


default search action
CoRR, July 2013
- Daan Wilmer:
Investigation of "Enhancing flexibility and robustness in multi-agent task scheduling". - Ranjeet Kumar Rout, Pabitra Pal Choudhury, Sarif Sk. Hassan, Saurabh Singh:
Fractal and Mathematical Morphology in Intricate Comparison between Tertiary Protein Structures. - Firas A. Jassim:
Increasing Compression Ratio in PNG Images by k-Modulus Method for Image Transformation. - Maria Gorlatova, John Sarik, Mina Cong, Ioannis Kymissis, Gil Zussman:
Movers and Shakers: Kinetic Energy Harvesting for the Internet of Things. - Minko Dudev, Sebastian Gerling, Philip Peter:
SAHER: Secure and Efficient Routing in Sensor Networks. - Zhaoxi Fang, Xin Wang, Xiaojun Yuan:
Beamforming Design for Multiuser Two-Way Relaying: A Unified Approach via Max-Min SINR. - Vikash K. Mansinghka, Tejas D. Kulkarni, Yura N. Perov, Joshua B. Tenenbaum:
Approximate Bayesian Image Interpretation using Generative Probabilistic Graphics Programs. - Mohammad Naghshvar, Tara Javidi, Michèle A. Wigger:
Extrinsic Jensen-Shannon Divergence: Applications to Variable-Length Coding. - Imam Riadi, Jazi Eko Istiyanto, Ahmad Ashari, Subanar:
Log Analysis Techniques using Clustering in Network Forensics. - Joshua I. James, Yunsik Jake Jang:
An Assessment Model for Cybercrime Investigation Capacity. - M. Khlaif, M. Talb:
Digital Data Security and Copyright Protection Using Cellular Automata. - Ossi Kaltiokallio, Hüseyin Yigitler, Riku Jäntti, Neal Patwari:
Catch a Breath: Non-invasive Respiration Rate Monitoring via Wireless Communication. - Cedomir Stefanovic, Petar Popovski:
Coded Slotted ALOHA with Varying Packet Loss Rate across Users. - Fabrizio M. A. Lolli:
Semantics and pragmatics in actual software applications and in web search engines: exploring innovations. - Kimmo Fredriksson, Emanuele Giaquinta:
On a compact encoding of the swap automaton. - Konstantin S. Solnushkin, Yuichi Tsujita:
Marrying Many-core Accelerators and InfiniBand for a New Commodity Processor. - Alvaro Cabezas-Clavijo, Nicolás Robinson-García, Manuel Escabias, Evaristo Jiménez-Contreras:
Reviewers' ratings and bibliometric indicators: hand in hand when assessing over research proposals? - Yanshu Zhu, Feng Sun, Yi-King Choi, Bert Jüttler, Wenping Wang:
Spline Approximation to Medial Axis. - Tor Lattimore, Marcus Hutter, Peter Sunehag:
Concentration and Confidence for Discrete Bayesian Sequence Predictors. - Roozbeh Rajabi, Hassan Ghassemian:
Hyperspectral Data Unmixing Using GNMF Method and Sparseness Constraint. - (Withdrawn) 4-Dimensional Geometry Lens: A Novel Volumetric Magnification Approach.
- Jian Gao, Qiong Kong:
One generator $(1+u)$-quasi twisted codes over $F_2+uF_2$. - Qasim Zeeshan Ahmed, Ki-Hong Park
, Mohamed-Slim Alouini
, Sonia Aïssa:
Compression and Combining Based on Channel Shortening and Rank Reduction Techniques for Cooperative Wireless Sensor Networks. - Philippe Dumas:
Rational series and asymptotic expansion for linear homogeneous divide-and-conquer recurrences. - A. B. M. Moniruzzaman, Syed Akhter Hossain:
NoSQL Database: New Era of Databases for Big data Analytics - Classification, Characteristics and Comparison. - Supriya Nirkhiwale, Alin Dobra, Chris Jermaine:
A Sampling Algebra for Aggregate Estimation. - Magnus Lie Hetland:
Simulating Ability: Representing Skills in Games. - Roberto Bruni, Hernán C. Melgratti, Ugo Montanari, Pawel Sobocinski
:
Connector algebras for C/E and P/T nets' interactions. - Thijs Laarhoven
:
Dynamic Traitor Tracing Schemes, Revisited. - Eduardo Graells-Garrido:
Ornitología Virtual: Caracterizando a #Chile en Twitter. - Richard A. Formato:
Dipole-Loaded Monopole Optimized Using VSO, v.3. - Claudius Jähn:
Progressive Blue Surfels. - Bhavana Bharat Dalvi, William W. Cohen, Jamie Callan:
Exploratory Learning. - Xiaofu Wu, Zhen Yang:
Verification-Based Interval-Passing Algorithm for Compressed Sensing. - Bhavana Bharat Dalvi, William W. Cohen, Jamie Callan:
WebSets: Extracting Sets of Entities from the Web Using Unsupervised Information Extraction. - Jialiang Zhang, Gang Wu, Wenhui Xiong, Zhi Chen, Shaoqian Li:
Utility-maximization Resource Allocation for Device-to-Device Communication Underlaying Cellular Networks. - Guangxun Du, Quan Quan, Kai-Yuan Cai:
Attitude Controllability Analysis and Degraded Attitude Control Scheme for a class of Hexacopters Subject to One Rotor Failure. - Sourav Samanta, Nilanjan Dey, Poulami Das, Suvojit Acharjee, Sheli Sinha Chaudhuri:
Multilevel Threshold Based Gray Scale Image Segmentation using Cuckoo Search. - Dmitriy S. Malyshev:
The coloring problem for classes with two small obstructions. - Pavel Yu. Chebotarev, Zoya M. Lezina, Anton K. Loginov, Yana Yu. Tsodikova:
The effectiveness of altruistic lobbying: A model study. - Ranald Clouston, Jeremy E. Dawson, Rajeev Goré, Alwen Tiu:
Annotation-Free Sequent Calculi for Full Intuitionistic Linear Logic - Extended Version. - Petko Bogdanov, Michael Busch, Jeff Moehlis, Ambuj K. Singh, Boleslaw K. Szymanski:
The Social Media Genome: Modeling Individual Topic-Specific Behavior in Social Media. - Jaka Speh, Andrej Muhic, Jan Rupnik:
Algorithms of the LDA model [REPORT]. - Wanling Gao, Yuqing Zhu, Zhen Jia, Chunjie Luo, Lei Wang, Zhiguo Li, Jianfeng Zhan, Yong Qi, Yongqiang He, Shimin Gong, Xiaona Li, Shujie Zhang, Bizhu Qiu:
BigDataBench: a Big Data Benchmark Suite from Web Search Engines. - Haris Aziz, Bart de Keijzer:
Shapley Meets Shapley. - Cheng-Yuan Liou, Bo-Shiang Huang, Daw-Ran Liou, Alex A. Simak:
Syntactic sensitive complexity for symbol-free sequence. - Gang Wang, Chunhong Zhang, Xiaofeng Qiu, Zhimin Zeng:
Replacing Network Coordinate System with Internet Delay Matrix Service (IDMS): A Case Study in Chinese Internet. - Alexander Kurz, Alessandra Palmigiano:
Epistemic Updates on Algebras. - Thomas Andrew Lampert, André Stumpf, Pierre Gançarski:
An Empirical Study into Annotator Agreement, Ground Truth Estimation, and Algorithm Evaluation. - Roberto Ammendola, Andrea Biagioni
, Ottorino Frezza, Francesca Lo Cicero, Alessandro Lonardo, Pier Stanislao Paolucci, Davide Rossetti, Francesco Simula
, Laura Tosoratto, Piero Vicini:
'Mutual Watch-dog Networking': Distributed Awareness of Faults and Critical Events in Petascale/Exascale systems. - Nurzhan Bakibayev, Tomás Kociský, Dan Olteanu, Jakub Zavodny:
Aggregation and Ordering in Factorised Databases. - Farhad Farokhi
, Amirpasha Shirazinia, Karl Henrik Johansson:
Networked Estimation using Sparsifying Basis Prediction. - Aliaksei Sandryhaila, José M. F. Moura:
Discrete Signal Processing on Graphs: Frequency Analysis. - Faraz Ahmed, Rong Jin, Alex X. Liu:
A Random Matrix Approach to Differential Privacy and Structure Preserved Social Network Graph Publishing. - Dominique Duval:
Scalability using effects. - Paul L. Hooper, Simon DeDeo, Hillard S. Kaplan:
Dynamical Structure of a Traditional South American Social Network. - Ahmed Abousamra, David P. Bunde, Kirk Pruhs:
An Experimental Comparison of Speed Scaling Algorithms with Deadline Feasibility Constraints. - Guodong Shi, Alexandre Proutière, Mikael Johansson, John S. Baras, Karl Henrik Johansson:
The Evolution of Beliefs over Signed Social Networks. - Ugo Dal Lago, Margherita Zorzi:
Wave-Style Token Machines and Quantum Lambda Calculi. - Andreas Göbel, Leslie Ann Goldberg, David Richerby:
The Complexity of Counting Homomorphisms to Cactus Graphs Modulo 2. - Marius Nicolae, Sanguthevar Rajasekaran:
Efficient Sequential and Parallel Algorithms for Planted Motif Search. - Harpreet S. Dhillon, Howard C. Huang, Harish Viswanathan, Reinaldo A. Valenzuela:
Fundamentals of Throughput Maximization with Random Arrivals for M2M Communications. - Steven R. Ness, Helena Symonds, Paul Spong, George Tzanetakis:
The Orchive : Data mining a massive bioacoustic archive. - Om P. Damani:
Improving Pointwise Mutual Information (PMI) by Incorporating Significant Co-occurrence. - Te Sun Han, Hiroyuki Endo, Masahide Sasaki:
Reliability and Security Functions of the Wiretap Channel under Cost Constraint. - Jyoti Tewari, Swati Arya:
Evolution of Gi Fi Technology Over Other Technologies. - T.-H. Hubert Chan, Fei Chen:
A Primal-Dual Continuous LP Method on the Multi-choice Multi-best Secretary Problem. - S. F. Bandhekar, S. N. Dhurvey, P. P. Ashtankar:
Simulation Un-Symmetrical 2 Phase Induction Motor. - Zoltán Ésik, Uli Fahrenberg, Axel Legay, Karin Quaas:
Kleene Algebras and Semimodules for Energy Problems. - Firas A. Jassim:
A Novel Steganography Algorithm for Hiding Text in Image using Five Modulus Method. - Edith Kovács, Tamás Szántai:
Discovering the Markov network structure. - Lutz Bornmann, Rüdiger Mutz:
Conceptual funding of a new citation-rank approach in bibliometrics: P100. - Maurizio Gabbrielli, Maria Chiara Meo, Paolo Tacchella, Herbert Wiklicky:
Unfolding for CHR programs. - Ahmed A. Zewail, Mohammed Nafie:
The Achievable Degrees of Freedom Region of Relay Networks using Detours. - Erol Gelenbe, Gökçe Görbil, Dimitrios Tzovaras, Steffen Liebergeld, David García, Madalina Baltatu, George L. Lyberopoulos:
Security for Smart Mobile Networks: The NEMESYS Approach. - Manfred Droste, Zoltán Ésik, Werner Kuich:
Conway and iteration hemirings. - Stephanie J. Foan, Andrew M. Jackson, Ian Spendlove, Uwe Aickelin:
Simulating the Dynamics of T Cell Subsets Throughout the Lifetime. - Peer-Olaf Siebers, Galina Sherman, Uwe Aickelin, David Menachof:
Comparing Decison Support Tools for Cargo Screening Processes. - Umakant Mishra:
How to Build an RSS Feed using ASP. - Jian Cheng, Tianzi Jiang, Rachid Deriche, Dinggang Shen, Pew-Thian Yap:
Regularized Spherical Polar Fourier Diffusion MRI with Optimal Dictionary Learning. - Cem Tekin, Mihaela van der Schaar:
Distributed Online Big Data Classification Using Context Information. - Reinhard Grandl, Kai Su, Cédric Westphal:
On the Interaction of Adaptive Video Streaming with Content-Centric Networking. - Marinka Zitnik, Blaz Zupan:
Data Fusion by Matrix Factorization. - Zemin Zhang, Gregory Ely, Shuchin Aeron, Ning Hao, Misha Elena Kilmer:
Novel Factorization Strategies for Higher Order Tensors: Implications for Compression and Recovery of Multi-linear Data. - Fereshteh Asgari, Vincent Gauthier, Monique Becker:
A survey on Human Mobility and its applications. - Stephen P. Jordan:
Strong equivalence of reversible circuits is coNP-complete. - Iztok Fister Jr., Iztok Fister, Janez Brest:
Comparing various regression methods on ensemble strategies in differential evolution. - Andrei Todor, Alin Dobra, Tamer Kahveci, Christopher Dudley:
Making massive probabilistic databases practical. - J. Gerard Wolff:
The SP theory of intelligence: benefits and applications. - James Yifei Yang, Bruce E. Hajek:
Single Video Performance Analysis for Video-on-Demand Systems. - Francesco Renna, A. Robert Calderbank, Lawrence Carin, Miguel R. D. Rodrigues:
Reconstruction of Signals Drawn from a Gaussian Mixture from Noisy Compressive Measurements: MMSE Phase Transitions and Beyond. - Honggang Hu, Shuai Shao, Guang Gong, Tor Helleseth:
The Proof of Lin's Conjecture via the Decimation-Hadamard Transform. - K. Ilambharathi, G. S. N. V. Venkata Manik, N. Sadagopan, B. Sivaselvan:
Domain Specific Hierarchical Huffman Encoding. - Xiaogang Liu, Yuan Luo:
On the bounds and achievability about the ODPC of $\mathcal{GRM}(2, m)^*$ over prime field for increasing message length. - Mouhamed Gaith Ayadi, Riadh Bouslimi, Jalel Akaichi:
Extending UML for Conceptual Modeling of Annotation of Medical Images. - Ivan Arakistain, Mikel Barrado:
WoodTouch, a new interaction interface for wooden furniture. - Ivan Arakistain, Jose Miguel Abascal, Oriol Munne:
Wireless sensor network technology for moisture monitoring of wood. - Saravana Manickam, Mahesh K. Marina, Sofia Pediaditaki, Maziar M. Nekovee
:
Auctioning based Coordinated TV White Space Spectrum Sharing for Home Networks. - Jordi Soria-Comas:
Improving data utility in differential privacy and k-anonymity. - Yeow-Khiang Chia, Kittipong Kittichokechai:
On Secure Source Coding with Side Information at the Encoder. - Arash Behboodi, Pablo Piantanida:
Mixed Noisy Network Coding and Cooperative Unicasting in Wireless Networks. - Ji Won Yoon:
An Efficient Model Selection for Gaussian Mixture Model in a Bayesian Framework. - Feng Lu, Ziqiang Chen:
Unified Representation of Elementary Geometric Transformations and Its Applications in Computer Vision. - Paul Ralph:
Software Engineering Process Theory: A Multi-Method Comparison of Sensemaking-CoevoIution-Implementation Theory and Function-Behavior-Structure Theory. - Abdelhakim Herrouz, Chabane Khentout, Mahieddine Djoudi:
Overview of Web Content Mining Tools. - Christophe Fouqueré, Myriam Quatrini:
Incarnation in Ludics and maximal cliques of paths. - Lewis Tseng, Nitin H. Vaidya:
Byzantine Convex Consensus: Preliminary Version. - John-Olof Nilsson, Peter Händel:
Recursive Bayesian Initialization of Localization Based on Ranging and Dead Reckoning. - Naisan Benatar, Uwe Aickelin, Jonathan M. Garibaldi:
A Comparison of Non-stationary, Type-2 and Dual Surface Fuzzy Control. - Mazlina Abdul Majid, Peer-Olaf Siebers, Uwe Aickelin:
Modelling Reactive and Proactive Behaviour in Simulation: A Case Study in a University Organisation. - Jenna Reps, Jan Feyereisl, Jonathan M. Garibaldi, Uwe Aickelin, Jack E. Gibson, Richard B. Hubbard:
Investigating the Detection of Adverse Drug Events in a UK General Practice Electronic Health-Care Database. - Ian Dent, Uwe Aickelin, Tom Rodden:
Application of a clustering framework to UK domestic electricity data. - Mohammed F. Nather, Nada N. Saleem:
Suggest an Aspect-Oriented Design Approach for UML Communication Diagram. - An Liu, Vincent K. N. Lau:
Mixed-Timescale Precoding and Cache Control in Cached MIMO Interference Network. - Zubair Nabi:
The Anatomy of Web Censorship in Pakistan. - Yi Ming Zou:
Representing Boolean Functions Using Polynomials: More Can Offer Less. - Firas A. Jassim:
A Novel Robust Method to Add Watermarks to Bitmap Images by Fading Technique. - Giovanni Giuffrida, Calogero G. Zarba:
A Formal Sociologic Study of Free Will. - Andrew Trotman, Jinglan Zhang:
Future Web Growth and its Consequences for Web Search Architectures. - Qin Xu, Fan Li, Jinsheng Sun, Moshe Zukerman:
A New TCP/AQM System Analysis. - Ridha Nasri, Zwi Altman:
Handover adaptation for dynamic load balancing in 3gpp long term evolution systems. - Laurent Tapie, Kwamiwi Bernardin Mawussi, Walter Rubio, Benoît Furet:
Machining of complex-shaped parts with guidance curves. - Pierre Olivier, Jalil Boukhobza
, Eric Senn:
Toward a Unified Performance and Power Consumption NAND Flash Memory Model of Embedded and Solid State Secondary Storage Systems. - Sukanta Bhattacharjee, Ansuman Banerjee, Tsung-Yi Ho, Krishnendu Chakrabarty, Bhargab B. Bhattacharya:
Algorithms for Producing Linear Dilution Gradient with Digital Microfluidics. - Piotr Krzysztof Skowron, Lan Yu, Piotr Faliszewski, Edith Elkind:
The Complexity of Fully Proportional Representation for Single-Crossing Electorates. - Roberto Ammendola, Andrea Biagioni, Ottorino Frezza, Werner Geurts, Gert Goossens, Francesca Lo Cicero, Alessandro Lonardo, Pier Stanislao Paolucci, Davide Rossetti, Francesco Simula, Laura Tosoratto, Piero Vicini
:
A heterogeneous many-core platform for experiments on scalable custom interconnects and management of fault and critical events, applied to many-process applications: Vol. II, 2012 technical report. - Elea Giménez-Toledo, Jorge Mañana-Rodríguez, Emilio Delgado López-Cózar:
Quality indicators for scientific journals based on experts opinion. - Fangxiang Feng, Ruifan Li, Xiaojie Wang:
Constructing Hierarchical Image-tags Bimodal Representations for Word Tags Alternative Choice. - Miguel Angel Veganzones, Mihai Datcu, Manuel Graña:
Further results on dissimilarity spaces for hyperspectral images RF-CBIR. - Toufiq Parag:
Submodularity of a Set Label Disagreement Function. - Jason D. McEwen, Boris Leistedt:
Fourier-Laguerre transform, convolution and wavelets on the ball. - Lewis Tseng, Nitin H. Vaidya:
Byzantine Convex Consensus: An Optimal Algorithm. - Pietro Codara, Ottavio M. D'Antona:
Investigating independent subsets of graphs, with Mathematica. - Pietro Codara, Ottavio M. D'Antona, Daniele Filaretti:
Building Bricks with Bricks, with Mathematica. - Pietro Codara, Ottavio M. D'Antona, Francesco Marigo, Corrado Monti:
Making simple proofs simpler. - Pietro Codara:
A Mathematica package to cope with partially ordered sets. - Hubie Chen, Moritz Müller:
One Hierarchy Spawns Another: Graph Deconstructions and the Complexity Classification of Conjunctive Queries. - Rafael E. Carrillo, Jason D. McEwen, Yves Wiaux:
On sparsity averaging. - Latanya Sweeney:
Matching Known Patients to Health Records in Washington State Data. - Alexander V. Evako:
On digital simply connected spaces and manifolds: a digital simply connected 3-manifold is the digital 3-sphere. - G. Kishore Kumar, V. K. Jayaraman:
Clustering of Complex Networks and Community Detection Using Group Search Optimization. - Ian Dent, Uwe Aickelin, Tom Rodden:
The Application of a Data Mining Framework to Energy Usage Profiling in Domestic Residences using UK data. - Ian Dent, Christian Wagner, Uwe Aickelin, Tom Rodden:
Creating Personalised Energy Plans. From Groups to Individuals using Fuzzy C Means Clustering. - Hala Helmi, Jonathan M. Garibaldi, Uwe Aickelin:
Examining the Classification Accuracy of TSVMs with ?Feature Selection in Comparison with the GLAD Algorithm. - Hong Qiao, Yinlin Li, Tang Tang, Peng Wang:
Introducing Memory and Association Mechanism into a Biologically Inspired Visual Model. - Grazziela P. Figueredo, Uwe Aickelin, Peer-Olaf Siebers:
Systems Dynamics or Agent-Based Modelling for Immune Simulation? - Feng Gu, Jan Feyereisl, Robert F. Oates, Jenna Reps, Julie Greensmith, Uwe Aickelin:
Quiet in Class: Classification, Noise and the Dendritic Cell Algorithm. - Yihui Liu, Uwe Aickelin:
Detect adverse drug reactions for drug Alendronate. - Kittipong Kittichokechai, Yeow-Khiang Chia, Tobias J. Oechtering, Mikael Skoglund, Tsachy Weissman:
Secure Source Coding with a Public Helper. - Marius Nicolae, Sanguthevar Rajasekaran:
On string matching with k mismatches. - Naisan Benatar, Uwe Aickelin, Jonathan M. Garibaldi:
An investigation into the relationship between type-2 FOU size and environmental uncertainty in robotic control. - Jenna Reps, Jonathan M. Garibaldi, Uwe Aickelin, Daniele Soria, Jack E. Gibson, Richard B. Hubbard:
Discovering Sequential Patterns in a UK General Practice Database. - Sanguthevar Rajasekaran, Marius Nicolae:
An Elegant Algorithm for the Construction of Suffix Arrays. - Phillippe Samer, Sebastián Urrutia:
A branch and cut algorithm for minimum spanning trees under conflict constraints. - Juha Kärkkäinen, Dominik Kempa, Simon J. Puglisi:
Lempel-Ziv Parsing in External Memory. - Yuqian Zhang, Cun Mu, Han-Wen Kuo, John Wright:
Toward Guaranteed Illumination Models for Non-Convex Objects. - Pablo Mayckon Silva Farias, Ricardo C. Corrêa:
Linear Time Computation of the Maximal (Circular) Sums of Multiple Independent Insertions of Numbers into a Sequence. - Sergio Barbarossa, Stefania Sardellitti, Paolo Di Lorenzo:
Distributed Detection and Estimation in Wireless Sensor Networks. - Sung Ho Chae, Changho Suh, Sae-Young Chung:
Degrees of Freedom of the Rank-deficient Interference Channel with Feedback. - Yihui Liu, Uwe Aickelin:
Detect adverse drug reactions for the drug Pravastatin. - Lavindra de Silva, Amit Kumar Pandey, Mamoun Gharbi, Rachid Alami:
Towards Combining HTN Planning and Geometric Task Planning. - Zhong Chen, Feifei Gao, Zhenwei Zhang, James C. F. Li, Ming Lei:
Multiple-Level Power Allocation Strategy for Secondary Users in Cognitive Radio Networks. - Lu Lu, Lizhao You, Soung Chang Liew:
Network-Coded Multiple Access. - Ittai Abraham, Shiri Chechik:
Dynamic Decremental Approximate Distance Oracles with (1+ε, 2) stretch. - Nandan Mirajkar, Sandeep Bhujbal, Aaradhana Deshmukh:
Perform wordcount Map-Reduce Job in Single Node Apache Hadoop cluster and compress data using Lempel-Ziv-Oberhumer (LZO) algorithm. - Harpreet S. Dhillon, Ying Li, Pavan Nuggehalli, Zhouyue Pi, Jeffrey G. Andrews:
Fundamentals of Heterogeneous Cellular Networks with Energy Harvesting. - Cezary Kaliszyk
, Christoph Lüth:
Proceedings 10th International Workshop On User Interfaces for Theorem Provers, UITP 2012, Bremen, Germany, July 11th, 2012. EPTCS 118, 2013 [contents] - Rusdha Muharar, Randa Zakhour, Jamie S. Evans:
Optimal Power Allocation and User Loading for Multiuser MISO Channels with Regularized Channel Inversion. - Christian von der Weth, Manfred Hauswirth:
DOBBS: Towards a Comprehensive Dataset to Study the Browsing Behavior of Online Users. - Christian von der Weth, Manfred Hauswirth:
Finding Information Through Integrated Ad-Hoc Socializing in the Virtual and Physical World. - Radoslaw Glowinski, Wojciech Rytter:
Compressed Pattern-Matching with Ranked Variables in Zimin Words. - E. Ravindran Vimina, K. Poulose Jacob:
A Sub-block Based Image Retrieval Using Modified Integrated Region Matching. - Chau Do, Eric J. Pauwels:
Using MathML to Represent Units of Measurement for Improved Ontology Alignment. - Jenna Reps, Jonathan M. Garibaldi, Uwe Aickelin, Daniele Soria, Jack E. Gibson, Richard B. Hubbard:
Comparing Data-mining Algorithms Developed for Longitudinal Observational Databases. - Grazziela P. Figueredo, Peer-Olaf Siebers, Uwe Aickelin, Stephanie J. Foan:
A Beginners Guide to Systems Simulation in Immunology. - Christopher M. Roadknight, Uwe Aickelin:
Extending a Microsimulation of the Port of Dover. - Chris M. Roadknight, Uwe Aickelin, Guoping Qiu, John Scholefield, Lindy Durrant:
Supervised Learning and Anti-learning of Colorectal Cancer Classes and Survival Rates from Cellular Biology Parameters. - Chris M. Roadknight, Uwe Aickelin, Alex Ladas, Daniele Soria, John Scholefield, Lindy Durrant:
Biomarker Clustering of Colorectal Cancer Data to Complement Clinical Classification. - Pietro Codara:
Partitions of a Finite Partially Ordered Set. - Piero Triverio:
Robust Causality Check for Sampled Scattering Parameters via a Filtered Fourier Transform. - Zhiguo Ding, Samir Medina Perlaza, Inaki Esnaola, H. Vincent Poor:
Power Allocation Strategies in Energy Harvesting Wireless Cooperative Networks. - Antonio Fernández Anta, Chryssis Georgiou, Miguel A. Mosteiro:
Algorithmic Mechanisms for Reliable Internet-based Computing under Collusion. - Rami Al-Rfou, Bryan Perozzi, Steven Skiena:
Polyglot: Distributed Word Representations for Multilingual NLP. - Lianggui Liu:
Extracting the trustworthiest way to service provider in complex online social networks. - Diya Naresh Vadhwani, Megha Singh, Deepak Kulhare:
Simulation of wireless dynamic source routing protocol with IP traffic flow analysis, memory efficiency and increased throughput. - Nitish Korula, Silvio Lattanzi:
An efficient reconciliation algorithm for social networks. - Tao Zhang, Peer-Olaf Siebers, Uwe Aickelin:
Modelling the Effects of User Learning on Forced Innovation Diffusion. - Pucktada Treeratpituk, Madian Khabsa, C. Lee Giles:
Graph-based Approach to Automatic Taxonomy Generation (GraBTax). - Jason Dagit, Matthew J. Sottile:
Identifying change patterns in software history. - Frédérique Bassino, Andrea Sportiello:
Linear-time generation of specifiable combinatorial structures: general theory and first examples. - Dmitry Ageyev, Artem Ignatenko, Fouad Wehbe:
Design of Information and Telecommunication Systems with the Usage of the Multi-Layer Graph Model. - Yuting Wang, Gopalan Nadathur:
Towards Extracting Explicit Proofs from Totality Checking in Twelf. - (Withdrawn) Anatomical Feature-guided Volumeric Registration of Multimodal Prostate MRI.
- Richard Gow, Srikumar Venugopal, Pradeep Kumar Ray
:
"The tail wags the dog": A study of anomaly detection in commercial application performance. - Jian Gao, Fang-Wei Fu, Linzhi Shen:
Generalized Quasi-Cyclic Codes Over 𝔽q+u𝔽q. - Sourangsu Banerji:
Study and Development of a Data Acquisition & Control (DAQ) System using TCP/Modbus Protocol. - Cheng Bo, Xuesi Jian, Xiang-Yang Li:
TEXIVE: Detecting Drivers Using Personal Smart Phones by Leveraging Inertial Sensors. - Wei Chen, Dayu Huang, Ankur A. Kulkarni, Jayakrishnan Unnikrishnan, Quanyan Zhu, Prashant G. Mehta, Sean P. Meyn, Adam Wierman:
Approximate dynamic programming using fluid and diffusion approximations with applications to power management. - Aris Filos-Ratsikas, Peter Bro Miltersen:
Truthful approximations to range voting. - Nazim Burak Karahanoglu, Hakan Erdogan:
Improving A*OMP: Theoretical and Empirical Analyses With a Novel Dynamic Cost Model. - Surabhi Jain, N. Sadagopan:
Simpler Sequential and Parallel Biconnectivity Augmentation. - Anna Adamaszek, Andreas Wiese:
Approximation Schemes for Maximum Weight Independent Set of Rectangles. - Minjia Shi:
MacWilliams type identities for some new $m$-spotty weight enumerators over finite commutative Frobenius rings. - Evgenij Thorstensen:
Lifting Structural Tractability to CSP with Global Constraints. - Michele Scquizzato, Francesco Silvestri:
Communication Lower Bounds for Distributed-Memory Computations. - Daniel J. Hsu, Sivan Sabato:
Approximate loss minimization with heavy tails. - Arno Pauly, Matthew de Brecht:
Towards Synthetic Descriptive Set Theory: An instantiation with represented spaces. - Jean-Baptiste Mouret, Sylvain Koos, Stéphane Doncieux:
Crossing the Reality Gap: a Short Introduction to the Transferability Approach. - Ibrahim Sabek, Noha A. Yousri, Nagwa M. El-Makky, Mona Habib:
Intelligent Hybrid Man-Machine Translation Quality Estimation. - Arindam Chaudhuri:
Solution of Rectangular Fuzzy Games by Principle of Dominance Using LR-type Trapezoidal Fuzzy Numbers. - Arindam Chaudhuri, Kajal De:
A Comparative study of Transportation Problem under Probabilistic and Fuzzy Uncertainties. - Arindam Chaudhuri, Kajal De, Dipak Chatterjee, Pabitra Mitra:
Trapezoidal Fuzzy Numbers for the Transportation Problem. - Arindam Chaudhuri, Kajal De, Dipak Chatterjee:
Discovering Stock Price Prediction Rules of Bombay Stock Exchange Using Rough Fuzzy Multi Layer Perception Networks. - Arindam Chaudhuri, Kajal De:
Fuzzy Integer Linear Programming Mathematical Models for Examination Timetable Problem. - Arindam Chaudhuri, Kajal De:
Achieving greater Explanatory Power and Forecasting Accuracy with Non-uniform spread Fuzzy Linear Regression. - Arindam Chaudhuri:
A Dynamic Algorithm for the Longest Common Subsequence Problem using Ant Colony Optimization Technique. - Frank Gurski, Jochen Rethmann, Egon Wanke:
Complexity of the FIFO Stack-Up Problem. - Seyed Kaveh Fayazbakhsh:
Modeling Human Mobility and its Applications in Routing in Delay-Tolerant Networks: a Short Survey. - Murat Ali Bayir, Ismail Hakki Toroslu:
Link Based Session Reconstruction: Finding All Maximal Paths. - Cvetan Dunchev, Alexander Leitsch, Tomer Libal
, Martin Riener
, Mikheil Rukhaia, Daniel Weller, Bruno Woltzenlogel Paleo:
PROOFTOOL: a GUI for the GAPT Framework. 1-14 - Carst Tankink
:
Proof in Context - Web Editing with Rich, Modeless Contextual Feedback. 42-56 - Makarius Wenzel:
READ-EVAL-PRINT in Parallel and Asynchronous Proof-checking. 57-71 - Wolfgang Windsteiger:
Theorema 2.0: A Graphical User Interface for a Mathematical Assistant System. 72-82 - Mingrui Yang, Frank de Hoog:
Coherence and RIP Analysis for Greedy Algorithms in Compressive Sensing. - Wojciech Zaremba, Arthur Gretton, Matthew B. Blaschko:
B-test: A Non-parametric, Low Variance Kernel Two-sample Test. - Jiong He, Mian Lu, Bingsheng He:
Revisiting Co-Processing for Hash Joins on the Coupled CPU-GPU Architecture. - Jae Young Park, Michael B. Wakin, Anna C. Gilbert:
Modal Analysis with Compressive Measurements. - Wentu Song, Son Hoang Dau, Chau Yuen, Tiffany Jing Li:
Optimal Locally Repairable Linear Codes. - Daniel Gaußmann, Stefan Hoffmann, Egon Wanke:
Hierarchical Bipartition Routing for delivery guarantee in sparse wireless ad hoc sensor networks with obstacles. - Alexandros Ladas, Uwe Aickelin, Jonathan M. Garibaldi, Eamonn Ferguson:
Using Clustering to extract Personality Information from socio economic data. - Aslam Ahmed, Julie Greensmith, Uwe Aickelin:
Variance in System Dynamics and Agent Based Modelling Using the SIR Model of Infectious Disease. - Martin Churchill, Jim Laird, Guy McCusker:
Imperative Programs as Proofs via Game Semantics. - Lefteris Zervakis, Christos Tryfonopoulos, Antonios Papadakis-Pesaresi, Manolis Koubarakis, Spiros Skiadopoulos:
Full-text Support for Publish/Subscribe Ontology Systems. - Jenny Rompa, Giorgos Lepouras, Costas Vassilakis, Christos Tryfonopoulos:
OntoFM: A Personal Ontology-based File Manager for the Desktop. - Simone Fulvio Rollini, Roberto Bruttomesso, Natasha Sharygina, Aliaksei Tsitovich:
Resolution Proof Transformation for Compression and Interpolation. - Vasilis K. Oikonomou, Jürgen Jost:
Periodic Strategies and Rationalizability in Perfect Information 2-Player Strategic Form Games. - Eike Hermann Müller, Robert Scheichl:
Massively parallel solvers for elliptic PDEs in Numerical Weather- and Climate Prediction. - Santiago Canales, Gregorio Hernández-Peñalver, Ana Mafalda Martins, Inês Matos:
Distance domination, guarding and vertex cover for maximal outerplanar graph. - Anshul Gupta, Sven Schewe:
The benefit of law-making power. - Catuscia Palamidessi:
Comparing the Expressive Power of the Synchronous and the Asynchronous pi-calculi. - Daniel Graziotin
, Pekka Abrahamsson:
A Web-based modeling tool for the SEMAT Essence theory of Software Engineering. - Mohamed Kafsi, Ehsan Kazemi, Lucas Maystre, Lyudmila Yartseva, Matthias Grossglauser, Patrick Thiran:
Mitigating Epidemics through Mobile Micro-measures. - Maike Buchin, Anne Driemel, Bettina Speckmann:
Computing the Fréchet distance with shortcuts is NP-hard. - Edoardo Di Napoli, Diego Fabregat-Traver, Gregorio Quintana-Ortí, Paolo Bientinesi:
Towards an Efficient Use of the BLAS Library for Multilinear Tensor Contractions. - Or Ordentlich, Uri Erez, Bobak Nazer:
Successive Integer-Forcing and its Sum-Rate Optimality. - Ian Dent, Tony Craig, Uwe Aickelin, Tom Rodden:
Finding the creatures of habit; Clustering households based on their flexibility in using electricity. - Yi-Zheng Fan, Tao Huang, Ming Zhu:
Mixed Compressed Sensing Based on Random Graphs. - David A. McAllester:
A PAC-Bayesian Tutorial with A Dropout Bound. - Mark A. Iwen, Rayan Saab:
Near-Optimal Encoding for Sigma-Delta Quantization of Finite Frame Expansions. - Javier Esparza, Jörg Desel:
On Negotiation as Concurrency Primitive. - Deepak Ponvel Chermakani:
Efficiently determining Convergence in Polynomial Recurrence Sequences. - Dániel Marx, Michal Pilipczuk:
Everything you always wanted to know about the parameterized complexity of Subgraph Isomorphism (but were afraid to ask). - R. E. Slattery, R. R. McHardy, R. Bairathi:
On the Topology of the Facebook Page Network. - Yoram Moses, Marcia Kuskin Shamo:
A Knowledge-based Treatment of Human-Automation Systems. - Hang T. Dinh, Hieu T. Dinh:
Inconsistency and Accuracy of Heuristics with A* Search. - Waldemar Gerok, Jürgen Peissig, Thomas Kaiser:
TDOA assisted RSSD based localization using UWB and directional antennas. - Aleksander Madry:
Navigating Central Path with Electrical Flows: from Flows to Matchings, and Back. - Simina Brânzei, Ioannis Caragiannis, David Kurokawa, Ariel D. Procaccia:
Equilibria of Generalized Cut and Choose Protocols. - Minjia Shi:
The MacWilliams identity for $m$-spotty weight enumerator over $\mathbb{F}_2+u\mathbb{F}_2+\cdots+u^{m-1}\mathbb{F}_2$. - Martin Fürer, Huiwen Yu:
Approximate the k-Set Packing Problem by Local Improvements. - Nicholas J. A. Harvey, Neil Olver:
Pipage Rounding, Pessimistic Estimators and Matrix Concentration. - (Withdrawn) A General Framework for Privacy-Preserving Distributed Greedy Algorithm.
- Hao Yu, Michael J. Neely:
Duality Codes and the Integrality Gap Bound for Index Coding. - Shay Mozes, Oren Weimann:
Improved Submatrix Maximum Queries in Monge Matrices. - Ying Cui, Vincent K. N. Lau, Huang Huang:
Dynamic Partial Cooperative MIMO System for Delay-Sensitive Applications with Limited Backhaul Capacity. - Bertram Felgenhauer, Martin Avanzini, Christian Sternagel:
A Haskell Library for Term Rewriting. - Romeo Rizzi, Alexandru I. Tomescu:
Floating-point arithmetic for approximate counting and random generation problems. - N. N. Davtyan:
On the $μ$-parameters of the Petersen graph. - Junlin Xiong, James Lam, Zhan Shu, Xuerong Mao:
Stability Analysis of Continuous-Time Switched Systems with a Random Switching Signal. - Peter Trifonov, Vera Miloslavskaya:
Polar Codes with Dynamic Frozen Symbols and Their Decoding by Directed Search. - Sena Seneviratne, David C. Levy, Rajkumar Buyya:
A Taxonomy of Performance Prediction Systems in the Parallel and Distributed Computing Grids. - Guilin Zhuansun, Junlin Xiong:
Local Mode Dependent Decentralized H∞ Control of Uncertain Markovian Jump Large-scale Systems. - Avinatan Hassidim, Orgad Keller, Moshe Lewenstein, Liam Roditty:
Finding the Minimum-Weight k-Path. - Yi Huang, Jie Xu, Ling Qiu:
Energy Efficient Coordinated Beamforming for Multi-cell MISO Systems. - Marco Pocci, Isabel Demongodin, Norbert Giambiasi, Alessandro Giua:
Testing experiments on synchronized Petri nets. - Pin-Hsun Lin, Chien-Li Su, Hsuan-Jung Su:
On The Fast Fading Multiple-Antenna Gaussian Broadcast Channel with Confidential Messages and Partial CSIT. - Firouz Abdullah Al-Wassai, N. V. Kalyankar:
Major Limitations of Satellite images. - Thijs Laarhoven
:
Efficient Probabilistic Group Testing Based on Traitor Tracing. - Firouz Abdullah Al-Wassai, N. V. Kalyankar:
Image Fusion Technologies In Commercial Remote Sensing Packages. - Roxana Bujack, Gerik Scheuermann, Eckhard Hitzer:
Detection of Outer Rotations on 3D-Vector Fields with Iterative Geometric Correlation and its Efficiency. - John L. Pfaltz:
The Irreducible Spine(s) of Undirected Networks. - Dan R. Ghica, Alex I. Smith:
From bounded affine types to automatic timing analysis. - Dusan Jakovetic, José M. F. Moura, João Manuel Freitas Xavier:
Linear Convergence Rate of a Class of Distributed Augmented Lagrangian Algorithms. - Nitin H. Vaidya:
Iterative Byzantine Vector Consensus in Incomplete Graphs. - Shenggen Zheng, Jozef Gruska, Daowen Qiu:
On the state complexity of semi-quantum finite automata. - Nirman Kumar, Benjamin Raichel:
Fault Tolerant Clustering Revisited. - Stefan Kratsch, Geevarghese Philip, Saurabh Ray:
Point Line Cover: The Easy Kernel is Essentially Tight. - Marcin Bienkowski, Jaroslaw Byrka, Marek Chrobak, Lukasz Jez, Jirí Sgall:
Better Approximation Bounds for the Joint Replenishment Problem. - Andrew Mastin, Patrick Jaillet:
Greedy Online Bipartite Matching on Random Graphs. - Yoram Bachrach, Vasilis Syrgkanis, Éva Tardos, Milan Vojnovic:
Strong Price of Anarchy and Coalitional Dynamics. - Stefan Milius, Lawrence S. Moss, Daniel Schwencke:
Abstract GSOS Rules and a Modular Treatment of Recursive Definitions. - Mehul Bhatt
, Jan Oliver Wallgrün:
Geospatial Narratives and their Spatio-Temporal Dynamics: Commonsense Reasoning for High-level Analyses in Geographic Information Systems. - El Amin Aoulad Abdelouarit:
Les index pour les entrepôts de données : comparaison entre index arbre-B et Bitmap. - Minjia Shi:
MacWilliams Type identities for $m$-spotty Rosenbloom-Tsfasman weight enumerators over finite commutative Frobenius rings. - Per Kristian Lehre, Carsten Witt:
General Drift Analysis with Tail Bounds. - Saurabh Jha, Tejaswi Agarwal, B. Rajesh Kanna
:
Exploiting Data Parallelism in the yConvex Hypergraph Algorithm for Image Representation using GPGPUs. - Abhinav Sinha, Achilleas Anastasopoulos:
Generalized Proportional Allocation Mechanism Design for Multi-rate Multicast Service on the Internet. - Parosh Aziz Abdulla, Richard Mayr:
Priced Timed Petri Nets. - Chris Piech, Jonathan Huang, Zhenghao Chen, Chuong B. Do, Andrew Y. Ng, Daphne Koller:
Tuned Models of Peer Assessment in MOOCs. - Richard Ellis-Braithwaite, Russell Lock, Ray Dawson, Badr Haque:
Towards an Approach for Analysing the Strategic Alignment of Software Requirements using Quantified Goal Graphs. - Emil Björnson, Jakob Hoydis, Marios Kountouris, Mérouane Debbah:
Massive MIMO Systems with Non-Ideal Hardware: Energy Efficiency, Estimation, and Capacity Limits. - Bin Han, Qun Mo, Zhenpeng Zhao:
Compactly Supported Tensor Product Complex Tight Framelets with Directionality. - Olivier Curé, Myriam Lamolle, Chan Le Duc:
Ontology Based Data Integration Over Document and Column Family Oriented NOSQL. - Timothy Wang, Romain Jobredeaux, Heber Herencia-Zapana, Pierre-Loïc Garoche, Arnaud Dieumegard, Eric Feron, Marc Pantel:
From Design to Implementation: an Automated, Credible Autocoding Chain for Control Systems. - Sourangsu Banerji:
On IEEE 802.11: Wireless LAN Technology. - Hubert Haoyang Duan, Vladimir Pestov, Varun Singla:
Text Categorization via Similarity Search: An Efficient and Effective Novel Algorithm. - Karthikeyan Shanmugam, Alexandros G. Dimakis, Giuseppe Caire:
Index Coding Problem with Side Information Repositories. - Robert Lychev, Sharon Goldberg, Michael Schapira:
BGP Security in Partial Deployment: Is the Juice Worth the Squeeze? - T.-H. Hubert Chan, Fei Chen, Xiaowei Wu, Zhichao Zhao:
Ranking on Arbitrary Graphs: Rematch via Continuous LP with Monotone and Boundary Condition Constraints. - Zahed Rahmati, Mohammad Ali Abam:
Kinetic Data Structures for the Semi-Yao Graph and All Nearest Neighbors in $\mathbb{R}^d$. - Hua Yao, William Zhu:
Applications of repeat degree on coverings of neighborhoods. - Jean Cardinal, Kolja B. Knauer, Piotr Micek, Torsten Ueckerdt:
Making Octants Colorful and Related Covering Decomposition Problems. - Hua Yao, William Zhu:
Unique expansion matroids and union minimal matroids. - Steven Obua, Mark Adams, David Aspinall:
Capturing Hiproofs in HOL Light. - A. Emre Cetin:
The technique of in-place associative sorting. - Shri Prakash Dwivedi:
An Efficient Multiplication Algorithm Using Nikhilam Method. - Stefano Braghin, Vincenzo Iovino, Giuseppe Persiano, Alberto Trombetta:
Secure and Policy-Private Resource Sharing in an Online Social Network. - Francesco Pantisano, Mehdi Bennis, Walid Saad, Stefan Valentin, Mérouane Debbah:
Matching with Externalities for Context-Aware User-Cell Association in Small Cell Networks. - Joël Ouaknine, James Worrell:
Positivity Problems for Low-Order Linear Recurrence Sequences. - Evgenia Christoforou, Antonio Fernández Anta, Chryssis Georgiou, Miguel A. Mosteiro, Ángel Sánchez:
Reputation-based Mechanisms for Evolutionary Master-Worker Computing. - Yu-Ru Lin, Brian Keegan, Drew Margolin, David Lazer:
Rising tides or rising stars?: Dynamics of shared attention on Twitter during media events. - Reza Farrahi Moghaddam, Fereydoun Farrahi Moghaddam, Mohamed Cheriet:
Computer Simulation of 3-D Finite-Volume Liquid Transport in Fibrous Materials: a Physical Model for Ink Seepage into Paper. - Kai Chen, Kai Niu, Jiaru Lin:
Polar Coded Modulation with Optimal Constellation Labeling. - Kai Chen, Kai Niu, Jiaru Lin:
A Hybrid ARQ Scheme Based on Polar Codes. - Yann Disser, Max Klimm, Nicole Megow, Sebastian Stiller:
Packing a Knapsack of Unknown Capacity. - Mohammad Taghi Hajiaghayi, Wei Hu, Jian Li, Shi Li, Barna Saha:
A Constant Factor Approximation Algorithm for Fault-Tolerant k-Median. - Sheng Cai, Mohammad Jahangoshahi, Mayank Bakshi, Sidharth Jaggi:
GROTESQUE: Noisy Group Testing (Quick and Efficient). - Vinay Kumar, Sunil Bhooshan:
Design of One-Dimensional Linear Phase Digital IIR Filters Using Orthogonal Polynomials. - Harbinder Singh, Vinay Kumar, Sunil Bhooshan:
Anisotropic Diffusion for Details Enhancement in Multi-Exposure Image Fusion. - Bin Han, Zhenpeng Zhao:
Image Denoising Using Tensor Product Complex Tight Framelets with Increasing Directionality. - Ulrich Bauer, Xiaoyin Ge, Yusu Wang:
Measuring Distance between Reeb Graphs. - Lorenzo Orecchia, Zeyuan Allen Zhu:
Flow-Based Algorithms for Local Graph Clustering. - Zdenek Dvorák, Martin Kupec, Vojtech Tuma:
Dynamic Data Structure for Tree-Depth Decomposition. - David A. Cohen, Peter G. Jeavons, Evgenij Thorstensen, Stanislav Zivný:
Tractable Combinations of Global Constraints. - Hessam Mahdavifar, Mostafa El-Khamy, Jungwon Lee, Inyup Kang:
Achieving the Uniform Rate Region of Multiple Access Channels Using Polar Codes. - Haris Aziz, Chun Ye:
New Cake Cutting Algorithms: a Random Assignment Approach to Cake Cutting. - Woo-Cheol Kim, Changryong Baek, Dongwon Lee:
Measuring the Optimality of Hadoop Optimization. - Michail Matthaiou
, Agisilaos Papadogiannis, Emil Björnson, Mérouane Debbah:
Two-Way Relaying under the Presence of Relay Transceiver Hardware Impairments. - Atta ur Rehman Khan, Mazliza Othman, Abdul Nasir Khan, Imran Ali Khan:
Framework for Ubiquitous Social Networks. - Constantin Siriteanu, Steven D. Blostein, Akimichi Takemura, Hyundong Shin, Shahram Yousefi:
Exact Performance Analysis of MIMO Zero Forcing Detection for Transmit Correlated Rician Rayleigh Fading. - Xin Li, Hua Vy Le Thanh:
A Formal Framework for Access Rights Analysis. - Quan Wang, Dijia Wu, Le Lu, Meizhu Liu, Kim L. Boyer, Shaohua Kevin Zhou:
Semantic Context Forests for Learning-Based Knee Cartilage Segmentation in 3D MR Images. - Ana Georgina Flesia, Josef Baumgartner, Javier Gimenez, Jorge Martinez:
Accuracy of MAP segmentation with hidden Potts and Markov mesh prior models via Path Constrained Viterbi Training, Iterated Conditional Modes and Graph Cut based algorithms. - Qiwei Lu, Wenchao Huang, Xudong Gong, Xingfu Wang, Yan Xiong, Fuyou Miao:
A Secure Distributed Authentication scheme based on CRT-VSS and Trusted Computing in MANET. - Mohammad Norouzi, Ali Punjani, David J. Fleet:
Fast Exact Search in Hamming Space with Multi-Index Hashing. - Xiaoying Zheng, Chunglae Cho, Ye Xia:
Content Distribution by Multiple Multicast Trees and Intersession Cooperation: Optimal Algorithms and Approximations. - Qiwei Lu, Wenchao Huang, Yan Xiong, Xudong Gong:
Integrity Verification for Outsourcing Uncertain Frequent Itemset Mining. - S. Padmavathi, Manojna K. S. S, S. Sphoorthy Reddy, D. Meenakshy:
Conversion of Braille to Text in English, Hindi and Tamil Languages. - Sharad Sharma, Shakti Kumar, Brahmjit Singh:
Routing in Wireless Mesh Networks: Two Soft Computing Based Approaches. - Sayed Amir Hoseini, Mohammad Reza Ashraf:
Computational Complexity Comparison Of Multi-Sensor Single Target Data Fusion Methods By Matlab. - Shakti Kumar, Brahmjit Singh, Sharad Sharma:
Soft Computing Framework for Routing in Wireless Mesh Networks: An Integrated Cost Function Approach. - Keisuke Umezu, Takahiro Kawamura, Akihiko Ohsuga:
Context-based Barrier Notification Service Toward Outdoor Support for the Elderly. - V. Karthikeyan, S. Senthilkumar, V. J. Vijayalakshmi:
A New Approach to the Solution of Economic Dispatch Using Particle Swarm Optimization with Simulated Annealing. - Craig A. James, Weidong Huang, Kazys Stepanas, Eleonora Widzyk-Capehart, Leila Alem, Chris Gunn, Matt Adcock, Kerstin Haustein:
Designing a Network Based System for Delivery of Remote Mine Services. - Kanika Kaur, Arti Noor:
CMOS Low Power Cell Library For Digital Design. - S. Hemalatha, U. Dinesh Acharya, A. Renuka:
Comparison of secure and high capacity color image steganography techniques in RGB and YCbCr domains. - Stefan Edelkamp, Armin Weiß:
QuickXsort: Efficient Sorting with n log n - 1.399n +o(n) Comparisons on Average. - Mehul Bhatt
:
Between Sense and Sensibility: Declarative narrativisation of mental models as a basis and benchmark for visuo-spatial cognition and computation focussed collaborative cognitive systems. - Sergey Kosov, Pushmeet Kohli, Franz Rottensteiner, Christian Heipke:
A two-layer Conditional Random Field for the classification of partially occluded objects. - Leila Esheiba, Hoda M. O. Mokhtar, Mohamed E. El-Sharkawi:
Spatio-Temporal Queries for moving objects Data warehousing. - Ramneet Kaur, Balwinder Singh:
Design and Implementation of Car Parking System on FPGA. - Sayali Nimkar, Sanal Varghese, Sucheta Shrivastava:
Contrast Enhancement And Brightness Preservation Using Multi- Decomposition Histogram Equalization. - Chittaranjan Pradhan, Ajay Kumar Bisoi:
Chaotic Variations of AES Algorithm. - Osama El-Sayed Sheta, Ahmed Nour Eldeen:
The technology of using a data warehouse to support decision-making in health care. - Sylvain Guillemot, Dániel Marx:
Finding small patterns in permutations in linear time. - Anurag, Gurmohan Singh, Vemu Sulochana:
Low Power Dual Edge-Triggered Static D Flip-Flop. - Erez Kantor, Shay Kutten:
Optimal competitiveness for Symmetric Rectilinear Steiner Arborescence and related problems. - Afifa Ghenai, Mohamed Youcef Badaoui, Mohamed Benmohammed:
Towards a Good ABS Design for more Reliable Vehicles on the Roads. - Dave Murray-Rust, Peter Murray-Rust:
The Declaratron, semantic specification for scientific computation using MathML. - Maria das Graças Bruno Marietto, Rafael Varago de Aguiar, Gislene de Oliveira Barbosa, Wagner Tanaka Botelho, Edson P. Pimentel, Robson dos Santos França, Vera Lúcia da Silva:
Artificial Intelligence MArkup Language: A Brief Tutorial. - Hauke Holtkamp, Gunther Auer:
Fundamental Limits of Energy-Efficient Resource Sharing, Power Control and Discontinuous Transmission. - Hauke Holtkamp, Gunther Auer, Harald Haas:
Minimal average consumption downlink base station power control strategy. - Maria-Florina Balcan, Vitaly Feldman:
Statistical Active Learning Algorithms. - Hauke Holtkamp, Gunther Auer, Harald Haas:
On Minimizing Base Station Power Consumption. - Olav Geil, Stefano Martin:
An improvement of the Feng-Rao bound for primary codes. - Hauke Holtkamp, Gunther Auer, Samer Bazzi, Harald Haas:
Minimizing Base Station Power Consumption. - Guido Dartmann, Ehsan Zandi, Gerd Ascheid:
A Modified Levenberg-Marquardt Method for the Bidirectional Relay Channel. - Juan A. Elices, Fernando Pérez-González:
Linking Correlated Network Flows through Packet Timing: a Game-Theoretic Approach. - Mladen Kovacevic, Dejan Vukobratovic:
Perfect Codes in the Discrete Simplex. - Biswapratapsingh Sahoo:
Performance Comparison of Packet Scheduling Algorithms for Video Traffic in LTE Cellular Network. - B. P. S. Sahoo, Satyajit Rath:
Integrating GPS, GSM and Cellular Phone for Location Tracking and Monitoring. - Riccardo Fedrizzi, Tinku Rasheed:
Cooperative Short Range Routing for Energy Savings in Multi-Interface Wireless Networks. - Alvaro Valcarce, Tinku Rasheed, Karina Mabell Gomez, Kandeepan Sithamparanathan, Laurent Reynaud, Romain Hermenier, Andrea Munari, Mihael Mohorcic, Miha Smolnikar, Isabelle Bucaille:
Airborne Base Stations for Emergency and Temporary Events. - David Coyle, Gavin J. Doherty:
Supporting Therapeutic Relationships and Communication about Mental Health. - David Coyle:
Replicating and Applying a Neuro-Cognitive Experimental Technique in HCI Research. - David Coyle, Mark Matthews, Gavin J. Doherty, John Sharry:
Engaging with mental health: a global challenge. - Nathaniel Korda, Prashanth L. A., Rémi Munos:
Online gradient descent for least squares regression: Non-asymptotic bounds and application to bandits. - Siyang Zhong, Xun Huang:
Compressive sensing based beamforming for noisy measurements. - Samuel Epstein:
Randomness Conservation over Algorithms. - Alexander Kogtenkov
, Bertrand Meyer, Sergey Velder:
Alias and Change Calculi, Applied to Frame Inference. - Oliver Göbel, Martin Hoefer, Thomas Kesselheim, Thomas Schleiden, Berthold Vöcking:
Online Independent Set Beyond the Worst-Case: Secretaries, Prophets, and Periods. - Davide Aversa, Stavros Vassos:
Action-based Character AI in Video-games with CogBots Architecture: A Preliminary Report. - Paulo Sérgio Almeida
, Carlos Baquero:
Scalable Eventually Consistent Counters over Unreliable Networks. - Baisakh, Chinmayee Mishra, Abhilipsa Pradhan:
A Novel Grid Based Dynamic Energy Efficient Routing Approach for Highly Dense Mobile Ad Hoc Networks. - Igor Cizelj, Calin Belta:
Negotiating the Probabilistic Satisfaction of Temporal Logic Motion Specifications. - Xavier Allamigeon, Stéphane Gaubert, Victor Magron, Benjamin Werner:
Certification of Bounds of Non-linear Functions: the Templates Method. - Neil Ghani, Patricia Johann, Clément Fumex:
Indexed Induction and Coinduction, Fibrationally. - Thomas Schultz, Anna Vilanova, Ralph Brecheisen, Gordon L. Kindlmann:
Fuzzy Fibers: Uncertainty in dMRI Tractography. - Michael Kerber, R. Sharathkumar:
Approximate Cech Complexes in Low and High Dimensions. - Shuai Yuan, Jun Wang:
Sequential Selection of Correlated Ads by POMDPs. - Ziad Ahmad, Zachary Chance, David James Love:
Concatenated Coding Using Linear Schemes for Gaussian Broadcast Channels with Noisy Channel Output Feedback. - Md. Maklachur Rahman
:
A dwt, dct and svd based watermarking technique to protect the image piracy. - Tareq Alhmiedat, Amer O. Abu Salem, Anas Abu Taleb:
An imporved decentralized approach for tracking multiple mobile targets through ZigBee WSNs. - Vitaly Feldman, Jan Vondrák:
Optimal Bounds on Approximation of Submodular and XOS Functions by Juntas. - Ashkan Paya, Dan C. Marinescu:
Energy-aware Application Scaling on a Cloud. - Juhi Ameta, Nisheeth Joshi, Iti Mathur:
Improving the quality of Gujarati-Hindi Machine Translation through part-of-speech tagging and stemmer-assisted transliteration. - K. S. Kuppusamy, Leena Mary Francis, Gnanasekaran Aghila:
Report: A Model for Remote Parental Control System Using Smartphones. - Laxmi Kumre, Ajay Somkuwar, Ganga Agnihotri:
Power efficient carry propagate adder. - J. Marcel Heusinger:
Challenges of Critical and Emancipatory Design Science Research: The Design of 'Possible Worlds' as Response. - Andriy Olenko
, Tibor K. Pogány:
Universal truncation error upper bounds in irregular sampling restoration. - Arti Buche, M. B. Chandak, Akshay Zadgaonkar:
Opinion Mining and Analysis: A survey. - T. Chandrasekhar, K. Thangavel, E. Elayaraja, E. N. Sathishkumar:
Unsupervised Gene Expression Data using Enhanced Clustering Method. - Juan A. Elices, Fernando Pérez-González:
The Flow Fingerprinting Game. - Andriy Olenko
, Tibor K. Pogány:
Universal truncation error upper bounds in sampling restoration. - Shihao Yan
, Robert A. Malaney:
Location Verification Systems in Emerging Wireless Networks. - A. B. M. Moniruzzaman, Syed Akhter Hossain:
Comparative Study on Agile software development methodologies. - Valerio Cambareri, Mauro Mangia, Fabio Pareschi, Riccardo Rovatti, Gianluca Setti:
Embedding Multiclass Data Hiding in Compressed Sensing. - Fazle Elahi Faisal, Tijana Milenkovic:
Dynamic networks reveal key players in aging. - R. Swaminathan, K. Karnavel:
Software as a Service - Common Service Bus (SAAS-CSB). - N. Sampath Kumar, U. KarthikChandran, N. ArunKumar, K. Karnavel:
Social Networking Site For Self Portfolio. - Ahmad Reza Montazerolghaem, Mohammad Hossein Yaghmaee:
Sip Overload Control Testbed: Design, Building and Evaluation. - Michael Schmidt, Georg Lausen:
Pleasantly Consuming Linked Data with RDF Data Descriptions. - Hadi Mohasel Afshar, Peter Sunehag:
On Nicod's Condition, Rules of Induction and the Raven Paradox. - Y. Jayanta Singh, Shalu Gupta:
Speedy Object Detection based on Shape. - Osama El-Sayed Sheta, Ahmed Nour Eldeen:
Evaluating a healthcare data warehouse for cancer diseases. - Bubacarr Bah, Ali Sadeghian, Volkan Cevher:
Energy-aware adaptive bi-Lipschitz embeddings. - Anton V. Eremeev:
Non-Elitist Genetic Algorithm as a Local Search Method. - Bilel Ben Ali, Fethi Jarray:
Genetic approach for arabic part of speech tagging. - Bhavya Kailkhura, Yunghsiang S. Han, Swastik Brahma, Pramod K. Varshney:
Distributed Bayesian Detection with Byzantine Data. - Baisakh:
A Review of Energy Efficient Dynamic Source Routing Protocol for Mobile Ad Hoc Networks. - T. Chandrasekhar, K. Thangavel, E. Elayaraja:
Performance Analysis of Clustering Algorithms for Gene Expression Data. - Shuai Yuan, Jun Wang, Maurice van der Meer:
Adaptive Keywords Extraction with Contextual Bandits for Advertising on Parked Domains. - Li He, Hairong Qi, Russell Zaretzki:
Emotion transfer for images based on color combinations. - Éric Grégoire, Jean-Marie Lagniez, Bertrand Mazure:
Improving MUC extraction thanks to local search. - Noah D. Stein, Asuman E. Ozdaglar, Pablo A. Parrilo:
Exchangeable Equilibria, Part I: Symmetric Bimatrix Games. - Rohit Budhiraja, K. S. Karthik, Bhaskar Ramamurthi:
Linear Precoders for Non-Regenerative Asymmetric Two-way Relaying in Cellular Systems. - Fred Y. Ye, Loet Leydesdorff:
The "Academic Trace" of the Performance Matrix: A Mathematical Synthesis of the h-Index and the Integrated Impact Indicator (I3). - Varun Kanade, Elchanan Mossel:
MCMC Learning. - Constantinos Daskalakis, Anindya De, Ilias Diakonikolas, Ankur Moitra, Rocco A. Servedio:
A Polynomial-time Approximation Scheme for Fault-tolerant Distributed Storage. - Sadegh Aliakbary, Jafar Habibi, Ali Movaghar:
Quantification and Comparison of Network Degree Distributions. - Sadegh Aliakbary, Sadegh Motallebi, Jafar Habibi, Ali Movaghar:
Learning an Integrated Distance Metric for Comparing Structure of Complex Networks. - (Withdrawn) Mc-Dis: A Heterogeneous Neighbor Discovery Protocol for Multi-channel Wireless Networks.
- Gaurav Soni, Kamlesh Chandravanshi
:
A Nobel Defence Scheme Against Selfish Node Attack in MANET. - Mehdi Molkaraie, Hans-Andrea Loeliger:
Partition Function of the Ising Model via Factor Graph Duality. - David Gajser:
Verifying Time Complexity of Deterministic Turing Machines. - Natashia Boland, Thomas Kalinowski, Simranjit Kaur:
Scheduling arc shut downs in a network to maximize flow over time with a bounded number of jobs per time period. - Martin Strohmeier, Vincent Lenders, Ivan Martinovic:
Security of ADS-B: State of the Art and Beyond. - Alexandros Ntoulas, Omar Alonso, Vasilis Kandylas:
A Data Management Approach for Dataset Selection Using Human Computation. - Chris Dyer:
Minimum Error Rate Training and the Convex Hull Semiring. - Maiia Bakhova:
A reduction of 3-SAT problem to Buchberger algorithm. - Junzhou Zhao:
On Analyzing Estimation Errors due to Constrained Connections in Online Review Systems. - Rakshith Saligram, Shrihari Shridhar Hegde, Shashidhar A. Kulkarni, H. R. Bhagyalakshmi, M. K. Venkatesha:
Design of Parity Preserving Logic Based Fault Tolerant Reversible Arithmetic Logic Unit. - Gary L. Miller, Richard Peng, Shen Chen Xu:
Parallel Graph Decompositions Using Random Shifts. - Daniel Genin, Jolene Splett:
Where in the Internet is congestion? - Kai-Min Chung, Zhenming Liu, Rafael Pass:
Statistically-secure ORAM with $\tilde{O}(\log^2 n)$ Overhead. - Kiran Kuchi:
Exploiting Spatial Interference Alignment and Opportunistic Scheduling in the Downlink of Interference Limited Systems. - Khalid Raza, Rafat Parveen:
Reconstruction of gene regulatory network of colon cancer using information theoretic approach. - Jun Zhang, Chao-Kai Wen, Shi Jin, Xiqi Gao, Kai-Kit Wong:
Large System Analysis of Cooperative Multi-cell Downlink Transmission via Regularized Channel Inversion with Imperfect CSIT. - Chih-Hong Cheng, Edward A. Lee:
Numerical LTL Synthesis for Cyber-Physical Systems. - Kiran Kuchi:
Limiting Performance of Conventional and Widely Linear DFT-precoded-OFDM Receivers in Wideband Frequency Selective Channels. - Pablo Daniel Azar, Robert Kleinberg, S. Matthew Weinberg:
Prophet Inequalities with Limited Information. - Maria Velema:
Classical Encryption and Authentication under Quantum Attacks. - Albert Gu, Anupam Gupta, Amit Kumar:
The Power of Deferral: Maintaining a Constant-Competitive Steiner Tree Online. - Evgeniy V. Martyushev:
A Minimal Six-Point Auto-Calibration Algorithm. - Peter Sasvari:
The Impacts of Using Business Information Systems on Operational Effectiveness in Hungary. - Zuzana Priscakova, Ivana Rabova:
Model of solutions for data security in Cloud Computing. - Vahid Aref, Laurent Schmalen, Stephan ten Brink:
On the Convergence Speed of Spatially Coupled LDPC Ensembles. - (Withdrawn) Handwritten Digits Recognition using Deep Convolutional Neural Network: An Experimental Study using EBlearn.
- Sameh Sorour, Ahmed Douik
, Shahrokh Valaee, Tareq Y. Al-Naffouri
, Mohamed-Slim Alouini
:
Partially Blind Instantly Decodable Network Codes for Lossy Feedback Environment. - Umang Bhaskar, Katrina Ligett, Leonard J. Schulman:
The Network Improvement Problem for Equilibrium Routing. - Elsayed Ahmed, Ahmed M. Eltawil, Ashutosh Sabharwal:
Self-Interference Cancellation with Nonlinear Distortion Suppression for Full-Duplex Systems. - Xiao-yu Wang, D. Mahinda Vilathgamuwa, S. S. Choi:
Energy Storage System Design for a Power Buffer System to Provide Load Ride-through. - D. Mahinda Vilathgamuwa, X. Y. Wang, King-Jet Tseng, Chandana Jayampathi Gajanayake:
Z-source Inverter Based Grid-interface For Variable-speed Permanent Magnet Wind Turbine Generators. - Weifeng Liu, Dacheng Tao, Jun Cheng, Yuan Yan Tang:
Multiview Hessian Discriminative Sparse Coding for Image Annotation. - Xiongping Dai, Tingwen Huang, Yu Huang, Mingqing Xiao:
Chaotic Characteristics of Discrete-time Linear Inclusion Dynamical Systems. - Bang Ye Wu:
A simple approximation algorithm for the internal Steiner minimum tree. - Keki M. Burjorjee:
The Fundamental Learning Problem that Genetic Algorithms with Uniform Crossover Solve Efficiently and Repeatedly As Evolution Proceeds. - Alexis Bernadet, Stéphane Graham-Lengrand:
A simple presentation of the effective topos. - Paolo Di Lorenzo, Sergio Barbarossa, Stefania Sardellitti:
Joint Optimization of Radio Resources and Code Partitioning in Mobile Cloud Computing. - Leonid Yavits, Amir Morad, Ran Ginosar:
Thermal analysis of 3D associative processor. - Yue Shi, Alexandros Karatzoglou, Linas Baltrunas, Martha A. Larson, Alan Hanjalic:
GAPfm: Optimal Top-N Recommendations for Graded Relevance Domains. - Meena Mahajan:
Algebraic Complexity Classes. - Andrea Farruggia, Paolo Ferragina, Antonio Frangioni, Rossano Venturini:
Bicriteria data compression. - A. Emre Cetin:
Idempotent permutations. - Shigeru Ninagawa:
Solving the Parity Problem with Rule 60 in Array Size of the Power of Two. - Henning Zörlein, Faisal Akram
, Martin Bossert:
Dictionary Adaptation in Sparse Recovery Based on Different Types of Coherence. - Peter Sasvari:
The Effects of Technology and Innovation on Society. - Jakob Nordström
:
Pebble Games, Proof Complexity, and Time-Space Trade-offs. - Wei Ding, Tiejun Lv:
Large-scale MU-MIMO: It Is Necessary to Deploy Extra Antennas at Base Station. - Steffen Borgwardt:
On Soft Power Diagrams. - Alejandro Edera, Federico Schlüter, Facundo Bromberg:
Learning Markov networks with context-specific independences. - Katalin Friedl, Madhu Sudan:
Some Improvements to Total Degree Tests. - Yaroslav D. Sergeyev, Alfredo Garro:
Single-tape and Multi-tape Turing machines through the lens of the Grossone methodology. - Bruno Bauwens:
Asymmetry of the Kolmogorov complexity of online predicting odd and even bits. - Marcin Nagy, N. Asokan, Jörg Ott:
PeerShare: A System Secure Distribution of Sensitive Data Among Social Contacts. - D. S. Pavan Kumar, N. Vishnu Prasad, Vikas Joshi, Srinivasan Umesh:
Modified SPLICE and its Extension to Non-Stereo Data for Noise Robust Speech Recognition. - Diego Mendez, Benoit Baudry, Martin Monperrus:
Empirical Evidence of Large-Scale Diversity in API Usage of Object-Oriented Software. - Hany SalahEldeen, Michael L. Nelson:
Reading the Correct History? Modeling Temporal Intention in Resource Sharing. - Peter Sasvari:
A Conceptual Framework for Definition of the Correlation Between Company Size Categories and the Proliferation of Business Information Systems in Hungary. - Eli A. Meirom, Shie Mannor, Ariel Orda:
Formation Games and the Internet Structure. - John O. Pliam:
Alternating Product Ciphers: A Case for Provable Security Comparisons (extended abstract). - Sardar Muhammad Bilal, Muhammad Naveed Dilber, Atta ur Rehman Khan:
Routing Proposals for Multipath Interdomain Routing. - Atta ur Rehman Khan, Shahzad Ali, Saad Mustafa, Mazliza Othman:
Impact of mobility models on clustering based routing protocols in mobile WSNs. - Atta ur Rehman Khan, Sardar Muhammad Bilal, Mazliza Othman:
A Performance Comparison of Network Simulators for Wireless Networks. - Jie Wang, Jiayu Zhou, Jun Liu, Peter Wonka, Jieping Ye:
A Safe Screening Rule for Sparse Logistic Regression. - Biao He, Xiangyun Zhou, Thushara D. Abhayapala:
Wireless Physical Layer Security with Imperfect Channel State Information: A Survey. - Elsayed Ahmed, Ahmed M. Eltawil, Ashutosh Sabharwal:
Self-Interference Cancellation with Phase Noise Induced ICI Suppression for Full-Duplex Systems. - Parikshit Gopalan, Cheng Huang, Bob Jenkins, Sergey Yekhanin:
Explicit Maximally Recoverable Codes with Locality. - Jie Wang, Jun Liu, Jieping Ye:
Efficient Mixed-Norm Regularization: Algorithms and Safe Screening Methods. - Gabriele Puppis
, Tiziano Villa:
Proceedings Fourth International Symposium on Games, Automata, Logics and Formal Verification, GandALF 2013, Borca di Cadore, Dolomites, Italy, 29-31th August 2013. EPTCS 119, 2013 [contents] - Mohit Singh, László A. Végh:
Approximating Minimum Cost Connectivity Orientation and Augmentation. - Neetu Goel, R. B. Garg:
A Comparative Study of CPU Scheduling Algorithms. - Neetu Goel, R. B. Garg:
An Optimum Multilevel Dynamic Round Robin Scheduling Algorithm. - Revati Shriram, Mahalingam Sundhararajan, Nivedita Daimiwal:
Human Brain Mapping based on COLD Signal Hemodynamic Response and Electrical Neuroimaging. - Farheen Siddiqui, Mohd. Afshar Alam:
Ontology Based Feature Driven Development Life Cycle. - Iztok Fister Jr., Xin-She Yang, Iztok Fister, Janez Brest, Dusan Fister:
A Brief Review of Nature-Inspired Algorithms for Optimization. - Richard Mayr, Patrick Totzke:
Branching-Time Model Checking Gap-Order Constraint Systems. - Lorenzo Fagiano, Trevor Marks:
Design of a small-scale prototype for research in airborne wind energy. - Baisakh, Nileshkumar R. Patel:
Energy Saving and Survival Routing Protocol for Mobile Ad Hoc Networks. - Valerio Capraro:
A Model of Human Cooperation in Social Dilemmas. - Peter Sasvari:
The State of Information and Communication Technology in Hungary, A Comparative Analysis. - Anna Adamaszek, Andreas Wiese:
A QPTAS for Maximum Weight Independent Set of Polygons with Polylogarithmically Many Vertices. - Martin Gairing, Tobias Harks, Max Klimm:
Complexity and Approximation of the Continuous Network Design Problem. - Shlomi Dolev, Robert Gmyr, Andréa W. Richa, Christian Scheideler:
Ameba-inspired Self-organizing Particle Systems. - Huy Nguyen, Rong Zheng:
A Data-driven Study of Influences in Twitter Communities. - Carsten Witt:
The Fitness Level Method with Tail Bounds. - Yuansheng Liu:
Breaking a RGB image encryption algorithm based on DNA encoding and chaos map. - René Sitters:
Polynomial time approximation schemes for the traveling repairman and other minimum latency problems. - Jyoti Singh, Nisheeth Joshi, Iti Mathur:
Part of Speech Tagging of Marathi Text Using Trigram Method. - Deepti Bhalla, Nisheeth Joshi, Iti Mathur:
Rule Based Transliteration Scheme for English to Punjabi. - Junichiro Fukuyama:
An Alternative Proof of the Exponential Monotone Complexity of the Clique Function. - Liliana Marcela Reina Leal, Rafael Repiso, Emilio Delgado López-Cózar:
H Index of scientific Nursing journals according to Google Scholar Metrics (2007-2011). - Lili Su, Farzad Farnoud, Olgica Milenkovic:
Computing Similarity Distances Between Rankings. - Kook Jin Ahn, Sudipto Guha:
Near Linear Time Approximation Schemes for Uncapacitated and Capacitated b-Matching Problems in Nonbipartite Graphs. - Kook Jin Ahn, Sudipto Guha:
Access to Data and Number of Iterations: Dual Primal Algorithms for Maximum Matching under Resource Constraints. - Nahier Aldhafferi, Charles Watson, A. S. M. Sajeev:
A Smart Wizard System Suitable for Use With Internet Mobile Devices to Adjust Personal Information Privacy Settings. - Narayanan Krishnan, Roy D. Yates, Narayan B. Mandayam:
Uplink Linear Receivers for Multi-cell Multiuser MIMO with Pilot Contamination: Large System Analysis. - Lily Briggs:
On the Complexity of a Matching Problem with Asymmetric Weights. - Yu Liu, Alexander M. Haimovich, Wei Su, Jason A. Dabin, Emmanuel Kanterakis:
Modulation Classification of MIMO-OFDM Signals by Independent Component Analysis and Support Vector Machines. - Peter Sasvari:
Usage habits of business information system in Hungary. - Ronald de Haan, Anna Roubícková, Stefan Szeider:
Parameterized Complexity Results for Plan Reuse. - Bo Bai, Wei Chen, Khaled Ben Letaief, Zhigang Cao:
An Outage Exponent Region based Coded f-Matching Framework for Channel Allocation in Multi-carrier Multi-access Channels. - Mahyar Shirvanimoghaddam, Yonghui Li, Shuang Tian, Branka Vucetic:
Distributed Raptor Coding for Erasure Channels: Partially and Fully Coded Cooperation. - Maciej Gazda, Tim A. C. Willemse
:
Zielonka's Recursive Algorithm: dull, weak and solitaire games and tighter bounds. 7-20 - Michael Huth, Jim Huan-Pu Kuo, Nir Piterman:
The Rabin index of parity games. 35-49 - Mark Reynolds:
A Faster Tableau for CTL. 50-63 - Marcello Maria Bersani, Matteo Rossi, Pierluigi San Pietro:
Deciding the Satisfiability of MITL Specifications. 64-78 - Davide Bresolin
:
Improving HyLTL model checking of hybrid systems. 79-92 - Seth Fogarty, Orna Kupferman, Moshe Y. Vardi, Thomas Wilke:
Profile Trees for Büchi Word Automata, with Application to Determinization. 107-121 - Nadia Labai, Johann A. Makowsky:
Weighted Automata and Monadic Second Order Logic. 122-135 - Krishnendu Chatterjee, Monika Henzinger, Sebastian Krinninger, Veronika Loitzenbauer:
Approximating the minimum cycle mean. 136-149 - Alessandra Di Pierro, Herbert Wiklicky:
Probabilistic data flow analysis: a linear equational approach. 150-165 - Aleksandar S. Dimovski:
Slot Games for Detecting Timing Leaks of Programs. 166-179 - Steen Vester:
Alternating-time temporal logic with finite-memory strategies. 194-207 - Wojciech Jamroga, Artur Meski, Maciej Szreter:
Modularity and Openness in Modeling Multi-Agent Systems. 224-239 - François Laroussinie, Nicolas Markey
:
Satisfiability of ATL with strategy contexts. 208-223 - Dario Della Monica
, Margherita Napoli, Mimmo Parente:
Model checking coalitional games in shortage resource scenarios. 240-255 - Weiyu Xu, Myung Cho:
Universally Elevating the Phase Transition Performance of Compressed Sensing: Non-Isometric Matrices are Not Necessarily Bad Matrices. - Deekshith P. K., Vinod Sharma, Ramachandran Rajesh:
AWGN Channel Capacity of Energy Harvesting Transmitters with a Finite Energy Buffer. - Aurélien Bellet:
Supervised Metric Learning with Generalization Guarantees. - I. Laurence Aroquiaraj, K. Thangavel:
Mammogram Edge Detection Using Hybrid Soft Computing Methods. - Jian Li, Zeyu Zhang:
Ranking with Diverse Intents and Correlated Contents. - Dhammika Pieris:
Extending the ER Model to relational Model novel transformation Algorithm: transforming relationship Types among Subtypes. - Adam Kasperski, Pawel Zielinski:
Bottleneck combinatorial optimization problems with uncertain costs and the OWA criterion. - Jakub Mikians, László Gyarmati, Vijay Erramilli, Nikolaos Laoutaris:
Crowd-assisted Search for Price Discrimination in E-Commerce: First results. - Martianus Frederic Ezerman, Somphong Jitman, Patrick Solé:
Xing-Ling Codes, Duals of their Subcodes, and Good Asymmetric Quantum Codes. - Laura Sacerdote, Michele Garetto, Federico Polito, Matteo Sereno:
Superprocesses as models for information dissemination in the Future Internet. - Lei Wang, Xiaodong Wang, Yingjie Wu, Daxin Zhu:
Complete Solutions for a Combinatorial Puzzle in Linear Time. - Christoph Koutschan
:
Creative Telescoping for Holonomic Functions. - Noga Alon, Nicolò Cesa-Bianchi, Claudio Gentile, Yishay Mansour:
From Bandits to Experts: A Tale of Domination and Independence. - Max Tschaikowski, Mirco Tribastone:
Spatial Fluid Limits for Stochastic Mobile Networks. - Michael Lange, Gerard Gorman, Michèle Weiland, Lawrence Mitchell, Xiaohu Guo, James Southern:
Benchmarking mixed-mode PETSc performance on high-performance architectures. - Yun-Bin Zhao:
RSP-Based Analysis for Sparsest and Least ℓ1-Norm Solutions to Underdetermined Linear Systems. - Liang Chen, Yipeng Zhou, Dah Ming Chiu:
Smart Progressive Downloading. - Michal Terepeta, Hanne Riis Nielson, Flemming Nielson:
Pushdown Systems for Monotone Frameworks. - Jérôme Fehrenbach, Pierre Weiss:
Processing stationary noise: model and parameter selection in variational methods. - Makhlad Chahid, Jérôme Bobin, Hamed Shams Mousavi, Emmanuel J. Candès, Maxime Dahan, Vincent Studer:
Hyperspectral fluorescence microscopy based on Compressive Sampling. - Taotao Wang, Soung Chang Liew:
Joint Channel Estimation and Channel Decoding in Physical-Layer Network Coding Systems: An EM-BP Factor Graph Framework. - Benoit Desouter, Tom Schrijvers:
Integrating Datalog and Constraint Solving. - Danny Munera, Daniel Diaz, Salvador Abreu:
Experimenting with X10 for Parallel Constraint-Based Local Search. - Paul Tarau:
A Prolog Specification of Giant Number Arithmetic. - David Scott Warren:
Interning Ground Terms in XSB. - Michael Hanus, Fabian Reck:
A Generic Analysis Server System for Functional Logic Programs. - Bernardino Romera-Paredes, Massimiliano Pontil:
A New Convex Relaxation for Tensor Completion. - Igor Stéphan:
Compilation for QCSP. - Benjamin Audoux:
An application of Khovanov homology to quantum codes. - Marta Bílková
, Alexander Kurz
, Daniela Petrisan, Jirí Velebil:
Relation lifting, with an application to the many-valued cover modality. - Giovanni M. Di Liberto, Serdar Kadioglu, Kevin Leo, Yuri Malitsky:
DASH: Dynamic Approach for Switching Heuristics. - Alejandro Sánchez Guinea:
A Design Methodology for Software Measurement Programs. - Rafael E. Carrillo, Kenneth E. Barner:
Lorentzian Iterative Hard Thresholding: Robust Compressed Sensing with Prior Information. - Mehdi Bahrami:
Cloud Template, a Big Data Solution. - T. Dharani, I. Laurence Aroquiaraj:
Content Based Image Retrieval System using Feature Classification with Modified KNN Algorithm. - Jesse Kelly, Omar Ghattas, Hari Sundar:
A Nested Partitioning Scheme for Parallel Heterogeneous Clusters. - Maaz M. Mohiuddin, Varun Maheshwari, Sreejith T. Veetil, Kiran Kuchi, G. V. V. Sharma, Shahriar Emami:
Performance Limits of a Cloud Radio. - Ahmed El Shafie, Tamer Khattab, Amr El-Keyi, Mohammed Nafie:
Cooperation Between a Primary Terminal and an Energy Harvesting Cognitive Radio Terminal. - Gerald Matz, Helmut Bölcskei, Franz Hlawatsch:
Time-Frequency Foundations of Communications. - Nathan Oken Hodas, Kristina Lerman:
Attention and Visibility in an Information Rich World. - Ayan Sengupta, I-Hsiang Wang, Christina Fragouli:
Cooperative Relaying at Finite SNR - Role of Quantize-Map-and-Forward. - Youssef Khmou, Said Safi, Mohamed Fakir:
Estimating 3D Signals with Kalman Filter. - Yongpeng Wu, Chengshan Xiao, Xiqi Gao, John D. Matyjas, Zhi Ding:
Linear Precoder Design for MIMO Interference Channels with Finite-Alphabet Signaling. - Bo Bai, Wei Chen, Khaled Ben Letaief, Zhigang Cao:
Outage Exponent: A Unified Performance Metric for Parallel Fading Channels. - Yousef Elmehdwi, Bharath K. Samanthula, Wei Jiang:
Secure k-Nearest Neighbor Query over Encrypted Data in Outsourced Environments. - Raphael 'kena' Poss:
Characterizing traits of coordination. - Zheng Wen, Benjamin Van Roy:
Efficient Exploration and Value Function Generalization in Deterministic Systems. - Yanbo Ma, Yuan Liu, Meixia Tao:
Power Efficiency for Device-to-Device Communications. - Carlos Castillo, Gianmarco De Francisci Morales, Marcelo Mendoza, Nasir Khan:
Automatic Analysis of Television News: Media, People, Framing and Bias. - Gilles Chardon, Laurent Daudet:
Source localization in reverberant rooms using sparse modeling and narrowband measurements. - Andreas Krebs, Nutan Limaye, Meena Mahajan, Karteek Sreenivasaiah:
Small Depth Proof Systems. - Janusz Dybizbanski, Andrzej Szepietowski:
Oriented chromatic number of Halin graphs. - Ville Salo:
Hard Asymptotic Sets for One-Dimensional Cellular Automata. - Yoichi Iwata, Keigo Oka, Yuichi Yoshida:
Linear-Time FPT Algorithms via Network Flow. - Yakov Babichenko, Ron Peretz:
Approximate Nash Equilibria via Sampling. - Sudip Mittal, Neha Gupta, Prateek Dewan, Ponnurangam Kumaraguru:
The Pin-Bang Theory: Discovering The Pinterest World. - Martin Suda:
Triggered Clause Pushing for IC3. - Jérémy Berthomieu, Jean-Charles Faugère, Ludovic Perret:
Polynomial-Time Algorithms for Quadratic Isomorphism of Polynomials. - Bowei Chen, Jun Wang, Ingemar J. Cox, Mohan S. Kankanhalli:
Multi-Keyword Multi-Click Option Contracts for Sponsored Search Advertising. - Gholamreza Alirezaei:
A Sharp Double Inequality for the Inverse Tangent Function. - Purnendu Banerjee, B. B. Chaudhuri:
Video and Scene Text Localization using Wavelet and Shearlet Transforms. - Julien Reichert:
On The Complexity of Counter Reachability Games. - Wah Loon Keng, Ge Xia:
The Yao Graph $Y_5$ is a Spanner. - Ruchir Gupta, Yatindra Nath Singh:
Avoiding Whitewashing in Unstructured Peer-to-Peer Resource Sharing Network. - Alexandru Cioaca, Adrian Sandu:
Low-rank Approximations for Computing Observation Impact in 4D-Var Data Assimilation. - Peng Qin, Bin Dai, Kui Wu, Benxiong Huang, Guan Xu:
DCE: A Novel Delay Correlation Measurement for Tomography with Passive Realization. - Per Austrin, Rajsekar Manokaran, Cenny Wenner:
On the NP-Hardness of Approximating Ordering Constraint Satisfaction Problems. - Alexios Balatsoukas-Stimming, Georgios Karakonstantis, Andreas Burg:
Enabling Complexity-Performance Trade-Offs for Successive Cancellation Decoding of Polar Codes. - Hsiang-Fu Yu, Prateek Jain, Inderjit S. Dhillon:
Large-scale Multi-label Learning with Missing Labels. - Stefano Gonella, Jarvis D. Haupt:
Automated Defect Localization via Low Rank Plus Outlier Modeling of Propagating Wavefield Data. - Michel X. Goemans, Thomas Rothvoß:
Polynomiality for Bin Packing with a Constant Number of Item Types. - Gemma Roig
, Xavier Boix, Luc Van Gool:
Random Binary Mappings for Kernel Learning and Efficient SVM. - Weisi Guo, Siyi Wang, Xiaoli Chu
, Jiming Chen, Hui Song, Jie Zhang
:
Automated Small-Cell Deployment for Heterogeneous Cellular Networks. - Andrzej Szepietowski:
Coloring directed cycles. - Vahid Aref, Nicolas Macris, Marc Vuffray:
Approaching the Rate-Distortion Limit with Spatial Coupling, Belief propagation and Decimation. - Paul Dütting, Felix A. Fischer, David C. Parkes:
Expressiveness and Robustness of First-Price Position Auctions. - Serdar Ozyurt, Murat Torlak:
Unified Performance Analysis of Orthogonal Transmit Beamforming Methods with User Selection. - Vivek Kumar Bagaria, Ashwin Pananjady, Rahul Vaze:
Optimally Approximating the Lifetime of Wireless Sensor Networks. - Serdar Ozyurt, Murat Torlak:
Performance Analysis of Optimum Zero-Forcing Beamforming with Greedy User Selection. - Abdelhakim Herrouz, Chabane Khentout, Mahieddine Djoudi:
Navigation Assistance and Web Accessibility Helper. - Nikolaos Chatzis, Georgios Smaragdakis, Anja Feldmann:
On the importance of Internet eXchange Points for today's Internet ecosystem. - Neal Glew, Tim Sweeney, Leaf Petersen:
Formalisation of the lambda aleph Runtime. - Johannes Dams, Martin Hoefer, Thomas Kesselheim:
Jamming-Resistant Learning in Wireless Networks. - Monik Khare, Claire Mathieu, Neal E. Young:
First-Come-First-Served for Online Slot Allocation and Huffman Coding. - Paul Duetting, Robert Kleinberg:
Polymatroid Prophet Inequalities. - Marius Bozga, Radu Iosif, Filip Konecný:
Safety Problems are NP-complete for Flat Integer Programs with Octagonal Loops. - Emanuel Santos, Daniel Faria, Catia Pesquita, Francisco M. Couto:
Ontology alignment repair through modularization and confidence-based heuristics. - Pekka Malo, Ankur Sinha, Pyry Takala, Pekka J. Korhonen, Jyrki Wallenius:
Good Debt or Bad Debt: Detecting Semantic Orientations in Economic Texts. - Oguz Semerci, Ning Hao, Misha Elena Kilmer, Eric L. Miller:
Tensor-based formulation and nuclear norm regularization for multi-energy computed tomography. - Ahmet A. Husainov:
Homology and Bisimulation of Asynchronous Transition Systems and Petri Nets. - Miral Patel, Prem Balani:
Clustering Algorithm for Gujarati Language. - Thomas Eder, Michael Rodler, Dieter Vymazal, Markus Zeilinger:
ANANAS - A Framework For Analyzing Android Applications. - Umakant Mishra:
How do Viruses Attack Anti-Virus Programs. - Umakant Mishra:
10 Inventions on Keyboard key layout: A TRIZ based analysis. - Umakant Mishra:
10 Inventions on improving keyboard efficiency: A TRIZ based analysis. - Umakant Mishra:
10 Inventions on keyboard attachments-A TRIZ based analysis. - Arash Mohammadi, Amir Asif, Xionghu Zhong, A. Benjamin Premkumar:
Distributed Computation of the Conditional PCRLB for Quantized Decentralized Particle Filters. - Chanchal Yadav, Shuliang Wang, Manoj Kumar:
Algorithm and approaches to handle large Data- A Survey. - Yaqin Zhou, Xiang-Yang Li:
Multi-Armed Bandits With Combinatorial Strategies Under Stochastic Bandits. - Hong Xu, Baochun Li:
Reducing Electricity Demand Charge for Data Centers with Partial Execution. - Greg Wilson:
Software Carpentry: Lessons Learned. - Francesca P. Carli, Lipeng Ning, Tryphon T. Georgiou:
Approximation in the Wasserstein distance with application to clustering. - Yun Xu, Edmund M. Yeh, Muriel Médard:
Approaching Gaussian Relay Network Capacity in the High SNR Regime: End-to-End Lattice Codes. - Laura Balzano, Stephen J. Wright:
On GROUSE and Incremental SVD. - Sakrapee Paisitkriangkrai, Chunhua Shen, Anton van den Hengel:
A scalable stage-wise approach to large-margin multi-class loss based boosting. - Dina Goldin, David Burshtein:
Improved Bounds on the Finite Length Scaling of Polar Codes. - Anton V. Eremeev, Julia V. Kovalenko:
Optimal Recombination in Genetic Algorithms. - Yuval Domb, Ram Zamir, Meir Feder:
The Random Coding Bound Is Tight for the Average Linear Code or Lattice. - Masoumeh Vali:
A New Optimization Approach Based on Rotational Mutation and Crossover Operator. - Vijay G. Subramanian, Michael L. Honig, Randy Berry:
Comparative Statics On The Allocation Of Spectrum. - Ross M. McConnell, Yahav Nussbaum:
Linear-Time Recognition of Probe Interval Graphs. - Youlong Wu, Paolo Minero, Michèle A. Wigger:
Insufficiency of Linear-Feedback Schemes In Gaussian Broadcast Channels with Common Message. - Sira Ferradans, Nicolas Papadakis, Gabriel Peyré, Jean-François Aujol:
Regularized Discrete Optimal Transport. - Youlong Wu, Michèle A. Wigger:
Any Positive Feedback Rate Increases the Capacity of Strictly Less-Noisy Broadcast Channels. - Anupam Gupta, Kunal Talwar:
Random Rates for 0-Extension and Low-Diameter Decompositions. - Henk D. L. Hollmann, Wencin Poh:
Characterizations and construction methods for linear functional-repair storage codes. - Subra Mukherjee
, Karen Das:
A Novel Equation based Classifier for Detecting Human in Images. - Zhe Hou, Ranald Clouston, Rajeev Goré, Alwen Tiu:
Proof search for propositional abstract separation logics via labelled sequents. - M. Naresh Kumar:
Performance comparison of State-of-the-art Missing Value Imputation Algorithms on Some Bench mark Datasets. - Jatin Agarwal, Nadeem Moidu, Kishore Kothapalli, Kannan Srinathan:
Efficient Range Reporting of Convex Hull. - Evangelia Matskani, Nestor D. Chatzidiamantis, Leonidas Georgiadis, Iordanis Koutsopoulos, Leandros Tassiulas:
Optimal Primary-Secondary user Cooperation Policies in Cognitive Radio Networks. - Tobias Harks, Philipp von Falkenhausen:
Quantitative Comparative Statics for a Multimarket Paradox. - Uri Abraham, Gal Amram:
On the Mailbox Problem. - Steven Dinger, John Dickens, Adam Pantanowitz
:
Robotic Arm for Remote Surgery. - Duc Phu Chau, Julien Badie, François Brémond, Monique Thonnat:
Online Tracking Parameter Adaptation based on Evaluation. - Guillaume Moroz:
Fast polynomial evaluation and composition. - Bin Tang, Shenghao Yang, Baoliu Ye, Yitong Yin, Sanglu Lu:
Expander Chunked Codes. - Masoumeh Vali:
New Optimization Approach Using Clustering-Based Parallel Genetic Algorithm. - Masoumeh Vali:
Solving Traveling Salesman Problem by Marker Method. - Masoumeh Vali:
Sub-Dividing Genetic Method for Optimization Problems. - Justin F. Brunelle, Michael L. Nelson:
An Evaluation of Caching Policies for Memento TimeMaps. - Nicolas Riche, Matthieu Duvinage, Matei Mancas, Bernard Gosselin, Thierry Dutoit:
A study of parameters affecting visual saliency assessment. - Yasin Kavak, Erkut Erdem, Aykut Erdem:
Visual saliency estimation by integrating features using multiple kernel learning. - Martin Grohe, Kristian Kersting, Martin Mladenov, Erkal Selman:
Dimension Reduction via Colour Refinement. - Samuel Fuller Dodge, Lina J. Karam:
Is Bottom-Up Attention Useful for Scene Recognition? - Jan Tünnermann, Dieter Enns, Bärbel Mertsching:
Saliency-Guided Perceptual Grouping Using Motion Cues in Region-Based Artificial Visual Attention. - Min Zhao, Andre G. Marquez:
Understanding Humans' Strategies in Maze Solving. - Roberto Di Pietro, Gabriele Oligeri:
Silence is Golden: exploiting jamming and radio silence to communicate. - Esther Luna Colombini, Alexandre da Silva Simões, Carlos H. C. Ribeiro:
Top-down and Bottom-up Feature Combination for Multi-sensor Attentive Robots. - Xiaowan Zhang, Bao-Gang Hu:
A New Strategy of Cost-Free Learning in the Class Imbalance Problem. - R. Sandanalakshmi, P. Abinaya Viji, M. Kiruthiga, M. Manjari, M. Sharina:
Speaker Independent Continuous Speech to Text Converter for Mobile Application. - Riccardo Satta:
Appearance Descriptors for Person Re-identification: a Comprehensive Review. - Christoph Neumann, Olivier Heen, Stéphane Onno:
DNStamp: Short-lived Trusted Timestamping. - (Withdrawn) An exact algorithm for 1-in-3 SAT.
- Subra Mukherjee
, Karen Das:
An Adaptive GMM Approach to Background Subtraction for Application in Real Time Surveillance. - Zhiguo Ding, H. Vincent Poor:
Cooperative Energy Harvesting Networks with Spatially Random Users. - Luis Barba, Prosenjit Bose, Mirela Damian, Rolf Fagerberg, Joseph O'Rourke, André van Renssen, Perouz Taslakian, Sander Verdonschot:
New and Improved Spanning Ratios for Yao Graphs. - Robert R. Tucci:
An Information Theoretic Measure of Judea Pearl's Identifiability and Causal Influence. - Masoumeh Vali:
Rotational Mutation Genetic Algorithm on optimization Problems. - Masoumeh Vali:
A New Approach for Finding the Global Optimal Point Using Subdividing Labeling Method (SLM). - Masoumeh Vali:
Sub- Diving Labeling Method for Optimization Problem by Genetic Algorithm. - Mansurul Bhuiyan, Mohammad Al Hasan:
MIRAGE: An Iterative MapReduce based FrequentSubgraph Mining Algorithm. - Peter Lindstrom, Deepak Rajan:
Optimal Hierarchical Layouts for Cache-Oblivious Search Trees. - Suayb S. Arslan, Jaewook Lee, Turguy Goker:
Embedding Noise Prediction into List-Viterbi Decoding using Error Detection Codes for Magnetic Tape Systems. - Abdellah Idrissi:
How to minimize the energy consumption in mobile ad-hoc networks. - Xiao Chen, Zizhuo Wang:
A Near-Optimal Dynamic Learning Algorithm for Online Matching Problems with Concave Returns. - Qi Wei, Nicolas Dobigeon, Jean-Yves Tourneret:
Bayesian Fusion of Multi-Band Images. - Guang Yang, John H. Hipwell, David J. Hawkes, Simon R. Arridge:
Numerical Methods for Coupled Reconstruction and Registration in Digital Breast Tomosynthesis. - Liyao Wang, Mokshay M. Madiman:
Beyond the entropy power inequality, via rearrangements. - Najla Akram Al-Saati, Marwa Abd-AlKareem:
The Use of Cuckoo Search in Estimating the Parameters of Software Reliability Growth Models.