


default search action
CoRR, November 2012
- Vladimir Vovk:
Venn predictors and isotonic regression. - Qirong Ho, Rong Yan, Rajat Raina, Eric P. Xing:
Understanding the Interaction between Interests, Conversations and Friendships in Facebook. - David I. Shuman, Sunil K. Narang, Pascal Frossard, Antonio Ortega, Pierre Vandergheynst:
Signal Processing on Graphs: Extending High-Dimensional Data Analysis to Networks and Other Irregular Data Domains. - Elkebir Sarhrouni, Ahmed Hammouch, Driss Aboutajdine:
Dimensionality Reduction and Classification Feature Using Mutual Information Applied to Hyperspectral Images: A Wrapper Strategy Algorithm Based on Minimizing the Error Probability Using the Inequality of Fano. - Jeff Linahan:
Improving the Numerical Robustness of Sphere Swept Collision Detection. - Leonid A. Levin:
Randomness and Non-determinism. - Alex Rudnick:
Transition-Based Dependency Parsing With Pluggable Classifiers. - Sodeif Ahadpour, Mahdiyeh Majidpour, Yaser Sadra:
Public key Steganography Using Discrete Cross-Coupled Chaotic Maps. - Sodeif Ahadpour, Yaser Sadra:
A Chaos-based Image Encryption Scheme using Chaotic Coupled Map Lattices. - Peter Beelen, Tom Høholdt, Johan Sebastian Rosenkilde Nielsen, Yingquan Wu:
On Rational-Interpolation Based List-Decoding and List-Decoding Binary Goppa Codes. - Jayakrishnan Unnikrishnan, Martin Vetterli:
Sampling and Reconstruction of Spatial Fields using Mobile Sensors. - Uzay Çetin, Haluk O. Bingol:
Effect of Advertisement to the Simple Recommendation Model. - Barun Gorain, Partha Sarathi Mandal:
Optimal Covering with Mobile Sensors in an Unbounded Region. - Matteo Magnani, Luca Rossi:
Multi-Stratum Networks: toward a unified model of on-line identities. - Herman J. Haverkort:
Harmonious Hilbert curves and other extradimensional space-filling curves. - Matteo Magnani, Danilo Montesi:
Joining relations under discrete uncertainty. - Hao-Hsiang Hung:
Improved Time Complexity of Bandwidth Approximation in Dense Graphs. - Branko Ristic, Jamie Sherrah, Ángel F. García-Fernández:
Performance Evaluation of Random Set Based Pedestrian Tracking Algorithms. - Sathiya Keerthi Selvaraj, Sundararajan Sellamanickam, Shirish K. Shevade:
Extension of TSVM to Multi-Class and Hierarchical Text Classification Problems With General Losses. - Lorena Etcheverry, Alejandro A. Vaisman:
Views over RDF Datasets: A State-of-the-Art and Open Challenges. - Alex Scott, Peter Jeavons, Lei Xu:
Feedback from nature: an optimal distributed algorithm for maximal independent set selection. - Bruno Lopes, Cécilia Englander, Fernanda Lobo, Marcela Cruz:
A new proof of normalization for NS4. - Shi Li, Ola Svensson:
Approximating $k$-Median via Pseudo-Approximation. - Philip Bille, Inge Li Gørtz, Benjamin Sach, Hjalte Wedel Vildhøj:
Time-Space Trade-Offs for Longest Common Extensions. - Emmanuel J. Candès, Carlos Fernandez-Granda:
Super-Resolution from Noisy Data. - Paraskevas V. Lekeas:
A Note on Circular Arc Online Coloring using First Fit. - W. A. Lorenz, Yann Ponty:
Non-redundant random generation algorithms for weighted context-free languages. - Paulo Urriza, Eric Rebeiz, Danijela Cabric:
Multiple Antenna Cyclostationary Spectrum Sensing Based on the Cyclic Correlation Significance Test. - Rami Al-Rfou', William Jannen, Nikhil Patwardhan:
TrackMeNot-so-good-after-all. - Anna C. Gilbert, Jae Young Park, Michael B. Wakin:
Sketched SVD: Recovering Spectral Features from Compressive Measurements. - Rajesh Kumar Tiwari, Gadadhar Sahoo:
Some New Methodologies for Image Hiding using Steganographic Techniques. - Lutz Bornmann, Loet Leydesdorff, Rüdiger Mutz:
The use of percentiles and percentile rank classes in the analysis of bibliometric data: Opportunities and limits. - Mohammad Allahbakhsh, Aleksandar Ignjatovic:
Rating through Voting: An Iterative Method for Robust Rating. - Andreas Björklund:
Below All Subsets for Permutational Counting Problems. - Toni Ernvall, Salim El Rouayheb, Camilla Hollanti, H. Vincent Poor:
Capacity and Security of Heterogeneous Distributed Storage Systems. - Normunds Gruzitis, Gunta Nespore, Baiba Saulite:
Verbalizing Ontologies in Controlled Baltic Languages. - Zhaoxiang Zang, Dehua Li, Junying Wang:
Learning classifier systems with memory condition to solve non-Markov problems. - Simon R. F. Ashton, Peter Sollich:
Learning curves for multi-task Gaussian process regression. - Wei Du, Yongjun Liao, Pierre Geurts, Guy Leduc:
Ordinal Rating of Network Performance and Inference by Matrix Completion. - Christer Bäckström, Peter Jonsson, Sebastian Ordyniak, Stefan Szeider:
Parameterized Complexity and Kernel Bounds for Hard Planning Problems. - Rami Al-Rfou':
Detecting English Writing Styles For Non-native Speakers. - Michael Lampis:
Local Improvement Gives Better Expanders. - Eric Schkufza, Rahul Sharma, Alex Aiken:
Stochastic Superoptimization. - Zubin Bharucha, Emilio Calvanese Strinati, Jiming Chen, Xiaoli Chu
, Afef Feki, Antonio De Domenico, Ana Galindo-Serrano, Weisi Guo, Raymond Kwan, Jimin Liu, David López-Pérez, Massod Maqbool, Ying Peng, Samir Perlaza, Guillaume de la Roche, Serkan Uygungelen, Alvaro Valcarce Rial, Jie Zhang:
Small Cell Deployments: Recent Advances and Research Challenges. - Andreas Klöckner, Timothy Warburton, Jan S. Hesthaven:
High-Order Discontinuous Galerkin Methods by GPU Metaprogramming. - Joel Veness, Martha White, Michael Bowling, András György:
Partition Tree Weighting. - Hadi Saboohi, Sameem Abdul Kareem:
Requirements of a Recovery Solution for Failure of Composite Web Services. - Jie Zhao, Wei Zheng, Li Zhang, Hua Tian:
Segmentation of ultrasound images of thyroid nodule for assisting fine needle aspiration cytology. - Mikhail N. Vyalyi:
On complexity of regular realizability problems. - Aiping Huang, William Zhu:
Matrix approach to rough sets through representable matroids over a field. - Elkebir Sarhrouni, Ahmed Hammouch, Driss Aboutajdine:
Band Selection and Classification of Hyperspectral Images by Minimizing Normalized Mutual Information. - Amit Daniely, Nati Linial, Shai Shalev-Shwartz:
The error rate of learning halfspaces using Kernel-SVMs. - Majid Nezakatolhoseini, Mohammad Amin Taherkhani:
A Framework For Performance Evaluation Of ASIPS In Network-Based IDS. - Hua Ouyang, Niao He, Alexander G. Gray:
Stochastic ADMM for Nonsmooth Optimization. - Pietro Oliva:
Project G.N.O.S.I.S.: Geographical Network Of Synoptic Information System. - Xin Li:
Non-Malleable Condensers for Arbitrary Min-Entropy, and Almost Optimal Protocols for Privacy Amplification. - Elie M. Adam, Munther A. Dahleh, Asuman E. Ozdaglar:
On Threshold Models over Finite Networks. - Moshe Schwartz:
On the Non-existence of Lattice Tilings by Quasi-crosses. - Yukihiro Kamada, Kiyonori Miyasaki:
Generation of Two-Layer Monotonic Functions. - Pascal Koiran, Anastasios Zouzias:
Hidden cliques and the certification of the restricted isometry property. - (Withdrawn) RCA: Efficient Connected Dominated Clustering Algorithm for Mobile Ad Hoc Networks.
- Patrick Oliver Glauner:
Enhancing Invenio Digital Library With An External Relevance Ranking Engine. - George Athanasiou, Leandros Tassiulas:
Dynamic Frequency Management in 802.11-based Multi-Radio Wireless Networks. - Devon Callahan, Paulo Shakarian, Jeffrey Nielsen, Anthony N. Johnson:
Shaping Operations to Attack Robust Terror Networks. - Hatem Herchi, Wahiba Ben Abdessalem:
From user requirements to UML class diagram. - Hadhemi Achour, Wahiba Ben Abdessalem:
An Evaluation of Arabic Language Learning Websites. - Omer Bar-Ilan, Yonina C. Eldar:
Sub-Nyquist Radar via Doppler Focusing. - A Simple Algorithm for Computing BOCP (An Efficient Algorithm for Boolean Operation on Circular-arc Polygons).
- Mohammed Ali Tawfeeq
:
Intelligent Algorithm for Optimum Solutions Based on the Principles of Bat Sonar. - Arron Norwell:
A Threshold For Clusters in Real-World Random Networks. - Shihao Yan, Robert A. Malaney, Ido Nevat, Gareth W. Peters:
Optimal Information-Theoretic Wireless Location Verification. - Indriana Hidayah, Alvi Syahrina
, Adhistya Erna Permanasari:
Student Modeling using Case-Based Reasoning in Conventional Learning System. - Cheng Wang:
Faster Approximation of Max Flow for Directed Graphs. - Junting Chen, Vincent K. N. Lau:
Large Deviation Delay Analysis of Queue-Aware Multi-user MIMO Systems with Multi-timescale Mobile-Driven Feedback. - Lukasz Debowski:
On Hidden Markov Processes with Infinite Excess Entropy. - Aaron Stump, Hans Zantema, Garrin Kimmell, Roba El Haj Omar:
A Rewriting View of Simple Typing. - Yonina C. Eldar, Shahar Mendelson:
Phase Retrieval: Stability and Recovery Guarantees. - Justin Hsu, Aaron Roth, Jonathan R. Ullman:
Differential Privacy for the Analyst via Private Equilibrium Computation. - Brent J. Lance, Scott E. Kerick, Anthony J. Ries, Kelvin S. Oie, Kaleb McDowell:
Brain Computer Interface Technologies in the Coming Decades. - Field Cady:
An Elementary Derivation of Mean Wait Time in Polling Systems. - Frank Hutter, Lin Xu, Holger H. Hoos, Kevin Leyton-Brown:
Algorithm Runtime Prediction: The State of the Art. - Eirina Bourtsoulatze, Nikolaos Thomos, Pascal Frossard:
Decoding Delay Minimization in Inter-Session Network Coding. - Kenneth L. Clarkson, Wolfgang Mulzer, C. Seshadhri:
Self-improving Algorithms for Coordinate-Wise Maxima and Convex Hulls. - Luis M. Lopez-Ramos, Antonio G. Marqués, Javier Ramos:
Jointly Optimal Sensing and Resource Allocation for Multiuser Overlay Cognitive Radios. - Tarun Kumar Sharma, Millie Pant, Ved Pal Singh:
Adaptive Bee Colony in an Artificial Bee Colony for Solving Engineering Design Problems. - Mohammad Allahbakhsh, Aleksandar Ignjatovic, Boualem Benatallah, Amin Beheshti, Norman Foo, Elisa Bertino:
Detecting, Representing and Querying Collusion in Online Rating Systems. - Moritz Hardt, Aaron Roth:
Beyond Worst-Case Analysis in Private Singular Vector Computation. - Valentin Garnero, Ignasi Sau
:
A linear kernel for planar total dominating set. - Quan Geng, Sreeram Kannan, Pramod Viswanath:
Interactive Interference Alignment. - Jelani Nelson, Eric Price, Mary Wootters:
New constructions of RIP matrices with fast multiplication and fewer rows. - Jelani Nelson, Huy L. Nguyen:
Sparsity Lower Bounds for Dimensionality Reducing Maps. - Pranjal Awasthi, Varun Kanade:
Learning using Local Membership Queries under Smooth Distributions. - Anindya De, Elchanan Mossel, Joe Neeman:
Majority is Stablest : Discrete and SoS. - Jelani Nelson, Huy L. Nguyen:
OSNAP: Faster numerical linear algebra algorithms via sparser subspace embeddings. - Haluk O. Bingol, Omer Basar:
Asymmetries of Men and Women in Selecting Partner. - David Kelk, David Devine:
A Scienceographic Comparison of Physics Papers from the arXiv and viXra Archives. - Moritz Hardt, Ankur Moitra:
Can We Reconcile Robustness and Efficiency in Unsupervised Learning? - José Hernández-Orallo:
Soft (Gaussian CDE) regression models and loss functions. - Moslem Noori, Hossein Bagheri, Masoud Ardakani:
Low-Latency Data Sharing in Erasure Multi-Way Relay Channels. - Moritz Hardt, David P. Woodruff:
How Robust are Linear Sketches to Adaptive Inputs? - Maria-Florina Balcan, Philip M. Long:
Active and passive learning of linear separators under log-concave distributions. - Rajendra Kumar Roul, Sanjay Kumar Sahay:
An effective web document clustering for information retrieval. - Daniel M. Kane, Raghu Meka:
A PRG for Lipschitz Functions of Polynomials with Applications to Sparsest Cut. - Vipul K. Dabhi, Sanjay Chaudhary:
A Survey on Techniques of Improving Generalization Ability of Genetic Programming Solutions. - Erik Rodner:
Visual Transfer Learning: Informal Introduction and Literature Overview. - S. Malathi, Sridhar Sundaramoorthy:
Estimation of Effort in Software Cost Analysis for Heterogenous Dataset using Fuzzy Analogy. - Gang Yang, Vincent Yan Fu Tan, Chin Keong Ho, See Ho Ting, Yong Liang Guan:
Wireless Compressive Sensing for Energy Harvesting Sensor Nodes. - Ángel Goñi-Moreno, Martyn Amos:
Discrete modelling of bacterial conjugation dynamics. - Jian Li, Wen Yuan:
Stochastic Combinatorial Optimization via Poisson Approximation. - Lutz Bornmann, Loet Leydesdorff:
The validation of (advanced) bibliometric indicators through peer assessments: A comparative study using data from InCites and F1000. - Hany Nashat Gabra, Ayman M. Bahaa Eldin, Hoda K. Mohamed:
Data Mining Based Technique for IDS Alerts Classification. - Thai Son Hoang:
Proof Hints for Event-B. - Ahmad Beirami, Hamid Nejati:
Chaotic-Map Truly Random Number Generators: Evaluation of Bit-Generation and Post-Processing. - Haruna Isah:
Information and Communication Technology in Combating Counterfeit Drugs. - Jaewook Kang, Heung-No Lee, Kiseon Kim:
Detection-Directed Sparse Estimation using Bayesian Hypothesis Test and Belief Propagation. - Md. Ali Hossain, Ahsan-Ul-Ambia, Md. Aktaruzzaman, Md. Ahaduzzaman Khan:
Implementation of Radon Transformation for Electrical Impedance Tomography (EIT). - Antonio G. Zippo, Giuliana Gelsomino, Sara Nencini, Gabriele E. M. Biella:
Handwritten digit recognition by bio-inspired hierarchical networks. - Emmanuel d'Angelo, Laurent Jacques, Alexandre Alahi, Pierre Vandergheynst:
From Bits to Images: Inversion of Local Binary Descriptors. - Thomas Brihaye, Laurent Doyen, Gilles Geeraerts, Joël Ouaknine, Jean-François Raskin, James Worrell:
Time-bounded Reachability for Hybrid Automata: Complexity and Fixpoints. - Sunirmal Khatua, Nandini Mukherjee:
Application-centric Resource Provisioning for Amazon EC2 Spot Instances. - René van Bevern, Michael R. Fellows, Serge Gaspers, Frances A. Rosamond:
How applying Myhill-Nerode methods to hypergraphs helps mastering the Art of Trellis Decoding. - Daniel Goc, Hamoon Mousavi, Jeffrey O. Shallit:
On the Number of Unbordered Factors. - Fernando Soler-Toscano, Hector Zenil, Jean-Paul Delahaye, Nicolas Gauvrit:
Calculating Kolmogorov Complexity from the Output Frequency Distributions of Small Turing Machines. - László Kozma, Shay Moran:
Shattering, Graph Orientations, and Connectivity. - Vasilis Syrgkanis, Éva Tardos:
Composable and Efficient Mechanisms. - Hossein Jahandideh, Mehrzad Namvar:
Use of PSO in Parameter Estimation of Robot Dynamics; Part Two: Robustness. - Hossein Jahandideh, Mohammad Nooranidoost, Behnam Enghiad, Armin Hajimirzakhani:
Ball Striking Algorithm for a 3 DOF Ping-Pong Playing Robot Based on Particle Swarm Optimization. - Hossein Jahandideh, Mehrzad Namvar:
Use of PSO in Parameter Estimation of Robot Dynamics; Part One: No Need for Parameterization. - Maxim Vashkevich, Alexander A. Petrovsky:
Derivation of fast DCT algorithms using algebraic technique based on Galois theory. - Bata Vasic:
Ordered Statistics Vertex Extraction and Tracing Algorithm (OSVETA). - Andrew D. King, Bruce A. Reed:
A short proof that χ can be bounded ε away from Δ+1 towards ω. - Vijay Manikandan Janakiraman, Dennis Assanis:
Lyapunov Method Based Online Identification of Nonlinear Systems Using Extreme Learning Machines. - Harshad B. Prajapati, Vipul A. Shah:
Advance Reservation based DAG Application Scheduling Simulator for Grid Environment. - (Withdrawn) Underwater Efficient Energy Communication in Wireless Sensor Networks.
- G. Vidhisha, C. Surekha, S. Sanjeeva Rayudu, U. Seshadri:
Preserving privacy for secure and outsourcing for Linear Programming in cloud computing. - Michael Langberg, Dan Vilenchik:
Edge distribution in generalized graph products. - (Withdrawn) Gender Recognition in Walk Gait through 3D Motion by Quadratic Bezier Curve and Statistical Techniques.
- José Miguel Díaz-Báñez, Matias Korman, Pablo Pérez-Lantero, Alexander Pilz, Carlos Seara, Rodrigo I. Silveira:
New results on stabbing segments with a polygon. - Hans L. Bodlaender, Marek Cygan, Stefan Kratsch, Jesper Nederlof:
Solving weighted and counting variants of connectivity problems parameterized by treewidth deterministically in single exponential time. - Marek Cygan, Stefan Kratsch, Jesper Nederlof:
Fast Hamiltonicity checking via bases of perfect matchings. - Matteo Mio
:
Probabilistic modal μ-calculus with independent product. - Naresh Manwani, P. S. Sastry:
K-Plane Regression. - Xiaofei Wang, Mingming Zhang, Liyong Shen, Suixiang Gao:
Explosion prediction of oil gas using SVM and Logistic Regression. - Harold Christopher Burger, Christian J. Schuler, Stefan Harmeling:
Image denoising with multi-layer perceptrons, part 1: comparison with existing algorithms and with bounds. - Bamdev Mishra, K. Adithya Apuroop, Rodolphe Sepulchre:
A Riemannian geometry for low-rank matrix completion. - Harold Christopher Burger, Christian J. Schuler, Stefan Harmeling:
Image denoising with multi-layer perceptrons, part 2: training trade-offs and analysis of their mechanisms. - Michael Hausenblas, Boris Villazón-Terrazas, Richard Cyganiak:
Data Shapes and Data Transformations. - Jarek Duda:
Embedding grayscale halftone pictures in QR Codes using Correction Trees. - Volker Weinberg:
Data-parallel programming with Intel Array Building Blocks (ArBB). - Nicolas Boumal, Amit Singer, Pierre-Antoine Absil, Vincent D. Blondel:
Cramér-Rao bounds for synchronization of rotations. - Jinyuan Chen, Petros Elia:
MISO Broadcast Channel with Delayed and Evolving CSIT. - Syavash Nobarany:
Annotations for Supporting Collaboration through Artifacts. - Sepp Hartung, André Nichterlein:
On the Parameterized and Approximation Hardness of Metric Dimension. - Luca Bortolussi:
Hybrid Behaviour of Markov Population Models. - Jaswinder Singh Dilawari, Ravinder Khanna:
Different Operating Systems Compatible for Image Prepress Process in Color Management: Analysis and Performance Testing. - Yue Wu, Sos S. Agaian, Joseph P. Noonan:
A New Randomness Evaluation Method with Applications to Image Shuffling and Encryption. - Yue Wu, Brian Tracey, Joseph P. Noonan:
James-Stein Type Center Pixel Weights for Non-Local Means Image Denoising. - Prabhanjan Kambadur, Amol Ghoting, Anshul Gupta, Andrew Lumsdaine:
Extending Task Parallelism for Frequent Pattern Mining. - Ashish Khisti:
Secret-Key Agreement Capacity over Reciprocal Fading Channels: A Separation Approach. - Mark Korenblit, Vadim E. Levit:
A One-Vertex Decomposition Algorithm for Generating Algebraic Expressions of Square Rhomboids. - Abdoul Aziz Ciss, Djiby Sow:
Pairings on Generalized Huff Curves. - Boris Leistedt, Jason D. McEwen, Pierre Vandergheynst, Yves Wiaux:
S2LET: A code to perform fast wavelet analysis on the sphere. - Stéphane Ross, Narek Melik-Barkhudarov, Kumar Shaurya Shankar, Andreas Wendel, Debadeepta Dey, J. Andrew Bagnell, Martial Hebert:
Learning Monocular Reactive UAV Control in Cluttered Natural Environments. - Ayman Farahat, Nesreen K. Ahmed, Utpal M. Dholakia:
Does a Daily Deal Promotion Signal a Distressed Business? An Empirical Investigation of Small Business Survival. - Anand Bhalgat, Sreenivas Gollapudi, Kamesh Munagala:
Optimal Auctions via the Multiplicative Weight Method. - Constantinos Daskalakis, Alan Deckelbaum, Christos Tzamos:
The Complexity of Optimal Mechanism Design. - Mikhail Belkin, Luis Rademacher, James R. Voss:
Blind Signal Separation in the Presence of Gaussian Noise. - Anindya De, Ilias Diakonikolas, Rocco A. Servedio:
Inverse problems in approximate uniform generation. - Yeow Meng Chee, Lijun Ji, Han Mao Kiah, Chengmin Wang, Jianxing Yin:
Maximum Distance Separable Codes for Symbol-Pair Read Channels. - Swaprava Nath
, Subrata Mitra:
Linear Antenna Array with Suppressed Sidelobe and Sideband Levels using Time Modulation. - Kanad Basu, Subrata Mitra, Srishti Mukherjee, Weixun Wang:
A Novel Approach for Handling Misbehaving Nodes in Behavior-Aware Mobile Networking. - Abhishek Anand, Sherwin Li:
3D Scene Grammar for Parsing RGB-D Pointclouds. - Olivier Rukundo, Hanqiang Cao:
Nearest Neighbor Value Interpolation. - Iyad Abu Doush, Faisal Alkhateeb, Eslam Al Maghayreh, Izzat Alsmadi, Samer Samarah:
Annotations, Collaborative Tagging, and Searching Mathematics in E-Learning. - Rakesh Kumar Jha, Upena D. Dalal, A. Vishal Wankhade:
Resource Allocation in Mobile WiMAX Network: An Optimal Approach. - Dipti Patil, Vijay M. Wadhai, Mayuri Gund, Richa Biyani, Snehal Andhalkar, Bhagyashree Agrawal:
An Adaptive parameter free data mining approach for healthcare application. - Jiri Kaiser:
Algorithm for Missing Values Imputation in Categorical Data with Use of Association Rules. - Hamdi Hassen, Maher Khemakhem:
A Comparative study of Arabic handwritten characters invariant feature. - Chen Chen, Yun Chen, Yizhi Wang, Na Ding, Jia-Chin Lin, Xiaoyang Zeng, Defeng David Huang:
Accurate Sampling Timing Acquisition for Baseband OFDM Power-line Communication in Non-Gaussian Noise. - Chen Chen, Yun Chen, Xiaoyang Zeng:
Fine Residual Carrier Frequency and Sampling Frequency Estimation in Wireless OFDM Systems. - Herman J. Haverkort, Jeffrey Janssen:
Simple I/O-efficient flow accumulation on grid terrains. - Pierre Vuillemin, Charles Poussot-Vassal, Daniel Alazard:
A Spectral Expression for the Frequency-Limited H2-norm. - Evangelos Markakis, Orestis Telelis:
On the Inefficiency of the Uniform Price Auction. - Mohamed Firdhous
:
Automating Legal Research through Data Mining. - Joost J. Joosten:
On the necessity of complexity. - Sofia Karygianni, Pascal Frossard:
Tangent-based manifold approximation with locally linear models. - Josh Benaloh, Mike Byrne, Philip T. Kortum, Neal McBurnett, Olivier Pereira, Philip B. Stark, Dan S. Wallach:
STAR-Vote: A Secure, Transparent, Auditable, and Reliable Voting System. - Arnab Bhattacharyya, Mark Braverman, Bernard Chazelle, Huy L. Nguyen:
On the Convergence of the Hegselmann-Krause System. - Govinda M. Kamath, N. Prakash, V. Lalitha, P. Vijay Kumar:
Codes with Local Regeneration. - Ryan O'Donnell, Yuan Zhou:
Approximability and proof complexity. - Zhizhen Zhao, Amit Singer:
Fourier-Bessel rotational invariant eigenimages. - Le-Nam Tran, Muhammad Fainan Hanif, Antti Tölli, Markku J. Juntti:
Fast Converging Algorithm for Weighted Sum Rate Maximization in Multicell MISO Downlink. - Ridha Ejbali, Mourad Zaied, Chokri Ben Amar:
Multi-input Multi-output Beta Wavelet Network: Modeling of Acoustic Units for Speech Recognition. - Mohamed Firdhous
:
Multicasting over Overlay Networks A Critical Review. - Mohamed Firdhous
, Ravindi Jayasundara:
A Decision Support Tool for Inferring Further Education Desires of Youth in Sri Lanka. - Paul Accisano, Alper Üngör:
Hardness Results on Curve/Point Set Matching with Fréchet Distance. - Mohamed Firdhous
:
Implementation of Security in Distributed Systems - A Comparative Study. - Mohamed Firdhous
, P. M. Karunaratne:
An ICT Enhanced Life Quality for the Elderly in Developing Countries: Analysis Study Applied to Sri Lanka. - Rehna V. J., M. K. Jeyakumar:
Time Complexity Analysis of Binary Space Partitioning Scheme for Image Compression. - Krishnahari Thouti, S. R. Sathe:
Comparison of OpenMP & OpenCL Parallel Processing Technologies. - Yuan Yao, Hanghang Tong, Xifeng Yan, Feng Xu, Jian Lu:
MaTrust: An Effective Multi-Aspect Trust Inference Model. - Padmanabha Venkatagiri Seshadri, Mun Choon Chan, Wei Tsang Ooi:
Mobile-to-Mobile Video Recommendation. - Chen Xu, Lingyang Song, Zhu Han, Qun Zhao, Xiaoli Wang, Xiang Cheng, Bingli Jiao:
Efficiency Resource Allocation for Device-to-Device Underlay Communication Systems: A Reverse Iterative Combinatorial Auction Based Approach. - Herman J. Haverkort:
I/O-optimal algorithms on grid graphs. - Yang Lu, Mengying Wang, Kenny Q. Zhu, Bo Yuan:
LAGE: A Java Framework to reconstruct Gene Regulatory Networks from Large-Scale Continues Expression Data. - Tianyu Wang, Lingyang Song, Zhu Han, Bingli Jiao:
Dynamic Popular Content Distribution in Vehicular Networks using Coalition Formation Games. - C. J. Prabhakar, P. U. Praveen Kumar:
3D Surface Reconstruction of Underwater Objects. - Arindam Sarkar, J. K. Mandal:
Secured Wireless Communication using Fuzzy Logic based High Speed Public-Key Cryptography (FLHSPKC). - Yann Disser, Andreas Emil Feldmann, Max Klimm, Matús Mihalák:
Improving the $H_k$-Bound on the Price of Stability in Undirected Shapley Network Design Games. - S. Arunkumar, Pallab Kumar Sahu, Sudeep Gorai, Kalyan Ghosh:
Localisation of Numerical Date Field in an Indian Handwritten Document. - Tillmann Miltzow:
Trees in simple Polygons. - Hela Ltifi, Ghada Trabelsi, Mounir Ben Ayed, Adel M. Alimi:
Dynamic Decision Support System Based on Bayesian Networks Application to fight against the Nosocomial Infections. - Mohamed Ben Halima, Hichem Karray, Adel M. Alimi, Ana Fernández Vilas:
NF-SAVO: Neuro-Fuzzy system for Arabic Video OCR. - Mojtaba Vaezi, Fabrice Labeau:
Improved Modeling of the Correlation Between Continuous-Valued Sources in LDPC-Based DSC. - Qiang Huo, Lingyang Song, Yonghui Li, Bingli Jiao:
A Distributed Differential Space-Time Coding Scheme With Analog Network Coding in Two-Way Relay Networks. - Ágnes Cseh:
Paths to stable allocations. - Jan-Philipp W. Kappmeier, Jannik Matuschke, Britta Peis:
Abstract flows over time: A first step towards solving dynamic packing problems. - Ali Eslami, Hossein Pishro-Nik:
On Finite-Length Performance of Polar Codes: Stopping Sets, Error Floor, and Concatenated Design. - Jannik Matuschke, Britta Peis:
Lattices and maximum flow algorithms in planar graphs. - Jesse Read, Luca Martino, David Luengo:
Efficient Monte Carlo Optimization for Multi-label Classifier Chains. - Khalid Raza, Akhilesh Mishra:
A Novel Anticlustering Filtering Algorithm for the Prediction of Genes as a Drug Target. - Daifeng Li, Jingwei Zhang, Gordon Guo-Zheng Sun, Jie Tang, Ying Ding, Zhipeng Luo:
What is the Nature of Tencent Weibo: Detect the Unique Features of Tencent Users. - Ali Eslami, Mohammad Nekoui, Hossein Pishro-Nik, Faramarz Fekri:
Results on Finite Wireless Sensor Networks: Connectivity and Coverage. - Navin Goyal, Luis Rademacher:
Efficient learning of simplices. - Pietro Codara, Ottavio M. D'Antona:
Independent subsets of powers of paths, and Fibonacci cubes. - Fuyuki Ishikawa, Alexander B. Romanovsky:
Proceedings: Workshop on the experience of and advances in developing dependable systems in Event-B (DS-Event-B 2012). - Matthew J. Streeter, H. Brendan McMahan:
No-Regret Algorithms for Unconstrained Online Convex Optimization. - T. Tony Cai, Yihong Wu:
Optimal Detection For Sparse Mixtures. - Yun Kuen Cheung, Richard Cole, Ashish Rastogi:
Tatonnement in Ongoing Markets of Complementary Goods. - B. Venkatalakshmi, S. Shanmugavel:
A Novel Architecture For Network Coded Electronic Health Record Storage System. - Jie Xu, Yu Zhang, Mihaela van der Schaar:
Designing Rating Systems to Promote Mutual Security for Interconnected Networks. - Abhimanu Kumar, Jason Baldridge, Matthew Lease, Joydeep Ghosh:
Dating Texts without Explicit Temporal Cues. - Mohammad Naghshvar, Tara Javidi:
Sequentiality and Adaptivity Gains in Active Hypothesis Testing. - Truong Vinh Truong Duy, Katsuhiro Yamazaki, Kosai Ikegami, Shigeru Oyanagi:
Hybrid MPI-OpenMP Paradigm on SMP Clusters: MPEG-2 Encoder and N-Body Simulation. - Truong Vinh Truong Duy, Katsuhiro Yamazaki, Shigeru Oyanagi:
Performance Evaluation of Treecode Algorithm for N-Body Simulation Using GridRPC System. - Ayan Acharya, Eduardo R. Hruschka, Joydeep Ghosh, Badrul Sarwar, Jean-David Ruvini:
Probabilistic Combination of Classifier and Cluster Ensembles for Non-transductive Learning. - (Withdrawn) Graph isomorphism and automorphism problems are polynomial.
- Roohallah Rastaghi:
An Efficient Encryption Algorithm for P2P Networks Robust Against Man-in-the-Middle Adversary. - Kenneth M. Mackenthun Jr.:
Some aspects of a vector basis for a controllable group system, group code, and group shift. - Amin Milani Fard:
Privacy Preserving Web Query Log Publishing: A Survey on Anonymization Techniques. - (Withdrawn) Genetic Algorithm for Designing a Convenient Facility Layout for a Circular Flow Path.
- Sylvester David Eriksson-Bique, David G. Kirkpatrick, Valentin Polishchuk:
Discrete Dubins Paths. - Ada Wai-Chee Fu, Huanhuan Wu, James Cheng, Shumo Chu, Raymond Chi-Wing Wong:
IS-LABEL: an Independent-Set based Labeling Scheme for Point-to-Point Distance Querying on Large Graphs. - Alistair Sinclair, Piyush Srivastava:
Lee-Yang theorems and the complexity of computing averages. - Cyril Voyant, Marc Muselli, Christophe Paoli, Marie-Laure Nivet:
Hybrid methodology for hourly global radiation forecasting in Mediterranean area. - Emmanuelle Gouillart, Florent Krzakala, Marc Mézard, Lenka Zdeborová:
Belief Propagation Reconstruction for Discrete Tomography. - George B. Mertzios, Paul G. Spirakis:
Strong Bounds for Evolution in Undirected Graphs. - Mohamed Labib Borham, Mostafa-Sami M. Mostafa, Hossam Eldeen Moustafa Shamardan:
MDSA: Modified Distributed Storage Algorithm for Wireless Sensor Networks. - Rayed AlGhamdi, Steve Drew, Thamer Alhussain:
A Conceptual Framework for the Promotion of Trusted Online Retailing Environment in Saudi Arabia. - Rayed AlGhamdi, Steve Drew, Salem Alkhalaf:
Government Initiatives: The Missing Key for E-commerce Growth in KSA. - Rustam Tagiew:
Mining Determinism in Human Strategic Behavior. - Adel A. Bahaddad, Rayed AlGhamdi, Luke Houghton:
To What Extent Would E-mall Enable SMEs to Adopt E-Commerce? - Rayed AlGhamdi, Steve Drew, Waleed Al-Ghaith:
Factors unflinching e-commerce adoption by retailers in Saudi Arabia: Qual Analysis. - Bernhard von Stengel:
Rank-1 Games With Exponentially Many Nash Equilibria. - Osama Alfarraj, Steve Drew, Rayed AlGhamdi:
EGovernment Stage Model: Evaluating the Rate of Web Development Progress of Government Websites in Saudi Arabia. - Rayed AlGhamdi, Anne Nguyen, Jeremy Nguyen, Steve Drew:
Factors influencing the decision of Saudi consumers to purchase form online retailers: Quantitative Analysis. - Mohammed Alshehri, Steve Drew, Thamer Alhussain, Rayed AlGhamdi:
The Effects of Website Quality on Adoption of E-Government Service: AnEmpirical Study Applying UTAUT Model Using SEM. - Waleed Abdullah Al Shehri:
Work Integrated Learning (WIL) In Virtual Reality (VR). - Shaoshi Chen, Frédéric Chyzak, Ruyong Feng, Guofeng Fu, Ziming Li:
On the Existence of Telescopers for Mixed Hypergeometric Terms. - Lanhui Wang, Amit Singer:
Exact and Stable Recovery of Rotations for Robust Synchronization. - Abdelilah Khaled, Mohammed Abdou Janati Idrissi:
A Semi-Structured Tailoring-Driven Approach for ERP Selection. - Luis Gonzalo Sánchez Giraldo, Murali Rao, José C. Príncipe:
Measures of Entropy from Data Using Infinitely Divisible Kernels. - Hossein Azari Soufiani, David C. Parkes, Lirong Xia:
Random Utility Theory for Social Choice. - Giovanni Viglietta:
Guarding and Searching Polyhedra. - Ehsan Karamad, Raviraj Adve, Jerry Chow:
Power Control and Interference Management in Dense Wireless Networks. - Congcong Chen, Jiguo Yu, Xiujuan Zhang:
Edge Dominating Capability based Backbone Construction in Wireless Networks. - Mohamed F. M. Firdhous
, D. L. Basnayake, K. H. L. Kodithuwakku, N. K. Hatthalla, N. W. Charlin, P. M. R. I. K. Bandara:
Route Planning Made Easy - An Automated System for Sri Lanka. - Armin Banaei, Daren B. H. Cline, Costas N. Georghiades, Shuguang Cui:
On Asymptotic Statistics for Geometric Routing Schemes in Wireless Ad-Hoc Networks. - Mojtaba Rahmati, Tolga M. Duman:
A Note on the Deletion Channel Capacity. - Mohamed A. El-Sayed:
A New Algorithm Based Entropic Threshold for Edge Detection in Images. - Petko Valtchev, Omar Mounaouar, Omar Cherkaoui, Alexandar Dimitrov, Laurent Marchand:
FlowME: Lattice-based Traffic Measurement. - Mohamed A. El-Sayed, Tarek Abd El-Hafeez
:
New Edge Detection Technique based on the Shannon Entropy in Gray Level Images. - (Withdrawn) Minimal cost feature selection of data with normal distribution measurement errors.
- Yanchuang Cao, Lihua Wen, Junjie Rong:
A SVD accelerated kernel-independent fast multipole method and its application to BEM. - Muhammad Ziad Nayyer:
Analysis of AODV over increased density and mobility in Intelligent Transportation System. - Fatai Adesina Anifowose:
A Comparative Study of Gaussian Mixture Model and Radial Basis Function for Voice Recognition. - Lok Ming Lui, Ka Chun Lam, Shing-Tung Yau, Xianfeng Gu:
Teichmüller extremal mapping and its applications to landmark matching registration. - Loet Leydesdorff, Filippo Radicchi, Lutz Bornmann, Claudio Castellano, Wouter de Nooy:
Field-normalized Impact Factors: A Comparison of Rescaling versus Fractionally Counted IFs. - Inga A. Ivanova, Loet Leydesdorff:
Rotational Symmetry and the Transformation of Innovation Systems in a Triple Helix of University-Industry-Government Relations. - Hela Limam, Jalel Akaichi:
A semantic cache for enhancing Web services communities activities: Health care case study. - Massimo Bartoletti
, Alceste Scalas
, Emilio Tuosto, Roberto Zunino
:
Honesty by Typing. - Corentin Burnay, Ivan Jureta, Stéphane Faulkner:
Context-driven Elicitation of Default Requirements. - Gábor Erdélyi, Martin Lackner, Andreas Pfandler:
Computational Aspects of Nearly Single-Peaked Electorates. - M. Oguzhan Külekci:
A memory versus compression ratio trade-off in PPM via compressed context modeling. - (Withdrawn) Determining a Loop Material Flow Pattern for Automatic Guided Vehicle Systems on a Facility Layout.
- Arash Rafiey:
Recognizing Interval Bigraphs by Forbidden Patterns. - Clément L. Canonne, Dana Ron, Rocco A. Servedio:
Testing probability distributions using conditional samples. - Aris Anagnostopoulos, Fabrizio Grandoni, Stefano Leonardi, Andreas Wiese:
A Mazing 2+eps Approximation for Unsplittable Flow on a Path. - Varun Gupta, Ana Radovanovic:
Online Stochastic Bin Packing. - Diodato Ferraioli, Carmine Ventre:
Metastability of Potential Games. - Abdur Rahman Bin Shahid, Shahriar Badsha, Md. Rethwan Kabeer, Junaid Ahsan, Mufti Mahmud:
A Non-Blind Watermarking Scheme for Gray Scale Images in Discrete Wavelet Transform Domain using Two Subbands. - Kenza Bouaroudj, Ilham Kitouni, Hiba Hachichi, Djamel-Eddine Saïdouni:
Extending Refusal Testing by Stochastic Refusals for Testing Non-deterministic Systems. - Gary L. Miller, Richard Peng:
Iterative Approaches to Row Sampling. - Norbert Bátfai:
Quantum Consciousness Soccer Simulator. - S. M. Hossein Tabatabaei Yazdi, Serap A. Savari:
On the Relationships among Optimal Symmetric Fix-Free Codes. - Jasine Babu, Ahmad Biniaz, Anil Maheshwari, Michiel H. M. Smid:
Fixed-Orientation Equilateral Triangle Matching of Point Sets. - Rajeswari P. V. N., T. V. Prasad:
Hybrid Systems for Knowledge Representation in Artificial Intelligence. - T. Kameswara Rao, Matta Rajya Lakshmi, T. V. Prasad:
An Exploration on Brain Computer Interface and Its Recent Trends. - Kamlesh Sharma, S. V. A. V. Prasad, T. V. Prasad:
A Hindi Speech Actuated Computer Interface for Web Search. - Vasudha Vashisht, Tanupriya Choudhury, T. V. Prasad:
Sketch Recognition using Domain Classification. - Rashmi Rameshwari, T. V. Prasad:
Systematic and Integrative Analysis of Proteomic Data using Bioinformatics Tools. - Monisha Prabhu, Subhash C. Kak:
Random Sequences from Primitive Pythagorean Triples. - Gwenaël Delaval, Alain Girault, Marc Pouzet:
A Type System for the Automatic Distribution of Higher-order Synchronous Dataflow Programs. - Rayed AlGhamdi, Anne Nguyen, Jeremy Nguyen, Steve Drew:
Factors influencing E-commerce Adoption by Retailers in Saudi Arabia. - (Withdrawn) Compressing 35GB of Data in 35 Pages of Numbers.
- Wahiba Ben Abdessalem Karaa, Nouha Mhimdi:
Using ontology for resume annotation. - Zachary P. Fry, Westley Weimer:
Fault Localization Using Textual Similarities. - Alon Schclar:
Multi-Sensor Fusion via Reduction of Dimensionality. - Maged Hamada Ibrahim:
A Novel Approach to Fully Private and Secure Auction: A Sealed Bid Knapsack Auction. - (Withdrawn) Deep Attribute Networks.
- Ariel Bar, Lior Rokach, Guy Shani, Bracha Shapira, Alon Schclar:
Boosting Simple Collaborative Filtering Models Using Ensemble Methods. - Aly El Gamal, V. Sreekanth Annapureddy, Venugopal V. Veeravalli:
Interference Channels with CoMP: Degrees of Freedom, Message Assignment, and Fractional Reuse. - M. Oguzhan Külekci:
Enumeration of sequences with large alphabets. - (Withdrawn) ATDSR: Trusted On-Demand Routing Protocol based on Agents for Mobile Ad-hoc Networks.
- Hamid Allouch, Idriss Chana, Mostafa Belkasmi:
Iterative decoding of Generalized Parallel Concatenated Block codes using cyclic permutations. - Derek Groen, Joris Borgdorff, Carles Bona-Casas, James Hetherington, Rupert W. Nash, Stefan J. Zasada, Ilya Saverchenko, Mariusz Mamonski, Krzysztof Kurowski, Miguel O. Bernabeu, Alfons G. Hoekstra, Peter V. Coveney:
Flexible composition and execution of high performance, high fidelity multiscale biomedical simulations. - Dan Stowell, Mark D. Plumbley:
Segregating event streams and noise with a Markov renewal process model. - Lazar Berbakov, Carles Antón-Haro, Javier Matamoros:
Optimal Transmission Policy for Cooperative Transmission with Energy Harvesting and Battery Operated Sensor Nodes. - (Withdrawn) A Strongly Grounded Stable Model Semantics for Full Propositional Language.
- Kumar Shashi Prabh:
Near-Optimal Distributed Scheduling Algorithms for Regular Wireless Sensor Networks. - Enrico Franconi, Paolo Guagliardo:
The View Update Problem Revisited. - Jörg Fischer, Achim Hekler, Maxim Dolgov, Uwe D. Hanebeck:
Optimal Sequence-Based LQG Control over TCP-like Networks Subject to Random Transmission Delays and Packet Losses. - Rafael M. Frongillo, Ian A. Kash:
General Truthfulness Characterizations Via Convex Analysis. - Lijun Zhang, Mehrdad Mahdavi, Rong Jin, Tianbao Yang:
Recovering Optimal Solution by Dual Random Projection. - Michelangelo Bucci, Alessandro De Luca, Luca Q. Zamboni:
Reversible Christoffel factorizations. - Pierre Fortin, Mourad Gouicem, Stef Graillat:
Correctly rounding elementary functions on GPU. - Luca Carlone, Andrea Censi:
From Angular Manifolds to the Integer Lattice: Guaranteed Orientation Estimation with Application to Pose Graph Optimization. - Natasha Jonoska, Daria Karpenko:
Active Tile Self-assembly, Self-similar Structures and Recursion. - (Withdrawn) ET-LDA: Joint Topic Modeling for Aligning Events and their Twitter Feedback.
- Martin Cadek, Marek Krcál, Jirí Matousek, Lukás Vokrínek, Uli Wagner:
Polynomial-time computation of homotopy groups and Postnikov systems in fixed dimension. - Ankur A. Kulkarni, Negar Kiyavash:
Non-asymptotic Upper Bounds for Deletion Correcting Codes. - James Powers, Keke Chen:
Secure MapReduce Power Iteration in the Cloud. - Rayed AlGhamdi, Steve Drew:
Seven Key Drivers to Online Retailing Growth in KSA. - Pierre-Olivier Amblard, Olivier J. J. Michel:
The relation between Granger causality and directed information theory: a review. - Theodoros K. Dikaliotis, Alexandros G. Dimakis, Tracey Ho, Michelle Effros:
On the Delay Advantage of Coding in Packet Erasure Networks. - Tao Feng:
A characterization of two-weight projective cyclic codes. - Amir Houmansadr, Wenxuan Zhou, Matthew Caesar, Nikita Borisov:
SWEET: Serving the Web by Exploiting Email Tunnels. - Mohammad Allahbakhsh, Aleksandar Ignjatovic, Boualem Benatallah, Amin Beheshti, Norman Foo, Elisa Bertino:
An Analytic Approach to People Evaluation in Crowdsourcing Systems. - Hadi Minooei, Chaitanya Swamy:
Truthful Mechanism Design for Multidimensional Covering Problems. - Varun Kanade, Zhenming Liu, Bozidar Radunovic:
Distributed Non-Stochastic Experts. - Camelia-Mihaela Pintea, Petrica C. Pop, Mara Hajdu-Macelaru:
Classical hybrid approaches on a transportation problem with gas emissions constraints. - Hatim Hafiddi, Hicham Baidouri, Mahmoud Nassar, Abdelaziz Kriouile:
Context-Awareness for Service Oriented Systems. - Rim Bahroun, Olivier J. J. Michel, F. Frassati, Mikael Carmona, Jean-Louis Lacoume:
Footstep localization using seismic sensors in an indoor environment : SO-TDOA algorithm. - Bojin Zheng, Hongrun Wu, Wenhua Du, Wanneng Shu, Jun Qin:
The Robustness of Scale-free Networks Under Edge Attacks with the Quantitative Analysis. - Qi Wang, Katia Jaffrès-Runser
, Claire Goursaud, Jean-Marie Gorce:
Deriving Pareto-optimal performance bounds for 1 and 2-relay wireless networks. - Carlo A. Furia, Bertrand Meyer, Manuel Oriol, Andrey Tikhomirov, Yi Wei:
The Search for the Laws of Automatic Random Testing. - Rakefet Rozen, Rann Smorodinsky:
Ex-Post Equilibrium and VCG Mechanisms. - Dong-Ming Yan, Peter Wonka:
Gap Processing for Adaptive Maximal Poisson-Disk Sampling. - Tobias Brunsch, Kamiel Cornelissen, Bodo Manthey, Heiko Röglin:
Smoothed Analysis of Belief Propagation for Minimum-Cost Flow and Matching. - Carlo Fischione, George Athanasiou, Fortunato Santucci:
Dynamic Optimization of Generalized Least Squares Handover Algorithms. - Xinping Yi, Sheng Yang, David Gesbert, Mari Kobayashi:
The Degrees of Freedom Region of Temporally-Correlated MIMO Networks with Delayed CSIT. - Jose Texier, Marisa R. De Giusti, Nestor Oviedo, Gonzalo L. Villarreal, Ariel Jorge Lira:
The Benefits of Model-Driven Development in Institutional Repositories - Los Beneficios del Desarrollo Dirigido por Modelos en los Repositorios Institucionales. - C. L. Simons, Jim E. Smith:
A Comparison of Meta-heuristic Search for Interactive Software Design. - Stephan Seufert, Avishek Anand, Srikanta J. Bedathur, Gerhard Weikum:
High-Performance Reachability Query Processing under Index Size Restrictions. - (Withdrawn) Clipping of Arbitrary Polygons with Degeneracies.
- Ahmed Azouaoui, Ahlam Berkani, Mostafa Belkasmi:
An Efficient Soft Decoder of Block Codes Based on Compact Genetic Algorithm. - Bohdan M. Pavlyshenko:
Genetic Optimization of Keywords Subset in the Classification Analysis of Texts Authorship. - Nesreen K. Ahmed, Jennifer Neville, Ramana Rao Kompella:
Network Sampling: From Static to Streaming Graphs. - R. D. Ogden:
The Encoding of Natural Numbers as Nested Parentheses Strings with Associated Probability Distributions. - Aditya Bhaskara, Devendra Desai, Srikanth Srinivasan:
Optimal Hitting Sets for Combinatorial Shapes. - B. Cung, T. Jin, Juan Ramirez, A. Thompson, Christos Boutsidis, Deanna Needell:
Spectral Clustering: An empirical study of Approximation Algorithms and its Application to the Attrition Problem. - Matt Stowe:
Memory Capacity of a Random Neural Network. - Tome Dimovski, Pece Mitrevski:
On the Performance Potential of Connection Fault-Tolerant Commit Processing in Mobile Environment. - Gabriel Ciobanu
:
Proceedings 6th Workshop on Membrane Computing and Biologically Inspired Process Calculi, MeCBIC 2012, Newcastle, UK, 8th September 2012. EPTCS 100, 2012 [contents] - Sandra Alves, Ian Mackie:
Proceedings 2nd International Workshop on Linearity, LINEARITY 2012, Tallinn, Estonia, 1 April 2012. EPTCS 101, 2012 [contents] - Liangzhong Ruan, Vincent K. N. Lau, Moe Z. Win:
The Feasibility Conditions for Interference Alignment in MIMO Networks. - Natalia L. Malinina:
On the principal impossibility to prove P=NP. - Prabath Chaminda Abeysiriwardana, Saluka R. Kodituwakku:
Ontology Based Information Extraction for Disease Intelligence. - Guoxu Zhou, Andrzej Cichocki, Shengli Xie:
Accelerated Canonical Polyadic Decomposition by Using Mode Reduction. - Muhammad Yasir Malik:
Efficient Group Key Management Schemes for Multicast Dynamic Communication Systems. - Derrick Wing Kwan Ng, Robert Schober:
Spectral Efficiency in Large-Scale MIMO-OFDM Systems with Per-Antenna Power Cost. - Chengqing Li, Yuansheng Liu, Tao Xie:
Breaking a novel image encryption scheme based on improved hyperchaotic sequences. - Massimo Bartoletti, Tiziana Cimoli, G. Michele Pinna:
Lending Petri nets and contracts. - Keisuke Goto, Hideo Bannai:
Simpler and Faster Lempel Ziv Factorization. - Tobias Kuhn
:
A Principled Approach to Grammars for Controlled Natural Languages and Predictive Editors. - Silas Alben:
Color scales that are effective in both color and grayscale. - Shuang Li, Zizhan Zheng, Eylem Ekici, Ness B. Shroff:
Maximizing System Throughput Using Cooperative Sensing in Multi-Channel Cognitive Radio Networks. - Luca Canzian, Yuanzhang Xiao, Michele Zorzi, Mihaela van der Schaar:
Pricing and Intervention in Slotted-Aloha: Technical Report. - P. Naga Aswani, K. Chandra Shekar:
Fuzzy Keyword Search over Encrypted Data using Symbol-Based Trie-traverse Search Scheme in Cloud Computing. - Andrew K. Hirsch, Michael R. Clarkson:
Nexus Authorization Logic (NAL): Logical Results. - Alex Graves:
Sequence Transduction with Recurrent Neural Networks. - Athanasios S. Lioumpas, Petros S. Bithas, Angeliki Alexiou:
Partitioning of Distributed MIMO Systems based on Overhead Considerations. - Dionna Amalie Glaze, Matthew Might, David Van Horn:
Optimizing Abstract Abstract Machines. - Chenlu Qiu, Namrata Vaswani, Leslie Hogben:
Recursive Robust PCA or Recursive Sparse Recovery in Large but Structured Noise. - Antonis G. Gotsis, Dimitris Komnakos, Demosthenes Vouyioukas, Philip Constantinou:
Radio Resource Allocation Algorithms for Multi-Service OFDMA Networks: The Uniform Power Loading Scenario. - Li M. Chen:
Determining the Number of Holes of a 2D Digital Component is Easy. - Enrique Nadal, Octavio A. González-Estrada, Juan José Ródenas García, Francisco Javier Fuenmayor Fernández:
Report: Error estimation of recovered solution in FE analysis. - Guillaume Latu, Marina Becoulet, Guilhem Dif-Pradalier, Virginie Grandgirard, Matthias Hoelzl
, G. Huysmans, Xavier Lacoste, Eric Nardon, Francois Orain, Chantal Passeron, Pierre Ramet, Ahmed Ratnani:
Non regression testing for the JOREK code. - Hosung Park, Seokbeom Hong, Jong-Seon No, Dong-Joon Shin:
Construction of High-Rate Regular Quasi-Cyclic LDPC Codes Based on Cyclic Difference Families. - Youhei Akimoto, Yann Ollivier:
Objective Improvement in Information-Geometric Optimization. - Jie Qian, Nafees Qamar:
An experimental evaluation of de-identification tools for electronic health records. - Peter Andras:
A Bayesian Interpretation of the Particle Swarm Optimization and Its Kernel Extension. - Marco Tagliasacchi, Marco Visentini Scarzanella, Pier Luigi Dragotti, Stefano Tubaro:
Transform coder identification based on quantization footprints and lattice theory. - Neelamadhab Padhy, Rasmita Panigrahi:
Multi Relational Data Mining Approaches: A Data Mining Technique. - Edward Moore, Oliver Obst, Mikhail Prokopenko, Peter Wang, Jason Held:
Gliders2012: Development and Competition Results. - Mehdi M. Molu, Norbert Goertz:
Maximum Eigenmode Relaying with statistical Channel State Information at the Relay. - Saad Akram, Jonas Beskow, Hedvig Kjellström:
Visual Recognition of Isolated Swedish Sign Language Signs. - Zhendong Ma, Paul Smith, Florian Skopik:
Towards a Layered Architectural View for Security Analysis in SCADA Systems. - H. Brendan McMahan, Omkar Muralidharan:
On Calibrated Predictions for Auction Selection Mechanisms. - Pavel Metelitsyn:
How to compute the constant term of a power of a Laurent polynomial efficiently. - Jie Wang, Peter Wonka, Jieping Ye:
Lasso Screening Rules via Dual Polytope Projection. - Mohamed Firdhous
, Osman Ghazali, Suhaidi Hassan:
Trust Management in Cloud Computing: A Critical Review. - Greg Szalkowski, Michael L. Nelson:
The Performance of Betting Lines for Predicting the Outcome of NFL Games. - Nikolaos Thomos, Rethnakaran Pulikkoonattu, Pascal Frossard:
Intermediate Performance Analysis of Growth Codes. - Shridhar K. Shah, Herbert G. Tanner, Chetan D. Pahlajani:
Stochastic receding horizon control of nonlinear stochastic systems with probabilistic state constraints. - Xingqin Lin, Jeffrey G. Andrews, Amitava Ghosh:
Modeling, Analysis and Design for Carrier Aggregation in Heterogeneous Cellular Networks. - Martin Sandve Alnæs, Anders Logg, Kristian B. Ølgaard, Marie E. Rognes, Garth N. Wells:
Unified Form Language: A domain-specific language for weak formulations of partial differential equations. - Karim Khalil, Eylem Ekici:
Multiple Access Games with a Cognitive Eavesdropper. - Daniel Cullina, Ankur A. Kulkarni, Negar Kiyavash:
Two Approaches to the Construction of Deletion Correcting Codes: Weight Partitioning and Optimal Colorings. - Borhan Molazem Sanandaji, Michael B. Wakin, Tyrone L. Vincent:
Observability with Random Observations. - Theodoros K. Dikaliotis, Hongyi Yao, Tracey Ho, Michelle Effros, Jörg Kliewer:
Network Equivalence in the Presence of an Eavesdropper. - Jetty Kleijn, Maciej Koutny, Marta Pietkiewicz-Koutny, Grzegorz Rozenberg:
Membrane Systems and Petri Net Synthesis. 1-13 - Margarita Antonaki, Anna Philippou:
A Process Calculus for Spatially-explicit Ecological Models. 14-28 - Erik P. de Vink, Hans Zantema, Dragan Bosnacki:
Combining Insertion and Deletion in RNA-editing Preserves Regularity. 48-62 - Peter Drábik, Andrea Maggiolo-Schettini, Paolo Milazzo:
Towards modular verification of pathways: fairness and assumptions. 63-81 - Marino Miculan
, Ilaria Sambarino:
Implementing the Stochastics Brane Calculus in a Generic Stochastic Abstract Machine. 82-100 - Masahiro Hamano
:
RNA interference and Register Machines (extended abstract). 107-112 - Maurizio Dominici, Simona Ronchi Della Rocca, Paolo Tranquilli:
Standardization in resource lambda-calculus. 1-11 - Maribel Fernández, Sébastien Maulat:
Higher-order port-graph rewriting. 25-37 - Pedro Baltazar, Dimitris Mostrous, Vasco Thudichum Vasconcelos:
Linearly Refined Session Types. 38-49 - Yuxin Deng, Iliano Cervesato, Robert J. Simmons:
Relating Reasoning Methodologies in Linear Logic and Process Algebra. 50-60 - Gang Liao, Si-hui Qin, Longfei Ma, Qi Sun:
Optimizing Synchronization Algorithm for Auto-parallelizing Compiler. - Eugen Jiresch:
Extending the Interaction Nets Calculus by Generic Rules. 12-24 - Ivan Guo:
Unilaterally Competitive Multi-Player Stopping Games. - Franz J. Király, Louis Theran, Ryota Tomioka, Takeaki Uno:
The Algebraic Combinatorial Approach for Low-Rank Matrix Completion. - Zilong Xu, Fan Min, William Zhu:
Cost-sensitive C4.5 with post-pruning and competition. - Amit K. Chopra, Munindar P. Singh:
Interaction-Oriented Software Engineering: Concepts and Principles. - Xiaoqiang Zhou, Qingguo Li:
Some new similarity measures for hesitant fuzzy sets and their applications in multiple attribute decision making. - Ibrahim El Bitar, Fatima-Zahra Belouadha, Ounsa Roudiès:
A Logic and Adaptive Approach for Efficient Diagnosis Systems using CBR. - Morteza Zadimoghaddam, Aaron Roth:
Efficiently Learning from Revealed Preference. - Ae-Lim Ahn, Éric Laporte
, Jee-Sun Nam:
Semantic Polarity of Adjectival Predicates in Online Reviews. - Yuanzhang Xiao, Mihaela van der Schaar:
Energy-Efficient Nonstationary Spectrum Sharing. - Fengrong Zhang, Claude Carlet, Yupu Hu, Wenzheng Zhang:
Secondary Constructions of Bent Functions and Highly Nonlinear Resilient Functions. - Yong Zeng, Xiaoli Xu, Yong Liang Guan, Erry Gunawan:
On the Achievable Degrees of Freedom for the 3-User Rank-Deficient MIMO Interference Channel. - Enrico Magli, Mea Wang, Pascal Frossard, Athina Markopoulou:
Network Coding Meets Multimedia: a Review. - Juho Park, Youngchul Sung:
On the Pareto-Optimal Beam Structure and Design for Multi-User MIMO Interference Channels. - Natalia B. Melnikova, Valeria V. Krzhizhanovskaya, Peter M. A. Sloot:
Modeling Earthen Dike Stability: Sensitivity Analysis and Automatic Calibration of Diffusivities Based on Live Sensor Data. - Rivindu Perera:
Education for All: Remote testing system with gesture recognition and recording. - Charanpal Dhanjal, Sandrine Blanchemanche, Stéphan Clémençon, Ákos Róna-Tas, Fabrice Rossi:
Dissemination of Health Information within Social Networks. - Guillaume Alain, Yoshua Bengio, Salah Rifai:
Regularized Auto-Encoders Estimate Local Statistics. - Ravi Tandon, Syed Ali Jafar, Shlomo Shamai:
Minimum CSIT to achieve Maximum Degrees of Freedom for the MISO BC. - Matthew Andrews, Lisa Zhang:
Multi-Carrier Multi-Rate Utility Optimization in Heterogeneous Networks via CSMA-Based Algorithms. - Kunal N. Chaudhury, Amit Singer:
Non-Local Patch Regression: Robust Image Denoising in Patch Space. - David F. Gleich, Ryan A. Rossi:
A Dynamical System for PageRank with Time-Dependent Teleportation. - Haichuan Zhou, Tharm Ratnarajah:
On Achievable Schemes of Interference Alignment in Constant Channels via Finite Amplify-and-Forward Relays. - Haichuan Zhou, Tharm Ratnarajah:
Close-Form Design of Antenna-Constrained Multi-Cell Multi-User Downlink Interference Alignment. - Haichuan Zhou, Tharm Ratnarajah:
On Achievable Schemes of Interference Alignment with Double-Layered Symbol Extensions in Interference Channel. - Loc Tran:
Application of three graph Laplacian based semi-supervised learning methods to protein function prediction problem. - Muntasir Raihan Rahman, Wojciech M. Golab, Alvin AuYoung, Kimberly Keeton, Jay J. Wylie:
Toward a Principled Framework for Benchmarking Consistency. - Jian Wang, Byonghyo Shim:
Improved Recovery Bounds of Orthogonal Matching Pursuit using Restricted Isometry Property. - Nuzhat Tasneem Awon, Md. Ashraful Islam
, Md. Mizanur Rahman, A. Z. M. Touhidul Islam:
Effect of AWGN & Fading (Raleigh & Rician) channels on BER performance of a WiMAX communication System. - Han Li, Kun Gai, Pinghua Gong, Changshui Zhang:
Efficient Superimposition Recovering Algorithm. - Shams Zawoad, Ragib Hasan:
I Have the Proof: Providing Proofs of Past Data Possession in Cloud Forensics. - Ye Liang:
Real root refinements for univariate polynomial equations. - Fedor Dzerzhinskiy:
How many software engineering professionals hold this certificate? - Elahe Moghimi Hanjani, Mahdi Javanmard:
An Algorithm for Optimized Searching using NON-Overlapping Iterative Neighbor intervals. - Osama El-Sayed Sheta, Ahmed Nour Eldeen:
Building a health care data warehouse for cancer diseases. - Chenxi Hao, Bruno Clerckx:
Degrees-of-Freedom Region of Time Correlated MISO Broadcast Channel with Perfect Delayed CSIT and Asymmetric Partial Current CSIT. - Jan Oksanen, Visa Koivunen, H. Vincent Poor:
A Sensing Policy Based on Confidence Bounds and a Restless Multi-Armed Bandit Model. - Vivek Shrivastava, Navdeep Sharma:
Artificial Neural Network Based Optical Character Recognition. - Du Ho Kang, Ki Won Sung, Jens Zander:
Cost Efficient High Capacity Indoor Wireless Access: Denser Wi-Fi or Coordinated Pico-cellular? - Emmanouil A. Platanios, Sotirios P. Chatzis:
A Mixture Gaussian Process Conditional Heteroscedasticity Model with Power-Law Nature. - Joaquín Keller, Raluca Diaconu, Mathieu Valero:
Towards a Scalable Dynamic Spatial Database System. - Chung-Chieh Fang:
Discrete-Time Poles and Dynamics of Discontinuous Mode Boost and Buck Converters Under Various Control Schemes. - Sergey V. Ivanov, Alexander Boukhanovsky, Peter M. A. Sloot:
Continuous Models of Epidemic Spreading in Heterogeneous Dynamically Changing Random Networks. - Baigong Zheng, Yuansheng Yang, Xirong Xu:
An upper bound for the crossing number of bubble-sort graph Bn. - Yuansheng Yang, Baigong Zheng, Xiaohui Lin, Xirong Xu:
The crossing numbers of Kn,n - nK2, Kn × P2, Kn × P3 and Kn × C4. - Yuansheng Yang, Baigong Zheng, Xirong Xu:
The crossing number of the generalized Petersen graph P(10, 3) is six. - B. Santhana Krishnan, Animesh Kumar, D. Manjunath, Bikash Kumar Dey:
On the Separability of Targets Using Binary Proximity Sensors. - Sai Suhas Balabadrapatruni:
Performance Evaluation of DOA Estimation using MATLAB. - Demosthenes Vouyioukas:
Efficient Spectrum Sharing in the Presence of Multiple Narrowband Interference. - C. D. Erdbrink, Valeria V. Krzhizhanovskaya, Peter M. A. Sloot:
Free-surface flow simulations for discharge-based operation of hydraulic structure gates. - Carlo A. Furia, Bertrand Meyer, Sergey Velder:
A survey of loop invariants. - Lian Lu, Jinlong Tu, Chi-Kin Chau, Minghua Chen, Xiaojun Lin:
Online Energy Generation Scheduling for Microgrids with Intermittent Energy Sources and Co-Generation. - Angelika Kimmig, Guy Van den Broeck, Luc De Raedt:
Algebraic Model Counting. - Massimiliano Di Ventra, Yuriy V. Pershin:
Memcomputing: a computing paradigm to store and process information on the same physical platform. - Jessica C. Ramírez, Yuji Matsumoto:
A Rule-Based Approach For Aligning Japanese-Spanish Sentences From A Comparable Corpora. - Monowar H. Bhuyan, D. K. Bhattacharyya, Jugal K. Kalita:
Survey on Incremental Approaches for Network Anomaly Detection. - Boshra Rajaei, Thomas Maugey, Hamid Reza Pourreza, Pascal Frossard:
Rate-Distortion Analysis of Multiview Coding in a DIBR Framework. - Joost Broekens, Chao Qu, Willem-Paul Brinkman:
Dynamic Facial Expression of Emotion Made Easy. - Monowar H. Bhuyan, D. K. Bhattacharyya:
An Effective Fingerprint Classification and Search Method. - Nika Salia, Alexander Gamkrelidze, Lasha Ephremidze:
Numerical comparison of different algorithms for construction of wavelet matrices. - Zhenliang Zhang, Edwin K. P. Chong, Ali Pezeshki, William Moran:
Sequential Hypothesis Testing with Broadcast Failures. - Chuan Zhang, Gerhard Dangelmayr, Iuliana Oprea:
Storing cycles in Hopfield-type networks with pseudoinverse learning rule: admissibility and network topology. - Tyler Clemons, S. M. Faisal, Shirish Tatikonda, Charu C. Aggarwal, Srinivasan Parthasarathy:
Hash in a Flash: Hash Tables for Solid State Devices. - Mohammad Javad Parseh, Saeid Pashazadeh:
Applying Dynamic Model for Multiple Manoeuvring Target Tracking Using Particle Filtering. - Mark Burgin, Gordana Dodig-Crnkovic:
From the Closed Classical Algorithmic Universe to an Open World of Algorithmic Constellations. - Gabriel Synnaeve, Pierre Bessière
:
A Dataset for StarCraft AI & an Example of Armies Clustering. - Krishnamurthy Dvijotham, Michael Chertkov, Scott Backhaus:
Distributed Control of Generation in a Transmission Grid with a High Penetration of Renewables. - Anil Maheshwari, Jörg-Rüdiger Sack, Kaveh Shahbaz:
Visiting All Sites with Your Dog. - Firas A. Jassim, Hind E. Qassim:
Five Modulus Method For Image Compression. - Nicolas Kourtellis, Jeremy Blackburn, Cristian Borcea, Adriana Iamnitchi:
Enabling Social Applications via Decentralized Social Data Management. - (Withdrawn) Single Exponential FPT Algorithm for Interval Vertex Deletion and Interval Completion Problem.
- Yuansheng Yang, Baigong Zheng, Xirong Xu, Xiaohui Lin:
The crossing numbers of Km × Pn and Km × Cn. - Yuansheng Yang, Bo Lv, Baigong Zheng, Xirong Xu, Ke Zhang:
The crossing number of pancake graph P4 is six. - Ashish Khisti, Dongye Zhang:
Artificial-Noise Alignment for Secure Multicast using Multiple Antennas. - François Laroussinie, Antoine Meyer
, Eudes Petonnet:
Counting CTL. - Suprativ Saha, Rituparna Chaki:
Application of Data mining in Protein sequence Classification. - Chen Chen, Yeqing Li, Junzhou Huang:
Learning with Forest Sparsity. - Monowar H. Bhuyan, Sarat Saharia, Dhruba K. Bhattacharyya:
An Effective Method for Fingerprint Classification. - Leonidas Georgiadis, Georgios S. Paschos, Lavy Libman, Leandros Tassiulas:
Minimal Evacuation Times and Stability. - Hoi-To Wai, Wing-Kin Ma:
A Decentralized Method for Joint Admission Control and Beamforming in Coordinated Multicell Downlink. - Rahul Vaze, Chandra R. Murthy:
On Whitespace Identification Using Randomly Deployed Sensors. - B. V. Patel, B. B. Meshram:
Content based video retrieval. - Smitha N. Pai, K. C. Shet, H. S. Mruthyunjaya:
Energy Aware Path Search for Sensor with parameters as used in agricultural field. - Dominik Herrmann, Christine Arndt, Hannes Federrath:
IPv6 Prefix Alteration: An Opportunity to Improve Online Privacy. - Manjula Shenoy K., K. C. Shet, U. Dinesh Acharya:
Secured Ontology Mapping. - Manjula Shenoy K., K. C. Shet, U. Dinesh Acharya:
A New Similarity Measure for Taxonomy Based on Edge Counting. - Priscill Orue-Esquivel, Bartolomé Rubio:
WiSANCloud: a set of UML-based specifications for the integration of Wireless Sensor and Actor Networks (WSANs) with the Cloud Computing. - Arindam Sarkar, J. K. Mandal:
Key Generation and Certification using Multilayer Perceptron in Wireless communication(KGCMLP). - Hajime Matsui:
Lemma for Linear Feedback Shift Registers and DFTs Applied to Affine Variety Codes. - Ralph Tanbourgi, Holger Jäkel, Friedrich K. Jondral:
Interference and Throughput in Poisson Networks with Isotropically distributed Nodes. - Dongni Ren, S.-H. Gary Chan, Gene Cheung, H. Vicky Zhao, Pascal Frossard:
Collaborative P2P Streaming of Interactive Live Free Viewpoint Video. - Ganesh Sundaramoorthi, Yanchao Yang:
Matching Through Features and Features Through Matching. - H.-Christian Estler, Marco Piccioni, Carlo A. Furia, Martin Nordio, Bertrand Meyer:
How Specifications Change and Why You Should Care. - Adriana B. Compagnoni, Mariangiola Dezani-Ciancaglini
, Paola Giannini
, Karin Sauer, Vishakha Sharma, Angelo Troina:
Parallel BioScape: A Stochastic and Parallel Language for Mobile and Spatial Interactions. 101-106 - Louis J. Dijkstra, Andrei V. Yakushev, P. A. C. Duijn, Alexander Boukhanovsky, Peter M. A. Sloot:
Inference of the Russian drug community from one of the largest social networks in the Russian Federation. - Sangwoo Park, Erchin Serpedin, Khalid A. Qaraqe:
A Unifying Variational Perspective on Some Fundamental Information Theoretic Inequalities. - Erwan Abgrall, Yves Le Traon, Martin Monperrus, Sylvain Gombault, Mario Heiderich, Alain Ribault:
XSS-FP: Browser Fingerprinting using HTML Parser Quirks. - Mohamed Farag:
An Insight View of Kernel Visual Debugger in System Boot up. - Mohamed Farag:
Multicore Dynamic Kernel Modules Attachment Technique for Kernel Performance Enhancement. - Sangwoo Park, Erchin Serpedin, Khalid A. Qaraqe:
Gaussian Assumption: the Least Favorable but the Most Useful. - Gwenaël Joret, Adrian Vetta:
Reducing the rank of a matroid. - Oscar Beijbom:
Domain Adaptations for Computer Vision Applications. - Salman Habib, Vitali A. Morozov, Hal Finkel, Adrian Pope, Katrin Heitmann, Kalyan Kumaran, Tom Peterka, Joseph A. Insley, David Daniel, Patricia K. Fasel, Nicholas Frontiere, Zarija Lukic:
The Universe at Extreme Scale: Multi-Petaflop Sky Simulation on the BG/Q. - Suprativ Saha, Rituparna Chaki:
A Brief Review of Data Mining Application Involving Protein Sequence Classification. - Faîçal Felhi, Jalel Akaichi:
Adaptation of Web services to the context based on workflow: Approach for self-adaptation of service-oriented architectures to the context. - Tuhin Sahai, Stefan Klus, Michael Dellnitz:
A Traveling Salesman Learns Bayesian Networks. - Greg Ver Steeg, Aram Galstyan:
Statistical Tests for Contagion in Observational Social Network Studies. - Fernando Soler-Toscano, Hector Zenil, Jean-Paul Delahaye, Nicolas Gauvrit:
Correspondence and Independence of Numerical Evaluations of Algorithmic Information Measures. - Oleksandr Manzyuk, Barak A. Pearlmutter
, Alexey Andreyevich Radul, David R. Rush, Jeffrey Mark Siskind:
Confusion of Tagged Perturbations in Forward Automatic Differentiation of Higher-Order Functions. - Luís Pedro Coelho:
Mahotas: Open source software for scriptable computer vision. - Benyuan Liu, Zhilin Zhang, Hongqi Fan, Zaiqi Lu, Qiang Fu:
Fast Marginalized Block SBL Algorithm. - Xi Chen, Dimitris Paparas, Mihalis Yannakakis:
The Complexity of Non-Monotone Markets. - Sergey Bereg, Timothy Rozario:
Angle Optimization of Graphs Embedded in the Plane. - Trung Van Nguyen, Alice Oh:
Summarizing Reviews with Variable-length Syntactic Patterns and Topic Models. - Keehang Kwon, Dae-Seong Kang:
Mutually Exclusive Rules in LogicWeb. - Muhammad Nazmul Islam, Byoung-Jo J. Kim, Paul S. Henry, Eric Rozner:
A Wireless Channel Sounding System for Rapid Propagation Measurements. - Shinnosuke Seki, Yasushi Okuno:
On the behavior of tile assembly system at high temperatures. - Antonio Pisasale, Domenico Cantone:
An Experiment on the Connection between the DLs' Family DL<ForAllPiZero> and the Real World. - S. Narendhar, T. Amudha:
A Hybrid Bacterial Foraging Algorithm For Solving Job Shop Scheduling Problems. - Akitoshi Kawamura, Norbert Th. Müller, Carsten Rösnick, Martin Ziegler:
Parameterized Uniform Complexity in Numerics: from Smooth to Analytic, from NP-hard to Polytime. - Benjamin T. H. Varcoe:
Channel Independent Cryptographic Key Distribution. - Sonja Kabicher-Fuchs, Stefanie Rinderle-Ma, Jan Recker, Marta Indulska, François Charoy, Rob Christiaanse
, Reinhold Dunkl, Gregor Grambow, Jens Kolb, Henrik Leopold, Jan Mendling:
Human-Centric Process-Aware Information Systems (HC-PAIS). - Amin Beheshti, Hamid R. Motahari Nezhad, Boualem Benatallah:
Temporal Provenance Model (TPM): Model and Query Language. - Federico Clazzer, Christian Kissling:
Enhanced Contention Resolution Aloha - ECRA. - Marcin Kaminski, Lukasz Kowalik:
Beyond the Vizing's bound for at most seven colors. - Osvaldo Skliar, Ricardo E. Monge
, Sherry Gapper, Guillermo Oviedo:
A Mathematical Random Number Generator (MRNG). - Mohammad Golbabaee, Pierre Vandergheynst:
Compressed Sensing of Simultaneous Low-Rank and Joint-Sparse Matrices. - Lorenzo Fagiano, Khanh Huynh, Bassam Bamieh, Mustafa Khammash:
On sensor fusion for airborne wind energy systems. - Razvan Pascanu, Tomás Mikolov, Yoshua Bengio:
Understanding the exploding gradient problem. - Puripong Suthisopapan, Kenta Kasai, Anupap Meesomboon, Virasit Imtawil:
Approaching the Capacity of Large-Scale MIMO Systems via Non-Binary LDPC Codes. - Poonam Jindal, Brahmjit Singh:
Study And Performance Evaluation Of Security-Throughput Tradeoff With Link Adaptive Encryption Scheme. - Haitao Wang, Wuzhou Zhang:
The L1 Nearest Neighbor Searching with Uncertain Queries. - Jörg Fischer, Marc Reinhardt, Uwe D. Hanebeck:
Optimal Sequence-Based Control and Estimation of Networked Linear Systems. - (Withdrawn) Scaling Genetic Programming for Source Code Modification.
- Lena Schlipf:
Notes on Convex Transversals. - Maxime Crochemore, Alessio Langiu, Filippo Mignosi:
The Rightmost Equal-Cost Position Problem. - Fotis Foukalas, Tamer Khattab:
To Relay or Not To Relay in Cognitive Radio Sensor Networks. - Edin H. Mulalic, Miomir S. Stankovic, Radomir S. Stankovic:
Memoization technique for optimizing functions with stochastic input. - Chaabane Abdelberi, Emiliano De Cristofaro, Mohamed Ali Kâafar, Ersin Uzun:
Privacy in Content-Oriented Networking: Threats and Countermeasures. - Zhuojie Zhou, Nan Zhang, Zhiguo Gong, Gautam Das:
Faster Random Walks By Rewiring Online Social Networks On-The-Fly. - Karthik H. Shankar, Marc W. Howard:
Optimally fuzzy scale-free memory. - Radu Mardare, Luca Cardelli
, Kim G. Larsen
:
Continuous Markovian Logics - Axiomatization and Quantified Metatheory. - Jin-Taek Seong, Heung-No Lee:
On the Compressed Measurements over Finite Fields: Sparse or Dense Sampling. - Reza Malekian, Abdul Hanan Abdullah:
Traffic Engineering Based on Effective Envelope Algorithm on Novel Resource Reservation Method over Mobile Internet Protocol Version 6. - Vishnuvardhan Mannava, T. Ramesh:
Service Composition Design Pattern for Autonomic Computing Systems using Association Rule based Learning and Service-Oriented Architecture. - Sergios Theodoridis, Yannis Kopsinis, Konstantinos Slavakis:
Sparsity-Aware Learning and Compressed Sensing: An Overview. - Chaitali Biswas Dutta, Partha Garai, Amitabha Sinha:
Design Of A Reconfigurable DSP Processor With Bit Efficient Residue Number System. - Ángel del Río, Josep Rifà:
Families of Hadamard Z2Z4Q8-codes. - Shun Watanabe, Masahito Hayashi:
Non-Asymptotic Analysis of Privacy Amplification via Renyi Entropy and Inf-Spectral Entropy. - Anudhyan Boral, Sylvain Schmitz:
PDL Model Checking of Parse Forests. - Josep Rifà, Victor A. Zinoviev:
On two families of binary quadratic bent functions. - Prateek Karandikar, Sylvain Schmitz:
The Parametric Ordinal-Recursive Complexity of Post Embedding Problems. - Ryuhei Mori, Toshiyuki Tanaka:
Source and Channel Polarization over Finite Fields and Reed-Solomon Matrix. - (Withdrawn) DNF-AF Selection Two-Way Relaying.
- Miguel O. Bernabeu, Rupert W. Nash, Derek Groen, Hywel B. Carver, James Hetherington, Timm Krüger, Peter V. Coveney:
Choice of blood rheology model has minor impact on computational assessment of shear stress mediated vascular risk. - Hector Zenil:
What is Nature-like Computation? A Behavioural Approach and a Notion of Programmability. - Yannick Viossat:
Game Dynamics and Nash Equilibria. - Maxime Crochemore, Alessio Langiu, Filippo Mignosi:
Note on the Greedy Parsing Optimality for Dictionary-Based Text Compression. - Roberto Konow, Gonzalo Navarro:
Faster Compact Top-k Document Retrieval. - Raka Kundu, Amlan Chakrabarti, Prasanna Kumar Lenka:
Cobb Angle Measurement of Scoliosis with Reduced Variability. - Sophia Athanasiadou, Marios Gatzianas, Leonidas Georgiadis, Leandros Tassiulas:
Stable XOR-based Policies for the Broadcast Erasure Channel with Feedback. - Tai-Yu Ma:
A hybrid cross entropy algorithm for solving dynamic transit network design problem. - Paul de Kerret, David Gesbert:
Interference Alignment with Incomplete CSIT Sharing. - Gabriele Fici, Thierry Lecroq, Arnaud Lefebvre, Élise Prieur-Gaston:
Algorithms for Computing Abelian Periods of Words. - Gerard Briscoe, Philippe De Wilde:
Ecosystem-Oriented Distributed Evolutionary Computing. - Gerard Briscoe, Krista Keranen, Glenn C. Parry:
Understanding Complex Service Systems Through Different Lenses: An Overview. - Nihar B. Shah, Kangwook Lee, Kannan Ramchandran:
The MDS Queue. - Irene C. L. Ng, Gerard Briscoe:
Value, Variety and Viability: New Business Models for Co-Creation in Outcome-based Contracts. - Daniel J. Hsu, Sham M. Kakade, Tong Zhang:
Analysis of a randomized approximation scheme for matrix multiplication. - D. Roselin Selvarani, T. N. Ravi:
A survey on data and transaction management in mobile databases. - Tian Zhang, Wei Chen, Zhu Han, Zhigang Cao:
A Cross-layer Perspective on Energy Harvesting Aided Green Communications over Fading Channels. - Emanuele Giaquinta, Szymon Grabowski, Kimmo Fredriksson:
Approximate pattern matching with k-mismatches in packed text. - Christopher Henard, Mike Papadakis, Gilles Perrouin
, Jacques Klein, Patrick Heymans, Yves Le Traon:
Bypassing the Combinatorial Explosion: Using Similarity to Generate and Prioritize T-wise Test Suites for Large Software Product Lines. - Bojin Zheng, Deyi Li, Guisheng Chen, Wenhua Du, Jianmin Wang:
Ranking the Importance of Nodes of Complex Networks by the Equivalence Classes Approach. - Mohammad Soleymani, Martha A. Larson, Thierry Pun, Alan Hanjalic:
Corpus Development for Affective Video Indexing. - Argyrios C. Zolotas, G. D. Halikias:
Optimal design of PID controllers using the QFT method. - Naomi Jacobs, Martyn Amos:
NanoInfoBio: A case-study in interdisciplinary research. - Vivekanand Samant, Arvind Hulgeri, Alfonso Valencia, Ashish V. Tendulkar:
Accurate Demarcation of Protein Domain Linkers based on Structural Analysis of Linker Probable Region. - Jirí Dokulil, Enes Bajrovic, Siegfried Benkner, Sabri Pllana, Martin Sandrieser, Beverly Bachmayer:
Efficient Hybrid Execution of C++ Applications using Intel(R) Xeon Phi(TM) Coprocessor. - Holger Petersen:
A Note on Kolmogorov-Uspensky Machines. - Ofir Pele, Michael Werman:
Improving Perceptual Color Difference using Basic Color Terms. - Jithin Kazuthuveettil Sreedharan, Vinod Sharma:
Spectrum Sensing using Distributed Sequential Detection via Noisy MAC. - Irene Marquez Corbella, Edgar Martínez-Moro, Emilio Suárez-Canedo:
On the Composition of Secret Sharing Schemes Related to Codes. - Mijail Borges-Quintana, Miguel A. Borges-Trenard, Irene Marquez Corbella, Edgar Martínez-Moro:
Computing coset leaders and leader codewords of binary codes. - Federico Cabitza, Carla Simone:
Design Ltd.: Renovated Myths for the Development of Socially Embedded Technologies. - Frédéric Bastien, Pascal Lamblin, Razvan Pascanu, James Bergstra, Ian J. Goodfellow, Arnaud Bergeron, Nicolas Bouchard, David Warde-Farley, Yoshua Bengio:
Theano: new features and speed improvements. - A. M. Adeshina, Rathiah Hashim, Noor Elaiza Abdul Khalid, Siti Z. Z. Abidin:
Hardware-Accelerated Raycasting: Towards an Effective Brain MRI Visualization. - Vishnuvardhan Mannava, T. Ramesh:
A Composite Design Pattern for Service Injection and Composition of Web Services for Peer-To-Peer Computing with Service Oriented Architecture. - Ali Ahmed, Benjamin Recht, Justin K. Romberg:
Blind Deconvolution using Convex Programming. - Peter Pleva:
A Revised Classification of Anonymity. - (Withdrawn) A Hash based Approach for Secure Keyless Steganography in Lossless RGB Images.
- Sriganesh Srihari, Hon Wai Leong:
A survey of computational methods for protein complex prediction from protein interaction networks. - Wook-Sung Yoo:
Prototype for Extended XDB Using Wiki. - Ladislau Bölöni:
Shadows and headless shadows: a worlds-based, autobiographical approach to reasoning. - Ladislau Bölöni:
Modeling problems of identity in Little Red Riding Hood. - Alfred Coleman, Marlien Herselman, Mary Coleman:
Improving Computer-Mediated Synchronous Communication of Doctors in Rural Communities through Cloud Computing: A Case Study of Rural Hospitals in South Africa. - Xin Li, Michael A. Scott:
Analysis-suitable T-splines: characterization, refineability, and approximation. - Heng Luo, Pierre Luc Carrier, Aaron C. Courville, Yoshua Bengio:
Texture Modeling with Convolutional Spike-and-Slab RBMs and Deep Extensions. - Jacek Tabor, Krzysztof Misztal:
Detection of elliptical shapes via cross-entropy clustering. - Elad Haramaty, Madhu Sudan:
Deterministic Compression with Uncertain Priors. - Ahmed ElSamadouny, Mohammed Nafie, Ahmed K. Sultan:
Cognitive Radio Transmission Strategies for Primary Markovian Channels. - Neelamadhab Padhy, Pragnyaban Mishra, Rasmita Panigrahi:
The Survey of Data Mining Applications And Feature Scope. - Neelamadhab Padhy, Rasmita Panigrahi:
Data Mining: A prediction Technique for the workers in the PR Department of Orissa (Block and Panchayat). - Xiaojun Zhu, Qun Li, Weizhen Mao, Guihai Chen:
Online Vector Scheduling and Generalized Load Balancing. - Song-Nam Hong, Giuseppe Caire:
Generalized Degrees of Freedom for Network-Coded Cognitive Interference Channel. - Giovanna Dondossola, Geert Deconinck, Felicita Di Giandomenico, Susanna Donatelli, Mohamed Kaâniche, Paulo Veríssimo:
Critical Utility Infrastructural Resilience. - Mohamed Kaâniche, Paolo Lollini, Andrea Bondavalli, Karama Kanoun:
Modeling the resilience of large and evolving systems. - Alexandr Klimchik, Yier Wu, Anatol Pashkevich, Stéphane Caro
, Benoît Furet:
Optimal Selection of Measurement Configurations for Stiffness Model Calibration of Anthropomorphic Manipulators. - Yier Wu, Alexandr Klimchik, Anatol Pashkevich, Stéphane Caro
, Benoît Furet:
Industry-oriented Performance Measures for Design of Robot Calibration Experiment. - Majed ValadBeigi, Farshad Safaei, Bahareh Pourshirazi:
DBR: A Simple, Fast and Efficient Dynamic Network Reconfiguration Mechanism Based on Deadlock Recovery Scheme. - Mayur Punekar, Pascal O. Vontobel, Mark F. Flanagan:
Low-Complexity LP Decoding of Nonbinary Linear Codes. - Jean-Francois Stumper, Ralph Kennel:
Inversion of Linear and Nonlinear Observable Systems with Series-defined Output Trajectories. - Jean-Francois Stumper, Ferdinand Svaricek, Ralph Kennel:
Trajectory Tracking Control with Flat Inputs and a Dynamic Compensator. - Jean-Francois Stumper, Ralph Kennel:
Computationally Efficient Trajectory Optimization for Linear Control Systems with Input and State Constraints. - Reda Mohamed Hamou, Abdelmalek Amine, Ahmed Chaouki Lokbani, Michel Simonet:
Visualization and clustering by 3D cellular automata: Application to unstructured data. - Koji Kobayashi:
Value Constraint and Monotone circuit. - Ofer Feinerman, Amos Korman, Shay Kutten, Yoav Rodeh:
Rendezvous of Agents with Different Speeds. - Alexandr Klimchik, Anatol Pashkevich, Damien Chablat
, Geir Hovland:
Compliance error compensation technique for parallel robots composed of non-perfect serial chains. - Alexandr Klimchik, Anatol Pashkevich, Damien Chablat
:
Stiffness modeling of non-perfect parallel manipulators. - Amin Beheshti, Sherif Sakr, Boualem Benatallah, Hamid R. Motahari Nezhad:
Extending SPARQL to Support Entity Grouping and Path Queries. - Erjia Yan, Ying Ding, Blaise Cronin, Loet Leydesdorff:
A bird's-eye view of scientific trading: Dependency relations among fields of science. - Reza Oji:
An Automatic Algorithm for Object Recognition and Detection Based on ASIFT Keypoints. - Yves van Gennip, Huiyi Hu, Blake Hunter, Mason A. Porter:
Geosocial Graph-Based Community Detection. - Maysam Mirahmadi, Abdallah Shami:
A Novel Algorithm for Real-time Procedural Generation of Building Floor Plans. - Richard T. B. Ma, John C. S. Lui, Vishal Misra:
On the Evolution of the Internet Economic Ecosystem. - Tian Zhang, Wei Chen, Zhu Han, Zhigang Cao:
Hierarchic Power Allocation for Spectrum Sharing in OFDM-Based Cognitive Radio Networks. - Albert Fannjiang, Wenjing Liao:
Super-Resolution by Compressive Sensing Algorithms. - Franck Cassez, Ralf Huuck, Gerwin Klein, Bastian Schlich:
Proceedings Seventh Conference on Systems Software Verification, SSV 2012, Sydney, Australia, 28-30 November 2012. EPTCS 102, 2012 [contents] - Mahyuddin K. M. Nasution
, Shahrul Azman Noah:
A Methodology to Extract Social Network from the Web Snippet. - Dimitrios Christopoulos, Symeon Chatzinotas, Jens Krause, Björn E. Ottersten:
Multi-User Detection in Multibeam Mobile Satellite Systems: A Fair Performance Evaluation. - Cong Sun, Eduard A. Jorswieck:
Low complexity sum rate maximization for single and multiple stream MIMO AF relay networks. - Dimitrios Christopoulos, Symeon Chatzinotas, Björn E. Ottersten:
User Scheduling for Coordinated Dual Satellite Systems with Linear Precoding. - Yuriy Ostapov:
Adaptive Control of Enterprise. - Dimitrios Christopoulos, Jesús Arnau, Symeon Chatzinotas, Carlos Mosquera, Björn E. Ottersten:
MMSE Performance Analysis of Generalized Multibeam Satellite Channels. - Diego Fabregat-Traver, Paolo Bientinesi:
Application-tailored Linear Algebra Algorithms: A search-based Approach. - Sascha Kurz, Nicola Maaser, Stefan Napel:
On the Egalitarian Weights of Nations. - Benjamin Ricaud, Bruno Torrésani:
A survey of uncertainty principles and some signal processing applications. - Ammar Zafar, Redha M. Radaydeh, Yunfei Chen, Mohamed-Slim Alouini
:
Optimal Power Allocation for Fixed-Gain Half-Duplex Amplify-and-Forward Relaying over Rayleigh Fading Channels. - Yixin Cao, Dániel Marx:
Interval Deletion is Fixed-Parameter Tractable. - Sunil Simon, Krzysztof R. Apt:
Social Network Games. - Mehrdad Mahdavi, Tianbao Yang, Rong Jin:
Online Stochastic Optimization with Multiple Objectives. - Santhosh Kumar, Jean-François Chamberland, Gregory H. Huff:
Reconfigurable Antennas, Preemptive Switching and Virtual Channel Management. - Giovanni Viglietta:
Rendezvous of two robots with visible bits. - Saurabh Paul, Christos Boutsidis, Malik Magdon-Ismail, Petros Drineas:
Random Projections for Support Vector Machines. - Kang Zhao, Greta E. Greer, Baojun Qiu, Prasenjit Mitra, Kenneth Portier, John Yen:
Finding influential users of an online health community: a new metric based on sentiment influence. - Menelaos I. Karavelas, Christos Konaxis, Eleni Tzanaki:
The maximum number of faces of the Minkowski sum of three convex polytopes. - Ladislau Bölöni:
Shadows and Headless Shadows: an Autobiographical Approach to Narrative Reasoning. - Alexandr Klimchik, Anatol Pashkevich, Yier Wu, Stéphane Caro
, Benoît Furet:
Design of Calibration Experiments for Identification of Manipulator Elastostatic Parameters. - Ankan Saha, Prateek Jain, Ambuj Tewari:
The Interplay Between Stability and Regret in Online Learning. - Manuel Rojas:
A semantic association page rank algorithm for web search engines. - Tao Zhu, David Phipps, Adam Pridgen, Jedidiah R. Crandall, Dan S. Wallach:
Tracking and Quantifying Censorship on a Chinese Microblogging Site. - Reynold Xin, Josh Rosen, Matei Zaharia, Michael J. Franklin, Scott Shenker, Ion Stoica:
Shark: SQL and Rich Analytics at Scale. - Sidney Amani, Peter Chubb, Alastair F. Donaldson, Alexander Legg, Leonid Ryzhyk, Yanjin Zhu:
Automatic Verification of Message-Based Device Drivers. 4-17 - Christoph Baumann, Bernhard Beckert, Holger Blasum, Thorsten Bormer:
Lessons Learned From Microkernel Verification -- Specification is the New Bottleneck. 18-32 - Gidon Ernst
, Gerhard Schellhorn, Dominik Haneberg, Jörg Pfähler, Wolfgang Reif:
A Formal Model of a Virtual Filesystem Switch. 33-45 - Daniel Matichuk:
Automatic Function Annotations for Hoare Logic. 46-56 - Chih-Hong Cheng, Rongjie Yan, Saddek Bensalem, Harald Ruess:
Distributed Priority Synthesis. 57-72 - Hendrik Tews, Marcus Völp
, Tjark Weber:
On the Use of Underspecified Data-Type Semantics for Type Safety in Low-Level Code. 73-87 - Tatiana Mangels, Jan Peleska:
CTGEN - a Unit Test Generator for C. 88-102 - Eva Beckschulze, Sebastian Biallas, Stefan Kowalewski:
Static Analysis of Lockless Microcontroller C Programs. 103-114 - Chris Hathhorn
, Michela Becchi, William L. Harrison, Adam M. Procter:
Formal Semantics of Heterogeneous CUDA-C: A Modular Approach with Applications. 115-124 - Alexandre David, Lasse Jacobsen, Morten Jacobsen, Jirí Srba
:
A Forward Reachability Algorithm for Bounded Timed-Arc Petri Nets. 125-140 - Kenneth Yrke Jørgensen, Kim G. Larsen
, Jirí Srba
:
Time-Darts: A Data Structure for Verification of Closed Timed Automata. 141-155 - Christel Baier, Marcus Daum, Benjamin Engel, Hermann Härtig, Joachim Klein
, Sascha Klüppelholz, Steffen Märcker, Hendrik Tews, Marcus Völp
:
Chiefly Symmetric: Results on the Scalability of Probabilistic Model Checking for Operating-System Code. 156-166 - David A. Cock
:
Verifying Probabilistic Correctness in Isabelle with pGCL. 167-178 - Farnood Merrikh-Bayat, Farshad Merrikh-Bayat, Saeed Bagheri Shouraki:
Neuro-Fuzzy Computing System with the Capacity of Implementation on Memristor-Crossbar and Optimization-Free Hardware Training. - Nicole Megow, José Verschae:
Scheduling on a machine with varying speed: Minimizing cost and energy via dual schedules. - Baile Xie, Yang Li, Hlaing Minn, Aria Nosratinia:
Adaptive Interference Alignment with CSI Uncertainty. - Shixin Luo, Rui Zhang, Teng Joon Lim:
Optimal Power and Range Adaptation for Green Broadcasting. - Masoud Amoozgar, Rasoul Ramezanian:
A Computational Modeling of Rumor Dissemination. - Arnim Bleier:
A simple non-parametric Topic Mixture for Authors and Documents. - Ivan Wang Hei Ho, Kin K. Leung, John W. Polak:
A Methodology for Studying VANET Performance with Practical Vehicle Distribution in Urban Environment. - Martin Tancer:
Recognition of collapsible complexes is NP-complete. - Mohammud Z. Bocus, Carl P. Dettmann, Justin P. Coon, Mohammed R. Rahman:
Keyhole and Reflection Effects in Network Connectivity Analysis. - Richard Ellis-Braithwaite, Russell Lock, Ray Dawson, Badr Haque:
Modelling the Strategic Alignment of Software Requirements using Goal Graphs. - Amineh Amini, Hadi Saboohi, Nasser Bakhsh Nemat:
A RDF-based Data Integration Framework. - Hassan Tavakoli, Mahmoud Ahmadian, M. Reza Peyghami:
Optimal Rate Irregular LDPC Codes in Binary Erasure Channel. - Francis R. Bach:
Duality between subgradient and conditional gradient methods. - Petr Kuznetsov, Sathya Peri:
On Non-Interference of Transactions. - Alex Massarenti, Emanuele Raviolo:
The Rank of n×n Matrix Multiplication. - Guo Zhang, Ying Ding, Stasa Milojevic:
Citation content analysis (cca): A framework for syntactic and semantic analysis of citation content. - Hao Wu, Rosemary Monahan, James F. Power:
Metamodel Instance Generation: A systematic literature review. - Md. Hedayetul Islam Shovon, Mahfuza Haque:
An Approach of Improving Students Academic Performance by using k means clustering algorithm and Decision tree. - Chantal Keller, Marc Lasson:
The Refined Calculus of Inductive Construction: Parametricity and Abstraction. - Hadi Saboohi, Sameem Abdul Kareem:
Increasing the failure recovery probability of atomic replacement approaches. - Yujie Tang, Laming Chen, Yuantao Gu:
On the Performance Bound of Sparse Estimation with Sensing Matrix Perturbation. - Mohammed El-Dosuky, Ahmed El-Bassiouny, Taher Hamza, Magdy Rashad:
Obesity Heuristic, New Way On Artificial Immune Systems. - Mohammed El-Dosuky, Ahmed El-Bassiouny, Taher Hamza, Magdy Rashad:
New Hoopoe Heuristic Optimization. - Mohammed El-Dosuky, Ahmed El-Bassiouny, Taher Hamza, Magdy Rashad:
New Heuristics for Interfacing Human Motor System using Brain Waves. - Iztok Fister Jr., Iztok Fister:
Measuring Time in Sporting Competitions with the Domain-Specific Language EasyTime. - Mike Stannett
, István Németi:
Using Isabelle to verify special relativity, with application to hypercomputation theory. - Alexandr Klimchik, Anatol Pashkevich, Yier Wu, Benoît Furet, Stéphane Caro
:
Optimization of measurement configurations for geometrical calibration of industrial robot. - Christophe Cérin, Alain Takoudjou, Nicolas Grenèche:
Intégration des intergiciels de grilles de PC dans le nuage SlapOS : le cas de BOINC. - Yeo Hun Yun, Joon Ho Cho:
Sum-Rate Optimal Multi-Code CDMA Systems: An Equivalence Result. - Naushad UzZaman, Roi Blanco, Michael Matthews:
TwitterPaul: Extracting and Aggregating Twitter Predictions.