default search action
CoRR, December 2012
- (Withdrawn) A large-scale and fault-tolerant approach of subgraph mining using density-based partitioning.
- Simon DeDeo:
Evidence for Non-Finite-State Computation in a Human Social System. - Mircea-Dan Hernest, Trifon Trifonov:
Modal functional interpretations. - Carlee Joe-Wong, Soumya Sen:
Mathematical Frameworks for Pricing in the Cloud: Revenue, Fairness, and Resource Allocations. - Jeff Jones, Andrew Adamatzky:
Emergence of Self-Organized Amoeboid Movement in a Multi-Agent Approximation of Physarum polycephalum. - Pablo Arrighi, Simon Martiel, Vincent Nesme:
Generalized Cayley Graphs and Cellular Automata over them. - Osama Khalil, Andrew Habib:
Viewpoint Invariant Object Detector. - RC Johnson, Walter J. Scheirer, Terrance E. Boult:
Secure voice based authentication for mobile devices: Vaulted Voice Verification. - Wooseok Nam, Dongwoon Bai, Jungwon Lee, Inyup Kang:
On the capacity limit of wireless channels under colored scattering. - Hamoon Mousavi, Jeffrey O. Shallit:
Repetition Avoidance in Circular Factors. - Minakshi Sharma:
Artificial Neural Network Fuzzy Inference System (ANFIS) For Brain Tumor Detection. - Natalia Malinina:
Properties of the dual planar triangulations. - Kyumars Sheykh Esmaili:
Challenges in Kurdish Text Processing. - Chuan Huang, Rui Zhang, Shuguang Cui:
Optimal Power Allocation for Outage Minimization in Fading Channels with Energy Harvesting Constraints. - Guido Governatori, Francesco Olivieri, Antonino Rotolo, Simone Scannapieco:
Computing Strong and Weak Permissions in Defeasible Logic. - Laurent Bougrain, Olivier Rochel, Octave Boussaton, Lionel Havet:
From the decoding of cortical activities to the control of a JACO robotic arm: a whole processing chain. - Gaurav Somani, Prateek Khandelwal, Kapil Phatnani:
VUPIC: Virtual Machine Usage Based Placement in IaaS Cloud. - Mohamed Nader Jelassi, Sadok Ben Yahia, Engelbert Mephu Nguifo:
A scalable mining of frequent quadratic concepts in d-folksonomies. - Samuel T. Blake, Andrew Z. Tirkel:
A Construction for Periodic ZCZ Sequences. - Jean-Francois Stumper, Alexander Doetlinger, Janos Jung, Ralph Kennel:
Predictive Control of a Permanent Magnet Synchronous Machine based on Real-Time Dynamic Optimization. - Fan Cheng, Raymond W. Yeung:
Performance Bounds on a Wiretap Network. - Robert Crowston, Gregory Z. Gutin, Mark Jones, Venkatesh Raman, Saket Saurabh, Anders Yeo:
Fixed-parameter tractability of satisfying beyond the number of variables. - Bhalchandra B. Godbole, Dilip S. Aldar:
Performance Improvement by Changing Modulation Methods for Software Defined Radios. - Dilip S. Aldar:
Centralized Integrated Spectrum Sensing for Cognitive Radios. - Robert Crowston, Gregory Z. Gutin, Mark Jones, Saket Saurabh, Anders Yeo:
Parameterized Study of the Test Cover Problem. - Jagdish Lal Raheja, Karen Das, Ankit Chaudhary:
Fingertip Detection: A Fast Method with Natural Hand. - Alexandre Adrien Chotard, Anne Auger, Nikolaus Hansen:
Cumulative Step-size Adaptation on Linear Functions. - Hemant Purohit, Yiye Ruan, David Fuhry, Srinivasan Parthasarathy, Amit P. Sheth:
On the Role of Social Identity and Cohesion in Characterizing Online Social Communities. - Pierre Sermanet, Koray Kavukcuoglu, Soumith Chintala, Yann LeCun:
Pedestrian Detection with Unsupervised Multi-Stage Feature Learning. - Yiye Ruan, David Fuhry, Srinivasan Parthasarathy:
Efficient Community Detection in Large Networks using Content and Links. - Miranda Zhang, Rajiv Ranjan, Armin Haller, Dimitrios Georgakopoulos, Michael Menzel, Surya Nepal:
An Ontology based System for Cloud Infrastructure Services Discovery. - Fatih Korkmaz, Musa Faruk Çakir, Yilmaz Korkmaz, Ismail Topaloglu:
Fuzzy Based Stator Flux Optimizer Design For Direct Torque Control. - Zhaoqun Chen, Pengfei Liu, Xiaohan Wang, Yuantao Gu:
Follow Whom? Chinese Users Have Different Choice. - Marko Horvat, Sinisa Popovic, Kresimir Cosic:
Towards semantic and affective coupling in emotionally annotated databases. - Herve Kabamba Mbikayi:
An Evolution Strategy Approach toward Rule-set Generation for Network Intrusion Detection Systems (IDS). - Nicholas Ruozzi, Sekhar Tatikonda:
Message-Passing Algorithms for Quadratic Minimization. - Xu He, Fan Min, William Zhu:
A Comparative Study of Discretization Approaches for Granular Association Rule Mining. - Koji Kobayashi:
Difference in monotonicity between P and NP. - Vladimir Braverman, Rafail Ostrovsky:
Approximating Large Frequency Moments with Pick-and-Drop Sampling. - Bojin Zheng, Hongrun Wu, Jun Qin, Wenfei Lan, Wenhua Du:
Modelling Multi-Trait Scale-free Networks by Optimization. - Mriganka Chakraborty:
Artificial Neural Network for Performance Modeling and Optimization of CMOS Analog Circuits. - J. Gerard Wolff:
Simplification and integration in computing and cognition: the SP theory and the multiple alignment concept. - Jain S. Abhisekh, S. Arvind, B. S. Balaji, N. P. Ramviyas:
Onboard Dynamic Rail Track Safety Monitoring System. - Emmanuel Polonowski:
DBGen User Manual. - Bruno Marnette:
Resolution and Datalog Rewriting Under Value Invention and Equality Constraints. - Samuel T. Blake, Andrew Z. Tirkel:
A Construction for Perfect Periodic Autocorrelation Sequences. - I-Hong Hou, Yao Liu, Alex Sprintson:
A Non-Monetary Protocol for Peer-to-Peer Content Distribution in Wireless Broadcast Networks with Network Coding. - Yulong Shen, Xiaohong Jiang, Jianfeng Ma, Weisong Shi:
Exploring Relay Cooperation for Secure and Reliable Transmission in Two-Hop Wireless Networks. - C. J. Prabhakar, P. U. Praveen Kumar:
An Image Based Technique for Enhancement of Underwater Images. - Aleksandar Nikolov, Kunal Talwar, Li Zhang:
The Geometry of Differential Privacy: the Sparse and Approximate Cases. - Lutz Bornmann, Moritz Stefaner, Félix de Moya-Anegón, Rüdiger Mutz:
Ranking and mapping of universities and research-focused institutions worldwide based on highly-cited papers: A visualization of results from multi-level models. - Xavier Caruso:
Random matrix over a DVR and LU factorization. - Kartheek Srungaram, Munaga H. M. Krishna Prasad:
Enhanced Cluster Based Routing Protocol for MANETS. - Mahsa Moazez, Farshad Safaei, Majid Rezazadeh:
Design and Implementation of Multistage Interconnection Networks for SoC Networks. - T. Anji Kumar, Munaga H. M. Krishna Prasad:
Enhanced Multiple Routing Configurations For Fast IP Network Recovery From Multiple Failures. - M. Bhanu Sridhar, Yarramalle Srinivas, Munaga H. M. Krishna Prasad:
Software Reuse in Medical Database for Cardiac Patients using Pearson Family Equations. - B. Adinarayana Reddy, O. Srinivasa Rao, Munaga H. M. Krishna Prasad:
An Improved UP-Growth High Utility Itemset Mining. - D. Srinivasa Rao, M. Seetha, Munaga H. M. Krishna Prasad:
Comparison of Fuzzy and Neuro Fuzzy Image Fusion Techniques and its Applications. - Yuri M. Monakhov, Maria Medvednikova, Konstantin Abramov, Natalia Kostina, Roman Malyshev, Oleg Makarov, Irina B. Semenova:
Analytical model of misinformation of a social network node. - Feng Tian, Wenjian Chai, Chuanyun Wang, Xiaoping Sun:
Design and Implementation of Flight Visual Simulation System. - Unai Fernández-Plazaola, Eduardo Martos-Naya, José F. Paris, José T. Entrambasaguas:
Comments on Proakis Analysis of the Characteristic Function of Complex Gaussian Quadratic Forms. - V. Asha, Nagappa U. Bhajantri, P. Nagabhushan:
GLCM-based chi-square histogram distance for automatic detection of defects on patterned textures. - Setiawan Assegaff, Ab Razak Che Hussin:
Review of Knowledge Management Systems As Socio-Technical System. - Jörg Endrullis, Dimitri Hendriks, Jan Willem Klop, Andrew Polonsky:
Discriminating Lambda-Terms Using Clocked Boehm Trees. - Khurram Soomro, Amir Roshan Zamir, Mubarak Shah:
UCF101: A Dataset of 101 Human Actions Classes From Videos in The Wild. - Elias Jarlebring, Simen Kvaal, Wim Michiels:
An inverse iteration method for eigenvalue problems with eigenvector nonlinearities. - Piotr Skowron, Krzysztof Rzadca:
Network delay-aware load balancing in selfish and cooperative distributed systems. - Piotr Skowron, Krzysztof Rzadca:
Replica placement for p2p redundant data storage on unreliable, non-dedicated machines. - Prasad Sudhakar, Laurent Jacques, Xavier Dubois, Philippe Antoine, Luc Joannes:
Compressive Schlieren Deflectometry. - Sirisha Rambhatla, Jarvis D. Haupt:
Semi-blind Source Separation via Sparse Representations and Online Dictionary Learning. - Po T. Wang, Christine E. King, An H. Do, Zoran Nenadic:
Pushing the Communication Speed Limit of a Noninvasive BCI Speller. - (Withdrawn) Multi-user Diversity in Spectrum Sharing Systems over Fading Channels with Average Power Constraints.
- Alexandr Klimchik, Yier Wu, Stéphane Caro, Anatol Pashkevich:
Design of Experiments for Calibration of Planar Anthropomorphic Manipulators. - Wolfgang Mauerer, Christopher Portmann, Volkher B. Scholz:
A modular framework for randomness extraction based on Trevisan's construction. - Bastien Maubert, Sophie Pinchinat:
Uniform Strategies. - Prosenjit Bose, Pat Morin, André van Renssen, Sander Verdonschot:
The theta-5-graph is a spanner. - Eric Mjolsness:
Compositional Stochastic Modeling and Probabilistic Programming. - Huiqi Xu, Shumin Guo, Keke Chen:
Building Confidential and Efficient Query Services in the Cloud with RASP Data Perturbation. - Mate Boban, Rui Meireles, João Barros, Peter Steenkiste, Ozan K. Tonguz:
TVR - Tall Vehicle Relaying in Vehicular Networks. - Emilio Delgado López-Cózar, Nicolás Robinson-García, Daniel Torres-Salinas:
Manipulating Google Scholar Citations and Google Scholar Metrics: simple, easy and tempting. - (Withdrawn) Evaluation of Particle Swarm Optimization Algorithms for Weighted Max-Sat Problem: Technical Report.
- Ritankar Mandal, Anirban Ghosh, Sasanka Roy, Subhas C. Nandy:
Greedy is good: An experimental study on minimum clique cover and maximum independent set problems for randomly generated rectangles. - Mohammadi Akheela Khanum, Munesh Chandra Trivedi:
Take Care: A Study on Usability Evaluation Methods for Children. - Roberto Amadini, Maurizio Gabbrielli, Jacopo Mauro:
An Empirical Evaluation of Portfolios Approaches for solving CSPs. - Emanuele Frandi, Ricardo Ñanculef, Maria Grazia Gasparo, Stefano Lodi, Claudio Sartori:
Training Support Vector Machines Using Frank-Wolfe Optimization Methods. - Tomasz Jurkiewicz, Kurt Mehlhorn:
The Cost of Address Translation. - Brage Ellingsæter, Magnus Skjegstad, Torleiv Maseng:
A Potential Game for Power and Frequency Allocation in Large-Scale Wireless Networks. - Michael Gr. Voskoglou, Sheryl Buckley:
Problem Solving and Computational Thinking in a Learning Environment. - Bundit Laekhanukit:
Parameters of Two-Prover-One-Round Game and The Hardness of Connectivity Problems. - Modou Gueye, Talel Abdessalem, Hubert Naacke:
Dynamic recommender system : using cluster-based biases to improve the accuracy of the predictions. - Philippe Morignot, Fawzi Nashashibi:
An ontology-based approach to relax traffic regulation for autonomous vehicle assistance. - Emilio Di Giacomo, Giuseppe Liotta, Tamara Mchedlidze:
How many vertex locations can be arbitrarily chosen when drawing planar graphs? - Evgeny V. Shchepin:
A Topological Code for Plane Images. - Loet Leydesdorff, Robert L. Goldstone:
Interdisciplinarity at the Journal and Specialty Level: The changing knowledge bases of the journal Cognitive Science. - Luke Schaeffer:
An Improved Lower Bound for Stack Sorting. - Weiyu Xu, Er-Wei Bai, Myung Cho:
Toeplitz Matrix Based Sparse Error Correction in System Identification: Outliers and Random Noises. - Christian Borgs, Michael Brautbar, Jennifer T. Chayes, Brendan Lucier:
Influence Maximization in Social Networks: Towards an Optimal Algorithmic Solution. - Roozbeh Rajabi, Hassan Ghassemian:
Unmixing of Hyperspectral Data Using Robust Statistics-based NMF. - Vasiliy M. Tereshkov:
An Intuitive Approach to Inertial Sensor Bias Estimation. - Yoshua Bengio, Nicolas Boulanger-Lewandowski, Razvan Pascanu:
Advances in Optimizing Recurrent Networks. - Nadim K. M. Madi, Mohamed Othman:
Optimizing Service Differentiation Scheme with Sized-based Queue Management in DiffServ Networks. - Ke Wu, Philip Resnik:
Two Algorithms for Finding $k$ Shortest Paths of a Weighted Pushdown Automaton. - Joy Chen, Ryan Compton, Aparna Das, Yi Huang, Stephen G. Kobourov, Paul S. Shen, Sankar Veeramoni, Yunhao Xu:
AngryAnts: A Citizen Science Approach to Computing Accurate Average Trajectories. - Nidhi Hegde, Laurent Massoulié, Laurent Viennot:
Self-Organizing Flows in Social Networks. - Hyun Joon Jung, Matthew Lease:
Evaluating Classifiers Without Expert Labels. - Sameer Singh, Thore Graepel:
Compiling Relational Database Schemata into Probabilistic Graphical Models. - Hamed Masnadi-Shirazi, Nuno Vasconcelos, Arya Iranmehr:
Cost-Sensitive Support Vector Machines. - Ran Duan, Kurt Mehlhorn:
A Combinatorial Polynomial Algorithm for the Linear Arrow-Debreu Market. - Sam Mavandadi, Steve Feng, Frank Yu, Richard Yu, Aydogan Ozcan:
BigFoot: Analysis, monitoring, tracking and sharing of bio-medical features of human appendages using consumer-grade home and office based imaging devices. - Konstantin Abramov, Yuri M. Monakhov:
Stochastic Models of Misinformation Distribution in Online Social Networks. - Tushar Rao, Saket Srivastava:
Modeling Movements in Oil, Gold, Forex and Market Indices using Search Volume Index and Twitter Sentiments. - Yuqing Zhu, Philip S. Yu, Jianmin Wang:
Latency Bounding by Trading off Consistency in NoSQL Store: A Staging and Stepwise Approach. - Leonardo Ermann, Klaus M. Frahm, Dima Shepelyansky:
Spectral properties of Google matrix of Wikipedia and other networks. - Jin-shan Pan, Risheng Liu, Zhixun Su, Xianfeng Gu:
Kernel Estimation from Salient Structure for Robust Motion Deblurring. - Merrick McCracken, Neal Patwari:
Hidden Markov Estimation of Bistatic Range From Cluttered Ultra-wideband Impulse Responses. - Francesco Ranzato:
A More Efficient Simulation Algorithm on Kripke Structures. - Daniel Reem:
The geometric stability of Voronoi diagrams in normed spaces which are not uniformly convex. - Daniel Reem:
On the possibility of simple parallel computing of Voronoi diagrams and Delaunay graphs. - Albert Guillen i Fabregas, Ingmar Land, Alfonso Martinez:
Extremes of Error Exponents. - Jim E. Smith, Praminda Caleb-Solly, Muhammad Atif Tahir, Davy Sannen, Hendrik Van Brussel:
Making Early Predictions of the Accuracy of Machine Learning Applications. - Tushar Rao, Saket Srivastava:
Twitter Sentiment Analysis: How To Hedge Your Bets In The Stock Markets. - Joshua Belanich, Luis E. Ortiz:
On the Convergence Properties of Optimal AdaBoost. - Maria Gregori, Miquel Payaró:
Energy-efficient transmission for wireless energy harvesting nodes. - Isabelle Stanton:
Streaming Balanced Graph Partitioning for Random Graphs. - Gilad Katz, Guy Shani, Bracha Shapira, Lior Rokach:
Using Wikipedia to Boost SVD Recommender Systems. - Peter Hauck, Michael Huber, Juliane Bertram, Dennis Brauchle, Sebastian Ziesche:
Efficient Majority-Logic Decoding of Short-Length Reed--Muller Codes at Information Positions. - Jake V. Bouvrie, Mauro Maggioni:
Multiscale Markov Decision Problems: Compression, Solution, and Transfer Learning. - Quan Geng, Pramod Viswanath:
Optimal Noise-Adding Mechanism in Differential Privacy. - Mahdi S. Hosseini, Konstantinos N. Plataniotis:
Compressed Sensing Recoverability In Imaging Modalities. - Miquel Esplà-Gomis, Felipe Sánchez-Martínez, Mikel L. Forcada:
Using external sources of bilingual information for on-the-fly word alignment. - Yiwei Song, Natasha Devroye, Huai-Rong Shao, Chiu Ngo:
Lattice Coding for the Two-way Two-relay Channel. - Santhosh Kumar, Nirmal Shende, Chandra R. Murthy, Arun Ayyagari:
Throughput Analysis of Primary and Secondary Networks in a Shared IEEE 802.11 System. - Chunxiao Jiang, Yan Chen, K. J. Ray Liu:
Distributed Adaptive Networks: A Graphical Evolutionary Game-Theoretic View. - Ernst Moritz Hahn, Holger Hermanns, Ralf Wimmer, Bernd Becker:
Transient Reward Approximation for Grids, Crowds, and Viruses. - Salman Durrani, Zubair Khalid, Jing Guo:
A Tractable Framework for Exact Probability of Node Isolation in Finite Wireless Sensor Networks.