity Loss of Dense Constellations. - Atish Das Sarma, Anisur Rahaman Molla, Gopal Pandurangan:

Fast Distributed Computation in Dynamic Networks via Random Walks. - Jagadeesh Gorla, Stephen Robertson, Jun Wang, Tamas Jambor:

A Theory of Information Matching. - Stefan Ratschan:

Applications of Quantified Constraint Solving over the Reals - Bibliography. - Hanchao Qi, Shannon M. Hughes:

Technical report: Two observations on probability distribution symmetries for randomly-projected data. - Lawrence Ong, Sarah J. Johnson:

The Capacity Region of Restricted Multi-Way Relay Channels with Deterministic Uplinks. - Lawrence Ong, Roy Timo, Sarah J. Johnson:

The Finite Field Multi-Way Relay Channel with Correlated Sources: Beyond Three Users. - Judit Bar-Ilan, Stefanie Haustein, Isabella Peters, Jason Priem, Hadas Shema, Jens Terliesner:

Beyond citations: Scholars' visibility on the social Web. - Caijun Zhong, Tharmalingam Ratnarajah, Shi Jin, Kai-Kit Wong:

Performance Analysis of Optimal Single Stream Beamforming in MIMO Dual-Hop AF Systems. - Md. Monzur Morshed, Md. Arifur Rahman, Salah Uddin Ahmed:

A Literature Review of Code Clone Analysis to Improve Software Maintenance Process. - Roman Zapatrin:

Quantum contextuality in classical information retrieval. - Rahul Vaze:

Transmission Capacity of Wireless Ad Hoc Networks with Energy Harvesting Nodes. - Joan Serrà, Alvaro Corral, Marián Boguñá, Martín Haro, Josep Lluís Arcos:

Measuring the evolution of contemporary western popular music. - Manuel Arora, Gábor Ivanyos, Marek Karpinski, Nitin Saxena:

Deterministic Polynomial Factoring and Association Schemes. - Roberto Gonzalez, Rubén Cuevas, Reza Rejaie, Ángel Cuevas:

Google+ or Google-?: Examining the Popularity of the new OSN. - Norbert Paul:

Signed Simplicial Decomposition and Overlay of n-D Polytope Complexes. - Gladys Chalom, Raul Antonio Ferraz, Marinês Guerreiro, César Polcino Milies:

Minimal Binary Abelian Codes of length $p^m q^n$. - Antonio Tapiador, Diego Carrera, Joaquín Salvachúa:

Tie-RBAC: An application of RBAC to Social Networks. - Ashraf Qadir, William Semke, Jeremiah Neubert:

Implementation of an Onboard Visual Tracking System with Small Unmanned Aerial Vehicle (UAV). - Simone Bova, Hubie Chen, Matthew Valeriote:

Generic Expression Hardness Results for Primitive Positive Formula Comparison. - Muhammad Asim, Tanya Ignatenko, Milan Petkovic, Daniel Trivellato, Nicola Zannone:

Enforcing Access Control in Virtual Organizations Using Hierarchical Attribute-Based Encryption. - Alexandre Bartel, Benoit Baudry, Freddy Muñoz, Jacques Klein, Tejeddine Mouelhi, Yves Le Traon:

Model Driven Mutation Applied to Adaptative Systems Testing. - Yosef Rinott, Marco Scarsini, Yaming Yu:

A Colonel Blotto Gladiator Game. - Roger Penrose:

Foreword: A Computable Universe, Understanding Computation and Exploring Nature As Computation. - Linh Anh Nguyen:

ExpTime Tableaux for the Description Logic SHIQ Based on Global State Caching and Integer Linear Feasibility Checking. - Hieu Duy Nguyen, Rui Zhang, Hon Tat Hui:

Multi-Cell Random Beamforming: Achievable Rate and Degrees of Freedom Region. - Evgeniy A. Timofeev, Alexei Kaltchenko:

Nearest-neighbor Entropy Estimators with Weak Metrics. - Hassan Mehri, Mohammad-Reza Sadeghi:

Construction of LDGM lattices. - B. K. Tripathy, G. K. Panda:

Approximate Equalities on Rough Intuitionistic Fuzzy Sets and an Analysis of Approximate Equalities. - Michele Mazzucco, Martti Vasar, Marlon Dumas:

Squeezing out the Cloud via Profit-Maximizing Resource Allocation Policies. - Brett Hern, Krishna R. Narayanan:

Joint Compute and Forward for the Two Way Relay Channel with Spatially Coupled LDPC Codes. - Carmi Grushko:

A Hough Transform Approach to Solving Linear Min-Max Problems. - Cristiano Torezzan, Sueli I. R. Costa, Vinay A. Vaishampayan:

Constructive spherical codes on layers of flat tori. - Noreddine Gherabi, Mohamed Bahaj:

Robust representation for conversion UML class into XML Document using DOM. - Noreddine Gherabi, Khaoula Addakiri, Mohamed Bahaj:

Mapping relational database into OWL Structure with data semantic preservation. - Noreddine Gherabi, Mohamed Bahaj:

Conversion database of the shapes into XML data for shape matching. - Bruno F. Ribeiro, Prithwish Basu, Don Towsley:

Multiple Random Walks to Uncover Short Paths in Power Law Networks. - Youcheng Lou, Guodong Shi, Karl Henrik Johansson, Yiguang Hong:

An Approximate Projected Consensus Algorithm for Computing Intersection of Convex Sets. - Karl Meinke, Muddassar A. Sindhu:

An n log n Alogrithm for Deterministic Kripke Structure Minimization. - Tichakorn Wongpiromsarn, Tawit Uthaicharoenpong, Yu Wang, Emilio Frazzoli, Danwei Wang:

Distributed Traffic Signal Control for Maximum Network Throughput. - Sung-Tai Choi, Ji-Youp Kim, Jong-Seon No:

On the Cross-Correlation of a $p$-ary m-Sequence and its Decimated Sequences by $d=\frac{p^n+1}{p^k+1}+\frac{p^n-1}{2}$. - Hassania Ouchetto, Ouail Ouchetto, Ounsa Roudiès:

Ontology-oriented e-gov services retrieval. - Diego Fabregat-Traver, Paolo Bientinesi:

A Domain-Specific Compiler for Linear Algebra Operations. - Elham Bahmani, Ghosheh Abed Hodtani:

Achievable Rate Regions for the Dirty Multiple Access Channel with Partial Side Information at the Transmitters. - Sergey Kuniavsky:

Consumer Search with Chain Stores. - Rasoul Ramezanian:

Computation Environments, An Interactive Semantics for Turing Machines (which P is not equal to NP considering it). - Ashutosh Nayyar, Tamer Basar, Demosthenis Teneketzis, Venugopal V. Veeravalli:

Optimal Strategies for Communication and Remote Estimation with an Energy Harvesting Sensor. - Biao Xiang, Enhong Chen, Qi Liu, Hui Xiong, Yu Yang, Junyuan Xie:

A Social Influence Model Based On Circuit Theory. - Martin Tancer, Dmitry Tonkonog:

Good covers are algorithmically unrecognizable. - Anil Aswani, Neal Master, Jay Taneja, Andrew Krioukov, David E. Culler, Claire J. Tomlin:

Quantitative Methods for Comparing Different HVAC Control Schemes. - Muhammad Akram, Wieslaw A. Dudek:

Interval-valued fuzzy graphs. - Li Wei, Youyun Xu, Yueming Cai, Xin Xu:

Robust frequency offset estimator for OFDM over fast varying multipath channel. - Faudziah Ahmad, Fauziah Baharom, Moath Husni:

Current Web Application Development and Measurement Practices for Small Software Firms. - Jan A. Bergstra:

Decision Taking versus Action Determination. - (Withdrawn) Power Consumption in Spatial Cognition.

- Ilan Shomorony, Raúl H. Etkin, Farzad Parvaresh, Amir Salman Avestimehr:

Diamond Networks with Bursty Traffic: Bounds on the Minimum Energy-Per-Bit. - Johann Schuster, Markus Siegle:

Markov Automata: Deciding Weak Bisimulation by means of non-naively Vanishing States. - Cristopher Moore, Alexander Russell:

Optimal epsilon-biased sets with just a little randomness. - Jaewon Yang, Jure Leskovec:

Structure and Overlaps of Communities in Networks. - Md. Selim Reza, Mohammed Shafiul Alam Khan, Md. Golam Rabiul Alam, Serajul Islam:

An Approach of Digital Image Copyright Protection by Using Watermarking Technology. - Jaewon Yang, Jure Leskovec:

Defining and Evaluating Network Communities based on Ground-truth. - Dariusz Dereniowski, Andrzej Pelc:

Leader Election for Anonymous Asynchronous Agents in Arbitrary Networks. - Abbas Mehrabian, Nick Wormald:

On the Stretch Factor of Randomly Embedded Random Graphs. - Van Trung Pham, Thi Ha Duong Phan:

Lattices generated by Chip Firing Game models: characterizations and recognition algorithm. - David J. Wilson, Russell J. Bradford, James H. Davenport:

Speeding up Cylindrical Algebraic Decomposition by Gröbner Bases. - Zuleita Ka Ming Ho, Eduard A. Jorswieck:

Improper Signaling on the Two-user SISO Interference Channel. - Klaus M. Frahm, Alexei D. Chepelianskii, D. L. Shepelyansky:

PageRank of integers. - Thomas Brihaye, Véronique Bruyère, Julie De Pril, Hugo Gimbert:

On Subgame Perfection in Quantitative Reachability Games. - Wenqiang Wang, Tien Tuan Anh Dinh, Hock-Beng Lim, Anwitaman Datta

:
Cloud and the City: Facilitating Flexible Access Control over Data Streams. - Vladimir Kolmogorov, Thomas Schoenemann:

Generalized sequential tree-reweighted message passing. - Akshay Deepak, David Fernández-Baca, Michelle M. McMahon:

Extracting Conflict-free Information from Multi-labeled Trees. - Markus Kimmig, Martin Monperrus, Mira Mezini:

Querying Source Code with Natural Language. - Martin Monperrus, Michael Eichberg, Elif Tekes, Mira Mezini:

What Should Developers Be Aware Of? An Empirical Study on the Directives of API Documentation. - Gérard Burnside, Dohy Hong, Son Nguyen-Kim, Liang Liu:

Publication Induced Research Analysis (PIRA) - Experiments on Real Data. - Ana Granados:

Analysis and study on text representation to improve the accuracy of the Normalized Compression Distance. - (Withdrawn) A Brief Summary of Dictionary Learning Based Approach for Classification.

- Murphy Choy:

Effective Listings of Function Stop words for Twitter. - Davis Arosemena-Trejos, Sérgio Crespo C. S. Pinto, Clifton Clunie:

Forming Teams for Teaching Programming based on Static Code Analysis. - Robert J. Simmons, Bernardo Toninho:

Constructive Provability Logic. - Christine Bachoc, Frank Vallentin, Alberto Passuello:

Bounds for projective codes from semidefinite programming. - Arnab Ghosh, Avishek Ghosh, Arkabandhu Chowdhury, Amit Konar:

An Evolutionary Approach to Drug-Design Using a Novel Neighbourhood Based Genetic Algorithm. - Pierre Nicodème:

Revisiting Waiting Times in DNA evolution. - Plawan Kumar Rath, G. N. Anil:

Proposed Challenges And Areas of Concern in Operating System Research and Development. - Amit Daniely, Sivan Sabato, Shai Shalev-Shwartz:

Multiclass Learning Approaches: A Theoretical Comparison with Implications. 


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID