


default search action
CoRR, August 2013
- Masaaki Nagahara, Daniel E. Quevedo

, Jan Østergaard:
Packetized Predictive Control for Rate-Limited Networks via Sparse Representation. - Ryan K. Williams, Andrea Gasparri, Bhaskar Krishnamachari:

Route Swarm: Wireless Network Optimization through Mobility. - Ralph Tanbourgi, Sarabjot Singh, Jeffrey G. Andrews, Friedrich K. Jondral:

A Tractable Model for Non-Coherent Joint-Transmission Base Station Cooperation. - David J. Galas, Nikita A. Sakhanenko, Benjamin Keller:

On Lattices and the Dualities of Information Measures. - Kaiwen Zhang, Hans-Arno Jacobsen:

SDN-like: The Next Generation of Pub/Sub. - David Eppstein:

Drawing Arrangement Graphs In Small Grids, Or How To Play Planarity. - Wei Wang, Baochun Li, Ben Liang:

Dominant Resource Fairness in Cloud Computing Systems with Heterogeneous Servers. - Yinglei Song:

An Improved Parameterized Algorithm for the Independent Feedback Vertex Set Problem. - Alex Pappachen James, Linu Rose V. J. Francis, Dinesh Sasi Kumar:

Resistive Threshold Logic. - Gan Zheng, Ioannis Krikidis, Jiangyuan Li, Athina P. Petropulu, Björn E. Ottersten:

Improving Physical Layer Secrecy Using Full-Duplex Jamming Receivers. - Fatemeh Teymoori, Hamid Nabizadeh, Farzaneh Teymoori:

A new approach in position-based routing protocol using learning automata for vanets in city scenario. - Han-Lim Choi:

Mutual Information-Based Planning for Informative Windowed Forecasting of Continuous-Time Linear Systems. - Adam Noel, Karen C. Cheung, Robert Schober:

Optimal Receiver Design for Diffusive Molecular Communication with Flow and Additive Noise. - Reza Asvadi, Tad Matsumoto, Markku J. Juntti:

Joint Distributed Source-Channel Decoding for LDPC-Coded Binary Markov Sources. - A. Kornyushkin:

X- problem of value three. - Afonso S. Bandeira, Dustin G. Mixon:

Near-optimal phase retrieval of sparse vectors. - Ömer Demirel, Ivo F. Sbalzarini:

Balancing indivisible real-valued loads in arbitrary networks. - Torsten Grust, Alexander Ulrich:

First-Class Functions for First-Order Database Engines. - Michael Dinitz, Merav Parter:

Braess's Paradox in Wireless Networks: The Danger of Improved Technology. - Urs Niesen, Mohammad Ali Maddah-Ali:

Coded Caching with Nonuniform Demands. - László Egri, Pavol Hell, Benoît Larose, Arash Rafiey:

Space complexity of list H-colouring: a dichotomy. - Thomas Place, Lorijn van Rooijen, Marc Zeitoun

:
Separating Regular Languages by Locally Testable and Locally Threshold Testable Languages. - Chris Unsworth, Patrick Prosser:

An n-ary Constraint for the Stable Marriage Problem. - Stephen Pasteris:

Fast Product Format. - Oren Salzman, Dan Halperin:

Asymptotically near-optimal RRT for fast, high-quality, motion planning. - Salim Ismail Al-Akhras, Sofiène Tahar, Gabriela Nicolescu, Michel Langevin, Pierre G. Paulin:

On the Verification of a WiMax Design Using Symbolic Simulation. 23-37 - Dara O. Shayda:

On Kolmogorov Complexity of Random Very Long Braided Words. - Jan A. Bergstra, Cornelis A. Middelburg:

Instruction sequence expressions for the secure hash algorithm SHA-256. - Tarik Anouari, Abdelkrim Haqiq:

Performance Analysis of VoIP Traffic in WiMAX using various Service Classes. - Roberto Amadini, Maurizio Gabbrielli, Jacopo Mauro:

Features for Building CSP Portfolio Solvers. - Helen Z. Margetts, Peter John, Scott A. Hale, Stéphane Reissfelder:

Leadership without Leaders? Starters and Followers in Online Collective Action. - Norbert Paul:

Applications of continuous functions in topological CAD data. - Ryoma Sin'ya:

Text Compression using Abstract Numeration System on a Regular Language. - António Ravara, Josep Silva:

Proceedings 9th International Workshop on Automated Specification and Verification of Web Systems, WWV 2013, Florence, Italy, 6th June 2013. EPTCS 123, 2013 [contents] - Qiang Qiu, Rama Chellappa:

Compositional Dictionaries for Domain Adaptive Face Recognition. - Qiang Qiu, Guillermo Sapiro:

Learning Robust Subspace Clustering. - Qiang Qiu, Guillermo Sapiro, Ching-Hui Chen:

Domain-invariant Face Recognition using Learned Low-rank Transformation. - Qiang Qiu, Zhuolin Jiang, Rama Chellappa:

Sparse Dictionary-based Attributes for Action Recognition and Summarization. - Leonardo Borba, Marcus Ritt:

Exact and Heuristic Methods for the Assembly Line Worker Assignment and Balancing Problem. - Przemyslaw A. Grabowicz, Luca Maria Aiello, Filippo Menczer:

Fast animation of large dynamic networks. - (Withdrawn) On the partition of R^n by hyperplanes.

- Mohamed Chakroun, Ali Wali, Adel M. Alimi:

MAS for video objects segmentation and tracking based on active contours and SURF descriptor. - John Gekas:

Social Data Mining through Distributed Mobile Sensing. - Shervan Fekri Ershad, Hadi Tajalizadeh, Shahram Jafari:

Design and Development of an Expert System to Help Head of University Departments. - Emanuel Aldea, Khurom H. Kiyani:

Hybrid Focal Stereo Networks for Pattern Analysis in Homogeneous Scenes. - Benjamin Graham:

Sparse arrays of signatures for online character recognition. - Mahdi Nasrullah Al-Ameen:

An Intelligent Fire Alert System using Wireless Mobile Communication. - Bo Li, Xin Zhao:

A New 3D Geometric Approach to Focus and Context Lens Effect Simulation. - Masaaki Nagahara, Clyde F. Martin:

L1-Optimal Splines for Outlier Rejection. - Masaaki Nagahara, Yutaka Yamamoto:

Optimal Discretization of Analog Filters via Sampled-Data H-infinity Control Theory. - Luca Cesari, Rosario Pugliese

, Francesco Tiezzi:
Blind-date Conversation Joining. 3-18 - Gabriel Ciobanu

, Ross Horne, Vladimiro Sassone:
Local Type Checking for Linked Data Consumers. 19-33 - Ivan Lanese, Fabrizio Montesi

, Gianluigi Zavattaro:
Amending Choreographies. 34-48 - James Smith:

Proving Properties of Rich Internet Applications. 49-63 - Michael J. Bannister, Zhanpeng Cheng, William E. Devanny, David Eppstein:

Superpatterns and Universal Point Sets. - Fuzhang Wu, Dong-Ming Yan, Weiming Dong, Xiaopeng Zhang, Peter Wonka:

Inverse Procedural Modeling of Facade Layouts. - Stefan Hetzl, Daniel Weller:

Expansion Trees with Cut. - Henri Bruno Razafindradina, Nicolas Raft Razafindrakoto, Paul Auguste Randriamitantsoa:

Improved Watermarking Scheme Using Discrete Cosine Transform and Schur Decomposition. - Tahina Ezéchiel Rakotondraina, Henri Bruno Razafindradina:

Authentication System Securing Index of Image using SVD and ECC. - Shenglong Zhou, Lingchen Kong, Ziyan Luo, Naihua Xiu:

New RIC Bounds via l_q-minimization with 0<q<=1 in Compressed Sensing. - Gregory Z. Gutin, Gabriele Muciaccia, Anders Yeo:

Parameterized Complexity of k-Chinese Postman Problem. - Bin Yang, Manohar Kaul

, Christian S. Jensen:
Using Incomplete Information for Complete Weight Annotation of Road Networks - Extended Version. - Alessandro Crismani, Udo Schilcher, Günther Brandner, Stavros Toumpis, Christian Bettstetter:

Cooperative Relaying in Wireless Networks under Spatially Correlated Interference. - Paola Cattabriga:

A note on Türing's 1936. - James Cheney:

Static Enforceability of XPath-Based Access Control Policies. - Ehirim Henry:

The Effects Of Computerizing Banking Operations. - Stefanie Scherzinger, Meike Klettke, Uta Störl:

Managing Schema Evolution in NoSQL Data Stores. - Giovanni Indiveri, Gianfranco Parlangeli:

Further results on the observability analysis and observer design for single range localization in 3D. - Masaaki Nagahara, Daniel E. Quevedo

, Jan Østergaard:
Sparsely-Packetized Predictive Control by Orthogonal Matching Pursuit. - Zack Fitzsimmons, Edith Hemaspaandra, Lane A. Hemaspaandra:

Control in the Presence of Manipulators: Cooperative and Competitive Cases. - Zhengjun Cao:

On Two Conversion Methods of Decimal-to-Binary. - M. A. Awad, Magdi Zakria Rashad, M. A. Elsoud, M. A. El-Dosuky:

Visualization of Job Scheduling in Grid Computers. - Günce Keziban Orman, Vincent Labatut, Hocine Cherifi:

Towards realistic artificial benchmark for community detection algorithms evaluation. - Abidin Kaya, Bahattin Yildiz, Irfan Siap:

New extremal and optimal binary self-dual codes from quadratic residue codes over f_2+uf_2+u^2f_2. - Eugene Goldberg, Mitesh Jain, Panagiotis Manolios:

Verification of Sequential Circuits by Tests-As-Proofs Paradigm. - Cheng Wang, Bhuvan Urgaonkar, Qian Wang, George Kesidis, Anand Sivasubramaniam:

Data Center Cost Optimization Via Workload Modulation Under Real-World Electricity Pricing. - Henri Bruno Razafindradina, Paul Auguste Randriamitantsoa, Nicolas Raft Razafindrakoto:

Compression d'images par SVD et sur-approximation des composantes de chrominance. - Hulya Seferoglu, Eytan H. Modiano:

TCP-Aware Backpressure Routing and Scheduling. - Michael E. Saks, C. Seshadhri:

Estimating the longest increasing sequence in polylogarithmic time. - Rick Ma, Samuel Cheng:

Zero-error Slepian-Wolf Coding of Confined Correlated Sources with Deviation Symmetry. - Masaaki Nagahara, Yutaka Yamamoto:

Frequency Domain Min-Max Optimization of Noise-Shaping Delta-Sigma Modulators. - Yupeng Fu, Kian Win Ong, Yannis Papakonstantinou:

Declarative Ajax Web Applications through SQL++ on a Unified Application State. - Jimmy S. J. Ren, Wei Wang, Jiawei Wang, Stephen Shaoyi Liao:

Exploring The Contribution of Unlabeled Data in Financial Sentiment Analysis. - Samet Atdag, Vincent Labatut:

A Comparison of Named Entity Recognition Tools Applied to Biographical Texts. - Syed Haani Masood:

Performance comparison of IEEE 802.11g and IEEE 802.11n in the presence of interference from 802.15.4 networks. - Xu Li, Xingming Sun, Quansheng Liu:

Image Integrity Authentication Scheme Based On Fixed Point Theory. - Jaydip Sen:

A Survey on Security and Privacy Protocols for Cognitive Wireless Sensor Networks. - Mark Graham, Scott A. Hale, Devin Gaffney:

Where in the World are You? Geolocation and Language Identification in Twitter. - Arpan Chattopadhyay, Marceau Coupechoux, Anurag Kumar:

As-You-Go Deployment of a Wireless Network with On-Line Measurements and Backtracking. - Johannes Borgström, Andrew D. Gordon, Michael Greenberg

, James Margetson, Jurgen Van Gael:
Measure Transformer Semantics for Bayesian Machine Learning. - Pushan Kumar Dutta

, Mrinal K. Naskar, O. P. Mishra:
Impact of two-level fuzzy cluster head selection model for wireless sensor network: An Energy efficient approach in remote monitoring scenarios. - Meisam Booshehri, Abbas Malekpour, Peter Luksch:

An Improving Method for Loop Unrolling. - Meisam Booshehri, Abbas Malekpour, Peter Luksch, Kamran Zamanifar, Shahdad Shariatmadari:

Ontology Enrichment by Extracting Hidden Assertional Knowledge from Text. - Alexey Potapov, Sergey Rodionov:

Universal Empathy and Ethical Bias for Artificial General Intelligence. - Debi Prasanna Acharjya, Debarati Bhattacharjee:

A Rough Computing based Performance Evaluation Approach for Educational Institutions. - Mohammad Noshad, Maïté Brandt-Pearce:

High-Speed Visible Light Indoor Networks Based on Optical Orthogonal Codes and Combinatorial Designs. - Stasa Milojevic:

Accuracy of simple, initials-based methods for author name disambiguation. - Alexander A. Semenov, Oleg Zaikin:

On estimating total time to solve SAT in distributed computing environments: Application to the SAT@home project. - Bing Wang, Puripant Ruchikachorn, Klaus Mueller:

SketchPadN-D: WYDIWYG Sculpting and Editing in High-Dimensional Space. - Ibrahim Sabek, Moustafa Youssef:

MonoStream: A Minimal-Hardware High Accuracy Device-free WLAN Localization System. - Yasunori Ishihara, Nobutaka Suzuki, Kenji Hashimoto, Shougo Shimizu, Toru Fujiwara:

XPath Satisfiability with Parent Axes or Qualifiers Is Tractable under Many of Real-World DTDs. - Monika Henzinger, Sebastian Krinninger, Danupon Nanongkai:

Dynamic Approximate All-Pairs Shortest Paths: Breaking the O(mn) Barrier and Derandomization. - James D. Wilson, Simi Wang, Peter J. Mucha, Shankar Bhamidi, Andrew B. Nobel:

A Testing Based Extraction Algorithm for Identifying Significant Communities in Networks. - Syed Haani Masood, Syed Ali Raza, Mark Coates:

Content Distribution Strategies in Opportunistic Networks. - Salman Zafar:

The Economic and Sustainability Future of Cellular Networks. - Masaaki Nagahara, Yutaka Yamamoto:

H-Infinity-Optimal Fractional Delay Filters. - Masaaki Nagahara, Takahiro Matsuda, Kazunori Hayashi:

Compressive Sampling for Remote Control Systems. - Matthias Thimm, Gabriele Kern-Isberner:

Stratified Labelings for Abstract Argumentation. - Ziyang Meng, Guodong Shi, Karl Henrik Johansson:

Multi-agent Systems with Compasses. - Onur Yilmaz:

Effects of Individual Success on Globally Distributed Team Performance. - Rohit Bhadauria, Rajdeep Borgohain, Abirlal Biswas, Sugata Sanyal:

Secure Authentication of Cloud Data Mining API. - Goutam Paul, Anupam Chattopadhyay, Chander Chandak:

Designing Parity Preserving Reversible Circuits. - Jian Zhao, Chuan Wu, Zongpeng Li:

Cost Minimization in Multiple IaaS Clouds: A Double Auction Approach. - Alex Graves:

Generating Sequences With Recurrent Neural Networks. - Yanfeng Geng, Christos G. Cassandras:

Quasi-dynamic Traffic Light Control for a Single Intersection. - Bo Li:

A Survey of Spline-based Volumetric Data Modeling Framework and Its Applications. - Bo Li:

A Spline-based Volumetric Data Modeling Framework and Its Applications. - Song-Nam Hong, Giuseppe Caire:

On Interference Networks over Finite Fields. - Parimita Saikia, Karen Das:

Head Gesture Recognition using Optical Flow based Classification with Reinforcement of GMM based Background Subtraction. - A. Kowcika, Uma Maheswari, T. V. Geetha:

Context Specific Event Model For News Articles. - Shailesh Vaya:

The complexity of resolving conflicts on MAC. - Dusan Jakovetic, João Manuel Freitas Xavier, José M. F. Moura:

Convergence Rates of Distributed Nesterov-like Gradient Methods on Random Networks. - Mischael Schill, Sebastian Nanz, Bertrand Meyer:

Handling Parallelism in a Concurrency Model. - (Withdrawn) An Incentive-Based Energy-Efficient Management Framework for Service Discovery in Device-to-Device Communications.

- Fragkiskos D. Malliaros, Michalis Vazirgiannis:

Clustering and Community Detection in Directed Networks: A Survey. - Parinaz Naghizadeh Ardabili, Mingyan Liu:

Closing the Price of Anarchy Gap in the Interdependent Security Game. - Yoram Bachrach, Vasilis Syrgkanis, Milan Vojnovic:

Incentives and Efficiency in Uncertain Collaborative Environments. - Azad Dehghan:

Boundary adjustment of events in clinical named entity recognition. - Rishabh K. Iyer, Stefanie Jegelka, Jeff A. Bilmes:

Fast Semidifferential-based Submodular Function Optimization. - Ping Li, Gennady Samorodnitsky, John E. Hopcroft:

Sign Stable Projections, Sign Cauchy Projections and Chi-Square Kernels. - Cristobal J. Garcia, Peter A. Gloor, Julia Gluesing, Casper Lassenius, Christine Miller, Maria Paasivaara, Ken Riopelle:

Proceedings of the 4th International Conference on Collaborative Innovation Networks COINs13, Santiago de Chile, August 11-13, 2013. - Björn Lohrmann, Daniel Warneke, Odej Kao:

Nephele Streaming: Stream Processing Under QoS Constraints At Scale. - Clemens Grabmayer, Jan Rochel:

Term Graph Representations for Cyclic Lambda-Terms. - David White:

Traversals of Infinite Graphs with Random Local Orientations. - Kafui Monu, Paul Ralph:

Beyond Gamification: Implications of Purposeful Games for the Information Systems Discipline. - Ardeshir Kianercy, Aram Galstyan:

Coevolutionary networks of reinforcement-learning agents. - Tiancheng Li:

A Gap between Simulation and Practice for Recursive Filters: On the State Transition Noise. - Rajesh Hemant Chitnis, László Egri, Dániel Marx:

List H-Coloring a Graph by Removing Few Vertices. - Guoqiong Liao, Yuchen Zhao, Sihong Xie, Philip S. Yu:

Latent Networks Fusion based Model for Event Recommendation in Offline Ephemeral Social Networks. - Haricharan Lakshman, Wang-Q Lim, Heiko Schwarz, Detlev Marpe, Gitta Kutyniok, Thomas Wiegand:

Image interpolation using Shearlet based iterative refinement. - Pablo Arrighi, Alejandro Díaz-Caro, Benoît Valiron:

The Vectorial Lambda-Calculus. - Hessam Mahdavifar, Mostafa El-Khamy, Jungwon Lee, Inyup Kang:

Performance Limits and Practical Decoding of Interleaved Reed-Solomon Polar Concatenated Codes. - Ali Wali, Adel M. Alimi:

Multimodal Approach for Video Surveillance Indexing and Retrieval. - Peter A. Gloor, Maria Paasivaara:

COINs change leaders - Lessons Learned from a Distributed Course. - Karin Frick, Detlef Guertler, Peter A. Gloor:

Coolhunting for the World's Thought Leaders. - Stori Hybbeneth, Dirk Brunnberg, Peter A. Gloor:

Increasing Knowledge Worker Efficiency through a "Virtual Mirror" of the Social Network. - Dirk Brunnberg, Peter A. Gloor, Gianni Giacomelli:

Predicting Client Satisfaction through (E-Mail) Network Analysis: The Communication Score Card. - Tobias Futterer, Peter A. Gloor, Tushar Malhotra, Harrison Mfula, Karsten Packmohr, Stefan Schultheiss:

WikiPulse - A News-Portal Based on Wikipedia. - Gaetano R. Lotrecchiano:

Role and Discipline Relationships in a Transdisciplinary Biomedical Team: Structuration, Values Override and Context Scaffolding. - Tomoki Furukawazono, Shota Seshimo, Daiki Muramatsu, Takashi Iba:

Designing a Pattern Language For Surviving Earthquakes. - Jorge Fabrega, Javier Sajuria:

The Emergence of Political Discourse on Digital Networks: The Case of the Occupy Movement. - Takashi Iba:

Pattern Languages as Media for the Creative Society. - Ali Soltani-Farani, Hamid R. Rabiee, Seyyed Abbas Hosseini:

Spatial-Aware Dictionary Learning for Hyperspectral Image Classification. - Abhijat Vichare:

Intensional view of General Single Processor Operating Systems. - Fabio Pasqualetti, Sandro Zampieri, Francesco Bullo:

Controllability Metrics and Algorithms for Complex Networks. - Sebastian Eggert, Ron van der Meyden, Henning Schnoor, Thomas Wilke:

Complexity and Unwinding for Intransitive Noninterference. - B. U. V. Prashanth, Y. Pandurangaiah:

Generation of Secret Key for Physical Layer to Evaluate Channel Characteristics in Wireless Communications. - Andrew Thangaraj, Rahul Vaze:

Online Algorithms for Basestation Allocation. - Sk. Shariful Alam, Lucio Marcenaro, Carlo S. Regazzoni:

Opportunistic Spectrum Sensing and Transmissions. - Aleksandar Stupar, Sebastian Michel:

Benchmarking Soundtrack Recommendation Systems with SRBench. - Joost Winter, Marcello M. Bonsangue

, Jan J. M. M. Rutten:
Coalgebraic Characterizations of Context-Free Languages. - Keehang Kwon, Jeongyoon Seo:

Bounded-Choice Statements for User Interaction in Imperative and Object-Oriented Programming. - Mehdi Karimi, Amir H. Banihashemi:

On Characterization of Elementary Trapping Sets of Variable-Regular LDPC Codes. - Eraldo Pereira Marinho:

Pattern recognition issues on anisotropic smoothed particle hydrodynamics. - Russell A. Brown:

Barycentric Coordinates as Interpolants. - Ko Matsuzuka, Taichi Isaku, Satoshi Nishina, Takashi Iba:

Global Life Patterns: A Methodology for Designing a Personal Global Life. - Eduardo Marisca:

The Networks Are Out There: Building Cultural and Economic Resilience Through Informal Communities of Practice. - Rahman O. Oloritun, Alex Pentland, Inas Khayal:

Dynamics of Human Social Networks: People, Time, Relationships, and Places. - Elysia Wells:

Science Fiction as a Worldwide Phenomenon: A Study of International Creation, Consumption and Dissemination. - Arokia Paul Rajan, Shanmugapriyaa:

Evolution of Cloud Storage as Cloud Computing Infrastructure Service. - Hendrik Vogt, Aydin Sezgin:

Secret-key generation from wireless channels: Mind the reflections. - Erik Schnetter

:
Performance and Optimization Abstractions for Large Scale Heterogeneous Systems in the Cactus/Chemora Framework. - (Withdrawn) An $O^*(1.0821^n)$-Time Algorithm for Computing Maximum Independent Set in Graphs with Bounded Degree 3.

- Gustavo M. D. Vieira, Luiz Eduardo Buzato:

The Performance of Paxos and Fast Paxos. - Mauricio González Avilés, José Juan González Avilés:

Mathematical model of concentrating solar cooker. - Hyuntaek Oh:

Bayesian ensemble learning for image denoising. - Xiaotie Deng, Paul W. Goldberg, Yang Sun, Bo Tang, Jinshan Zhang:

Pricing Ad Slots with Consecutive Multi-unit Demand. - Cynthia Dwork, Aleksandar Nikolov, Kunal Talwar:

Efficient Algorithms for Privately Releasing Marginals via Convex Relaxations. - Ye Tian, Aylin Yener:

Degrees of Freedom for the MIMO Multi-way Relay Channel. - Hannes Uppman:

Computational Complexity of the Minimum Cost Homomorphism Problem on Three-Element Domains. - Amandianeze O. Nwana, Salman Avestimehr, Tsuhan Chen:

A Latent Social Approach to YouTube Popularity Prediction. - László Dobos, Alexander S. Szalay, Tamas Budavari, István Csabai, Nolan Li:

Graywulf: A platform for federated scientific databases and services. - Ahmet A. Husainov:

Category of asynchronous systems and polygonal morphisms. - Andy R. Terrel, Kyle T. Mandli

:
ManyClaw: Slicing and dicing Riemann solvers for next generation highly parallel architectures. - Abhijeet Bhorkar, Gautam D. Bhanage:

Interference Reduction in High Density WLAN Deployments using antenna Selection. - R. Arokia Paul Rajan, F. Sagayaraj Francis:

Application of Inventory Management Principles for Efficient Data Placement in Storage Networks. - Carsten Burstedde, Donna A. Calhoun, Kyle T. Mandli

, Andy R. Terrel:
ForestClaw: Hybrid forest-of-octrees AMR for hyperbolic conservation laws. - Saba Rezvaniana, Farzad Towhidkhah, Nematollah Ghahramani, Alireza Rezvanian:

Increasing Robustness of the Anesthesia Process from Difference Patient's Delay Using a State-Space Model Predictive Controller. - Somayeh Nabizadeh, Alireza Rezvanian, Mohammad Reza Meybodi:

A Multi-Swarm Cellular PSO based on Clonal Selection Algorithm in Dynamic Environments. - Cedomir Stefanovic, Petar Popovski:

ALOHA Random Access that Operates as a Rateless Code. - Yuriy Ostapov:

Logical analysis of natural language semantics to solve the problem of computer understanding. - Masaaki Nagahara, Clyde F. Martin:

Monotone Smoothing Splines Using General Linear Systems. - Gleb Beliakov, Yuri V. Matiyasevich:

A Parallel Algorithm for Calculation of Large Determinants with High Accuracy for GPUs and MPI clusters. - Sami Alsouri, Thomas Feller, Sunil Malipatlolla, Stefan Katzenbeisser:

Hardware-based Security for Virtual Trusted Platform Modules. - Lutz Bornmann, Werner Marx:

The Wisdom of Citing Scientists. - Yinglei Song:

On the Independent Set and Common Subgraph Problems in Random Graphs. - Airat Urakov, Timofey Timeryaev:

All-Pairs Shortest Paths Algorithm for High-dimensional Sparse Graphs. - Mark Jerrum, Kitty Meeks:

The Parameterised Complexity of Counting Connected Subgraphs. - Masaaki Nagahara, Daniel E. Quevedo

:
Sparse Representations for Packetized Predictive Networked Control. - Yuval Filmus:

Universal codes of the natural numbers. - Raphael 'kena' Poss:

Optimizing for confidence - Costs and opportunities at the frontier between abstraction and reality. - Dietmar Volz:

A Note on Topology Preservation in Classification, and the Construction of a Universal Neuron Grid. - Andrei Popleteev, Venet Osmani, Oscar Mayora:

Investigation of indoor localization with ambient FM radio stations. - Charles H. Swannack, Uri Erez, Gregory W. Wornell:

Geometric Relationships Between Gaussian and Modulo-Lattice Error Exponents. - Megumi Kadotani, Aya Matsumoto, Takafumi Shibuya, Younjae Lee, Saori Watanabe, Takashi Iba:

Pattern Language for Good Old Future From Japanese Culture. - Yoshiaki Matsuzawa, Sayaka Tohyama, Sanshiro Sakai:

The Course Design To Develop Meta-Cognitive Skills for Collaborative Learning Through Tool-Assisted Discourse Analysis. - Suryajith Chillara, Partha Mukhopadhyay:

Determinantal Complexity of Iterated Matrix Multiplication Polynomial. - Hu Fu, Robert Kleinberg:

Improved Lower Bounds for Testing Triangle-freeness in Boolean Functions via Fast Matrix Multiplication. - Subhash C. Kak:

The Number Theoretic Hilbert Transform. - Pietro Codara, Ottavio M. D'Antona, Pavol Hell:

A simple combinatorial interpretation of certain generalized Bell and Stirling numbers. - Muthiah Annamalai:

Invitation to Ezhil: A Tamil Programming Language for Early Computer-Science Education. - Daniel E. Quevedo

, Karl Henrik Johansson, Anders Ahlén, Isabel Jurado:
Adaptive Controller Placement for Wireless Sensor-Actuator Networks with Erasure Channels. - Daniel E. Quevedo

, Jan Østergaard, Anders Ahlén:
Power Control and Coding Formulation for State Estimation with Wireless Sensors. - Aleksandrs Slivkins, Jennifer Wortman Vaughan:

Online Decision Making in Crowdsourcing Markets: Theoretical Challenges (Position Paper). - Ahmed A. Zewail, Yahya Mohasseb, Mohammed Nafie, Hesham El Gamal:

The Deterministic Capacity of Relay Networks with Relay Private Messages. - Alistair Sinclair, Piyush Srivastava, Yitong Yin:

Spatial mixing and approximation algorithms for graphs with bounded connective constant. - Nitin Rakesh, Vipin Tyagi:

Linear Network Coding on Multi-Mesh of Trees (MMT) using All to All Broadcast (AAB). - Fabio Angius, Cédric Westphal, Mario Gerla, Giovanni Pau:

WARP: A ICN architecture for social data. - Marco B. Caminati, Manfred Kerber, Christoph Lange, Colin Rowat:

Proving soundness of combinatorial Vickrey auctions and generating verified executable code. - Jónathan Heras, Ekaterina Komendantskaya, Moa Johansson, Ewen Maclean:

Proof-Pattern Recognition in ACL2. - Michal Aharon, Natalie Aizenberg, Edward Bortnikov, Ronny Lempel, Roi Adadi, Tomer Benyamini, Liron Levin, Ran Roth, Ohad Serfaty:

OFF-Set: One-pass Factorization of Feature Sets for Online Recommendation in Persistent Cold Start Settings. - Umakant Mishra:

Introduction to Management Information system. - Jamshid Tamouk, Nasser Lotfi, Mina Farmanbar:

Satellite image classification methods and Landsat 5TM bands. - Petr A. Golovach:

Editing to a Connected Graph of Given Degrees. - Gaurav Mittal, Nishtha Kesswani, Kuldeep Goswami

:
A Survey of Current Trends in Distributed, Grid and Cloud Computing. - Tareq Alhmiedat, Ghassan Samara

, Amer O. Abu Salem
:
An Indoor Fingerprinting Localization Approach for ZigBee Wireless Sensor Networks. - Pasi Saari, Tuomas Eerola:

Semantic Computing of Moods Based on Tags in Social Media of Music. - Gregory Z. Gutin, Mark Jones:

Parameterized Algorithms for Load Coloring Problem. - Lasse Kliemann:

The Price of Anarchy in Bilateral Network Formation in an Adversary Model. - Stefanie Haustein, Isabella Peters, Cassidy R. Sugimoto, Mike Thelwall

, Vincent Larivière:
Tweeting biomedicine: an analysis of tweets and citations in the biomedical literature. - Mirghiasaldin Seyedebrahimi, Colin Bailey, Xiao-Hong Peng:

Model and Performance of a No-Reference Quality Assessment Metric for Video Streaming. - Anthony Astoul, Christopher Filliter, Eric Mason, Andrew Rau-Chaplin, Kunal Shridhar, Blesson Varghese, Naman Varshney:

Developing and Testing the Automated Post-Event Earthquake Loss Estimation and Visualisation (APE-ELEV) Technique. - Vu Dung Nguyen, Blesson Varghese, Adam Barker:

The Royal Birth of 2013: Analysing and Visualising Public Sentiment in the UK Using Twitter. - Pollyanna Gonçalves, Fabrício Benevenuto, Meeyoung Cha:

PANAS-t: A Pychometric Scale for Measuring Sentiments on Twitter. - Alexandru Cioaca, Adrian Sandu:

An Optimization Framework to Improve 4D-Var Data Assimilation System Performance. - Ehsan Zandi, Guido Dartmann, Gerd Ascheid, Rudolf Mathar:

A Non-Alternating Algorithm for Joint BS-RS Precoding Design in Two-Way Relay Systems. - John Cook, Robert Primmer, Ab de Kwant:

Comparing cost and performance of replication and erasure coding. - Dieter Hutter, Raúl Monroy:

Strand-Based Approach to Patch Security Protocols. - Robert Primmer:

Distributed Object Store Principles of Operation The Case for Intelligent Storage. - Saurabh Aggarwal, Joy Kuri, Rahul Vaze:

Social optimum in Social Groups with Give-and-Take criterion. - Cyril Voyant

, Wani W. Tamas, Christophe Paoli, Aurélia Balu, Marc Muselli, Marie-Laure Nivet, Gilles Notton
:
Time series modeling with pruned multi-layer perceptron and 2-stage damped least-squares method. - Alberto Bartoli, Eric Medvet:

Citation Counts and Evaluation of Researchers in the Internet Age. - Stratos Keranidis, Giannis Kazdaridis, Nikos Makris, Thanasis Korakis, Iordanis Koutsopoulos, Leandros Tassiulas:

Evolution of IEEE 802.11 compatible standards and impact on Energy Consumption. - M. Amin Rahimian, Victor M. Preciado:

Detection and Isolation of Link Failures under the Agreement Protocol. - Ji Zhu, Bruce E. Hajek:

Tree dynamics for peer-to-peer streaming. - Jakub Kowalski, Marek Szykula:

A New Heuristic Synchronizing Algorithm. - Kaushik Mitra, Oliver Cossairt, Ashok Veeraraghavan:

A Framework for the Analysis of Computational Imaging Systems with Practical Applications. - Geoffrey Irving, Forrest Green:

A deterministic pseudorandom perturbation scheme for arbitrary polynomial predicates. - Shuyang Lin, Xiangnan Kong, Philip S. Yu:

Predicting Trends in Social Networks via Dynamic Activeness Model. - Peng Qin, Bin Dai, Kui Wu, Benxiong Huang, Guan Xu:

Taking A Free Ride for Routing Topology Inference in Peer-to-Peer Networks. - Serhat Nazim Avci, Ender Ayanoglu:

Link Failure Recovery over Very Large Arbitrary Networks: The Case of Coding. - Masaaki Nagahara:

Min-Max Design of FIR Digital Filters by Semidefinite Programming. - Tao Huang, Yi-Zheng Fan, Ming Zhu:

Symmetric Toeplitz-Structured Compressed Sensing Matrices. - Rémy Haemmerlé, José F. Morales:

Proceedings of the 23rd Workshop on Logic-based methods in Programming Environments (WLPE 2013). - Ishan Patel, Blesson Varghese, Adam Barker:

RBioCloud: A Light-weight Framework for Bioconductor and R-based Jobs on the Cloud. - Yutaka Yamamoto, Masaaki Nagahara, Pramod P. Khargonekar:

Signal Reconstruction via H-infinity Sampled-Data Control Theory: Beyond the Shannon Paradigm. - Aman Kumar Bahl, Oliver Baltzer, Andrew Rau-Chaplin, Blesson Varghese:

Parallel Simulations for Analysing Portfolios of Catastrophic Event Risk. - Pirita Paajanen:

Finite p-groups, entropy vectors and the Ingleton inequality for nilpotent groups. - Marc Hellmuth, Wilfried Imrich, Tomas Kupka:

Fast Recognition of Partial Star Products and Quasi Cartesian Products. - Daniel Kühlwein, Josef Urban:

MaLeS: A Framework for Automatic Tuning of Automated Theorem Provers. - Mark T. Keane:

Deconstructing analogy. - Alexander V. Terekhov, J. Kevin O'Regan:

Space as an invention of biological organisms. - Paolo Boldi, Sebastiano Vigna:

Axioms for Centrality. - Siert Wieringa:

Some notes on model rotation. - Paolo Boldi, Sebastiano Vigna:

In-Core Computation of Geometric Centralities with HyperBall: A Hundred Billion Nodes and Beyond. - Danny Hendler, Alex Naiman, Sebastiano Peluso, Francesco Quaglia, Paolo Romano, Adi Suissa:

Exploiting Locality in Lease-Based Replicated Transactional Memory via Task Migration. - William M. Farmer, Pouya Larjani:

Frameworks for Reasoning about Syntax that Utilize Quotation and Evaluation. - Kanat Tangwongsan, A. Pavan, Srikanta Tirthapura:

Parallel Triangle Counting in Massive Streaming Graphs. - Hongwei Wang, F. Richard Yu, Li Zhu, Tao Tang, Bin Ning:

Finite-State Markov Modeling of Leaky Waveguide Channels in Communication-based Train Control (CBTC) Systems. - Hsiu-Chen Hsu, Rong-Chin Lo:

A New Mattress Development Based on Pressure Sensors for Body-contouring Uniform Support. - Ping Li, Michael Mitzenmacher, Anshumali Shrivastava:

Coding for Random Projections. - Petra Ahrweiler, Mark T. Keane:

Innovation networks. - Meadhbh Foster, Mark T. Keane:

Surprise: Youve got some explaining to do. - Stephanie O'Toole, Mark T. Keane:

Cognitive residues of similarity. - Shahin Shahrampour, Victor M. Preciado:

Topology Identification of Directed Dynamical Networks via Power Spectral Analysis. - Petteri Räty, Benjamin Behm, Kim-Karol Dikert, Maria Paasivaara, Casper Lassenius, Daniela E. Damian:

Communication Practices in a Distributed Scrum Project. - Shama Naz Islam, Parastoo Sadeghi, Salman Durrani:

Error Performance Analysis of DF and AF Multi-way Relay Networks with BPSK Modulation. - Dae-Sung Jang, Han-Lim Choi, Ji-Eun Roh:

Search Optimization for Minimum Load under Detection Performance Constraints in Multifunction Radars. - Pascal Koiran, Natacha Portier, Sébastien Tavenas, Stéphan Thomassé:

A tau-conjecture for Newton polygons. - Masaaki Nagahara, Daniel E. Quevedo

, Takahiro Matsuda, Kazunori Hayashi:
Compressive Sampling for Networked Feedback Control. - Heike Benninghoff, Harald Garcke:

Fast image segmentation and restoration using parametric curve evolution with junctions and topology changes. - Mohammadreza Malek-Mohammadi, Massoud Babaie-Zadeh, Arash Amini, Christian Jutten:

Recovery of Low Rank Matrices Under Affine Constraints via a Smoothed Rank Function. - Nithin Nagaraj:

Lossless Data Compression with Error Detection using Cantor Set. - Antoine Deleforge, Florence Forbes, Radu Horaud:

Mapping Learning with Partially Latent Output. - I. Boulkabeit, Linda Mthembu, Tshilidzi Marwala, Fernando Buarque de Lima Neto:

Finite Element Model Updating Using Fish School Search Optimization Method. - Satyakama Paul, Andreas Janecek, Fernando Buarque de Lima Neto, Tshilidzi Marwala:

Applying the Negative Selection Algorithm for Merger and Acquisition Target Identification. - Rakesh Duggirala, P. Narayana:

Mining Positive and Negative Association Rules Using CoherentApproach. - Hongbo Si, Onur Ozan Koyluoglu, Sriram Vishwanath:

Lossy Compression of Exponential and Laplacian Sources using Expansion Coding. - Rémi Bonnet, Rohit Chadha, P. Madhusudan, Mahesh Viswanathan:

Reachability under Contextual Locking. - Jayanta K. Dutta, Bonny Banerjee:

Learning Features and their Transformations by Spatial and Temporal Spherical Clustering. - Srijith Ravikumar, Kartik Talamadupula, Raju Balakrishnan, Subbarao Kambhampati:

RAProp: Ranking Tweets by Exploiting the Tweet/User/Web Ecosystem and Inter-Tweet Agreement. - Amitav Mukherjee, A. Lee Swindlehurst:

On the Detection of Passive Eavesdroppers in the MIMO Wiretap Channel. - Arun S. Maiya, John P. Thompson, Francisco Loaiza-Lemos, Robert M. Rolfe:

Exploratory Analysis of Highly Heterogeneous Document Collections. - Yunsik Jake Jang, Bo young Lim:

Harmonization among national cyber security and cybercrime response organizations: New challenges of cybercrime. - Yao Sun:

Signature-Based Gröbner Basis Algorithms - Extended MMM Algorithm for computing Gröbner bases. - Seyed Pooya Shariatpanahi, Hamed Shah-Mansouri, Babak Hossein Khalaj:

Throughput of One-Hop Wireless Networks with Noisy Feedback Channel. - Francesco Bonanno, Giacomo Capizzi, Christian Napoli, Giorgio Graditi, Giuseppe Marco Tina:

A radial basis function neural network based approach for the electrical characteristics estimation of a photovoltaic module. - Santanu Sarma:

Adaptive Technique for Computationally Efficient Time Delay and Magnitude Estimation of Sinusoidal Signals. - Suresh Jaganathan, Srinivasan Arulanandam, Damodaram Avula:

An Efficient Transport Protocol for delivery of Multimedia An Efficient Transport Protocol for delivery of Multimedia Content in Wireless Grids. - Niraj Kumar Singh, Soubhik Chakraborty, Dheeresh Kumar Mallick:

An Adaptable Fast Matrix Multiplication Algorithm, Going Beyond the Myth of Decimal War. - Tiancheng Li, Shudong Sun, Tariq Pervez Sattar:

A Fast Numerical Fitting Approach to Calculate the Likelihood of Particles in Particle Filters. - Divesh Aggarwal, Oded Regev:

A Note on Discrete Gaussian Combinations of Lattice Vectors. - Amer E. Mouawad, Naomi Nishimura, Venkatesh Raman, Narges Simjour, Akira Suzuki:

On the Parameterized Complexity of Reconfiguration Problems. - Grigori Fursin:

Collective Mind: cleaning up the research and experimentation mess in computer engineering using crowdsourcing, big data and machine learning. - Tiancheng Li:

Bias of the SIR filter in estimation of the state transition noise. - Olivier Picard, Mélanie Lord, Alexandre Blondin Massé, Odile Marcotte, Marcos Lopes, Stevan Harnad:

Hidden Structure and Function in the Lexicon. - Zhiwu Xie, Herbert Van de Sompel, Jinyang Liu, Johann van Reenen, Ramiro Jordan:

Archiving the Relaxed Consistency Web. - Oriol Farràs, Josep Domingo-Ferrer, Alberto Blanco-Justicia:

Privacy-Preserving Trust Management Mechanisms from Private Matching Schemes. - Tiancheng Li, Shudong Sun, Tariq P. Sattar, Juan M. Corchado:

Fighting against Sample Degeneracy and Impoverishment in Particle Filters: Particularly on Intelligent Choices. - (Withdrawn) Exponential Quantum-Classical Gaps in Multiparty Nondeterministic Communication Complexity.

- Cristobal García, Paul Chauveau, Javier Ledezma, Maria Pinto:

What can Social Media teach us about protests? Analyzing the Chilean 2011-12 Student Movement's Network evolution through Twitter data. - Wei Bao, Ben Liang:

Understanding the Benefits of Open Access in Femtocell Networks: Stochastic Geometric Analysis in the Uplink. - Xun Zhou, Rui Zhang, Chin Keong Ho:

Wireless Information and Power Transfer in Multiuser OFDM Systems. - Hui Huang, Uri M. Ascher:

Faster gradient descent and the efficient recovery of images. - Safeeullah Soomro, Zahid Hussain, Ayaz Keerio:

Path Conditions Help to Locate and Localize Faults from Programs. - Andrew Berns, James Hegeman, Sriram V. Pemmaraju:

Super-Fast Distributed Algorithms for Metric Facility Location. - Farbod Roosta-Khorasani, Uri M. Ascher:

Improved bounds on sample size for implicit matrix trace estimators. - Georgios Rokos, Gerard J. Gorman, James Southern, Paul H. J. Kelly:

A thread-parallel algorithm for anisotropic mesh adaptation. - Mona Rahn, Guido Schäfer:

Bounding the Inefficiency of Altruism Through Social Contribution Games. - Alexey Gotsman, Hongseok Yang:

Linearizability with Ownership Transfer. - Rafik Aramyan, Gagik Mkrtchyan, Arman Karapetyan:

Coding and Compression of Three Dimensional Meshes by Planes. - R. R. Kamalian:

Interval colorings of complete bipartite graphs and trees. - Chloë Brown, Anastasios Noulas, Cecilia Mascolo, Vincent D. Blondel:

A place-focused model for social networks in cities. - Aman K. Bahl, Oliver Baltzer, Andrew Rau-Chaplin, Blesson Varghese, Aaron Whiteway:

Achieving Speedup in Aggregate Risk Analysis using Multiple GPUs. - Taimoor Abbas, Fredrik Tufvesson:

Line-of-Sight Obstruction Analysis for Vehicle-to-Vehicle Network Simulations in a Two-Lane Highway Scenario. - Lars Roemheld:

Evolutionary Extortion and Mischief: Zero Determinant strategies in iterated 2x2 games. - Craig Vercueil:

A Simple Circle Discretization Algorithm With Applications. - Konstantin Avrachenkov, Nelly Litvak, Vasily Medyanikov, Marina Sokol:

Alpha current flow betweenness centrality. - Masaaki Nagahara, Daniel E. Quevedo

, Jan Østergaard, Takahiro Matsuda, Kazunori Hayashi:
Sparse Command Generator for Remote Control. - Daniel Graziotin, Xiaofeng Wang, Pekka Abrahamsson:

A Framework for Systematic Analysis of Open Access Journals and its Application in Software Engineering and Information Systems. - Gregory Z. Gutin, Magnus Wahlström, Anders Yeo:

Parameterized Rural Postman and Conjoining Bipartite Matching Problems. - Mohamed Hanini, Abdelali El Bouchti, Abdelkrim Haqiq, Amine Berqia:

An Enhanced Time Space Priority Scheme to Manage QoS for Multimedia Flows transmitted to an end user in HSDPA Network. - Parinya Chalermsook, Bundit Laekhanukit, Danupon Nanongkai:

Independent Set, Induced Matching, and Pricing: Connections and Tight (Subexponential Time) Approximation Hardnesses. - José M. Celaya-Padilla, Juan Rodríguez-Rojas, Victor Trevino, José Gerardo Tamez-Peña:

Local image registration a comparison for bilateral registration mammography. - Ilya Loshchilov, Marc Schoenauer, Michèle Sebag:

KL-based Control of the Learning Schedule for Surrogate Black-Box Optimization. - Peter Schuster

:
Induction in Algebra: a First Case Study. - James Hegeman, Sriram V. Pemmaraju:

A Super-Fast Distributed Algorithm for Bipartite Metric Facility Location. - Alexandra Paxton, Rick Dale:

B(eo)W(u)LF: Facilitating recurrence analysis on multi-level language. - Tad Hogg, Kristina Lerman, Laura M. Smith:

Stochastic Models Predict User Behavior in Social Media. - Rodrigo C. de Lamare:

Adaptive and Iterative Multi-Branch MMSE Decision Feedback Detection Algorithms for MIMO Systems. - Masaaki Nagahara, Yutaka Yamamoto:

H-infinity Optimal Approximation for Causal Spline Interpolation. - Masaaki Nagahara, Masaki Ogura, Yutaka Yamamoto:

H-infinity Design of Periodically Nonuniform Interpolation and Decimation for Non-Band-Limited Signals. - Andrew J. Duly, Taejoon Kim, David J. Love, James V. Krogmeier:

Closed-Loop Beam Alignment for Massive MIMO Channel Estimation. - Stephane Durocher, Robert Fraser, Saeed Mehrabi:

A 3-Approximation Algorithm for Guarding Orthogonal Art Galleries with Sliding Cameras. - Debajit Sensarma, Koushik Majumder:

An efficient ant based qos aware intelligent temporally ordered routing algorithm for manets. - M. R. Mollakhalili Meybodi, Mohammad Reza Meybodi:

Extended Distributed Learning Automata: A New Method for Solving Stochastic Graph Optimization Problems. - Sabyasachi Mukhopadhyay, Prasanta K. Panigrahi:

Wind Speed Data Analysis for Various Seasons during a Decade by Wavelet and S transform. - Mohamed Faisal Elrawy, Tarik K. Abdelhamid, Abdelfatah M. Mohamed:

IDS in Telecommunication Network Using PCA. - Ishan Patel, Andrew Rau-Chaplin, Blesson Varghese:

Accelerating R-based Analytics on the Cloud. - Iftikhar Ahmad, Humaira Jabeen, Faisal Riaz:

Improved Quality of Service Protocol for Real Time Traffic in MANET. - Chunming Tang, Yanfeng Qi:

Effective Construction of a Class of Bent Quadratic Boolean Functions. - Severin Bannert, Karlheinz Gröchenig, Joachim Stöckler:

Discretized Gabor Frames of Totally Positive Functions. - Usukhbayar Baldangombo, Nyamjav Jambaljav, Shi-Jinn Horng:

A Static Malware Detection System Using Data Mining Methods. - Nikola Zlatanov, Robert Schober, Zoran Hadzi-Velkov:

Asymptotically Optimal Power Allocation for Energy Harvesting Communication Networks. - Chao Shen, Wei-Chiang Li, Tsung-Hui Chang:

Wireless Information and Energy Transfer in Multi-Antenna Interference Channel. - Animashree Anandkumar, Daniel J. Hsu, Majid Janzamin, Sham M. Kakade:

When are Overcomplete Topic Models Identifiable? Uniqueness of Tensor Tucker Decompositions with Structured Sparsity. - Jakub Gajarský, Michael Lampis, Sebastian Ordyniak:

Parameterized Algorithms for Modular-Width. - Blesson Varghese, Gerard T. McKee, Vassil Alexandrov:

Can Agent Intelligence be used to Achieve Fault Tolerant Parallel Computing Systems? - Robert T. Hans:

Work Breakdown Structure: A Tool for Software Project Scope Verification. - Holger Machens, Volker Turau:

Opacity of Memory Management in Software Transactional Memory. - N. A. Carella:

Deterministic Integer Factorization Algorithms. - Christoph Stockhusen, Till Tantau:

Completeness Results for Parameterized Space Classes. - Amit Daniely, Sivan Sabato, Shai Ben-David, Shai Shalev-Shwartz:

Multiclass learnability and the ERM principle. - Kai Niu, Kai Chen, Jiaru Lin:

Low-Complexity Sphere Decoding of Polar Codes based on Optimum Path Metric. - Markus Miettinen, Stephan Heuser, Wiebke Kronz, Ahmad-Reza Sadeghi, N. Asokan:

ConXsense - Context Sensing for Adaptive Usable Access Control. - Ying Li, Radim Bartos:

A Survey of Protocols for Intermittently Connected Delay-Tolerant Wireless Sensor Networks. - Bendaoud Karim Talal, Rachid Merzougui:

Service Discovery - A Survey and Comparison. - Rahul K. Dixit, Rahul Johari:

As-puma: anycast semantics in parking using metaheuristic approach. - Emiliano De Cristofaro, Claudio Soriente:

Extended Capabilities for a Privacy-Enhanced Participatory Sensing Infrastructure (PEPSI). - Shangxing Wang, Andrea Gasparri, Bhaskar Krishnamachari:

Robotic Message Ferrying for Wireless Networks using Coarse-Grained Backpressure Control. - Qing Hui, Haopeng Zhang:

Semistability-Based Convergence Analysis for Paracontracting Multiagent Coordination Optimization. - K. Jaaskelainen, Louis-François Pau:

ERP projects Internal Stakeholder network and how it influences the projects outcome. - Louis-François Pau:

Mobile operators as banks or vice-versa? and: regulators interest in the best efficiency for payments. - Louis-François Pau:

Smart business networks and business genetics with a high tech communications supplier selection industry case. - Louis-François Pau:

How and why communications industry suppliers get squeezed out: now, and the next phase. - (Withdrawn) BlueSky: Realizing Buried Potential of Bluetooth to Sustain a Large-scale Multi-hop Network.

- Joel A. Tropp, Richard Y. Chen:

Subadditivity of Matrix phi-Entropy and Concentration of Random Matrices. - Bruno D. Abrahao, Flavio Chierichetti, Robert Kleinberg, Alessandro Panconesi:

Trace Complexity of Network Inference. - Connor Ahlbach, Jeremy Usatine, Nicholas Pippenger:

Gap Theorems for the Delay of Circuits Simulating Finite Automata. - Flavio Paiva Junqueira, Marco Serafini:

On Barriers and the Gap between Active and Passive Replication (Full Version). - Nisar R. Ahmed

, Tsung-Lin Yang, Mark E. Campbell:
On Generalized Bayesian Data Fusion with Complex Models in Large Scale Networks. - Wufeng Xue, Lei Zhang, Xuanqin Mou, Alan C. Bovik:

Gradient Magnitude Similarity Deviation: A Highly Efficient Perceptual Image Quality Index. - Juri Ranieri, Amina Chebira, Yue M. Lu, Martin Vetterli:

Phase Retrieval for Sparse Signals: Uniqueness Conditions. - Wei Zeng, An Zeng, Ming-Sheng Shang, Yi-Cheng Zhang:

Membership in social networks and the application in information filtering. - Wei Zeng, An Zeng, Ming-Sheng Shang, Yi-Cheng Zhang:

Information filtering in sparse online systems: recommendation via semi-local diffusion. - Jun He, Xin Yao:

Average Drift Analysis and Population Scalability. - Christopher Zach, Christian Häne:

Compact Relaxations for MAP Inference in Pairwise MRFs with Piecewise Linear Priors. - Sachin Kumar, Ashish Kumar, Pinaki Mitra, Girish Sundaram:

System and Methods for Converting Speech to SQL. - Qiuyu Peng, Anwar Walid, Steven H. Low:

Multipath TCP: Analysis and Design. - Volker Weinberg, Momme Allalen:

First experiences with the Intel MIC architecture at LRZ. - Abdelali El Bouchti, Said El Kafhali, Abdelkrim Haqiq:

Performance Analysis of Connection Admission Control Scheme in IEEE 802.16 OFDMA Networks. - Richard Preen, Larry Bull:

Towards the Coevolution of Novel Vertical-Axis Wind Turbines. - Rahul Vaze, Srikanth K. Iyer:

Percolation on the Information-Theoretically Secure Signal to Interference Ratio Graph. - Kartik Gupta, V. Krishna Nandivada:

Lexical State Analyzer. - Tobias Harks, Martin Hoefer, Kevin Schewior, Alexander Skopalik:

Routing Games with Progressive Filling. - Benjamin Lubin, Jesse Shore, Vatche Ishakian:

Communication Network Design: Balancing Modularity and Mixing via Optimal Graph Spectra. - Andrew R. Cohen, Paul M. B. Vitányi:

Normalized Google Distance of Multisets with Applications. - Jérémie Chalopin, Victor Chepoi, Guyslain Naves:

Isometric embedding of Busemann surfaces into L1. - Nicholas Mastronarde, Viral Patel, Jie Xu, Mihaela van der Schaar:

To Relay or Not to Relay: Learning Relaying Strategies in Cellular Device-to-Device Networks. - Viveck R. Cadambe, Arya Mazumdar:

An Upper Bound On the Size of Locally Recoverable Codes. - Dino Distefano, Jérémy Dubreil:

Detecting Data Races on OpenCL Kernels with Symbolic Execution. - Mohammad Noshad, Maïté Brandt-Pearce:

Can Visible Light Communications Provide Gb/s Service? - Mohamed Ben Halima, Mohamed Hamroun

, Sami Ben Moussa, Adel M. Alimi:
An interactive engine for multilingual video browsing using semantic content. - Pedro Henrique Juliano Nardelli, Carlos A. Pomalaza-Raez, Paulo Cardieri, Matti Latva-aho:

The Quest for Sustainable Smart Grids. - Pierluigi Salvo Rossi, Domenico Ciuonzo, Gianmarco Romano:

Orthogonality and Cooperation in Collaborative Spectrum Sensing through MIMO Decision Fusion. - Mohamed Ben Halima, Hichem Karray, Adel M. Alimi:

Arabic Text Recognition in Video Sequences. - Subhash Khot, Rishi Saket:

Hardness of Finding Independent Sets in 2-Colorable and Almost 2-Colorable Hypergraphs. - Jeremy Kun, Brian Powers, Lev Reyzin:

Anti-Coordination Games and Stable Graph Colorings. - Namyoon Lee, Robert W. Heath Jr.:

Space-Time Interference Alignment and Degrees of Freedom Regions for the MISO Broadcast Channel with Periodic CSI Feedback. - Jelani Nelson, Huy L. Nguyen:

Lower bounds for oblivious subspace embeddings. - Yury Sokolov, Robert Kozma, Ludmilla Werbos, Paul J. Werbos:

Complete stability analysis of a heuristic ADP control design. - Nicholas Kersting:

A Secure and Comparable Text Encryption Algorithm. - Minas Gjoka, Emily Smith, Carter T. Butts:

Estimating Clique Composition and Size Distributions from Sampled Network Data. - Masaaki Nagahara, Ken-ichi Hamaguchi, Yutaka Yamamoto:

Active Noise Control with Sampled-Data Filtered-x Adaptive Algorithm. - (Withdrawn) Notes on equivalence of cut-point languages about measure many quantum automata.

- Masaaki Nagahara:

YY Filter - A Paradigm of Digital Signal Processing. - Qiutao Zhuang, Jia Liu, Xiao Ma:

Upper Bounds On the ML Decoding Error Probability of General Codes over AWGN Channels. - Daniel Andrew Huntley, Vadim Bulitko:

Search-Space Characterization for Real-time Heuristic Search. - Mehdi Ashraphijuo, Vaneet Aggarwal, Xiaodong Wang:

On the Capacity and Degrees of Freedom Regions of MIMO Interference Channels with Limited Receiver Cooperation. - Sanaz Sadeghi, Behrouz Sadeghi:

Designing secure clustering protocol with the approach of reducing energy consumption in wireless sensor networks. - Sujata Khatri, Rajender Singh Chhillar, V. B. Singh:

Improving the Testability of Object-oriented Software during Testing and Debugging Processes. - N. N. Davtyan, R. R. Kamalian:

Some remarks on relations between the $μ$-parameters of regular graphs. - Nikita Yadav, V. B. Singh:

E-Governance: Past, Present and Future in India. - Ahmadreza Ghaffarizadeh, Vicki H. Allan:

History Based Coalition Formation in Hedonic Context Using Trust. - Gelin Zhou:

Sorted Range Reporting Revisited. - Vittorio Bilò:

On Linear Congestion Games with Altruistic Social Context. - Jakub Lacki, Jakub Ocwieja, Marcin Pilipczuk, Piotr Sankowski, Anna Zych:

Dynamic Steiner Tree in Planar Graphs. - Rio Yokota

, Jennifer Pestana, Huda Ibeid
, David E. Keyes:
Fast Multipole Preconditioners for Sparse Matrices Arising from Elliptic Equations. - Marat Charlaganov, Philippe Cudré-Mauroux, Cristian M. Dinu, Christophe Guéret, Martin Grund, Teodor Macicas:

The Entity Registry System: Implementing 5-Star Linked Data Without the Web. - Tamara Mchedlidze, Martin Nöllenburg, Ignaz Rutter:

Drawing Planar Graphs with a Prescribed Inner Face. - Jianfeng Xu, Jun Tang, Xuefeng Ma, Bin Xu, Yanli Shen, Yongjie Qiao:

Objective Information Theory: A Sextuple Model and 9 Kinds of Metrics. - Twan van Laarhoven, Elena Marchiori:

An axiomatic study of objective functions for graph clustering. - Mauro Femminella, Gianluca Reali:

Consistency Analysis of Sensor Data Distribution. - Anthony Bonato, Noor Hadi, Paul Horn, Pawel Pralat, Changping Wang:

Models of on-line social networks. - Hiroki Sayama:

Guiding Designs of Self-Organizing Swarms: Interactive and Automated Approaches. - Matthias Poloczek, David P. Williamson, Anke van Zuylen:

On Some Recent MAX SAT Approximation Algorithms. - Yoshua Bengio, Nicholas Léonard, Aaron C. Courville:

Estimating or Propagating Gradients Through Stochastic Neurons for Conditional Computation. - Dongxiao He, Weixiong Zhang:

Identification of hybrid node and link communities in complex networks. - Petra Berenbrink, Funda Ergün, Frederik Mallmann-Trenn, Erfan Sadeqi Azer:

Palindrome Recognition In The Streaming Model. - Andrei Popescu:

Security Type Systems as Recursive Predicates. - Pinaki Mitra, Girish Sundaram, Swarup Kumar Mallick:

Application Behavior Enforcement Based On Network Characteristics. - Pinaki Mitra, Rinku Das, Girish Sundaram:

Privatizing user credential information of Web services in a shared user environment. - Muhammad Rizwan Asghar, Mihaela Ion, Giovanni Russello, Bruno Crispo:

ESPOON$_{ERBAC}$: Enforcing Security Policies In Outsourced Environments. - Teake Nutma:

xTras: a field-theory inspired xAct package for Mathematica. - Kevin Waugh, Brian D. Ziebart, J. Andrew Bagnell:

Computational Rationalization: The Inverse Equilibrium Problem. - Stanislav Sobolevsky

, Riccardo Campari, Alexander Belyi, Carlo Ratti:
A General Optimization Technique for High Quality Community Detection in Complex Networks. - Andrew Cotter:

Stochastic Optimization for Machine Learning. - Finale Doshi-Velez, George Dimitri Konidaris:

Hidden Parameter Markov Decision Processes: A Semiparametric Regression Approach for Discovering Latent Task Parametrizations. - Rajesh Hemant Chitnis, MohammadTaghi Hajiaghayi, Guy Kortsarz:

Fixed-Parameter and Approximation Algorithms: A New Look. - Alberth Alvarado, Gesualdo Scutari, Jong-Shi Pang:

A New Distributed DC-Programming Method and its Application to Physical Layer Security. - Giacomo Capizzi, Christian Napoli, Francesco Bonanno:

Innovative Second-Generation Wavelets Construction With Recurrent Neural Networks for Solar Radiation Forecasting. - Jiaji Zhou, Stéphane Ross, Yisong Yue, Debadeepta Dey, J. Andrew Bagnell:

Knapsack Constrained Contextual Submodular List Prediction with Application to Multi-document Summarization. - Ming Gan, Dongning Guo, Xuchu Dai:

Distributed Ranging and Localization for Wireless Networks via Compressed Sensing. - Ming Gan, Zhiguo Ding, Xuchu Dai:

Application of Analog Network Coding to MIMO Two-Way Relay Channel in Cellular Systems. - Yoshihisa Udagawa:

Source Code Retrieval Using Sequence Based Similarity. - Leon Wenliang Zhong, James T. Kwok:

Fast Stochastic Alternating Direction Method of Multipliers. - Kevin Benton, Ty Bross:

Timing Analysis of SSL/TLS Man in the Middle Attacks. - Lingfei Jin, Chaoping Xing:

Euclidean and Hermitian Self-orthogonal Algebraic Geometry Codes and Their Application to Quantum Codes. - Lingfei Jin, Chaoping Xing:

A Construction of Quantum Codes via A Class of Classical Polynomial Codes. - Lingfei Jin, Chaoping Xing:

Quantum Gilbert-Varshamov Bound Through Symplectic Self-Orthogonal Codes. - Mohit John, Arun JosephPalai:

ZigBee Based Wireless Data Acquisition Using LabVIEW for Implementing Smart Driving Skill Evaluation System. - Vsevolod Salnikov, Daniel Schien, Hyejin Youn, Renaud Lambiotte, Michael T. Gastner:

The geography and carbon footprint of mobile phone use in Cote d'Ivoire. - Liang Ding, Abdul Samad, Xingran Xue, Xiuzhen Huang, Liming Cai:

Polynomial kernels collapse the W-hierarchy. - Andrew Rau-Chaplin, Blesson Varghese, Duane Wilson, Zhimin Yao, Norbert Zeh:

QuPARA: Query-Driven Large-Scale Portfolio Aggregate Risk Analysis on MapReduce. - Sascha Hunold, Jesper Larsson Träff:

On the State and Importance of Reproducible Experimental Research in Parallel Computing. - Tomer Kotek, Johann A. Makowsky:

Connection Matrices and the Definability of Graph Parameters. - Amy X. Zhang, Anastasios Noulas, Salvatore Scellato, Cecilia Mascolo:

Hoodsquare: Modeling and Recommending Neighborhoods in Location-based Social Networks. - Victor M. Preciado, Faryad Darabi Sahneh, Caterina M. Scoglio:

A Convex Framework for Optimal Investment on Disease Awareness in Social Networks. - Bart M. P. Jansen:

On Sparsification for Computing Treewidth. - Pinaki Mitra, Girish Sundaram, Sreedish P. S.:

Just In Time Indexing. - Antoine Cully, Jean-Baptiste Mouret:

Learning to Walk in Every Direction. - Louis-François Pau:

Business and social evaluation of denial of service attacks of communications networks in view of scaling economic counter-measures. - Joseph Reddington, Fionn Murtagh, Douglas Cowie:

Computational Properties of Fiction Writing and Collaborative Work. - Yahya Forghani, Hadi Sadoghi Yazdi:

Comment on "robustness and regularization of support vector machines" by H. Xu, et al., (Journal of Machine Learning Research, vol. 10 pp. 1485-1510, 2009, arXiv: 0803.3490. - Ali Hameed, Arkadii M. Slinko:

A Characterization of Ideal Weighted Secret Sharing Schemes. - Arif Önder Isikman, Hani Mehrpouyan, Ali A. Nasir, Alexandre Graell i Amat, Rodney A. Kennedy:

Joint Phase Noise Estimation and Data Detection in Coded MIMO Systems. - Joseph Y. Halpern, Rafael Pass:

Game Theory with Translucent Players. - Joseph Y. Halpern, Rafael Pass, Lior Seeman:

Decision Theory with Resource-Bounded Agents. - Hojjat Emami, Shahriar Lotfi:

Graph Colouring Problem Based on Discrete Imperialist Competitive Algorithm. - Md. Ali Hossain, Md. Mijanur Rahman, Uzzal Kumar Prodhan, Md. Farukuzzaman Khan:

Implementation Of Back-Propagation Neural Network For Isolated Bangla Speech Recognition. - Hao Fang, Sergiy A. Vorobyov, Hai Jiang:

Parallel Compressed Sensing Reconstruction. - Jesse Geneson, Rohil Prasad, Jonathan Tidor:

Bounding sequence extremal functions with formations. - Yanpeng Li:

Reference Distance Estimator. - Steven M. Kearns:

Regular Expression Searching in Sublinear Time. - Ahmed Badr, Pratik Patil, Ashish Khisti, Wai-Tian Tan, John G. Apostolopoulos:

Layered Constructions for Low-Delay Streaming Codes. - Igor Razgon:

On OBDDs for CNFs of bounded treewidth. - Rukshan Alexander, Prashanthi Rukshan, Sinnathamby Mahesan:

Natural Language Web Interface for Database (NLWIDB). - Marcos A. Kiwi, Pablo Moisset de Espanés, Ivan Rapaport, Sergio Rica, Guillaume Theyssier:

Strict majority bootstrap percolation in the r-wheel. - Inga A. Ivanova, Loet Leydesdorff:

Redundancy Generation in University-Industry-Government Relations: The Triple Helix Modeled, Measured, and Simulated. - (Withdrawn) Consensus Sequence Segmentation.

- Xiaofeng Bai, Abdallah Shami:

Modeling Self-Similar Traffic for Network Simulation. - Kyeong Soo Kim:

Asynchronous Source Clock Frequency Recovery through Aperiodic Packet Streams. - Roberto Bagnara, Matthieu Carlier, Roberta Gori, Arnaud Gotlieb:

Filtering Floating-Point Constraints by Maximum ULP. - Kyeong Soo Kim:

The Effect of ISP Traffic Shaping on User-Perceived Performances in Broadband Shared Access Networks. - Adam Bachorek, Bagavathiannan Palanisamy, Jens B. Schmitt:

Measurement and Prediction of Centrical/Peripheral Network Properties based on Regression Analysis - A Parametric Foundation for Performance Self-Management in WSNs. - Jian Sun, Wei Chen, Junhui Deng, Jie Gao, Xianfeng Gu, Feng Luo:

A Variational Principle for Improving 2D Triangle Meshes based on Hyperbolic Volume. - Manu S. Hegde, Sanjay Singh:

Alert-BDI: BDI Model with Adaptive Alertness through Situational Awareness. - H. K. Jnanamurthy, Sanjay Singh:

Detection and Filtering of Collaborative Malicious Users in Reputation System using Quality Repository Approach. - Abhijeet Bhorkar, Gautam D. Bhanage:

Reliable multicast in large enterprise networks. - Xin-She Yang:

Bat Algorithm: Literature Review and Applications. - Ricardo G. Sanfelice, Christophe Prieur:

Robust Supervisory Control for Uniting Two Output-Feedback Hybrid Controllers with Different Objectives. - Feng Sun, Yi-King Choi, Yizhou Yu, Wenping Wang:

Medial Meshes for Volume Approximation. - Christian Drescher, Toby Walsh:

Efficient Approximation of Well-Founded Justification and Well-Founded Domination (Corrected and Extended Version). - Yury A. Tyapchenko:

Analysis and Synthesis of a Subsystem of the Manual Control Loop for Manned Spacecraft. - Michael Codish, Yoav Fekete, Amit Metodi:

Compiling Finite Domain Constraints to SAT with BEE: the Director's Cut. - Spyros Hadjichristodoulou, Donald E. Porter, David Scott Warren:

Efficiently Retrieving Function Dependencies in the Linux Kernel Using XSB. - Dragan Ivanovic:

Implementing Constraint Handling Rules as a Domain-Specific Language Embedded in Java. - Alejandro Serrano, Pedro López-García, Manuel V. Hermenegildo:

Towards an Abstract Domain for Resource Analysis of Logic Programs Using Sized Types. - Jan Wielemaker, Michael Hendricks:

Why It's Nice to be Quoted: Quasiquoting for Prolog. - Siu On Chan, Ilias Diakonikolas, Gregory Valiant, Paul Valiant:

Optimal Algorithms for Testing Closeness of Discrete Distributions. - Jingjin Yu, Soon-Jo Chung, Petros G. Voulgaris:

Target Assignment in Robotic Networks: Distance Optimality Guarantees and Hierarchical Strategies. - Keigo Takeuchi, Shuhei Horio:

Iterative Multiuser Detection and Decoding with Spatially Coupled Interleaving. - Roope Vehkalahti:

Remarks on criteria for achieving the optimal diversity-multiplexing gain trade-off. - Michael Woopen, Aravind Balan, Georg May, Jochen Schütz:

A Comparison of Hybridized and Standard DG Methods for Target-Based hp-Adaptive Simulation of Compressible Flow. - Wojciech Czerwinski

, Piotr Hofman
, Slawomir Lasota
:
Reachability Problem for Weak Multi-Pushdown Automata. - Momin Jamil, Xin-She Yang:

A Literature Survey of Benchmark Functions For Global Optimization Problems. - Christian Napoli, Giuseppe Pappalardo, Emiliano Tramontana:

Using Modularity Metrics to assist Move Method Refactoring of Large System. - Adish Singla, Andreas Krause:

Incentives for Privacy Tradeoff in Community Sensing. - Rada Chirkova:

Combined-Semantics Equivalence Is Decidable for a Practical Class of Conjunctive Queries. - Sébastien Bardin, Nikolai Kosmatov, François Cheynier:

Efficient Leverage of Symbolic ATG Tools to Advanced Coverage Criteria. - M. Laxmaiah, A. Govardhan:

Gcube Indexing. - Georg Ostrovski, Sebastian van Strien:

Payoff Performance of Fictitious Play. - Augustine Kwanashie, David F. Manlove:

An Integer Programming Approach to the Hospital/Residents Problem with Ties. - José Bento, Morteza Ibrahimi:

Support Recovery for the Drift Coefficient of High-Dimensional Diffusions. - Michael Sagraloff, Kurt Mehlhorn:

Computing Real Roots of Real Polynomials - An Efficient Method Based on Descartes' Rule of Signs and Newton Iteration. - Rajgopal Kannan, Costas Busch, Paul G. Spirakis:

The Price of Anarchy is Unbounded for Congestion Games with Superpolynomial Latency Costs. - Rajeev Alur, Salar Moarref, Ufuk Topcu:

Counter-Strategy Guided Refinement of GR(1) Temporal Logic Specifications. - Carl Andersen, Brett Benyo, Miguel Calejo, Mike Dean, Paul Fodor, Benjamin N. Grosof, Michael Kifer, Senlin Liang, Terrance Swift:

Understanding Rulelog Computations in Silk. - Carlos Cardonha, Marcos Dias de Assunção, Marco Aurélio Stelmar Netto, Renato Luiz de Freitas Cunha, Carlos Queiroz:

Patience-aware Scheduling for Cloud Services: Freeing Users from the Chains of Boredom. - Mrigank Sharad, Deliang Fan, Kaushik Roy:

Ultra-low Energy, High Performance and Programmable Magnetic Threshold Logic. - Marco Comini, Laura Titolo, Alicia Villanueva:

Towards an Effective Decision Procedure for LTL formulas with Constraints. - Bin Lu, Joseph O'Rourke, Jianyuan K. Zhong:

A 2-chain can interlock with an open 10-chain. - Siddharth Narayanaswamy, Andrei Barbu, Jeffrey Mark Siskind:

Seeing What You're Told: Sentence-Guided Activity Recognition In Video. - Marthe Bonamy, Benjamin Lévêque, Alexandre Pinlou:

List coloring the square of sparse graphs with large degree. - Erik Rodner, Judy Hoffman, Jeff Donahue, Trevor Darrell, Kate Saenko:

Towards Adapting ImageNet to Reality: Scalable Domain Adaptation with Implicit Low-rank Transformations. - (Withdrawn) Full-Diversity Space-Time Block Codes for Integer-Forcing Linear Receivers.

- Jose Fernando S. Carvalho, Paulo Anselmo da Mota Silveira Neto, Vinicius Cardoso Garcia, Rodrigo Elia Assad, Frederico Araújo Durão:

A Systematic Mapping Study on Cloud Computing. - Liang Feng Zhang, Reihaneh Safavi-Naini:

Privately Outsourcing Polynomial Evaluations and Matrix Multiplications using Multilinear Maps. - Angelo Ciaramella, Giulio Giunta:

Compressive Sampling for the Packet Loss Recovery in Audio Multimedia Streaming. - Masaaki Nagahara:

Multirate Digital Signal Processing via Sampled-Data H-infinity Optimization. - Xiongping Dai, Tingwen Huang, Yu Huang, Mingqing Xiao:

Chaotic Characteristic of Discrete-time Linear Inclusion Dynamical Systems. - Edoardo Di Napoli, Eric Polizzi, Yousef Saad:

Efficient estimation of eigenvalue counts in an interval. - Jinghui Zhang, Tong Ye, Tony Tong Lee, Fangfang Yan, Weisheng Hu:

Birkhoff-von-Neumann Switches with Deflection-Compensated Mechanism. - Patrizio Angelini, Fabrizio Frati, Maurizio Patrignani, Vincenzo Roselli:

Morphing Planar Graphs Drawings Efficiently. - Enzo Fioriti, Stefano Chiesa, Fabio Fratichini:

Expanding the Knowledge Horizon in Underwater Robot Swarms. - Abouzar Ghavami, Koushik Kar, Aparna Gupta:

Decentralized Charging of Plug-In Electric Vehicles with Distribution Feeder Overload Control. - Leonardo Torres, Alejandro César Frery:

SAR Image Despeckling Algorithms using Stochastic Distances and Nonlocal Means. - Janusz A. Brzozowski, Gareth Davies:

Maximally Atomic Languages. 151-161 - Peter Roelse:

A new key establishment protocol and its application in pay-TV systems. - M. Reza Rahimi, Nalini Venkatasubramanian, Sharad Mehrotra, Athanasios V. Vasilakos:

On Optimal and Fair Service Allocation in Mobile Cloud Computing. - Gang Mei

, John C. Tipper:
Simple and Robust Boolean Operations for Triangulated Surfaces. - Firouz Abdullah Al-Wassai, N. V. Kalyankar:

Influences Combination of Multi-Sensor Images on Classification Accuracy. - Keehang Kwon:

A New Statement for Selection and Exception Handling in Imperative Languages. - Reza Pournaghi, Xiaolin Wu:

Coded Acquisition of High Frame Rate Video. - Ulas C. Kozat, Guanfeng Liang, Koray Kokten:

On Diagnosis of Forwarding Plane via Static Forwarding Rules in Software Defined Networks. - Craig Dillabaugh:

External Memory Algorithms For Path Traversal in Graphs. - Tong Ye, Tony Tong Lee, Wei Wu, Weisheng Hu:

AWG-based Non-blocking Clos Networks. - Juan Luo, Yves Lepage:

An Investigation of the Sampling-Based Alignment Method and Its Contributions. - Neeta Sharma, Manoj Kumar:

The Wonderful Toy of 20th Century can be a Disaster in 21st Century: Scenario and Policies Regarding Mobile Waste in India. - Manoj Kumar, Sheshendra Rathi:

Services in Android can Share Your Personal Information in Background. - Jing Xia, Liuquan Wang, Maosheng Xiong:

On a question of Babadi and Tarokh II. - Kai Han, Chi Zhang, Jun Luo:

Truthful Scheduling Mechanisms for Powering Mobile Crowdsensing. - Ala Aboudib, Vincent Gripon, Xiaoran Jiang:

A study of retrieval algorithms of sparse messages in networks of neural cliques. - Zhe Chen:

On the Generative Power of Omega-Grammars and Omega-Automata. - Christoph Benzmüller, Bruno Woltzenlogel Paleo:

Formalization, Mechanization and Automation of Gödel's Proof of God's Existence. - Iain McBride, David F. Manlove:

The Hospitals / Residents Problem with Couples: Complexity and Integer Programming Models. - Sami Akin, Mustafa Cenk Gursoy:

On the Throughput and Energy Efficiency of Cognitive MIMO Transmissions. - Cem Tekin, Mihaela van der Schaar:

Decentralized Online Big Data Classification - a Bandit Framework. - Cem Tekin, Mihaela van der Schaar:

Distributed Online Learning via Cooperative Contextual Bandits. - Neri Merhav:

Codeword or noise? Exact random coding exponents for slotted asynchronism. - Michael J. Bell, Matthew Collison, Phillip W. Lord:

Can inferred provenance and its visualisation be used to detect erroneous annotation? A case study using UniProtKB. - Enzo Fioriti, Marta Chinnici, Andrea Arbore:

Topological security assessment of technological networks. - Nikki McNeil, Robert A. Bridges, Michael D. Iannacone, Bogdan D. Czejdo, Nicolas Perez, John R. Goodall:

PACE: Pattern Accurate Computationally Efficient Bootstrapping for Timely Discovery of Cyber-Security Concepts. - Sándor P. Fekete, Stephan Friedrichs, Alexander Kröller, Christiane Schmidt:

Facets for Art Gallery Problems. - Mrigank Sharad, Deliang Fan, Kaushik Roy:

Ultra-low Energy, High-Performance Dynamic Resistive Threshold Logic. - Denny Hermawanto

:
Genetic Algorithm for Solving Simple Mathematical Equality Problem. - Manish Sharma, Atul Chaudhary, Santosh Kumar:

Query Processing Performance and Searching Over Encrypted Data By Using An Efficient Algorithm. - Yaqin Zhou, Xiang-Yang Li, Fan Li, Min Liu, Zhongcheng Li, Zhiyuan Yin:

Almost Optimal Channel Access in Multi-Hop Networks With Unknown Channel Variables. - Ziqiang Shi:

Online Douglas-Rachford splitting method. - Tri Kurniawan Wijaya, Kate Larson, Karl Aberer:

Matching Demand with Supply in the Smart Grid using Agent-Based Multiunit Auction. - Mohsen Zamani, Giulio Bottegal, Brian D. O. Anderson:

On the Zero-freeness of Tall Multirate Linear Systems. - Georg Hofferek, Ashutosh Gupta, Bettina Könighofer, Jie-Hong Roland Jiang, Roderick Bloem:

Synthesizing Multiple Boolean Functions using Interpolation on a Single Proof. - Cewei Cui, Zhe Dang, Thomas R. Fischer:

Bit Rate of Programs. - Na Li, Zesong Fei, Chengwen Xing, Jingming Kuang:

Adaptive Multi-objective Optimization for Energy Efficient Interference Coordination in Multi-Cell Networks. - Qasem Abdollah Nezhad, Javad Palizvan Zand, Samira Shah Hoseini:

An Investigation On Fuzzy Logic Controllers (TAKAGI-SUGENO & MAMDANI) In Inverse Pendulum System. - Suhyuk Kwon, Jian Wang, Byonghyo Shim:

Multipath Matching Pursuit. - A. W. M. van Schijndel:

The Mapping of Simulated Climate-Dependent Building Innovations. - Xiao Ma, Chulong Liang, Kechao Huang, Qiutao Zhuang:

Block Markov Superposition Transmission: Construction of Big Convolutional Codes from Short Codes. - Clinton F. Goss:

Machine Code Optimization - Improving Executable Object Code. - Swapan Bhattachrya, Devmalya Banerjee, Abirlal Biswas, Pijush Biswas:

A secured communication link design using narrow line of sight technique. - Shariq Hussain, Zhaoshun Wang, Sabit Rahim:

E-learning Services for Rural Communities. - Kyeong Soo Kim:

A Research Framework for the Clean-Slate Design of Next-Generation Optical Access. - Tor Lattimore, Marcus Hutter, Peter Sunehag:

The Sample-Complexity of General Reinforcement Learning. - Zeynep Pehlivan, Benjamin Piwowarski, Stéphane Gançarski:

Diversification Based Static Index Pruning - Application to Temporal Collections. - Ivan Stupia, Luca Sanguinetti, Giacomo Bacci, Luc Vandendorpe:

Energy-Efficient Power Optimization in Heterogeneous Networks: A Quasi-Variational Inequality Approach. - Krishnendu Chatterjee, Martin Chmelik:

POMDPs under Probabilistic Semantics. - Yeasir Fathah Rumi, Uzzal Kumar Prodhan, Mohammed Ibrahim Hussain, A. H. M. Shahariar Parvez, Md. Ali Hossain:

Strategy For Assessment Of Land And Complex Fields Type Analysis Through GIS In Bangladesh. - Abdulrahman Aldhaheri, Christian Bach:

How to implement Marketing 2.0 Successfully. - Abdulrahman Aldhaheri, Hammoud Alshammari, Majid Alshammari:

Optimizing Key Distribution in Peer to Peer Network Using B-Trees. - Aini Najwa Azmi, Dewi Nasien, Siti Mariyam Shamsuddin:

A review on handwritten character and numeral recognition for Roman, Arabic, Chinese and Indian scripts. - Luca Bortolussi

, Manuela-Luminita Bujorianu, Giordano Pola:
Proceedings Third International Workshop on Hybrid Autonomous Systems, HAS 2013, Rome, Italy, 17th March 2013. EPTCS 124, 2013 [contents] - Joel Kronander, Stefan Gustavson, Gerhard Bonnet, Anders Ynnerman, Jonas Unger:

A Unified Framework for Multi-Sensor HDR Video Reconstruction. - (Withdrawn) Learning Deep Representation Without Parameter Inference for Nonlinear Dimensionality Reduction.

- Robert A. Bridges, Corinne L. Jones, Michael D. Iannacone, John R. Goodall:

Automatic Labeling for Entity Extraction in Cyber Security. - David I. Shuman, Mohammad Javad Faraji, Pierre Vandergheynst:

A Framework for Multiscale Transforms on Graphs. - Claus-Peter Wirth, Frieder Stolzenburg:

David Poole's Specifity Revised. - Maurice Margenstern, Lan Wu:

A proposal for a Chinese keyboard for cellphones, smartphones, ipads and tablets. - Xiaofeng Wang, Daniel Graziotin, Juha Rikkilä, Pekka Abrahamsson:

Traverse the landscape of the mind by walking: an exploration of a new brainstorming practice. - Dionysios S. Kalogerias, Athina P. Petropulu:

Matrix Completion in Colocated MIMO Radar: Recoverability, Bounds & Theoretical Guarantees. - Yair Bartal, Lee-Ad Gottlieb, Ofer Neiman:

On the Impossibility of Dimension Reduction for Doubling Subsets of ℓp, p>2. - Bogdan Gliwa, Anna Zygmunt, Stanislaw Podgórski:

Incorporating Text Analysis into Evolution of Social Groups in Blogosphere. - Nathan Oken Hodas, Kristina Lerman:

The Simple Rules of Social Contagion. - Xiaoliang Li, Dongming Wang:

Computing Equilibria of Semi-algebraic Economies Using Triangular Decomposition and Real Solution Classification. - Liane Gabora, Steve DiPaola:

How Did Humans Become So Creative? A Computational Approach. - Guanghui Huang, Zhifeng Pan:

A hybrid evolutionary algorithm with importance sampling for multi-dimensional optimization. - Po-Yu Chen, Ivan W. Selesnick:

Group-Sparse Signal Denoising: Concave Regularization, Convex Optimization. - Carlos Ansótegui, Maria Luisa Bonet, Jesús Giráldez-Cru, Jordi Levy:

The Fractal Dimension of SAT Formulas. - Juan Liu, Huaiyu Dai, Wei Chen:

Delay Optimal Scheduling for Energy Harvesting Based Communications. - Panqu Wang, Yan Zhang:

Suspicious Object Recognition Method in Video Stream Based on Visual Attention. - Franz-Josef Brandenburg:

1-Visibility Representations of 1-Planar Graphs. - Mithileysh Sathiyanarayanan, Kyeong Soo Kim:

Multi-Channel Deficit Round-Robin Scheduling for Hybrid TDM/WDM Optical Networks. - Derek Greene, Pádraig Cunningham:

Discovering Latent Patterns from the Analysis of User-Curated Movie Lists. - Naisan Benatar, Uwe Aickelin, Jonathan M. Garibaldi:

Performance Measurement Under Increasing Environmental Uncertainty In The Context of Interval Type-2 Fuzzy Logic Based Robotic Sailing. - Josie McCulloch, Christian Wagner, Uwe Aickelin:

Extending Similarity Measures of Interval Type-2 Fuzzy Sets to General Type-2 Fuzzy Sets. - Josie McCulloch, Christian Wagner, Uwe Aickelin:

Measuring the Directional Distance Between Fuzzy Sets. - Uwe Aickelin, Dipankar Dasgupta, Feng Gu:

Artificial Immune Systems (INTROS 2). - Yihui Liu, Uwe Aickelin:

Detect adverse drug reactions for drug Pioglitazone. - Ali Ahmed, Justin K. Romberg:

Compressive Multiplexing of Correlated Signals. - Deborah Cohen, Yonina C. Eldar:

Sub-Nyquist Sampling for Power Spectrum Sensing in Cognitive Radios: A Unified Approach. - Parikshit Gopalan, Salil P. Vadhan, Yuan Zhou:

Locally Testable Codes and Cayley Graphs. - Oliver Friedmann, Markus Latte, Martin Lange:

Satisfiability Games for Branching-Time Logics. - Shan-Hung Wu, Man-Ju Chou, Ming-Hung Wang, Chun-Hsiung Tseng, Yuh-Jye Lee, Kuan-Ta Chen:

Is Somebody Watching Your Facebook Newsfeed? - James Pallister, Simon J. Hollis, Jeremy Bennett:

BEEBS: Open Benchmarks for Energy Measurements on Embedded Platforms. - Gitanjali, Sukhjit Singh Sehra, Jaiteg Singh:

Policy Specification in Role based Access Control on Clouds. - Nicolas Boumal, Bamdev Mishra, Pierre-Antoine Absil, Rodolphe Sepulchre:

Manopt, a Matlab toolbox for optimization on manifolds. - Gozde Ozcan, Mustafa Cenk Gursoy:

Throughput of Cognitive Radio Systems with Finite Blocklength Codes. - Afonso S. Bandeira, Christopher Kennedy, Amit Singer:

Approximating the Little Grothendieck Problem over the Orthogonal Group. - (Withdrawn) Simple Locally Repairable Codes for Distributed Storage System.

- Emden R. Gansner, Yifan Hu, Shankar Krishnan:

COAST: A Convex Optimization Approach to Stress-Based Embedding. - Ali Makhdoumi, Shao-Lun Huang, Muriel Médard, Yury Polyanskiy:

On Locally Decodable Source Coding. - Christopher A. Baker:

A Note on Sparsification by Frames. - Afonso S. Bandeira, Moses Charikar, Amit Singer, Andy Zhu:

Multireference Alignment using Semidefinite Programming. - (Withdrawn) A comparative analysis of methods for estimating axon diameter using DWI.

- Jugal Garg, Vijay V. Vazirani:

Computability of Equilibria in Markets with Production. - Luca de Alfaro, Michael Shavlovsky:

CrowdGrader: Crowdsourcing the Evaluation of Homework Assignments. - Rishabh K. Iyer, Jeff A. Bilmes:

The Lovasz-Bregman Divergence and connections to rank aggregation, clustering, and web ranking. - Luca Canzian, Yu Zhang, Mihaela van der Schaar:

Ensemble of Distributed Learners for Online Classification of Dynamic Data Streams. - Sabir Ribas, Berthier A. Ribeiro-Neto, Edmundo de Souza e Silva, Nivio Ziviani:

R-Score: Reputation-based Scoring of Research Groups. - Xi Zhang, Xiangyun Zhou, Matthew R. McKay

:
Enhancing Secrecy with Multi-Antenna Transmission in Wireless Ad Hoc Networks. - Amelia Carolina Sparavigna:

Edge-detection applied to moving sand dunes on Mars. - Seppo Ilari Tirri:

Evolution Theory of Self-Evolving Autonomous Problem Solving Systems. - Xu Li, Xingming Sun, Quansheng Liu, Beijing Chen:

A Novel Method for Image Integrity Authentication Based on Fixed Point Theory. - Ezio Bartocci

, Radu Grosu:
Monitoring with uncertainty. 1-4 - Rafael Wisniewski:

Combinatorial Abstractions of Dynamical Systems. 5-8 - Maria Domenica Di Benedetto, Giordano Pola:

Networked Embedded Control Systems: from Modelling to Implementation. 9-13 - Elodie Chanthery, Pauline Ribot:

An Integrated Framework for Diagnosis and Prognosis of Hybrid Systems. 14-25 - Rafael Wisniewski, Christoffer Sloth

:
Completeness of Lyapunov Abstraction. 26-42 - Alberto Casagrande

, Tommaso Dreossi, Carla Piazza
:
Approximated Symbolic Computations over Hybrid Automata. 43-57 - Marta Capiluppi, Roberto Segala

:
World Automata: a compositional approach to model implicit communication in hierarchical Hybrid Systems. 58-72 - Davide Bresolin

:
HyLTL: a temporal logic for model checking hybrid systems. 73-84 - Ezio Bartocci

:
Sampling-based Decentralized Monitoring for Networked Embedded Systems. 85-99 - Andrea Ocone, Guido Sanguinetti

:
A stochastic hybrid model of a biological filter. 100-108 - Maria Simonsen

, John Leth
, Henrik Schiøler
, Horia D. Cornean
:
A Simple Stochastic Differential Equation with Discontinuous Drift. 109-123 - Cagdas Bilen, Gilles Puy, Rémi Gribonval, Laurent Daudet:

Convex Optimization Approaches for Blind Sensor Calibration using Sparsity. - (Withdrawn) A Framework on GPON and next generation WDM PON.

- Arun I. B, T. G. Venkatesh:

Adaptive Backoff Algorithm for IEEE 802.11 DCF under MPR Wireless Channels. - Cunsheng Ding, Ying Gao, Zhengchun Zhou:

Five Families of Three-Weight Ternary Cyclic Codes and Their Duals. - Daniel G. Schwartz:

Dynamic Reasoning Systems. - (Withdrawn) Effects of Crowding Perception on Self-organized Pedestrian Flows Using Adaptive Agent-based Model.

- Robert B. Allen:

Toward an Interactive Directory for Norfolk, Nebraska: 1899-1900. - Luke Farmer, Kyeong Soo Kim:

Cooperative ISP Traffic Shaping Schemes in Broadband Shared Access Networks. - Marcelo P. Fiore, Ola Mahmoud:

Second-Order Algebraic Theories. - Nils Ulltveit-Moe, Vladimir A. Oleshchuk:

Measuring Privacy Leakage for IDS Rules. - M. Thangarasu, Manavalan Radhakrishnan:

A Literature Review: Stemming Algorithms for Indian Languages. - Chunhua Geng, Hua Sun, Syed Ali Jafar:

Multilevel Topological Interference Management. - Rad Niazadeh, Robert D. Kleinberg:

A Unified Approach to Online Allocation Algorithms via Randomized Dual Fitting. - Henrik Ohlsson, Yonina C. Eldar:

On Conditions for Uniqueness in Sparse Phase Retrieval. - Boris Leistedt, Hiranya V. Peiris

, Jason D. McEwen:
Flaglets for studying the large-scale structure of the Universe. - Bodo Winter:

Linear models and linear mixed effects models in R with linguistic applications. - Willem L. Fouché:

Algorithmic randomness and Ramsey properties of countable homogeneous structures. - Greg Aloupis, Hebert Pérez-Rosés, Guillermo Pineda-Villavicencio, Perouz Taslakian, Dannier Trinchet:

Fitting Voronoi Diagrams to Planar Tesselations. - Rasit Tutgun, Emre Aktas:

Cooperative Network Coded ARQ Strategies for Two Way Relay Channel. - Bogdan Cautis, Alin Deutsch, Ioana Ileana, Nicola Onose:

Rewriting XPath Queries using View Intersections: Tractability versus Completeness. - Rad Niazadeh, Massoud Babaie-Zadeh, Christian Jutten:

Sparse Channel Estimation by Factor Graphs. - Zi Chao Wang:

Implicit Resolution. - Habib Ammari, Minh-Phuong Tran, Han Wang:

Shape identification and classification in echolocation. - Nathalie Diane Wandji, Xingming Sun, Moise Fah Kue:

Detection of copy-move forgery in digital images based on DCT. - Rafi Witten, Emmanuel J. Candès:

Randomized algorithms for low-rank matrix factorizations: sharp performance bounds. - Marcelo Arenas, Gonzalo I. Diaz

, Achille Fokoue, Anastasios Kementsietsidis, Kavitha Srinivas:
A Principled Approach to Bridging the Gap between Graph Data and their Schemas. - Jason D. McEwen, Pierre Vandergheynst, Yves Wiaux:

On the computation of directional scale-discretized wavelet transforms on the sphere. - Thao Dang, Carla Piazza

:
Proceedings Second International Workshop on Hybrid Systems and Biology, HSB 2013, Taormina, Italy, 2nd September 2013. EPTCS 125, 2013 [contents] - Pingzhi Yuan, Cunsheng Ding:

Further Results on Permutation Polynomials over Finite Fields. - Michael J. Bannister, David Eppstein, Joseph A. Simons:

Fixed parameter tractability of crossing minimization of almost-trees. - Paschalis Tsiaflakis, François Glineur, Marc Moonen:

Real-time dynamic spectrum management for multi-user multi-carrier communication systems. - Uzi Pereg, Ido Tal:

Channel Upgradation for Non-Binary Input Alphabets and MACs. - Tarik Mountassir, Bouchaib Nassereddine, Abdelkrim Haqiq, Samir Bennani:

Multi-Objective Particle Swarm Optimization for Facility Location Problem in Wireless Mesh Networks. - Paschalis Tsiaflakis, François Glineur:

Spectrum optimization in multi-user multi-carrier systems with iterative convex and nonconvex approximation methods. - Kyeong Soo Kim, Karin Ennser, Yogesh Kumar Dwivedi:

Clean-Slate Design of Next-Generation Optical Access. - Ebrahim Babaei, S. A. Kh. Mozaffari Niapour, Mehrdad Tabarraie:

Design of a non-linear power system stabiliser using the concept of the feedback linearisation based on the back-stepping technique. - Sumudu Samarakoon, Mehdi Bennis, Walid Saad, Matti Latva-aho:

Backhaul-Aware Interference Management in the Uplink of Wireless Small Cell Networks. - Olatunde Olabiyisi, Yusuff Akingboye, Adebayo Abayomi-Alli, Fred Izilein, Iyiola Adeleke:

An Investigation of the Incidences of Repetitive Strain Injury among computer Users in Nigeria. - Stoyan Maleshkov, Dimo Chotrov

:
Affordable Virtual Reality System Architecture for Representation of Implicit Object Properties. - Stoyan Maleshkov, Dimo Chotrov

:
Post-processing of Engineering Analysis Results for Visualization in VR Systems. - James F. Power:

Thue's 1914 paper: a translation. - Pili Hu, Wing Cheong Lau:

A Survey and Taxonomy of Graph Sampling. - Laura Rebollo-Neira, Ryszard Maciol, Shabnam Bibi:

Hierarchized block wise image approximation by greedy pursuit strategies. - Chunlei Li, Nian Li, Tor Helleseth, Cunsheng Ding:

On the weight distributions of several classes of cyclic codes from APN monomials. - David Baelde

, Arnaud Carayol:
Proceedings Workshop on Fixed Points in Computer Science, FICS 2013, Turino, Italy, September 1st, 2013. EPTCS 126, 2013 [contents] - Cyril Voyant

, Daniel Julian, Rudy Roustit, Katia Biffi, Celine Lantieri Marcovici:
Biological effects and equivalent doses in radiotherapy: a software solution. - Chen Avin, Michael Borokhovich, Yoram Haddad, Erez Kantor, Zvi Lotker, Merav Parter, David Peleg:

Generalized Perron-Frobenius Theorem for Nonsquare Matrices. - Ala'a Atallah Al-Mughrabi, Hussein Owaied:

Framework Model for Database Replication within the Availability Zones. - Abhinov Balagoni, Vinay Kumar Chavala:

A Multilayered Approach to Estimate Business Performance. - Stella Achtenberg, Dan Raphaeli:

Theoretic Shaping Bounds for Single Letter Constraints and Mismatched Decoding. - Sergey V. Dolgov, Alexander P. Smirnov, E. E. Tyrtyshnikov:

Low-rank approximation in the numerical modeling of the Farley-Buneman instability in ionospheric plasma. - Timothy Wang, Eric Feron:

Automated, Credible Autocoding of An Unmanned Aggressive Maneuvering Car Controller. - Harit Shah, Sharma Shankar Anandane, Shrikanth:

Security Issues on Cloud Computing. - Kandasamy Selvaradjou, A. Sharma Shankar, U. Anandakumar, N. Sivasundar:

Optimization of Bluetooth Audio Stream based on the Estimation of Proximity. - Zhe Yao, Vincent Gripon, Michael G. Rabbat:

Improving Sparse Associative Memories by Escaping from Bogus Fixed Points. 


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID